TABLE OF CONTENTSDECLARATION................................................................................................................................iAPPROVAL ...................................................................................................................................... iiACKNOWLEDGEMENT................................................................................................................ iiiTABLE OF CONTENTS ................................................
Food poisoning is a term applied to an acute intestinal disease acquired by the consumption of food or drinks (e.g. juice, water, wine). The toxic agents responsible for food poisoning include the following; microorganisms that occur naturally in humans, animals and/or the environment, naturally occurring toxins that occur in food naturally or produce toxins inside the food through normal biological processes. Food poisoning is often confused with food allergy and food adverse effects, which ...
TABLE OF CONTENTDECLARETIONAPPROVAL HDEDICATIONSACKNOWLEDGEMENT ivABSTRACT VLIST OF TABLES ixABBREVIATIONS xCHAPTER ONE 11.0 INTRODUCTION si1.1BACKGROUND OF THE PROBLEM21.2 PROBLEM STATEMENT 21.3 OBJECTIVES OF STUDY 31.4 THE SPECIFIC OBJECTIVE 31.5 RESEARCH QUESTIONS 41.6 SIGNIFICANCE OF THE STUDY 51.7 SCOPE OF THE STUDY 51.7.1 TIME SCOPE 51.7.2 GEOGRAPHICAL SCOPE 51.7.3 CONTEXTUAL SCOPE 51.7.4 THOERATICAL SCOPE 61,8 OPERATIONAL DEFINITIONS 61.8.1 Customer satisfaction 61 .8.2 Service deliver...
Abstract Food vendors are important in every socio-economic sector in developing countries, providing ready-to-eat food to the populace and in the process, they transmit pathogenic organisms to the food being sold. However, a very important but neglected source of these pathogenic bacteria is the phone handled by the food vendors. This study is aimed to ascertain if the phone handled by the food vendor could be a potential source of dissemination pathogenic bacteria to the vended food bee...
ABSTRACT This research focuses on Agribusiness firms and social responsibilities in Nigeria (A case study of Nestle Food Nigeria Plc.). Data for this study was collected by the use of a structured questionnaire and interview schedule. Thirty (30) respondents were randomly sampled from the study area and the data collected was analyzed with the use of descriptive design such as Mean, Frequency tables, Percentages and t-test and the following findings were made; Quality of food (quality control...
ABSTRACT The survival of a library depends to a large extent on how secured its collections are. Security of collections constitutes a critical challenge facing academic libraries in Nigeria. It is against this background that this study investigated the coping with the security challenges in Federal University of Agriculture, Abeokuta, Olabisi Onabanjo University, Ago-Iwoye, and Babcock University, Ilishan, libraries in Ogun-State, Nigeria. The study adopted a descriptive survey design. The...
INTRODUCTION Mycotoxins are pharmacologically active mold metabolites produced in a strain-specific way that elicit some complicated toxicological activities (Bennett, 2003). Mycotoxins could also be described as secondary metabolites produced by a wide variety of organisms categorized as fungi, including mushrooms, yeasts and molds. The term mycotoxin was used for the first time in 1961 in the aftermath of a veterinary crisis in England, during which thousands of animals died. The disease wa...
ABSTRACT In most developing the establishment and efficient operation of security market has come to be accepted as an important pre- requisite for rapid economic development. The study is carried out through the use of library (textbook), newspapers and journals. In chapter I (one) is the background of the study (introduction), statement of the problems, objective of the study, and significance of the study, scope and limitation of the study, and reference. In chapte...
ABSTRACT Network Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance improvement in information technology as pertaining programming language; because this is achieved by the help of visual basic programming language and other programming language. For the first few decades of their existence, computer networks were primarily used b...
Abstract This research examines school record keeping in public secondary schools in Oredo Local Government Area. The objectives of the study were to find out the type of school records, the level of adequacy of record facilities for school record keeping in public secondary schools, the adequacy of personnel for school record keeping, the training opportunities for school records keeping provided for staff in public secondary schools, and the security strategies for protecting school record...
CHAPTER ONE 1.0 GENERAL INTRODUCTION 1.1 Background Fish and fisheries products serve as significant sources of food and incomes for numerous people, particularly those from developing countries (FAO, 2018). Fish is highly nutritious, containing approximately 70-84% water; 15-24% protein; 0.1-22% fat; 1-2%, minerals; 0.5% calcium; 0.25% phosphorus; and 0.1% vitamins A, D, B and C (Abraha, et al., 2018). Consumption of fish and fisheries products has been known to reduce the risks of cardio...
ABSTRACT Given the increasing freshwater scarcity, the performance of irrigation is critical in increasing and sustaining agricultural productivity in the water-scarce and largely arid and semi-arid Kenya. Irrigation currently accounts for most of the water withdrawals in the country, and the required improvement in the performance of irrigation is hampered by inadequate benchmarks upon which to base effective planning. This study was conducted between September and October 2008 to analyze ...
The purpose of this research is to critique the Principle of Collective Security and proffer possible solutions to help policy makers in the international arena devise means of calling off collective actions and improve the tenets of Collective Security. Gulf War 1 (1990-1991) is the major focus in critiquing the Principle of Collective Security. The research approach is non-experimental, qualitative, exploratory-descriptive and contextual. In this study, the sampling method was non-probable ...