...AN INVESTIGATION INTO ACADEMIC INDISCIPLINE AND FAILURE AMONG SECONDARY SCHOOL STUDENTS IN ENGLISH LANGUAGE MATHEMATICS, IGBO LANGUAGE, AGRICULTURAL SCIENCE, ECONOMICS PERIOD 2005-2010 (A CASE STUDY OF NIGERIA) TABLE OF CONTENTS Title page Approval Certification Dedication Acknowledgement Abstract Table of contents CHAPTER ONE 1.0 INTRODUCTION 1.1 Background of study 1.2 Statement of the Problems 1.3 Purpose of the Study 1.4 Significant of the Study 1.5 Research Questions 1.6 Scope of the study 1.7 Definition of terms CHAPTER TWO 2.0 LITERATURE REVIEW 2.1 Aspects of students’ indiscipline 2.2 Causes of students indiscipline 2.3 Consequences of students’ indiscipline 2.4 Strategies of maintaining discipline 2.5 Summary of literature review CHAPTER THREE 3.0 RESEARCH METHODOLOGY 3.1 Research design 3.2 Area of the study 3.3 Population of the study 3.4 Sample and sampling techniques 3.5 Development of the instrument 3.6 Method of Data Collection 3.7 Method of Data Analysis 3.8 Validation of instrument CHAPTER FOUR 4.0 DATA PRESENTATION AND ANALYSIS CHAPTER FIVE 5.0 DISCUSSIONS, CONCLUSION, RECOMMENDATIONS, AND SUMMARY 5.1 Discussions 5.2 Conclusion 5.3 Implications 5.4 Recommendations 5.5 Suggestion 5.6 Limitation of the study 5.7 Summary References Appendix TO DOWNLOAD “AN INVESTIGATION INTO ACADEMIC INDISCIPLINE AND FAILURE AMONG SECONDARY SCHOOL STUDENTS IN (ENGLISH LANGUAGE MATHEMATICS, IGBO LANGUAGE, AGRICULTURAL SCIENCE, ECONOMICS” COMPLETE PROJECT MATERIALS...
Words: 1115 - Pages: 5
...Pointing Devices 1 Introduction & Rationale A mouse is a pointing device used to input movement onto a GUI via detecting the shift of X and Y coordinates, as the mouse is moved from one position to another. The mouse was first invented in 1964 by Douglas Engelbart and changed the use of computers from scientists only to consumer friendly. [Inventors.about.com, (n.d.)]. The mouse was chosen as the device as its user friendly with few physical input demonstrated by the fact it is a ubiquitous device found all over the world. 2 Ergonomics Ergonomics, the study of how efficiently an environment can facilitate work is a key part of mouse design. Since, the first pointing devices, such as the ones produced at Xerox Parc, computer device have iteratively been improved to achieve as much ergonomic efficiency as possible. Figure 1: The Evolution of Mice As you can see computer mice have followed an extensive evolution over their 44 year existence (19682012). Initial designs were extremely square and were only designed to fit a human hand in terms of size not shape. Furthermore, the status quo of computer mice today are designed to include three buttons (one doubles as a scroll wheel) and to fit the a right hand of a human. It is interesting to note how modern designs have foregone the ambidextrous nature of their predecessors as they value the shape of the mouse more than said feature. 3 Psychology of Interaction The computer mouse provides a natural environment in...
Words: 1239 - Pages: 5
...CHAPTER ONE INTRODUCTION 1. BACKGROUND OF THE STUDY User authentication for network or internet based environment posed a challenging task for system and network administrator. This statement is true and is still very much applicable till these days as it is a well known fact that authentication is being widely incorporated as part of access control for most systems. Authentication has been the catalyst for business organization in information protection and security. Implementation of access control policies, standards or procedures involves the identification of appropriate authentication mechanism whereby the criticality of the information being protected are being used as justification for having a more refined authentication mechanism as compared to a more simple approach. Without the appropriate authentication mechanism in place, attacker could easily gain access to systems or applications by utilizing personal information, gained through various means, including but not limited to social engineering. Conventional textual passwords are the most common mechanism used in authentication. This method requires a user to enter their username and password, either in alphabet or numeric, or more commonly, a mixture of both forms as authentication tokens to gain access to systems or applications. Two recent surveys have shown that users choose short, simple passwords that are easily guessable, for example, “password”, personal names of family members, names...
Words: 17307 - Pages: 70
...Case Study Best-Book-Buy Online Bookstore Requirements Specification Document (By Henrique Paques, Leo Mark and Shamkant B. Navathe) 1. Introduction The purpose of this case study is to present a data-intensive application for which a database can be designed. It is described with sufficient degree of detail so that the application can be implemented in languages like Java or C using ODBC or JDBC connectivity to the relational database. This case study is an illustration of the typical project we have been using to teach an undergraduate class in database design that covers essentially the first 16 chapters of the textbook at Georgia Tech. The user interface is defined in screen format – these screens can be implemented using Visual Basic or Java as needed, or a simpler version of the interface using simple text menus may be implemented. There are a few reports included in the application specification. They are for illustrative purposes and may be modified as well. The methodology to be followed uses conceptual design in the Entity Relationship Model (Chapter 3), followed by a mapping of the ER schema into the relational schema (Chapter 7). The application is broken into a number of tasks and the inputs and outputs are related to the tasks by means of an Information Flow Diagram. Students should use Chapter 12 to understand the overall process of database design used for design of large databases. A design methodology is developed during the discussion of this...
Words: 5909 - Pages: 24
...YOU MAY WANT TO PRINT THIS GUIDE FOR QUICK REFERENCE AND CONVENIENCE 1. The Quiz is "open book, open notes." The maximum time you can spend in the exam is 2 hours, 30 minutes. If you have not clicked the Submit for Grading button by then, you will be automatically exited from the exam. In the Quiz environment, the Windows clipboard is disabled, so you will not be able to copy exam questions or answers to or from other applications. 2. You should click the “Save Answers” button in the exam frequently. This helps prevent connection timeouts that might occur with certain Internet Service Providers, and also minimizes lost answers in the event of connection problems. If your Internet connection does break, when you reconnect, you will normally be able to get back into your quiz without any trouble. Remember, though, that the exam timer continues to run while students are disconnected, so students should try to re-login as quickly as possible. The Help Desk cannot grant any student additional time on the exam. 3. Quizzes for this course will take place during Week 4 and Week 7. This study guide will cover content for both weeks. 4. Reminders * You will only be able to enter your online Quiz one time. * Click the "Save Answers" button often. * If you lose your Internet connection during your Quiz, logon again and try to access your final. If you are unable to enter the exam, first contact the Help Desk and then your instructor. * You will always be able...
Words: 1282 - Pages: 6
...WEB PORTAL FOR FREELANCE PHOTOGRAPHERS: Connecting Freelance Photographers and Prospective Clients A Thesis Paper Presented to the Department of Information Technology Mapúa Institute of Technology School of Information Technology Buendia, Makati Philippines In Partial Fulfilment of the Requirements for the Degree Bachelor of Science in Computer Science and Bachelor of Science in Information Technology By: Ahmed Abdulrahim, Firas A. Peña, John Michael C. June 2012 APPROVAL SHEET This is to certify that we have supervised the preparation of and read the thesis paper prepared by (Firas A. Ahmed Abulrahim and John Michael C. Pena) entitled “Web Portal for Freelance Photographers: Connecting Freelance Photographers and Prospective Clients” and that the said paper has been submitted for final examination by the Oral Examination Committee. Mr. Ariel Kelly D. Balan | | Dr. William T. Torres | Thesis Adviser | | Thesis Instructor | As members of the Oral Examination Committee, we certify that we have examined this paper and hereby recommend that it be accepted as fulfillment of the thesis requirement for the Degree Bachelor of Science in Computer Science and Bachelor of Science in Information Technology. Ms. Ira Camus | | Mr. William Rey | Panel Member | | Panel Member | | | | | | | | Mr. Joel De Goma | | | Committee Chair | | This thesis paper is hereby approved and accepted by the School of Information Technology...
Words: 13899 - Pages: 56
...Charles V. Zegeer, P.E. Associate Director of Roadway Studies Highway Safety Research Center University of North Carolina Chapel Hill, North Carolina FIGURE 5-1 Pedestrian signal displays.' Traffic Signals Traffic signals are intended to assign the right-of-way to vehicular and pedestrian traffic. When installed appropriately, traffic signals can provide many benefits, including the interruption of heavy volumes of motor vehicles where there are insufficient gaps in motor vehicle traffic for pedestrians to cross safely at intersections or midblock locations. Unwarranted or improperly used traffic sig-nals can cause excessive delay for pedestrians and motor vehicles, signal disobedience, and an increase in certain accident types. Even where warranted, traffic signal installations commonly result fn an increase in rear-end and total accidents, with a corresponding reduction in more severe right-angle acci-dents. The effect of traffic signal installations on pedestrian accidents is not well known, but different locational characteristics of the sites are important factors in the accident experience at signals.° While many traffic signals include only the green, yellow, and red signal faces, a variety of signal lens faces may be used, depending on needed signal phasing. Studies have suggested, however, that highly-com-plex, multiphase signals often result in con-fusion and hazardous situations for pedestrians. Therefore, in cases where such complex phasing is necessary, pedestrian...
Words: 4096 - Pages: 17
...Case Study 1 Christopher Jay Lawrence CIS210 System Analysis and Development Professor Bindu Geroge Case Study 1 Access Control System Due to the need for increased security around the campus we need to implement a new Access Control System (ACS) for access to the student dormitories, employee only areas and parking garages. The basic design of this system is to include proximity badge integration for access to the required areas listed above and cameras that will focus and record the face of individual transiting the access point. This system needs to be robust enough to handle the weather, with a backup emergency power system. The cameras need to be hi-res and need to be able to work under low to no light. This system needs to be able to be monitored 24 x 7 have the ability to save the recordings for a minim of two weeks and allow for remote open from the security desk. There are other points to consider since this is for a college. Due to the high level of sexual assault on most colleges and other common issues that arise due to the nature of college students here are a few other features that the system needs to have. There are to be emergency phones and call buttons at each station. These phones and buttons will call back to the security desk and will also trigger the cameras to record. If the emergency button is triggered at night area floods will also light for support in recording and assessment of the situation. These cameras need...
Words: 679 - Pages: 3
...Analysis Report Case Study Number 1 The NY Fashion Company Prepared for Prepared by John July 2006 Table of Contents Summary of Case Study: 3 Item a: Maximize total contribution margins given the constraints 3 Item b: Sensitivity analysis of solution given 10,000 yards additional acetate. 6 Item c: Income statement 7 Item d: Unit profit using the volume-based costing method. 10 Item e: Unit profit using the activity based costing method. 11 Item f: Financial/economic explanation for the difference between the unit profits 14 Appendix – Case Study #1 A-1 Summary of Case Study: This case study concerns determination of an optimum product mix solution given a number of resource, demand, and production constraints for a clothing manufacturer. Sensitivity to change in one of the resource constraints is examined. An income statement is developed based on the optimum solution determined. Finally, the unit profit is calculated using both traditional volume based costing and using activity based costing; included is a discussion of the financial and economic reasons for the difference between the two results. The case study document is included as an appendix to this report. Because of difficulties presenting the TORA output files in a readable state as integral parts of this document, those output files are both embedded in the document represented as icons and they will be submitted as four separate files along with this report. With this...
Words: 4455 - Pages: 18
...CHAPTER I THE PROBLEM AND ITS BACKGROUND 1.1 INTRODUCTION AND ITS BACKGROUND A pastor named Ferdie Sinense together with his wife Marisa Sinense who works as an auditor, established Rapa Generics Pharmacy on September 23, 2011. The main branch of this Pharmacy is located at Las Piňas-Zapote Road in Las Piňas City. Anthony Rudil, a licensed pharmacist and Jennifer Robela the assistant pharmacist are currently managing the business. In addition to that, the business opened its door to three more branches located in Pulang Lupa, Las Piňas and Marikina. The advent of new technology, most company nowadays is using computers in their transactions. Pharmacies in particular, are now making their systems computerized since that helps them minimize the time and efforts consumed by using manual system. Point-of-Sale Inventory System is one of the essential components of a successful business. It is a modern replacement for cash register in retail applications. It can help to record securely all the sales and customer’s orders and track products. A sale refers to the exchange of product or services for an amount of money or its equivalent while inventory, on the other hand, is the total amount of items and the act of counting them. A pharmacy owner must know the precise number of items in their storage areas in order to place orders and control losses up to date. Hence, computerizing both Sales and Inventory System will make an easier and faster transaction among the customers...
Words: 16309 - Pages: 66
...the behaviourist and psychodynamic perspective account for how people make sense of their environments‘. Psychology as a scientific study of behaviour and mental phenomena, in its systematic approach to observe, describe, predict and explain behaviour (class note), offers different approaches to studying and explaining behaviours, the main approaches includes, behaviourist, psychodynamic, cognitive, humanistic and biological. In this essay, two of the approaches (behaviourist and psychodynamic) will be discussed. There are two categories of behaviourism; radical which explain operant conditioning and classic or methodological behaviourism which explains classical conditioning. Watson (1913, 1919,) developed and popularised methodological behaviourism, while . . . as Morris (1988) recorded, Skinner's radical behaviourism start to be recognised within the academic folklore, in the late 1950s. Psychodynamic perspective was originally explained in the publication by Freud (1900) titled The Interpretation of Dreams, although there are many other psychodynamic theories based on Freud’s ideas (such as Jung’s, Adler‘s, and Erikson’s). This essay is purposed to highlight the similarities and differences between the two aforementioned psychological approaches (behaviourist and psychodynamic). Behavioural approach emphasises scientific study of only observable and measurable behaviours, responses and their environmental determinant. In behaviourism learning theory applies...
Words: 1183 - Pages: 5
...FAQs Answers to frequently asked questions – FAQs SIX COMMON CAUSES OF CONFUSION… PLEASE READ! 1. SCM Globe runs best under two browsers – Chrome and Safari. It will also run under Firefox, but sometimes it runs slowly under Firefox. And it DOES NOT run under Microsoft Internet Explorer. You can download a free copy of the Chrome or Firefox browsers by going to the websites of those browser makers. If Microsoft is your regular browser, Chrome and Firefox co-exist well with Microsoft. You can use Chrome or Firefox when working with SCM Globe. And you can return to the Microsoft browser for other tasks. One of those features is triggered when you download simulation results from SCM Globe to your PC. In the Firefox browser when you click on the “Export Results to Excel” button it will cause Firefox to open a dialog box. The dialog box will ask “What should Firefox do with this file?” There are two options: 1) Open with; or 2) Save File. Select “Save File”. The simulation data will then download as a data file to your PC in whatever folder you use for downloading from the Internet. The file will be something called an “octet-stream” instead of a .csv file. . Unlike a .csv file, you cannot open this file unless you open it from within your spreadsheet application. So open up your spreadsheet application (MS Excel, Apple Numbers, Google Sheets, etc.) and then open the simulation data file that you just downloaded. It will open correctly inside your spreadsheet application. ...
Words: 1443 - Pages: 6
...MGMT591 Final Exam Study Guide YOU MAY WANT TO PRINT THIS GUIDE. 1. The Final Exam is "open book, open notes." The maximum time you can spend in the exam is three hours, 30 minutes. If you have not clicked the Submit for Grade button by then, you will be automatically exited from the exam. In the Final Exam environment, the Windows clipboard is disabled, so you will not be able to copy exam questions or answers to or from other applications. 2. You should click the Save Answers button in the exam frequently! This helps prevent connection timeouts that might occur with certain Internet service providers, and also minimizes lost answers in the event of connection problems. If your Internet connection does break, when you reconnect, you will normally be able to get back into your Final Exam without any trouble. Remember, though, that the exam timer continues to run while students are disconnected, so students should try to re-login as quickly as possible. The Help Desk cannot grant any student additional time on the exam. 3. See Syllabus "Due Dates for Assignments & Exams" for due date information. 4. Reminders * You will only be able to enter your online Final Exam one time. * Click the Save Answers button often. * If you lose your Internet connection during your Final Exam, logon again and try to access your Final Exam. If you are unable to enter the Final Exam, first contact the Help Desk and then your instructor. * You will always be able to see...
Words: 1634 - Pages: 7
...types of classification tasks will be considered – two-class and multi-class classification. In all cases protein-ligand binding data will analyzed, ligands exhibiting strong binding affinity towards a certain protein being considered as “active” with respect to it. If it is not known about the binding affinity of a ligand towards the protein, such ligand is conventionally considered as “nonactive” one. In this case, the goal of classification models is to be able to predict whether a new ligand will exhibit strong binding activity toward certain protein biotargets. In the latter case one can expect that such ligands might possess the corresponding type of biological activity and therefore could be used as ‘’hits” for drug design. All ligands in this tutorial are described by means of an extended set of MACCS fingerprints, each of them comprising 1024 bits, the “on” value of each of them indicating the presence of a certain structural feature in ligand, otherwise its value being “off”. Part 1. Two-Class Classification Models. 1. Data and descriptors. The dataset for this tutorial contains 49 ligands of Angeotensin-Converting Enzyme (ACE) and 1797 decoy compounds chosen from the DUD database. The set of "extended" MACCS fingerprints is used as descriptors. 2. Files The following file is supplied for the tutorial: • ace.arff – descriptor and activity values 3. Exercise 1: Building the Trivial model ZeroR In this exercise, we build the trivial model ZeroR, in which all...
Words: 5674 - Pages: 23
...investigation you will explore some of these factors. Materials In order to test the intensity of light, there are several different materials needed. Those materials are as follows; colorimeter probe (spectrophotometer), red food color solution, blue food color solution, green food color solution, deionized water, test tubes and rack, pipet, and a timer. Procedures: Part 1 The first part in the experiment is to pour each colored solution into a vial, then calibrate the spectrophotometer. The calibration steps are to set it on the 430nm wavelength, and to place a vial of de-ionized water inside, then press the calibration button and letting it calibrate for 10 seconds. The spectrophotometer should show a percent transmittance of 100% since it is pure water being tested. Calibration is needed before every test is completed. After the spectrophotometer is calibrated, place the vial containing the red food color solution into the machine with the ridged sides pointing to the left and right, then close the lid. Press the start button and let the data collect for about 30 seconds, then press the stop button. Once the test is completed, collect and record the data. Calibrate the spectrophotometer again with the...
Words: 2451 - Pages: 10