Methods of stock verification , Other Management

Assignment Help:

Methods

Following is a brief description of the prevalent methods of stock taking. 

Stock Verification by Accession Numbers:  The  accession numbers of the books from the shelves are read by one person and another person checks and tick marks the corresponding accession number in the register. When all the books in the  library and  out in circulation are checked in this manner, the unmarked accession numbers give us a list of lost books. 

This method is cumbersome and time consuming as the books on the shelves are arranged by class numbers. The use of accession register, which is a very important record also spoils. A  modified  method is to prepare and use a duplicate accession register. But then the task of preparing another duplicate accession register is  stupenduous and also involves unnecessary wastage of time, energy and money. 

Another simplified variant of this method is  to  prepare slips with only the accession numbers and use these slips for stock taking. Alternatively a register bearing only serial numbers in columns  in a page may be used. Numbers may be crossed out for books on the shelf. However both the methods may lead to malpractices since bibliographical detail cannot be verified in either of the two. However, this method may lead to malpractices; for example, a lost book may be replaced  by another cheap book with the same accession number, since bibliographical details are not provided. 

Numerical Counting Method: This is another simple method, wherein all the books on the shelves and the books out on loan are counted and tallied with the total number of books as per records. The comparison indicates the less of books in terms of only numbers. However, it does not reveal the particulars of the books and hence it serves only a limited purpose of stock verification, however, this method gives a rough idea of the extent of loss.  

Stock Verification by Shelf List Method: Maintenance of an up-to-date and accurate, shelf list is a pre-condition for this method of stock taking. Shelf list on cards is very flexible and facilitates speedy stock verification. The cards are taken to the  stack and call number of each book on the shelf is  read' by one person and another person either ticks it or takes out and keeps it in-.another tray. Otherwise the cards  of missing books' can be removed and kept it in another tray. Otherwise the cards of missing books can be removed and kept separately. This is an easy, simple and quick method. The trays containing the shelf register cards can be distributed among a number of persons and   simultaneous stock verification of  various sections of the stack is possible. Though time-consuming, this is a very  efficient method  of stock taking, and stock verification is also achieved in this method.


Related Discussions:- Methods of stock verification

denominators, who are those involve in denominators for desi

who are those involve in denominators for desire

What is the role of communication in culture, QUESTION 1 Explain the me...

QUESTION 1 Explain the meaning of organizational and cultural diversity Why is it important for us to be sensitive to and aware of cultural diversity within your workplace?

Prussian instructions - british museum cataloguing rules, Prussian Instruct...

Prussian Instructions: The Prussian instructions. Rules for the alphabetical catalogues of the Prussian libraries l translated from the 2nd edition, authorized, 1908; with an

Six-sigma speciality, S ix-Sigma Speciality Six Sigma can be used for ...

S ix-Sigma Speciality Six Sigma can be used for both operational and strategic management. It is regarded as a new quality management strategy that has the ability to replace

Negotiations , Negotiations  One of the most important activities perfo...

Negotiations  One of the most important activities performed by the supply managers is to negotiate agreements or contracts with the suppliers. Although supply management is de

Legal aspects of health care management, 3. "Patient self-determination and...

3. "Patient self-determination and autonomy are under the law ancillary and derivative from the well-articulated right of privacy. Under this well established right, procreative fr

Outline the organisational and behavioural factors, Question 1: Describ...

Question 1: Describe what is meant by ‘skilled-based', ‘rule-based' and knowledge-based behaviour. Explain in each case how these operating levels can give rise to human error

Major types of validity, Major Types of Validity: Different aspects or...

Major Types of Validity: Different aspects or facets of  validity  questions are explained by  the type of validity, and number of  indirect and logical methods have evolved t

Historical sources - source of data, Historical Sources: Historical Da...

Historical Sources: Historical Data  are a combination of documentary and field sources. These consist of  documents and various historical sources  to which the historian him

Describe the occurrence of quantization error, Question 1 a) List the ...

Question 1 a) List the layers of the OSI model and briefly explain the function of each layer. b) List the three key elements of a protocol. Give a brief explanation of ea

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd