Você está na página 1de 51

A TECHNICAL REPORT ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES) AT NEW HORIZONS SYSTEM SOLUTIONS #6 BENUE ROAD UNIVERSITY

OF IBADAN, OYO STATE NIGERIA.

IN PARTIAL FULFILLMENT FOR THE AWARD OF BACHELOR OF SCIENCE (B.Sc) DEGREE IN COMPUTER SCIENCE

MARCH, 2009

EXECUTIVE SUMMARY

SIWES (Students industrial Work Experience Scheme) is very essential as it aids students knowledge in merging the theoretical knowledge gained in school and the practical in real life scenario.

This is a detailed report on the information technology (IT) skills that i acquired during my six (6) months mandatory industrial attachment program at New Horizons System Solution Benue Road University of Ibadan, Oyo State. This report also includes various methods used in building a dynamic and interactive website.

DEDICATION

I dedicate this report to God Almighty for His unfailing love, immeasurable faithfulness, unlimited grace and for sparing my life throughout the period of my industrial attachment. And also to my darling parents Mr. & Mrs. S. N. Agughasi for their unalloyed support and unquantifiable assistance throughout the whole exercise.

ACKNOWLEDGEMENT

I would like to use this medium to acknowledge the entire working crew of New Horizons System Solutions Ibadan, Oyo State for the kind gesture to me throughout my training and also for the love and concern from all friends and well-wishers.

My heartfelt gratitude goes to Mr. Tunji Lawoyin, Mr. Olumide Ojo, Mr. Johnson Falokun, Mrs. Olamide Olajide, Mrs Adebambo Adeosun(NEE AYOKA), Mrs. Olajumoke Adepoju, Mr. Laseinde Olanrewaju, Mr. Olalekan Bamisile, Miss Adebukola Aina for imparting in me individual experience and relevant information, for their time and energy to meet my needs and for their assistance in putting me through in many practical situations. Also, to my loving parents, siblings, uncles and aunties for their moral, financial and spiritual support throughout the training period. Thanks are also due to my lecturers at the Department of Computer Science, Michael Okpara University of Agriculture Umudike (for inculcating in me a sense of responsibility). I will never forget Mr. Ayowole Stephen who gave me a comfortable apartment thereby making my stay at New Horizons Ibadan a reality. Lastly, my immeasurable gratitude to these following people; Prof. Ajah Akpuru Ajah, Elder Ibekwe Nwachukwu, Engr. Agbeyewa Olayinka, Mr. Olaniyi Ajibola and Pastor & Mrs. Yinka Odudiran for affecting my life positively.

LIST OF TABLES

TABLE 2.1

Induction Guide/Plan by Department (Quality Assurance Department)

.....21

LIST OF FIGURES Figure 3.7 Lovibond comparator................................................................................29

Figure 3.8 PHmeter .....................................................................................................30 Figure 5.1 Steinfurth....................................................................................................36 Figure 5.2 DMA 4500..................................................................................................37 Figure 5.3 Mettler balance........................................................................................38

TABLE OF CONTENTS

Executive summary

iii

Dedication

iv

Acknowledgement

List of Tables

vi

List of Figures

vii

CHAPTER ONE

1.0 Introduction............................................................................................................................10

1.1 Relevance of SIWES................................................................................................................10

1.1 Objective of SIWES................................................................................................................10

1.2 Objective of report.................................................................................................................11

1.3 Scope of report......................................................................................................................11

1.4 Brief history of company........................................................................................................11

CHAPTER TWO

2.0 ality Assurance...............................................................................21 2.1 2.2 2.3

CHAPTER THREE

3.0 Methodology.........................................................................................23

3.1

Processes involved in the water treatment plant...................................................23

3.2

Pre-treatment of raw water....................................................................................24

3.3

In-line flocculation...................................................................................................24

3.4

Filtration through sand....................................................................................24

3.5

Filtration through carbon filter/purifier.........................................................25

3.6 filtration through the water polisher..............................................................25

3.7 Various test performed and processes involved............................................26

3.8

Residual chlorine test....................................................................................26

3.9

Appearance, taste and odour test................................................................27

3.10 Coagulation test............................................................................................27

3.11 Sanitizing processes......................................................................................32

3.12 Water polishing filter sanitizing process......................................................32

3.13

Sand filter back-washing process................................................................32

3.14

Carbon filter back-washing process.............................................................32

CHAPTER FOUR

4.0

Syrup rooms...................................................................................................32

4.1

Simple syrup room........................................................................................33

4.2

Final syrup room........................................................................................33

4.3

Sanitization processes in the syrup rooms..................................................34

4.4

One way sanitization................................................................................34

4.5

Three way sanitization ..............................................................................34

4.6

Five way sanitization..................................................................................34

CHAPTER FIVE

5.0

Main laboratory...........................................................................................34

CHAPTER SIX

6.0 Conclusion...............................................................................................................39

6.1

Recommendation......................................................................................................39

CHAPTER ONE

1.0

INTRODUCTION

The Student Industrial Work Experience Scheme (SIWES) is an accepted skills training programme, which forms part of the approved minimum academic standards in the various degree programme for all the Universities. It is an effort to bridge the gap existing between theory and practice of engineering and technology, Sciences, Agriculture, Medical, Management and other professional educational programmed in the Nigerian tertiary institutions. It is aimed at exposing students to machines and equipment, professional work methods and ways of safeguarding the work areas and workers in industries and other organizations. This training is notably taken in the student s penultimate year of study so as to help build in him or her some degree of professional competence, which would not only be a valuable advantage to the student when he graduates and starts professional practice, but also invaluable to his future employer, who finds it easy to work with him as there is little need for further training. Thus, the transition from student to professional is a smooth one. Other advantages include; I. In professions like engineering where practice confirms theory. The understanding of such theories is consolidated by physical experiences. This particular point is important as theory taught in some schools is based mostly on ideal situations. II. The training empowers the student boldly to handle professional jobs with little or no supervision and if even, possible, start private practice on his own after graduation from university. III. It gives the student the privilege of understanding all the possible developments that could occur as regards any aspect of his practice and how they can easily be handled. IV. It also provides the student with the platform to access his level of understanding of theory taught in class and areas in which he is still lacking. The student acquires relevant skills he needs to develop within the period of his final year so that he can graduate as an industry-ready professional. V. By his participation, he gets the opportunity to familiarize himself with other players in the field, in addition to getting to meet and know various clients who could be equally important in the future towards building a good career.

1.1

BACKGROUND

The 1988 biennial SIWES/ITF national conference held in JOS, Plateau State Nigeria mandated all collaborating agencies (NUC, NBTE, and NCCE) to draw up job specifications for all degree programme included in the Students Industrial Work Experience Scheme (SIWES). The job specifications would guide the industrialist and institutional supervisors in the placement of the students such that they would meet the expected requirement of minimum industrial exposure preparatory to employment. The National Universities Commission, recognizing the importance of job specification in SIWES did set necessary machinery in motion soon after the resolution was taken in 1988. However, from 1989-1993, the drawing up of the Minimum Academic Standards documents (a major statutory function of the commission), the resultant accreditation exercise and the movement of the commission secretariat to Abuja did not leave sufficient time to actualize this goal. It was not until January 1996, at a three-day National workshop in JOS, that job specifications were drawn for the entire programme that had industrial attachment component in their minimum Academic standards documents. Participants were drawn from senior academics from the universities across the country, SIWES coordinators, officers of the ITF head-quarters and NUC academics planning officers. In all, nine panels, each headed by senior academic, were constituted for all the forty-six programmes. The panels drew up the job specifications in a two day meeting. Prior to drawing up the job specifications, however, a one day meeting was held at which five invited papers were presented and the procedure, content and format for presentation of the job specification documents were decided. The first draft of the documents was sent to all the Universities. ITF, Industries and all professional bodies involved in the running of the scheme for their comment and input. Their comments were then considered by a panel comprised of the nine chairmen of the discipline groups and those found relevant were incorporated to produce the final job specification documents. The final job specification for each programme, organized into the following four parts: Introduction, Objective/Philosophy, Job schedule and Appendices; was then bound into the booklet. Finally, the production of SIWES job specifications is without doubt a milestone in the development of academic activities in the Nation s University System. The benefits derivable by employers, universities and the students alike are immense and will go a long way to move the country forward technologically.

1.2

RELEVANCE OF STUDENTS INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES)

Students Industrial Work Experience Scheme (SIWES) is no doubt a laudable scheme which supplements teaching education in Nigeria. The SIWES is the accepted skills training programme, which forms part of the approved minimum Academic Standards in the various degree programmes for all Nigerian Universities. It is an effort to bridge the gap existing between theory and practice of engineering and technology, sciences, agriculture, medical, management and other professional education programmes in the Nigerian tertiary institutions. It is aimed at exposing students to machinery and equipment, professional work methods and ways of safe guarding the work areas and workers in the industries and other organizations. It helps the students to understand the link between what was learnt in the tertiary institutions and what is obtainable in the industry. It also avails the students of opportunities to have a deeper insight as regards their various course of study which in turn makes them appreciate their course of study better thereby giving them an idea of areas they can specialize in towards the technological improvement of the individual and the nation at large. The Scheme is a tripartite programme involving the students, universities and industries (employers of labour). It is funded by the Federal Government of Nigeria and jointly coordinated by the Industrial Training Fund (ITF) and the National University Commission (NUC).

1.3

OBJECTIVES OF SIWES

The objectives of Students Industrial Work Experience Scheme are to: (a) Provide an avenue for students in Nigerian Universities to acquire industrial skills and experience in their course of study. (b) Prepare students for the work situation they are likely to meet after graduation. (c) Expose students to work methods and techniques in handling equipment and machinery that may not be available in the tertiary institutions. (d) Make the transition from tertiary institution to the world of work easier and thus enhance student s contacts for future job placement. (e) Provide students with an opportunity to apply their theoretical knowledge in real work situation, thereby bridging the gap between university work and actual practice. (f) Enlist and strengthen employers involvement in the entire educational process of preparing university graduates for employment in the industry.

1.4

OBJECTIVE OF REPORT

The objective of this report is to present a detailed explanation of the processes involved in creation of a dynamic website and also the post-encryption tests carried out on web pages to make sure that they conform with the required Standard as stated by the World Wide Web Consortium (W3C) during my Six (6) months of industrial attachment at the New Horizons System Solutions University of Ibadan, Oyo State Nigeria.

1.5

SCOPE OF REPORT

The scope of this report is limited to the creation of a Content Management System (CMS) and simulation tests that took place at New Horizons System Solutions, Ibadan.

CHAPTER TWO

2.0

BRIEF HISTORY OF THE COMPANY.

ABOUT NEW HORIZONS (WORLDWIDE) It was founded in 1982 and headquartered in Anaheim, California; New Horizons was named the world's largest training company by IDC the last 3 years. The company is both an operator and franchisor of training centers that offer a broad range of technical training, desktop application and business skills courses for all levels in multiple delivery methods and formats. New Horizons has over 312 training Centers in 60 countries in the world and has over 2400 instructors, 2100 classrooms and 2100 sales people globally. It also has a superior content catalog of over 2000 courses for office productivity, IT professionals and business skills. 60 New Horizons Countries

Americas Europe Africa

Middle East Asia Pacific

1. USA 2.Canada 3.Argentina 4.Chile 5.Costa Rica 6.Salvador 7.Guatemala 8.Honduras 9.Mexico 10.Nicaragua 11.Panama 12.Ecuador 13.Colombia 14.Peru 15.Bolivia 16.Jamaica 18.England 19.Ireland 20.Greece 21.Portugal 22.Spain 23.Malta 17.Netherlands

24.Georgia 25.Nigeria 26.South Africa 27.Malawi 28.Zimbabwe 29.Tanzania 30.Kenya 31.Egypt 32.Uganda 33.Tunisia 34.Syria 35.Kuwait 36.Qatar 37.Bahrain 38.Saudi Arabia 39.United Arab emirate 40.Oman 41.Yemen 42.Lebanon 43.China 44.Nepal 45.India 46.Bangladesh 47.Malaysia 48.Singapore

49.Australia 50.New Zealand 51.Fiji 52.India 53.Taiwan 54.Philippians 55.Vietnam 56.Korea 57.Mosambique 58. Ghana 59.UAE 60.Turkey

ABOUT NEW HORIZONS NIGERIA New Horizons Nigeria was granted the license as a franchise of New Horizons world-wide to operate in Nigeria in May 2005. The firms vision is to be the foremost provider of IT and Business Skills training in Nigeria; in order to achieve this vision, we believe we need the right values to propel the organization to the forefront of the IT and Soft Skill training industry in Nigeria; our values therein are Integrity, Innovation & Culture of Responsibility. The founders of New Horizons Nigeria saw the deepening of the IT and Management knowledge divide between the developed nations and the developing ones i.e. Nigeria as a threat to the socio-economic development of Nigeria and in order to bridge this divide, they decided to form a strategic alliance with the most reputable IT and Soft Skills training organization in the world. New Horizons Nigeria strongly believes that by doing this, she will contribute immensely to the socio-economic development of Nigeria. Strategic Alliance: New Horizons is the largest Microsoft s Technical Partners, and we also partner with Element K, Velsoft, Chyles Pathway, Oracle,Microsoft, Cisco, EC-Council, Comptia, Axios, IBM among others. Course Scope: We have over 4,300 IT and 800 Business skills courses.

The New Horizons network provides students more ways to learn, more courses at more times and in more locations than any other company in the industry. Testing Centre: New Horizons is an Authorized Prometric and VUE Testing Centers. Nigerian New Horizons System Solutions became autonomous from the group about 2005 and recently won meritorious awards in the world of Information Technology (IT) viz: The World s No. 1 Information Technology and Business Skills Training Institution

(IDC 2006 Report, www.idc.com) First IT Company to have successfully integrated IT professional Certification into the University Academic Curriculum (Nov 2008). Microsoft s Largest Technical Training Partner in the World (June 2009) Nigerian best cooperate IT training company(Sept 2009)

It is interesting to note that the company has trained over one million (1,000,000) clients since its inception in 1982. The first Microsoft Certified Trainer in Oyo State (Mr. Ojo Olumide) is a product of New Horizons System Solutions, little wonder he s the Centre Manager for Ibadan. Presently, there exist ten (10) solution centres spread across the country with State-of-the-Art Training Facility namely:CORPORATE OFFICE: #5 Babatola Drive, Off Obafemi Awolowo Way, Ikeja, Lagos State. FESTAC OFFICE: 1st Avenue, Mr. BIGGS Building, Beside Skye Bank, Lagos State. ABUJA OFFICE: Amma House, 1st Floor, Central Area, Opposite National Hospital, Abuja. ABEOKUTA OFFICE: 92, Ijemo-Agbadu Road, Ake, Ogun State.

IBADAN OFFICE 1: Lead City University, (Computer Department) Oyo State. IBADAN OFFICE 2: ARCIS-AFRICA, Regional Centre, Information Science, 6, Benue Road, University of Ibadan, Oyo State. CONVENANT CENTRE: CST Building Covenant University Campus, Otta. CRAWFORD UNIVERSITY CENTRE: Hall 6, Main Building Crawford Campus, Igbesa. BABCOCK UNIVERSITY CENTRE: New Horizons Building Babcock University Campus, LLishan. CRESCENT UNIVERSITY CENTRE: IT Resources Centre Crescent University Campus, Abeokuta. A Centre Manager heads each of the centre.

2.1 NEW HORIZONS NIGERIA BOARD MEMBERS New Horizons Nigeria is proud to have a team of highly respected business and academic professionals at the helm of affairs of the organization Professor Adebayo Adedeji Mr. Adedotun Sulaiman Chairman Vice Chairman

Mr. Tim Akano Chief Leo Stan Ekeh Chief Laolu Akinkugbe Professor Amuda J. Muibi Mr. Tunde Popoola Arch T. C. Awagwu

MD/CEO Director Director Director Director Director

2.2 NEW HORIZON SYSTEM SOLUTION, ORGANIZATIONAL CHART At the Head Office in Ikeja Lagos State, the overall Head of Administration and Operation is the Chief Executive Officer, with three other directors ably assisting and reporting to him and a Deputy Managing Director (see NHS organogram).

2.3 THE VARIOUS DEPARTMENTS/UNITS IN THE ESTABLISHEMENT AND THEIR FUNCTIONS There are basically four (4) distinct departments in the establishment which are listed bellow with their respective function. ADMINISTRATIVE DEPARTMENT 1. 2. 3. 4. 5. 6. 7. Handling of workers promotion. They control and handle general welfare of staff. They are responsible for policy formulation. They constitute and manage disciplinary team. Staff recruitment. They control and handle general welfare of students. They do the marketing works.

PLANNING AND FACULTY DEPARTMENT 1. They constitute the instructors.

2. 3. 4. 5. 6.

Production of drawing concerning project done or rehabilitated especially on networking. They produce the cost estimation. They do the training works. They constitute IT counseling team. They are involved in marketing.

FINANCE DEPARTMENT 1. 2. 3. 4. They issue out receipt. Issue out of cash for projects. They are in charge of collecting cash from students. They are involved in marketing.

TECHNICAL AND MAINTENANCE DEPARTMENT 1. 2. 3. 4. Maintenance of computers and its accessories. Undertakes all electrical related works. Undertakes the maintenance of generators serving the center. They are actively involved in the marketing works.

2.4 NEW HORIZONS SERVICES Solutions for Organizations For government, small, medium and large organizations, New Horizons has become a single source for all their training. Their customized enterprise solutions allow corporate training managers the ability to easily administer their learning programs and track the progress of all participating employees. Maximizing the investment in training is important for all companies, and New Horizons assists each client with the management and measurement of their training activities. The variety of learning options from New Horizons allows students to learn in the manner that best suits their schedule, budget, learning style and expertise. Solutions for Individuals

New Horizons provides comprehensive and cost-effective training for individuals looking to expand their IT and Management skills in their current professions or looking to take the first step toward new careers. With courses available online and in traditional classroom settings, New Horizons has a flexible educational solution that fits your learning style and your schedule. Integrated Learning New Horizons Integrated Learning is a comprehensive approach to training that guides each learner through all stages of their learning lifecycle. It consists of five components - Assess, Learn, Reinforce, Support and Validate - and combines classroom and eLearning products and services to create the most effective learning experience available in the industry. Technical Training and Certification Choose from a wide selection of technical classes and certification packages. New Horizons maintains the world's largest network of Gold Microsoft Certified Partners for Learning Solutions and Microsoft Certified Partners for Learning Solutions (CPLS). In fact, New Horizons does more Microsoft technical and certification training than any other company. Business/Soft Skills Training Choose from a wide selection of our Business Skills courses. New Horizons offers both classroom and elearning options. They feature the latest titles and provide solutions tailored to help individuals execute real-world business projects. The Learning Experience The success of customers is realized through training classes, but the foundation of New Horizons is based on inspiring students and companies to become more productive and successful in their daily activities. They see it on the students' faces every day. It's the confidence that comes from learning. METHOD OF DELIVERY Classroom Learning (New Horizons Offices Nationwide) Onsite Training (Clients sites Nationwide) Dedicated Classes Mentored learning. Online e-Learning Any combination that works for you

CHAPTER THREE TECHNICAL DEPARTMENT AND EXPERIENCE GAINED 3.0 THE TECHNICAL DEPARTMENT

The department is meant for knowledgeable-based staff that develop solution (both hardware and software) with the language in vogue. It also adopt student(s) from the department of Computer science, Electrical/Electronics engineering, Computer engineering, Information Science and Fine arts. 3.0.1 RESPONSIBILITIES

Initiate IT projects, estimate effort, evaluate high level design and architecture, and execute project assignments Manages all software releases for the assigned applications/business unit(s). Maintain effective communication with all employees to ensure coordination and exchange of information for accomplishing goals. Serve as adviser to customers to research and/or resolve end-user problems or questions regarding business applications. Manage applications to ensure the application is functioning at an optimal level. Manage and track application changes, following the IT Change Control guidelines and procedures. Design and develop solution to meet organisation needs as well as in-house softwares to handle helpdesk and client maintenance. Preparing initial designs, studies and arrangements for application(s) in conformity with the requirements and needs set by the Technical Planning Section and of the concerned bodies (account) in accordance with the initial budgets. Handles networking, system maintenance and FTP uploads as well as ticket sending to Host Management. Ticketing sending means reporting error to Host Manager or attendant. Creates Administrative e-mail for client(s) as well as set their password. Deployment of solutions for the client as well as other related technical support issues 3.0.2 a. PROGRAMMING LANGUAGES USED PHP (Hypertext Preprocessor)

b.

HTML

3.1

SOFTWARE TOOLS USED FOR IMPLEMENTATION

The Company uses several development tool to accomplish the application to be deployed which sometimes has to go a long way with the clients taste. The Software tool used are as follows:3.1.1 MACROMEDIA DREAMWEAVER (v8 and Adobe Dreamweaver CS3)

Macromedia Dreamweaver 8 and Adobe Dreamweaver CS3 is a professional HTML editor for designing, coding, and developing web pages, and web applications. One can streamline the development workflow by creating and editing images in Macromedia Fireworks or another graphics application, then importing them directly into Dreamweaver, or by adding Macromedia Flash objects. Dreamweaver also provides a full-featured coding environment that includes code-editing tools (such as code hinting and syntax completion) and language reference material on Cascading Style Sheets (CSS), JavaScript, and ColdFusion Markup Language (CFML), among others. Macromedia Roundtrip HTML technology imports your hand-coded HTML documents without reformatting the code. It also enables you to build dynamic database-based web applications using server technologies such as CFML, ASP.NET, ASP, JSP, and PHP. Figure 3.1.1: Dreamweaver workflow for designing a website 3.1.2 MACROMEDIA FIREWORKS

Macromedia Fireworks is the definitive solution for professional web graphics design and production. It is the first production environment to address and solve the special challenges facing web graphics designers and developers. One can use Fireworks to create, edit, and animate web graphics, add advanced interactivity, and optimize images in a professional environment. In Fireworks, it is easy to create and edit bitmap and vector graphics in a single application. Everything is editable, all the time and the workflow can be automated to meet the demands of time-consuming updates and changes. Fireworks integrate with other Macromedia products such as Dreamweaver, Flash, FreeHand, and Director, as well as other favourite graphics applications and HTML editors, to provide a truly integrated web solution.

Figure 3.1.2: Adobe Fireworks environment 3.1.3: ADOBE FLASH PROFESSIONAL Flash is an authoring tool that designers and developers use to create presentations, applications, and other content that enables user interaction. Flash projects can include simple animations, video content, complex presentations, applications, and everything in between. In general, individual pieces of content

made with Flash are called applications, even though they might only be a basic animation. You can make media-rich Flash applications by including pictures, sound, video, and special effects. Flash is well suited for creating content to delivery over the Internet because its files are very small. Flash achieves this through its extensive use of vector graphics. Vector graphics require significantly less memory and storage space than bitmap graphics because they are represented by mathematical formulas instead of large data sets. Bitmap graphics are larger because each individual pixel in the image requires a separate piece of data to represent it.

Figure 3.1.3: Adobe FLASH Professional environment

3.2

HARDWARE TOOLS USED FOR IMPLEMENTATION

Hardware includes disk drives, modems (CISCO), switches, integrated circuits, display screens, cables, modems, speakers, and printers. NAME DESCRIPTION DEVICE

LAN TESTER Lan tester is an electronic device that is used to test the connectivity and functionality of LAN cables (RJ45, Cat5E etc) to ensure that it is well cripped and fit for data transmission. FIBRE-OPTICS CABLE This is an enhanced cable that is used for communication between servers.It support fast data transfer rate compared to the usual LAN cables (Twisted-pair and co-axial cables).

CRIMPING TOOL This is commonly called a Crimper. It is a device that is used to prepare a new LAN cable using the IEEE approved colour code convention and standards.it works with lan tester to check if the cripping process is successful or not.

MINI DLINK SWITCH

This acts like a hub used for LAN connection between systems in an autonomy.

PROCESSOR,MOTHERBOARD ,MEMORY AND HARDDISK Most important Computer system component for normal running of deskops and laptops. RAM is also used to store instructions about currently running applications; HARDDISK is a storage devices use to hold, or store, information, even when the computer s power is turned off. Unlike information in RAM, The device responsible for organizing the actions of these components is the processor, also referred to as the central processing unit, or CPU. As the brain of the computer. harddisk

LAN CABLE transfer.

This can be shielded or unshielded cable that is use for network connection and data

Others include Router (A router is a System whose software and hardware are usually tailored to the tasks of routing and forwarding broadcasts. Routers generally contain a specialized Operating System (e.g. Cisco's IOS or Juniper Networks JUNOS and JUNOSe or Extreme Networks XOS), RAM, NVRAM, flash memory, and one or more processors, as well as two or more network interfaces.)

3.3 3.3.1

DEVELOPMENTS CMS (CONTENT MANAGEMENT SYSTEM)

AN OVERVIEW ON CONTENT MANAGEMENT SYSTEM In general sense, Content Management System (CMS) is an expression that is widely used in relation to Web site development and maintenance all over the world. There are many searches to know about Content Management System. It is a special one. All content including metadata like page title, description, keywords, etc. is added to the database and used by the CMS to dynamically generate Web pages. In most cases, there is no need to install any special administrative software on the user's computer. There are different kinds of content management systems. A simple and easy-to-use CMS can be sufficient for an individual or a small business, while a large company may require a more sophisticated solution. A sophisticated CMS may be used to manage company workflow by setting roles and permissions for different employees. Some of them may be allowed only to upload their material, others are to review and edit it, and the others are to approve and publish it. A CMS creates and modifies content to publish it well. One can type or paste text in special boxes and upload images using the placeholders in a form, or if the CMS provides a WYSIWYG (What You See Is What You Get) editor, one can even work on a page and at the same time view what it will look like. Managing a Web site becomes easy even for non-technical business people; all they have to do is to log on via their browser, create or change a Web page or several pages, and then have the CMS publish the content to the Web server at the click of a button. 3.3.2 ADVANTAGES OF CMS

1. User can break free of the HTML (HyperText Markup Language) coding dependency trap and start working on the content. 2. User can make changes to their Web site quickly and easily, correct mistakes as soon as it is noticed. 3. It reduces the costs of professional assistance.

4. A CMS helps the clients with little Web authoring skills to re-design, maintain, and update their Web sites themselves. 5. It is possible to change the entire site quickly and easily using templates.

6. The design of a Web site always remains consistent because the content obtained from the database can be inserted into pre-designed templates. 7. 8. 9. User can modify the template in each and every page. CMS work smarter and it is not hard to implement. User can use a CMS once they can use a Web browser.

3.3.3 DISADVANTAGES OF CMS 1. A CMS is usually a fairly expensive product. Even if you get an open source solution, user will most certainly have to pay for installing it and setting it up. Don't be surprised to find out that your initial costs are higher than if you had your Web site built of static HTML pages. 2. A Web site based on a CMS tends to work slower, and that search engines index it worse than a static HTML site. These problems can be solved by adding a function that allows you to publish the site as static HTML pages or simply by choosing a CMS that uses search engine friendly URLs (Uniform Resource Locator). 3.3.4 WAYS TO OBTAIN A CMS

Different ways are there to get CMS in your web site. A) CREATE IT IN ONE S WORK FIRM One doesn t need to be a professional to develop a CMS for you. The technical staff can do it but it will be risk, if he leaves. And also it is difficult to find someone who is an expert in this job. B) CMS THROUGH OUTSOURCING

A lot of vendors will offer to develop a CMS that will fit all your needs. There's no doubt that most of these vendors will have enough experience for that. The problem is that even if you want to have a CMS based site with rather modest functionality, you're probably looking at the cost of $6,000 (#900,000)

range as a minimum. Developing a CMS with a respectable number of functions and modules costs several hundred thousand dollars. It is very expensive. C) POSSIBILITY OF BUYING CMS

These systems are normally well tested, and they work smoothly. On the downside, the affordable systems aren't very flexible or efficient, while the high-end sophisticated ones are extremely expensive. This option is probably the easiest and the most reliable one. Besides, you need to hire professionals to have the system deployed and set up. There are varieties of such products on the market, so you may choose the one that suits you best. D) OPEN SOURCE CMS

Open source systems are usually as good as commercial ones, and one don't have to pay for them because software distributed under the GNU public license is free to use, modify, and redistribute. Development teams and users all over the world have spent years working with open source systems, so the core functionality of an open source CMS is thoroughly tested and improved. This option seems to be the most effective one. It is also easy to extend because the development community continuously create new features and modules.

3.3.5

TRAINING EXPERIENCES AT THE ORGANIZATION

The experience gained during the period of industrial training can be categorized into two. Since in an organization, there is a code of conduct to which all staffs must adhere. A trainee must adhere to these rules to understand how an organization operates and this constitutes the administrative experience (the first facet) then the technical experience which is on-the-job training.

3.3.5.1 ADMINISTRATIVE EXPERIENCE (This cover the 6months) The organization runs 8.ooam to 5p.m work hour. Hence, I learnt to resume work on or before 8.ooam which makes me industrious towards the labour market criteria for promotion. The organization runs administrative style which helps to bring everybody together. Every First Monday of a new month an appraisal meeting of all staff including the trainee is held to appraise the past month and plan for the current month as well as work performance is reviewed. With this I developed a manual form to appraise the IT Student, which was adopted for the intranet system. As a result of the meeting that is usually held, I learnt about investment, time management, staff management, interpersonal relationship, budget analysis, target achievement, dedication and commitment to work (be it self-establishment or in an organisation). All these administrative styles gave me insights on how to be more disciplined and work towards ones establishment as well as manage the employee to build a nation.

With the marketing strategy and walk-through, I was able to see how softwares are being described to the client to convincingly make them see its benefit. The marketer have a saying that: 1. It s something else to have sleepless days, month or even years, its another thing to convince this people (client) to get the product or solution so as not to have a wasted solution 2. on. We (Marketers) might not know how to develop, but we can get it done with mouth and so

With at least six(6) outings I went with few marketers, I found out that client doesn t want to know the stress a programmer went through, all they want and ask is Is the Solution working or Can we customize it to our taste . This makes me work toward future solution or craft ideas with my technical crew.

3.3.5.2 TECHNICAL EXPERIENCE The technical experience gained can be summarized as follows: More broad insight into web application development with the use web tools like Macromedia Suite (Dreamweaver, Fireworks, Flash) More broad insight into database management using MYSQL database Acquainted with PHP environment, Webservice etc Excellent ability in the use of internet tool and website deployment with the use of Upload Software otherwise called FTP (File Transfer Protocol) tool like IPSwitch, Upload Manager 1.2 etc. Insight on network connectivity, use of cripping tools, network cable color arrangement. How to trunk a network over an organisation Acquainted on computer repair, troubleshooting, installation and maintenance of hardware. Awareness to new hardware that support solutions and handling of hardware tools. Creating Graphics that is Web2.0 enabled and Client User friendly as well as animation (multimedia) for applications. Everything in life has development stages and so does in Software development and this is referred to as the application Lifecycle or Software Development LifeCycle (SDLC) from small to medium to large database.

3.3.5.3 APPLICATION LIFECYCLE MANAGEMENT (ALM) OR SDLC Application lifecycle management or SDLC refers to the process of delivering software as a continuously repeating cycle of interrelated steps. Today, efficient software systems are the lifeblood of any business. With good systems, a company can dramatically streamline its processes and ensure that all members of the application team have the information they need. I was made to know that database software projects are generally broken down into six stages and how to work from one stage to the other depending on the solution to be built. The Stages is as follows:

Figure 3.3.5.3: Application Lifecycle or SDLC

The relationship of each stage to the others can be roughly described as a waterfall, where the outputs from a specific stage serve as the initial inputs for the following stage. During each stage, additional information is gathered or developed, combined with the inputs, and used to produce the stage deliverables. It is important to note that the additional information is restricted in scope; new ideas that would take the project in directions not anticipated by the initial set of high-level requirements are not incorporated into the project. Rather, ideas for new capabilities or features that are out-of-scope are preserved for later consideration. After the project is completed, the Primary Developer Representative (PDR) and Primary End-User Representative (PER), in concert with other customer and development team personnel develop a list of recommendations for enhancement of the current software.

3.3.6 1.

MONTH OF JUNE TECHNICAL EXPERIENCE (1 30/06/2009) INTRODUCTION TO WEB DESIGN AND APPLICATION

A web application is a website that contains pages with partly or entirely undetermined content. The final content of a page is determined only when the visitor requests a page from the web server. Because the final content of the page varies from request to request based on the visitor s actions, this kind of page is called a dynamic page. Web applications are built to address a variety of challenges and problems. 2. HOW WEB APPLICATIONS WORK

A web application is a collection of static and dynamic web pages. A static web page is one that does not change when a site visitor requests it: The web server sends the page to the requesting web browser

without modifying it. In contrast, a dynamic web page is modified by the server before it is sent to the requesting browser. The changing nature of the page is why it s called dynamic. 3. PROCESSING STATIC WEB PAGES

A static website comprises a set of related HTML pages and files hosted on a computer running a web server. The content seen by various user with time remains the same. The only functionality added to it is javascript which stands as a Client-Side Scripting Language. A web server is software that serves web pages in response to requests from web browsers. A page request is generated when a visitor clicks a link on a web page, selects a bookmark in a browser, or enters a URL in a browser s address text box. The final content of a static web page is determined by the page designer and doesn t change when the page is requested. When the web server receives a request for a static page, the server reads the request, finds the page, and sends it to the requesting browser, as shown in the following figure:

Figure3.3.6: Web server requesting a browser

4.

PROCESSING DYNAMIC PAGES

When a web server receives a request for a static web page, the server sends the page directly to the requesting browser. When the web server receives a request for a dynamic page, however, it reacts differently: It passes the page to a special piece of software responsible for finishing the page. This special software is called an application server. The application server reads the code on the page, finishes the page according to the instructions in the code, and then removes the code from the page. The result is a static page that the application server passes back to the web server, which then sends the page to the requesting browser. All the browser gets when the page arrives is pure HTML. Here s a view of the process:

5.

SCENARIO OF WHAT HAPPENS BEHIND THE SCENE

If for instance the URL is http://www.computerscience.com/home.htm The browser will break the URL into three parts: 1. 2. The protocol ( http ) The server name (www.computerscience.com)

3.

The file name ( home.htm) The browser communicated with a name server to translate the server name

www.computerscience.com into an IP address, which it uses to connect to the server machine. The browser then formed a connection to the server at the IP address on port 80 Following the HTTP protocol, the browser sent a GET request to the server, asking for the file http://www.computerscience.com/home.htm. The server then sends the HTML text for the Web page to the browser. The browser read the HTML tag and formats the page onto your screen.

6.

IP (Internet Protocol) ADDRESS

To keep all machines straight, machine on the internet is assigned a unique address called an IP address. IP stands for internet protocol, and these addresses are 32-bit numbers, normally expressed as four octets in a dotted decimal number. A typical IP address looks like this: 192.168.40.3. The four numbers in an IP address are called octets because they can have values between 0 and 255. Every machine on the internet has a unique IP address. A server has a static IP address that does not change very often. A home machine that is dialing up through a modem often has an IP address that is assigned by the ISP when the machine dials in. That IP address is unique for that session it may be different the next time the machine dials in. This way, an ISP only needs one IP address for each modem it supports, rather than for each customer.

7.

DOMAIN NAMES

Because most people have trouble remembering the strings of numbers that make up IP address and because IP addresses sometimes need to change, all servers on the internet also have human readable names, called DOMAIN NAMES. For example, www.computerscience.com is a permanent, human-readable name. It is easier for most people to remember www.computerscience.com than it is to remember 209.116.69.66

8.

HOW DOMAIN NAME SERVERS WORK

Human-readable names like hotmail.com are easy for people to remember, but they don t do machines any good. All of the machines use names called IP addresses to refer to one another. For example, the machine that humans refer to as www.computerscience.com with IP address 216.183.103.150 when used, the internet s domain name servers (DNS) translates the human-readable

domain name into the machine-readable IP address. During a day of browsing and e-mailing, one might access the domain name servers hundreds of times Domain Name Servers (DNS) translate domain names to IP addresses. That sounds like a simple task, and it would be except for five things:There is billions of IP addresses currently in use and most machines have a human-readable name as well. There are many billions of DNS requests made every day. A single person can easily make a hundred or more DNS requests a day and there are hundreds of millions of people and machines using the internet daily. Domain names and IP addresses change daily New domain names get created daily Millions of people do the work to change and add domain names and IP addresses every day. The DNS system is a database and no other database on the planet gets this many requests. No other database on the planet has millions of people changing it every day, either. That is what makes the DNS system so unique.

9.

EXAMPLES OF DOMAIN NAMES

If we had to remember the IP address of all the Web sites we visit every day, we would all go nuts. Human beings just are not that good at remembering strings of numbers. We are good at remembering words that is where domain names come in. You probably have hundreds of domain names stored in your head. For example www.yahoo.com- the world s best-known name www.mit.edu- a popular EDU name M6.net, hostlane.com- a Web server that does not start with www ftp.microsoft.com- an FTP server rather than a Web server. The COM, EDU, and UK portions of these domain names are called the top-level domain or first-level domain. There are several hundred top-level domain names, including COM, EDU, GOV, MIL, NET, ORG, and INT, as well as unique two-letter combinations for every country

3.3.6.1 USE OF DREAMWEAVER TOOL TO MANAGE AND DEVELOP WEB APPLICATIONS

The use of Dreamweaver to build web applications supports the use of these server technologies like ColdFusion, ASP.NET, ASP, JSP, or PHP. Choosing any one for web application depends on one s level of comfort with various scripting languages and the application server one plan to use but sometimes do go with the client s specification. Which server technology one chooses also depends on the application server one plan to use for the web application. An application server is software that helps web server process web pages containing server-side scripts or tags. For example, if you have ColdFusion MX 7 Server, you can choose ColdFusion as your server technology. If you have access to a server running Microsoft Internet Information Server 5 (IIS) with the .NET Framework, you can choose ASP.NET. While for PHP one needs the following to run PHP scripts; APACHE (Web server), MYSQL (Database), Notepad++ (Text Editor) and Firefox (Browser). This can either be on a developer s computer or on any host on the internet. Any web server software works with PHP and MYSQL, but the best to use is Apache, which is free, interactively maintained and easy to use. I choose PHP because it s a robust, free and easy to use server-side scripting language with free online help features and improved interactivity. 3.3.7 1. MONTH OF JULY TECHNICAL EXPERIENCE (1/07/09 31/07/09) WHY TODAY S CLIENT CHOSE PHP?

PHP is open source free software that is cross-platform web scripting language that has joined Perl, ASP.Net and Java on the select list of languages that can be used to create dynamic online and robust application environments. A BRIEF HISTORY OF PHP AS A SCRIPTING LANGUAGE Version 1 of PHP was written by Rasmus Logof in 1994 and it was a set of CGI binaries in the C Programming language owing to his curiosity of maintaining his home page easier. Version 2: He released in 1995 and that was the first public release of PHP (It was called Personal Home Page Tools). Version 3: It was released in 1998 by two (2) Israeli developers (Zeeb Zaraski and Nd Gadmus) and they renamed it PHP: Hypertext PreProcessor . It s still supported by web browsers but not been improved and interactively maintained. Version 4: It was released in may 2000 and the two (2) programmers jointly formed a company called ZEND and its features actively supported updates and bugs fixing. Version 5: It was released in 2004; the latest version being developed. Version 5.2.1 was released on Feb 8, 2008 and version 5.2.2 released later the same year. One of the most significant features of PHP is its support for a wide range of databases.

2.

INTRODUCTION TO OPEN SOURCE DEVELOPMENT TOOLS

To understand open source technologies, we have to comprehend what open source software is. Opensource software is freely available source code; anybody may view the code or redistribute it. An open source software package usually contains the source code use to build it up. Access to such source code allows anybody to modify the software or create a new version of it as well as anybody can package the software and distribute it as compared to Windows tools that are sold at high rate. Software with source code in the public domain is open source as well as any software distributed under an open source license. Open-source licenses define the privilege and restrictions a licensor must follow in order to use, modify or redistribute the open source software. Such licenses may have additional restrictions such as a requirement to preserve the name of the authors and the copyrights statement within the code. There are also shared source license which have some similarities with open source, but a number of critical differences make such licenses incompatible with the open source Definition. Some software licenses define an open standard basis and may or may not be similar to open source. Programming tools (software used to develop software) which are developed and distributed under open-source licenses are called open source development tools.

Examples of open source development tools include: PHP scripting language MYSQL relational database Apache HTTP server

3.

ABOUT DATABASES AND HOW TO DESIGN BEFORE DEVELOPMENT

A database is a collection of related files having minimum redundancy and high efficiency. Usually, when we talk about databases we refer to a collection of tables. The building block of a database is the record. A record is a collection of related data treated as a single entity. For example, a hockey trading card could be called a record: it brings together the name, photograph, team, and statistics of one player. Using database terms, each of these related pieces of information is called a field: each hockey card record has a name field, a photograph field, a team field, and various player statistics fields. A collection of records that share the same fields is called a table because this kind of information can easily be presented in table format: each column represents a field and each row represents a record. In fact, the word column is synonymous with the word field, and the word row is synonymous with the word record.

When you create a database, you're creating a structure like this: ID 1 2 Title Mr Miss First_Name Surname

Victor Agughasi Boluwatife Agbayewa

The columns (ID, Title, First_Name, and Surname) are called Fields. The rows are called Records. Each record is a separate entry. In a database, you save the information in a Table. A single database can contain many tables, and they can be linked together. When the tables are linked together, it's said to be a relational database. If you just have a single table in your database, then it's called a flat-file database. Flat-file database are easier to create and understand. There are various types of databases namely: Access, MYSQL, MSSQL, ORACLE, etc. Access is flat file database as a result it cannot store large records of data compared to MSSQL and ORACLE. MYSQL RELATIONAL DATABASE MYSQL databases have a standard setup. They are made up of a database which contains tables. Each of these tables is quite separate and can have different fields etc. Though it is part of one database. Each table contains records, which are made up of fields. The process of setting up a MYSQL database varies from host to host; you will however end up with a database name, a user name and a password. This information will be required to log in to the database. If you have PHPMyAdmin (or a similar program) installed, you can just go to it to log in with your user name and password. If not you must do all your database administrative using PHP scripts. CONNECTING TO THE DATABASE WITH PHP MYSQL It is advised that you specify the username, password and database name first so that if you change any of them at a later date you will only have to change one line: $username = username ; $password = password ; $database = your databasename ; $host= local host ; At this point you may be wondering if it is insecure to keep your password in the file. You don t need to worry, because the server processes the PHP source code before sending it to the browser such that it is impossible for the user to see the script s source. Next, you will need to issue the command to start a database connection:

mysql_connect ($host, $username, $password); or mysql_pconnect ($host, $username, $password); This line tells PHP to connect to the MYSQL database server at $host (LocalHost means the server that the site is running on). The use of localhost is used unless one s web host tells otherwise. If you are given a server address (such as sql.myserver.com you should replace local host with sql.myserver.com ) using the username stored in $username and the password in $password.

SELECTING THE DATABASE After you have connected to the database server, select the database you wish to use. This must be a database to which your username has access. The following command; Mysql_select_db ($database) or die ( unable to select database ); This commands tells PHP to select the database stored in the variable $database (which has been set earlier). If it cannot connect it will stop executing the script and output the text: unable to select database.

CLOSING A CONNECTION The connection will be closed as soon as the script ends. To close the connection before, use the mysql_close() function. EXECUTING COMMANDS Now that you have connected to the server and selected the database you want to work with, you can begin to execute commands on the server. There are two ways of executing a command. One is to just enter the command in PHP. This method is used if there will be no results from the operation. The command will look like this: Mysql_query ($query) The other way is to define the command as a variable. This will set the variable with the results of the operation. The command will look like this: $result = mysql_query($query) In this part of the tutorial we will use the first way as we are not expecting a response from the database.

CREATING A TABLE

Before one can do anything with database, you must create a table. A table is a section of the database for storing related information. In a table you will set up the different fields, which will be used in that table. Because of this construction, nearly all of a site s database needs can be satisfied using just one database. CREATING A TABLE WITH PHP To create a table in PHP is a little bit difficult than with MYSQL. It takes the following format: CREATE TABLE tablename{ Fields } Primary Keys and Auto Increment Fields Each table should have a primary key field. A primary key is used to uniquely identify the rows in a table. Each primary key value must be unique within the table. Furthermore, the primary key field cannot be null because the database engine requires a value to locate the record. The primary key field is always indexed. There is no exception to this rule! You must index the primary key field so the database engine can quickly locate rows based on the key's value. PHP MySQL INSERT INTO STATEMENT The INSERT INTO statement is used to insert new records into a database table. INSERT INTO tablename VALUES (value1, value2,....) Example

DELETE FROM STATEMENT The DELETE FROM statement is used to delete records from a database table. DELETE FROM table name WHERE column name = some value

3.3.8

INTRODUCTION TO NETWORKING CONCEPTS AND DESIGN

Networks provide home users and business people with the ability to share files, resources, and mail, almost instantly, as though they resided locally on the user s computer. Computer networks have become so important in some settings that they provide the basis for nearly all business transactions.

Networks make it possible to share documents and images with people all around the world, literally at the click of a mouse. TOPOLOGIES The term network topology refers to the physical layout of computers and other equipment in the network. The most commonly used topologies are star, bus, and ring. 3.3.8.1 STAR TOPOLOGY Star networks consist of computers that are all attached to a network device called a hub. The hub s job is to receive signals (called data packets) from one computer, and relay them to all other attached computers. The computer to which a packet is addressed opens and reads the data. All other computers attached to the hub ignore the packet. In a star network, computers are attached to a central hub.

Figure 3.3.8.1 Star Topology Star networks do not always appear like the one above when they are implemented. It might be inconvenient to place a hub and cables in the middle of an office. In most implementations, the hub will be placed on one side of the room, with the cables running under tables or desks to the hub. One advantage to implementing a star network is that if a single computer goes down, the rest of the network is not affected. The same is true for the cables. No single cable in a star network can cause the downfall of the entire network. This type of arrangement also makes it easy to add new computers to the network (this is called scalability). The new computer can be set up in any free space and its cable attached to any available hub port. One disadvantage of this type of network is the extra expense of the hub itself. Furthermore, the hub can provide a single point of failure for the entire network. That is, if the hub goes down, the entire network will fail. Another disadvantage is the method of data relay. Recall that when the hub receives data from any computer, it sends it to all other computers. This is called a network broadcast, and it can cause enough unnecessary network traffic to result in slow data transmission, especially in networks with a large number of computers. Finally, star networks allow only one computer to transmit at a time 3.3.8.2 BUS TOPOLOGY In a bus topology, each computer is connected to a cable backbone (see Figure 7-2). In most cases, the backbone itself is a series of connected cable segments. At each junction in the backbone is a three-way T-connector that also attaches to a computer in the network. When one computer sends data, the packet travels along the backbone. Each computer examines the packet, but only the computer to which the packet is addressed will accept it.

In a bus topology, each computer is attached to a cable backbone.

Figure 3.3 8.2 Bus Topology 3.3.8.3 RING TOPOLOGY In a ring network, each computer is attached to the next in a circle formation (see Figure 7-3). Each computer therefore has two network ports one for the incoming cable and one for the outgoing cable. Data always travels in one direction in a ring network. When one computer sends data, that data is received by the next computer in line. That computer reads the packet address and passes the packet on. This process continues until the packet reaches its destination. In a ring topology, each computer is attached to the next in a circle formation.

Figure 3.3.8.3: Ring Topology PROTOCOLS A network s protocol is the language it uses for data transmission. The protocol includes the rules for communication, packet size, addressing, and ability to be routed. Computers on a network cannot communicate with other computers unless they are using the same protocol. The three most common protocols on Windows-based systems are TCP/IP, NetBEUI, and IPX/SPX.

TCP/IP Transmission Control Protocol/Internet Protocol (TCP/IP) is by far the most common protocol on internal networks and is the protocol of the Internet. TCP/IP requires more configuration than other protocols but is the most robust, can be used on very large networks, and is routable. The term routable refers to the ability to send data to other subnetworks, typically connected by a bridge or router. TCP/IP allows for cross-platform communication. That means that computers using different OSs (such as Windows and Unix) can send data back and forth, as long as they are both using TCP/IP. Each computer in a Windows TCP/IP network must be configured with a computer name and workgroup (or domain) and a unique IP address. An IP address is a 32-bit address that is indicated by four numbers from 0 255, each separated by a period. An example IP address is 238.14.82.31.

CABLING

There are many types of network cables, but the most common fall into one of three categories: twisted pair, coaxial, and fiber optic.

NETWORK ACCESS Network access refers to the method that computers use to determine when they can communicate, how messages are transferred, and what to do in the case of a data collision. The two most commonly implemented access methods are CSMA/CD and token passing.

NETWORK SETUP AND TROUBLESHOOTING The actual implementation of a network is a very large and complex task. It requires intensive preplanning in terms of design, access, security, fault tolerance, and scalability issues, on top of the physical implementation of the protocols, topologies, and access methods. This job is typically the domain for computer network specialists. However, there are some relatively common and simple network problems that you will be able to resolve without complete training as a network specialist. These troubleshooting issues, as well as procedures for configuring a computer to join a network, are described below.

INSTALLING AND CONFIGURING NETWORK CARDS(NIC) Most networks require the installation of NICs in each computer. The purpose of the NIC is to translate the computer s data into signals that can travel on the network and to take care of actually sending and receiving network traffic. As well as configuring the computer s NIC with the proper driver and system resources, you must also configure the computer with the settings it will need to join the intended network. The physical installation of a NIC (network card) includes physically attaching it to the motherboard, then loading its Setup or Install program (unless it is Plug and Play).

3.3.9

MONTH OF AUGUST TECHNICAL EXPERIENCE (03 - 31/08/2009)

HARDWARE AND COMPUTER MAINTENANCE Tips on the basic computer component and how to identify them were explained within the first few days of the month. These were related to how well I have been taught in school, so much time was not spent on it. I was meant to then show other IT students how the component(s) are handled and coupled together. These include; 3.3.9.1 THE SYSTEM BOARD

Each internal and external component is connected to the system board. The system board, also referred to as the main board, the motherboard, or the planar board, is made of fiberglass and is typically brown or green, with a meshwork of copper lines (see Figure 1-1). These lines are the electronic circuits through which signals travel from one component to another and are collectively called the bus.

Figure 3.3.9.1: A typical system board 3.3.9.2 THE POWER SUPPLY The power supply, typically located at the back of the computer s interior, has several very important functions. It is responsible for converting the alternating current (AC) voltage from wall outlets into the direct current (DC) voltage that the computer requires. The power supply accomplishes this task through a series of switching transistors, which gives rise to the term switching mode power supply. Another function of the power supply is to ensure that the computer receives the proper amount of voltage.

Figure 3.3.9.2: An ATX Power pack MEMORY Memory is one of the most important but perhaps most misunderstood computer components. Its function is often mistaken for that of hard drive space. Furthermore, computers use several types of memory, each with a different function and different physical form. Typically, when people discuss memory, they are referring to random access memory, or RAM. RAM RAM is also used to store instructions about currently running applications. For example, when you start a computer game, a large set of the game s instructions (e.g., how it works, how the screen should look, which sounds must be generated) is loaded into memory. The processor can retrieve these instructions much faster from RAM than it can from the hard drive, where the game normally resides until you start it. Within certain limits, the more information that s stored in memory, the faster the computer will run. In fact, one of the most common computer upgrades is to increase the amount of RAM. ROM Although read-only memory, or ROM, has an important function, it is rarely changed or upgraded, so it typically warrants less attention by most computer users. Unlike RAM, ROM is read-only, meaning its instructions can be read by the processor, but it cannot be used to store new information. CACHE

Cache memory carries out a similar function to that of RAM, but it resides directly on the processor itself or physically close to the processor on the motherboard. Cache memory runs faster than typical RAM and is able to guess which instructions the processor is likely to need, then retrieve those instructions from RAM or the hard drive in advance. STORAGE DEVICES The function of all storage devices is to hold, or store, information, even when the computer s power is turned off. Unlike information in RAM, files that are kept on a storage device remain there unless they are manually removed or altered by the user or the computer s operating system. HARD DRIVES Hard drives store data in a similar fashion to floppy drives, but they typically are not removable and have a different physical structure (see Figure 1-6). A hard drive, also referred to as a fixed drive, consists of several hard platters, stacked on top of but not touching one another. The stack of platters is attached through its center to a rotating pole, called a spindle. Each side of each platter can hold data and has its own read/write head. The read/write heads all move as a single unit back and forth along the stack.

MODEMS Modems allow computers to communicate with one another over existing phone or cable lines. Internal modems attach directly to a computer s motherboard and connect to a regular phone jack using the same connector as a phone. External modems also connect to the phone jack but are attached to the computer via an external port. External modems are typically easier to configure and troubleshoot than internal modems and have the benefit of being easily transported to another computer. PERIPHERALS The term peripheral is typically used to refer to non critical external computer components. For example, although monitors are external components, they are critical to the computer s function so are generally not thought of as peripherals. Interestingly, keyboards are considered peripherals, even though the computer will not properly boot without one. With the exception of keyboards, pointing devices, and printers, most peripheral devices are proprietary (in other words, nonstandardized). Peripherals can be categorized as either input or output devices. Input devices are used for entering data and commands into the computer; these devices include mice, microphones, digital cameras, joysticks, and scanners. Output devices are used for seeing or hearing the result of some computer process; they include printers and speakers. Others include working with teams to accomplish a web solution on WANEP Nigeria to solve Early Warning Problems like disaster, backing up of Server document, design of Cerikash Website (Static Site)

3.4

MONTH OF SEPTEMBER TECHNICAL EXPERIENCE (1 - 30/09/2009)

I was involved in several petty jobs during the month of september, assisting the chief programmer. Such jobs included creating downloadable pdf forms, installation of softwares. Most of the softwares I was opportuned to install Microsoft Vista Ultimate Edition, Adobe Studio, WAMP Server 2.0. It took roughly an hour for the installation to complete. Also I was put through the use of more CSS rules which involve the DOM (Document Object Module). In the third week of the month, I was informed that I would be working on a team development which involves interpersonal skills to demonstrate a 5-in-1 web solution for Sonagroup of Company(Maltonic and other product manufacturer. This program was to run live on the internet. This was a major challenge for me. Plans on the solution started immediately. The Solution contains CMS (discussed earlier), Online Transaction, Forum, Client Box, SMS Request. Firstly, the specifications for the solution were obtained. From the specifications, I was able to know how the database would look like. Secondly, I designed the database using the MYSQL with the aid of PHPMyAdmin. Finally, I designed the interface of the website, Client area, Forum and others using the Macromedia Dreamweaver program. I was able to communicate it to other members of the team successfully. The development spanned through to the fourth week to materialize the whole development to a keyed ending.

3.5

MONTH OF OCTOBER TECHNICAL EXPERIENCE (1 - 30/10/2009)

I was still working on the Sonagroup web solution aside other technical functionality which was assigned to me during the month of training(s). This includes handling of new and existing IT student(s) who cannot cope up with the training section. Within the First week, I was engaged in some engineering task like Crimping of LAN cables for new system purchased for staff, configuring it to the domain of New Horizons, repairs of system to relieve the supervisor of much stress. That was successful. In the third week of the month, I was taught how to configure CISCO routers and how setup some administrative privileges such as hostnames, banners, access-list e.t.c This includes the finalization of the Sonagroup implementation and demonstration at Ikeja and SangoIbadan for their IT Department and other related staff. This was a good month for me.

3.6

MONTH OF NOVEMBER TECHNICAL EXPERIENCE (2 - 30/11/2009)

I was involved more in system troubleshooting; web management for client, training of clients and students, support for New Horizons Ibadan Intranet Study designs. The second week, I was involved in

more training section owing to the fact that I was about leaving the company, recruitment process and how to detect a good IT Specialist with other general support for Data Entry Officer(s) The last two week(s) involves the development of new solution for Unity School Ejigbo (Osun State). The project entails tracking system and website preferences.

CHAPTER FOUR ACTIVITIES, PARTICIPATION AND CONTRIBUTION 4.0 ACTIVITES

My activities in the Technical Unit of the organization for the scheduled 24weeks (6month) included Software and Hardware Support (both In-House or Client-end), Application Development, Training of IT Student, Training of Personnel and Data Entry Clerk from basic to intermediate level, Purchase of IT materials which includes Books and Hardware Device(s). Maintenance and Added Online Support for Client were daily office routine as well as introduce any new IT Student to the Workflow of the Organization and Hardware Support for the in-house Staff. 4.1 PARTICIPATION

This include my involvement in various principal project for client such as modules on each project (Module is a fragment of code that is frequently used within an application such as Database Design and Connection, Insertion Snippets, Login Query etc), Network Adjustment, Printer Communication over Network, Network Cabling, Installation of new system and formatting of old ones etc. Simulation of Advert on www.wetherheadsoutdoor.com web applications. This module helps visitors to see how their advert picture or image will look like so as to know the kind of the view or distance of the board they will request for. This is with the aid of CSS and PHP Language. 4.2 CONTRIBUTION(S) TO THE ORGANISATION

During my period of IT at the New Horizons Ibadan, I was involved in assisting the company ranging from graphics, application design, demo project(s), Client-Support, Database Management, Maintenance of our clients website and general support.

4.2.1

GRAPHIC DESIGN

With the use of Fireworks and Photoshop which are graphic tools for web application, I was able to design different Login screen, Templates and Manual Coverpages for clients. Macromedia Fireworks 8 is

the definitive solution for professional web graphics design and production. It is the first production environment to address and solve the special challenges facing web graphics designers and developers. Fireworks integrated with other Macromedia products such as Dreamweaver, Flash, FreeHand, and Director, as well as your other favorite graphics applications and HTML editors, to provide a truly integrated web solution. Files are saved here with PNG, JPEG, GIF, etc. Files that are saved with PNG can be edited while those that are saved with JPEG or GIF cannot be edited. 4.2.2 ONLINE TRANSACTION DEMO FOR SONAGROUP WITH CMS (MANUFACTURER OF MALTONIC PRODUCT)

It is a solution that helps their customer to transact and request for product through the internet and their mobile phone. It is a 5-in-1 application. It consist their Website(Dynamic with CMS), Forum, Client Box, Mobile Transaction and E-Recuitment How it works?

1.

User makes online purchase. (See diagram above for each numbered step.)

The transaction information is encrypted and transmitted to the secure server, which is linked via a dedicated leased line to the processing network. 2. 3. A program within the Payment Page sends data to the T.P. (Transaction Processor). T.P. checks User's account to verify funds and identity.

It Processes the information sent to the i-manager who approves and refers it back to the marketing manager for proper action to deliver goods. 4. 5. 6. 7. 8. 9. 4.2.3 T.P. gets results back. T.P. returns results to webpage informing user of purchase OK'ed or denied. For OK'ed purchases only, T.P. sends details to a Settlement Processor, (SP) S.P. sends authorization to User's bank to send Naira to Sonagroup bank. User's bank sends funds to Sonagroup s bank. Sonagroup receives funds and accounting details of transaction. E-RECURITMENT

4.2.4

PROBLEMS ENCOUNTERED DURING MY PROGRAMME

During the training, the following problems were often encountered Persistent error pages on our PHP scripts once the index page is required There were times when I was short of ideas owing to my inexperience. During such periods, it took encouragement from my Industry-based supervisor and my colleagues to get my way around such problems. Complex Query were often to ambiguous for me to understand. I encountered a major problem during the implementation of the polling software. I was not getting the expected results at all. The solution was not working and I was completely disappointed. By the mid of the third week of October, I was still struggling with how to get the software done, still there was no result. By the end of the third week, I was advised by my industry-based supervisor to check from the internet, possible ways of getting the solution done. I did just what he said and I got some tutorials on polling solutions, designs and implementation. By the time I applied the ideas suggested in the tutorial, the solution worked. I encountered problems with the CISCO 2600 ROUTER when I tried setting up administrator privileges such as message of the day and VLANS As a result of no I.D. card to justify that I was a SIWES student I was often harassed.

CHAPTER FIVE 5.0 CONCLUSION AND RECOMMENDATION 5.0.1 CONCLUSION

Though stressful it was, owing to hectic transportation situation I had to undergo daily on my way to and from work, the 24-week industrial training at New Horizons System Solutions Ibadan was a very benefiting one. It gave me the opportunity of learning lots of things I cannot possibly put down in this report. I now strongly believe that occupational experience for students via the student Industrial Work Experience Scheme (SIWES) is of great advantage which made me appreciate more of all the advice from my HOD and all the lecturers in the Computer Science department. I am grateful for the opportunity of gaining such experience as it serves as an eye-opener for me in the computer industry compared to the previous computing knowledge I had before I underwent the exercise. I had gained so much practical knowledge.

5.0.2 RECOMMENDATION(S) TO IT COORDINATING UNIT I will like to use this opportunity to plead on behalf of the oncoming 300 level that more efforts should be made to establish relationships with more software-oriented IT firms so as to make it easy for them to get an IT placement that will have more relevance to their course of study. TO THE IT COMPANY They should continue their practice of assisting students on Industrial Training. I was given a very warm welcome and enjoyed my stay as Industrial Training Student.

TO THE DEPARTMENT The Department of Computer Science, MOUAU has right from time, been very dynamic, compared to department of computer science in other schools across the nation. This really has made us stand-out amongst colleagues from other schools. I urge them to keep re-engineering the syllabus to reflect recent technologies in the industry and help build a multimedia training environment for courses that needed practical illustrations with the use of Projector (compulsory).

REFERENCES: 1. HTML Introduction to Html 4.0; New Horizons, 2005 2. PHP

www.php.net SAMS teach yourself PHP in 24Hours, July 2006 PHP online documentation 3. SQL

Mysql online Documentation www.devshed.com 4. DREAMWEAVER

Dreamweaver Help Features Dreamweaver Bible Dreamweaver 8.0 Level 1; New Horizons, 2005 5. PHOTOSHOP

Photoshop Help Features Adobe Photoshop CS4 Level 1; New Horizons, 2005

APPENDIX 1) WANEP HOME PAGE

WANEP Early Warning System

Zones Incidence

South-South

South-East

South-West

North-Central

North-East

North-West

FORM 8

INDUSTRIAL TRAINING FUND MIANGO ROAD, P.M.B. 2199, JOS

STUDENTS INDUSTRIAL WORK EXPERIENCE SCHEME END-OF-PROGRAMME REPORT SHEET

PART A (To be completed by the Student) 1. (a) Name in full: (b) Registration/Matriculation Number: (d) Year of Study (c) Course of Study: (e) Name of Institution:

2. (a) Name & Address of the Establishment of Attachment:

(b) The Department/Section: (c) Period of Attachment: From: To: k Number of Weeks:

3. Total Allowance received by Student: N 4. Brief outline of experience/relevance of training provided:

5. (a) Where were you attached last? (If applicable)

(b) Total number of weeks engaged on industrial attachment: Signature of Student: Date:

PART B (To be completed by the Employer) Do you agree with the student's comments in items 3 & 4 in Part A? YES/NO If No, please comment:

State total amount paid to student as ITF allowance: N In words: Source: www.siwesdata.org

6. Please assess the student's overall performance by ticking the appropriate VERY GOOD GOOD SATISFACTORY POOR

7. Will you accept the student in an future attachment? YES/NO If No, please comment:

8. Is your Company/Establishment in a position to offer this student a job in the future?

9. Name of Reporting Officer: Signature/Stamp:

Designation/Rank: Date:

N.B. Forms duly completed by employers should be forwarded to/collected by the respective institutions under seal:

PART C (To be completed by Institution) 10. Indicate number of visits: 11. Give your assessment of facilities provided by Company during visit(s) by ticking: STANDARD ADEQUATE RELEVANT NOT RELEVANT

12. Give your impression of the student's involvements in training: FULLY/PARTIALLY

13. Assessment of student's performance (Grading "A, B, C, or D" has to be stated).

Full Name of Supervisor: Department/Discipline:

Status:

Signature/Stamp: Date: N.B.: This form is to be returned to the ITF on completion by the respective institutions under seal. Source: www.siwesdata.org

Você também pode gostar