Fill This Form To Receive Instant Help
Homework answers / question archive / Harvard University AUDIT 111 Chapter 12-Business Ethics, Fraud, and Fraud Detection TRUE/FALSE 1)The ethical principle of justice asserts that the benefits of the decision should be distributed fairly to those who share the risks
Harvard University
AUDIT 111
Chapter 12-Business Ethics, Fraud, and Fraud Detection
1)The ethical principle of justice asserts that the benefits of the decision should be distributed fairly to those who share the risks.
assets.
a. |
minimize risk |
b. |
justice |
c. |
informed consent |
d. |
proportionality |
a. |
para computer ethics |
b. |
pop computer ethics |
c. |
theoretical computer ethics |
d. |
practical computer ethics |
a. |
Ethical behavior of an individual |
b. |
Pressure exerted on an individual at home and job related |
c. |
Materiality of the assets |
d. |
Opportunity to gain access to assets |
a. |
uniqueness of the product |
b. |
possibility of exact replication |
c. |
automated monitoring to detect intruders |
d. |
ease of dissemination |
except
a. |
poor judgment |
b. |
false representation |
c. |
intent to deceive |
d. |
injury or loss |
a. |
is perpetrated at a level to which internal controls do not apply |
b. |
involves misstating financial statements |
c. |
involves the direct conversion of cash or other assets to the employee’s personal benefit |
d. |
involves misappropriating assets in a series of complex transactions involving third parties |
a. |
a gambling addiction |
b. |
lack of segregation of duties |
c. |
centralized decision making environment |
d. |
questionable integrity of employees |
a. |
applying cash receipts to a different customer’s account in an attempt to conceal previous thefts of funds |
b. |
inflating bank balances by transferring money among different bank accounts |
c. |
expensing an asset that has been stolen |
d. |
creating a false transaction |
a. |
stealing cash from an organization before it is recorded |
b. |
Stealing cash from an organization after it has been recorded |
c. |
manufacturing false purchase orders, receiving reports, and invoices |
d. |
A clerk pays a vendor twice for the same products and cashes the reimbursement check issued by the vendor. |
a. |
justice |
b. |
self interest |
c. |
risk minimization |
d. |
proportionality |
a. |
stealing cash from an organization before it is recorded |
b. |
Stealing cash from an organization after it has been recorded |
c. |
manufacturing false purchase orders, receiving reports, and invoices |
d. |
A clerk pays a vendor twice for the same products and cashes the reimbursement check issued by the vendor.
|
a. |
concealing the crime to avoid detection |
b. |
stealing something of value |
c. |
misstating financial statements |
d. |
converting the asset to a usable form |
a. |
stealing cash from an organization before it is recorded |
b. |
Stealing cash from an organization after it has been recorded |
c. |
manufacturing false purchase orders, receiving reports, and invoices |
d. |
A clerk pays a vendor twice for the same products and cashes the reimbursement check issued by the vendor. |
a. |
segregation of duties |
b. |
accounting records |
c. |
accounting system |
d. |
access controls |
a. |
how managers decide on what is right in conducting business |
b. |
how managers achieve what they decide is right for the business |
c. |
both a and b |
d. |
none of the above |
a. |
false representation |
b. |
injury or loss |
c. |
intent |
d. |
material reliance |
a. |
bribery |
b. |
gratuities |
c. |
conflict of interest |
d. |
economic extortion |
a. |
Conflicts of interest |
b. |
Full and Fair Disclosures |
c. |
Legal Compliance |
d. |
Internal Reporting of Code Violations |
e. |
All of the above are issues to be addressed |
a. |
altering program logic to cause the application to process data incorrectly |
b. |
misusing the firm’s computer resources |
c. |
destroying or corrupting a program’s logic using a computer virus |
d. |
creating illegal programs that can access data files to alter, delete, or insert values |
a. |
theft or illegal use of computer-readable information |
b. |
theft, misuse, or misappropriation of computer equipment |
c. |
theft, misuse, or misappropriation of assets by altering computer-readable records and files |
d. |
theft, misuse, or misappropriation of printer supplies |
SEC?
are unintentional mistakes.
78?
two.
Already member? Sign In