Professional Documents
Culture Documents
Caatts For Data Extraction and Analysis: It Auditing & Assurance, 2E, Hall & Singleton
Caatts For Data Extraction and Analysis: It Auditing & Assurance, 2E, Hall & Singleton
Access method
Hashing
Pointers
INDEX DATA File
File
Access: Data
Index Methods Organization
SEQUENTIAL SEQUENTIAL
ISAM RANDOM
RANDOMIT Auditing & Assurance, 2e, Hal
FILE PROCESSING
OPERATIONS
1. Retrieve a record by key
2. Insert a record
3. Update a record
Individual
4. Read a file Records
5. Find next record
6. Scan a file
7. Delete a record Table 8-1
Legacy systems
Legacy systems
Inefficient
CUSTOMERS
INVOICES
INVENTORY
Query function
Allows users to create customized lists from database
Users stipulate, using English-like commands, which tables,
records, fields, filtering criteria needed to produce the
desired list
Result is virtual table derived from actual database tables
SQL
• SELECT, FROM, WHERE [Figure 8-16]
• De facto standard query language