Você está na página 1de 33

MAKERERE

UNIVERSITY

COLLEGE OF COMPUTING AND INFORMATION SCIENCES


SCHOOL OF COMPUTING AND INFORMATICS TECHNOLOGY
FIELD ATTACHMENT 2015 REPORT BY:

. .
REGISTRATION NUMBER: ...
STUDENT NUMBER:
Email: ...
PLACE OF TRAINING:.
SUBMITTED IN PARTIAL FULFILMENT FOR THE AWARD OF
BACHELORS DEGREE IN COMPUTER SCIENCE
OF MAKERERE UNIVERSITY, KAMPALA
AUGUST, 2015
Academic Supervisor:.

DECLARATION;
I hereby declare to the best of my knowledge that this report is as a result of the training
activities and knowledge I have acquired from my place of attachment and that all
the content of this report is my own original piece and it has never been submitted to any other
institution or department for any academic award.

Student name

........

Signature

Date

APPROVAL
The report has been submitted for examination to the department of Computer Science under the
School of Computing and Informatics Technology Makerere University, with approval of my
field supervisor.

Signature

NAME..
FIELD SUPERVISOR
DATE
..

ii

DEDICATION
I dedicate the success of this work to my parents who have supported me materially, financially
and spiritually throughout my course and my entire life. To my friends and coursemates for their
constant support academically, spiritually, socially and psychologically.

iii

ACKNOWLEDGEMENT
I thank the almighty God for giving me the strength to work and acquire more knowledge at
. He has given me life and the courage acquire several skills.
I also appreciate the tremendous and selfless assistance from my field supervisor ........I convey
my heartfelt appreciation for the advice and corrections from the beginning of this industrial
training to the end. I really appreciate all his efforts throughout my training. I wish to thank in a
special way my academic supervisor . for his inspiration and
encouragement. I also thank my fellow workmates who have tirelessly assisted me in
understanding my course more and successfully building it up. I cannot forget my entire family
for the moral, physical and financial support offered during the course of this study. I can not
forget to thank the School of Computing and Informatics Technology for granting me such a
wonder moment to train at one of their highly trained
I highly acknowledge the services rendered by my field supervisors colleague. I thank
Mr. Mr .... and for the great work done. They have really enabled me
gain more practical skills under the Computing and IT field.

iv

ABSTRACT
Internship is a period of time during which a student gets practical experience in his or her
career. The School of Computing and Informatics Technology on award of the Bachelors degree
of Computer Science in Makerere University requires second year students at the end of
academic year to undertake industrial training .This training is intended for acquisition of more
practical skills and knowledge to the students.
This report includes all activities I carried out during the entire training at the CoCIS Makerere
and these include installing operating system, Computer Hardware and maintenance, setting up a
network ,routing ,switching, wireless networks, cable termination, server management applying
system updates, web hosting, file sharing, resource sharing ,network trouble shooting and server
services.
This report shows the experiences that I have gained in my training and also shows the
challenges that I have encountered during the course of my training.
It also gives the conclusion and also recommendation to School of Computing and Informatics
Technology, references for the Organization at which I undertook my training in compiling this
report and a list of appendices page.
The activities that I have written in this report have enabled me to acquire more practical skills,
having more experience, confidence, professional skills and competence in my career field.
On addition to the training, I have learnt team work, time management, patience, working
without supervision and all those have changed me positively. The purpose of the field
attachment was to enable interns gain more knowledge and acquire practical skills.

LIST OF ACRONYMS

IT-

Information Technology

CoCIS- College of Computing and Information Sciences


CIT- School of Computing and Informatics Technology
OS-

Operating system

IDE- Integrated Drive Electronics


RAM- Random Access Memory
CD-

Compact Disk

CPU-central processing unit


RJ- Registered Jack
IP- Internet Protocol
WAP -wireless access point
BIOS- Basic Input Output System
LAN-Local Area Network

TABLE OF CONTENTS
vi

DECLARATION;.............................................................................................................................i
APPROVAL.....................................................................................................................................ii
DEDICATION................................................................................................................................iii
ACKNOWLEDGEMENT..............................................................................................................iv
ABSTRACT....................................................................................................................................v
LIST OF ACRONYMS..................................................................................................................vi
TABLE OF CONTENTS...............................................................................................................vii
CHAPTER ONE..............................................................................................................................1
1.0

Background...........................................................................................................................1

1.1

Introduction...........................................................................................................................1

1.2

Profile of CoCIS Makerere..................................................................................................1

Vision statement:.............................................................................................................................2
To be leaders in computing and ICT training research and service internationally.........................2
Mission statenent:............................................................................................................................2
Values statement:.............................................................................................................................2
Field attachment activities...............................................................................................................7
2.0 COMPUTER HARDWARE AND MAINTENANCE...........................................................7
Power supply:..................................................................................................................................7
2.1 NETWORKING....................................................................................................................10
3.1.1 Challenges encountered during the training.........................................................................17
CHAPTER FOUR.........................................................................................................................18
4.1.0 Conclusions...........................................................................................................................18
4.1.1 Recommendations.................................................................................................................18
APPENDICES...............................................................................................................................20
Appendix 7: Internship schedule...................................................................................................24
vii

viii

CHAPTER ONE
1.0 Background
Industrial training is a period of time during where a student or a new graduate gets practical
experience in a job. The training exposes the interns to working environments and gives them a
chance to acquire more skills to be employed in the practical and competitive world. Industrial
training should thus be undertaken by student to enhance their practicability at work.

1.1 Introduction
This report involves activities during my industrial training at CoCIS Makerere. It contains
activities conducted during my stay and work at the organization. These activities among others
include cable termination, server management, applying system updates, file sharing, resource
sharing, network trouble shooting and server services.
1.2 Profile of CoCIS Makerere
The College of Computing and Information Sciences Makerere University was opened on 13th
December 2010. It is made up of the School of Computing and Informatics Technology and the
East African School of Library and Information Science (EASLIS). COCIS is one of the largest
computing and ICT training, , research, information science and consultancy colleges in Africa
has maintained its place as a recognized institute worldwide. It is committed to delivering
standard services under Computing, Library, Records and Information Sciences and attracts both
local and international students. COCIS boasts of the state of the art infrastructure including
lecture theaters, giant computer laboratories, specialized computer laboratories and a college
library. Its three buildings can accommodate over 10,000 students in one sitting.
The established academic staff strength of the College is about 300 teaching staff including 30
visiting and local professors. Over twenty of these staff members hold doctorate, with many
others
in
advanced
stages
of
completing
their
PhD
studies.
Formation of the College of Computing and Information Science is based on the criteria of
relatedness, compatibility, interdisciplinary, capacity to form a viable college, synergy in mission
and objectives, potential for modularization and baseline resources (number of students,
programmes, academic staff, space, library and computing facilities) and other capacity
indicators considered by the National Council for Higher education (NCHE).
This merger has seen a pool of resources and facilities like computer laboratories, specialized
laboratories, book libraries, journals, cameras, and personnel both administrative and academic
staff.
The college is an active centre for Research and Outreach. It produces a journal, the International
1

Journal of Computing and ICT Research (IJCIR). It also hosts an annual international
conference, the International Conference on Computing and ICT Research (ICCIR). The College
is interested in in-depth research in the areas of Machine learning, Security, ICT for
development, Model and web based systems, E-Learning, Mobile computing and
Communication, Documentary Heritage , Records Management Education, Information Policy
and Publishing, Knowledge Management, ICTs for Libraries and LIS Curriculum.
The College of Computing and Information Sciences is poised to continue being a modal college
in Makerere University and the region, by providing first class teaching, learning and research
that directly answers to both local and international demands

Vision statement:
To be leaders in computing and ICT training research and service internationally.

Mission statenent:
To provide first class teaching reach and services in computing and ICT responsive to national
and international needs.
Values statement:
The college of computing and information technology is an innovative and industry oriented
college, persuing excellence, teaching, learning, writing edge value added research and
consultancy, community outreach as well as providing a vibrant student life
1.3 Projects
The Department of Innovations and Software Development has a core team of full-time
employees who have considerable experience in their relevant areas and carry out extensive
software development activities in accordance with detailed business designs and plans.
Some of the Projects currently undertaken are: Students' Exam Grading, Epi Handy, Ossis,
Online Student's Course Selection, Students Results Management System, MobileHRS, Epi
Handy Mobile, HEITML, OMEVAC, OpenMRS, etc.
1.3.1 Internal Projects
2

1. Students Exam Grading


A simple application that exports two best done course marks and the exam mark from each
Lecturer's file to a single Excel file, calculates the Grade Point Average for each semester,
Cumulative G.P.A to present time and comments on students grades.
2. MOBILEHRS
This is a collection of components, which enable data collection and analysis for Iganga DSS
site. The data can also be collected using PDAs where MobileHRS uses an EpiHandy module.
3. STUDENTS OSSIS
This is an Open Source School Information System for managing Secondary and Primary
Schools by enabling efficient storage of student and staff records for quick and easy retrieval,
together with automating tasks like report card and teaching time table making, and more.
4. ONLINE STUDENTS COURSE SELECTION
A web-based application used by College of Computing and Information Sciences
undergraduate students to choose Elective courses they wish to undertake for each semester.
They also get to review previous courses completed, which will help the administrators find
loopholes in a specific course. It assists lecturers of elective courses to plan in advance according
to the number of students that have registered for their course unit. The administration can also
post student results online so that the students can have easy access to their results.
5. STUDENTS RESULT MANAGEMENT SYSTEM
This is for CoCIS students results processing. The CoCIS Software Developers, Department of
Innovations and Software Development are currently working on a much more powerful and
dynamic system to support lecturers and students.
6. ELECTRONICS VOTING SYSTEM

1.3.2 External Projects


3

7. MOBILEHRS
A mobile client for data collection tool for DSS (Demographic Surveillance) sites running on
PDA (Personal Digital Assistant) with Windows CE specifically for household information. It is
based on epihandy forms engine. It synchronizes data to the HRS server. Makerere University
College of Computing and Information Sciences in conjunction with the University of Bergen,
Norway and University of Southern Maine, USA provide software development assistance on
this project.
8. EPIHANDY MOBILE.
It is a generic data collection tool for mobile phones. It utilizes the new mobile technology to
improve data collection and handling processes. It is a new solution that revolutionizes the way
in which surveys and data collection is done in Health and development research. Makerere
University College of Computing and Information Sciences in conjunction with the University of
Bergen, Norway provides software development services to extend the tool.
9. HEITML (On-going)
It is a framework for developing web application. Makerere University College of Computing
and Information Sciences represents that it has expertise in the area of web application
development with heitml and javaScript, and is able to provide original software development
assistance to HEI InformationSsysteme GmbH, Germany.
10. OMEVAC (On-going)
A proposal titled 'OMEVAC (Open Mobile Electronic Vaccine Trials)', an interdisciplinary
project to improve quality of vaccine trials in low-resource settings was accepted for funding.
The project Primary objective is to develop OMEVAC, a complete secure, mobile and electronic
system for data collection and management in vaccine trials, from source to publication and
using and complying to international standards and requirements.
11. OpenMRS (On-going)
This is a free opensource clinical data collection system. CoCIS has carried out the pilot
implementation of it at Mbarara, Masaka and Mbale hospitals. CoCIS is also actively involved in
developing additional modules for that.
1.4 PHEA Projects and Grants
CIT staff members won two competitive research grants in May 2007 from the Partnership for
Higher Education in Africa (PHEA). These include:
a. The project Survey Data Collection Using Mobile Phones by Mr. P. Bagyenda
involves carrying out research on how mobile phones can be used to collect information
that is vital in Health management in the African/rural setting. With mobile phones fast
4

becoming the most immediately accessible ICT device as a result of the benefits and
convenience they offer at low cost. By leveraging the accessibility and low-cost of
mobile phones and the benefits of electronic data collection, efficiencies can be derived.
With the grant from PHEA, researchers are able use mobile phones for data collection.
This project is on-going.
b. Another project by Prof. H.N. Muyingi Low-class Communities Income-generating ebusiness: Outreach Action-driven e-business for Rural and Art-craft Women
Communities, also received a grant from PHEA. The main objective of this project is to
harness ICT as a driver of socio-economic development within low-income communities
in Uganda by collaboratively helping to increase the income generation of participating
groups of women selling African artifacts and cultural goods around Kampala and
organized in cooperative or small or medium enterprises (SMEs), by use of appropriate
web technologies.
Furthermore, this project will allow rural communities to have access to cash money from
any mobile telecommunication end-point service providers (TESP) in their immediate

1.5

The CoCIS Makerere Structure

The College comprise of two schools that is School of Computing and Informatics Technology
(CIT) and East African School of Library and Information Science (EASLIS). The College is
managed by an administrative team led by a College Principal. Each School is headed by a Dean.
The School of Computing and Informatics Technology (CIT) has four academic departments and
the East African School of Library and Information Science (EASLIS) has two academic
departments. The College has an academic staff establishment of about 330 members.

College of Computing and


Information Sciences(CoCIS)

School of Computing
and Informatics
Technology

E.A School of Library


and Information Sciences

Department of
Computer science

Department of
Information
Technology

Department of
Information
Systems

Department of
Networks

Department of
Records and
Arcives
Management

Department
of Library
and
information
sciences

Centre for Professional Skills


Development

Tele-Education Centre

CHAPTER TWO

Field attachment activities


This chapter consists of the various activities undertaken during the course of the industrial
training
The activities carried out were; Computer Hardware and maintenance, Networking, Server
management, Software installation and Server Management.
6

2.0 COMPUTER HARDWARE AND MAINTENANCE


Computer hardware is defined as the physical components attached to the computer to enhance
its functionality.
The training began by identifying the different hardware components attached to the computer. I
was able to disassemble the System unit and the following are some of the components I found
in it; mother, board Central processing unit (CPU), connectors, c-mos Battery, power supply,
RAM Chips, hard disk, heat sink among the others.
Power supply:
I learnt that a power supply is a device that supplies current to the motherboard or power supply
unit normally refered to as PSU. It has a power supply slot and cables that are used to
disseminate power to other parts of the motherboard.
Motherboard:
A motherboard is the central printed circuit board (PCB) in many modern computers and it holds
many of the crucial components of the system. The motherboard is also known as the main
board or the system board and it also provides connectors for other peripherals.
Processor:
The CPU is secured to the socket on the motherboard with a locking assembly.
I learnt that the northern bridge has RAM slots and then the southern bridge having expansion
slots.
On addition to the processor, motherboard and the power supply, I looked at the different ROM
drives among which we have the CDROM, CDW, DVDROM, DVDRW and then the FLOOPY
DRIVE.

system unit.
DVD-ROM

ram chips

hard disk

processor

Motherboard

power supply

I learnt more about the IDE connectors, SATA and the jumpers.
I learnt how to come up with a master and slave hard disk. The hard disk with a jumper
becomes the master and the one without the jumper becomes the slave.
Random-access memory (RAM): It provides temporary data storage for the CPU while the
computer is operating.
The various types of the random access memory which I learnt about are SDR and DDR.
SDRAM refering to Synchronous Dynamic Random Access Memory and DDR standing for
Double Data Rate. I learnt that DDR perfoms better work than SDR and the difference between
DDR and SDR is that the DDR has one notch and SDR has two notches. I learned how to
identify a computer with no RAM or when the chip is not fixed properly and that is according to
the beep codes generated when rebooting.

2.0.1 Troubleshooting a computer with faulty RAM:


I learnt how to troubleshoot a computer with faulty RAM and the steps involve shutting down
the computer, disconnecting the power, opening the system Unit and removing the RAM chip(s),
8

testing the RAM chip in a working computer if it doesnt work then exchange with a working
RAM, ensuring that the chip(s) are fixed properly then closing the System Unit and powering the
computer again.
2.0.2 Software installation:
Installation of Windows XP Operating system:
These are the procedures I learnt on how to install windows XP operating system.
The computer should be capable of booting from the CD-ROM drive since the windows XP CDs
are bootable.

Switch on the computer and insert the XP CD in the CD-ROM.

Boot from CD-ROM.

Choose whether you want to install windows XP or repair the existing one. In our case of
installing a fresh copy of XP, press enter key and the installation begins.

Accept the user license agreement and failure to accept with the license agreement
installation can not proceed.

The next screen displays the available partitions from which the operating system can be
installed and prompts to select the partition you want are available. Press enter key to
move to the next screen to select a file system.

There are two file systems available and those are the File Allocation Table 32 (FAT32)
and New Technology File System (NTFS) being the best since it allows security features
and stability that are not possible with FAT32.You then select the file system and press
F10 key to run.

Installation will continue until you reach another reboot. The process proceeds for 39
minutes.

Follow all the steps prompted and those are basically settings.Activate the software and
enter your preferred username.
9

2.1 NETWORKING
Networking refers to the exchange of information or services among individual, groups or
institutions over a given network. Networks are systems that are formed by links.
I learnt the different different classes and the different types of modes and their respective signs.
The modes were as follows;
configuration/Global mode switch (config)#
User mode switch >
Privilege mode switch#
I learnt some of the commands used when working under the above modes.
Under the User mode, we have commands like:ipconfig :- for showing the ip address of the computer in use.
show :- for showing the commands used so far.
ping :- for pinging a given ip address.
Other commands were nslookup, trace route among the others.
Under the Privilege mode, we have commands like;
ping, trace route, copy run start, delete flash, show commands.
I learnt Cable termination. This involves coming up with the different types of cables
considering the two standards used namely Standard A and B. The cables terminated were the
Straight through, the console or roll-over and the Cross over cables
a) Straight through connects unlike devices and it has standard A on both sides.
b) Cross over connects like devices and it has standard A on one side and standard B on the
other side.

10

c) Rollover for management configuration of network cables. An example could be


configuration of a switch and router.
d) The Serial cable which connects one network with the other.
The color codes for each standard are as follows:Standard A: White Green, Green, White Orange, Blue, White Blue, Orange, White brown,
Brown respectively.
Standard B: White Orange, Orange, White Green, Blue, White blue, Green, White Brown,
Brown respectively.
The classes that are used under networking are A, B, C, D and class E.
2.1.0 Class A addresses are specified to networks with large number of total hosts. It also ranges
between 1 - 106 and its first octet is for the network ID and the next three octets reserved for the
host.
2.1.1 Class B addresses are specified to medium sized of networks. Ranges between 107 191
and its first two octets for the network ID and the last two reserved for the host.
2.1.2 Class C addresses are used in small area networks. It ranges between 192 223 and uses
the first three octets for networks ID and the forth one for the host.
2.1.3 Class D is used for multicasting and that refers to the sending of a group of messages to
various people. It ranges between 224 239.
2.1.4 Class E being reserved for scientific research and ranges between 240 255.
Each class has four octets and that is thirty two bits for every class.
I also learnt the types of addresses and they include private and public.
Public addresses are bought from the Internet Assigned Number Authority (IANA) and that is
the body for assigning addresses whereas Private addresses are assigned freely and do not
collide.
11

I also learnt how to subnet, how to come up with a network topology and learnt the various
routing protocols which are as follows:2.1.5 Routing Protocols
Routing Information Protocol (RIP): It has version 1 and 2
Open Shortest Path Fast (OSPF): It is another routing protocol and the last one being EIGRP.
Those are the three routing protocols configured under routing. I was also able to learn the
DHCP and DNS configurations.
2.1.6 Switching:
I learnt how to assign VLANs in a given network, the three categories of Access List Control
namely: Standard Access Control List which is configured closest to where traffic is heading.
Extended Access Control List which is configured closest to the destination.
Named Access Control List which is another type of access control. Access control
involves denying a given computing device from reaching or accessing the other for example a
denying a computer from accessing a given router.
I learnt how to one can access the others computer in the same LAN provided his ip address.
I was able to run commands under the windows prompt terminal and among the others were the
ping command that can enable one to access the others computer given his ip address. An
example could be ping 192.168.1.1. It can also be used to ping a given website when the
packets of data being sent are low that is to say when the web browser takes long to respond.
One can type ping cisco.com under that terminal so as to increase the packets being sent.

12

2.2 SERVER MANAGEMENT


A server is a computing device that responds to client requests. We learnt the various types of
servers that is to say database servers, mail servers application servers, web servers, among
others.
2.2.0 Windows Server 2003
We installed windows server 2003 and Ubuntu Linux server.
We installed DNS and DHCP servers and I learnt how to configure them, assigning rights to the
various hosts.
We assigned computers in a workgroup and in a domain, configured DHCP and DNS on the
Windows Server.
I learnt how to create several user accounts under Windows and Linux operating systems.
2.2.1 Server services
We were introduced to server services under Windows and Linux .The services include network
services, web application services, database application services.
Installed dns and bind9 in linux and learnt shell scripting.

13

CHAPTER THREE

3.1 Emerging issues and experiences


3.1.0 Experiences /Emerging Issues:
This chapter covers the discussion of experiences and challenges I encountered during the
industrial training. I was able to gain experiences in various fields. I learnt through the full
commitment and involvement as well as with supervision. It emerged that I had the theoretical
knowledge more than the practical and I had to concentrate on hands in training which led to my
perfection.
Practically, I learnt how to fix RAM chips, the processors, the CMOS battery and other
hardware components onto the motherboard.
I learnt how to replace faulty hard disks, installing an operating system and that is
Windows and Linux.
I learnt how to repair and update several operating systems which included windows XP
professional and Linux operating systems.
I learnt how to configure printers and enable people to share a printer and documents.
I learnt how to subnet and that is getting an ip address and assign it to different networks
(subnetworks) from which we can generate ip addresses.
I learnt some commands that can enable me to check the ip address of the computer in
use.
I learnt how to terminate cables, the two standards used and when each is used.
I learnt how to come up with a network topology, assigning ip addresses to different
computers, hubs and networking devices.
I learnt the routing protocols and when each is used.
I learnt the static and dynamic configurations, configuring DHCP on the various routers. I
learnt Remote Access Control that is how I can access a given computing device on a
dispersed network.
14

I learnt Virtual Local Area Network (VLAN) configuration and configuration of switches.
I learnt Access Control List, the three categories that is Standard Access, Extended
Control List and Named Access List.
I learnt how to use computers in a workgroup and a domain. We configured DHCP and
DNS on the Windows Server 2003.
I learnt how to install a Linux Server and that was Open Suse Linux Server.
I learnt shell scripting under Linux and how I can come up with scripts of various
categories using some of the basic linux commands.
I learnt different commands that can enable me to check my computers ip address using
Windows and Linux operating systems. I also learnt how to create ip addresses for an
upcoming company provided the number of branches or subnetworks they want .
I learnt the two types of subnetting and that is Class Less Subnetting which we were
recommended to use because it does not leave unutilized ip addresses in comparison to
Class Full Subnetting which wastes ip addresses.
I learnt troubleshooting a VLSM addressing design and Inter-VLAN routing.
Under server management, I also learnt a lot. I learnt the basic commands for Server
configurations, how to use Vi, Vim and Nano as the editors in the Linux command
terminal. Under Server management, I learnt how to copy files from the computer acting
as a server to other client computers as well as assigning them rights using the server.
Among the other commands, I learnt some that can enable me to create a new user
account used in case we can not login as the administrator to access full rights.
I have also learnt team work, being Honest, Creative and innovative and Modest as well.
I had an introduction to system administration and networking in my recess term but we
did not get enough practical sessions. I have gained more in this training because I
personally could not terminate cables, connecting networking devices like routers,
switches and computers in a network. I really thank my place of attachment for the lots of
skills that they have enabled me to acquire.
15

We covered server services and I was able to configure the backup domain controller and
installation with LDAP and Samba on Open Suse Server.
I also learnt how to set up idap client in Linux and how to use PAM to activate the
directory to login.
I was exposed to new technology for example the internet access point. I learnt that it is
through that internet access point that wireless is connected. I learnt that the WAP can
work as a four port switch and as a router
Under sharing resources and files, I learnt how to block ones password and spreading a
virus to ones documents.
Apart from windows XP installation, I also learnt how to install programs on the
computer and uninstall them.
CoCIS Makerere has guided me perfect in that I been able to attain the following values
during my stay at the place. These include:
Competency
Hard work and team work
Solidarity
Respect
Creativity and innovation
I met new individuals and interacted with them. This has improved my interpersonal
communication skills.
During my training, Mr Seth Muhairwe my field supervisor encouraged my to be
optimistic and to be eager in acquiring more skills. In addition he encouraged me to be
diverse in all the IT fields and that I can earn a living as an IT specialist. He said that
mere troubleshooting computers for my customers can help me earn. I can also come up
with an internet caf since I have got enough knowledge about networking
16

In addition, CoCIS has trained me to be a confident person and to be prepared to share


the knowledge with others at any time. This has been emphasized through our constant
presentations and assignments that we have been having. I was really motivated because
previous I was shy. At times I found that I could not share the knowledge that I had with
my colleague yet I was knowledgeable about the topic of discussion. I eventually gained
confidence after several public speaking trials. I do believe that every one under the IT
field has to gain confidence because such situations arise.
3.1.1 Challenges encountered during the training

Some of my workmates were not social, some were mean and never wanted to
share their knowledge with others yet they seemed to be more skilled.

I have found it costly commuting from my place of residence to go to CoCIS


Makerere for my training. It was so hectic and expensive but in any case I do not
regret all the times I have been at CoCIS because I have gained a lot of skills.

I did not get to interact with all the IT related activities due to the short scheduled
internship period. IT being wide is hard to exhaust but I have gained a lot.

CHAPTER FOUR

4.1 Conclusions and recommendations


17

This chapter covers conclusions and recommendations I have come up with during my entire
period of the industrial training at CoCIS Makerere.

4.1.0 Conclusions.
The main Purpose of the industrial training has been achieved to a greater extent. I have gained a
lot for this part of my course load that is to say what I have acquired in the past two years all
being done practically. I do believe that the practical skills I have acquired in this training will be
of great importance as I pursue my career. I have met different personalities and as a result I have
been able to respond to each one of them accordingly. I have learnt how to handle such people
when at work. The training has also helped me discover my strengths and weakness as I struggle
to become an IT specialist.

4.1.1 Recommendations
The industrial training should be emphasized in order to solve the problem of students knowing
only the theory part minus the practical skills.
Enhancement in training facilities, would enable trainees have more practical training sessions
and able to demonstrate their skills to the interns.
The scheduled period offered by the faculty for industrial training should be noted carefully
because some areas of placement take long to start the training hence interns lose out. This would
be made possible through having partnerships with those places of placement so that as soon as
the internship period starts, they take up students from the university for the training. This will
reduce the time wasted by students in getting placements and also the placements to start off
immediately. The students will then be able to train for the ten weeks as stipulated by the
university.

References
18

Google http://www.google.co.ug/search/accessed 16th, June, 2014


Ehow http://www.ehow.com/http:/accessed 16th, June, 2014
Offerfamilyhttp://www.135.ibm/srvices/us/index.w.ss/offerfamily/gts/a1027691/accessed

16th,

June, 2014
Englander, I. (2000). The Architecture of computer hardware and systems software. John
Wiley, USA, p272.
http://www.manageengine.com/products/applications_manager/system-management

APPENDICES
Appendix 1: The procedures that were undertaken during repairing of Windows XP
operating system are discussed below;
19

We set the CD-ROM drive as the first boot in the computers Basic BIOS, inserted a
bootable Windows XP Compact Disk in the CD-ROM Drive, saved the changes and
we restarted the computer.
At booting, we pressed F12 to boot from CD-ROM, then pressed any key on the
keyboard and the windows setup started.
We either used the repair console or the normal windows setup depending on ones
internship training group. We pressed the ENTER key to continue.
We pressed F8 key to accept the terms and conditions.
After the setup detecting the previous windows installations, the repair option was
given.
We then pressed R option to begin the repairing.
All necessary files for the setup were copied to the drive that contained the preinstalled Operating System and then rebooted to begin installation.
We then followed all the steps until the repair was complete.
Those were the steps involved in repairing Windows XP operating system.

Appendix 2: The steps that I undertook during the termination of cross over cable include
the following;
I held the cable and used a crimp tool blade to cut both ends of the cable.
20

I arranged the cable wires in their right order starting with white orange, orange, white
green, blue, white blue, green, white brown and brown(standard B) on one side and white
green, green, white orange, blue, white blue, orange, white brown, brown(standard A) on
the other end respectively.
Straightened them and used a crimp tool blade to cut them at the same level.
Held the RJ45 connector while the clip was facing downwards, pushed in the wires

gently until they touched the surface of the connector.


Used a crimp tool to clip the RJ45 onto the cable so that the wires are held properly.
Crimping was done on both of the cable.
I then used a network tester to test for connectivity of the cable.
The network tester beeped green from top to bottom (1-8) and this showed that I had
successfully terminated a cross over cable.

Appendix 3: The steps that I undertook during the termination of straight through cable
include the following;
I held the cable and used a crimp tool blade to cut both ends of the cable.
I arranged the cable wires in their right order starting with white orange, orange, white
green, blue, white blue, green, white brown and brown in that order.(standard A) on both
sides.
Straightened them and used a crimp tool blade to cut them at the same level.
Held the RJ45 connector while the clip was facing downwards, pushed in the wires

gently until they touched the surface of the connector.


Used a crimp tool to clip the RJ45 onto the cable so that the wires are held properly.
Crimping was done on both of the cable.
I then used a network tester to test for connectivity of the cable.
The network tester beeped green from top to bottom (1-8) and this showed that I had
successfully terminated the straight through cable.

Appendix 4: The steps that were taken when setting up a Local Area Network (LAN) are
discussed below;
We placed a network switch on a flat surface acting as a center of convergence of all
nodes on the network.
21

We connected cables to the wireless modem that was connected to the server and from
the server to the client computers.
Different IP addresses of class C network were distributed to different computers, the
default gateway and the subnet mask were all the same.
Pinging anothers computer was done using the ping command to check for connectivity
that is to check whether we were within the same network and the LAN was created.
Appendix 5: Under resource sharing, the following steps were taken;
We set up a network and configurations were made and a folder was created on the

desktop.
I right clicked on the folder that was going to be shared by everyone on the network.
I then I clicked sharing and security
Clicked on the link.
I then marked the checkbox which reads Share this folder on the network and then I

clicked OK.
Finally all computers on the network were able to access the folder.

Appendix 6: The troubleshooting of hardware and software

Hardware and Software

Signs of the fault

Solution to the problem

Processor

-The computer does not start

- Check the fitting of the processor or


replace with new one.

22

Slow computers

- Running so many programs at the

- Make a full scan of your computer with

same time.

an updated antivirus.

- Low disk space.

- Uninstall unnecessary programs.

- Computer viruses or worms.

- Repair your computer with the


appropriate bootable CD-ROM with the
same version of the

- Low memory.
- Corrupt system files
- Faulty Motherboard
RAM

- No boot but you hears continuous


beeps (sound).

- Fitting the appropriate RAM Chip(s)


well in their slot(s).
-Replacing those that are used up with
new ones.

Power supply

- Failure to power on the computer


even when turned on and off
several times.

Appendix 7: Internship schedule

ICT SERVICES DEPARTMENT


INTERNSHIP TRAINING
PROGRAM
WEEK:

13th -17th

ITEM/COURSE:
Computer Hardware
- Software
- Assemble, Disassemble
- Windows Operating system
- Unix Operating System
- Cloning

23

- Check all connections for all power


connectors, if all are fine replace the
power supply with new one.

Networking
20th June

- Setting up a network e.g Peer to Peer


- Switch, Router and Hub Configuration
- Wireless Networks, Network Printers
- Cable Termination, Remote Networks
- Vlans

Server Management
1st 15th July

- Installation of Windows Sever 2003


- Server Management
- Linux Servers
- DNS,DHCP
- Server Management

Services
16th 23 th July

- Applications
- Databases
- Web hosting

24

Você também pode gostar