Question: Group Project Part III Kim s Flower Inc. Purchasing ( Expenditure ) Cycle Requirements: The final part of the project requires your team to implement
Group Project Part III
Kims Flower Inc. Purchasing Expenditure Cycle
Requirements:
The final part of the project requires your team to implement the logical data model in MS Access. Please
read carefully the instructions below before you start working on your project. You should submit your
database file related to the question && and a separate word document with answersexplanations to the
question as requested below.
Create tables in the MS Access file by using the provided solution of Group Project Part II with
Solutionie the normalized tables
In each table, define the primary key. Primary keys cannot be null.
For each attribute, define the data type, provide a field description, and define the field
properties if necessary
Establish relationships between all the tables you created. You may take a look at the video How to add
relationship between tables in Microsoft Access on Canvas to add relationships between tables.
Make sure that you enforce the referential integrity in all your relationships. Referential integrity
rule: Foreign key which link rows in one table to rows in another table must have values that
correspond to the value of a primary key in another table.
Populate all your tables with fictitious data entries
You should sufficiently populate your tables so that you can demonstrate your design about
rows for events and for agents and resources
Create queries and explain why these queries are important for managersdecision makers.
You should have at least three multiple table queries in your design.
At least one of your queries should perform calculation. You can create a query using SQL
language or Query design.
Document the existing internal control structure based on your current design.
You may refer to some controls we discussed in Chapter You need to specify at least TWO
threats and explain related controls your team can provide to mitigate each of them.
For example, the threat to the database could be entering an invalid supplier when an employee
enters the purchase order. To control the threat, we can apply the validity check by comparing
the supplier ID which the employee enters with the purchase order with the supplier ID in the
supplier mater file to verify that the account exists. Please do not use this example in your
submission
Deliverables:
Create the tables in TeamNumberPartaccdb.
Complete the document ie TeamNumberPartdocx
Submit two files. Be sure to change the file name using your team number. For example, my MS Access file
would be TeamPartaccdb and my MS Word file would be TeamPartdocx.
Only one team member needs to submit these required files.
Normalized Tables
tableTable Name,Primary Key,Foreign Key,Other AttributesOrderInventoryPurchaseOrderNo,tablePreparedEmployeeNoAuthorizedEmployeeNoVendorNoPODateReceiveOrderReceiptNo,tableEmployeeNo VendorNo,PaymentNoPurchaseOrderNoReceiptDateMakePaymentPaymentNo,tablePreparedEmployeeNoAuthorizedEmployeeNoVendorNo AccountNo,PaymentDate, PaymentAmount,FlowerInventoryProductNo,,Description, QtyOnHand, ListPriceCashAccountNo,,AccountType, Bank, AccountBalanceVendorVendorNo,,tableVendorName VendorAddress,BalanceEmployeeEmployeeNo,,tableEmployeeName EmployeeAddress,DateStarted JobTitle, PhonetableFlowerInventoryOrderInventorytablePurchaseOrderNoProductNoQtyOrdered, OrderPricetableFlowerInventoryReceiveOrdertableProductNoReceiptNoProductCondition
Note:
For OrderInventory table, we do not need to have ProductNo as a foreign key to link FlowerInventory table. Instead, FlowerInventoryOrderInvetory table will link the OrderInventory table and FlowerInventory table together.
For ReceiveOrder table, we do not need to have ProductNo as a foreign key to link FlowerInventory table. Instead, FlowerInventoryReceiveOrder table will link the ReceiveOrder table and FlowerInventory table together.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
