Cyclostyled form - conventional forms, Other Management

Cyclostyled Form:

Revised version of bound register form came into existence due to the typewriter and cyclostyling machine. The entries are typed. Multiple copies (up to four) can be had from the typewriter. By using a cyclostyling machine, one may get multiple copies of the catalogue. This facilitated movement of catalogue from one room to another room. All the advantages of bound register form are applicable to this form. Pages of the register are now kept in plastic jackets to increase the life of the pages. These pages are filed in separate files. It is also difficult to provide additional entries to a document, in addition to the main entry. Hence, flexibility of different approaches to the catalogue may not be possible. Provision of cross-reference is even more difficult. All these naturally restrict the use of the catalogue. Most modern libraries have discarded this form of library catalogue.  

Posted Date: 11/9/2012 1:02:21 AM | Location : United States

Related Discussions:- Cyclostyled form - conventional forms, Assignment Help, Ask Question on Cyclostyled form - conventional forms, Get Answer, Expert's Help, Cyclostyled form - conventional forms Discussions

Write discussion on Cyclostyled form - conventional forms
Your posts are moderated
Related Questions
Note that the goal of this assignment is to assess your understanding of the core principles of good OO design (e.g. the advantages of using inheritance and polymorphism etc.). As

Tangible and Intangible Value The value which communities create includes the tangible results like the standard manual, the improved skills or the reduced costs through faster

Recent Trends in document delivery service: Recent Trends As mentioned earlier document delivery scene has changed with the emergence of a large number of electronic databases

Internet Shopping system: Project Name : Internet Shopping system Role : Leading the Team, Involved in Requirement Gathering, Estimation, System, System Design, Datab

Problem: a) Authentication is the mechanism whereby a system securely identifies their users. Authentication system provides answers to the following questions: - Who is t

QUESTION 1 Why is it that businesses are increasingly exposed to scrutiny and criticisms? How can they cope with these? QUESTION 2 What are the implications for corpora

QUESTION 1 (i) Discuss the key activities of the strategic management process'. Explain why it is important for managers to recognise the interdependent nature of these activit

Methods Following is a brief description of the prevalent methods of stock taking.  Stock Verification by Accession Numbers:  The  accession numbers of the books from t

Objectives of Resource Sharing   The objectives implied in resource sharing activity are very idealistic in nature. They are mainly aimed at providing convenient access to info

Maturity model in CobiT 5: CobiT 5 maturity model is based on the ISO/IEC 15504. This new model presents some differences (CobiT 5 2012). However, an important similarity betwe