In a relational database, requiring that every record in a table have a unique identifier is called the. Question 21. Which of the following is an opportunity that could contribute to employee fraud?. Question 22. Which of the following is the greatest risk to information systems and causes the greatest dollar losses?. Question 23. One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks. This is known as. Question 24. Most frauds are detected by. Question 25. The most efficient way to conceal asset misappropriation is to. Question 26. A fraud technique that slices off tiny amounts from many projects is called the ________ technique.. Question 27. Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using. Question 28. A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called. Question 29. Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called. Question 30. A ________ is similar to a ________, except that it is a program rather than a code segment hidden in a host program.. Question 31. ________ controls prevent, detect and correct transaction errors and fraud.. Question 32.