internship report sample

47
MAKERERE UNIVERSITY COLLEGE OF COMPUTING AND INFORMATION SCIENCES SCHOOL OF COMPUTING AND INFORMATICS TECHNOLOGY FIELD ATTACHMENT 2015 REPORT BY: …………………………………. ……………………………………………………………. REGISTRATION NUMBER: …………………………………………………………………... STUDENT NUMBER:…………………………………………………………………………… Email: ……………………………………………………………………………………………... PLACE OF TRAINING:…………………………………………………………………………. SUBMITTED IN PARTIAL FULFILMENT FOR THE AWARD OF BACHELORS DEGREE IN COMPUTER SCIENCE OF MAKERERE UNIVERSITY, KAMPALA AUGUST, 2015

description

Simple description on what to put in a report

Transcript of internship report sample

MAKERERE UNIVERSITY

MAKERERE UNIVERSITYCOLLEGE OF COMPUTING AND INFORMATION SCIENCESSCHOOL OF COMPUTING AND INFORMATICS TECHNOLOGY

FIELD ATTACHMENT 2015 REPORT BY: . .REGISTRATION NUMBER: ...STUDENT NUMBER:Email: ...PLACE OF TRAINING:.SUBMITTED IN PARTIAL FULFILMENT FOR THE AWARD OF BACHELORS DEGREE IN COMPUTER SCIENCE OF MAKERERE UNIVERSITY, KAMPALA AUGUST, 2015

Academic Supervisor:.DECLARATION;I hereby declare to the best of my knowledge that this report is as a result of the training activities and knowledge I have acquired from my place of attachment and that all the content of this report is my own original piece and it has never been submitted to any other institution or department for any academic award.

Student name Signature Date........ APPROVAL

The report has been submitted for examination to the department of Computer Science under the School of Computing and Informatics Technology Makerere University, with approval of my field supervisor.Signature

NAME..FIELD SUPERVISOR

DATE

..

DEDICATIONI dedicate the success of this work to my parents who have supported me materially, financially and spiritually throughout my course and my entire life. To my friends and coursemates for their constant support academically, spiritually, socially and psychologically.ACKNOWLEDGEMENTI thank the almighty God for giving me the strength to work and acquire more knowledge at . He has given me life and the courage acquire several skills.

I also appreciate the tremendous and selfless assistance from my field supervisor ........I convey my heartfelt appreciation for the advice and corrections from the beginning of this industrial training to the end. I really appreciate all his efforts throughout my training. I wish to thank in a special way my academic supervisor . for his inspiration and encouragement. I also thank my fellow workmates who have tirelessly assisted me in understanding my course more and successfully building it up. I cannot forget my entire family for the moral, physical and financial support offered during the course of this study. I can not forget to thank the School of Computing and Informatics Technology for granting me such a wonder moment to train at one of their highly trained I highly acknowledge the services rendered by my field supervisors colleague. I thank Mr. Mr .... and for the great work done. They have really enabled me gain more practical skills under the Computing and IT field.ABSTRACTInternship is a period of time during which a student gets practical experience in his or her career. The School of Computing and Informatics Technology on award of the Bachelors degree of Computer Science in Makerere University requires second year students at the end of academic year to undertake industrial training .This training is intended for acquisition of more practical skills and knowledge to the students.

This report includes all activities I carried out during the entire training at the CoCIS Makerere and these include installing operating system, Computer Hardware and maintenance, setting up a network ,routing ,switching, wireless networks, cable termination, server management applying system updates, web hosting, file sharing, resource sharing ,network trouble shooting and server services.This report shows the experiences that I have gained in my training and also shows the challenges that I have encountered during the course of my training.It also gives the conclusion and also recommendation to School of Computing and Informatics Technology, references for the Organization at which I undertook my training in compiling this report and a list of appendices page.

The activities that I have written in this report have enabled me to acquire more practical skills, having more experience, confidence, professional skills and competence in my career field.On addition to the training, I have learnt team work, time management, patience, working without supervision and all those have changed me positively. The purpose of the field attachment was to enable interns gain more knowledge and acquire practical skills.LIST OF ACRONYMS

IT- Information Technology

CoCIS- College of Computing and Information Sciences CIT- School of Computing and Informatics Technology

OS- Operating system

IDE- Integrated Drive Electronics

RAM- Random Access Memory

CD- Compact Disk

CPU-central processing unit

RJ- Registered Jack

IP- Internet Protocol

WAP -wireless access point BIOS- Basic Input Output SystemLAN-Local Area NetworkTABLE OF CONTENTSiDECLARATION;

iiAPPROVAL

iiiDEDICATION

ivACKNOWLEDGEMENT

vABSTRACT

viLIST OF ACRONYMS

viiTABLE OF CONTENTS

1CHAPTER ONE

11.0Background

11.1Introduction

11.2Profile of CoCIS Makerere

2Vision statement:

2To be leaders in computing and ICT training research and service internationally.

2Mission statenent:

2Values statement:

7Field attachment activities

72.0 COMPUTER HARDWARE AND MAINTENANCE

7Power supply:

102.1 NETWORKING

173.1.1 Challenges encountered during the training

18CHAPTER FOUR

184.1.0 Conclusions.

184.1.1 Recommendations

20APPENDICES

24Appendix 7: Internship schedule

CHAPTER ONE1.0Background Industrial training is a period of time during where a student or a new graduate gets practical experience in a job. The training exposes the interns to working environments and gives them a chance to acquire more skills to be employed in the practical and competitive world. Industrial training should thus be undertaken by student to enhance their practicability at work. 1.1IntroductionThis report involves activities during my industrial training at CoCIS Makerere. It contains activities conducted during my stay and work at the organization. These activities among others include cable termination, server management, applying system updates, file sharing, resource sharing, network trouble shooting and server services. 1.2Profile of CoCIS MakerereThe College of Computing and Information Sciences Makerere University was opened on 13th December 2010. It is made up of the School of Computing and Informatics Technology and the East African School of Library and Information Science (EASLIS). COCIS is one of the largest computing and ICT training, , research, information science and consultancy colleges in Africa has maintained its place as a recognized institute worldwide. It is committed to delivering standard services under Computing, Library, Records and Information Sciences and attracts both local and international students. COCIS boasts of the state of the art infrastructure including lecture theaters, giant computer laboratories, specialized computer laboratories and a college library. Its three buildings can accommodate over 10,000 students in one sitting.The established academic staff strength of the College is about 300 teaching staff including 30 visiting and local professors. Over twenty of these staff members hold doctorate, with many others in advanced stages of completing their PhD studies.Formation of the College of Computing and Information Science is based on the criteria of relatedness, compatibility, interdisciplinary, capacity to form a viable college, synergy in mission and objectives, potential for modularization and baseline resources (number of students, programmes, academic staff, space, library and computing facilities) and other capacity indicators considered by the National Council for Higher education (NCHE).This merger has seen a pool of resources and facilities like computer laboratories, specialized laboratories, book libraries, journals, cameras, and personnel both administrative and academic staff.The college is an active centre for Research and Outreach. It produces a journal, the International Journal of Computing and ICT Research (IJCIR). It also hosts an annual international conference, the International Conference on Computing and ICT Research (ICCIR). The College is interested in in-depth research in the areas of Machine learning, Security, ICT for development, Model and web based systems, E-Learning, Mobile computing and Communication, Documentary Heritage , Records Management Education, Information Policy and Publishing, Knowledge Management, ICTs for Libraries and LIS Curriculum.The College of Computing and Information Sciences is poised to continue being a modal college in Makerere University and the region, by providing first class teaching, learning and research that directly answers to both local and international demandsVision statement:To be leaders in computing and ICT training research and service internationally.Mission statenent:To provide first class teaching reach and services in computing and ICT responsive to national and international needs.Values statement:The college of computing and information technology is an innovative and industry oriented college, persuing excellence, teaching, learning, writing edge value added research and consultancy, community outreach as well as providing a vibrant student life1.3 ProjectsThe Department of Innovations and Software Development has a core team of full-time employees who have considerable experience in their relevant areas and carry out extensive software development activities in accordance with detailed business designs and plans.

Some of the Projects currently undertaken are: Students' Exam Grading, Epi Handy, Ossis, Online Student's Course Selection, Students Results Management System, MobileHRS, Epi Handy Mobile, HEITML, OMEVAC, OpenMRS, etc.1.3.1 Internal Projects

1. Students Exam GradingA simple application that exports two best done course marks and the exam mark from each Lecturer's file to a single Excel file, calculates the Grade Point Average for each semester, Cumulative G.P.A to present time and comments on students grades.

2. MOBILEHRS

This is a collection of components, which enable data collection and analysis for Iganga DSS site. The data can also be collected using PDAs where MobileHRS uses an EpiHandy module.

3. STUDENTS OSSISThis is an Open Source School Information System for managing Secondary and Primary Schools by enabling efficient storage of student and staff records for quick and easy retrieval, together with automating tasks like report card and teaching time table making, and more.

4. ONLINE STUDENTS COURSE SELECTION

A web-based application used by College of Computing and Information Sciences undergraduate students to choose Elective courses they wish to undertake for each semester. They also get to review previous courses completed, which will help the administrators find loopholes in a specific course. It assists lecturers of elective courses to plan in advance according to the number of students that have registered for their course unit. The administration can also post student results online so that the students can have easy access to their results.

5. STUDENTS RESULT MANAGEMENT SYSTEM

This is for CoCIS students results processing. The CoCIS Software Developers, Department of Innovations and Software Development are currently working on a much more powerful and dynamic system to support lecturers and students.6. ELECTRONICS VOTING SYSTEM

1.3.2 External Projects

7. MOBILEHRSA mobile client for data collection tool for DSS (Demographic Surveillance) sites running on PDA (Personal Digital Assistant) with Windows CE specifically for household information. It is based on epihandy forms engine. It synchronizes data to the HRS server. Makerere University College of Computing and Information Sciences in conjunction with the University of Bergen, Norway and University of Southern Maine, USA provide software development assistance on this project. 8. EPIHANDY MOBILE.

It is a generic data collection tool for mobile phones. It utilizes the new mobile technology to improve data collection and handling processes. It is a new solution that revolutionizes the way in which surveys and data collection is done in Health and development research. Makerere University College of Computing and Information Sciences in conjunction with the University of Bergen, Norway provides software development services to extend the tool.

9. HEITML (On-going) It is a framework for developing web application. Makerere University College of Computing and Information Sciences represents that it has expertise in the area of web application development with heitml and javaScript, and is able to provide original software development assistance to HEI InformationSsysteme GmbH, Germany. 10. OMEVAC (On-going)A proposal titled 'OMEVAC (Open Mobile Electronic Vaccine Trials)', an interdisciplinary project to improve quality of vaccine trials in low-resource settings was accepted for funding. The project Primary objective is to develop OMEVAC, a complete secure, mobile and electronic system for data collection and management in vaccine trials, from source to publication and using and complying to international standards and requirements.

11. OpenMRS (On-going)This is a free opensource clinical data collection system. CoCIS has carried out the pilot implementation of it at Mbarara, Masaka and Mbale hospitals. CoCIS is also actively involved in developing additional modules for that.

1.4 PHEA Projects and GrantsCIT staff members won two competitive research grants in May 2007 from the Partnership for Higher Education in Africa (PHEA). These include:

a. The project Survey Data Collection Using Mobile Phones by Mr. P. Bagyenda involves carrying out research on how mobile phones can be used to collect information that is vital in Health management in the African/rural setting. With mobile phones fast becoming the most immediately accessible ICT device as a result of the benefits and convenience they offer at low cost. By leveraging the accessibility and low-cost of mobile phones and the benefits of electronic data collection, efficiencies can be derived. With the grant from PHEA, researchers are able use mobile phones for data collection. This project is on-going.

b. Another project by Prof. H.N. Muyingi Low-class Communities Income-generating e-business: Outreach Action-driven e-business for Rural and Art-craft Women Communities, also received a grant from PHEA. The main objective of this project is to harness ICT as a driver of socio-economic development within low-income communities in Uganda by collaboratively helping to increase the income generation of participating groups of women selling African artifacts and cultural goods around Kampala and organized in cooperative or small or medium enterprises (SMEs), by use of appropriate web technologies.

Furthermore, this project will allow rural communities to have access to cash money from any mobile telecommunication end-point service providers (TESP) in their immediate

1.5The CoCIS Makerere Structure The College comprise of two schools that is School of Computing and Informatics Technology (CIT) and East African School of Library and Information Science (EASLIS). The College is managed by an administrative team led by a College Principal. Each School is headed by a Dean. The School of Computing and Informatics Technology (CIT) has four academic departments and the East African School of Library and Information Science (EASLIS) has two academic departments. The College has an academic staff establishment of about 330 members.

College of Computing and Information Sciences(CoCIS)

School of Computing and Informatics TechnologyE.A School of Library and Information Sciences

Department of Computer scienceDepartment of Information TechnologyDepartment of Records and Arcives ManagementDepartment of Library and information sciences

Department of Information SystemsDepartment of NetworksCentre for Professional Skills Development

Tele-Education Centre

CHAPTER TWO

Field attachment activitiesThis chapter consists of the various activities undertaken during the course of the industrial trainingThe activities carried out were; Computer Hardware and maintenance, Networking, Server management, Software installation and Server Management.2.0 COMPUTER HARDWARE AND MAINTENANCEComputer hardware is defined as the physical components attached to the computer to enhance its functionality.The training began by identifying the different hardware components attached to the computer. I was able to disassemble the System unit and the following are some of the components I found in it; mother, board Central processing unit (CPU), connectors, c-mos Battery, power supply, RAM Chips, hard disk, heat sink among the others.Power supply: I learnt that a power supply is a device that supplies current to the motherboard or power supply unit normally refered to as PSU. It has a power supply slot and cables that are used to disseminate power to other parts of the motherboard.Motherboard:A motherboard is the central printed circuit board (PCB) in many modern computers and it holds many of the crucial components of the system. The motherboard is also known as the main board or the system board and it also provides connectors for other peripherals. Processor:

The CPU is secured to the socket on the motherboard with a locking assembly.

I learnt that the northern bridge has RAM slots and then the southern bridge having expansion slots.On addition to the processor, motherboard and the power supply, I looked at the different ROM drives among which we have the CDROM, CDW, DVDROM, DVDRW and then the FLOOPY DRIVE. system unit. Motherboard

DVD-ROM ram chips hard disk processor power supplyI learnt more about the IDE connectors, SATA and the jumpers.I learnt how to come up with a master and slave hard disk. The hard disk with a jumper becomes the master and the one without the jumper becomes the slave.Random-access memory (RAM): It provides temporary data storage for the CPU while the computer is operating.

The various types of the random access memory which I learnt about are SDR and DDR.SDRAM refering to Synchronous Dynamic Random Access Memory and DDR standing for Double Data Rate. I learnt that DDR perfoms better work than SDR and the difference between DDR and SDR is that the DDR has one notch and SDR has two notches. I learned how to identify a computer with no RAM or when the chip is not fixed properly and that is according to the beep codes generated when rebooting.2.0.1 Troubleshooting a computer with faulty RAM: I learnt how to troubleshoot a computer with faulty RAM and the steps involve shutting down the computer, disconnecting the power, opening the system Unit and removing the RAM chip(s), testing the RAM chip in a working computer if it doesnt work then exchange with a working RAM, ensuring that the chip(s) are fixed properly then closing the System Unit and powering the computer again.2.0.2 Software installation:Installation of Windows XP Operating system:These are the procedures I learnt on how to install windows XP operating system.

The computer should be capable of booting from the CD-ROM drive since the windows XP CDs are bootable.

Switch on the computer and insert the XP CD in the CD-ROM.

Boot from CD-ROM. Choose whether you want to install windows XP or repair the existing one. In our case of installing a fresh copy of XP, press enter key and the installation begins. Accept the user license agreement and failure to accept with the license agreement installation can not proceed.

The next screen displays the available partitions from which the operating system can be installed and prompts to select the partition you want are available. Press enter key to move to the next screen to select a file system.

There are two file systems available and those are the File Allocation Table 32 (FAT32) and New Technology File System (NTFS) being the best since it allows security features and stability that are not possible with FAT32.You then select the file system and press F10 key to run. Installation will continue until you reach another reboot. The process proceeds for 39 minutes.

Follow all the steps prompted and those are basically settings.Activate the software and enter your preferred username. 2.1 NETWORKING

Networking refers to the exchange of information or services among individual, groups or institutions over a given network. Networks are systems that are formed by links. I learnt the different different classes and the different types of modes and their respective signs. The modes were as follows; configuration/Global mode switch (config)#

User mode switch >

Privilege mode switch#

I learnt some of the commands used when working under the above modes.

Under the User mode, we have commands like:-

ipconfig :- for showing the ip address of the computer in use.

show :- for showing the commands used so far.

ping :- for pinging a given ip address.

Other commands were nslookup, trace route among the others.Under the Privilege mode, we have commands like;

ping, trace route, copy run start, delete flash, show commands.

I learnt Cable termination. This involves coming up with the different types of cables considering the two standards used namely Standard A and B. The cables terminated were the Straight through, the console or roll-over and the Cross over cablesa) Straight through connects unlike devices and it has standard A on both sides. b) Cross over connects like devices and it has standard A on one side and standard B on the other side. c) Rollover for management configuration of network cables. An example could be configuration of a switch and router.d) The Serial cable which connects one network with the other. The color codes for each standard are as follows:-Standard A: White Green, Green, White Orange, Blue, White Blue, Orange, White brown, Brown respectively.Standard B: White Orange, Orange, White Green, Blue, White blue, Green, White Brown, Brown respectively. The classes that are used under networking are A, B, C, D and class E.

2.1.0 Class A addresses are specified to networks with large number of total hosts. It also ranges between 1 - 106 and its first octet is for the network ID and the next three octets reserved for the host.2.1.1 Class B addresses are specified to medium sized of networks. Ranges between 107 191 and its first two octets for the network ID and the last two reserved for the host.2.1.2 Class C addresses are used in small area networks. It ranges between 192 223 and uses the first three octets for networks ID and the forth one for the host.2.1.3 Class D is used for multicasting and that refers to the sending of a group of messages to various people. It ranges between 224 239. 2.1.4 Class E being reserved for scientific research and ranges between 240 255.Each class has four octets and that is thirty two bits for every class.I also learnt the types of addresses and they include private and public.Public addresses are bought from the Internet Assigned Number Authority (IANA) and that is the body for assigning addresses whereas Private addresses are assigned freely and do not collide.

I also learnt how to subnet, how to come up with a network topology and learnt the various routing protocols which are as follows:-

2.1.5 Routing Protocols Routing Information Protocol (RIP): It has version 1 and 2

Open Shortest Path Fast (OSPF): It is another routing protocol and the last one being EIGRP. Those are the three routing protocols configured under routing. I was also able to learn the DHCP and DNS configurations.2.1.6 Switching:

I learnt how to assign VLANs in a given network, the three categories of Access List Control namely: Standard Access Control List which is configured closest to where traffic is heading. Extended Access Control List which is configured closest to the destination.

Named Access Control List which is another type of access control. Access control involves denying a given computing device from reaching or accessing the other for example a denying a computer from accessing a given router.

I learnt how to one can access the others computer in the same LAN provided his ip address.

I was able to run commands under the windows prompt terminal and among the others were the ping command that can enable one to access the others computer given his ip address. An example could be ping 192.168.1.1. It can also be used to ping a given website when the packets of data being sent are low that is to say when the web browser takes long to respond. One can type ping cisco.com under that terminal so as to increase the packets being sent.

2.2 SERVER MANAGEMENTA server is a computing device that responds to client requests. We learnt the various types of servers that is to say database servers, mail servers application servers, web servers, among others.

2.2.0 Windows Server 2003

We installed windows server 2003 and Ubuntu Linux server.

We installed DNS and DHCP servers and I learnt how to configure them, assigning rights to the various hosts.We assigned computers in a workgroup and in a domain, configured DHCP and DNS on the Windows Server.

I learnt how to create several user accounts under Windows and Linux operating systems.

2.2.1 Server services We were introduced to server services under Windows and Linux .The services include network services, web application services, database application services. Installed dns and bind9 in linux and learnt shell scripting. CHAPTER THREE 3.1 Emerging issues and experiences3.1.0 Experiences /Emerging Issues:This chapter covers the discussion of experiences and challenges I encountered during the industrial training. I was able to gain experiences in various fields. I learnt through the full commitment and involvement as well as with supervision. It emerged that I had the theoretical knowledge more than the practical and I had to concentrate on hands in training which led to my perfection. Practically, I learnt how to fix RAM chips, the processors, the CMOS battery and other hardware components onto the motherboard. I learnt how to replace faulty hard disks, installing an operating system and that is Windows and Linux. I learnt how to repair and update several operating systems which included windows XP professional and Linux operating systems. I learnt how to configure printers and enable people to share a printer and documents.

I learnt how to subnet and that is getting an ip address and assign it to different networks (subnetworks) from which we can generate ip addresses. I learnt some commands that can enable me to check the ip address of the computer in use. I learnt how to terminate cables, the two standards used and when each is used.

I learnt how to come up with a network topology, assigning ip addresses to different computers, hubs and networking devices. I learnt the routing protocols and when each is used. I learnt the static and dynamic configurations, configuring DHCP on the various routers. I learnt Remote Access Control that is how I can access a given computing device on a dispersed network. I learnt Virtual Local Area Network (VLAN) configuration and configuration of switches. I learnt Access Control List, the three categories that is Standard Access, Extended Control List and Named Access List. I learnt how to use computers in a workgroup and a domain. We configured DHCP and DNS on the Windows Server 2003. I learnt how to install a Linux Server and that was Open Suse Linux Server. I learnt shell scripting under Linux and how I can come up with scripts of various categories using some of the basic linux commands. I learnt different commands that can enable me to check my computers ip address using Windows and Linux operating systems. I also learnt how to create ip addresses for an upcoming company provided the number of branches or subnetworks they want .

I learnt the two types of subnetting and that is Class Less Subnetting which we were recommended to use because it does not leave unutilized ip addresses in comparison to Class Full Subnetting which wastes ip addresses. I learnt troubleshooting a VLSM addressing design and Inter-VLAN routing.

Under server management, I also learnt a lot. I learnt the basic commands for Server configurations, how to use Vi, Vim and Nano as the editors in the Linux command terminal. Under Server management, I learnt how to copy files from the computer acting as a server to other client computers as well as assigning them rights using the server. Among the other commands, I learnt some that can enable me to create a new user account used in case we can not login as the administrator to access full rights. I have also learnt team work, being Honest, Creative and innovative and Modest as well. I had an introduction to system administration and networking in my recess term but we did not get enough practical sessions. I have gained more in this training because I personally could not terminate cables, connecting networking devices like routers, switches and computers in a network. I really thank my place of attachment for the lots of skills that they have enabled me to acquire.

We covered server services and I was able to configure the backup domain controller and installation with LDAP and Samba on Open Suse Server.

I also learnt how to set up idap client in Linux and how to use PAM to activate the directory to login. I was exposed to new technology for example the internet access point. I learnt that it is through that internet access point that wireless is connected. I learnt that the WAP can work as a four port switch and as a router Under sharing resources and files, I learnt how to block ones password and spreading a virus to ones documents.

Apart from windows XP installation, I also learnt how to install programs on the computer and uninstall them.

CoCIS Makerere has guided me perfect in that I been able to attain the following values during my stay at the place. These include:

Competency

Hard work and team work

Solidarity Respect

Creativity and innovation I met new individuals and interacted with them. This has improved my interpersonal communication skills. During my training, Mr Seth Muhairwe my field supervisor encouraged my to be optimistic and to be eager in acquiring more skills. In addition he encouraged me to be diverse in all the IT fields and that I can earn a living as an IT specialist. He said that mere troubleshooting computers for my customers can help me earn. I can also come up with an internet caf since I have got enough knowledge about networking

In addition, CoCIS has trained me to be a confident person and to be prepared to share the knowledge with others at any time. This has been emphasized through our constant presentations and assignments that we have been having. I was really motivated because previous I was shy. At times I found that I could not share the knowledge that I had with my colleague yet I was knowledgeable about the topic of discussion. I eventually gained confidence after several public speaking trials. I do believe that every one under the IT field has to gain confidence because such situations arise.3.1.1 Challenges encountered during the training Some of my workmates were not social, some were mean and never wanted to share their knowledge with others yet they seemed to be more skilled.

I have found it costly commuting from my place of residence to go to CoCIS Makerere for my training. It was so hectic and expensive but in any case I do not regret all the times I have been at CoCIS because I have gained a lot of skills.

I did not get to interact with all the IT related activities due to the short scheduled internship period. IT being wide is hard to exhaust but I have gained a lot. CHAPTER FOUR

4.1 Conclusions and recommendationsThis chapter covers conclusions and recommendations I have come up with during my entire period of the industrial training at CoCIS Makerere.4.1.0 Conclusions.The main Purpose of the industrial training has been achieved to a greater extent. I have gained a lot for this part of my course load that is to say what I have acquired in the past two years all being done practically. I do believe that the practical skills I have acquired in this training will be of great importance as I pursue my career. I have met different personalities and as a result I have been able to respond to each one of them accordingly. I have learnt how to handle such people when at work. The training has also helped me discover my strengths and weakness as I struggle to become an IT specialist.

4.1.1 RecommendationsThe industrial training should be emphasized in order to solve the problem of students knowing only the theory part minus the practical skills. Enhancement in training facilities, would enable trainees have more practical training sessions and able to demonstrate their skills to the interns.The scheduled period offered by the faculty for industrial training should be noted carefully because some areas of placement take long to start the training hence interns lose out. This would be made possible through having partnerships with those places of placement so that as soon as the internship period starts, they take up students from the university for the training. This will reduce the time wasted by students in getting placements and also the placements to start off immediately. The students will then be able to train for the ten weeks as stipulated by the university.ReferencesGoogle http://www.google.co.ug/search/accessed 16th, June, 2014Ehow http://www.ehow.com/http:/accessed 16th, June, 2014Offerfamilyhttp://www.135.ibm/srvices/us/index.w.ss/offerfamily/gts/a1027691/accessed 16th, June, 2014Englander, I. (2000). The Architecture of computer hardware and systems software. John Wiley, USA, p272. http://www.manageengine.com/products/applications_manager/system-management APPENDICESAppendix 1: The procedures that were undertaken during repairing of Windows XP operating system are discussed below;

We set the CD-ROM drive as the first boot in the computers Basic BIOS, inserted a bootable Windows XP Compact Disk in the CD-ROM Drive, saved the changes and we restarted the computer.

At booting, we pressed F12 to boot from CD-ROM, then pressed any key on the keyboard and the windows setup started. We either used the repair console or the normal windows setup depending on ones internship training group. We pressed the ENTER key to continue. We pressed F8 key to accept the terms and conditions.

After the setup detecting the previous windows installations, the repair option was given.

We then pressed R option to begin the repairing.

All necessary files for the setup were copied to the drive that contained the pre-installed Operating System and then rebooted to begin installation.

We then followed all the steps until the repair was complete.

Those were the steps involved in repairing Windows XP operating system.Appendix 2: The steps that I undertook during the termination of cross over cable include the following;

I held the cable and used a crimp tool blade to cut both ends of the cable.

I arranged the cable wires in their right order starting with white orange, orange, white green, blue, white blue, green, white brown and brown(standard B) on one side and white green, green, white orange, blue, white blue, orange, white brown, brown(standard A) on the other end respectively. Straightened them and used a crimp tool blade to cut them at the same level.

Held the RJ45 connector while the clip was facing downwards, pushed in the wires gently until they touched the surface of the connector.

Used a crimp tool to clip the RJ45 onto the cable so that the wires are held properly.

Crimping was done on both of the cable.

I then used a network tester to test for connectivity of the cable.

The network tester beeped green from top to bottom (1-8) and this showed that I had successfully terminated a cross over cable.

Appendix 3: The steps that I undertook during the termination of straight through cable include the following;

I held the cable and used a crimp tool blade to cut both ends of the cable. I arranged the cable wires in their right order starting with white orange, orange, white green, blue, white blue, green, white brown and brown in that order.(standard A) on both sides. Straightened them and used a crimp tool blade to cut them at the same level. Held the RJ45 connector while the clip was facing downwards, pushed in the wires gently until they touched the surface of the connector.

Used a crimp tool to clip the RJ45 onto the cable so that the wires are held properly. Crimping was done on both of the cable.

I then used a network tester to test for connectivity of the cable.

The network tester beeped green from top to bottom (1-8) and this showed that I had successfully terminated the straight through cable.Appendix 4: The steps that were taken when setting up a Local Area Network (LAN) are discussed below; We placed a network switch on a flat surface acting as a center of convergence of all nodes on the network.

We connected cables to the wireless modem that was connected to the server and from the server to the client computers. Different IP addresses of class C network were distributed to different computers, the default gateway and the subnet mask were all the same. Pinging anothers computer was done using the ping command to check for connectivity that is to check whether we were within the same network and the LAN was created. Appendix 5: Under resource sharing, the following steps were taken; We set up a network and configurations were made and a folder was created on the desktop. I right clicked on the folder that was going to be shared by everyone on the network.

I then I clicked sharing and security

Clicked on the link.

I then marked the checkbox which reads Share this folder on the network and then I clicked OK.

Finally all computers on the network were able to access the folder.Appendix 6: The troubleshooting of hardware and software

Hardware and SoftwareSigns of the faultSolution to the problem

Processor -The computer does not start- Check the fitting of the processor or replace with new one.

Slow computers- Running so many programs at the same time.

- Low disk space.

- Computer viruses or worms.

- Low memory.

- Corrupt system files

- Faulty Motherboard- Make a full scan of your computer with an updated antivirus.

- Uninstall unnecessary programs.

- Repair your computer with the appropriate bootable CD-ROM with the same version of the

RAM- No boot but you hears continuous beeps (sound).- Fitting the appropriate RAM Chip(s) well in their slot(s).

-Replacing those that are used up with new ones.

Power supply- Failure to power on the computer even when turned on and off several times.- Check all connections for all power connectors, if all are fine replace the power supply with new one.

Appendix 7: Internship scheduleICT SERVICES DEPARTMENT

WEEK: INTERNSHIP TRAINING PROGRAM ITEM/COURSE:

13th -17thComputer Hardware

- Software

- Assemble, Disassemble

- Windows Operating system

- Unix Operating System

- Cloning

20th JuneNetworking

- Setting up a network e.g Peer to Peer

- Switch, Router and Hub Configuration

- Wireless Networks, Network Printers

- Cable Termination, Remote Networks

- Vlans

1st 15th JulyServer Management

- Installation of Windows Sever 2003

- Server Management

- Linux Servers

- DNS,DHCP

- Server Management

16th 23 th JulyServices

- Applications

- Databases

- Web hosting

PAGE 12