asap pls 17. According to the fraud triangle, what three conditions exist for a traud to A. Control Environment, Objective Setting, Risk Response B. Incentive, Opportunity, Rationalize C. Incenti...
17. According to the fraud triangle, what three conditions exist for a traud to A. Control Environment, Objective Setting, Risk Response B. Incentive, Opportunity, Rationalize C. Incentive, Environment, Authorization D. Desire, Disregard, Demeanor 18. A fraud prevention program starts with A. the definition of the scope and ownership of IT process B. a fraud risk assessment across the entire firm C. a network packet D. the fraud triangle that appears to come from a source other than its actual source 19. Using redundant units to provide a system the ability to continue functioning when part of the system fails is called A. fail-proof systems B. fault tolerance C. zero risk systems D. just in time systems 20. The process of searching for patterns in the data in a data warehouse and to analyze patterns for decision making is called A. Information Technology B. Data Processing C. Customer Relationship Management D. Data Mining 21. Which of the following describes a group of computers that connects the internal users of a company distributed over an office building? A. Internet . LAN Virtual private network (VPN) Decentralized network
17. According to the fraud triangle, what three conditions exist for a traud to A. Control Environment, Objective Setting, Risk Response B. Incentive, Opportunity, Rationalize C. Incentive, Environment, Authorization D. Desire, Disregard, Demeanor 18. A fraud prevention program starts with A. the definition of the scope and ownership of IT process B. a fraud risk assessment across the entire firm C. a network packet D. the fraud triangle that appears to come from a source other than its actual source 19. Using redundant units to provide a system the ability to continue functioning when part of the system fails is called A. fail-proof systems B. fault tolerance C. zero risk systems D. just in time systems 20. The process of searching for patterns in the data in a data warehouse and to analyze patterns for decision making is called A. Information Technology B. Data Processing C. Customer Relationship Management D. Data Mining 21. Which of the following describes a group of computers that connects the internal users of a company distributed over an office building? A. Internet . LAN Virtual private network (VPN) Decentralized network