Accounting Information Systems
11th Edition
ISBN: 9780357156032
Author: Ulric J. Gelinas; Richard B. Dull; Patrick Wheeler
Publisher: Cengage Limited
expand_more
expand_more
format_list_bulleted
Question
Chapter 6, Problem 6DQ
Summary Introduction
To explain: The alternate problems that might occur with the alternative strategy.
Introduction:
Relational database:
It is a collection of multiple data sets constituted by rows, columns, and tables. It aids in developing a well-established relationship between different database tables. Information is shared between these tables for efficient use.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Discuss the importance of the role of data administrator. In the flat-fie environment, why is such a rolenot necessary? What tasks does the DBA perform?
Which of the following statements is not correct?
a.The database approach uses one common database to promote the concept of single user view.
b.Database systems resolve task data dependency.
c.The flat-file model encourages data redundancy.
d.A primary goal of databasesystems is to minimize data redundancy. e.Database systems provide increased accessibility to data and data integration.
Which statement is NOT true?a. In a typical two-tier client-server architecture, the server handles both application and database duties.b. Client computers are responsible for presenting data to the user and passing user input back to the server.c. Two-tier architecture is for local area network applications where the demand on the server is restricted to a relatively small population of users.d. The database and application functions are separated in the three-tier model. e. In three-tier client-server architectures, one tier is for user presentation, one is for database and applications access, and the third is for Internet access.
Chapter 6 Solutions
Accounting Information Systems
Ch. 6 - What is business intelligence (BI)?Ch. 6 - Prob. 2RQCh. 6 - Prob. 3RQCh. 6 - Prob. 4RQCh. 6 - What is a relationship?Ch. 6 - Prob. 6RQCh. 6 - Prob. 7RQCh. 6 - Prob. 8RQCh. 6 - How can an REA model help an organization improve...Ch. 6 - Prob. 10RQ
Ch. 6 - Prob. 11RQCh. 6 - Prob. 12RQCh. 6 - What is a foreign key? How are foreign keys...Ch. 6 - Prob. 14RQCh. 6 - Prob. 15RQCh. 6 - Prob. 1DQCh. 6 - What is a model? How is modeling a database or...Ch. 6 - Prob. 3DQCh. 6 - Prob. 4DQCh. 6 - Prob. 5DQCh. 6 - Prob. 6DQCh. 6 - Although todays enterprise systems incorporate...Ch. 6 - Prob. 8DQCh. 6 - Prob. 1SPCh. 6 - Prob. 2SPCh. 6 - Examine Figure 6.18, which contains the REA model...Ch. 6 - Prob. 6SPCh. 6 - Prob. 7SPCh. 6 - What SQL command(s) would you use to add the date...Ch. 6 - Prob. 2P
Knowledge Booster
Similar questions
- Discuss the importance of the role of the database administrator. In the flat-file environment, why is such a role not necessary? What tasks does the DBA perform?arrow_forwardMatch each of the numbered descriptions with the principle, component, or descriptor that it best reflects. Indicate your answer by entering the letter A through J in the blank provided. A. Control principle B. Relevance principle C. Compatibility principle D. Flexibility principle E. Cost-benefit principle F. Source documents G. Input devices H. Information processors I. Information storage J. Output devices 1. Capture information from source documents and transfer to information processing. 2. Keeps data accessible to information processors. 3. Systems that summarize information for use. 4. Means to take information out of an accounting system and make it available to users. 5. Provide the information processed by the accounting system. 6. Prescribes that benefits from an activity in a system outweigh the costs. 7. Prescribes that a system be adaptable to changes in the company, environment, and user needs. 8. Prescribes that a system conform with a company’s activities, personnel,…arrow_forwardConcerning eXtensible Business Reporting Language (XBRL), which of the following statements is not true? A. XBRL reduces the need for information to be manually reentered into analysis tools B. XBRL creates unique tags for each data item C. XBRL is used for internal (managerial) reporting D. XBRL reduces the need to produce multiple reportsarrow_forward
- Which of the following is least likely to be an attribute of an employee table in a normalized database?a. employee nameb. employee addressc. employee numberd. employee supervisor’s namee. all of these would be attributes of the employee table in a normalized database.arrow_forwardDistinguish the revenue cycle activities and operations of a conventional "brick and mortar" company from those of an internet business. Avoid using the same distinctions between data flow and system flowcharts in your answer.arrow_forwardMatch the term to its definition by choosing the appropriate number in the answer field. You will not use all of the terms provided. Question 8 options: A partial set of all available data items in a database that are used by a specific application, query, or report. Fields that link tables with other tables. The ability of employees at higher levels of responsibility and authority to bypass internal controls. A field which is unique to each record in a database table. The total number of transactions in a batch, used as a control total. Procedures that are put in place to remedy errors or irregularities after they have been discovered. Controls designed to enhance the control environment and strengthen the effectiveness of application controls. 1. Corrective controls 2. Preventive controls 3. General controls 4. Application controls 5. Record counts 6.…arrow_forward
- Outline the traditional problems associated with the flatfile model that are resolved by the database model.arrow_forwardMatch the two lists, below, by placing the capital letter from List 1 in each of the cells preceding the five descriptions in List 2 to which they best relate. One description in List 2 can be answered with 2 matches from List 1. Therefore, you should have 2 letters left over from List 1. List 1: Concepts A. Application (i.e., automated) control. B. Corrective control. C. Control environment. D. Input validity. E. Input completeness. F. Input accuracy G. Update completeness. H. Efficient use of resources. List 1: Capital letter List 2: Definitions/Descriptions 1. Insurance policy reimburses a company for losses due to a fire in a warehouse. 2. Shipping notices have a serial number that is tracked to ensure that they are all input. 3. Computer reviews each input to ensure that all the required data are included. 4. Inventory movements are tracked with a scanner to reduce manual counting. 5. Purchase orders are signed to approve the purchase.arrow_forwardYou are the administrator of a web server to configure the level of access for users. Then need to be authenticated first before having access to some web pages. What criteria of information security has been addressed in this configuration? Choose one of the below options and justify your answer. - integrity - scalability - availability - confidentialityarrow_forward
- Which of the following statements is correct? a. A bridge is used to connect a LAN and a WAN. b. Packet switching combines the messages of multiple users into a packet for transmission. At the receiving end, the packet is disassembled into individual messages and distributed to the user. c. The decision to partition a database assumes that no identifiable primary user exists in the organization. d. Message switching is used to establish temporary connections between network devices for the duration of a communications session. e. A deadlock is a temporary phenomenon that disrupts transaction processing. It will resolve itself when the primary computer completes processing its transaction and releases the data the other nodes need.arrow_forwardIdentify two specific IT-related risks in computerized accounting information systems. Propose a strategy that might be implemented to mitigate or eliminate each selected risk. Be sure to effectively support your rationale.arrow_forwardWhich of the following statements about the client-server model is correct?a. It is best suited to the token ring topology because the random-access method this topology uses detects data collisions.b. It distributes both data and processing tasks to the server node. The client-server model can use the bus or ring topology.c. It is most effective when used as a bus topology because its deterministic access method avoids collisions and prevents data loss during transmissions.d. It is more efficient than the bus or ring topologies because it transmits an entire file of records to the requesting node rather than only a single record.e. It is not used in conjunction with either the bus or ring topologies.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning