We'll email you at these times to remind you to study
You can set up to 7 reminders per week
We'll email you at these times to remind you to study
Figures 7.1 – 7.7 contains routines often found on systems flowcharts.
Figure 7.1, depicts a typical two-step data entry process which might be described as follows:
The data entry clerk keys a sales input document while online. The computer accesses data in data store 1 and in data store 2 to edit/validate the input. The computer displays the input, including any errors.
The clerk compares the input document to the display, keys in corrections as necessary, and accepts the input. The computer updates the table in data store 2 and notifies the clerk that the input has been recorded.
Notice the following about Figure 7.1
• The edit or validate step may be performed with one or more data stores.
• The display is implied with most, if not all, data entry processes.
• By combining the “Edit/validate input” rectangle with the “Record input” rectangle, we could depict this input process in one—rather than two— steps without losing much detail about the activities being performed.
• The manual processes undertaken by the clerk are isolated in a separate column to distinguish them from the automated processes undertaken by the computer.
• We show the input document at the bottom of the column to indicate that the document “flows” through the input process.
Figure 7.2, depicts a typical online computer query, which might be described as follows:
A user keys a query request online into a computer. The computer accesses the table(s) in one or more data stores and presents a response to the user.
Notice the following about Figure 7.2:
• The user and computer activities are again isolated in separate columns.
• The display is an implied element of the online computer.
Figure 7.3 depicts the update of master data stored in a sequential data store and might be described as follows:
New data previously recorded on disk are input to the computer, along with the existing (old) master data. The computer updates the existing master data and creates a new version of the master data.
Notice the following about Figure 7.3:
• When sequential master data is updated, we show two data store symbols on a flowchart. One symbol represents the existing (old) version and the other represents the new version.
• A dashed line connects the new with the old master data version to show that the new becomes the old version during the next update process.
Figure 7.4, depicts the input and reconciliation of computer inputs and might be described as follows:
The user collects a number of input documents in a “batch”, prepares batch totals, and enters the documents into the computer. The computer records the inputs on a disk and notifies the user as each input is accepted. The user files the input documents in numerical sequence. At the end of the batch, the computer prepares an exception and summary report that includes batch totals. The user compares the computer batch totals to those prepared prior to entry of the documents to make sure the data were entered correctly.
Notice the following about Figure 7.4:
• The annotation makes it clear that the computer prepares the exception and summary report after the user has completed entry of the batch.
• The user’s comparison of the batch totals is depicted with a dashed line— rather than a manual process.
• If the batch totals had been input with the batch, the computer—rather than the user—could compare the batch totals.
Figure 7.5, depicts entry of data to a data entry system and might be described as follows:
A data entry clerk (Clerk 1) enters documents into a PC connected to a data entry system. The system records the inputs on a disk and notifies the user of the acceptance of each input. The documents are then forwarded to a different clerk (Clerk 2) who keys the documents again. Differences are resolved and the transaction data are updated to reflect the verifications and corrections.
Notice the following about Figure 7.5:
• The key-to-disk unit is an offline device and should be depicted with a square—rather than a rectangle—and in a column separate from the computer.
• We show the data entry clerks in two columns to emphasize that the keying and two different clerks perform verification steps.
• Clerk 2 probably follows an established procedure to reconcile differences found during the verification step. We use the annotation about error routine to suggest the existence of these procedures.
Figure 2.7, part (f), depicts the entry and recording of an input using a scanner and might be described as follows:
A clerk scans a document into the computer. Using the data from the scanned document, the computer updates the data located on one or more data stores. The majority of data processing errors occur at the data entry stage and the majority of those errors can be attributed to misreading or miskeying the input. Because it is unlikely that two different clerks will make the same reading or keying mistake, the rekeying by a different clerk will discover the majority of these errors.
Notice the following about Figure 2.7, part (f):
• We represent the scanner with the offline process symbol.
• We could include a display coming from the scanner, showing the clerk the document that had just been scanned.
• To be able to read data from the document, the scanner must have optical character recognition (OCR) capabilities
Figure 7.7, depicts the entry and recording of an input using a scanner and a keyboard and might be described as follows:
A clerk scans a document into the computer. The computer routes an image of the scanned input to a data entry clerk, who keys data from the document’s image into the computer. The computer records the keyed data with the scanned document.
Log in to save your progress and obtain a certificate in Alison’s free Documenting Business Processes and Information Systems online course
Sign up to save your progress and obtain a certificate in Alison’s free Documenting Business Processes and Information Systems online course
Please enter you email address and we will mail you a link to reset your password.