A SURVEY OF DATA BASE MANAGEMENT IN ENHANCING THE WORK PERFORMANCE OF OTM GRADUATES IN SELECTED ORGANISATION IN ABUJA

  • Comments off

CHAPTER ONE INTRODUCTION 1.1 Background of the Study In the early days of computerization, it was normal to maintain specific files for individual applications. Data were processes centrally in batches and there was little or no online interrogation of data. This approach is wholly inefficient for most of today’s data processing systems. Supporting this, Vossen (1991) […]

Read More

A STUDY INTO THE CHALLENGES AND PROSPECTS OF MARKETING NIGERIAN MADE COMPUTER SOFTWARES

  • Comments off

ABSTRACT The study examines the challenges and prospects of marketing Nigerian made computer software. Posed with the problem of inferiority complex usually associated with Nigerian made goods, various foreign products have edge over indigenous products. Objectives for the study were to critically examine attitude of people towards Nigerian made computer software and various ways in […]

Read More

ANALYSIS OF DATA MINING TECHNIQUES OF TELECOMMUNICATION COMPANIES IN NIGERIA: A CASE STUDY OF MTN NIGERIA

  • Comments off

ABSTRACT   This study was intended to analyze data mining techniques of telecommunication companies in Nigeria. This study was guided by the following objectives; to provide an overview on data mining. To examine the various data mining techniques of telecommunication companies in Nigeria; to identify the challenges of data mining faced by telecommunication companies in Nigeria. […]

Read More

APPLICATION AND BENEFITS OF ARTIFICIAL INTELLIGENCE

  • Comments off

CHAPTER ONE INTRODUCTION 1.1   BACKGROUND TO THE STUDY According to wikipedia (2015), artificial intelligence (AI) is the intelligence exhibited by machines or software. It is also the name of the academic field of study in computer science which studies how to create computers and computer software that are capable of intelligent behavior. Major artificial intelligence […]

Read More

HOW TO PREVENT COMPUTER SYSTEM INFECTION AND COMPROMISE USING TROJAN TOOL AND PROCESS

  • Comments off

CHAPTER ONE INTRODUCTION 1.1   BACKGROUND TO THE STUDY Computer system infection, also known as malicious code, refers to a program that is covertly inserted into another program with the intent to destroy data, run destructive or intrusive programs, or otherwise compromise the confidentiality, integrity, or availability of the victim’s data, applications, or operating system (Higgins, […]

Read More

THE ROLE OF INFORMATION GATHERING IN THE RAPID SOCIAL-ECONOMIC TRANSFORMATION OF NIGERIA

  • Comments off

CHAPTER ONE INTRODUCTION 1.1   BACKGROUND TO THE STUDY Rapid economic development and social well-being constitute the transformation imperative of developing countries of the world and indeed, remain the normative goal of the international community (Ehi, 2009). This involves the attainment of sufficient levels of economic growth to allow for a progressive improvement in the material […]

Read More

CLOUD COMPUTING A BETTER MEANS OF IT OUTSOURCING

  • Comments off

CHAPTER ONE INTRODUCTION BACKGROUND OF THE STUDY Cloud computing is a model for enabling ubiquity, convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Although this widely adopted description of […]

Read More