ACC 564 Course Great Wisdom / tutorialrank.com ACC 564 Course Great Wisdom / tutorialrank.com | Page 6

Most frauds are detected by . Question 25 . The most efficient way to conceal asset misappropriation is to . Question 26 . A fraud technique that slices off tiny amounts from many projects is called the ________ technique. . Question 27 . Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using . Question 28 . A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called . Question 29 . Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called . Question 30 . A ________ is similar to a ________, except that it is a program rather than a code segment hidden in a host program. . Question 31 . ________ controls prevent, detect and correct transaction errors and fraud. . Question 32 . According to the ERM, these objectives help ensure the accuracy, completeness and reliability of internal and external company reports.