You are on page 1of 15

AN INTERNSHIP REPORT ON

“Title of your report”


FOR
“Bahwan CyberTek”

Prepared for

Dr. Rafi Ashrafi


Head of Information Systems Department
Collage of Commerce and Economics

by

Naama Said Al-Saidi 80733/06 (INFS)

October 2, 2010
Introduction

There is a way to pass on practical working knowledge that might not be explained

or properly understood in an academic program. Training allows students to apply

the theoretical knowledge which they have learned. This summer I made training in

Bahwan CyberTek for a period of 8 weeks (16/06/10-11/08/10) so, the purpose of

training are to :

1- -Expose students to a real world working environment enabling them to gain

working experience.

2- Assist students in understanding what their responsibilities which are need in

work's environment.

In this report, I will describe in details about where did the training? As well as in

which organization I made the training and give some overview of the company

structure. In addition, I will discuss in details what are the tasks that I did in the

training like installation some software programs, learn networking, SQL program.

Also, I focus on what are the problems that I was faced in the training. Finally, I give

some recommendations to improve the training in the organization.


Company Profile

Bahwan CyberTek, BCT, has more than 1300 employees worldwide our operations

span United States, MENA and Asia. Our CUECENT line of products offer a complete

BPM suite and several BPM/SOA based products and solution frameworks targeting

BFS, Government, Oil and Gas, and High Tech business domains.

Customers

Throughout our evolution into a New Economy Services company, we have built an enviable track
record, e-transforming ideas and enterprises in the Middle East and across the world.

We believe in building partnerships through "effective, efficient, enjoyable, enthusiastic and ethical"
relationships that are personally, professionally and profitably rewarding.

Our clients are from various industry segments, including the Banking and Financial Industry,
Government and Enterprise.
Core center

The training covered the activities of the BCT in different divisions including: Net
works and Database. In addition, the trainee has covered our daily operations in the
BCT company such as management operation.

Network Division:

A network consists of two or more computers that are linked in order to share resources
(such as printers and CDs), exchange files, or allow electronic communications. The
computers on a network may be linked through cables, telephone lines, radio waves,
satellites, or infrared light beams. To built network they need to know Rooting switching,
security, wireless, storing storming design, technical and server agreement.

In this division I learned two types of networks areas. These are:

1) Local area network (LAN).

2) Wide area network (WAN).

A local area network (LAN) is a group of computers and devices that share a common

communications line or wireless link and typically share the resources of a single

processor or server within a small geographic area ( for example, within an office

building or a campus area). Usually, the server has application and data storage that

are shared in common by multiple computer users. A local area networks my serve

as two or three users (for example, in a home network) or many as thousands of

users (for example, the University LAN, the SQUNET).


Two types of local area networks. These are:

1) Ethernet. It is the most widely installed local area network technology.

2) Token Ring. It is a local area network in which all computers are connected in a

ring or star topology and a digital or token-passing scheme is used in order to

prevent the collision of data between two computers that want to send messages at

the same time.

On other hand, a wide area network (WAN) is a geographically dispersed

telecommunications network. The term distinguishes a broader telecommunication

structure from a local area network.

A wide area network may be privately owned or rented, but the term usually

connotes the inclusion public (shared user) networks. An intermediate from of

network in terms of geography is a metropolitan area network (MAN). The most

commonly known wide area network is the Internet.

Moreover, cable is the medium through which information usually moves from one

network device to another. The types of cables that are used in networks. These are:

1) Unshielded Twisted Pair (UTP) Cable. It is the most popular and is generally the

best option for installations where there are limited high intensity radio frequency

interference networks.
2) Shielded Twisted Pair (STP) cable. It includes extra shielding to guard against

interference, so is suitable for environments with electrical interference. Its

disadvantages are its higher cost, as well as its extra bulk. Shielded twisted pair is

often used in networks using Token Ring technology.

3) Coaxial Cable. Coaxial Cabling has a single copper conductor at its centre. A plastic

layer provides insulation between the centre conductor and a braided metal shield.

4) Fiber Optic Cable. It consists of a thin glass centre core surrounded by several

layers of protective materials.

Network switching

A network switch is a small hardware device that joins multiple computers together

within one local area network (LAN). In addition, Network switch is a marketing term

rather than a technical one. Switches may operate at one or more OSI layers, including

physical, data link, network, or transport. You can see hair picture for switching device:
Network router

Network router is a device of software in a computer that forwards and routes

data packets along networks. Also, network router connects at least two

networks, commonly two LANs or WANs or a LAN and its ISP network. However a

router is often included as part of a network switch.

Databases

A database management system (DBMS) is software that has been created to allow
the efficient use and management of databases, including ensuring that data is
consistent and correct and facilitating its updating. A database is a set of data that
has a regular structure and that is organized in such a way that a computer can easily
find the desired information.
Structured query language(SQL) is a common standard for describe and queries
database and is available with many commercial relational database products,
including DB2,Oracal, Microsoft Access and MySQL.

Bahwan CyberTek company use SQL relation to built database so, I installed SQL
PLUS in my laptop to learn and practice. I learned many things from this program for
example:

1- Create Table

The CREATE TABLE statement is used to create a table in a database is as follows:

CREATE TABLE table_name


(
column_name1 data_type,
column_name2 data_type,
column_name3 data_type,
....
)

2- Constraints

Constraints are used to limit the type of data that can go into a table. In addition,
Constraints can be specified when a table is created (with the CREATE TABLE
statement) or after the table is created (with the ALTER TABLE statement).

I was focusing on the following constraints:

NOT NULL

UNIQUE

PRIMARY KEY

FOREIGN KEY

CHECK

DEFAULT

NOT NULL Constraint

The NOT NULL constraint enforces a column to NOT accept NULL values. Also, the
NOT NULL constraint enforces a field to always contain a value. This means that you
cannot insert a new record, or update a record without adding a value to this field.
The following creates a NOT NULL constraint on the "P_Id" column when the
"Persons" table is created:

CREATE TABLE Persons


(
P_Id int NOT NULL,
LastName varchar(200) NOT NULL,
FirstName varchar(200),
E-mail varchar(200),
Country varchar(200)
)

UNIQUE Constraint

The UNIQUE constraint uniquely identifies each record in a database table.


Moreover the UNIQUE and PRIMARY KEY constraints both provide a guarantee for
uniqueness for a column or set of columns. A PRIMARY KEY constraint automatically
has a UNIQUE constraint defined on it.

The following creates a UNIQUE constraint on the "P_Id" column when the
"Persons" table is created:

CREATE TABLE Persons


(
P_Id int NOT NULL,
LastName varchar(200) NOT NULL,
FirstName varchar(200),
E-mail varchar(200),
Country varchar(200),
UNIQUE (P_Id)
)

PRIMARY KEY Constraint

The PRIMARY KEY constraint uniquely identifies each record in a database table.
Primary keys must contain unique values. However, each table should have a
primary key, and each table can have only ONE primary key.

The following creates a PRIMARY KEY constraint on the "P_Id" column when the
"Persons" table is created:

CREATE TABLE Persons


(
P_Id int NOT NULL,
LastName varchar(200) NOT NULL,
FirstName varchar(200),
E-mail varchar(200),
Country varchar(200),
PRIMARY KEY (P_Id)
)

CHECK Constraint

The CHECK constraint is used to limit the value range that can be placed in a column.

If you define a CHECK constraint on a single column it allows only certain values for
this column. Also, if you define a CHECK constraint on a table it can limit the values in
certain columns based on values in other columns in the row.

CREATE TABLE Persons


(
P_Id int NOT NULL,
LastName varchar(200) NOT NULL,
FirstName varchar(200),
E-mail varchar(200),
Country varchar(200),
CHECK (P_Id>0)
)

DEFAULT Constraint

The DEFAULT constraint is used to insert a default value into a column.

The default value will be added to all new records, if no other value is specified
CREATE TABLE Persons
(
P_Id int NOT NULL,
LastName varchar(200) NOT NULL,
FirstName varchar(200),
E-mail varchar(200),
Country varchar(255) DEFAULT 'Sandnes'
)

3-The SELECT Statement

The SELECT statement is used to select data from a database. The result is stored in a
result table, called the result-set.

SELECT Syntax:

SELECT * FROM table_name

Data requirement

In terms of the number of employees in BCT company me and others trainee tried to

build a program that help Executive Secretary to know all details of the employees

passport.

So, we were creating a program in excel show in figure (1). The aim for this project

arranging the process of taking and returning back the employees passport.

Functions:

- The system should show the details of the employees passport.

- The system should warn the user if the employees do not return back their

passport in the specified date.


Construction

1- Collect data about the employees and their passport.

2- Specify three columns:

 Date of taking passport.

 Date of returning passport.

 Date of warning the employee to return passport.

3- If the sys date – returning date = 7 days the system will highlight the returning
date.
4- If the sys date = date of expiration then the system will highlight the date of
expiration.

Management operation

In the last week I worked with a group of five employees. Where we make an interview

to a Diploma and Bachelor graduated student in order to occupy an IT teacher job in

Digital Oman project. My particularly job was to collect the CVs and divided them

according to the majors and the type of certificate and degree. Moreover, I called them

and determined the day to come to make an interview. I learned how to deal with

candidates if they fail in the interview politely. Moreover, I learned the process of

recruitment and organizing the interviews. Likewise , I enjoy the group work as well as I

was committed with my individual job.


Limitations

Nothing in the world is perfect. So, There are several limitations in our training. For

instance:

1- Responsibility and Confidence. Some staffs are not trust the trainees so they did

not take them sensitive work.

2- Limited time. The time is not enough for information systems trainees because they

deal with technology .For example, when the computer stack does not work, they

need to wait for replay.

3- Boring Days. Sometime I feel boring because no tasks for doing.


Conclusion

The training is effectual way to convert theoretical lessons to the practical lessons.

Bahwan CyberTek are a good example for effectual training environment. The

training covered the activities of the company different divisions including: oracle,

Networks ,management task . Limited time, boring days and does not trust the trainee

are the most important problems which I faced during the training. So, there are some

suggestions for improving the training.


Recommendation

Related to my problems which are faced in our training there are some

recommendation.

 To improve training course, the organization should be prepare a clear

planning for trainees.

 Should the department of information system in bahwan Cybertek company

takes the trainee responsibility and trust them when they work and doing the

tasks.

 I recommend to Provide trainees with PC and password that help them to

search through internet and expires their work.

 Give trainees opportunity to work with project to increase practical said

rather than theoretical.

 Field education is more important to refine the knowledge.

You might also like