Accounting Information Systems
11th Edition
ISBN: 9781337552127
Author: Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 6, Problem 7SP
Summary Introduction
To list: The attributes that a database designer should include in each table and identify primary key attributes and composite key attributes with justifications.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
An organization’s IT function has the following goals: Improve the quality of IT solutions and services to its internal users. Increase the ratio of planned-to-realized benefits from systems solutions. Fully match IT strategy with enterprise strategies.Integrate information systems architectures to minimize database redundancy and increase systems reusability across the user community.RequiredDevelop a BSC depicting specific measures for each of the four BSC perspectives.
One of the first steps in the creation of a relational database is toa. integrate accounting and nonfinancial data.b. plan for increased secondary storage capacity.c. order data-mining software that will facilitate data retrieval.d. create a data model of the key entities in the system.e. construct the physical user view using SQL.
An engineering company is looking for a software solution to manage their inventory and distribution.Name the four main activities of systems analysis that could be applied in the given situation.
Chapter 6 Solutions
Accounting Information Systems
Ch. 6 - What is business intelligence (BI)?Ch. 6 - Prob. 2RQCh. 6 - Prob. 3RQCh. 6 - Prob. 4RQCh. 6 - What is a relationship?Ch. 6 - Prob. 6RQCh. 6 - Prob. 7RQCh. 6 - Prob. 8RQCh. 6 - How can an REA model help an organization improve...Ch. 6 - Prob. 10RQ
Ch. 6 - Prob. 11RQCh. 6 - Prob. 12RQCh. 6 - What is a foreign key? How are foreign keys...Ch. 6 - Prob. 14RQCh. 6 - Prob. 15RQCh. 6 - Prob. 1DQCh. 6 - What is a model? How is modeling a database or...Ch. 6 - Prob. 3DQCh. 6 - Prob. 4DQCh. 6 - Prob. 5DQCh. 6 - Prob. 6DQCh. 6 - Although todays enterprise systems incorporate...Ch. 6 - Prob. 8DQCh. 6 - Prob. 1SPCh. 6 - Prob. 2SPCh. 6 - Examine Figure 6.18, which contains the REA model...Ch. 6 - Prob. 6SPCh. 6 - Prob. 7SPCh. 6 - What SQL command(s) would you use to add the date...Ch. 6 - Prob. 2P
Knowledge Booster
Similar questions
- Which of the following is an example of an input control?a. making sure that output is distributed to the proper peopleb. monitoring the work of programmersc. collecting accurate statistics of historical transactions while gathering datad. recalculating an amount to ensure its accuracye. having another person review the design of a business formarrow_forwardWhat is the role of management in information technology? Enumerate the four organizational assets in an IS Organization. Explain why do the IS leadership needs to manage these assets? Search for the Objectives of Technology Department then explain each objective in one or two sentences Given the chance to be part of the MIS Organization, what position would you apply for and why?arrow_forwardThe database model most likely to be used in the development of a modern (not legacy) system is a. hierarchical b. structured c. relational d. network e. navigationalarrow_forward
- Educate these stakeholders on the advantages of utilizing a spreadsheet solution and how simple it was to process data in order to generate the information provided in the report in Excelarrow_forwardDiscuss the importance of the role of data administrator. In the flat-fie environment, why is such a rolenot necessary? What tasks does the DBA perform?arrow_forwardBetter Business Company (BBC) is in the process of planning a more advanced computer-based information system. Slavish, Moore, LLP, BBCs consulting firm, has recently been provided with an overview of their proposed plan: To ensure that the system functions as needed, the BBC Information System (BBCIS) will be created with input from its employees. System construction will begin with prototyping, computer-aided software engineering technology, and Gantt charts. From this point, IT professionals and a systems administrator, who are full-time employees of BBC, will create data models of the business process, define conceptual user views, design database tables, and specify system controls. Users in each department will submit written descriptions of their information needs and business problems to the IT professionals, who will then perform feasibility studies. Each aspect of the system will be documented in accordance with best practices and standards. The systems administrator will determine access privileges and maintain access control lists and database authorization tables. The administrator will have sole access to the transaction log, which will be used to record all changes made to database tables. A role of the administrator is to detect unauthorized access, reconstruct events, and promote personal accountability. The systems administrator will also be responsible for ensuring that virus protection software is current. Another important task of the administrator is to ensure that adequate backup to databases and applications occur and that disks and tapes are stored in a secure off-site location. Each employee requiring computer access will be assigned a user ID and password that will be entered when logging onto the system. If a computer terminal is left idle for more than five minutes, the system will close out the session and the user will need to log on again. Furthermore, users will be required to change their passwords once every year. Hardware will be purchased from Bell Computer Company with the advice of in-house systems developers. With the exception of basic applications, user departments will be allowed to purchase additional software that they need, which will be added to the system. BBCIS will run on a central server in the computer center located in the companys administration building. Two security guards will be assigned to the entrance to the computer room. To access the computer center, employees will swipe their ID cards on the lock to the main entrance door. The system will record the times of each entry and departure from the center. The data center will employ an advanced air-conditioning and air filtration system to eliminate dust and pollens. There will also be a sprinkler system to minimize damages in case of a fire. Required Based on BBCs plans for the implementation of a new computer system, describe the potential risks and needed controls. Classify these according to the relevant areas of the COSO framework.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAccounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage Learning
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College PubCornerstones of Cost Management (Cornerstones Ser...AccountingISBN:9781305970663Author:Don R. Hansen, Maryanne M. MowenPublisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Cornerstones of Cost Management (Cornerstones Ser...
Accounting
ISBN:9781305970663
Author:Don R. Hansen, Maryanne M. Mowen
Publisher:Cengage Learning