Methods of stock verification , Other Management

Assignment Help:

Methods

Following is a brief description of the prevalent methods of stock taking. 

Stock Verification by Accession Numbers:  The  accession numbers of the books from the shelves are read by one person and another person checks and tick marks the corresponding accession number in the register. When all the books in the  library and  out in circulation are checked in this manner, the unmarked accession numbers give us a list of lost books. 

This method is cumbersome and time consuming as the books on the shelves are arranged by class numbers. The use of accession register, which is a very important record also spoils. A  modified  method is to prepare and use a duplicate accession register. But then the task of preparing another duplicate accession register is  stupenduous and also involves unnecessary wastage of time, energy and money. 

Another simplified variant of this method is  to  prepare slips with only the accession numbers and use these slips for stock taking. Alternatively a register bearing only serial numbers in columns  in a page may be used. Numbers may be crossed out for books on the shelf. However both the methods may lead to malpractices since bibliographical detail cannot be verified in either of the two. However, this method may lead to malpractices; for example, a lost book may be replaced  by another cheap book with the same accession number, since bibliographical details are not provided. 

Numerical Counting Method: This is another simple method, wherein all the books on the shelves and the books out on loan are counted and tallied with the total number of books as per records. The comparison indicates the less of books in terms of only numbers. However, it does not reveal the particulars of the books and hence it serves only a limited purpose of stock verification, however, this method gives a rough idea of the extent of loss.  

Stock Verification by Shelf List Method: Maintenance of an up-to-date and accurate, shelf list is a pre-condition for this method of stock taking. Shelf list on cards is very flexible and facilitates speedy stock verification. The cards are taken to the  stack and call number of each book on the shelf is  read' by one person and another person either ticks it or takes out and keeps it in-.another tray. Otherwise the cards  of missing books' can be removed and kept it in another tray. Otherwise the cards of missing books can be removed and kept separately. This is an easy, simple and quick method. The trays containing the shelf register cards can be distributed among a number of persons and   simultaneous stock verification of  various sections of the stack is possible. Though time-consuming, this is a very  efficient method  of stock taking, and stock verification is also achieved in this method.


Related Discussions:- Methods of stock verification

Inputs to quality assurance process, I nputs to quality assurance process ...

I nputs to quality assurance process The inputs to quality assurance are: P roject management plan: This contains quality management plan which describes how quality

Construct a cedar eee analysis for an event, Question 1: You are to set...

Question 1: You are to set up your biggest conference room for a cocktail party for a renowned bank in Mauritius. The cocktail is scheduled to start at 19h00. However, the same

Machine readable catalogue, Machine Readable Catalogue: The past ten y...

Machine Readable Catalogue: The past ten years have witnessed a great change in cataloguing practice with the increasing use of computers and network communications. Catalogui

Network configurations - cd rom network, Network Configurations   The b...

Network Configurations   The basic components of a single CD-Rom workstation are a microcomputer and a CD-ROM drive. A printer will be necessary if you want to obtain a paper c

Ala rules 2nd definitive edition, ALA Rules (2nd definitive edition): ...

ALA Rules (2nd definitive edition): American Library Association. ALA cataloging rules for author and title entries. - 2nd ed. / Clara Beetle, editor. - Chicago: American Libr

Dichotomous data - levels of measurement, Dichotomous Data: - Data tha...

Dichotomous Data: - Data that  fall  into only  two  categories are called dichotomous data.  - Although these  data ordinarily might be considered nominal level  (e.g. pas

Paragraph writing management assignment, Situation A caller asked "Wh...

Situation A caller asked "What is the policy on a manager unlocking one of their employees desks after hours in search of something? Is this an invasion of privacy? What righ

Outline various steps of the policy analysis process, QUESTION 1 Policy...

QUESTION 1 Policy implementation is the most critical stage of the policy process. Critically analyse some of the main constraints that hinder the implementation of public poli

Stack guides - library management, Stack Guides: Guides are to be put...

Stack Guides: Guides are to be put up at different places in the library in order to enable a user to find his/ her way into different parts of the library with minimum of ass

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd