IT report
IT report
INTRODUCTION
1.1 INTRODUCTION
This chapter begins with explaining the purpose of the report; follow by the history
of SIWES, their objective and organization involved in the management of SIWES
program.
SIWES was established by ITF in 1973 to solve the problem of lack of adequate
practical skills preparatory for employment in industries by Nigerian graduates of
tertiary institution.
The scheme exposes students to industry based skills necessary for a smooth
transition from the classroom to world of work. It affords students of tertiary
institution the opportunity of being familiarized and exposed to the needed
experience in handling machinery and equipment which is usually not available in
the educational institution.
Participation in industrial training is a well-known educational strategy. Classroom
studies are integrated with learning through hand-on work experience in a field
related to the students’ academic major and career goal. Successful internship fosters
an experiential learning process that not only promotes career preparation but
provides opportunities for learners to develop skills necessary to become leaders in
their chosen professions.
1.2 PURPOSE OF THIS REPORT
The industrial attachment program fulfills parts of the requirement in pursuing a
Certificate in National Diploma (Computer Science) in the Federal collage of
education Zaria. This report sense to summarize the activities and experiences
gained with MINISTRY OF PUBLIC WORKS AND INFRASTRUCTURE,
KADUNA.
1|Page
1.3 HISTORY OF SIWES
The Government’s decree No 47 0f 8th Oct. 1971 as amended in 1990, Highlighted
the capacity building of human resources in industry. Commerce and the government
through training and retaining of workers in order to effectively provide the much
needed high quality goods and service in a Dynamic economy as ours (Jemerigbo.
2003). The decree led to the establishment of industrial training fund (ITF) in
19/3/1974. The growing concern amongst our industrialists that graduates from our
institution of higher learning, lack adequate practical background studies preparation
for employment in industries, led to the formation to the students Industrial work
experience scheme (SIWES) by ITF in 1993/1994 (Information and Guideline for
SIWES. 2002). ITF has one of its key functions; to work as Cooperation entity with
industry and commerce where student in institution of higher learning can undertake
midcareer work experience attachment in Industries which are compatible with
student’s area of study (Okorie 2002, in Asikadi 2003). The Experience scheme
(SIWES) is a skill training program designed to expose and prepare students of
Agriculture, Engineering Technology, Environment, Scheme, Medical Science and
also Pure and Applied Science for the Industrial work situation which they are likely
to meet after graduation. Duration of SIWES is four (4) month in polytechnics at end
ND1, four Months in college of education at the end of NCE-II and six month in the
Universities at the end of 300 or 400 or 500 level depending on the discipline.
2|Page
1.5 SOME OF THE OBJECTIVES OF SIWES ARE:
1. To provide an avenue for students in the Nigeria universities and polytechnic to
acquire industrial skills and experience duration their course of study.
2. To prepare student for work situation they are likely to meet after graduation.
4. To allow the transition phase from school to world of working environment easier
and facilitate students contact for later job placement.
5. To allow the transition phase from school to world of working environment easier
and facilitate students contract for after job placement.
CORE MANDATES.
Preparation of policy and plans for the provision of physical infrastructure for the
state.
Ensure the provision of physical infrastructure like roads, water, electricity, broad
road, light rail, etc.
4|Page
Provision of civil, mechanical and electrical engineering service and advice to
agencies of the state government.
To provide inter and intra modern transportation system in the state.
Ensure quality control in the public infrastructure.
To provide oversight of the public works sector.
Transform the construction and infrastructure sectors through the development
of policy and legislature prescripts.
5|Page
CHAPTER TWO
OFFICE SUITS AND PRINTER
2.1. PRINTERS
DEFINITION: A printer is an external hardware output device that takes the electronic data
stored on a computer or other device and generates a hard copy. For example, if you created
a report on your computer, you could print several copies to hand out at a time. Printers are
one of the most popular computer peripherals and are commonly used to print text and photos.
PRINTER CONNECTION: One can follow the steps below to connect a printer to the
system.
1. Locate your printer cable: Most printers will come with a cable packaged into the box,
though sometimes they won’t.
2. Make sure you buy the right cable: Certain printer cables will allow you to connect the
printer to your laptop via a USB port, while others will use a parallel port. Check your laptop
for the proper connections. USB ports are small, rectangular ports while parallel ports are
generally larger and have holes for several small pins to plug into.
3. Plug one end of the cable into your printer: This end is typically square in shape and
plugs into the appropriately labeled hole on the back of the device. If you have problems
locating this port on the back of your printer, consult the diagram in the printer’s manual.
6|Page
4. Plug the other end of the cable into your laptop: If it is a USB cable, then it plugs
directly into a USB port. If it is a parallel port cable, then you need to plug the cable into a
free parallel port on the back of your laptop and secure it into place using the two tiny screws
on each side of the cable.
5. Install any software that came with the printer: Certain printers will work as soon as
they are plugged in, while others come with a CD with the necessary software and drivers
needed to make it work. If your printer came with a CD, then put it into your laptop’s CD-
ROM or DVD-ROM drive on your laptop and install the necessary software.
6. Make sure your printer is plugged into a power source: While some printers can be
powered over the USB interface, others will need external power. Plug your printer’s power
cord into a wall outlet or power strip.
2.3 POWER POINT
Sometimes abbreviated as PP or PPT, PowerPoint is a presentation program developed by
Microsoft that creates a slide show of important information, charts, and images for a
presentation. It is most often used for business and school presentations.
PowerPoint slides may contain only text, or they can include pictures, videos, or animated
text and images. Text may be formatted in the same ways as in Microsoft Word, with custom
color, size, and font type.
2.3.1 LAUNCHING POWER POINT
Use the following steps to launch PowerPoint manually from a windows system:
1. Open My Computer.
2. Click or select the C: drive. If Microsoft Office is installed on a drive other than the C:
drive, select that drive instead.
3. Navigate to the Program Files (x86) folder, then the Microsoft Office folder.
7|Page
4. In the Microsoft Office folder, if there is a root folder, open that folder. Then open the
OfficeXX folder, where XX is the version of Office (e.g., Office16 for Microsoft Office
2016). If there is no root folder, look for and open a folder with "Office" in the name.
5. Look for a file named POWERPNT.EXE and double-click that file to start Microsoft
PowerPoint.
2.3.1 BENEFITS OF POWER POINT
a
PowerPoint presentation, it's more likely it will be easier for others to open and view.
9|Page
Press ENTER to start a new paragraph (this is sometimes called a ―carriage return‖).
2.4.6 FORMATTING TEXT
Changing the look of what you’ve written is called ―formatting‖. This can include changing
the text style, size, color, and more.
You can also make bold, underline, or italicize when using MS Word. These features do not
have to be used independently of each other either – in other words, you can make bold,
underline, and italicize a single piece of text.
To make text really stand out, you can also combine this with alignment and size to produce
a heading in bold, italics, underlined, sized and centered:
Sale at Bob’s Paint Supplies!
In order to apply certain stylistic or other changes to text, you must first HIGHLIGHT the
text. This is a common procedure in Microsoft Windows applications, and like being able to
successfully navigate the mouse around your screen, the ability to highlight well is one that
you want to master.
To highlight text, you start by placing your cursor (by moving the mouse) directly to one side
of the selection that you are working with. In the case above, the user wants to highlight the
phrase ―This is a test‖ but NOT ―to show.‖ In this example, the user should place the cursor
directly to the left of the word ―This‖ and hold down the left-click button on the mouse.
Then, drag the mouse across the sentence, and a black highlight will follow. The computer
now understands that any and all formatting that you command will ONLY apply to the part
of the sentence that you highlighted (and not ―to show,‖ since it is not highlighted).
Suppose we wanted to make the words ―This is a test‖ bold, and leave the rest of the sentence
unformatted. The end result (once you click elsewhere on the screen to remove the highlight)
would be this:
Experimenting with formatting can be fun, and it is an essential tool to master in MS Word.
You can also change the font color by clicking on the appropriate buttons in the Formatting
Toolbar. Experiment and remember – you can always start over with a fresh, new document,
10 | P a g e
so don’t worry about making mistakes! If you do, however, there is always the incredible
―UNDO‖ tool.
2.4.7 SAVING DOCUMENT
When you finish typing and want to leave the computer, it is important to save your work
(even if you are printing a hard copy—saving should be a reflex). To save your work in MS
Word, it is essential to know WHAT you are trying to save as well as WHERE you are
trying to save it. Click ►File ►Save from the Menu Bar to get started. You can change the
filename that Word has chosen just by typing a new one in the File name box at the bottom
of the window that appears. MS Word will automatically save your document with the suffix
―.doc‖ – this is simply a tag that lets Word know that your work is specific to this program.
You do not have to type it – just highlight what is there (default is ―Documet1‖) and write
a new file name. There are many places in which you can save a file, some of which are
portable and some of which are immobile. The My Documents folder on your computer’s
hard drive is a good place to store your documents. A blank CD (compact disc) is a great
portable storage device and can contain a LOT of data. It is important to note that every
consequent command of SAVE will overwrite your original file, creating the most up-to-date
version.
If you want to save the changed document without destroying the original one: In the Menu
Bar, click ►File ►Save As from the menu bar and give your document a new filename
(unique from the original). To bring a saved document back up on the screen from MS Word:
Click ►File ►Open from the Menu Bar. Locate where the file is located (which folder, that
is) and click on the filename of the document you want.
Click ►Open.
2.4.8 PRINTING OF FILE
To print your MS Word document: Click ►File ►Print from the Menu Bar and a Print
window will pop up on the screen. Click ►OK for your document to start printing. As with
all commands in MS Word, you can make changes along the way. From the Print menu, you
can alter how many copies will be made, in what order the pages will be and much more.
11 | P a g e
Another useful tool is the Print Preview function found alongside the Print command. This
will allow you to look over an exact copy of what will come out of the printer before actually
executing the print command. It is especially useful when experimenting with altered margins
and page dimensions, and can help to conserve paper.
12 | P a g e
CHAPTER THEE
NETWORK AND SYSTEM MAINTENANCE
3.1 SYSTEM MAINTENANCE
System maintenance is a catchall term used to describe various forms of computer or server
maintenance required to keep a computer system running properly. It can describe network
maintenance, which could mean that servers are being physically repaired, replaced, or
moved. Network maintenance can also mean that the software for a server is being updated,
changed, or repaired. This sort of maintenance is typically performed on a regular or semi-
regular schedule, often during non-peak usage hours, and keeps servers running smoothly.
Below are some basic maintenance tips:
a) Start with the easy stuff: keeping your device’s accessories and openings clean.
b) A dirty keyboard will eventually stop working properly. Ditto for a dirty mouse. A
replacement keyboard costs roughly N800 new, so replacing yours won’t ruin you, but that
money could absolutely be spent on better things.
c) To clean your keyboard’s more accessible surfaces, use a damp, lint-free cloth. Don’t spray
water directly onto the keyboard or allow water to pool anywhere on it – this will only make
things worse. Use the same approach to clean your mouse’s accessible surfaces.
d) To clean harder-to-reach parts of your keyboard and mouse, such as the mouse’s optical
opening and the spaces underneath the keys, use a compressed air canister. You can get one
for N600 or N800 online or in your local hardware store.
e) Don’t neglect laptop and desktop ports and crevices either. Dusty or particle-clogged ports
reduce airflow into and out of the device, increasing the risk of overheating. If you’re prone
to forgetting small tasks like this, set a recurring calendar reminder every month.
2. Gently Clean Your Monitor:
13 | P a g e
Your monitor might seem solid enough, but it’s just as vulnerable to dust and debris as your
keyboard and ports. Dust it periodically with a microfiber cloth. Remove tougher stains with
LCD screen cleaner, which should cost you no more than N700 to N1000 per can.
3. Keep Food and Beverages Away From Desktops and Laptops
4. Organize Cords and Other e-Debris:
If you have an active home office setup, it probably features a mess of cords, power strips,
and random accessories on the floors and working surfaces.
This mess is unsightly and unwieldy at minimum. If you have small children or pets, it may
well present an electrocution risk. Depending on how loaded-up your power strips and outlets
are, you could have a fire hazard on your hands. And jumbled cords are more vulnerable to
damage, meaning higher long-term ownership costs.
14 | P a g e
That’s not the worst thing you could do for your waterlogged phone, but it’s not the ideal fix
either. Rice is merely the best desiccant, or drying agent, that most people have lying around
the home. It’s not made for clearing water from sensitive devices – it’s made for eating.
As it turns out, there are products made specifically to mop moisture out of electronics.
They’re commonly known as desiccant bags, and they’re cheap.
An even cheaper alternative: the little silica gel bags that come in many shipping boxes.
Rather than throwing them out, collect them as they come in, taking care to store them
somewhere child- and pet-proof. You’ll need several to dry out a dripping phone.
If you need to remember websites or phone numbers, use Post-it notes or digital files instead.
Keep magnets where they belong – in the kitchen.
9. Be Careful With Unfamiliar Wi-Fi Networks:
Be wary of unsecured Wi-Fi networks in coffee shops, airports, hotel lobbies, and other
public places. Without basic network security, your computer is a sitting duck – out there in
the open for any hacker or cyber-criminal who feels like sending a malware package your
way. When in doubt, use a virtual private network (VPN) to encrypt your connection and
repel attacks.
3.2 COMPUTER NETWORK
A computer network is a group of computers that use a set of common communication
protocols over digital interconnections for the purpose of sharing resources located on or
provided by the network nodes. The interconnections between nodes are formed from a broad
spectrum of telecommunication network technologies, based on physically wired, optical,
and wireless radio-frequency methods that may be arranged in a variety of network
topologies.
15 | P a g e
3.2.1 HUB, SWITCH AND ROUTER
1. Hub: A hub is to send out a message from one port to other ports. For example, if there
are three computers of A, B, C, the message sent by a hub for computer A will also come to
the other computers. But only computer A will respond and the response will also go out to
every other port on the hub. Therefore, all the computers can receive the message and
computers themselves need to decide whether to accept the message.
2. Switch: A switch is able to handle the data and knows the specific addresses to send the
message. It can decide which computer is the message intended for and send the message
directly to the right computer. The efficiency of switch has been greatly improved, thus
providing a faster network speed.
16 | P a g e
3. Router: Router is actually a small computer that can be programmed to handle and route
the network traffic. It usually connects at least two networks together, such as two LANs,
two WANs or a LAN and its ISP network. Routers can calculate the best route for sending
data and communicate with each other by protocols.
3.2.2 INTERNET PROTOCOLS
The Internet Protocol (IP) is the principal communications protocol in the Internet protocol
suite for relaying datagrams across network boundaries. Its routing function enables
internetworking, and essentially establishes the Internet.
IP has the task of delivering packets from the source host to the destination host solely based
on the IP addresses in the packet headers. For this purpose, IP defines packet structures that
encapsulate the data to be delivered. It also defines addressing methods that are used to label
the datagram with source and destination information.
3.2.3 MEDIA ACCESS CONTROL
MAC Addresses: A Media Access Control (MAC) address is the unique hardware address
of an Ethernet network interface card (NIC), typically ―burned in‖ at the factory. MAC
addresses may be changed in software.
Note: Burned-in MAC addresses should be unique. There are real-world exceptions to this,
often due to mistakes by NIC manufacturers, but hardware MAC addresses are considered
unique on the exam.
Historically, MAC addresses were 48 bits long. They have two halves: the first 24 bits form
the Organizationally Unique Identifier (OUI) and the last 24 bits form a serial number
(formally called an extension identifier).
17 | P a g e
CHAPTER FOUR
SUMMARY, CONCLUTION AND RECOMMENDATION
4.1 SUMMARY
At the end of this program I was able to extend my knowledge in enhancing the concept on
the topic treated. The student’s Industrial Work Experience Scheme (SIWES) has provided
training ground and has exposed me to different experience and findings in my field of
learning. It has also improved my curiosity to the field of computer science and ICT
generally. This has gone a long way in equipping me in merging what was actually learnt on
the field.
4.2 CONCLUSION
Finally, I would like to conclude by encouraging all students to make good use of their time
during SIWES and appreciate his or her profession, because this training. It’s actually a forum
for ushering one into the labor market.
4.3 RECOMMENDATION
1. The training department of ITF should be providing adequate information about the
biennial SIWES national conference and workshops on time.
2. All the institution involved should be organizing orientation courses in collaboration with
the ITF for their students prior to their attachment with the attendance made mandatory for
the students accepted for SIWES and ITF staff.
3. ITF should ensure the regular visitation of the ITF officers to supervising agencies,
institutions, employers and students on attachment.
4. Students are most time faced with the problem of placement.
5. The log-book issued to students at attachment by institutions must be checked and signed
by the institutions and ITF supervisors responsible during supervision.
6. Ensure payment of allowances for the students and supervisors even if is for only transport
of the SIWES student.
18 | P a g e