Design and Implementation of Real Processing in Accounting Information System
Design and Implementation of Real Processing in Accounting Information System
Design and Implementation of Real Processing in Accounting Information System
IMPLEMENTATION OF
REAL TIME
PROCESSING IN
ACCOUNTING
INFORMATION SYSTEM.
1
BY
…………………………………………………..
AKP/WRR/ASC/CSC/ND2007/…………
NOVEMBER 2009
2
CERTIFICATION
_________________ ________________
DATE
Project supervisor
_________________ ________________
DATE
Centre co-ordinator
3
DEDICATION
This research project is dedicated to the Almighty God for His ever enduring
love, kindness, mercy and grace all through the course of this programme.
Father, I thank and worship you and give You all the Glory and Honour.
4
ACKNOWLEDGEMENT
work and made some corrections where necessary which brought this
Ogbinaka .F, the registrar Mrs. Stella Oyabugbe and all the lecturers
5
ABSTRACT
system.
6
In this research work, the researcher will consider in chapter
7
TABLE OF CONTENTS
Title page - - - - - - - - - i
Certification - - - - - - - - - ii
Dedication - - - - - - - - - iii
Acknowledgement - - - - - - - - v
Abstract - - - - - - - - - v
Table of content - - - - - - - -
viii
CHAPTER ONE
INTRODUCTION
CHAPTER TWO
LITERATURE REVIEW
8
2.0.2 Accounting information system - - - - 6
2.4 Features - - - - - - - - 8
2.4.2 Reliability - - - - - - - - 9
2.4.3 Inflexibility - - - - - - - - 9
10
2.5.1 Atomicity - - - - - - - -
10
2.5.2 consistency - - - - - - - -
10
2.5.3 Isolation - - - - - - - -
10
2.5.4 Durability - - - - - - - -
10
9
2.5.6 Concurrency - - - - - - - -
11
12
13
14
CHAPTER THREE
15
10
3.4 Input design - - - - - - - - 34
CHAPTER FOUR
4.3 Methods - - - - - - - - - 43
4.4 Events - - - - - - - - - 43
CHAPTER FIVE
RECOMMENDATION
5.1 Implementation - - - - - - - 45
5.5 Conclusion - - - - - - - - 53
5.6 Recommendation - - - - - - - 53
11
CHAPTER ONE
INTRODUCTION
expert in the field of real-time system. Their works are grouped into six parts,
subject, the chapters therein developing one of the major aspects of real-time
the foundations for a general systemic theory of those systems, the book
It would have been a total waste of time, efforts, energy and ofcourse fund, in
objectives. The research would also have been seen as a fruitless exercise if
The research is aimed at describing the design and implementation of real time
12
The objectives of the study therefore are:
(i) To investigate the role and the relative efficiency of the Design and
system
(ii) To find out whether or not, this real time processing system require the
(iii) To enable the researcher avail himself the opportunity of contribute his
(iv)To find out how effective real time processing works in business
organization.
organization.
This research will give an overview of real time processing system as well as
13
Other areas of coverage will be the design and implementation of the system.
The researcher has no doubt whatsoever, that the findings presented in this
amongst others:
Limited
• system analysts
• project managers
• management accountant
• other researchers
14
1.5 LIMITATION OF THE STUDY
Research work is subject to one form of limitation or the other, mine is not an
exemption. It was the initial thought of the researcher that the exercise was
easy but the contrary was the case. As a student, several academic demands
This implies that none of the competing exercise could be effectively handled
This was my situation. Although the time expended was too small to do justice
to the study. The opportunity cost in terms of other equally important activities
staff of the company completing the questionnaire who could not understand
Information for this research study was gathered from various sources such as:
(1) The Internet: A large part of the materials were extracted from the internet
information system .
15
(3) Some of the information used were extracted from compact disk that has
related topic.
CHAPTER TWO
LITERATURE REVIEW
into an information society where value is now based on the ability to use,
share and create knowledge and information. Obviously, the success in the
a target system. An information system can not exist without such a target
system. For example, production activities would be the target system for a
would be the target system of a human resource information system, and so on.
16
It is important to recognise that within a vending machine there is a
sense, every active system will have a subsystem that can be considered an
system.
target system. It should be obvious that the target system must be business
entered, processed and then the batch results are produced. Batch processing
requires separate programs for input, process and output. It is an efficient way
18
alone’s both in the mode of entry to the system and also in the
handling of output.
often for updating and reference than batch processing. The database
With batch processing, the data is organised and stored before the
2.4 FEATURES
2.4.1 Rapid response
respond, the turnaround time from the input of the transaction to the
operations or even stop the business. For a TPS to be effective, its failure rate
must be very low. If a TPS does fail, then quick and accurate recovery, must
essential.
2.4.3 Inflexibility
the user, the customer or the time for day. If a TPS is flexible, there would be
employees, then the TPS should enforce and maintain this requirement.
20
2.5 ACID TEST PROPERTIES: FIRST DEFINITION
2.5.1 Atomicity
2.5.2 Consistency
group do not violate any of the integrity constraints associated with the state.
2.5.3 Isolation
2.5.4 Durability
survive failures.
2.5.6 Concurrency
Ensures that two users cannot change the same data at the same time. That is,
one user cannot change a piece of data before another user has finished with it.
(such as the increase in the speed of data transmission and larger bandwidth),
able to help with error correction and receives confirmation of the transaction
completion.
Updating in real-time uses direct access of data. This occurs when data are
accessed without accessing previous data items. The storage device stores
be calculated to find an approximate location of the data. If data are not found
at this location, it will search through successive locations until it's found.
can store large amounts of data and provide quick access (thus the common
22
2.7 ACCOUNTING INFORMATION SYSTEM (AIS)
TECHNOLOGY
Input: The input devices commonly associated with AIS include: standard
commerce. The output content may encompass almost any type of financial
23
2.8 MANAGEMENT INFORMATION SYSTEMS(MIS)
MIS are interactive human/machine systems that support decision making for
future tactical decisions; and overall strategic direction. MISs are made up of
several major applications including, but not limited to, the financial and
budgeting.
24
2.9 AIS—ACCOUNTING INFORMATION SYSTEMS IN
CONTEXT
(transactions) are classified and summarized for internal decision making and
These allow organizations to track the costs associated with the production of
25
CHAPTER THREE
from the systems approach to organisations. The systems approach has many
synergy. The systems view is that the whole is more than just the sum of
26
• The parts of a system constitute an indissoluble whole so that no part
• The sub-systems should work towards the goals of their higher systems
The analysis phase is used to both determine and document the accounting and
system solutions.
27
to the data that the organization should be using for managerial purposes. This
systems.
responsible for making. The primary decisions that managers are responsible
for are identified on an individual basis. Then models are created to support
that either add or change data. These processes can then be modified or
28
and controlling current and future operations and for nonroutine decision
with traditional accounting controls and methods to provide users the financial
processing systems.
In a real time processing, there is a continual input, process and output of data.
For example:
29
handed the money.. and there's no turning back! :)
able to help with error correction and receives confirmation of the transaction
completion.
Updating in real-time uses direct access of data. This occurs when data are
accessed without accessing previous data items. The storage device stores data
calculated to find an approximate location of the data. If data are not found at
this location, it will search through successive locations until it's found.
For some tasks, a computer must process information to meet some real world
time deadline. The time deadline must be met regardless of how much work
the computer has to do. Usually real time computer systems are required to
process information very quickly. Most real time systems appear to process
data instantly. A computer system which must process data extremely quickly
to meet a real world deadline is known as a real time system. Here are some
of the advantages:
30
• Money is transferred at the time of the transaction.
• No manual card processing work required! You simply need to pack and
• You only receive orders that have actually passed the processing stage.
certain jobs.
out of stock then you must organise a refund. (Most payment gateway
companies now provide you with the means for doing refunds however.)
add products, you have no way of doing so without asking for the
31
customer's credit card details, even if you have approval from the
customer.
Having seen the problems faced by the system, it is vital to note that
thus :
waiting to be made. The transactions are processed in the order that they
are placed into the queue. If there are many people using the system at
the same time then there could be lots of transactions being made from
• The computer system will process one transaction at a time. Once the
32
3.1.3 THE PROPOSED SYSTEM
information system :
microprocessor.
33
It is a most crucial phase in the development of a system. Normally, the
and planning.
The design phase takes the conceptual results of the analysis phase and
phases. It involves the detailed design of all inputs, processing, storage, and
through the use of flowcharts or business process maps that define the
system logic, operations, and work flow. Logical data storage designs are
tools such as report writers, data extraction tools, query tools, and on-line
analytical processing tools. In addition, all aspects of the design phase can be
34
performed with software tool sets provided by specific software
manufacturers.
In this design phase, the researcher changes focus and concentrates on how a
system can be developed to meet the requirements. Several steps are useful
system were identified during system analysis and stated in the system
analysis report. Before the researcher can proceed with system design,
these objectives must be reviewed, since any system design offered must
conform to them. Apart from being a better alternative for checks, This
significant impact in the market. Some of the objectives are seen below:
35
• Accelerated fund availability
• No postage necessary
• Integrated Processing
the various components and their interactions. In reviewing the models, the
important subsystems……
subsystems?
factors that could potentially affect the success of the system. The most
36
of a suitable development framework for the classification of relevant
subject, identifying the relationships between the parts and revealing the
system development and usage that influence the success of the whole
framework which will serve as the foundation for a deeper study of the
and some issues relevant to each phase, are briefly discussed below.
E S P R I T
EVALUATION SURVEY OF PROTOTYPE REVIEW IMPLEMENT TRANSFER
37
Here, the consultants undertaking the development project are committed to
carry out a joint survey to assess the AIS requirements. The suitability of the
suitable prototype project. End-users of the system and other people affected
by the system are involved in the project. The software and hardware to be
used for the prototype are selected. It is also necessary, at this stage, to assess
and detail of activities is then drawn up. This forms the terms of reference for
the project and the consultants should obtain authorisation to go on with the
prototype.
for potential users to explore the system and ask questions about it. The
38
prototype is installed in the executive sponsor's office to demonstrate
how the sponsor will use his/her time more productively, and how
and in the light of experience gained so far, the full EIS proposal is
updated with full project costs and timescales set out. The proposal is
format of the reports (both paper and on-screen) delivered by the system
is designed and the AIS is ready for use by the developers at key
executive meetings.
courses for the users of the system. Training of the senior executives is
slowly. Training courses for planners, analysts and the system manager
39
are also planned and implemented. Any documentation supplied with
the system, about the facilities the AIS provides, is produced in different
The users are then interviewed and their comments about the benefits
gained from installing the system are documented in order to justify the
costs of running the AIS on a permanent basis. At this point, the next
below.
40
AIS
one makes the distinction between data internal to the organisation and data
The framework takes the view that AISs development is a dynamic process
41
issues relevant to activities undertaken to develop an AIS, since these
activities play an important role in the success of the final system. Issues
put forward in this component include, the development time for a system,
the development methodology used, the hardware and software used for the
system as well as issues about the evolution and spread of the system to
to the users of the system are addressed and classified into three categories.
The first of these, involves issues concerning the knowledge users need to
operate the system. The second category addresses issues pertinent to the
operation of the system, such as system response time and the user-system
interface. Finally, the last category looks into how information is presented
and the effect of the use of colour and multiple presentation formats. The
this stage, the design of the system becomes more structured. Structure
42
original problem. Input, output and processing specifications are drawn up
in detail. In the design stage, the programming language and the platform in
There are several tools and techniques used for designing. They are:
⇒ Flowchart
⇒ Data dictionary
⇒ Structured English
⇒ Decision tree.
information derived from the previous stage. For the first time physical
Type of system
⇒ Hardware specifications
Data organisation
⇒ Files/databases
Packages/programming
The output design shows how the report will actually look like and
43
(i) Confirmation report: The report shows a confirmation message
(ii) Financial report: This report will show the total amount log in by
multiple dimensions.
(v) Reports are of three basic types: A filter report that separates select
(vi) Screen designs and system interfaces are the primary data capture
(vii) Business process maps and flowcharts are used to document the
This report shows a type of data entry and is user friendly. To carry out
45
3.5 FILE DESIGN
The system bas only one database file. This file is made up of three tables.
Each table of the database file is designed with specific format for each field.
Access mode for each of the files is random, that is records in a file can be
read or modified.
Record layout
This is the description of the structure of the records in each of the file used.
The record layout for all the two files used in the online system are given
below:
Database file
Personal data
S/N FIELD NAME DATA TYPE FIELD WIDTH
1 SURNAME TEXT 18
2 OTHER NAMES TEXT 30
3 AGE NUMBER 2
4 GENDER TEXT 6
5 MARITAL TEXT 9
STATUS
6 RESIDENTIAL MEMO -
ADDRESS
46
7 OFFICE ADDRESS MEMO -
8 OCCUPATION TEXT 15
9 NATIONAL ID TEXT 16
CARD NO
10 SIGNATURE OLE -
11 PHOTOGRAPH OLE -
Customers’ data
Validation database
NO
2 USER NAME TEXT 30
3 PASSWORD TEXT 12
4 REMARK TEXT 10
3.6 This is in-built checking facility that enables the discovery of errors in
the input data. Validation is based on the rule created through expressions.
When data fail validating, a message will display informing the user of the
error.
Example, if a field is meant for numeric value, the user mistakenly inputted the
alphabet, the system will prompt the user with the message that there is an
47
error in the input data. It also provide the user the information on how to re-
right user can gain access to the system . The security is placed on the
CHAPTER FOUR
DESIGN METHODOLOGY AND
TECHNOLOGY
48
The design of the Internet information system was accomplished due to the
front Page and HTML (Hypertext Markup Language), the working program
that enables the forms to interface with the database files was designed in
visual basic programming language. The modular approach was used for the
program designs. That is, each module was designed and developed
or more independently developed modules that are not combined until the
contained within the same unit of programming code and that separate
functions should be developed as separate units of code so that the code can
49
(a) OVERVIEW OF HYPERTEXT MARKUP LANGUAGE
(HTML)
documents are SGML documents with generic semantics that are appropriate
HTML has been in use by the World Wide Web (WWW) global information
HTML defines the structure and layout of a Web document by using a variety
of tags and attributes. The correct structure for an HTML document starts with
50
There are hundreds of other tags used to format and layout the information in a
Web page. Tags are also used to specify hypertext links. These allow Web
developers to direct users to other Web pages with only a click of the mouse
formatting documents for output to a computer screen but which are generally
hidden from the user. It is essentially a set of codes used to format the
b. VISUAL BASIC
Visual Basic, which is used for the form design and to interface the data entry
form to the database files is a programming language suitable for all forms of
information, etc.
51
Object-oriented programming (OOP) is a programming language model
organized around "objects" rather than "actions" and data rather than logic.
input data, processes it, and produces output data. The programming
challenge was seen as how to write the logic, not how to define the data.
Object-oriented programming takes the view that what we really care about
are the objects we want to manipulate rather than the logic required to
by name, address, and so forth) to buildings and floors (whose properties can
The first step in OOP is to identify all the objects you want to manipulate and
how they relate to each other, an exercise often known as data modeling.
of Plato's concept of the "ideal" chair that stands for all chairs) and define the
kind of data it contains and any logic sequences that can manipulate it. Each
a class." The object or class instance is what you run in the computer. Its
52
provide relevant data. You communicate with objects - and they communicate
important benefits:
objects that share some or all of the main class characteristics. Called
• Since a class defines only the data it needs to be concerned with, when
an instance of that class (an object) is run, the code will not be able to
• The definition of a class is reusable not only by the program for which it
is initially created but also by other object-oriented programs (and, for this
• The concept of data classes allows a programmer to create any new data
53
Your web page document is an object. Any table, form, button, image, or link
on your page is also an object. Each object has certain properties (information
about the object.) for example, the background colour of the document is
The contents (or value) of a texbox named ‘password’ in a form named ‘entry
4.3 METHODS
Most objects have a certain collection of things that they can do. Different
objects can do different things, just as a door can open and close while a light a
can turn on and off. A new document is opened with the method document.
Open () you can write ‘Hello World’ into a document by typing document.
Write (Hello World’). Open () and write () are both methods of the object:
document.
4.4 EVENTS
Event are how we trigger our functions to run. The easiest example is a button,
54
The onClick event, as its name implies, will run the function when the user
use with Microsoft Windows. It is the world's second most popular web server
in terms of overall websites behind the industry leader Apache HTTP Server.
The services provided currently include FTP, FTPS, SMTP, NNTP, and
HTTP/HTTPS.
approaches, techniques and tools which system analysts use to help them
An ISDM is:-
55
CHAPTER FIVE
IMPLEMENTATION, CONCLUSION
AND RECOMMENDATION.
5.1 IMPLEMENTATION
software and vendors for the implementation; building and testing the
and testing the new program modifications; and installing and testing the total
final system and user acceptance testing; preparing the conversion plan;
installing the production database; training the users; and converting all
Tool sets are a variety of application development aids that are vendor-
specific and used for customization of delivered systems. They allow the
addition of fields and tables to the database, along with ability to create screen
and other interfaces for data capture. In addition, they help set accessibility
and security levels for adequate internal control within the accounting
applications.
56
Security exists in several forms. Physical security of the system must be
access granted only to technicians. Software access controls are set at several
levels, depending on the size of the AIS. The first level of security occurs at
Next is the operating system level security, which protects the computing
AIS.
The support phase has two objectives. The first is to update and maintain the
AIS. This includes fixing problems and updating the system for business and
system modifications.
57
Implementation is the stage of a project during which theory is turned into
practice. During this phase, all the programs of the system are loaded onto
will be required:
Hardware
When talking about hardware for an AIS environment, we should focus on the
hardware that meet the executive’s needs. The executive must be put first and
the executive’s needs must be defined before the hardware can be selected.
The basic computer hardware needed for a typical AIS includes four
components:
58
3. Data storage files. The executive can use this part to save useful
business information, and this part also help the executive to search
executive to save or read. This device refers to the visual output device or
printer.
In addition, with the advent of local area networks (LAN), several AIS
less support and less expensive computer hardware. They also increase access
Software
Therefore, the software components and how they integrate the data into one
system are very important. The basic software needed for a typical AIS
documents;
59
2. Database. Heterogeneous databases residing on a range of vendor-
specific and open computer platforms help executives access both internal and
external data;
3. Graphic base. Graphics can turn volumes of text and statistics into
visual information for executives. Typical graphic types are: time
60
will achieve stipulated objectives. Such requests can be accepted after
b. date of request;
to the computer files. The time it takes to accomplish this task requires
61
careful planning and control. The Longer the transfer takes the more
Very often record are converted from ledger cards on which transaction
balances on such record as tax record, payroll records of each tax payer are
system. This creates a high volume activity and suitable arrangements must
Testing is performed at four levels. Stub or unit testing is used to insure the
within the AIS as a whole. Acceptance testing ensures that the modifications
meet user expectations and that the entire AIS performs as designed.
62
Prior to the installation of the computerised system test data must be prepared
for live testing. It is also necessary to simulate the operation of the computer
desk checking or dry running, which involves running through the program
This entails the method used to change from an old AIS to a new AIS. There
are several methods for achieving this goal. One is to run the new and old
over to the new system at a specified point. A third is to phase in the system,
characteristics, which need to be taken into account during the planning stage
of installation.
63
only The results obtained from running this pilot scheme assist in determining
When to use a pilot scheme. A pilot scheme should be adopted when the
5.5 CONCLUSION.
information, at the right time, in the right amount, with an acceptable level of
dealing with exceptional circumstances and errors; effective safeguards for the
stored in master file; efficient design of document and reports will make the
64
5.6 RECOMMENDATION
System monitoring. After the system has gone live and proved to be
that no abnormalities occur and to remove the cause if any arise. It may be
found that, although the system is achieving results as stipulated in the system
specification, the system design does not provide for certain requirements.
related systems to avoid the input of data several times to each of several
65
from external sources for the new types of task which have been created.
the required aptitude and potential for specified tasks. The cost and benefits
66