CHAPTER ONE BACKGROUND OF STUDY 1.1 INTRODUCTION Computer household inventory system today encompasses either directly or indirectly ; A field of activity both private and public that taxes the imagination, it revolves around the ownership possession and use of the system. The term “computer household inventory” includes re... Continue Reading
DESIGN AND IMPLEMENTATION OF A VISA PROCESSING MANAGEMENT SYSTEM: A CASE STUDY OF SOME SELECTED IMMIGRATION OFFICE IN ABEOKUTA SOUTH LOCAL GOVERNMENT, AREA OF OGUN STATE. CHAPTER ONE BACKGROUND OF THE STUDY 1.1 INTRODUCTION In this project, design and implementation of a computerize visa processing information system is based o... Continue Reading
DESIGN AND IMPLEMENTATION OF E-VOTING MANAGEMENT SYSTEM CHAPTER ONE INTRODUCTION 1.1 Background of the Study E-Voting is an election system that allows a voter to record his or her secure and secret ballot electronically. In 2004; it's estimated that approximately 30 percent of the voting population in the United State used some ... Continue Reading
DESIGN AND IMPLEMENTATION OF AN ACADEMIC INFORMATION SYSTEM USING RELATIONAL DATABASE AND HTTP SEVER CHAPTER ONE 1.1 INTRODUCTION There is an outgrowing need for electronic accessories in a world where there is great necessity for speed, efficiency and perfection of work. Information factors efficiency, access to electronic device... Continue Reading
CHAPTER ONE INTRODUCTION 1.1.0 GENERAL INTRODUCTION It is safe to say that most activities such as hostel allocation carried out in most universities in Nigeria are done manually. Therefore, there is a lot of strain on the individuals running the hostels. An E-Hostel system is simply software developed for managing most activities that ... Continue Reading
COMPUTER CLOUD SECURITY SYSTEM CHAPTER ONE 1.0 Introduction The importance of Cloud Computing is increasing and it is receiving a growing attention in the scientific and industrial communities. A study by Gartner [2011] considered Cloud Computing as the first among the top 10 most important technologies and with a better prospect in su... Continue Reading
COMPUTER CLOUD SECURITY SYSTEM CHAPTER ONE 1.0 Introduction The importance of Cloud Computing is increasing and it is receiving a growing attention in the scientific and industrial communities. A study by Gartner [2011] considered Cloud Computing as the first among the top 10 most important technologies and with a better prospect in su... Continue Reading
DESIGN AND IMPLEMENTATION COMPUTERIED DATA ENCRYPTION SYSTEM CHAPTER ONE 1.0 Introduction The ongoing dilemma of digital age is balancing convenience against security. Security is a system safeguards for protecting information technology against disasters, system failure, and an unauthorized access that can result in damage, loss or ex... Continue Reading
COMPUTERIZED MANAGEMENT INFORMATION SYSTEM IN BURSARY DEPARTMENT CHAPTER ONE 1.1 INTRODUCTION Paying of fee in school especially in tertiary institutions is an indispensable responsibility on students, parents, guardians, government or organizations offering scholarship grants. The fee charged is used in providing a conducive learning env... Continue Reading
CONGESTION CONTROL IN GSM NETWORK A CASE STUDY OF ETISALAT NIGERIA CHAPTER ONE 1.0 INTRODUCTION The advents of wireless technology have had great impact on globalization of the Nigeria economy since its inception in 2001. But the tremendous growth in subscription have brought some challenges to the operators on how to tackle ... Continue Reading
DESIGN AND IMPLEMENTATION OF A COMPUTERIZED TAX COLLECTION AND MANAGEMENT SYSTEM CHAPTER ONE 1.0 INTRODUCTION According to a world bank economic report on Nigeria published on the 1st of May 2013, it was stated that 95% of the government’s budgeted expenditure depended on its projected o... Continue Reading
DESIGN AND IMPLEMENTATION OF AN ONLINE COMPLAINT MANAGEMENT SYSTEM CHAPTER ONE 1.1 INTRODUCTION BACKGROUND TO THE STUDY Establishments like IT firm, school, hospitals, government secretarial, financial institutions etc. which have large numbers of customers or client received enormous amount of complaints per day, and these complain has... Continue Reading
DESIGN AND IMPLEMENTATION OF AN ONLINE VEHICLE AND PLATE NUMBER REGISTRATION AND IDENTIFICATION SYSTEM IN NIGERIA CHAPTER ONE INTRODUCTION 1.1 Background of study Traffic laws and regulations in Nigeria were inherited from colonial administration. The first Edith is the 1920 Road Traffic Ordinance of Lagos Colony and Southern Protector... Continue Reading
DESIGN AND IMPLEMENTATION OF ATTENDANCE MANAGEMENT SYSTEM CHAPTER ONE 1.1 Introduction Attendance Management System is software developed for daily student attendance in schools, colleges and institutes. If facilitates to access the attendance information of a particular Employee in a particular industry. The information is sorted by the o... Continue Reading
DESIGN AND IMPLEMENTATION OF FILE ENCRYPTION AND HASH SYSTEM CHAPTER ONE INTRODUCTION 1.O BACKGROUND OF THE STUDY The ongoing dilemma of digital age is balancing convenience against security. Security is a system safeguards for protecting information technology against disasters, system failure, and an unauthorized access that can re... Continue Reading