SM-09-New Reviewed by Hall Version 2
Short Description
JAMES HALL ACCOUNTING INFORMATION SYSTEMS LEHIGH UNIVERSITY 2014 FINAL STUDY...
Description
Chapter 9 Page 99
CHAPTER 9 DATABASE MANAGEMENT SYSTEMS REVIEW QUESTIONS 1.
database planning, design, implementation, operation and maintenance, and change and growth.
2.
the users, the database management system, the database administrator, and the physical database structures.
3.
The primary difference between the network and hierarchical models is in the parent-child relationship. The network model allows a child file to have multiple parents. The hierarchical model permits a child to be associated with only one parent record.
4.
a.
No data redundancy
b. Single update of data c.
Current values for all user applications
d. Task-data independence.
Chapter 9 Page 100
5.
program development, backup and recovery, database usage reporting, and database access.
6.
One level is the schema, which is the conceptual view of the data. The schema describes the entire database, and it represents the database logically. The second level is the internal view which is the physical arrangement of the records. At this level, the physical data records are described as well as linkages between files. The next level is the subschema, which is the external view of the database that specific users have authorization to use. This is also called the user view. This is the level that users find of most interest.
7.
The primary key is a table attribute the value of which is unique to the record. It is a unique identifier.
8.
Logically related tables need to be physically connected to achieve the associations described in the data model. This is accomplished by embedding the primary key of one table into the related table as a foreign key.
9.
The data dictionary describes every data element in the database. The data dictionary enables all users (and programmers) to share a common view of the data resource, thus facilitating greatly the analysis of user needs.
10.
An organization has three diverse operating units: tractors, sewing machines, and computer chips. These units have different customers, suppliers, and production facilities. Operating data are consolidated for financial reporting only.
Chapter 9 Page 101
11.
An entity is anything about which the organization wishes to capture data. Entities may be physical, such as “Inventory”, “Customer”, or “Employee”. They may also be conceptual, such as “Sale” (to a customer), “Accounts Receivable”, or “Accounts Payable”.
12.
The XYZ company is a geographically distributed organization with several sites around the country. Users at these sites need rapid access to common data for read-only purposes.
13.
(1:0,1) Every occurrence (record) is for one entity (Employee), there is a possibility of zero or one occurrence in the related entity (Company Car). (1:1) Describes a situation in which each record in one entity is always associated with one (and only one) record in the associated entity. For example, a company laptop computer is assigned to only one manager, and every manager is assigned only one laptop. (1:M) An example of this situation is that each item of Inventory (entity) is supplied by one and only one Vendor (related entity), but each Vendor supplies one or many different Inventory items to the company. (M:M) A company with a policy of purchasing the same types of inventory from multiple suppliers would have a M:M association between the Vendor and Inventory entities.
Chapter 9 Page 102
14.
The term association pertains to the nature of the relationship between two entities. This is represented by a verb such as shipped, requests, or receives. Cardinality is the degree of association between two entities. Simply stated, cardinality describes the number of possible occurrences in one table that are associated with a single occurrence in a related table.
15.
In a many-to-many association, a link table with a combined (composite) key consisting of the primary keys of the two related tables is created in order to link the related tables.
16. a.
All occurrences at the intersection of a row and column are a single value. No
multiple values (repeating groups), partial dependencies, or transitive dependencies are allowed. b. The attribute values in any column must all be of the same class. c.
Each column in a given table must be uniquely named.
d. Each row in the table must be unique in at least one attribute that is considered to be the primary key. 17. a.
Restrict—Extracts rows that satisfy the given condition from a specified table
and places these rows into a new table. b. Project—Extracts columns from a specified table and places these attributes (columns) into a new table. c.
Join—Builds a new table from two tables consisting of all concatenated pairs of rows, one from each table.
18.
A table normalized to 3NF meets the following conditions:
1. All nonkey attributes in the table are dependent on the primary key.
Chapter 9 Page 103
2. All nonkey attributes are independent of the other nonkey attributes. In other words, the primary key of a table wholly and uniquely defines each attribute in the table, and none of the table attributes are defined by an attribute other than the primary key.
Chapter 9 Page 104
19.
The user may restrict the fields of data to view with the SELECT command. Further, the user may restrict the rows or records of data to be viewed with the WHERE command. The WHERE command allows the user to view only those records that have values which fall within a certain range for one or more fields of data.
20.
A data model is the blueprint for creating the physical database. Database designers identify system entities and prepare a model of them using a graphical representation technique called an entity relationship (ER) diagram.
21.
The deletion anomaly may cause records to be deleted unintentionally and may occur for some time before the problem is noticed. A deletion anomaly occurs when an item in one file is legitimately deleted. The problem occurs when this file is linked to another file, which may also have a record deleted, due to its link. If the second record should not be deleted, then an update anomaly has occurred.
22.
A user view is the set of data that a particular user sees. Examples of user views are computer screens for entering or viewing data, management reports, or source documents, such as an invoice.
23.
User views derive from underlying database tables. Simple views may be constructed from a single table, while more complex views may require several tables. Furthermore, a single table may contribute data to many different views.
24.
Valid entities meet the two conditions below: Condition 1.
An entity must have two or more occurrences.
Condition 2.
An entity must contribute at least one attribute that is not provided through other entities.
Chapter 9 Page 105
25.
Because attributes are the logical and relevant characteristics of an entity, they are unique to it. Therefore, the same attributes should not be used to define two different entities.
DISCUSSION QUESTIONS
Chapter 9 Page 106
1.
In the traditional data management environment, applications are developed with data and program dependency. Typically, these programs are application specific. Thus, the users of the application data tend to be proprietary about the data in “their” application and may not be amenable to sharing such data.
2.
If your university were to use different databases for the registrar, library, parking, food services, and computing services, then the number of forms you would have to fill out, if any of your personal data changes, would be plentiful. For example, if you were to move during the semester to a different apartment, the university should be notified. In this situation, a couple of things could happen. You could be required to go to each service individually and fill out an address form, or you could go to one central location and fill out a form that has multiple copies, which are sent to the various areas on campus for update. In any case, your address could be keyed in correctly by the registrar. You might receive some correspondence from the registrar and assume that the address correction was made. However, a keypunch error might have occurred by the library staff, and you may not receive notification that you have a library book which you forgot about past due. After the end of the semester, you may not receive your final grade report. When you call the registrar, you may find out that the library has reported that you have an overdue book and that your grades should be held until the book is returned, and the fine is paid.
Chapter 9 Page 107
3.
Under the database concept, the data becomes centrally stored with many different users accessing the database. However, each user should not have access to the whole database. Under the traditional data management approach, where the data are limited to a single application, the user access problem was not as much of a threat. The DBMS is a special software system that is programmed to know which data each user is authorized to access. This controlled authorization is crucial in centrally stored DBMSs.
4.
User views are derived database tables. A single table may contribute data to several different views. On the other hand, simple views may be constructed from a single table.
5.
Tables that are logically related in the data model need to be physically linked. The degree of association between the tables (i.e., 1:1, 1:M, or M:M) determines how the linking occurs. The key-assignment rules for linking tables are discussed below:
Where a true 1:1 association exists between tables, either (or both) primary keys may be embedded as foreign keys in the related table.
Where a 1:M (or 1:0,M) association exists, the primary key of the 1 side is embedded in the table of the M-side.
To represent the M:M association between tables, a link table needs to be created which has a combined (composite) key consisting of the primary keys of two related tables.
Chapter 9 Page 108
6.
The entity relationship (ER) diagram is the graphical representation technique used to depict a data model. Each entity in an ER diagram is named in the singular noun form, such as Customer rather than Customers. The labeled line connecting two entities describes the nature of the association between them. This association is represented with a verb, such as shipped, requests, or receives. The ER diagram also represents cardinality (the degree of association between two entities). Four basic forms of cardinality are possible: zero or one (0,1), one and only one (1,1), zero or many (0,M), and one or many (1,M). These are combined to represent logical associations between entities such as 1:1, 1:0,M, and M:M.
7.
SQL allows users to retrieve data from many different files without the assistance of programmer professionals. Thus, if the user has access to data files and knows SQL, which is very user friendly, the user may retrieve the data instantaneously.
8.
The data was not centrally stored for many different applications to use in the traditional data management environment; therefore, a database administrator was not needed. Because it is centrally stored and shared by many users in a database environment, the need arose for an individual to care for and control these files. The database administrator is responsible for database planning, developing the data requirements and data dictionary, database design and controls, database implementation and access controls, operation and maintenance, and establishing and reviewing the standards and procedures.
Chapter 9 Page 109
9.
The system programmer’s program should not have access to the data, except perhaps temporarily to test the programs. The database administrator controls the access to the data. If one person has the authority to both write programs and access data, then control issues become a concern. The potential to commit fraud or embezzlement or to destroy or alter the company’s records increases.
10.
Neither table can donate an embedded key to the other, because both are on the “many” side. The only solution, therefore, is to create a new link table containing the key fields of both tables.
11.
Tables that are not normalized contain anomalies which require excessive updates to tables, prevent data from being stored properly, and may cause unintentional deletion of data. Accountants need to be familiar with normalization issues, because these anomalies threaten the integrity of the financial data of the organization.
12.
A database lockout prevents multiple users from accessing the same table simultaneously and making changes to data values while they are temporarily inconsistent. Lockouts force changes to be made sequentially to ensure data accuracy.
13.
Database concurrency controls ensure the completeness and accuracy of a distributed database at remote sites where the same beginning data balances are updated by different transactions. This is accomplished by serializing and timestamping transactions. Depending on the need for data currency, the time-stamped data will be reconciled and posted to all distributed databases.
Chapter 9 Page 110
14.
Database accounting systems are transaction-based rather than account-based. The focus is on capturing important details of transactions that may be lost when they are forced into the structure of traditional accounting records. The transaction tables are then to be used to reconstruct traditional accounting records, such as Accounts Receivable and Accounts Payable.
15.
Where a true 1:1 association exists between tables, either (or both) primary keys may be embedded as foreign keys in the related table. On the other hand, when the lower cardinality value is zero (1:0,1), a more efficient table structure can be achieved by placing the 1-side (1:) table’s primary key in the zero-or-one (:0,1) table as a foreign key. Assume that a company has 1000 employees, but only 100 of them are sales staff. Also assume that each sales person is assigned a company car. Therefore, every occurrence in the Employee entity is associated with either zero or one occurrence in the Company Car entity. If we assigned the Company Car (:0,1) side primary to the Employee (:1) table as a foreign key, then most of the foreign keys will have null (blank) values. While this approach would work, it could cause some technical problems during table searches. Correctly applying the keyassignment rule solves this problem, because all Company Car records will have an employee assigned, and no null values will occur.
Chapter 9 Page 111
16.
The insertion and update anomalies would create record keeping and operational problems for the firm. However, flawed databases design that prevents the insertion of records, or requires the user to perform excessive updates, would attract attention quickly. The presence of the deletion anomaly is less conspicuous, but potentially more serious from an accounting perspective. Because the deletion anomaly may go undetected, the user may be unaware of the loss of important data until it is too late. This anomaly can result in the unintentional loss of critical accounting records and the destruction of the audit trail.
17.
The organization’s business rules directly impact the structure of the database tables. If the database is to function properly, its designers need to understand the organization’s business rules, as well as the specific needs of individual users. For example: 1. When an organization decides to purchase the same items of inventory from different suppliers, the cardinality between the Supplier and Inventory tables is M:M. 2. When a the company purchases all items of a certain type from only one supplier, the cardinality between Supplier and Inventory tables is 1:M respectively. 3. A policy that a separate receiving report is prepared for the receipt of goods specified on a single purchase order will result in a 1:1 cardinality between the receiving report and purchase order tables. If, however, multiple purchase orders are combined on a single receiving report, then the cardinality between these tables will be 1: M respectively.
Chapter 9 Page 112
18.
The partitioned approach works best for organizations that require minimal data sharing among users at remote sites. To the extent that remote users share common data, the problems associated with the centralized approach will apply. The primary user must now manage requests for data from other sites. Selecting the optimum host location for the partitions, to minimize data access problems, requires an indepth analysis of end-user data needs.
19.
To achieve data currency, simultaneous access to individual data elements or records by multiple users needs to be prevented. The solution to this problem is a database lockout, which is a software control that prevents multiple simultaneous accesses to data. A deadlock occurs when multiple users seeking access to the same set of records lockout each other. As a result, the transactions of all users assume a “wait” state until the locks are removed. A deadlock is a permanent condition that must be resolved by special software that analyzes each deadlock condition to determine the best solution.
Chapter 9 Page 113
20.
The primary justification for a replicated database is to support read-only queries in situations involving a high degree of data sharing, but no primary user exists. With data replicated at every site, data access for query purposes is ensured, and lockouts and delays due to network traffic are minimized. A potential problem arises, however, when replicated databases need to be updated by transactions. Since each site processes only local transactions, the common data attributes that are replicated at each site will be updated by different transactions and thus, at any point in time, will have uniquely different values. System designers need to employ currency control techniques to ensure that transactions processed at different locations are accurately reflected in all the database copies.
MULTIPLE CHOICES 1.
D
2.
C
3.
D
4.
E
5.
D
6.
D
7.
A
8.
C
9.
B
10.
C
11.
D
12.
C
Chapter 9 Page 114
13.
D
14.
C
15.
A
16.
D
17.
A
18.
D
PROBLEMS 1.
August 23, 199X MEMO TO:
Al Brindifi, VP Operations Carla Glasser, VP Finance James Closter, VP Marketing Julia Tinner, Controller Beth Clark, Manager of Information Systems
FROM:
Solutions Consultants
SUBJ:
Conversion of data processing systems After examining the operations of your organization and deriving a rough-cut estimate of your needs, this consulting team feels that your organization would benefit greatly from a database management system. A database management system will allow data to be shared amongst the departments, thus facilitating communication. One of the problems that has been brought repeatedly to our attention, is the need for information by user groups, which is currently kept by the
Chapter 9 Page 115
organization. These user groups are having trouble gaining access to the data, because it does not reside in that user groups’ application. A database management system will provide a central data source, whereby each authorized user group may gain access to the data it needs. Further, we see many inefficiencies in processing data due to data duplication by various applications. An even greater problem is that the data is oftentimes not consistent from one application to another. The DBMS will reduce data duplication and data redundancy. We propose that you begin a conversion to a DBMS. This conversion will require that a database administrator be appointed or hired. A DBMS requires that the central data store be diligently
planned,
managed,
and
maintained. The
database
administrator would perform these functions, as well as control user access to the data. 2.
a.
indexed sequential or indexed random; least optimal: sequential
b. indexed random or hashing; least optimal: sequential c.
sequential; least optimal: indexed random
d. sequential or pointer; least optimal: indexed random e. indexed random or hashing; least optimal: sequential f.
indexed random or hashing; least optimal: sequential
g. indexed random; least optimal: hashing
Chapter 9 Page 116
3.
Supplier Table Supplier ID Supplier
Supplier
(PK)
Address
Name
Terms
Balance
Supplier Phone #
Supplier/DVD Table Supplier ID DVD # (PK)
(PK)
DVD Table DVD #
DVD
DVD
Year of
(PK)
Name
Genre
Release
Address
Credit
Copy Table Copy ID
DVD #
(PK)
(FK)
Customer Table Customer
Name of
Phone
Primary
#(PK)
Customer
Household Member Table
Card #
Cost
Rental Time
Chapter 9 Page 117
4.
Member #
Customer
Name of
(PK)
Phone #
Household
(FK)
Member
Age
Restrictions
Mail order catalogues are beginning to be customized based upon the preferences and purchasing patterns of the customers. If data is stored regarding the customer preferences and their buying patterns, then catalogues containing only the items which are believed to be of value to the customer may be contained in the catalogue. Printing costs and postage costs would be saved. Also, more items could be included which fit the pattern of the customer. Further, the customer does not have to weed through the catalogue to find the items that he or she likes. The technology is changing such that customized or semi-customized (for groups of people) catalogues are a reality. Listed below are some files and some fields in the files which would be necessary in addition to the traditional accounts receivable, cash receipts, vendor, and general ledger files.
Customer Master File Customer Number Name
Sales File Customer Number Sales Order
Inventory Master File Item Number Item
Inventory Type File Product Type Product
Number $ Amount of Items Taxes
Description Product Type Quantity on
Classification
Address Phone Credit Card Type Credit Card Number Credit Card Expiration Last Purchase Date Cumulative Purchase Amount Purchases in Last 12 months Purchases in Last 3 months
Freight Total Amount
Sales Order Detail File
Hand Selling Price
Chapter 9 Page 118 $ Purchases of Type A $ Purchases of Type B $ Purchases of Type C $ Purchases of Type D Request Type A catalogue Request Type B catalogue Request Type C catalogue Request Type D catalogue
5.
Sales Order Number Item Number Quantity Discount
Lockout. The example below illustrates how two different transactions are being processed against the same AR control account within the same time frame. The individual logic steps are shown in their actual sequence of execution. If no database lockout were in place, the AR Control value of 20,000 is retrieved by both users of the system. One user is posting a payment to Sub Account 1 of $500 and the other is posting a payment to Sub Account 2 for $800.
AR Control Time IPU Instruction Sub Acct 1 Sub Account 2 Account 1:00:001 A Read sub acct 1 1,000 1:00:001 B Read sub acct 2 3,000 1:00:002 A Update sub acct 1 500 1:00:002 B Update sub acct 2 2,200 1:00:003 A Read control acct 20,000 1:00:003 B Read control acct 20,000 1:00:004 A Update control acct 19,500 1:00:005 B Update control acct 19,200 The update process does not reflect the second to last instruction executed. The AP Control Account should reflect payments received of $1,300, but only $800 of payments are accounted for. Thus, a transaction is lost, and the control and subsidiary ledgers are out of balance. Deadlock. A deadlock occurs when multiple sites lock out each other. Take for example, a mail order company in which two customers are
Chapter 9 Page 119
processing transactions simultaneously. Customer 1 wants to order 2 items—Item A and Item B. Customer 2 is purchasing Item B and Item A. Customer 1 informs the phone clerk that he or she wants Item A, and the record for Item A is locked until the order is complete. Meanwhile, Customer 2 orders Item B from another phone clerk who locks it. Customer 1 then requests Item B, which is locked by Customer 2’s order. The phone clerk apologizes for the delay and says the system is slow today. Customer 2 then requests Item A, which is locked by Customer 1’s order. The phone clerk helping Customer 2 apologizes for the delay and says the system is slow today. Unfortunately, neither transaction can be completed, resulting in deadlock. This condition will not be resolved unless some type of intervention occurs. 6.
SELECT Customer Name, Inventory Number, Item Description, Due Date FROM Customer Table, Rental Line Items Table WHERE Due Date < Today
7.
The best distributed approach is a replicated database. Reasoning
The users are distributed around the country and need rapid access to data. A centralized model may result in long delays because of network traffic and database lockout.
User data needs are common not unique. Since there are no identifiable primary
Chapter 9 Page 120
users, partitioning the database will accomplish nothing.
Because usage is read-only, changes will not occur and database concurrency is not a problem.
8.
The best distributed approach is a partitioned database. Reasoning
The users are distributed around the country and need rapid access to data. A centralized model may result in long delays because of network traffic and database lockout.
User data needs are unique with identifiable primary users. There is no need to replicate the entire database.
Since users are unique, changes to the database will not cause database concurrency problem.
9.
The first step is to remove repeating groups. The removal of repeating groups results in the following two tables. Due Date has been removed because it is a calculated field. Student ID Number is the primary key for the Student table. Student Id Number and Book Call No. together are the primary key for the Library table. Student table is now in 3NF. Library table requires further normalization. Student Table Student ID
Student First
Student Last
No. of Books
Number
Name
Name
Out
Book Call No.
Book Title
Date Out
Library Table Student ID
Chapter 9 Page 121
Number The second step is to remove partial dependencies from Library table. Book Title is partially dependent on the Book Call No. component of the primary key. This assumes that the call number is unique to the book, and not to the event of borrowing the book. It also assumes that more than one copy of the book may exist in the library and that all copies have the same call number. Removing the partial dependency results in the tables below: Transaction Table Student ID
Book Call No.
Date Out
Number Book Table Book Call No.
Book Title
Book Call No. is the primary key for the new table Book. Since no transitive dependencies exist, all three tables (Student, Transaction, and Book) are now in 3NF. 10.
Table Textbook ISBN #
Title
(PK)
Publisher (FK)
Table Publisher Publisher (PK) Table Class
Address
Phone #
Cost
Selling
Quantity
Price
on Hand
Chapter 9 Page 122
Course #
Course
Professor
(PK)
Name
(Employee
Days
Room #
(FK)
Number) (FK) Table Semester Term
Year
Semester
Name
Address
#(PK) Table Professor Employee # (PK)
Term #
Phone
Title
Chapter 9 Page 123
11.
See diagram below. PK
Inventory Table
FK
Chapter 9 Page 124
Part # Description QOH Reorder Point EOQ Unit Cost Vendor #
Chapter 9 Page 125
PK
Vendor Table
Chapter 9 Page 126
Vendor # Vendor Name Vendor Address
Telephone
Chapter 9 Page 127
12. See diagram below. PK
Inventory Table
Chapter 9 Page 128
Part # Description QOH Reorder Point EOQ
Part # Vendor # Unit cost
Vendor # Vendor Name Vendor Address
Telephone
Note: This is an example of a many-to-many relation between the inventory and vendor tables. The solution requires a link table, which also contains Unit Cost data. A composite key of Part # and Vendor # is needed to define the Unit Cost attribute, because there are many prices for each item carried, depending on which vendor supplies the part.
13. See diagram below. Customer Table Customer # Customer Name Address * Customer Total Invoice Table Invoice # Date *Invoice Total
Customer #
Line Item Table Invoice # Part # Quantity *Extended Price Inventory Table Part Number Unit Price * Could be a calculated field 14.
Table Employee Employee #
Name
Address
Date Hired
Exemptions Marital
Chapter 9 Page 129
(PK) Table PO PO # (PK)
Status Date
Employee # Vendor # (FK) (FK)
Table PO/Item PO # (PK) Item # (PK) Quantity
Table Item Item # (PK)
Description On Hand
Table Vendor Vendor # (PK) Name
Address
Cost
Price
Location
Contact
Terms
Balance
Chapter 9 Page 130
15.
16.
Defining Entities and Data Modeling - Payroll
Response:
Chapter 9 Page 131
1 and 2
Rejected Entities Payroll clerk
(a)Reason
cash disbursements clerk
Violates rule 1 and 2 – Wording suggests only one clerk (rule 1) and no evidence of attributes unique to this entity (rule 2) Violates Rule 1 – the company is a single occurrence Violates rule 1 and 2
supervisor check for the total payroll paycheck payroll summary
Violates rule 1 and 2 This is a view - Violates rule 2 This is a view - Violates rule 2 This is a view - Violates rule 2
Sagerod manufacturing company
Valid entities Employee Paycheck register Cash disbursement journal Time card Employee earnings File
Chapter 9 Page 132
17.
a. and b. Rejected Entities Accounts Payable
Reason Violates rule 1 and 2––Wording suggests only one
Department Clerk
clerk (rule 1) and no evidence of attributes unique to
Safe Buy Grocery
this entity (rule 2) Violates Rule 1––The company is a single
Stores Receiving Report
occurrence This is a view––It derives entirely from receiving
Summary Part-Time Employees
report and thus violates rule 2 Violates rule 2––Assumption: no employee specific
Chapter 9 Page 133
Unloading Personnel
data need to be captured by this system Violates rule 2––Assumption: no employee specific
Sales
data need to be captured by this system Violates rule 2––Assumption: The company does not
Representatives Obsolescence
capture Sales Rep data unique to each transaction. This is a view––Derived from inventory records
Reports Invoice (physical)
Violates rule 2 This is a view––Used to create Invoice Record
Check (physical)
Violates rule 2 This is a view––Derived from Check register records.
Payment Summary
Violates rule 2 This is a view––Derived from Check register records
Purchase Requisition
Violates rule 2 This is a view––Used to create Purchase Order
Customers
Violates rule 2 Not relevant to this system
Valid Entities Purchase Manager
Reason Assumption: all store purchase managers will use the system. This entity will consist of multiple occurrences and provide manager/store-specific
Supplier Inventory Purchase Order Receiving Report Invoice (record) Payment Obligation Check (register)
data not contained in other entities. Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2
Chapter 9 Page 134
Chapter 9 Page 135
18.
Solution a. and b. Rejected Entities Accounts Payable
Reason Violates rule 1 and 2—Wording suggests only one
Department Clerk
clerk (rule 1) and no evidence of attributes unique to
Safe Buy Grocery
this entity (rule 2) Violates Rule 1—the company is a single occurrence
Stores FA Receiving Report
This is a view—It derives entirely from receiving
Summary
report and thus violates rule 2
Chapter 9 Page 136
Receiving Clerk
Violates rule 2—Assumption: no employee specific
Accounts Payable
data need to be captured by this system Violates rule 2—Assumption: no employee specific
Manager Depreciation
data need to be captured by this system Assumption: This is a view—Derived from data in
Schedule Invoice (physical)
inventory records Violates rule 2 This is a view—Used to create Invoice Record
Check (physical)
Violates rule 2 This is a view—Derived from Check register records.
Payment Summary
Violates rule 2 This is a view—Derived from Check register records.
Purchase Requisition
Violates rule 2 This is a view—Used to create Purchase Order.
Store Manager
Violates rule 2 Assumption: manager/store-specific data will be contained in other entities i.e. Purchase Order
Valid Entities Supplier Fixed Assets Inventory Purchase Order Receiving Report Invoice (record) Payment Obligation Check (register)
Reason Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2
Chapter 9 Page 137
Chapter 9 Page 138
Chapter 9 Page 139
19. Response: 1 and 2
Rejected Entities Lotus Tea Importer Company and all departments such as Sales, warehouse, shipping department, general ledger department, etc. Various clerks such as Sales representative, accounting department clerk, AR Clerk, etc. stock release document Mail room employees packing slip. Invoice (physical) Customer Check (physical) inventory account summary remittance advices AR account summery price list
(a)Reason Violates Rule 1 – the company and these departments are single occurrences
Violates rule 1 and 2 – Wording suggests only one clerk (rule 1) and no evidence of attributes unique to this entity (rule 2) This is a view – It derives entirely from sales order and thus violates rule 2 Violates rule 2 – Assumption: no employee specific data need to be captured by this system This is a view – Derived from sales order. Violates rule 2 This is a view – derived from sales order Violates rule 2 This is a view – used to create record in cash receipts journal Violates rule 2 This is a view – Derived from inventory records. Violates rule 2 This is a view that is derived from the sales order and sent to the customer to facilitate posting payments to the correct customer account This a view – derived from the AR subsidiary ledger or the total of all unpaid sales orders Given the limited information in the problem, this entity may be represented as either a separate table or more simply as a field in the inventory record. We assume the latter in this solution.
Chapter 9 Page 140
Valid entities Customer Sales order inventory (product) Cash receipts record (CR journal) bill of lading carrier deposit slip Shipping Notice
Reason Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2
The ER diagrams in the student solutions probably contain the accounting-record entities in the table below. Technically, however, these entities are not necessary in a modern database system. This issue is an aspect of REA modeling that is examined in detail in chapter 10 of the text. The table below illustrates how each of these accounting records can be derived from other transactional database tables. The solutions to parts C and D of this problem do not include these unnecessary entities Unnecessary Accounting Records
May be derived as follows
Sales Journal
This is equivalent to sales order records
AR Subsidiary ledger
cost of goods sold account (GL)
This is the sum of all sales order records organized by customer that are still open (unpaid) at period end. This is the sum total of all sales order records that are still open (unpaid) at the period end. Calculated as the quantity sold (sales Order) X the cost of the item taken from the inventory record
inventory control (GL)
Sum of all inventory records
sales account (GL) journal voucher
This is sum total sales order records This is the sum of the transaction detail captured by the cash receipts records and/or the c
AR control accounts (GL)
Chapter 9 Page 141
Chapter 9 Page 142
Chapter 9 Page 143
20
Chapter 9 Page 144
21.
Chapter 9 Page 145
22.
Solution: a. and b. Rejected Entities Sales Representative
Reason Assumption: Sales representative specific data will
D&F Music Club
be contained in customer record. Violates rule 2 Violates Rule 1—the company is a single
John, Billing Clerk
occurrence Violates rule 2—Assumption: no employee specific
Chris, Warehouse
data need to be captured by this system Violates rule 2—Assumption: no employee specific
Clerk Sandy, AR Clerk
data need to be captured by this system Violates rule 2—Assumption: no employee specific
Scott, Mailroom Clerk
data need to be captured by this system Violates rule 2—Assumption: no employee specific
Customer Invoice
data need to be captured by this system This is a view—created from Customer Invoice
(physical) Customer Check
record. Violates rule 2 This is a view—Derived from Check register
(physical) Remittance Advise
records. Violates rule 2 This is a view—Derived from Customer Invoice
Remittance List
record at time of billing. Violates rule 2 This is a view—Used to create Cash Receipt
Laura, Cash Receipts
record. Violates rule 2 Violates rule 2—Assumption: no employee specific
Clerk Deposit Slip
data need to be captured by this system. This is a view—Created from Cash Receipt record.
Warehouse Manager
Violates rule 2 Violates rule 2—Assumption: no employee specific
Demand Forecast Purchase Requisition
data need to be captured by this system. View derived from marketing system Assumption: This is a View derived from Inventory records.
Chapter 9 Page 146
Rejected Entities Sara, Purchasing
Reason Violates rule 2—Assumption: no employee specific
Clerk PO Blind Copy
data need to be captured by this system. This is a view—derived from Purchase Order
Cash Disbursement
record. Violates rule 2 Violates rule 2—Assumption: no employee specific
Clerk Payment Check
data need to be captured by this system. This is a view—Created from Check Register
(Physical) Packing Slip
record. Violates rule 2 This is a view—Created from Sales Order record. Violates rule 2
Chapter 9 Page 147
Valid entities Customer Sales Order Sales Journal Inventory Sub Ledger Bill of Lading General Ledger Cash Receipts Journal Return Record Purchase Order Supplier Account Payable Receiving Report Supplier Invoice
Reason Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2 Meets conditions of Rules 1 and 2
(record) Check (register)
Meets conditions of Rules 1 and 2
Chapter 9 Page 148
22, part c.
22, part c.
Data Model of Expenditure Procedures
Data Model for Revenue Cycle Procedures
Chapter 9 Page 149
22, part d.
Fully Attributed Model Expenditure Procedures
Chapter 9 Page 150
22 part d.
Fully Attributed Model Revenue Cycle Procedures
22, part e. DFD of Revenue Cycle Procedures
Chapter 9 Page 151
Chapter 9 Page 152
22, part e. DFD for Expenditure Cycle Procedures
View more...
Comments