Inventory System for Yanz & John Apparel
Keywords:computerized, inventory, system
Nowadays, everyone is dependent on technology. Technologies help people to keep in touch with each other by using mobile phones and computers. As an ICT student, we conducted research and proposed a computerized system for our chosen client. Mr. John Hojilla is the owner of Yanz & John Apparel that still uses a manual system. Mr. Hojilla is doing an inventory by using a logbook in monitoring his business. The main problem with this manual system is that it can lead to low profit and give the owner a hard time. The researchers proposed an inventory system for Yanz & John Apparel. Thus, the researchers can help the client to become more successful. The methodology that the researchers used was the systems development life cycle (SDLC) for the project plan. SDLC has seven phases, such as planning, analysis, design, development, testing, implementation, and maintenance. The researchers chose SDLC because it can easily finish the study. The researchers also used it to see the flow the researcher used and gather all of the data of client. Yanz and John Apparel have a specific problem in using a manual inventory system because it is time-consuming. The unmonitored list of products can lead to important papers getting lost or misplaced. Yanz and John Apparel lack security because the files are stored in a filing cabinet; even with the presence of a padlock, someone can still steal all files. Mr. John Hojilla, who is the owner of the store, is having a hard time while doing an inventory. The researchers’ proposed computerized inventory system will reduce time, effort, and make his work easily. Yanz and John Apparel encountered difficulty in monitoring their product and maintaining their security. To prevents this, the researchers provided a database for the system to lessen the time of monitoring the products because unorganized products can cause an error. The researchers provide a list of products and stock to the system. The researchers create a login form before starting the system to secure the information of the user.