Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

The term spoofing refers to: Select one: a. Computer hijacking b. Kidding c. Posing as a legitimate computer user d. Distributing junk mail All of

The term spoofing refers to: Select one: a. Computer hijacking b. Kidding c. Posing as a legitimate computer user d. Distributing junk mail All of the following are ways to thwart computer viruses except: Select one: a. Acquire a vaccine or antivirus program b. Do not download computer games from questionable sources c. Maintain complete backup files d. Buy shrinkwrapped software from reputable sources Almost all computer criminals can be described as: Select one: a. Professional criminals b. Technical hackers possessing strong computer skills c. White collar professional criminals d. Amateurs who describe themselves as relatively honest Which of the following is a benefit to corporate executives when a process is outsourced? Select one: a. Day-to-day process management responsibilities are deleted b. More time to explore new revenue generation activities c. More time to focus on recruiting and training personnel d. Changing customer demands are no longer a problem Which of the following is normally more important for a not-for-profit organization compared to a profit-oriented organization? Select one: a. Long-range goals b. Earning an adequate level of income each accounting period c. Long-range budgetary planning and controlling system d. Short-range budgetary planning and controlling system Another term for an accounting system accessed via the Internet is: Select one: a. Internet portal b. Online access c. Hosted solution d. BRP system A general rule that should be followed when developing control procedures for a company's assets is: Select one: a. The cost of the control procedure will likely exceed the procedure's benefit b. The procedure should not be designed and implemented unless an asset's cost exceeds $5,000 c. The more liquid an asset is, the greater the risk of its misappropriation d. The procedure should not be designed and implemented in situations where a risk assessment has been previously performed The auditors role in reviewing the system of computer program development: Select one: a. Does not include checking to see that all program changes are properly documented b. Does not include a check of librarian functions c. Does not include checking to see that program change requests are properly costed d. Includes a cross-check of program changes against in-use programs

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Police Auditing Standards And Applications

Authors: Allan Y. Jiao

2nd Edition

0398090750, 978-0398090753

More Books

Students also viewed these Accounting questions