Design And Implementation Of Computer Based Police Investigation System

Original price was: $ 13.00.Current price is: $ 12.00.

A Case Study Of Fiib Headquarters Ogbor-Hill Aba

SKU: UFS-0000001608 Category: Tags: , , ,

Description

ABSTRACT
The world over, it is indisputable that the introduction of computer technology in different facets of life, has virtually transformed and entranced information processing, which is very vital in any organization or parastatals of government. Not only as a means of information processing, the technology has also proved to be the fastest means of information retrieval, which forms the nucleus of this study.
This work tries to x- ray the rate role of the computer in crime investigation as it affects the Nigerian police. Force it looks at ways of improving the information management of the force. This research work will cover the following areas: record information retrieval relating to MIS (Management information system), retirement Cretan for officers and crime mapping through a data bank of crime related information.
A detailed design of a computerized approach that will bring the much needed innovation is given. Also included in this work is a praper documentation for the new system design.

TABLE OF CONTENT
Title page
Certification
Dedication
Acknowledgement
Abstract
Organization of work
Table of contents

Chapter one
Introduction
1.1 Statement of the problem
1.2 purpose of the study
1.3 Aims and objective
1.4 Scope of the study
1.5 Limitations of the study
1.6 Definition of terms

Chapter two
2.0 Literature review

Chapter three
3.0 Description and analysis of the existing system
3.1 fact finding methods used
3.2 Organizational structure
3.3 Objective of the existing system
3.4 Input, process, output analysis
3.5 Information flow diagram
3.6 Problems of the existing system
3.7 Justification of the new system

Chapter four
4.0 Description of the new system
4.1 output specification and design
4.2 Input specification and design
4.3 File design
4.4 Procedure chart
4.5 System requirement

Chapter five
5.0 Implementation
5.1 program design
5.2 Pseudo code

Chapter six
6.0 Documentation

Chapter seven
7.0 Recommendation and conclusion
7.1 Reference