Professional Documents
Culture Documents
Acces to the data resource is controlled by a database management system. The DBMS is a special
software system that is programmed to know which data elements each user is authorized to acces.
The user’s program sends requests for data to the DBMS, which validates and authorizes access to
the database in accordance with the user’s authority level. If the user requests data that he or she is
not authorized to acces, the request is denied. Clearly, the organization’s procedures for assigning
user authority are important control issues for auditors to consider. Figure 4.2 provides an overview
of the database environment.
This approach centralizes the organization’s data into a common database that is shared by the user
community. With the enterprise’s data in a central location, all users have access to the data they
need to achieve their respective objectives. Through data sharing, the traditional problems
associated with the flat-file approach may be overcome.
Each data element is stored only once, thereby eliminating data redundancy and reducing data
collection and storage costs. For example, in figure 4.2 only a single occurance of customer data
exists, but this occurance is shared by accounting, marketing, and product services users. Since no
single user or unit owns data, the data must be structured in such a way as to be useful to a broad
set of users and potential users.
Because each data element exist in only one place, it requires only a single update procedure. This
reduces the time and cost of keeping the database current.
A single change to a database attribute is automatically made available to all users of the attribute.
For example, a customer adders change entered by the billing clerk is immediately reflected in the
marketing and product services views.
The most striking difference between the database model and the flat-file model is the polling of
data into a common database that is shared by all authorizational users. With access to the full
domain of entity data, changes in user information needs can be satisfied without obtaining
additional private data sets. Users are constrained only by the limitations of the data available to the
entity and the legitimacy of their need to access them. Therefore the database method eliminates
the limited access that flat files, by their nature, dictate to users.
This section discusses the key elements of the database environment. These include the DBMS,
users, the database administrator (DBA), the physical database, and DBMS models. Figure 4.3
depicts the relationship among several of these elements.
Typical Features
The central eleement of the database approach depicted in Figure 4.3 is the DBMS. The DBMS
provides a controlled environment to assist (or prevent) access to the database and to efficiently
manage the data resource. Typical DBMS features include.
4. Database access
Data definitiom language is a programming language used to define the database to the DBMs. The
ddl identifies
Data definition language is a programming language used to define the database to the DBMS. The
DDL indentifies the names and the relationship of all data elements, records, and files that constitute
the database. This definition has three levels, called views : the physical internal view, the
conceptual view (schema), and the user view (subschema). Figure 4.4 shows the relationship among
these views.
Database views
Internal view/physical view. The physical arrangement of records in the database is presented
through the internal view this is the lowest of representation, which is one step removed from the
physical database. This internal view describes the structures of data record, the linkages between
files, and the physical arrangement and sequence of records in a file. There is only one internal view
for the database.
Users
Figure 4.3 shows how users access the database in two ways. First, access is possible by the formal
application interfaces. User programs, prepared by systems professional, send data access requests
(calls) to the DBMS, which validates tje requests and retrieves the data for processing. Under this
mode of access, the presence of the DBMS is transparent to the users. Data processing procedures
(both batch and real time) for transactions such as sales, cash receipts, and purchases are essentially
the same as they would be in the flat-file environment.
Data manipulating language is the proprietary programming language that a particular DBMS uses
to retrieve, process, and store data.
DBMS Operation
Figure 4.3 illustrates how the DBMS and user applications work together. Let’s consider the typical
sequence of events that occur while accessing data. The following description is generic and certain
technical details are omitted.
Definition. The second method of database access is the informal method of queries. A query is an
ad hoc access methodology for extracting information from a database. Users can access data via
direct query (which requires no formal application program) using the DBMS’s built-in query facility.
IBMS’s structured query language, has emerged as the standars query language fir both mainframe
and microcomputer DBMSs. The select command is a powerful tool for retrieving data. The example
in figure 4.5 illustrates the use of the select command to procedure a user report from a database
file called inventory.
Refer to figure 4.3 and note the administrative position of the database administrator (DBA). The
DBA is responsible for managing the database resource. The sharing of a common database by
multiple users requires organization, coordination, rules, and guidelines to protect the integrity of
the database.
The duties of the DBA fall into the following areas : database planning; database design; database
implementation, operation, and maintenance; and database growth and change. Table 4.1 present a
breakdown of specific tasks within these broad areas.
Figure 4.6 shows some of the organizational interfaces of the DBA. Or particular importance is the
relationship among the DBA, the end users, and the systems professionals of the organization. Reter
again to figure 4.3 as we examine this relationship.
This is the lowest level of the databasw and the only level that exist in physical form. The physical
database consists of magnetic spots on metalic coated disks that create a logical collection of fies
and records. This section deals with the data structures used in the physical database.
Data structures are the bricks and mortar of the database. Data structures have two fundamental
components: 1. Organization and 2. Access method
Data organization
The organization of a file refers to the way records are physically arranged on the storage devices.
This may be either sequential or random.
Access methods are computer programs that are part of the operating system and are used to locate
records and to navigate through the database. During database processing, the access method
program, responding to requests for data from the user’s appliction, locates and retrieves or stores
the records.
The criteria that influence the selection of the data structure include :
DBMS Models
A data model is an abstract representation of the data about entities of interest. These include
resource, events, and agents and the relationships in an organization. The purpose of a data model is
to represent entities and defining their attributes in a way that is understandable to users.