Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

6. A perpetrator attacks phone systems to obtain free phone line access or uses telephone lines to transmit viruses and to access, steal, and destroy

image text in transcribed
6. A perpetrator attacks phone systems to obtain free phone line access or uses telephone lines to transmit viruses and to access, steal, and destroy data. What is this computer fraud technique called? a) phishing b) phreaking c) pharming d) vishing 7. From where do adjusting entries usually come? a) treasurer b) controller c) various accounting cycle subsystems, such as sales order entry d) unit managers 8. Recording and processing information about a transaction at the time it takes place is referred to as which of the following? a) batch processing b) online, real-time processing c) captured transaction processing d) chart of accounts processing 9. How are data sources and destinations represented in a data flow diagram? a) as a square b) as a curved arrow c) as a circle d) as two parallel lines 10. Which of the following attributes in the Cash Receipts table (representing payments received from customers) would most likely be a foreign key? a) cash receipt number b) customer check number c) customer number d) cash receipt date

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Audit Standards A Comparative Analysis

Authors: Walter W. O Willborn

1st Edition

0873890345, 978-0873890342

More Books

Students also viewed these Accounting questions

Question

d. How were you expected to contribute to family life?

Answered: 1 week ago