NAME

Question types


Start with


Question limit

of 17 available terms

Advertisement Upgrade to remove ads
Print test

6 Written questions

6 Multiple choice questions

  1. includes tampering with company software, copying software illegally, using software in an unauthorized manner, and developing software to carry out an unauthorized activity
  2. allows perpetrators to justify their illegal behavior
  3. data a website stores on your computer to identify the website to your computer so that you do not have to log on each time you visit the site
  4. intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statement
  5. unless properly safeguarded, displayed or printed output can be stolen, copied or misused
  6. deliberate destruction or harm to a system

5 True/False questions

  1. data fraudillegally using, copying, browsing, searching, or harming company data

          

  2. Threat to AISsnatural and political disasters, software errors and equipment malfunctions, unintentional acts, intentional acts (computer crimes)

          

  3. the fraud trianglethree conditions are present when fraud occurs: a pressure, an opportunity, and a rationalization

          

  4. processor fraudany fraud that requires computer technology knowledge to perpetrate, investigate, or prosecute it

          

  5. fraudgaining an unfair advantage over another person. legally, there must be: 1) a false statement, representation, or disclosure 2) a material fact, which is something that induces a person to act 3) an intent to deceive 4) a justifiable reliance; that is, the person relies on the misrepresentation to take an action 5) an injury or loss suffered by the victim

          

Create Set