Professional Documents
Culture Documents
UNIVERSITY OF ZIMBABWE
PROGRAM : HBSCT
Chapter 1....................................................................................................................................1
Introduction.........................................................................................................................1
1.1 Background of the organisation.............................................................................1
1.2 Channels.................................................................................................................1
1.3 Competencies.........................................................................................................2
1.4 Structure of the organisation..................................................................................2
Department functions..........................................................................................................3
Human Resource Department......................................................................................3
Administration Department..........................................................................................4
Accounts and Finance Department...............................................................................4
Information and Technology Department....................................................................4
Vsion............................................................................................................................4
Mission.........................................................................................................................5
1.5: Coperate culture...........................................................................................................5
Chapter 2....................................................................................................................................6
Introduction................................................................................................................................6
Duties I carried out during attachment.............................................................................6
PC and Desktop Support Services...............................................................................6
Software Installation and Support...............................................................................9
Server Configuration and Maintenance.....................................................................10
Network Installation, Configuration, Monitoring and Maintenance.........................11
Research and Development in Networking ...................................................................14
Problem Statement:....................................................................................................14
Solution:.....................................................................................................................14
Problem Statement: Troubleshoot and Fix Pathetically Slow Network?...................15
Solution :....................................................................................................................15
Conclusion..................................................................................................................16
Web Development (Web Contact Database).............................................................17
Problems Discovered:.................................................................................................17
Solution:.....................................................................................................................17
Work carried out during the Yadah Connect project:......................................................18
Installation of SAP to new computers........................................................................18
Installation of operating system and Microsoft office packages................................18
Repairing of computer hardware................................................................................18
Backup........................................................................................................................19
Basis consultancy.......................................................................................................19
Major Activities.................................................................................................................19
Software Installation...................................................................................................19
Adding or installing a printer and scanner to a computer that is networked..............19
Networking.................................................................................................................20
Technologies I have learnt at Yadah Connect...................................................................20
Description of other duties performed........................................................................20
Relevance of the assignment to the degree of HBSCT.............................................22
Chapter 3..................................................................................................................................23
Analysis and Evaluation of the organisation.....................................................................23
Introduction.......................................................................................................................23
Nature of industry and industry requirements............................................................23
Salient features of the organisation............................................................................23
Relevance of Theory to Practice.......................................................................................24
Internet Programming, Database Concepts, Software Engineering, Programming...24
ICT Services...............................................................................................................25
Finance, Administration and Human Resources........................................................25
Audit...........................................................................................................................25
Developments in the domain of operation.................................................................26
Products and services markets....................................................................................26
Type of technology used............................................................................................26
Chapter4...................................................................................................................................27
Assuming a role which carries a little of responsibility and accountability;..............27
Working with highly skilled and experienced experts...............................................27
Industry reality...........................................................................................................28
Principles of management-.........................................................................................29
Networking concepts-.................................................................................................29
Computer Hardware and Architecture concepts-.......................................................29
Databases and SQL concepts ....................................................................................29
Operating Systems concepts.......................................................................................30
Principles of communication......................................................................................30
Systems Analysis concepts.........................................................................................30
Software Engineering concepts..................................................................................30
Computer and Network Security................................................................................31
Project Management...................................................................................................31
Chapter 5..................................................................................................................................32
Introduction.......................................................................................................................32
Key skills development..............................................................................................32
Planning skills............................................................................................................32
Organizing skills.........................................................................................................32
Interpersonal skills.....................................................................................................32
Personal development................................................................................................33
Proffessional development.........................................................................................35
Chapter 6..................................................................................................................................37
Introduction.......................................................................................................................37
To University Of Zimbabwe (UZ).............................................................................37
Reality in the Industry................................................................................................38
Challenges faced.........................................................................................................38
Recommendations to the Department of Computer Science......................................38
ABBREVIATIONS & GLOSSARY.......................................................................................40
BIBLIOGRAPHY....................................................................................................................41
ABSTRACT
The author joined the Yadah Connect as a trainee for on the job training or work related
learning. In this report the author highlights the challenges that he encountered, the tasks he
was appointed to solve and the actions taken or the solutions reached to solve problems. The
author was able to explore the details of the information technology structure, to deliver and
to learn about technologies in various fields, like system development and support,
procurement of Yadah Connect, user support and training, and hardware and network
maintenance and support. The period of work related learning that the author has been with
Yadah Connect benefited him in terms of knowledge, experience and was able the integrate
theory learnt at college and practice or exposure on the job. It also helps the university to
assess and evaluate the relevance of its program to the society’s needs.
ACKNOWLEDGEMENTS
The author is indebted to all the Yadah Connect , IT department and the Security
departmental staff who contributed to the knowledge that was acquired. Authors heartfelt
gratitude is directed to the following people for playing a crucial role during his year of
attachment:
Supervisor Mr Chimhau
Operation Manager (Yadah IT Operation).
Chapter 1
Introduction
This chaper is going to explain the sructure of Yadah Connect how the organisation interact
with each other to effectively manage its operations.It will hightlight the background of the
organisation the channel of distribution and the overal structure of the organisation.
Yadah Connect provides consumers, small business enterprises, corporate institutions, public
sector enterprises and stakeholders with a broad range of products and services, through its
various subsidiaries
Founded in 2016, Yadah Connect, operating as a holding company for its cooperatives, is
steadily growing into a strong company with a unique brand impact, objective and drive
respected for its commitment to improving the economic and skill resources of all
stakeholders.
With over 30 Yadah Connect agents represented across all provinces in Zimbabwe, as well
across the globe, the company has made it a mandate to reach and tap into Africa’s vast
resources in order to create a visible sign of invisible grace.
Yadah Connect provides consumers, small business enterprises, corporate institutions, public
sector enterprises and stakeholders with a broad range of products and services, through its
various subsidiaries, covering a vast number of industries, including:
Mining
Farming
Construction
Transport
Solar dried products
Bee keeping
Software development
1.2 Channels
1.3 Competencies
Yadah Connect boasts of a staff compliment with highly skilled consultants whose unique
mix contributes to a successful diverse product and service range designed to address global
needs.
Department functions
Last but not least the department is responsible for employment Law compliance that is
monitoring and implementing applicable federal and state human resource requirements,
developing conducting; and tracking legally required training.
Administration Department
Security and Evacuation
Vsion
Empowering thousands and giving you a life.
Mission
Yadah Connect aim to provide the ultimate in professional, reliable, and effective stone
restoration and care for our customers. Their passion for beautifying natural stone combined
with our extensive expertise, state-of-the art technology, and intensive technician training
allows us to fulfill our mission for all our clients, no matter what their needs. From corporate
lobbies and factory floors to private kitchens and personal patios: If it’s made of stone, we’ll
make it like new again.
It is defined as a union of values, beliefs, attitudes and behaviour that employees enact and
exhibit, enabling them to think and act in a certain manner that is distinct from other
organizations. Corporate culture can hence make or break the entity. As a result of its
magnitude, employees have an obligation to remain loyal to the organization and its valued
clients, working hand in hand towards common corporate objectives in a manner that
outperforms its competitors.
Chapter 2
Introduction
This chapter will explain the link between the degree of business studies and computer
science in the work environment and how it is used to sovle problems in the organisation.It
will contain the stages how to sovle a given problem how too notice the computer problems
and how to solve, also how to make the ineternet fast when it is low in the organisation.
2.Computers -hard reset (removing the battery and press the power
with blank button for about 10 seconds)
screens failing -remove the CMOS battery and plug it back , this
to boot was in notion to reset the CMOS which is a memory
chip that houses settings and configurations
3.Malware - malware cleaning using Windows Defender -Learnt malware
Infected -resetting the Operating System services can run in
machines the background
occupying
significant amount
of RAM causing the
turnaround of
machines to be slow
thus in general
making a machine
slow, malware
services can also
chew a lot of
Bandwidth in the
Background
4.Faulty -replacing faulty parts
screens, VGA
cards, network
ports, USB
ports
5.Loss of User .Google Services -I learnt Google
Data due to (a)Google Drive Installation Sync contributes
Computer - installing google drive more on Upload
Crash To sync files between local machine files and the since most of the
online google drive times users work on
(b) Teaching users how to use google docs their local machines
and a good upload
speed is required
hence as IT
Department when
subscribing for
Bandwidth it is not
only download
speed that has to be
considered but the
Upload speed too ,
for example Cloud
based Companies
like Microcred if
possible should
subscribe for
unlimited Upload
speed
Working in Google
docs also require a
good upload speed
6.Software -solving through research from Google - with the
problems availability of
-Word network access I
-Excel learnt users ask
-Libre some simple
-Gmail solutions that are on
- Google ,from this I
learnt the
importance of
Information
Literacy to every
person no matter
one’s profession
-I learnt
Information
Literacy techniques
helped me solve the
problems since I
didn’t have all the
theoretical
knowledge.
7.Printer Setting up network printer It is required to
Connections Setting up USB printer Connections maintain same
network addressing
as the client
machine for the
printer to be
accessible
8. Two
different
networks need Setup wireless or cable connection on the
accessing one printer for network A and install USB
printer connection to network B and share the Printer
-Excel
-Libre
-Gmail
-I was responsible for the installation of the above Software and Programs
Routers.
-configure new machines for internet connection -from this
-adding machines to a Domain experience I
applied my theory
in network
addressing and I
managed to play
around all
Network
Classes(A,B and
C)
-I learnt how
DHCP service
works, for
example I
regularly
encounter ip
address of
169.x.x.x
network
-this means the
machine couldn’t
find any DHCP
server on the LAN
- I also
encountered
windows IP
conflicts messages
-this made me
understand to
avoid disaster on
LAN Server
Machines should
have static IP
Addresses.
-I learnt how DNS
resolve names to
IPs, learnt it is
easy to manage
domain controlled
machines.
Configure Wireless Connection -it is required to
Physical connection and installation of Ubiquiti set static IPs for
Wireless Access Points these Access
Network configuration of these access points Points and during
assigning IPs to
Access points first
make sure there is
no device with the
same IP on LAN
-PC and Desktop Network Configuration (IP Addressing, Adding computers to Domain,)
-network connectivity troubleshooting
-Physical Connections (Cable colour coding-RJ45) →exposed to Console Cables, RJ45
Cable,
-Firewall Policy Configuration (WLAN Failover configuration)
Research and Development in Networking
Problem Statement: Research And Implement How To Add ADSL Link As A
Secondary Or Backup Link On Watch-Guard Firewall?
Solution:
1. First step was to remove ADSL from DHCP broadcasting
2. Set a Static network Address for ADSL that is different from LAN network (if these
networks were to be the same there would be confusion in the Firewall/Router –
Routing Table Issue)
3. Configure Secondary interface on Firewall and input ADSL ip address
4. Done, now we could have ADSLs in our branches as Backup Links.
This has been implemented in 9 Branches.
Diagram Showing ADSL Connection as Secondary Link:
Solution :
1. Use of Monitoring Tools like Wireshark and Solarwinds Network
Monitoring Tools to analyse network traffic
2. Above Tools showed a lot of multicast and broadcast traffic.
-Use Elimination Rule (removing network infrastructure thus switches
and computers one by one and see if network improves)
-all this was in notion to find a broadcasting machine but has never been
easy and we couldn’t pick the broadcasting machine
3. To minimise multicast and broadcast traffic we had to block multicast
traffic on each of our network switches
Conclusion
To eliminate this Layer 2 Problem and not to doubt any Layer 1 and 2 infrastructure
we had to install Ubiquiti Access Points and switched the LAN from cable to Wireless.
There was an improvement. However I realised when troubleshooting slow network
checking the ISP link should be the first step for example plugging in a PC direct to the
ISP and check if you get the subscribed bandwidth on your connection this can be
donethrough network speed checking sites like (speedtest.net,speedtest.co.zw ). Not only
the Bandwidth could be checked but also the Latency.
In Summary we had a layer 3 problem on the LAN and a latency issue on the ISP side
that is Liquid Telecoms.
Problems Discovered:
- Expense of internal calls for requesting external calls
-delay on trying to find the required contact from printed copies
-by the time a user request a call on Reception it means External calls are being blocked
momentarily
-Receptionist would manually capture call logs details, by being overworked the
Receptionist may not record all call logs hence communication not traceable.
Solution: I developed an Ajax powered Web Application that allows
1. . Each department to save, edit and add it’s contact list
2. allows the user to search for required contact using keywords like name and since it was
Ajax powered the application could bring results quickly through autocomplete just like
what Gmail and other apps does.
3. Any user of any branch and department could first select table of interest for example
(Mutare Branch, Bulawayo Branch, and IT Service Providers) then put a keyword of
name or ISP to search.
allows user to make a request for a call (each contact result had request call option)
-The user must be logged in first ,when user click request call button , the reception
could receive a pop up sound notifying the new request queued in the database the
Reception Interface could update in 20 seconds,
Reception page interface shows details of person requesting call and the recipient
details after seeing new request the Receptionist makes a call and forward to one
who requested ,on her interface each call request row has Through and failed button
the Receptionist click failed button if the phone failed to get through and the request will
be deleted from call requests table.
The Receptionist click Through button if phone get through and all call log details will be
saved accordingly – this time the Receptionist does not need to type anything but just click
Success button to compile Call Logs.
Allows a user to request a call for a new contact by populating a relevant form then submit
and the new contact will be automatically saved in contact database.
The Above Application minimise internal communication costs, automatically update contact
database, minimise turnaround for calls requests enhancing effective communication,
automatically creates Call logs report, minimise time in searching a contact in hard copies
since autocomplete powered search replace this manual work, no more costs on papers to
print contact list for whole organisation workers.
The Above Application was developed and hosted on my personal Web Hosting Server.
supply with a new one. The malfunctioning of the network card was usually a result of it
being disabled, the solution was to enable it or replace it with a new one if the latter failed.
When resistors on a motherboard were destroyed usually they would be replaced by a new
one.
Backup
Backup of the servers was done daily after working hours. Backup was done to production
(Database), quality assurance (QAS) and development (DEV). The backup process would
take place during the night and it was done on tapes since the dump of the system was very
large
Basis consultancy
SAP users would be helped via the helpdesk or by having technicians sent to their stations.
The common problems that SAP users would have were, they would erase some of the
functional setup files of SAP hence they would be unable to log onto the
System or the system would be infected by the viruses. The latter problems were usually
solved by reinstallations of the SAP package.
Major Activities
Software Installation
This included installation of software to the newly purchased computers or those which
would have corrupted. During the Installation of the software, close attention was to the steps
which needed prompt response accordingly, like clicking next after every step then Finish
after the installation procedure. The student was also taught that after every installation there
is need to restart the computer always then confirm whether the Installation has been
performed correctly by opening all the packaged programmes
Networking
We set Up a Local Area Network (LAN) at various centers. During the Networking I was
tasked to make some Straight Through cables using a Cramping Tool. We used UTP Cables
to connect the terminals. I was also tasked to connect the terminals to the server via the
switch.
organisation for the specifications, so they would produce RFPs we would produce RFQs
specifying the required specifications.
Chapter 3
Analysis and Evaluation of the organisation.
Introduction
This chapter will explain clearly the nature of the the industry requirement and how the
industry link with the modern technolgy.Also explain the mordern technology Yadah connect
is using in its operation.Although I will go deeper because some of the information are
private and cofidential in the organisation.
Computer Architecture
The theory was implemented in PC and Desktop repairs day to day activities e.g increasing
RAM size, expanding computer page size, installing relevant OS on small or large RAM
computers.
Communication Skills
This course theory application has been pivotal in communicating to the whole organisation
via emails, handling users queries and reporting to my co-worker and Superior.
Life skills learnt from helped me balance work and personal development pressure.
Information Literacy
I faced new problems every day on which I had less to no knowledge on how to solve them
but due to good research techniques acquired from this course and personal skills I managed
to solve almost every problem.
Entrepreneurship
Optimizing IT Services requires one who understand that it is essential to meet organisation
goals, objectives and vision. It is not enough to be only technically capable, business
decisions are exercised every day in buying IT Services and infrastructure and this require a
good business understanding.
ICT Services
Coordinate, monitor and advice on all information technology activities in the Civil
Service that is Systems Requirement Analysis, preparing requirements for proposal
documents, evaluation of tenders, contract negotiations, project monitoring, project
management and implementation.
Provide a central computer processing facility to government ministries and
departments.
Facilitate the development of e-Applications and local content.
Train or facilitate ICT training for civil servants and citizens.
Audit
Monitor and evaluate the internal control systems in the organisation.
an urgent need to increase pace in as far as the ICTs are taking over the world so this has
caused this rapid change. It has been noted that the rate of poverty eradication amongst most
societies is directly proportional to the percentage of their technological advancement and
appreciation so this has caused this industry to operate in ever changing stance. Day in and
day out developments are happening whereby better, faster and cheaper technological
solutions are introduced. Like for example, Voice over Internet Protocol (VoIP) has been
introduced and it is slowly taking over GSM and our conventional Land telephones. The
people in the country are also increasing their rate of appreciation towards ICTs and this has
caused the people in the industry to amplify the intensity of their research towards new things
so as to remain ahead of the society as a whole.
Yadah Connect uses T24 MIS systems for reports writing, and mac book desktop computer
for development of applications.However in department such as marketing they use digital
signs, Facebook, twitter, linked in workplace, google + community as a way of
communicating within the company and also with our valuable clients.
Computers, printers, scanners and hard drives are used so as to send and receive information,
within and outside of the organization. Most of these computers are connected to the network
of internet and the intranet. Internet is used to send and receive emails and also to search the
information which is beneficial to the organization for decision making. The internet has been
facilitated by the establishment of Wi-Fi at Yadah Connect ICT room. Also, the intranet is
used to share information, devices such as printers, and to share the programs like the pastel
accounting system.
The management tries to keep in line with technological changes. A lot has been done in
upgrading the computer system such as the use of anti-virus materials and latest software
packages. There is a specific IT department and more computers are purchased to ease
operations.
Chapter4
I expected to use my own office with own desk and PC a laptop that I would carry home for
mainly unfinished business at work. I expected to go out with our seniors and supervisors
each time they went out for various operations that were work related but it did not happen.
Further expectations of coming across various advanced sophisticated systems and hardware
which would be more disadvantaged by the possession of theory only which I acquired for
the first two years at the university. So lack of experience was going to be a major drawback
to my day to day activities as everything would want hands on experience.
His perception towards management was wrong too, managers are not there to flex their
muscles or rather bully their subordinates in fact managers are there to direct, guide,
supervise and control their subordinates and activities in their departments, and to attend to
specific high level issues because of their superior capacities and capabilities in order to fulfil
the organization’s objectives.
Industry reality
Prospects appeared so much different to what appeared to be on the ground. I did not go out
travelling and exploring with my seniors, had no office of my own just a PC depending on
what department i was in. I had no work identity card as well i had to flash my national id
and convince clients by word of mouth about where i worked. At one of the departments I
valued sharing one block of office as it actually encourages and strengthens teamwork. Since
I was more involved in the support side of IT I discovered that the time one spend in the
office is not determined by efficiency and effectiveness one is when executing tasks.
When I got into the industr Yadah Connect and Cyber Security I realized that being an IT
person you are not entitled to the most demanding tasks only everyday of you working life.
This was proved as I sometimes attend to users who were having challenges in accessing
office applications simply because it would have crashed and would be wanting a new
installation. You would not do work alone if you found it challenging, you would get
assistance from colleagues.
Comparing to what we learn as theory learnt at college, could not match precisely with the
practical applications, the student noticed a common approach that was particularly
emphasized by the supervisor. To create effective communication, he was supposed to report
to the supervisor on task he had to do.
Would confess that as a trainee I faced many challenges in maintaining and improving the
ICT structure and services so as to increase IT credibility in the organization. These
challenges were complicated by the demands of an increasingly complex IT environment,
various user problems and at large lack of resources.
During the attachment period I gained lifetime experience in understanding the relationship
between theory and practice. Professional and industrial experience as a product of theory
initiates for a symbiotic relationship between theory and practice. The outlined modules
proved to be of paramount importance to practice and the business environment inclusive.
Databases and SQL concepts –On numerous occasions during EOD, I used execute
SQL statements to manipulation data in the various tables in the database. I really appreciated
the database and database design module. I was getting failure with manipulation of data e.g.
I used to check space in the database, back up user data in the database, compressing the
data, making adjustments to FLEXCUBE in the different tables in the database.
Systems Analysis concepts- Systems are created to solve problems. One can think of
the systems approach as an organized way of dealing with a problem. In this dynamic world,
The subject System Analysis and Design, mainly deals with the software development
activities. There were various systems at and being an IT person I got a chance to take part in
User Acceptance Testing stage during the development of various systems. I installed the
various software used during the test like Oracle Client, SQL developer and many other
software. Being involved in this stage also enables me to understand the system that was
being implemented so as to help the various users who would use the system.
collective processes and mechanisms by which sensitive and valuable information assets and
key services are protected from unintended tampering or publication by unauthorized
individuals. My task in computer security was to install antivirus on every machine which is
good for scanning your hard drives and any removable disks that you may attach to your
computer. Password controls were also used in the organization and my task was to ensure
that whenever a user request a password reset an email is sent requesting a reset for audit
purposes. Also we used to keep inventory of all the hardware by keeping an asset register
which was always updated whenever hardware was dispatched. I was also did backup during
EOD process for FLEXCUBE, Leasepac (system used in Asset Finance) and Bankers Realm
(system used in Microfinance). The purpose of the backup is to protect the database against
data loss and reconstruct the database after data loss.
Chapter 5
Introduction
Planning skills
Voluminous nature of workloads at Yadah connect and Cyber Security made me appreciate
and apply various planning techniques. This has equipped me with proper planning skills.
For example, as the administrator, l learnt to set SMART objectives .I used to set my work
objectives at the start of each day and I followed the work plan. Through this, I was able to
tackle workloads and handle conflicting demands without difficulties.
Organizing skills
Voluminous and challenging nature of IT activities has equipped me with organising skills. I
have come to apply Fayol’s principle of order, “Records have to be at the right place at the
right time”. I have learnt to keep all my things in order and this has helped in solving issues.
Proper organisation has made it possible to tackle my work without hassles.
Interpersonal skills
Involvement in various forms of communication ranging from telephone conversations to
emails has improved my communication skills. I have come to appreciate the importance and
applicability of principles of communication. These skills were also strengthened through in
help desk administration since this requires effective communication skills such as good
listening and presentation solutions to users’ queries.
Conceptual skills
Working in IT Department, supporting various departments has enabled me to see things in a
holistic approach. I have come to understand the concept of synergy and would try by all
means to assess the implications of my actions to the whole system before implementing
them.
Personal development
Since I had never been employed, I had the zeal to experience the working lifestyle; I had
eagerness to harness as much information about the surroundings as possible. My very first
day at Yadah Connect I wanted to be given tasks to do so that I could have a feel of what
working is all about. During the period I noticed that I had my strengths and weaknesses
which I have listed below and I can proudly say the strengths outweigh the weaknesses.
The “ability to work with others in a team, communicate and persuade and have interpersonal
sensitivity”, the “ability to desire to learn for oneself and improve one’s self-awareness and
performance” and “technical ability”
Flexibility
During the time I was being taught on how to execute certain tasks I discovered that I am just
the way I am at school because it could not took thrice explanations except on some very few
tasks which were a bit complex. I could easily fit myself into the workplace as well as the
tasks I was required to carry out.
Communication
I have managed to keep consistent communication between myself, my IT colleagues and all
the workmates at the bank. Because I have accepted that I am at Yadah Connect to learn and
contribute what I know I could easily consult whenever I need assistance. Actually I decided
ask more questions doing the right thing unlike less questions doing the wrong thing as this
reduces my dignity as well as the university’s. One of my duties was to talk to users
whenever they had problems. As a result the attachee learnt to be polite, patient and tolerant
with different characters. With particular attention to verbal skills, the student noticed a big
improvement.
Responsibility
I never been responsible in my life but I can safely say Yadah Connect has strengthened my
responsibility. I can easily say when assigned a task I have to make sure that I execute it
responsibly minding my own business. I was developed in such a way that now I know when
one is responsible he is also accountable
Tolerance
The strength helped me a lot especially in improving the social side of me. At times when
attending to user, one would be watch timing you treating you as if do not know what you
doing. Some would be saying frustrating statements but thank God that I do not get upset
easily instead I tolerate and continue with my task.
Acceptance
By accepting that I am on work related learning seeking to advance my career as well as
building acceptable image for my university institution I could easily find myself listening to
users’ contribution towards the tasks I will be executing as well as my career. Actually I have
come to the realisation that not only the IT colleagues can help you but anyone else can do.
Time management
Time management encompasses planning, allocating, setting goals, delegating tasks,
analysing time spent on tasks, organizing, scheduling, and prioritising tasks according to their
level of importance. I really have more developments on how to manage my tasks. When I
got to Yadah Conneect one of my strengths was good time management as I had never come
to work late and also received less complains from the users when solving their problems.
What helps me out was task prioritisation.
Self confidence
Because of the help I got from the people I worked with, I grew confident in everything that I
did and this helped me to improve myself and be exposed to many things and be involved in
many assignments. At times I could execute tasks that I was not familiar with because of the
confidence I have. Actually this was one of my greatest strengths that helped me develop the
skills I have now. Being confident helped me gain respect from the MICTCS staff.
Work Related Learning is there to arm students with practical skills on what they have
learned theoretically, the student had to concentrate on learning. The more she did the work
the more she learned.
Proffessional development
is process of obtaining the skills, qualifications, and experience that allow you to make
progress in your career.
As a student I was ambitious and eager to have my hands on each and every task that was
being done at the workplace. I experienced there as I would like to go in the field to
implement some tasks I thought would extend my knowledge base so that I will increase my
competitive edge on completion of my degree program. All these efforts were daydreaming
as theYadah Connect has certain parameters to be followed so that only limited individuals
have rights to certain tasks in the system in order to prevent funds fraudulent.
Therefore the need to fulfil my personal goals and existing organizational goals sometimes
diverged and conflicted. As a way to handling there I would do my assigned tasks diligently
and then revert to my own tasks. The main reason was because my own tasks I was able to do
them at my spare time whereas on assigned tasks I was contributing to the credibility of the
IT department so they have to be done first as there may also increase the university’s
credibility.
Chapter 6
Introduction
Recommendation to the department of computer science to meet the expectation in the
industrial attachment period.
The college should have a research centre where all IT students go and further their academic
knowledge into practical knowledge. This IT centre would provide an opportunity for the
mixing and mingling of different students who will then show case their talents and
innovation through research and experiments. By so doing, most students would benefit from
each other.
One alternative issue conjointly, a research centre would offer a platform for the invitation of
other corporate bodies who will then add expert advice knowledge and all other forms of
support like monetary support. These stake holders may even provide invitation trips to their
organisations and thus improving the exposure of all participating students.
The course modules should be adapted to fit industrial standards like for example moving
from Visual Basic 6 to VB.NET which is currently used the most in industries. This will
allow students to quickly familiarise with it when they go on work related learning.
The university should consider allowing students to be attached to more than one
organisation over the period of attachment to allow the students to experience a variety of
exposure.
The college should add a project module for students on attachment. An attachment project
would keep the students on the urge and thus helping them not to lose their academic touch
during attachment. This can also help in broadening the innovative stance of students
especially if they would be given `challenging tasks.
According to my personal experience there are more Companies that are ready for IT Support
practitioners than Software Development. Starting from interviews I have been called for few
Challenges faced
May the department do something on this to change how the Industry perceives us. Existence
of an experimental Lab with all networking hardware, web Servers, Printers and all IT related
hardware and any I may not have mentioned can well prepare us for the Industry.
Conclusion
Having the oppotunity to work at Yadah Connect It has greatly empower me to bridge the
gap between theory and practice. This has a great impact in daily problem sovling in the
computer science field and I had greatly benefited with this on field practise. Yes it was of
great impotance for the university of Zimbabwe to put all undergraduate degree programmes
under industrial practise.I salute Yadah connect For this great oppotunity to learn and
BIBLIOGRAPHY
Reference
1. http://www.yadahconnect.com
2. Transforming Regional Economies and Communities with Information Technology
Stewart Marshall; Wallace Taylor; Xinghuo Yu.
3. Software engineering Ian Sommerville 7th edition
4. Marketing
5. Yadah Connect Strategic plan 2016 - 2018