This website uses cookies to ensure you have the best experience. Learn more

Computer Information System Brief Essay

1150 words - 5 pages

Computer Information System Brief

University of Phoenix
Accounting Information Systems
ACC 542

Jan 28, 2012

Computer Information System Brief
Kudler Fine Foods a premier gourmet grocery store is considering the best methods to integrate technology into its business operations. Kudler currently has three store locations in southern California and is considering adding a fourth store in Carlsbad (Kudler Fine Foods Virtual Organization, 2011). Currently the organization uses Microsoft Retail Enterprise Management System (REMS), Quick Books, and Microsoft Excel for their software needs and has a system of microcomputers and server at each store. This brief will discuss an analysis of ...view middle of the document...

Using REMS as a point-of-sale system Kudler meets their unique requirements and allows the organization “…to drive retail across channels, locally or globally, with technology and features that connect, empower, and offer the needed insight for proactive execution” (Microsoft Dynamics ERP: United States, 2012, para. 2). The current accounting system working across different software platforms entails the completion of certain accounting functions by manually re-inputting data, which is inefficient and prone to errors.
The current system is simple and easy for the employees to implement. The hardware needed in each store consists of a series of microcomputers, one of which works as a server, which is low in cost and needs less sophisticated IT support. The system in each store is not connected to the Internet for customer interaction that minimizes the possibility of external hacking. Microsoft REMS point-of-sale software is an extremely flexible and gives employees relevant information “…to make the most of face-to-face time with customers” (Microsoft Dynamics ERP: United States, 2012, para. 4).
Currently there is no way to integrate the business operations from all locations. Each location’s hardware system is set up to function as three separate networks and access to the Internet is only available through a 56k modem. Based on the Kudler network diagrams for each store there does not seem to be an integrated backup system in place or procedures in place for recurring backups or recovery in case of a system crash. Errors in the integrity of accounting and finance data and transactions are increased by the manual re-inputting of information from the point-of-sale system and excel spreadsheets into the general ledger. The organization is not currently taking advantage of all the functionality of the point-of-sale software.
Time sheets are filled out manually by employees and entered into Quick Books to complete payroll leading to poor internal controls and manipulation (Kudler Fine Foods Virtual Organization, 2011). A firewall or other system does not seem to be in place to protect proprietary information from spyware or virus attacks. Reports from each store for sales and human resources are not centrally located and therefore not easily accessible to management for effective decision-making.
Kudler Fine Foods has a variety of opportunities available to improve and increase their technology and software efficiencies and become a competitive organization. Microsoft REMS will allow the company to expand seamlessly into a full service website and “…offers one powerful, agile, and simple solution that connects retail enterprises from end to end, helping to drive growth and foster customer relationships” (Microsoft Dynamics ERP: United States, 2012, para. 7). The Kudler Strategic Plan is considering implementing a preferred customer rewards program and...

Other assignments on Computer Information System Brief

Secutiry Threats Essay

452 words - 2 pages Security Threats Computer security is no longer just an organization’s concern but everyone’s who uses their computer to access the internet. Anyone who uses their personal computer to access the internet faces potential security threat. This document will identify all the potential security threats on a personal computer and some techniques an attacker might employ to access information on the file system. Security threats can be broadly

Human Resources Information Systems Essay

4923 words - 20 pages UNIT 8 HUMAN SYSTEMS RESOURCE INFORMATION Structure 8.0 8.1 8.2 8.3 8.4 8.5 8.6 8.7 8.8 8.9 Objectives Introduction Information: Some Basic Guidelines Human Resource Information at Macro Level Human Resource Information at Micro Level Effective Human Resource Information System: Some Approaches Why Computerise Personnel Records and Information Systems? Computer Applications in Human Resource Management: An Overview


647 words - 3 pages it the computer itself would be a lost source. RAM (Random Access Memory) Often confused with the hard drive, RAM stands for Random Access Memory and is the most common type of memory used in computers. A computer's RAM is the memory used to store data and programs on a temporary basis. The RAM is compared to short-term memory, as it stores applications and information that is actively used while the system is on. In comparison, the hard


3050 words - 13 pages the magic comes from the software – the set of instructions that tell the computer how to process and display data (and we’ll talk more about that in the following classes). * Most of the magic comes from the way people use the information produced by the computer, and (most importantly) the way they recognize, manage, and overcome the limits of computer-based information. To understand and manage these limitations, you need to have a

Acceptable Use Policy

805 words - 4 pages company by the clients. Just as “Employee Smith” would safeguard his home computer against a malware attack, so should he protect the company’s computer from a malware attack. The following will outline the acceptable use of Cooley’s assets regarding Internet and email access and the actions that are prohibited. Cooley Investment’s computers, computer files, e-mail system, Internet access and any software furnished to employees are company


435 words - 2 pages 1. WHAT IS MIS? MIS is short for management information system or management information services. Management information system, or MIS, broadly refers to a computer-based system that provides managers with the tools to organize, evaluate and efficiently manage departments within an organization. In order to provide past, present and prediction information, a management information system can include software that helps in decision making


259 words - 2 pages necessary for the protection of a multilevel computer system; identifying the role of management and policy issues in computer security. This report/paper significantly expanded the scope of computer security to include the following: securing the data, limiting random and unauthorized access to said data, and involving personnel from multiple levels of the organization in matters pertaining to information security. 3. Consider the information

Data Information And Information System

2370 words - 10 pages . COMPONENTS OF AN INFORMATION SYSTEM Data Input that the system takes to produce information Hardware A computer and its peripheral equipment: input, output, and storage devices; hardware also includes data communication equipment Software Sets of instructions that tell the computer how to take data in, how to process it, how to display information, and how to store data and information Telecommunications Hardware and software that facilitate fast

The Differences Between Ethics And Law

552 words - 3 pages THE DIFFERENCES BETWEEN ETHICS AND LAW DEFINITION OF ETHICS In general, ethics is a moral philosophy where a person makes a specific moral choice and sticks to it. On the other hand, ethics in computing means moral guidelines to refer to when using the computer and computer networks. This includes the Internet. DEFINITION OF LAW Law is a legal system comprising of rules and principles that govern the affairs of a community and controlled by a

It Cannot Only Be Linked, It Has To Be Designed

1489 words - 6 pages repertory of knowledge. The Memex ideal machine consisted of many wide sections of information encrypted on microfilm. This allows users to browse from one text to another with the help of links. It also gives users the possibility to add their own thoughts or notes about the topic and make connections with other sources. The machine served, as what we know today, as a hard drive in a server, which keeps the information registered into the system

Problem Scope And Objective In Software Project Management

504 words - 3 pages capabilities.[5] Acrobat and Reader are widely used as a method of presenting information with a fixed layout similar to a paper publication. How do I install Java ? The procedure to download Java broadly consists of: 1. Download and Install 2. Enable and Configure 3. Test Installation The following software will be installed on your computer: 1. Java download, which includes the Java Plug-in software and the Java Virtual Machine

Similar Documents

System Inventory Essay

650 words - 3 pages . | | | | | | | | Option 2: General IT System Inventory Complete the following chart, filling in information for each system. Add rows to the chart as necessary. |Industry or Business Type|System Name |Brief Description |Target Departments |Purpose |Would Connect With | |Trucking/National |Fleet Truck |Relational database and an |Fleet Maintenance |DBMS will house all the

Online Course Registration System Essay

2760 words - 12 pages Group | Brief Description | In this case students can create and participate in one group in order to work together in large Homework Submissions like project and store in there group. | Actor | Student. | Precondition | Logged in the system. Logged in his/her account by using username and password | Basic flow | 1. Verify user information. 2. Choose Group link. 3. Choose create group link. 4. Choose one from the listed

Computer Viruses Essay

1026 words - 5 pages transactions. A computer security risk is any action that could cause loss of information to software, data, processing incompatibilities or damage to computer hardware. An intentional breach in computer security is known as a computer crime, which is slightly different from a cybercrime. A cybercrime is known as illegal acts based on the Internet and is one of the FBI's top priorities. There are several distinct categories for people that

Computer Organization Essay

1348 words - 6 pages . It also deals with the input units of the computer which receive information from external sources and the output units which send computed results to external destinations. The input, storage, processing, and output operations are governed by a list of instructions that constitute a program. We should understand Computer Architecture in order to structure a program so that it runs more efficiently on a real machine. In selecting a system to