Professional Documents
Culture Documents
BY
AUWAL UMAR
16AU/KUJ/BCSIT/177R
AUGUST 2017
i
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
DECLARATION
I Auwal Umar hereby declare that this report written in partial fulfillment of the requirements of
the award of a Bachelor of Computer Science and information technology degree at Kampala
University Jinja Campus. This is my very own work documenting my internship (Industrial
Training) at Web Info-Net Limited during the recess term of June to August, Academic year
2017.
Signature . Date ..
ii
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
APPROVAL
This industrial training has been submitted for examination with the approval of the following
supervisors.
Sign. Date
Mr. Musinguzi Rogers
Web Info-Net Limited
Sign Date.
Madam Juliet Bvkenya
Kampala University Jinja Campus
iii
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
DEDICATION
I humbly thank the Almighty Allah for having kept me keep me health and energy to come up
with this internship report.
I dedicate this work to my Parents and entire family for their tireless efforts towards the success
of this work. I thank them for having supported us both financially, parental care as well as in
prayers.
To web info-net that has given me knowledge and the opportunity to be part of them, especially
Mr. Rogers Musinguzi who gave on us not.
Also not forgetting to Madam Juliet Bvkenya my Head of Department and my internship
supervisor, she took her time from Jinja district to Web Info-net in Kampala to check on me and
asses my progress during the course of internship at Web Info-Net Ltd.
Above all May almighty Allah who saw me from day one up to the end of it all.
iv
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
ACKNOWLEDGEMENT
I would like to acknowledge Gods mercies that saw me through from day one up to the end.
I would like to acknowledge the support offered to me by my family and friends for the strength
and support during this industrial training period and other times.
Special thanks go to Madam Juliet Bvkenya my Head of Department who gave me advice
throughout the whole internship training and spared her time to come and check on me during
my training.
The company internship supervisor who also happened to be my trainer Mr. Musinguzi Rogers,
thank you for the knowledge passed onto me during the time of industrial training.
v
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
LIST OF ABBREVIATIONS
ADDC Active Directory Domain Controller
BIOS Basic input output system
CCNA Cisco Certified Network Association
CPU Central Processing Unit
CPU Central processing unit
DHCP Dynamic Host Configuration Protocol
DNS Domain Name Service
ICT Information Communication Technology
IDE Integrated drive electronics
IP Internet Protocol
ISP Internet Service Provider
IT Information technology
NPS Network Policy Services
OS Operating system
RAM Random Access Memory
RJ45 Register Jack 45
RTMP Routing table maintenance protocol
SATA Serial advanced technology attachment
VGA Video graphic array
VLAN Virtual Local Area Network
VLSM Variable Length Subnet Mask
VMware Virtual Machine ware
WAN Wide Area Network
WIN Web Info-Net
vi
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
TABLE OF CONTEENTS
DECLARATION...................................................................................................................... i
APPROVAL ........................................................................................................................... iii
DEDICATION ....................................................................................................................... iv
ACKNOWLEDGEMENT ...................................................................................................... v
LIST OF ABBREVIATIONS ................................................................................................ vi
TABLE OF CONTEENTS ................................................................................................... vii
LIST OF FIGURES ............................................................................................................... ix
LIST OF TABLES .................................................................................................................. x
ABSTRACT/SUMMARY OF THE REPORT ...................................................................... xi
REFERENCES ..................................................................................................................... 30
APPENDICES ...................................................................................................................... 30
APPENDIX1 ......................................................................................................................... 31
APPENDIX2 ......................................................................................................................... 32
APPENDIX3 ......................................................................................................................... 33
APPENDIX4 ......................................................................................................................... 34
viii
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
LIST OF FIGURES
ix
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
LIST OF TABLES
x
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
In summary, this report contains various activities that I carried out during the Industrial Training
period at Web Info-Net Ltd. It starts with an overview of the organization, and a summary of the
activities that I carried out during the industrial training period. The training ran for eight (8)
weeks that is from June 7th, 2017 to Aug 7th, 2017, with three working days per week, and 3
working hours a day that is from 8:00am to 11:00am.
The training started with an orientation session, where I was introduced to WIN as a company
and fellow interns and stake holders to guide us through various activities during our stay at the
organization. Here I got involved in activities under the Information Technology department,
where I was introduced to IT Support which involves solving user issues by troubleshooting and
fixing physical problems, hardware maintenance, I was also introduced to computer assembly
and disassembly, Networking, Windows server 2008 installation and administration, operating
system installation of windows and administration, business management, risk assessment in
business and starting, VoIP setup on a machine and on a router, Site survey and design of a
network, switch and router configuration on both packet tracer and physical hardware and
website designing in word press.
I was also introduced to database design, MySQL databases in particular followed by computer
security which in most cases is termed as cyber security of what to protect and what to protect.
Linux operating system came in the last week and I was introduced to the desktop version and
the server version
xi
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
CHAPTER ONE
1.0 Background of Company/Organization
Web Info-Net ltd is a private limited IT Business Solution company. It was formed in 2010 by IT
Experts from Different organizations. It deals in ICT Training, Services and supplies to
Universities and other educational institutions, Government organizations, Private companies
and individuals. Web Info-Net Ltd has been pre-qualified by over 250 big organizations in
Uganda, and it has completed projects in networking
Computer maintenance and repairs, supply of different ICT equipment and Developing Different
Computer Software's. Web Info-Net Ltd has offered Internship training to over 3000 students
from different universities and these include Kampala University, Makerere University,
Kyambogo University, Mbarara University, Amity University, Makerere University Business
school, Kampala International University, Islamic University in Uganda and Ndejje University,
Busitema University, Bishop Stuart University, Mountain of the Moon University, Kabale
University and Bugema University.
Vision
To Meet Each Clients Business Vision- is our mission.
Mission
To provide and facilitate the delivery of quality, sustainable, customer oriented services
efficiently and effectively. To consistently create value for our stakeholders, by providing
solutions which enable our customers to achieve excellence and sustainable competitive edge
with emerging technologies in IT fields.
Insight: At Web Info-Net, we have always prided ourselves on the vision, skills, expertise and
professionalism of our team. Our team members make use of their keen Insight to foresee
industry trends and meet demanding customer needs.
Integrity: At Web Info-Net, We look at the Core Value of Integrity as the very soul of our
company. This is reflected in its finances, the trusted relationship that we share with our
customers and business partners, and the faith reposed in them by their stakeholders.
2
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
3
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
4
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
Board of directors: The WIN BOD is made up of the company consultant, the executive
director, and director of ICT center. . The BOD makes decisions that cant be made by top
management of the organization for example buying a large number of computers. The BOD
inserts money into the organization and make sure it lacks nothing and keep it running. Some
members of the BOD dont work in the WIN departments.
5
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
Company consultant: This is a person whom the company consults for some strategic decision
making.
Executive director: Is made up of the top management of WIN for example department heads.
They put into action decisions decided by the BOD, head their respective departments to ensure
values and objectives of the organization are achieved. The Executive Director of WIN is made
up of Human Resource/ Sales manager and Application, Research and Future development
manager.
Director of ICT WIN: Heads the ICT department and makes decisions regarding this
department at WIN.
During the training period, I was under the supervision of Mr. Rogers Musinguzi, who happens
to be manager of the Information Technology department. He guided me through some of the
activities I carried out.
6
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
CHAPTER TWO
During the eight weeks that I spent at WIN under IT department, I was able to learn some of the
basics in the IT field of work and got to do hands-on practices. My day to day activities involved
computer assembly and disassembly, PC troubleshooting, hardware maintenance, networking,
windows installation and administration business skills, windows server 2008 administration,
website designing.
questions
Everyday PC problems(the common
ones), and their solutions plus
computer cleaning and maintenance
Business management and how the
hierarchy flows with in the business
with the roles of each
Networking equipment, Ethernet cable
terminating, the OSI model application
Network setup using wired and Using packet tracer to configure networks
THREE wireless
LAN set up
Server administration
8
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
CHAPTER THREE
3.0 Working Experience
Through the industrial training a number of experiences covering aspects in computer hardware,
networking, business, software installation, windows server 2008 administration, Linux
administration, website designing and hosting, databases and system development in Microsoft
visual 2012, and security were gained.
CPU (central processing unit) this acts as the main brain of the computer speed and
performance is determined by the central processing unit.
The CPU comes in two basic designs that is cartridge and socket.
The socket CPUs: These are small and common in the dual core processors and the some of the
Pentium processors and are usually categorized into two forms i.e the pinned and the pin less.
Pin less CPU: - This is evident in P IV (P4) computers. Most early versions i.e. Pentium I-
Pentium III is not versed with such sockets. It was also noticed that the Pentium IV computer
have a 24 pin power connector and an extra 4 pin CPU power source.
Pinned CPU sockets: - These are evident in Pentium I-Pentium III. It was also noticed that such
computer have 20 pin power connector.
9
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
Heat sink: - This is another important component on the mother board and its placed on top of
devices that heat up due to the functionalities they perform. Such devices include the North
Bridge and the CPU. Heat sinks are made out of aluminum, copper or a black body that absorbs
heat from devices on which are placed. They are designed in form of fins, a design that enables
them to radiate heat generated by those devices on which are placed very fast such that they may
not heat up and exceed the expected heat capacities which might cause mal functioning of the
whole computer system.
Expansion slots: Expansion buses enhance the PCs capabilities by allowing users to add
missing features in their computers in form of adapter cards that are slotted in expansion slots.
Expansion slots
CMOS battery: - CMOS is an acronym for Complementary Metal Oxide Semiconductor. The
purpose of the CMOS battery is to keep CMOS RAM chips with high speeds at low power and
small separate block of memory alive even when the power is off.
The purpose of CMOS RAM is to store basic information about a PCs configuration which
includes floppy and hard drive types, CPU, RAM size, date and time, serial and parallel port
information, plug and play information and power saving setting.
BIOS which is an acronym from Basic Input Output System which include low level software
that controls the system hardware and an interface between the operating system and the
hardware. BIOS contains all the code required to control key board, display screen, disk drives,
serial communications and a number of miscellaneous functions. BIOS is ROM chip on the
10
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
mother board used by the computer during the startup routine to check out the system and
prepare hardware to run.
There are different categories of Dynamic Random Access Memory (DRAM) where chips must
be re-energized constantly or they lose their contents include:-
SD (Synchronous DRAM) synchronized to the system clock and faster than basic DRAM.
DDR1 (Double Data Rate SDRAM) transfers data twice instead of once for each clock cycle.
DDR2 this is second generation of DDR and is faster than DDR
DDR3this is third generation of DDR that was designed for computers with multi-core
processors.
SIMM (single inline model memory) used in Pentium 1 computers
The figure below shows RAM chips of laptop and desktop
11
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
IDE
connectors
IDE
cable
In computer disassembly, we start with externally connected device attachment. Make sure the
computer system is turned off, if not then successfully shutdown the system and then detach the
external devices from the computer system. This includes switch off the power supply and
detaching power cable from SMPS from the back of the CPU cabinet.
12
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
The power supply converts AC to required current supposed to be used in computer in form of
DC.
Next we remove the remaining external devices like keyboard, mouse, monitor, printer or
scanner from the back of the CPU cabinet.
Note: Do not start disassembling without detaching the power cable from computer system. It is
also very essential to always have the right voltage running for example 110-150V for most
developed countries like America and 230-240V for developing countries like Uganda. We then
remove the CPU cabinet cover. If there are no screws, slide the cover back about an inch and lift
it off. One can use screwdrivers to complete task if there are screws attached to the CPU cabinet
cover.
Next, we remove the adapter cards. Check for cables or wires that might be attached and decide
if it would be easier to remove them before or after you remove the card. Remove screws if any
that hold card in place. Grab the card by its edges, front and back, and gently rock it lengthwise
to release it.
Removing drives is easy. There can be three types of drives present in your computer system,
hard disk drive, CD/DVD drives, and floppy disk drives. All these usually have a power
connector and a data cable attached from the device to a controller card or connector on the
motherboard. CD/DVD drive may have an analog cable connected to the sound card for direct
audio output.
After pulling out the power connectors, pull out the data cables from the drive as well as
motherboard connector. The hard disk drive and CD/DVD drives have two types of data cables
i.e. IDE and SATA cables. The IDE need better care while being removed as it may cause
damage to drive connector pins. Gently wiggle the cables sideways and remove it. SATA cables
can be removed easily by pressing the tab and pulling the connector straight back. After
removing screws, slide drive out the back of the bay.
13
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
Note:
CD/DVD drives may be of three kinds namely
CD Combo: Read/write between Cds and Read DVDs
DVD ROM: Read CDs and DVDs
DVD Rewritable: Read and write CDs and DVDs
Hard disk has evolved through HDD, SSD and SSHD. HDD may come with pins or no pins and
usually has a spinning disk. HDD hard disk with no pins is of SATA type. HDD is best in terms
of capacity. SSD uses flash memory, best for durability, performance and speed. SSHD is a
hybrid of HDD and SSD. It is best known for storage and is more expensive than all the other
types. Memory modules are mounted on the motherboard as chips that can be damaged by
manual force if applied improperly. Be careful while removing the RAM chips, always handle
them only by the edges. RAM chips are of different kinds that is; DIMM, SIMM, SDRAM,
DDR1, DDR2, DDR3, DDR4.
Lastly, before removing the motherboard, we must first remove the power connector connected
to motherboard including CPU fan power connector, cabinet fan, front panel of cabinet power
buttons and all remaining drives if not detached yet. Then we remove the screws if SMPS from
the back of cabinet and SMPS can be detached from tower cabinet. Before removing connectors
from motherboard, memorize all connectors for assembling computer. Remove screws from back
of the motherboard and you will be able to detach it from cabinet. Remove CPU fan from mother
board. Heat sink is visible now which can be removed by pulling tab upward. Remove the
processor.
Note: The processor may come with pins or no pins. Processors have evolved through years from
DUO Core to i3, i5, i7. The more cores, the more the speed, thus the more cost. Processors may
also come with hyper threading technology or turbo boost. Computer assembly is opposite of
computer disassembly. Note that the North Bridge is composed of PCIs and VGAs while the
South Bridge is composed of hard disk controllers and USBs. Yellow and blue cables are SATA
connectors. Jumpers should be turned on by using pins 2 and 3 and off by using pins 1 and 2.
Expansion slots white are for PCIs and black are for AGPs.
14
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
Maintenance of windows
OS Restoration for windows
Press Windows key + R and type rstrui and then run
Press next
15
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
Press finish if OS is new else, select choose a different restore point and select a date that
you wish to restore OS to. It is recommended to use a date that is nearby.
Press yes
Steps considered to back data on alive cd using hiren
Reboot from CD
Select mini windows XP
Select my computer
Select the first local disk
Double click on users and copy files within desktop, documents etc. and paste them to an
external drive
OS password reset using hiren live CD
Boot form CD with hiren software
Select offline NT/2000/XP/Vista/7 Password change
Press enter twice, it will automatically select partition
Press enter twice
Enter 2 or 3 to select drive with operating system depending on which drive contains
operating system
Press enter and then long hold enter until screen flashes
List users by typing .
Press entering the user name
Select 1 to clear password, 2 to reset the password
Enter ! to quit
Enter q to quit
Enter y to save changes
Enter n not to try again if it fails
Type reboot and then enter
16
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
Most of the misbehaviors in the OS or application programs are brought about by conflicting
driver in the system, terminate and stay resident programs (and other commands and settings run
when your computer starts). If any trouble is encountered to booting the system, follow the
following procedures to resolve the problem;
Make sure everything is well connected and that the power switch is on and that current
is there by using the current tester. If there is no change, you may follow the next steps.
Turn off the power and unplug the AC power cable, then test power cable for continuity
using the multi-meter tester. If there is continuity, then check the power output of the
cable when plugged in the power compared to the expected. If okay then.
Compare the input and output of the power supply compared to the manufacturers
specifications otherwise follow the flow of current until your problem is solved.
If may be you were working inside the system and there were some disconnections, then
make sure that your jumper settings are okay, for CPU is inserted well, and DRAMS are
correct and then after confirming that every device is fully connected well the you can
reboot your system.
If there is no display, perhaps your VGA card or monitor is defective.
If it displays, press ctrl and alt at the same time, hold them and then press delete to see if
the system reboots.
If you suspect the problem to have been caused by some system changes made on the
BIOS settings, you may reboot the system and then, press delete to enter BIOS setup and
then choose load set up defaults.
If you suspect the problem to be on the OS, then you may need to Re-install either
Windows 95, 98, XP, VISTA, or any others OS depending on what you previously had
installed.
17
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
You may need to consult a specialized technician in case the problem is not solved so as
to help you out come it.
ii) Hub: This is a device that is used to link more than two computers together, a device
to circulate packets, or blocks of information. When a computer is linked to a network
it makes a request for data from another computer, which in turn request will be sent
out to the hub.
18
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
iii) Router:
A router is an internetworking device that forwards packets between networks by processing
information found in the datagram or packet. In many situations, this information is processed in
conjunction with the routing table (also known as forwarding table). Routers use routing tables to
determine what interface to forward packets.
iv) Modem: A modem is a device that allows a person to connect to your Internet service
provider. Because modems only provide one IP address each, the best way to use a high-speed
modem is to share its services among computers.
v) Ethernet Cable: It is needed to allow the transmission of data from one networked device to
another. To set up a wired network, Ethernet cables are needed that allow the transmission of
data from one networked device to another. Category 5 (Cat 5) cable is one of the most common
types of Ethernet cable.
vi) Switch: A switch is a device that distributes packets, or blocks of data, between computers in
a network. Switches function in a similar fashion to hubs, but are much more efficient. A switch
can send a packet directly to a specific destination, instead of sending it to every computer in a
network.
Cable termination.
In order to start on cable termination I was first introduced to the different cables used. These
included CAT5, CAT5E and CAT6 as the most commonly used. These cables differ in speeds
used in data transfer. For purposes of learning we used CAT6 and RJ45 connectors for
terminating. It was also important for me to note that color codes are important especially in
terminating the different types of cables.
I used different tools to terminate the cables. These tools included a stripper which is used to
remove the cable cover, clipper which is used for terminating RJ45 and cable tester which is used
to test if the cable is functioning as expected.
19
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
The tables below show the color arrangements for straight through and crossover cables
Side A Side B
White orange White green
Orange Green
White green White orange
Blue Blue
White blue White blue
Green Orange
White brown White brown
Brown Brown
20
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
Step 1: Using a crimping tool, I trimmed the end of the cable I was going to terminate, to ensure
that the ends of the conducting wires are even.
Step 2: Being careful not to damage the inner conducting wires, I stripped off approximately 1
inch of the cables jacket, using a modular clamping tool.
Step 3: After that I separated the 4 twisted wire pairs from each other, and then untwisted each
pair, so that it could end up with 8 individual wires. I flatten the wires out as much as possible,
since they needed to be very straight for them to be properly inserted into the connector.
Step 4: I held the cable with the wire ends facing away from me. I arranged the wires in a flat,
side-by-side ribbon formation, placing them in the following order: white/orange, solid orange,
white/green, solid blue, white/blue, solid green, white/brown, solid brown. The table below
explains straight through and cross over arrangement.
Step 5: I held the RJ45 connector so that its pins are facing away from me and the plug-clip side
was facing down, carefully inserted the flattened, arranged wires into the connector, pushing
through until the wire ends emerge from the pins. For strength of connection, I also pushed as
much of the cable jacket as possible into the connector so that no loss of signals takes place.
Step 6: I made sure that the wire ends coming out of the connectors pin side are in the correct
order if not I would rearrange them into proper formation, and re-insert them into RJ45 because
once the connector is crimped onto the cable, its permanent. If at all i realized that a mistake has
been made in wire order after termination, I would have to cut the connector off and start all over
again.
Step 7: I inserted the prepared connector into the RJ45 slot in my crimping tool. I firmly
squeezed the crimpers handles together until I couldnt go any further. Released the handles and
repeated this step to ensure a proper crimp.
21
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
Step 8: After completing the first termination, I repeated the process on the opposite end of my
cable.
File sharing.
This file sharing was achieved through working in a work group where by different workgroups
had different IP addresses but on the same network and these the addresses we used to access
their files they wish to share. Note that before one could access the file shared he could first get
the username and password of the computer sharing those files.
I gave a description and name of my computer, gave it a workgroup name. Clicked accept to
finish the wizard. After the computer restarted.
I repeated the procedures for all other computers and gave them different names but same
workgroup. After restarting I went to my computer double clicked Network places from my
desktop then left clicked on properties clicked on TCP/IP and clicked OK. The IP address for my
computer is 192.168.10.5 and I renamed my computer to FIVE and the subnet is automatically
255.255.255.0.
Server administration
Servers use the raid technology which makes them so expensive and include the following type,
DNS, DHCP, ADDS, remote access, terminal server, print server, file server among others.
The Domain Name server enables the server to name the server name
Dynamic host configuration protocol supplies IP addresses to the clients
ADDS (active directory domain services) stores all the resources on the network for example
computers, users, user groups.
Others like remote access help one access the server remotely,
As part of the training, disks having windows server 2008 were provided and I installed the
server software on the machine, a desktop
Adding computers/users to the domain,I right clicked computer-properties-Advanced system
settings-computername change- domain-insert domain name for example ham.com according to
what the domain name was.
Finish by clicking okay which without permission of the administrator wont accept as it requires
22
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
23
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
I installed a local server wamp which my site was to sit on before I export it to the internet
Altering with the tools like themes, plugins menus and more was also done to make sure the site
looks the one I needed according to what a client who comes to me as a website designer.
A few things like a free hosting account and downloading of file-zera followed which I needed to
host my account that was designed earlier.
I backed up all the site data before exporting it to the internet, where it can be retrieved in case of
any unexpected circumstances of loss.
3.1.6 Databases.
A database is a collection of logically related data. At WIN, I got a chance of dealing with
databases in the unique way unlike the usual sql commands that were common to me.
Using Microsoft visual 2008, which I installed on my machine, the first thing to complete was
creating the interfaces. These interfaces acted as GUIs in a form format that directly interact
with database or the back end of the database.
With the different properties ranging from text properties, checkboxes, text inputs and many
more to give the users the wide range of data to input in the databases.
A little bit of programming was involved, in order to give these forms behavior as they interact
with the database.
Mr. Yiga Steven helped us on the programming bit and gave us the core codes that were needed
to let us connect to the database.
24
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
Other software like true encrypt that helps encrypt the users data, in this case turn normal text
into cipher text.
I also got to use steganography, a way of hiding information in a picture format for a secure
communication between two parties. Where I emailed the data that was hidden in a bmp format
to my fellow internee Glen. A means mostly used by top notch secret organizations.
Another powerful tool used by most dangerous attackers was also tested by myself where if
installed on ones machine, it gives keeps watch of everything done on the machine, our
instructor installed it and asked me to login on his machine with my Facebookaccount. To a
surprise, it had captured both the username and password.
This appearing too risky for any organization if the software is installed on the top secrets
machines. I also learnt that this software cant be detected in program files if one wishes to hide
it, it even does not appear on the menu , its rather guided or started by keys to which the user sets
on its installation and then it requires a password to proceed.
25
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
26
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
There was also a challenge of identification of some components of the motherboard and
their functions. Like resistors and capacitors since some were fixed sealed on the mother-
board that they were invisible.
I also faced the challenge of arranging the color codes during termination of the cables
like differentiating between internet protocol version four and six..
27
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
CHAPTER FOUR
4.0 Summary
This chapter generally discusses the types of experiences gained at WIN and problems
encountered during the training as well as future recommendations and a conclusion of the
report.
4.2 Problems
The general problems encountered during training included:
Total difference between theory and the outside world, the field
Extra costs that came in from buying equipment for example headsets for VoIP that were
least expected
The standard of living, transport and food, since its almost middle of the town everything
were expensive.
28
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
Failure to install software required during training because of machine compatibility and
developer issues. (For example WAMP installation and packet tracer crashing on UBUN-
TU). This therefore resulted in replacement of UBUNTU OS with WINDOWS OS.
4.4 Conclusion
It was also a great experience being at the training where most of the theory that I had learnt in
class was laid bare and was done by me especially in computer hardware repair and maintenance,
software design, entrepreneurship and communication skills, networking, embedded systems
among others.
In a special way I would like to thank Kampala University Jinja Campus computer science for
introducing and implementing such practical skills.
29
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
REFERENCES
[1] Auwal Umar
Phones: +256704136480 / +2348034171643
[2] auwalumar1108@gmail.com
[3] Web Info-Net Ltd.
30
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
APPENDICES
Appendixes are additional information considered appropriate to support the main text.
Suggested appendixes are for example:
APPENDIX1
Investigation/Internship report during the industrial training
31
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
APPENDIX 2
32
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
APPENDIX 3
Industrial training acceptance Letter
33
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology
APPENDIX 4
34