ResourcesThe issue of computer-based fraud cannot be relegated only to the Information Technology department and the outside auditors. Again, the tone at the top and management alertness are necessary. Learn more as you read:http://www.riskmanagementmonitor.com/insider-fraud-how-to-identify-and-prevent-internal-threats/In Accounting and Auditing, one often hears “Trust but Verify.” As a business professional, consider the following articles:Fraud Prevention Techniqueshttps://www.withum.com/resources/fraud-prevention-techniques/Victim of Fraud? What Can Be Done to Prevent It From Happening?https://www.withum.com/resources/company-victim-fraud-can-prevent-happening/What Is a Fraud Risk Assessment and Why Do I Need One?https://www.withum.com/resources/what-is-a-fraud-risk-assessment/Anatomy of a Fraudhttps://www.withum.com/resources/anatomy-of-a-fraud/Fraud in Not-for-Profitshttps://www.withum.com/resources/fraud-in-not-for-profits/Detect Internal Fraud Early with a Strong Audit Policyhttps://www.withum.com/resources/detect-internal-fraud-early-with-a-strong-audit-policy/Each of these learning activities, featured in the Readings for Week 4, assists in further developing your Common Body of Knowledge (CBOK) and completing the projects and deliverables for our course.Complete the Week 4 activities listed below.Explain your progress toward completing a major assignment in our course and how course resources to date assist you in the process.Each students posting should be unique!After reading the various resources this week from the weekly learning resources accessed here section, answer the following questions. This exercise is intended to get you to think about the various aspects of fraud detection and deterrence.single space APA 325 words.1. Select one of the readings and provide a summary.2. How did the reading relate to fraud detection and deterrence?3. What did you learn and how will you apply it going forward?