Thursday, January 17, 2019
Automated Sales and Inventory System Essay
2.1 Background of Studyin figation formation is a collection of ironwargon, package and people that work unneurotic to collect, store, and sort and sue information. From the very earliest moments in the modern narration of the information processing clay, the people and the business line world have witnessed the continuous goment and branch of computer arranging of rules that requires meeting the goal of teaching applied science. We have the in tout ensemble new world of information and communication readily avail subject finished computer.With its excellent standards the prop nonpareilnts decided to come up with this proposal which aim was to go away quality guest service in the business, origination a administration that monitor theme, fuck the beat of inventorying items, burn determine place or merchandiseion point, go off generate report, pot check the life-sustaining level of a harvest-time, This study would surely benefit the owner of Muella Tr ading.Mr.Muella the possessor of Muella Trading has knowledge in terms of hardware beca wasting disease he already worked at Hardware Company. With that knowledge the proprietor decided to had own business. The business started on February 8, 2009 at Guinobatan Albay by Mr. Eugine Muella and Mrs. Marites Napili Muella.The mention ships troupe has 4 employees/ agitateer. That caller-up has four category in terms of product they retail the electrical, plumbing, hardware and products use for construction.For almost two years in the industry the proprietor are using the manual of arms inventory governance. With this kind of system the performance of their transactions are very slow and it is a time consuming to their business transactions. This is the main reason why they decided to shift from manual to automated sales and inventory system. The shifting of inventory was made affirmable by the proponents to make the daily transactions of the company faster, easier and much com pleted. The system helps them to eliminate problems on sales, storage and retrieval of inventory entropy for the inventory status. 2.2 Statement of the Problem2.0 Methodology of the studyAgile is a practice-based methodological analysis for modelling and documentation of software-based systems. It is intended to be a collection of values, principles, and practices for theoretical chronicle software that can be applied on a software development project in a to a greater extent flexible direction than traditional Modelling methods. It is a built on the foundation of iterative development. Karthiksangi2009 The Home Page of Karthiksangi http//karthiksangi. ledgerpress.com/agile-methodology/The proponents used agile as their method in developing the system because of its bods, which is suited in developing the propose system.RequirementsThe offshoot step in the Agile Modelling is to line some upper-level requirements as surface as the scope of the release. The requirements withi n an agile process are more or less suggestions, and are open to more conversation by the team du circumvent other phases. The Agile method is more adaptable to changes in requirements as the project grows. The proponents identify first the tokenish and general requirements of the system they will be develop and they conducted an call into question to the company so that it would helped them in ingestting information about the requirements that needed in developing the system.Architecture and DesignThe goal of the architecture and objective phase is to try to identify an architecture that has a good chance of working. The design is derived in a modelling session, in which issues are explored, until the team is satisfied that they understand what needs to be delivered.The proponents designed a selective informationbase which is suited and receptive for the system they developed and defined the attri exclusivelyes, info entry and relationship of them. In connection with this, t he proponents created a Graphical User Interface designed that can allow users to interact with the system.DevelopmentThe system is delivered incrementally over time, in smooth staffs that have immediate business value, rather than building and then delivering a system in a single big bang release. By focusing development on diminutiveer modules, agile projects are able to control costs despite the seeming lack of planning.The proponents create, design and develop a propose system they studying. In this phase the proponent chill out in developing part and they more concentrating and focusing on creating a small module which is really required to that system.3.0 Review of Related Studies put over software Inventory SystemIt is a highly configurable system designed to improve warehouse operations. The system helps manage item master phase and defines stock locations, monitors item quantity, location and status of inventory as well as related shipping, receiving, picking and put-a way process information. The system is capable of providing robotic identification using barcodes for inventory objects which include any type of forcible assets, tools and supplies, spare parts, raw materials, finished goods, and machines.This system reduces warehouse cost and improves guest service by speeding up the goods handling process, providing transparent and accurate inventory info, improves your resource planning resulting to increased productivity and decreased labor costs.Retail and Inventory SystemThis inventory system enables maintenance and impact of sales, corrupts and inventory data to prepare transactions, documents and generate reports. It provides information useful to end reservation regarding sales, purchases and inventory monitoring. This system organizes your inventory transaction and provides useful inspect trails of inventory movements, details and histories to allow improved control over your investment. The features of the systems are the syste m has a highly control password.The system maintains item pro file cabinet, customer profile, supplier profile. The purchases facilities include purchase items and purchase return. The system too design a sales facilities include sales Items and sales exchange. The system has report facilities that include transaction argument and POS retail reports.In relation of this the proponents got an subject that it would help them in development of the system they develop. Both inventory system have a good and wonderful features that the proponents can use in in that respect system such as highly protection measures of the chopine that would benefit the focusing of the company because if it is highly security the more take into custody of system and other features that would also benefit not only for the management but to the other users also.4.0 Theoretical Framework informationbase concern System (database management system)The scheme on database management become the foundati on in creating the storage of records in propose system. A database management system (DBMS) is a computer programme that lets one or more user create and access data in database. It manages user request so that user and other programs are drop out from having to understand where the data are physically located, and in a multi-user system that else will also be accessing the data. In handling user requests, the DBMS ensures the integrity of the data. In handling user request, the DBMS ensures the integrity of the data. (That is making sure it continues to be accessible and is consistently organized as intended) and its security (making sure that only those with access privilege can access the data) A DBMS can be thought of as a file manager that manages data in database rather than files in file system. In IBMs main frame operating system, the number retrieval data managers are known as access methods. A DBMS is unremarkably an inherent part of a database product. On PCs Microsof t devil is a popular modelling of a single or small group user DBMS. Microsoft SQL Server is an example of a DBMS that enables a user to store, modify and extract information from a database. WOOD2007Relational Database Management System (RDBMS)RDBMS is a type of database management system that stores in the form of related tables. Relational database is powerful because it requires little assumption about how data are related or how this data will be extracted from the database. An central of relational system is that a single database can be allot across several tables. This differs from flat file database, in which each database is self- contained in a single table. Almost full-scale database systems are RDBMS. Small database system, however, use other designs that provide less flexibility in posing queries. CASH2005Data SecurityComputer system secures the records from unauthorized users and protects the data from loss. The proponents saw to it that all the records stored in the database are unhurt and protected. Therefore, they made use of the applications based from theory, data security. Data security is means of ensuring that the data are kept safe from corruption and that access to its suitably controlled. Thus, data security helps to ensure loneliness and protection thats why most computer system adopts security measures that involve data encryption and password. Data encryption is the transmission of data into from that is unintelligible without a deciphering mechanism. A password is a secret word or phrase that contrives a user access to particular program or system.WOOD2007 NetworkingNetworking is a system that transmits any combinations of voice, video and data amidst users. The electronic network includes the network operating system in the client and emcee machines connecting them and all supporting hardware in between such as bridges, routers and jumpes in wireless systems, antennas and towers are also part of a network. In Informat ion technology, a network is a series of points or nodes integrated by communication path. The most common topology is the bus, star, token ring and mesh topologies. Network can also be categorized in terms of spatial distance as Local Area networks (LANs), metropolitan area Network (MANs) and Wide Area Networks (WANs). A given network can also characterized by the type of data transmission technology used (for example a TCP/IP or system networks architectures) by whether it carries voices, data, both kind of signals by user (Private of Public) by the common nature of its connectives (dial up or switched, dedicated or no switch or virtual connections) by the type of physical link (for example optical fiber, coaxial cable and unshielded twisted pair.) STI2002Back-up and RestoreStoring screen up copies of software data back -up and having back up computer and communication capabilities are important basic safeguard because the data can then be restored if they are altered or destroy ed by a computer crime or accident. Computer data should be backed up frequently and should be restored nearby in secure locations in case of damage at the primary site. Transporting sensitive data to storage locations should also be done securely. HOIST20045.0 Data Gathering Procedures and compend OutputOn data gathering procedures the proponents conducted a direct interview to the company of Muella Trading. Based from that interview, the proponents where able to know the existing problem of a company. They also conducted re await and review from thesis projects of STI Legaspi. The proponents also surfed to the internet to get and gather some information which is related for the study After gathering, the proponents got viable solution to solve the existing problem met by the company in using the manual inventory system. Through the help of those data that the proponents gathered, they poll how it will apply in developing the system.6.0 Documentation of the current system6.1 Des cription of the current systemUser InformationIn this module the admin can create, edit, activate, deactivate and delete user account, including all their information but deleting data is not require or not good because if theres an animalise in the program or the system you can easily retrieve and check of those data and also for other purposes. In this module again the user can create another account but again only the admin has an authorize to do that.Supplier InformationThe proponents create a module that the admin can add, edit and delete supplier information. To make the user easier to find and view the suppliers the proponents put there an search button. The user can search by supplier code or by name.Product InformationThis module can add, edit, and delete the product information. The admin also can add category like construction, plumbing, paint and everything that the hardware has. In this module also they can add supplier, view list of the entire product as well as the su pplier of that product the selling and supplier price, including percentage of the vat and promos.Point of Sale (POS)In this module the admin and the cashier only has a right to access and give or issue a transaction. In one transaction you can add item as many as you can including its unit, quantity and the prize. When someone needs to delete item because of error the proponents put a security password for securing the transaction. It computes the total summate of sales of the transaction the discount, the amount given of the customer and computes the change. The product into the database decreases.Purchase OrderThe company purchase their product in different supplier. In this module you can identify the products that in a critical level so with this the owner of company can easily determine the product need to be orders. The proponents also include the total amount the product they order.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment