Philadelphia University – final exam – AIS- 2012/2013 Student name: Student number:

advertisement
Philadelphia University – final exam – AIS- 2012/2013
Student name:
Student number:
Section time:
1. Common approaches to “cooking the books” include concealing
a. losses
b. Revenues
c. Expenses
d. liabilities
e. A and d
2.
a.
b.
c.
d.
e.
Hackers and computer fraud perhaps tend to be more motivated by:
Curiosity
dreams
Pressure
Opportunity
Rationalization
3.
a.
b.
c.
d.
e.
The “Fraud Triangle” by Donald Cressey includes:
Pressure
Opportunity
Rationalization
All of above
None of above
4.
a.
b.
c.
d.
e.
to be considered fraudulent, an act must involve:
Oral false statement
writing false statement
A victim relies on the statement
All of above
None of above
5.
a.
b.
c.
d.
e.
all of the following types consider other fraud except:
Financial institution fraud
Check and credit card fraud
Insurance fraud
Fraudulent Statements
all of above
6. The pressure could be related to
a. Finances
b. Emotions
c. Lifestyle
d. Al of above
e. None of above
7. The direct beneficiary of financial statement fraud is
a. Individuals
b. Company
c. Perpetrators
d. Accountants
e. Managers
8. _______________ is an example of pressure related to finances:
a. Living beyond means
b. Power
c. Support gambling habit
d. Job dissatisfaction
e. Family pressure
9.
a.
b.
c.
d.
e.
Asset Misappropriation fraud include
Theft of Cash
Fraudulent disbursements
Inventory and other assets
All of above
None of above
10. Power or control is an example of :
a. Emotional fraud
b. life style fraud
c. Financial fraud
d. Occupational fraud
e. consultant fraud
11. ___________is the opening or gateway that allows an individual to commit
the fraud, conceal the fraud and convert the proceeds
a. Emotion
b. Life style
c. Opportunity
d. Pressure
e. Financial fraud
12. The simplest and most common way to commit a fraud is to alter computer:
a. Output
b. Process
c. Input.
d. instructions
e. Stored data
13. Management may allow fraud by:
a. Not Getting involved in the design or enforcement of internal controls
b. Inattention
c. carelessness;
d. Overriding controls
e. All of above
14. "I was just borrowing the money." This is an example of:
a. Rationalization
b. Pressure
c. Opportunity
d. Bad emotion
e. Good emotion
15. Input Fraud can take a number of forms, including:
a. Disbursement frauds
b. Inventory frauds
c. Payroll frauds
d. Cash receipt frauds
e. All of above
16. Using copies in an unauthorized manner is an act represents the fraud in :
a. Input.
b. instructions
c. Process
d. Output
e. Stored data
17. Organizations must take every precaution to protect their information systems
by certain measures can significantly decrease the potential for fraud and any
resulting losses, these measures include:
a. Make fraud less likely to occur
b. Increase the difficulty of committing fraud
c. Improve detection methods
d. Reduce fraud losses
e. All of above
18. Reduce Fraud Losses include
a. Conduct periodic external and internal audits, as well as special network
security audits.
b. Use software to monitor system activity and recover from fraud.
c. Implement a fraud hotline.
d. Develop a strong system of internal controls
e. All of above
19. damaging a company’s data files is example of
a. Input fraud
b. Output fraud
c. Process fraud
d. Data fraud
e. Instructions fraud
20. Lapping is an example of:
a. Commit the fraud
b. Convert the proceeds
c. Conceal the fraud
d. Change the situation
e. kiting
21. Hackers and computer fraud perhaps tend to be more motivated by:
a. absence
b. A quest for knowledge
c. Pressure
d. Opportunity
e. Rationalization
22. The combination of the database, the DBMS, and the application programs
that access the database is referred to as the:
a. Database system.
b. system
c. Database
d. File
e. Coordinated file
23. One of the following is a benefit of documentation:
a. Designing new systems / modifying an existing system
b. Auditing AISs
c. Complying with the regulations.
d. Training users.
e. all of above
24. The level of schema in which the entity can find Indexes is:
a. Internal level
b. External level
c. Conceptual level
d. Subschema level
e. None of above
25. The organization can achieve to ___________________ by combining master
files into larger pools of data accessible by many programs.
a. Data sharing
b. Reporting flexibility
c. Data integration
d. Minimal data redundancy and inconsistencies
e. Data independence
26. The square in the data flow diagram represents:
a. flows
b. sources
c. processes
d. stores
27. __________________ is a graphical representation supported by a narrative
description that explains how a system operates.
a. written descriptions
b. Diagrams
c. Flowcharts
d. Subsystem
e. None of above
GOOD LUCK
Download