Chapter 2 AIS
Chapter 2 AIS
Accounting Records
File Structures
Documentation Techniques
1|Page
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
Chapter 1 introduced the transaction processing system (TPS) as an activity consisting of three major subsystems called cycles:
the revenue cycle, the expenditure cycle, and the conversion cycle. Even though each cycle performs different specific tasks and
supports different objectives, they share common characteristics. For example, all three TPS cycles capture financial transactions,
record the effects of transactions in accounting records, and provide information about transactions to users in support of their
day-to-day activities. In addition, transaction cycles produce much of the raw data from which management reports and financial
statements are derived. Because of their financial impact on the firm, transaction cycles command much of the accountant’s
professional attention.
The purpose of this chapter is to present some preliminary topics that are common to all three transaction processing cycles. In
subsequent chapters, we will draw heavily from this material as we examine the individual subsystems of each cycle in detail.
TPS applications process financial transactions. A financial transaction was defined in Chapter 1 as:
An economic event that affects the assets and equities of the firm, is reflected in its accounts, and is measured in monetary terms.
The most common financial transactions are economic exchanges with external parties and also include
certain internal events such as the depreciation of fixed assets; the application of labor, raw materials, and
overhead to the production process; and the transfer of inventory from one department to another.
Financial transactions are common business events that occur regularly. For instance, thousands of
transactions of a particular type (sales to customers) may occur daily. To deal efficiently with such volume,
business firms group similar types of transactions into transaction cycles.
TRANSACTION CYCLES
Three transaction cycles process most of the firm’s economic activity: the expenditure cycle, the conversion
cycle, and the revenue cycle. These cycles exist in all types of businesses—both profit-seeking and not-for-
profit types. For instance, every business (1) incurs expenditures in exchange for resources (expenditure
cycle), (2) provides value added through its products or services (conversion cycle), and (3) receives revenue
from outside sources (revenue cycle). Figure 2-1 shows the relationship of these cycles and the resource flows
between them.
2|Page
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
3|Page
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
PRODUCT DOCUMENTS. Product documents are the result of transaction processing rather than the
triggering mechanism for the process. For example, a payroll check to an employee is a product document of
the payroll system. Figure 2-3 extends the example in Figure 2-2 to illustrate that the customer’s bill is a
product document of the sales system.
4|Page
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
TURNAROUND DOCUMENTS. Turnaround documents are product documents of one system that become
source documents for another system. This is illustrated in Figure 2-4. A turnaround document contains
important information about a customer’s account to help the cash receipts system process the payment.
Journals
A journal is a record of a chronological entry. At some point in the transaction process, when all relevant facts
about the transaction are known, the event is recorded in a journal in chronological order. Documents are the
primary source of data for journals.
SPECIAL JOURNALS. Special journals are used to record specific classes of transactions that occur in high
volume. Such transactions can be grouped together in a special journal and processed more efficiently than a
general journal permits.
5|Page
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
REGISTER. The term register is often used to denote certain types of special journals.
GENERAL JOURNALS. Firms use the general journal to record nonrecurring, infrequent, and dissimilar
transactions.
Ledgers A ledger is a book of accounts that reflects the financial effects of the firm’s transactions after they are
posted from the various journals. Whereas journals show the chronological effect of business activity, ledgers
show activity by account type. A ledger indicates the increases, decreases, and current balance of each
account. Organizations use this information to prepare financial statements, support daily operations, and
prepare internal reports.
GENERAL LEDGERS. The general ledger (GL) summarizes the activity for each of the organization’s
accounts. The general ledger department updates these records from journal vouchers prepared from special
journals and other sources located throughout the organization.
6|Pa ge
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
SUBSIDIARY LEDGERS. Subsidiary ledgers are kept in various accounting departments of the firm, including
inventory, accounts payable, payroll, and accounts receivable. This separation provides better control and
support of operations.
7|Page
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
Modern accounting systems store data in four types of digital computer files:
✓ A master file contains account data.
✓ A transaction file is a temporary file that holds transaction records that will be used to change or
update data in a master file.
✓ A reference file is a file that stores the data used as standards for processing transactions.
✓ An archive file is a file that contains records of past transactions that are retained for future reference.
Audit trails in computer-based systems are less observable than in traditional manual systems, but they still
exist. Let’s walk through the system represented in Figure 2-11 to illustrate how computer files provide an
audit trail. We begin with the capture of the economic event. In this example, sales are recorded manually on
source documents, just as in the manual system. The next step in this process is to convert the source
documents to digital form. This is done in the data-input stage, when the transactions are edited and a
transaction file of sales orders is produced. Some computer systems do not use physical source documents.
Instead, transactions are captured directly on digital media.
The next step is to update the various master file subsidiary and control accounts that the transaction affects.
During the update procedure, additional editing of transactions takes place. Some transactions may prove to
be in error or invalid for such reasons as incorrect account numbers, insufficient quantities on hand, or
customer credit problems. In this example, the system determines the available credit for each customer from
the credit file before processing the sale. Any records that are rejected for credit problems are transferred to
the error file. The remaining good records are used to update the master files. Only these transactions are
added to the archive file that serves as the sales journal. By copying the valid transactions to the journal, the
original transaction file is not needed for audit trail purposes. This file can now be erased (scratched) in
preparation for the next batch of sales orders. Like the paper trail, this digital audit trail allows transaction
tracing. Again, an auditor attempting to evaluate the accuracy of the AR figure published in the balance sheet
could do so via the following steps, which are identified in Figure 2-11.
1. Compare the accounts receivable balance in the balance sheet with the master file AR control account
balance.
2. Reconcile the AR control figure with the AR subsidiary account total.
3. Select a sample of update entries made to accounts in the AR subsidiary ledger and trace these to
transactions in the sales journal (archive file).
4. From these journal entries, identify specific source documents that can be pulled from their files and
verified. If necessary, the auditor can confirm the accuracy and propriety of these source documents
by contacting the customers in question.
8|Page
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
Digital file structures and storage techniques vary widely among transaction processing systems. Some
structures are effective at processing all records in large master files. Some file structures are better for directly
locating and processing a single record in a large file. The legacy systems are large mainframe systems
implemented in the late 1960s through the 1980s.
Data Capture and Storage. Data storage is an efficient information system that captures and stores data only
once and makes this single source available to all users who need it.
Data Updating. Data updating is the periodic updating of data stored in the files of an organization.
Currency of Information. Currency of information is a problem associated with the flat-file model because
of its failure to update all the user files affected by a change in status; may result in decisions based on outdated
information.
Task-Data Dependency. Task-data dependency is a user’s inability to obtain additional information as his or
her needs change.
9|Page
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
10 | P a g e
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
Visual images convey vital system information more effectively and efficiently than words. Accountants use
system documentation routinely, as both systems designers and auditors.
Five basic documentation techniques are introduced in this section: data flow diagrams, entity relationship
diagrams, system flowcharts, program flowcharts, and record layout diagrams.
The data flow diagram (DFD) is the use of a set of symbols in a diagram to represent the processes, data
sources, data flows, and process sequences of a current or proposed system.
11 | P a g e
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
An entity relationship (ER) diagram is a documentation technique used to represent the relationship among
data entities in a system.
✓ Cardinality is the numeric mapping between entities such as one-to-one (1:1), one-to-many (1:M),
and many-to-many (M:M).
✓ A data model is the blueprint for what ultimately will become the physical database.
SYSTEM FLOWCHARTS
A system flowchart is used to show the relationship between the key elements—input sources, programs,
and output products—of computer systems.
12 | P a g e
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
Based on these facts, the auditor can create a flowchart of this partial system. It is important to note that
flowcharting is as much an art form as it is a technical skill, giving the flowchart author a great deal of
license. Nevertheless, the primary objective should be to provide an unambiguous description of the
system. With this in mind, certain rules and conventions need to be observed:
1. The flowchart should be labeled to clearly identify the system that it represents.
2. The correct symbols should be used to represent the various entities in the system.
3. All symbols on the flowchart should be labeled.
4. Lines should have arrowheads to clearly show the process flow and sequence of events.
5. If complex processes need additional explanation for clarity, a text description should be included on
the flowchart or in an attached document referenced by the flowchart.
LAY OUT THE PHYSICAL AREAS OF ACTIVITY. Remember that a flowchart reflects the physical system,
which is represented as vertical columns of events and actions separated by lines of demarcation. Generally,
each of these areas of activity is a separate column with a heading. From the written system facts, we see that
there are four distinct areas of activity: sales department, credit department, warehouse, and shipping
department. The first step in preparing the flowchart is to lay out these areas of activity and label each of
them.
TRANSCRIBE THE WRITTEN FACTS INTO VISUAL FORMAT. At this point we are ready to start visually
representing the system facts.
13 | P a g e
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
14 | P a g e
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
LAY OUT THE PHYSICAL AREAS OF ACTIVITY. The flowcharting process begins by creating a template
that depicts the areas of activity.
TRANSCRIBE THE WRITTEN FACTS INTO VISUAL FORMAT. As with the manual system example, the
next step is to systematically transcribe the written facts into visual objects.
15 | P a g e
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
PROGRAM FLOWCHARTS
A program flowchart is a diagram providing a detailed description of the sequential and logical operations of
the program. Every program represented in a system flowchart should have a supporting program flowchart
that describes its logic.
A separate symbol represents each step of the program’s logic, and each symbol represents one or more lines
of computer program code. The connector lines between the symbols establish the logical order of execution.
Tracing the flowchart downward from the start symbol, we see that the program performs the following
logical steps in the order listed:
1. The program retrieves a single record from the unedited transaction file and stores it in memory.
2. The first logical test is to see if the program has reached the end-of-file (EOF) condition for the
transaction file. Most file structures use a special record or marker to indicate an EOF condition.
When EOF is reached, the edit program will terminate and the next program in the system (in this
case, the update program) will be executed. As long as there is a record in the unedited transaction
file, the result of the EOF test will be ‘‘no’’ and process control is passed to the next logical step in the
edit program.
3. Processing involves a series of tests to identify certain clerical and logical errors. Each test,
represented by a decision symbol, evaluates the presence or absence of a condition. For example, an
edit test could be to detect the presence of alphabetic data in a field that should contain only numeric
data.
4. Error-free records are sent to the edited transaction file.
5. Records containing errors are sent to the error file.
6. The program loops back to Step 1, and the process is repeated until the EOF condition is reached.
16 | P a g e
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
17 | P a g e
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
This section examines alternative transaction processing models, which fall broadly into two types: (1)
batch processing and (2) real-time processing.
18 | P a g e
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
Deadlock or “wait” is a state that occurs between sites when data are locked by multiple sites that are waiting
for the removal of the locks from the other sites.
19 | P a g e
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
REAL-TIME PROCESSING
Real-time systems process the entire transaction as it occurs. Real-time processing is well suited to systems
that process lower transaction volumes and those that do not share common records. Terminals at distributed
sites throughout the organization are used for receiving, processing, and sending information on the status of
current transactions.
Data coding involves creating simple numeric or alphabetic codes to represent complex economic phenomena
that facilitate efficient data processing.
The following discussion examines some of the more commonly used coding techniques and explores their
respective advantages and disadvantages.
20 | P a g e
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
Sequential Codes
As the name implies, sequential codes represent items in some sequential order (ascending or descending). A
common application of numeric sequential codes is the prenumbering of source documents. At printing, each
hard-copy document is given a unique sequential code number. This number becomes the transaction number
that allows the system to track each transaction processed and to identify any lost or out-of-sequence
documents. Digital documents are similarly assigned a sequential number by the computer when they are
created.
ADVANTAGES. Sequential coding supports the reconciliation of a batch of transactions, such as sales orders,
at the end of processing. If the transaction processing system detects any gaps in the sequence of transaction
numbers, it alerts management to the possibility of a missing or misplaced transaction. By tracing the
transaction number back through the stages in the process, management can eventually determine the cause
and effect of the error. Without sequentially numbered documents, problems of this sort are difficult to detect
and resolve.
DISADVANTAGES. Sequential codes carry no information content beyond their order in the sequence. For
instance, a sequential code assigned to a raw material inventory item tells us nothing about the attributes of
the item (type, size, material, warehouse location, and so on). Also, sequential coding schemes are difficult to
change. Inserting a new item at some midpoint requires renumbering the subsequent items in the class
accordingly. In applications where record types must be grouped together logically and where additions and
deletions occur regularly, this coding scheme is inappropriate.
Block Codes
A numeric block code is a variation on sequential coding that partly remedies the disadvantages just
described. This approach can be used to represent whole classes of items by restricting each class to a specific
range within the coding scheme. A common application of block coding is the construction of a chart of
accounts.
21 | P a g e
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
ADVANTAGES. Block coding allows for the insertion of new codes within a block without having to
reorganize the entire coding structure. For example, if advertising expense is account number 626, the first
digit indicates that this account is an operating expense. As new types of expense items are incurred and have
to be specifically accounted for, they may be added sequentially within the 600 account classification. This
three-digit code accommodates 100 individual items (X00 through X99) within each block. Obviously, the
more digits in the code range, the more items that can be represented.
DISADVANTAGES. As with the sequential codes, the information content of the block code is not readily
apparent. For instance, account number 626 means nothing until matched against the chart of accounts,
which identifies it as advertising expense.
Group Codes
Numeric group codes are used to represent complex items or events involving two or more pieces of related
data. The code consists of zones or fields that possess specific meaning. For example, a department store chain
might code sales order transactions from its branch stores as follows:
ADVANTAGES. Group codes have a number of advantages over sequential and block codes.
1. They facilitate the representation of large amounts of diverse data.
2. They allow complex data structures to be represented in a hierarchical form that is logical and more
easily remembered by humans.
3. They permit detailed analysis and reporting both within an item class and across different classes of
items.
DISADVANTAGES. Ironically, the primary disadvantage of group coding results from its success as a
classification tool. Because group codes can effectively present diverse information, they tend to be overused.
Unrelated data may be linked simply because it can be done. This can lead to unnecessarily complex group
codes that cannot be easily interpreted. Finally, overuse can increase storage costs, promote clerical errors,
and increase processing time and effort.
Alphabetic Codes
Alphabetic codes are used for many of the same purposes as numeric codes. Alphabetic characters may be
assigned sequentially (in alphabetic order) or may be used in block and group coding techniques.
ADVANTAGES. The capacity to represent large numbers of items is increased dramatically through the use
of pure alphabetic codes or alphabetic characters embedded within numeric codes (alphanumeric codes). The
earlier example of a chart of accounts using a three-digit code with a single blocking digit limits data
representation to only 10 blocks of accounts—0 through 9. Using alphabetic characters for blocking, however,
increases the number of possible blocks to 26—A through Z.
DISADVANTAGES. The primary drawbacks with alphabetic coding are (1) as with numeric codes, there is
difficulty rationalizing the meaning of codes that have been sequentially assigned, and (2) users tend to have
difficulty sorting records that are coded alphabetically.
22 | P a g e
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
Mnemonic Codes
Mnemonic codes are alphabetic characters in the form of acronyms and other combinations that convey
meaning. For example, a student enrolling in college courses may enter the following course codes on the
registration form:
Course Type Course Number
Acctg 101
Psyc 110
Mgt 270
Mktg 300
This combination of mnemonic and numeric codes conveys a good deal of information about these courses;
with a little analysis, we can deduce that Acctg is accounting, Psyc is psychology, Mgt is management, and
Mktg is marketing. The sequential number portion of the code indicates the level of each course.
ADVANTAGES. The mnemonic coding scheme does not require the user to memorize meaning; the code itself
conveys a high degree of information about the item that is being represented.
DISADVANTAGES. Although mnemonic codes are useful for representing classes of items, they have limited
ability to represent items within a class. For example, the entire class of accounts receivable could be
represented by the mnemonic code AR, but we would quickly exhaust meaningful combinations of alphabetic
characters if we attempted to represent the individual accounts that make up this class. These accounts would
be represented better by sequential, block, or group coding techniques.
23 | P a g e
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
SEQUENTIAL STRUCTURE
Sequential structure is a data structure in which all records in the file lie in contiguous storage spaces in a specified
sequence arranged by their primary key.
Sequential access method is a method in which all records in the file are accessed sequentially.
Sequential files are files that are structured sequentially and must be accessed sequentially.
INDEXED STRUCTURE
Indexed structure is a class of file structure that uses indexes for its primary access method.
Indexed random file is a randomly organized file accessed via an index.
24 | P a g e
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
25 | P a g e
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
HASHING STRUCTURE
Hashing structure is a structure employing an algorithm that converts the primary key of a record directly
into a storage address.
POINTER STRUCTURE
Pointer structure is a structure in which the address (pointer) of one record is stored in the field on a related
record.
26 | P a g e
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
Types of Pointers: A physical address pointer contains the actual disk storage location (cylinder, surface,
and record number) that the disk controller needs. A relative address pointer contains the relative position
of a record in the file. A logical key pointer contains the primary key of the related record.
References:
Bagranoff, N., Norman, C., & Simkin, M., 2007. Accounting Information System, 10 th Edition
Cashman, T., Rosenblatt, H., & Shelly, G., 2005. Systems Analysis and Design, 6 th Edition
Chang, C., Richardson, V., & Smith, R., 2014. Accounting Information System, 1st Edition
Hall, J., 2019. Accounting Information System, 10th Edition
Hall, J., 2011. Accounting Information System, 7th Edition
Savage, A., Simkin, M., & Worrell, J., 2017. Accounting Information System, 14 th Edition
27 | P a g e
ACCTY/MA 225 –Accounting Information Systems | Chapter 2
Republic of the Philippines
ISABELA STATE UNIVERSITY
Echague, Isabela
EXERCISE 1
EXERCISE 2
Devise a coding scheme using block and sequential codes for the following chart of accounts for Jensen
Camera Distributors.
EXERCISE 3
For each of the following file processing operations, indicate whether a sequential file, indexed random file,
virtual storage access method, hashing, or pointer structure would work best. You may choose as many as you
wish for each step. Also indicate which would perform the least optimally.
a. Retrieve a record from the file based on its primary key value.
b. Update a record in the file.
c. Read a complete file of records.
d. Find the next record in a file.
e. Insert a record into a file.
f. Delete a record from a file.
g. Scan a file for records with secondary keys.
28 | P a g e
ACCTY/MA 225 –Accounting Information Systems | Chapter 2