Search Header Logo

Ethics, Fraud, and Internal Control Quiz

Authored by BYANGI BYANGI

Other

University

Used 3+ times

Ethics, Fraud, and Internal Control Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the Grandfather-Father-Son (GFS) backup system?

A method that only keeps the most recent backup file.  

A structured approach that stores multiple historical copies of data.  

A real-time backup system that updates every second.

A system that does not rotate or overwrite backups. 

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key difference between real-time backup systems and batch backup systems?

Real-time backups occur less frequently than batch backups.  

Batch systems process transactions instantly, while real-time backups are delayed.  

Real-time backups happen frequently and ensure immediate transaction backup.  

Real-time systems do not require backups since they process transactions immediately.  

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

ETHICS are the principles of conduct that individuals use in making choices that guide their behavior in situations involving the concepts of right and wrong.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

FRAUD is the false representation of a material fact made by one party to another party, with the intent to deceive and induce the other party to justifiably rely on the material fact to his or her detriment

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What makes the actual cost of fraud difficult to quantify?

Not all fraud is detected

Some fraud cases go unreported

Incomplete or mismanaged information

All of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does collusion between employees affect fraud risks?

It makes fraud easier to detect

It reduces the likelihood of fraud

It allows perpetrators to bypass internal controls

It only happens in large organizations

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Once data passes the input stage, ________ ensure the application’s logic functions correctly.

Batch Controls

Run-to-Run Controls

Hash Total Control

Processing Control

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?