Premium Essay

Nt1330 Unit 4 Case Study Answers

Submitted By
Words 547
Pages 3
Purchasing requests are controlled and started by a computer system that tracks the inventory level and purchasing requests seem to be approved by the computer instead of being checked and approved before it is made available to the clerks in the inventory control department who assume that it is correct. Unnecessary items may be requested by the computer when it tracks that item is in shortage which can lead to the ordering of unnecessary items due to the purchasing request not being approved by the department’s manager.
2. Inventory is not counted physically rather it is counted by the computer which tracks the level of inventory, overtime the inventory records will probably become inaccurate and will need to be physically counted, computers are also unable to account for the possibility of theft, hence the need for periodic …show more content…
The inventory clerk may add new suppliers to the supplier list without prior approval, and as a result the supplier file may include suppliers that the company doesn’t need to do business with.
4. The selection of suppliers is based upon preapproved vendors that the company has done business with in the past, this can be a hindrance because if new vendors who sell quality products for cheap are in the market, the company will miss out on doing business with the new vendors for a low cost, and in the case that the current vendor list contains suppliers whose products begin to lose quality, the computer may select that supplier and the company will order products of inferior quality.
5. Employees who receive the ordered products tend to unload deliveries without prior verification of an approved purchase order, this wastes time because the company will have to contact the supplier regarding unordered items later on.
6. During busy and hectic times, receiving department staff can fail or forget to inform purchasing regarding errors between the amounts received and ordered, causing a delay or failure in settling errors in a prompt

Similar Documents

Premium Essay

Test

...Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone...

Words: 2305 - Pages: 10

Premium Essay

Nt1230 Syllabus

...aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420...

Words: 1834 - Pages: 8

Premium Essay

Nothing

...practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580 | | | NT2670 | NT2640 | | PT2520 | | Introduction to | | | | | | | | | | | Email and Web | | | | | Information | | | | IP Networking | | Database Concepts | | | | | Services | | | | | Security | | | | | | | | | | | | | | | | NT1330 | | | NT1230 | NT1430 | | PT1420 | | Client-Server | | | Client-Server | | | Introduction to |...

Words: 10839 - Pages: 44