...Data Table Analysis LeKane Gilling ACC/542 March 13, 2014 Brad Thompson Abstract In this brief, data tables will be analyzed because it can be critical to the accounting cycle. With accurate data that is informing, Kudler Fine Foods ought to be able to make more practical business decisions. With Kudler Fine Foods using data table to order, keep inventory, and to process their products, they can become more successful and on top of the food industry. As a company, Kudler needs to evaluate their design elements of the data tables that are needed for review from an accounting perspective. An entity relationship program would need to be developed showing the past data tables. A recommendation would need to be met for improvements or changes. With providing vital information in the pivot tables, then this will improve making decisions for every department at Kudler Fine Foods. By creating a pivot table that shows everything in a list, this will possibly help management see where items need to either increase or decrease because they're not selling. Data Table Analysis Kudler Fine Foods are a part of a broad spectrum of prestigious locations that are becoming successful. La Jolla, Del Mar, and Encinitas are the three stores that Kudler has opened, all located in California. The products range from fresh bread, harvest, meat and poultry, flavorings and packeted foods, and special milk and cheese products. Since 1998, Kudler’s goal is to supply the consumers carefully chosen...
Words: 1218 - Pages: 5
...[pic] Ministry/Agency Name [Complete file/properties to populate fields on this page and in the document headers] Project Name Project #: Business Requirements Document (BRD) Template Prepared by: Author's Name Prepared for: Date Submitted: [Date] Project Sponsor: Project Sponsor's Name Client Acceptor: Project Manager: Document Number: 6450-20/Project Number /BRD Security Classification: Low Version: 0.1 Last Updated: April 26, 2013 Creation Date: June 06, 2006 Table of Contents Table of Contents 2 1. Introduction 4 1.1. Document Purpose 4 1.2. Intended Audience 4 1.3. Project Background 5 1.4. Purpose of the Business Requirements 5 1.5. Business Goals/Objectives to be achieved 6 1.6. Benefits/Rationale 6 1.7. Stakeholders 6 1.8. Dependencies on existing systems 6 1.9. References 6 1.10. Assumptions 6 2. Requirements Scope 7 2.1. In Scope 8 2.2. Out of Scope 8 3. Functional Requirements 8 3.1. Actor Profiles Specification 8 3.2. Essential Use Case Diagram 9 3.3. Essential Use Case Specifications 9 3.4. Function Hierarchy Diagram 11 3.5. Function Definition Report 11 3.6. Business Rules 12 4. Data Requirements 13 4.1. Data Architecture 13 4.1.1. Domain Class Diagram 13 ...
Words: 5662 - Pages: 23
...Assignments for Information Systems II: module A - 2012 Assignments are based on the Chapter Capstone Case: Softwear, Limited case study at the end of each chapter of the prescribed textbook, (Analysis and Design for Systems 9th edition, 2012, by GN Shelly and HJ Rosenblatt.). All assignments * Are group assignments. Students choose their own groups. Groups must have between 3 and 5 members. * Be presented as a report. * Have a front page, listing all group member names in alphabetical order of the surnames. Include the student number as well. If you move to another class or group, you must inform all lecturers involved. Assignment marks will not be corrected at the end of the year. Chapter 1 1. Write an employment advertisement for a new systems analyst position at SWL. Consider the business profile choice of SWL when you write the advertisement. 2. Give at least two places where you will advertise this position. Give reason(s) for your choice. Why do you think it will attract the right person? What will be the cost of the advertisement? Provide, in an appendix, the published rates for advertisements where the advertisement will be placed. Advert: Systems Analyst Short job description/Purpose of job | (2) | | Qualifications | (2) | | Experience required | (3) | | Key performance areas / Job description | (5) | | Salary range | (1) | | Contact | (2) | | Other | (5) | | | (20) | | Advertisement details (Remember it...
Words: 1015 - Pages: 5
...Answers to Review Questions 1. Name and discuss the different levels of data abstraction as defined by ANSI/SPARC. Conceptual Located at the abstraction apex, the conceptual model represents a global view of the data. It forms the basis of the conceptual schema, which provides a relatively easily understood bird's-eye view of the data environment. Since the conceptual model focuses on the main data objects and avoids detail, it exhibits both software and hardware independence. The most widely used conceptual model is the Entity Relationship (E-R) model, which yields the basic database blueprint. Internal The internal model represents the adaptation of the conceptual model to a specific DBMS. Basically, the internal model requires the database designer to match the conceptual model's characteristics and constraints to those of the selected hierarchical, network, or relational DBMS. Therefore, although it is still hardware-independent, it is software-dependent. External The external model represents the applications programmer's view of the data environment. Its use requires that the modeler subdivide a universal set of requirements and constraints into functional modules, each represented by its own external model. (The modules correspond to business units such as production, sales, personnel, and so on.) Each external model is represented by its own external schema. Each business unit is thus represented by an external model that includes that unit's entities...
Words: 11031 - Pages: 45
...the problem before you start constructing a solution. There are two important things to keep in mind when learning about and doing data modeling: 1. Data modeling is first and foremost a tool for communication.Their is no single “right” model. Instead, a valuable model highlights tricky issues, allows users, designers, and implementors to discuss the issues using the same vocabulary, and leads to better design decisions. 2. The modeling process is inherently iterative: you create a model, check its assumptions with users, make the necessary changes, and repeat the cycle until you are sure you understand the critical issues. In this background lesson, you are going to use a data modeling technique—specifically, EntityRelationship Diagrams (ERDs)—to model the business scenario from Lesson 2. The data model you create in this lesson will form the foundation of the database that you use throughout the remaining lessons. Before you sit down in front of the keyboard and start creating a database application, it is critical that you take a step back and consider your business problem—in this case, the kitchen supply scenario presented in Lesson 2— from a conceptual point of view. To facilitate this process, a number of conceptual modeling techniques have been developed by computer scientists, psychologists, and consultants. ? For our purposes, we can think of a conceptual model as a picture of the information system we are going to build. To use an analogy, conceptual models...
Words: 7007 - Pages: 29
...|[pic] |Course Syllabus | | |College of Information Systems & Technology | | |DBM/380 Version 9 | | |Database Concepts | | |July 16, 2012 to August 13, 2012 | | |Group KM11BIT13 | Copyright © 2012, 2010, 2008, 2007, 2006, 2005, 2003 by University of Phoenix. All rights reserved. Course Description This course covers database concepts. Topics include data analysis, the principal data models with emphasis on the relational model, entity-relationship diagrams, database design, normalization, and database administration. Policies Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document...
Words: 3236 - Pages: 13
...Assignments for Information Systems II: module A - 2012 Assignments are based on the Chapter Capstone Case: Softwear, Limited case study at the end of each chapter of the prescribed textbook, (Analysis and Design for Systems 9th edition, 2012, by GN Shelly and HJ Rosenblatt.). All assignments * Are group assignments. Students choose their own groups. Groups must have between 3 and 5 members. * Be presented as a report. * Have a front page, listing all group member names in alphabetical order of the surnames. Include the student number as well. If you move to another class or group, you must inform all lecturers involved. Assignment marks will not be corrected at the end of the year. Chapter 1 1. Write an employment advertisement for a new systems analyst position at SWL. Consider the business profile choice of SWL when you write the advertisement. 2. Give at least two places where you will advertise this position. Give reason(s) for your choice. Why do you think it will attract the right person? What will be the cost of the advertisement? Provide, in an appendix, the published rates for advertisements where the advertisement will be placed. Advert: Systems Analyst Short job description/Purpose of job | (2) | | Qualifications | (2) | | Experience required | (3) | | Key performance areas / Job description | (5) | | Salary range | (1) | | Contact | (2) | | Other | (5) | | | (20) | | Advertisement details (Remember it...
Words: 1015 - Pages: 5
... | | | |U10230366, U1008620 ,U0929909 | Table of Contents 1. Brief History of British Airways 3 The decision making process 4 British Airways uses the following information tools at its strategic level. 4 Executive Support System (ESS) 5 Senior management in BA use the following information tools. 6 Transaction Processing Systems (TPS) 7 Roles for Management Information Systems in British Airways 8 References: 9 Entity Relationship Diagram (ERD) 10 The Entities: 11 Entities and Attributes: 11 Entities and Attributes 2 12 First cut ERD Diagram for ELRSC. 13 Normalisation Diagram 14 Requirement Specification for the E L R C System 16 Use case Description for ELRSC 18 Screen shot of use case For ELRSC. 34 Screen Shot Turnitin Report 35 1. Brief History of British Airways The purpose of this project is explore how information systems helps organisations to make decisions at different levels to achieve set objectives and...
Words: 3378 - Pages: 14
...Chapter 6 Normalization of Database Tables The manager of a consulting firm has asked you to evaluate a database that contains the table structure shown in Table P6.10. Table P6.10 Sample CLIENT Records |Attribute Name |Sample Value |Sample value |Sample Value | |CLIENT_NUM |298 |289 |289 | |CLIENT_NAME |Marianne R. Brown |James D. Smith |James D. Smith | |CLIENT_REGION |Midwest |Southeast |Southeast | |CONTRACT_DATE |10-Feb-2010 |15-Feb-2010 |12-Mar-2010 | |CONTRACT_NUMBER |5841 |5842 |5843 | |CONTRACT_AMOUNT |$2,985,00.00 |$670,300.00 |$1,250,000.00 | |CONSULT_CLASS_1 |Database Administration |Internet Services |Database Design | |CONSULT_CLASS_2 |Web Applications | |Database Administration | |CONSULT_CLASS_3 ...
Words: 587 - Pages: 3
...*If you are submitting the form electronically (via MyLO) then it does not have to be signed, but the details for each student must be included. By submitting the form into your account you are declaring your agreement with the above statement about plagiarism. Statement on Plagiarism and Academic Integrity Plagiarism is a form of cheating. It is taking and using someone else's thoughts, writings or inventions and representing them as your own, for example: • using an author's words without putting them in quotation marks and citing the source; • using an author's ideas without proper acknowledgment and citation; or • copying another student's work. If you have any doubts about how to refer to the work of others in your assignments, please consult your lecturer or tutor for relevant referencing guidelines, and the academic integrity resources on the web at www.academicintegrity.utas.edu.au/. The intentional copying of someone else’s work as one’s own is a serious offence punishable by penalties that may range from a fine or deduction/cancellation of marks and, in the most serious of cases, to exclusion from a unit, a course or the University. Details of penalties that can be imposed are available in the Ordinance of Student Discipline – Part 3 Academic Misconduct, see www.utas.edu.au/universitycouncil/legislation/ord9.pdf The University reserves the right to submit assignments to plagiarism detection software, and might then retain a copy of the assignment...
Words: 3520 - Pages: 15
...Chapter 5 Normalization of Database Tables Discussion Focus Why are some table structures considered to be bad and others good and how do you recognize the difference between good and bad structures? From an information management point of view, possibly the most vexing and destructive problems are created through uncontrolled data redundancies. Such redundancies produce update and delete anomalies that create data integrity problems. The loss of data integrity can destroy the usefulness of the data within the database. (If necessary, review Chapter 1, Section 1.4.4, “Data Redundancy”, to make sure that your students understand the terminology and that they appreciate the dangers of data redundancy.) Table structures are poor whenever they promote uncontrolled data redundancy. For example, the table structure shown in Figure IM5.1 is poor because it stores redundant data. In this example, the AC_MODEL, AC_RENT_CHG, and AC_SEATS attributes are redundant. (For example, note that the hourly rental charge of $58.50 is stored four times, once for each of the four Cessna C-172 Skyhawk aircraft – check records 1, 2, 4, and 9.) Figure IM5.1 A Poor Table Structure [pic] |[pic] The figures shown in this discussion show the contents of the IM_Discussion database. This database is located on the teacher’s CD. The | |Student Online Companion also includes SQL script files (Oracle and SQLServer) for all of the data sets used throughout the book. ...
Words: 9797 - Pages: 40
...KENYATTA UNIVERSITY NAME : JAMES KARIU MACHARIA REG NO : J17S/10565/2009 CONTACTS : 0728617714 E-MAIL : macharia.jimmo@gmail.com SCHOOL : ENGINEERING AND TECHNOLOGY DEPARTMENT : C.I.T UNIT CODE : SCT 400 UNIT TITLE : PROJECT TASK : PROJECT PROPOSAL PROJECT TITLE : HOMELAND HOTEL ONLINE RESERVATION SYSTEM SUPERVISOR : Mr. Kennedy Gichaba Siika DATE : 2/11/2012 Table of Contents CHAPTER ONE 3 INTRODUCTION 3 Background of the Study 3 Problem Statement 3 Goal 3 Objectives 4 Scope and Limitation of the Study 4 Justification 5 CHAPTER TWO 6 LITERATURE REVIEW 6 Introduction 6 (a) Case Study 1 - Swiss-Garden Hotel 6 (b) Case Study 2 - Shangri-La Hotel 6 Summary 7 CHAPTER THREE 8 METHODOLOGY 8 Time Schedule 11 Budget 12 REFERENCES 13 CHAPTER ONE INTRODUCTION Background of the Study Kenya is a growing tourist destination for people from diverse nations and this has greatly contributed to growth of Nairobi which is now becoming a global competitive city. The rapid development and commercialization of Information and Communication technologies (ICTs) in Nairobi industrial sectors such as travel and tourism have prompted Hotels to increasingly adapt to these technologies. ICT based products and processes enables hotels to enhance the operating efficiency, improve service experience as well as provide a means to access markets on a global basis. Problem Statement Homeland Hotel have for long time been using paper records kept in filing cabinets as a method...
Words: 2678 - Pages: 11
...CHAPTER 1 1 The word ________ indicates that the facts have not yet been processed to reveal their meaning. a. data b. dictionary c. raw d. information correct: c 2 Processed data, or ________, can be used as the foundation for decision making. a. information b. DP c. raw data d. queries correct: a 3 Raw data must be properly ________ for storage, processing, and presentation. a. sorted b. grouped c. formatted d. arranged correct: c 4 What is a key characteristic of knowledge? a. "new" Knowledge can be derived from "old" knowledge. b. It is assembled from raw data. c. It cannot be duplicated. d. It exists in a vacuum. correct: a 5 Accurate, relevant, and timely ________ is the key to good decision making. a. relationships b. data c. processing d. information correct: d 6 What is the name for data about data? a. unique data b. superdata c. metadata d. raw data correct: c 7 Data management is a discipline that focuses on ________. a. the proper generation, storage, and retrieval of data b. the help items to be used by end users c. the management of end users d. the proper generation, storage, and retrieval of information correct: a 8 What is a benefit of using a DBMS? a. It provides seamless Internet access to database data. b. It creates automatic backups. c. It helps create an environment for end users to have access to more data. d. It provides full security to data using private/public key encryption. correct: c 9 The ________ manages interaction between the end...
Words: 8796 - Pages: 36
...I. INTRODUCTION This IDoc describes use of the Unified Modeling Language (UML) to model and document Accounting Information Systems (AIS). The objective of modeling AIS is multifaceted and can be to: visualize, understand, summarize, detail, analyze, design, develop, implement, operate, secure, control, or audit the AIS. UML is a powerful modeling language and technique for all of these modeling tasks and is more robust and semantically superior to the commonly used Structured Analysis (SA) modeling tools of flowcharts (FC), data flow diagrams (DFD), and entity-relationship diagrams (ERD). Dr. White suggests that using UML diagrams as a tool to document AIS is a viable alternative to the Structured Analysis’s diagrams of FC, DFD, and ERD. What follows in Section II is a brief comparison of the two alternative approaches to systems documentation: Structured Analysis (SA) and Object Orientation (OO). Section III presents the definition and description of the major structural and behavioral elements used in UML including classifiers, instances, relationships, collaborations, activities, interactions, and states. Section IV discusses the organization and presentation of UML documentation of AIS as a collection of diagrams and packages. Section V contains various UML diagrams of the business revenue cycle (system) as examples of how to use UML to document a business system. Section VI contains examples of UML models of two special systems of great importance to accountants:...
Words: 9812 - Pages: 40
...* Budget making process. Midterm budget framework. Budget Defined * A budget (from old French bougette, purse) is a financial plan and a list of all planned expenses and revenues. * A government budget is a legal document that is often passed by the legislature, and approved by the chief executive-or president. * The two basic elements: Revenues and Expenses. * Revenues are derived primarily from taxes and non-tax revenue. * Government expenses include spending on current goods and services, which economists call government consumption ; government investment expenditures such as infrastructure investment or research expenditure; and transfer payments like unemployment or retirement benefits, Social Safety nets Basis of Budget * Budgets have an economic, political and technical basis. * Unlike a pure economic budget, they are not entirely designed to allocate scarce resources for the best economic use. * They also have a political basis wherein different interests push and pull in an attempt to obtain benefits and avoid burdens. * The technical element is the forecast of the likely levels of revenues and expenses Budget Cycle * Budget Preparation: The first phase of the budget cycle involves preparation by the departments/agencies, ministries and finally ministry of Finance * Legislative Approval: Typically, the legislature has the power to approve or reject a proposed budget. They review it and vote. If approved, it moves...
Words: 6348 - Pages: 26