The Role of Information Communication Technology (Ict) In the Management of Schools: A Case Study of Primary and Secondary Schools in the Zimbabwean Harare Province (2006)
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 5
Abstract
Abstract: The study covered schools in the province of Harare. A representative stratified sample was carried out in coming up with the number of both the primary and secondary schools. Ninety-four schools were sampledand this represented one third of all Harare schools. These comprised of 18 government secondary schools, eight non-government secondary schools, 36 government primary schools, and 32 non-government primary schools. A quantitative methodology was employed. The main instrument used was a questionnaire and telephone interview was used to follow-up and clarify unclear issues. The heads of schools were used as the research subjects. The study showed that ICT played an important role in the management of schools and this was supported by literature. It showed that 86% of the schools had office computers and 26% had Internet connections. Business software, PASTEL and PAYPLUS, were used by only one school. Many advantages likedata storage and speedy document processing were being experienced in the use of ICT although there were problems and challenges such as high inflation, material shortages, skilled manpower shortages and insufficientfunds. The education ministry had a challenge of connecting the schools to its offices although many schools had office computers. The study recommended that the Ministry should connect school business systems to itsown system. The Ministry could make use of existing facilities to improve communication between different education structures. Further research was recommended to assess the effects of ICT on e-learning
Authors and Affiliations
Dr Farai Choga
Pi-calculus based Bayesian Trust Web Service Composition
Abstract : To enhance the reliability of trust Web service composition, Pi-calculus based formal verification of trust Web service composition is proposed. Bayesian trust Web service composition is firstly defined abstra...
Auto Secured Text Monitor in Natural Scene Images
Abstract: Monitoring the text in content based images is an important task. An accurate and robust method to monitor texts in natural scene images. In this paper fast and effective decision tree algorithm (MSERs) is used...
Fuzzy Querying Based on Relational Database
The traditional query in relational database is unable to satisfy the needs for dealing with fuzzy linguistic values. In this paper, a new data query technique composed of fuzzy theory and MS-SQL is provided. &nb...
Evolution of Sha-176 Algorithm
To maintain data integrity hash functions are generally used. Hash function is one type of cryptographic primitives, which provide an assurance for data integrity. NAS has designed SHA hash functions which are th...
MAC Protocols: A Review
Mobile adhoc networks (MANETS) are infrastructureless networks which uses radio signals, to establish communication among mobile nodes. MANET media is open shared media, multiple mobile nodes may access the...