Thursday, August 27, 2020

Summer Training Report on Delhi Transco Limited Essay Example For Students

Summer Training Report on Delhi Transco Limited Essay Flawless PROFESSIONAL UNIVERSITY DEPARTMENT OF MANAGEMENT Report on Summer Training TITLE: Analysis of budget report In halfway satisfaction of the Requirements for the honor of Degree of Master of Business Administration Submitted by: Sweta kumari 10904523 DEPARTMENT OF MANAGEMENT LOVELY PROFESSIONAL UNIVERSITY PHAGWARA Certificate by the Guide Certificate that this paper depends on a unique task concentrate by sweta kumara under my direction. This has not framed nuts and bolts for the honor of any Degree/Diploma by any college. Spot : Phagwara(Punjab) Guide Signature (Mr. Harendra ) Student Declaration I proclaim that the task named ‘ ANALYSIS OF FINANCIAL STATEMENT’is a unique venture done by me and no piece of the undertaking is taken from some other venture or materials distributed or in any case or submitted before to some other Collage or college. Understudy Signature Acknowledgment I accept this open door to introduce my statements of gratitude to each one of those guidepost who truly went about as helping columns to illuminate our way all through this undertaking has prompted fruitful and good culmination of this investigation. We will compose a custom article on Summer Training Report on Delhi Transco Limited explicitly for you for just $16.38 $13.9/page Request now We are extremely appreciative to our guide MR. HARENDRA sir for furnishing us with a chance to embrace this task in this college and giving all of us the offices. We are profoundly appreciative to Mr. D. N. SONDHI and Mr. R. P. AGRAWAL and Mr. D. K. Mishra for there dynamic help, important time and exhortation, entire hearted direction, genuine participation and torments taking inclusion during the examination and in finishing the task of setting up the said venture inside the time specified. Finally, We are grateful to every one of those, especially the different companions , who have been instrumental in making appropriate, solid and conductive condition and including new and new imaginative thoughts for us during the undertaking, their assistance, it would have been amazingly hard for us to set up the task in a period bound structure. Rundown of Content †¢ Introduction 1. Presentation Of Company 2. Presentation Of Topic †¢ Research Objectives †¢ Methodology of information assortment and apparatuses †¢ Limitations †¢ Analysis and understanding of information Findings †¢ Conclusion †¢ References LOGO OF DELHI TRANSCO LTD. Official SUMMARY: The task title’ ANALYSIS OF FINANCIAL STATEMENT’ is picked by me for my undertaking in Delhi Transco restricted. A financial plan is an archive that makes an interpretation of plans into cash that should be spent to complete your arranged exercises (consumption) and cash that should be c reated to take care of the expenses of completing the work (salary). It is a gauge, or educated theory, about what you will require in fiscal terms to accomplish your work. The financial plan is a fundamental administration instrument. for my undertaking report I have taken endorsed spending plan of this specific organization for most recent multi year 2008-09 and 2009-2010. for this reason I have made these strides 1. Chosen endorsed asset report of both the most recent year 2. At that point chosen office shrewd endorsed financial plan. 3. At that point chosen income articulation 4. At that point chosen salary explanation 5. Right off the bat I have determined fluctuation and rate change in difference 6. Examine the results of the above counts. Presentation Electricity assumes an essential job in our everyday life. It controls our homes, businesses, clinics and in certainty our whole economy. Electricityâ (from the New Latinâ electricus, golden like) is a general term that incorporates an assortment of wonders coming about because of the nearness and stream ofâ electric charge. At the point when we think about power, we as a rule consider electric force, and that is the means by which well utilize the term here. Power is vitality, and vitality can accomplish work. Electric force, power, is utilized to get things done for us, and no advanced society exists without it. Power is produced at places where it is efficient and worthwhile to do as such, and is moved to spots of utilization through the force lattice. Verifiably the advanced power industry utility framework was first acquainted with the world on the opening of Thomas Edison’s Pearl Street Electricity Generating Station on September fourth, 1882 at New York (United States of America). To the extent that Delhi is concerned, the position is that according to accessible records, the main diesel Power Station was built up in Delhi in the year 1905 when private English Company by name M/s. John Fleming was allowed to produce power under the arrangements of the Indian Electricity Act 1903. The previously mentioned Company was given the duty both of age and appropriation of intensity in a constrained way. That Company subsequent to getting permit nder the arrangements of Electricity Act 1903 had set up a little 2 MW Diesel set at Lahori Gate in Old Delhi. Later on, this very Company was changed over as Delhi Electricity Supply and Traction Company. In the Year 1911, the force age was increased by Steam Generation Station. In the year 1932, the administration of Central Power House was given over to New Delhi Municipal Committee (NDMC). In the field of intensity age and dispersion, an amazing advancement was accomplished in 1939 when Delhi Central Electricity Power Author ity (DCEPA) was built up. This Company was answerable for the gracefully of capacity to the territories secured by Local Bodies, to be specific, the Municipal Committees of Delhi, West Delhi and South Delhi, the Notified Area Committees of Red fort, Civil Lines, Mehrauli, Najaf Garh, and the District Board of Delhi. The flexibly of power to the Municipal Committees of Delhi-Shahdara and the Notified Area of Narela was finished by various private offices. In 1947 DCEPA assumed control over a Private Limited Company by name Delhi electric Supply footing Company Limited. Declaration of Electricity (Supply)Act 1948:-  In the year 1948,â power (Supply) Act 1948 came into power, which between alia providedâ for the constitution of a power Board in the States that was to work as a vertically incorporated power utility in the whole State, undertaking all the elements of exercises identified with power, which included power age, transmission, dispersion, supply,â arranging coordination and furthermore was to go about as administrative expert for doing different capacities coincidental and auxiliary thereto. As it were, the Electricity (Supply) Act 1948 was qualified for become a monopolistic endeavor in the field of power control by an instrument of the state and not by private part. The essential goal behind the above arrangement choice of the Government of India in accommodating the constitution of State power to all, especially in semi-urban and country zones on the grounds that till then the accessibility of power was kept to urban regions and was for the most part served by private power dissemination licenses gave under the Indian power Act 1910. Arrangement of Delhi State Electricity Board: In compatibility of the arrangements of the Electricity (Supply) Act, 1948, in Delhi, in the year 1951 the Delhi State Electricity Board (DSEB) appeared and the duty of age and circulation of power was taken over by DSEB from DCEPA. The whole staff of DCEPA and different organizations was consumed by DSEB under the current terms states of administration. Arrangement of Delhi Electric Supply undertaking by declaration of DMC Act 1957:-  â After the proclamation of the Delhi Municipal Corporation Act 1957, the DSEB was broken down and the elements of DSEB were taken over by Delhi Electric Supply Undertaking (DESU), which appeared in 1958. After the development DESU, the age and circulation of power to all the regions of Delhi went under DESU and the workers of recent DSEB were additionally consumed by DESU. Constitution of Delhi Vidyut Board:  â The Government of the National Capital Territory of Delhi vide warning No. F. 11 (10)/92-LSG/PF (II) dated 24. 02. 1997, gave under the Electricity (Supply) Act, 1948, comprised a different Electricity Board, I. e. the Delhi Vidyut Board (DVB) for the NCT of Delhi w. e. f. 24. 02. 1997 with the end goal of age and circulation of capacity to the whole are of NCT of Delhi aside from the territories falling inside the purview of NDMC and Delhi Cantonment Board. Down to earth challenges in the working of Delhi Vidyut Board:-  â The exercises of Delhi Vidyut Board from its initiation, and in actuality even earlier thereto when the exercises were being attempted by DESU, were not monetarily feasible by virtue of a few components influencing the power business remembering the elevated level of misfortunes for the framework and the incomes being not ready to meet the expense with result that like other State power Boards, Delhi vidyut Board endured working deficiency in total to the tune of Rs. 2,386. 72 crore during the period from 1995-96 to 2000-01. Also the Delhi Vidyut Board was required to make sufficient arrangement for awful and dicey obligations. The combined impact of every one of these elements was that the Delhi Vidyut Board was not in a situation to meet its monetary commitments and duties including the installment for power bought from age companiesâ and providers, such NTPC Limited,â Nuclear Power Corporation Limited, national Hydroelectric Corporation Limited,etc. Unbundling of Delhi Vidyut Board in six elements:  â In the ongoing for lightening the worries of customers in the force part, a few changes began picking up energy. That very way so as to protect the general interests of the buyers GNCTD accepting some strategy activities as because of which DVB was part into six Companies, viz. ,Â

Saturday, August 22, 2020

Americans Motivation to Work Essay -- Labor Supply Economics

American's Motivation to Work Most of Americans get up every morning and go to work so as to procure cash. Be that as it may, what are the genuine helpers for working and where do they originated from? How pay rates and different types of pay influence the amount of work provided to the market? This exposition will talk about how work impacts the economy. Every individual working assumes a job in the public eye and creation yield. These are regions that should be tended to when the flexibly of work is being talked about. The inspiration to work emerges from an assortment of social, mental and monetary powers. Individuals need salary to take care of their tabs, feel that they have a job in the public arena and furthermore feel a feeling of acheivement. In spite of the fact that there is consistently a decision, that isn't working and not getting paid. Individuals pick among work and recreation as per the percieved prizes of each. The negligible utility of work mirrors the satisifaction to be picked up from included salary, just as any immediate delight a vocation may give. A laborer contrasts these fulfillments and those of recreation and picks the one that yeilds the best utility for accessible time and pay rates. As it might appear obvisous to a few, the more a specialist gets paid, the greater consolation that laborer needs to work more hours and produce more yield. Along these lines, higher wages may expand the negligible utility of an hour's work, this being a substitiute for work. Be that as it may, it can likewise have the contrary impact. This being if a wor...

Friday, August 21, 2020

Payday Loans vs Pawnshop Loans - OppLoans

Payday Loans vs Pawnshop Loans - OppLoans Payday Loans vs Pawnshop Loans Payday Loans vs Pawnshop LoansInside Subprime: Dec 10, 2018By Jessica EastoWe recently looked at the similarities and differences between payday loans and title loans. Now lets look at pawnshop loans, another option that is frequently marketed to people who need cash quick and can’t go through traditional lending channels.Remember, payday loans and title loans are forms of predatory lendingâ€"the kind that uses questionable tactics and unfair terms to bleed vulnerable populations of billions of dollars each year. Although most states have laws that regular pawnshop loans, not all pawnshop brokers follow them, and this type of lending frequently falls into the predatory camp as well.The good newsâ€"if you can call it thatâ€"is that pawnshop loans are less toxic than payday loans and title loans. The bad news is they are still risky, costly, and are unlikely to solve your financial problems.Pawnshop loans require you to put up something you own as collateral. The amount you receive d epends on the value of your possessions. However, the pawnshop broker is not going to offer a loan equal to the full value of your propertyâ€"he’s only going to offer a fraction of it. According to NOLO, the average amount of a pawnshop loan is $75 to $100. Payday loans tend to offer a bit more, with many states capping payday loan principals at $500, and you don’t need to put anything up for collateral.From there, the pawnshop owner will tell you what your fees are (they frequently don’t talk in terms of annual percentage rates [APR]) and other terms, such as your repayment schedule. Compared to payday loansâ€"which commonly have APRs of 300 to 400 percent or moreâ€"pawnshop loans have relatively low APRs. An average monthly interest rate is 10 percent, which works out to an APR of 120 percent (although they can be much higher, depending on your states regulations.) Usually, pawnshop loans have repayment terms that range from one to a few months.Imagine you are putting up you r $700 computer as collateral, and after it was valued and assessed by the pawnbroker, you walked out of the shop with a $100 loan. Even if you pay it back only one month later, your total charge would be $110, which means you technically now paid $810 for your computer.But what if you can’t repay the loan? This is where pawnshop loans are a bit less risky than payday loans. If you can’t repay a pawnshop loan, the pawnshop keeps the property you left as collateral. That’s really the only thing you lose; there is no legal requirement to repay pawnshop loans, so your credit is not affected.If you can’t repay a payday loan, however, it can hurt your credit, overdraw your bank account, incite calls from the debt collector, and even cause your wages to be garnished. Additionally, payday lenders frequently allow borrowers to rollover their debt. This gives you more time to pay back the loan, but it also adds interest and fees, which increases your debt. This can happen over and ov er again, snaring you in a debt trap that is difficult to get out of.The takeaway? Pawnshop loans are less risky than payday loans, but they aren’t the best option. Learn more about avoiding cash advance scams and alternatives to costly storefront loans.For more information on payday loans, scams,  cash advances, and  title loans,  check out our state financial guides  including, Illinois, Texas, Florida and more.Visit  OppLoans  on  YouTube  |  Facebook  |  Twitter  |  LinkedIn

Monday, May 25, 2020

Testing Your Perl Installation

In order to test our fresh installation of Perl, well need a simple Perl program. The first thing most new programmers learn is how to make the script say Hello World. Lets look at a simple Perl script that does just that. #!/usr/bin/perl print Hello World.\n; The first line is there to tell the computer where the Perl interpreter is located. Perl is an interpreted language, which means that rather than compiling our programs, we use the Perl interpreter to run them. This first line is usually #!/usr/bin/perl or #!/usr/local/bin/perl, but depends on how Perl was installed on your system. The second line tells the Perl interpreter to print the words Hello World. followed by a newline (a carriage return). If our Perl installation is working correctly, then when we run the program, we should see the following output: Hello World. Testing your Perl installation is different depending on the type of system you are using, but well take a look at the two most common situations: Testing Perl on Windows  (ActivePerl)Testing Perl on *nix Systems The first thing youll want to do is make sure youve followed the  ActivePerl Installation tutorial  and installed ActivePerl and the Perl Package Manager on your machine. Next, create a folder on your C: drive to store your scripts in -- for the sake of the tutorial, well call this folder  perlscripts. Copy the Hello World program into C:\perlscripts\ and make sure the filename is  hello.pl. Getting a Windows Command Prompt Now we need to get to a Windows command prompt. Do this by clicking on the  Start  menu and selecting the item  Run.... This will pop up the run screen that contains the  Open:  line. From here, just type  cmd  into the  Open:  field and press the  Enter  key. This will open (yet another) window which is our Windows command prompt. You should see something like this: Microsoft Windows XP [Version 5.1.2600] (C) Copyright 1985-2001 Microsoft Corp. C:\Documents and Settings\perlguide\Desktop We need to change to the directory (cd) that contains our Perl scripts by typing in the following command: cd c:\perlscripts That should make our prompt reflect the change in the path like so: C:\perlscripts Now that were in the same directory as the script, we can run it simply by typing its name at the command prompt: hello.pl If Perl is installed and running correctly, it should output the phrase Hello World., and then return you to the Windows command prompt. An alternate method of testing your Perl installation is by running the interpreter itself with the  -v  flag: perl -v If the Perl interpreter is working correctly, this should output quite a bit of information, including the current version of Perl you are running. Testing Your Installation If you are using a school or work Unix / Linux server, chances are Perl is already installed and running -- when in doubt, just ask your system administrator or technical staff. There are a few ways we can test our installation, but first, you will need to complete two preliminary steps.​ First, you must copy your Hello World program to your home directory. This is usually accomplished via FTP.   Once your script has been copied to your server, you will need to get to a  shell prompt  on the machine, usually via SSH. When you have reached the command prompt, you can change into your  home  directory by typing the following command: cd ~ Once there, testing your Perl installation is very similar to testing on a windows system with one extra step. In order to  execute  the program, you must first tell the operating system that the file is OK to execute. This is done by setting the permissions on the script so that anyone can execute it. You can do this by using the  chmod  command: chmod 755 hello.pl Once youve set the permissions, you can then execute the script by simply typing its name. hello.pl If that doesnt work, you might not have your home directory in your current path. As long as you are in the same directory as the script, you can tell the operating system to run the program (in the current directory) like so: ./hello.pl If Perl is installed and running correctly, it should output the phrase Hello World., and then return you to the Windows command prompt. An alternate method of testing your Perl installation is by running the interpreter itself with the  -v  flag: perl -v If the Perl interpreter is working correctly, this should output quite a bit of information, including the current version of Perl you are running.

Thursday, May 14, 2020

The Case Of Nancy Troy And Her Family - 1683 Words

The case of Nancy Troy and her family is undoubtedly complex and will necessitate a clinician with the ability to evaluate and address multiple dimensions of Nancy Troy and her family s lives. It will be critical for a social worker to assess the family structure, the impact of violence, trauma, mental illness, and substance abuse, and finally, cultural considerations in order to address all the needs and areas of improvement presented by the Troy family. Family Structure There are several concerns and potentially problematic issues within the Troy family related to family structure that could be impeding on family functioning. Family structure, according to Goldberg and Goldberg (2008) provides a framework for understanding†¦show more content†¦From a structural therapy perspective, it would be important to work on re/defining and restructuring the family so that it can operate in a more functional and healthy way. Clarifying and defining the boundaries between Nancy and her children, particularly Sarah, will be critical in trying to erode the enmeshment that is currently occurring. These treatment goals might be more difficult to achieve with Melanie and Amy considering they are currently living with their great grandmother; however, effort on the social workers part should still be made. Trauma and Violence Nancy, both as a child and as an adult, as well as her children, have experienced significant trauma and possibly family violence. Most likely, some of the most significant experiences Nancy faced were the unexpected loss of her mother, sporadic homelessness, and constant change of her home environment. The death of Nancy s mother would have been a significant life transition for her. Increasing that impact of her mother s death is the actuality that Nancy was left as the only female in the family system, perhaps leaving her feeling like she had to fulfill the role of her mother. A study conducted by Case and Ardington (2006) found that paternal death, particularly maternal death, was a strong predictor of poor schooling outcomes. Maternal orphans were significantly less likely to be enrolled in school andShow MoreRelatedSports, Crime, And Money : Athletes Gone Wrong776 Words   |  4 Pagesits victim. Credibility: My whole life I have been a daughter and granddaughter of police officers. I am also a member of the Marion County Domestic Violence Task Force. So I have seen firsthand of how domestic violence affects a person and their family. II. According to Justice.gov, sponsored by The United States Department of Justice Accessed on April 6, 2015 and updated on July 23, 2014, domestic violence is defined as a pattern of abusive behavior in any relationship that is used by one partnerRead MoreTorvald Helmer And Troy Maxson1965 Words   |  8 PagesMonica Therrien Nancy Slavin English 105 18 March 2015 Torvald Helmer and Troy Maxson in Comparison It is a common assumption to believe that men are to be masculine, protective, and a provider to their families. That is especially the case in the time period both, A Doll’s House and Fences were written in, the 19th and 20th centuries. Torvald Helmer and Troy Maxson, were alike in many ways, but also so very different, each man loved and provided for his family in different ways, but both wereRead MoreFemale Serial Killers : A Serial Killer Essay1190 Words   |  5 Pageskillers. Wuornos was a white female from Florida in her mid-thirties during the time of the different murders she committed. All of her victims were killed along the highways of central and northern Florida during 1989 and 1990. Wuornos worked as a prostitute and was hitchhiking when she was picked up by her victims (Hart, 2002).. There were seven victims all ranging from forty to sixty five years of age including Richard Mallory, Dick Humphreys, Troy Burress, David Spears, Walter Gino Antonio, PeterRead More Women in Homers Odyssey Essay1960 Words   |  8 Pages     Ã‚  Ã‚   As Agamemnon tells Odysseus, â€Å"Let it be a warning even to you. Indulge a woman never, and never tell her all you know. Some things a man may tell, some he should cover up.† (P.199, Book XI) This is not a revelation for the wayward King. Odysseus treats all women he encounters with the same caution alluded to by Agamemnon when the shade tells him how his treacherous wife Clytemnestra acted in a way that defiled all women kind. Agamemnon is giving words to the concept of women that existedRead More Women and Deception in Homers Odyssey Essay1986 Words   |  8 PagesWomen and Deception in the Odyssey      Ã‚  Ã‚   As Agamemnon tells Odysseus, â€Å"Let it be a warning even to you. Indulge a woman never, and never tell her all you know. Some things a man may tell, some he should cover up† (Book XI   199).   This is not news to Odysseus, who treats all women with caution ever since he was betrayed by his wife Helen, who acted in a way that defiled all womankind. Agamemnon did not come to this realization all by himself, however; his statement represents the common sentimentRead MoreLove, Sex and Gender in the World Religions Essay4945 Words   |  20 PagesLove, Sex and Gender in the World Religions Edited by Joseph Runzo and Nancy Martin Introduction Two forces which gathered strength in the last half of the twentieth century now dominate the world religions at the beginning of the twenty-first century. The first is the globalization of religions and their resulting encounter with each other, and the second is the need to redefine attitudes toward gender as women have stepped forward to insist that their full humanity be acknowledgedRead MoreStrategy Management18281 Words   |  74 PagesConfirming Pages Strategic Management CONCEPTS CASES FRANK T. ROTHAERMEL Georgia Institute of Technology rot12737_fm_i-xlvi.indd iii 17/11/11 7:37 PM Confirming Pages STRATEGIC MANAGEMENT: CONCEPTS AND CASES Published by McGraw-Hill/Irwin, a business unit of The McGraw-Hill Companies, Inc., 1221 Avenue of the Americas, New York, NY, 10020. Copyright  © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Printed in the United States of America. No part of this publicationRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 Pages vi BRIEF CONTENTS 4 The Organization System 16 Organizational Culture 511 17 Human Resource Policies and Practices 543 18 Organizational Change and Stress Management 577 Appendix A Research in Organizational Behavior Comprehensive Cases Indexes Glindex 637 663 616 623 Contents Preface xxii 1 1 Introduction What Is Organizational Behavior? 3 The Importance of Interpersonal Skills 4 What Managers Do 5 Management Functions 6 †¢ Management Roles 6 †¢ ManagementRead MoreHbr When Your Core Business Is Dying74686 Words   |  299 PagesExecution Donald N. Sull and Charles Spinosa 90 The Leadership Team: Complementary Strengths or Conï ¬â€šicting Agendas? Stephen A. Miles and Michael D. Watkins 100 Avoiding Integrity Land Mines Ben W. Heineman, Jr. 20 33 FORETHOUGHT HBR CASE STUDY Why Didn t We Know? Ralph Hasson 45 FIRST PERSON Preparing for the Perfect Product Launch THOU SHALT †¦page 58 James P. Hackett 111 TOOL KIT The Process Audit Michael Hammer 124 BEST PRACTICE Human Due Diligence Read MoreDeveloping Management Skills404131 Words   |  1617 PagesUnderstanding and Appreciating Individual Differences Important Areas of Self-Awareness 61 Emotional Intelligence 62 Values 65 Ethical Decision Making and Values 72 Cognitive Style 74 Attitudes Toward Change 76 Core Self-Evaluation 79 SKILL ANALYSIS 84 Cases Involving Self-Awareness 84 Communist Prison Camp 84 Computerized Exam 85 Decision Dilemmas 86 SKILL PRACTICE 89 Exercises for Improving Self-Awareness Through Self-Disclosure 89 Through the Looking Glass 89 Diagnosing Managerial Characteristics 90

Wednesday, May 6, 2020

Joyce Carol OatessWhere Are You Going, Where Have You Been

Fiction Analysis Paper: Where are you going, where have you been? Joyce Carol Oates’s Where are you going, where have you been? is a post-modernist story. The primary theme is childhood versus adulthood. The story explores Connie’s, the main character’s, ambivalence about adulthood. The plot of the story builds the theme. Throughout the story, Connie believes that she is playing 2 personas. One that is child-like, and innocent, and another that is lascivious and â€Å"adult-like† to the extent that she knows adultness. In the beginning, she is undoubtedly convinced that she wants adulthood; however, she doesn’t understand all the implications, and she becomes ambivalent when faced with the reality of adulthood, personified by the character†¦show more content†¦It’s safe to say that Connie’s conception of adulthood also includes a notion of â€Å"independence,† separate from her family, but accompanied by a male admirer. June’s personality and interests foil with Connie’s and their mother’s constant comparisons cause Connie to resent June, and because June lives with them, this also likely attests to her desire for pseudo-adulthood. Her father is completely uninvolved, and because Connie specificall y lacks the love of and closeness with her father, the pseudo-Freudian approach suggests that this could have a direct influence on her quest for pseudo-adulthood, which I defined as consisting of male attention, and her conception of independence. Now straying from her family, I’ll explain Eddie’s significance to the theme. Eddie gives the reader better insight into Connie’s character. The time Connie spends with Eddie in the alley shows the reader that her understanding of adulthood is lacking, and that she is just teetering around the line between childhood and adulthood, but keeping one foot neatly planted on childhood’s side. This becomes more obvious later in the story, once she encounters Arnold Fiend. Those 3 hours had to have been spent engaging in what was considered â€Å"adult-like,† but not quite adult. A lot couldn’t have happened, and the 2Show MoreRelatedJoyce Carol OatessWhere Are You Going, Where Have You Been?1554 Words   |  7 PagesMystical voices of unity and liberty filled the youths spirits in the 1960’s, sparking what may have been America’s â€Å"golden ages†. For baby boomers, however, the new generation was being poisoned by talks of rebellion and uprising. Joyce Carol Oates, the author of â€Å"Where Are You Going, Where Have You Been?†, begins by introducing Connie, a stereotypical 15 year-old in the 1960’s, who voices the arrogance of the youth. Connie’s passion for glancing at every reflective surface she passes by, her attempts

Tuesday, May 5, 2020

Potential Risks of computerized information system

Questions: 1.What is the Potential Impact of Each Risk to Fruito? 2.Recommend Which Internal Controls should be implemented by Fruito.How do these Controls Mitigate the risks you have Identified? 3.Prepare a Summary of your Findings for the CFO. Answers: Introduction The report has been made for Frutio for understanding the concept of computerized information system for the accounting operations of the company. The report would highlight the risks faced while using the information system, their impact on the business structure and provide mitigation strategies for managing the information system of the company. 1. Potential Risks of computerized information system The potential risks of the computerized information system for accounting operations of Frutio are intentional and non intentional entry of wrong data, accidental loss of data and information, unauthorized access, natural disaster, computer viruses, theft of data, and interception of process (Schneider et al., 2014). They have been explained below: Intentional and non intentional entry of wrong data: The primary issue made by person involved for entering the data about the stock ordered or delivered in the organization (Willcocks, 2013). The wrong data entered by the person in charge of the information system can be accidental and deliberate too. Accidental Deletion of data and information: The data and information of the fruits and vegetable can be lost due to the some technical issues (Li, 2014). It is possible that the file containing the data gets corrupted and deleted during the operations of the organization. Unauthorized access: The information system runs on virtual security system and it can be accessed using right means of the technology (Schneider et al., 2014). The system is prone to get hacked into for infiltrating information like name of suppliers and customers of the company. Natural disaster: The natural disaster is the most uncalled system failure that can happen any time without any consent (Willcocks, 2013). The natural disaster includes data lost by fire or any breakage. It happens without anyones initiation. Computer viruses: The computer viruses, malware, and Trojans are responsible for malfunctioning of the computerized systems (Li, 2014). It would hinder the processing of the information system for the stock information input. Theft of data: The theft of data is an external issue and it is caused by any way extracting information from the system. The rivals and competitors can extract the data from the information system using methods of hacking and phishing. Interception of process: The process of the information inputting into the system can be intercepted from outside and the result of the process would be halting of the process of data storage. Potential Impact of risks The impact of the risk factors like intentional and non intentional entry of wrong data, accidental loss of data and information, unauthorized access, natural disaster, computer viruses, theft of data, and interception of process have been explained below in the table: Risk Factors Potential Impact on the company Intentional And Non Intentional Entry Of Wrong Data Wrong data is entered Overall calculation of stock is miscalculated Accidental Deletion Of Data And Information No information for stock inventory is present Final Balance and accounts book cannot be prepared Unauthorized Access Data and information can be modified Extraction of the data from the database would result in violation of privacy (Covello Merkhoher, 2013) Natural Disaster Loss of important data and information Re-entering of the data set Computer Viruses Slowing the processing of the system Malfunctioning of the computer system Theft Of Data Misuse of the data by rival competitors Loss of customers contact information Interception Of Process Not being able to complete the data processing Growth in customers dissatisfaction due to issues in service (Joyce et al., 2016) Table 1: Risk Assessment Factors (Source: Goble Bier, 2013, pp-1950) 2.. Recommended Internal Controls and their mitigation on risks Each of the risk factors mentioned in the report have to be dealt for making sure that the information system processing for the accounting data can be done successfully (Mehta et al., 2014). The risk mitigation strategies and their operations on the risks are given below: Risk factor Risk Mitigation Control Function of the risk mitigation control Intentional And Non Intentional Entry Of Wrong Data Double Checking the data entered Wrong entered value would be detected and corrected Employing a supervisor for cross checking the data entered by the employee Wrong entered value would be detected and corrected, the employee should be dealt with Accidental Deletion Of Data And Information Keeping the data stored in a recovery platform The data deleted can be recovered Information system design should prompt permission before deleting any file The deletion of data by mistake can be avoided Unauthorized Access Password for accessing into the system No one can access the information system without the password Limiting the users into the password Chances of password being shared would become minimum Natural Disaster Data backup should be kept Data would be stored in a separate platform System should be made with auto recovery option System would be able to retrieve data automatically Computer Viruses Antivirus should be used in the system Detection and Deletion of virus and other Trojans Untrusted sites and server should not be accessed No scope for malware to inflict into the system Theft Of Data Data theft detection software must be used Theft of data can be stopped and halted Data should be encrypted Even the theft data could not be misused Interception Of Process Troubleshooting for detecting any hindrance in the process Interception can be dealt and process can be continued Process Recovery options The stopped process can be restarted with the system reboot Table 2: Risk Mitigation Strategies (Source: Prasannakumar, 2012, pp-212) 3. Summary of the report The potential risks for the information system are intentional and non intentional entry of wrong data, accidental loss of data and information, unauthorized access, natural disaster, computer viruses, theft of data, and interception of process and they can affect the processes of the organization by slowing, hindering, halting, data theft and economically bringing loss to the organization. The use of risk mitigation techniques like backup and recovery, security system, troubleshooting option, and antivirus would be helpful for supporting the information system of the organization. The tabular representation of the findings of the report has been given below: Findings Description Risk factors for Fruito The risk factors for the information system of Fruito are intentional and non intentional entry of wrong data, accidental deletion of data and information, unauthorized access, natural disaster, computer viruses, theft of data, and interception of process Impact of risk factors on the operations of Fruito The impacts of the risk factors on the operations of Fruito are wrong calculation of stock, no information for stock inventory, extraction of the data, result in violation of privacy, loss of important data and information, slowing and malfunctioning of the computer system, misuse of the data, and loss of customer. Risk Mitigation Strategies for Fruito The risk mitigation strategies include employment of a supervisor for cross checking, password for accessing into the system, data backup and auto recovery option, use of antivirus, not assessment of non-trusted sites and server, encryption of data, and provision for troubleshooting. Conclusion It can be concluded from the report that the use of above mentioned risk mitigation methods are very useful for dealing with the issues of risk factors in the organization of Fruito. The methods shown in the report would help in forming the appropriate information system solution for the organization. References Covello, V. T., Merkhoher, M. W. (2013).Risk assessment methods: approaches for assessing health and environmental risks. Springer Science Business Media. Goble, R., Bier, V. M. (2013). Risk Assessment Can Be a Game?Changing Information TechnologyBut Too Often It Isn't.Risk Analysis,33(11), 1942-1951. Joyce, D. L., Li, Z., Edwards, L. B., Kobashigawa, J. A., Daly, R. C. (2016). Predicting One-Year Cardiac Transplant Survival Using a Donor/Recipient Risk Assessment Tool.The Journal of Heart and Lung Transplantation,35(4), S58-S59. Li, W. (2014).Risk assessment of power systems: models, methods, and applications. John Wiley Sons. Mehta, H., Goedvalk, C., Barber, R. (2014). INCIDENCE AND RISK FACTORS FOR CENTRAL VENOUS CATHETER RELATED THROMBOSIS IN PICU AND DEVELOPMENT OF A RISK ASSESSMENT TOOL.Pediatric Critical Care Medicine,15(4_suppl), 125. Prasannakumar, V., Vijith, H., Abinod, S., Geetha, N. (2012). Estimation of soil erosion risk within a small mountainous sub-watershed in Kerala, India, using Revised Universal Soil Loss Equation (RUSLE) and geo-information technology.Geoscience Frontiers,3(2), 209-215. Schneider, E. C., Ridgely, M. S., Meeker, D., Hunter, L. E., Khodyakov, D., Rudin, R., ... Harpel, J. (2014). Promoting patient safety through effective Health Information Technology risk management.Santa Monica, CA: RAND. Willcocks, L. (2013).Information management: the evaluation of information systems investments. Springer