ACC 564 TUTOR Learn by Doing/acc564tutor.com ACC 564 TUTOR Learn by Doing/acc564tutor.com | Page 5

In a relational database, requiring that every record in a table have a unique identifier is called the . Question 21 . Which of the following is an opportunity that could contribute to employee fraud? . Question 22 . Which of the following is the greatest risk to information systems and causes the greatest dollar losses? . Question 23 . One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks. This is known as . Question 24 . Most frauds are detected by . Question 25 . The most efficient way to conceal asset misappropriation is to . Question 26 . A fraud technique that slices off tiny amounts from many projects is called the ________ technique. . Question 27 . Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using . Question 28 . A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called . Question 29 . Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called . Question 30 . A ________ is similar to a ________, except that it is a program rather than a code segment hidden in a host program. . Question 31 . ________ controls prevent, detect and correct transaction errors and fraud. . Question 32 .