NAME

Question types


Start with


Question limit

of 17 available terms

Advertisement Upgrade to remove ads
Print test

6 Written questions

6 Multiple choice questions

  1. what fraud perpetrators are often referred to as
  2. includes tampering with company software, copying software illegally, using software in an unauthorized manner, and developing software to carry out an unauthorized activity
  3. illegally using, copying, browsing, searching, or harming company data
  4. intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statement
  5. deliberate destruction or harm to a system
  6. the condition or situation that allows a person or organization to do three things: commit the fraud, conceal the fraud, and convert theft or misrepresentation to personal gain

5 True/False questions

  1. computer fraudthe simplest and most common way to commit a computer fraud is to alter or falsify computer input

          

  2. rationalizationillegally using, copying, browsing, searching, or harming company data

          

  3. cookiedata a website stores on your computer to identify the website to your computer so that you do not have to log on each time you visit the site

          

  4. the fraud trianglethree conditions are present when fraud occurs: a pressure, an opportunity, and a rationalization

          

  5. output fraudunless properly safeguarded, displayed or printed output can be stolen, copied or misused

          

Create Set