ACC 564 help A Guide to career/uophelp.com ACC 564 help A Guide to career/uophelp.com | Page 7

A fraud technique that slices off tiny amounts from many projects is called the ________ technique. . Question 27 . Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using . Question 28 . A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called . Question 29 . Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called . Question 30 . A ________ is similar to a ________, except that it is a program rather than a code segment hidden in a host program. . Question 31 . ________ controls prevent, detect and correct transaction errors and fraud. . Question 32 . According to the ERM, these objectives help ensure the accuracy, completeness and reliability of internal and external company reports. . Question 33 .