ACCT 310
Latest uploads at ACCT 310. Looking for notes at ACCT 310? We have lots of notes, study guides and revision notes available for your school.
-
8
- 0
-
1
All courses for ACCT 310
-
ACCT 310 8
Latest content ACCT 310
ACCT 310 Test 2 | Verified with 100% Correct Answers Which of the following best describes the purpose of a BPMN collapsed sub-process? Contains a series of activities that are hidden from view Which of the following best describes the purpose of an intermediate error event? Illustrates the process flow when an exception occurs Which of the following best describes the difference between access controls and application controls? Access controls limit who can change records and application con...
- Exam (elaborations)
- • 12 pages's •
-
ACCT 310•ACCT 310
Preview 2 out of 12 pages
Getting your document ready...
ACCT 310 Test 2 | Verified with 100% Correct Answers Which of the following best describes the purpose of a BPMN collapsed sub-process? Contains a series of activities that are hidden from view Which of the following best describes the purpose of an intermediate error event? Illustrates the process flow when an exception occurs Which of the following best describes the difference between access controls and application controls? Access controls limit who can change records and application con...
Chapter 4 – Billing Schemes 
 
1.	Categories of billing schemes include which of the following? 
a.	Shell company schemes 
b.	Larceny billing schemes 
c.	Fictitious disbursements schemes 
d.	All of the above 
 
 
 
2.	In a	scheme, the perpetrator uses false documentation to cause a payment to be issued for a fraudulent purpose. 
a.	Purchasing 
b.	Skimming 
c.	Larceny 
d.	Billing 
 
3.	In the Fraud Tree, all of the following are categories of fraudulent disbursements except: 
a.	Payroll schemes...
- Exam (elaborations)
- • 6 pages's •
-
ACCT 310•ACCT 310
Preview 2 out of 6 pages
Getting your document ready...
Chapter 4 – Billing Schemes 
 
1.	Categories of billing schemes include which of the following? 
a.	Shell company schemes 
b.	Larceny billing schemes 
c.	Fictitious disbursements schemes 
d.	All of the above 
 
 
 
2.	In a	scheme, the perpetrator uses false documentation to cause a payment to be issued for a fraudulent purpose. 
a.	Purchasing 
b.	Skimming 
c.	Larceny 
d.	Billing 
 
3.	In the Fraud Tree, all of the following are categories of fraudulent disbursements except: 
a.	Payroll schemes...