ABSTRACT
As the complexity and degree of crimes wider, system Nigeria new technology will have to be utilized to aid lawyers and criminologist to fight this tends, on computerized crime record will offer a solution on this issue. It is a software set up in order to meet the information needs of every part of the agency about crime record. The software is divided into four different sections: Criminal record, case record, cases and tutorial.
Crime record gives information on any offence selected by the user; case record store all relevant information on any case handled by the expert, case given already decided cases depending on the choice of the users tutorial teaches or explains certain thing son crime record. The aim behind the design of this software is to model a computerized crime record system to enable professional and non-professional to handle criminal related matters with ease.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE: INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE
1.5 LIMITATION
1.6 DEFINITION OF TERMS
CHAPTER TWO
2.1 LITERATURE REVIEW
CHAPTER THREE: DESCRIPTION AND ANALYSIS OF THE EXISTING SYSTEM
3.1 FACT FINDING METHODS USED
3.2 ORGANISATIONAL STRUCTURE
3.3 OBJECTIVES OF THE EXISTING SYSTEM
3.4 INPUT, PROCESS, OUTPUT ANALYSIS
3.5 INFORMATION FLOW DIAGRAM
3.6 PROBLEMS OF THE EXISTING SYSTEM
3.7 JUSTIFICATION FOR THE VIEW SYSTEM
CHAPTER FOUR: DESIGN OF THE NEW SYSTEM
4.1 DESIGN OF THE NEW SYSTEM
4.2 OUTPUT SPECIFICATION AND DESIGN
4.3 INPUT SPECIFICATION AND DESIGN
4.4 SYSTEM FLOW CHART
4.5 SYSTEM REQUIREMENT
4.6 PROCEDURE CHART
CHAPTER FIVE: IMPLEMENTATION
5.1 PROGRAM DESIGN
5.2 PROGRAM FLOWCHART
5.3 PSEUDOCODES
5.4 SOURCE PROGRAM
5.5 TEST RUN
CHAPTER SIX: DOCUMENTATION
6.1 SYSTEM DOCUMENTATION
6.2 PROGRAM DOCUMENTATION
6.3 USER DOCUMENTATION
CHAPTER SEVEN: CONCLUSION & RECOMMENDATION
7.1 CONCLUSION
7.2 RECOMMENDATION
BIBLIOGRAPHY
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 12). Design And Implementation Of A Computerised Crime Record System (a Case Study Of State C.i.d. Headquarters Enugu).. ProjectStoc.com. Retrieved 12, 2014, from https://projectstoc.com/read/5916/design-and-implementation-of-a-computerised-crime-record-system-a-case-study-of-state-c-i-d-headquarters-enugu-4904
"Design And Implementation Of A Computerised Crime Record System (a Case Study Of State C.i.d. Headquarters Enugu)." ProjectStoc.com. 12 2014. 2014. 12 2014 <https://projectstoc.com/read/5916/design-and-implementation-of-a-computerised-crime-record-system-a-case-study-of-state-c-i-d-headquarters-enugu-4904>.
"Design And Implementation Of A Computerised Crime Record System (a Case Study Of State C.i.d. Headquarters Enugu).." ProjectStoc.com. ProjectStoc.com, 12 2014. Web. 12 2014. <https://projectstoc.com/read/5916/design-and-implementation-of-a-computerised-crime-record-system-a-case-study-of-state-c-i-d-headquarters-enugu-4904>.
"Design And Implementation Of A Computerised Crime Record System (a Case Study Of State C.i.d. Headquarters Enugu).." ProjectStoc.com. 12, 2014. Accessed 12, 2014. https://projectstoc.com/read/5916/design-and-implementation-of-a-computerised-crime-record-system-a-case-study-of-state-c-i-d-headquarters-enugu-4904.
- Related Works
- Design And Implementation Of Code Optimization: Implementation Of Scalar Optimization
- Design And Implementation Of An Online Hotel Reservation System
- The Design And Implementation Of A Computer Pharmaceutical Centre (a Case Study Of Osco Pharmaceutical Centre Warri, Delta State)
- Authentification Of Digital Images By Encryption And Decryption With Primary Key Implementation Using Ism Algorithm And Steganography
- Compound Interest Calculation System In Retail Bank
- Network Base Security Surveillance System
- Web Based Credit Card System
- Fuzzy Control Model Optimization For Behavior-consistent Traffic Routing Under Information Provision
- Design And Implementation Of Interactive Intranet Portal For Effective Management In Tertiary Institution
- Open-source Software Vs Closed Software