You are on page 1of 38

YGLOBALSTAFF

TRI
NING PROPOSAL
Pr
ese
nte
dby

Cy
ber
netCompy
ter&Secur
it
y(U)Lt
d

Of
fi
ceLi
ne:0
392
-887
972|Ema
il
:su
p p
o r
t@c
csu
g.n
et/i
nfo@c
csug.
net
1

Proposal to provide Training services to

YGlobal

A Non-Government Organization, Located at Kiyrandongo - Uganda


2

Table of Contents
List of Abbreviations and Definitions ............................................................................................. 4
Non-Disclosure and Confidentiality Agreement ........................................................................... 5
COVER LETTER..................................................................................................................................... 6
INTRODUCTION: .................................................................................................................................. 7
Mission statement: ............................................................................................................................ 7
Core values:........................................................................................................................................ 7
Goals: .................................................................................................................................................. 7
Guiding Principles: ............................................................................................................................ 8
Executive Summary: ........................................................................................................................... 9
Revision Highlights: .......................................................................................................................... 10
1.0. OUR METHODOLOGY TO TRAINING PROJECTS. ................................................................... 11
1.1. Clarity of purpose (Goal focus). .......................................................................................... 11
1.2. Excellent communication skills: Accurate language. ........................................................ 11
1.3. Prioritization, planning and delegation. ............................................................................ 11
1.4. Rational conflict. .................................................................................................................. 12
1.5. Inspiration and motivation. ................................................................................................ 12
2. PROJECT BENEFICIARIES: ............................................................................................................ 13
2.1. Project approach: ...................................................................................................................... 13
3.0. Technical information .............................................................................................................. 15
3.1. Overall objective: ...................................................................................................................... 15
3.2. Division sections or lots: .......................................................................................................... 15
3.3. Items to cover during the Essentials Training: ...................................................................... 15
3.3. Volume of the contract. (Quantities). ...................................................................................... 16
3.4. Duration of the contract. .......................................................................................................... 16
3.5. Timing ....................................................................................................................................... 16
3.6. Location ..................................................................................................................................... 17
4.0. SERVICES DESCRIPTION (Tasks and expected Deliverables). .......................................... 18
4.1. Expertise and venues required .......................................................................................... 21
4.3. Organisation of the work with the Contracting Authority .................................................... 23
4.4. Other aspects ............................................................................................................................ 23
4.5. Protection of personal data of participants ............................................................................ 23
5. TEAM STRUCTURE ........................................................................................................................ 25
6. LEAD TIME TO START SERVICES ............................................................................................ 26
6.1 Methodology on how the service will be performed .............................................................. 26
6.2. Time Table ................................................................................................................................ 27
6.3. Course Outline .......................................................................................................................... 27
3

6.4. Training procedures:................................................................................................................ 30


6.5. Seating arrangements for various training applications ....................................................... 32
6.6. Reporting on contract performance ....................................................................................... 33
6.7. Evaluation of contract performance ....................................................................................... 33
6.8. Cancellation .............................................................................................................................. 33
7. QUALIFICATIONS:.......................................................................................................................... 34
APPENDIX B - PROJECT DETAILED COST / INVESTMENT .......................................................... 35
APPENDIX CTRAINING EVALUATION FORM ................................................................................ 36
BENEFITS: ........................................................................................................................................... 37
4

List of Abbreviations and Definitions


YG YGlobal (Contracting Authority)

CCS Cybernet Computer and Security (U) Ltd (Contractor / Cybernet)

ICT Information Communication Technology

Refreshers Trainees that came with some prior computer skills and desired revision.

Beginners Trainees who had no computer skills at all prior to this training.
5

Non-Disclosure and Confidentiality Agreement

The undersigned (‘Recipient’), hereby agrees that all financial and other information
(“Information”) that has and will receive concerning Cybernet Computer & Security (U)
Ltd is confidential and will not be disclosed to any other individual or entity without prior
written consent.

The Information shall remain the property of Cybernet Computer & Security (U) Ltd and
shall be returned to Cybernet Computer & Security (U) Ltd promptly at its request
together with all copies made thereof.

YG acknowledges that no remedy of law may be adequate to compensate Cybernet


Computer & Security (U) Ltd for a violation of this Agreement and YG hereby agrees that
in addition to any other legal or other rights that may be available in the event of a breach
hereunder, Cybernet Computer & Security (U) Ltd may seek equitable relief to enforce
this agreement in any court of competent jurisdiction.

__________________ __________________________
Date Signature of YGlobal
6

COVER LETTER

Our Ref: CCS/YG/11/05/23

Dated: 30th/May, 2023

To;
The Executive Director,

Thru;
The Operations manager,
Head of I.T,
YGlobal - Kiyrandongo
P. O. Box
Kiyrandongo – Uganda.

Dear Sir/ Madam,

RE: STAFF TRAINING PROPOSAL

We thank you for giving us the opportunity to submit our proposal in respect of
the above matter.

In line with your requirements, please find herewith attached details of our
proposal, for your kind consideration.

We trust that this is satisfactory enough; however, should you require more
information, please contact the undersigned.

Yours faithfully,

Ssegujja Patrick. C.
Director
+256 704 218263 | +256 763 328931
sse.patrick@ccsug.net

For Cybernet Computer & Security (U) Ltd


7

INTRODUCTION:

CYBERNET COMPUTER & SECURITY (U) LTD has been established as an Information
Technology company in Central Uganda.
Our traditional business model is based on the accomplishment of IT support services in
East Africa particularly in Uganda, both in the public and private sectors.

Based on the decision of the company to diversify our services; we have now established
this corporation in several parts of the country. In addition to Technological investments,
the company has invested portions of its assets in various technologies to meet the
demand and growing market trends.

Company Strategy:
Purpose:
To be a leader in the ICT industry by providing enhanced services and relationship.

Vision:
To provide quality services that exceeds the expectations of our esteemed customers.

Mission statement:
To build long term relationships with our customers and clients and provide exceptional
customer services by pursuing business through innovation and advanced technology.

Core values:
❖ We help people improve their live through technology
❖ We believe in treating our customers with respect, faith and diligence.
❖ We grow through creativity, invention and innovation.
❖ We integrate honesty, integrity and business ethics into all aspects of our business
functioning

Goals:
❖ Regional expansion in the field of IT and develop a strong base of key customers.
❖ Increase the assets and investments of the company to support the development
of services.
❖ To build good reputation in the field of IT and become a key player in the industry.
8

Guiding Principles:
Dedication. Every day, consistency is key. CCS is dedicated to each and every job – down
to the very last detail. It is this tenacity, attention and focus to detail on each and every
project that defines the success of this organization.

Dependable. CCS believes that a commitment to meet all its obligations punctually,
honestly and honorably. CCS believes that if you are the "go to" business, you'll never
have to worry about having to generate extra leads or word-of-mouth referrals.

Give and You Shall Receive. Give the thing you want most and you'll be amazed at what you get
in return. CCS firmly believes in this philosophy and that its efforts can be multiplied for the
greater good of the company, its customers and the community.
9

Executive Summary:

YG a non-government initiative in her mission to help increase the use of computers for
its staff has initiated a computer training program. This is focused on increase technology
use among staff in an effort to achieve better service delivery and increase performance
and productivity to people they serve with the use of technology.

YG has therefore collaborated with Cybernet Computer & Security (U) Ltd (CCS), a private
body to conduct the basic training of staff to equip them with basic and essential
computer skills to learn the new system’s functionality and service procedures.

The training is estimated to run for a period of three (03) weeks in at YG head offices. CCS
with her team of instructors will conduct the training and mobilize the training tools,
equipment and other necessary materials to effect the training as specified by YG.

Training staff to use computers and current technologies better will increase technology
use in their daily activities and they will find new methods of better service delivery,
motivation and meeting organization goals and objectives.
10

Revision Highlights:

Any changes or revisions will be highlighted in this section if project has been
resubmitted.

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………
11

1.0. OUR METHODOLOGY TO TRAINING PROJECTS.

Cybernet Computer & Security (U) Ltd (CCS) follows a standard, codified project
implementation methodology. Our methodology is a pattern-based approach that
emphasizes strong customer collaboration and high-quality system integrations. We
combine all the best practices we have adopted based on more than 12 years of
experience implementing computer training in hardware, software and related IT
equipment.

1.1. Clarity of purpose (Goal focus).


Goals are the starting point of all achievement. “Success” means “The achievement of a
goal”. Therefore, clarity of purpose, Goal focus, is the most important quality of a good
instructor and leader. CCS sets valuable goal and we stick with it until achieved as
intended by all our clients.
We always train people on to be “drifters” who set goals and they simply react to
circumstances as they occur.
On this course, we will encourage the development of a goal focused mind-set for staff
achieve the best out of it.

1.2. Excellent communication skills: Accurate language.


CCS instructor have the ability to accurately explain the project goals, ideas and feeling to
others they train, in such a way that they will understand you, agree with you and will act
in accordance with what has been trained.
As opposed to; suffering an excessive number of miscommunications, misunderstandings
and avoidable upsets. Clear communication is a must-have-skill to all our instructors and
we emphasize this to all our subjects.

1.3. Prioritization, planning and delegation.


Rational, logical planning skills. We have the ability to analyse facts and formulate
detailed, written plans of action that will achieve the set goals, in the most efficient
manner possible. This has very much help in being precise and straight to the point while
training in the most timely fashion and manner.
12

1.4. Rational conflict.


As we train, we tend to push a little further and teach subjects on professional behavior.
Teaching staff certain management skills like managing conflict professionally and
objective manner has greatly improved performance in various disciplines.
This will help to work as a team and always help one another at all circumstances.

1.5. Inspiration and motivation.


We believe in setting the trend and others follow. During training, we make it a point
teach learners have the ability to maintain a positive mental state of optimism and
realistic self-confident, especially when things appear to have gone wrong.
It gives leaners a sense that they can do better and all issues can be resolved easily. And
makes them have the ability to inspire the positive emotions of self-belief, desire and self-
confidence in the other members of the team.
13

2. PROJECT BENEFICIARIES:
At the time of writing this proposal, a total number of 20 or more YGlobal staff is
estimated to be trained over a period of 3 weeks or less.

The above is subject to change by the contracting Authority over the course of the
duration of the contract.

2.1. Project approach:


Based on this training project, CCS will regard it as a Managed Short Term Service and
Support.
The following timeline indicates major activities that must occur in phases in order to
implement a proper training service. Each phase of the timeline is described in greater
detail in subsequent pages. The specific time required for each phase will vary by State,
depending on such readiness factors as managed care infrastructure, YG support and
procurement policy.

Phase 1: Plan
• Develop Communications Plan
• Articulate Program Goals
• Develop Project Work Plan

Develop Communications Plan (early Phase 1)


Regular communication to YG is key to success. A communications plan should be
established early in the planning process and updated as needed throughout the lifetime
of the training.

Articulate Program Goals (early Phase 1)


One of the early roles of staff is to help establish a clear set of goals for the CCS training
and support staff.

Develop a Detailed Project Work Plan (late Phase 1)


Toward the end of the planning process, a detailed project work plan should be developed
to ensure an orderly and effective implementation. The plan should include:
14

• A detailed set of tasks with timelines, responsible parties and milestones; and
• A clear sequence, indicating which tasks are dependent on others having been
accomplished first.
Phase 2: Implement
• Continue Staff Dialogue
• Obtain YG management Approval as Needed

This phase begins with the decision to implement the training plan and culminates in the
enrollment of the training party.

Continue Staff Dialogue (throughout all phases)


Interest among staff increases when it becomes clear that they intend to move forward
with the implementation. Effective dialogue becomes even more important in this period.

Obtain YG Management Approval as Needed (early to middle Phase 2)


The need for approval need budget approval for operational resources, including new
and reallocated training staff positions if required.

Phase 3: Refine
• Monitor
• Correct Training Bugs
• Review Early Experience

Monitor Program (throughout Phase 3)


YG will monitor the training, with particular emphasis on ensuring that the training
service and Supports is being delivered in accordance with service plans, and contractors
are meeting all targets as set by YG.

Correct Training Bugs (early Phase 3)


Even the best planning does not foresee every issue that may result from the training, and
the first few days of training will focus on identifying and correcting unanticipated
training bugs.

Review Early Experience (middle to late Phase 3)


15

Once early training bugs are resolved, a more systematic review of the training’s early
experience may be conducted.

3.0. Technical information

3.1. Overall objective:


The training services to be provided as a result of this tender shall develop the skills in
the area of ICT, using an internationally recognized certification model (ICDL), of staff
members of selected organizations and particular to enable staff members to meet the
required level of knowledge and skills for them to be able to use the computers in their
areas of work and improve their skill set individually and performance at the work place.

The operating system to be used during this training will be Microsoft windows 10 or 11
and Microsoft office version 16 or 19.

3.2. Division sections or lots:


The contracting body YG may divide the training project into lots basing on the time frame
for the project completion and deadlines. Cybernet for that matter may adjust her task
force to fulfill the goals and objectives of the contracting authority through meetings to
discuss the implementation plan.

3.3. Items to cover during the Essentials Training:


On completion of this model the candidate will be able to:

• Understand key concepts relating to ICT, computers, devices and software.


• Start-up and shutdown a computer.
• Work effectively on the computer desktop using icons and windows.
• Adjust the main operating system settings and use built in help features.
• Create a simple document and print it out.
• Core concepts in daily service Programs i.e., Ms-word, Power Point, Outlook and
Excel
• Know about the main concepts of file management, be able to efficiently organize
files and folders.
• Understand key storage concepts and use utility software to compress and extract
files.
• Understand network concepts.
• Understand the importance of data protection and malware from devices and the
importance of backing up data.
• Recognize considerations relating to green IT, accessibility and user health.
16

Estimated volume of lots for the whole duration of the frame work contract.
Office No. Estimated no. of participants
A YGlobal Staff 1 15 - 20

3.3. Volume of the contract. (Quantities).


The proposal has no ‘minimum quantities’. The number detailed above are rough
estimates given only to enable the estimation of the service volume in awarding the
contract.

Exact qualities; e.g. number of man-days, shall be determined by YG in order forms to be


established before each service activity implemented by CCS under the frame work
contract.

Cybernet Computer Systems will provide a lump - sum unit price per day for the required
tasks.

NB: No registration or administrative fees will be charged to participants of the program.

3.4. Duration of the contract.


The contract starts upon award notification and expires after the time duration stipulated
by YG.

The specific duration of each service request (work order) this frame work contract will
be defined by YG in coordination with the selected organization and agree with CCS
before commencing the service delivery.

3.5. Timing
Delivery will mainly take place on normal working days (Monday – Friday). As an
exception. (e.g.: to prevent negative impact on service delivery by staff being in training.
The contracting Authority YG may request delivery of the service outside the normal
working days. For these situations, no surcharges will be added to the awarded lump –
sum – unit prices.
17

3.6. Location
The selected organization whose employees are primary audience will participate in the
location designed and approved by YG in the respective locations listed in section 2.0
above.

The training venue designed by YG should sit between 10 and 20 trainees maximum
with 1 computer for each trainee. “Elements included in the price”.
18

4.0. SERVICES DESCRIPTION (Tasks and expected Deliverables).


The contracting authority YG may request the services (tasks and deliverables)
separately when needed.

Tack A: Provision of BASIC ICT training service.

The following lacks will be carried out by Cybernet Computer & Security.

1. Design and adopt a modular course plan based on an internationally recognized


certification (ICDL), out lining the course objectives, target population content,
delivery methodology and the trainer’s instructions.
2. The training duration of the module must be between 3 and 5 days maximum, at
least 2 Hours training a day, unless restructured by YG.
3. Design and deliver workshop materials including all printed and bound copies as
may be necessary in the course module.
4. Deliver corresponding standard but single test to assess the skills and knowledge
of trainees.

Deliverable1: A training syllabus in English on the areas to be covered during the training.

Deliverable 2: reports of the training including evaluation reports.

Deliverable3: certification tests and certificates (Approved by YG) of completion for


participants.

Task B: Logistics for the training course.

The aim of this task is to ensure that training courses are efficiently organized and that
suitable training facilities are provided.

The training facilities will have;

1. IT equipment computers, servers. Sufficient to install a mobile lab to train between


15 to 20 trainees.
2. A projector.
3. All computers as well as projector connected and fully operational at least 30min
prior beginning of each course.
4. Tip charts and workshop materials.
5. Information material for participants, both on paper and electronically,
containing all training material, manuals and documentation needed.
19

The following facilities are responsibilities of the authority but need to be monitored by
the contracting.

Contractor during the training by the contractor.

a) Water on the tables of participants, catering services foreseen for morning,


afternoon coffee breaks and lunch (if applicable).
b) Venues to install the mobile labs.

TASK C: Provision of general and secretarial support before and during the
training courses:

The aim of this is to provide general and secretarial support to YG and to the course
participants before and during the courses. In particular:

1. Before the course: (contractor Responsibility)


a) Provide YG with a description of the course and agenda to be included in the.
b) Provide name list of trainers and assistants and name tags to be worn during
training.

Contracting authority Responsibilities (YG)

a) Invitation to participants.
b) Registration forms.
c) Provide a list of participants.
d) Distribution of the list of participants to be signed each day.
e) Venue to install the mobile training lab.
2. During the courses:

The following tasks are the responsibilities of the contractor (CCS)

a) Welcome and registering of participants.


b) General assistance of participants during the courses.
c) Take pictures during the course and provide them to YG in digital version.
d) Inform YG immediately of any changes in participants list.

Responsibilities of the contracting Authority (YG)

a) Any additional communication with the participants regarding the organization


of the courses.
20

b) Transport, per – diem and accommodation of participants to the training venue.

YG personnel might attend the course. If this is the case coordination may be assigned on
YG behalf to support in this task. YG participation however is not guaranteed.

Deliverable4: adjustment and distribution of a Training Evaluation Form to the course


participants, collection of the completed questionnaires, and analysis of the answers.

Deliverable5: provision to YG of Training Status Report (with an Action Plan for Inking
Learning to Performance).
21

4.1. Expertise and venues required


Cybernet proposes a team of Senior trainer and assistants who can also do technical
analysis and support at all circumstances.

• 1 Team leader;
Session • a pool of minimum 1 - maximum 2 assistants;
• minimum 1 training in a venue that sits between 10 and 20 trainees.

Efficient communication and sharing of experience within the framework contract is put
in place within the team.

The Contracting Authority reserves the right of only activating a part of the trainers in
function of the indicative calendar and the specific needs of the selected organizations.

Coordinator/team leader:

The Contractor shall identify a coordinator/team leader within its organisation who will
represent the single point of contact for all administrative and operational
communication with the Contracting Authority. The single point of contact and if
necessary his/her replacement must fulfil the requirements set in the selection criteria.
Similarly, the Contracting Authority will designate contact persons.

All communications and exchange of information between the Contracting Authority and
the Contractor during the contract period shall be held in writing or email, in English and
be addressed to the Contractor’s single point of contact and to the contact person in the
Contracting Authority respectively.

The coordinator shall also supervise the implementation from a capacity development
point of view to ensure adaptation of methods and methodology for training services. In
addition, he/she shall safeguard that the requirements as described in this tender are
being kept. The coordinator will need to closely collaborate with the Contracting
Authority ensuring that the quality of the services meets the standards set.

Mandatory requirements for the coordinator:

• Have proficiency in English language;


22

• Have at least 3 years proven experience of project management;


• Have knowledge of adult learning principles;
• Experience in teaching adults;
• Have experience with methods to facilitate transfer of learning to the workplace.

Trainers/Experts:
Cybernet Computer and Security (U) Ltd will provide suitable and professional
trainers/experts. All trainers/experts must fulfil the following minimum criteria in term
of qualification and profile:

• Have at least 1 (one) year proven experience in delivering the training.

• Accredited in ICDL.

• Have proficiency in English language;

• Experience in teaching adults.

Cybernet will be responsible to present a pool of trainers/experts that can cover all
contents of the internationally recognized certification (ICDL, ECDL, Microsoft office
specialist certificate) modules asked in the tender.

Cybernet will be responsible for selecting the individual trainer/expert out of his pool
for delivering the outputs of the specific service requests of the contract. But during the
implementation of the contract the Contracting Authority will individually assess the
performance of the trainers/experts and conduct evaluation sessions to get feedback
from the participants. The Contracting Authority reserves the right to reject a trainer if
his/her performance is not satisfactory to the Contracting Authority.

Cybernet shall ensure that there is a back-up trainer/expert available in the pool. Should
a trainer/expert, become unavailable for any reason for more than one (1) week, the
back-up trainer/expert has to be provided at short notice. The back-up trainer/expert
shall continue the implementation at the required standards.

Technical and Administrative Support staff:

The Contractor is free to ensure the presence of an administrative support staff in each
of the services organised. This administrative support will not be invoiced separately and
will be included in the lump-sum unit price per day.
23

4.3. Organisation of the work with the Contracting Authority

A kick off meeting in Kampala at the start of the performance. The aim will be to discuss
with the Contracting Authority the general implementation of the project, the work plan
and the communication with the project management team. The meeting will also aim at

clarifying to Cybernet the roles and responsibilities of the Contracting Authority during
the implementation.

As required, ad hoc meetings and conference calls will be scheduled and organised by the
Contractor during the implementation of a given service request. Prior to each of these
meetings/ conference calls the Contractor will submit to the Contracting Authority a
brief summary of any specific points that need to be discussed.

Supplementary meetings in Kampala during the implementation of the specific contracts


may be convened at the request of the Contracting Authority to monitor the
implementation.

The Contractor shall be required to reply to all queries from the Contracting Authority
within two (2) working days, unless agreed otherwise.

Furthermore, the Contractor shall be obliged to ensure that the trainers/experts comply
to and follow the instructions given by the Contracting Authority, to allow smooth
administration of the courses.

The Contractor must also ensure timely and accurate invoicing for services delivered as
well as any required reporting.

4.4. Other aspects


Intellectual property rights / ownership of the result of the services provided:
YG keeps the intellectual property rights on all materials developed as part of activities
under this contract.

4.5. Protection of personal data of participants


On submission of this proposal implies acceptance of the principle of data
protection:
In the services, personal data of the participants will be collected and processed. Within
the duration of the framework contract, Cybernet will ensure handling and storage of all
24

pertinent data of the contract implementation and deliver them to the Contracting
Authority in the form and frequency requested.
Cybernet will act only on instructions from the Contracting Authority with regard to
processing personal data under the framework contract. Cybernet will ask in writing for
the approval of the Contracting Authority before starting any kind of personal data
processing operation. We shall inform the Contracting Authority if it receives any kind of
request from a data subject concerning any data processing operation carried out by us.
Cybernet will NOT disclose the personal data to any third parties, unless in exceptional
cases when a written prior authorisation is given by the Contracting Authority.
25

5. TEAM STRUCTURE
Team composition and task assignments Organization chart

ORGANISATIONAL STRUCTURE

I.T / Operations
MANAGER

HEAD TRAINING
DEPT CCS

INSTRUCTORS/
Training Assistants

Maintenance Transport
Team Department

Technical/Managerial Position Task


Staff

Ssegujja Patrick Cyber CCS Head of Overall responsibility for functioning of


Training the project and achieving targeted mile-
Department stones, coordination with the YG's Project
Manager. This ensures the smooth running
of the project and be able to identify
bottlenecks.

Mazinga Adam Instructors To carry on the day-to-day training on site


Batte Daniel and to ensure that all activities run
smoothly right on time and on schedule.

Mukiibi Brian, Assistant Setup machines at respective sites where


Kiwuwa Saul, Trainers training is to be conducted, do PM works
Nabagajja Eunice and ensure full systems functionality and
give assistance to trainees in the due
course of training sessions.
26

6. LEAD TIME TO START SERVICES


Instructors deployment of training work plan to effect training.

Stations Resources to be assigned


To all Offices 1 Instructor, 2 Training
Assistant

The above Team will use the best practice of the company as laid down below to execute the
training assigned

6.1 Methodology on how the service will be performed

The training will be conducted on a weekly basis from YGlobal offices basing on the time
frame provided by YG. We shall conduct one (1) session per day, and this is expected to
run from 4:00pm to 5:30pm (Evening) depending on the number of trainees.

Session I 4:00pm - 5:30pm Monday to Friday


However, a second session might be fixed depending on the on a number of trainees
available in a particular location.

Trainees will be categorized into beginner and intermediate.


Beginners are the ones that totally don't have any computing skills at all, and
intermediates are those that have at least some computing knowledge and have a basic
understanding of the computer's functionality.

Time allocation.
At instances where there are more beginners, they will be given more time and attention
to help them catch up. They will be preferred to take classes in the morning hours.
Learners will be grouped in clusters of 5-6 to help one another and share challenges they
find in using computers. Each person will be expected to contributed in class as this will
give them the motive to pay attention.

Handouts will be issued, with details on how the entire training period is to run, including
what has to be covered and on what dates and time. Specific issues will be addressed in
line with the basic operation of a computer without going in depth.
27

6.2. Time Table

IT Essentials | COMPUTER TRAINING


W E E K 1
Time MONDAY TUESDAY WEDNESDAY THURSDAY FRIDAY
Introduction New words,
Introduction IT Managing Entering
04:00 pm Using Safety,
ESSENTIALS Windows & File Data, Saving
to Computer Security,
Refreshers & management & Editing
05:30 pm Hardware & Conclusion &
Beginners Beginners Beginners
Best Practices Attempting

W E E K 2
Intermediate Discuss
Introduction
04:00 pm features of Challenges of
Office Focus on Focus on
to Microsoft Word Microsoft
Applications Microsoft Word Microsoft Excel
05:30 pm and How they Word and
and their use
are Used Solutions

W E E K 3

Highlights of Information and Review


04:00 pm Using Outlooks, Conclusion &
Previous weeks Computer Questions
to Emails and File Attempting
and Look at Security and and Answers
05:30 pm management Exams
Power Point Best practices for all topics

Table above indicates simple time allocation throughout an entire training week

6.3. Course Outline


Knowing computer: What is a Computer, Basic applications of Computer; Components of
Computer System, Central Processing Unit (CPU), VDU, Keyboard and Mouse, Other Input
/ Output Devices, Computer Memory, Concepts of Hardware and Software; Concept of
Computing, Data and Information.

Operating Computer using GUI Based Operating System: What is an Operating System;
Basics of Popular Operating Systems; The User Interface, Using Mouse; Using right Button
of the Mouse and Moving Icons on the screen, Use of Common Icons, Status Bar, Using
Menu and Menu-selection, Running an Application, Viewing of Files, Folders and
Directories, Creating and Renaming of files and folders, Opening and closing of different
Windows; Using help; Creating Short cuts, Basics of O.S Setup and Common utilities.
28

Understanding Word Processing: Word Processing Basics; Opening and Closing of


documents; Text creation and Manipulation; Formatting of text and basic data entry in
tables and letter writing.

6.3.1 Detailed Syllabus

1. KNOWING COMPUTER
1.0. Introduction
1.1. Objectives
1.2. What is Computer?
1.2.1 Basic Applications of Computer
1.3 Components of Computer System
1.3.1. Central Processing Unit
1.3.2. Keyboard, mouse and VDU
1.3.3. Other Input devices
1.3.4. Other Output devices
1.3.5. Computer Memory
1.4. Concept of Hardware and Software
1.4.1. Hardware
1.4.2. Software
1.4.2.1. Application Software
1.4.2.2 Systems software
1.5 Concept of computing, data and information
1.6 Bringing computer to life
1.6.1. Connecting keyboard, mouse, monitor and printer to CPU
1.6.2. Checking power supply
1.7. Summary

2. OPERATING COMPUTER USING GUI BASED OPERATING SYSTEM


2.0. Introduction
2.1. Objectives
2.2. Basics of Operating System
2.2.1. Operating system
2.2.2. Basics of popular operating system (LINUX, WINDOWS)
2.3. The User Interface
2.3.1. Task Bar
2.3.2. Icons
2.3.3. Menu
2.3.4. Running an Application
2.4. Operating System Simple Setting
2.4.1. Changing System Date and Time
2.4.2. Changing Display Properties
2.4.3. To Add or Remove a Windows Component
29

2.4.4 Changing Mouse Properties


2.4.5 Adding and removing Printers
2.5. File and Directory Management
2.5.1. Creating and renaming of files and directories
2.6. Common utilities
2.7. Summary

3. UNDERSTANDING WORD PROCESSING


3.0 Introduction
3.1. Objectives
3.2. Word Processing Basics
3.2.1 Opening Word Processing Package
3.2.2 Menu Bar
3.2.3 Using the Help
3.2.4 Using the Icons Below Menu Bar
3.3. Opening and closing Documents
3.3.1. Opening Documents
3.3.2. Save and Save as

Duration: At total of 1 ½ hours will be used to complete the course daily, 7 ½ Hours in
a week and a total of 22 ½ Hours will be used for the entire course with much focus on
practical involvement.

General Terms and Conditions

• Software that might be needed to be installed and configured will be done by YG.
• Trainees are expected to arrive on time for any session
• Trainees are expected to follow their time tables.

NB: It should be noted that these terms and conditions are subject to change without
notice.
30

6.4. Training procedures:

Introduction:
A trainer/instructor is expected to be knowledgeable, possess excellent
communication skills, and be able to communicate at the level and in the language of
the participants.
To be effective, the trainer should take into account the nature of the target group or
audience (who are they? are they senior or line managers?) and their level of
knowledge and skill (have participants been trained in the subject to be presented or
related subjects?). Those are the key points we consider for our trainers before
making a class or presentation.

Preparation.
Time used in preparation is time well spent. On average, the amount of time we spend
preparing the first presentation of a course or training session by aninstructor
knowledgeable on the topic equals four times that spent presenting it. So a one-week
course would require four weeks of preparation. After looking up information and
consulting manuals and other resources that are relevant to the subjects (identified
in the needs assessment), we choose appropriate learning methods and we put
together a session plan.
Our trainer takes steps to acquire or prepare appropriate participants’ guides and
audiovisual aids well in advance of the targeted training date. We then have draft
materials peer reviewed by someone who is technically competent in the subject area.
Also, if possible, the trainer rehearses the presentation before colleagues, keeping in
mind issues of time and clarity.

Presentation.
The trainer always come to the training venue and the session early to check out the
room, the seating arrangements, and the audiovisual equipment (Figure 1). We make
friendly chat with participants before the session which creates a more comfortable
learning environment.
Formal introductions should take place at the beginning of the first session. One way to
do this is asking pairs of participants to interview each other; then each presents the
other to the group or records the information on a wall chart for all to see.
The actual session begins with the trainer presenting the objectives of the course or
session and summarizing its main points. These main points are then expanded using the
chosen learning methods. At the end of the session, the trainer always summarize the
discussion, making sure to allow time for questions and clarification.

In developing visual aids, the following points are be kept in mind—


• We use only one idea per visual aid to avoid crowding.
• We use large letters and clear drawings.
• We never include too much information on one slide
• (Seven lines with seven words per line is a maximum guideline).
• We do not use multiple fonts, sizes, and colors.
31

• We allow plenty of time for preparing the visual aids and time for obtaining and
testing the equipment.
• We test the materials in a rehearsal before the session, preferably in front of
critical colleagues.

When using visual aids, the instructor takes care to—


• Check the visual aids and equipment a few minutes before the session begins.
• Always face the audience, without obstructing their view, and use a pointer.
• Switch off the equipment during discussions.

Trainers’ personal style.


Personal appearance and style can make a difference in keeping participants’ interest
during a session. We always maintain eye contact with the group and make sure that his
or her (instructor’s) voice is clear and can be heard by everybody. When interest appears
to be flagging, we are flexible and change the schedule, perhaps by introducing a role-play
or inserting an unscheduled break to allow participants to stretch or get refreshments. A
good story or joke can help revive interest of the trainees.

In a session in which participants are divided into small groups, we move from group to
group which stimulates interest.
32

6.5. Seating arrangements for various training applications

COMMUNICATION IN SMALL GROUPS (5–10 PEOPLE)

Key
Instructor
Trainee

COMMUNICATION AND PRESENTATION IN LARGER GROUPS (10–30 PEOPLE)


33

6.6. Reporting on contract performance


Without prejudice to any of the outputs/deliverables as outlined above, Cybernet shall
provide overview reports with, at a minimum, the following characteristics:
• Frequency: Every week.
• Content, Out lining the general performance of the trainees.
• Attendance; Provided in a spreadsheet format

6.7. Evaluation of contract performance


Evaluation of the performance will be conducted by the Contracting Authority on a
regular basis to assess the level of the quality of services provided, the trainer/expert's
capacity, and participant's satisfaction.

From a pedagogical point of view, the evaluation will assess the achievement of learning
objectives and participants' expectations, trainers' teaching performance and the overall
evaluation. The Contracting Authority will communicate the assessment methodology
prior to the evaluation.

The Contracting Authority will communicate the outcomes of the evaluation sessions to
the Contractor and, if necessary, will ask for actions to be taken. The Contractor can also
perform self-evaluation, without the results of it being binding to the Contracting
Authority. The Contracting Authority will closely monitor the content, methodology and
implementation of the courses to ensure that the desired level is kept.

6.8. Cancellation
In case of cancellation of a course by the Contracting Authority, the Contracting Authority
must inform the Contractor as soon as possible. The cancelled course shall be
rescheduled, without cost, at a later date suitable for the selected organisation.
In the case of cancellation by the Contractor, the Contracting Authority shall be informed
at least two (2) working days in advance and the course will have to be rescheduled at a
later date by mutual agreement between the Contracting Authority, the selected
organisation and the Contractor. In case of last minute, less than two working days before
the start of the course, cancellations if, for example, the trainer falls ill at the last minute,
Cybernet shall have measures in place to replace the trainer. If no such replacement is
available, the course shall be rescheduled.
34

7. QUALIFICATIONS:
CCS has a well trained staff to take on this training series based on their trainings
previously conducted, education and qualification levels, years of experience in
conducting trainings of this nature with successful trainings completed in the recent
years.

Below is a brief qualification list of some of our major instructors.

1. Ssegujja Patrick Cyber


- Currently under taking a Bachelor of Security and Forensics at UTAMU
University,
- Holds an Advanced Diploma in Software Engineering from APTECH computer
Education,
- Professional Certificates of Network+, Security+, CompTIA+, MCSE,
through APTECH,
- Networking Certificates of CCNA, Routing and Switching Suit,
- Multi-Media Certificates in Adobe Professional Programs, Illustrator,
Photoshop, Indesign, Bridge,
- ICDL South Africa Certification through APTECH.
Email: sse.patrick@ccsug.net
35

APPENDIX B - PROJECT DETAILED COST / INVESTMENT


Training Accommodation, Grand Total
Remuneration Sub Total
Material Meals & Transport
Unit Cost 5,000/= Trainer 1 Trainer
3,300,000
Qty 30 people 1 5 days Per Week
YGlobal 18%
Kiryandongo
Per Day - 120,000 70,000 594,000
Total per Week
(5 Days)
150,000 600,000 350,000 1,000,000/= 3,894,000/=

The total cost for training for 3 weeks is Three million eight hundred ninety-four thousand Uganda shillings

NOTE:
• It is assumed that there will be a total of 30 students to be provided with Training Material; this figure might vary and
affect costs of training materials.
• The above estimations are inclusive of VAT.
36

APPENDIX CTRAINING EVALUATION FORM

Training Evaluation

Date____________________ Training Session Title_______________________

Instructors_______________________________________________

Do you feel the instructor(s) had thorough knowledge of the content area? YES NO
If NO, please explain:

What level of expertise would you rank yourself in this training area?

Beginner Average User Expert

Please indicate the level of knowledge you feel you gained from this training session.
(1 being very little knowledge and 5 being great amount of knowledge)

1 2 3 4 5

Please comment on any aspect of the training you really enjoyed or learned from:

Please comment on any aspect of the training that needs improvement or areas you
wish to learn more about:
37

BENEFITS:
CCS always strive towards achieving the major goals and objectives of the contracting
party, and we all push to the limits to make any project a success in its relative discipline.
This has made us complete all previous projects successfully and always strive for better
services ahead of our career.
We believe YG will attain the best results possible through this training once conducted
with Cybernet Computer & Security (U) Ltd.

Thank You

You might also like