Category Archives: Ict/ Computer Science Project Samples

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED CRIME MANAGEMENT SYSTEM

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED CRIME MANAGEMENT SYSTEM
CASTE STUDY: NIGERIAN POLICE FORCE CENTRAL POLICE STATION ENUGU.

Click here to download our android mobile app to your phone  for more materials and others

Note: our case study can be change to suit your desire location . we are here for your success.

ORDER NOW

COMPLETE MATERIAL  COST  N2,500 Or $10.  FRESH  PROJECT MATERIAL  COST 50,000 NAIRA FOR UNDERGRADUATE, OTHERS 100,000 -200,000 NAIRA.

MAKE YOUR PAYMENT  INTO ANY OF THE FOLLOWING BANKS:
 GTBANK
Account Name : Host Link Global Services Ltd
ACCOUNT NUMBER: 0138924237
First Bank:
Account Name: Chi E-Concept Int’l
Account Name: 3059320631

Foreign Transaction For Dollars Payment :
Bank Name: GTBank
Branch Location: Enugu State,Nigeria.
Account Name: Chi E-Concept Int’l
 Account Number:  0117780667. 
Swift Code: GTBINGLA 
Dollar conversion rate for Naira is 175 per dollar. 

Note:  We accept bank transfer, ATM cash transfer , Online payment using your ATM , Western union bank transfer.  We will respond to you anytime of the day. 

OR
PAY ONLINE USING YOUR ATM CARD. IT IS SECURED AND RELIABLE.

Enter Amount

CALL OUR  CUSTOMERS CARE  OKEKE CHIDI C ON :  08074466939,08063386834.

AFTER PAYMENT SEND YOUR PAYMENT DETAILS TO

08074466939 or 08063386834, YOUR PROJECT TITLE  YOU WANT US TO SEND TO YOU, AMOUNT PAID, DEPOSITOR NAME, UR EMAIL ADDRESS,PAYMENT DATE. YOU WILL RECEIVE YOUR MATERIAL IN LESS THAN 1 HOURS ONCE WILL CONFIRM YOUR PAYMENT.

WE HAVE SECURITY IN OUR BUSINESS.   

MONEY BACK GUARANTEE

 

ABSTRACT
Computerized crime management systems have been one of the most widely deployed management science technologies in the fight against crime. Computers are now in irremovable part of the arsenal of the fight against crime.
In this project work, based on the crime wave in our society today, it is very necessary to propose a computer based approach or search systems to facilitate the activities of the police who are interested in combating criminal cases especially crime.
It is suggested that the user interface problems is nearly insurmountable for local police agencies but that effective use of the computerized crime management system might be substituted for inadequate user interface design. Recommendations are provided to address the problems encountered.
TABLE OF CONTENTS

CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF THE PROBLEM
1.2 AIMS AND OBJECTIVES
1.3 PURPOSE OF STUDY
1.4 SIGNIFICANCE OF THE STUDY
1.5 SCOPE / DELIMITATION
1.6 LIMITATION AND CONCLUSION
1.7 ASSUMPTION OF STUDY
1.8 DEFINITION OF TERMS

CHAPTER TWO
2.0 REVIEW OF RELEVANT LITERATURE

CHAPTER THREE
3.0 DESCRIPTION AND ANALYSIS OF THE EXISTING SYSTEM
3.1 FACT FINDING METHODS / METHODOLOGY
3.2 ORGANIZATIONAL STRUCTURE
3.3 OBJECTIVES OF THE EXISTING SYSTEM
3.4 INPUT PROCESS AND OUTPUT ANALYSIS
3.4.1 INPUT ANALYSIS
3.4.2 PROCESS ANALYSIS
3.4.3 OUTPUT ANALYSIS
3.5 INFORMATION FLOW DIAGRAM
3.6 PROBLEMS OF THE EXISTING SYSTEM
3.7 JUSTIFICATION FOR THE NEW SYSTEM

CHAPTER FOUR
4.0 DESIGN OF THE NEW SYSTEM
4.1 DESIGN STANDARD
4.2 OUTPUT SPECIFICATION AND DESIGN
4.3 INPUT SPECIFICATION AND DESIGN
4.4 PROCEDURE CHART
4.5 SYSTEM FLOW CHART
4.6 SYSTEM REQUIREMENTS
4.6.1 HARDWARE REQUIREMENTS
4.6.2 SOFTWARE REQUIREMENTS
4.6.3 OPERATIONAL REQUIREMENTS
4.6.4 PERSONNEL REQUIREMENTS

CHAPTER FIVE
5.0 IMPLEMENTATION
5.1 DESIGN STANDARD
5.2 PROGRAM DESIGN
5.2.1 PROGRAM FLOWCHART
5.2.2 PSEUDOCODE
5.3 CODING
5.4 TEST DATA / TEST RUN
5.5 USER TRAINING – AN OVERVIEW
5.6 CUTOVER PROCESS
CHAPTER SIX
6.0 DOCUMENTATION
6.1 PROGRAM DOCUMENTATION
6.2 USER DOCUMENTATION

CHAPTER SEVEN
7.0 RECOMMENDATIONS, SUMMARY AND CONCLUSION
7.1 RECOMMENDATION
7.2 SUMMARY
7.3 CONCLUSION

REFERENCE

BIBLIOGRAPHY

APPENDIX
CHAPTER ONE
1.0 INTRODUCTION
The present, in his yearly state of he union message to congress announced a ground plan: “To bring the most advanced technology to the war on crime in every city and country in Nigeria”. In less than ten months congress and the president had put into law the omnibus and the president bad put into law the congress and the president has put into law the omnibus crime control and safe streets act of 2001. among other initiatives, this low created the Law Enforcement Assistance Administration, LEAA, specifically t deliver on the president is promise of technological assistance. They contributed nearly N50 million to state police and local government criminal justice and law enforcement agencies to fight crime. This founding was overmatched by other federal agencies such as the FBI and he states and local government police themselves. The police man date to “assist” was broad but a large share of its technological assistance was aimed at adding the powerful tools of management science and information system on the fight against crime.
The project focuses on a particular class of computer use, searches for vital information, that constitute the bulk of police computer activity. The results suggests that computerize search capability is widely and routinely used by both patrol officers and detectives, and that such uses are valued by the police in their fight against crime.

1.1 STATEMENT OF THE PROBLEM
The chronic lack of adequate information is the paramount difficulty facing the police in the fight against crime. The lack ranges from the police chief’s shortages, of information on how to deploy the department’s limited resources, to the practical problems of each patrol officer’s uncertainty over whom to stop and question regarding suspicious behaviour. The multi faceted management system approaches of the year addressed the problem with significant payoffs.
The challenge of improving the information provided in the patrol officer in the street or the detective working a case, was not amenable to such approaches. Rather, the only source of information on how to deal with specific individuals or cases was existing records. And the only means of using those records was to “look something up” Thus, records and searching form core of the information system that support the patrol and detective functions of the police.

1.2 AIMS AND OBJECTIVES
The fundamental objectives of the computerized crime management system are;
• Improves police effectiveness in

DESIGN AND IMPLEMENTATION OF COMPUTERIZED ECONOMIC GROWTH MONITORING SYSTEM

DESIGN AND IMPLEMENTATION OF COMPUTERIZED ECONOMIC GROWTH MONITORING SYSTEM
(CASE STUDY OF FEDERAL MINISTRY OF FINANCE)

Click here to download our android mobile app to your phone  for more materials and others

Note: our case study can be change to suit your desire location . we are here for your success.

ORDER NOW

COMPLETE MATERIAL  COST  N2,500 Or $10.  FRESH  PROJECT MATERIAL  COST 50,000 NAIRA FOR UNDERGRADUATE, OTHERS 100,000 -200,000 NAIRA.

MAKE YOUR PAYMENT  INTO ANY OF THE FOLLOWING BANKS:
 GTBANK
Account Name : Host Link Global Services Ltd
ACCOUNT NUMBER: 0138924237
First Bank:
Account Name: Chi E-Concept Int’l
Account Name: 3059320631

Foreign Transaction For Dollars Payment :
Bank Name: GTBank
Branch Location: Enugu State,Nigeria.
Account Name: Chi E-Concept Int’l
 Account Number:  0117780667. 
Swift Code: GTBINGLA 
Dollar conversion rate for Naira is 175 per dollar. 

Note:  We accept bank transfer, ATM cash transfer , Online payment using your ATM , Western union bank transfer.  We will respond to you anytime of the day. 

OR
PAY ONLINE USING YOUR ATM CARD. IT IS SECURED AND RELIABLE.

Enter Amount

CALL OUR  CUSTOMERS CARE  OKEKE CHIDI C ON :  08074466939,08063386834.

AFTER PAYMENT SEND YOUR PAYMENT DETAILS TO

08074466939 or 08063386834, YOUR PROJECT TITLE  YOU WANT US TO SEND TO YOU, AMOUNT PAID, DEPOSITOR NAME, UR EMAIL ADDRESS,PAYMENT DATE. YOU WILL RECEIVE YOUR MATERIAL IN LESS THAN 1 HOURS ONCE WILL CONFIRM YOUR PAYMENT.

WE HAVE SECURITY IN OUR BUSINESS.   

MONEY BACK GUARANTEE

ABSTRACT

Federal Ministry of Finance has always monitoring how economic growth is moving in this Nation. After the granting of internal autonomy to regions in 1946, there have been subsequent fiscal commission, military decrees Actes of Parliaments that reviewed both dreamed earning structure for Government. In the cause of this research work”. Design and implementation of Computerized Economic growth monitoring system Federal Ministry of Finance”, economic growth as constituent of revenue allocation has been checked in relation to the Federal Ministry of Finance (F.M.F) of the sectors that contributes more percentage to the ministry economy.
Indeed, up to the time of work, the issue of economic growth increment or amendment in salary structure came to shape focus with little or no counter check consequences viz: wage and price and employment; And money multiphers. Both the tiers of Government and the various workers union have refused to be amenable to Nigeria Financial trends haven observed that in recent years, the petroleum sector has become the main stay of Nigeria economy, in the fiscal year, 1964/67. However, it’s found that computer economic.

TABLE OF CONTENT

Title page
Certification
Dedication
Acknowledge
Abstract
Table of content

CHAPTER ONE
INTRODUCTION
1.1 Background of the study
1.2 Statement of the problem
1.3 Purpose of study
1.4 Aims and objective of study
1.5 Scope of the problem
1.6 Limitation of the study
1.7 Assumption
1.8 Definition of term

CHAPTER TWO
LITERATURE REVIEW

CHAPTER THREE
DESCRIPTION AND ANALYSIS
3.1 General description of the existing system
3.2 Methods of data collection used
3.3 Objectives of the existing
3.4 Organization structure
3.5 Input, process and output analysis
3.6 Information flow diagram
3.7 Problem of the existing system
3.8 Justification for the new system

CHAPTER FOUR
DESIGN OF THE NEW SYSTEM
4.1 Output specification and design
4.2 Input specification and design
4.3 File design
4.4 Procedure chart
4.5 System flowchart
4.6 System requirements

CHAPTER FIVE
IMPLEMENTATION OF THE NEW SYSTEM
5.1 Program design
5.2 Program flowcharts
5.3 Pseudo codes
5.4 Source program listing
5.5 Test run
CHAPTER SIX
DOCUMENTATION
DOCUMENTATION
6.1 System description
6.2 Program description
6.3 User guide

CHAPTER SEVEN
CONCLUSION AND RECOMMENDATIONS
7.1 Conclusion
7.2 Recommendation
Bibliography
CHAPTER ONE

INTRODUCTION
1.1 BACKGROUND OF STUDY
The federal ministry of finance was established in 1958 by the finance (control and management) ordinance, to replace the finance department. The ordinance conferred on the ministry the responsibility for the control and management of the public finance of the federation. In the 1080, attempts were made to re-organize the finance ministry either by existing some of its departments or ceding others to it. For example, in 1980 Budget office became an extra Ministerial Department under the executive office of the president and headed by a special Adviser to the president on Budget matters from 1987, the Budget office functioned once again under the ministry of finance and was surprised by its own merged with the ministry of National planning to form the office of Budget and planning in the presidency under ministry of state. Then in 1991, the Budget office was excised again from the ministry of budget and planning and returned to the ministry of finance where it is to date.
In the case of the customs, it was a department in the ministry of finance until 1985 when it was transferred to the Ministry of Internal Affair where it was managed under the customs, immigration and prisons services board, however, in 1992, customs was returned to the jurisdiction of the ministry of finance.
The revenue department is made up of three division namely Revenue Division, Petroleum Division and Research and Statistic Division. Given this background, the function of the department include monitoring, analyzing and reporting of the revenue inflow as from oil and non-oil revenue source.
In addition, the federal ministry of finance carries out revision exercise on monthly and quarterly basis, in respect of revenue from the sources (customs and excise including levies, company income tas, federal government independent revenue earned by Ministry / Parastatal and operating surplus from major government parastatals.

1.2 STATEMENT OF THE PROBLEM
Every organization is comprised of individuals that are recruited to offer diverse kinds of services, the cost of acquiring this task is translated into the payment made for carrying out this services.
Economic Growth Monitoring is an important aspect of any developing country particularly Nigeria, specifically. The federal Ministy of finance which is in the position to monitor and forecast Economic Growth has for

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED SECURITY INFORMATION SYSTEM FOR ENUGU STATE

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED SECURITY INFORMATION SYSTEM FOR ENUGU STATE
(A CASE STUDY OF NIGERIA POLICE FORCE)

Click here to download our android mobile app to your phone  for more materials and others

Note: our case study can be change to suit your desire location . we are here for your success.

ORDER NOW

COMPLETE MATERIAL  COST  N2,500 Or $10.  FRESH  PROJECT MATERIAL  COST 50,000 NAIRA FOR UNDERGRADUATE, OTHERS 100,000 -200,000 NAIRA.

MAKE YOUR PAYMENT  INTO ANY OF THE FOLLOWING BANKS:
 GTBANK
Account Name : Host Link Global Services Ltd
ACCOUNT NUMBER: 0138924237
First Bank:
Account Name: Chi E-Concept Int’l
Account Name: 3059320631

Foreign Transaction For Dollars Payment :
Bank Name: GTBank
Branch Location: Enugu State,Nigeria.
Account Name: Chi E-Concept Int’l
 Account Number:  0117780667. 
Swift Code: GTBINGLA 
Dollar conversion rate for Naira is 175 per dollar. 

Note:  We accept bank transfer, ATM cash transfer , Online payment using your ATM , Western union bank transfer.  We will respond to you anytime of the day. 

OR
PAY ONLINE USING YOUR ATM CARD. IT IS SECURED AND RELIABLE.

Enter Amount

CALL OUR  CUSTOMERS CARE  OKEKE CHIDI C ON :  08074466939,08063386834.

AFTER PAYMENT SEND YOUR PAYMENT DETAILS TO

08074466939 or 08063386834, YOUR PROJECT TITLE  YOU WANT US TO SEND TO YOU, AMOUNT PAID, DEPOSITOR NAME, UR EMAIL ADDRESS,PAYMENT DATE. YOU WILL RECEIVE YOUR MATERIAL IN LESS THAN 1 HOURS ONCE WILL CONFIRM YOUR PAYMENT.

WE HAVE SECURITY IN OUR BUSINESS.   

MONEY BACK GUARANTEE

ABSTRACT
Security of life and property is an essential need of an individual as well as a generate body. This calls for the need for a well-organized information security system.
Before the advent of computers, there was no security of vital information’s, files where pulled out from cabinets from sections, which might result to misplacement of individual files, and documents as a result this project was implemented.
This project emphasis on information which is produced in a way understandable by man and the need to store this information so that need to store this information so that it can be referenced when necessary, it also describes how all these could be done electronically. It shows how information could be stored, modified and recalled instantly and accurately through computerization with out access by authorized persons.
ORGANIZATION OF WORK
This work is divided into four sections namely the preliminaries, the chapters, the bibliography and the appendices. The preliminaries, the abstracts, dedications, acknowledgement, table of contents and the list of appendices.
The chapters were divided into seven, chapter one treats the problem and its setting. This includes the statement of the problems, purpose of the study, aims and objectives, scope and delimitation, limitations and constraint assumptions and defection of terms.
Chapter two treats the review of related literature which includes introduction, and a brief description of our police services.
Chapter three treats the description and analysis of the existing system, organization chart, information flow diagram.
Chapter four treats the design of the new system which involves the procedure, chart, file design, system flowchart and system requirement.
Chapter five of this study discusses the implementation of the new system.
Chapter six discusses the documentation of the new system.
Chapter seven summaries the entire work in a nutshell bringing into view its recommendation for future study.
The bibliography entitle the author’s name and books consulted during the course of the study.
Finally, the appendices comprises the program used to test the thesis.

TABLE OF CONTENTS
CHAPTER ONE
Introduction
1.1 Background of the study
1.2 Statement of problem
1.3 Purpose of study
1.4 Scope of study
1.5 Limitations
1.6 Assumption
1.7 Definition of terms

CHAPTER TWO
Literature review
CHAPTER THREE
Descriptions and analysis of the existing system
3.1 General description of the existing system
3.2 Methods of fact finding used
3.3 The organizational structure
3.4 Objectives of the existing system
3.5 Input, process, and output analysis
3.6 Information flow diagram
3.7 Problem of the existing system
3.8 Justification for the new system

CHAPTER FOUR
Design of the new system
4.1 Output specifications and design
4.2 Input specifications and design
4.3 File design
4.4 Procedure chart
4.5 System flowchart
4.6 System requirements

CHAPTER FIVE
Implementation
5.1 Program design
5.2 Program flow chart
5.3 Psendocodes
5.4 Sources programs
5.5 Test run

CHAPTER SIX
Documentation
6.1 System documentation
6.2 Program documentation
6.3 User documentation
CHAPTER SEVEN
Conclusion and Recommendation
7.1 Conclusion
7.2 Recommendation
Bibliography

CHAPTER ONE
INTRODUCTION
1.1 BACKGROUND OF STUDY
Information system occupies a vital and unique position in any organization by virtue of the data and information, which it contains. Security of information is of great importance to any given organization this makes the information reliable since information stored can be referenced whenever necessary access by unauthorized persons.
This project analysis the activities and importance of securing information in any organizations and to see that the information is accurately maintained to help the management in decision making and control of the diverse activities of the organization.
The Nigeria police force is responsible for security of live and property and as a result keeps record of vital information given to them by any informant so as to enable them arrest activities or scenes unpleasant to people residing in a particular district.
Therefore, for effective administration and management, the provision of computer based information security for every source station is certainly inevitable, since it will take care of all the problems and inadequacies of the manual system.
1.2 STATEMENT OF THE PROBLEM
Inspite of the level of computation of various organizations, this particular organization on discussion is still at the grass root level. It requires a certain degree of protection especially of vital equipments, properties and information and this cannot be realized through the current system of

DESIGN AND IMPLEMENTATION OF AN ON-LINE LAN KNOWLEDGE-BASED SYSTEM.

DESIGN AND IMPLEMENTATION OF AN ON-LINE LAN KNOWLEDGE-BASED SYSTEM.

Click here to download our android mobile app to your phone  for more materials and others

Note: our case study can be change to suit your desire location . we are here for your success.

ORDER NOW

COMPLETE MATERIAL  COST  N2,500 Or $10.  FRESH  PROJECT MATERIAL  COST 50,000 NAIRA FOR UNDERGRADUATE, OTHERS 100,000 -200,000 NAIRA.

MAKE YOUR PAYMENT  INTO ANY OF THE FOLLOWING BANKS:
 GTBANK
Account Name : Host Link Global Services Ltd
ACCOUNT NUMBER: 0138924237
First Bank:
Account Name: Chi E-Concept Int’l
Account Name: 3059320631

Foreign Transaction For Dollars Payment :
Bank Name: GTBank
Branch Location: Enugu State,Nigeria.
Account Name: Chi E-Concept Int’l
 Account Number:  0117780667. 
Swift Code: GTBINGLA 
Dollar conversion rate for Naira is 175 per dollar. 

Note:  We accept bank transfer, ATM cash transfer , Online payment using your ATM , Western union bank transfer.  We will respond to you anytime of the day. 

OR
PAY ONLINE USING YOUR ATM CARD. IT IS SECURED AND RELIABLE.

Enter Amount

CALL OUR  CUSTOMERS CARE  OKEKE CHIDI C ON :  08074466939,08063386834.

AFTER PAYMENT SEND YOUR PAYMENT DETAILS TO

08074466939 or 08063386834, YOUR PROJECT TITLE  YOU WANT US TO SEND TO YOU, AMOUNT PAID, DEPOSITOR NAME, UR EMAIL ADDRESS,PAYMENT DATE. YOU WILL RECEIVE YOUR MATERIAL IN LESS THAN 1 HOURS ONCE WILL CONFIRM YOUR PAYMENT.

WE HAVE SECURITY IN OUR BUSINESS.   

MONEY BACK GUARANTEE

 

ABSTRACT
The project is designed specially for those hardware engineers/computer scientist who are just commerce their carries in the field of installation and maintenance of computer network. While the theories are meant for commercial applicant that are interested in using the programme technique.
Further more, in this project design, the principle of different type of network configuration are been highlighted. And emphasis are made on the installation and maintenance techniques. Finally, appropriate information are been acquired from human experts in the field of network.

ORGANISATION OF THE WORK
This study is organized into chapters. And each chapter handles specific subject area explicitly. The chapter are further broken down into smaller unit (subheading) to enable a better understanding of the study. The further arrangements is shown in the table of content.

TABLE OF CONTENT
CHAPTER ONE: INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE AND PRELIMITATION
1.5 LIMITATIONS OR CONSTRAINTS
1.6 ASSUMPTIONS
1.7 DEFINITION OF TERMS

CHAPTER TWO
LITERATURE REVIEW
HIERARCHICAL TOPOLOGY
STARTOPOLOGY
BUSTOPOLPGY
RING NETWORK
BNC CONNECTOR

CHAPTER THREE
3.0 DESCRIPTION AND ANALYSIS OF EXISTING SYSTEM
3.1 FACT FINDINGS METHOD USED
3.2 OBJECTIVES OF THE EXISTING SYSTEM
3.3 INOUT ANALYSIS
3.4 PROCESS ANALYSIS
3.5 OUTPUT ANALYSIS
3.6 PROBLEMS OF THE EXISTING SYSTEM
3.7 JUSTIFICATION OF THE NEW SYSTEM

CHAPTER FOUR
4.1 DESIGN OF THE NEW SYSTEM OUTPUT SPECIFICATION AND DESIGN
4.2 FILE DESIGN
4.3 PROCEDURE CHART
4.4 SYSTEM FLOW CHAR
4.5 SYSTEM REQUIREMENT

CHAPTER FIVE
5.1 IMPLEMENTATION
5.2 PROGRAM DESIGN
5.3 PROGRAM FLOW CHART
5.4 PSEUDOCODES
5.5 SOURCE PROGRAM
5.6 TEST RUN

CHAPTER SIX
DOCUMENTATION

CHAPTER SEVEN
7.1 RECOMMENDATION
7.2 CONCLUSION
APPENDICES/REFERENCE
CHAPTER ONE
INTRODUCTION
How is computer and other related devices actually able to send information across data communication lines. The answer to this is the installation and maintenance of computer network. Furthermore, installation and maintenance of computer network is the glue that holds all data in the exact form, the data is to be transfer from one place to another. While the procedures for installation of computer methods are embodies in this project.

STATEMENT OF THE PROBLE
Computer hardware may fail, telephone line may fail and more likely, the computer software may have bugs that make the network stop working. How does the airlines clerk sell tickets when the computer is down? How can the pilot send a message across if the network fails? How do you get your electronic mail, pay bills, get news, if you become dependent on computer networks that sometimes fails. If you put a shaved database, you want to be sure that it will not disappear or be tampered with. It you can use home computer raid your account and toil will your money?
A company that puts all its important data in line runs the risk to go out of business if that information is boss or incorrect.
Furthermore, support the owners of a saved data based want only certain people to use it one way to limit use, is to give a password to those people alone, that will have access to it and before opening the data base, the computer will ask the user to enter a password.
Password protection is not parted, though if someone finds out your password and use it, the computer will not know that such password is been used illegally by such person.
Finally, inability of the computer scientist to observe appropriate procedure in connection during installation poses treat to them, which however may lead to damage of the computer and cards.

PURPOSE OF THE STUDY
The purpose of the study is to design a system which shall render an assistance to the computer scientist during the installation and maintenance of a compute network. Moreover, proper installation of various components of the networks are achieved and the prevention and corrective maintenance are properly added.

DESIGN AND IMPLEMENTATION OF COMPUTER BASED TUTORIAL ON AIDS AWARENESS AMONAST STAFF AND UNDER GRADUATES OF IMT-ENUGU

DESIGN AND IMPLEMENTATION OF COMPUTER BASED TUTORIAL ON AIDS AWARENESS AMONAST
STAFF AND UNDER GRADUATES OF IMT-ENUGU

Click here to download our android mobile app to your phone  for more materials and others

Note: our case study can be change to suit your desire location . we are here for your success.

ORDER NOW

COMPLETE MATERIAL  COST  N2,500 Or $10.  FRESH  PROJECT MATERIAL  COST 50,000 NAIRA FOR UNDERGRADUATE, OTHERS 100,000 -200,000 NAIRA.

MAKE YOUR PAYMENT  INTO ANY OF THE FOLLOWING BANKS:
 GTBANK
Account Name : Host Link Global Services Ltd
ACCOUNT NUMBER: 0138924237
First Bank:
Account Name: Chi E-Concept Int’l
Account Name: 3059320631

Foreign Transaction For Dollars Payment :
Bank Name: GTBank
Branch Location: Enugu State,Nigeria.
Account Name: Chi E-Concept Int’l
 Account Number:  0117780667. 
Swift Code: GTBINGLA 
Dollar conversion rate for Naira is 175 per dollar. 

Note:  We accept bank transfer, ATM cash transfer , Online payment using your ATM , Western union bank transfer.  We will respond to you anytime of the day. 

OR
PAY ONLINE USING YOUR ATM CARD. IT IS SECURED AND RELIABLE.

Enter Amount

CALL OUR  CUSTOMERS CARE  OKEKE CHIDI C ON :  08074466939,08063386834.

AFTER PAYMENT SEND YOUR PAYMENT DETAILS TO

08074466939 or 08063386834, YOUR PROJECT TITLE  YOU WANT US TO SEND TO YOU, AMOUNT PAID, DEPOSITOR NAME, UR EMAIL ADDRESS,PAYMENT DATE. YOU WILL RECEIVE YOUR MATERIAL IN LESS THAN 1 HOURS ONCE WILL CONFIRM YOUR PAYMENT.

WE HAVE SECURITY IN OUR BUSINESS.   

MONEY BACK GUARANTEE

ABSTRACT
AIDS has become a serious problem all over the world. Everybody need to be informed about HIV/ AIDS. In this project work, efforts have been made to inform the students and staff of higher institution of the danger of AIDS to human life. What distinguishes this work form all other AIDS awareness program is the fact that it is properly document and can be easily used by any student or staff even if the person is not a computer literate.
Also this work considered the fact that human brain sometime doesn’t store some vital information for a long time. This is because of the information filtering in the human information processing system. Because of this some feature were used in the tutorial program to permeate human filters thereby establishing the information in the mind of the user.
Also this work took an indebt look on the origin of AIDS, its causes transmission, prevention and some other current development towards the fight against its spread. When implemented it will go a long way in the prevention of the HIV spread.
TABLE OF CONTENT
CHAPTER ONE
1.0 Introduction 1
1.1 statement of problem 2
1.2 Purpose of the study 3
1.3 Aims and objective 4
1.4 Scope of the study 5
1.5 Limitation of the study 5
1.6 Definition of terms 6
CHAPTER TWO
Literature Review 8
CHAPTER THREE
3.0 Definitions and analysis of existing system 16
3.1 Fact finding method used 16
3.2 Organization chart of IMT 18
3.3 Objective of the existing system 19
3.4 Information flow diagram 20
3.5 Problem of the existing system 20
3.6 Justification for the new system 23
CHAPTER FOUR
4.0 Design of the new system 25
4.1 Output specification and design 25
4.2 Input specification and design 27
4.3 File organization 27
4.4 System flowchart 28
4.5 Procedure chart 29
4.6 System requirement 29
CHAPTER FIVE
5.0 Implementation 31
5.1 program design 31
5.2 Pseuocode 32
5.3 Program flow chart 34
CHAPTER SIX
6.0 Documentation 39
CHAPTER SEVEN
Recommendation 42
Conclusion 43
Reference 45
CHAPTER ONE
1.0 INTRODUCTION
Despite all the awareness programs on AIDS, it is like greater number of people are still not well informed about the menace of AIDS in the society. It is guit appalling that even among the student of higher institution and some staff in the campus community that AIDS awareness program has not gone deep inside them. Most of the awareness programs are through public lecture and some other means that are not computer based. The effect of this is that, proper documentation of the lessons is not done and this has made it impossible for people (students and staff) to go back to reference such materials. Ti is impossible to determine the prevalence of HIV/AIDS in the university/ campus community because nobody to data has come out in the open to acknowledge being HIV positive in the campus and death certificates do not state whether one died of an AIDS related illness or not.
The lack of the higher institution information on the disease is attributed to inadequate record. Available records were found to be inadequate foe two principal reassure:
1. They make almost no mention of AIDS
2. They are incomplete to the extent that they do not capture the situation of the campus personnel.
Infact records that might throw height on the prevalence of HIV/AIDS on campus did not appear to be held by any of the central administration (registrar, personnel officer, etc). These lapses are addressed in this project work. This work incorporates some features that makes the awareness tutorial an interesting one. Also the proper documentation (computer based) makes it easy to reference.

1.1 STATEMENT OF PROBLEMS
A lot of people (student and staff) do not understand the relationship between HIV and Aids. Because the HIV Incubation period varies from one person to another. Some people will develop AID after about two month of up to 5 HIV. While other may last up to 5 month or more. The valve point here in that, give the long period that Inference between HIV Infection and the emergence of full- blown AID, the full extent of student HIV Infection will not unfold until students have graduated from the university/campus and entries the words of wor