TABLE OF CONTENTS DECLARATION APPROVAL DEDICATION TABLE OF CONTENTS v CHAPTER ONE 1 INTRODUCTION 1 1.0 Introduction 1 1.1 Background of the study i 1.2 Problem statement 2 1.3 Purpose 2 1.3.1 Objectives 2 1.4 Scope 2 1.5 Significance 3 1.6 Conceptual framework 3 1.7 Theoretical framework 4 CHAPTER TWO 5 LITERATURE REVIEW 5 2.0 Introduction 5 2.1 Information system 5 2.2 Role of information systems in an organization 5 2.3 Management information system 6 2.4 Human resources management informat...
ABSTRACT Performance appraisal is a formal management system that provide for the evaluation of the qualities o1 an indjviduals performance in an organization. One of the viable means of motivating staff in higher institutions of learning is to ensure that staff are rewarded with promotion and other benefits as at when due. in practice, this is not automatic as staff advancement is usually based on a number of criteria or indicators that should be aggregated to achieve a fair and transparen...
Abstract In carrying out this study, three research questions and three null hypotheses were developed to guide the study. Descriptive survey research design was employed in selecting the respondents for the study. The study was carried out in Kwara State covering the three State Colleges of Education in Kwara State. The population for this study was 232 comprising 102 Senior lecturers (Chief Lecturer, Principal Lecturer) and 130 Junior Lecturers (Lecturer I, Lecturer II, Lecturer III and Ass...
ABSTRACT The project report was undertaken in order to learn and use systems and standards for Parliamentary documents. Systems for managing documentation in digital formats can make Parliamentary operations efficient and help increase the transparency of the institution. These systems are evolving to encompass the entire lifecycle of documents from creation through management, dissemination, and long term preservation. Within these phases documents may be edited and amended by various “aut...
Abstract This qualitative and quantitative research set out to investigate the Analysis and Implementation ofICT in urban secondary schools in Makindye division. It is a recent activity that has brought forth a lot of interest. However, there are many challenges that hinder efficient implementation ofICT including: lack ofICT laboratories, electricity, and teachers’ skills. This study explored how these challenges affect its implementation. Out of 10 public and private secondary schools in ...
ABSTRACT The advancement in Information Technology has led to changes in teaching and learning processes of many educational institutions across the globe, which provides reliable, convenient and easily accessible environment which is conducive for learning. Considering the fact that, the Kampala International University E-Learning System is in its infant stage, it is necessary to come up with a robust strategy or fi-arnework that can be deployed to monitor user activities on the E-learning p...
ABSTRACT Automation of Computer troubleshooting system is meant to store, update and help the users and administrators in finding problems and solutjons associated with computers in the Rick lCT Laboratory. This will also cater for the newly detected problems and symptoms in the computers at the institution. It's in due course because of the problems incurred due to poor computer troubleshooting techniques in the institution such as software and hardware failures like hard disk crushing, inad...
TABLE OF CONTENTS CHAPTER ONE 1.1 INTRODUCTION 1.2 BACKGROUND OF THE STUDY 1.3 STATEMENT OF THE PROBLEMS 1.4 OBJECTIVES OF THE STUDY 1.5 SIGNIFICANCE OF THE STUDY 1.6 SCOPE OF THE STUDY 1.7 LIMITATION OF THE STUDY 1.8 DEFINITION OF TERMS CHAPTER TWO REVIEW OF RELATED LITERATURE 2.1 INTRODUCTION 2.1.1 STREAMING 2.2 INTERNET RADIO TECHNOLOGY 2.2.1 �...
TABLE OF CONTENTS Title page i Approval Page ...
ABSTRACT Biometric recognition is the use of individual biometric characteristics, such as fingerprint, face, and signature for automatically computerized recognition systems. Fingerprints are the most widely used form of biometric recognition system successfully. However, fingerprint images are rarely of perfect quality. They may be degraded and corrupted due to variations in skin and impression conditions. Thus, image enhancement techniques are employed prior to minutiae extraction to obta...
TABLE OF CONTENTS DECLARATION .................................................................................................................. i APPROVAL ....................................................................................................................... ii DEDICATION ................................................................................................................... iii ACKNOWLEDGEMENT ..........................................................................
ABSTRACT The overall objective of this study is to investigate the challenges of adopting e-learning pedagogical approach in higher education in higher education institutions in Uganda. The descriptive research design method was employed in this study. It involved using the questionnaires in collecting data from the respondents. The quantitative research design was used in gathering data on cases of efficiency in accessing, retrieving, securing, storing, registering and disseminating informat...
ABSTRACT Cloud computing offers an innovative business model for all cloud enterprises to serve IT services with no need to have technical details. The extreme growth of cloud usage increases the probability of threats occurrence, which in turn leads to financial and other losses. So there is a need to use appropriate metrics to assess the failure cost among cloud stakeholders according to their different needs; we propose a measure called “Mean Failure Cost” (MFC) which quantifies the im...
ABSTRACT The study was to access the role of electronic media in recording and updating criminals across the nation as a whole. Using Central Police Station as a case study, the objectives of the study were to provide ways how the Police could keep/store records of criminals across the country, to identify media programs that enable a police officer to record a criminal into a very secure database management system throughout the entire country. The research was carried out through both theor...
Abstract The number of mobile phone and Internet users in Uganda is increasing continuously, it is no doubt that online shopping market in Uganda certainly sees a rapid rise and great developing potentials with many investment opportunities. With the advent of the Internet and network technology, many organizations are now being equipped with Internet connections, either through wired connections or wireless infrastructure. Internet access provides customers an easy access to product informat...