Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

21) Which of the following is an example of input fraud? A A man used desktop publishing to prepare bills for office supplies that were

image text in transcribed
21) Which of the following is an example of input fraud? A A man used desktop publishing to prepare bills for office supplies that were never oruc delivered and mailed them to local companies. and mailed them to local companies. The invoices were for less than $300, an amount that often does not require purchase orders or appro es not require purchase orders or approvals. A high percentage of the companies paid the bills. Wo accountants without the appropriate access rights hacked into Cisco's stock option system, transferred over $6.3 million of Cisco stock to their brokerage accoun stock. They used part of the funds to support an extravagant lifestyle, including a Mercedes-Benz, a $44.000 diamond ring, and a $20,000 Rolex watch. C) The office manager of a Wall Street law firm sold information to friends and prospective mergers and acquisitions found in Word files. w firm sold information to friends and relatives about trading the securities. ound in Word files. They made several million dollars ud perpetrator scanned a company paycheck used desktop publishing software to erase the payee and amount, and printed fictitious paychecks. ock to their brokerage accounts, and sold the lifestyle, including a $52,000 D) A fraud perpetrator scanned a company payo 22) _ is a simple, yet effective, method for catching or preventing many types of employee fraud. A) Requiring all employees to take annual vacations B) Monitoring all employees computer usage activities C) Requiring all employees to take a fraud prevention awareness course D) Explaining that fraud is illegal and will be severely punished to employees 23) Which of the following is not a way to make fraud less likely to occur? A) Adopt an organizational structure that minimizes the likelihood of fraud. B) Create an organizational culture that stresses integrity and commitment to ethical values. C) Create an audit trail so individual transactions can be traced. D) Effectively supervise employees. 24) The general ledger and reporting system consists of the involved in general ledger and reports. A) business transactions, updating processing B) data processing; business transactions for; printing C) information processing; updating, creating D) business transactions; data processing; preparing 25) Which item below is not considered a major input to the general ledger and reporting Eystem? ) summary entries from the major subsystems reports from managers adjusting entries financing and investing activities 21) Which of the following is an example of input fraud? A A man used desktop publishing to prepare bills for office supplies that were never oruc delivered and mailed them to local companies. and mailed them to local companies. The invoices were for less than $300, an amount that often does not require purchase orders or appro es not require purchase orders or approvals. A high percentage of the companies paid the bills. Wo accountants without the appropriate access rights hacked into Cisco's stock option system, transferred over $6.3 million of Cisco stock to their brokerage accoun stock. They used part of the funds to support an extravagant lifestyle, including a Mercedes-Benz, a $44.000 diamond ring, and a $20,000 Rolex watch. C) The office manager of a Wall Street law firm sold information to friends and prospective mergers and acquisitions found in Word files. w firm sold information to friends and relatives about trading the securities. ound in Word files. They made several million dollars ud perpetrator scanned a company paycheck used desktop publishing software to erase the payee and amount, and printed fictitious paychecks. ock to their brokerage accounts, and sold the lifestyle, including a $52,000 D) A fraud perpetrator scanned a company payo 22) _ is a simple, yet effective, method for catching or preventing many types of employee fraud. A) Requiring all employees to take annual vacations B) Monitoring all employees computer usage activities C) Requiring all employees to take a fraud prevention awareness course D) Explaining that fraud is illegal and will be severely punished to employees 23) Which of the following is not a way to make fraud less likely to occur? A) Adopt an organizational structure that minimizes the likelihood of fraud. B) Create an organizational culture that stresses integrity and commitment to ethical values. C) Create an audit trail so individual transactions can be traced. D) Effectively supervise employees. 24) The general ledger and reporting system consists of the involved in general ledger and reports. A) business transactions, updating processing B) data processing; business transactions for; printing C) information processing; updating, creating D) business transactions; data processing; preparing 25) Which item below is not considered a major input to the general ledger and reporting Eystem? ) summary entries from the major subsystems reports from managers adjusting entries financing and investing activities

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Accounting questions

Question

List common tools used in quality improvement. AppendixLO1

Answered: 1 week ago

Question

Identify important consumer protection laws and their purpose.

Answered: 1 week ago