Category Archives: Ict/ Computer Science Project Samples

DESIGN AND IMPLEMENTATION OF A WEB SITE FOR THE WEST AFTRICAN EXAMINATION COUNCIL

DESIGN AND IMPLEMENTATION OF A WEB SITE FOR THE WEST AFTRICAN EXAMINATION COUNCIL
(A CASE STUDY OF WAEC, NIGERIA)

Click here to download our android mobile app to your phone  for more materials and others

Note: our case study can be change to suit your desire location . we are here for your success.

ORDER NOW

COMPLETE MATERIAL  COST  N2,500 Or $10.  FRESH  PROJECT MATERIAL  COST 50,000 NAIRA FOR UNDERGRADUATE, OTHERS 100,000 -200,000 NAIRA.

MAKE YOUR PAYMENT  INTO ANY OF THE FOLLOWING BANKS:
 GTBANK
Account Name : Host Link Global Services Ltd
ACCOUNT NUMBER: 0138924237
First Bank:
Account Name: Chi E-Concept Int’l
Account Name: 3059320631

Foreign Transaction For Dollars Payment :
Bank Name: GTBank
Branch Location: Enugu State,Nigeria.
Account Name: Chi E-Concept Int’l
 Account Number:  0117780667. 
Swift Code: GTBINGLA 
Dollar conversion rate for Naira is 175 per dollar. 

Note:  We accept bank transfer, ATM cash transfer , Online payment using your ATM , Western union bank transfer.  We will respond to you anytime of the day. 

OR
PAY ONLINE USING YOUR ATM CARD. IT IS SECURED AND RELIABLE.

Enter Amount

CALL OUR  CUSTOMERS CARE  OKEKE CHIDI C ON :  08074466939,08063386834.

AFTER PAYMENT SEND YOUR PAYMENT DETAILS TO

08074466939 or 08063386834, YOUR PROJECT TITLE  YOU WANT US TO SEND TO YOU, AMOUNT PAID, DEPOSITOR NAME, UR EMAIL ADDRESS,PAYMENT DATE. YOU WILL RECEIVE YOUR MATERIAL IN LESS THAN 1 HOURS ONCE WILL CONFIRM YOUR PAYMENT.

WE HAVE SECURITY IN OUR BUSINESS.   

MONEY BACK GUARANTEE

ABSTRACT
As the society becomes more dependent on information technology (IT) to store and obtain information quickly and effectively, there has been increasing concern on how easy information could be accessed about research work or knowledge.
The internet in its ever-evolving state is becoming a serious method of business communication and data transfer world wide. As students and other Institutions and Organizations beginning to use the internet as a new method for awareness creation and information search, then there comes the need for a comprehensive website that will provide them with the comprehensive information they required especially in the aspect of result checking by the candidates of senior secondary school examination and private examinations of the West African Examination Council. This was what motivated me in embarking on this project work.
This research work was properly arranged to the understanding of a layman and finally, the web site was designed in pages but the scope was limited to the West African Examination Council, Nigeria.

TABLE OF CONTENTS

CHAPTER ONE
Introduction
1.1 Background of the study 1
1.2 Statement of the problem 2
1.3 Purpose of the study 3
1.4 Aims and objectives 3
1.5 Scope of the study 4
1.6 Assumptions 4
1.7 Definition terms 5
CHAPTER TWO
Literature Review
2.1 History of the internet 7
2.2 The difference between static and dynamic web pages 17
2.3 The requirements for connecting to the internet 46
CHAPTER THREE
Description and analysis of existing system
3.1 Fact finding methods used 53
3.2 Input, process and output analysis 54
3.3 Justification of the new system 56
CHAPTER FOUR
4.0 Design of the new system 68
4.1 Output specialization and design 69
4.2 Input specification and design 69
4.3 Procedure design 71
4.4 System flowchart 72
4.5 System requirements 73
CHAPTER FIVE
5.0 Implementation 79
5.1 Program design/flowcharts 79
5.2 Pseudopodia 109
5.3 Source program 110
5.4 Test run 110
CHAPTER SIX
Documentation
6.1 Identification 113

6.2 Program id 113
6.3 User information 113

CHAPTER SEVEN
7.0 Summary, Recommendation and Conclusion
7.1 Summary 115
7.2 Recommendation 116
7.3 Conclusion 117
Reference 118
CHAPTER ONE
INTRODUCTION
1.1 BACKGROUND OF THE STUDY
Information technology (IT) is able to facilitate the revolution of changes which optimizes performance and profitability to companies because it provides solution to one of the key business and communication barrier, distance and difficulties associated with crossing them. The emergent of internet and its technologies has led to the death of distance and collapsed the entire world into a global village.
The word “Website” means a collection of one or more electronic files, mainly web pages available to viewers via the Internet. All web pages are written with HTML which lets you format text; add graphics, sounds, video e.t.c.
The term “Web site” emanates from the introduction of world wide web (www) which is one of the application of Internet. World Wide Web (www) is the gustatory of our time. This is because anyone can create their own web site and then present it to the internet public therefore, the www serves as a cross plat form in the sense that, as long as the user can access the internet, he can as well gain access to the world wide web.
But, mere looking at all this our main aim on this project is to develop a comprehensive website for global access across the world.
1.2 STATEMENT OF THE PROBLEM
Most institutions and large organizations in Nigeria are yet to create or have a website for the smooth running of their day to day activities, thereby making it difficult for candidates and members to have access to valuable information. This is likely one of the major cause or out-dated knowledge that candidate suffer in checking examination Results from their various centers.
To cope with high pace technology in this information age, the researcher is prompted to develop a comprehensive web site that will serve as an effective channel or medium through which candidates of both WAEC and G.C.E can have access to their result online in any part of the world as well as retrieving updated information.

IMPORTANT OF COMPUTER IN SECURITY

IMPORTANT OF COMPUTER IN SECURITY

Click here to download our android mobile app to your phone  for more materials and others

Note: our case study can be change to suit your desire location . we are here for your success.

ORDER NOW

COMPLETE MATERIAL  COST  N2,500 Or $10.  FRESH  PROJECT MATERIAL  COST 50,000 NAIRA FOR UNDERGRADUATE, OTHERS 100,000 -200,000 NAIRA.

MAKE YOUR PAYMENT  INTO ANY OF THE FOLLOWING BANKS:
 GTBANK
Account Name : Host Link Global Services Ltd
ACCOUNT NUMBER: 0138924237
First Bank:
Account Name: Chi E-Concept Int’l
Account Name: 3059320631

Foreign Transaction For Dollars Payment :
Bank Name: GTBank
Branch Location: Enugu State,Nigeria.
Account Name: Chi E-Concept Int’l
 Account Number:  0117780667. 
Swift Code: GTBINGLA 
Dollar conversion rate for Naira is 175 per dollar. 

Note:  We accept bank transfer, ATM cash transfer , Online payment using your ATM , Western union bank transfer.  We will respond to you anytime of the day. 

OR
PAY ONLINE USING YOUR ATM CARD. IT IS SECURED AND RELIABLE.

Enter Amount

CALL OUR  CUSTOMERS CARE  OKEKE CHIDI C ON :  08074466939,08063386834.

AFTER PAYMENT SEND YOUR PAYMENT DETAILS TO

08074466939 or 08063386834, YOUR PROJECT TITLE  YOU WANT US TO SEND TO YOU, AMOUNT PAID, DEPOSITOR NAME, UR EMAIL ADDRESS,PAYMENT DATE. YOU WILL RECEIVE YOUR MATERIAL IN LESS THAN 1 HOURS ONCE WILL CONFIRM YOUR PAYMENT.

WE HAVE SECURITY IN OUR BUSINESS.   

MONEY BACK GUARANTEE

TABLE OF CONTENTS

Abstract

CHAPTER ONE
Introduction
Intrusion detection system

CHAPTER TWO
Fingerprints activated locks (door)
How the finger sensors works
Which type of sensors is the best

CHAPTER THREE
Benefits of the computerized locks (door)
Compromisation of a fingerprint
Use of a finger smart card
Firewall
Application safeguard

CHAPTER FOUR
Conclusion

Reference
ABSTRACT

Security has become one of the primary concerns when organizations and institutions like Hotels, Banks, and companies need to be acquainted with the latest developments on security locks. Regardless of the rareness and financial involvements, an increasing number of individuals and cooperate bodies are demanding for better security locks.
Even if an organisation is not security conscious with the introduction of such security system, they will go for one of the latest of these electronic locks.
CHAPTER ONE

INTRODUCTION
Computerized Security Locks
Voice activated, finger prints and infrared lock security is said to be protection against attack from without or subversion from within or afar, it is also precautions taken to keep somebody or something safe from crime, attack, or danger. The source of Texas instruments speaks and spell handheld electronic learning and, introduced in 1978, sparked the present growth of computerized speech, or what is called designated speech synthesis, voice-response systems, in which a computer “speaks” in response to a (non spoken) command, represent a market or under 20 million in 1978. By 1988 that market to estimates by SRI international in manlo park calif. Adding speech recognition, whereby a human voice activates electronic circuits to perform a specific task such as voice activated doors, the market by 1988 is forecast at around 1.3 billion to 1.8 billion, excluding defense and aerospace products.
A number of electronic products that features a computerized speech are already on the consumer market fidelity Electronic Computer chess player, chess challenges, “speaks” with a player; canon inc. and the Panasonic company introduced talking calculators this year; sharp corporation of Japan has digital clock radio that voices the time when a button is pressed. Computerized Security System (CSS) is one of the world’s largest security equipment suppliers and a leader in the electronic access management industry.
Through it’s subsidiaries SAFELOCK and GARD, CSS reaches countless hotels, multifamily properties, commercial facilities, military and government facilities and much more in the production of electronic locks.
Quasar has a talking microwave oven, fisher-price toys an talking dell, taxes instruments a talking language translator, and there are speech-synthesis attachments for personal computers. Prodding the computer-speech industry onward is a host of chip makers who will produce devices inexpensively for anyone able to purchase them in large quantities. The companies include taxes instrument, National Semiconductor Corporation, and the votrax division of federal screw works. Each of the three used a different electronic method to achieve the same and-linear predictive coding, waveform digitalization, and format synthesis. Format synthesis, which uses combined phonemes, the smallest sound units of speech, was also used with the IBM Audio Typing units, designed for the blind, which vocalizes the keypad struck by the user.
Voice recognition was receiving increasing attention too. Heuristic inc, of sunny vale, calif, for example introduced a speech recognition model that enables a hear siegler ADM-3A “dumb terminal” to be voice controlled, through 64-128 speaker-developed words or phrases at a time. The standard recognition accuracy rate is said to be better than 99 percent. Also, IBM researchers have developed a computer to transcribe speck from a 1,000 word vocabulary, printing is automatically with 91 percent accuracy. Malicious hackers are increasingly developing powerful software crime tools. Such as automatic computer virus generators, internet eavesdropping sniffers, passwords guessers, vulnerability testers, and computer service saturators. For example, an internet eavesdropping sniffer intercepts internet messages sent to other computers. A password guesser tries millions of combinations of characters in an effort to guess a computer’s password vulnerability testers look for software weaknesses. These crime tools are also valuable security tools used for testing the security of computers and networks.
An increasingly common hacker tool that has gained widespread public attention is the computer service saturation, used in denial-of-service attacks, which can shut down a selected or targeted computer on the internet by bombarding the computer with more requests than it can handle.
This tools first searches for vulnerable computers on the internet where it can install it’s own software program. Once installed, the compromised computers act like “zombies” sending usage requests to the target computer. If thousands of computers become infected with the software than all would be sending usage requests to the target computer, overwhelming it’s ability to handle the requests for service.

INTRUSION DETECTION SYSTEMS
Security software called intrusion detection systems may be used in computers to detect unusual and suspicious activity and in some cases, stop a variety of harmful actions by authorized persons. Abuse and misuse of sensitive system and application programs and data such as password, inventory, financial, engineering, and personnels files can be detected by this system.

INFRARED ACTIVATED LOCKS (DOORS)
Infrared (IR) lock was developed by SAFELOCK (as security company) to interface with energy management systems. IR provides wireless communications to and from the lock to give you an online lock system without all the hassles of running wires to each lock, there is an IR module in the room and on the lock that communication to a central computer, the central computer reports all keys used in the lock. Below are some of the devices – Electronic Control Unit (ECU) –safes –hospitality an easy-to-use handhold service as a

DESIGN AND IMPLEMENTATION OF CLUB SIDE MANAGEMENT INFORMATION TECHNOLOGY SYSTEM

DESIGN AND IMPLEMENTATION OF CLUB SIDE MANAGEMENT INFORMATION TECHNOLOGY SYSTEM

(CASE STUDY OF ENUGU RANGERS MANAGEMENT BOARD)

 

Click here to download our android mobile app to your phone  for more materials

COMPLETE PROJECT  MATERIAL COST 3000 NAIRA

 

Note: our case study can be change to suit your desire location . we are here for your success.

ORDER NOW

MAKE  PAYMENT  INTO ANY OF THE FOLLOWING BANKS:
 GTBANK
Account Name : Chi E-Concept Int’l
ACCOUNT NUMBER:  0115939447
First Bank:
Account Name: Chi E-Concept Int’l
Account Name: 3059320631

 

CALL Customer care on :  08074466939,08063386834.

AFTER PAYMENT SEND YOUR PAYMENT DETAILS TO

08074466939 or 08063386834, YOUR PROJECT TITLE  YOU WANT US TO SEND TO YOU, AMOUNT PAID, DEPOSITOR NAME, UR EMAIL ADDRESS,PAYMENT DATE.

WE HAVE SECURITY IN OUR BUSINESS.

MONEY BACK GUARANTEE

ABSTRACT

Nigeria is a seller loving country as football is being played all levels in a curbside there are venous farms representing various clubs in Nigeria. Club scale is a team sports played by eleven (ii) players (male or females) a earth such side of the opposites team. One of each team must be the goal keeper. Usually the gave may not, if are side or both presents less than ii players. The players. Seek to advance a round reflected leather or (rubber ball) forwards and between an opponents goal post and under crossbar ,, by either ticking scribbling or pushing it with any part of the body except curbside as gave which are played on national and international levels and have their governing bodies. They are usually played according to the rules loud down by the governing bodies they include sclera, Basket ball, hard ball volley ball etc. base on these sports and gone above, we Base on now discuss the following sport chibside as followers.

 

 

 

TABLE OF CONTENT

 

CHAPTER ONE

INTRODUCTION

  • Over view
  • The aim of study
  • Statement of problem
    • Purpose of Study
  • justification of work
  • Limitation of Study
  • Methodology

CHAPTER TWO

Literature Review

 

CHAPTER THREE

  • Description and Analysis of the Existing System
  • Method of Data Collection used.
    • Interview method.
    • Reference to written text
  • Input Analysis
  • Process Analysis
  • Output Analysis
  • Problem of the Existing System
  • Justification for the new System

 

CHAPTER FOUR

4.0     Design of the New system

  • Output Specification and Design
  • Input Specification and Design
  • File Design
  • Procedure Chart
  • System Flowchart
  • System Requirement

 

CHAPTER FIVE

Implementation of the new System

  • Program Design
  • Program Flowchart
  • Pseudo code
  • Source Using

 

CHAPTER SIX

Documentation

 

CHAPTER SEVEN

Recommendation Conclusion and

References

CHAPTER ONE

 

INTRODUCTION

  • OVER VIEW

Club scale is originated from Sunland in 1848. the advocate of foot ball met in Cambridge to drown up list of rules which because know as the Cambridge rules thus meeting was not sufficient that some school of through favour carrying the ball as permitted by Ref by. This result was favoured. In 1863 this group formed a football association called London football association. This body Exited until the formation of the federation of international football (FIFH) in 1904.

latest project materials and topics

  • AIMS AND OBJECTIVE OF STUDY

The aims and objectives of the study are as follow

  1. Develop of gave software for the club
  2. To unite the youths of the country after.
  • To fish out hidden sports men and women that will represent the country at international competitions.
  1. Any hosting state builds every sports faculty needed for all sports. This helps to develop sports from state to state competition is held every two years.

 

  • STATEMENT OF PROBLEMS

There are specific offences by a player is panelized by. The evolved of a direct free fuk to the opposing scale in club during the of competition in league. If the offence is committed in a player is awarded planarity to the opponent the offence are changing an opponent violently. Holding and pushing of opponent by had

 

Complete Material Cost #3000

Order Full Material Here

DESIGN AND IMPLEMENTATION OF COMPUTERIZED BANKING MONITOR INFORMATION SYSTEM

DESIGN AND IMPLEMENTATION OF COMPUTERIZED BANKING MONITOR INFORMATION SYSTEM
(A CASE STUDY OF CENTRAL BANK PLC ENUGU).

Click here to download our android mobile app to your phone  for more materials and others

Note: our case study can be change to suit your desire location . we are here for your success.

ORDER NOW

COMPLETE MATERIAL  COST  N2,500 Or $10.  FRESH  PROJECT MATERIAL  COST 50,000 NAIRA FOR UNDERGRADUATE, OTHERS 100,000 -200,000 NAIRA.

MAKE YOUR PAYMENT  INTO ANY OF THE FOLLOWING BANKS:
 GTBANK
Account Name : Host Link Global Services Ltd
ACCOUNT NUMBER: 0138924237
First Bank:
Account Name: Chi E-Concept Int’l
Account Name: 3059320631

Foreign Transaction For Dollars Payment :
Bank Name: GTBank
Branch Location: Enugu State,Nigeria.
Account Name: Chi E-Concept Int’l
 Account Number:  0117780667. 
Swift Code: GTBINGLA 
Dollar conversion rate for Naira is 175 per dollar. 

Note:  We accept bank transfer, ATM cash transfer , Online payment using your ATM , Western union bank transfer.  We will respond to you anytime of the day. 

OR
PAY ONLINE USING YOUR ATM CARD. IT IS SECURED AND RELIABLE.

Enter Amount

CALL OUR  CUSTOMERS CARE  OKEKE CHIDI C ON :  08074466939,08063386834.

AFTER PAYMENT SEND YOUR PAYMENT DETAILS TO

08074466939 or 08063386834, YOUR PROJECT TITLE  YOU WANT US TO SEND TO YOU, AMOUNT PAID, DEPOSITOR NAME, UR EMAIL ADDRESS,PAYMENT DATE. YOU WILL RECEIVE YOUR MATERIAL IN LESS THAN 1 HOURS ONCE WILL CONFIRM YOUR PAYMENT.

WE HAVE SECURITY IN OUR BUSINESS.   

MONEY BACK GUARANTEE

 

ABSTRACT

This project work is concerned with monitoring of Banking Operations a case study of CENTRAL BANK OF NIGERIA PLC.
The internet is used in this project and this is the acts over evolving state is becoming a serious method of business communication and data transfer worldwide. As such bank and other financial institution are beginning to use the internet as new vehicle for information mentoring.
The internet allow bank to after both new services and level of convenience for existing service and allowing the consumers and customers to interact from any computer capable of making appropriate connections.
The technological developments have made most banks and other financial institutions is be more responsive to change and it is imperative to adopt the latent technology in order to maintain operational efficiency as a means of wording off competitive threat, to increase speed of transaction improvement of customers conveniences by reducing barriers to entry into payment system and retail banking.

TABLE OF CONTENT

CHAPTER ONE
INTRODUCTIONS
1.1 Background of the study
1.2 Statement of the problem
1.3 Purpose of the study
1.4 Objective of the study
1.5 scope of the project
1.6 Limitations of study
1.7 Assumption of study
1.8 Data of terms

CHAPTER TWO
Review of related Literature
CHAPTER THREE
Description and Analysis of the existing system
3.1 General description and analysis of the existing system
3.2 Fact finding method used
3.3 Organization structure
3.4 objective of the existing system
3.5 input process and output analysis
3.6 information flow diagram
3.7 problem of the existing system
3.7 justifications for the new system

CHAPTER FOUR
Design of the new system
4.1 Output specification and design
4.2 Input specification and design
4.3 Procedure chart
4.4 System flowchart
4.5 System requirements

CHAPTER FIVE
IMPLEMENTATION
5.1 Program design
5.2 Program flow chart
5.3 Pseudo code
5.4 Source listing
5.5 Test run

CHAPTER SIX
DOCUMENTATION
6.1 System documentation
6.2 Program documentation
6.3 User documentation
CHAPTER SEVEN
CONCLUSION AND RECOMMENDATION
7.1 Conclusion
7.2 Recommendation
BIBLIOGRAPHY

CHAPTER ONE

INTRODUCTION
1.1 BACKGROUND OF THE STUDY
The greatest innovation that has taken place in the twenties century is in the realer of information technology. This is currently made possible by the introduction of the digital computers, which has been observed in the field of communication to be increasingly inseparable from communication. This linkages often referred to as amplified by business trends the technology and business, foster growth in network systems that use communication links to connect subsidiary system (nodes) which may sender and receive direct and information to,fro,sender and receive.
Taking of the internet a couple of years ago would have sound link a fair table but today the internet is pervasive in almost every field of human endeavour changing the fundamentals of how are conduct national as well as international business. Few years of existence, the internet information in Banking has shown that it can sliver the long sought after goal of electronic commerce.
It is worth noting that companies in developed countries world-wide have recognized the business potential of the internet and are getting connected to the network of network in their million back to be relevant to their customers in terms of the services they provide in the twenty first century and in the future most append this services provide by E-commerce in the banking system in order to stay in competition. Now that an on time banking is the on thing bank should get up and invest in internet technology information monitoring system to reap bounteously the benefit accruing from web banking.

1.2 STATEMENT OF PROBLEM
The advances in the world of information technology it is almost recorded on a daily basic consequently rendering former communication equipment obsolete as people tilt toward the improved electronics that support E-commerce made possible through the use of the internet in the banking sector.
Although a significant improvement has been recorded in the use and development technology information monitor in the banking industry over the last decade. Most banks are still far from implementing technology-based

DESIGN AND IMPLEMENTATION OF ON LINE CASH RECEIPT GENERATING SYSTEM FOR A SUPERMARKET.

DESIGN AND IMPLEMENTATION OF ON LINE CASH RECEIPT GENERATING SYSTEM FOR A SUPERMARKET.
(CASE STUDY OF RORBAN STORES LTD)

Click here to download our android mobile app to your phone  for more materials and others

Note: our case study can be change to suit your desire location . we are here for your success.

ORDER NOW

COMPLETE MATERIAL  COST  N2,500 Or $10.  FRESH  PROJECT MATERIAL  COST 50,000 NAIRA FOR UNDERGRADUATE, OTHERS 100,000 -200,000 NAIRA.

MAKE YOUR PAYMENT  INTO ANY OF THE FOLLOWING BANKS:
 GTBANK
Account Name : Host Link Global Services Ltd
ACCOUNT NUMBER: 0138924237
First Bank:
Account Name: Chi E-Concept Int’l
Account Name: 3059320631

Foreign Transaction For Dollars Payment :
Bank Name: GTBank
Branch Location: Enugu State,Nigeria.
Account Name: Chi E-Concept Int’l
 Account Number:  0117780667. 
Swift Code: GTBINGLA 
Dollar conversion rate for Naira is 175 per dollar. 

Note:  We accept bank transfer, ATM cash transfer , Online payment using your ATM , Western union bank transfer.  We will respond to you anytime of the day. 

OR
PAY ONLINE USING YOUR ATM CARD. IT IS SECURED AND RELIABLE.

Enter Amount

CALL OUR  CUSTOMERS CARE  OKEKE CHIDI C ON :  08074466939,08063386834.

AFTER PAYMENT SEND YOUR PAYMENT DETAILS TO

08074466939 or 08063386834, YOUR PROJECT TITLE  YOU WANT US TO SEND TO YOU, AMOUNT PAID, DEPOSITOR NAME, UR EMAIL ADDRESS,PAYMENT DATE. YOU WILL RECEIVE YOUR MATERIAL IN LESS THAN 1 HOURS ONCE WILL CONFIRM YOUR PAYMENT.

WE HAVE SECURITY IN OUR BUSINESS.   

MONEY BACK GUARANTEE

 

 

ABSTRACT
This project work, is a computerization it cash receipt system of an organization. Different source of receipt whose scope and limitation are based on.
a. Sales and purchased receipts/ invoices inquiry on total balance and generation of report.
But before we venture into that, attention should be drawn to the introductory part, the literati on review, and later the analysis of the existing system, and the design of the new system.
Since there is constrain in time, this project will not go on exhaustive treatment of every expected module, module, rather will represent only sales and purchases receipts modules with two other operational modules subset of the broad menu.
Nevertheless, there is provision for onward development of those expected modules and for other source of receipts and other operations to suit any organization.
It is not the intention here to treat each module separately hence the entire project is menu driven to cover some of the facilities present.
Lastly, it is an optimistic fact that after going through the text, one would be able to.
1. Know what is achieved have a clear knowledge of the project have a clear knowledge of the project be able to in prove it to suit other organization in reaction to other source and problems.

TABLE OF CONTENTS
CHAPTER ONE
INTRODUCTION
Statement of the problem
Purpose of the study
Aim and Objectives
Scope Delimitation

CHAPTER TWO
LITERATURE REVIEW
CHAPTER THREE
DESCRIPTION AND ANALYSIS OF THE EXISTING SYSTEM
Fact finding method used
Objective of the existing system
Input, Process, Output analysis
Problem of the existing system
Justification of the new existing system

CHAPTER FOUR
DESIGN OF THE NEW SYSTEM
Output specification and design
Input specification and design
File design
Procedure chart
Expected Benefits Of The New System

CHAPTER FIVE
IMPLEMENTATION
Introduction

CHAPTER SIX
DOCUMENTATION
Constraint (Limitation)

CHAPTER SEVEN
Recommendation And Conclusion
Reference
Appendix
Program Coding

CHAPTER ONE
1.0 INTRODUCTION
Cash receipt generating system is a viable source in any business organization and venture and so on, its main purpose is to maintain a more reliable records of money going out from the firm. This is look upon the view that the business organization most have business associates that exchange market with each other. It is a sure fact that the most have been a contract of which, there is an obligatory task that stands the terms of agreement, it could be a payment to their client or partners or from their client who pays into their own account. Another thing matters weather it will be cash without remark balance or install mental, and how many installment it is going to be.
This is clear stated in the organization activities and manner of operation. When ever there is payment, there is also the issuing of receipts this is centred on the writing of what each party has in stock.

1.1 JUSTIFICATION OF THE PROJECT
For there to be a computerized business operation, the business most be look upon in a new way of existence. No only being concerned with customers, prices output and so forth one should also consider the fact that data forms, information flows procedures etc. it is momentous on the basic that computers are used as a co-existing element to information system. This application is effective and productive because it enhance to process amore better information system.(Automated)
On this work, we shall basically look upon the possibility of making the outline orderly model of designing effect change. The process of changing system is systematic such that it is a repetition process. It is a fact to say that every system has what is called life cycle especially information system. By reviewing and modifying them, we say,

It is a system development cycle. The routine is always cyclical. It is on the system development that the familiar input processing output-feedback pattern of all system. The system development contains the output which consist of various organization information system. The feedback components help evaluate the effectiveness of the systems terms of changing requirements.

IN THE PROCESSING COMPONENTS WE HAVE THREE PARTS
System analysis
System design
System implementation.