AIS exam 2 review

AIS exam 2 review - ACC 361 Exam 2 Review Chapter 9:...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
ACC 361 – Exam 2 Review Chapter 9: Flat-File vs Database Approach: - Flat-file Approach – An organizational environment in which users own their data exclusively. o Exclusive ownership of data is a natural consequence of two problems associated with the legacy-system era 1. Is a business culture that erects barriers between organizational units that inhibit entity-wide integration of data 2. Stems from the limitations in flat file management technology that require data files to be structured to the unique needs of the primary user. - Data Redundancy is the state of data elements being represented in all user files. It is the cause of four types of data management problems: o Data Storage – In flat-file it is not possible to capture and store data once and make it available to all users. Instead organizations must incur costs of multiple collection and storage procedures o Data Updating – Very expensive to update for all users who the information is necessary for. o Currency of Information – This is in contrast to the data updating problem, a lot of times not all the necessary files are updated and users are making decision using outdated information o Task-Data dependency – The user’s inability to obtain additional information as his or her needs change - The Database Approach – Uses a pooling of data method into a common database that is shared by all users. Data sharing (The absence of ownership) is the central concept of the database approach - How does the database approach solve the problems of the flat-file approach: o No data redundancy o Single Update – The data exists all in one place and thus only needs a single update o Current Values – A change a user makes will show up for all the other users o Task-data independence – Users have access to the full domain of data available to the firm. Even if their information needs change, they have all possible information that could be needed. (This is not so in flat-file) - Database Management System is a software system that controls access to the data resource o Because all the information is in one database there must be security measures. If Data X is a confidential file the DBMS knows which users have access to certain confidential files - 3 most common database approaches used for business information systems are: o Hierarchical Model – A lot of limitations o Network Model – A lot of limitations o Relational Model – Flexible and allows users to create new and unique paths through the database to solve a wider range of business problems
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
- The four primary elements of the database environment: o The users – Access the database in two ways Via user application programs that professionals prepare Via direct query, which requires no formal user programs instead has built in protection that only allows authorized users to process data o Database management system o Database administrator – does not exist in the flat-file environment. It is responsible for managing the database resource. In some organizations it
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 01/31/2012 for the course ACC 361 taught by Professor Eighme during the Fall '10 term at Miami University.

Page1 / 6

AIS exam 2 review - ACC 361 Exam 2 Review Chapter 9:...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online