A SURVEY OF DATA BASE MANAGEMENT IN ENHANCING THE WORK PERFORMANCE OF OTM GRADUATES IN SELECTED ORGANISATION IN ABUJA

CHAPTER ONE INTRODUCTION 1.1 Background of the Study In the early days of computerization, it was normal to maintain specific files for individual applications. Data were processes centrally in batches and there was little or no online interrogation of data. This approach is wholly inefficient for most of today’s data processing systems. Supporting this, Vossen (1991) […]

Continue Reading

A STUDY INTO THE CHALLENGES AND PROSPECTS OF MARKETING NIGERIAN MADE COMPUTER SOFTWARES

ABSTRACT The study examines the challenges and prospects of marketing Nigerian made computer software. Posed with the problem of inferiority complex usually associated with Nigerian made goods, various foreign products have edge over indigenous products. Objectives for the study were to critically examine attitude of people towards Nigerian made computer software and various ways in […]

Continue Reading

ANALYSIS OF DATA MINING TECHNIQUES OF TELECOMMUNICATION COMPANIES IN NIGERIA: A CASE STUDY OF MTN NIGERIA

ABSTRACT   This study was intended to analyze data mining techniques of telecommunication companies in Nigeria. This study was guided by the following objectives; to provide an overview on data mining. To examine the various data mining techniques of telecommunication companies in Nigeria; to identify the challenges of data mining faced by telecommunication companies in Nigeria. […]

Continue Reading

APPLICATION AND BENEFITS OF ARTIFICIAL INTELLIGENCE

CHAPTER ONE INTRODUCTION 1.1   BACKGROUND TO THE STUDY According to wikipedia (2015), artificial intelligence (AI) is the intelligence exhibited by machines or software. It is also the name of the academic field of study in computer science which studies how to create computers and computer software that are capable of intelligent behavior. Major artificial intelligence […]

Continue Reading

HOW TO PREVENT COMPUTER SYSTEM INFECTION AND COMPROMISE USING TROJAN TOOL AND PROCESS

CHAPTER ONE INTRODUCTION 1.1   BACKGROUND TO THE STUDY Computer system infection, also known as malicious code, refers to a program that is covertly inserted into another program with the intent to destroy data, run destructive or intrusive programs, or otherwise compromise the confidentiality, integrity, or availability of the victim’s data, applications, or operating system (Higgins, […]

Continue Reading

INFORMATION TECHNOLOGY AND SERVICES DELIVERY (A CASE STUDY OF TERTIARY HOSPITAL IN RIVERS STATE)

INFORMATION TECHNOLOGY AND SERVICES DELIVERY (A CASE STUDY OF TERTIARY HOSPITAL IN RIVERS STATE) CHAPTER ONE INTRODUCTION 1.1   Background to the Study Information technology (IT) is the application of computers and telecommunications equipment to store, retrieve, transmit and manipulate data, often in the context of a business or other enterprise. The term is commonly […]

Continue Reading

THE ROLE OF INFORMATION GATHERING IN THE RAPID SOCIAL-ECONOMIC TRANSFORMATION OF NIGERIA

CHAPTER ONE INTRODUCTION 1.1   BACKGROUND TO THE STUDY Rapid economic development and social well-being constitute the transformation imperative of developing countries of the world and indeed, remain the normative goal of the international community (Ehi, 2009). This involves the attainment of sufficient levels of economic growth to allow for a progressive improvement in the material […]

Continue Reading

CLOUD COMPUTING A BETTER MEANS OF IT OUTSOURCING

CHAPTER ONE INTRODUCTION BACKGROUND OF THE STUDY Cloud computing is a model for enabling ubiquity, convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Although this widely adopted description of […]

Continue Reading