College of Administration and Finance SciencesAssignment (1)
Deadline: Saturday 22/04/2023 @ 23:59
Course Name: Introduction to
Accounting Information Systems
Student’s Name:
Course Code: ACCT 402
Student’s ID Number:
Semester: Third Term 22/23
CRN:
Academic Year: 1444 H
For Instructor’s Use only
Instructor’s Name: Yazeed A. Alnaeem
Students’ Grade:
/15
Level of Marks: High/Middle/Low
Instructions – PLEASE READ THEM CAREFULLY
• The Assignment must be submitted on Blackboard (WORD format only) via allocated
folder.
• Assignments submitted through email will not be accepted.
• Students are advised to make their work clear and well presented, marks may be
reduced for poor presentation. This includes filling your information on the cover
page.
• Students must mention question number clearly in their answer.
• Late submission will NOT be accepted.
• Avoid plagiarism, the work should be in your own words, copying from students or
other resources without proper referencing will result in ZERO marks. No exceptions.
• All answers must be typed using Times New Roman (size 12, double-spaced) font.
No pictures containing text will be accepted and will be considered plagiarism.
• Submissions without this cover page will NOT be accepted.
1
College of Administration and Finance Sciences
Assignment Question(s):
(Marks 15)
Question 1:
(04 Marks)
Explain what an AIS is, describe the basic tasks it performs in an organization using examples of Saudi
Companies.
Answer:
Question 2:
(03 Marks)
Give examples of Saudi companies that using ERP and what are the advantages of implementing the
ERP?
Answer:
Question 3:
•
(04 Marks)
What motives do people have for hacking? Why has hacking become so popular in
recent years? Do you regard it as a crime? Explain your position.
Answer
2
College of Administration and Finance Sciences
Question 4:
(02 Marks)
Describe at least four ways a company can make fraud less likely to occur.
Answer:
Question 5:
(02 Marks)
Personal information about customers is collected, used, disclosed, and maintained only in compliance
with internal policies and external regulatory requirements and is protected from unauthorized
disclosure. With reference to Privacy Concern how would you deal with SPAM and Identify Theft
problem of your business organization?
Answer:
3