ACC 564 Experience Tradition / tutorialrank.com ACC 564 Experience Tradition / tutorialrank.com | Page 6

Most frauds are detected by . Question 25 . The most efficient way to conceal asset misappropriation is to . Question 26 .
A fraud technique that slices off tiny amounts from many projects is called the ________ technique .
. Question 27 .
Computer fraud perpetrators that modify programs during systems development , allowing access into the system that bypasses normal system controls are using
. Question 28 .
A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called
. Question 29 .
Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called
. Question 30 .
A ________ is similar to a ________, except that it is a program rather than a code segment hidden in a host program .
. Question 31 .
________ controls prevent , detect and correct transaction errors and fraud .
. Question 32 .
According to the ERM , these objectives help ensure the accuracy , completeness and reliability of internal and external company reports .