SlideShare a Scribd company logo
1 of 45
1
TECHNICAL REPORT ON STUDENT INDUSTRIAL
WORK EXPERIENCE SCHEME (SIWES) TRAINING
PROGRAMME
UNDERTAKEN AT
LOSTCODES TECHNOLOGY NIGERIA LIMITED.
YENAGOA, BAYELSA STATE.
www.lostcodes.com, info@lostcodes.com
+2348067976680, +2347032671390, +234803884828.
BY
NAME: ODOMO AYODELE ELIJAH
MATRIC NO: FUO/11/CSI/218
PROGRAMME: COMPUTER SCIENCE & INFORMATICS
FACULTY: SCIENCE
INSTITUTION: FEDERAL UNIVERSITY, OTUOKE,
BAYELSA STATE.
APRIL – SEPTEMBER, 2015.
2
DEDICATION
This report is dedicated to Almighty God for his protection, wisdom,
knowledge, and understanding throughout theperiod of theindustrialtraining.
Special dedication also goes to my ever supportive parents and my dear wife,
for their relentless support and encouragement towards me during the course
of my six months training.
3
ACKNOWLEDGEMENT
I am highly thankful and grateful to the Almighty God Jehovah for his
awesome presence in my life and his continued guidance and assistance. I am
also grateful to my instructors, Mr. Godwin Larry, Mr. Premobowei Oti, Miss.
Theresa Briseimo, and Mr. Kelly Omekwe for their encouragement and
guidance as well as their mentorship even when all seemed impossible. I also
wish to express my profound gratitude to all LostCodes Technology staff for
their accommodation and contributions throughout the six months of the
training programme.
For everyone that contributed in one way or the other to the success of this six
month SIWES programme, especially her Excellency, Mrs. Martha Nestor
Binabo and her caring husband who housed and fed me, I say thank you very
much and maythe good lord continueto guideand bless you all.
I appreciateyou all.
4
TABLE OF CONTENTS
Title Page
Cover Page i
Dedication ii
Acknowledgement iii
Tableof Contents iv
Abstract v
Overview vi
Chapter 1: Introduction 1
1.2 Aimsof SIWES 2
1.3 Objectivesof SIWES 2
1.4 LostCodes Technology NigeriaLimited 3
1.4.1 LostCodes Products& Services 3
1.4.2LostCodesDepartments& their Functions 4
1.4.3LostCodes OrganisationalStructure 6
1.4.4 LostCodes Organogram 7
Chapter 2: Activitiesat LostCodesTechnology 8
2.1 Computer HardwareMaintenance& Repair 8
2.2.0 Microsoft OfficeWord 2007 16
2.2.1Microsoft OfficeExcel 2007 18
2.3 Basic Computer Network 21
2.4 Java ProgrammingLanguage 23
Chapter 3: ProblemsEncountered LostCodes 34
Relevance of SIWES programme 35
Chapter 4: Summary, Recommendation, and Conclusion 35
4.1 Waysof Improving The SIWES programme 35
4.2 AdviceFor Future Participant 37
4.3 AdviceFor The SIWES Manager 38
4.4 Conclusion 38
4.5 Recommendation 39
Reference
5
ABSTRACT
This technical report covers a review of work undertaken and skills acquired
during the Students Industrial Work Experience Scheme (SIWES) at LostCodes
Technology Nigeria Limited, Amarata, Yenagoa, Bayelsa State, from April 2015
to September 2015.
The nature of the work undertaken include: Computer hardware maintenance
and installations, Basic use of Microsoft Office package (MS word, Excel and
Powerpoint), Java programming language and Basic computer system
networking. The report also covers the activities as well as duties carried out by
me.
I was also involved in repairs and general maintenance of computer
componentswithinthecompany.
This report gives concise information on all the subjects matter mentioned
above, and defines the experience gained. It also highlights some problems I
encountered during the process of acquiring this experience, and a few
recommendations that I think will help improve the purpose of the
programme.
6
OVERVIEW
Thisreport is organized inthe following order:
Chapter One: IntroductiontoSIWES and LostCodes Technology
This chapter describes briefly the history and objectives of SIWES, including
the bodies under SIWES. This chapter also describes the location and brief
history of establishment of LostCodes Technology Nigeria Limited, aim and
vision as well as objectives of the establishment, its organizational chart, and
the variousdepartmentsand their functions.
Chapter Two: SIWES activitiesat LostCodes Nigeria Limited
This chapter discusses the various activities and duties performed in relation to
the different departments in the firm. This chapter also explains the knowledge
acquired in computer hardware maintenance including the tools and software
used the use of Microsoft word, Microsoft Excel, and Microsoft PowerPoint.
Basic introduction to Java programming language as well as basic computer
networking wasalso discussed.
Chapter Three: Problemsencountered during theprogramme
This chapter enumerates the problems encountered and the relevance of the
SIWES programme.
Chapter Four: Conclusion
This chapter gives the summary of all experiences and knowledge gained and
the skills acquired, recommendations on the ways of improving the
programme, advicefor futureparticipantsaswell as for the SIWES Managers.
7
CHAPTER ONE
1.1 INTRODUCTION
Student Industrial Work Experience Scheme (SIWES) is a programme which
was established by ITF in 1973 under the direct coordination of the Nigeria
Universities Commission (NUC), National Commission for College of
Education (NCCE), and National Board for Technical Education (NBTE) to
solve the problem of lack of adequate practical skills required for employment
in industriesbyNigeriangraduatesoftertiaryinstitutions.
Participation in Industrial Training is a well-known educational strategy.
Classroom studies are integrated with learning through hands-on work
experiences in a field related to the student’s academic program and career
goals. Successful internships foster an experiential learning process that do not
only promotes career preparation but provides opportunities for learners to
develop skills necessary to becomeleaders in their chosen professions.
One of the primary goals of the SIWES is to help students integrate leadership
development into the experiential learning process. Students are expected to
learn and develop basic non-profit leadership skills through a mentoring
relationship with innovativenon-profit leaders.
By integrating leadership development activities into the Industrial Training
experience, ITF hope to encourage students to actively engage in non-profit
management as a professional career objective. Participation in SIWES has
become a necessary pre-condition for the award of Diploma and Degree
certificates in specific disciplines in most institutions of higher learning in the
country. The scheme is a tripartite programme involving the students, the
Universitiesand the Industries(the employers of labour).
8
1.2 AIMS OF SIWES
SIWES is aimed at promoting the much-desired technological know-how for
the advancement of the nation by exposing students to machines and
equipment, professional work methods and ways of safeguarding the work area
as well as the workers in industriesand other organizations.
1.3 OBJECTIVESOF SIWES
The following are some of theobjectivesof SIWES:
1. To provide students the opportunity to test their interest in a particular
career before permanent commitmentsaremade.
2. To develop skills in theapplicationoftheory to practicalworksituations.
3. To provide students the opportunity to test their aptitude for a particular
career before permanent commitmentsaremade.
4. To develop skills and techniquesdirectlyapplicabletotheir careers.
5. To aid studentsin adjusting from college to full-timeemployment.
6. To prepare SIWES students in entering into full-time employment in
their area of specializationupongraduation.
7. To help SIWES student acquiregood workhabits.
8. To help SIWES student develop employment records/references that will
enhanceemployment opportunities.
9
1.4 LOSTCODESTECHNOLOGY NIGERIALIMITED
LostCodes Technology is a fully fledge Information and Communication
Technology (ICT) solutions provider situated at No. 1 Jimmy Ebi street,
AmaratainYenagoa, Bayelsa State, Nigeria.
The company was established by a group of young ICT intellects in 2006;
LostCodes was established as a private owned Limited Liability Company
(LLC). LostCodes is committed to offering delivery-on-demand ICT solutions
to both small and large scale enterprises. They also offer ICT consultancy
services by always keeping their clients abreast with the current trends in the
ICT world and helping in realizing all available ICT opportunities for business
growth and stability. Their approaches are business oriented and their core
goal is aimed at offering efficient ICT solutions as well as building human
capacity development in the ICT industry for the economic growth of Nigeria in
particularand theworld at large.
1.4.1 LOSTCODESTECHNOLOGY PRODUCTSAND SERVICES
Some of the services offered by LostCodes Technology are:
 Training & Consultancy
LostCodes provides professional IT training and consultancy services
throughout Nigeria. With a team of highly trained and skilled ICT
professionals, they offer a wide range of courses from short daytime courses
through a six-month part time training leading to a diploma certification, as
well as hands-on training onvariouscomputer applicationsand packages.
 Networking Systems
Network/Communication Solutions (Internet facilities, Telecommunications
and SystemsSecurity)
10
 ICT Office/Lab Setup
Computer Installation and Maintenance (General ICT Office/Lab Supplies,
Sales, Setup, Support and Delivery)
 Responsive WebDesign
Website Design and Maintenance that provides an optimal viewing experience,
easy reading and navigation with a minimum of resizing, panning, and
scrolling across a widerangeof devices.
 Software Engineering
Software application development and mobile computing (RIM Blackberry
Applications, Android Applications, iOS Applications, MobileIntegration, etc.).
 Data Management
We offer an administrative process by which the required data is acquired,
validated, stored, protected, and processed, hence the data accessibility,
reliability, and timelinessisensured to satisfy theneeds of the end users.
1.4.2 LOSTCODESDEPARTMENTSAND THEIR FUNCTIONS
LostCodes has different strategic departments and units that assist in
performing various functions in order to achieve the desired objectives. This
section explores these diverse units and shows how they function in LostCodes
Technology.
1. ADMINISTRATION: This department over sees the smooth running of
daily activities and ensures good flow of work process. It sub divided into
the following:
 Human Resource Management (HRM): Here, they are committed
to providing an enabling environment where the full potentials of each
and every staff can be unleashed to create a mastery of achievement.
They are in charge of employment and code of conduct and ethics of
11
members of staff. Training of IT students, students of LostCodes and
staffs of the companyis also carried out in thisunit.
 Reception/Customer Service: These units are responsible for
welcoming visitors and customers to LostCodes. They enquire from the
customers what they want, whom they would want to see, show them the
firm facilities, direct their enquiries or complains to the appropriate staff,
keep recordsof visitorslog and ensure that the log is filled correctly.
2. FINANCE DEPARTMENT: The Finance department is responsible for
the following:
 Keeping Procedures - Keeping records of the purchases and
sales made by a businessas well as capitalspending.
 Preparing Final Accounts - Profit and loss account and Balance
Sheets
 Providing management information - Managers require
ongoing financial information to enable them to make better
decisions.
 Management of wages - The wages section of the finance
department will be responsible for calculating the wages and
salaries of employees and organizing the collection of income tax
and nationalinsurancefor the Inland Revenue.
 Raising Finance - The finance department is also responsible for
the technical details of how the business raises finance e.g. through
loans, and the repayment of interest on that finance. In addition it
also supervises the payment of dividendsto shareholders.
3. ICT DEPARTMENT: The Information Communication Technology (ICT)
performs a cross-cutting function and therefore addresses the connectivity and
harnessing of the emerging technologies to enhance research capacity.
Modernizing the infrastructure and services that support research activities of
12
the firm is also a priority of this department. The contract of the company as
relates to technology (database design, web design, software development and
networking etc.) is executed inthis department.
1.4.3LOSTCODESTECHNOLOGYORGANISATIONAL STRUCTURE
LostCodes Technology Nigeria Limited is headed by a Chief Executive Officer,
CEO who also doubled as the director of research and innovation. He sees to
the smooth running of the day-to-day activities of the company. The CEO is
directly assisted by three (3) different directors, namely: director of ICT and
Chief Architect, directorof Administration, and director ofFinance.
The three directors who are in charge of the three departments are also assisted
by six (6) other managers who are in charge of various units in the company.
The six units are: Administration, Account, Operation, Human Resources,
System Security, and NetworkSystem.
LostCodes also has a business developer who report to the director of Business
analysis, Network Engineer working with the Network System manager, a
receptionist under Administration manager, training instructors working in the
Human Resources department as well as a cashier assisting the Account
manager.
13
1.4.4
CEO, DIRECTOR OF
RESEARCH &INNOVATION
DIRECTOR OF
BUSINESS
ANALYSIS
HUMAN
RESOURCES
MANAGER
ADMIN MANAGER
NETWORK
ENGINEER
RECEPTIONIST
BUSINESS
DEVELOPER
OPERATION
MANAGER
DIRECTOR OF
FINANCE
CHIEF
ARCHITECT AND
DIRECTOR OF ICT
SYSTEM
SECURITY
MANAGER
NETWORK
SYSTEM
MANAGER
TRAINING
INSTRUCTOR
ACCOUNT
MANAGER
CASHIER
14
CHAPTER TWO
Activities duringthe SIWES period:
During my six months SIWES programme at LostCodes, all lectures and
practical works took place at the company’s classroom/Laboratory whereby all
resource persons come to deliver their lecture or take the students on practical.
The activities undertaken during the period of attachment in LostCodes
Technology canbe divided into four (4) distinct parts, theyare:
A. Computer hardwaremaintenanceand repair,
B. Use of Microsoft Word, Excel and PowerPoint,
C. Preparing, installing, configuringofcomputer network,
D. Basic introductiontoJava programminglanguage.
2.1 Computer hardware maintenance and repair:
This section deals with the repair, maintenance and installation of some basic
computer hardware. In order to work as a professional in computer hardware
repair and maintenance, some basic tools such as Anti-static wrist strap, Spare
parts container, Screwdrivers, Inspection flashlight, Part retriever, Wire
Stripper, Solder iron, IC puller, Pliers etc. are required. These tools can be
purchase in a single tool kit or separately. Some basic precautions that must be
observed in carrying out either repair or maintenance, or installation of basic
PC hardwareare:
 Remember to turn off the AC supply and unplugged the system or
remove the batteryincaseof a laptop for extra safety.
 Always put on your anti-static wrist strap or ground yourself by
discharging yourself of any electric charges, also remove any hand
jewelry.
15
 Avoid capacitors in the first 10 minutes of opening the system because
capacitor storescharges.
 Never service the non-serviceable like the PSU, hard & Optical drives,
etc.
Some of the Computer hardware I was opportune to have a hand-on experience
with during the SIWES and the problems associated with each of them solved
are: Motherboard, Hard diskdrive, CPU, RAM, PSU, keyboard, casefan, etc.
A. FAULTY MOTHERBOARD
The Motherboard is the heart of a
computer because other major
components that make the system
work are connected to it. As the
processor is said to be the brain of a
computer system, so also is a
Motherboard refers to as the heart
of a computer system. As long as
the system Motherboard is intact, if
other things go wrong with the system, it is often repairable at a
reasonable cost. Motherboard repair or replacement is usually very
expensive.
Symptoms:
Failure to boot at all or boot successfully, increased window errors or blue
screens of death, freezing, or connected device that previously worked suddenly
won’t work. Four beeps, followed by 2, 3, or 4 beeps indicate serial or parallel
port issues on a motherboard which alsoimpliesa damaged motherboard.
16
Causes:
Electrical spikes & surges, Dust, Pet hair, & debris, smoke and tar, heating
issues, physical impact or spill, normal aging & wear, manufacturer design
defectsetc.
Solution:
Most repair of motherboard is usually done by professional technician because
of the various circuitry on it if it has not damaged beyond repair else a new
motherboard of the same form factor and specification will be acquired for
replacement tothe dead motherboard.
Installation:
STEP 1: Orient thesystem board intothe case,
STEP 2: Locatethe mounting holes,
STEP 3: Insert the riser fittings(ifneeded),
STEP 4: Positionthesystem board,
STEP 5: Screw the system board.
The faulty motherboard I handled in LostCodes Technology had a symptom of
not booting at all and after eliminating every other possible component such as
CPU, RAM, & PSU, it was confirmed that the Motherboard was responsible for
the problem and the problem was solved by simply replacing the faulty
Motherboard with a new one.
B. FAULTY HARD DISK DRIVE
Hard disk drive is a secondary storage medium of
a PC, the operating system (OS) and every other
programs that is not in execution are stored in the
hard disk drive. Hard disk failure can cause loss of
17
data stored in it if it isn’t backup with another storagemedium.
Symptoms:
Although, there are many signs associated with a failing or dead hard disk drive
like slowing down of performance, frequent freezes, Blue screen of death
(BSOD), corrupted data, strange sounds etc. but the most common of them all
is the slowing down in performance or the strange sounds. When the hard disk
drive is failing, it can take up to 25 – 30 minutes to load the OS after booting
and the same amount of time to also shut down properly. Even when the
system finally load the OS, frequent freezes will still be experienced during the
use of the PC.
Causes:
Firmware or manufacturer faults, heating issues, frequent power outage
without UPS, electronic failure or power surges, mechanical or internal failure,
corrupted system files by unethically shutting down of PC, human errors like
modifying the system registry settings, altering system files attribute and
location, wrong installationof OS.
Repair:
In case of corrupted system files, always use the standard way of shutting down
of PC by closing any or all the running programs before shutting down. Regular
updating of system, running the latest copy of antivirus program or replacing a
hard disk drive after 5 years of intensive use can handle problem arising from
mechanical or internal failure. In case of electronic failure, use only required
power supply. If the disk drive is dead, try changing the SATA/USB or IDE
cable as well as the power adapter and if this does not work, replace the dead
hard disk drive with a new one.
18
Installation:
STEP 1: Configure thedrive as a master or slave,
STEP 2: Locatethe drive cage,
STEP 3: Orient the drivein the cage,
STEP 4: Securethe driveby installing themounting screws,
STEP 5: Install the drivecageinto the computer case,
STEP 6: Securethe casewith screws.
The two particular hard disk drive problems I encountered at LostCodes was
caused by its SATA cable which was not properly plugged and other was caused
by mechanical failure with a symptom of strange sound which was solved by
replacing thefaulty hard disk drive.
C.FAULTY CPU
Central Processing Unit (CPU) which is also refers
to as the ‘Processor’ is the brain of a computer
system as it performs the Arithmetical/logical
operations in the system. Without a CPU, a system
cannot work.
Symptoms:
i. Computer turns on, no beeps, no screen and
does no POST.
ii. Computer turns on; fans run at highest speeds, still no POST and OS not
loading.
iii. Computer turnson but turnsoff immediately
iv. Computer screenfreezes after being on for a few minutes.
v. System halts error (BSOD).
19
Above symptoms is also associated with other hardware fault in the system but
in other to be sure of a faulty CPU, the following is what needed to be checked
if they are working properlybefore drawing your conclusion:
i. If the heat sink and fan is working properly,
ii. If there is no bulging or leaking capacitors on the motherboard near the
CPU or memory,
iii. If the power supply is working properlyby checking with a tester,
iv. If the system has a dedicated videocard that isin good condition.
If all the above checksout well, then the CPU or the motherboard isfaulty.
Causes:
Age, heat, overclocking or stress, dried thermal compound, electrical power
surge.
Solution:
If it has been confirmed that the CPU is bad, the only solution is to replace the
bad CPU with another one.
Installation:
STEP 1: Locate the processor socket on the system board,
STEP 2: Open the socket cover,
STEP 3: Orient the processor,
STEP 4: Insert the processor into the socket,
STEP 5: Securethe processor by closing and locking the cover.
A complete dead case of CPU was handled during my attachment, its symptom
is that the computer is not turning on at all and it was resolved changing the
CPU with a new one
D. FAULTY RANDOMACCESS MEMORY (RAM)
20
RAM is a volatile primary memory
medium in which programs in execution
are stored. Without the RAM, OS can’t be
loaded thereby terminating the boot
process uncompleted.
Symptoms:
i. Computer first turn on and runs fine but it performance start deteriorating
about an hour of use.
ii. Computer System randomlyrestarts whileusing it or freeze sporadically.
iii. Files regularlyaccessand save seem to be inexplicablycorrupted.
iv. Attempt toinstalla new program repeatedlyfailfor unknown reasons.
v. Computer failsto boot to OS.
vi. System beeps 2 to 3 times when turned on and refuse to boot to OS.
Causes:
The symptom of 2 to 3 beeps when turned on is usually caused by improper
installation of the RAM stick into its slot on the motherboard. Soft errors due
to heat, magnetic interference, electrostatic discharge, power surges and flaws,
hard errors which cause hardware or software to crash whenever the affected
memory cell is accessed. Unlike soft errors, hard errors are uncorrectable.
Factorydefect can also causea faulty RAM.
Solution:
The memory sticks can be removed if they are more than one and start testing
each of the RAM modules in the slots. If all the RAM modules seem bad, then
the problem might probably be the RAM slots. If the module is not inserted
correctly on the slot, then remove and re-insert correctly. But if the RAM
module is bad, replacing it will be appropriate. To fix a faulty RAM slot, one
would need to replace themotherboard completely.
21
Installation:
STEP 1: Locate RAM slots on the system board,
STEP 2: Orient the RAM over the slot,
STEP 3: Insert the RAM into theslot;
STEP 4: Secure the RAM by verifying that the locking arms have properly
closed into the locked position.
Most RAM problems I encountered were that of improper installation which
was corrected bysimply re-installing them.
E.FAULTY POWER SUPPLY UNIT (PSU)
Power supply unit converts alternating current
(AC) to low voltage regulated DC power for the
consumptionof internalcomponentsof the PC.
Symptoms:
When your computer does not get the power it
needs, the result can be erratic behaviour,
irregular shut downs, or spectacular failures.
Unexplained crashes could point to a PSU failure, unexplained video errors,
noise and odour, complete failure. Hard disk and fan simultaneously fail to
spin.
Causes:
PSU fan failure, electric shocks, smoke, blown circuit breaker, bad capacitor,
inadequatecooling fan, overloading etc.
Solution:
If the PSU has been ascertained to be dead, a replacement is an option to bring
the system back to life. Repair of dead PSU is done by a professional technician
22
who is grounded in the recoiling and service of PSU. If the power cord is bad,
replacement isnecessary.
Installation:
STEP 1: Locate the power supply bay in the case,
STEP 2: Orient the power supply to the bay,
STEP 3: Insert the power supply intothe bay,
STEP 4: Securethe power supply to the caseby installing the mounting screws.
The problem of the PSU I came across at LostCodes technology was complete
failure to power a system which was solved by purchasing a new PSU of the
samespecification.
Other problems encountered and solved were keyboard problem, monitor not
displaying at all, opticaldrivethat is not reading a digitalvideodisk (DVD), etc.
2.2.0 MICROSOFT OFFICE WORD 2007
Is a word processing application, and it is a part of the Microsoft office
package. A word processor is a program that helps you create, edit, format, and
print documentssuch as letters, reports, and Web pages.
A.COMPONENTSOF THE WORD WINDOW
Word had several components that help you interact with the program, they
are listed below:
 the titlebar, the menu bar, standard toolbar, document area
 view buttons(print layout, full screen reading, web layout etc.)
 statusbar, verticaland horizontalscroll bar, ruler
Important shortcutsinMicrosoft word are:
23
 ctrl+ n = new document, ctrl+ s = save document
 ctrl+ d = font, ctrl+ f = find
 ctrl+ p = print document, ctrl+ b = bold
 ctrl+ I = italics, ctrl+ u = underline
 ctrl+ ] = to increasetext size, ctrl+ [ = to decreasetext size
 ctrl+ c = copy, ctrl+ v = paste
 ctrl+ z = undo ctrl+ x = cut
 ctrl+ e = centralise shift + arrow keys = highlight text
 ctrl+ j = justify ctrl+ a = highlight all text
 shift + f3 = to toggle betweenlower case, upper case etc
 alt + f4 = shutdown, etc.
B. DIFFERENT METHODSOF CREATINGTABLES:
 USE OF THE TABLE MENU
Click where you want to insert a table.
On the Insert tab, in the Tables group, click Table, and then, under Insert
Table, drag toselect the number of rows and columns that you want.
 USE THE INSERT TABLE COMMAND
You can use the Insert Table command to choose the table dimensions and
format beforeyou insert the tableinto a document.
Click where you want to insert a table.
On the Insert tab, in the Tables group, click Table, and then click Insert
Table.
Under Table size, enter the number of columns and rows.
Under AutoFit behaviour, chooseoptionsto adjust the tablesize.
 DRAW A TABLE
24
Click where you want to createthe table.
On the Insert tab, in the Tables group, click Table, and then click Draw
Table.
The pointer changesto a pencil.
To define the outer table boundaries, draw a rectangle. Then draw the column
lines and row lines inside the rectangle.
2.2.1MICROSOFT EXCEL 2007
Thisis a spreadsheet program used to store and manipulatedata.
To open an Excel workbook, click on ‘Start menu’, then ‘All programs’, then
‘Microsoft Office’ and finally click on ‘Microsoft Office Excel’. When a new
workbook is opened, the following aresome featuresfound in MS Excel:
Office, Quick office access, title bar, menu bar, standard toolbar (Ribbon), cell
address, formula bar, column heading, row heading, spreadsheet cell, status
bar, horizontal& verticalscrollbar, etc.
In MS Excel, two or more cells canbe merged together.
Autofill – This feature is used to copy cell contents across or down the
spreadsheet. This is useful if you have to type the same word or number into a
group of neighbouring cells.
A.To use Autofill:
 Select the cell containing thedata you wish to copy
 Positionover the fill handle untilthe cursor changesto a blackcross
 Click on the fill handle and drag down or across the sheet, until the data
series has reached thesize you want
25
If Autofill is used with dates or words relating to dates, such as months or days,
it will produce a ‘fill series’. This will work with months in full (January) or in
short (Jan) and days of the week in full (Monday) or in short (Mon).
B. SELECTINGA CELL, COLUMN,ROW
1. To select a cell – clickon the cell with your cursor
2. To select a column – click on the grey column heading at the top of the
column
3. To select multiplecolumns – click and drag acrossthe column heading
4. To select a row – click on the row heading
5. To select multiplerow - clickand drag down through the row heading
6. To select non Adjacent Range - it is also possible to select two ranges of
cells that arenot touching each other.
 Click and drag through the cells to select the first range
 Press the Ctrl key and hold it down
 Click and drag through the second rangeof cells
7. To select the whole spreadsheet – click on the small grey box at the top of
the spreadsheet, it is located to the left of the column heading A and
above row heading 1
C. Create or delete an Excel table in a worksheet
When you create a table in a Microsoft Office Excel worksheet, you can manage
and analyse the data in that table independently of data outside the table.
When you no longer need a table, you candelete it.
D. Manipulating the datain a table
1. To calculate TOTAL of a rangeof numbers:
 Select the cell you wish to containthe total
 Type = sign, to start theformula
 Type the functionfor adding cells, SUM
26
 Type the open brackets character(
 Click on the first cell in therange
 Type a colon :
 Click on the last cell in therange
 Type the close bracketscharacter )
 Press enter to finish the formula
The AutoSum ∑ canalso be used to calculatetheTOTAL
2. To calculate AVERAGE of a rangeof numbers
 Select the cell you wish to containthe AVERAGEin
 Type = sign, to start the formula
 Type the functioncode AVERAGE
 Enter the rangeyou wish to act upon, in bracketsi.e(A1:A50)
 Press enter to finish the formula
To input GRADE in a table, logicalIF expressionis used e.g
=IF(F3>200, “A”, IF(F3>150, “B”, IF(F3>100, “C”, IF(F3>50, “D”, “F”))))
Data in a tablecanbe used to plot its chart
 Select the rows or the columns to be used
 Click on INSERT from menu bar
 Select your desired chart
27
2.3 BASIC COMPUTER NETWORK
This is a collection of two or more computers that are connected together to
share files, or resources.
A. NETWORK CABLE
This is a medium which connects two or more devices together in which
informationcanflow.
ETHERNET CABLE PIN OUTSIN UNSHIELDED TWISTED PAIR
There are two basic Ethernet cable pin outs. A straight-through Ethernet cable,
which is used to connect to a hub or a switch, and a crossover Ethernet cable
used to operatein a peer-to-peer fashionwithout a hub/switch.
For straight-through, there are two standards which are T568A refers to as
Standard A and T568B also refers to as Standard B. Both ends for Standard A
are thesame as well as that of Standard B. Their colour configurationsare:
STANDARD A STANDARD B
S/NO WIRE S/NO WIRE
1 WhiteGreen 1 WhiteOrange
2 Green 2 Orange
3 WhiteOrange 3 WhiteGreen
4 Blue 4 Blue
5 WhiteBlue 5 WhiteBlue
6 Orange 6 Green
7 WhiteBrown 7 WhiteBrown
8 Brown 8 Brown
28
Colour configurationsfor Crossover Ethernet cable pinout
END 1 END 2
S/NO WIRE S/NO WIRE
1 WhiteOrange 1 WhiteGreen
2 Orange 2 Green
3 WhiteGreen 3 WhiteOrange
4 Blue 4 WhiteBrown
5 WhiteBlue 5 Brown
6 Green 6 Orange
7 WhiteBrown 7 Blue
8 Brown 8 WhiteBlue
B. HOW TO WIRE ETHERNET CABLES
Wiring your own Ethernet cablesand connectors.
Required itemsare:
 Ethernet Cable (PreferablyCat 5, 5e, 6, 6e Or 7), MultipurposeCrimper Tool
 Modular Connector Plug (RJ45), LAN Cable Tester
Below are the steps on how to wireEthernet patch cables:
1. Strip off about twoinches of the Ethernet cablesheath
2. Untwist the pairs
3. Alignthe coloured wiresaccording toyour desired standard
4. Trim all the wires to the same length, about ½ to ¾ inch left exposed
from the sheath
5. Insert the wires into the RJ45 plug – make sure each wire is fully inserted
to the front of the RJ45 plug and in correct order. The sheath of the cable
should extend into the plug by about ½ inch and will be held in place by
the crimp.
6. Crimp the RJ45 plug with the crimper tool
29
7. Verify that the wires ended up the right order and that the wires extend
to the front of the RJ45 plug and make good contact with the metal
contactsinthe RJ45 plug
8. Cut the Ethernet cable to length – make sure it is more than long enough
for your needs
9. Repeat the above step 1 – 7 for the other end with the same colour
configuration for straight-through but different colour configurations for
the Crossover cable
Test the cable with the LAN cable tester to check for continuity in each of the
wire.
2.4 JAVA PROGRAMMING LANGUAGE
Among other things I learnt was how to write some basic Java programs.
Towards the end of the forth month of my SIWES programme, Java
programming language was introduced and I learnt some rules governing Java
programming.
Java is an Object Oriented Programming (OOP) language that was designed to
meet the need for a platform-independent language. Java is used to create
applications that can run on a single computer as well as a distributed network.
Java is used to develop stand-aloneand Internet-based applications.
A. Declaring Variables and Literals in Java
Java supports some basic programming elements, such as data types,
keywords, literals, and variables. Keywords are the reserved words for the Java
programming language, which cannot be used as names for variables, classes,
or methods. The data stored in the memory of the computer can be of many
types. Data types are used to define the operations that are possible on the
variables and the storage method. Java is a strictly typed language. The data
30
stored in the memory of a computer can be of different types. The various data
types in Java are:
o Primitivedata types
o Reference data types
o Abstractdata types
 Primitive DataTypes.
The built-in data types in Java are known as the primitive or the simple
data types. There are eight primitivedata typesinJava, they are:
o Integer type: Can store whole number values. The size of the values of
the variables depends upon the chosen integer data type. The four integer
data typesare: byte, short, int and long.
o Floating point type: Can store fractional numbers. The two types of
floating point type are: float and double.
o Boolean type: Can store only the true and false values. The Boolean
data type is required when a condition has to be checked. The true or
false value of the expression or the condition determines further
executionof the Java programs.
o Character type: Can store symbols, such as letters and numbers. In
charactertype, thereis only one data type, char.
 Reference Data Types.
A reference data type contains the reference or an address of dynamically
created objects. They are also known as non-primitive data types. The
default value of a variable that is of reference data type, is null. The
examplesof referencedata typesin Java are: Objectsand Arrays.
 Abstract Data Types
The abstract data type includes the data types derived from the primitive
data type and have more functions than primitive data types. For example,
String is an abstract data type that can store letters, digits, and other
31
characters, such as /, (), :, $, and #. You cannot perform calculations on a
variableof the String data typeeven if the data stored in it has digits.
B. Defining Variables and Literals
A variable is the name that refers to a memory location where some data
value is stored. You can assign different values to a variable during program
execution. Java allocates memory to each variable that you use in your
program.
Types of Variable.
The area or the region of a program where a variable can be accessed is known
as variable scope. The various types of variables based on the variable scope in
Java are:
 Class variables: Are accessible within a class and its objects. The class
variablesaredeclared insidethe class before their use.
 Instance variables: Are declared inside a class and are created when the
class is instantiated. Objects give different values to instance variables as
per the specific requirementsofthe object of that class type.
 Local variables: Are declared inside a method. Their scope is within the
block of code in which they are defined. They are local to the block of code
and arenot accessibleoutsidethe method.
 Static variables: Are allocated memory only once but are globally accessible
to all instances of a class. Therefore, when an instance of a class is
destroyed, the static variable is not destroyed and is available to other
instancesof that class.
 Automatic variables: Are accessible within the function in which they are
declared. The automatic variables are created when a function is called and
are destroyed when you exit thefunction.
32
Syntax for declaring variables:
<type><variablename>; // Singlevariableof given type.
<type><variable1name,variable2name ... variable_n_name> //
Multiplevariablesof giventype.
You need to initialize variables in java before you use them. The Java compiler
initializes the class data variables to default values when an object is created.
You can assign values to a variable during declaration or after declaration of
the variable, before first use of the variable. For example, you can use the
following code snippet to declare the variables, num1 and num2 to calculate the
sum of two numbers: int num1, num2;
The following code snippet shows how to assign values to a variable:
<type><variablename>=<value>; // During declaration.
<variablename>=<value>// after declaration.
For example, you can use the following code snippet to assign values to the
variables,num1and num2 to calculatethesum of two numbers:
float num1, num2; // Declarationofvariables.
num1 = 7; // Assigning values to thevariables.
num2 =12;
You can also assign the same value to more than one variable in a single
statement. The following code snippet shows the assignment of the same value
to more thanone variable: x = y = z = 9;
In the preceding command, integer value 9 is first assigned to variable z, then
toy, and finally to x.
C. Structure of a Java Application
In Java, you can either create a stand-alone application or a networked
application. A stand-alone application uses resources of a local computer. A
networked application uses the resources available over a network. For
example, a networked application is allowed to read from or write to files on
33
remote computers. Classes and objects form the basis of the structure of a Java
application. A Java application consists of a class, in which you declare the data
members and methods. An object is an instance of a class, and it encapsulates
the methods and data members of a class. Objects can be reused across
programs.
Creating Objects and Classes
A class defines user-defined objects and their characteristics. Any concept that
you need to implement in a Java program is encapsulated within a class. A
class defines the attributes and methods of objects of the same type sharing
common characteristics. For example, when you create an online shopping site
for books, each book is an instance of the Books class. All books have
attributes, such as the number of pages, type of binding, and title. In addition,
the books have various common methods, such as being selected, being bought,
and being sold. The state of each book is independent of the state of another
book. The maincomponentsof a class are:
D. Data Attributes and Methods.
Classes contain statements that include the declaration of data members,
which specify the type of data to be stored. Methods of a class contain a set of
executable statements that gives a desired output. Methods define the action to
be carried out on the data members of the class. The class block or the class
body is included within a set of braces, {}, which indicate the start and end of
the classes.
E. Creating Classesin Java
Various data members and methods of a class are defined inside a class. The
statements written in a Java class must end with a semicolon (;). The following
code snippet shows how to declarea class:
Class ClassName{
//Declaration of data members
34
//Declaration of methods
}
F. Creating Objects of a Class
An object is an instant of a class and has a unique identity. Classes and objects
are closely link together, while an object is a unique identity, a class is an
abstractionofcommonpropertiesof variousobject.
Declaration: Declares a variable that holds the reference to the object. The
following code snippet shows how to declare an object of the class:
class_nameobject_name;
Instantiation or creation: Creates an object of the specified class. When you
declare an object, memory is not allocated to it. Therefore, you cannot store
data in the data members of the object. To allocate memory to the object, you
need to use the new operator. The new operator allocates memory to an object
and returnsa referenceto that memorylocationin the object variable.
object_name=new class_name();
To accessthe data membersof a class, you use the following syntax
object_name.data_member_name
G. Declaring the main() Method
A Java program consists of the main() method that calls the methods defined
in a class. You can create a number of classes in a Java program. The Java
compiler compiles all the classes in an application. However, to execute a
program, you need to include a main() method in the program. The following
code snippet shows how to declarethe main() method:
public static void main(String [] args){
// Code for main() method
}
For example:
35
A Java application containing an Account class that consists of various
data members, such as account number, name, age, and balance. The
application initialize the data members to some default values when an object
of the Account class is created. In addition, the application display the data
stored in theobject.
Import java.Util.*;
Account.java;
class Account {
Scanner input = new Scanner (System.in);
privateintaccount_no; // Data members converted to private toencapsulate data
private String name; private int age; private float balance;
public Account()
{
System.out.println (“enter the account number”);
account_no = input.nextInt ();
System.out.println (“please enter the account name”);
name = input.nextLine ();
System.out.println (“please enter the age”);
age = input.nextInt ();
System.out.println(“ please enter the balance”);
balance = input.nextInt();
}
public void showData() { // Method can be called from outside the class
to access the data members
System.out.println("Account Number = "+ account_no);
System.out.println("Name = "+ name);
System.out.println("Age = "+ age);
System.out.println("Balance of this customer is = "+ balance);
}
publicstatic void main(String args[]) {
Account ac = new Account();
36
ac.showData();
}
}
H. Operators in Java
Operators are used to calculate, compute, and compare values. Operators are
also used to test multiple conditions. You can connect two or more variables in
a logical expression by using operators. Operators can operate on one, two, or
three operands.
Using Increment and Decrement Operators: The increment and
decrement operators are unary operators. The increment operator (++)
increases the value of an operand by 1. The decrement operator (--) decreases
the value of an operand by 1. For example, the following code snippet
incrementsthevalue of the z variableby1:
++z;
In the preceding code snippet, 1 is added to the z variable and then the result is
assigned to it. This code snippet is equivalent to the z = z+1 statement.
Similarly, the following code snippet decreases the value of the y variable by 1:
--y;
In the postfix form, the operator follows the operand. In this form, the operator
operates on the operand after the value of the operand is used in the
expression. That is;
n = 5;
m = n++;
In the preceding code snippet, n is assigned the value 5. The value of m is set to
5, because n is incremented after the value of n is assigned to m. The following
code snippet shows the two statements that are equivalent to the m = n++
statement:
n = 5;
37
m = n;
n = n+1;
The following codes show how to use increment and decrement operators:
class Increment_DecrementOperators {
publicstatic void main(String args[]){
int x= 2;
int y= 5;
int a,b,c,d;
a=x++; // Postfix increment operator
b=y--; // Postfix decrement operator
c=++x; // Prefix increment operator
d=--y; // Prefix decrement operator
System.out.println("The value of variable a is:" + a);
System.out.println("The value of variable b is:" + b);
System.out.println("The value of variable c is:" + c);
System.out.println("The value of variable d is:" + d);
}
}
Output: a = 2, b = 5, c = 4, and d = 3.
I. Arithmetic Operators in Java
In Java, various arithmetic operators, such as +, -, /, *, and % are combined
with the assignment operator and arecalled arithmeticassignmentoperators.
For example:
classAssignOperator{
public static void main(String args[]) {
int x, y, z;
x = y = z = 6;
x += y; // Arithmetic assignment operator
y -= z;
z *= x;
System.out.println("The value of x is: " + x);
System.out.println("The value of y is: " + y);
38
System.out.println("The value of z is: " + z);
}
}
J. Defining and Using Methods In Java
A method define an executable code that can be invoked (called), passing a
fixed number of argument. Methods are declare within a class source file. The
method declaration includes the method signature, which includes any
modifier, a method name, a return value and type and name of the method
arguments that are required to be passed in. The method body follows the
method signatures which is a collection of statement that is to be executed
when the method are invoked. The syntax follows:
Method_modifierreturn_valuesmethod_name(){
Statementstobeexecuted
}
Example: A program that test for the largest of ten numbersinputted bya user.
importjava.util.*;
public class LargestNumber
{
static Scanner console = new Scanner(System.in);
public static void main(String[] args)
{
double num;
double max;
int count;
System.out.println("Enter 10 numbers:");
num = console.nextDouble();
max = num;
for (count = 1; count <= 10; count++)
{
num = console.nextDouble();
max = larger(max, num);
}
System.out.println("The largest number is " + max);
}
public static double larger(double x, double y)
{
double max;
if (x >= y)
39
max = x;
else
max = y;
return max;
}
}
40
CHAPTER THREE
PROBLEM ENCOUNTERED
Having problem in life is inevitable and my SIWES period was not an
exemption as I was also faced with some problems in which some were solved
and some were without solution. Some of the problems I encountered during
the programme at LostCodes Technology were:
Inadequate Equipment – During my attachment, some basic tools needed
for troubleshooting of basic computer system hardware were not available. So,
troubleshooting a system with problems like faulty motherboard or CPU was
done manually through eliminationprocess.
Communication Gap – At the early stage of my programme, information
was not properly flowing from the management of the company to the students
on industrial training attachment which was corrected when their attention
was drawnto it.
Job Scarcity – Computer repairs, maintenance and installations for clients as
well as other jobs were not rampart as some complained about the economy
situation of the country. This limits the level of work I was able to perform
during my programme.
Office Space–the small office space at the company was a major problem as
students on IT attachment are made to carry out every work performed in a
classroom that canonly accommodatenot more thantwelve studentsat a time.
41
RELEVANCE OF SIWES TO MY COURSE OF STUDY
SIWES having been introduced to enable student obtain reasonable and
necessary skills in handling challenges and to help in the transformation of the
classroom knowledge acquired in tertiary institution into practical skill has
really achieved a lot of its objectives. The relevance of SIWES programme to
studentseducationallives are numerous, amongst are:
 Preparing students for employment and making the transition from
school to the world of work easier after graduation.
 Enabling students appreciate the connection between their courses of
study and other related disciplines in the production of goods and
services.
 Opportunity for students to blend theoretical knowledge acquired in the
classroom with practical hands-on application of knowledge required to
perform work in industry.
 Enabling students bridge the gap between the knowledge acquired in
institutions and the relevant production skills required in work
organizations.
 Enhancing students’contactswith potentialemployerswhile on training.
 Provision of an enabling environment where students can develop and
enhance personal attributes such as critical thinking, creativity, initiative,
resourcefulness, leadership, time management, presentation skills and
interpersonalskills, amongst others.
 Exposure of students to the environment in which they will eventually
work, thereby enabling them to see how their future professions are
organized in practice.
42
CHAPTER FOUR
4.1 WAYS OF IMPROVING THE SIWES PROGRAMME
SIWES programme can be improved by the various actors in the programme
which include the Federal Government of Nigeria (FGN), Industrial Training
Fund (ITF), Supervisory Agencies (NUC, NCCE, NBTE), the Institutions, and
the Employers.
A.THE FEDERAL GOVERNMENT OF NIGERIA
 The Federal Government should make it mandatory to all ministries,
companies, and other organization to offer placement and as well as
accept student for industrial attachment.
 The Federal Government should increase the fund being provided for the
SIWES Programme and other educational Programme in general for
effectiveand productiveimplementationof thescheme.
B.THE INDUSTRIAL TRAINING FUND (ITF)
 The Industrial Training Fund should provide a strong insurance policy
covered for student on SIWES programme.
 The Industrial Training Fund should provide logistic and material
necessaryfor the effectiveadministrationofthe scheme.
 The Industrial Training Fund should formulate policies and guidelines on
SIWES programme for enhancement to all SIWES participating bodies,
Institutionand companiesinvolved in thescheme.
 The Industrial Training Fund should provide information on companies
for the attachmentand help in the placement of student.
C.THE SUPERVISORY AGENCY
 The Supervisory agency should liaise with the industrial training funding
(ITF) to ensure the implementation of all the federal government policies
on thescheme.
 The Supervisory agency should ensure adequate funding of the SIWES
Unit in all the institutionfor effectiveadministrationofthe scheme.
 The Supervisory agency should research into the development of the
schemein line with advancesin technologicaldevelopment.
43
 The Supervisory agency should develop, monitor and review job
specification in collaboration with the institution toward the
maintenance of the National Minimum Academic Standard for the entire
programmeapproved for SIWES.
D.THE INSTITUTION
 The institution should help identify placement opportunities for student
attachmentwith employers.
 The institution should ensure regular visitation of their student on
industrialattachment tomonitor their welfareand improvement status.
 The institution should have adequate information on some of the
challenges facing the firm and the student; it should be noted and treated
immediately.
 The institution should ensure payment of student allowances and other
outstanding financialchallenges.
E. THE EMPLOYER
 The Employer should accept student for industrialtraining attachment
 The Employer should allow the student to have access to some of their
useful equipment like the computer system and its other resourceful
accessories(Internet service) and other useful facilities.
 The Employer should provide welfare services like – Drugs and other
Medicationand show good hospitalitytostudent and general public.
4.2 ADVICE FOR FUTURE PARTICIPANT
The future participant of SIWES Programme, I strongly recommend that they
should bear the following in mind:
 The student should be focus to avoid disputing the reputation of the
institution in their place of industrial attachment and they should also
bear in mind the objective of the scheme and show commitment, diligent
and honesty.
 The students should obey and adhere strictly to all rules and regulations
of the company; they should respect the industrial based supervisors as
well as other staff of the company because the moral standard of the
student is also evaluated.
44
 The student should avoid change of placement without seeking
permission from the institution even in special circumstance which must
always be determine and approved by their institutional based supervisor,
the employer and the industrialtrainingfund.
 The student should handle the equipment of the firm with great care and
they should take pride in protecting the interest of the company
throughout theperiod of industrialattachment.
4.3 ADVICE FOR THE SIWES MANAGER
 The SIWES Manager should give attention to student welfare on
industrial training and the student allowance should be increase as a
result of high cost of standard ofliving in our society.
 Technologists from various departments or programs should be involved
in the drafting of time table for students on IT to ensure that students are
always sent into areas where activities that will result in learning
experienceare taking place.
4.4 CONCLUSION
In conclusion, there were many things that I experienced and learnt during the
six month of my Industrial Training at LostCodes Technology. As a student
majoring in computer science I was very much involve in computer related
work and task, most of my training time were focused on computer system
repairs, maintenance and installation as well as basic computer networking.
The whole training period was very interesting, instructive and challenging.
Through this training I was able to gain new insights and more comprehensive
understanding about the real industry working condition and practice because
it has afforded me the basic practical and theoretical knowledge that I would
not have gotten from the lecture room going by my experience in the past three
years in the institution. It also gave me the opportunity to have a feel of what it
45
would be like after graduation when I start working. Going by the experience
acquired during this programme, SIWES can be said to be the best way to
prepare students to face the real working life after graduation. I also have been
able to use this training to explore various avenues available at my disposal
career-wiseespeciallyin preparing for CompTIA A+ certificateexamination.
4.5 RECOMMENDATION
Although SIWES undergone did achieve quite a lot of its stated objectives,
nevertheless, the following recommendations are suggested to improve the
qualitativecontext ofthe programme:
i. Participation of private corporate organization to minimize the problem
of low funding as recently complained by the director of ITF and payment
of befitting student allowance to assist in students finances during the
period of training should be done on monthlybasisand promptly.
ii. Participation of various professional, regulatory and statutory bodies
such as CPN, NCS in the supervisionof students.
iii. Sending students specifically to establishment where the stipulated aims
and objectivesof SIWES would be achieved.
REFERENCES:
 David B, David G, & Jim M, 2004, Cabling: complete guide to network wiring, 3rd
Edition, SYBEX, London.
 Jeans Andrews, 2004, A+ Guide to managing & maintaining your PC, 5th Edition.
 IT Essentials: PC Hardware & Software Companion Guide. (pg 103 - 112).
 Fundamentals of programming using Java by Edward Currie (2006).

More Related Content

What's hot

What's hot (20)

Computer Basics - A SIWES Report.
Computer Basics - A SIWES Report.Computer Basics - A SIWES Report.
Computer Basics - A SIWES Report.
 
SIWES PRESENTATION
SIWES PRESENTATIONSIWES PRESENTATION
SIWES PRESENTATION
 
Richard siwes presentation
Richard siwes presentationRichard siwes presentation
Richard siwes presentation
 
Sample of SIWES REPORT
Sample of SIWES REPORTSample of SIWES REPORT
Sample of SIWES REPORT
 
KOHequity SIWES report
KOHequity SIWES reportKOHequity SIWES report
KOHequity SIWES report
 
Siwes Report on Back End Web Development
Siwes Report on Back End Web DevelopmentSiwes Report on Back End Web Development
Siwes Report on Back End Web Development
 
SIWES TECHNICAL REPORT SAMPLE
SIWES TECHNICAL REPORT SAMPLESIWES TECHNICAL REPORT SAMPLE
SIWES TECHNICAL REPORT SAMPLE
 
SIWES Industrial Training report (NIGERIA)
SIWES Industrial Training report (NIGERIA)SIWES Industrial Training report (NIGERIA)
SIWES Industrial Training report (NIGERIA)
 
Siwes report
Siwes reportSiwes report
Siwes report
 
Siwes Pesentation
Siwes PesentationSiwes Pesentation
Siwes Pesentation
 
Siwes report original
Siwes report originalSiwes report original
Siwes report original
 
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNSIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
 
Siwes Report by odubiyi kazeem akionola (ENGKEEN),electrical enginieering,YAB...
Siwes Report by odubiyi kazeem akionola (ENGKEEN),electrical enginieering,YAB...Siwes Report by odubiyi kazeem akionola (ENGKEEN),electrical enginieering,YAB...
Siwes Report by odubiyi kazeem akionola (ENGKEEN),electrical enginieering,YAB...
 
Technical Report
Technical ReportTechnical Report
Technical Report
 
Abolarin james siwes powerpoint
Abolarin james  siwes powerpointAbolarin james  siwes powerpoint
Abolarin james siwes powerpoint
 
siwes technical report in mechanical engineering, automobile workshop
siwes technical report in mechanical engineering, automobile workshopsiwes technical report in mechanical engineering, automobile workshop
siwes technical report in mechanical engineering, automobile workshop
 
SIWES Report
SIWES ReportSIWES Report
SIWES Report
 
SIWES I.T REPORT ON WEB DESIGN
SIWES I.T REPORT ON WEB DESIGNSIWES I.T REPORT ON WEB DESIGN
SIWES I.T REPORT ON WEB DESIGN
 
johnson pdf (3)_2N
johnson pdf (3)_2Njohnson pdf (3)_2N
johnson pdf (3)_2N
 
It report
It reportIt report
It report
 

Viewers also liked

MY SIX MONTHS I T REPORT
MY SIX MONTHS I T REPORTMY SIX MONTHS I T REPORT
MY SIX MONTHS I T REPORT
Ikenna Onyeama
 
SIWES REPORT FOR INTERNAL AUDIT
SIWES REPORT FOR INTERNAL AUDITSIWES REPORT FOR INTERNAL AUDIT
SIWES REPORT FOR INTERNAL AUDIT
Sikiru Shittu
 
Industrial training Report
Industrial training ReportIndustrial training Report
Industrial training Report
David James
 

Viewers also liked (13)

Indusrial trainning Report presentation
Indusrial trainning Report presentationIndusrial trainning Report presentation
Indusrial trainning Report presentation
 
my It report
 my It report my It report
my It report
 
SIWES Presentation
SIWES PresentationSIWES Presentation
SIWES Presentation
 
MY SIX MONTHS I T REPORT
MY SIX MONTHS I T REPORTMY SIX MONTHS I T REPORT
MY SIX MONTHS I T REPORT
 
SIWES REPORT FOR INTERNAL AUDIT
SIWES REPORT FOR INTERNAL AUDITSIWES REPORT FOR INTERNAL AUDIT
SIWES REPORT FOR INTERNAL AUDIT
 
OPES SIWES
OPES SIWESOPES SIWES
OPES SIWES
 
Vincent chibueze c. full it report
Vincent chibueze c. full it reportVincent chibueze c. full it report
Vincent chibueze c. full it report
 
I.T. Report
I.T. ReportI.T. Report
I.T. Report
 
Logbook For Industrial Supervision and Training- A Look at Paper and Digital ...
Logbook For Industrial Supervision and Training- A Look at Paper and Digital ...Logbook For Industrial Supervision and Training- A Look at Paper and Digital ...
Logbook For Industrial Supervision and Training- A Look at Paper and Digital ...
 
Swep report
Swep reportSwep report
Swep report
 
Logbook for industrial supervision and training
Logbook for industrial supervision and trainingLogbook for industrial supervision and training
Logbook for industrial supervision and training
 
Industrial training Report
Industrial training ReportIndustrial training Report
Industrial training Report
 
Industrial Training report on java
Industrial  Training report on javaIndustrial  Training report on java
Industrial Training report on java
 

Similar to MY SIWES REPORT

My Interpretation about NIIT and Crest Academy
My Interpretation about NIIT and Crest AcademyMy Interpretation about NIIT and Crest Academy
My Interpretation about NIIT and Crest Academy
Smita Sahu
 
ICT JORDAN
ICT JORDANICT JORDAN
ICT JORDAN
Ayman
 

Similar to MY SIWES REPORT (20)

Report docx
Report docxReport docx
Report docx
 
COMPUTER ENGINEERING DIVINE UCHENNA WOGA.pptx
COMPUTER ENGINEERING DIVINE UCHENNA WOGA.pptxCOMPUTER ENGINEERING DIVINE UCHENNA WOGA.pptx
COMPUTER ENGINEERING DIVINE UCHENNA WOGA.pptx
 
Aroso Emmanuel A. - IT Technical Report.pdf
Aroso Emmanuel A. - IT Technical Report.pdfAroso Emmanuel A. - IT Technical Report.pdf
Aroso Emmanuel A. - IT Technical Report.pdf
 
DIIT Educom
DIIT EducomDIIT Educom
DIIT Educom
 
IIHT company profile brochure
IIHT company profile brochureIIHT company profile brochure
IIHT company profile brochure
 
My Interpretation about NIIT and Crest Academy
My Interpretation about NIIT and Crest AcademyMy Interpretation about NIIT and Crest Academy
My Interpretation about NIIT and Crest Academy
 
M-Tec-Prospectus
M-Tec-ProspectusM-Tec-Prospectus
M-Tec-Prospectus
 
IIHT Presentation
IIHT PresentationIIHT Presentation
IIHT Presentation
 
IIHT Presentation
IIHT PresentationIIHT Presentation
IIHT Presentation
 
O Level
O LevelO Level
O Level
 
Cegonsoft Bangalore
Cegonsoft Bangalore Cegonsoft Bangalore
Cegonsoft Bangalore
 
Cegonsoft College Tie up
Cegonsoft College Tie upCegonsoft College Tie up
Cegonsoft College Tie up
 
Industrial_Training_Report_docx.docx
Industrial_Training_Report_docx.docxIndustrial_Training_Report_docx.docx
Industrial_Training_Report_docx.docx
 
Subject Selection - Computer Studies*
Subject Selection - Computer Studies*Subject Selection - Computer Studies*
Subject Selection - Computer Studies*
 
Skill zip final
Skill zip finalSkill zip final
Skill zip final
 
ICT JORDAN
ICT JORDANICT JORDAN
ICT JORDAN
 
Get skills
Get skillsGet skills
Get skills
 
How students can get prepared for COMPTIA mobility+ plus certification (IOS,...
How students can get prepared for COMPTIA mobility+  plus certification (IOS,...How students can get prepared for COMPTIA mobility+  plus certification (IOS,...
How students can get prepared for COMPTIA mobility+ plus certification (IOS,...
 
About the company
About the companyAbout the company
About the company
 
Ajayi samson aduragbemi siwes report
Ajayi samson aduragbemi siwes reportAjayi samson aduragbemi siwes report
Ajayi samson aduragbemi siwes report
 

MY SIWES REPORT

  • 1. 1 TECHNICAL REPORT ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES) TRAINING PROGRAMME UNDERTAKEN AT LOSTCODES TECHNOLOGY NIGERIA LIMITED. YENAGOA, BAYELSA STATE. www.lostcodes.com, info@lostcodes.com +2348067976680, +2347032671390, +234803884828. BY NAME: ODOMO AYODELE ELIJAH MATRIC NO: FUO/11/CSI/218 PROGRAMME: COMPUTER SCIENCE & INFORMATICS FACULTY: SCIENCE INSTITUTION: FEDERAL UNIVERSITY, OTUOKE, BAYELSA STATE. APRIL – SEPTEMBER, 2015.
  • 2. 2 DEDICATION This report is dedicated to Almighty God for his protection, wisdom, knowledge, and understanding throughout theperiod of theindustrialtraining. Special dedication also goes to my ever supportive parents and my dear wife, for their relentless support and encouragement towards me during the course of my six months training.
  • 3. 3 ACKNOWLEDGEMENT I am highly thankful and grateful to the Almighty God Jehovah for his awesome presence in my life and his continued guidance and assistance. I am also grateful to my instructors, Mr. Godwin Larry, Mr. Premobowei Oti, Miss. Theresa Briseimo, and Mr. Kelly Omekwe for their encouragement and guidance as well as their mentorship even when all seemed impossible. I also wish to express my profound gratitude to all LostCodes Technology staff for their accommodation and contributions throughout the six months of the training programme. For everyone that contributed in one way or the other to the success of this six month SIWES programme, especially her Excellency, Mrs. Martha Nestor Binabo and her caring husband who housed and fed me, I say thank you very much and maythe good lord continueto guideand bless you all. I appreciateyou all.
  • 4. 4 TABLE OF CONTENTS Title Page Cover Page i Dedication ii Acknowledgement iii Tableof Contents iv Abstract v Overview vi Chapter 1: Introduction 1 1.2 Aimsof SIWES 2 1.3 Objectivesof SIWES 2 1.4 LostCodes Technology NigeriaLimited 3 1.4.1 LostCodes Products& Services 3 1.4.2LostCodesDepartments& their Functions 4 1.4.3LostCodes OrganisationalStructure 6 1.4.4 LostCodes Organogram 7 Chapter 2: Activitiesat LostCodesTechnology 8 2.1 Computer HardwareMaintenance& Repair 8 2.2.0 Microsoft OfficeWord 2007 16 2.2.1Microsoft OfficeExcel 2007 18 2.3 Basic Computer Network 21 2.4 Java ProgrammingLanguage 23 Chapter 3: ProblemsEncountered LostCodes 34 Relevance of SIWES programme 35 Chapter 4: Summary, Recommendation, and Conclusion 35 4.1 Waysof Improving The SIWES programme 35 4.2 AdviceFor Future Participant 37 4.3 AdviceFor The SIWES Manager 38 4.4 Conclusion 38 4.5 Recommendation 39 Reference
  • 5. 5 ABSTRACT This technical report covers a review of work undertaken and skills acquired during the Students Industrial Work Experience Scheme (SIWES) at LostCodes Technology Nigeria Limited, Amarata, Yenagoa, Bayelsa State, from April 2015 to September 2015. The nature of the work undertaken include: Computer hardware maintenance and installations, Basic use of Microsoft Office package (MS word, Excel and Powerpoint), Java programming language and Basic computer system networking. The report also covers the activities as well as duties carried out by me. I was also involved in repairs and general maintenance of computer componentswithinthecompany. This report gives concise information on all the subjects matter mentioned above, and defines the experience gained. It also highlights some problems I encountered during the process of acquiring this experience, and a few recommendations that I think will help improve the purpose of the programme.
  • 6. 6 OVERVIEW Thisreport is organized inthe following order: Chapter One: IntroductiontoSIWES and LostCodes Technology This chapter describes briefly the history and objectives of SIWES, including the bodies under SIWES. This chapter also describes the location and brief history of establishment of LostCodes Technology Nigeria Limited, aim and vision as well as objectives of the establishment, its organizational chart, and the variousdepartmentsand their functions. Chapter Two: SIWES activitiesat LostCodes Nigeria Limited This chapter discusses the various activities and duties performed in relation to the different departments in the firm. This chapter also explains the knowledge acquired in computer hardware maintenance including the tools and software used the use of Microsoft word, Microsoft Excel, and Microsoft PowerPoint. Basic introduction to Java programming language as well as basic computer networking wasalso discussed. Chapter Three: Problemsencountered during theprogramme This chapter enumerates the problems encountered and the relevance of the SIWES programme. Chapter Four: Conclusion This chapter gives the summary of all experiences and knowledge gained and the skills acquired, recommendations on the ways of improving the programme, advicefor futureparticipantsaswell as for the SIWES Managers.
  • 7. 7 CHAPTER ONE 1.1 INTRODUCTION Student Industrial Work Experience Scheme (SIWES) is a programme which was established by ITF in 1973 under the direct coordination of the Nigeria Universities Commission (NUC), National Commission for College of Education (NCCE), and National Board for Technical Education (NBTE) to solve the problem of lack of adequate practical skills required for employment in industriesbyNigeriangraduatesoftertiaryinstitutions. Participation in Industrial Training is a well-known educational strategy. Classroom studies are integrated with learning through hands-on work experiences in a field related to the student’s academic program and career goals. Successful internships foster an experiential learning process that do not only promotes career preparation but provides opportunities for learners to develop skills necessary to becomeleaders in their chosen professions. One of the primary goals of the SIWES is to help students integrate leadership development into the experiential learning process. Students are expected to learn and develop basic non-profit leadership skills through a mentoring relationship with innovativenon-profit leaders. By integrating leadership development activities into the Industrial Training experience, ITF hope to encourage students to actively engage in non-profit management as a professional career objective. Participation in SIWES has become a necessary pre-condition for the award of Diploma and Degree certificates in specific disciplines in most institutions of higher learning in the country. The scheme is a tripartite programme involving the students, the Universitiesand the Industries(the employers of labour).
  • 8. 8 1.2 AIMS OF SIWES SIWES is aimed at promoting the much-desired technological know-how for the advancement of the nation by exposing students to machines and equipment, professional work methods and ways of safeguarding the work area as well as the workers in industriesand other organizations. 1.3 OBJECTIVESOF SIWES The following are some of theobjectivesof SIWES: 1. To provide students the opportunity to test their interest in a particular career before permanent commitmentsaremade. 2. To develop skills in theapplicationoftheory to practicalworksituations. 3. To provide students the opportunity to test their aptitude for a particular career before permanent commitmentsaremade. 4. To develop skills and techniquesdirectlyapplicabletotheir careers. 5. To aid studentsin adjusting from college to full-timeemployment. 6. To prepare SIWES students in entering into full-time employment in their area of specializationupongraduation. 7. To help SIWES student acquiregood workhabits. 8. To help SIWES student develop employment records/references that will enhanceemployment opportunities.
  • 9. 9 1.4 LOSTCODESTECHNOLOGY NIGERIALIMITED LostCodes Technology is a fully fledge Information and Communication Technology (ICT) solutions provider situated at No. 1 Jimmy Ebi street, AmaratainYenagoa, Bayelsa State, Nigeria. The company was established by a group of young ICT intellects in 2006; LostCodes was established as a private owned Limited Liability Company (LLC). LostCodes is committed to offering delivery-on-demand ICT solutions to both small and large scale enterprises. They also offer ICT consultancy services by always keeping their clients abreast with the current trends in the ICT world and helping in realizing all available ICT opportunities for business growth and stability. Their approaches are business oriented and their core goal is aimed at offering efficient ICT solutions as well as building human capacity development in the ICT industry for the economic growth of Nigeria in particularand theworld at large. 1.4.1 LOSTCODESTECHNOLOGY PRODUCTSAND SERVICES Some of the services offered by LostCodes Technology are:  Training & Consultancy LostCodes provides professional IT training and consultancy services throughout Nigeria. With a team of highly trained and skilled ICT professionals, they offer a wide range of courses from short daytime courses through a six-month part time training leading to a diploma certification, as well as hands-on training onvariouscomputer applicationsand packages.  Networking Systems Network/Communication Solutions (Internet facilities, Telecommunications and SystemsSecurity)
  • 10. 10  ICT Office/Lab Setup Computer Installation and Maintenance (General ICT Office/Lab Supplies, Sales, Setup, Support and Delivery)  Responsive WebDesign Website Design and Maintenance that provides an optimal viewing experience, easy reading and navigation with a minimum of resizing, panning, and scrolling across a widerangeof devices.  Software Engineering Software application development and mobile computing (RIM Blackberry Applications, Android Applications, iOS Applications, MobileIntegration, etc.).  Data Management We offer an administrative process by which the required data is acquired, validated, stored, protected, and processed, hence the data accessibility, reliability, and timelinessisensured to satisfy theneeds of the end users. 1.4.2 LOSTCODESDEPARTMENTSAND THEIR FUNCTIONS LostCodes has different strategic departments and units that assist in performing various functions in order to achieve the desired objectives. This section explores these diverse units and shows how they function in LostCodes Technology. 1. ADMINISTRATION: This department over sees the smooth running of daily activities and ensures good flow of work process. It sub divided into the following:  Human Resource Management (HRM): Here, they are committed to providing an enabling environment where the full potentials of each and every staff can be unleashed to create a mastery of achievement. They are in charge of employment and code of conduct and ethics of
  • 11. 11 members of staff. Training of IT students, students of LostCodes and staffs of the companyis also carried out in thisunit.  Reception/Customer Service: These units are responsible for welcoming visitors and customers to LostCodes. They enquire from the customers what they want, whom they would want to see, show them the firm facilities, direct their enquiries or complains to the appropriate staff, keep recordsof visitorslog and ensure that the log is filled correctly. 2. FINANCE DEPARTMENT: The Finance department is responsible for the following:  Keeping Procedures - Keeping records of the purchases and sales made by a businessas well as capitalspending.  Preparing Final Accounts - Profit and loss account and Balance Sheets  Providing management information - Managers require ongoing financial information to enable them to make better decisions.  Management of wages - The wages section of the finance department will be responsible for calculating the wages and salaries of employees and organizing the collection of income tax and nationalinsurancefor the Inland Revenue.  Raising Finance - The finance department is also responsible for the technical details of how the business raises finance e.g. through loans, and the repayment of interest on that finance. In addition it also supervises the payment of dividendsto shareholders. 3. ICT DEPARTMENT: The Information Communication Technology (ICT) performs a cross-cutting function and therefore addresses the connectivity and harnessing of the emerging technologies to enhance research capacity. Modernizing the infrastructure and services that support research activities of
  • 12. 12 the firm is also a priority of this department. The contract of the company as relates to technology (database design, web design, software development and networking etc.) is executed inthis department. 1.4.3LOSTCODESTECHNOLOGYORGANISATIONAL STRUCTURE LostCodes Technology Nigeria Limited is headed by a Chief Executive Officer, CEO who also doubled as the director of research and innovation. He sees to the smooth running of the day-to-day activities of the company. The CEO is directly assisted by three (3) different directors, namely: director of ICT and Chief Architect, directorof Administration, and director ofFinance. The three directors who are in charge of the three departments are also assisted by six (6) other managers who are in charge of various units in the company. The six units are: Administration, Account, Operation, Human Resources, System Security, and NetworkSystem. LostCodes also has a business developer who report to the director of Business analysis, Network Engineer working with the Network System manager, a receptionist under Administration manager, training instructors working in the Human Resources department as well as a cashier assisting the Account manager.
  • 13. 13 1.4.4 CEO, DIRECTOR OF RESEARCH &INNOVATION DIRECTOR OF BUSINESS ANALYSIS HUMAN RESOURCES MANAGER ADMIN MANAGER NETWORK ENGINEER RECEPTIONIST BUSINESS DEVELOPER OPERATION MANAGER DIRECTOR OF FINANCE CHIEF ARCHITECT AND DIRECTOR OF ICT SYSTEM SECURITY MANAGER NETWORK SYSTEM MANAGER TRAINING INSTRUCTOR ACCOUNT MANAGER CASHIER
  • 14. 14 CHAPTER TWO Activities duringthe SIWES period: During my six months SIWES programme at LostCodes, all lectures and practical works took place at the company’s classroom/Laboratory whereby all resource persons come to deliver their lecture or take the students on practical. The activities undertaken during the period of attachment in LostCodes Technology canbe divided into four (4) distinct parts, theyare: A. Computer hardwaremaintenanceand repair, B. Use of Microsoft Word, Excel and PowerPoint, C. Preparing, installing, configuringofcomputer network, D. Basic introductiontoJava programminglanguage. 2.1 Computer hardware maintenance and repair: This section deals with the repair, maintenance and installation of some basic computer hardware. In order to work as a professional in computer hardware repair and maintenance, some basic tools such as Anti-static wrist strap, Spare parts container, Screwdrivers, Inspection flashlight, Part retriever, Wire Stripper, Solder iron, IC puller, Pliers etc. are required. These tools can be purchase in a single tool kit or separately. Some basic precautions that must be observed in carrying out either repair or maintenance, or installation of basic PC hardwareare:  Remember to turn off the AC supply and unplugged the system or remove the batteryincaseof a laptop for extra safety.  Always put on your anti-static wrist strap or ground yourself by discharging yourself of any electric charges, also remove any hand jewelry.
  • 15. 15  Avoid capacitors in the first 10 minutes of opening the system because capacitor storescharges.  Never service the non-serviceable like the PSU, hard & Optical drives, etc. Some of the Computer hardware I was opportune to have a hand-on experience with during the SIWES and the problems associated with each of them solved are: Motherboard, Hard diskdrive, CPU, RAM, PSU, keyboard, casefan, etc. A. FAULTY MOTHERBOARD The Motherboard is the heart of a computer because other major components that make the system work are connected to it. As the processor is said to be the brain of a computer system, so also is a Motherboard refers to as the heart of a computer system. As long as the system Motherboard is intact, if other things go wrong with the system, it is often repairable at a reasonable cost. Motherboard repair or replacement is usually very expensive. Symptoms: Failure to boot at all or boot successfully, increased window errors or blue screens of death, freezing, or connected device that previously worked suddenly won’t work. Four beeps, followed by 2, 3, or 4 beeps indicate serial or parallel port issues on a motherboard which alsoimpliesa damaged motherboard.
  • 16. 16 Causes: Electrical spikes & surges, Dust, Pet hair, & debris, smoke and tar, heating issues, physical impact or spill, normal aging & wear, manufacturer design defectsetc. Solution: Most repair of motherboard is usually done by professional technician because of the various circuitry on it if it has not damaged beyond repair else a new motherboard of the same form factor and specification will be acquired for replacement tothe dead motherboard. Installation: STEP 1: Orient thesystem board intothe case, STEP 2: Locatethe mounting holes, STEP 3: Insert the riser fittings(ifneeded), STEP 4: Positionthesystem board, STEP 5: Screw the system board. The faulty motherboard I handled in LostCodes Technology had a symptom of not booting at all and after eliminating every other possible component such as CPU, RAM, & PSU, it was confirmed that the Motherboard was responsible for the problem and the problem was solved by simply replacing the faulty Motherboard with a new one. B. FAULTY HARD DISK DRIVE Hard disk drive is a secondary storage medium of a PC, the operating system (OS) and every other programs that is not in execution are stored in the hard disk drive. Hard disk failure can cause loss of
  • 17. 17 data stored in it if it isn’t backup with another storagemedium. Symptoms: Although, there are many signs associated with a failing or dead hard disk drive like slowing down of performance, frequent freezes, Blue screen of death (BSOD), corrupted data, strange sounds etc. but the most common of them all is the slowing down in performance or the strange sounds. When the hard disk drive is failing, it can take up to 25 – 30 minutes to load the OS after booting and the same amount of time to also shut down properly. Even when the system finally load the OS, frequent freezes will still be experienced during the use of the PC. Causes: Firmware or manufacturer faults, heating issues, frequent power outage without UPS, electronic failure or power surges, mechanical or internal failure, corrupted system files by unethically shutting down of PC, human errors like modifying the system registry settings, altering system files attribute and location, wrong installationof OS. Repair: In case of corrupted system files, always use the standard way of shutting down of PC by closing any or all the running programs before shutting down. Regular updating of system, running the latest copy of antivirus program or replacing a hard disk drive after 5 years of intensive use can handle problem arising from mechanical or internal failure. In case of electronic failure, use only required power supply. If the disk drive is dead, try changing the SATA/USB or IDE cable as well as the power adapter and if this does not work, replace the dead hard disk drive with a new one.
  • 18. 18 Installation: STEP 1: Configure thedrive as a master or slave, STEP 2: Locatethe drive cage, STEP 3: Orient the drivein the cage, STEP 4: Securethe driveby installing themounting screws, STEP 5: Install the drivecageinto the computer case, STEP 6: Securethe casewith screws. The two particular hard disk drive problems I encountered at LostCodes was caused by its SATA cable which was not properly plugged and other was caused by mechanical failure with a symptom of strange sound which was solved by replacing thefaulty hard disk drive. C.FAULTY CPU Central Processing Unit (CPU) which is also refers to as the ‘Processor’ is the brain of a computer system as it performs the Arithmetical/logical operations in the system. Without a CPU, a system cannot work. Symptoms: i. Computer turns on, no beeps, no screen and does no POST. ii. Computer turns on; fans run at highest speeds, still no POST and OS not loading. iii. Computer turnson but turnsoff immediately iv. Computer screenfreezes after being on for a few minutes. v. System halts error (BSOD).
  • 19. 19 Above symptoms is also associated with other hardware fault in the system but in other to be sure of a faulty CPU, the following is what needed to be checked if they are working properlybefore drawing your conclusion: i. If the heat sink and fan is working properly, ii. If there is no bulging or leaking capacitors on the motherboard near the CPU or memory, iii. If the power supply is working properlyby checking with a tester, iv. If the system has a dedicated videocard that isin good condition. If all the above checksout well, then the CPU or the motherboard isfaulty. Causes: Age, heat, overclocking or stress, dried thermal compound, electrical power surge. Solution: If it has been confirmed that the CPU is bad, the only solution is to replace the bad CPU with another one. Installation: STEP 1: Locate the processor socket on the system board, STEP 2: Open the socket cover, STEP 3: Orient the processor, STEP 4: Insert the processor into the socket, STEP 5: Securethe processor by closing and locking the cover. A complete dead case of CPU was handled during my attachment, its symptom is that the computer is not turning on at all and it was resolved changing the CPU with a new one D. FAULTY RANDOMACCESS MEMORY (RAM)
  • 20. 20 RAM is a volatile primary memory medium in which programs in execution are stored. Without the RAM, OS can’t be loaded thereby terminating the boot process uncompleted. Symptoms: i. Computer first turn on and runs fine but it performance start deteriorating about an hour of use. ii. Computer System randomlyrestarts whileusing it or freeze sporadically. iii. Files regularlyaccessand save seem to be inexplicablycorrupted. iv. Attempt toinstalla new program repeatedlyfailfor unknown reasons. v. Computer failsto boot to OS. vi. System beeps 2 to 3 times when turned on and refuse to boot to OS. Causes: The symptom of 2 to 3 beeps when turned on is usually caused by improper installation of the RAM stick into its slot on the motherboard. Soft errors due to heat, magnetic interference, electrostatic discharge, power surges and flaws, hard errors which cause hardware or software to crash whenever the affected memory cell is accessed. Unlike soft errors, hard errors are uncorrectable. Factorydefect can also causea faulty RAM. Solution: The memory sticks can be removed if they are more than one and start testing each of the RAM modules in the slots. If all the RAM modules seem bad, then the problem might probably be the RAM slots. If the module is not inserted correctly on the slot, then remove and re-insert correctly. But if the RAM module is bad, replacing it will be appropriate. To fix a faulty RAM slot, one would need to replace themotherboard completely.
  • 21. 21 Installation: STEP 1: Locate RAM slots on the system board, STEP 2: Orient the RAM over the slot, STEP 3: Insert the RAM into theslot; STEP 4: Secure the RAM by verifying that the locking arms have properly closed into the locked position. Most RAM problems I encountered were that of improper installation which was corrected bysimply re-installing them. E.FAULTY POWER SUPPLY UNIT (PSU) Power supply unit converts alternating current (AC) to low voltage regulated DC power for the consumptionof internalcomponentsof the PC. Symptoms: When your computer does not get the power it needs, the result can be erratic behaviour, irregular shut downs, or spectacular failures. Unexplained crashes could point to a PSU failure, unexplained video errors, noise and odour, complete failure. Hard disk and fan simultaneously fail to spin. Causes: PSU fan failure, electric shocks, smoke, blown circuit breaker, bad capacitor, inadequatecooling fan, overloading etc. Solution: If the PSU has been ascertained to be dead, a replacement is an option to bring the system back to life. Repair of dead PSU is done by a professional technician
  • 22. 22 who is grounded in the recoiling and service of PSU. If the power cord is bad, replacement isnecessary. Installation: STEP 1: Locate the power supply bay in the case, STEP 2: Orient the power supply to the bay, STEP 3: Insert the power supply intothe bay, STEP 4: Securethe power supply to the caseby installing the mounting screws. The problem of the PSU I came across at LostCodes technology was complete failure to power a system which was solved by purchasing a new PSU of the samespecification. Other problems encountered and solved were keyboard problem, monitor not displaying at all, opticaldrivethat is not reading a digitalvideodisk (DVD), etc. 2.2.0 MICROSOFT OFFICE WORD 2007 Is a word processing application, and it is a part of the Microsoft office package. A word processor is a program that helps you create, edit, format, and print documentssuch as letters, reports, and Web pages. A.COMPONENTSOF THE WORD WINDOW Word had several components that help you interact with the program, they are listed below:  the titlebar, the menu bar, standard toolbar, document area  view buttons(print layout, full screen reading, web layout etc.)  statusbar, verticaland horizontalscroll bar, ruler Important shortcutsinMicrosoft word are:
  • 23. 23  ctrl+ n = new document, ctrl+ s = save document  ctrl+ d = font, ctrl+ f = find  ctrl+ p = print document, ctrl+ b = bold  ctrl+ I = italics, ctrl+ u = underline  ctrl+ ] = to increasetext size, ctrl+ [ = to decreasetext size  ctrl+ c = copy, ctrl+ v = paste  ctrl+ z = undo ctrl+ x = cut  ctrl+ e = centralise shift + arrow keys = highlight text  ctrl+ j = justify ctrl+ a = highlight all text  shift + f3 = to toggle betweenlower case, upper case etc  alt + f4 = shutdown, etc. B. DIFFERENT METHODSOF CREATINGTABLES:  USE OF THE TABLE MENU Click where you want to insert a table. On the Insert tab, in the Tables group, click Table, and then, under Insert Table, drag toselect the number of rows and columns that you want.  USE THE INSERT TABLE COMMAND You can use the Insert Table command to choose the table dimensions and format beforeyou insert the tableinto a document. Click where you want to insert a table. On the Insert tab, in the Tables group, click Table, and then click Insert Table. Under Table size, enter the number of columns and rows. Under AutoFit behaviour, chooseoptionsto adjust the tablesize.  DRAW A TABLE
  • 24. 24 Click where you want to createthe table. On the Insert tab, in the Tables group, click Table, and then click Draw Table. The pointer changesto a pencil. To define the outer table boundaries, draw a rectangle. Then draw the column lines and row lines inside the rectangle. 2.2.1MICROSOFT EXCEL 2007 Thisis a spreadsheet program used to store and manipulatedata. To open an Excel workbook, click on ‘Start menu’, then ‘All programs’, then ‘Microsoft Office’ and finally click on ‘Microsoft Office Excel’. When a new workbook is opened, the following aresome featuresfound in MS Excel: Office, Quick office access, title bar, menu bar, standard toolbar (Ribbon), cell address, formula bar, column heading, row heading, spreadsheet cell, status bar, horizontal& verticalscrollbar, etc. In MS Excel, two or more cells canbe merged together. Autofill – This feature is used to copy cell contents across or down the spreadsheet. This is useful if you have to type the same word or number into a group of neighbouring cells. A.To use Autofill:  Select the cell containing thedata you wish to copy  Positionover the fill handle untilthe cursor changesto a blackcross  Click on the fill handle and drag down or across the sheet, until the data series has reached thesize you want
  • 25. 25 If Autofill is used with dates or words relating to dates, such as months or days, it will produce a ‘fill series’. This will work with months in full (January) or in short (Jan) and days of the week in full (Monday) or in short (Mon). B. SELECTINGA CELL, COLUMN,ROW 1. To select a cell – clickon the cell with your cursor 2. To select a column – click on the grey column heading at the top of the column 3. To select multiplecolumns – click and drag acrossthe column heading 4. To select a row – click on the row heading 5. To select multiplerow - clickand drag down through the row heading 6. To select non Adjacent Range - it is also possible to select two ranges of cells that arenot touching each other.  Click and drag through the cells to select the first range  Press the Ctrl key and hold it down  Click and drag through the second rangeof cells 7. To select the whole spreadsheet – click on the small grey box at the top of the spreadsheet, it is located to the left of the column heading A and above row heading 1 C. Create or delete an Excel table in a worksheet When you create a table in a Microsoft Office Excel worksheet, you can manage and analyse the data in that table independently of data outside the table. When you no longer need a table, you candelete it. D. Manipulating the datain a table 1. To calculate TOTAL of a rangeof numbers:  Select the cell you wish to containthe total  Type = sign, to start theformula  Type the functionfor adding cells, SUM
  • 26. 26  Type the open brackets character(  Click on the first cell in therange  Type a colon :  Click on the last cell in therange  Type the close bracketscharacter )  Press enter to finish the formula The AutoSum ∑ canalso be used to calculatetheTOTAL 2. To calculate AVERAGE of a rangeof numbers  Select the cell you wish to containthe AVERAGEin  Type = sign, to start the formula  Type the functioncode AVERAGE  Enter the rangeyou wish to act upon, in bracketsi.e(A1:A50)  Press enter to finish the formula To input GRADE in a table, logicalIF expressionis used e.g =IF(F3>200, “A”, IF(F3>150, “B”, IF(F3>100, “C”, IF(F3>50, “D”, “F”)))) Data in a tablecanbe used to plot its chart  Select the rows or the columns to be used  Click on INSERT from menu bar  Select your desired chart
  • 27. 27 2.3 BASIC COMPUTER NETWORK This is a collection of two or more computers that are connected together to share files, or resources. A. NETWORK CABLE This is a medium which connects two or more devices together in which informationcanflow. ETHERNET CABLE PIN OUTSIN UNSHIELDED TWISTED PAIR There are two basic Ethernet cable pin outs. A straight-through Ethernet cable, which is used to connect to a hub or a switch, and a crossover Ethernet cable used to operatein a peer-to-peer fashionwithout a hub/switch. For straight-through, there are two standards which are T568A refers to as Standard A and T568B also refers to as Standard B. Both ends for Standard A are thesame as well as that of Standard B. Their colour configurationsare: STANDARD A STANDARD B S/NO WIRE S/NO WIRE 1 WhiteGreen 1 WhiteOrange 2 Green 2 Orange 3 WhiteOrange 3 WhiteGreen 4 Blue 4 Blue 5 WhiteBlue 5 WhiteBlue 6 Orange 6 Green 7 WhiteBrown 7 WhiteBrown 8 Brown 8 Brown
  • 28. 28 Colour configurationsfor Crossover Ethernet cable pinout END 1 END 2 S/NO WIRE S/NO WIRE 1 WhiteOrange 1 WhiteGreen 2 Orange 2 Green 3 WhiteGreen 3 WhiteOrange 4 Blue 4 WhiteBrown 5 WhiteBlue 5 Brown 6 Green 6 Orange 7 WhiteBrown 7 Blue 8 Brown 8 WhiteBlue B. HOW TO WIRE ETHERNET CABLES Wiring your own Ethernet cablesand connectors. Required itemsare:  Ethernet Cable (PreferablyCat 5, 5e, 6, 6e Or 7), MultipurposeCrimper Tool  Modular Connector Plug (RJ45), LAN Cable Tester Below are the steps on how to wireEthernet patch cables: 1. Strip off about twoinches of the Ethernet cablesheath 2. Untwist the pairs 3. Alignthe coloured wiresaccording toyour desired standard 4. Trim all the wires to the same length, about ½ to ¾ inch left exposed from the sheath 5. Insert the wires into the RJ45 plug – make sure each wire is fully inserted to the front of the RJ45 plug and in correct order. The sheath of the cable should extend into the plug by about ½ inch and will be held in place by the crimp. 6. Crimp the RJ45 plug with the crimper tool
  • 29. 29 7. Verify that the wires ended up the right order and that the wires extend to the front of the RJ45 plug and make good contact with the metal contactsinthe RJ45 plug 8. Cut the Ethernet cable to length – make sure it is more than long enough for your needs 9. Repeat the above step 1 – 7 for the other end with the same colour configuration for straight-through but different colour configurations for the Crossover cable Test the cable with the LAN cable tester to check for continuity in each of the wire. 2.4 JAVA PROGRAMMING LANGUAGE Among other things I learnt was how to write some basic Java programs. Towards the end of the forth month of my SIWES programme, Java programming language was introduced and I learnt some rules governing Java programming. Java is an Object Oriented Programming (OOP) language that was designed to meet the need for a platform-independent language. Java is used to create applications that can run on a single computer as well as a distributed network. Java is used to develop stand-aloneand Internet-based applications. A. Declaring Variables and Literals in Java Java supports some basic programming elements, such as data types, keywords, literals, and variables. Keywords are the reserved words for the Java programming language, which cannot be used as names for variables, classes, or methods. The data stored in the memory of the computer can be of many types. Data types are used to define the operations that are possible on the variables and the storage method. Java is a strictly typed language. The data
  • 30. 30 stored in the memory of a computer can be of different types. The various data types in Java are: o Primitivedata types o Reference data types o Abstractdata types  Primitive DataTypes. The built-in data types in Java are known as the primitive or the simple data types. There are eight primitivedata typesinJava, they are: o Integer type: Can store whole number values. The size of the values of the variables depends upon the chosen integer data type. The four integer data typesare: byte, short, int and long. o Floating point type: Can store fractional numbers. The two types of floating point type are: float and double. o Boolean type: Can store only the true and false values. The Boolean data type is required when a condition has to be checked. The true or false value of the expression or the condition determines further executionof the Java programs. o Character type: Can store symbols, such as letters and numbers. In charactertype, thereis only one data type, char.  Reference Data Types. A reference data type contains the reference or an address of dynamically created objects. They are also known as non-primitive data types. The default value of a variable that is of reference data type, is null. The examplesof referencedata typesin Java are: Objectsand Arrays.  Abstract Data Types The abstract data type includes the data types derived from the primitive data type and have more functions than primitive data types. For example, String is an abstract data type that can store letters, digits, and other
  • 31. 31 characters, such as /, (), :, $, and #. You cannot perform calculations on a variableof the String data typeeven if the data stored in it has digits. B. Defining Variables and Literals A variable is the name that refers to a memory location where some data value is stored. You can assign different values to a variable during program execution. Java allocates memory to each variable that you use in your program. Types of Variable. The area or the region of a program where a variable can be accessed is known as variable scope. The various types of variables based on the variable scope in Java are:  Class variables: Are accessible within a class and its objects. The class variablesaredeclared insidethe class before their use.  Instance variables: Are declared inside a class and are created when the class is instantiated. Objects give different values to instance variables as per the specific requirementsofthe object of that class type.  Local variables: Are declared inside a method. Their scope is within the block of code in which they are defined. They are local to the block of code and arenot accessibleoutsidethe method.  Static variables: Are allocated memory only once but are globally accessible to all instances of a class. Therefore, when an instance of a class is destroyed, the static variable is not destroyed and is available to other instancesof that class.  Automatic variables: Are accessible within the function in which they are declared. The automatic variables are created when a function is called and are destroyed when you exit thefunction.
  • 32. 32 Syntax for declaring variables: <type><variablename>; // Singlevariableof given type. <type><variable1name,variable2name ... variable_n_name> // Multiplevariablesof giventype. You need to initialize variables in java before you use them. The Java compiler initializes the class data variables to default values when an object is created. You can assign values to a variable during declaration or after declaration of the variable, before first use of the variable. For example, you can use the following code snippet to declare the variables, num1 and num2 to calculate the sum of two numbers: int num1, num2; The following code snippet shows how to assign values to a variable: <type><variablename>=<value>; // During declaration. <variablename>=<value>// after declaration. For example, you can use the following code snippet to assign values to the variables,num1and num2 to calculatethesum of two numbers: float num1, num2; // Declarationofvariables. num1 = 7; // Assigning values to thevariables. num2 =12; You can also assign the same value to more than one variable in a single statement. The following code snippet shows the assignment of the same value to more thanone variable: x = y = z = 9; In the preceding command, integer value 9 is first assigned to variable z, then toy, and finally to x. C. Structure of a Java Application In Java, you can either create a stand-alone application or a networked application. A stand-alone application uses resources of a local computer. A networked application uses the resources available over a network. For example, a networked application is allowed to read from or write to files on
  • 33. 33 remote computers. Classes and objects form the basis of the structure of a Java application. A Java application consists of a class, in which you declare the data members and methods. An object is an instance of a class, and it encapsulates the methods and data members of a class. Objects can be reused across programs. Creating Objects and Classes A class defines user-defined objects and their characteristics. Any concept that you need to implement in a Java program is encapsulated within a class. A class defines the attributes and methods of objects of the same type sharing common characteristics. For example, when you create an online shopping site for books, each book is an instance of the Books class. All books have attributes, such as the number of pages, type of binding, and title. In addition, the books have various common methods, such as being selected, being bought, and being sold. The state of each book is independent of the state of another book. The maincomponentsof a class are: D. Data Attributes and Methods. Classes contain statements that include the declaration of data members, which specify the type of data to be stored. Methods of a class contain a set of executable statements that gives a desired output. Methods define the action to be carried out on the data members of the class. The class block or the class body is included within a set of braces, {}, which indicate the start and end of the classes. E. Creating Classesin Java Various data members and methods of a class are defined inside a class. The statements written in a Java class must end with a semicolon (;). The following code snippet shows how to declarea class: Class ClassName{ //Declaration of data members
  • 34. 34 //Declaration of methods } F. Creating Objects of a Class An object is an instant of a class and has a unique identity. Classes and objects are closely link together, while an object is a unique identity, a class is an abstractionofcommonpropertiesof variousobject. Declaration: Declares a variable that holds the reference to the object. The following code snippet shows how to declare an object of the class: class_nameobject_name; Instantiation or creation: Creates an object of the specified class. When you declare an object, memory is not allocated to it. Therefore, you cannot store data in the data members of the object. To allocate memory to the object, you need to use the new operator. The new operator allocates memory to an object and returnsa referenceto that memorylocationin the object variable. object_name=new class_name(); To accessthe data membersof a class, you use the following syntax object_name.data_member_name G. Declaring the main() Method A Java program consists of the main() method that calls the methods defined in a class. You can create a number of classes in a Java program. The Java compiler compiles all the classes in an application. However, to execute a program, you need to include a main() method in the program. The following code snippet shows how to declarethe main() method: public static void main(String [] args){ // Code for main() method } For example:
  • 35. 35 A Java application containing an Account class that consists of various data members, such as account number, name, age, and balance. The application initialize the data members to some default values when an object of the Account class is created. In addition, the application display the data stored in theobject. Import java.Util.*; Account.java; class Account { Scanner input = new Scanner (System.in); privateintaccount_no; // Data members converted to private toencapsulate data private String name; private int age; private float balance; public Account() { System.out.println (“enter the account number”); account_no = input.nextInt (); System.out.println (“please enter the account name”); name = input.nextLine (); System.out.println (“please enter the age”); age = input.nextInt (); System.out.println(“ please enter the balance”); balance = input.nextInt(); } public void showData() { // Method can be called from outside the class to access the data members System.out.println("Account Number = "+ account_no); System.out.println("Name = "+ name); System.out.println("Age = "+ age); System.out.println("Balance of this customer is = "+ balance); } publicstatic void main(String args[]) { Account ac = new Account();
  • 36. 36 ac.showData(); } } H. Operators in Java Operators are used to calculate, compute, and compare values. Operators are also used to test multiple conditions. You can connect two or more variables in a logical expression by using operators. Operators can operate on one, two, or three operands. Using Increment and Decrement Operators: The increment and decrement operators are unary operators. The increment operator (++) increases the value of an operand by 1. The decrement operator (--) decreases the value of an operand by 1. For example, the following code snippet incrementsthevalue of the z variableby1: ++z; In the preceding code snippet, 1 is added to the z variable and then the result is assigned to it. This code snippet is equivalent to the z = z+1 statement. Similarly, the following code snippet decreases the value of the y variable by 1: --y; In the postfix form, the operator follows the operand. In this form, the operator operates on the operand after the value of the operand is used in the expression. That is; n = 5; m = n++; In the preceding code snippet, n is assigned the value 5. The value of m is set to 5, because n is incremented after the value of n is assigned to m. The following code snippet shows the two statements that are equivalent to the m = n++ statement: n = 5;
  • 37. 37 m = n; n = n+1; The following codes show how to use increment and decrement operators: class Increment_DecrementOperators { publicstatic void main(String args[]){ int x= 2; int y= 5; int a,b,c,d; a=x++; // Postfix increment operator b=y--; // Postfix decrement operator c=++x; // Prefix increment operator d=--y; // Prefix decrement operator System.out.println("The value of variable a is:" + a); System.out.println("The value of variable b is:" + b); System.out.println("The value of variable c is:" + c); System.out.println("The value of variable d is:" + d); } } Output: a = 2, b = 5, c = 4, and d = 3. I. Arithmetic Operators in Java In Java, various arithmetic operators, such as +, -, /, *, and % are combined with the assignment operator and arecalled arithmeticassignmentoperators. For example: classAssignOperator{ public static void main(String args[]) { int x, y, z; x = y = z = 6; x += y; // Arithmetic assignment operator y -= z; z *= x; System.out.println("The value of x is: " + x); System.out.println("The value of y is: " + y);
  • 38. 38 System.out.println("The value of z is: " + z); } } J. Defining and Using Methods In Java A method define an executable code that can be invoked (called), passing a fixed number of argument. Methods are declare within a class source file. The method declaration includes the method signature, which includes any modifier, a method name, a return value and type and name of the method arguments that are required to be passed in. The method body follows the method signatures which is a collection of statement that is to be executed when the method are invoked. The syntax follows: Method_modifierreturn_valuesmethod_name(){ Statementstobeexecuted } Example: A program that test for the largest of ten numbersinputted bya user. importjava.util.*; public class LargestNumber { static Scanner console = new Scanner(System.in); public static void main(String[] args) { double num; double max; int count; System.out.println("Enter 10 numbers:"); num = console.nextDouble(); max = num; for (count = 1; count <= 10; count++) { num = console.nextDouble(); max = larger(max, num); } System.out.println("The largest number is " + max); } public static double larger(double x, double y) { double max; if (x >= y)
  • 39. 39 max = x; else max = y; return max; } }
  • 40. 40 CHAPTER THREE PROBLEM ENCOUNTERED Having problem in life is inevitable and my SIWES period was not an exemption as I was also faced with some problems in which some were solved and some were without solution. Some of the problems I encountered during the programme at LostCodes Technology were: Inadequate Equipment – During my attachment, some basic tools needed for troubleshooting of basic computer system hardware were not available. So, troubleshooting a system with problems like faulty motherboard or CPU was done manually through eliminationprocess. Communication Gap – At the early stage of my programme, information was not properly flowing from the management of the company to the students on industrial training attachment which was corrected when their attention was drawnto it. Job Scarcity – Computer repairs, maintenance and installations for clients as well as other jobs were not rampart as some complained about the economy situation of the country. This limits the level of work I was able to perform during my programme. Office Space–the small office space at the company was a major problem as students on IT attachment are made to carry out every work performed in a classroom that canonly accommodatenot more thantwelve studentsat a time.
  • 41. 41 RELEVANCE OF SIWES TO MY COURSE OF STUDY SIWES having been introduced to enable student obtain reasonable and necessary skills in handling challenges and to help in the transformation of the classroom knowledge acquired in tertiary institution into practical skill has really achieved a lot of its objectives. The relevance of SIWES programme to studentseducationallives are numerous, amongst are:  Preparing students for employment and making the transition from school to the world of work easier after graduation.  Enabling students appreciate the connection between their courses of study and other related disciplines in the production of goods and services.  Opportunity for students to blend theoretical knowledge acquired in the classroom with practical hands-on application of knowledge required to perform work in industry.  Enabling students bridge the gap between the knowledge acquired in institutions and the relevant production skills required in work organizations.  Enhancing students’contactswith potentialemployerswhile on training.  Provision of an enabling environment where students can develop and enhance personal attributes such as critical thinking, creativity, initiative, resourcefulness, leadership, time management, presentation skills and interpersonalskills, amongst others.  Exposure of students to the environment in which they will eventually work, thereby enabling them to see how their future professions are organized in practice.
  • 42. 42 CHAPTER FOUR 4.1 WAYS OF IMPROVING THE SIWES PROGRAMME SIWES programme can be improved by the various actors in the programme which include the Federal Government of Nigeria (FGN), Industrial Training Fund (ITF), Supervisory Agencies (NUC, NCCE, NBTE), the Institutions, and the Employers. A.THE FEDERAL GOVERNMENT OF NIGERIA  The Federal Government should make it mandatory to all ministries, companies, and other organization to offer placement and as well as accept student for industrial attachment.  The Federal Government should increase the fund being provided for the SIWES Programme and other educational Programme in general for effectiveand productiveimplementationof thescheme. B.THE INDUSTRIAL TRAINING FUND (ITF)  The Industrial Training Fund should provide a strong insurance policy covered for student on SIWES programme.  The Industrial Training Fund should provide logistic and material necessaryfor the effectiveadministrationofthe scheme.  The Industrial Training Fund should formulate policies and guidelines on SIWES programme for enhancement to all SIWES participating bodies, Institutionand companiesinvolved in thescheme.  The Industrial Training Fund should provide information on companies for the attachmentand help in the placement of student. C.THE SUPERVISORY AGENCY  The Supervisory agency should liaise with the industrial training funding (ITF) to ensure the implementation of all the federal government policies on thescheme.  The Supervisory agency should ensure adequate funding of the SIWES Unit in all the institutionfor effectiveadministrationofthe scheme.  The Supervisory agency should research into the development of the schemein line with advancesin technologicaldevelopment.
  • 43. 43  The Supervisory agency should develop, monitor and review job specification in collaboration with the institution toward the maintenance of the National Minimum Academic Standard for the entire programmeapproved for SIWES. D.THE INSTITUTION  The institution should help identify placement opportunities for student attachmentwith employers.  The institution should ensure regular visitation of their student on industrialattachment tomonitor their welfareand improvement status.  The institution should have adequate information on some of the challenges facing the firm and the student; it should be noted and treated immediately.  The institution should ensure payment of student allowances and other outstanding financialchallenges. E. THE EMPLOYER  The Employer should accept student for industrialtraining attachment  The Employer should allow the student to have access to some of their useful equipment like the computer system and its other resourceful accessories(Internet service) and other useful facilities.  The Employer should provide welfare services like – Drugs and other Medicationand show good hospitalitytostudent and general public. 4.2 ADVICE FOR FUTURE PARTICIPANT The future participant of SIWES Programme, I strongly recommend that they should bear the following in mind:  The student should be focus to avoid disputing the reputation of the institution in their place of industrial attachment and they should also bear in mind the objective of the scheme and show commitment, diligent and honesty.  The students should obey and adhere strictly to all rules and regulations of the company; they should respect the industrial based supervisors as well as other staff of the company because the moral standard of the student is also evaluated.
  • 44. 44  The student should avoid change of placement without seeking permission from the institution even in special circumstance which must always be determine and approved by their institutional based supervisor, the employer and the industrialtrainingfund.  The student should handle the equipment of the firm with great care and they should take pride in protecting the interest of the company throughout theperiod of industrialattachment. 4.3 ADVICE FOR THE SIWES MANAGER  The SIWES Manager should give attention to student welfare on industrial training and the student allowance should be increase as a result of high cost of standard ofliving in our society.  Technologists from various departments or programs should be involved in the drafting of time table for students on IT to ensure that students are always sent into areas where activities that will result in learning experienceare taking place. 4.4 CONCLUSION In conclusion, there were many things that I experienced and learnt during the six month of my Industrial Training at LostCodes Technology. As a student majoring in computer science I was very much involve in computer related work and task, most of my training time were focused on computer system repairs, maintenance and installation as well as basic computer networking. The whole training period was very interesting, instructive and challenging. Through this training I was able to gain new insights and more comprehensive understanding about the real industry working condition and practice because it has afforded me the basic practical and theoretical knowledge that I would not have gotten from the lecture room going by my experience in the past three years in the institution. It also gave me the opportunity to have a feel of what it
  • 45. 45 would be like after graduation when I start working. Going by the experience acquired during this programme, SIWES can be said to be the best way to prepare students to face the real working life after graduation. I also have been able to use this training to explore various avenues available at my disposal career-wiseespeciallyin preparing for CompTIA A+ certificateexamination. 4.5 RECOMMENDATION Although SIWES undergone did achieve quite a lot of its stated objectives, nevertheless, the following recommendations are suggested to improve the qualitativecontext ofthe programme: i. Participation of private corporate organization to minimize the problem of low funding as recently complained by the director of ITF and payment of befitting student allowance to assist in students finances during the period of training should be done on monthlybasisand promptly. ii. Participation of various professional, regulatory and statutory bodies such as CPN, NCS in the supervisionof students. iii. Sending students specifically to establishment where the stipulated aims and objectivesof SIWES would be achieved. REFERENCES:  David B, David G, & Jim M, 2004, Cabling: complete guide to network wiring, 3rd Edition, SYBEX, London.  Jeans Andrews, 2004, A+ Guide to managing & maintaining your PC, 5th Edition.  IT Essentials: PC Hardware & Software Companion Guide. (pg 103 - 112).  Fundamentals of programming using Java by Edward Currie (2006).