Explain the shell company fraud.

What will be an ideal response?


A shell company fraud first requires that the perpetrator establish a false supplier on the books of the victim company. The fraudster then manufactures false purchase orders, receiving reports, and invoices in the name of the vendor and submits them to the accounting system, which creates the allusion of a legitimate transaction. Based on these documents, the system will set up an account payable and ultimately issue a check to the false supplier (the fraudster).

Computer Science & Information Technology

You might also like to view...

When a derived class has two or more base classes, the situation is called

a. multiple inheritance b. multiplicity c. polymorphism d. encapsulation e. None of these

Computer Science & Information Technology

Select Landscape orientation to print the page sideways.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What is the function of a router? What else do some routers do?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ________ is a notebook computer that is thin and light, has high-end processing, and video capabilities

Fill in the blank(s) with correct word

Computer Science & Information Technology