TABLE OF CONTENTS DECLARATION . APPROVAL LISTOF FIGURES v LIST OF ABBREVIATIONS ABSTRACT iv CHAPTERONE 1 BACKGROUND 1 1.0 Introduction 1 1.1 Background of study 1 1.2 Problem Statement 2 1.3 Proposed system 2 1.4 Objectives 2 1.4.0 Main Objectives 2 1.4.1 Specific Objectives 2 1.6 Scope of study 3 1.7 Expected Significance of study 3 CHAPTER TWO 4... Continue Reading
TABLE OF CONTENT Declaration ii Approval iii Dedication iv Acknowledgements v List ofAbbreviations/Acronyms vi List ofTables and Figures vii TABLE OF CONTENT viii Abstract/Executive Summary CHAPTER ONE:fNTRODUCTJON TO THE STUDY 2 1.0 Background information 2 1.1 Statement of the Problem 3 1.2 General objective 3 1.3 Specific objectives 4 1.4... Continue Reading
ABSTRACT The report is about a design of Gema Women’s group website. The group is a self sponsored con~imunity development group that provides voluntary services for the less fortunate persons within the society. Due to uncontrollable increase in membership within the group there was need for a fast yet cost effective way of managing the... Continue Reading
ABSTRACT In this project about online car rental system the trend of c-business has~ been highlighted where by some car renting agencies have changed from traditional way of booking to an electronic one. Mainly a number of aspects have been stressed which include business process, technological enhancement, diversification, flexibility,... Continue Reading
ABSTRACT The research focused on the challenges of developing computerized information systems in a supermarket. The research study involved visiting Uchurni supermarket which uses manual file based system for managing inventory data, they face problems like data redundancy and inconsistency whereby some information are duplicated in several files... Continue Reading
Abstract This Study Showed How Efficiency And Security Can Be Enhanced In The Management Of Examination Result Of Students In The School Of Computer Studies The Researchers Went To The Case Study And Used Interview, Observation And Dissemination Of Questionnaires, To Collect Data At The School With A Bias Towards The Examination Office. This Data... Continue Reading
ABSTRACT Tumaini center is located in Ukonga a suburb of the town center 8 kilometers from the city of Dar es salaam. This center is still using paper based file system to collect and store data, the paper based file system has been faced with many problems in daily working such as losing of some document, lack of security, data duplication,... Continue Reading
TABLE OF CONTENTS Declaration Approval Acknowledgement CHAPTER ONE INTRODUCTION 1.1 Background 1 1.2 Statement of the problem 2 1.3Scope 2 1 .4 Objectives of the project 3 1 .4.1 Main objectives 3 1 .4.2 Specific objectives 3 1 .5 Research questions 4 1.6 Conceptual Framework 4 1 .7 Significance of the study 5 CHAPTER TWO LITERATURE REVIEW 2.0... Continue Reading
ABSTRACT An Optimized loan process management system is meant to store, update and help in the follow up of clients who are on loan program at Kitgum Cooperative Savings and Credit Society in loan department and store confidential information on them. This will also cater a newly accepted client under the department. It's in due course because of... Continue Reading
ABSTRACT Victoria high school has undergone a complete redecoration the manual way of keeping records has now been digitalized so as to ease the storing of the required data. The researcher designed a fees payment and monitoring system for school bursar that provided all the school’s functions in order to improve the use of the fees payment and... Continue Reading
TABLE OF CONTENTS DECLARATION .1 APPROVAL ii DEDICATION Ii ACKNOWLEDGEMENT iv TABLE OF CONTENTS v LIST OF FIGURES viii LISTOFTABLES ix LiST OF ABBREVIATIONS x ABSTRACT xi CHAPTER ONE I INTRODUCTION 1 1.0 General Introduction 1 1.1 Background 2 1.2 Problem statement 2 1.3 Objectives 2 1.3.0 Main Objective 2 1.3.1 Specific Objectives 2 1.3.2... Continue Reading
ABSTRACT The purpose of this report was to analyze computer worms, their past, present and future, threats posed and recommend suitable solutions to mitigate and eradicate these worm threats. This study was carried out on kengrow industries. Major focus of this report is on computer worms that exploit computer networks. Computer worms are a type... Continue Reading
Abstract This qualitative and quantitative research set out to investigate the Analysis and Implementation Of ICT in urban secondary schools in Makindye division. It is a recent activity that has brought forth a lot of interest. However, there are many challenges that hinder efficient implementation of ICT including: lack of ICT laboratories,... Continue Reading
ABSTRACT This research aimed at designing and developing the monitoring tool of employee activities in Uganda Revenue Authority. The main objective of the research was to design and test a web based activity monitoring tool for employees of Uganda Revenue Authority. The study specific objectives were; to identify the requirements for designing and... Continue Reading
ABSTRACT Data storage and retrieval is a big challenge in most organizations, especially in most government institutions and parastatals, but the cost to secure management information systems remains a hurdle. However JURISS LAW SOFTWARE comes into rescue. This document is written for the basic computer user (magistrates, chiefjustice, lawyers,... Continue Reading
ABSTRACT JACAR ltd James Car dealers limited is a Company which is under private Companies dealing in transaction of car, spare parts and Motor cycles. At the district level, JACAR ltd is under Kampala district which is under the private sector. The Company is headed by the Company Manager, His major role is to ensure that the Company is... Continue Reading
Abstract Information is a very important aspect in our day-to~clay activities to ensure effective communication. As result of this, Information Communication Technology plays a great role to guarantee efficient and effective communication within and among different institutions and organizations. In response to this, each organization/institution... Continue Reading
ABSTRACT A computerized students' records management system (CSRMS) is a computer program designed to capture, store, manage the creation and maintenance of students' records in an organisation. Records management (RM) is the practice of controlling records of an organization from the time they are created to the time of disposal which includes... Continue Reading
ABSTRACT Two major challenges in legal decision making arise from the high complexity of the cases and from the high level of uncertainty caused by incomplete or missing information. In most cases it is not possible to apply Bayesian probability and legal standards prohibit the application of fastand-frugal heuristics. Based on a connectionist... Continue Reading
ABSTRACT The report provides a technical analysis and reviews of a database driven website which has been designed and constructed by the researcher to assist the Kampala International University guild union in conducting its elections. In designing the database driven website, the researcher has used Macromedia Dreamweaver 8, PHP language and... Continue Reading
TABLE OF CONTENTS CENTRALISED HOSPITAL MANA GEMENTAND PATIENTS’ ADMINISTRATION i DECLARATION APPROVAL iii DEDICATION iv ABSTRACT vi TABLE OF CONTENTS vii LIST OF FIGURES ix LIST OF TABLES ABBREVIATIONS AND ACRONYMS CHAPTER ONE 1 1.0 INTRODUCTION 1 1.1 BACKGROUND OF THE STUDY 1 1.2 STATEMENT OF THE PROBLEM 2 1.3.1 Main objective 2 1.3.2 Specific... Continue Reading
ABSTRACT The study was to access the role of electronic media in recording and updating criminals across the nation as a whole. Using Central Police Station as a case study, the objectives of the study were to provide ways how the Police could keep/store records of criminals across the country, to identify media programs that enable a police... Continue Reading
ABSTRACT Cloud computing offers an innovative business model for all cloud enterprises to serve IT services with no need to have technical details. The extreme growth of cloud usage increases the probability of threats occurrence, which in turn leads to financial and other losses. So there is a need to use appropriate metrics to assess the failure... Continue Reading
TABLE OF CONTENTS DECLARATION .................................................................................................................. i APPROVAL ....................................................................................................................... ii DEDICATION... Continue Reading