(SM) Chapter 4
(SM) Chapter 4
REVIEW QUESTIONS
5. What flat-file data management problems are solved as a result of using the
database concept?
Response:
a. data storage problem
b. data update problem
c. currency problem
d. task-data dependency problem
6. What is DML?
Response: DML is the proprietary programming language that a particular DBMS
uses to retrieve, process, and store data.
Response: (DDL) is a programming language used to define the database to the DBMS.
The DDL identifies the names and the relationship of all data elements, records, and files
that constitute the database. This definition has three levels, called views: the physical
internal view, the conceptual view (schema), and the user view (subschema).
8. What is the internal view of a database?
Response: The internal view of a database is the physical arrangement of the records. It
describes the data structure, the linkages between files, and the physical arrangement of
the records.
9. What is SQL?
Response: Structured Query Language (SQL) is a fourth-generation, nonprocedural
language that allows users to easily input, retrieve, and modify data. It is the standard
query language for both mainframe and microcomputer DBMSs.
12. What are the criteria that influence the selection of the data structure?
Response:
a. rapid file access and data retrieval
b. efficient use of disk storage space
c. high throughput for transaction processing
d. protection from data loss
e. ease of recovery from system failure
f. accommodation of file growth
19. Explain the grandfather-father-son backup technique. Is it used for sequential files
or direct access techniques? Why? How many generations can be backed up?
Response: This procedure is when the current master file (the father) is processed against
the transaction file to produce a new master file (the son). With the next batch of
transactions, the son becomes the current master file (the father), and the original father
becomes the backup (the grandfather) file. The new master file that emerges from the
update process is the son. This procedure is continued with each new batch of
transactions, creating generations of backup files. When the desired number of backup
copies is reached, the oldest backup file is erased (scratched). This process is used for
sequential files and batch direct access systems. The updates for online, real-time, direct
access systems occur continuously throughout the day. The master files are backed up at
certain intervals. The number of backed up master files is a management and auditor
decision.
21. What are the four basic backup and recovery features necessary in a DBMS? Briefly
explain each.
Response:
a. Backup. This feature makes a periodic backup of the entire database.
b. Transaction Log (Journal). This feature tracks all transactions in a transaction log.
c. Checkpoint Feature. This feature suspends all data processing while the system
reconciles the transaction log and the database change log against the database.
d. Recovery Module. This feature uses the logs and backup files to restart the system after
a failure.
22. What is data encryption?
Response: Data encryption uses an algorithm to scramble selected data, thus making
them unreadable to an intruder browsing the database. In addition to protecting stored
data, encryption is used for protecting data that are transmitted over communications
lines.
Discussion Questions
1. In the flat-file data management environment, users are said to own their data files.
What is meant by this ownership concept?
Response: In the traditional data management environment, applications are developed
with data and program dependency. Typically, these programs are application specific.
Thus, the users of the application data tend to be proprietary about the data in “their”
applications and may not be amenable to sharing such data.
3. Discuss why control procedures over access to the database become more crucial
under the database concept than in the flat-file data management environment.
What role does the DBMS play in helping to control the database environment?
Response: Under the database concept, the data is centrally stored with many different
users accessing the database. However, each user should not have access to the whole
database. Under the flat-file data management environment where the data and programs
were linked, the user access problem was not as great a threat. The DBMS is a special
software system that is programmed to know which data each user is authorized to
access. This controlled authorization is crucial in centrally stored DBMSs.
5. Discuss the two ways in which users can access the database files in a database
environment.
Response: The first way the user may access the database is through user programs
prepared by systems professionals. These programs send data access requests to the
DBMS. The DBMS then validates the requests and retrieves the data for processing. The
presence of the DBMS is transparent to the user. The second method involves direct
inquiry on the part of the user. DBMSs have built-in data inquiries that allow authorized
users to retrieve and manipulate data without the assistance of the professional
programmers.
Response: The primary limitation of this model is that a parent record may own one or
more child, but no child record may have more than one parent. If a child logically needs
to be linked to more than one parents, which is common in business applications,
duplication of files with different predefined linkages is required.
Response: The partitioned database approach splits the central database into segments or
partitions that are distributed to their primary users. The advantages of this approach
follow: having data stored at local sites increases users’ control, transaction processing
response time is improved by permitting local access to data and reducing the volume of
data that must be transmitted between IT units. Also, partitioned databases can reduce
the potential effects of a disaster. By locating data at several sites, the loss of a single IT
unit does not eliminate all data processing by the organization.
8. SQL has been said to place power in the hands of the user. What is meant by this
statement?
Response: SQL allows users to retrieve data from many different files without the
assistance of programming professionals. Thus, if the user has access to data files and
knows the SQL, which is very user friendly, the user may retrieve the data
instantaneously.
9. Discuss the importance of the role of the database administrator. Why wasn’t such
a role necessary in the flat-file environment? What tasks are performed by the
DBA?
Response: In the flat-file environment, the data were not centrally stored for many
different applications to use. Because the data are centrally stored and shared by many
users in a database environment, the need for an independent individual to care for and
control these files arose. The database administrator is responsible for database planning,
developing the data requirements and data dictionary, database design and controls,
database implementation and access controls, operation and maintenance, and
establishing and reviewing the standards and procedures.
10. As users determine new computer application needs, requests must be sent to both
the system programmers and the DBA. Why is it important that these two groups
perform separate functions, and what are these functions?
Response: The system programmers program the manner in which the data will be
retrieved, manipulated, reported, and stored. They do not need, and should not have,
access to the data, except perhaps temporarily to test the programs. The database
administrator controls access to the data. If one person has the authority to write
programs and access data, then control issues become a concern. The potential to commit
fraud or embezzlement or destroy or alter the company’s records becomes too great.
Response:
1) The partitioned approach works best for organizations that require minimal data
sharing among their distributed IT units. The primary user manages data requests from
other sites. To minimize data access from remote users, the organization needs to
carefully select the host location. Identifying the optimum host requires an in-depth
analysis of user data needs.
2) In a portioned environment, it is possible for multiple sites to lock out each other from
the database, thus preventing each from processing its transactions.
12. In a distributed data processing system, why can temporary inconsistencies result in
permanent damage to accounting records? Explain with an example.
Response: In between the time a processing application (a) updates a subsidiary account
and (b) updates the control account, a temporary inconsistency exists. Permanent damage
may result between the time an account value is read and the time it is written or updated.
Consider the following example where a payment for sub account 1 is received for $500
and a payment is received for sub account 2 for $800.
AR
Control
Time Site Instruction Sub Account 1 Sub Account 2 Account
1:00:001 A Read sub acct 1 1,000
1:00:001 B Read sub acct 2 3,000
1:00:002 A Update sub acct 1 500
1:00:002 B Update sub acct 2 2,200
1:00:003 A Read control acct 20,000
1:00:003 B Read control acct 20,000
1:00:004 A Update control acct 19,500
1:00:005 B Update control acct 19,200
Thus, the data never reflect the second to last instruction indicated. The AR control
account should reflect payments received of $1,300 and have a value of $18,700, but
reflect payments of only $800. Thus, the transaction of $500 is lost, and the control and
subsidiary ledgers are out of balance.
Response: Replicated databases are effective in companies where there exists a high
degree of data sharing but no primary user. Since common data are replicated at each IT
unit site, the data traffic between sites is reduced considerably. Figure 4.18 in the text
illustrates the replicated database model. The primary justification for a replicated
database is to support read-only queries. With data replicated at every site, data access for
query purposes is ensured, and lockouts and delays due to data traffic are minimized. The
problem with this approach is maintaining current versions of the database at each site.
Since each IT unit processes only its transactions, common data replicated at each site are
affected by different transactions and reflect different values.
14. Which database method would be most appropriate for ticket sales at thirty
different outlets to an assigned seating concert? Why?
Response: Partitioned databases would not be appropriate because the seats received by
the customer would be a function of the ticket outlet where the purchase is made.
Replicated databases would not be appropriate because duplicate tickets would be sold.
Centralized databases with local processing are the appropriate method. The seat data
would be centrally stored. Only the data for the seat being purchased would be locked and
sent to the appropriate node. Once the seat is sold, the record is processed locally and
then the data are transmitted back to the central computer.
15. Why is it risky to allow programmers to create user subschemas and assign access
authority to users?
Response: Such a subschema is a subset of the total database that defines the user’s
access authority. The database administrator has primary responsibility for designing
these authorization tables. The programmers should not perform this task because the
concept of authorization could be circumvented. The tasks of programming and the
creation of user authorization tables are incompatible tasks and should be performed by
different individuals.
16. Is access control of greater concern in the flat-file or database file environment?
Response: In the flat-file environment, data and users linked and are separated through
ownership. The physical data files are accessed only by the owner of the data. In the
database environment, data are centrally stored and shared by many users. The
assignment of user privileges via authorization tables determines who accesses the data
and access control thus becomes a greater concern.
19. Discuss and give an example of one-to-one, one-to-many, and many-to-many record
associations.
Response: A one-to-one association means that for every occurrence in record type X,
either zero or one occurrence exists of record type Y. An example would be that for every
student, only one social security number exists.
A one-to-many association means that for every occurrence in record type X, either zero,
one, or many occurrences exist of record type Y. An example would be buyers of
assigned seating at concerts. Each potential buyer would leave the sales box office with
zero, one, or many seats.
A many-to-many association is a two-way relationship. For each occurrence of record
types X and Y, zero, one, or many occurrences exist of record type Y and X, respectively.
An example would be a student-professor relationship. Each student has multiple
professors each semester, and each professor has multiple students each semester.
20. Explain the deadlock phenomenon. Discuss how it could occur with a phone-in mail
order system that locks the inventory records until the order is complete.
Response: A deadlock occurs when multiple sites lock out each other from the data they
need to process transactions. Phone-in mail-order Example. Customer 1 wants to order
two items—Item A and Item B. The customer informs the phone clerk that he or she
wants Item A, and the record for Item A is locked until the order is complete in case any
changes are made. Customer 1 then requests Item B, but it is locked by another
customer’s order. The phone clerk will apologize for the delay and say the system is slow
today. Meanwhile, Customer 2 who has just ordered Item B and locked it requests Item
A, which is locked because of Customer 1’s order. The phone clerk who is helping
Customer 2 will apologize for the delay and say the system is slow today. Unfortunately,
neither record can be unlocked until the competing orders are complete, which results in
deadlock. This condition will require system intervention to resolve it.
MULTIPLE CHOICE QUESTIONS
1. c
2. a
3. a
4. c
5. d
6. d
7. c
8. c
9. b
10. c
11. b
12. e
PROBLEMS
Response:
Responses to this problem will vary. The sample memo below covers the key issues that should
be discussed:
After examining Johnson Manufacturing operations our consulting team feels confident that your
organization would benefit greatly from a relational database management system. Such a system
will allow data sharing among all functional areas and thus greatly enhance communications
between departments and improve business operations. An operational problem that has
repeatedly come to light is the lack of intra-organizational communication. This has resulted in
out-of –stock situations, over stock situations, shipping delays, and shipping errors. In addition to
adding considerable cost to your operations, these problems have had an adverse effect on your
customer and vendor relationships
A relational database management system will provide a central data source whereby all
authorized users may gain access to the data they need for decisions and to support day-to-day
operations. Also, a database system will greatly simplify you data processing burden. Currently,
you are transcribing data multiple times as it is moved from one user’s system to another. This
error-prone activity will be eliminated in a database environment. Once data are entered into the
system, they are available to all legitimate users.
We propose that you begin a conversion to a DBMS at your earliest convenience. The
process will take approximately one year to complete, but you will begin to experience some of
the benefits within six months as key systems are cut over to the central database.
technology
2. Database Authorization
Some relevant database tables and attributes are presented in the figure designated Problem 4-2 in
the chapter.
Required:
A) Create a database authorization table for an Accounts payable clerk. Structure your response
similar to the example below:
Indicate the name of each table the AP clerk may access and the degree of access privilege such
as:
Read data from the table
Insert data into the table,
Modify or edit data in the table
Delete data (attribute values or entire records) from the table
Response:
A) The table below illustrates the appropriate access privileges for the AP clerk whose job is to
review the supplier’s invoice and set up a liability, which will later be paid.
Authority Level
Read Y Y Y
Insert N N Y
Modify N N N
Delete N N N
B) The process involves performing a three-way-match of the PO, receiving report, and the
Vendor Invoice. Before setting up an account payable the clerk will verify the items invoiced
were ordered (PO), received in good condition (receiving report), and that the invoice charges are
correct. To do this the clerk needs “Read” access to the PO and receiving report tables and
“Read” and “Insert” access to the Vendor Invoice table. Once the three-way-match is complete,
the clerk transcribes the details from the supplier’s hard copy invoice to the Vendor Invoice table
and assigns a due date. This establishes the liability. The unpaid invoices at any point in time
constitute the accounts payable.
The AP clerk normally would not have “modify” or “delete” access to the Vendor Invoice table.
Editing and deleting existing records in a table should be a supervisor function.
Also, the clerk should not have insert, modify, or delete access to the PO and receiving report
tables. Such access would allow the AP clerk to enter fraudulent PO and receiving report records.
The clerk’s legitimate “insert” privileges would then allow him to create a fraudulent supplier’s
invoice (on behalf of himself or a conspirator) and set up a false liability, which would later be
paid.
Response:
The table below illustrates the appropriate access privileges for the sales clerk whose typical job
is to review customer credit, check inventory availability, and create a sales invoice record.
Authority Level
Read Y Y Y
Insert N N Y
Modify N N N
Delete N N N
B) The clerk needs “Read” access to the Customer Table attributes (including “available credit”)
and to the “Quantity on Hand” and “Sales Price” attributes in the Inventory Table. Once credit
worthiness and inventory availability are established, the clerk transcribes the customer order
details to the Sales Invoice table. The unpaid sales invoices at any point in time constitute the
accounts receivable.
The Sales clerk normally would not have “modify” or “delete” access to the Sales Invoice table.
Editing and deleting existing records in a table should be a supervisor function.
Also, the clerk should not have “insert”, “modify”, or “delete” access to the Customer Table or
the Inventory Table. Such access would allow the sales clerk to alter a customer’s available credit
and create a sales invoice for a customer who lacks adequate credit. It would also permit the sales
clerk to modify the Sales Price attribute in the Inventory Table and thus discount the price of sales
to certain customers.
4. Access Privileges
Mary Johnson, the Ajax Construction Co. cash disbursement clerk, has the database access
privileges presented in the table below.
Required:
Discuss the appropriateness of the access privileges assigned. What, if any, internal control
problems may result.
Response:
The Cash disbursement clerk should have “read” only access to the PO, Receiving Report, and
Vendor Invoice tables above. These documents provide evidence of a liability, which the clerk
discharges by writing a check. As a final control prior to writing the check, Mary may review the
PO, receiving report, and invoice.
A problem lies in the degree of access Mary has. Her “Insert” capability would allow her to
create a purchase order, receiving report, and supplier’s invoice (for herself or an associate) thus
creating the illusion of a transaction. Mary’s role as CD clerk allows her to write a check to
discharge the phony liability that she established. On the surface the transition looks valid
because it has the necessary supporting documents.
5. Distributed Databases
The XYZ Company is a geographically distributed organization with several sites around the
country. Users at these sites need rapid access to common data for read-only purposes. Which
distributed database method is best under these circumstances? Explain your reasoning.
Response: The best distributed approach is a replicated database.
Reasoning:
● The users are distributed around the country and need rapid access to data. A centralized
model may result in long delays because of network traffic and database lockout.
● User data needs are common, not unique. Because there are no identifiable primary users,
partitioning the database will accomplish nothing.
● Because usage is read-only, changes will not occur and database concurrency is not a
problem.
6. Distributed Databases
The ABC Company is a geographically distributed organization with several sites around the
country. Users at these sites need rapid access to data for transaction processing purposes. The
sites are autonomous; they do not share the same customers, products, or suppliers. Which
distributed database method is best under these circumstances? Explain your reasoning.
Mega wants to improve response time by distributing some parts of the corporate database
while keeping other parts of it centralized.
A) Develop a schema for distributing Mega Supply Corporation’s database. Add new
tables and attributes as needed.
B) Briefly explain how the new system will operate.
Response: