Documente Academic
Documente Profesional
Documente Cultură
SM 7.1
delivered, authorized signatures, detailed information about items ordered including quantity,
price, description, and salesperson number.
7-7.
Data flow diagrams are logical descriptions of a system whereas systems flowcharts
capture a physical view of the system. The data flow diagram would show processes, similarly
to a systems flowchart. The systems flowchart, however, is likely to show whether the
processes are performed by computer, manually, or by another device. Flow lines in the data
flow diagram would show input and output items. These would either go to a data source or
destination or a data store. The flowchart would show inputs and outputs apart from flow lines.
They might be depicted in manual files, disk files, tape files, documents, etc. Both flowcharts
and data flow diagrams may be designed to show increasing levels of detail. For instance, a
context data flow diagram corresponds to a high level systems flowchart and each usually
shows only one overall process for the revenue cycle.
7-8.
Both restaurants and car manufacturers are manufacturing organizations. They take
raw materials, process them, and produce finished goods. However, the car manufacturer will
deliver the product to a car dealer or intermediary, rather than to the customer. The restaurant
does not only deliver the product to the customer; the process doesn't really end until the
product is consumed! Insofar as inputs to the purchasing cycle are concerned, both car
manufacturers and restaurants are buying raw materials, as mentioned. Therefore, inputs are
likely to be similar. They would consist primarily of purchase requisitions and purchase orders.
One difference worth mentioning is that a car manufacturer is likely to be closely linked to
suppliers - via electronic data interchange (EDI). Therefore, the car manufacturer may make use
of electronic requests for inventory items. A restaurant may not be large enough or closely
linked to specific suppliers for EDI to be effective.
7-9.
Business-without-boundaries is the term given to an organization that has
outsourced one or several business functions. The organization may have outsourced the
function to another company in the US or perhaps to a company that is outside the US (called
offshoring). This trend is changing the nature of organizations in a variety of ways. As with
national and multi-national firms, employees may be located anywhere in the US or the world.
Typically, communication and coordination of business processes are very important so that the
customer experiences seamless service from the firm. As an example, Amazon.com
(headquartered in Seattle, WA) outsourced (offshored) some of their customer service functions
to a company in India. When customers have problems, it is likely that an e-mail response will
originate in India. However, the customer e-mails Amazon.com not the company in India
where the response is generated. Amazon.com has customers worldwide and believes that the
customer service function should respond to customer concerns 24/7. By offshoring this
function to various companies in the world, as well as outsourcing to some companies in the
US, Amazon.com is able to respond to customers very quickly.
As a result of improved technology, networks and improved communications capabilities,
companies can interact with each other in new and different ways to provide better, more
efficient service to customers, while cutting the cost of doing business. Of course, this also
presents new risks and challenges to companies that outsource business processes, because
they are no longer able to directly monitor and control the quality of service that is provided to
their customers.
7-10.
This means that companies have outsourced one or more business functions
(processes) to companies that are not located in the US. According to a recent META Group
report (www.metagroup.com, Worldwide IT Benchmark Report, 2004), India continues to be the
SM 7.2
preferred offshore country with more than 500,000 knowledge workers. Other countries
compete with India for this offshore business such as Russia, the Philippines, Ireland, Israel,
and China.
7-11. Students might strongly agree or disagree with these claims regarding the availability of
qualified IT personnel. However, the responses they give should be based on their research
(number of IT graduates at your university or other statistics that might support their view).
Encourage students to base their opinions on data that they might find on the Internet or data
that might be available in their university library (either reference books or digital media), rather
than their feelings. This topic can lead to a very lively classroom discussion if half of the
students are required to support the claims and the other half of the students must find support
to refute the claims. A mock debate can be used to bring out both sides of this issue. In this
case, 2-3 students from each group would present their findings (perhaps using PowerPoint
slides) in front of the class and present their respective points of view. After both presentations,
the students in the front of the class could act as facilitators to encourage the rest of the class to
give their opinions.
A web site that discusses IT Offshoring and the impact on employees is:
http://www.mckinsey.com/mgi/rp/offshoring/
7.12.
One interesting new use of RFID tags is for passports. The US Government believes that the
benefits outweigh the costs (http://news.cnet.com/RFID-passports-take-off/2100-7348_36130016.html). Another interesting use is that they are implanting in people as an in thing
(http://www.prisonplanet.com/articles/april2004/040704bajabeachclub.htm) to be considered a
VIP at a beach club in Spain.
7.13.
For a list of the Top 15 Weirdest, Funniest, and Scariest Uses of RFID, visit the following
website: http://www.rfidgazette.org/2007/04/top_15_weirdest.html
7.14.
Students opinions of this technology will likely differ based on how they interpret the privacy
issues surrounding RFID tags.
Advantages:
ability to track people (e.g., patients and babies in hospitals)
ability to track items of all types, such as inventory in warehouses, office buildings,
university buildings
convenience (like the smart passes for cars to pass quickly through toll gates)
Disadvantages:
for individuals, the primary concern surrounds the perception that personal privacy could
be violated
from a manufacturing perspective, the primary concern is the cost of the tags
SM 7.3
Problems
7-14.
a) sequence code such as a social security number
b) block code or group code
c) block code or group code
d) block code or group code
e) sequence code (by one's)
f) sequence code (by one's)
g) sequence code (by one's)
h) group code
i) mnemonic code
j) block code
k) sequence code (by one's)
l) sequence code (by one's)
m)sequence code (by one's)
n) group code
o) sequence code or group code
p) sequence code or group code
q) block code
r) block code
s) block code
t) alphabetic code or mnemonic code
u) sequence code (by ones)
v) sequence code or group code
7-15.
=
=
=
=
=
=
=
=
product line (1=toys and games, 2=party and magic tricks, 3=gifts)
subproduct code (numeric)
product number (numeric)
geographic area (mnemonic)
sales district (numeric)
salesperson (numeric)
customer type (mnemonic)
credit rating (numeric)
Note that this is a transaction code, not a product code. The product line, subproduct code and
product number may be used as a product number. The remaining code is not known until a
sales transaction takes place.
7-16.
The figure in this problem is a document flowchart for the preparation of purchase
orders for the P. Miesing and Company. Three source documents are involved in the data
processing: (1) new vendor authorization forms, (2) new product authorization forms, and (3)
authorized purchase requisitions.
SM 7.4
When a new vendor is approved, the vendor information from the new vendor form is keyed
online through a computer edit program which creates a new vendor record on the vendor
master file. Similarly, when a new product is approved, the information from the new product
authorization form is keyed on line though a computer edit program which creates a new
product record on the product master file.
When corporate purchasing agents (or other approved personnel) receive authorization to make
a purchase, an authorized purchase requisition form is obtained. The information on this form is
keyed into an online terminal which in turn connects to a CPU using a Prepare Purchase
Orders program. This program (1) creates a computer record on the purchase orders pending
file, (2) creates a multiple copy purchase order (at least one copy of which is sent to the
vendor), and (3) creates a purchase order summary report.
7-17.
The events in SSR-Saves sales process are:
i. Customer selects goods
ii. Customer and sales clerk participate in sale
iii. Customer pays
a. The sales process in an online environment is similar, with one main exception. The most
important difference is that the store must ship the goods to the customer. This is an
additional event. Attributes of the other events change to some degree. The customer still
selects the goods, but does so without physical inspection. The customer interacts with
software rather than a human sales clerk. As for payment, the customer will always use a
credit card if that is the payment option allowed in the online store.
b. In the retail store, the sales clerk may collect some data about the customer at the point of
sale. However, if the sale is for cash, it is possible that the store never collects data about
the customer. In the online store, the system can collect data about the customer at any
point. For instance, when the customer first opens the site, there could be a registration
screen.
c. Some stores ask customers for their zip code and/or phone number. They do this to track
demographic data about customers and sales. Online stores can collect a lot of data about
customers easily. If you buy online, you need to supply address and, frequently, credit card
information. You may need to provide other data as well. To improve customer satisfaction,
you could post an optional satisfaction survey at the web site. You can also use the data you
collect about the sale to improve customer satisfaction. For example, you could use data
about products most frequently sold online to organize your product offerings online. You
can also use data about the pages customers most frequently open to organize your site. In
addition, the data collected about customer purchases could be used to suggest similar
types of products (cross-selling) the next time the customer visited the website (like
Amazon.com).
d. Public accounting firms sell services instead of goods. There are many differences between
selling goods and selling services. For example, services are intangible and are
experienced. The way a public accounting firm gets its customers is different from a retail
store. The firm may have to bid on jobs and the sales process takes place over time as work
is performed. Public accounting firms will definitely be interested in customer satisfaction.
They can collect the data through surveys and by asking for suggestions from clients on
SM 7.5
ways to improve their service. One way to collect data to improve service in a public
accounting firm or any professional service firm is to create a knowledge management
system. These systems may contain data about client Best Practices that professionals can
use to better service new and existing clients. Some public accounting firms are creating
customer portals where they interact with their clients, providing them updates, for example,
on new accounting standards.
Case Analyses
7-18.
System verifies
credit card
details
Card # Valid?
No
Error Message
Yes
Encrypt data &
send to UB
computer
Accountant
retrieves
transactions
Accountant charges
card and gets
validation
Accountant enters
validation #
Database
Print receipt
and update
database
Receipt
SM 7.6
1. The answer depends on the volume of business. The costs are the $400 software charge
and the increase in credit card rate. If annual sales are $100,000, the extra .5% amounts to
$500. Weighed against the costs are the benefits. The benefit here will be saved labor (it
would take less of the accountants time). There may be a benefit of fewer errors because
the accountant does not need to key in a number. However, there could also be more errors
because there are fewer chances for error with swiped cards.
2. See flowchart.
3. There are not too many risks associated with the sales process itself. There is the risk that
a credit card or card number is stolen although the credit card company is likely to bear
that risk. There is the risk that the customer will input an incorrect dollar amount for the sale.
There is the risk that the online system could go down. There is the risk that the accountant
could forget to enter a transaction. The accountant could record the wrong validation
number.
7-19. Larkin State University (Purchasing Process)
1. The events are: Purchase Requisition; Purchase Order; Receipt of Goods/Services; and
Cash Payment
2. Employees could complete Purchase Requisition forms on the companys intranet. The
completed requisitions could be forwarded to the appropriate authorities for approval.
Approvals could be online and then the purchase order would be routed to the purchasing
department. The accounting or enterprise software could check for approval and forward
the requisition to the appropriate purchasing agent. The agent could match the order to an
appropriate supplier and enter the data needed to complete a purchase order. Copies of the
purchase order can be routed through the Intranet to receiving and accounts payable
departments. Receiving clerks can complete receipt information and forward that via e-mail
to the appropriate accounts/payable clerk based on vendor name. The accounting or
enterprise software can check all documentation for discrepancies. The software can also
perform checks of vendor names, payment dates, invoice numbers, and invoice amounts as
an internal control against duplicate payments. The software could also print out a
discrepancy report when the vendor invoice, receiving report and purchase order amounts
do not agree.
7-20.
1. The students might have a lot of different ideas from their own point of view, but what we
want them to do in this case is to consider the business advantages and disadvantages from
an accounting perspective. The possible advantages could include those that are discussed
in the chapter:
more accurate data in AIS (avoid human error in entering sales data)
perhaps increased sales (VIP status in club)
servers more attentive to customers (dont have to spend time getting bill, delivering to
table, collecting money)
SM 7.7
SM 7.8
SM 7.9