Our Archives

Call 08068929770 or 08122972656 for any enquiries.

Project Topic:

INTRANET MAILING SYSTEM

Project Information:

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 67 ::   Attributes: source code ::   1,742 people found this useful

Project Body:

CHAPTER ONE

1.0 INTRODUCTION

1.1 BACKGROUND OF STUDY

Intranet is the generic term for a collection of private computer networks within an organization. An intranet uses network technologies as a tool to facilitate communication between people or work groups to improve the data sharing capability and overall knowledge base of an organization's employees. A network that uses technologies of internet protocol to share any type of information within association or Business Company is called Intranet. This technology is used in the proposed system, the “Intranet Mailing System” to make the most out of this technology. This will somehow automate the information passing system.

The Internet, which is a distributed and open system, provides access to diversified information created by various organizations and individuals and is geographically distributed worldwide. The Internet, a hypermedia system, is commonly used as the first source of information because downloading text, audio and graphical information is so convenient. Corporate intranet users need to develop systems to share information in virtual space through the Internet without risking the security and integrity of their data. Many enterprises share and reuse information through the intranet.

However, the intranet systems, which provide many types of service, need to incorporate solutions for security and access control (Park, J. S. et al., 2006). Currently, most enterprise intranet systems process user information for security and access authentication. However, unauthorized users often capture this information and may edit, modify, delete or otherwise corrupt this data.

1.2 STATEMENT OF RESEARCH PROBLEM

The advancement in the level of technology in most organization has really improved overtime. But there are still some limitations that may affect the contribution of this technology growth in most organizations in the areas of effective information sharing. It is evident that for some mail users, the amount of time to handle incoming messages exceeds the available time for the server to respond to the mail request. Intranet mail users become over flown and important messages may be lost or forgotten in the flood of other messages (Hiltz & Turoff 1985; Mackay 1988). All these raise needs to reroute, organize, or delete messages. It is important to find solutions for these over-flown users without degrading the situation for those that do not have overflow problems.

In other words, it is important to study many different types of users’ mail handling in order to identify problems for each user group and for designers to solve these without causing more trouble for the other groups.

1.3 AIM AND OBJECTIVES OF STUDY

The main aim of the research work is to examine intranet mailing system. Other specific objectives of the study are:

  1. to determine the effectiveness of intranet mailing system
  2. to determine the protective measure in the design of intranet mailing system
  3. to investigate on the integrity of the intranet mailing systems
  4.  to proffer solution to the above problem

1.4 RESEARCH QUESTIONS

The study came up with research questions so as to ascertain the above stated objectives of the study. The research questions for the study are:

  1. How effective is the intranet mailing system?
  2. What are the protective measures in the design of intranet mailing system?
  3. How can the integrity of the intranet mailing systems be improved?

1.5 SIGNIFICANCE OF STUDY

Intranet mailing system will influence the security level and have impacts on the growth of information communication technology in most organisations in Nigeria. The challenges faced by mail users are majorly insecurity in information storage and ease of access. The findings of the study will dictate the types of intranet mailing system problems and also proffer solution to the problems faced by the users in Nigeria. The findings will also serve as spring board for the conduct of further research.

1.6 SCOPE OF STUDY

The study is limited to users of intranet mailing system in Nigeria only; it covers on how to improve security of data or information about mails on disposition in regard to the destination and delivery of the mails. Finally the study will look at other issues in terms of data loss and integrity as a result of hardware failure.

1.7 DEFINITION OF TERMS

MySQL: is an open-source relational database management system. Its name is a combination of "My", the name of co-founder Michael Widenius's daughter, and "SQL", the abbreviation for Structured Query Language.

HTML: Hypertext Markup Language is the standard markup language for creating web pages and web applications

JAVA: Java is a general-purpose computer-programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible

Intranet: An intranet is a private network based on TCP/IP protocols, belonging to an organization, usually a corporation, accessible only by the organization's members, employees, or others with authorization

Intranet mailing system: An intranet is a network based on the internet TCP/IP open standard. An Intranet belongs to an organization, and is designed to accessible only by organization's members, employees, or others with authorization.

 


Get The Complete Project »

Project Department:

MORE COMPUTER SCIENCE FREE UNDERGRADUATE PROJECT TOPICS AND RESEARCH MATERIALS

Instantly Share this Project On Social Media:

CLOSELY RELATED COMPUTER SCIENCE FREE UNDERGRADUATE PROJECT TOPICS AND RESEARCH MATERIALS

A SURVEY OF DATA BASE MANAGEMENT IN ENHANCING THE WORK PERFORMANCE OF OTM GRADUATES IN SELECTED ORGANISATIONS IN ABUJA

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 61 ::   Attributes: Questionnaire, Data Analysis,Abstract  ::   4022 engagements

CHAPTER ONE 1.1. BACKGROUND OF THE STUDY A database is an organized collection of data.[1] It is the collection of schemes, tables, queries, reports, views and other objects. The data is typically o...Continue reading »

A STUDY INTO THE CHALLENGES AND PROSPECTS OF MARKETING NIGERIAN MADE COMPUTER SOFTWARES

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 65 ::   Attributes: Questionnaire, Data Analysis,Abstract  ::   5403 engagements

CHAPTER ONE 1.1. Background to the Study Made-in-Nigeria softwares are those that are produced within Nigeria. Nigeria as a third world country needs to produce its own software so that it will help...Continue reading »

AN APPRAISAL OF THE ROLE OF ICT AS A CHANGE AGENT FOR QUALITY EDUCATION IN TERTIARY INSTITUTION IN NIGERIA

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 64 ::   Attributes: Questionnaire, Data Analysis,Abstract

CHAPTER ONE INTRODUCTION 1.1. BACKGROUND OF THE STUDY Quality assurance in the education system is a concept consisting of lot of activities that are designed to improve the quality of input, proce...Continue reading »

ASSESSMENT OF THE UTILIZATION OF INTERNET SERVICES AMONG STUDENTS IN FEDERAL INSTITUTIONS IN KADUNA STATE

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 69 ::   Attributes: Questionnaire, Data Analysis,Abstract  ::   4518 engagements

CHAPTER ONE INTRODUCTION The convergence of information and communication technologies as typified by the Internet is increasingly having more influence on all aspects of the society as it has becom...Continue reading »

AUTOMATED DATA ANALYSIS OF LABORATORY TEST RESULTS AND ITS SCIENTIFIC IMPORTANCE

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 59 ::   Attributes: Sort code, Abstract  ::   3095 engagements

CHAPTER ONE 1.1. Introduction As an authentic measure to curb mortality rate, it is important to know the diseases that contribute to increasing mortality rate. Laboratory test results provide inform...Continue reading »

AUTOMATED MARKET BASKET ANALYSIS SYSTEM

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 65 ::   Attributes: Sort code, Abstract  ::   3006 engagements

CHAPTER ONE 1.0 INTRODUCTION Data mining is described as the extraction of hidden helpful information from a collection of huge databases, data mining is also a technique that encompasses an enormou...Continue reading »

What are you looking for today?

TESTIMONIALS:

  • 1. Mohammed A.B from Veterinary Laboratory, Zanzibar ,Tanzania said "You are doing good job to assists in research. God bless you.".
    Rating: Very Good
  • 2. Grace Madu from IMT enugu said "Thank you so much; i will tell my friends about you guys!!! Please give them a good job just like mine!!! God bless you!!!".
    Rating: Excellent
  • 3. Favour Adeoti from Unimaid said "For the good deeds and help to students like me, may God almighty continue to bless u and empower you to do more. Thank u very much...".
    Rating: Excellent
  • 4. Saddiq Abubakar Shuaibu from ESAE BENIN UNIVERSITY said "I check your site because I want you to help do this project thank you".
    Rating: Excellent
  • 5. Temitope Olumide from UAM makurdi said "I can not believe i could trust online platforms but you prove to me that there are still some good people out there. Thank you Mr Donald".
    Rating: Excellent
  • 6. Topeola Atinuke from the bells said "hmmmm, not sure yet about all dis comment still working on dem yet....tank u".
    Rating: Average

Paper Information

Format:ms word
Chapter:1-5
Pages:67
Attribute:source code
Price:₦3,000
Get The Complete Project »

Best Selling Projects

Our Archives