Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 9, Problem 8P
To determine
Determine the best distributed database method in the given circumstances. Also, explain the reason.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Two geographically distributed companies have several facilities around the country. The database users in company “A” need rapid access to common data for read-only purposes. Company “B” users need rapid access to data for transaction processing purposes. Their sites are autonomous; they do not share the same customers, products, or suppliers Under these circumstances:
Which distributed database method is best for company “A”. Explain your reasoning.
Which distributed database method is best for company “B”. Explain your reasoning.
The ABC Company is a geographically distributed organization with several sites around the country. Users at these sites need rapid access to data for transaction processing purposes. The sites are autonomous; they do not share the same customers, products, or suppliers. Which distributed database method is best under these circumstances? Explain your reasoning.
The XYZ Company is a geographically distributed organization with several sites around the country. Users at these sites need rapid access to common data for read-only purposes. Which distributed database method is best under these circumstances? Explain your reasoning.
Chapter 9 Solutions
Accounting Information Systems
Ch. 9 - Prob. 1RQCh. 9 - Prob. 2RQCh. 9 - Prob. 3RQCh. 9 - Prob. 4RQCh. 9 - Prob. 5RQCh. 9 - Prob. 6RQCh. 9 - Prob. 7RQCh. 9 - Prob. 8RQCh. 9 - Prob. 9RQCh. 9 - Prob. 10RQ
Ch. 9 - Prob. 11RQCh. 9 - Prob. 12RQCh. 9 - Prob. 13RQCh. 9 - Prob. 14RQCh. 9 - Prob. 15RQCh. 9 - Prob. 16RQCh. 9 - Prob. 17RQCh. 9 - What are the conditions for third normal form...Ch. 9 - Prob. 19RQCh. 9 - Prob. 20RQCh. 9 - Prob. 21RQCh. 9 - What is a user view?Ch. 9 - Prob. 23RQCh. 9 - Prob. 24RQCh. 9 - Prob. 25RQCh. 9 - Prob. 1DQCh. 9 - Prob. 2DQCh. 9 - Prob. 3DQCh. 9 - Prob. 4DQCh. 9 - Prob. 5DQCh. 9 - Prob. 6DQCh. 9 - Prob. 7DQCh. 9 - Prob. 8DQCh. 9 - Prob. 9DQCh. 9 - Prob. 10DQCh. 9 - Prob. 11DQCh. 9 - Prob. 12DQCh. 9 - Prob. 13DQCh. 9 - Prob. 14DQCh. 9 - Prob. 15DQCh. 9 - Discuss the accounting implications of the update,...Ch. 9 - Prob. 17DQCh. 9 - Prob. 18DQCh. 9 - Prob. 19DQCh. 9 - Prob. 20DQCh. 9 - Prob. 1MCQCh. 9 - Prob. 2MCQCh. 9 - Prob. 3MCQCh. 9 - Prob. 4MCQCh. 9 - Prob. 5MCQCh. 9 - Prob. 6MCQCh. 9 - Prob. 7MCQCh. 9 - Prob. 8MCQCh. 9 - Prob. 9MCQCh. 9 - Prob. 10MCQCh. 9 - Prob. 11MCQCh. 9 - Prob. 12MCQCh. 9 - Prob. 13MCQCh. 9 - Prob. 14MCQCh. 9 - Prob. 15MCQCh. 9 - Prob. 16MCQCh. 9 - Prob. 17MCQCh. 9 - Prob. 18MCQCh. 9 - The Mega Supply Corporation has three divisions:...Ch. 9 - Prob. 2PCh. 9 - Lesters Rentals is located in Cincinnati, Ohio....Ch. 9 - Prob. 4PCh. 9 - Prob. 5PCh. 9 - Prob. 6PCh. 9 - Prob. 7PCh. 9 - Prob. 8PCh. 9 - Prob. 9PCh. 9 - Prob. 10PCh. 9 - Prob. 11PCh. 9 - Prob. 12PCh. 9 - Prepare the 3NF base tables needed to produce the...Ch. 9 - Prob. 14PCh. 9 - Prob. 15PCh. 9 - Prob. 16PCh. 9 - Prob. 17PCh. 9 - Prob. 18PCh. 9 - Prob. 21PCh. 9 - Prob. 22PCh. 9 - Prob. 23PCh. 9 - Prob. 24P
Knowledge Booster
Similar questions
- Technology can be used to support a strong internal control system. Discuss how technology has improved the point-of-sale transactions.arrow_forwardWhich statement best describes the issue of distributed data processing (DDP)?a. The centralized and DDP approaches are mutually exclusive; an organization must choose one approach or the other.b. The philosophy and objective of the organization’s management will determine the extent of DDP in the firm.c. In a minimum DDP arrangement, only data input and output are distributed, leaving the tasks of data control, data conversion, database management, and data processing to be cen- trally managed.d. The greatest disadvantage of a totally distributed environment is that the distributed infor- mation processing unit locations are unable to communicate and coordinate their activities.e. Although hardware (such as computers, database storage, and input/output terminals) can be effectively distributed, the systems development and maintenance tasks must remain centralized for better control and efficiency.arrow_forwardDatabase currency is achieved bya. implementing partitioned databases at remote sites.b. employing data-cleansing techniques.c. ensuring that the database is secure from accidental entry.d. an external auditor’s reconciliation of reports from multiple sites.e. a database lockout that prevents multiple simultaneous access.arrow_forward
- One physical computer can be used to host multiple instances of operating systems, and multiple users can separately access those separate operating systems. This is an example of: A) blockchain. B) value chain. C)Virtualization. D)distributed computing. Controls that are designed to apply to an entire control environment are called:. A)Integrated controls. B)Application controls . C)General controls . D)Governance controls. This internal control framework is used by many public companies that file with the SEC in the United States: . A)COBIT. B)PCAOB. C) ERM. D)coso. In conversations, Bob told Alice that a property for sale had an "ocean view." She was so motivated that she made an offer and gave money as a down payment. When she went to see the property the ocean was not visible because it was too far away. Which element of fraud is illustrated by this story?. A) Misappropriation of assets. B)Corruption . C)Material fact .…arrow_forwardWhich of the following best describes a system of computers that connects the internal users of an organization distributed over a wide geographic area? a. LAN b. Internet c. decentralized network d. multidrop network e. intranetarrow_forwardExplain how internal control can be enhanced through the proper installation of Information Technology Identify the risks for accounting systems that rely heavily on IT functions. Distinguish between general controls and application controls and give examples at least five Which duties should be segregated in a computer department? Describe the typical duties of computer personnel. What aspects of documentation, file security and retention control procedures are unique to computer systems? What are the responsibilities of the database administrator (DBA) function? Compare the risks associated with network environment to those associated with centralized IT functions.arrow_forward
- Which of the following statements is not correct? a.The database approach uses one common database to promote the concept of single user view. b.Database systems resolve task data dependency. c.The flat-file model encourages data redundancy. d.A primary goal of databasesystems is to minimize data redundancy. e.Database systems provide increased accessibility to data and data integration.arrow_forwardExplain why an organization would choose to install a distributed instead of a centralized computer environment.arrow_forwardMany large companies use an electronic data interchange (EDI) to communicate with key customers and suppliers. Explain the benefits and risks involved when companies use EDI. Explain one way that the use of EDI affects internal controls and the auditor's testing.arrow_forward
- Which statement is NOT true?a. In a typical two-tier client-server architecture, the server handles both application and database duties.b. Client computers are responsible for presenting data to the user and passing user input back to the server.c. Two-tier architecture is for local area network applications where the demand on the server is restricted to a relatively small population of users.d. The database and application functions are separated in the three-tier model. e. In three-tier client-server architectures, one tier is for user presentation, one is for database and applications access, and the third is for Internet access.arrow_forwardWhich of the following would strengthen organizational control over a large-scale data processing center?a. Requiring the user departments to specify the general control standards necessary for processing transactions.b. Requiring that requests and instructions for data processing services be submitted directly to the computer operator in the data center.c. Having the database administrator report to the manager of computer operations.d. Assigning maintenance responsibility to the original system designer who best knows its logic.e. None of the above.arrow_forwardWhich preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (f) A company purchased the leading “off-the-shelf” e-commerce software for linking its electronic storefront to its inventory database. A customer discovered a way to directly access the database by entering appropriate SQL code.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Principles of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax College
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College