ACC 564 TUTOR Great Stories /acc564tutor.com ACC 564 TUTOR Great Stories /acc564tutor.com | страница 5
The database requirement that foreign keys must be null or have a value corresponding to the value of a primary key in another table is formally called the . Question 20 . In a relational database , requiring that every record in a table have a unique identifier is called the . Question 21 . Which of the following is an opportunity that could contribute to employee fraud ? . Question 22 . Which of the following is the greatest risk to information systems and causes the greatest dollar losses ? . Question 23 . One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks . This is known as . Question 24 . Most frauds are detected by . Question 25 . The most efficient way to conceal asset misappropriation is to . Question 26 . A fraud technique that slices off tiny amounts from many projects is called the ________ technique . . Question 27 . Computer fraud perpetrators that modify programs during systems development , allowing access into the system that bypasses normal system controls are using . Question 28 . A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called . Question 29 . Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called . Question 30 . A ________ is similar to a ________, except that it is a program rather than a code segment hidden in a host program .
The database requirement that foreign keys must be null or have a value corresponding to the value of a primary key in another table is formally called the . Question 20 . In a relational database , requiring that every record in a table have a unique identifier is called the . Question 21 . Which of the following is an opportunity that could contribute to employee fraud ? . Question 22 . Which of the following is the greatest risk to information systems and causes the greatest dollar losses ? . Question 23 . One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks . This is known as . Question 24 . Most frauds are detected by . Question 25 . The most efficient way to conceal asset misappropriation is to . Question 26 . A fraud technique that slices off tiny amounts from many projects is called the ________ technique . . Question 27 . Computer fraud perpetrators that modify programs during systems development , allowing access into the system that bypasses normal system controls are using . Question 28 . A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called . Question 29 . Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called . Question 30 . A ________ is similar to a ________, except that it is a program rather than a code segment hidden in a host program .