Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 9, Problem 9P
To determine
Develop normalized data tables in third normal form. Also, mention the steps necessary to normalized the report and establish link between tables.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Please see attached image for instructions. Thank you for your help!
All of the following can provide source data except ________.A. a scanning device at the grocery storeB. a utility bill received in the mailC. a bar code readerD. software to process the source data
In a computer system, how are accounting records posted?a. master file is updated to a transaction fileb. master file is updated to an index filec. transaction file is updated to a master filed. master file is updated to a year-to-date filee. current balance file is updated to an index file
Chapter 9 Solutions
Accounting Information Systems
Ch. 9 - Prob. 1RQCh. 9 - Prob. 2RQCh. 9 - Prob. 3RQCh. 9 - Prob. 4RQCh. 9 - Prob. 5RQCh. 9 - Prob. 6RQCh. 9 - Prob. 7RQCh. 9 - Prob. 8RQCh. 9 - Prob. 9RQCh. 9 - Prob. 10RQ
Ch. 9 - Prob. 11RQCh. 9 - Prob. 12RQCh. 9 - Prob. 13RQCh. 9 - Prob. 14RQCh. 9 - Prob. 15RQCh. 9 - Prob. 16RQCh. 9 - Prob. 17RQCh. 9 - What are the conditions for third normal form...Ch. 9 - Prob. 19RQCh. 9 - Prob. 20RQCh. 9 - Prob. 21RQCh. 9 - What is a user view?Ch. 9 - Prob. 23RQCh. 9 - Prob. 24RQCh. 9 - Prob. 25RQCh. 9 - Prob. 1DQCh. 9 - Prob. 2DQCh. 9 - Prob. 3DQCh. 9 - Prob. 4DQCh. 9 - Prob. 5DQCh. 9 - Prob. 6DQCh. 9 - Prob. 7DQCh. 9 - Prob. 8DQCh. 9 - Prob. 9DQCh. 9 - Prob. 10DQCh. 9 - Prob. 11DQCh. 9 - Prob. 12DQCh. 9 - Prob. 13DQCh. 9 - Prob. 14DQCh. 9 - Prob. 15DQCh. 9 - Discuss the accounting implications of the update,...Ch. 9 - Prob. 17DQCh. 9 - Prob. 18DQCh. 9 - Prob. 19DQCh. 9 - Prob. 20DQCh. 9 - Prob. 1MCQCh. 9 - Prob. 2MCQCh. 9 - Prob. 3MCQCh. 9 - Prob. 4MCQCh. 9 - Prob. 5MCQCh. 9 - Prob. 6MCQCh. 9 - Prob. 7MCQCh. 9 - Prob. 8MCQCh. 9 - Prob. 9MCQCh. 9 - Prob. 10MCQCh. 9 - Prob. 11MCQCh. 9 - Prob. 12MCQCh. 9 - Prob. 13MCQCh. 9 - Prob. 14MCQCh. 9 - Prob. 15MCQCh. 9 - Prob. 16MCQCh. 9 - Prob. 17MCQCh. 9 - Prob. 18MCQCh. 9 - The Mega Supply Corporation has three divisions:...Ch. 9 - Prob. 2PCh. 9 - Lesters Rentals is located in Cincinnati, Ohio....Ch. 9 - Prob. 4PCh. 9 - Prob. 5PCh. 9 - Prob. 6PCh. 9 - Prob. 7PCh. 9 - Prob. 8PCh. 9 - Prob. 9PCh. 9 - Prob. 10PCh. 9 - Prob. 11PCh. 9 - Prob. 12PCh. 9 - Prepare the 3NF base tables needed to produce the...Ch. 9 - Prob. 14PCh. 9 - Prob. 15PCh. 9 - Prob. 16PCh. 9 - Prob. 17PCh. 9 - Prob. 18PCh. 9 - Prob. 21PCh. 9 - Prob. 22PCh. 9 - Prob. 23PCh. 9 - Prob. 24P
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.Similar questions
- All of the following can provide source data except ________. A. a scanning device at the grocery store B. a utility bill received in the mail C. a bar code reader D. software to process the source dataarrow_forwardChoose only one answer as well as state their reasons/rationale for the answer chosen. 10) An organization uses batch processing to generate customer invoices. During the process, the computer sums the invoice number field for all invoices in the batch and the billing clerk then compares that number to the same total that the clerk calculated prior to processing. That calculation (the sum of the sales invoice numbers) is a type of batch total called a:a. Record countb. Financial totalc. Hash totalarrow_forwardMatch each example with a component of a computerized accounting information system. Components may be used more than once. Example Component 1. Server 2. Bank checks 3. Reports 4. Keyboard 5. Software 6. Financial statements 7. Bar code scannerarrow_forward
- Draw the flow chart for the following - manual based(NOTE: add files, data store and departments which all time should be included even not in the following process, also don’t add any more process not in the scenario , your drawing should be clear )The Process: Vendors send invoices to the AP department where they are reviewed and approved for payment. Once approved, the invoice and a cash disbursement voucher are sent to the cash disbursement department, where a check is prepared and sent to the vendor. A copy of the check, the invoice, and the voucher are returned to the AP department and filed.arrow_forwardSandol Corporation has numerous customers. A customer file is kept on disk storage. Each customer file contains name, address, credit limit, and account balance. The auditor wishes to test this file to determine whether credit limits are being exceeded. The best procedure for the auditor to follow would be to: a. Develop test data that would cause some account balances to exceed the credit limit and determine if the system properly detects such situations. O b. Request a printout of a sample of account balances so they can be individually checked against the credit limits. c. Request a printout of all account balances so they can be manually checked against the credit limits. O d. Develop a program to compare credit limits with account balances and print out the details of any account with a balance exceeding its credit limit.arrow_forwardThe systems programmer uses a hashing algorithm to determine storage addresses. The hashing structure is 9,997/key. The resulting number is then used to locate the record. The first two digits after the decimal point represent the cylinder number, while the second two digits represent the surface number. The fifth, sixth, and seventh digits after the decimal point represent therecord number. This algorithm results in a unique address 99 percent of the time. What happens the remainder of the time when the results of the algorithm are not unique? Explain in detail the storage process when key value 3 is processed first, key value 2307 at a later date, and shortly thereafter key value 39.arrow_forward
- When aninventory itemfalls to the recorder point, a purchase requisition is automatically generated and printed on the terminal in the purchasing department. The purchasing clerk select suppliers and prepare a purchase order. One copy of the purchase order is sent to the supplier and another copy is sent to the receiving department. The purchasing clerk then adds a record to the open/closed purchase order file through an update program in the data processing department.When the receiving clerk receivesthe delivery from the supplier, the clerkreconciles the items with the packing slip and the purchasing order. After the reconciliation, the receiving clerk prepares a hard-copy receiving report recording the quantity and quality of the goods received. One copy of the receiving report accompaniesthe items to the warehouse and another copy is filed in the receiving department. Using the department terminal, the receiving clerk adds a record to the digital receiving report file. The system…arrow_forwardMatch the term to its definition by choosing the appropriate number in the answer field. You will not use all of the terms provided. Question 8 options: A partial set of all available data items in a database that are used by a specific application, query, or report. Fields that link tables with other tables. The ability of employees at higher levels of responsibility and authority to bypass internal controls. A field which is unique to each record in a database table. The total number of transactions in a batch, used as a control total. Procedures that are put in place to remedy errors or irregularities after they have been discovered. Controls designed to enhance the control environment and strengthen the effectiveness of application controls. 1. Corrective controls 2. Preventive controls 3. General controls 4. Application controls 5. Record counts 6.…arrow_forwardFor each of the following file processing operations, indicate whether a sequential file, indexed random file, indexed sequential access method (ISAM), hashing, or pointer structure works the best. You may choose as many as you wish for each step. Also, indicate which would perform the least optimally.a. Retrieve a record from the file based upon its primary key value.b. Update a record in the file.c. Read a complete file of records.d. Find the next record in a file.e. Insert a record into a file.f. Delete a record from a file.g. Scan a file for records with secondary keys.arrow_forward
- For each of the following file processing operations, indicate whether a sequential file, indexed random file, virtual storage access method, hashing, or pointer structure would work best. You may choose as many as you wish for each step. Also indicate which would perform the least optimally. a. Retrieve a record from the file based on its primary key value. b. Update a record in the file. c. Read a complete file of records. d. Find the next record in a file. e. Insert a record into a file. f. Delete a record from a file. g. Scan a file for records with secondary keys.arrow_forwardSelect one of the journal entry testing analytics from the following list and explain why it is useful in detecting journal entry fraud risk. Use the internet to find examples to support your answer. Round dollar entries Revenue reversals Unusual dates Management override General ledger close Dormant accountsarrow_forward________ takes all transactions from the journal during a period and moves the information to a general ledger (ledger). A. Hitching B. Posting C. Vetting D. Laxingarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Excel Applications for Accounting PrinciplesAccountingISBN:9781111581565Author:Gaylord N. SmithPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
- Auditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College PubAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningPrinciples of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax College
Excel Applications for Accounting Principles
Accounting
ISBN:9781111581565
Author:Gaylord N. Smith
Publisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College