Khadija Project
Khadija Project
BY
CS/DCS/20/015
i
OCTOBER, 2022.
ii
APPROVAL PAGE
This project report has been read and approved by the undersigned as meeting the requirement for
the award of Diploma in Computer Science by the Computer Science Department of College of
Project Supervisor
H.O.D Computer
External Examiner
iii
DEDICATION
This project work is dedicated to our beloved parents and the entire members of our Families for
their prayers and assistances towards the completion of our studies, May Almighty Allah Merit,
Dignify, elevate their positions where so ever they are and finally reward them with Jannatul
Fardausi, Amen.
iv
ACKNOWLEDGEMENT
All praises be to Almighty Allah for granting us the privilege, wisdom, opportunities and
the enabling environment to conduct this research work. We also thank him tremendously for the
Our special thanks to our project supervisor, Malam Fatima Sa’idu Sarduana for his
guidance, truthfulness in reading the manuscript, His patience and readiness towards the success
of this task are highly appreciated. May Allah bless him Ameen.
We also thanks our course lecturers in Computer Science Department as well as our
course mates in general for their contributions, assistances and advices in one way or the other,
Also our profound gratitude's to our parents for their support both financially and morally
v
ABSTRACT
The purpose of the study is to examine the “Student Attendance Management System” in Yobe
State University, Damaturu, the researcher adopted descriptive survey design. The
questionnaires were distributed to the group of the respondents to fill out, considered to be the
representatives of the entire population. And also, the population size comprised of all Yobe
State University academic staffs which is sixty (60) staff lecturers in Yobe State University,
Damaturu. Therefore, the sample size contained fifty (50) lecturers selected from the entire
population using Random Sampling Techniques in which each member has an equal opportunity
of being chosen. The instrument were used in this study was the questionnaire which contained
(20) items that solicited the respondents opinions on the “Student Attendance Management
System”, and using the (5) Likert Rating Scale of Agreed (A), Strongly Agreed (SA), Disagreed
(D), Strongly Disagreed (SD), and Undecided (U). Furthermore, the date collected for this
research work can be presented and analyzed in a tabular form showing the differences in
numbers and percentages of the respondents that were consulted during this write up. Moreover,
the first table analyzes the respondents based on their Gender, Educational Background, Marital
Status, and Working Experience of the respondents. And the other 12 tables present the number
and percentage of the respondents upon respondents they gave when filling their questionnaires
form. Follow by the formula were used to analyze is No of Respondents Divided b Total No of
Respondents multiply by one Hundred (100). Lastly,, the summarized of majority having made
reasonable attempts to find out the problem and areas of the ineffective use of Online Attendance
the researcher come out with the following findings; the majority of the respondents were
strongly agreed throughout the finding.
vi
TABLE OF CONTENTS
Title Page - - - - - - - - - i
Approval Page - - - - - - - - ii
Dedication - - - - - - - - - iii
Acknowledgment - - - - - - - - iv
Abstract - - - - - - - - - v
Table of Contents - - - - - - - - vi
CHAPTER ONE: Introduction
1.1 Background of the Study - - - - - - - 1
1.2 Statement of the Problem- - - - - - - 2
1.3 Research Objectives - - - - - - - 4
1.4 Research Question and/or Research Hypothesis - - - - 5
1.5 Significance of the Study - - - - - - - 5
1.6 Scope and Limitation of the Study - - - - - 6
1.7 Definition of Terms - - - - - - - 6
CHAPTER TWO: Literature Review
2.1 What Is Computer - - - - - - - - 7
2.2 Historical Evolution of Computers - - - - - - 7
2. Classification of Computers - - - - - - - 9
2.4 Computers Generations - - - - - - - - 11
2.5 Characteristics of Computers - - - - - - 12
2.6 Fundamental Computer Systems - - - - - - 12
2.7 Data flow In Banks - - - - - - - 15
2.8 Information System Processing - - - - - - 18
vii
3.3 Sample Size and Sampling Technique(s) - - - - - 31
3.4 Research Instrument - - - - - - - 31
3.5 Method of Data Collection - - - - - - 31
3.6 Data Analysis Technique(s) - - - - - - 32
viii
CHAPTER ONE
INTRODUCTION
In an evolving Nigerian banking industry, strategies are being adopted by the major
players in order to achieve their long-term organizational goals- profitability and survival. In the
light of this belief, much emphasis is being laid on the computerization of their banking
operations. Within the last decade, the Nigerian banking industry has been at the forefront of
computerization. This is with the aim of: improving their information system, delivery of
In the advent of computerization, old generation banks in the industry were force to wake
up from their slumbers and face reality. The new generation banks came into the industry with
innovation, research and development, in order to push these less competent old ones out of
business. This revolution was aided by computerization. It’s very pertinent to state that
The Nigerian banking industry ensures that their data base is updated as at when due. With the
2004 banking reform in Nigeria, the industry has persistently remained vibrant. The overall aim
of this sanitations effort by Professor Charles Chukwuma Soludo was to achieve some
To create a world of banking groups through mergers and acquisitions aimed at avoiding bank
distress. To consolidate Nigerian banks to manage the country’s external reserve deposited in
According to Rob Kling (1996), “when a specialist discusses computerization and work,
they often appeal to a strong implicit image about the transformation of work in the last one
1
hundred years and the role that technology has played in some of these changes.” In view of this,
it’s quite imperative to analyze this information with the Nigerian banking industry, and to take
providing computers to do identified operations”. Before the advent of computers, the rule of
According to Rob Kling (1994), “In the early twentieth century, the organization of office
work underwent substantial change-firms began to adopt telephones and typewriters. By 1930s
and 1940s, many manufacturers had devised electromechanical machines to help manipulate,
In the early 1960s, business firms such as insurance companies and banks adopted
During the 1980s and early 1990s, virtually every business organizations had bought the
personal computer (PC). The PC revolution did not only change the 9 nature of office work but,
In the last decade, many larger organizations that imbibed computerization and saw their
profit rise astronomically concluded that “computerization is the currency to be spent in the new
millennium”.
In the light of this belief, this study probes the pros and cons of computerizing banking
The twenty-first century business-world has been marked by the rise of service job in
such areas as: banking, insurance, advertising, transportation and health. Many of the earliest
2
commercial computers were bought by large service organizations such as: banks and insurance
companies.
One of the basic problems of this research work is to critically look at the banking
industry vis-à-vis the heavy investment made by these institutions in the acquisition of computer
technology. This will be geared towards assessing the effect of this computer technology on the
With computerization, jobs that would have taken hours and a lot of manpower, can
conveniently be done by few hands in just a jiffy. The concomitant effect of this will inevitably
be lay-off of workers. In the case study of this research work-United Bank for Africa Plc- about
Shankar K. (1997) “as society becomes more dependent on computers, computer crime is
becoming not only more disastrous, but also more attractive to the criminally-minded people: the
disclosure threat, which is the dissemination of information to an individual for whom that
In the context of computer security, the disclosure threat occurs whenever some secret
information that is stored in a computer is divulged to somebody who shouldn’t have seen it.
Fraudulent people have devised a clever way of guessing at people’s passwords. These could
take the following forms: a user’s role model, surname, best movie, spouse’s name, street name,
best drink.
which is one of the external threats in the business environment, changes very rapidly. What was
impossible yesterday has been made possible today. With technological changes, huge
3
investments made by banks in the acquisition of contemporary computer devices are lost. This
The objective of this study is to carry out a thorough analysis of effect of computerization
on the Nigerian banking Industry. The positive side of it will be fully looking at, and the
problems associated with it will be brought out in details. This study is also aimed at taking a
holistic view of computerized banking operations in order to help identify clearly those
computerization such as: Speed, efficiency, reliability and accuracy will be thoroughly analyzed.
The proper management of the computerization process aimed at cushioning its traumatic effect
like job losses will also be delved into. The use of computers in the Nigerian banking Industry
has been necessitated by the large volume of book-keeping and their multifarious scale of
operations. In studying the effect of computerization in the Nigerian banking industry, efforts
industry
iii. To assess how computerization can affect the internal control system in the banking
industry.
iv. To find out how data can be secure in the computer systems in Zenith Bank Plc in
4
Research is also aimed at providing an in-depth analysis of computerized banking
operations in Zenith Bank Plc in Potiskum Local Government Area which will serve as a guide
Data analyzed should be able to answer the following questions that will be used in
ii. Can job-losses be the end-product of computerization in the Nigerian banking industry in
iii. Can computerization affect the internal control system in the banking industry?
iv. Can data be secure in the computer systems in Zenith Bank Plc in Potiskum Local
The significance of the study of the effect of computerization on the Nigerian banking
industry could be established from the point of view that one of the important benefits which a
computer system could bring to an organization is speed and accuracy of information. The study
is further justified by the need to guide the banks in their quest to computerize their operations,
thereby bringing out the cost implication of doing so. The need to take a critical look at the
Nigerian banking industry which is the life-blood of the Nigerian economy makes this study very
important.
5
In view of the fact that no economy can make headway without a sound and vibrant
vast one. It involves an extensive study and understanding of the total effect of computerization
on the Nigerian banking industry, considering its merits and demerits. In view of the large size
and scale of operation, it is a very painstaking and excruciating one. In a bid to keep the work
within a manageable limit in terms of time and financial constraints, the research will be limited
It’s quite pertinent to state that banks have a discreet nature of not divulging sensitive
information about their scale of operation. And, this has served as a limiting factor. The problem
Despite these factors, efforts will be made to obtain the much-needed information to
carry out this research work and the conclusion drawn to be incisive.
Data Base: An organized set of data that is stored in a computer and can be accessed and
Reform: A change that is made to an organization or a social system in order to improve it.
6
CHAPTER TWO
LITERATURE REVIEW
2.0 Introduction
Modern-day business organizations strive to achieve certain goals for the benefit of their
owners and clients, these goals are usually expressed in terms of objectives such as: increase in
turnover, cost reduction, profit maximization and improvements in services. Such objectives will
a. Plan ahead
b. Control cost
Today, large business organizations have discovered that the best means to deliver high quality
According to G.B Davies (1978), a computer can be defined as any electronic device that
can accept data, process this data and produce this processed data as output, at a very high speed
The existence of computers can be traced to the early days of man. As a matter of fact,
the computer has become known to mankind as early as 7th century BC when the first computer
called the ABACUS came into being. It was made In China and consisted of beads strewn on
7
iron rods. The abacus was used mainly for simple arithmetic calculations such as additions and
subtraction. Since the invention of the Abacus, computer has metamorphosed through different
Frenchman called Blaise Pascal, a nineteen- year- old boy, who was motivated by the need to
reduce the numerical labour involved in his father’s work(the supervision of the tax and
In 1823, a breakthrough was recorded in what is today known as computer. That year, a British
mathematician called Charles Babbage “the father of computer” invented a machine called the
He didn’t receive the expected assistance because his ideas continued to develop beyond
the original concept. In fact, due to lack of fund, he abandoned the project and commenced work
on the second machine called “The Analytical Engine”. However, parts of the difference engine
were made and it can be found in the science museum in south Kensington, England.
The Analytical Engine was patterned towards the modern-day computer. For instance, it
had the processor, input device, output device, main storage and the control unit. The Analytical
Engine could be programmed. It held its programs on punched card. Charles Babbage could not
The punched card was first used for automatic control of the weaving loom in 1801 by
Jacquard. However, it became useful for computational work at the tail-end of the 19th century.
At that time, an American statistician by name Herman Hollerith who was working in the US
8
census department suggested its use to the government. He devised a card-based machine which
Herman Hollerith later left the census office in 1896 to form the tabulating machine
company which later became what is today known as international Business machine (IBM) inc.
one of the largest computer manufacturers in the world, and a pioneer in the production of micro-
Sequence Controlled Calculator (ASCC) was invented. This later became known as mark-1. This
feat by Howard Aiken of Harvard University was encouraged by the success of the punched card
machine in 1937. He was greatly assisted by IBM which provided all the manufacturing
capabilities. The success of the Mark-1 led to the invention n of both Mark-2 and Mark-3. All of
which used the punched card as input medium. The output device was a card punch and a
typewriter and it operated electro-magnetically. The Second World War propelled a lot of efforts
in the development of electronics. The evidence of this can be found in the design of a machine
Then, the best was yet to come as John Von Neumann led other scientists at Advanced
could be said to have set the stage for the manufacture of today’s computers. As a result of
Neumann’s achievement, a great number of computers were designed in the United States of
1. By Data processed
2. By Size
9
BY DATA PROCESSED
Considering the manner in which data is represented within the computers, we could have
following classes.
1. Analog Computers: These are computers that operate on values represented in the form of
continuous variables. That is, values those changes frequently within short time interval. In
analog computers, a value is represented by a physical quantity that is proportional to it. The
output from this type of computers is represented in the form of smooth curves or graphs
from which information can be read. A physical quantity used may be current, voltage,
2. Digital Computers: These are computers that process data which is represented in the form
of discrete values (e.g. 0,1,2,3) by operating on it in step. Discrete values occur at each step
of operation. Counting on one’s fingers is probably the simplest digital operation we all
know. Today, there are more applications that use digital rather than analog computers.
3. Hybrid Computers: This is a computer that combines the speed of digital computers and the
B. BY SIZE
1. Mainframe Computers: This is a set of computer that is large and expensive, which is used
b. They support a wide range of peripheral equipment including high speed storage devices.
10
2 Mini Computers: These are computers that are smaller in size and have a very low cost of
a. Micro Computer: In physical size, the micro-computer is the smallest. It’s also known as
“Personal Computer” (PC). It’s very cheap to acquire a micro-computer. It’s commonly used
in homes and small offices. It’s portable and can tolerate the normal room or office
temperature. Again, its operations are very simple and therefore require little or no skill. It’s
simple to install,
1. The First Generation: The first generation computers were characterized by the presence of
‘vacuum tubes’ which acted as a basic block for building the logical part of the computer. It
consisted of circuits made up of wires and values. Examples of computers in this generation
include UNIVAC1, IBM, 700. The period covered by the first generation computers lasted from
2. The Second Generation: This generation of computers was characterized by the use of
transistors in place of vacuum tubes. This made the computers consume less electricity power
and produces less heat. They were physical smaller and cheaper. The computers in this group
include IBM 7030, NCR 315, UNIVAC 1107 and Honeywell 800. The period of the second
3. The Third Generation: In this computer generation, the integrated circuits tech neology was
the major characteristics of the computers. This made computers cheaper than the earlier ones
and these computers were also faster as they operated in nano seconds (one billionth of a
second). This generation witnessed the introduction of many mini and mainframe computers.
11
The major companies involved included: IBM, Honeywell amongst others. These computers
4. The Fourth Generation: This generation witnessed the production of micro –computers. It
was characterized by the use of micro-processors; it came along with software such as
improved networks and electronic mail. The fourth generation covers mid nineteen seventies to
late eighties.
5. The Fifth Generation: Computers in this generation came into the market around 1990. This
3. Consistency: A computer, if given the same task, it’ll continue to produce the same result.
a. Input Devices.
12
c. Primary Storage Unit.
e. Output Devices.
a. Input Devices: Are used to capture and enter data into the computer. Before data can be used
within a computer system, it’s usually necessary to convert it into a format that supports
processing by computer. Most data are held in machine-sensible form. We shall briefly discuss
i. The Keyboard: This remains the most common input devices and its basic design has
remained largely the same. A common criticism of the keyboard is that inexperienced users find
it difficult to use.
ii. The Mouse: This is a device held by the user to navigate from one side of the screen to
another. Selections like menu items are made by clicking one of the buttons on the mouse. A
mouse is suitable for controlling programs that make use of icons, menus or buttons.
b. Central Processing Unit: The central processing unit (CPU) performs processing by carrying
out instructions given in the form of computer programs. It’s made up of two components:
The control unit fetches commands from memory, decodes them and then executes them.
It controls the operations of all hardware, including all input/output operations. The arithmetic
c. Primary Storage or Main Memory: This is the memory that store and load data and
13
i. Random Access Memory(RAM): The content of this type of memory are lost when the power
d. Secondary Storage Devices: They provide a means of storing data and programs until they
i. Floppy disk drive: It uses plastic disk, coated with a magnetic covering and enclosed within a
rigid plastic base. They come in different sizes. At present, the most common type is the high
ii. Hard disk drive: This is a standard feature of a modern computer. It is used in storing the
computer’s operating system, application software and data. It stores data on a number of rigid
iii. The CD-Rom Drive: This arose from the audio compact disc player and began to gain
popularity in the late ’80s. The acronym ‘CD-Rom’ stands for Compact Disc-Read Only
Memory. Data cannot be written to a CD-Rom by a conventional player. The digital versatile
Disc(DVD), although, this is similar to a CD-Rom, two significant benefits to users are:
d. Output Devices: This translates the result of processing into a human-readable form. The
results of a calculation, for example, can be displayed on a screen or sent to a printer. Output
devices include:
i. Video Display Unit (VDU): This is the most common output device, also known as the
monitor. Here, information can be shown instantly, and the cost of using the monitor as an input
ii. The Printer: The printer is a very common output device and thus, it’s considered an
14
iii. Laser printer: This is a type of printer that makes use of the toner powder it’s usually
described as page printers. It has a high quality printing ability, and it’s almost completely silent
in operation.
The effective operation of banks is dependent on the efficiently flow of data, both
internally and externally. Accurate, prompt and complete data is essential for quick customer
services and operation of the various banking activities. Bank managers and officers alike, must
dissemination units of banks. This is why banks computerize their operations to enable
value to a bank’s operation, certain data must be available at specific point in time in the banking
cycle. A system of processing data must take the element of time into account. Because, the
accuracy and thoroughness of any effective data-processing is measured in terms of quality and
Banks
There are several facilities needed for the development of an efficient information system
1. Self-service terminal
15
3. On-line network
4. Data base
Self-service terminal (SST) is an electronic device that facilitates a wide range of banking
activities, but doesn’t accept cash deposits. They are accessible, easy to use and more cost-
effective, and helps one avoid long queues. The following transactions can be performed on an
SST.
This is a computerized replacement for the manual cash register. It includes the ability to
record and track customers’ orders, process debit and credit cards and mange inventory. A pos
terminal system for a restaurant, for example, is likely to have all menu items stored in a
16
2.8.4 Database
repository is to maintain data for some set of organizational objectives. Most database systems
are built to retain the data required for the running of the day-to-day activities of an organization.
Hence, in a university, a database system will be needed for such activity as recording the
(a) Data Sharing: Data stored in a database is not usually held solely for the use of one person.
A data base is normally expected to be accessible to more than one authorized persons.
staff.
(b) Data Integration: Shared data brings numerous advantages to the organization. Such
advantages, however, only result if database is treated responsibly. One major responsibility of
(c) Data Integrity: Another responsibility arising as a result of shared data is that a database
should display integrity. In other words, a database should accurately reflect the universe of
(d) Date Security: One of the ways of ensuring data security is by restricting access to the
database. The main way this is done in contemporary database systems is by defining in some
detail a set of authorized users of the database. For instance, a secure system would be one where
the finance department has access to information used for collection of students’ fees, but is
17
2.9 Information System Processing
(a) Batch Processing: With the increase in number of data to be processed, it makes more sense
to gather and store individual data (of the same type) in batches, so that when the data have
accumulated to a certain number, they are sorted and processed at once. The processing time is
predetermined by the designer of the application and depends mainly on the operational role of
the batch within the organization. Processing may be periodically i.e. hourly, weekly, monthly,
Batch processing was the earliest mode used in commercial data processing and it is currently
used in some situations where the transaction data comes on paper such as processing of cheques
Advantage
Disadvantages
1. The gap between data capture and information generation renders this mode of processing
operations or decisions.
2. This mode allows for delay in the operational system, because errors detected after batch
b. Real-time Processing
The expression “real-time” is applied to any system, which produces almost immediate
responses as a result of information input. The essential feature of this information processing is
that the input information is processed quickly enough so that action can then be promptly taken
on the results.
18
Real-time processing forms the basis for a type of information system called ‘Decision
Support System’. This is because the system depends upon immediate access to information
stored in the computer system. In this mode of information processing, a dual-purpose input and
output devices, such as terminals and VDU’s are required. Communication front-end is
Advantages
2. It is often interactive
Disadvantages
1. The systems that operate in real-time are often complicated and relatively expensive: initial
costs include programming, testing higher skilled personnel, file protection, and back-up
equipment.
C. Centralized Processing
Centralized processing is a processing mode that is accomplished either by having all the
computers in the organization in a centralized computer center or by giving one large central
computer, with telecommunications links to other micro-computers at other locations. This mode
resources and duplication of effort, since all data or information are processed at the central point
department.
19
2.10 Prerequisite for the Development of a Computer-Based Management Information
System (MIS).
Good planning is a prerequisite of any business activity, and computer data processing is
significant improvement in management information reporting. All plans should be thorough and
would as much as possible be close to reality. The planning for the introduction of computerized
management information system in the banks requires all level of planning (strategic, tactical and
operational). And should cover all areas of information needs within the bank’s top management:
A. Strategic Planning
This phase would come about as a manifestation of policy decision of the top
management of the bank. The policy should define the long-term objective of the bank, and
The strategic plan would help keep the banks as a going concern and would span over
several years usually between 5 years and 10 years. This phase would consider units and the
entire contribution of computers to the overall corporate objective of the banks, not only in terms
Generally, strategic planning when concluded would satisfy the following needs:
(i) Amplify the objectives and key tasks to be achieved by the computer-based MIS when
introduced.
(ii) Determination of those who would be responsible for the project or random phases of it.
20
B. Tactical
This phase commences after the approval of the recommendations agreed during strategic
planning phase. The tactical phase would consider the earlier various resources on short-term
basis. It is also at this phase that planning is done on how policy decision could actually be
- The organizational structure, the location of the various branches, department and area offices.
- Mainframe computer
- The site(s)
- Software selection
The operating plan covers the day-to-day progress of the project and usually gets time-
scale in terms of weeks or months. The aim of operational planning would be to assess the direct
effect of the strategic and tactical phases on the available resources. The plan would concentrate
on the focal point of all the earlier plans and ensure that hitches at the operational level are
identified and remedial action taken. In the planning of this phase, consideration must be given
to the following:
21
(c) Software (type, source implementation, assuage)
With the satisfaction of these pre-requisites, it becomes relatively easy to implement the
computer-based MIS.
(EDP)
can now look at internal control in a computer-based information system. Internal control is a
sine-qua-non for effective accountability, and with the system being computerized, it stands to
pose new challenges to the operations of the computer system by internal control, we mean not
only internal check and internal audit, but the whole system of control, financial and otherwise,
established by the management in order to carry on the business of the company in an orderly
According to J. Santock (1978, page 11), internal control is an umbrella beneath which
are financial controls, internal check and audit. Spicer and Pegler (1985, pg 102), believe that
where a system is computerized, general controls are needed to ensure proper development and
them from non-EDP systems and which, potentially, can create internal control problems. Some
22
(b) Computer systems are usually highly integrated. This often results in the concentration of
previously separate data processing functions in the EDP department. This development
increases the risk of irregularities within the EDP department as the quality of internal check is
thereby reduced.
(c) In a computer environment, control procedures which were previously exercised clerically
are included in the program logic and are autonomously executed by the computer during
processing. The computer will often not leave any documentary evidence of complying with
these controls. .
It can be seen from the above that while EDP systems offer significance advantages and
advancement on data processing, they are fraught with potential dangers. As a result,
management should, when setting up an EDP system, carefully consider and establish adequate
There should be procedures also to ensure that EDP controls are reviewed regularly for
effectiveness and efficiency. The broad objectives of the controls will include:
(a) To ensure that EDP operations are carried out in an orderly and efficient manner.
(b) To safeguard the EDP facilities including the central processing, the computer files and the
computer peripherals.
(c) To ensure that polices relating to the EDP department are adhered to
23
Division Internal Controls in an EDP Environment:
Organizational Controls
These controls relate to the environment within which application and programs are developed,
a. Hardware.
b. Software.
Administrative Controls
a. Segregation of duties: This implies that the main function in a transaction is carried out by
separate individuals or group of persons. It is aimed at minimizing the risk of errors and fraud
inherent in the system. In an EDP environment, the following control relating to the segregation
1. There should be separation of duties between the user department function and the EDP
function.
24
2. The main functions within the EDP department should be carried out by separate persons. The
functions include: An organizational chart should be prepared and the principal tasks in the
department should be defined and allocated to separate individuals and group of individuals.
The following restrictions should apply within the EDP department whenever practicable:
1. Only the control and data preparation section should have access to the documents
times.
b. Control Over Computer Operators: The computer operators are responsible for operating the
equipment. This should be in accordance with operating rules of the enterprise. The work of
(a) Setting up the equipment for each run (i.e. loading the input devices, setting up the magnetic
storage devices and loading the correct stationery into the printer);
To ensure that the computer is used for bona fide businesses only.
c. File Control: Modern computer files are maintained in a magnetic backing storage device
such as magnetic tapes and disks. In view of the large number of records and programs held on
25
magnetic backing storage devices in most EDP systems, it is necessary to provide adequate
That files can be reconstructed if they are lost or their content are corrupt.
Maintaining computer files and programs in a secure manner, for example, by the use of locks
and keys.
Maintaining computer files and programs under a conducive atmospheric condition. For
example, the file library should be properly air-conditioned, equipped with smoke and dust
The computer system, being an electronic device, though very intelligent, relies upon
data input and stored in it to produce relevant and incisive information. Hence, the slogan
“Garbage in, Garbage out”. In essence, the computer is not in a position to detect whether the
data it receives is fraudulent or not. As a result, dubious staff of banks capitalize on this
weakness of the computer system to defraud their organization and cause them to lose a lot of
money.
Another disadvantage is that, once an unauthorized access is gained to the database all
that is required is a single command to debit all account or a particular account, and fraudulently
withdraw the money. To preclude the occurrence of fraud, banks will need to set up a high
standard internal control mechanism, which will be proficient in detecting and preventing fraud.
26
Measures to Adopt in Checkmating Computer in Banks
In this aspect, no one person should be in charge of a particular process. That is, where
one person’s duty ends, the other’s duty begins. This menace can be curtailed if the management
strives:
a) To ensure that the computer is used for bona fide businesses only.
This problem could be seen from the history of the united bank for Africa plc, which,
over its many years of experience, has changed from centralized system prior to 1970 to Branch
accounting system in the mid-1970s, with its concentrations of information system at it head
office, from where printout and the information output are produced and distributed to its various
branches in a centralized manner. Subsequently, UBA Plc started to decentralize its operations
on a stand-alone basis in 1986 . In 1992, the bank started full computerization of its branch
network, making each branch to be fully on-line and independent of both the Head Office and
other branches, in the generation and processing of data, based on “Branch Accounting
Information System (BRAINS) software. The bank has also made inter-branch communication
very easy through its “very small Aperture Terminal” (VSAT) satellite. This is the means
27
through which customers can transact businesses with branches other than that where they
According to Rob Kling (1996), “when specialists discuss computerization and work,
they often appeal to a strong implicit image about the transformation of work in the last one
hundred years, and the role that technologies have played in some of those changes. In the
nineteenth-century North America, there was a major shift from farms to the offices as the
primary workplaces. Those shifts often associated with the industrial revolution-continued well
into the early twentieth century. Industrial technologies such as the steam engine played a key
Our twentieth-century economy has been marked by the rise of human service jobs, in
area such as banking, insurance, travel, education, and health. And many of the earliest
commercial computer system were bought by large service organization such as banks and
insurance companies. By some estimates, the finance industries bought about 30% of the
computer hardware in the United States in 1980s. During the last three decades, computer use
has spread to virtually every kind of workplace, although large firms are still the dominant
investors in computer-based system. Since offices are the predominant site of computerization, it
is helpful to focus on offices in examining the role that these systems play in altering work.
In the early twentieth century, the technologies and organization of office work
underwent substantial change. Firms began to adopt telephones and typewriters, both of which
had been recently invented. By the 1930s and 1940s, many manufacturers devised
electromechanical machines to help manipulate, sort, and tally specialized paper records
automatically. Some of the more expensive pieces of equipment, such as specialized card-
28
accounting machines, were much more affordable and justifiable in organizations that centralized
29
CHAPTER THREE
RESEARCH METHODOLOGY
This chapter presents method and procedure used in carrying out the study under the
following sub-headings: research design, population of the design, sample size and sampling
techniques, research instrument, method of data collection, and method of data analysis.
The researcher made use of field study or survey approach. This was based on the use of
personal interview and administration of questionnaire. The questionnaire was designed in such a
way that it contained a blend of fixed alternative questions which were meant to limit the
responses of respondents to stated alternative and open- ended questions which offered the
The questionnaire consists of three parts. The first part contained background
acceptability to the entire staff and management of Zenith Bank Plc. The second part comprised
questions which helped to find out the application and usage of computer including types and
The third part generally tries to find out the positive impact of computer application on
the selected bank and short-comings of computerization as well. Personal interview were used
mainly where the questions are of such technical nature that only a specialist could deal with.
This helped the researcher in his search for objectivity and increased validity of his findings and
conclusion.
30
The researcher considered a judicious mix of personal interview, free response questions
and fixed alternative questions more desirable in producing a thorough description of the other
computerization on the Nigerian banking industry. And, in an attempt to do this effectively, the
population of this study is Zenith Bank and the total number of staff in Zenith Bank Plc.
Potiskum Branch are forty staff (60 staff), which he believes will be representative of the
Nigerian banking industry. The sample was selected bearing in mind how unwieldy it will be to
study the entire Nigerian banking industry, and the need to come out with a reliable research
finding.
The sample size contained fifty (40) staff selected from the entire population using
Random Sampling Techniques in which each member has an equal opportunity of being chosen.
study. The questionnaire was designed to elicit information on the assessment of the impact of
computerization on the Productivity of Nigerian banking industry in Zenith Bank Plc Potiskum
Branch, using the five Likert Rating scale of Agreed (A), Strongly Agreed (SA), Disagreed (D),
The researcher collected the necessary data by personally administering the questionnaire
prepare for this purpose, on the respondent. The researcher also interviewed some members of
31
staff of the bank (mostly top and technical officers) on some important issues. In all, the
researcher administered thirty four questionnaires to the bank and respondents were given two
working days to read and fill them. At the end of the period, the researcher went personally to
collect the completed questionnaire. Therefore, the researcher tested the completed questionnaire
The procedures for data analysis utilized by the researcher include the following:
(1). Placing each items in its appropriate category reflective of the hypothesis to be tested.
(3). Performing Statistical Computation: The statistical computations used by the researcher
included percentage analysis and empirical test of general characteristics of the respondents.
Also, the responses to key questions and statements in the questionnaire will be analyzed using
32
CHAPTER FOUR
form.
Findings: This show indicates that majority of the respondents are male.
33
The above table shows that 15 (37.5%) of the respondents are Degree holders, while 13
respondents representing (32.5%) have Masters, 07 (17.5%) are PhD holders, and finally 05
Findings: This show indicates that majority of the respondents are degree holders.
15% of the respondents are single which constitute minority of the respondents.
Findings: This show indicates that majority of the respondents are married.
TOTAL 40 100
Source: Fieldwork (2022)
From the table 4.1 above, a total of 40 questionnaires were administered. A total of 34
which represents 42.5% of the total questionnaires administered were returned. Only 6 which
34
Table 4.1.5: Department of Respondents
From the table 4.2 above, 15 respondents representing 37.5% work in the computer
department of the bank. While 14 respondents representing 35% work in the Account
department. And, 11 of the respondents representing 27.5% work in the Marketing department.
The analysis of the tables of this section shows the respondent or option of respondent
based on the question contained in the questionnaire as an instrument used by the researcher.
50% strongly agreed, and another 5 numbers of respondents (12.5%) agreed with the same
35
opinion. While 5 respondents (12.5%) strongly disagreed, and 5 respondents (12.5%) disagreed,
Findings: This show indicates that majority of the respondents are strongly agreed.
Table 4.2.2: Evaluation of whether Computerization has Brought Efficient Service Delivery in
the Bank
The above table shows that majority of respondents 12 in number with a response rate of
30% strongly agreed, and another 10 numbers of respondents agreed with the same opinion.
While 6 respondents (15%) strongly disagreed and 8 respondents (20%) disagreed, as none of
Findings: This show indicates that majority of the respondents are agreed.
Table 4.2.3: Evaluation of Whether Computerization Can Lead to Job-Loss in the Bank
36
The above table shows that majority of respondents 14 in number with a response rate of
35% strongly agreed, and another 8 numbers of respondents agreed with the same opinion.
While 7 respondents (17.5%) strongly disagreed and 6 respondents (15%) disagreed, as none
Findings: This show indicates that majority of the respondents are strongly agreed.
Table 4.2.4: Evaluation Of Whether Computerization Has Increased The Incidence Of Fraud In
The Bank.
The above table shows that majority of respondents 20 in number with a response rate of
50% strongly agreed, and another 10 numbers of respondents (25%) agreed with the same
opinion. While 5 respondents (10%) strongly disagreed, and 1 respondent (12.5%) disagreed,
Findings: This show indicates that majority of the respondents are strongly agreed.
Table 4.2.5: Evaluation of the Effect Of computerization on the Bank’s Internal Control System
37
From the table 4.7 above, 33 respondents representing 97.06% agreed that
computerization has had a positive effect on the bank’s internal control system. While 1
respondent representing 2.94% of the respondents was of the opinion that computerization has
had a negative effect on the bank’s internal control system. This means that computerization has
Table 4.2.6 Evaluation of Whether the Staffing of the Bank’s Computer Department is Adequate
The above table shows that majority of respondents 15 in number with a response rate of
37.5% strongly agreed, and another 10 numbers of respondents (25%) agreed with the same
Findings: This show indicates that majority of the respondents are strongly agreed
38
Table 4.2.7: Evaluation Of Whether The Computer Hardware And Software Of The Bank Is
Reliable.
The above table shows that majority of respondents 20 in number with a response rate of
50% strongly agreed, and another 10 numbers of respondents (25%) agreed with the same
Findings: This show indicates that majority of the respondents are strongly agreed.
The above table shows that majority of respondents 20 in number with a response rate of
50% strongly agreed, and another 10 numbers of respondents (25%) agreed with the same
39
opinion. While 5 respondents (12.5%) strongly disagreed, and 3 respondents (7.5%)
Findings: This show indicates that majority of the respondents are strongly agreed.
banking Industry in Zenith Bank Branch, Potiskum. Fouty (40) questionnaires were retrieved
The Bank need to prepare workshop for staff to learn how to handle such kind of
of computerization the researcher come out with the following findings: The majority of
40
CHAPTER FIVE
5.1 Summary
The research was focused on the effect of computerization on the Nigerian banking
industry, with particular interest in the Zenith Bank Plc, which is considered representative of the
In order to make an informed inference, on the study, various relevant literatures were
consulted and field study carried out to obtain relevant data. The data collected were analyzed
and various hypotheses formulated were subjected to test and verification. The study revealed the
following:
2. Computerization fully and effective supports the operation of the Zenith Bank Plc, and
3. The study revealed that a good percentage of the staff of Zenith Bank Plc is computer
4. The staff appreciates computerization and see computer as a device meant to assist them
in carrying out their job effectively, as against seeing it as a replacement for manpower.
5. Computerization is fully embraced by the entire staff and management of the bank.
6. The study revealed that the bank uses on-line and real-time instead of batch processing.
7. The computer hardware and software being used by the bank are highly reliable.
8. The study revealed that the computer department of the bank requires further staffing.
9. The level of training given to computer users and operators is just adequate with equal
41
10. The respondents were fully of the opinion that computerization has greatly improved
11. With computerization, the services of the bank have been quite timely, efficient and
effective.
12. The study revealed that internal control has not been negatively affected by
computerization.
13. The study revealed that computerization has greatly reduced the incidence of fraud in the
bank.
14. The respondents want computerization encouraged in the Nigerian banking industry.
15. The study revealed that the major set-back of computerization is the heavy cost
implication of the process, and the need for adequate and continuous training of staff
16. Computerization has reduced the transaction-processing time in the Nigerian banking
industry.
5.2 Conclusion
The introduction of computers into the Nigerian banking industry, though spanning over
a relatively short period of time have had a great and beneficial impact on the industry.
Transactions now take very short time to be processed, customers’ expectations are being met,
and volume of business transaction has increased tremendously, both for the banks and its
customers.
Considering the above positive scenario, the researcher is of the opinion that
computerization should be encouraged and advises that banks go the computer way. Government
42
should monitor development in the industry to avoid dumping of outdated computers in the
banking industry.
Furthermore, the researcher is of the opinion that further researcher work should be encouraged
in this direction using the work already done as a basis and a guide.
5.3 Recommendations
Having carried out the research on the effect of computerization on the Nigerian banking
i. Banks should embrace computerization fully, considering the immense benefits that
ii. Banks should study extensively the systems available before choosing the one to adopt in
order to avoid the huge cost implication of changing from one computerization system to
another.
iii. Banks should map out a good training program for their staff to help them keep abreast of
iv. Banks should ensure availability of trained personnel to man their computer departments.
v. Banks should ensure adequate back-up procedures as regards the availability of computer
43
REFERENCES
Dixon-Ogbechi,B.N (2002), Research Methods and Elementary Statistics in Practice, Lagos: Phil
Glad Nigeria Ltd (Page 180-181).
Edward ,Amoroso (1994), Fundamentals of Computer Security Technology, New Jersey:
Prentice- Hall PTR (Page 1-8).
Edward, Amoroso (1994), Fundamentals of computer security technology security, New Jersey:
prentice-hall ptr (page1-8).
Olowe, R.A (2008), Financial Management Concepts, Financial Systems and Business Finance
Lagos: Bierly Jones Nig. Ltd (Page 22-26)
Olusanya, T (2001), Auditing and investigation, Lagos: Negro ltd (172-201).
Omilo, A (1996), computer skills at a glance, Lagos: Phil glad publishing.
Oxford Advanced Learners’ Dictionary
Oxford English dictionary, (sixth edition).
Paul, b. (1996), database systems, London: Macmillan press ltd (page11-15)
Rob, Kling (1994), Computerization and Controversy, California: Academic Press (Page 278-
280)
Rob, Kling (1994), computerization and controversy, California: academic press. (Page278-302).
44
APPENDIX I
titled “Effect of Computerization on the Nigerian Banking Industry in Zenith Bank Branch Plc
Potiskum LGA”.
I hereby solicit for your cooperation in responding to the questionnaire by simply ticking
All the information given will be treated with confidentiality and used for the purpose of
Thanks you.
Yours Faithfully
45
APPENDIX II
QUESTIONNAIRE
SECTION A
Personal Data
1. GENDER
Male ( ) Female( )
2. EDUCATIONAL BACKGROUND
Professor ( )
3. MARITAL STATUS
Married ( ) Single ( )
SECTION B
Strongly Agreed ( )
Agreed ( )
Strongly Disagreed ( )
Disagreed ( )
Undecided ( )
the Bank
Strongly Agreed ( )
Agreed ( )
46
Strongly Disagreed ( )
Disagreed ( )
Undecided ( )
Strongly Agreed ( )
Agreed ( )
Strongly Disagreed ( )
Disagreed ( )
Undecided ( )
The Bank.
Strongly Agreed ( )
Agreed ( )
Strongly Disagreed ( )
Disagreed ( )
Undecided ( )
Strongly Agreed ( )
Agreed ( )
Strongly Disagreed ( )
Disagreed ( )
Undecided ( )
47
6. Evaluation of Whether the Staffing of the Bank’s Computer Department is
Adequate
Strongly Agreed ( )
Agreed ( )
Strongly Disagreed ( )
Disagreed ( )
Undecided ( )
Reliable.
Strongly Agreed ( )
Agreed ( )
Strongly Disagreed ( )
Disagreed ( )
Undecided ( )
Strongly Agreed ( )
Agreed ( )
Strongly Disagreed ( )
Disagreed ( )
Undecided ( )
48