All of the following are factors in the fraud triangle except

A. Ethical behavior of an individual
B. Pressure exerted on an individual at home and job related
C. Materiality of the assets
D. Opportunity to gain access to assets


Answer: C

Computer Science & Information Technology

You might also like to view...

The volatility attribute of a file specifies ________.

a) the frequency with which additions and deletions are made to a file b) whether the file is stored on a volatile medium c) the percentage of a file’s records accessed during a given period of time d) restrictions placed on access to data in a file

Computer Science & Information Technology

Count the total number of rooms in LOCATION.

Write queries for the following. (Use tables created in Chapter 4 Lab Activity.)

Computer Science & Information Technology

A virtual organization is one that has parts of the organization in different physical locations. They use computer networks and communications technology to work on projects. Advantages of a virtual organization are:

What will be an ideal response?

Computer Science & Information Technology

The accompanying figure shows three examples of a(n) ____.

A. output device B. scanner C. pointer D. pointing device

Computer Science & Information Technology