NAME

Question types


Start with


Question limit

of 17 available terms

Advertisement Upgrade to remove ads
Print test

6 Written questions

6 Multiple choice questions

  1. unless properly safeguarded, displayed or printed output can be stolen, copied or misused
  2. deliberate destruction or harm to a system
  3. the condition or situation that allows a person or organization to do three things: commit the fraud, conceal the fraud, and convert theft or misrepresentation to personal gain
  4. gaining an unfair advantage over another person. legally, there must be: 1) a false statement, representation, or disclosure 2) a material fact, which is something that induces a person to act 3) an intent to deceive 4) a justifiable reliance; that is, the person relies on the misrepresentation to take an action 5) an injury or loss suffered by the victim
  5. includes unauthorized system use, including the theft of computer time and services
  6. what fraud perpetrators are often referred to as

5 True/False questions

  1. input fraudunless properly safeguarded, displayed or printed output can be stolen, copied or misused

          

  2. Threat to AISsnatural and political disasters, software errors and equipment malfunctions, unintentional acts, intentional acts (computer crimes)

          

  3. data fraudillegally using, copying, browsing, searching, or harming company data

          

  4. rationalizationillegally using, copying, browsing, searching, or harming company data

          

  5. computer instructions fraudany fraud that requires computer technology knowledge to perpetrate, investigate, or prosecute it

          

Create Set