You are on page 1of 45

auwalumar1108@gmail.

com Industrial Training Computer Science and Information


Technology

SCHOOL OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY

INTERNSHIP CARRIED OUT AT WEB INFO-NET LTD


FROM 7ST JUNE 2017 TO 7TH AUGUST 2017

BY
AUWAL UMAR
16AU/KUJ/BCSIT/177R

An Internship Report Submitted To the School Of Computer Science and


Information Technology in Partial Fulfillment of the Requirements
For The Award of Bachelor Degree in Computer Science
And Information Technology of Kampala
University Jinja Campus.

AUGUST 2017
i
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

DECLARATION
I Auwal Umar hereby declare that this report written in partial fulfillment of the requirements of
the award of a Bachelor of Computer Science and information technology degree at Kampala
University Jinja Campus. This is my very own work documenting my internship (Industrial
Training) at Web Info-Net Limited during the recess term of June to August, Academic year
2017.

Signature . Date ..

Tel: +256704136480 / +2348034171643


Email: auwalumar1108@gmail.com

ii
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

APPROVAL

This industrial training has been submitted for examination with the approval of the following
supervisors.

Sign. Date
Mr. Musinguzi Rogers
Web Info-Net Limited

Sign Date.
Madam Juliet Bvkenya
Kampala University Jinja Campus

iii
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

DEDICATION
I humbly thank the Almighty Allah for having kept me keep me health and energy to come up
with this internship report.
I dedicate this work to my Parents and entire family for their tireless efforts towards the success
of this work. I thank them for having supported us both financially, parental care as well as in
prayers.
To web info-net that has given me knowledge and the opportunity to be part of them, especially
Mr. Rogers Musinguzi who gave on us not.
Also not forgetting to Madam Juliet Bvkenya my Head of Department and my internship
supervisor, she took her time from Jinja district to Web Info-net in Kampala to check on me and
asses my progress during the course of internship at Web Info-Net Ltd.
Above all May almighty Allah who saw me from day one up to the end of it all.

iv
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

ACKNOWLEDGEMENT
I would like to acknowledge Gods mercies that saw me through from day one up to the end.
I would like to acknowledge the support offered to me by my family and friends for the strength
and support during this industrial training period and other times.
Special thanks go to Madam Juliet Bvkenya my Head of Department who gave me advice
throughout the whole internship training and spared her time to come and check on me during
my training.
The company internship supervisor who also happened to be my trainer Mr. Musinguzi Rogers,
thank you for the knowledge passed onto me during the time of industrial training.

v
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

LIST OF ABBREVIATIONS
ADDC Active Directory Domain Controller
BIOS Basic input output system
CCNA Cisco Certified Network Association
CPU Central Processing Unit
CPU Central processing unit
DHCP Dynamic Host Configuration Protocol
DNS Domain Name Service
ICT Information Communication Technology
IDE Integrated drive electronics
IP Internet Protocol
ISP Internet Service Provider
IT Information technology
NPS Network Policy Services
OS Operating system
RAM Random Access Memory
RJ45 Register Jack 45
RTMP Routing table maintenance protocol
SATA Serial advanced technology attachment
VGA Video graphic array
VLAN Virtual Local Area Network
VLSM Variable Length Subnet Mask
VMware Virtual Machine ware
WAN Wide Area Network
WIN Web Info-Net

vi
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

TABLE OF CONTEENTS

DECLARATION...................................................................................................................... i
APPROVAL ........................................................................................................................... iii
DEDICATION ....................................................................................................................... iv
ACKNOWLEDGEMENT ...................................................................................................... v
LIST OF ABBREVIATIONS ................................................................................................ vi
TABLE OF CONTEENTS ................................................................................................... vii
LIST OF FIGURES ............................................................................................................... ix
LIST OF TABLES .................................................................................................................. x
ABSTRACT/SUMMARY OF THE REPORT ...................................................................... xi

CHAPTER ONE ................................................................................................................... 1


1.0 Background of Company/Organization ............................................................................ 1
1.1 Core Values ....................................................................................................................... 1
1.2 Aims and Objectives of Web Info-Net Ltd ....................................................................... 2
1.3 Functions of WIN ............................................................................................................. 2
1.4 Structural Organization of Web Info-Net Limited ............................................................ 5
1.5 Title and Position of the officer responsible ..................................................................... 6

CHAPTER TWO .................................................................................................................. 7


2.0 Summary of Duties ........................................................................................................... 7
2.1 Schedule of the training .................................................................................................... 7

CHAPTER THREE .............................................................................................................. 9


3.0 Working Experience .......................................................................................................... 9
3.1Projects carried out ............................................................................................................ 9
3.1.1Computer Assembly and Disassembly ........................................................................... 9
3.1.2 P.C Trouble Shooting. .................................................................................................. 17
3.1.3Networking and Data communication .......................................................................... 18
3.1.4 Site survey and design. ................................................................................................ 23
vii
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

3.1.5 Website design ............................................................................................................. 23


3.1.6 Databases. .................................................................................................................... 24
3.1.7 Cyber security .............................................................................................................. 24
3.1.8 Linux operating system ................................................................................................ 25
3.2 Supervisory works done. ................................................................................................. 26
3.3 Problems encountered ..................................................................................................... 26
3.4 Problems solved .............................................................................................................. 27

CHAPTER FOUR ............................................................................................................... 28


4.0 Summary ......................................................................................................................... 28
4.1Types of experiences gained ............................................................................................ 28
4.2 Problems ......................................................................................................................... 28
4.3 Views and recommendation ............................................................................................ 29
4.4 Conclusion ...................................................................................................................... 29

REFERENCES ..................................................................................................................... 30
APPENDICES ...................................................................................................................... 30
APPENDIX1 ......................................................................................................................... 31
APPENDIX2 ......................................................................................................................... 32
APPENDIX3 ......................................................................................................................... 33
APPENDIX4 ......................................................................................................................... 34

viii
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

LIST OF FIGURES

Figure 1: Bios chip .........................................................................................................................11


Figure 2: RAM Chips.................................................................................................................... 12
Figure 3: Connectors ..................................................................................................................... 12
FIG 4:1Network design of WIN ................................................................................................... 32
FIG 5;2blowing and cleaning the computer.................................................................................. 34
FIG 6: Examining and maintaining the hardware in detail 1.34

ix
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

LIST OF TABLES

TABLE 1: Projects carried out by WIN .......................................................................................... 3


TABLE 2: Some of the ongoing Projects: ..................................................................................... 4
TABLE 3: Schedule of Training ..................................................................................................... 7
TABLE 4: Cross over cable. ......................................................................................................... 20
TABLE 5: Straight thru cable20

x
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

ABSTRACT/SUMMARY OF THE REPORT

In summary, this report contains various activities that I carried out during the Industrial Training
period at Web Info-Net Ltd. It starts with an overview of the organization, and a summary of the
activities that I carried out during the industrial training period. The training ran for eight (8)
weeks that is from June 7th, 2017 to Aug 7th, 2017, with three working days per week, and 3
working hours a day that is from 8:00am to 11:00am.
The training started with an orientation session, where I was introduced to WIN as a company
and fellow interns and stake holders to guide us through various activities during our stay at the
organization. Here I got involved in activities under the Information Technology department,
where I was introduced to IT Support which involves solving user issues by troubleshooting and
fixing physical problems, hardware maintenance, I was also introduced to computer assembly
and disassembly, Networking, Windows server 2008 installation and administration, operating
system installation of windows and administration, business management, risk assessment in
business and starting, VoIP setup on a machine and on a router, Site survey and design of a
network, switch and router configuration on both packet tracer and physical hardware and
website designing in word press.
I was also introduced to database design, MySQL databases in particular followed by computer
security which in most cases is termed as cyber security of what to protect and what to protect.
Linux operating system came in the last week and I was introduced to the desktop version and
the server version

xi
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

CHAPTER ONE
1.0 Background of Company/Organization
Web Info-Net ltd is a private limited IT Business Solution company. It was formed in 2010 by IT
Experts from Different organizations. It deals in ICT Training, Services and supplies to
Universities and other educational institutions, Government organizations, Private companies
and individuals. Web Info-Net Ltd has been pre-qualified by over 250 big organizations in
Uganda, and it has completed projects in networking

Computer maintenance and repairs, supply of different ICT equipment and Developing Different
Computer Software's. Web Info-Net Ltd has offered Internship training to over 3000 students
from different universities and these include Kampala University, Makerere University,
Kyambogo University, Mbarara University, Amity University, Makerere University Business
school, Kampala International University, Islamic University in Uganda and Ndejje University,
Busitema University, Bishop Stuart University, Mountain of the Moon University, Kabale
University and Bugema University.

Vision
To Meet Each Clients Business Vision- is our mission.

Mission
To provide and facilitate the delivery of quality, sustainable, customer oriented services
efficiently and effectively. To consistently create value for our stakeholders, by providing
solutions which enable our customers to achieve excellence and sustainable competitive edge
with emerging technologies in IT fields.

1.1 Core Values


Innovation: Flexibility is the key to our offerings, and intrinsic to this flexibility, is the spirit of
Innovation that we bring to our products and services from the very stage of design to
implementation and customer support.
1
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

Insight: At Web Info-Net, we have always prided ourselves on the vision, skills, expertise and
professionalism of our team. Our team members make use of their keen Insight to foresee
industry trends and meet demanding customer needs.

Integrity: At Web Info-Net, We look at the Core Value of Integrity as the very soul of our
company. This is reflected in its finances, the trusted relationship that we share with our
customers and business partners, and the faith reposed in them by their stakeholders.

1.2 Aims and Objectives of Web Info-Net Ltd


Carry out consultancy on information technology, enterprise network, office automation
and servicing / supply of equipment and consumables therefore.
Provide data and records management services.
Provide IT security that is anti-virus, firewalls, and training customers protection and IT
user skills.
Conduct research in co-temporally issues affecting the society and come up with IT
solutions to help them mitigate their problems.
Provide IT supplies, services and training.

1.3 Functions of WIN


They offer internet security, IT skill training, consultancy, research and IT supplies.
They offer home and office networking. No matter the size of the project, we deliver
exceptional results at a reasonable cost.
They offer service in web hosting
They design dynamic websites with content management systems
They offer reliable web and data applications hosting solutions.
They offer options of shared or dedicated, virtual or physical servers, Linux or windows.
They also offer Networking LAN & WAN services, Network troubleshooting, Network
installs and internet configurations.

2
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

TABLE 1: Projects carried out by WIN


Uganda Revenue Intranet Portal 35,000US$
Authority
Uganda National ITIL compliant Service 40,000US$
Roads Desk
Authority IT infrastructure Support
Presidents Office Networking LAN/WAN 6,000 US$
data communication
Rainbow Networking 1,000 US$
International
School
Landlords in Power billing System 16,000 US $
Kampala
A & M Executive Material Information 1,200US$
cleaning Management System
Services
Ndejje University Supply Servers, Computers, Ugx
Printers, laptops 110,000,000/=
Presidential Supply of ICT Ugx
Initiative on equipment 199,600,000/=
Banana Industrial
Development

3
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

TABLE 2: Some of the ongoing Projects:


CLIENT SERVICES to be CONTRACT value
offered
MG Holdings Ltd Production, sales & 2,500 US$
Purchases information
Management System.
East African Online School Profiles 1,500 US $
Schools Directory
Katumwa Sports Point of sale management 2,200 US$
Centre System

4
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

1.4 Structural Organization of Web Info-Net Limited

Board of directors: The WIN BOD is made up of the company consultant, the executive
director, and director of ICT center. . The BOD makes decisions that cant be made by top
management of the organization for example buying a large number of computers. The BOD
inserts money into the organization and make sure it lacks nothing and keep it running. Some
members of the BOD dont work in the WIN departments.

5
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

Company consultant: This is a person whom the company consults for some strategic decision
making.
Executive director: Is made up of the top management of WIN for example department heads.
They put into action decisions decided by the BOD, head their respective departments to ensure
values and objectives of the organization are achieved. The Executive Director of WIN is made
up of Human Resource/ Sales manager and Application, Research and Future development
manager.
Director of ICT WIN: Heads the ICT department and makes decisions regarding this
department at WIN.

1.5 Title and Position of the officer responsible

During the training period, I was under the supervision of Mr. Rogers Musinguzi, who happens
to be manager of the Information Technology department. He guided me through some of the
activities I carried out.

6
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

CHAPTER TWO
During the eight weeks that I spent at WIN under IT department, I was able to learn some of the
basics in the IT field of work and got to do hands-on practices. My day to day activities involved
computer assembly and disassembly, PC troubleshooting, hardware maintenance, networking,
windows installation and administration business skills, windows server 2008 administration,
website designing.

2.0 Summary of Duties


The following are the activities that I carried out and got involved in during my Industrial
training at WIN.
Orientation was the very first one on day one which was conducted by the internship supervisor,
Mr. Musinguzi My fellow internees and I were introduced to the company members and their
trainers and deployed in their respective departments. Internship schedule was handed out to
every intern.

2.1 Schedule of the training


TABLE 3: Schedule of Training

Week Activity Break Down Of Activities


Number
Reporting Day and Introduction to the company and
ONE Orientation fellow internees, receiving of industrial
General introduction to training schedule
computer hardware Computer assembly and disassembly,
OS Installation ( study of BIOS settings
Windows) The price quotations of different kinds
of hardware.
What to consider before and after
installation of windows, how to make a
flash drive bootable, installation of
windows

Computer and Maintenance Restoration of OS (windows), hard


TWO Repair disk maintenance, using hiren to data
PC Troubleshooting backup software, data recovery, OS
Business skills password reset
Introduction to networking Common interview expectations and
7
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

questions
Everyday PC problems(the common
ones), and their solutions plus
computer cleaning and maintenance
Business management and how the
hierarchy flows with in the business
with the roles of each
Networking equipment, Ethernet cable
terminating, the OSI model application
Network setup using wired and Using packet tracer to configure networks
THREE wireless
LAN set up
Server administration

Site survey Using Microsoft visual to design a network


FOUR drawing
Planning activities of materials required

Websites Using word press to create dynamic websites


FIVE Creating hosting accounts
Hosting websites and backing them up on the
internet
Databases Dealing with sql databases
SIX Using Visio to create GUI that interact with
the database

Security Basic concerns of cyber security


SEVEN

Linux O.S Installation of LINUX


EIGHT Desktop version and server version

8
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

CHAPTER THREE
3.0 Working Experience
Through the industrial training a number of experiences covering aspects in computer hardware,
networking, business, software installation, windows server 2008 administration, Linux
administration, website designing and hosting, databases and system development in Microsoft
visual 2012, and security were gained.

3.1Projects carried out

3.1.1Computer Assembly and Disassembly


The very first bit of the week that introduced us to computer hardware specifically assembly and
disassembly which is a vital thing in computing. I was also introduced to new interior devices
with in the systems unit of a computer and their roles. These include;

CPU (central processing unit) this acts as the main brain of the computer speed and
performance is determined by the central processing unit.
The CPU comes in two basic designs that is cartridge and socket.

Cartridge CPUs are big and are used in Pentium ii computers.

The socket CPUs: These are small and common in the dual core processors and the some of the
Pentium processors and are usually categorized into two forms i.e the pinned and the pin less.

Pin less CPU: - This is evident in P IV (P4) computers. Most early versions i.e. Pentium I-
Pentium III is not versed with such sockets. It was also noticed that the Pentium IV computer
have a 24 pin power connector and an extra 4 pin CPU power source.

Pinned CPU sockets: - These are evident in Pentium I-Pentium III. It was also noticed that such
computer have 20 pin power connector.

9
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

Heat sink: - This is another important component on the mother board and its placed on top of
devices that heat up due to the functionalities they perform. Such devices include the North
Bridge and the CPU. Heat sinks are made out of aluminum, copper or a black body that absorbs
heat from devices on which are placed. They are designed in form of fins, a design that enables
them to radiate heat generated by those devices on which are placed very fast such that they may
not heat up and exceed the expected heat capacities which might cause mal functioning of the
whole computer system.

Expansion slots: Expansion buses enhance the PCs capabilities by allowing users to add
missing features in their computers in form of adapter cards that are slotted in expansion slots.

Expansion slots

CMOS battery: - CMOS is an acronym for Complementary Metal Oxide Semiconductor. The
purpose of the CMOS battery is to keep CMOS RAM chips with high speeds at low power and
small separate block of memory alive even when the power is off.

The purpose of CMOS RAM is to store basic information about a PCs configuration which
includes floppy and hard drive types, CPU, RAM size, date and time, serial and parallel port
information, plug and play information and power saving setting.

BIOS which is an acronym from Basic Input Output System which include low level software
that controls the system hardware and an interface between the operating system and the
hardware. BIOS contains all the code required to control key board, display screen, disk drives,
serial communications and a number of miscellaneous functions. BIOS is ROM chip on the

10
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

mother board used by the computer during the startup routine to check out the system and
prepare hardware to run.

Figure 1: Bios chip

USB (Universal Serial Bus) port: - These are used


for connecting external devices like USB flash drives, external hard disks, iPods, MP3 players
and cameras.
Main memory (Random Access Memory):- This refers to the computer chips that temporarily
store data dynamically when we are working with our computers to enhance computers
performance. When one turns on power to a computer, certain operating system files (such as the
files that determine how the desktop appears) load into RAM from a storage device such as a
hard disk. These files remain in RAM as long as the computer has continuous power.

There are different categories of Dynamic Random Access Memory (DRAM) where chips must
be re-energized constantly or they lose their contents include:-
SD (Synchronous DRAM) synchronized to the system clock and faster than basic DRAM.
DDR1 (Double Data Rate SDRAM) transfers data twice instead of once for each clock cycle.
DDR2 this is second generation of DDR and is faster than DDR
DDR3this is third generation of DDR that was designed for computers with multi-core
processors.
SIMM (single inline model memory) used in Pentium 1 computers
The figure below shows RAM chips of laptop and desktop

11
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

RAM chip for


a desktop
computer

RAM chip for a


laptop computer

Figure 2: RAM Chips


Connectors: - These include IDE and STA cables which are used to connect a computers hard
drive and optical drive to the mother board. STA cable are preferred to IDE because they have
relatively high speeds when it comes to data transfer and take up small space on the mother
board. STA is a recent technology and therefore the first versions of computers i.e. Pentium I-
Pentium III do not have these connectors.
The figures below show the two connectors.

IDE
connectors

Figure 3: Connectors SATA


connectors

IDE
cable

In computer disassembly, we start with externally connected device attachment. Make sure the
computer system is turned off, if not then successfully shutdown the system and then detach the
external devices from the computer system. This includes switch off the power supply and
detaching power cable from SMPS from the back of the CPU cabinet.

12
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

The power supply converts AC to required current supposed to be used in computer in form of
DC.
Next we remove the remaining external devices like keyboard, mouse, monitor, printer or
scanner from the back of the CPU cabinet.
Note: Do not start disassembling without detaching the power cable from computer system. It is
also very essential to always have the right voltage running for example 110-150V for most
developed countries like America and 230-240V for developing countries like Uganda. We then
remove the CPU cabinet cover. If there are no screws, slide the cover back about an inch and lift
it off. One can use screwdrivers to complete task if there are screws attached to the CPU cabinet
cover.

Next, we remove the adapter cards. Check for cables or wires that might be attached and decide
if it would be easier to remove them before or after you remove the card. Remove screws if any
that hold card in place. Grab the card by its edges, front and back, and gently rock it lengthwise
to release it.

Removing drives is easy. There can be three types of drives present in your computer system,
hard disk drive, CD/DVD drives, and floppy disk drives. All these usually have a power
connector and a data cable attached from the device to a controller card or connector on the
motherboard. CD/DVD drive may have an analog cable connected to the sound card for direct
audio output.

After pulling out the power connectors, pull out the data cables from the drive as well as
motherboard connector. The hard disk drive and CD/DVD drives have two types of data cables
i.e. IDE and SATA cables. The IDE need better care while being removed as it may cause
damage to drive connector pins. Gently wiggle the cables sideways and remove it. SATA cables
can be removed easily by pressing the tab and pulling the connector straight back. After
removing screws, slide drive out the back of the bay.

13
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

Note:
CD/DVD drives may be of three kinds namely
CD Combo: Read/write between Cds and Read DVDs
DVD ROM: Read CDs and DVDs
DVD Rewritable: Read and write CDs and DVDs

Hard disk has evolved through HDD, SSD and SSHD. HDD may come with pins or no pins and
usually has a spinning disk. HDD hard disk with no pins is of SATA type. HDD is best in terms
of capacity. SSD uses flash memory, best for durability, performance and speed. SSHD is a
hybrid of HDD and SSD. It is best known for storage and is more expensive than all the other
types. Memory modules are mounted on the motherboard as chips that can be damaged by
manual force if applied improperly. Be careful while removing the RAM chips, always handle
them only by the edges. RAM chips are of different kinds that is; DIMM, SIMM, SDRAM,
DDR1, DDR2, DDR3, DDR4.

Lastly, before removing the motherboard, we must first remove the power connector connected
to motherboard including CPU fan power connector, cabinet fan, front panel of cabinet power
buttons and all remaining drives if not detached yet. Then we remove the screws if SMPS from
the back of cabinet and SMPS can be detached from tower cabinet. Before removing connectors
from motherboard, memorize all connectors for assembling computer. Remove screws from back
of the motherboard and you will be able to detach it from cabinet. Remove CPU fan from mother
board. Heat sink is visible now which can be removed by pulling tab upward. Remove the
processor.

Note: The processor may come with pins or no pins. Processors have evolved through years from
DUO Core to i3, i5, i7. The more cores, the more the speed, thus the more cost. Processors may
also come with hyper threading technology or turbo boost. Computer assembly is opposite of
computer disassembly. Note that the North Bridge is composed of PCIs and VGAs while the
South Bridge is composed of hard disk controllers and USBs. Yellow and blue cables are SATA
connectors. Jumpers should be turned on by using pins 2 and 3 and off by using pins 1 and 2.
Expansion slots white are for PCIs and black are for AGPs.
14
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

Windows Operating system installations


What to consider before installing windows?
RAM of computer
CPU speed
OS bits namely 32 or 86, 64
Hard disk partitions(Ensuring data security is the main reason as to why partitioning is
done)
Data backup
There are three ways of backup namely; removing hard disk and putting it in a different machine
then copying user files, using Linux specifically UBUNTU, using hiren software
Version of Operating System
Making a flash bootable
Press windows key + R
Type cmd and Enter
Type disk part and press enter
Select yes option
Type list disk and press enter
Select disk for example type select disk no_of_disk and press enter
Type clean and press enter
Type create partition primary and press enter to create a primary partition on drive
Select the partition by typing select partition 1 and press enter
make the drive active by typing active and pressing enter
Type format fs=file_system QUICK. File systems may be FAT32, FAT12, NTFS
depending on how big the drive is
Type assign to assign the drive a letter and press enter
Then Exit

Maintenance of windows
OS Restoration for windows
Press Windows key + R and type rstrui and then run
Press next

15
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

Press finish if OS is new else, select choose a different restore point and select a date that
you wish to restore OS to. It is recommended to use a date that is nearby.
Press yes
Steps considered to back data on alive cd using hiren
Reboot from CD
Select mini windows XP
Select my computer
Select the first local disk
Double click on users and copy files within desktop, documents etc. and paste them to an
external drive
OS password reset using hiren live CD
Boot form CD with hiren software
Select offline NT/2000/XP/Vista/7 Password change
Press enter twice, it will automatically select partition
Press enter twice
Enter 2 or 3 to select drive with operating system depending on which drive contains
operating system
Press enter and then long hold enter until screen flashes
List users by typing .
Press entering the user name
Select 1 to clear password, 2 to reset the password
Enter ! to quit
Enter q to quit
Enter y to save changes
Enter n not to try again if it fails
Type reboot and then enter

16
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

3.1.2 P.C Trouble Shooting.


This is the process of identifying a PC problem by following given procedures and by use of the
right tools to determine the exact problem and getting an appropriate solution to it. It involved
both identifying hardware and software problems depending on where the system is suspected to
be misbehaving from.

Most of the misbehaviors in the OS or application programs are brought about by conflicting
driver in the system, terminate and stay resident programs (and other commands and settings run
when your computer starts). If any trouble is encountered to booting the system, follow the
following procedures to resolve the problem;

Make sure everything is well connected and that the power switch is on and that current
is there by using the current tester. If there is no change, you may follow the next steps.
Turn off the power and unplug the AC power cable, then test power cable for continuity
using the multi-meter tester. If there is continuity, then check the power output of the
cable when plugged in the power compared to the expected. If okay then.
Compare the input and output of the power supply compared to the manufacturers
specifications otherwise follow the flow of current until your problem is solved.
If may be you were working inside the system and there were some disconnections, then
make sure that your jumper settings are okay, for CPU is inserted well, and DRAMS are
correct and then after confirming that every device is fully connected well the you can
reboot your system.
If there is no display, perhaps your VGA card or monitor is defective.
If it displays, press ctrl and alt at the same time, hold them and then press delete to see if
the system reboots.
If you suspect the problem to have been caused by some system changes made on the
BIOS settings, you may reboot the system and then, press delete to enter BIOS setup and
then choose load set up defaults.
If you suspect the problem to be on the OS, then you may need to Re-install either
Windows 95, 98, XP, VISTA, or any others OS depending on what you previously had
installed.
17
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

You may need to consult a specialized technician in case the problem is not solved so as
to help you out come it.

3.1.3Networking and Data communication


Networks were created by connecting personal computers (PCs) together via cables, wireless
and some in built network software especially in windows called Remote Desktop Connection.
Networks allow the connected computers to share data and other resources like drivers.
Computers connected together can share file, documents and drivers for other devices like
printers. Print to shared printers, Share an Internet connection, Provide communication (email,
audio and video conferencing, network-based fax services, etc.), Enable remote control of
connected hardware devices (entire offsite computers, cameras, devices installed as expansion
cards and peripherals, etc.), Run software installed on a separate machine, Provide data
collection, manipulation, use, and storage between machines.

Components required when setting up a network.


i) Network Interface Card (NIC): I was convinced by the supervisors at KAMPALA
UNIVERSITY that a computer connects to network via NIC. NIC allows a computer
to send and receive radio waves. They also have an Ethernet Adapter that is inside
the back panel of the computer and connects to the cable or DSL modem. The NIC
controls the flow of data between the computers internal data bus and the serial
stream of data on the network cable. Wireless network interface card (NIC) is used
mostly for laptops that have NIC slot were users can insert a wireless card that
connects to the network and internet.

ii) Hub: This is a device that is used to link more than two computers together, a device
to circulate packets, or blocks of information. When a computer is linked to a network
it makes a request for data from another computer, which in turn request will be sent
out to the hub.

18
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

iii) Router:
A router is an internetworking device that forwards packets between networks by processing
information found in the datagram or packet. In many situations, this information is processed in
conjunction with the routing table (also known as forwarding table). Routers use routing tables to
determine what interface to forward packets.

iv) Modem: A modem is a device that allows a person to connect to your Internet service
provider. Because modems only provide one IP address each, the best way to use a high-speed
modem is to share its services among computers.

v) Ethernet Cable: It is needed to allow the transmission of data from one networked device to
another. To set up a wired network, Ethernet cables are needed that allow the transmission of
data from one networked device to another. Category 5 (Cat 5) cable is one of the most common
types of Ethernet cable.

vi) Switch: A switch is a device that distributes packets, or blocks of data, between computers in
a network. Switches function in a similar fashion to hubs, but are much more efficient. A switch
can send a packet directly to a specific destination, instead of sending it to every computer in a
network.

Cable termination.
In order to start on cable termination I was first introduced to the different cables used. These
included CAT5, CAT5E and CAT6 as the most commonly used. These cables differ in speeds
used in data transfer. For purposes of learning we used CAT6 and RJ45 connectors for
terminating. It was also important for me to note that color codes are important especially in
terminating the different types of cables.
I used different tools to terminate the cables. These tools included a stripper which is used to
remove the cable cover, clipper which is used for terminating RJ45 and cable tester which is used
to test if the cable is functioning as expected.

19
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

I terminated two types of cables that is a straight through and crossover.


The types of cabling standards
There are two types of cable coding ie,
T658A and T658B, this can be summarized in the following tables:

The tables below show the color arrangements for straight through and crossover cables

TABLE 4: Cross over cable.

Side A Side B
White orange White green
Orange Green
White green White orange
Blue Blue
White blue White blue
Green Orange
White brown White brown
Brown Brown

TABLE 5: Straight thru cable


White orange White green
Orange Green
White green White orange
Blue Blue
White blue White blue
Green Orange
White brown White brown
Brown Brown

20
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

These are the steps of terminating cables.

Step 1: Using a crimping tool, I trimmed the end of the cable I was going to terminate, to ensure
that the ends of the conducting wires are even.

Step 2: Being careful not to damage the inner conducting wires, I stripped off approximately 1
inch of the cables jacket, using a modular clamping tool.

Step 3: After that I separated the 4 twisted wire pairs from each other, and then untwisted each
pair, so that it could end up with 8 individual wires. I flatten the wires out as much as possible,
since they needed to be very straight for them to be properly inserted into the connector.

Step 4: I held the cable with the wire ends facing away from me. I arranged the wires in a flat,
side-by-side ribbon formation, placing them in the following order: white/orange, solid orange,
white/green, solid blue, white/blue, solid green, white/brown, solid brown. The table below
explains straight through and cross over arrangement.

Step 5: I held the RJ45 connector so that its pins are facing away from me and the plug-clip side
was facing down, carefully inserted the flattened, arranged wires into the connector, pushing
through until the wire ends emerge from the pins. For strength of connection, I also pushed as
much of the cable jacket as possible into the connector so that no loss of signals takes place.

Step 6: I made sure that the wire ends coming out of the connectors pin side are in the correct
order if not I would rearrange them into proper formation, and re-insert them into RJ45 because
once the connector is crimped onto the cable, its permanent. If at all i realized that a mistake has
been made in wire order after termination, I would have to cut the connector off and start all over
again.

Step 7: I inserted the prepared connector into the RJ45 slot in my crimping tool. I firmly
squeezed the crimpers handles together until I couldnt go any further. Released the handles and
repeated this step to ensure a proper crimp.
21
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

Step 8: After completing the first termination, I repeated the process on the opposite end of my
cable.

File sharing.
This file sharing was achieved through working in a work group where by different workgroups
had different IP addresses but on the same network and these the addresses we used to access
their files they wish to share. Note that before one could access the file shared he could first get
the username and password of the computer sharing those files.

I gave a description and name of my computer, gave it a workgroup name. Clicked accept to
finish the wizard. After the computer restarted.

I repeated the procedures for all other computers and gave them different names but same
workgroup. After restarting I went to my computer double clicked Network places from my
desktop then left clicked on properties clicked on TCP/IP and clicked OK. The IP address for my
computer is 192.168.10.5 and I renamed my computer to FIVE and the subnet is automatically
255.255.255.0.
Server administration
Servers use the raid technology which makes them so expensive and include the following type,
DNS, DHCP, ADDS, remote access, terminal server, print server, file server among others.
The Domain Name server enables the server to name the server name
Dynamic host configuration protocol supplies IP addresses to the clients
ADDS (active directory domain services) stores all the resources on the network for example
computers, users, user groups.
Others like remote access help one access the server remotely,
As part of the training, disks having windows server 2008 were provided and I installed the
server software on the machine, a desktop
Adding computers/users to the domain,I right clicked computer-properties-Advanced system
settings-computername change- domain-insert domain name for example ham.com according to
what the domain name was.
Finish by clicking okay which without permission of the administrator wont accept as it requires
22
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

the admin user name and password to save.


Same way on the server one may need to activate these users.
This is done by clicking on start, then administrative tools.
Click active directory users and computers, double click on the domain.com. Click on the
computers and enable.
I also looked at VOIP (Voice over internet protocol) which uses a protocol SIP (session initiation
protocol) which supports multimedia like images, voice, and videos and audio. The steps I
followed were as follows;
Opened the VOIP software
I double clicked the SIP server
Clicked next for it to install and finish
Clicked on the office SIP server panel on the desktop
Clicked connect
Clicked settings and changed the administrator password
I right clicked it and closed it from down
I reopened it and clicked on connect

3.1.4 Site survey and design.


The fourth week introduced me to site survey and design, a core essential in networking.
After a simple demonstration of how a networker needs to first do a survey, I got to see why it is
essential in the sense that it helps the networker to budget well and avoid purchasing a lot of
networking, some of which may not be required or what may be missing
It also gives a good design of how the site where one intends to network in regard to avoiding
loose Ethernet cables and misguided appearance.
I also got a chance of going out as part of the assignment given to me, and check out for the
prices of different networking materials always required
In the appendix, an example of the design I did about ICS lab 3 and WIN lab are included.

3.1.5 Website design


The 5thweek introduced us to websites, dynamic websites to be specific using Wordpress which
acted as a tool that is used.

23
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

I installed a local server wamp which my site was to sit on before I export it to the internet
Altering with the tools like themes, plugins menus and more was also done to make sure the site
looks the one I needed according to what a client who comes to me as a website designer.

A few things like a free hosting account and downloading of file-zera followed which I needed to
host my account that was designed earlier.
I backed up all the site data before exporting it to the internet, where it can be retrieved in case of
any unexpected circumstances of loss.

3.1.6 Databases.
A database is a collection of logically related data. At WIN, I got a chance of dealing with
databases in the unique way unlike the usual sql commands that were common to me.
Using Microsoft visual 2008, which I installed on my machine, the first thing to complete was
creating the interfaces. These interfaces acted as GUIs in a form format that directly interact
with database or the back end of the database.
With the different properties ranging from text properties, checkboxes, text inputs and many
more to give the users the wide range of data to input in the databases.
A little bit of programming was involved, in order to give these forms behavior as they interact
with the database.
Mr. Yiga Steven helped us on the programming bit and gave us the core codes that were needed
to let us connect to the database.

3.1.7 Cyber security


This basically refers to computer security, which encompasses even every device that can help
one gain access to the internet that means phones are included too.
In these cyber security sessions I got to know what to protect and how to protect it, that is data
and resources especially when dealing on the organizational level even on the personal level.
Using soft wares like deep freezer which wipes a users data after use, thats if one who owns the
computer doesnt not have interest in the new users data or if in any way its infected by a virus
for example.

24
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

Other software like true encrypt that helps encrypt the users data, in this case turn normal text
into cipher text.
I also got to use steganography, a way of hiding information in a picture format for a secure
communication between two parties. Where I emailed the data that was hidden in a bmp format
to my fellow internee Glen. A means mostly used by top notch secret organizations.
Another powerful tool used by most dangerous attackers was also tested by myself where if
installed on ones machine, it gives keeps watch of everything done on the machine, our
instructor installed it and asked me to login on his machine with my Facebookaccount. To a
surprise, it had captured both the username and password.
This appearing too risky for any organization if the software is installed on the top secrets
machines. I also learnt that this software cant be detected in program files if one wishes to hide
it, it even does not appear on the menu , its rather guided or started by keys to which the user sets
on its installation and then it requires a password to proceed.

3.1.8 Linux operating system


Linux operating system is an OS just like any other operating system but in most cases preferred
because its virus free, safe and open source. That is why people trust it on severs, unlike
windows which are costly.
Under this activity, different Linux commands and requirements that Linux need for it to be able
to work were done, the installation of Linux operating system that is Ubuntu. More to that the
following are the activities covered under Linux; Installation of VMware player/ Virtual box ,
Ubuntu server, Open SSH Server , Apache webserver and uploading a sample Webpage to the
server and displaying it in chrome.
As a person who had my own laptop I had to use a virtual box in order to work with
Linux(Ubuntu) and files required were availed to me to install and experience the desktop
version of Linux

25
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

These are some of the commands I used in Linux;


Ctr+alt+f1 - allowing me to login in
ls - that helps in listing files
cd - change directory
cd .. - takes you to the home directory
cd / - takes you to the file system
cd/media/ - accesses the flash disk
pwd - printing working directory
free m - shows the capacity of RAM
df h - shows the size of the hard disk
top -shows the processes that are running in each microsecond
cd Desktop - take one to the desktop
cp - copying a file created
mkdir - creating a directory on the desktop
touch - creating a file
man - system call that calls the command and among

3.2 Supervisory works done.

3.3 Problems encountered


Expenses in transport costs to travel to WIN daily were high. Some extra transport costs
were incurred when we had to go to the field and so a lot of research.
The unstable internet that was at the facility denied me a lot of access to required research
data
Lunch in the neighborhood was expensive and yet the company didnt provide anything
to the internees
For one to get a supervisory signature at the end of each week, they had to have
completed all tasks given that week. This was close to impossible as most of the tasks
given were project tasks and required a longer grace time period to be completed.
The windows 8.1 that was on the facility was not activated and virus issues that chewed
almost all our data

26
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

There was also a challenge of identification of some components of the motherboard and
their functions. Like resistors and capacitors since some were fixed sealed on the mother-
board that they were invisible.
I also faced the challenge of arranging the color codes during termination of the cables
like differentiating between internet protocol version four and six..

3.4 Problems solved


The problem of having less experience was solved by doing more practice even after the
sessions with the company conductor. This enabled me to acquire more practical skills for
example terminating cables. I also got more information from the internet to complement
the practice like.
The problem of newness and complexity of software was solved by making thorough na-
vigation throughout the software by the help of student group mates and company super-
visor, also got more details from the internet about how they work.
Through a number of consultations from the company supervisor, I was able to terminate
cables given to me. After a number of practices like during fieldwork I was able to master
termination of network cables.
Same parts of the motherboard like capacitors, resistors and transistors were too small to
be identified at a distance. After some time, I was able to identify the parts with the help
of my group mates.

27
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

CHAPTER FOUR
4.0 Summary
This chapter generally discusses the types of experiences gained at WIN and problems
encountered during the training as well as future recommendations and a conclusion of the
report.

4.1Types of experiences gained


The experiences gained covered a wide range of skills in technical, social, business,
communication, team work, time management, conduct and leadership.
Team work, socially, I have learnt to work with other people as a team because no one
can do everything on their own.
Experience, I believe Im now equipped with the basic experience that I can be able to
use develop hardware projects, create networks, repair and maintain computers, install
software.
Keeping records, Filling and Updating daily and Weekly Log Forms has made me
realized the importance of keeping records and how helpful these records are for future
references for example,
The business communication skills especially to deal with interviews
Not to forget to mention, time management and conduct at work in preparation for future
employment.

4.2 Problems
The general problems encountered during training included:
Total difference between theory and the outside world, the field
Extra costs that came in from buying equipment for example headsets for VoIP that were
least expected
The standard of living, transport and food, since its almost middle of the town everything
were expensive.

28
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

Failure to install software required during training because of machine compatibility and
developer issues. (For example WAMP installation and packet tracer crashing on UBUN-
TU). This therefore resulted in replacement of UBUNTU OS with WINDOWS OS.

4.3 Views and recommendation


As a student of I.T who has been exposed to the world of technology I recommend installation
and concentration of network that is stable. It gives on quick answers to the users
Time allocated for individual sessions is not enough for serious practical work! The manager
should try to increase to like 6 hours and reserve some time for individual practical.
As part of what gets the computer involved students sharp , I recommend even industrial
training to be introduced even after the first year for I.T students , it exposes them earlier enough

4.4 Conclusion
It was also a great experience being at the training where most of the theory that I had learnt in
class was laid bare and was done by me especially in computer hardware repair and maintenance,
software design, entrepreneurship and communication skills, networking, embedded systems
among others.

In a special way I would like to thank Kampala University Jinja Campus computer science for
introducing and implementing such practical skills.

29
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

REFERENCES
[1] Auwal Umar
Phones: +256704136480 / +2348034171643
[2] auwalumar1108@gmail.com
[3] Web Info-Net Ltd.

30
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

APPENDICES
Appendixes are additional information considered appropriate to support the main text.
Suggested appendixes are for example:

APPENDIX1
Investigation/Internship report during the industrial training

31
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

APPENDIX 2

FIG 4:1Network design of WIN

32
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

APPENDIX 3
Industrial training acceptance Letter

33
auwalumar1108@gmail.com Industrial Training Computer Science and Information
Technology

APPENDIX 4

FIG 5;2blowing and cleaning the computer

FIG 6: Examining and maintaining the hardware in detail 1

34

You might also like