• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15

The organization that I have chosen and wish to use for my study is "The Fun drive Company" which was established in the year 1987.

Extracts from this document...

Introduction

Introduction The organization that I have chosen and wish to use for my study is "The Fun drive Company" which was established in the year 1987.It has been running successfully all over the U.A.E. The company deals with spare parts, tyres and batteries. It has earned the reputation of being one of the best companies in the U.A.E. It has its warehouse in Jumeriah and its office is in Deira, Muraqqabat Street. The Chief Executive Officer and the Managing Director manage the company. There are three departments in the company and there are different managers appointed by the C.E.O to manage the Purchases Department, the sales department and the Stock Department. Each of these departments have 20 employees working under them. The organization was a Private Limited Company initially but recently it converted into a Public Limited Company. The C.E.O has delegated certain tasks to the employees that is given them a certain authority to perform particular tasks. Working Of The Existing System The company purchases its stock from its wholesalers who in return send the company a Performa invoice stating the quantity of the stock and the price, the company accepts the invoice and also informs the wholesalers about their method of payment i.e. T.T. or L.C. The stock is then delivered to the company and is stored in the warehouse. When a dealer requires goods it places an order to "The Fun Drive Company" through fax or phone. In special cases the company sends its salesman over to the dealers and the salesman gives the dealer a form containing details of the goods provided by the company. Forms are typed out, with a help of a typewriter, and these forms are sent, through fax to the dealers who have placed their orders. The dealers then fill out the form, which inquires about their name, address, and contact number, quantity of items required and their method of payment whether by cash or cheque. ...read more.

Middle

The problem in the working of the company as I have mentioned before is the manual system, which gives rise to a lot of errors. The objective of the use of the computer is to reduce wastage of time, effort, paper and space. Since there are various documents to be generated, their contents would vary so the necessary data has to be obtained. In the company a lot of work has to be done. These include calculating wages of the employees, updating of employees details. If all these calculations and records are done manually then mistakes can be made. Doing all these things on the computer system will not even take quarter of the time. By using this software the company will be able to produce records and databases about customers and suppliers quickly and accurately. This will also enable them to become more efficient. Microsoft Access has many options and they are as follows: > A report is an effective way to present data in a printed format. Because you have control over the size and appearance of everything on a report, you can display the information you want to see. Most of the information in a report comes form an underlying table, query which is the source of the reports data. Other information in the report is stored in the report's design. > You use queries to view, change and analyze data in different ways. You can also use them as the source of records for forms and reports. The most common type of query is a select query. A select query retrieves data from one or more tables using criteria you specify and then display it in the order you want. > You can use forms for a variety of purposes. Most of the information in a form comes from an underlying record source. Other information in the form is stored in the form's design. ...read more.

Conclusion

Security Strategies would also include Anti hacking programs, which would be prevent files from being hacked. The Anti Virus Program would protect the data from any virus. Read-only passwords could be put on certain files so that a person would be able to view the file but won't be able to make any changes to it. Interview An Interview was conducted with John Ibrahim, the manager of "The Fun Drive Company". Q. What is your job description? Ans. My job requires a lot of attention. There is a lot of paper work to do. I have to make sure there is enough staff to satisfy dealer's requirements. I have to see whether my company stands out in terms of quality. Q. How is information Received? Ans. I receive information about all the dealers from the questionnaires handed to them at the beginning of the transaction. I also receive information by conducting a general survey every 2 months. Through these surveys we find out the status of the company in the market and the level of customer satisfaction and popularity. Q. What accounts do you prepare? Ans. A Trading And Profit And Loss Account is prepared and also a Balance Sheet is prepared. These Accounts are primed in order to find out the profit of the company. Q. What outputs are generated and where are they stored? Ans. Reports are generated from the data stored on the stock, dealers and employees files. These reports are then stored in cabinets. The Dealers report is generated from the Dealers File and it contains the Dealers personal information. The Stock Report is originated from the Stock File and it contains detailed information about the products in stock. The Employees Report is procreated from the Employees File and it contains meticulous information about the employees salary, wage rate, hours worked etc. Q. What are the problems encountered? Ans. The data entered might not be accurate. It's time consuming and the reports generated may not be clear and professional. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Networking Diagrams and Case Study

    3 star(s)

    They require a connection between each of the stores/head office, allowing networking between each of the stores/head office. The VPN would allow this; we would connect each of the individual LANs to a Cable/DSL Model that would then allow connection to the internet and from that, access to the Dingo Mobile VPN.

  2. Visual basic

    * Each text character has an associated code. * There are various "types" of numbers depending on the number of digits and decimals needed (e.g., integer, float, double), each has different storage requirements. * The data type indicates the type of information that will be stored in a variable or constant and the amount of space (number of bytes)

  1. System Analysis The aim of the Jewellery store system is to make the work ...

    o Phased implementation: The new system is introduced in phased manner. o Pilot implementation: In this implementation, the new system is installed in parts. Some part of the new system is installed first and executed successfully for considerable time period.

  2. GCSE I.T Security Case Study - Riverside Leisure Centre

    data and against accidental loss or destruction of, or damage to, personal data. Data must be kept private and secure. This means that the data controller must ensure that data is backup up regularly, virus checked, and restricted to named authorised persons by means of passwords or other means.

  1. Smart Card System

    This is due to the lack of upgrading of hardware and software in the old systems. c) Speed Issues The speed of Java application is not fast enough if it has not yet been converted into native code. With ever-faster computers available at bargain prices, Java should be fast enough for all, but the most-intensive programs.

  2. System I designed in order to produce a promotion package for her newly formed ...

    feedback to improve my system 25/10/00 - Prepare data collection sheets and enter a suitable sample by hand 27/10/00 - Produce database as detailed in design specification 29/10/00 - Produce user guide for client 1/11/00 - 1st Submission date. Research completed and data files created with evidence of testing 3/11/00

  1. Hardware and Software

    graphic applications have and they will have more room to see the network. They can change from 17" to 21" a monitor which is an ideal for designers. Benefits: 1. Makes Clicking Easier - it's easier to click on larger targets.

  2. Propose to research the WTLS or Wireless transport layer security protocol along with the ...

    are updated New keys are calculated at every n = 2key_refresh messages, ie, when the sequence number is 0, n, 2n, 3n etc. Data path from WAP device to the Internet4 4The graphic above shows the model of how a WAP device communicates with the wired Internet.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work