Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

8/4/22, 1:13 PM Computer Audit Ethics

Computer Audit Ethics


jchchatto@universityofbohol.edu.ph Switch account

Draft saved

Your email will be recorded when you submit this form

* Required

Multiple Choice

The exposure to stories and reports found in the 


popular media regarding * 1 point
the good or bad ramifications of computer technology
 

Para

Theoretical

Pop

Involves taking a real interest


in computer ethics cases and acquiring some * 1 point

level of skill and knowledge in the field

Pop

Theoretical

Para

https://docs.google.com/forms/d/e/1FAIpQLScL7-i1Qjrv4gJbZpb1-PokGGQQmSwg09C5HgJ_NacVAlNGxA/formResponse 1/6
8/4/22, 1:13 PM Computer Audit Ethics

Is of interest to multi-disciplinary researchers who apply the theories of * 1 point


philosophy, sociology, and psychology to computer science with the goal of
bringing some new understanding to the field.

Pop

Theoretical

Para

People desire to be in full control of what and how much information about * 1 point

themselves is
available to others, and to whom it is available.

privacy

ownership

computer security

The creation
and maintenance of huge, shared databases make it * 1 point
necessary to protect people from the
potential misuse of data.

privacy

computer security

ownership

https://docs.google.com/forms/d/e/1FAIpQLScL7-i1Qjrv4gJbZpb1-PokGGQQmSwg09C5HgJ_NacVAlNGxA/formResponse 2/6
8/4/22, 1:13 PM Computer Audit Ethics

An attempt to avoid such undesirable events as a loss of confidentiality or * 1 point


data integrity.

privacy

computer security

ownership

A condition to constitute a fraudulent act that there must be a false * 1 point

statement or a nondisclosure

Intent

Justifiable reliance

False representation

Material fact

A condition to constitute a fraudulent act that a fact must be a substantial * 1 point


factor in inducing someone to act

Material fact

Intent

Justifiable reliance

False representation

https://docs.google.com/forms/d/e/1FAIpQLScL7-i1Qjrv4gJbZpb1-PokGGQQmSwg09C5HgJ_NacVAlNGxA/formResponse 3/6
8/4/22, 1:13 PM Computer Audit Ethics

A condition to constitute a fraudulent act that there must be the intent to * 1 point
deceive or the knowledge that one’s statement is
false

Material fact

Justifiable reliance

Intent

False representation

Involves an executive, manager, or employee of the organization in * 1 point

collusion
with an outsider

Corruption

Bribery

Illegal Gratuities

Conflicts of Interest

Involves giving, offering, soliciting, or receiving things of value to influence * 1 point

an official in the performance of his or her lawful duties

Illegal Gratuities

Conflicts of Interest

Corruption

Bribery

https://docs.google.com/forms/d/e/1FAIpQLScL7-i1Qjrv4gJbZpb1-PokGGQQmSwg09C5HgJ_NacVAlNGxA/formResponse 4/6
8/4/22, 1:13 PM Computer Audit Ethics

Involves giving, receiving, offering, or soliciting something of value because * 1 point


of an official act that has been taken

Bribery

Illegal Gratuities

Conflicts of Interest

Corruption

Occurs when an employee acts on behalf of a third party during the * 1 point
discharge of
his or her duties or has self-interest in the activity being
performed

Corruption

Conflicts of Interest

Illegal Gratuities

Bribery

Involves schemes where cash receipts are stolen from an


organization after * 1 point

they have been recorded in the organization’s books and records

Pass-through

Billing schemes

Lapping

Cash larceny

https://docs.google.com/forms/d/e/1FAIpQLScL7-i1Qjrv4gJbZpb1-PokGGQQmSwg09C5HgJ_NacVAlNGxA/formResponse 5/6
8/4/22, 1:13 PM Computer Audit Ethics

Perpetrated by
employees who cause their employer to issue a payment to * 1 point

a false supplier or vendor


by submitting invoices for fictitious goods or
services, inflated invoices, or invoices for
personal purchases

Cash larceny

Lapping

Pass-through

Billing schemes

Similar to the shell company fraud with the exception that a


transaction * 1 point

actually takes place

Lapping

Billing schemes

Pass-through

Cash larceny

Back Next Clear form

Never submit passwords through Google Forms.

This form was created inside of University of Bohol. Report Abuse

 Forms

https://docs.google.com/forms/d/e/1FAIpQLScL7-i1Qjrv4gJbZpb1-PokGGQQmSwg09C5HgJ_NacVAlNGxA/formResponse 6/6

You might also like