All of the following are factors in the fraud triangle except

A. Ethical behavior of an individual
B. Pressure exerted on an individual at home and job related
C. Materiality of the assets
D. Opportunity to gain access to assets

Answer: C

Computer Science & Information Technology

You might also like to view...

Additional RAM can be installed into slots on the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

In the linked list implementation of the queue, it was not necessary to set the pointer in the last node of the queue to NULL because:

A. we never had to search for an element in the queue B. the address stored in the back pointer gives the address of the last node C. it is never necessary to set a pointer in the last node of a linked list to NULL D. the last node in the queue is not necessarily the last node in the linked list

Computer Science & Information Technology