ABSTRACT As the complexity and degree of crimes wider, system Nigeria new technology will have to be utilized to aid lawyers and criminologist to fight this tends, on computerized crime record will offer a solution on this issue. It is a software set up in order to meet the information needs of every part of the agency about crime record. The ... Continue Reading
ABSTRACT This Project work intends to address some of the problems encountered in the allocation of hostels to students manually in Universities, using University of Calabar as the case study. The growing number of students in higher institutions posed a lot of accommodation problems on the part of students and school management. Some of the pro... Continue Reading
CHAPTER ONE 1.0 INTRODUCTION BACKGROUND OF THE STUDY The world is fast becoming a global village and a necessary tool for this process is communication of which telecommunication is a key player. The quantum development in the telecommunications industry all over the world is very rapid as one innovation r... Continue Reading
CHAPTER ONE BACKGROUND OF THE STUDY 1.1 INTRODUCTION The advent of computer Technology has brought relief to repetitive tasks and has helped in the better management and origination of data. Information management system can be applied to any system that facilitates storage, management and retrieved of data and information required fo... Continue Reading
ABSTRACT A vehicle is a mobile machine that transports passengers or cargo. Automated vehicle identification system, is software that will assist the security men in recognizing an official car in Federal Polytechnic Nekede. This software is an expert system will be program with the knowledge of someone that is charge of assigning official car t... Continue Reading
CHAPTER ONE INTRODUCTION BACKGROUND OF THE STUDY An Office was described as a place where all the official or paper work are done or performed. But in this era of information technology, office is no longer referred to a place but it as set of function for doing office work or activity (Nwoke: 2013). An office helps us to perform different t... Continue Reading
CHAPTER ONE GENERAL INTRODUCTION INTRODUCTION Insurance is a promise of compensation for specific potential future losses such as damage, illness or death in exchange for a periodic payment. It is designed as a risk management mechanism to protect the financial well being of an individual, company or other entities in the case of unexpected ... Continue Reading
CHAPTER ONE INTRODUCTION 1.0 Introduction The emergency ambulance dispatch system or computer aided dispatch system (CAD) is a web based application that efficiency receives a phone call from all services, records the details of an emergency including location, find the next available ambulance and dispatches the ambulance as... Continue Reading
CHAPTER ONE 1.1. BACKGROUND OF THE STUDY A database is an organized collection of data.[1] It is the collection of schemes, tables, queries, reports, views and other objects. The data is typically organized to model aspects of reality in a way that supports processes requiring information, such as modelling the availability of rooms in hotels... Continue Reading
ASSESSMENT OF THE UTILIZATION OF INTERNET SERVICES AMONG STUDENTS IN FEDERAL INSTITUTIONS IN KADUNA STATE ABSTRACT The research provides an assessment of the utilization of internet services among students in federal institution in Kaduna State. It provides a conceptual and theoretical appraisal of the nature, challenges and signif... Continue Reading
CHAPTER ONE 1.1. INTRODUCTION It is safe to say that most activities such as hostel allocation carried out in most universities in Nigeria are done manually. Therefore, there is a lot of strain on the individuals running the hostels. An E-Hostel system is simply software developed for managing most activities that take place in the hostels w... Continue Reading
ABSTRACT The Bank Verification Number (BVN) became imperative following the increasing incidence of compromise on conventional security systems such as password and Personal Identification Number (PIN) of customers. The BVN involves identifying an individual based on physiological or behavioral attributes, such as fingerprint, signatures and ot... Continue Reading
CHAPTER ONE 1.1. INRODUCTION An online examination system for recruitment of staff is a web application that establishes a network between the organization and applicants. The organization enters on the site the questions they want in the exam. These questions are displayed as a test to the eligible students. The answers inputted by the appli... Continue Reading
CHAPTER ONE 1.1. BACKGROUND OF THE STUDY When one looked back with analytical mid, we can concluded that computer technology keeps an advancing with remarkable increase in speed accuracy and reliability. Computing in whatever field i.e. science, Business and industry is reaching directly or indirectly into various aspect of our society withou... Continue Reading
CHAPTER ONE 1.1. INTRODUCTION A search engine is an information retrieval system designed to help find information stored on a computer system. The search results are usually presented in a list and are commonly called hits. Search engines help to minimize the time required to find information and the amount of information which must be cons... Continue Reading