This action might not be possible to undo. Are you sure you want to continue?
PMB 0248 BAUCHI, NIGERIA
STUDENTS· INDUSTRIAL WORK EXPERIENCE SCHEME (S.I.W.E.S.) UNDERTAKEN AT:
NIGERIAN PORTS AUTHORITY
No. 26/28 Marina, Lagos. (MAY 23, 2009 - NOV, 23 2009)
BLUECHIP TECHNOLOGIES (SENSE-D CONSULTING)
16 Boyle StreetOnikan, Lagos. (NOV 24, 2009 MAY 31, 2010)
A TECHNICAL REPORT
PARTIAL FULFILLMENT FOR THE AWARD OF BACHELOR S DEGREE (B.TECH) IN COMPUTER SCIENCE
BY HAUWA MAULUDATU ABDULLAHI MATRICULATION NUMBER: 05/15998/1
MATHEMATICAL SCIENCES PROGRAMME SCHOOL OF SCIENCE ABUBAKAR TAFAWA BALEWA, UNIVERSITY BAUCHI.
CERTIFICATION This is to certify that, this report conform with the acceptable standards of scholarly presentation as regards the industrial training undertaken by HAUWA MAULUDATU ABDULLAHI of the Mathematical sciences program (Computer science) in the school of Science Technology of the ABUBAKAR TAFAWA BALEWA UNIVERSITY BAUCHI at the Nigerian Ports
Authority No. 26/28 Marina, Lagos and Bluechip Technologies Limited No 16. Boyle Street Onikan, Lagos. .
«««««««««««««. SIWES COODINATOR
««««««««««««« COORDINATOR (MSP)DATE
DEDICATION I dedicate this write up to ALLAH who saw me through the period of my Industrial Training attachment. I also dedicate this report to my family for their support, encouragement and understanding while I was on the industrial training attachment.
ACKNOWLEDGEMENT With Kindest regards and heart-felt thanks, I wish to express my profound gratitude to the entire management and staff of Nigerian Ports Authority (NPA) andBluechip technologies (Sense-D) for the outstanding attachment I had, and the wonderful opportunity I was offered to work in the companies. More so, my gratitude goes to particular members of staffs of the above named companies whom my attachment would have been a mere sheep-herding. If I were to mention names, I would be most elated to enlist all members of staff. However due to space constraints, I cannot but only say a big thank you to all. My stay was indeed fruitful and memorable. I would not also forget to mention my Industry-based supervisors, Mr. Ibrahim M. Babangida (N.P.A), and Miss Deborah Alelumhe whom where very supportive and helpful during my training. My special regard extends to my parents, sisters, brothers, lectures/faculties friends and colleagues. This is a token of that appreciation. All thanks Belong to Allah«..Amin.
Local Area Networking during my industrial attachment at the Nigerian Ports Authority and Software/ application development. One of the primary reasons for the immense popularity of computers is speed with which they can accomplish specified tasks. insurance. Data mining . education.PREFACE Man has invented many electronic devices but the computer has made a greater impact on society than any other device. This makes the computer quite an expensive electronic device This report is on the experiences gathered on Computer maintenance. banking. Computers have become an integral part of man·s everyday life. They have made a potentially significant contribution to the society during the last three decades. research. medicine. . database development and maintenance. The areas of computer applications are literally too numerous to mention. Business intelligence and some little programming experiences at Bluechip Technologies. They continue to grow and open new horizons of application. They dominate every sphere of life be it entertainment. design or manufacturing.
1.VIAbstract SECTION 1:INDUSTRIAL TRAINING FUND (ITF) CHAPTER ONE 1.3 OBJECTIVES OF NIGERIAN PORTS AUTHORITY 2.8 ORGANIZATIONAL STRUCTURE/ PROFILE OF DEPARTMENT CHAPTER TWO 2.6 2.2 CONCEPT OF COMPUTER NETWORKING 184.108.40.206.1.2 FUNCTIONS OF NIGERIAN PORTS AUTHORITY 2.1.TABLE OF CONTENT Certification Dedication Acknowledgement Preface Table of Content VII I II III IV V.3 2.1 FIRST DAY EXPERIENCE 2.1 HISTORY OF INDUSTRIAL TRAINING FUND (ITF) 1.7 THE ORGANOGRAM OF NIGERIAN PORTS AUTHORITY (NPA) 2.2.5 220.127.116.11 BOARD OF DIRECTORS 2.5 MISSION STATEMENT 18.104.22.168 STUDENTS· INDUSTRIAL WORK EXPERIENCE SCHEME 22.214.171.124 2.4 2.6 VISION STATEMENT 2.2.8 126.96.36.199.1.3 OBJECTIVES OF SIWES SECTION 2:NIGERIAN PORTS AUTHORITY (NPA) CHAPTER ONE 2.9 TYPES OF NETWORKS LOGICAL CLASSIFICATION OF NETWORKS NETWORK ADAPTERS COMPUTER NETWORKING DEVICES NETWORK TOPOLOGY BASIC TYPES OF TOPOLOGIES TRANSMISSION MEDIA .2.1 PROFILE OF THE ORGANIZATION 2.2.
188.8.131.52.4 CONCLUSION .1.3 OBJECTIVES OF BLUECHIP TECHNOLOGIES 3.2.7PROJECT UNDERTAKEN/ WORK DONE 3.2 SERVICESOF BLUECHIP TECHNOLOGIES 3.2.10 SERVER TYPES 2.1 WORKDONE/ PROBLEMS IDENTIFIED 2.1.2 CONCEPT OF SOFTWARE DEVELOPMENT 3.3 SOFTWARE DEVELOPMENT PROCESS 3.1.1. 184.108.40.206 FOR PROSPECTIVE INTERNS 4.2 FOR THE COMPANY 4.2 PROBLEMS IDENTIFIED SECTION 4:RECOMMENDATION/ CONCLUSION CHAPTER ONE 4.4 MANAGEMENT PROFILE 3.3 FOR THE INSTITUTION 4.13 SOFTWARE INSTALLATION CHAPTER THREE 2.8 SOFTWARE INSTALLATION CHAPTER THREE 220.127.116.11 VISION STATEMENT 3.6 BLUECHP TECHNOLOGIES ORGANIZATION HIERARCHY CHAPTER TWO 3.3.4 SOME AREAS WHERE SOFTWARE/APPLICATION DEVELOPMENT PROCESS ARE APPLIED.11 LOCAL AREA NETWORKING/ TROUBLESHOOTING 18.104.22.168.22.214.171.124 MISSION STATEMENT 3.5 SOME TOOLS/TECHNOLOGIES USED IN SOFTWARE/APPLICATION DEVELOPMENT INCLUDE.2 PROBLEMS IDENTIFIED SECTION 3: BLUECHIP TECHNOLOGIES (SENSE-D CONSULTING) CHAPTER ONE 3.1 PROFILE OF THE ORGANIZATION 3.2.1. 3.2.1 WORKDONE/ PROBLEMS IDENTIFIED 3.12 CRIMPING OF NETWORK CABLES 2.2.1.
t. and conclusion of what the report actually entails.c.This is to prepare them for the future as to what the outside world would expect from them when needed. . profile of the Nigerian Ports Authority(NPA) and Bluechip Technologies(Sense-D) in which the SIWES programme was undertaken with their organizational charts (organ gram). web content development. types of networking based on scale.ABSTRACT Student industrial work experience scheme (SIWES) as the name implies is an avenue through which students from various disciplines are given the opportunity to have a feel of what their various professions entails. recommendations were made for prospective interns and the companies. applet programming . e. for future reference. various networking devices.t. which basically is on computer networking. crimping of network cables and software installation on computer systems.c. web scripting. types of network topology. This report gives the profile of industrial training fund (ITF).java programming . SIWES is an avenue through which many skilled manpower and proficient individuals have been raised for exploration by diverse industries. Finally.database administration and development e. Work experience during the programme is also elaborated upon this report.Data mining. Business application developments. application development. Data warehousing. Relational database design and implementation. Work done and the various problems encountered is succinctly stated in this report which covers the area of local area networking / troubleshooting a LAN connection.
agriculture. This was done with the view of generating a pull of indigenous trained manpower sufficient to meet the needs of the economy. sciences. involving the students. The decree number 47 of 1971 was charged with the responsibility of promoting and encouraging the acquisition of skills in industry and commerce. which forms part of the approved Minimum Academic standards in the various degree programmes for all the Nigerian Universities.SECTION 1: INDUSTRIAL TRAINING FUND (ITF) CHAPTER ONE 1.1. The scheme is a tripartite programme. 1. medical. The minimum duration for the SIWES should normally be 24 weeks except for engineering and technology programmes where the minimum duration is 40 weeks.2STUDENT·S INDUSTRIAL WORK EXPERIENCE SCHEME: The student·s Industrial Work Experience Scheme (SIWES) is the accepted skills training programme. It is funded by the Federal Government of Nigeria and jointly coordinated by the Industrial Training Fund (ITF) and the National Universities Commission.1 HISTORY OF INDUSTRIAL TRAINING FUND (ITF) The Federal Military Government established the Industrial Training Fund (ITF) in 1971 during the second national plan within the period 19701974. . It is an effort to bridge the gap existing between theory and practice of engineering and technology. the universities and the industry (employers of labour). professional work methods and ways of safe-guarding the work areas and workers in industries and other organizations. It is aimed at exposing students to machines and equipment.1. management and other profession educational programmes in the Nigerian tertiary institutions. The Students· Industrial Work Experience Scheme is one of the projects that is carried out under the Industrial Training Fund.
iv. Provide students with an opportunity to apply their theoretical knowledge in real work situation. ii. Expose students to work methods and techniques in handling equipment and machinery that may not be available in the universities. iii.3 OBJECTIVES OF SIWES: Specifically.1. and vi. Make the transition from the university to the world of work easier.1. the objectives of the Students Industrial Work Experience Scheme are to: i. thereby bridging the gap between university graduates for employment in industry. v. Provide an avenue for students in the Nigerian universities to acquire industrial skills and experience in their course of study. . and thus enhance students· contacts for later job placement. Enlist and strengthen employers· involvement in the entire educational process of preparing university graduate for employment in industry. Prepare students to work situation they are likely to meet after graduation.
Although limited initially to the opening up of the Lagos lagoon. Security services. 1955. Fire Service. 2. Calabar Port. 2. it however resulted in the opening of ports at Apapa and Harcourt. Ocean and Lighter Terminal.3 OBJECTIVES OF NIGERIAN PORTS AUTHORITY: To promote operational efficiency. Towage. Tin Can Port. the operation of the Nigerian Ports Authority became fully commercialized in May 1992. Medical Services. Container Port.1 PROFILE OF THE ORGANIZATION Company History: The development of a seaport in Nigeria started in the mid 19th-century in the era of explorers and traders.1. Computerization of Ports.2 FUNCTIONS OF NIGERIAN PORTS AUTHORITY:The functions of the Nigerian Ports Authority are as follows. Ship repair. Warri Port. reverted to its former name .Nigerian Ports Authority. they are: Apapa Port. The NPA commenced operation on 1st April. Supply of water.Pilot age. in consideration of its full ownership while recognizing its commercial status the company in October 1996. cost effectiveness and customer satisfaction through a . The Nigerian Ports Authority today is a wholly government owned organization under the supervision of the Federal Ministry of Transport with eight ports in different locations in the country. The Nigeria Ports Plc was incorporated.SECTION 2: NIGERIAN PORTS AUTHORITY (NPA) CHAPTER ONE 2. This led eventually to the establishment of the Nigerian Ports Authority (NPA) in 1954 to maintain the ports as well as load and discharge cargo. Roro Port .1.1. It made remarkable progress and on the 15th of June 1992. There is also the NPA International. Port Harcourt Port. Subsidiary Companies and Auxiliary Services. However. In pursuance of government efforts to ensure the efficiency of public enterprises.
D. Marine & Operations E. 2. as well as adapting to the changing demands of maritime trade to play a leading role in the African region. 2. D Corporate Service E. .1.committed workforce while ensuring adequate returns on stakeholders investments. D. 2. D.5MISSION STATEMENT To promote competitiveness of Nigerian Ports.1.O) E. through the efficient provision. Finance E.1.Engineering / Tech. development and management of port/marine infrastructure.E. port regulation and land administration.4 BOARD OF DIRECTORS: MD (C.6VISION STATEMENT Developing safe and secure Nigerian Ports into a distribution platform from where the West and Central African Sub-region can be served. with the ports serving purely as operational transit point for cargo and regional ports for the sub-region.
Managers Snr. Officer Officer 1 Officer 2 Asst.M Prin. G. Manager Port Managers Manager Asst. Manager G. Manager Prin.7THE ORGANOGRAM OF NIGERIAN PORTS AUTHORITY (NPA) M.1.2. Managers Asst. G. Director Eastern Zone E. Director Western Zone G. G. G. Manager G.M Asst.D (C. Director Corp Services Finance E. Manager G.M Snr. Manager Asst.M Port Managers .O) General Manager Audit Special Assistant Assistant General Manager P/Affairs E.E.
1.2. The department has the function supplying and managing (maintaining) of the computers used in the company and also the printing out of staff pay slip.2.8 Organizational Structure/ Profile of Department: I worked in the Data Processing/Management and Information Systems Department. CHAPTER TWO WORK EXPERIENCE 2.1FIRST DAY EXPERIENCE . GM MIS AGM Budget AGM CP&S AGM Data Processing The subsequent chapters are a full description of what I learnt and did as an Industrial Training student in the department.
When I got to the networking unit (popularly called Server Room in NPA).3TYPES OF NETWORKSListed below are various types of computer networks in order of their scale of distribution: . graphics. Babangida. according to the functional relationships which exist among the elements of the network and according to the network topology upon which the network is based. and was introduced to my industry based supervisor whose name is Mr. messages. 2. the time of resumption and closure (8am to 5pm) as well as other general information that would aid in the proper conduct of the training. according to the hardware and software technology that is used to interconnect the individual devices in the network. The networks allow computers to communicate with each other and share resources and information. 2. He gave me a vague description of the kind of work that is expected to be carried out (network maintenance and troubleshooting). modems and other hardware resources. printers. fax machines.2. I was escorted to the networking unit by one of the computer personnel.2 CONCEPT OF COMPUTER NETWORKING Computer networking is a collection of computers connected to each other. Computers that are part of a network can share data. Ibrahim M.On resumption of work at NPA. Networking arose from the need to share data in a timely fashion.He also introduced some of the other personnel that work in the networking unit as well as a few other interns from other higher institutions that are also on industrial training.2. Computer networks can be classified based on their scale. I was given a letter of appointment by the Assistant General Manager of the training department and was asked to take the letter to the Data Processing department for further instructions. After all was said and done.
Metropolitan area network (MAN): is a network that connects two or more local area networks or campus area networks together but does not extend beyond the boundaries of the immediate town/city. switches and hubs are connected to create a metropolitan area network.WAN connects large numbers of computers and terminals over a long distance. Less formally. e. The workstations are . any network whose communications links cross metropolitan.g. an airport. fax machines. and PDAs. Examples of devices used in PAN are scanners. Personal area network (PAN): is a computer network used for communication among computer devices close to one person. d.a. Campus area network (CAN): is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area. c. office. For example. printers and servers) and to connect to the internet.. or small group of buildings. The largest and most well-known example of a WAN is the internet. LAN network usually contain peripherals such as hard disk units and printers to which all users have access via the network. Routers. printers. regional. In WAN network is usually nationwide or even worldwide. b. telephone. Current LANs are most likely to be based on Ethernet technology. a library may have a wired or wireless LAN for users to interconnect local devices (e. A campus area network is larger than a local area network but smaller than a wide area network (WAN).e. such as a school or.LAN networks are characterized by workstations that are usually microcomputers. a WAN is a network that uses routers and public communications links. The principle of a local area network is that multiple users each with their own system can share resources which may be expensive (like hard disk or a common value such as a centralized set of department records. or national boundaries. Local area network (LAN): is a computer network covering a small physical area like a home.. Wide area network (WAN): is a computer network that covers a broad area (i.
there is usually a dedicated central system called sever on which the files of every user connected to the network are stored. The advantages of WAN are that the user has a fast means of communicating with other users where ever they are and access is provided to other mainframe facilities. The user on each computer determines what data on their computer gets shared on the network. Computing power of the network maybe provided by a number of mainframe computers which maybe remote from each other connected by high speed data links. users will usually be able to connect to a point on the network near to them. There is no one to be assigned administrator responsibilities for the entire network.2. Peer-to-peer (Workgroup Network) Network: This means computer-to-computer. Client-Server (Server based) Network: This is a server-based network that is essentially used for sharing data such as Accounts/Order processing systems. It is common in small offices or departments in a large organization. Each computer can access files stored on any of the computers stored on the network. It provides a better security as all resources of the computer are centrally located on the server. In a client/server network. 2. Client/server network provides an efficient way . This network provides a simple and inexpensive way to interconnect less than ten computers. A server based network is such that other computers called clients.4 LOGICAL CLASSIFICATION OF NETWORKS Networks can be divided into two main categories: 1. called servers respond to the requests. 2.terminals or even microcomputers. Each computer acts as both a client and a server. and other resources. request services and other computers. there are no dedicated severs or hierarchy among the computers.
This hub arrangement gives rise to a ´star-siredµ tree topology. Ethernet works in a way similar to how people talk in a polite discussion. gets the token attaches it to the network to indicate free traffic. (b) Token ring adapter: Beside the fiber optic cables. Intermediate Systems (IS) or Interworking Unit (IWU). To send a file the workstation waits for a token. fax servers etc. The workstations in a network continuously pass an electronic token among themselves. There is a HUB which is a device that centrally connects all the cables in a network. 2. This type of network has dedicated servers that only function as severs and are not used as clients or workstation.2. Application servers.of connecting computers (10 or more systems) to share information. 2.5 NETWORK ADAPTERS There are two widely-used adapters. Computer networking devices are also called network equipment. . Collision occurs when two workstation send information at the same time.2. They are: (a) Ethernet adapter: This is the most widely used method of exchanging information on a network.6 COMPUTER NETWORKING DEVICES Computer networking devices are units that mediate data in a computer network. Clients are computers or workstations that can access information stored on Servers. file servers. Units which are the last receiver or generate data are called hosts or data terminal equipment. this is the most expensive connection. A token is a small message that indicates that the network is free. Each workstation waits for a pause before sending information so as to avoid collision. There are different servers that have been specialized for different functions such as print servers.
every attached device shares the same broadcast domain and the same collision domain. y Bridge: a device that connects multiple network segments along the data link layer. y Router: a specialized network device that determines the next network point to which to forward a data packet toward its destination. . So unlike a hub a switch splits the network traffic and sends it to different destinations rather than to all systems on the network. When using a hub. y Switch: a device that allocates traffic from one network segment to certain lines (intended destination(s)) which connect the segment to another network segment.Common basic network devices: y Gateway: device sitting at a network node for interfacing with another network that uses different protocols. it cannot interface different protocols. y Hub: connects multiple Ethernet segments together making them act as a single segment. Unlike a gateway.
A local area network (LAN) is one example of a network that exhibits both a physical topology and a logical topology. nodes. Thus topology can be categorized into physical and logical topologies.y Repeater: device to amplify or regenerate digital signals received while setting them from one part of a network into another. etc. 2.2. . Any particular network topology is determined only by the graphical mapping of the configuration of physical and/or logical connections between nodes. It refers to how computers in a network are physically connected.) of a network. especially the physical (real) and logical (virtual) interconnections between nodes. The physical topology describes the routes of the network cables as they link each node while the logical topology refers to how messages flow from one station to another.7NETWORK TOPOLOGY Network topology is the study of the arrangement or mapping of the elements (links.
In a bus network configuration. the rest of the network can continue to function normally.2.8 BASIC TYPES OF TOPOLOGIESThere are six basic types of topology in networks: y BUS: This type of network topology is the one in which all of the nodes of the network are connected to a common transmission medium which has exactly two endpoints (this is the 'bus'. the central node being the 'hub' and the nodes that are attached to the central node being the 'spokes' (e.g. BUS TOPOLOGY y STAR: This is the type of network topology in which each of the nodes of the network is connected to a central node with a point-to-point link in a 'hub' and 'spoke' fashion.2. which is also commonly referred to as the backbone. each node is connected to one main communications line.. even if one of the nodes goes down. With this arrangement. or trunk) ² all data that is transmitted between nodes in the network is transmitted over this common transmission medium and is able to be received by all nodes in the network virtually simultaneously. a collection of point-to-point links from the peripheral nodes that converge at a .
. messages travel in one direction around a ring from node to node.central node) ² all data that is transmitted between nodes in the network is transmitted to this central node. it checks the message address. As each node receives a message. the message is regenerated and passed on. This regeneration allows messages to travel farther in a ring network than in other network configurations. forming a ring ² all data that is transmitted between nodes in the network travels from one node to the next node in a circular manner and the data generally flows in a single direction only. In a ring network. which is usually some type of device that then retransmits the data to some or all of the other nodes in the network. If the message is not for that particular node. STAR TOPOLOGY y RING: This is the type of network topology in which each of the nodes of the network is connected to two other nodes in the network and with the first and last nodes being connected to each other.
the second level) with a point-to-point link between each of the second level nodes and the top level central 'root' node. . MESH TOPOLOGY y TREE: also known as hierarchical network is a type of network topology in which a central 'root' node (the top level of the hierarchy) is connected to one or more other nodes that are one level lower in the hierarchy (i.RING TOPOLOGY y MESH: This is the type of network topology in which each of the nodes of the network is connected to each of the other nodes in the network with a point-to-point link..e.
TREE TOPOLOGY y HYBRID: This is the type of network topology that is composed of one or more interconnections of two or more networks that are based upon the same physical topology. The Internet is a series of interconnected networks. HYBRID TOPOLOGY THE INTERNET TOPOLOGY Connecting individual computers to each other creates networks. Personal computers and workstations are connected to a Local Area Network (LAN) by either a dialup connection through a modem and standard phone line or by being directly wired into the LAN. . but where the physical topology of the network resulting from such an interconnection does not meet the definition of the original physical topology of the interconnected networks. Other modes of data transmission that allow for connection to a network include T-1 connections and dedicated lines.
9 TRANSMISSION MEDIA There are many data transmission media.Bridges and hubs link multiple networks to each other. a braided metal shielding and an outer cover. Sometimes referred as standard Ethernet .is a relatively rigid coaxial cable about 0. y Thick (thicknet).5 inch in diameter. Routers transmit data through networks and determine the best path of transmission. There is a variety of cable that can meet the varying needs and sizes of networks. Coaxial cable is mostly used in the TV industry and some LANS.2. Coaxial cable is of two types: y Thin (thinnet)-which is flexible and about 25 inch thick and can carry a signal up to approximately 185 meters. The major types of cabling include: i) Coaxial-consists of a core made up of solid paper surrounded by insulation. INTERNET TOPOLOGY 2. They are: 1) CABLES: Most networks are connected by some sort of wire or cable which acts as some sort of medium carrying signal between computers. .
Twisting reduces electrical interference (crosstalk). . iii) Fiber optic cable: this consists of a single bundle of hair-like glass fiber along which signals travel as pulses of light. Fiber optic cables use light instead of electricity to carry information. There are microwave towers serving as boosters that amplify and retransmit the signals to the next station.The shielded cable has increased amount of insulation and hence it is noise-immune. which travel in straight lines and the quality of signal reduces as they move farther away from the source. It is used in many network topologies including Ethernet. ii) Twisted-pair Cable-it consists of insulated strands of copper wire twisted around each other . The satellite is permanently stationed at a point in the planet so that it is continuously available for communication with all the points within its range. It is used for wireless connections.this is of two types.The thick cable has greater immunity for noise and is more durable. unshielded twisted pair and shielded twisted pair.000 miles above the surface of the earth is used for information communication. and IBM token ring topologies. The thin cable on the other hand carries signals over a short distance. ARCNet. 3) SATELLITE LINK: A geosynchronous satellite which orbits about 23. Telephone companies mostly use the unshielded. 2) MICROWAVE LINK: microwaves are electromagnetic waves. This medium is however expensive but transmits at high speed and is very immune to interference.
y SAGE SERVER: this server is used to save accounting data at the end of each day the data that has been worked upon on the sage is backed up and saved to an external storage device. ISA Server allows administrators to create policies for regulating usage based on user. The Web cache stores and serves all regularly accessed Web content in order to reduce network traffic and provide faster access to frequentlyaccessed Web pages. checking permissions. y ISA SERVER: Microsoft's Internet Security and Acceleration Server (ISA SERVER) provides the two basic services of an enterprise firewall and a Web proxy/cache server. circuit-level. Sage server works under the domain controller and also stores Cooperate version of the MacAfee antivirus software which is shared by all members of the organization. It contains accounting software packages that can be accessed by employees of the company. group. destination.) within the Windows Server domain. On Windows Server Systems.2. These servers include.2. A domain is a concept introduced in Windows NT whereby a user may be granted access to a number of computer resources with the use of a single username and password combination. application. and application-level traffic. ISA Server also schedules download of Web page updates for non-peak times. . The updates to the antivirus are downloaded every five minutes from MacAfee. a domain controller (DC) is a server that responds to security authentication requests (logging in. and content type criteria. ISA Server's firewall screens all packet-level. schedule.10 SERVER TYPES In the Nigerian Ports Authority the server room housed four main servers which have Windows Server 2003 Service pack 1 installed on them. y DOMAIN CONTROLLER:This connects the computers to each other over the network. etc.
e. and instead refers to a network within an organization. Sometimes the term refers only to the organization's internal website. 2. Ethernet network cables. there are situations a times that I am been caught up with when carrying out a local area network connections which requires troubleshooting procedures to detect why the computers or certain computers on that same network are not seeing the network.2. Another problem . to link computers together using the star network topology especially. crimping tool and a LAN tester to test if the crimped cable is well crimped for the networking process about to be put in place. but may be a more extensive part of the organization's information technology infrastructure. special duties department. It may host multiple private websites and constitute an important component and focal point of internal communication and collaboration. As a result of these developments what I often do is to check if the Local area network on that particular computer is disabled so as to re-enable back. RJ-45. a network between organizations. I was able to link the various computers in the fire service department.y INTRANET SERVER: An intranet is a private computer network that uses Internet Protocol technologies to securely share any part of an organization's information or network operating system within that organization.11 LOCAL AREA NETWORKING/ TROUBLESHOOTING During my SIWES programme in Nigerian Ports Authority (NPA). with the basics learnt on networking from my industry-based supervisor. civil engineering department.t. This local area network that I carried out required the use of hubs.c. The term is used in contrast to internet. At times after all connections have been carried out and the computer is not connected I would need to restart the system as a form of refreshing its operating system to recognise the newly connected device. However. I was able.
e. Therefore. . which update that take long period of time on the internet for effective performance. brown. white-blue.c. The software I usually install includes Microsoft office 2007. which I have to resolve so as enable the connected computers see the network. pink and then white-pink.2.t. white-brown. The problem I usually encounter here is that of edge-alignment for a proper grip when clip with the aid of the crimping tool.13 SOFTWARE INSTALLATION Installation of software is one basic work I do while on my SIWES programme. I often carry out this duty when new computers are bought in the department. 2. When I crimp a network cable what I often put into consideration is that both ends of the crimped cable must align to enable it work when put to use. green. Before I crimp any network cable I have to make sure I Know the length of the cable required for the LAN connection so as not to result into waste of available RJ-45. McAfee antivirus. These are some of the problems I encounter after carrying out my connections. white-green. I try as much as possible to overcome this because most of the time it results into wastes of RJ45. The problem I face here is mostly from the installation of McAfee. blue. which is not meant to be because the nature of the network detection operated on in NPA is a domain host configuration protocol (DHCP). which requires an automatic for of network detection. Java. The arrangement of the embedded cables when crimped follows thus.12 CRIMPING OF NETWORK CABLES Most often I crimp network cables needed for a local area connection. Before the installation proper I have to make sure that I uninstall any available trial versions of the software I am about to install so as to avoid software conflict when the operating system is running. 2.2.often identified is that some computers are assigned IP addresses.
Backing-up of files on external storage devices e. Crimping of Ethernet network cable c. Unavailability of network cables and RJ-45 b.3.1 WORKDONE/ PROBLEMS IDENTIFIED a. Local area networking/ troubleshooting b. The industry based supervisor was not always available to instruct us when we run into difficulties trying to solve problems d. Deployment of McAfee antivirus on newly bought computers 2.2 PROBLEMS IDENTIFIED a.3. Shortage of tools per personnel which often make job execution slow c. Less fund in the area of transportation e. Erratic power supply .CHAPTER THREE 2. Software installation d.
1. Zain. of the human element. It had Multiliks as its first client then later. 3. To assist our clients in extracting business meaning from their data and developing competitive advantage by creating custom designed information management strategies and solutions through the use of data warehousing. implementation and other IT value added services. To establish strategies that is custom fit to each unique business challenge. MTN.1 PROFILE OF THE ORGANIZATION Company history:Bluechip Technologies Limited started in the year 2008 it was originally know as Sense-D consulting which was owned and established by KazeemTewogbade. application development and support. and other business intelligence disciplines.3 OBJECTIVES OF BLUECHIP TECHNOLOGIES:To provide high quality and cost effective data warehousing solutions for enterprises. to information technology solutions.1. etisalat. Later a partnership establishment was proposed by OlumideSoyombo which brought about the birth of Bluechip Technologies Limited. MTN-Zambia NDIC and Bank PHB. Data Management. with KazeemTewogbade and OlumideSoyombo as major share holders. We have our presence in Nigeria and Zambia. and Business Performance Measurement 3. To balance our data management knowledge with a healthy understanding.1. We work to sustain reputation for excellent customer service and helping our clients discover the key to their organizational intelligence. data mining. Data warehouse design and construction. Bluechip Technologies is a wholly owned Nigeria Company specialized typically on IT solutions and services. knowledge management.SECTION 3: BLUECHIP TECHNOLOGIES (SENSE-D CONSULTING)CHAPTER ONE 3. .2 SERVICES OF BLUECHIP TECHNOLOGIES: The services of Bluechip Technologies include Business Requirement Analysis. Customer Analytics. Custom Application Development.
1.Sc Computer Science (Ibadan) 1st Class Master of Business Administration (Lagos) Over 14 years Systems Integration and Solution Development Experience.3.1.T (Birmingham. 3.Sc Computer Science(Ibadan) 1st Class Certified Project Management Professional Over 13 years Systems Integration Experience Experience in Nigeria and Southern Africa OlumideSoyombo (Manager) B. UK) Distinction Certified Business Analysis Professional (CBAP.6VISION STATEMENT:To be the premier specialist business application consulting firm delivering world-class services and values in Nigeria and beyond. advantage by implementing integrated business application solutions. IIBA) Over 8 years Business Analysis and Data Modelling experience Experience in Nigeria. . Southern Africa and U.Sc Systems Engineering(Lagos) M.sc Business and I.K RilwanLateef (Manager) B.1.4 MANAGEMENT PROFILE KazeemTewogbade (Senior Manager) B.5MISSION STATEMENT: To turn our clients· vital business data into a competitive. Last 3 years at senior management position in a Nigerian Telco Experience in Nigeria and Southern Africa 3.
1.3.6 BLUECHP TECHNOLOGIES ORGANIZATION HIERARCHY: Senior Manager (SM) Manager 1 Manager 2 Manager 3 Consultant 1 Consultant 2 Consultant 3 Analyst 1 Analyst 2 Analyst 3 BITP Trainees Youth Coppers Industrial Trainees Office Assistant/ Cleaner Drivers .
Enterprise Application Development. Deborah Alelumhe and told me that she will provide me with anything I need.2 CONCEPT OF SOFTWARE DEVELOPMENT Software development (also known as Application Development. or for personal use. she would also be responsible for signing my log books and other documents.CHAPTER TWO WORK EXPERIENCE 3. and how they go about in carrying out those services in terms of the technologies they use. The term software development may also refer to computer programming. or any other activities that result in software products. 3. maintenance. Software Application Development.2. What they do. Mr.2. I was given a letter of appointment by the Human Resource Manager of the company and was asked to the wait to see the Company Manager. I was also introduced some of the other members of staff that work in the company as well as a two other interns from other higher institutions that are also on industrial training.I was also informed that their working hours was from 9:00am to 5:00pm. and Platform Development) is the development of a software product in a planned and structured process to meet specific needs of a specific client/business. the process of writing and maintaining . It is the set of activities that results in software products. After my chat with Mr. re-engineering. to meet a perceived need of some set of potential users.1FIRST DAY EXPERIENCE On my first day of work at Bluechip Technologies. Software Engineering. Olumide to have a chat with him after a few minutes I was asked to go into his office where he explained to me what the company bluechip Technologies was all about. modification. He also told me to be a very inquisitive person and to be free to ask any member of staff any arising questions that I may have. reuse. new development. Software development may include research. their services. the types of clients they service. Olumide he then introduced me to my supervisor Miss. Software Design. Designing Software.
Software development can also refer to applications development which is the development of a software product in a planned and structured process. speeding up business process and. 3. Design and Develop. Application development involves creating a computer program. is a structure imposed on the development of a software product. what does the user want? Interview and interact with the users to determine their expectations. The program must be designed to meet the specifications and the design and specifications must be converted to . Application development involves higher levels of responsibility (particularly for requirement capturing and testing). It can also be known as software life cycle and software process. 1. The process of software development consists of various stages and activities some of which include. Here user expectations are written as "specifications" that describe the details and functions of the program.2. It will specify what the program will do. What should the program do for them? An understanding of the business need helps. Functional Specification. It answers the questions. Getting user needs requires good communications and business skills.the source code. 2. The important task in creating a software product is extracting the requirements or requirements analysis. from keeping track of inventory and billing customers to maintaining accounts. in fact.3 SOFTWARE DEVELOPMENT PROCESS A software development process. even improving application effectiveness. User Requirements. also known as a software development lifecycle. or set of programs to perform tasks. The essential purpose of this phase is to find the need and to define the problem that needs to be solved. 3.
problems or questions. 4. Documentation for user and system procedures are written and reviewed. .computer code. 7 Technical assistance. And note that insufficient and inadequate testing is a major cause of bad software ² software that doesn·t work to specification. As a programmer. resilience. security. 6 Maintenance. you may need to change an existing program to meet user requirements or to remove bugs. tracking errors in a program is in fact a critical programming skill. 5. Documentation. Is the program working to specification? Testing can be done within the programming team. Completed programs need to be tested for bugs or mistakes. Testing. Debugging. software that is ridden with bugs. writing the program in the chosen programming language based on the specifications. This is helpful and is a key requirement for future maintenance. is regarded by many as the core programming skill. Interaction with users enables you to get feedback on the program·s actual performance. Coding must be done with functionality. Training of users could be part of your duties. Testing can be done with the users to ensure it meets specification. Coding. Such interaction with users again requires first-class interpersonal and business skills. usability and future maintenance of the software application in mind. You will get enquiries from users regarding programming errors.
for a single customer (user) or a group. Finding new creative decisions in order to meet the specific requirements and preferences of the customer as quickly as possible may be achieved with custom software development.4SOME AREAS WHERE SOFTWARE/ APPLICATION DEVELOPMENT PROCESS ARE APPLIED 1) CUSTOM APPLICATION DEVELOPMENT:This is another subset of software development. also known as custom software engineering. custom software development technologies can address their issues. The goal of custom software solutions may be to develop not for the mass audience (users). Custom developed . If a customer believes that their needs are unique and want to put their ideas into practice. is defined as omitting of pre-developed (template or boxed) solutions and views.2. Custom developed software is encouraged to take under one umbrella progressive technologies along with preferences and expectations of the customer. Custom software development.SOFTWARE DEVELOPMENT LIFE CYCLE (SDLC) 3. but rather developed to be unique.
algorithmic processes.the term information system is used to refer to the interaction between people. Classes of information systems include: y Transaction processing systems: are applications that capture and process data about business transactions. these reports are usually generated or predetermined schedule appear in a prearranged format. but also to the way in which people interact with this technology in support of business processes. management. These systems are sometimes called executive information systems when applied to executive managers.software may be designed in stage by stage processes. y Decision support systems: applications that provide its users with decision-oriented information whenever a decision making situation arises. it is refers not only to the information and communication technology (ICT) an organization uses. allowing all nuances and possible hidden dangers to be taken into account. and decision-making. including issues which were not mentioned in the specifications. 2) INFORMATION SYSTEM DEVELOPMENT: Information System (IS) is any combination of information technology and people's activities using that technology to support operations. y Management information systems: are information system applications that provide for management oriented reporting. y Expert systems: are an extension of decision making systems that capture and reproduce the knowledge and . data and technology.
y Office automation systems (OA): and workgroup support a Wide range of business activities that provide for improved workflow and communication between workers. best practices deliverables and automated tools for system developers and project managers to use to develop and maintain most or all information systems and software. Phases and activities for system development include: y y y y preliminary analysis/investigation problem analysis requirement analysis decision analysis . While workgroup information systems are those designed to meet the needs of a workgroup productivity. The process of information systems development also applies the processes of software development hence information systems development is a subset of software development. they are designed to boost groups The Process of Information Systems Development:Systems development methodology (system analysis and design) it is a very formal and precise system development process that defines a set of activities methods. regardless of whether or not these workers are located in the same area.expertise of an expert problem solver or decision maker then stimulate the ´thinkingµ and ´actionµ of that expert.
In an object database the entities and relationships map directly to object classes and named relationships. but also the forms and queries used as part of the overall database application within the database management system (DBMS). not just the base data structures. This logical data model contains all the needed logical and physical design choices and physical storage parameters needed to generate a design in a Data Definition Language. it can be thought of as the logical design of the base data structures used to store the data. Database design is the process of producing a detailed data model of a database.y y y design construction implementation 3) DATABASE DESIGN: A database is the data resource for all computer based information systems. which can then be used to create a database. The diagram below shows the database . Database design could also be used to apply to the overall process of designing. the designer must: Determine the relationships between the different data elements. In the relational model these are the tables and views. Usually.The process of doing database design generally consists of a number of steps which will be carried out by the database designer. And superimpose a logical structure upon the data on the basis of these relationships. design cycle. The term database design can be used to describe many different parts of the design of an overall database system.
This can include web design. Server Side Coding. web content development. Web development may be a collaborative effort between departments rather than the domain of a designated department. Database Technology. "web development" usually refers to the main non-design aspects of building web sites: writing markup and coding. among web professionals. electronic businesses. Client Side + Server Side. Web development can range from developing the simplest static single page of plain text to the most complex web-based internet applications. or social network services. client-side/server- sidescripting. and e-commerce development. web server and network security configuration. . Web Development can be split into many areas and a typical and basic web development hierarchy might consist of: Client Side Coding.DATABASE DESIGN LIFE CYCLE 4) WEBSITE PROGRAMMIG (WEB DEVELOPMENT): The name Web development is a broad term for the work involved in developing a web site for the Internet (World Wide Web) or an intranet (a private network). However. client liaison.
Business process automation. Using multiple software programs makes it difficult to retrieve information in a timely manner and to perform analysis of the data. It consists of integrating applications. Well-developed business processes can create a seamless link from initial customer interface through the supply chain. To keep track of that information. such as sales revenue by products or departments or associated costs and incomes. Business Intelligence (BI) refers to computer-based techniques used in spotting. and analyzing business data. a business and would need to use a wide range of software programs. reduce risk. optimizing and then automating business processes. digging-out. The term Business Intelligence (BI) represents the tools and systems that play a key role in the strategic planning process of the corporation.5) BUSSINESS PROCESS AUTOMATION (BPA): Business Process Automation is the practice of analyzing. and using software applications throughout the organization. documenting. 6) BUSSINESSINTELLIGENCE:Business intelligence usually refers to the information that is available for the enterprise to make decisions on. is the process a business uses to contain costs. such as Excel. BPA is the use of "technology components to substitute and/or supplement manual processes to manage information flow within an organization to lower costs. These systems . or BPA. restructuring labor resources. Access and different database applications for various departments throughout their organization. and increase consistency. Most companies collect a large amount of data from their business operations.
BI applications include the activities of decision support systems. product profitability. and providing access to data to help enterprise users make better business decisions. query and reporting. online analytical processing (OLAP).A data warehouse can be used to analyze a particular subject area. statistical analysis. transformation. transportation. Generally these systems will illustrate business intelligence in the areas of customer profiling. a data warehouse environment includes an extraction. storing. analyzing. It usually contains historical data derived from transaction data. market segmentation. access and analyze corporate data to aid in decision-making. online analytical processing (OLAP) and data mining capabilities. client analysis tools. Business intelligence (BI) is a broad category of applications and technologies for gathering. 7) DATA WAREHOUSING: A data warehouse is a relational database that is designed for query and analysis rather than for transaction processing. A data warehouse integrates data from multiple data sources. customer support. source A . forecasting. store.allow a company to gather. "sales" can be a particular subject. and loading (ETL) solution. and data mining. Data warehouses separate analysis workload from transaction workload and enable an organization to consolidate data from several sources. In addition to a relational database. and inventory and distribution analysis to name a few. For example. statistical analysis. but can include data from other sources. For example. and other applications that manage the process of gathering data and delivering it to business users. market research.
Data mining is a closely related field in which a large body of information is analyzed to identify patterns. Data mining is becoming an increasingly important tool to transform this data into information. mining the sales records from a store could identify shopping patterns to help guide the store in stocking its shelves more effectively. For example. A data warehouse is a copy of transaction data specifically structured for query and analysis. For example. where a data warehouse can hold all addresses associated with a customer. For example. a transaction system may hold the most recent address of a customer. 6 months. Historical data is kept in a data warehouse. or computer systems. Data mining can be used to uncover patterns in data but is often carried out only on samples of data. or even older data from a data warehouse. Undergo a Data migration is the process of making an exact copy of an organization·s current data from one device to another device preferably without disrupting or disabling active applications and . formats. one can retrieve data from 3 months. 9) DATA MIGRATION: This is the process of transferring data between storage types. 8) DATA MINING: Extraction of consumer information from a database by utilizing software that can isolate and identify previously unknown patterns or trends in large amounts of data. So. This contrasts with a transactions system. Once data is in the data warehouse. It is the process of extracting patterns from data. where often only the most recent data is kept. but in a data warehouse. it will not change. 12 months. historical data in a data warehouse should never be altered. there will be only a single way of identifying a product.and source B may have different ways of identifying a product.
1) PROGRAMMING LANGUAGES A programming language is a computer language programmers use to develop applications.2. enabling programmers to develop applications quickly and easily it is an event .java is platform independent language. It is required when organizations or individuals change computer systems or upgrade to new systems. Some types of java application are applications that use character user interface (CUI) and applications that use graphical user interface (GUI).java is used to create applications that can run on a single computer as well as a distributed network.5 TOOLS/TECHNOLOGIES USED IN SOFTWARE/APPLICATIONDEVELOPMENT INCLUDE. or other set of instructions for a computer to execute. scripts. or when systems merge (such as when the organizations that use them merger/takeover) 3. Some examples of programming languages include: y JAVA: java is an object-oriented programming language that was designed to meet the need for a platform independent language. y C#: Has roots in C. applets. servelets.then redirecting all input/output (I/O) activity to the new device. freeing up human resources from tedious tasks. Data migration is usually performed programmatically to achieve an automated migration. packages etc. C++ and Java adapting the best features of each and adapting new features of its own# is object oriented and contains a powerful class library of prebuilt components.java is both a language and a technology used to develop stand-alone and internet based applications.
Some markup languages only describe appearances (¶this is italics·. will be formatted. A well-known example of a markup language in widespread use today is Hypertext Markup Language (HTML). and is not normally re-usable for anything else.video etc. y HTML: Hypertext Markup Language (HTML) in computer science. and markup or tags. encoded information that directs the text format on the screen and is generally hidden from the user. HTML also includes markups for formsthat let the user fill out information and electronically . the standard text-formatting for documents on the interconnected computing network known as the World Wide Web. HTML documents are text files that contain two parts: content that is meant to be rendered on a computer screen. ¶this is bold·). one of the document formats of the World Wide Web. XML tags are not predefined.xml concentrates only on content and not on the presentation of the content within the tags. Some tags in an HTML document determine the way certain text. but this method can only be used for display. such as titles. XML is a markup similar to hypertext markup language it contains information embedded within element it has a set of predefined tags and allows you to create your own elements or vocabulary. The need for a common data interchange format in web applications resulted in the evolution of (XML). Other tags cue the computer to respond to the user's actions on the keyboard or mouse. y XML: XML is the shorthand name for Extensible Markup Language. A markup language is a modern system for annotating a text in a way that is syntactically distinguishable from that text. You must define your own tags according to your needs. XML is a markup language much like HTML and was designed to describe data. This is a World Wide Web consortium (W3C) standard for structuring and describing data for a web.
so browsers must be upgraded regularly to meet the revised standards. and search and other access. Digital databases are managed using database management systems. XHTML was developed by the W3C to help web developers make the transition from HTML to XML. and methods for . The software that permits the user to navigate the World Wide Web and view HTML-encoded documents is called a browser. and initiate sophisticated searches of information on the Internet. In XML you can declare your own rules. powerful and very strict way of marking up pure data. or e-mail. One way of classifying databases involves the type of their contents.Database Technology includes theory and experimental methodology for building computer systems that Handles large data volumes. as it encourages good practice. y XHTML: XHTML stands for Extensible Hypertext Markup Language and is the next step in the evolution of the Internet. however. languages. allowing data creation and maintenance. for example: bibliographic. Central is development of concepts. or order goods and services. documenttext. It interprets the HTML tags in a document and formats the content for screen display. XHTML is a stricter form of HTML and as such is a subset of XML which is an extremely useful. XHTML is significantly better than HTML. 4) DATABASE TECHNOLOGIES A database consists of an organized collection of data for one or more uses. software. Most sites on the World Wide Web adhere to HTML standards and.01. HTML continues to evolve. typically in digital form. the World Wide Web has grown rapidly. the data to the document author. statistical. which store database contents.send. because HTML is easy to use. This is a cleaner and stricter version of HTML 4.
Tablespaces can contain various types of memory segments. analyzing. y Oracle Database: The Oracle Database (commonly referred to as Oracle RDBMS or simply as Oracle) is an object-relational database management system (ORDBMS). reliable. distributing. The dbms also provides backup and other facilities. searching. and adaptable for new application areas. DBMS can be categorized according to the database model they support such as relational or XML or the query language that access the database such as SQL.Describing. The DBMS allocates storage to the data it maintains indices so that any required data can be retrieved and any required data can be cross-referenced. Examples of DBMS include.in a DBMS data records can be added deleted amended and expanded. Segments in turn comprise one or more extents. The DBMS also provides security for data. The Oracle RDBMS stores data logically in the form of tablespaces and physically in the form of data files ("datafiles"). PL/SQL (Oracle Corporation's proprietary procedural extension to SQL). efficient. DATABASE MANAGEMENT SYSTEMS The database management system is a complex software system which constructs. scalable. etc. It also provides the interface between the user and the data in the base. Query languages such as structured query language (SQL) are used to access data from a database. or the object-oriented language Java can invoke such code objects and/or provide the programming structures for writing them. storing. Index Segments. and other data processing to make access of data simple. expands and maintains the database. produced and marketed by Oracle Corporation. such as Data Segments. The Oracle DBMS can store and execute stored procedures and functions within it. Extents comprise . Data in the oracle database can be accessed through the use of SQL.
Data blocks form the basic units of data storage. It provides management tools to manage the server. web applications. reliable.Microsoft Visual Studio is an integrated development environment (IDE) from Microsoft. C# (via Visual C#).groups of contiguous data blocks. you can easily perform complex computations and analyze data. and database schema designer. It can be used to develop console and graphical user interface applications along with Windows Forms applications.some examples of IDE·s include. Microsoft SQL server has added features to the base-level syntax of SQL and has its own SQL called transact-SQL 5) INTEGRATED DEVELOPMENT ENVIRONMENTS Integrated development environments(IDE·s) are software programs/applications that help programmers create. Other built-in tools include a forms designer for building GUI applications. You can also use http to sent queries to the sever Microsoft SQL is highly scalable and reliable it also provides tools to move data from various sources it reduces time taken to develop an application from design to completion. y Microsoft SQL server: this is a fast.. class designer. Support for other languages such as M. y Microsoft visual studio. Python. test and debug programs and applications conveniently and effectively thereby reducing the time it takes to produce a working program to a fraction of the time it would have taken without using the (IDE).sql provide various backup strategies to improve reliability. secure and scalable relational database management system from Microsoft that adheres to the client server architecture it provides various features to manage data such as web-enabled features to facilitate easy and secure access to data via the web. Visual Studio supports different programming languages such as C/C++ (via Visual C++). run. and web services. . web designer. web sites.
It was .LOGIN PAGE HOME PAGE I also took part in the data migration project for liquidated banks that was done for the Nigerian deposit insurance corporation (NDIC).
It is an applet for a simple project titled ´KNOWLEDGEONWEBµ where graduate students can apply for various post graduate courses online by providing their personal details and qualifications details as shown by the applet abovee.y Creation of applets. 3. the project was titled ´NEWPROJECTLIMITEDµ. I designed a simple database for a company called New Project Limited that gives staffs on contracts to work on client sites and executes projects with the aid of Timecards. y Design of a simple database.g.2. operating systems etc was one basic work I do while on my SIWES programme. I often carry out this duty . using Java I used notepad to create this applet which is linked to three other applets. I employed relational database design methodology and used Microsoft SQL server 2003 to develop the database. antivirus.8 SOFTWARE INSTALLATION At Bluechip Technologies Installation of software such as Microsoft SQL server. oracle database. Microsoft visual studio.
Before the installation proper I have to make sure that I uninstall any available versions of the software I am about to install so as to avoid software conflict when the operating system is running.2 PROBLEMS IDENTIFIED y Compatibility issues of software version and O/S.3.when either I or other staffs of the organization need the software to carry out a project and sometimes when new computers are bought in the company for the staffs. . Modification of application using Microsoft visual studio. CHAPTER THREE 3.1 WORKDONE/ PROBLEMS IDENTIFIED y y y y y y Uploading of data into database using web application or excel sheets. Software installation such as oracle and SQL server. files on external storage devices. I also install java runtime environments (JRE) and java development kits (JDK) so as to run programs that are written in java on the systems e.t. Recovery of database. 3. The problem I face here is mostly from the installation of McAfee. which update that take long period of time on the internet for effective performance. Backing-up of database.3.c. Creation of database.
y Proper project scope is not specified while project is being executed hence project completion is not on time. This is because the intern might end up getting a place where he/she will be well paid but may not acquire any skill at the end of the training. This will help them get a place in time. Lack of proper communication between the client and the company/project development team. Forthcoming Interns should start early in their search for companies where they can secure placement. SECTION 4:RECOMMENDATION AND CONCLUSION CHAPTER ONE 4. y Absence of industry based supervisor for instructions when I run into difficulties trying to solve problems. y No proper documentation during the course of the project and hence modifications are always difficult. 2. 4. y Client is always changing the data that we have to work with hence resulting in an inconsistent database. Forthcoming Interns should not secure placement based on how much the company will pay.1. y y y Application I used for data upload contains a lot of errors and bugs Inconsistent data types in the database.2 FOR THE COMPANIES . 1.1 FOR PROSPECTIVE INTERNS 1.
e. 4. Constant supervision should be made available for the students by the company so that errors and mistakes are easily detected and rectified. Bluechip Technologies should make sure that the proper definition of the project scope is made and understood by both the client and the company so that a project would not be dragged unnecessarily(i. The company (Bluechip Technologies) should provide materials on the theoretical aspect for students to study so that students can understand the work that is being done well.1.It has also afforded me the opportunity to make sense of what I have been taught in school and it will enable me have a better understanding of what I would be taught further in my study. requirement specification should be strictly adhered to) 4. It has also enabled me to appreciate the field of computer science even more and has inspired me to further pursue the study of Computer Science and information systems development. The Nigerian Ports Authority (NPA) should try as much as possible to pay students who are on industrial training or give them stipends as this will help to ease the burden of transportation and feeding. 2.1. 4.3 FOR THE INSTITUTION 1. the industrial training was a very wonderful experience for me because it has exposed me to the way things are done in a working environment and has also given me the opportunity to practice what I have learnt in school.1. The institution based supervisors should also try to visit students while they are on industrial training. The School should assist students in getting IT placement 2. . NPA should also assign more than one supervisor to students who are on industrial training so that if one supervisor is not around. 3. 5. the other supervisors will be around to administer instructions to the students on how to carry out a task.4 CONCLUSION In conclusion.
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue reading from where you left off, or restart the preview.