Data structures in accounting systems
All info and instructions used in IT are executed in binary code - 0s and 1s
1) Bit - individual 0 or 1
2) Byte - group, usually 8 bits, that are used to represent alphabetic and numeric characters. ASCII and EBCIDIC 2 most common
3)Field - group of bytes identifying a characteristic of an entity - date, text,number are common
4) Record - group of related fields describing an individual instance of entity (customer, specific invoice)
5) File - collection of records for one specific entity (tables)
6) Databae - set of logically related files
Except for “file” the words get longer as the units get bigger:
Software
Computer software in 3 categories
1) Systems software - Programs that run the computer and support system A)operating system B)database mangement system (DBMS) C)Data communication software D)Utility programs
2 Programming Languages
3 Application Software
Diverse group of end-user programs that accomplish user objectives
Software Licensing
Organizations should have policies and procedures to ensure they comply with software copyright law
Databases
Set of logically related files; characterizes by the way data relationships are established and the way it is implemented across organization
Database mangement system
System for reading and managing a well-structured database. “middle-ware” program that interacts with the database application and the operating system to define the database, enter transactions into the database, and extract information from the database; the DBMS uses three special languages to accomplish these objectives:
1) Data definition language (DDL) - Allows the definition of tables and fields and relationships among tables
2) Data manipulation language (DML) - allows user to add new records, delete, update
3) Data Query language (DQL) - Extract information from database; using GUI to drag and drop into a query grid = query by example QBE
Database controls - DBMS should have following controls:
a. Concurrent access issues management, e.g., control multiple users attempting to access the same file or record
b. Access controls, i.e., tables that specify who can access what data within the system
c. Data definition standards, e.g., determine and enforce what data elements must be entered and which are optional
d. Backup and recovery procedures to ensure integrity in the event of system errors or outages
e. Update privileges that define who, and when, the data can and should be updated
f. Data elements and relationships controls to ensure data accuracy, completeness, and consistency