The project titled as 'Coffee Shop Management System' is developed in vb as front end and ms access as back end. The main aim of the project is to make a complete solution for coffee sales system. This project has login module, coffee details module, coffee sales module, billing module, coffee purchase module and reports module all coffee... Continue Reading
ABSTRACT In this research, majority of the students use mobile phones (smart phones)/laptops thus 55(40.44%) with 53(38.97%) using their smart phones as the main device for accessing the internet. The respondents also confirmed the internet has helped significantly improved their academic work or studies generally with all 136(100%) saying... Continue Reading
Cloud Computing trend is rapidly increasing that has a technology link with Grid Computing, Utility Computing, Distributed Computing. Cloud service providers such as Amazon IBM, Google’s Application, Microsoft Azure etc., provide the users to developing applications in cloud environment and to access them from anywhere. Cloud sever provider’s... Continue Reading
ABSTRACT This study focused on the impact of computer institutes in building information technology skills for state development in Nigeria with reference to Jos North Local Government Area. The importance of computer institutes and information technology to nation building cannot be over emphasized giving by the fact that no nation can have any... Continue Reading
ABSTRACT User satisfaction is one of the key research area of Information Technology (IT) particularly, Information System (IS). It is recognized by many researchers as a significant factor in determining IS success. In view of it competitive advantage, most business organizations nowadays focus on IS as a means of minimizing cost and maximizing... Continue Reading
ABSTRACT Accurate meter readings, timely and correct bills have become an important aspect of water metering systems. Additionally, anomalies such as leakage and bursts in water pipelines have significant consequences to the environment and lead to financial constraints to the water companies. Since monitoring leakages and bursts in the water... Continue Reading
ABSTRACT Assistive Technology for Children with Learning Disabilities (ATCLD) was developed in response to the language and arithmetic challenges faced by learners with dyslexia of Eros Girls School (EGS). This development followed from requirement elicitation and is intended for grades 5 - 7. Having discussed the above, Assistive Technology (AT)... Continue Reading
The proliferation of Android smartphones has propagated negative societal issues that resulted in successful arrests of the culprits, forensic examination and prosecution. Other such cases have collapsed due to alteration of forensic evidence as a result of inadequate forensic sound frameworks. The purpose of this study was to develop and... Continue Reading
E-learning has enhanced the way students think and learn over time. Different studies show that students appreciate facilities offered through the e-learning process. It has also proven to be a very useful tool by bringing education closer to the learner, hence, learner-centred. A point to note about e-learning is the ability to offer a wide... Continue Reading
Word processors are one of the most widely used software applications in our time and have greatly contributed to the shift of paperless office. It has brought drastic changes in the way business documents are created, edited and stored. However word processors have over the years proven to be susceptible and have been successfully exploited... Continue Reading
The objective of this study was to establish the factors influencing successful implementation of core banking system. The specific objectives for the study were: To find out the processes involved in implementation of a Core Banking Systems (CBS), to identify the factors influencing the successful implementation of CBS and to design a ... Continue Reading
The aim of the study was to investigate the influence of data visualization techniques on the overall adoption of data visualizations in humanitarian organizations with reference to Danish Refugee Council, UNOCHA, IOM, IFRC, and DDG. The study established the influence of data visualization techniques, user’s requirements as well as the... Continue Reading
With the growth of the Internet and the increase in number of online devices, IPv4 address space approaches exhaustion. This has led to the deployment of IPv6. However, IPv6 has not been widely adopted, particularly in Kenya. According to Akamai (2016) IPv6 has an adoption rate of 0.02% in Kenya despite recent studies showing that adoption... Continue Reading
Information technology evolution and the spread of internet connectivity have enabled globalization which allows communication and transaction of businesses across different countries. To ensure information infrastructure protection, understanding how the organizational, individual and technical aspects all together affect the outcome in... Continue Reading
The purpose of this research was to develop a low cost system for identifying logon anomalies based on the time a user provides login credentials and also the physical location of the workstation on the LAN. The specific objectives of the project were (i) to evaluate how logon anomalies based on physical locations have been addressed in the... Continue Reading
The purpose of this study was to investigate the factors influencing adoption of secure cryptographic QR application by focusing on alcohol vendors who engage in the business of selling alcoholic beverages in Nairobi and its environs. This research was based on four specific objectives which were: to study the influence of cryptographic... Continue Reading
Smart phones are powerful minicomputers characterized by high performance, large memory capacity and enhanced applications that enable various ways of communication. They are widely used for other purposes besides making phone calls, for instance browsing the internet, reading and responding to emails, road navigation, editing documents,... Continue Reading
Security problems have become a major concern in most urban settlements across the globe. The use of technology can be incorporated into the security systems to enhance operational measures that have been deployed. The aim of this study was to examine the challenges stakeholders face in crime reporting and develop a mobile-based system that... Continue Reading
The use of and reliance on information systems for business has been on the rise especially in recent years. This has had a serious impact on the security of business information. Previous studies have identified two areas that must be considered when creating a secure information system: technology and human compliance to policies. Many... Continue Reading
The main goal of healthcare sector worldwide is to provide quality and efficient health services to citizens. As the threat landscape on healthcare continues to escalate, many hospitals still lag behind in terms of protecting its critical infrastructure and electronic protected health information (ePHI).This research provided solution by ... Continue Reading
ABSTRACT In our present society today, it is clearly seen that garbage cans are being placed in open environments because it needs to be accessed by the public. It can be observed that those garbage cans usually get filled up and overflow and litter the environment. Patil (2015) claims that this uncontrolled littering can lead to a gradual... Continue Reading
ABSTRACT Customer service is the most important aspect of every business that builds its processes on the basis of customers going through the queue before receiving any service from the organization. These businesses become ineffective and inefficient if the queues are not moving well or the queues are not fluid. This research was inspired by the... Continue Reading
Knowledge management is a field with a lot of potential that can benefit individuals as well as different types of organizations. Despite this fact, most organizations in Kenya have focused on knowledge storage, but have not adopted sharing of the stored knowledge. This study examined the adoption of mobile technology for knowledge... Continue Reading
Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. Nairobi city residents encounter a myriad of... Continue Reading