NAME

Question types


Start with


Question limit

of 17 available terms

Print test

6 Written questions

6 Multiple choice questions

  1. includes unauthorized system use, including the theft of computer time and services
  2. theft of company assets. examples include embezzlement, falsifying records
  3. the condition or situation that allows a person or organization to do three things: commit the fraud, conceal the fraud, and convert theft or misrepresentation to personal gain
  4. allows perpetrators to justify their illegal behavior
  5. natural and political disasters, software errors and equipment malfunctions, unintentional acts, intentional acts (computer crimes)
  6. what fraud perpetrators are often referred to as

5 True/False questions

  1. sabotagedata a website stores on your computer to identify the website to your computer so that you do not have to log on each time you visit the site

          

  2. output fraudunless properly safeguarded, displayed or printed output can be stolen, copied or misused

          

  3. the fraud trianglenatural and political disasters, software errors and equipment malfunctions, unintentional acts, intentional acts (computer crimes)

          

  4. cookiedata a website stores on your computer to identify the website to your computer so that you do not have to log on each time you visit the site

          

  5. fraudillegally using, copying, browsing, searching, or harming company data