Free Essay

Sathyam Computers

In:

Submitted By abhijithr3
Words 3054
Pages 13
AMITY UNIVERSITY

MBA SECOND SEMESTER ASSIGNMENT 2014 – 16
Minor Project
Financial Fraud –Sathyam computers

SUBMITTED BY:
Abhijith Rajan
AUD 2351
MBA (GENERAL)

ABSTRACT
From Satyam, we can see that corporate book keeping misrepresentation is a noteworthy issue that is raising both in its recurrence and seriousness. Exploration confirmation has demonstrated that these developing number of fakes have made undermined the trustworthiness of monetary reports, added to generous financial misfortunes, and disintegrated speculators' certainty with respect to the handiness and dependability of money related articulations. The expanding rate of these sort of law violations need to get hardened punishments, excellent disciplines, and powerful requirement of law with the right soul. An endeavor is made to inspect and investigate inside and out the Satyam Computer's "inventive bookkeeping" embarrassment, which conveyed to spotlight the significance of "morals and corporate administration" (CG). The extortion submitted by the authors of Satyam in 2009, is a demonstration of the way that "the art of behavior is influenced in huge by human eagerness, aspiration, and crave influence, cash, acclaim and wonderfulness". Dissimilar to Enron, which sank because of "organization" issue, Satyam was conveyed to its knee because of "burrowing" impact. The Satyam embarrassment highlights the significance of securities laws and CG in "developing" markets. Without a doubt, Satyam misrepresentation "prodded the administration of India to fix the CG standards to anticipate repeat of comparative cheats in future". Therefore, major monetary reporting fakes need to be considered for "lessons-educated" and "methodologies to-take after" to lessen the occurrences of such cheats later on.

Table of content

1.Introduction
2. Impact of Fraud in an Organization
3. Literature Review
4. Research Methodology
5. The Scandal at Satyam Computer
6. The start of Satyam Computer ltd.
7. Outcome of Satyam Scandal
8. Data Analysis
9. Conclusions

Introduction
What Is Fraud?
Fraud is a deceptive activity bringing on genuine or potential monetary misfortune to any individual or element including burglary of cash or other property by workers or persons outer to the University and where duplicity is utilized at the time, instantly before or promptly taking after the action. This likewise incorporates the intentional distortion, camouflage, obliteration or utilization of misrepresented documentation utilized or proposed for utilization for an ordinary business reason or the ill-advised utilization of data or position for individual monetary advantage.
The idea of misrepresentation includes false or degenerate lead by inner gatherings or outer substances focusing on the University, or deceitful or degenerate direct by the University itself focusing on outside elements.

Impact of Fraud in an Organization:
In the course of recent decades, real open organizations have encountered budgetary misrepresentation, bringing about uncertainty in markets also loss in shareholder quality, &, sometimes insolvency of organization itself. In spite of the fact that, it is by and large acknowledged that the “Sarbanes-Oxley Act” has enhanced corporate administration & diminished the frequency of extortion, late studies and reviews demonstrate that financial specialists & administration keep on having worries about monetary explanation misrepresentation.
Literature Review
Beginning in the 1990’s, a flood of corporate fakes in the Us happened in Enron. “Approximately 63 percent of the 910 fraud cases are classified under the internal control risks”. In addition, Smith offered a “typology” of individuals who embezzle. He indicated that embezzlers are “opportunist’s type”, who rapidly identifies the absence of shortcoming in inside control and grabs the chance to utilize the insufficiency to his advantage. Essentially, Ziegenfuss performed a study to focus the sum and sort of misrepresentation happening in "state and neighborhood" governments. His study has uncovered that the frequently event sorts coercion are misappropriation of advantages, thievery, false representation and false receipt. On the other hand, Haugen and Selin in their study examined the estimation of "inward" controls, which depends generally on administration's honesty and the prepared accessibility of PC innovation, which helped with the dedication of wrongdoing. Sharma and Brahma underlined on "financiers" obligation on fakes; bank cheats could manifest in all circles of bank's managing. Significant foundation for execution of extortion is laxity in recognition in set down framework and strategies by regulating staff. Harris and William, then again, inspected the explanations behind "advance" fakes in banks and accentuated on due tirelessness program. Beirstaker, Brody, Pacini in their study proposed various extortion insurance and recognition strategies. Additionally, Willison inspected the reasons that prompted the breakdown of "Notwithstanding" Bank. The breakdown came about because of the disappointments in administration, monetary and operational controls of Baring Banks.Choo and Tan clarified corporate misrepresentation by relating the "extortion triangle" to the "broken trust hypothesis" and to an "American Dream" hypothesis, which starts from the sociological writing, while Schrand and Zechman relate official arrogance to the dedication of extortion. In addition, Bhasin analyzed the explanations behind "check" fakes, the greatness of cheats in Indian banks, and the way, in which the mastery of inward examiners can be coordinated, with a specific end goal to recognize and anticipate cheats in banks by taking "proactive" strides to battle cheats. Chen in his study analyzed "deceptive" initiative in the organizations and thinks about the part of exploitative pioneers in an assortment of situations. Through the utilization of PC recreation models, he indicates how a blend of CEO's narcissism, monetary motivating force, shareholders' desires and subordinate hush and CEO's deceptive nature can do much to clarify a portion of the discoveries highlighted in late prominent money related bookkeeping outrages. As indicated by an examination study performed by Cecchini et al.the creators gave a technique to distinguishing "administration" extortion utilizing fundamental money related information in light of "bolster vector machines".From the above, it is obvious that dominant part of studies were performed in created, Western nations. Be that as it may, the chief's conduct in extortion responsibility has been generally unexplored in this way. Likewise, the goal of this paper is to inspect chiefs' dishonest practices in Sathyam Computer Ltd, which constitute an ex-post assessment of claimed or recognized misrepresentation case. Tragically, “no study has been directed to inspect behavioral parts of administrator's in the propagation of corporate fakes in the connection of a creating economy, similar to India. Thus, the present study tries to fill this hole and adds to the writing”.

Research Methodology: Monetary recording practice can be created by situation to a specific setting in which it is implanted. Consequently, subjective examination can be valuable to investigate & depict false money related reporting practice. Here, two issues are significant. To start with, to comprehend why and how a particular organization is focused on false money related reporting practice a fitting interpretive examination methodology is required. Second, contextual investigation directed as a major aspect of this study, took a gander at the biggest misrepresentation, including Sathyam Computer Service’s (Sathyam). Named as “India's Enron by the Indian media, the Satyam bookkeeping misrepresentation has extensively uncovered the disappointment of the administrative oversight component in India”. Doubtlessly, to plan better bookkeeping frameworks, we have to see how bookkeeping frameworks work in their social, political and financial settings. The principle targets of this study are to: * Bring out the Sathyam Computers Ltd bookkeeping outrage by depicting the succession of occasions, the result of occasions, the key gatherings included, and major subsequent activities embraced in India

* What we can be get from Satyam manupulation?

The Scandal at Satyam Computer
Sathyam Computers was awarded the “Golden Peacock Award” being the best administrated establishment in both 2007 & 2009. During these times Sathyam computers was known as the “crown jewel” and the country’s “fourth largest” company with hig-profile customers. The chairman and founder of Sathyam computers was arrested has confessed to Rs. 7800 crore fraud, and also said that he had been making benefits for a considerable length of time. “The instance of Satyam's bookkeeping extortion has been named as India's Enron". So as to assess and comprehend the seriousness of Satyam's extortion, it is imperative to comprehend variables that added to the "exploitative" choices made by the organization's officials. First and foremost, it is important to detail the ascent of Satyam as a contender inside of the worldwide IT administrations commercial center. Second, it is useful to assess the main thrusts behind Satyam's choices: Ramalinga Raju. At long last, endeavor to realize a few "lessons" from Satyam fraud for what's to come.

The start of Sathyam Computers ltd.
Sathyam Computer Ltd was a “rising-star” in the Indian “outsourced” IT-services industry. The company began with 20 employees in 1987 in Hyderabad by Mr.Ramalinga. Satyam won various recompenses for advancement, administration, and corporate responsibility. “In 2007, Ernst & Young awarded Mr. Raju with the ‘Entrepreneur of the Year’ award. On April 14, 2008, Satyam won awards from MZ Consult’s for being a ‘leader in India in CG and accountability”. “The markets major drivers at that point in time were the increased importance of IT services to businesses worldwide; the impact of the Internet on eBusiness; the emergence of a high‐quality IT services industry in India and their methodologies; and, the growing need of IT services providers who could provide a range of services”. From 2003 to 2008, in about every single monetary metric of enthusiasm to financial specialists, the organization became quantifiably. “Satyam produced USD $467 million altogether deals, By March 2008, the organization had developed to USD $2.1 billion” & The organization illustrated "a yearly compound development rate of 35% over that period". “The instance of Satyam bookkeeping misrepresentation has been named as India’s Enron”.

Outcome of Satyam Scandal
After the news of the coercionand Credit Suisse temperorly stoped its extent of Satyam, and PricewaterhouseCoopers (PwC) went under remarkable examination and its allow to work was repudiated. Craved awards won by Satyam and its official organization were stripped from the association. “Satyam's shares tumbled to 11.50 rupees on January 10, 2009, their most insignificant level since March 1998, diverged from a high of 544 rupees in 2008. In the New York Stock Exchange, Sathyam shares peaked in 2008 at US $ 29.10; by March 2009 they were trading around US $1.80”. Subsequently, budgetary authorities lost $2.82 billion in Satyam. Appallingly, Sathyam in a general sense extended its pay and assets for an extensive period of time and moving down Indian stock trades and hurling the business into turmoil. Mr. Raju was soon arrested with criminal charges, including: criminal plan and impersonation. After the Satyam calamity and the imagined by PwC, money related pros got the opportunity to be cautious about those associations who are clients of PwC, which realized fall in offer expenses of around 100 associations moving between 5% - 15%. Raju's leak about book-keeping blackmail, "new board people were assigned and they started working towards an answer that would keep the total breakdown of the firm”. The Government "rapidly started an examination, while meanwhile confining its prompt participation, with Satyam in light of the way that it might not want to appear like it was responsible for the coercion, or attempting to disguise the distortion". The assembly chose "another" directorate for Sathyam to endeavor to extra the association. The Board's goal was "to offer the association within 100 days". To devise a plan of offer, the board met with speculators, accountants, legitimate advocates, and government powers in a flash. It worked innovatively to take quality and conviction back to the association to ensure the offer of the association within the 100-day time compass. To accomplish the arrangement, the heap up enrolled Goldman Sachs and Avendus Capital and blamed them for offering the association in the most constrained time possible.By mid-March, a couple of important players in the IT field had adequately expanded trust in Satyam's operations to take an enthusiasm for a wheeling and dealing technique for Satyam. “The Securities and Exchange Board of India (SEBI) named a surrendered Supreme Court Justice, Justice Bharucha, to direct the method and instill confide in the trade”. A couple of associations offer on Sathyam on April 13, 2009. The triumphant buyer, Tech Mahindra, obtained Sathyam for $1.13 per offer not as much as 33% of its securities trade regard before Mr. Raju revealed the blackmail and saved its operations. Both Tech Mahindra and the SEBI are right away totally aware of the full level of the coercion and India won't look for after further examinations

Data Analysis
The stathyam scam made an impact not only in the indian economy but the whole world economy. This scam started small thinking little changes here and there wont make much dfifference but eventualy it turned out to be one of the most biggest scam India has ever seen. soon Sathyam computers was known as the “India’s Enron”.
Table 1 delineates a few sections of manufactured “Asset report and Income Statement” and demonstrates "distinction" in the middle of "genuine" and "reported" investments. Luckily, the Sathyam manage Matyas was "salvageable". It could have been spared just “if the arrangement had been permitted to experience, as Satyam would have possessed the capacity to utilize Maytas' advantages for shore up its own books". Raju, who demonstrated "counterfeit" money on his books, had wanted to utilize this "non-existent" money to get the two Maytas organizations. As a feature of their "burrowing" method, the Sathyam organizers had generously diminished their possessions in organization from 25.6% in March 2001 to 8.74% in March 2008. Besides, as the organizers seized a little rate of value (unimportant 2.18%) on December 2008,

We can see a takeover offer from table II, in this manner uncovering the hole. It was similar to "riding a tiger, not knowing how to get off without being eaten". “The prematurely ended Maytas obtaining arrangement was the last, frantic push to conceal the bookkeeping misrepresentation by bringing some genuine resources into the business”. The organization with a colossal money heap, with promoters as yet controlling it with a little every penny of shares (under 3%), and attempting to retain a land organization in which they have a dominant part stake is a lethal mix guiding by all appearances toward burrowing . The motivation behind why Ramalinga Raju claims that he did it was on account of each year he was fudging income figures and since consumption figures couldn't be fudged so effortlessly, the crevice between "genuine" benefit and "book" benefit got broadened consistently. Along these lines, "invented" benefits could be consumed through a "self-managing" procedure. The evaluators, financiers, and SEBI, the business guard dog, were all reprimanded for their part in the bookkeeping extortion.
2. Promoter’s shareholding pattern 2001 to 2008.

“Stock Charting of Satyam from December 2008 to January 2009”.

Conclusions
The rate of certified criminal acts, lacking indecision, desires solid punishments and self-restraints. Maybe, no monetary misrepresentation had a more noteworthy effect on accountin and reviewing calling than Enron, WorldCom, and as of late, India's Enron: "Satyam". Every one of these fakes have provoked the entry of the “Sarbanes-Oxley Act in July 2002, and another government office and monetary standard-setting body, the Public Companies Accounting Oversight Board (PCAOB). It additionally was the force for the American Institute of Certified Public Accountants' (AICPA) reception of SAS No. 99”, "Thought of Fraud in a Financial Statement Audit". All sort of outrages/fakes have demonstrated that there is a requirement for good direct taking into account solid morals. The Indian government, in Satyam case, took brisk activities to secure the enthusiasm of the speculators, defend the believability of India, and the country's picture over the world. Besides, Satyam misrepresentation has constrained the administration to re-compose CG runs and fixed the standards for examiners and bookkeepers. The Indian partner of PwC "routinely neglected to take after the most essential review techniques. The SEC and the PCAOB fined the associate, PwC India, $7.5 million which was portrayed as the biggest American punishment ever against an outside bookkeeping firm". As per President, ICAI (January 25, 2011), "The Satyam trick was not a bookkeeping or examining disappointment, but rather one of CG. This pinnacle body had discovered the two PWC examiners by all appearances blameworthy of expert offense". The CBI, which explored the Satyam extortion case, additionally accused the two inspectors of "complicity in the commission of the misrepresentation by intentionally ignoring the bookkeeping anomalies". The way of life at Satyam, particularly commanded by the board, symbolized a dishonest society. On one hand, his ascent to fame in the corporate world, combined with enormous weight to awe financial specialists, made Mr. Raju a "forced pioneer to convey extraordinary results". Despite what might be expected, Mr. Raju needed to stifle his own ethics and values for more prominent else's benefit of the organization. The board schemed with his activities and remained as a visually impaired onlooker; the draw of enormous remuneration to individuals further supported such conduct. At the same time, at last, truth is looked for and those damaging the lawful, moral, and societal standards are reprimanded according to procedure of law. General society admission of extortion by Mr. Ramalinga Raju discusses respectability still left in him as a person. His acknowledgement of blame and fault for the entire disaster demonstrates a splendid spot of a generally "altered" character. Subsequent to stopping as Satyam's Chairman, Raju said, "I am presently arranged to subject myself to the laws of area and face results thereof". Mr. Raju had numerous moral quandaries to face, however his tireless indecent thinking brought his own downfall. The extortion at last needed to end and the suggestions were having broad results. Accordingly, Satyam trick was not a bookkeeping or evaluating disappointment, but rather one of CG. Without a doubt, the legislature of India took brief activities to secure the enthusiasm of the financial specialists and protection the validity of India and the country's picture over the world. Moreover, the CG system needs to be fortified, actualized both in "letter and additionally in right soul", and authorized vivaciously to check desk wrongdoings.

Reference:

“http://www.vikalpa.com/pdf/articles/2011/Pages-from-Vikalpa36-3-9-20.pdf?” http://en.wikipedia.org/wiki/Satyam_scandal http://qz.com/379877/the-satyam-scandal-how-indias-biggest-corporate-fraud-unfolded/ http://www.hindustantimes.com/business-news/all-you-need-to-know-about-multi-crore-satyam-accounting-fraud/article1-1335467.aspx http://whistleblower.org/satyam-scandal
http://www.scirp.org/journal/PaperInformation.aspx?paperID=30220#.VWCt7dyqpHw

Similar Documents

Free Essay

Disaster Plan

...| Disaster plan | | | | 6/6/2010 | | Abstract This is a disaster plan that I created for the IST Department of XYZ Computers company in order to prevent any future problems that may arise such as the situation they had over the weekend when a major water pipe broke and flooded the first floor, causing extensive damage to the servers. Included in the disaster plan I will address a few issues that will aid the company in protecting against such things as any natural disasters that may occur as well as any other occurrences that may deem necessary for such a disaster plan. I will detail my recommendations for using a RAID system for data protection in order to have a well placed back up plan with the most up to date information possible. In short I plan to properly detail a disaster plan the best possible way that I can in order to have a good disaster recovery plan in place rather than having to spend the time and money on extra recovery efforts. Hopefully having such a plan in place will keep from losing important data to unforeseen issues, such as natural disasters due to the geographical location among other issues that may arise at the most in opportune time possible. When creating a disaster plan the first thing to keep in mind is to do a complete risk assessment of the entire existing computer systems. In order to accomplish this task all the risks and probabilities will need to be noted such as any delays to system uptime and how close at hand these...

Words: 1273 - Pages: 6

Premium Essay

How a New Strategy Saved and Created a Bright Future for Ibm in 90s.

...Term Paper Proposal To: Dr. Vijay Karan From: Ming-Tzu Chou Date: 13 February 2012 Subject: Management control system Proposed Research Topic: How a new strategy saved and created a bright future for IBM in 90s. Statement of problem: In the early 1990s, IBM suffered in dramatically declining in the revenue of the mainframe sales, and the stock price also dropped. During the period, the personal computer was the most popular products in Information Technology market, and the mainframe was already outdated. Last but not least, IBM could not reduce its cost according to its size and bureaucracy. As a result, many people believed that IBM could only fell or be divided to smaller companies. Louis V. Gerstner, Jr., who was the new CEO, saved IBM and implemented different strategies in the company. Objective & Method: The purpose of the study is to evaluate how a new strategy affected IBM. Except the abstract, the term project will be separated to four parts: problem statement, strategy formulation and strategy planning of solutions, the summary of results, and recommendations. The term project should reach the following goals through in the four sections. 1. Problem statement will describe IBM’s previous business situation and introduce how problems had generated before Gerstner arrived. 2. The solutions from Gerstner will be deeply analyzed according to the theories from strategy formulation and strategy planning in the textbook. 3. The summary of results will be presented...

Words: 319 - Pages: 2

Free Essay

Technology Emergence Papaer

... 2012). Bleeding technology is relatively, new technology. Bleeding technology is unreliable because it has not been tested and it has not proven its worthiness or authenticity. A user will be taking a huge risk to use the bleeding technology which would be more expensive than the leading technology. Bleeding edge technology could be very costly and it could turn into something that could be the beginning of a serious problem. The reason why bleeding edge technology could cause many problems is because it is new and might be quite risky because of the instability. Bleeding edge technology has not been thoroughly tested and has not proven itself to be reliable. As an example of bleeding technology would be an early development of a new computer product that is being develop for the very first time. When a consumer decides to purchase the product, the cost is not the only thing that the consumer faces when choosing to purchase the bleeding edge technology; it is possible that the customer might get stuck with...

Words: 1786 - Pages: 8

Premium Essay

Computer as a Catalyst for Change

...1 Teachers’ Views of Computers as Catalysts for Changes in Their Teaching Practice Sara L. Dexter and Ronald E. Anderson University of Minnesota Henry Jay Becker University of California, Irvine This paper was published in the Journal of Research on Computing in Education. The citation for it is: Dexter, S., Anderson, R. E., & Becker, H. J. (1999). Teachers’ views of computers as catalysts for changes in their teaching practice. Journal of Research on Computing in Education, 31 (3), 221239. Abstract: In this study we examined the use of computers by teachers in their instructional practices and their perception of the impact of computers on changes they have made to their classroom practice. These data draw from 47 teachers from 20 K-12 schools across 3 states who each completed a questionnaire, participated in 3 semi-structured interviews, and allowed 3 observations of their classroom. The teachers who had adopted more progressive teaching practices over time felt computers helped them change but they did not acknowledge computers as the catalyst for change. Instead, they cited catalysts that included: reflection upon experience, classes taken, and the context or culture of the school. We conclude that in order for teachers to implement the use of educational technology in a constructivist manner, they must have opportunities to construct pedagogical knowledge in a supportive climate. Research funded by the program of Research on Education Policy and Practice at the National...

Words: 9206 - Pages: 37

Premium Essay

Capstone Wbs Dictionary

...WBS Dictionary Team One Technologies Project Management | From start to finish lay out of the project | Scope / Requirements | Team One Technologies is determined to helping Greenway Bank develop an approach to examine their scale or level of risk management. | Design | The office will house a local LAN, create a revenue stream, a new inbound customer service call center | Headquarters and four branch locations | Four branches located in New York, Seattle, Orlando, and Los Angeles, corporate offices in St Louis | Budget breakdown / Materials | Total cost on parts, labor and time | Complete data network and communication to all locations | Networks connect large numbers of users to share information and resources | Physical Layout for Voice & Data | A building by building layout or diagram for the Physical layout for the voice and data network | Data storage and off site backups for all 5 locations | off-site data protection, or vaulting, is the strategy of sending critical data out of the main location (off the main site) as part of a disaster recovery plan.Example: Barracuda Networks | Network Configuration Plan | the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems. | Documentation for business continuity | The activities performed by Team One Technologies to ensure that critical business functions will be available to customers, suppliers, regulators, and...

Words: 655 - Pages: 3

Free Essay

Information Technology

...1. what is e-classroom? 2. what is industrial robot? Explain that. 3. Describe about the process that Mubin told about his parents. 4. ICT used for doing many dangerous situation succesfully. Explain that. Answers: 1. main book. 2. Industrial robot is a robot that is used in many dangerous work. Now all the industrial work in industry are done by industrial robot. Human become tired,bored but robot never. Robot can do work for long time. In the big industry of the world now robot is uses as labor. 3. Mubin told his parents about the use of computer in operating phone. He also told about the drone system. Mubin works in air force thats why his parents always anxious for him.They think about the airplane accident. Then mubin told them about the latest technology that used in aircraft. Now all the airplane are opetated by computer. Now pilot dont have to do many things. So the posibility of the plane accident now become less. Now a days there is no pilot in the fighter plane. The drone system is used normally in war. 4. Besides the use in aircraft ICT also used in many dangerous sector for doing many dangerous work. Now most of the work in the big industry is done by robot bacuase robot dont get tired or bored like human. Now human just observe the work either its right or wrong. Now in transportation the use of ICT increased a lot. In future if car dmis driven by robot then the number of road accidents will definately less. So now ICT is used in many dangerous sector...

Words: 679 - Pages: 3

Free Essay

Lg Michael Ahn on Becoming a Global Player in the Consumer Electronics

...LG’s Michael Ahn on Becoming a Global Player in the Consumer Electronics Market: Knowledge@Wharton ( http://knowledge.wharton.upenn.edu/article.cfm?articleid=2667) LG’s Michael Ahn on Becoming a Global Player in the Consumer Electronics Market Published : January 06, 2011 in Knowledge@Wharton In 2000, executives at South Korea-based LG Electronics set the goal of becoming a top-three player globally by the close of the decade. One year early, in 2009, the company achieved its goal. Meanwhile, revenue has jumped from $5.6 billion in 2004 to more than $13 billion in 2010. Michael Ahn guided the branding effort for LG Electronics North America before stepping down as regional president and CEO last year to become a senior adviser at LG Electronics USA. In a recent conversation with Knowledge@Wharton, Ahn -- who was visiting the University of Pennsylvania to make a speech as part of the Wharton Leadership Lecture series -- named patience, consumer-targeted marketing and achieving synergy among the firm's different divisions as the factors catapulting LG Electronics from a relatively obscure maker of commodity goods to a premium global brand. An edited version of the conversation appears below. This is a single/personal use copy of Knowledge@Wharton. For multiple copies, custom reprints, e-prints, posters or plaques, please contact PARS International: reprints@parsintl.com P. (212) 221-9595 x407. Knowledge@Wharton I would love to start by talking about the consumer electronics...

Words: 1692 - Pages: 7

Free Essay

A Horror Story

...Theme: Horror/Suspense Setting: A typical boy’s room- dirty and messy. The only light source would be the computer. Most used part would be the computer table/desktop. Characters: Gio- The main character, a slouchy procrastinator student who was writing and cramming a paper. Stranger- No fact was known other than he is implied to be a ghost or spirit a hint of it’s appearance. • Page 1 Panel 1: Paneling- 1/3 of the page horizontally (most of computer screens are horizontally oriented) A close up shot of a computer monitor, Microsoft word is the open application with only his name on it and a title “A Horror Story” Panel 2: Paneling- 1/3 of the page horizontally Gio leaning on his palm looking bored/thinking (shot from monitor’s POV), with a gleam of the only light source which is the monitor on his face. Thought Bubble: Ahhh, damn. I’ve been doing this for two days now. Panel 3: Paneling- 1/3 of the page horizontally A zoom up shot of the computer clock with “11:11pm” on it. Thought Bubble(top right side): 11:11 do you work, please send me a spirit and have him type his story! • Page 2 Panel 1: Paneling- 1/3 horizontally, 2/3 of the first tier. Gio face palming, same shot from page 1, panel 2. Thought Bubble(bottom left part): Who am I kidding? Wake up kid! Panel 2: inset, remaining of the first tier Gio reaching to the right for the coffee mug in the study table, back shot with him on the center. Thought Bubble(left side of the...

Words: 541 - Pages: 3

Premium Essay

Inventory Management

...KB Corporation PROPOSAL For Inventory Management System Table of Contents 1 Overview 2 Problem Situations Proposed and Purpose 3 Record methods 3.1 Recommendation for the forms design principles are: 3.2 Computer assisted-retrieval system (CAR) 3.3 Data Retrieval methods by Information Technologies 3.4 Policies for record storage 4 Organizing the record and the classification system. 5 Implementation. 6 Conclusion: Strategically Managing Inventory for Future Growth 1. Overview As the company are expecting to establish another 20 shops in the next 2 years, we have realized how important for the document system for different department. And our products are almost imported from Europe and Asia. We cannot keep to using the manual record for the document record system. This document will explain the requirement for management, inventory, provisioning, customer support, sales support, and book-to-bank systems. Where possible recommendations are given to understand and plan for interconnection, correlation, and data warehousing requirements. Emphasis is given to ensuring all databases will have a capability to provide input to decision support systems needed by both senior management, as well as operational levels of the business. 2 . Problem Situations Our company current operation has shown that the inventory document record is obvious inefficiency. In the aspect of inventory control, more and more errors were found...

Words: 1430 - Pages: 6

Premium Essay

Report

...INTRODUCTION Real Estate Management System is website which is helpful for Builders as well as a individual as Buyers or Seller. In the currently all the activities are done manually. It is very tough for person to contact a appropriate Buyer or Seller. Our Real Estate Management System deals with the various activities related to the students. There are mainly 3 modules in this software * Search * Post * List On this Website we can register as a Individual, Agent or Builder. Administrator has the power to activate and deactivate the user account Administrator can also add new user and can edit and delete a user. A Builder can register as user and can buy and sell Properties. An Agent can suggest for buying and selling Properties. An Individual can register as a user and can list, buy and sell properties. SYSTEM ANALYSIS EXISTING SYSTEM: System Analysis is a detailed study of the various operations performed by a system and their relationships within and outside of the system. Here the key question is- what all problems exist in the present system? What must be done to solve the problem? Analysis begins when a user begins its registration & starts to search, list & post property. During analysis, data collected on the various files, decision points and transactions handled by the present system. The commonly used tools in the system are Data Flow Diagram, activity diagram, sequence diagram, collaboration diagram, etc. Training, experience and common...

Words: 1885 - Pages: 8

Premium Essay

Operating Systems on the Internet

...Internet Operating Systems For years I thought that operating systems were simple little programs (lines of code) placed inside personal computers to help them run smoothly and efficiently (truth be known, an OS is needed to make any computer run at all). But not until recently did I discover that operating systems must also be used in larger mainframes and servers as well. After all, servers are computers too! And any computer, regardless of its size or purpose, needs internal instructions. It needs a set of executable code that makes the thing come alive. One might say that operating systems are the souls of computers everywhere. This begs a question or two: what types of OS’s are out there? And how do they differ from the one in my iPhone? Also, if I wanted to swap out my current operating system for a different one (after all, my friends keep telling me about all of the great things they’re doing with Linux), how easy of a task would that be? The most common OS for a desktop (or a laptop) in use today is Windows 7 ("Os Platform Statistics", 2012). But what about the operating systems which are used by small and large companies that host web pages? Or what about the large computers that store hundreds of thousands (if not millions) of large data files in a centralized data centers? Or what about those companies that provide search engine services? Companies like Google, facebook, and Yahoo!, maintain their own, internal OS’s, which are designed to serve...

Words: 572 - Pages: 3

Premium Essay

Hillman Group, Avnet and Quaker Chemical: Process Transformation Through Business Intelligence Deployments.

...in 1964, has enjoyed ever four decades serving the har dware/ home improvement industry. Which widely known for the outstanding service and quality products. Max Hillman Jr. and Richard Hillman are both helped to start the company and remains as leaders. Avnet is one of the world’s largest transnational electronics distributors of electronic parts, enterprise computing and storage products and embedded subsystems, Avnet provides a vital link in the technology supply chain. Market needs and trends drive Avnet’s product and service strategy, supported by a global infrastructure. It brings a breadth and depth of service capabilities, such as supply-chain and design- chin services, logistics solutions, product assembly, device programming, computer system configuration and integration, and technical seminars. Quaker chemical since 1918, they have been established and maintaining long term relationships with leading enterprise in primary metals, metalworking, and other basic process industries all over the world. Quaker is a $544.1 million dollar company. The company is publicly traded on the New York Stock exchange, and has a long track record of financial consistency and strength. Today, they have business and production presence in every major manufacturing country in the world. Business intelligence (BI) is a broad category of applications and technologies for gathering, storing, analyzing, and providing access to data to help enterprise users make better business decisions...

Words: 400 - Pages: 2

Premium Essay

Computer Hardware Servicing Ncii

... | |Qualification: | |COMPUTER HARDWARE SERVICING NC II | |[pic] |Technical Education and Skills Development Authority | | |East Service Road, South Superhighway, Taguig City, Metro Manila | TABLE OF CONTENTS Page A. COURSE DESIGN 1-5 B. MODULES OF INSTRUCTION 6-73 • Basic Competencies 6 o Participating in workplace communication ………………… 7-10 o Working in a team environment ……………….... 11-13 o Practicing career professionalism .……………. 14-17 o Practicing occupational health and safety procedures 18-22 • Common Competencies 23 o Applying quality standards …………………………………… 24-27 o Performing computer operations 28-34 o Performing mensuration and calculation 35-38 o Preparing and interpreting technical drawing 39-42 o Using hand tools 43-47 o Terminating and connecting electrical...

Words: 8633 - Pages: 35

Free Essay

How Has Information Technology Transformed the Package Delivery Business?

...Week 1 – Chapter 1 Jiajun DU 1. Read Chapter 1 – Information Systems in Global Business Today –N/A 2. Weekly Online Discussion Question – completed online in the Discussion Forum Area (no need to copy and paste into document) 3. Chapter 1 Video Case – PDF file located in the Course Documents Area (answer the questions without retyping the question) (1). “Smart Labels” are data and computer based shipping labels. And it can be made byr personal computer. The barcodes can record a lot of data, so it can’t only decrease the transit time, but also increase reliability. UPS can use GPS to provide a better track serves. Once the package arrive a UPS station, the “Smart Labels” can record the information of package and update to the website. The customer can track their packages easier. The UPS can also use this system to control their deliver serves, make sure the package can deliver on time. (2). Costumer order –logistics center-DIAD-delivered-DIAD A. The customer places an order, the logistics center receive the package and updates tracking information. B. When UPS ship out the package, they will use DIAD to scan the “Smart Labels”, so they can update the tracking information in date center. C. When the package is delivered, the customer need to sign name and UPS will use DIAD to update information. (3). Wireless communication can make the express delivery services more flexible and update their information faster. And it makes UPS more efficient and lower the cost of operation...

Words: 360 - Pages: 2

Premium Essay

Importance of Technology in Society

...of time. Technology has allowed man-kind to obtain and create new desires. In this society, technological advancement has allowed our society to use enhanced goods to make our everyday life easier. Technology has made our civilization better in many ways. Technology has increased productivity, help people economically, create new advance technology to fulfill people’s desires and wants, and the invention of the computer which has created numerous effects that almost everyone uses in our current society. One of the major technological invention that has changed the way people live their life is the computer. The computer has changed the way our society works today. Currently in our society, people use computers for virtually anything. The internet was created so that the invention of a computer can reach new peaks. People use computers for their own benefits and desires. Computers have provided many different types of efficient data storage systems and amazing processor that is very informative (Oak). Something that has really become popular because of computers is online shopping. A decade ago, buying any type of good online seemed imaginary, but now it has brought tons of income across the world (Nickson). Instead of going to a store and being limited to what they have on stock, people in our society can now go online to places like Amazon.com, or even a certain to store that they wish to purchase something, and purchase products from limitless categories. Online shopping...

Words: 1054 - Pages: 5