ACC 564 TUTOR Learn by Doing/acc564tutor.com ACC 564 TUTOR Learn by Doing/acc564tutor.com | Page 5
In a relational database, requiring that every record in a table have a
unique identifier is called the
. Question 21 .
Which of the following is an opportunity that could contribute to
employee fraud?
. Question 22 .
Which of the following is the greatest risk to information systems and
causes the greatest dollar losses?
. Question 23 .
One fraudulent scheme covers up a theft by creating cash through the
transfer of money between banks. This is known as
. Question 24 .
Most frauds are detected by
. Question 25 .
The most efficient way to conceal asset misappropriation is to
. Question 26 .
A fraud technique that slices off tiny amounts from many projects is
called the ________ technique.
. Question 27 .
Computer fraud perpetrators that modify programs during systems
development, allowing access into the system that bypasses normal
system controls are using
. Question 28 .
A fraud technique that allows a perpetrator to bypass normal system
controls and enter a secured system is called
. Question 29 .
Computer fraud perpetrators who use telephone lines to commit fraud
and other illegal acts are typically called
. Question 30 .
A ________ is similar to a ________, except that it is a program
rather than a code segment hidden in a host program.
. Question 31 .
________ controls prevent, detect and correct transaction errors and
fraud.
. Question 32 .