Search Results

Geology And Occurrence of Groundwater In Ishieke Area, Southeastern Nigeria

ABSTRACT  The study area is located in the Abakaliki formation of Asu-River group Lower Benue Trough. The area lies between latitude N060221 011to N060 281 011of the equator and longitude E0080 001 011 to E 0080 061 011of the Greenwich meridian. The study was carried out to ascertain the geology and the occurrence of groundwater in the area through detail geological field mappings geophysical investigation and pumping test. Field observations shows that the area is made up of two lithologic...

SOIL CHARACTERIZATION, GENESIS, CLASSIFICATION AND LAND SUITABILITY EVALUATION OF KULUMSA SUBWATERSHED, ARSI, ETHIOPIA

Abstract: Environmental factors such as topography, climate, geology, biotic factors and land-use activities are largely responsible for creating local differences in soil characteristics. These in turn create variations in the agricultural potential and management options of the soils that need detailed study in order to have adequate and comprehensive information and be able to solve site specific problems related to their sustainable use. However, there exists still a dearth of data in th...

The Influence of Computer Simulation Instructional Methods on Students' Performance in Chemical Bonding

ABSTRACT  Growth to a worldwide scale in the 21st century has ensued innovative ways of teaching and learning. The traditional method of teaching and learning of science is fast losing its acceptance and impact in the educational sector. Computers have become increasingly important among science educators as they play important roles during the instruction of students in the science classroom. To demonstrate conditions of conceptual change in science learning, simulation-based environments a...

The Challenges Of Cost Benefit Analysis, In A Computerized Accounting System (A Case Studyof Coca-Cola Bottling Company Enugu)

This research is on the challenges of cost benefit analysis in a computerized Accounting System. The purpose of this study is to enquire into the viability or other wise of computerized accounting Systems, with particularly reference to coca-cola Bottling Company, Enugu. The objective of the study is to ascertain if the introduction computer system may lead to industrial unrests as workers resists change. Also, the method used in this study is chi-square while the findings in the process of t...

Solar Drying Of Fruits And Vegetables: Dryers’ Thermal Performance, Quality And Shelf Life Of Dried Mango, Banana, Pineapple And Tomato

ABSTRACT The thermal performance of solar drying methods (cabinet direct, cabinet mixed-mode and tunnel drying), biochemical, sensory, rehydration and shelf-life qualities of mango banana, pineapple and tomato varieties were investigated in this study. Collector efficiencies and drying rates were computed and compared to measure the performance of dryers. The results showed tunnel dryer had significantly (p

Computer Aided Design And Computer Aided Manufacturing Training, Competency And Usage In Textile Industries Of Northern Nigeria

ABSTRACT Computer Aided Design (CAD) and Computer Aided Manufacturing (CAM) is the use of technology to design and produce textile goods with greater productivity at low cost. It s usage demands some level of training and competency. The purpose of the study was to assess CAD CAM training, competency and usage in textile industries of Nor thern Nigeria in order to develop a CAD CAM training model. The objectives of study were to identify the level of CAD-CAM training received, to examine the ...

Computers in Life

A man wakes up in the morning to the sound of his digital alarm clock and immediately checks his e-mail. He turns on the television, which has a V-chip to keep his children from watching what may be violent. He gets dressed, gets in his car, and drives to work where he works as the network administrator at a local steel company. It is amazing all of the things this man uses in the morning alone that would not be possible if it were not for computer technology. From his alarm clock to his e-ma...

Effects Of The Use Of Computer Animated Loci Teaching Technique On Secondary School Students’ Achievement And Misconceptions In Mathematics Within Kitui County, Kenya

ABSTRACT Mathematics plays an important role in the scientific and development of all nations. In Kenya mathematics is compulsory in all Primary and secondary schools. However the performance in the subject at the National Examinations has remained below average with marked gender differences. The students‘ performance in some mathematics topics such as ―Loci‖ has been wanting. The reason for the poor performance in mathematics and the Loci topic in particular has been attributed to se...

Effects of the use of computer animated loci teaching technique on secondary school students’ achievement and misconceptions in mathematics within Kitui County, kenya

Mathematics plays an important role in the scientific and development of all nations. In Kenya mathematics is compulsory in all Primary and secondary schools. However the performance in the subject at the National Examinations has remained below average with marked gender differences. The students‘ performance in some mathematics topics such as ―Loci‖ has been wanting. The reason for the poor performance in mathematics and the Loci topic in particular has been attributed to several fact...

Computer Troubleshooting System Case Study: Rick Ict Laboratory- Gulu

ABSTRACT Automation of Computer troubleshooting system is meant to store, update and help the users and administrators in finding problems and solutjons associated with computers in the Rick lCT Laboratory. This will also cater for the newly detected problems and symptoms in the computers at the institution. It's in due course because of the problems incurred due to poor computer troubleshooting techniques in the institution such as software and hardware failures like hard disk crushing, inad...

An Analysis of the Legal Regime Under the Computer Misuse Act in Relation to Cyber and Computer Law in Uganda

CHAPTER ONE REPROPOSAL FOR THE RESEARCH TOPIC 1.0 Introduction: The Computer Misuse Act of 20 II was enacted with the intent of providing safety and security of computer (information systems) and electronic transactions. The act in relation to its main purposes of protecting and safeguarding information and other transactions on electronic devices handles crimes of nature not tackled under the Penal Code act Cap 120 by virtue of its enactment in the I 950's. Under the act an electronic devic...

A STUDY OF SELF-EFFICACY BELIEFS IN COMPUTER USE OF UNDERGRADUATE MATHS STUDENTS’ AND ITS RELATIONSHIP TO THEIR COMPUTER EXPERIENCES IN SHS

ABSTRACT  This study investigated Self-efficacy Beliefs in Computer use of Undergraduate maths Students’ and its Relationship to their Computer Experiences in SHS. The study used quantitative methodology which employed survey design as an approach of inquiry. Bandura self-efficacy beliefs theory was used as a conceptual model to assess the extent of students’ computer competence and constructivist teaching and learning principle as a theoretical framework to assess SHS students’ comput...

APPLICATION OF COMPUTERIZED RECORD KEEPING AND THE GROWTH OF INFORMAL SECTOR IN KEBBI STATE

ABSTRACT The role played by computer is the existence growth and efficient operation of modern firm is numerous. Thus, this research was geared towards examining the impact of computerization on the accounting system of banks with a particular reference to Fidelity Bank Nigeria Plc. Baring this in mind, efforts were made to find out how and in what terms computerization has been able to improve the operations of Banks.   The research has identified some problem associated with the rise of ...

Design And Fabrication Of A Computer-Based Fingerprint Security System For Restricted Access Control

ABSTRACT The access to a restricted area within a premise is normally done through a manual system of keys and locks. This has been automated through the use of personal identification number (PIN) or passwords and smartcard technology. However, such systems are faced with a number of limitations such as losing a smartcard, forgetting a PIN, duplication of keys and impersonation. Thus, the use of an authentication system such as biometric verification techniques has become an effective altern...

COMPUTER AGE AND ITS IMPACT ON FINANCIAL INSTITUTIONS

ABSTRACT This study is on the computer age and it’s impact on financial institutions. In other words, it reflects on the difference between when the use of manual machine was passed out and when the modern technology computer was introduced whether there is any improvement 0as regards the success in settlement of claims arising. The researcher vigorously and extensively studies the extent to which typical Nigeria financial institution made use of computer in the operational system of some o...


316 - 330 Of 970 Results