Data Structures and CAATTs

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

In a database, the arrangement of records on storage devices, be it sequential or random, is referred to as the data's ______.

organization

A technique used to locate records and navigate through a database or file is known as the ______.

access method

In a ______, end users manage their data files independently, rather than sharing them with others.

flat file structure

A file where records are stored in contiguous storage spaces, with all records arranged in a specified sequence, represents a ______.

<p>sequential structure</p>
Signup and view all the answers

In an ______, records are created without concern for their physical proximity to other related records.

<p>indexed random file</p>
Signup and view all the answers

A storage method for very large files needing routine batch processing combined with some individual record processing is known as ______.

<p>Virtual Storage Access Method</p>
Signup and view all the answers

Fast access to records that uses address pointers to link records, but can suffer if a record moves or a pointer is lost refers to a ______.

<p>pointer structure</p>
Signup and view all the answers

In database systems, the actual disk storage location that allows direct access to a record is specified by the ______.

<p>physical address pointer</p>
Signup and view all the answers

The relative position of a record in a file, which then must be converted to a physical address, is contained in a ______.

<p>relative address pointer</p>
Signup and view all the answers

Early database models that relied on flat-file techniques and proprietary structures for process integration and data sharing are known as the ______.

<p>hierarchical &amp; network database structures</p>
Signup and view all the answers

Based on indexed sequential file structure, facilitates direct and batch access to records, and supports relational algebra functions refers to ______.

<p>relational database structure, concepts and terminology</p>
Signup and view all the answers

In relational algebra, the function that extracts specified rows from a specified table is known as ______.

<p>restrict</p>
Signup and view all the answers

The relational algebra function that extracts specified attributes (columns) from a table to create a virtual table is known as ______.

<p>project</p>
Signup and view all the answers

The relational algebra function that builds a new physical table from two tables by concatenating pairs of rows is known as ______.

<p>join</p>
Signup and view all the answers

In database design, anything about which an organization wishes to capture data is known as an ______.

<p>entity</p>
Signup and view all the answers

The degree of association between two entities in a database is referred to as the ______.

<p>cardinality</p>
Signup and view all the answers

The anomaly that arises from data redundancy in an unnormalized table, where modification to an attribute must be made in each of the rows in which the attribute appears, is known as the ______.

<p>update anomaly</p>
Signup and view all the answers

The anomaly that occurs when a new item cannot be added to the table because there is no association with the primary key is know as the ______.

<p>insertion anomaly</p>
Signup and view all the answers

The anomaly that involves unintentional deletion of data, which occurs when an attribute item used by only one entity is deleted, causing all information about that attribute item to be lost, is known as the ______.

<p>deletion anomaly</p>
Signup and view all the answers

Software that allows auditors to access electronically coded data files and perform various operations on their contents is a ______.

<p>Generalized Audit Software</p>
Signup and view all the answers

Flashcards

Organization

Arrangement of records on storage devices, either sequential or random.

Access Method

Technique used to locate records and navigate through the database.

Flat File Structures

Users own their data files rather than sharing with others.

Sequential Structure

Records are stored in contiguous storage spaces in a specified sequence.

Signup and view all the flashcards

Indexed Random File

Records created without regard to physical proximity to related records.

Signup and view all the flashcards

Virtual Storage Access Method (VSAM)

Used for very large files requiring routine batch processing.

Signup and view all the flashcards

Hashing Structure

Fast access but inefficient storage and collision issues.

Signup and view all the flashcards

Pointer Structure

Uses address pointers to link records, offering fast access.

Signup and view all the flashcards

Physical Address Pointer

Contains actual disk storage location for direct record access.

Signup and view all the flashcards

Relative Address Pointer

Contains relative position of a record converted to physical address.

Signup and view all the flashcards

Logical Key Pointer

Contains primary key of related record; converted to physical address by hashing.

Signup and view all the flashcards

Restrict

Extracts specified rows from a specified table.

Signup and view all the flashcards

Project

Extracts specified attributes (columns) from a table to create a virtual table.

Signup and view all the flashcards

Join

Builds a new physical table from two tables by concatenating rows.

Signup and view all the flashcards

Entity

Anything about which the organization wishes to capture data.

Signup and view all the flashcards

Data Model

Blueprint for the physical database.

Signup and view all the flashcards

Entity Relationship Diagram

Graphic representation of a data model.

Signup and view all the flashcards

Occurrence

Number of records that pertain to a specific entity.

Signup and view all the flashcards

Cardinality

Degree of association between two entities.

Signup and view all the flashcards

ACL Software

ACL is designed as a meta-language for auditors to access data.

Signup and view all the flashcards

Study Notes

  • Chapter 8 focuses on data structures and CAATTs (Computer-Assisted Audit Tools and Techniques) for data extraction.

Data Structure Fundamentals

  • Data structure has two fundamental components: organization and access method.
  • Organization refers to the arrangement of records on storage devices, either sequentially or randomly.
  • Access method is the technique used to locate records and navigate through a database or file.

Flat File Structures

  • In flat file structures, end users own their data files, rather than sharing them.
  • Data files are structured, formatted, and arranged to suit the specific needs of the owner or primary user.

Sequential Structure

  • All records are stored in contiguous storage spaces in a specified sequence, using a key field.
  • Sequential files are simple and easy to process.
  • The application starts at the beginning of the file and processes each record in sequence.

Indexed Random File

  • Records are created without regard to physical proximity to other related records.
  • The physical organization of the index itself may be either sequential (by key value) or random.

Virtual Storage Access Method (VSAM)

  • VSAM is used for very large files that require routine batch processing and a moderate degree of individual record processing.
  • VSAM has three physical components: indexes, prime data storage area, and overflow area.

Hashing Structure

  • Hashing structure provides fast access but inefficient storage and collision issues.

Pointer Structure

  • Pointer structure uses address pointers to link records, offering fast access.
  • Potential issues arise if a record moves or a pointer is lost.

Types of Pointers

  • Physical address pointer: Contains the actual disk storage location for direct access to the record.
  • Relative address pointer: Contains the relative position of a record in the file which must be converted to a physical address.
  • Logical key pointer: Contains the primary key of a related record, with the key value converted by hashing to the physical address.

Hierarchical & Network Database Structures

  • These structures are early models using flat-file techniques and proprietary structures for process integration and data sharing.

Relational Database Structure Concepts

  • Based on indexed sequential file structure, this approach facilitates direct and batch access to records and supports relational algebra functions.

Algebra Functions in Relational Databases

  • Restrict: Extracts specified rows from a specified table.
  • Project: Extracts specified attributes (columns) from a table to create a virtual table.
  • Join: Builds a new physical table from two tables, consisting of all concatenated pairs of rows from each table.
  • Concatenated means linked together in a series

Entity, Occurrence, and Attributes

  • Entity: Anything about which the organization wishes to capture data.
  • Data model: Blueprint for the physical database.
  • Entity relationship diagram: Graphic representation of a data model.
  • Occurrence: Number of records that pertain to a specific entity.
  • Attributes: Data elements of an entity.

Association and Cardinality

  • Cardinality: Degree of association between two entities.
    • Zero or one (0,1)
    • One and only one (1,1)
    • Zero or many (0,M)
    • One or many (1,M)

Anomalies, Structural Dependencies, and Data Normalization

  • Update anomaly: Results from data redundancy in an unnormalized table, requiring modifications across multiple rows.
  • Insertion anomaly: Occurs when a new item cannot be added to the table due to a lack of association with the primary key.
  • Deletion anomaly: Involves unintentional data loss when deleting an attribute item used by only one entity.

Designing Relational Databases

  • Six phases of database design:
    • Identify entities
    • Construct a data model showing entity associations
    • Add primary keys and attributes to the model
    • Normalize the data model and add foreign keys
    • Construct the physical database
    • Prepare the user reviews

Embedded Audit Module

  • Also known as continuous auditing, it identifies important transactions while they are being processed and extracts copies in real time.
  • An EAM is a specially programmed module embedded in a host application to capture predetermined transaction types for subsequent analysis.

Generalized Audit Software (GAS)

  • GAS allows auditors to access electronically coded data files and perform various operations on their contents.
  • Common uses for GAS:
    • Footing and balancing files
    • Selecting and reporting file data
    • Selecting statistical samples
    • Formatting audit reports
    • Printing confirmations
    • Screening data items
    • Comparing files
    • Recalculating data fields

ACL Software

  • ACL (Audit Command Language) is used to access data in various digital formats and test them comprehensively.
    • Data Definition: Allows the auditor to define characteristics of the source file such as record length, field names, data types, and field lengths.
    • Customizing a View: Allows auditors to customize the original view to better meet their audit needs.
    • Filtering Data: ACL provides options for filtering data using logical operators such as AND, OR, and NOT.
    • Stratifying Data: Allows the auditor to view the distribution of records by strata, such as sales price or unit cost.
    • Statistical Analysis: ACL offers sampling methods such as record sampling and monetary unit sampling (MUS).

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser