Professional Documents
Culture Documents
UNDERTAKEN AT
COMPILED
BY
ABDURRAHMAN B. ISAH
SUBMITTED TO
JANUARY, 2023
1
CERTIFICATION
This is to certify that this report was written by ABDURRAHMAN B. ISAH with the
………………………………….. …………………………………..
DATE
This is to certify that this report is for the STUDENT INDUSTRIAL WORK EXPERIENCE
………………………………….. …………………………………..
SIWES Supervisor
DATE
2
ACKNOWLEDGEMENT
I am grateful to Almighty God, the beginning and the end, my creator and my everlasting big
brother who spared my life throughout the period of my SIWES program. May His name be
glorified and worshiped forever. My profound gratitude goes to my Brothers ……… for their
tremendous contribution and support both morally and financially during the course of my
I would also like to express my special thanks of gratitude to the Head of Department, Computer
Science, Yusuf Maitama Sule University in person of ………. and the entire Staff both academic
and non- academic of this great department for the basic foundational knowledge I acquired before
My most profound appreciation goes to my IT Supervisor, who out of his busy schedule gave me
his time and was patient enough to painstakingly guide me on how to prepare and write this project.
I would not forget my indefatigable supervisor, ………. for his unflinching support till date, a
person of ………. and also …………… H.O.D of AKTH IT DEPARTMENT, the entire staff and
my colleagues at the IT department (Ibrahim, Zainabou, isma’il, Mahmud, and Abdurrazak ). May
3
SUMMARY
The Students’ Industrial Work Experience Scheme (SIWES) is a scheme that was set up to enhance and
expose students to acquire adequate and relevant skills that would enable them to perform effectively in
their future place of work and assignment. It also exposes students to work methods and enrich their
experiences in acceptable methods of handling equipment and machinery that may not be available in the
education institution. It is also aimed at exposing students to people from all works of life, hence enhancing
their communication skills and ability to interact with people after graduation. This report is a summary of
the knowledge and experiences gained during my Students Industrial Work Experience Scheme (SIWES),
which was done at Aminu Kano Teaching Hospital, Kano State. Throughout my SIWES period, I worked
at their IT Department sections where I was exposed to the basics of the Hypertext mark-up Language
(HTML), network topology, internet connection guided and unguided ( wired and wireless). The training
has afforded me the opportunity to be exposed and learn from my colleagues and other individuals within
Title Page i
Cerfication ii
Acknowledgement iii
4
Summary iv
Table of Content v
CHAPTER ONE 1
Introduction to SIWES 1
CHAPTER TWO 6
Experience Gained 6
2.1 Hardware 6
2.2 Maintenance 9
5
2.3.1.3 Laptop makes noise while running 11
2.4 Networking 19
2.10 How to Make Cable for Transmission Straight through Crossover Cabling 29
CHAPTER THREE 42
CHAPTER FOUR 44
4.1 Conclusion 44
4.2 Recommendation 45
6
References 46
8
CHAPTER ONE
The student industrial work experience scheme (SIWES) is appreciable skill program, which forms
part of the approved minimum academic standard in the various degree programs for all the
universities. The scheme bridges the gap existing between theory and practice of the engineering
and technology, sciences agriculture, medical and other professional education programs in the
Nigerian tertiary institution. It is aimed at exposing and equipping students to the real life working
experience.
The training lasted for six (6) months, which involve the students, universities and the industries.
SIWES was established by the federal Government of Nigeria and is jointly coordinated by the
SIWES is aimed at providing skills for students in their various fields. Some of the various
1. To provide an avenue for students in institution of higher learning to acquire skill and
2. To prepare students for the industrial work situation they are to meet after graduation.
3. To expose students to work methods and techniques in handling equipment and machinery that
4. To make the transition from the school to the world of work easier, and enhances students
5. To provide students with an opportunity to apply their knowledge in real work situation
9
1.2 OBJECTIVES OF THE REPORT
1. The objective of this report is to put into writing all the practical knowledge and experience I
The establishment is called Aminu Kano Teaching Hospital; it is a place with broad expertise in ICT
consultancy, is offering a wide range of automated and integrated solution in broad spectrum of computers
cheapest source for high quality goods and services and has a high reputation for performance in
customization, distribution and after-sales services of laptop, desktops, printers, software and all kinds of
system accessories, security gadgets and communication equipment’s supplies, maintenance, software
1. To serve as a catalyst for both individual and collective development through the provision of
3. To offer a wide range of automated and integrated solution in broad spectrum of computer and
telecommunication.
10
1.5 ORGANIZATION AREA OF SPECIALIZATION
With a team of seasoned computer Engineers and Programmers with proven track records in
computer and communication business, the company offers the following wide areas of
specialization
(ii) Sales and Lease of all up-to date Computers, Computer peripherals and other consumables
They manage and monitor the network at the receiving end. They are also responsible for the
They are also responsible for the upkeep, configuration, and reliable operation of the computer
They are responsible for maintaining all system across the network and other IT peripheral devices
including printers and scanners. Maintenance and improvement of system performance and online
availability. Inventory of all computer equipment, keeping maintenance records, and ensuring
11
to solve them, keeping standard software and hardware recommendations under review, and
providing input into future IT strategy. Overseeing computer security and Antivirus precautions
Figure 1.1 below shows the organogram of the company/Organization according to the various
departments.
12
CHAPTER TWO
EXPERIENCE GAINED
Under this chapter two, I will be writing on what I gained and with brief explanation on them to at
least explain myself out .I gained a lot from the hardware section, maintenance section, and
networking section and programming section but I mainly worked in networking department and
programming department.
2.1 HARDWARE
13
HARDWARE COMPONENTS
(i) CASE: This is also called a tower or housing, it is the box that encloses many of the parts
(ii) POWER SUPPLY: This is used to connect all of the parts of the computer to electrical power,
as can be seen in figure 2.1 below. You can find it at the back of the computer.
(iii) MOTHERBOARD: This is a large electronic board that is used to connect the power supply
to various electronic parts and to hold these parts in place on the computer. Figure 2.2, shows a
mother board. The computer memory (RAM) and processor are attached to the motherboard. On
the motherboard you also see the BIOS (Basic Input and Output System) chip that is responsible
for some fundamental operations of the computer such as linking hardware and the software.
14
Figure 2.2: Motherboard
(v) DRIVES: These are devices used for long time storage of information. The main storages for a
computer is the internal hard drive (also called a hard disk).A typical hard disk is the one in figure
2.3 below.
(iv) CARDS: Cards is used to describe important tools that allow your computer to connect and
communicate with various output devices. The term card is used because these items are relatively
flat, with the sound card, video card, a network card and a modem.
(v) RAM: RAM is abbreviation for Random Access Memory. It is a short term memory that is
used to store documents while they are being processed. Also note that the amount of RAM in a
computer is one of the factors that affect the speed of a computer. Seeing below is a typical RAM
15
Figure 2.4: RAM
(vii) PROCESSOR: Processor is the main ‘brain’ of the computer system, as can be seen in figure
2.5. It performs instructions and calculation that are needed and managed a flow of information
through a computer. Processors are continually evolving and becoming faster and more powerful. It
2.2 MAINTENANCE
Maintenance is a process of taking necessary precautionary and correcting measures to prevent the
computer from breaking down. We also use precautionary maintenance and correcting maintenance
in maintaining a hardware.
2.2.1 Precaution maintenance: This has to do with the process of taking necessary preventive
measures and putting in place the required resources to prevent a computer from breaking down.
There are some common hardware problems that can be avoided or at least made less frequent by
16
1. Dust control: Dust is very harmful to computer part. Excess dust can cause mechanical failures,
particularly on computer components with moving parts. We minimize dust in a computer lab
(i) Computer should be regularly dusted (wiped with a dry cloth or duster).
(ii) When a computer is opened for others repairs, the dust that has built up inside the case
2. Heat control: When noticed that computer parts precisely CPU, produce a large amount of heat
while operating, it is important that this heat is dissipate so that the computer is not
damaged by overheating.
(i) A laptop computer should not be left running for any length of time on a soft surface (like a
(ii) A desktop computer case should not be used while in an enclosed cabinets.
(iii) It is ideal that computer lab temperature should be kept low, using air conditional is also
good option since the windows can be kept close to minimize dust.
3. Surge protection: At times, electrical supply does not have a uniform (well controlled) voltage.
Voltage is also due to surges that occur; voltage surge can be very damaging to computers and
electrical components.
(i) Purchase protecting power (adapter) strips, these devices contain 4 outlets that are
against any computer software and hardware problem, corrective maintenance has to do with
troubleshooting which involves the use of human intelligence, deductive reasoning and the use of
2.3.1 Basic Laptop Problems I Experienced in The Industry (Enclave Computer College) And
In using a computer, there is a coup of additional issues to be aware of, that can
The ones I have experienced so far and their possible solutions are:
2.3.1.1 Computer doesn’t turn on at all: When you plug the AC adapter into the laptop, there are no
light turning on at all, even when the power button is pushed, no lights we say that the laptop is
(i) The AC adapter failed and battery has no charge left. In this case test the AC adapter with a
(ii) DC jack failed and the motherboard does not receive any power from the adapter in this case
(iii)Motherboard failed, the motherboard has to be replaced, if not too expensive otherwise get
18
2.3.1.2 Blank screen: In most cases, I experienced that when laptop is booted (turns on), the power
IED light will come up, cooling fan works but nothing appears or displayed on the screen that is the
(i) This can be memory failure; it is possible that one of the memory modules failed. In this case I
try resetting memory modules to make sure they are making good contact with the slot. I can also
test the laptop with another memory modules if it does not help,
(ii) I remove the hard drive, DVD drive, wireless card, keyboard etc. in other to disassemble the
laptop to bare minimum and test again if it still does not turn on most likely the motherboard has
2.3.1.3 Laptop makes noise while running: When you turn on your computer and everything
works fine, but (except) it makes some constant noise or rattling noise.
(i) In most case this noise comes from the cooling fan or hard drive (takes a closer look at the
(ii) If the fan does not spin but the laptop makes noise probably it is from the hard drive so
(iii) Bad key-board can also cause the noise which will result to change of key-board.
2.3.1.4 Battery not charging properly: It might be that battery has stopped charging properly or it
does not charge at all or it charges only when the AC adapter is adjusted inside the power
connector.
19
Possible problem and solution
(ii) Failed DC power connector. That is, if it charges well when the AC is been adjusted.
2.3.1.5 Some keyboard keys stopped working: Possible problem and solution
(i) Most likely it might be that there is stuck keys on the keyboard, which will result to changing
(ii) But I also open the keyboard and dust it properly before replacing decision is carried
20
2.6.3 HOW TO DISTINGUISH A SOFTWARE ISSUE FROM HARDWARE ISSUE
I experience that it is not always easy to know the source of a computer program but determining
whether the problem is from hardware or software will help to give a computer lab manager some
(i) I make sure I reduced possible “external” problem before proceeding. This means unplugging
any external devices (such as scanner etc.) and remove CD or DVD disk from their drives.
(ii) Where there is any loud noise or smote when the problem just appeared (occurred)? Then it is a
probably a hardware problem, with most likely culprit being the power supply unit.
(iii)Is the computer entirely dead? Or is the screen blank these faults are probably due to hardware
problem also.
(iv) Does the computer produce a series of beeps? This is a code that can be used to distinguish
(v) Does the computer produce error information after it has booted or only when some programs
(vi) Finally, I opened my control panel any device either hardware or software that has a problem
will have a warning symbol next to it, I double click on the device detail or recommendation will
appear.
NETWORKING SECTION
2.4 NETWORKING: In the world of computer, networking is the practice of linking two or more
computing devices together for the purpose of sharing data. Network is built with a mix of
computer hardware and software. In order to telecommunicate, local, regional, national, and
international telecommunication networks are required. In the world of computers, networking is
the practice of linking two or more computing devices together for the purpose of sharing data.
The meaning of the word 'networking' may not be very clear at first, but it is something we all do.
The OSI is not a physical model, though. Rather, it is a set of guidelines that application developers
can use to create and implement applications that run on a network. It also provides a framework
for creating and implementing networking standards, devices, and internetworking schemes.
The OSI has seven different layers, divided into two groups. The top three layers define how the
applications within the end stations will communicate with each other and with users. The bottom
22
Figure 2.16: The OSI Layer
specific location of a device on the network. It is a software address. The two types of IP addresses
are the version 4 types (IPv4) and the version 6 type (IPv6). The IPv6, often referred to as ‘The
next generation internet protocol’, is still under research and is not yet in use publicly. The IPv4 is
(iii) Network address- This is a designation used to send packets to a remote network.
23
(v) Broadcast address- This is the address used by applications and hosts to send information to
all nodes in a network. Example 10.255.255.255, which is all nodes in 10.0.0.0 network.
They are:
(i) The Class A IP addresses: These have 8 bits for network addressing, and 24 bits for host.
Example 10.0.0.4 is an address under the 10.0.0.0.network. The range for the network
address is 0 to 127.
(ii) The Class B IP addresses: These have 16 bits for network addressing, and 16 bits for host.
Example is 171.52.0.6 is a host address under the 171.52.0.0 network. The range for the
(iii) The Class C IP addresses: These have 24 bits for network addressing, and 8 bits for host.
24
2.6 TERMS USED IN NETWORKING
(i) Server: In general, a server is a computer that provides shared resources to network users
(client). Servers are typically powerful computers that run the software that controls and
(ii) Network interface card: The network interface card (NIC), is the expansion card one
installs in a computer to connect, or interface, a computer to the network (i.e. NICs are
used to connect PCs to the network). This device provides the physical, electrical, and
electronic connections to the network media. NICs are either an expansion card or built in
NICs come in three basic varieties: 8bits, 16bits and 32bits. The larger the number of bits that
transfer to the NIC, the faster the NIC can transfer data to the network cable.
iii) Router: This is a specialized network device that determines the next point to which it can
25
iv)Gateway: This device is placed at a network node and interface with another network that
v) Switch: This device allocate traffics from one network segment to certain lines (intended
destination (s)) which connects the segment to another work segment. Switch splits the network
vi) Hub: This device connects multiple Ethernet segments, making them act as a single segment
when using a hub, every attached device shares the same broadcast domain and the same
collision domain. Therefore, only one computer connected to the hub is able to transmit at a time.
26
Figure 2.19: Hub
OSI mode connection among the network objects (workstations, servers etc.) bandwidth which is
shared among all the objects in contrast to switches which provide a connection between
vii) Ethernet: This is a family of computer networking technologies for local area networks
(LANs).It has largely replaced competing wired LAN technologies. Ethernet used coaxial cable
as a shared medium. Later the coaxial cables were replaced by twisted pair and fibre optics links
viii) Intranet: An intranet is a private network that is contained within an enterprise. It may
consist of many interlinked local area networks and also use leased lines in the wide area
network. Typically, an intranet includes connections through one or more gateway computers to
the outside Internet. The main purpose of an intranet is to share company information and
computing resources among employees. An intranet can also be used to facilitate working in
ix) Internet: The internet in simple terms is a network of the interlinked computer
networking worldwide, which is accessible to the general public. These interconnected computers
work by transmitting data through a special type of packet switching which is known as the
internet protocol (IP). Internet is such a huge network of several different interlinked networks
relating to the business, government, academic, and even smaller domestic networks, therefore
x) Frame: This is the protocol data unit of the data link layer. xi) Packet: This is the
27
xii) E1: This is a fractional unit of transmission. It carries signal at 2.0468Mbps with 32
channels at 64Kbps. 30 channels carries traffic that is, voice and data, 1 channel is for
signaling and the other 1 is for synchronization that is, reviewing. E1 is the minimum
xiii) T1: This is a transmission equipment that carries signal at 1.544Mbps with 24 channels at
xiv) IP Monitor: It is a monitoring system that monitors the network through the
destination.
Computer networks can be characterized by their size as well as by their purposes. The size of a
network can be expressed by the geographical area they occupy and the numbers of computers
that are part of the network. Network can cover anything from a handful of devices within single
room to millions of devices spread across the entire globe. Some of the different networks I
single sit, typically an individual office building. A LAN is useful for sharing of
resources. Note: network resources are other peripheral devices that are shared on a
28
scanner etc.
across an entire city, collage campus or small region. Note that: a MAN is larger than
(WAN): WAN occupies a very large area, such as countries or entire world. WAN
As I have studied, I can summaries that network provides great flexibility, such as:
(iii) All forms of network resources are being shared including accessing the internet.
Network topology is also known as physical topology which refers to the configuration of
connected devices on a network. Network topologies are categorized into the following basic
types;
(i) Star Topology; In this topology all the computers are connected to a single hub through a
cable the hub is the control node all other nodes are connected to the node.
(ii) Mesh topology: This forms a ring as each computer is connected to another computer,
with the last one connected to the first two neighbors for each device.
(iii) Ring Topology: This forms a ring as each computer is connected to another computer,
with the last one connected to the first two neighbours for each devices
29
(iv) Tree Topology: It has a root node and all other nodes are connected to it forming a
(v) Bus Topology: In this topology, all stations are attached to a single cable. When a station
sends a message, it is broadcast down in both directions. Terminators at the end of the cable
Figure 2.20: Structures of Ring, Star, and Bus and mesh topologies
30
2.12 NETWORK CABLING
Just as I have learnt, these cables are able to transmit data and information from computer to
other viz.
(i) Transmit voice. All these transmissions are being done due to their respective capacities
(ii) The data sent is being carried in the form of more related pulse of light or electronic
signals.
Materials needed
A. Cat 5 cable - One can buy a 1000 feet roll of Cat 5 cable at computer stores and industry
supply houses for somewhere between 6 and 10 cents a foot, depending on the quality. Check to
31
Figure 2.21: Cat 5 cable packet
RJ-45 connectors: They usually come in bags of 50, 100 etc. Pay attention to the type of RJ-45
connector you get and make sure it is intended for the type of Cat 5 wire you are using. There are
two different kinds of RJ-45 connectors, depending on whether you use them with solid or
stranded wire cable. Using the wrong kind with the wrong cable will most likely result in a bad
connection.
B. Crimping tool: While this is the expensive part of making your own cables, it is only a one-
time startup cost. A good crimping tool has a pair of wire cutters built in, as well as a blade to
strip insulation. It also might support crimping of other connectors such as RJ-11.
32
Figure 2.23: Crimping tool
C. Diagonal Cutter Pliers: You will need a pair of this to cut the wires in case the crimper does
not come with a built-in wire cutter. Cutting, Stripping, and Sorting the Wires Cut a piece of
Cat 5 as long as you need. When you cut, remember the old saying:
Measure twice, cut once. Make sure the cut on each end is clean and straight.
Strip about an inch of the insulation off the cable. Cut it back nice and square. Some crimping
tools such as the one used here, come with a built-in wire stripper. You put the cable in to a stop
on one side of the cutter. It will cut the jacket the right length to make a perfect crimp. It is
33
extremely important that you only cut the plastic insulation or jacket and not the wire. Damaging
one of the 8 wires, even if you just nick it or partially cut it, will ruin your cable.
D. Untwist the wires. You will notice that there are 4 pairs of multi-colored wires inside. Sort
the pairs by color. You should end up with wires color coded as follows: blue/blue-white,
Now align the wires in the following order from left to right. The order is important since there is
Get the wires lined up and nice and straight. Then clip off the top millimeter so that they are all
the same length and stick out about half an inch from the insulated part.
HTML:
HTML stands for Hypertext Markup Language, and it is the most widely used language to write
Web Pages.
(i) Hypertext refers to the way in which Web pages (HTML documents) are linked together.
34
(ii) As its name suggests, HTML is a Markup Language which means you use HTML to
simply "mark-up" a text document with tags that tell a Web browser how to structure it to
display. Originally, HTML was developed with the intent of defining the structure of documents
like headings, paragraphs, lists, and so forth to facilitate the sharing of scientific information
between researchers.
Now, HTML is being widely used to format web pages with the help of different tags available in
HTML language.
HTML Tags: As told earlier, HTML is a markup language and makes use of various tags to
format the content. These tags are enclosed within angle braces <Tag Name>. Except few tags,
most of the tags have their corresponding closing tags. For example, <html>has its closing
tag</html>and
ELEMENT
This tag encloses the complete HTML document and mainly comprises
<head> This tag represents the document's header which can keep other HTML tags
35
<title> The <title> tag is used inside the <head> tag to mention the document title.
<body> This tag represents the document's body which keeps other HTML tags like
<h1> This tag represents the document's body which keeps other HTML tags like
<b>, <i>, <li>, Bold, italic, list, unordered list, ordered list
<ul>, <ol>etc
With the help of HTML Tags a web page can be easy created.
C.S.S explains how HTML elements are to be displayed on screen, web browsers etc
C.S.S controls a layer of multiple web page all at once also external sheets are being stored in
CSS
files.
USE OF C.S.S
We use C.S.S to define style for your documents, including the design, layout and variations in
display for different devices and screen sizes. You can place your C.S.S in the <head> of a
documents with an embedded style sheet, or attached a separate files and defines your styles with
36
an external style sheet. To link an external style sheet to your documents you simply add a link to
When a user displays a web page, the users browsers loads style information along with the
When a user prints a web page, you can provide different style information that makes printed
In general, we use html to describe the content of the documents, not its style while we use C.S.S
37
CHAPTER THREE
The fore knowledge I had in CSC 2205 and ITC 2310 really helped me in networking and programing
and the training I went through in the organization, I was able to contribute to the establishment in the
following ways:
(i) Teaching and assisting students. (Clients) through their lessons: During the Students’
Industrial Work Experience, I was able to put into practice all that I was taught teaching others
too. This really gave me the opportunity to know what I was taught better.
(ii) Assist in marketing and publication: I was able to assist industriously in the marketing and
publication by introducing the Enclave Computer Centre to the people that have not even
(iii)I was able to successfully install Windows 7, despite the fact that I could install other recent
windows but I was personally interested in installing the old operating system as many people
have been forgetting how to install this windows. With this I was able to also make positive
passport photograph. I was able to increase the sale of the establishment by the uniqueness of
the sale method I brought into the establishment such as giving of discount to our customer,
38
(v) I was part of the first group of students to practically carry out wireless ad hoc configuration
which was so amazing to many of the staff members of the Enclave Computer Centre.
(vi)I was able to successfully troubleshoot, reinstall and replace bad parts of computer system
both desktop and laptop, and I also upgraded some of the computers.
(i) Insufficient Vehicles: The shortage of vehicles for work especially when a lot of services
were required concurrently was a challenge .Sometimes, we had to wait for a particular team to
return before heading out to site or even take public transport in very urgent situations. This often
(ii) Distance: The distance between the office and my home was also a major challenge.
Sometimes, I had to wake up around 4am to be able to meet up with work around 8am
considering the fact that I reside at Ogun state, although my passion for what I did kept me
going/
(iii) Use of Crude Implements: In some cases, most of the equipment and facilities used
were not up to standard and this had a way of slowing down the job process. Examples are the
39
CHAPTER FOUR
4.1 CONCLUSION
i. In respective of the challenges encountered in this SIWES program, there were many things
that I have experienced and learned during the six (6) months of my industrial training at
Aminu Kano Teaching Hospital, the whole period was very educating, interesting and
instructing. Through this training I was able to gain new insight and more understanding
about the real industry working condition and practice. I was able to successfully
troubleshoot, reinstall and replace bad parts of computer system both desktop and laptop,
and I also upgraded some of the computers. It has provided me the opportunities to develop
and improve my soft and functional skills. All of this valuable experiences and knowledge
that I had gained were not only acquired through direct involvement in task given but also
through other aspect of the training such as work observation, interaction with colleagues,
superior, and other people related to the field. From what I have undergone, I am very sure
that industrial training program has achieved its entire primary objectives. This program has
also prepared students to face the real working life. As a result of the program, now I am
more confident to build my future career. So also, the fore knowledge I had in CSC 2205 and
communications and the training I went through in the organization, I was able to contribute to the
40
4.2 RECOMMENDATION
(ii) Students should be paid monthly in their places of attachment by the SIWES body.
(iii) Supervisors should always visit students monthly in their various places of attachment.
(iv) School should always liase with industries, firm and companies where the students are
(v) Despite the challenges encountered I still wish to recommend my place of attachment
( Aminu Kano Teachung Hospital ) for schools and students who are yet to undergo their SIWES.
REFERENCES
2(1), 102-131,
Network Digital Signage Player, iCAT Web Manager User’s Guide, 26-02-2019. Olusegun,
12.com.
41
42