Abstract Peer-to-peer file sharing applications have been in existence for some time. Familiar applications or architectures such as Napster, Gnutella, and Freenet have a large user base. The main design idea of these systems files are distributed throughout nodes. This is much different from traditional client/server systems, where files would lie on one central machine, and all transfers would occur only between the individual clients and that machine. In peer-to-peer, file transfers can occur between the individual nodes. The proposed system is a peer-to-peer file sharing application. Why did we decide to create one more file sharing system The answer is that the proposed system has some unique properties, which distinguish it from other existing systems. The system is developed to be an auxiliary in distributing academic resources among students. The proposed system is developed in such a manner that it provides maximum user-friendly interface using PHP (Hypertext pre-processor) programming language using the XAMPP as the test bed.
|Settings||Design and implementation of a cloud-based lecture notes distribution system remove||DESIGN AND IMPLEMENTATION OF A SECURITY INFORMATION SYSTEM A CASE STUDY OF THE NIGERIAN POLICE remove||DESIGN AND IMPLEMENTATION OF A VIRTUAL E-LEARNING SYSTEM A Case Study of Lagos State University remove||DESIGN AND IMPLEMENTATION OF A COMPUTER BASED WAREHOUSING INFORMATION SYSTEM A CASE STUDY OF NIGERIA PORTS AUTHORITYNPA LAGOS remove||DESIGN AND IMPLEMENTATION OF A PROFITED DATABASE SYSTEM FOR GOVERNMENT ESTABLISHMENT remove||DESIGN AND IMPLEMENTATION OF A COMPUTER BASED HOUSEHOLD INVENTORY SYSTEM CASE STUDY PRESIDENTIAL HOTEL ENUGU remove|
|Name||Design and implementation of a cloud-based lecture notes distribution system remove||DESIGN AND IMPLEMENTATION OF A SECURITY INFORMATION SYSTEM A CASE STUDY OF THE NIGERIAN POLICE remove||DESIGN AND IMPLEMENTATION OF A VIRTUAL E-LEARNING SYSTEM A Case Study of Lagos State University remove||DESIGN AND IMPLEMENTATION OF A COMPUTER BASED WAREHOUSING INFORMATION SYSTEM A CASE STUDY OF NIGERIA PORTS AUTHORITYNPA LAGOS remove||DESIGN AND IMPLEMENTATION OF A PROFITED DATABASE SYSTEM FOR GOVERNMENT ESTABLISHMENT remove||DESIGN AND IMPLEMENTATION OF A COMPUTER BASED HOUSEHOLD INVENTORY SYSTEM CASE STUDY PRESIDENTIAL HOTEL ENUGU remove|
|Add to cart|
|Description||ABSTRACT The principal objective of this project is to help Security Information Systems (SIS) especially NIGERIAN POLICE which is my case study in the area they encounter problems in securing security data processing and efficient information system. This will be the solution given to handle this problem by transforming the existing manual information system into an automated form and overcome the existing problems of insecurity and delay in data processing. I decided to use an automated database system to enhance information storage and keep track of security information. Again, doing this will ensure that there is an effective security information system computerization. To achieve this, Visual Basic 6.0 is used for its implementation.||ABSTRACT The demand to acquire knowledge or to learn has rise, thus, the present technology had gone a long way to provided means to learn, irrespective of the distance or the location of the E-learner and source of information. This is achieved through electronic sharing of information and virtual classroom. However, virtual classroom and text based e- learning is a system design to help student gain access and acquire knowledge in any university of their choice. This method of learning will enhance face ? to - face instruction or campus, use of computer in classrooms and elicitation of information with the World Wide Web (WWW) enhanced distance education (on or off campus). Individual and group learning with both print and computer based materials. With all these, virtual classroom and test based e-learning knowledge is moving towards every students and staff of Federal Polytechnic Nekede Owerri (for instance) being an e- learner at least for part of their study, this could be through learning materials e- mails contacting tutors or submitting assignment, the use of website for research or any one of the myriad e- learning application. Thus, students or staff must not travel to Americas to acquire knowledge. Also information can be send to students abroad through online. Never the less, in this research work, chapter one deals with the introductory part of this work and some definition of terms chapter two deals with literature review and some other important review, chapter three talks about the description and analysis of the existing system, chapter four deals with the system implementation and programming, chapter five is the summary, conclusion and recommendation.||CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF THE STUDY Warehouse is where goods and commodities are kept for further clearance. Narrowing it to Nigeria Ports Authority, there are many warehouses where imported consignment and goods are stored. This is cleared by carrying the billing papers from post to post, waiting and wasting much time in seeing who is in charge. Goods that takes about two weeks to berth into the country takes another two weeks to get cleared. This makes the importers and the clearing agents to run from port to port, in search of where the goods were kept. The introduction of computer in warehousing will enable importers know which and where their goods are kept, as it will always be stipulates on the bill of laden papers. Computer is hereby seen as a way of handling, by systematically organizing them, recording or making notations on them, following up with the appropriate action or the like. 1.2 STATEMENT OF THE PROBLEM The processing of billing papers for clearance of goods, with manual method has led to omission of many records that ought to be included. This is caused by inaccuracy of the manual billing process. Due to the inefficiency in manual billing process, billing papers are carried from post to post, waiting for who is in charge, thereby delaying the goods that suppose to be delivered. More so, goods are not delivered on time, due to the fact, that goods that takes about two weeks to get into the country, still takes another two weeks to be cleared. 1.3 AIM AND OBJECTIVE OF STUDY The purpose of this is study is to 1. Identify those problems caused by using manual billing clearance 2. Finding out the effect of this in Nigeria Ports Authority 3. Create computer awareness 4. Identify prospects for solution of problems. 1.4 SIGNIFICANCE OF THE STUDY This research, base on the problem and prospect of using computer in Nigeria Ports Authority, will help to develop interest towards computer. The findings of this research will also help the management to increase the income generation of Nigeria Ports Authority and smooth running of the warehouse in general. 1.5 SCOPE AND LIMITATION OF THE STUDY The researcher will identify all the problems, including the financial constraints of the problems, encounter with the use of manual billing clearance in warehousing. LIMITATIONS OF THE STUDY Due to the financial constraints of the researcher and lack of time, the researcher is concentrating the study in only Nigeria Ports Authority Lagos. 1.7 DEFINITION OF TERMS GOOD- Goods carried in a ship TONNAGE- A measure of the capacity of a ship (1 ton = 100 cubic feet) PORT- A place where ship load and unload goods shattered form storms. VESSEL- A ship for transport by water BILL OF LOADING- A list giving details of a ships goods CONSIGNCE- A person or company to whom goods are sent forms the counting of export and who receives them. MANIFEST- A list of all goods on the ship WHARF- This is a landing stage built along the shares for loading or unloading vessels. LABOUR- An area of water protected from the open sea by land or walls in which ships can shelter. BERTH- This is a place in the wharf where a ship can be died up or swing at anchor. PORT OF LOADING- A place where ships load goods and leave for the definition. PORT OF DISCHARGE- A place where unload goods from poof of loading. OCEAN FREIGHT- This is an amount charged by the carrier by the carrier for transportation of goods by sea. VOYAGE- A journey by water mostly a long one in a ship. SHIPPING- This is the process of pulling things on in a ship or transportation goods by ship WAREHOUSE- This is a store house TRASNPORT- This is carriage of goods from one place to another SAILING- This is the movement of ship on a sea from one place to another CUSTOM- This are the people that are in charge of checking the vessel if it contains any contraband items and the paper that contains the particulars of the container in the vessels. ROTATION NUMBER- A number allocated by the department of customs and exercise to every ship entering into future use. COMPUTER- This is an electronic machine that accepts data as input, process it using a set of instructions and given out result as output. It also stores information which could be received for future use. DATA- This are raw fact that have not been processed. DISK- It is a storage device that stores data or information||ABSTRACT The problem which always emanate from inadequate personnel information maintenance and management has been a torn in the flesh of the entire Nigerian society, Enugu state precisely. In other to proffer solution to the existing problems, the project work researched into the modus operandi of personnel database management system of Enugu state. In the process of analysis of the existing system were detected, carefully analyzed and possible solution to the problems were proffered in the newly designed system. The new system designed in this project work is computerized and it works automatically; it addresses all the lapses that cause hindrance to the existing system. It is timely accurate and very comprehensive in report generation.||ABSTRACT This project was centered computer based household inventory system. The current process of keeping records of properties, equipments and other items owned by the hotel is being operated manually and due to this procedure numerous problem are been encountered. A design was taken to computerized the manual process in order to check this problem. The problems were identified after series of interviews and examination of documents after which analysis was made and a computerized procedure recommended. This project will also suggest how to successfully implement the computerized procedure and to overcome the obstacle that would hinder the successful implementation of the system. The new system was designed using Microsoft visual basic 6.0 programming language. This language was chosen because of its easy syntax and features for developing windows based applications.|
|Content||Abstract Peer-to-peer file sharing applications have been in existence for some time. Familiar applications or architectures such as Napster, Gnutella, and Freenet have a large user base. The main design idea of these systems files are distributed throughout nodes. This is much different from traditional client/server systems, where files would lie on one central machine, and all transfers would occur only between the individual clients and that machine. In peer-to-peer, file transfers can occur between the individual nodes. The proposed system is a peer-to-peer file sharing application. Why did we decide to create one more file sharing system The answer is that the proposed system has some unique properties, which distinguish it from other existing systems. The system is developed to be an auxiliary in distributing academic resources among students. The proposed system is developed in such a manner that it provides maximum user-friendly interface using PHP (Hypertext pre-processor) programming language using the XAMPP as the test bed.||CHAPTER ONE 1.0INTRODUCTION National security is the requirement to maintain the survival of the state through the use of economic, security operatives especially police, political power and the exercise of diplomacy. The concept developed mostly in the United States of America after World War II focusing on the police and military might. Now, it encompasses a broad range of facets, all of which impinge on the police and military for economic security of the nation, lives property and values protected by national society. Accordingly, in order to possess national security, a nation needs to possess economic security, energy security, environmental security, etc. Security threats involve not only conventional foes such as other national states but also nonstate actors such as violent non-state actors, narcotic cartels, multinational corporations and non-governmental organizations; some authorities include natural disasters and events causing severe environmental change in this category. The origin of the modern concept of ?national security? as a philosophy of maintaining a stable nation state can be traced to the peace of Westphalia, wherein the concept of a sovereign state, ruled by a sovereign, became the basis of a new international order of nation states. As an academic concept, national security can be seen as a recent phenomenon which was first introduced in the United States after World War II, and has to some degree replaced other concepts that describe the struggle of states to overcome various external and internal threats. The struggle of states to overcome various external and internal threats. The earliest mention of the term national security, however, was made in Yale University in 1790 wherein was made to its relation with domestic industries. The concept of the national security became an official guiding principle of foreign policy in the United States when the National security Act of 1947 was signed on July 26, 1947 by the U.S. President Harry S. Truman. Together with its 1949 amendment, this act create American national security d important facets for American national security as the precursor to the department of defense, subordinated the security operatives branches to the new cabinet level position of the secretary of defense, established the National Security council and the Central Intelligence Agency. The Act did not define national security which was conceivably advantageous as it?s ambiguity made it a powerful phrase to invoke whenever issues threatened by other interests of the state, such as domestic concerns, came up for discussion and decision making. The realization that national security encompasses more than just security was present though understated, from the beginning itself. The US National Security Act of 1947 was set up ?to advise the president on the integration of domestic security and foreign policies related to national security?. Gen Maxwell Taylor?s essay of 1947 titled ?The Legitimate claims of National Security? has this to say; The national valuables in this broad sense include current assets and national interests, as well as the sources of strength upon which our future as a nation depends. Some valuables are tangible and earthly; others are spiritual or intellectual. They range widely from political assets such as the Bill of Rights, National Security and political institutions and international relations to many economic assets which radiate worldwide from a highly productive domestic economy supported by rich natural resources. It is the urgent need to protect valuables such as these which legitimizes and makes essential the role of national security. 1.1 STATEMENT OF THE PROBLEM Security information system has always played a vital role in the stability of a nation. Keeping security information manually can hinder some defense program and delay passage of security information to the appropriate body. Manual documentation of security information can lead to exposure of the information thereby creating threat to the nation at large. Hence, there is need for an automated security information system to guaranty safety of information. 1.2 OBJECTIVES OF THE STUDY The general objective of the study is to develop a database for security information storage and retrieval. Specifically, the following objectives are also considered: i. To build a database system for police security information. ii. To develop a software for managing security information. iii. To determine the effectiveness of Nigerian police in managing signal. 1.3 DEFINITION OF TERMS/VARIABLES Policing: Policing is another way of depicting the police. Anti-policing: Anti-policing is the society?s social attitude opposed to war between states and in particular countering arguments based on policism. Databases: A systematically arranged collection of computer data, structured so that it can be automatically retrieved or manipulated. It is also called a databank. National Security: The requirement to maintain the survival of the nation-state through the use of economic, policing, and political power and the exercise of diplomacy. Information Security: means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording, or destruction. Classified Information is sensitive information to which the access is restricted by law or regulation to particular groups of persons. Security Management is a broad field of management related to asset management, physical security and human resource safety functions||CHAPTER ONE 1.0 INTRODUCTION Virtual e- learning is a system designed to help students gain access and acquire knowledge in any university of their choice. It can include: Enhance face ?to- face instruction (on campus, in class use of computer and the World Wide Web (WWW), enhanced distance education (on or off campus) individuals and group learning with both print and computer-based materials instruction entirely on- line (individual and group learning) because of this mix virtual classroom and text based e- learning knowledge is moving towards every student being an e- learner at last for part of their study, whether through learning materials, e-mail for contacting teachers/ tutors or any one of their myriad other e-learning applications. Online learning results to learning and other supportive resources that are available through a computer and it includes computer based training, computer based instruction and technology. The e-learning system use text messages to deliver information and data. Student or e-learners will be in their computer receiving lectures as if they are in classroom. This has gone a long way helping e-learners to acquire degree in the institution they have never seen. 1.1 BACKGROUND OF THE STUDY Internet as global connection of computers sited around the world forming huge network for information to be shared and disseminated by many millions of people has done so well in information technology and in education so to speak. Virtual classroom and text-based e-learning cannot be an exception. Often time?s students experience a lot of difficult in the quest for basic knowledge from higher institution of their choice, not for the fact that the person doesn?t have resources to acquire them but the risk in traveling from the said institution wherever the person might be pose problems. In order to reduce these risks, satellite computer were established but did not solve the problem of traveling out from one?s location to the said location in quest for knowledge. In this regard, Federal Polytechnic Nekede compete with a of institutions, this sometimes reduces the number of students enrollment in the school to the above listed problems the system ?virtual classroom and text based e- learning was designed with this Federal Polytechnic Nekede will have thousands of student in which she doesn?t provide any a accommodation or any structure for and still gain much grounds economically and student all over the world suffer less in having any of Federal Polytechnic Nekede?s certificate. This is designed that before anybody can participate must register. Students have free registration form but lecturers must provide their staff number that tally with their surnames before they have access to registration form. One month is giving to student to pay his/her school fees after registration to remove his/her name from the database. This will go along way increasing student?s enrollment in the institution. The system has very security conscious software that resides in the ever helping except those supposed. Having seen and observed. Having seen and observed this benefit to students in an unprecedented scale. Indeed, this sounds interesting to my academic pursuit in FPN. Perhaps this calls for implementation. 1.2 STATEMENT OF THE PROBLEM Due to the problems students find and experiences, it has never been easy for students to acquire basic and necessary education in any institution one wishes irrespective of the fact that the resources are there. This poses a lot of problems sometimes they will embrace not going to school at all. It is very impossible for a student in America or any other country coming to FPNO everyday for lectures more so, it will be impossible for FPN staff going to America or any other country where the students might be located everyday to deliver lectures. Sometimes if number of students increase reduction in student'? admission will be affected in order to provided adequate structures where they can have their lectures. The above views are what gave birth to the research work in order to find solution to them. 1.3 PURPOSE OF THE STUDY The purpose of the study is to find possible solution to students whom because of nearness to institute and are unable to acquire knowledge that they need. Again, to provide students easier way to acquire any of the FPNO certificates without been in the institute or with less difficulty. Notwithstanding the fact that other institutes who offer the same courses as FPNO exist, this will go far reducing her competition with them. Since the system is virtual, that is there will be no physical contact between students, their instructors and FPNO, the problem structure is solved. 1.4 OBJECTIVE OF THE STUDY As they say ?scientia st potential? that is knowledge is power?. The aim of this research is to provide the students all the information needed in any subject that is done in this great institute FPNO. Again to assure that student meets the current trend to academic setting all over the world. This will go a long way making FPNO to be aware of trends in technology and gain to making them have desires for other on-line provisions and computerization in the institute. 1.5 SCOPE AND LIMITATION OF THE STUDY The project is concerned with the virtual e-learning system files that are transferable within the net. It should be in form of text file (.txt), rich text files (.rtf) or hypertext mark-up language file (.htmf). LIMITATIONS To be candid, I encountered a lot of problems while carrying out this research work.. It wasn?t easy for me to get data relevant for this research. The most important thing I needed was courses FPNO was doing. I requested that from different schools of which I were told to go from one department to another to collect them. Lastly I were able to get some and others from FPNO library. The project work is a tasking job which demands time, money and commitments. Due to lack of funds to meet all resources and materials that are used, I had to make do with other activities while the process was going on. 1.6 DEFINITION OF TERMS COMPUTER: an electronic device that is capable of accept In data, processing data automatically, store it, produces the result where needed. VIRTUAL CLASSROMM: is an act of using IT tools to distribute or share knowledge between groups of learners. It is not going to be physically but the use of electronics. E ? LEARNING: it is an acronym of eletroniic learning it is an aspect of virtual classroom that is concerned with sharing of knowledge electronically by use of text video, web or any other IT tools. FILE: this is a collection of related records. VEL: This is the acronym of virtual electronic learning PROGRAM: a set of logical instructions combined together to perform a specific task to a given problem and providing solution to it. IT TOOLS: is any machines techniques etc. used in information technology. OUTPUT: result of the processed data by the computer. INPUT: data supplied to the computer for processing. IT (Information Technology): it is combination of computing and telecommunication facility. DATA: raw materials used by the computer. INFORMATION: processed data capable of solving a problem E-MAIL: electronic mail, which is an alternative of HIPOST. This is the use of on - line computer to send messages across the net. STORAGE DEVICES: a device for storing data in the computer COMPUER NETWORK: it is connection of two or more computers using special protocol such that they share data or information inform of text, audio, messages or mail. WWW (World Wide Web): this is a format that we use to design website. WEBSITE: it is information of a particular people, individual, state, country etc made available to be seen or can download on the net. HOST COMPUTER: the main electronic device that manipulates all the given data and produce the required result to the individual connected to it for information retrieval. INTERNET: it is global connection of computers sited around the world forming huge network for information to be shared by millions of people. E-LEARNER: person who uses internet to receive searches for knowledge on the internet. LAN (local area network): is the connection of two or more computers within one?s boundary. LOGIN: to connect to the scale and make use of available information provided by the designer within some range of specification. LOG OFF: it close one?s access from the site the person was using. LEARNING: process of acquiring knowledge||? CHAPTER ONE 1.1 INTRODUCTION ? As much as have to receive adequate welfare and entitlements the personnel database must be maintain effectively. The personnel database is the comprehensive information update of employees under a particular employee at a particular time. The maintenance and management of employee information has bee a big problem in the Nigerian society workers denied of their primary and secondary entitlements and the most sad aspect of inadequacy in the maintenance of employee information is the erupt of ghost workers syndrome, this has the greatest thing this laxity in personal database system has caused in the society. The problem of promotion is also on offspring of inadequate personnel database management; who to promote when there is necessity for promotion is always the problem faced by personnel officers in change of promotion exercise. Workers have suffered a lot under this error of ignorance and sheet wickedness in every activity work of life, the first thing to be observed is always information about the staff involved. This helps to give out desired incentives for the works, to help them put in their best in their work the non-payment of salary or in some cases, the delay in payment of salary is always caused by the problems associated with personnel database. This work researched into the operational activities of existing system of maintaining personnel database in Enugu state with a view to detecting and solving the problems making it not to work out smoothly. 1.2 STATEMENT OF THE PROBLEM The problem caused by poor management and maintenance of personnel database in Enugu state is numerous. Th procrastination in payment of workers salary is a work force badly. Because of the fact that act information of worker s in the state is not known the state faces the problem of how to provide incentives for its worker. A lot of public money is been diverted into private purses due to the problem of poor information management concerning personnel records. ? 1.3 PURPOSE OF STUDY The main purpose of this study is to provide ever lasting solution to the current problems facing the Enugu state personnel database maintenance system through a well computerized design. 1.4 AIM/OBJECTIVES OF STUDY The primary aim of this work is to make sure that personnel database management system of EnuguState is to serve the citizen better by producing a new computerized system that will tackle the problems currently facing it. The objectives include: To create a system that will maintain workers records randomly and give easy and tidy access to the stored record for easy information retrieval. To maintain a database that will support sorting and searching of records automatically To maintain an internecine database. SCOPE OF THE PROBLEM This study is carried out covering the totality of personnel database system in Enugu state in the areas of quick information retrieval automatic promotion list generation, ghost workers control and timely salary payment ASSUMPTIONS If the new design is completely implemented the whole problems associated with the existing system will be all solved. DEFINITION OF TERMS Work force is the personnel strength of the organization. Welfare is the condition of comfort in an area of work. System is a network of interrelated procedures combined to form a unit Policy is a plan of actions, aims and ideas, sophisticated, having learnt the ways of the world and having lost natural simplicity. Implementation: carry an undertaking agreement promise into effect. Information age:The current age of information technology around the globe. ,||CHAPTER ONE BACKGROUND OF STUDY 1.1 INTRODUCTION Computer household inventory system today encompasses either directly or indirectly ; A field of activity both private and public that taxes the imagination, it revolves around the ownership possession and use of the system. The term ?computer household inventory? includes real property defined as computer handset calculator remote control alarm clock and other product of the system as well as space. Embraces any and every house or interest in household inventory and improvement there on. The household inventory business can be define as a vocation in which property forms that stock in trade and is brought sold rented as agents for others or dealers of themselves or both. A calling in skill and experience in household inventory coupled with high standard of integrity as presidential hotel Enugu are offering as a service to the public. The presidential hotel Enugu is a firm of household inventory system value registered 1942, they carry on with computer household inventory management and house planning. They are located at P.M.B 3017 presidential road Ogui New layout Enugu. This from has it principal partner as professor Umeaha Commodore undertakes valuation projects for banks public financial companies on the area of invitation management and valuation process. The design and implementation of computer based household inventory system will focus on the practical job on valuation proper and report work the activities of presidential hotel in terms of professional and agreement certificate of value will be stated in the system design the system will aim at bringing to view the step of the process of valuation in the household inventory practice. However much will not be discuss on area of different plans on production but the basis needs for its valuation will be focus on the system orientation during the professional research office equipment like reports of the valuation input/output resources and the company history was review for the purpose of colleting primary data the area of study secondary data are gotten from related literature. Finally the design computer household inventory valuation system will be focus on the commercial property which may be used for mortgage rent as the case may be. The program is written using Visual Basic 6.0 for easy asses 1.2 STATEMENT OF THE PROBLEM The importance of household inventory cannot be readily appreciated unless its value is clearly stated by a value. Although the value of any household inventory differs from place to place and time to time but the basic of each valuation is relatively the same at the same instance and time. If it is true different property located at the same area with the same purpose can be evaluated in the same purpose can be evaluated in the same way there is need to ask. ? why the reputation of such valuation on different property in the same area? Hone can the various valuation job be centered to uniform the need of the property owner and the value what is the basic of valuation taking to different property at each given time? 1.3 PURPOSE OF THE STUDY The inventory designed for computer household valuation system is aimed at so making tedious work in calculation scaling and repetitive work of the manufacture appraisal. It will guide the research in compiling all real household inventory listing off property valuated by portraying a data base of different property value that will show a prototype to the present job stoke and creating the enabling environment for its format and frame work. 1.4 SCOPE OF THE STUDY Although presidential hotel is an established firm that has branches at Lagos Jos Abuja Port-Harcourt etc. all the information used for this research report is based on the collected from the Enugu office due to time and resources. As much as the business of household inventory system comprises of a while lot of household management valuation and facility etc. The designed worked covers only valuation report 1.5 LIMITATION OF THE STUDY The research project was only restricted to the department of household inventory penitential hotel Enugu. The following was done. Periodic physical checking of household system with the view to ascertain the level of each item keeping an accurate record of all entries insurance and transfer of these items purchase I order of the needed items and the determination and review of the inventory maintenance level. The research was limited to the mentioned department since it has direct concern to the research topic. The report cannot only be applied to presidential hotel Enugu household inventory but also to any other establishment that wise to go an computerization of their household inventory control section this research was carried out simultaneously with normal academic studies moreover due to the rush to end the semester as fast as possible there was no time for a comprehensive research work. Finance also affected this research work on area of typing and binding transporting form one library to the other in search of reliable information and also transporting to and form THE PRESIDENTIAL HOTEL ENUGU 1.6 OBJECTIVE OF THE STUDY In companies and industrial where there is household inventory planning it could be observed that properties in the different area of their department are well erected following the specific rules and regulation; the need for this planning is seen when the property owner want to know the value of his wealth. Therefore the design and implementation of a computer based household inventory system will not only benefit the researcher and value or property owner but will also create and improved system of marketing agent and environment as follows. The producer will find this hard value very much important because it will make his job feasible in course of any field (in course of any) work made on valuation and report to be presentable he will not need to expose his valuation report to anybody outside the business contract and the report will be made within shortest space of time. It will be a business ascribe as just in time business report where the need for filling report will be eliminated entirely. The property owner is at the better position to benefit because he will get the value of this property without much involvement and at every instance he stands to know precisely the value at which his property worthy. This work aim at encouraging every principal agent independent contractors and other associate members to accept the need to be computerized in all their practical job since the marketing agents will find it interesting to always present the household inventory business on line as regards the status of real property in market at every given time. 1.7 IMPORTANCE OF THE STUDY The research study is aimed at eliminating the manual system of household inventory system the project will help to create effective management information system in presidential hotel Enugu and most computer based enterprises. Because the system will given information regarding items which have fallen to re-order level and can also be programmed to issue replenishment order thereby conquering the problems encountered in the manual system where the reordering system is overloaded. Moreover the research work will be of immense benefit to the future researcher on the same problem because my approach to the fact finding was not a passive exercise rather all information were examined and challenged. 1.8 DEFINITION OF TERMS Acceptance: Is an indication of unwillingness to be bound by an offer. Access: Is the right of ingress to a parcel of household inventory property held by another. Accessibility: Is the easiness of ability in the value of property either by natural or artificial process Agency: Is a legal relationship whereby one person is employed to represent another in business or legal affairs with third person Agent: Is one who is employed to present another in business and legal affair with third person Commission: Is the amount due to a broker for service rendered usually figured as a percentage of the total price. Contract: Is a promise or agreement the performance of which a legal duty and the breach of which is actionable at law Equity: Is the owner?s interest in the value of real property usually reflected as the different between the market value and the balance owned on the mortgage Market value: Is the price in term of money of which a property of exposed for a reasonable time will sell in competitive market at a particular time by a seller to a buyer each acting prudently and without obligation to act which knowledge of the uses too which the property can be adopted. Ownership: Is used interchange ably with the term ?title? to indicate one?s right to posses use and dispose of property Principle: Is one who employee another (his agent) to represent him in Business and legal dealing with third person Bin card: This is the warehouse keepers record of movement of ?IN? and ?out? of the material under that his control|