NAME

Question types


Start with


Question limit

of 17 available terms

Advertisement Upgrade to remove ads
Print test

6 Written questions

6 Multiple choice questions

  1. illegally using, copying, browsing, searching, or harming company data
  2. any fraud that requires computer technology knowledge to perpetrate, investigate, or prosecute it
  3. the simplest and most common way to commit a computer fraud is to alter or falsify computer input
  4. data a website stores on your computer to identify the website to your computer so that you do not have to log on each time you visit the site
  5. what fraud perpetrators are often referred to as
  6. intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statement

5 True/False questions

  1. Threat to AISsnatural and political disasters, software errors and equipment malfunctions, unintentional acts, intentional acts (computer crimes)

          

  2. sabotagedeliberate destruction or harm to a system

          

  3. fraudillegally using, copying, browsing, searching, or harming company data

          

  4. the fraud trianglenatural and political disasters, software errors and equipment malfunctions, unintentional acts, intentional acts (computer crimes)

          

  5. processor fraudincludes unauthorized system use, including the theft of computer time and services

          

Create Set