ACC 564 help A Guide to career/uophelp.com ACC 564 help A Guide to career/uophelp.com | Page 7
A fraud technique that slices off tiny amounts from many projects is
called the ________ technique.
. Question 27 .
Computer fraud perpetrators that modify programs during systems
development, allowing access into the system that bypasses normal
system controls are using
. Question 28 .
A fraud technique that allows a perpetrator to bypass normal system
controls and enter a secured system is called
. Question 29 .
Computer fraud perpetrators who use telephone lines to commit fraud
and other illegal acts are typically called
. Question 30 .
A ________ is similar to a ________, except that it is a program rather
than a code segment hidden in a host program.
. Question 31 .
________ controls prevent, detect and correct transaction errors and
fraud.
. Question 32 .
According to the ERM, these objectives help ensure the accuracy,
completeness and reliability of internal and external company reports.
. Question 33 .