Professional Documents
Culture Documents
Prepared for
by
October 2, 2010
Introduction
There is a way to pass on practical working knowledge that might not be explained
the theoretical knowledge which they have learned. This summer I made training in
training are to :
working experience.
work's environment.
In this report, I will describe in details about where did the training? As well as in
which organization I made the training and give some overview of the company
structure. In addition, I will discuss in details what are the tasks that I did in the
training like installation some software programs, learn networking, SQL program.
Also, I focus on what are the problems that I was faced in the training. Finally, I give
Bahwan CyberTek, BCT, has more than 1300 employees worldwide our operations
span United States, MENA and Asia. Our CUECENT line of products offer a complete
BPM suite and several BPM/SOA based products and solution frameworks targeting
BFS, Government, Oil and Gas, and High Tech business domains.
Customers
Throughout our evolution into a New Economy Services company, we have built an enviable track
record, e-transforming ideas and enterprises in the Middle East and across the world.
We believe in building partnerships through "effective, efficient, enjoyable, enthusiastic and ethical"
relationships that are personally, professionally and profitably rewarding.
Our clients are from various industry segments, including the Banking and Financial Industry,
Government and Enterprise.
Core center
The training covered the activities of the BCT in different divisions including: Net
works and Database. In addition, the trainee has covered our daily operations in the
BCT company such as management operation.
Network Division:
A network consists of two or more computers that are linked in order to share resources
(such as printers and CDs), exchange files, or allow electronic communications. The
computers on a network may be linked through cables, telephone lines, radio waves,
satellites, or infrared light beams. To built network they need to know Rooting switching,
security, wireless, storing storming design, technical and server agreement.
A local area network (LAN) is a group of computers and devices that share a common
communications line or wireless link and typically share the resources of a single
processor or server within a small geographic area ( for example, within an office
building or a campus area). Usually, the server has application and data storage that
are shared in common by multiple computer users. A local area networks my serve
2) Token Ring. It is a local area network in which all computers are connected in a
prevent the collision of data between two computers that want to send messages at
A wide area network may be privately owned or rented, but the term usually
Moreover, cable is the medium through which information usually moves from one
network device to another. The types of cables that are used in networks. These are:
1) Unshielded Twisted Pair (UTP) Cable. It is the most popular and is generally the
best option for installations where there are limited high intensity radio frequency
interference networks.
2) Shielded Twisted Pair (STP) cable. It includes extra shielding to guard against
disadvantages are its higher cost, as well as its extra bulk. Shielded twisted pair is
3) Coaxial Cable. Coaxial Cabling has a single copper conductor at its centre. A plastic
layer provides insulation between the centre conductor and a braided metal shield.
4) Fiber Optic Cable. It consists of a thin glass centre core surrounded by several
Network switching
A network switch is a small hardware device that joins multiple computers together
within one local area network (LAN). In addition, Network switch is a marketing term
rather than a technical one. Switches may operate at one or more OSI layers, including
physical, data link, network, or transport. You can see hair picture for switching device:
Network router
data packets along networks. Also, network router connects at least two
networks, commonly two LANs or WANs or a LAN and its ISP network. However a
Databases
A database management system (DBMS) is software that has been created to allow
the efficient use and management of databases, including ensuring that data is
consistent and correct and facilitating its updating. A database is a set of data that
has a regular structure and that is organized in such a way that a computer can easily
find the desired information.
Structured query language(SQL) is a common standard for describe and queries
database and is available with many commercial relational database products,
including DB2,Oracal, Microsoft Access and MySQL.
Bahwan CyberTek company use SQL relation to built database so, I installed SQL
PLUS in my laptop to learn and practice. I learned many things from this program for
example:
1- Create Table
2- Constraints
Constraints are used to limit the type of data that can go into a table. In addition,
Constraints can be specified when a table is created (with the CREATE TABLE
statement) or after the table is created (with the ALTER TABLE statement).
NOT NULL
UNIQUE
PRIMARY KEY
FOREIGN KEY
CHECK
DEFAULT
The NOT NULL constraint enforces a column to NOT accept NULL values. Also, the
NOT NULL constraint enforces a field to always contain a value. This means that you
cannot insert a new record, or update a record without adding a value to this field.
The following creates a NOT NULL constraint on the "P_Id" column when the
"Persons" table is created:
UNIQUE Constraint
The following creates a UNIQUE constraint on the "P_Id" column when the
"Persons" table is created:
The PRIMARY KEY constraint uniquely identifies each record in a database table.
Primary keys must contain unique values. However, each table should have a
primary key, and each table can have only ONE primary key.
The following creates a PRIMARY KEY constraint on the "P_Id" column when the
"Persons" table is created:
CHECK Constraint
The CHECK constraint is used to limit the value range that can be placed in a column.
If you define a CHECK constraint on a single column it allows only certain values for
this column. Also, if you define a CHECK constraint on a table it can limit the values in
certain columns based on values in other columns in the row.
DEFAULT Constraint
The default value will be added to all new records, if no other value is specified
CREATE TABLE Persons
(
P_Id int NOT NULL,
LastName varchar(200) NOT NULL,
FirstName varchar(200),
E-mail varchar(200),
Country varchar(255) DEFAULT 'Sandnes'
)
The SELECT statement is used to select data from a database. The result is stored in a
result table, called the result-set.
SELECT Syntax:
Data requirement
In terms of the number of employees in BCT company me and others trainee tried to
build a program that help Executive Secretary to know all details of the employees
passport.
So, we were creating a program in excel show in figure (1). The aim for this project
arranging the process of taking and returning back the employees passport.
Functions:
- The system should warn the user if the employees do not return back their
3- If the sys date – returning date = 7 days the system will highlight the returning
date.
4- If the sys date = date of expiration then the system will highlight the date of
expiration.
Management operation
In the last week I worked with a group of five employees. Where we make an interview
Digital Oman project. My particularly job was to collect the CVs and divided them
according to the majors and the type of certificate and degree. Moreover, I called them
and determined the day to come to make an interview. I learned how to deal with
candidates if they fail in the interview politely. Moreover, I learned the process of
recruitment and organizing the interviews. Likewise , I enjoy the group work as well as I
Nothing in the world is perfect. So, There are several limitations in our training. For
instance:
1- Responsibility and Confidence. Some staffs are not trust the trainees so they did
2- Limited time. The time is not enough for information systems trainees because they
deal with technology .For example, when the computer stack does not work, they
The training is effectual way to convert theoretical lessons to the practical lessons.
Bahwan CyberTek are a good example for effectual training environment. The
training covered the activities of the company different divisions including: oracle,
Networks ,management task . Limited time, boring days and does not trust the trainee
are the most important problems which I faced during the training. So, there are some
Related to my problems which are faced in our training there are some
recommendation.
takes the trainee responsibility and trust them when they work and doing the
tasks.