Search result(s): 601 - 615 of 1236 » Department » Computer Science

poverty and unemployment in nigeria causes effects and remedies

Poverty And Unemployment In Nigeria Causes Effects And Remedies ABSTRACT This study is an econometric method of research that analyzed the causes, effects and remedies of poverty and unemployment in Nigeria. It covered a period of 20 years 1991-2010 hence a time series analysis descriptive statistics and regression model was used to estimate th... Continue Reading

Computer Science

impact of ict usage on the student academic performance

IMPACT OF ICT USAGE ON THE STUDENT ACADEMIC PERFORMANCE ABSTRACT This study was intended to evaluate the effect of ICT usage on academic performance of students. This study was guided by the following objectives; To examine the relationship between computer usage and academic achievement of HNAUB student, To examine the effectiveness of compu... Continue Reading

Computer Science

effect of computer usage on academic performance of students

EFFECT OF COMPUTER USAGE ON ACADEMIC PERFORMANCE OF STUDENTS ABSTRACT This study was intended to evaluate the effect of computer usage on academic performance of students. This study was guided by the following objectives; To examine the relationship between computer usage and academic achievement of secondary school students in Nigeria, To e... Continue Reading

Computer Science

design and implementation of a digital library system

DESIGN AND IMPLEMENTATION OF A DIGITAL LIBRARY SYSTEM ABSTRACT Libraries have been an important part of educational and information sector of any school. The success of any library largely depends on proper management. Continue Reading

Computer Science

design and implementation of a computerized game

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED GAME (CASE STUDY LUDO GAME) CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF THE STUDY Ludo (latin word “ludus” -“I play”) is a board game for two to four players, in which the players race their four tokens from start to finish according to die rolls. Like other cross and circle games, L... Continue Reading

Computer Science

design and simulation of secure virtual private network (vpn) over an open network (internet) infrastructure

Design And Simulation Of Secure Virtual Private Network (VPN) Over An Open Network (internet) Infrastructure ABSTRACT The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread ... Continue Reading

Computer Science

appraisal of the use of automated teller machine (atm) in the banking industry

APPRAISAL OF THE USE OF AUTOMATED TELLER MACHINE (ATM) IN THE BANKING INDUSTRY IN NIGERIA. ABSTRACT This work is based on the appraisal of the Automated Teller Machine. It involves the use of Diffusion of Innovation (DOI) model which comprises of the relative advantage, compatibility, complexity, trialability, observability for the analysis o... Continue Reading

Computer Science

appraisal of the use of automated teller machine (atm) in the banking industry

APPRAISAL OF THE USE OF AUTOMATED TELLER MACHINE (ATM) IN THE BANKING INDUSTRY IN NIGERIA. ABSTRACT This work is based on the appraisal of the Automated Teller Machine. It involves the use of Diffusion of Innovation (DOI) model which comprises of the relative advantage, compatibility, complexity, trialability, observability for the analysis o... Continue Reading

Computer Science

appraisal of the use of automated teller machine (atm) in the banking industry

APPRAISAL OF THE USE OF AUTOMATED TELLER MACHINE (ATM) IN THE BANKING INDUSTRY IN NIGERIA. ABSTRACT This work is based on the appraisal of the Automated Teller Machine. It involves the use of Diffusion of Innovation (DOI) model which comprises of the relative advantage, compatibility, complexity, trialability, observability for the analysis o... Continue Reading

Computer Science

design and implementation of database management system case of an abiolian solution limited address book

Design And Implementation of Database Management System Case of an Abiolian Solution Limited address Book CHAPTER ONE INTRODUCTION 1.1 Background Of The Study A database is an organized collection of data. It is the collection of schemas, tables, queries, reports, views, and other objects. The data are typically organized to model aspec... Continue Reading

Computer Science

detection of invalid cash transaction in ikot ekpene diamond bank

CHAPTER ONE INTRODUCTION 1.0 Introduction Fraud encompasses a wide range of illicit practices and illegal acts involving intentional deception or misrepresentation. The Institute of Internal Auditors’ International Professional Practices Framework (IPPF) defines fraud as: “… any illegal act characterized by deceit, concealment, or violatio... Continue Reading

Computer Science

detection of invalid cash transaction in ikot ekpene diamond bank

CHAPTER ONE INTRODUCTION 1.0 Introduction Fraud encompasses a wide range of illicit practices and illegal acts involving intentional deception or misrepresentation. The Institute of Internal Auditors’ International Professional Practices Framework (IPPF) defines fraud as: “… any illegal act characterized by deceit, concealment, or violatio... Continue Reading

Computer Science

design and implementation of medical diagnosis of typhoid using general hospital

CHAPTER ONE INTRODUCTION 1.0 Introduction This chapter presents the introduction to design and implementation of a medical diagnosis system for typhoid fever. It presents the introduction, theoretical background, statement of the problem, aim and objectives of the study, significance of the study, scope of the study, organization of the re... Continue Reading

Computer Science

automated membership record management

CHAPTER ONE INTRODUCTION 1.0 Introduction Church records management is an area that nobody in the church thinks about; they simply expect that when they need access to a record, someone from the church will be able to find it. While we all wish records were that simple, the fact is that efficient management of records requires some thought... Continue Reading

Computer Science

design and implementation of assets management system

CHAPTER ONE INTRODUCTION 1.0 Introduction Asset management is defined as the systematic and coordinated activities and practices through which an organization optimally and sustainably manages its assets and asset systems, their associated performance, risks and expenditures over their life cycles for the purpose of achieving its organizat... Continue Reading

Computer Science

About e-Project Material Centre


e-Project Material Centre is a web service aimed at successfully assisting final year students with quality, well researched, reliable and ready made project work. Our materials are recent, complete (chapter 1 to Minimum of Chapter 5, with references) and well written.INSTANT ACCESS! INSTANT DOWNLOAD. Simply select your department, choose from our list of topics available and explore your data

Why Students Love to Use e-Project Material ?


Guaranteed Delivery Getting your project delivered on time is essential. You cannot afford to turn in your project past the deadline. That is why you must get your project online from a company that guarantees to meet your deadline. e-Project Topics Material Centre is happy to offer instant delivery of projects listed on our website. We can handle just about any deadline you send our way. Satisfaction Guaranteed We always do whatever is necessary to ensure every customer's satisfaction

Disclaimer


e-Project Topics Material Centre will only provide projects as a reference for your research. The projects ordered and produced should be used as a guide or framework for your own project. The contents of the projects should be able to help you in generating new ideas and thoughts for your own project. It is the aim of e-Project Topics Centre to only provide guidance by which the projects should be pursued. We are neither encouraging any form of plagiarism nor are we advocating the use of the projects produced herein for cheating.

Terms and Condition


Using our service is LEGAL and IS NOT prohibited by any university/college policies You are allowed to use the original model papers you will receive in the following ways:
  • As a source for additional understanding of the subject
  • As a source for ideas for you own research (if properly referenced)
  • For PROPER paraphrasing ( see your university definition of plagiarism and acceptable paraphrase) Direct citing ( if referenced properly)
Thank you so much for your respect to the authors copyright