DESIGN AND IMPLEMENTATION COMPUTERIED DATA ENCRYPTION SYSTEM CHAPTER ONE 1.0 Introduction The ongoing dilemma of digital age is balancing convenience against security. Security is a system safeguards for protecting information technology against disasters, system failure, and an unauthorized access that can result in damage, loss or ex... Continue Reading
COMPUTERIZED MANAGEMENT INFORMATION SYSTEM IN BURSARY DEPARTMENT CHAPTER ONE 1.1 INTRODUCTION Paying of fee in school especially in tertiary institutions is an indispensable responsibility on students, parents, guardians, government or organizations offering scholarship grants. The fee charged is used in providing a conducive learning env... Continue Reading
CONGESTION CONTROL IN GSM NETWORK A CASE STUDY OF ETISALAT NIGERIA CHAPTER ONE 1.0 INTRODUCTION The advents of wireless technology have had great impact on globalization of the Nigeria economy since its inception in 2001. But the tremendous growth in subscription have brought some challenges to the operators on how to tackle ... Continue Reading
DESIGN AND IMPLEMENTATION OF A COMPUTERIZED TAX COLLECTION AND MANAGEMENT SYSTEM CHAPTER ONE 1.0 INTRODUCTION According to a world bank economic report on Nigeria published on the 1st of May 2013, it was stated that 95% of the government’s budgeted expenditure depended on its projected o... Continue Reading
DESIGN AND IMPLEMENTATION OF AN ONLINE COMPLAINT MANAGEMENT SYSTEM CHAPTER ONE 1.1 INTRODUCTION BACKGROUND TO THE STUDY Establishments like IT firm, school, hospitals, government secretarial, financial institutions etc. which have large numbers of customers or client received enormous amount of complaints per day, and these complain has... Continue Reading
DESIGN AND IMPLEMENTATION OF AN ONLINE VEHICLE AND PLATE NUMBER REGISTRATION AND IDENTIFICATION SYSTEM IN NIGERIA CHAPTER ONE INTRODUCTION 1.1 Background of study Traffic laws and regulations in Nigeria were inherited from colonial administration. The first Edith is the 1920 Road Traffic Ordinance of Lagos Colony and Southern Protector... Continue Reading
DESIGN AND IMPLEMENTATION OF ATTENDANCE MANAGEMENT SYSTEM CHAPTER ONE 1.1 Introduction Attendance Management System is software developed for daily student attendance in schools, colleges and institutes. If facilitates to access the attendance information of a particular Employee in a particular industry. The information is sorted by the o... Continue Reading
DESIGN AND IMPLEMENTATION OF FILE ENCRYPTION AND HASH SYSTEM CHAPTER ONE INTRODUCTION 1.O BACKGROUND OF THE STUDY The ongoing dilemma of digital age is balancing convenience against security. Security is a system safeguards for protecting information technology against disasters, system failure, and an unauthorized access that can re... Continue Reading
DESIGN AND IMPLEMENTATION OF FINGERPRINT VERIFICATION SYSTEM FOR CRIME CHAPTER ONE 1.1 Introduction I shall discuss on the techniques that will be employed by me on accomplishing this research work, its limitation and scope will be highlighted. 1.1 Background of Study Criminality is part and parcel of human nature and soc... Continue Reading
DESIGN AND IMPLEMENTATION OF FOLDER LOCKER APPLICATION FOR WINDOWS OS USING C#NET CHAPTER ONE Introduction 1.1 Background of the Research Because of the increasing threat to computer system and the information they store and process are valuable resources which need to be protected. Authentication refers to the techniques where user... Continue Reading
DESIGN AND IMPLEMENTATION OF INFORMATION MANAGEMENT SYSTEM FOR COMPUTER SCIENCE DEPARTMENT CHAPTER ONE 1.0 INTRODUCTION Information systems have become the backbone of most organizations. Banks could not process payments, governments could not collect taxes, hospitals could not treat patients, and supermarkets could not stock the... Continue Reading
DESIGN AND IMPLEMENTATION OF ONLINE VIDEO RENTAL SERVICE CHAPTER ONE 1.0 INTRODUCTION Renting, also known as hiring or letting, is an agreement where a payment is made for the temporary use of a good, service or property owned by another. A video rental shop/store is a physical business that rents home videos such as movie... Continue Reading
DESIGN AND IMPLEMENTATION OF SECURE WEB BASED COLLABORATIVE ENVIRONMENT CHAPTER ONE 1.0 Introduction Collaborative Virtual Environment (CVE) allows participant from distant geographic location to share a common virtual environment, including virtual entities and resources maintained by a group of computers. In such a way that it can su... Continue Reading
DESIGN AND IMPLEMENTATION OF SOFTWARE FOR TRACKING STUDENT PROFILE CHAPTER ONE 1.0 INTRODUCTION A system, with numerous definitions can be literally seen in a computer way as a collection of the hardware and software components of a computer. According to Stella C. Chiemeke and Franca A. Egbokdara (2006), a system is set of componen... Continue Reading
DESIGN AND IMPLEMENTATION OF PROJECT MANAGEMENT SYSTEM A STUDY OF COMPUTER SCIENCE DEPARTMENT CHAPTER ONE 1.0 INTRODUCTION One of the recent advances in the world of information technology is the rapid development of communication which has turned the world into a global village, we can send mails electronically (e-mail), sea... Continue Reading