DESIGN AND IMPLEMENTATION OF COMPUTERIZED VERIFICATION SYSTEM FOR TERTIARY INSTITUTIONS

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0155
  • Access Fee: ₦5,000 ($14)
  • Chapters: 7 Chapters
  • Pages: 59 Pages
  • Methodology: NIL
  • Reference: YES
  • Format: Microsoft Word
  • Views: 2.5K
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853
DESIGN AND IMPLEMENTATION OF COMPUTERIZED VERIFICATION SYSTEM FOR TERTIARY INSTITUTIONS
ABSTRACT

This work was produced out of the necessity to address the inherent problems that spring up during admission of students in the institution this effort is geared towards assisting the necessary bodies to verity students within a given time. It also addresses the issue of time wasting in admission/verification of students.
It is also designed for easy associability to all and sundry.
The software of this project when run, prompts the user to enter the name, his personal data,WAEC result, prelim result and then the department for which he or she is to be admitted. The computer will verify and inform you if the student in question is qualified to be admitted or not.
Also, the software of this project contains storage facilities as well deletion of out dated/obsolete information.  It should be noted that this project if utilized reduces considerably the volume of files to be carried in the office as tedious of work will be reduced.    .
  TABLE CONTENTS
CHAPTER ONE
Introduction
Statement of the problems
Purpose of Study
Aims and Objective
Scope and Delimitations
Limitation
Assumptions
Definition of Terms
 CHAPTER TWO
Literature review
CHAPTER THREE
Description of existing system
Facts finding method
Organizational structure
Objective of existing system
Input output, process analysis
Problems of existing system
Justification for the new system
 CHAPTER FOUR
Design of the new system
Output Format
Input Format
File Design
Procedure Chart
System requirements
 CHAPTER FIVE
Implementation
Program design
Program flow chart
Data addition
Data Display
Test run
 CHAPTER SIX
Documentation
 CHAPTER SEVEN
Conclusion and Recommendation
References      
 CHAPTER ONE
INTRODUCTION
In this jet age where technology and computer know-how in the bedrock of development the collection of data, retrieval of information and verification of needed data becomes necessary for an improved organizational efficiency in order to achieve this, the design of software for the above remains undoubtly important.
Thus, the design of this computerized verification  of  admitted students into the institute of management and technology (IMT).
This design if implemented will go a long way to correct the anomalies of the manual sorting of records.
The result to be achieved by this computerized as the workers of the institute especially the non-academic staff of the institute will find this work invaluable.
STATEMENT OF THE PROBLEM
Below is some of the problems encountered when carrying out student admission processing menacing
1.         Document stored on shelves occupies more space in the office.
2.         It also makes the office untidy and congested.
3.         Verification attention takes days to retrieve.
4.         Typographic errors.
 PURPOSE OF THE STUDY
The utmost aim of embarking on this project is to design a standard students verification system which will serve as a substitute to the manual method. This will Make the tsak easier and will help the necessary bodies to verifies students within a given time and also stress been reduced in the institution (IMT).
The study also goes further to address the long controversy surrounding the processing of student admission in the institution.
It will serve as a base for further studies by system designers. The study will help to determine the nature of students to be admitted that will be under the absolute control of the school.
Finally, this study will go along way covering the staff of admission department their job id not tedious but one of the easiest and most interesting task in the school. It will also serve as guide for future researchers or computerization and related field.
The work will also help the researchers to meet up with an essential academic requirement for graduation.
 AIMS AND OBJECTIVES
The study is significant in that the researcher aimed at achieving the following.
1.           Reduction in the time the manual processing take.
2.         provision of an efficient computer based system verifying, updating and retrieval of necessary information about students admission.
3.         Provision of a system which will reduce the lost associated with bringing of materials, accuracy, reliability, efficiency of processing student admission.
4.         To provide a result which will be reliable and accurate.
5.         The researcher also aimed at eliminating all traces of typographical errors that may occur in our manually compiled students name for admission.
6.         Complexity: production of a system, which will be less complex to operate.
7.         Adjustability.
8.         The work will be able to provide a solution to in urgent enquires about student’s qualification.
 DELIMITATION
This work is aimed at providing the easiest way of verifying qualified students in the institution as a whole:
 
DESIGN AND IMPLEMENTATION OF COMPUTERIZED VERIFICATION SYSTEM FOR TERTIARY INSTITUTIONS
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0155
  • Access Fee: ₦5,000 ($14)
  • Chapters: 7 Chapters
  • Pages: 59 Pages
  • Methodology: NIL
  • Reference: YES
  • Format: Microsoft Word
  • Views: 2.5K
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU0155
    Fee ₦5,000 ($14)
    Chapters 7 Chapters
    No of Pages 59 Pages
    Methodology NIL
    Reference YES
    Format Microsoft Word

    Related Works

    ABSTRACT This work was produced out of the necessity to address the inherent problems that spring up during admission of students in the institution this effort is geared towards assisting the necessary bodies to verity students within a given time. It also addresses the issue of time wasting in admission/verification of students.  It is also... Continue Reading
    ABSTRACT This work was produced out of the necessity to address the inherent problems that spring up during admission of students in the institution this effort is geared towards assisting the necessary bodies to verity students within a given time. It also addresses the issue of time wasting in admission/verification of students. It is also... Continue Reading
    ABSTRACT  The Bank Verification Number (BVN) became imperative following the increasing incidence of compromise on conventional security systems such as password and Personal Identification Number (PIN) of customers. The BVN involves identifying an individual based on physiological or behavioral attributes, such as fingerprint, signatures and... Continue Reading
    ABSTRACT The objective of this research is to design and implement a computerized Online Bank Verification Number System for Nigerian Bank Customers in the Diaspora. This project was motivated because of the fact that Nigerian bank customers in the Diaspora are barred from having access to their fund in Nigerian banks without BVN, therefore they... Continue Reading
    ABSTRACT The objective of this research is to design and implement a computerized Online Bank Verification Number System for Nigerian Bank Customers in the Diaspora. This project was motivated because of the fact that Nigerian bank customers in the Diaspora are barred from having access to their fund in Nigerian banks without BVN, therefore they... Continue Reading
    ABSTRACT The Bank Verification Number (BVN) became imperative following the increasing incidence of compromise on conventional security systems such as password and Personal Identification Number (PIN) of customers. The BVN involves identifying an individual based on physiological or behavioral attributes, such as fingerprint, signatures and... Continue Reading
    ABSTRACT The implementation of the biometric based attendance system constrained by our scope and objectives was successfully achieved using the waterfall approach through the help of my supervisor and expert advice. We built a handheld device which was controlled by the ATMega1284p microcontroller, the program for the microcontroller was written... Continue Reading
    (A CASE STUDY OF UNTH, ENUGU) ABSTRACT The proper management and utilization of financial resources has over the years been the bed rock of growth, expansion and continual existence of the world most popular industries and business organizations. In... Continue Reading
    ABSTRACT The proper management and utilization of financial resources has over the years been the bed rock of growth, expansion and continual existence of the world most popular industries and business organizations. In contrast, the liquidation of once popular organizations is dependent on the allocation and improper utilization of financial... Continue Reading
    ABSTRACT The proper management and utilization of financial resources has over the years been the bed rock of growth, expansion and continual existence of the world most popular industries and business organizations. In contrast, the liquidation of once popular organizations is dependent on the allocation and improper utilization of financial... Continue Reading
    Call Us
    Get this work
    whatsappWhatsApp Us