SlideShare a Scribd company logo
Accounting Information Systems, 6th
edition
James A. Hall
COPYRIGHT © 2009 South-Western, a division of Cengage Learning. Cengage Learning and South-Western
are trademarks used herein under license
Objectives for Chapter 9
Problems inherent in the flat file approach to data
management that gave rise to the database concept
Relationships among the defining elements of the
database environment
Anomalies caused by unnormalized databases and the
need for data normalization
Stages in database design: entity identification, data
modeling, constructing the physical database, and
preparing user views
Features of distributed databases and issues to consider in
deciding on a particular database configuration
Flat-File Versus Database Environments
Computer processing involves two components: data and
instructions (programs)
Conceptually, there are two methods for designing the
interface between program instructions and data:
File-oriented processing: A specific data file was created
for each application
Data-oriented processing: Create a single data
repository to support numerous applications.
Disadvantages of file-oriented processing include
redundant data and programs and varying formats for
storing the redundant data.
Flat-File Environment
Program 1
Program 2
Program 3
A,B,C
X,B,Y
L,B,M
User 2
Transactions
User 1
Transactions
User 3
Transactions
Data
Data Redundancy and Flat-File
Problems
Data Storage - creates excessive storage costs of
paper documents and/or magnetic form
Data Updating - any changes or additions must
be performed multiple times
Currency of Information - potential problem
of failing to update all affected files
Task-Data Dependency - user’s inability to
obtain additional information as his or her needs
change
Program 1
Program 2
Program 3
User 2
Transactions
User 1
Transactions
User 3
Transactions
Database
D
B
M
S
A,
B,
C,
X,
Y,
L,
M
Database Approach
Advantages of the Database Approach
Data sharing/centralize database resolves flat-file
problems:
 No data redundancy: Data is stored only once,
eliminating data redundancy and reducing storage
costs.
 Single update: Because data is in only one place, it
requires only a single update, reducing the time and
cost of keeping the database current.
 Current values: A change to the database made by any
user yields current data values for all other users.
 Task-data independence: As users’ information needs
expand, the new needs can be more easily satisfied
than under the flat-file approach.
Disadvantages of the Database Approach
Can be costly to implement
additional hardware, software, storage, and network
resources are required
Can only run in certain operating
environments
may make it unsuitable for some system
configurations
Because it is so different from
the file-oriented approach, the database
approach requires training users
may be inertia or resistance
Elements of the Database Environment
System Development
Process
Database
Administrator
U
S
E
R
S
DBMS
Host
Operating
System
Physical
Database
User
Programs
User
Programs
User
Programs
Applications
Data
Definition
Language
Data
Manipulation
Language
Query
Language
User Queries
Transactions
Transactions
Transactions
SystemRequests
Internal Controls and DBMS
The database management system (DBMS) stands
between the user and the database per se.
Thus, commercial DBMS’s (e.g., Access or Oracle)
actually consist of a database plus…
Plus software to manage the database, especially
controlling access and other internal controls
Plus software to generate reports, create data-entry
forms, etc.
The DBMS has special software to know which data
elements each user is authorized to access and deny
unauthorized requests of data.
DBMS Features
Program Development - user created applications
Backup and Recovery - copies database
Database Usage Reporting - captures statistics on
database usage (who, when, etc.)
Database Access - authorizes access to sections of the
database
Also…
User Programs - makes the presence of the DBMS
transparent to the user
Direct Query - allows authorized users to access data
without programming
Data Definition Language (DDL)
DDL is a programming language used to define
the database per se.
It identifies the names and the relationship of all data
elements, records, and files that constitute the
database.
DDL defines the database on three viewing levels
Internal view – physical arrangement of records (1
view)
Conceptual view (schema) – representation of
database (1 view)
User view (subschema) – the portion of the database
each user views (many views)
James hall ch 9
Data Manipulation Language (DML)
DML is the proprietary programming language
that a particular DBMS uses to retrieve, process,
and store data to / from the database.
Entire user programs may be written in the
DML, or selected DML commands can be
inserted into universal programs, such as
COBOL and FORTRAN.
Can be used to ‘patch’ third party applications
to the DBMS
Query Language
The query capability permits end users and
professional programmers to access data in the
database without the need for conventional
programs.
Can be an internal control issue since users may be
making an ‘end run’ around the controls built into
the conventional programs
IBM’s structured query language (SQL) is a fourth-
generation language that has emerged as the
standard query language.
Adopted by ANSI as the standard language for all
relational databases
Functions of the DBA
Database Conceptual Models
Refers to the particular method used to
organize records in a database
A.k.a. “logical data structures”
Objective: develop the database efficiently so
that data can be accessed quickly and easily
There are three main models:
hierarchical (tree structure)
network
relational
Most existing databases are relational. Some
legacy systems use hierarchical or network
databases.
The Relational Model
The relational model portrays data in the form
of two dimensional ‘tables’.
Its strength is the ease with which tables may
be linked to one another.
A major weakness of hierarchical and network
databases
Relational model is based on the relational
algebra functions of restrict, project, and join.
RESTRICT – filtering out rows,
such as the dark blue
PROJECT – filtering out columns,
such as the light blue
X1 X1
X2 X2
X3 X3
Y1
Y1
Y1 Y1
Y1
Y2 Y2 Y2
Y3
Z1 Z1
Z2 Z2
Z3 Z1
JOIN – build a new table or data set from multiple existing tables
Relational Algebra
Associations and Cardinality
Association – the labeled line connecting two
entities or tables in a data model
Describes the nature of the between them
Represented with a verb, such as ships, requests, or
receives
Cardinality – the degree of association between
two entities
The number of possible occurrences in one table that
are associated with a single occurrence in a related
table
Used to determine primary keys and foreign keys
“Crow’s Feet” Cardinalities
(1:0,1)
(1:1)
(1:0,M)
(1:M)
(M:M)
Properly Designed Relational Tables
Each row in the table must be unique in at least
one attribute, which is the primary key.
Tables are linked by embedding the primary key
into the related table as a foreign key.
The attribute values in any column must all be of
the same class or data type.
Each column in a given table must be uniquely
named.
Tables must conform to the rules of
normalization, i.e., free from structural
dependencies or anomalies.
Three Types of Anomalies
Insertion Anomaly: A new item cannot be
added to the table until at least one entity uses a
particular attribute item.
Deletion Anomaly: If an attribute item used by
only one entity is deleted, all information about
that attribute item is lost.
Update Anomaly: A modification on an attribute
must be made in each of the rows in which the
attribute appears.
Anomalies can be corrected by creating
additional relational tables.
Advantages of Relational Tables
Removes all three types of
anomalies
Various items of interest
(customers, inventory, sales) are
stored in separate tables.
Space is used efficiently.
Very flexible – users can form ad
hoc relationships
The Normalization Process
A process which systematically splits
unnormalized complex tables into smaller
tables that meet two conditions:
all nonkey (secondary) attributes in the table are
dependent on the primary key
all nonkey attributes are independent of the other
nonkey attributes
When unnormalized tables are split and reduced to
third normal form, they must then be linked
together by foreign keys.
Steps in Normalization
Unnormalized table with
repeating groups
First normal
form 1NF
Second normal
form 2NF
Third normal
form 3NF
Higher normal
forms
Remove
repeating
groups
Remove
partial
dependencies
Remove
transitive
dependencies
Remove
remaining
anomalies
Accountants and Data Normalization
Update anomalies can generate conflicting and
obsolete database values.
Insertion anomalies can result in unrecorded
transactions and incomplete audit trails.
Deletion anomalies can cause the loss of
accounting records and the destruction of audit
trails.
Accountants should understand the data
normalization process and be able to determine
whether a database is properly normalized.
Six Phases in Designing Relational
Databases
1. Identify entities
• identify the primary entities of the
organization
• construct a data model of their
relationships
1. Construct a data model showing
entity associations
• determine the associations between
entities
• model associations into an ER diagram
3. Add primary keys and attributes
• assign primary keys to all entities in the
model to uniquely identify records
• every attribute should appear in one or more
user views
3. Normalize and add foreign keys
• remove repeating groups, partial and
transitive dependencies
• assign foreign keys to be able to link tables
Six Phases in Designing Relational
Databases
5. Construct the physical database
• create physical tables
• populate tables with data
5. Prepare the user views
• normalized tables should support all
required views of system users
• user views restrict users from have access
to unauthorized data
Six Phases in Designing Relational
Databases
Distributed Data Processing (DDP)
Data processing is organized around several
information processing units (IPUs) distributed
throughout the organization.
Each IPU is placed under the control of the end
user.
DDP does not always mean total decentralization.
IPUs in a DDP system are still connected to one
another and coordinated.
Typically, DDP’s use a centralized database.
Alternatively, the database can be distributed,
similar to the distribution of the data processing
capability.
Distributed Data
Processing
Site CSite BSite A
Centralized
Database
Central
Site
The data is retained in a central location.
Remote IPUs send requests for data.
Central site services the needs of the remote IPUs.
The actual processing of the data is performed at the
remote IPU.
Centralized Databases in DDP
Environment
Advantages of DDP
Cost reductions in hardware and data entry tasks
Improved cost control responsibility
Improved user satisfaction since control is closer
to the user level
Backup of data can be improved through the use of
multiple data storage sites
Disadvantages of DDP
Loss of control
Mismanagement of resources
Hardware and software incompatibility
Redundant tasks and data
Consolidating incompatible tasks
Difficulty attracting qualified personnel
Lack of standards
Data Currency
Occurs in DDP with a centralized database
During transaction processing, data will
temporarily be inconsistent as records are
read and updated.
Database lockout procedures are
necessary to keep IPUs from reading
inconsistent data and from writing over a
transaction being written by another IPU.
Distributed Databases: Partitioning
Splits the central database into segments
that are distributed to their primary users
Advantages:
users’ control is increased by having data stored
at local sites
transaction processing response time is
improved
volume of transmitted data between IPUs is
reduced
reduces the potential data loss from a disaster
The Deadlock Phenomenon
Especially a problem with
partitioned databases
Occurs when multiple sites lock each other
out of data that they are currently using
One site needs data locked by another site.
Special software is needed to analyze and
resolve conflicts.
Transactions may be terminated and restarted.
The Deadlock Phenomenon
A,B
E, F
C,D
Locked A, waiting for C
Locked C, waiting for E
Locked E, waiting for A
Distributed Databases: Replication
The duplication of the entire
database for multiple IPUs
Effective for situations with a high
degree of data sharing, but no
primary user
Supports read-only queries
Data traffic between sites is
reduced considerably.
Concurrency Problems and Control
Issues
Database concurrency is the presence of
complete and accurate data at all IPU sites.
With replicated databases, maintaining
current data at all locations is difficult.
Time stamping is used to serialize
transactions.
Prevents and resolves conflicts created by updating
data at various IPUs
Distributed Databases and the
Accountant
The following database options impact the
organization’s ability to maintain database integrity,
to preserve audit trails, and to have accurate
accounting records.
Centralized or distributed data?
If distributed, replicated or partitioned?
If replicated, totally or partially replication?
If partitioned, what allocation of the data segments
among the sites?

More Related Content

PPT
James hall ch 10
PPT
James hall ch 13
PPT
James hall ch 8
PPT
James hall ch 7
PPT
James hall ch 15
PPT
James hall ch 14
PPTX
PPTX
James hall ch 10
James hall ch 13
James hall ch 8
James hall ch 7
James hall ch 15
James hall ch 14

What's hot (20)

PPT
James hall ch 6
PPT
James hall ch 1
PPT
James hall ch 5
PPT
James hall ch 4
PPTX
Chapter 11 Enterprise Resource Planning System
PPT
James hall ch 3
PPT
James hall ch 2
PPTX
Chapter 02 - Transaction Processing System
PPTX
Lecture 21 expenditure cycle part i - accounting information systesm james ...
PPTX
Chapter 1 - The Information System: An Accountant's Perspective
PPTX
Conversion cycle
PPT
AIS-CHAPTER-1.ppt
PPTX
PPT
Introduction to Transaction Processing Chapter No. 2
PPT
Purchasing & cash disbursement
PPT
Revenue cycle (AIS)
PPTX
Report AIS chapter 7- Conversion Cycle
PPTX
Lecture 20 computer based accounting system -revenue cycle - accounting info...
PPTX
Chapter 4 security part ii auditing database systems
PPTX
Lecture 23 expenditure cycle part ii -fixed assets accounting information sy...
James hall ch 6
James hall ch 1
James hall ch 5
James hall ch 4
Chapter 11 Enterprise Resource Planning System
James hall ch 3
James hall ch 2
Chapter 02 - Transaction Processing System
Lecture 21 expenditure cycle part i - accounting information systesm james ...
Chapter 1 - The Information System: An Accountant's Perspective
Conversion cycle
AIS-CHAPTER-1.ppt
Introduction to Transaction Processing Chapter No. 2
Purchasing & cash disbursement
Revenue cycle (AIS)
Report AIS chapter 7- Conversion Cycle
Lecture 20 computer based accounting system -revenue cycle - accounting info...
Chapter 4 security part ii auditing database systems
Lecture 23 expenditure cycle part ii -fixed assets accounting information sy...
Ad

Viewers also liked (14)

PDF
Plugin rea-romney
PPT
Implementing an REA Model in a Relational Database (Chapter 16:)
PPTX
Lecture 6 evolution of ais chapter 1 jamed a hall
PPTX
Dbms
PPTX
Data definition language postgreSQL
PDF
Plugin ch12edited-ok
PPT
Ch12(revised 20071226)
PPT
Ais Romney 2006 Slides 16 Implementing An Rea
PPTX
Sppt chap008
PPT
Ais Romney 2006 Slides 16 Implementing An Rea
PDF
The REA-invention of Double Entry Bookkeeping - Moving Accounting Back to the...
PPTX
Lecture 22 expenditure cycle part ii - payroll processing accounting informa...
PPT
Database Design
Plugin rea-romney
Implementing an REA Model in a Relational Database (Chapter 16:)
Lecture 6 evolution of ais chapter 1 jamed a hall
Dbms
Data definition language postgreSQL
Plugin ch12edited-ok
Ch12(revised 20071226)
Ais Romney 2006 Slides 16 Implementing An Rea
Sppt chap008
Ais Romney 2006 Slides 16 Implementing An Rea
The REA-invention of Double Entry Bookkeeping - Moving Accounting Back to the...
Lecture 22 expenditure cycle part ii - payroll processing accounting informa...
Database Design
Ad

Similar to James hall ch 9 (20)

PDF
PPTX
Chapter 4 Chapter Relational DB - Copy.pptx
PPTX
unit 1.pptx
PPTX
dbms lecture 1.pptx , where traditional file system vs database management ar...
PPTX
DIGITAL CONTENT for the help of students.pptx
PPTX
unit 1.pptx
PDF
dbms Unit 1.pdf arey bhai teri maa chodunga
PPTX
Accounting Information System Related Data.pptx
PPT
D B M S Animate
PPTX
Arinda oktaviana 11353204810 vii lokal g
PPT
DBMS - Introduction
PPT
This discussion about the dbms introduction
PPTX
PPTX
Pp 09-new
PPT
Advanced Database Management System_Introduction Slide.ppt
PPTX
Unit-1 DBMS24.pptxruzruxtidtixift8ffticiycyoc
PPTX
7 - Enterprise IT in Action
PPTX
Lecture 3 note.pptx
PPT
demo2.ppt
Chapter 4 Chapter Relational DB - Copy.pptx
unit 1.pptx
dbms lecture 1.pptx , where traditional file system vs database management ar...
DIGITAL CONTENT for the help of students.pptx
unit 1.pptx
dbms Unit 1.pdf arey bhai teri maa chodunga
Accounting Information System Related Data.pptx
D B M S Animate
Arinda oktaviana 11353204810 vii lokal g
DBMS - Introduction
This discussion about the dbms introduction
Pp 09-new
Advanced Database Management System_Introduction Slide.ppt
Unit-1 DBMS24.pptxruzruxtidtixift8ffticiycyoc
7 - Enterprise IT in Action
Lecture 3 note.pptx
demo2.ppt

Recently uploaded (20)

PPTX
Software Engineering BSC DS UNIT 1 .pptx
PDF
Electrolyte Disturbances and Fluid Management A clinical and physiological ap...
PPTX
How to Manage Global Discount in Odoo 18 POS
PPTX
PPTs-The Rise of Empiresghhhhhhhh (1).pptx
PPTX
Introduction and Scope of Bichemistry.pptx
PDF
What Is Coercive Control? Understanding and Recognizing Hidden Abuse
PDF
Mga Unang Hakbang Tungo Sa Tao by Joe Vibar Nero.pdf
PPTX
Strengthening open access through collaboration: building connections with OP...
PPTX
How to Manage Bill Control Policy in Odoo 18
PPTX
Cardiovascular Pharmacology for pharmacy students.pptx
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
DOCX
UPPER GASTRO INTESTINAL DISORDER.docx
PPTX
How to Manage Loyalty Points in Odoo 18 Sales
PDF
Phylum Arthropoda: Characteristics and Classification, Entomology Lecture
PPTX
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
PDF
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
PDF
Piense y hagase Rico - Napoleon Hill Ccesa007.pdf
PDF
5.Universal-Franchise-and-Indias-Electoral-System.pdfppt/pdf/8th class social...
PPTX
ACUTE NASOPHARYNGITIS. pptx
PPTX
Odoo 18 Sales_ Managing Quotation Validity
Software Engineering BSC DS UNIT 1 .pptx
Electrolyte Disturbances and Fluid Management A clinical and physiological ap...
How to Manage Global Discount in Odoo 18 POS
PPTs-The Rise of Empiresghhhhhhhh (1).pptx
Introduction and Scope of Bichemistry.pptx
What Is Coercive Control? Understanding and Recognizing Hidden Abuse
Mga Unang Hakbang Tungo Sa Tao by Joe Vibar Nero.pdf
Strengthening open access through collaboration: building connections with OP...
How to Manage Bill Control Policy in Odoo 18
Cardiovascular Pharmacology for pharmacy students.pptx
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
UPPER GASTRO INTESTINAL DISORDER.docx
How to Manage Loyalty Points in Odoo 18 Sales
Phylum Arthropoda: Characteristics and Classification, Entomology Lecture
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Piense y hagase Rico - Napoleon Hill Ccesa007.pdf
5.Universal-Franchise-and-Indias-Electoral-System.pdfppt/pdf/8th class social...
ACUTE NASOPHARYNGITIS. pptx
Odoo 18 Sales_ Managing Quotation Validity

James hall ch 9

  • 1. Accounting Information Systems, 6th edition James A. Hall COPYRIGHT © 2009 South-Western, a division of Cengage Learning. Cengage Learning and South-Western are trademarks used herein under license
  • 2. Objectives for Chapter 9 Problems inherent in the flat file approach to data management that gave rise to the database concept Relationships among the defining elements of the database environment Anomalies caused by unnormalized databases and the need for data normalization Stages in database design: entity identification, data modeling, constructing the physical database, and preparing user views Features of distributed databases and issues to consider in deciding on a particular database configuration
  • 3. Flat-File Versus Database Environments Computer processing involves two components: data and instructions (programs) Conceptually, there are two methods for designing the interface between program instructions and data: File-oriented processing: A specific data file was created for each application Data-oriented processing: Create a single data repository to support numerous applications. Disadvantages of file-oriented processing include redundant data and programs and varying formats for storing the redundant data.
  • 4. Flat-File Environment Program 1 Program 2 Program 3 A,B,C X,B,Y L,B,M User 2 Transactions User 1 Transactions User 3 Transactions Data
  • 5. Data Redundancy and Flat-File Problems Data Storage - creates excessive storage costs of paper documents and/or magnetic form Data Updating - any changes or additions must be performed multiple times Currency of Information - potential problem of failing to update all affected files Task-Data Dependency - user’s inability to obtain additional information as his or her needs change
  • 6. Program 1 Program 2 Program 3 User 2 Transactions User 1 Transactions User 3 Transactions Database D B M S A, B, C, X, Y, L, M Database Approach
  • 7. Advantages of the Database Approach Data sharing/centralize database resolves flat-file problems:  No data redundancy: Data is stored only once, eliminating data redundancy and reducing storage costs.  Single update: Because data is in only one place, it requires only a single update, reducing the time and cost of keeping the database current.  Current values: A change to the database made by any user yields current data values for all other users.  Task-data independence: As users’ information needs expand, the new needs can be more easily satisfied than under the flat-file approach.
  • 8. Disadvantages of the Database Approach Can be costly to implement additional hardware, software, storage, and network resources are required Can only run in certain operating environments may make it unsuitable for some system configurations Because it is so different from the file-oriented approach, the database approach requires training users may be inertia or resistance
  • 9. Elements of the Database Environment System Development Process Database Administrator U S E R S DBMS Host Operating System Physical Database User Programs User Programs User Programs Applications Data Definition Language Data Manipulation Language Query Language User Queries Transactions Transactions Transactions SystemRequests
  • 10. Internal Controls and DBMS The database management system (DBMS) stands between the user and the database per se. Thus, commercial DBMS’s (e.g., Access or Oracle) actually consist of a database plus… Plus software to manage the database, especially controlling access and other internal controls Plus software to generate reports, create data-entry forms, etc. The DBMS has special software to know which data elements each user is authorized to access and deny unauthorized requests of data.
  • 11. DBMS Features Program Development - user created applications Backup and Recovery - copies database Database Usage Reporting - captures statistics on database usage (who, when, etc.) Database Access - authorizes access to sections of the database Also… User Programs - makes the presence of the DBMS transparent to the user Direct Query - allows authorized users to access data without programming
  • 12. Data Definition Language (DDL) DDL is a programming language used to define the database per se. It identifies the names and the relationship of all data elements, records, and files that constitute the database. DDL defines the database on three viewing levels Internal view – physical arrangement of records (1 view) Conceptual view (schema) – representation of database (1 view) User view (subschema) – the portion of the database each user views (many views)
  • 14. Data Manipulation Language (DML) DML is the proprietary programming language that a particular DBMS uses to retrieve, process, and store data to / from the database. Entire user programs may be written in the DML, or selected DML commands can be inserted into universal programs, such as COBOL and FORTRAN. Can be used to ‘patch’ third party applications to the DBMS
  • 15. Query Language The query capability permits end users and professional programmers to access data in the database without the need for conventional programs. Can be an internal control issue since users may be making an ‘end run’ around the controls built into the conventional programs IBM’s structured query language (SQL) is a fourth- generation language that has emerged as the standard query language. Adopted by ANSI as the standard language for all relational databases
  • 17. Database Conceptual Models Refers to the particular method used to organize records in a database A.k.a. “logical data structures” Objective: develop the database efficiently so that data can be accessed quickly and easily There are three main models: hierarchical (tree structure) network relational Most existing databases are relational. Some legacy systems use hierarchical or network databases.
  • 18. The Relational Model The relational model portrays data in the form of two dimensional ‘tables’. Its strength is the ease with which tables may be linked to one another. A major weakness of hierarchical and network databases Relational model is based on the relational algebra functions of restrict, project, and join.
  • 19. RESTRICT – filtering out rows, such as the dark blue PROJECT – filtering out columns, such as the light blue X1 X1 X2 X2 X3 X3 Y1 Y1 Y1 Y1 Y1 Y2 Y2 Y2 Y3 Z1 Z1 Z2 Z2 Z3 Z1 JOIN – build a new table or data set from multiple existing tables Relational Algebra
  • 20. Associations and Cardinality Association – the labeled line connecting two entities or tables in a data model Describes the nature of the between them Represented with a verb, such as ships, requests, or receives Cardinality – the degree of association between two entities The number of possible occurrences in one table that are associated with a single occurrence in a related table Used to determine primary keys and foreign keys
  • 22. Properly Designed Relational Tables Each row in the table must be unique in at least one attribute, which is the primary key. Tables are linked by embedding the primary key into the related table as a foreign key. The attribute values in any column must all be of the same class or data type. Each column in a given table must be uniquely named. Tables must conform to the rules of normalization, i.e., free from structural dependencies or anomalies.
  • 23. Three Types of Anomalies Insertion Anomaly: A new item cannot be added to the table until at least one entity uses a particular attribute item. Deletion Anomaly: If an attribute item used by only one entity is deleted, all information about that attribute item is lost. Update Anomaly: A modification on an attribute must be made in each of the rows in which the attribute appears. Anomalies can be corrected by creating additional relational tables.
  • 24. Advantages of Relational Tables Removes all three types of anomalies Various items of interest (customers, inventory, sales) are stored in separate tables. Space is used efficiently. Very flexible – users can form ad hoc relationships
  • 25. The Normalization Process A process which systematically splits unnormalized complex tables into smaller tables that meet two conditions: all nonkey (secondary) attributes in the table are dependent on the primary key all nonkey attributes are independent of the other nonkey attributes When unnormalized tables are split and reduced to third normal form, they must then be linked together by foreign keys.
  • 26. Steps in Normalization Unnormalized table with repeating groups First normal form 1NF Second normal form 2NF Third normal form 3NF Higher normal forms Remove repeating groups Remove partial dependencies Remove transitive dependencies Remove remaining anomalies
  • 27. Accountants and Data Normalization Update anomalies can generate conflicting and obsolete database values. Insertion anomalies can result in unrecorded transactions and incomplete audit trails. Deletion anomalies can cause the loss of accounting records and the destruction of audit trails. Accountants should understand the data normalization process and be able to determine whether a database is properly normalized.
  • 28. Six Phases in Designing Relational Databases 1. Identify entities • identify the primary entities of the organization • construct a data model of their relationships 1. Construct a data model showing entity associations • determine the associations between entities • model associations into an ER diagram
  • 29. 3. Add primary keys and attributes • assign primary keys to all entities in the model to uniquely identify records • every attribute should appear in one or more user views 3. Normalize and add foreign keys • remove repeating groups, partial and transitive dependencies • assign foreign keys to be able to link tables Six Phases in Designing Relational Databases
  • 30. 5. Construct the physical database • create physical tables • populate tables with data 5. Prepare the user views • normalized tables should support all required views of system users • user views restrict users from have access to unauthorized data Six Phases in Designing Relational Databases
  • 31. Distributed Data Processing (DDP) Data processing is organized around several information processing units (IPUs) distributed throughout the organization. Each IPU is placed under the control of the end user. DDP does not always mean total decentralization. IPUs in a DDP system are still connected to one another and coordinated. Typically, DDP’s use a centralized database. Alternatively, the database can be distributed, similar to the distribution of the data processing capability.
  • 32. Distributed Data Processing Site CSite BSite A Centralized Database Central Site
  • 33. The data is retained in a central location. Remote IPUs send requests for data. Central site services the needs of the remote IPUs. The actual processing of the data is performed at the remote IPU. Centralized Databases in DDP Environment
  • 34. Advantages of DDP Cost reductions in hardware and data entry tasks Improved cost control responsibility Improved user satisfaction since control is closer to the user level Backup of data can be improved through the use of multiple data storage sites
  • 35. Disadvantages of DDP Loss of control Mismanagement of resources Hardware and software incompatibility Redundant tasks and data Consolidating incompatible tasks Difficulty attracting qualified personnel Lack of standards
  • 36. Data Currency Occurs in DDP with a centralized database During transaction processing, data will temporarily be inconsistent as records are read and updated. Database lockout procedures are necessary to keep IPUs from reading inconsistent data and from writing over a transaction being written by another IPU.
  • 37. Distributed Databases: Partitioning Splits the central database into segments that are distributed to their primary users Advantages: users’ control is increased by having data stored at local sites transaction processing response time is improved volume of transmitted data between IPUs is reduced reduces the potential data loss from a disaster
  • 38. The Deadlock Phenomenon Especially a problem with partitioned databases Occurs when multiple sites lock each other out of data that they are currently using One site needs data locked by another site. Special software is needed to analyze and resolve conflicts. Transactions may be terminated and restarted.
  • 39. The Deadlock Phenomenon A,B E, F C,D Locked A, waiting for C Locked C, waiting for E Locked E, waiting for A
  • 40. Distributed Databases: Replication The duplication of the entire database for multiple IPUs Effective for situations with a high degree of data sharing, but no primary user Supports read-only queries Data traffic between sites is reduced considerably.
  • 41. Concurrency Problems and Control Issues Database concurrency is the presence of complete and accurate data at all IPU sites. With replicated databases, maintaining current data at all locations is difficult. Time stamping is used to serialize transactions. Prevents and resolves conflicts created by updating data at various IPUs
  • 42. Distributed Databases and the Accountant The following database options impact the organization’s ability to maintain database integrity, to preserve audit trails, and to have accurate accounting records. Centralized or distributed data? If distributed, replicated or partitioned? If replicated, totally or partially replication? If partitioned, what allocation of the data segments among the sites?

Editor's Notes

  • #5: Users access data via computer programs that process the data and present information to the users. Users own their data files. Data redundancy results as multiple applications maintain the same data elements. Files and data elements used in more than one application must be duplicated, which results in data redundancy. As a result of redundancy, the characteristics of data elements and their values are likely to be inconsistent. Outputs usually consist of preprogrammed reports instead of ad-hoc queries provided upon request. This results in inaccessibility of data. Changes to current file-oriented applications cannot be made easily, nor can new developments be quickly realized, which results in inflexibility.
  • #7: Solves the following problems of the flat file approach no data redundancy - except for primary keys, data is only stored once single update current values task-data independence - users have access to the full domain of data available to the firm A database is a set of computer files that minimizes data redundancy and is accessed by one or more application programs for data processing. The database approach to data storage applies whenever a database is established to serve two or more applications, organizational units, or types of users. A database management system (DBMS) is a computer program that enables users to create, modify, and utilize database information efficiently.
  • #32: Decentralization does not attempt to integrate the parts into a logical whole unit.