NAME

Question types


Start with


Question limit

of 17 available terms

Advertisement Upgrade to remove ads
Print test

6 Written questions

6 Multiple choice questions

  1. deliberate destruction or harm to a system
  2. unless properly safeguarded, displayed or printed output can be stolen, copied or misused
  3. includes unauthorized system use, including the theft of computer time and services
  4. what fraud perpetrators are often referred to as
  5. a person's incentive or motivation for committing fraud (financial, emotional, lifestyle)
  6. gaining an unfair advantage over another person. legally, there must be: 1) a false statement, representation, or disclosure 2) a material fact, which is something that induces a person to act 3) an intent to deceive 4) a justifiable reliance; that is, the person relies on the misrepresentation to take an action 5) an injury or loss suffered by the victim

5 True/False questions

  1. cookiedata a website stores on your computer to identify the website to your computer so that you do not have to log on each time you visit the site

          

  2. fraudulent financial reportingintentional or reckless conduct, whether by act or omission, that results in materially misleading financial statement

          

  3. input fraudthe simplest and most common way to commit a computer fraud is to alter or falsify computer input

          

  4. misappropriation of assetsnatural and political disasters, software errors and equipment malfunctions, unintentional acts, intentional acts (computer crimes)

          

  5. computer fraudunless properly safeguarded, displayed or printed output can be stolen, copied or misused

          

Create Set