Professional Documents
Culture Documents
Organization: the way records are physically arranged on the secondary storage device
Access method: technique used to locate records and to navigate through the database
or file
2. Insert a record
3. Update a record
4. Read a file
6. Scan a file
7. Delete a record
Data Structures
Efficient: 4, 5 sometimes 3
Inefficient: 1, 2, 6, 7 usually 3
Indexed structure
Efficient: 1, 2, 3, 7
Inefficient: 4
Access time for single record is slower than Indexed Sequential or Indexed
Random
Has 3 physical components: indexes, prime data storage area, overflow area
[Figure 8-4]
Might have to search index, prime data area, and overflow area slowing down
access time
Integrating overflow records into prime data area, then reconstructing indexes
reorganizes ISAM files
Very Efficient: 4, 5, 6
Moderately Efficient: 1, 3
Inefficient: 2, 7
Hashing Structure
o Employs algorithm to convert primary key into physical record storage address [Figure
8-5]
No separate index necessary
Advantage: access speed
Disadvantage
Inefficient use of storage
Different keys may create same address
Efficient: 1, 2, 3, 6
Inefficient: 4, 5, 7
Pointer Structure
Stores the address (pointer) of related record in a field with each data record
[Figure 8-6]
Pointers may also provide links of records b/w files [Figure 8-7]
Efficient: 1, 2, 3, 6
Inefficient: 4, 5, 7
Objective: develop the database efficiently so that data can be accessed quickly and easily.
network
relational
Most existing databases are relational. Some legacy systems use hierarchical or network
databases.
The relational model portrays data in the form of two dimensional tables.
Its strength is the ease with which tables may be linked to one another.
Relational model is based on the relational algebra functions of restrict, project, and join.
Association
The number of possible occurrences in one table that are associated with a single
occurrence in a related table
Each row in the table must be unique in at least one attribute, which is the primary key.
Tables are linked by embedding the primary key into the related table as a foreign key.
The attribute values in any column must all be of the same class or data type.
Tables must conform to the rules of normalization, i.e., free from structural dependencies or
anomalies.
Insertion Anomaly: A new item cannot be added to the table until at least one entity uses a
particular attribute item.
Deletion Anomaly: If an attribute item used by only one entity is deleted, all information about
that attribute item is lost.
Update Anomaly: A modification on an attribute must be made in each of the rows in which the
attribute appears.
Various items of interest (customers, inventory, sales) are stored in separate tables.
A process which systematically splits unnormalized complex tables into smaller tables that
meet two conditions:
all nonkey (secondary) attributes in the table are dependent on the primary key
When unnormalized tables are split and reduced to third normal form, they must then be linked
together by foreign keys.
Insertion anomalies can result in unrecorded transactions and incomplete audit trails.
Deletion anomalies can cause the loss of accounting records and the destruction of audit trails.
Accountants should understand the data normalization process and be able to determine
whether a database is properly normalized.
1. Identify entities
assign primary keys to all entities in the model to uniquely identify records
The subject has implications for internal control that make it the concern of auditors also.
Most auditors will never be responsible for normalizing an organizations databases; they should
have an understanding of the process and be able to determine whether a table is properly
normalized.
In order to extract data from tables to perform audit procedures, the auditor first needs to know
how the data are structured.
Identify important transactions live while they are being processed and extract them [Figure 8-
26]
Examples
Errors
Fraud
Compliance
Disadvantages:
Brief history
1950-1967 nascent field, little tools or techniques (e.g., K. Davis in Viet Nam)
1967-1970 AICPA efforts for one GAS, Big 8 each developed their own
o GAS can be used to audit the data currently being stored in most file structures and formats
Auditing issues:
ACL