1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Slav-nsk [51]
4 years ago
10

A company used computer auditing techniques to compare employees' telephone numbers with vendors' telephone numbers. This is an

example of which step in a proactive fraud auditing?
Computers and Technology
2 answers:
sveta [45]4 years ago
7 0

Answer:

Building audit programs to proactively look for symptoms and exposures

Explanation:

Building audit programs to proactively look for symptoms and exposures, This simply means audit programs helps to detect error and fraud in a company and can as well help to detect ,prevent and investigate error which is why the audit program are build to proactively look for symptoms, Symptoms in this case means signs that shows that fraud or error is been or has been committed while exposure means to reveal and investigate the fraud once it has been detected.

Therefore building audit programs proactively identify the fraud symptoms of each exposure and as well investigate the fraud symptoms identified.

ElenaW [278]4 years ago
3 0

Answer:

Building audit programs to proactively look for symptoms and exposures

Explanation:

Proactive fraud auditing is the process by which fraud is proactively mitigated against by employing all encompassing means of detecting fraud in a system.

Step 4 in proactive fraud auditing characterizes searching for symptoms of fraud risks prior to identifying symptoms of fraud risks in step 3 of the process. Other steps in proactive fraud auditing include investigations and detection of the fraud.

You might be interested in
Who initially developed what is now known as the internet?
Lyrx [107]

in 1990, when computer scientist Tim Berners-Lee invented the World Wide Web.

5 0
3 years ago
Which number is equivalent to 17e3?<br><br> 17000.0<br> 1700.0<br> 0.017<br> 0.17
Nina [5.8K]

Answer:

17000.0

Explanation:

since it is a positive 3 you move the decimal 3 times to the right

8 0
3 years ago
An online article in 2001 described a study in which twelve sixth-grade students who had not previously played chess participate
ipn [44]
Bdbxhdhdhdbxbdhdhxhxhdhdhdhdhdhdhdhdhdbdhdhdhdhdhdhrhrhrhrhrhdhdhdhdisisieiejjdidieieieieieiei
6 0
3 years ago
Discuss the major procedures that investigators must use in order to collect network trace evidence of computer-related crimes.
frez [133]

Answer:

The answer is below

Explanation:

The major procedures that investigators must use to collect network trace evidence of computer-related crimes include the following:

1. Establish appropriate guidelines to follow: before starting the actual investigation, all the legal procedures and instructions to follow must be clearly stated and shown to everybody involved in the investigation process.

2. Assess the Evidence: the investigators must assess all the available evidence by checking the computer through a specific means. The assessment includes checking of hard drives, email accounts, social networking sites, or similar digital prints that can be used as proof of the criminal activities

3. Acquire the Evidence: here the investigators must find an appropriate means of gathering the evidence formally and legally. This may involve the removal of any form of hardware such as hard drives, and software-related items that can be extracted.

4. Examine the Evidence: this involved examination of the acquired evidence, to determine if it can be used as proof or not. This involved analyzing the evidence to check if they correlate with the criminal activities under investigation. Some of the things to check include, date of formation of the evidence, the names attached to it, the routes those data were sent or received from, etc.

5. Prepare a report and document them appropriately: this involved the proper detailing and recording of the information derived from the evidence. It includes the time of evidence examination and methods used in examining them. Also, the means at which they acquired the evidence among others.

8 0
3 years ago
In C#/ Write an application that computes the area of a circle, rectangle, and cylinder. Display a menu showing the three option
irga5000 [103]

Answer:

five nth cut gthrjhyyvhthtcycyhtbycuvhcyhcxhuffffvgxxv,-:

7 0
3 years ago
Other questions:
  • A ________ is a system of hardware and software that stores user data in many different geographical locations and makes that da
    14·1 answer
  • You can encrypt individual files, but microsoft recommends encrypting at what level?
    9·1 answer
  • In the SoundByte, the Magic Gradient Pen has an algorithm which listens for ________ and then changes the gradient coloring of t
    9·2 answers
  • When is e-mail an appropriate channel for goodwill messages? If you frequently communicate with the receiver by e-mail and are c
    15·1 answer
  • Anna is making a presentation on the solar system. She wants to emphasize the planet names as they appear one by one on the pres
    11·1 answer
  • The width of a strand of fiber is 19.2 micrometers. if 1500 strands are adhered side by side, how wide would the resulting fabri
    9·1 answer
  • Question 1. (50 points) 1.Write a program that computes information related to a sequence of entries regarding age of customers.
    6·1 answer
  • Each row in a database is a set of unique information called a(n)
    8·2 answers
  • Which of the following is an easy steps to take to avoid ESSD well working on your computer?
    5·1 answer
  • Emily is deciding whether to buy the same designer jacket her friends have. The jacket is much more expensive than a similar one
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!