Uploaded by khalid Omer

Corrigé-Gestion-et-Finance-DELAGRAVE-2020-8.fr.en

advertisement
Translated from French to English - www.onlinedoctranslator.com
1010Check the operations carried out by Samuel to process each order with the ERP.
Drut command
Order Joly
-
-
Consult the customer file.
-
Establish that the customer is solvent.
Observe that the customer is at the “red” risk level
(numerous late payments).
-
Consult stock sheets.
-
Notice a stock shortage.
-
Refuse the order.
-
Accept the order.
-
Notify the customer by email.
Report the item out of stock to the purchasing manager.
-
Inform the customer of the references of the missing items.
Start editing and sending the invoice.
1111List the operations that are done automatically in the ERP.
Updating stock, customer account, emails and letters addressed to the customer, editing invoices.
12What does this digital technology bring to the CIS of the OlivesLife company?
This technology ensures:
– better monitoring of customers, in particular compliance with agreed payment deadlines and their solvency;
– rigorous monitoring of orders.
4
Processing security: access rights (p. 14)
12 13Identify the risk related to the single ERP database.
Company personnel can access all information.
13 14Indicate how this risk is addressed.
Access rights management makes it possible to restrict access to database information and thus ensure
the confidentiality and integrity of the data.
14 15 Describe the two mechanisms allowing user rights to be differentiated
according to their needs.
The first system is the authentication of users which makes it possible to verify their identities
(checking the identifier also called “user name” or “login” and the password).
The second system is the allocation to authorized users of access rights to each functionality of the
module.
15 16Based on the administrator status assignment, identify their responsibilities.
The status of administrator, reserved for the manager, signals a significant level of responsibility: policy and control of
the management of access rights.
Chapter 1The role of CIS and the contribution of digital technologies
7
Download