Skip recommendations
Suggested Topics within your search.
Suggested Topics within your search.
Skip recommendations
Security measures
4
Computer networks
3
Computer security
3
Law and legislation
3
Methodology
3
International law
2
Medicine
2
Nanostructured materials
2
Nursing
2
Physical therapy
2
Risk management
2
Social aspects
2
Administration and dosage
1
Airspace (International law)
1
Allied health personnel
1
Anthropologie légale
1
Anti-Infective Agents
1
Anti-infective agents
1
Biomedical materials
1
Biopsy
1
Biotechnology
1
Business
1
Calculus
1
Chemical processes
1
Climatic changes
1
Cold War
1
Commercial statistics
1
Communication studies
1
Component software
1
Compulsive gambling
1
-
1by Rusere, Tafadzwa“…The progressive Road Rules Defensive Driver’s License Application will permit users to practice questions remotely using their devices. …”
Published 2018
Get full text
-
2by Moyo, Ngqabutho M.“…By ascertaining how social media users used Facebook and Twitter, it is possible to use this case study as an example of the importance of engaging with users and identifying areas of concern. …”
Published 2018
Get full text
-
3by Mahlabvani, Tinashe“…Maintenance strategies were discussed and it was seen necessary to use them to ensure the continuity of the system, efficiency and effectiveness. …”
Published 2018
Get full text
-
4by Musora, Farai“…Maintenance strategies were discussed and it was seen necessary to use them to ensure the continuity of the system, efficiency and effectiveness. …”
Published 2019
Get full text
-
5by Zongoro, Keith“…Its major thrust is to provide a simple and easy platform to serve end users faster with help desk automation that automates repetitive tasks using smart help desk workflows. …”
Published 2018
Get full text
-
6by Gumbo, Lettiah“…This paper investigates how Shona linguists can shorten the terms created using thecompounding strategy so as to make them user-friendly. …”
Published 2021
Get full text
Get full text
Article -
7by Chikondowa, Tinevimbo“…Security measures were considered through use of user names and passwords thus restricting access to certain privileges to some users. …”
Published 2018
Get full text
-
8by Nyakudya, Nigel“…With the help of Java programming language and JavaFX framework the developer found it easy to integrate some of the user requirements into a single system that can forecast the product performance, do product time series analysis whilst monitoring the customer buying patterns and hopping to add some of or all the future user novel requirements to the system if possible. …”
Published 2019
Get full text
-
9by Manjombo, Honest Kudakwashe“…As technology evolves, the equipment currently in use becomes obsolete and makes it hard to keep maintaining available infrastructure to serve the population. …”
Published 2019
Get full text
-
10by Musarira, Collen“…After the system was successfully designed, it was then tested in order to see if the user expectations were met. After system testing, the users were trained on how use the system. …”
Published 2017
Get full text
-
11by Maramba, Oliver“…Maintenance strategies were discussed and it was seen necessary to use them all to ensure the continuity of the system, efficiency and effectiveness. …”
Published 2020
Get full text
Thesis -
12by Sambadzi, Blessing“…Maintenance of the system options were evaluated giving the perfective maintenance option since the system will be thriving through the use recommendation. For the future there is need to create a cross platform application that serve all with smartphones and also the integration of Telecash.…”
Published 2019
Get full text
-
13by Mbweku, Peter“…With all being done the new Boardpack system was fully implemented and a user manual was produced to help users how to use the system. …”
Published 2016
Get full text
-
14by Maringe, Robert“…The study advanced to outline the system user manual and document the data mining methods used to develop the proposed system.…”
Published 2019
Get full text
-
15
-
16by Mahoko, Abraham“…Various measures such as user identification, user authentication and access control have been put in place in order to counteract unauthorized users from using the system. …”
Published 2021
Get full text
Other -
17by Chibagidi, Prince“…Each user has his/her own mobile device that they use to report the faults and the IT personnel have their own devices they use to attend to the faults. …”
Published 2018
Get full text
-
18by Masunungure, James D.“…The user interface was implemented using HTML and PHP. …”
Published 2017
Get full text
-
19by Musvazvi, Nigel Tafadzwa“…The system comprised of web application and android application. The web application serves the organization and it acts as back end application which was developed using Php laravel. …”
Published 2018
Get full text
-
20by Andreya, Fungai“…Security measures were considered through use of user names and passwords thus restricting access to certain privileges to some users. …”
Published 2018
Get full text