You are on page 1of 16

3/7/22, 8:32 PM Chapter 3 Test

Chapter 3 Test
jchchatto@universityofbohol.edu.ph Switch account Draft saved

Your email will be recorded when you submit this form

* Required

Multiple Choice

Is of interest to multidisciplinary researchers who apply the theories of 1 point

philosophy, sociology, and psychology to computer science with the goal


of bringing some new understanding to the field. *

Pop computer ethics

Para computer ethics

Theoretical computer ethics

https://docs.google.com/forms/d/e/1FAIpQLScBEP9KxVKuQFhzdyVnJ6vdD482NLu0MPcRM8Tl3TvhBPXGPQ/formResponse 1/16
3/7/22, 8:32 PM Chapter 3 Test

In the four broad objectives of Internal Control, what is the objective for 1 point
the accounting records and information *

safeguard

accuracy and reliability

efficiency

compliance

(1) stealing something of value (an asset), (2) converting the asset to a 1 point
usable form (cash), and (3) concealing the crime to avoid detection are
steps to commit *

Employee fraud

Top management fraud

Middle management fraud

White collar crime

https://docs.google.com/forms/d/e/1FAIpQLScBEP9KxVKuQFhzdyVnJ6vdD482NLu0MPcRM8Tl3TvhBPXGPQ/formResponse 2/16
3/7/22, 8:32 PM Chapter 3 Test

In the 2008 ACFE fraud study results, women are not fundamentally more 1 point
honest than men, but women occupy high corporate positions in greater
numbers than women. This affords men greater access to assets *

True

False

The accounting information system consists of the records and methods 1 point
used to initiate, identify, analyze, classify, and record the organization’s
transactions and to account for the related assets and liabilities. *

control environment

risk assessment

information and communcation

monitoring

control activities

https://docs.google.com/forms/d/e/1FAIpQLScBEP9KxVKuQFhzdyVnJ6vdD482NLu0MPcRM8Tl3TvhBPXGPQ/formResponse 3/16
3/7/22, 8:32 PM Chapter 3 Test

Involves direct access to assets and/or access to information that controls 1 point
assets *

situational pressure

opportunity

ethics

First requires that the perpetrator establish a false supplier on the books of 1 point
the victim company. The fraudster then manufactures false purchase
orders, receiving reports, and invoices in the name of the vendor and
submits them to the accounting system, which creates the allusion of a
legitimate transaction. Based on these documents, the system will set up
an account payable and ultimately issue a check to the false supplier (the
fraudster). This sort of fraud may continue for years before it is detected. *

billing schemes

shell company

pass through fraud

pay-and-return

https://docs.google.com/forms/d/e/1FAIpQLScBEP9KxVKuQFhzdyVnJ6vdD482NLu0MPcRM8Tl3TvhBPXGPQ/formResponse 4/16
3/7/22, 8:32 PM Chapter 3 Test

The legislation that came about as a response to the Public outcry 1 point

surrounding ethical misconduct and fraudulent acts by executives of


Enron, Global Crossing, Tyco, Adelphia, WorldCom, and others. *

Sarbanes-Oxley Act (SOX)

John May Dodge the Exclusion Act

Securities and Exchange Commission (SEC) Acts of 1933 and 1934

Statement on Auditing Standards (SAS) No. 99, Consideration of Fraud in a Financial


Statement Audit

The policies and procedures used to ensure that appropriate actions are 1 point
taken to deal with the organization’s identified risks. *

control environment

risk assessment

information and communcation

monitoring

control activities

https://docs.google.com/forms/d/e/1FAIpQLScBEP9KxVKuQFhzdyVnJ6vdD482NLu0MPcRM8Tl3TvhBPXGPQ/formResponse 5/16
3/7/22, 8:32 PM Chapter 3 Test

Another term form fraud * 1 point

white-collar crime

defalcation

embezzlement

White collar crime

irregularities

all of the above

Sets the tone for the organization and influences the control awareness of 1 point

its management and employees *

control environment

risk assessment

information and communcation

monitoring

control activities

https://docs.google.com/forms/d/e/1FAIpQLScBEP9KxVKuQFhzdyVnJ6vdD482NLu0MPcRM8Tl3TvhBPXGPQ/formResponse 6/16
3/7/22, 8:32 PM Chapter 3 Test

The purpose is to ensure that all material transactions processed by the 1 point

information system are valid and in accordance with management’s


objectives *

general controls

application controls

physical controls

transaction authorization

The perpetrator creates a false vendor and issues purchase orders to it for 1 point

inventory or supplies. The false vendor then purchases the needed


inventory from a legitimate vendor. The false vendor charges the victim
company a much higher than market price for the items, but pays only the
market price to the legitimate vendor. The difference is the profit that the
perpetrator pockets *

billing schemes

shell company

pass through fraud

pay-and-return

https://docs.google.com/forms/d/e/1FAIpQLScBEP9KxVKuQFhzdyVnJ6vdD482NLu0MPcRM8Tl3TvhBPXGPQ/formResponse 7/16
3/7/22, 8:32 PM Chapter 3 Test

Identify, analyze, and manage risks relevant to financial reporting * 1 point

control environment

risk assessment

information and communcation

monitoring

control activities

Pertain to entity-wide concerns such as controls over the data center, 1 point
organization databases, systems development, and program maintenance.
*

general controls

application controls

physical controls

transaction authorization

https://docs.google.com/forms/d/e/1FAIpQLScBEP9KxVKuQFhzdyVnJ6vdD482NLu0MPcRM8Tl3TvhBPXGPQ/formResponse 8/16
3/7/22, 8:32 PM Chapter 3 Test

This typically involves a clerk with check writing authority who pays a 1 point
vendor twice for the same products (inventory or supplies) received. The
vendor, recognizing that its customer made a double payment, issues a
reimbursement to the victim company, which the clerk intercepts and
cashes *

billing schemes

shell company

pass through fraud

pay-and-return

A requirement that public companies to disclose to the SEC whether they 1 point

have adopted a code of ethics that applies to the organization’s chief


executive officer (CEO), CFO, controller, or persons performing similar
functions. *

Section 406 of SOX

John May Dodge the Exclusion Act

Securities and Exchange Commission (SEC) Acts of 1933 and 1934

Statement on Auditing Standards (SAS) No. 99, Consideration of Fraud in a Financial


Statement Audit

https://docs.google.com/forms/d/e/1FAIpQLScBEP9KxVKuQFhzdyVnJ6vdD482NLu0MPcRM8Tl3TvhBPXGPQ/formResponse 9/16
3/7/22, 8:32 PM Chapter 3 Test

Ensure the integrity of specific systems such as sales order processing, 1 point
accounts payable, and payroll applications *

general controls

application controls

physical controls

transaction authorization

Includes personal or job-related stresses that could coerce an individual to 1 point


act dishonestly. *

situational pressure

opportunity

ethics

https://docs.google.com/forms/d/e/1FAIpQLScBEP9KxVKuQFhzdyVnJ6vdD482NLu0MPcRM8Tl3TvhBPXGPQ/formResponse 10/16
3/7/22, 8:32 PM Chapter 3 Test

Involves taking a real interest in computer ethics cases and acquiring some 1 point
level of skill and knowledge in the field. All systems professionals need to
reach this level of competency so they can do their jobs effectively. *

Pop computer ethics

Para computer ethics

Theoretical computer ethics

In the four broad objectives of Internal Control, what is the objective for 1 point

the assets *

safeguard

accuracy and reliability

efficiency

compliance

https://docs.google.com/forms/d/e/1FAIpQLScBEP9KxVKuQFhzdyVnJ6vdD482NLu0MPcRM8Tl3TvhBPXGPQ/formResponse 11/16
3/7/22, 8:32 PM Chapter 3 Test

In the 2008 ACFE fraud study results, individuals in the highest positions 1 point

within an organization are beyond the internal control structure and have
the greatest access to company funds and assets. *

True

False

An attempt to avoid such undesirable events as a loss of confidentiality or 1 point


data integrity. *

privacy

ownership

security

Fraudulent statements are associated with * 1 point

Employee fraud

Management fraud

White collar crime

Defalcation

https://docs.google.com/forms/d/e/1FAIpQLScBEP9KxVKuQFhzdyVnJ6vdD482NLu0MPcRM8Tl3TvhBPXGPQ/formResponse 12/16
3/7/22, 8:32 PM Chapter 3 Test

Type of fraud is generally designed to directly convert cash or other assets 1 point
to the employee’s personal benefit *

Employee fraud

Top management fraud

Middle management fraud

White collar crime

Every system of internal control has limitations on its effectiveness. These 1 point
include (1) the non-possibility of error— the system is perfect. *

safeguard

accuracy and reliability

efficiency

compliance

https://docs.google.com/forms/d/e/1FAIpQLScBEP9KxVKuQFhzdyVnJ6vdD482NLu0MPcRM8Tl3TvhBPXGPQ/formResponse 13/16
3/7/22, 8:32 PM Chapter 3 Test

People desire to be in full control of what and how much information about 1 point
themselves is available to others, and to whom it is available. *

privacy

ownership

security

The exposure to stories and reports found in the popular media regarding 1 point

the good or bad ramifications of computer technology *

Pop computer ethics

Para computer ethics

Theoretical computer ethics

https://docs.google.com/forms/d/e/1FAIpQLScBEP9KxVKuQFhzdyVnJ6vdD482NLu0MPcRM8Tl3TvhBPXGPQ/formResponse 14/16
3/7/22, 8:32 PM Chapter 3 Test

Perpetrated by employees who causes their employer to issue a payment 1 point


to a false supplier or vendor by submitting invoices for fictitious goods or
services inflated invoices, or invoices for personal purchases. *

billing schemes

shell company

pass through fraud

pay-and-return

The distribution of fraudulent paychecks to existent and/or nonexistent 1 point


employees. *

payroll fraud

expense reimbursements fraud

theft of cash

computer fraud

https://docs.google.com/forms/d/e/1FAIpQLScBEP9KxVKuQFhzdyVnJ6vdD482NLu0MPcRM8Tl3TvhBPXGPQ/formResponse 15/16
3/7/22, 8:32 PM Chapter 3 Test

The process by which the quality of internal control design and operation 1 point
can be assessed. *

control environment

risk assessment

information and communcation

monitoring

control activities

Back Next Page 3 of 4 Clear form

Never submit passwords through Google Forms.

This form was created inside of University of Bohol. Report Abuse

 Forms

https://docs.google.com/forms/d/e/1FAIpQLScBEP9KxVKuQFhzdyVnJ6vdD482NLu0MPcRM8Tl3TvhBPXGPQ/formResponse 16/16

You might also like