SlideShare a Scribd company logo
1 of 13
TECHNICAL REPORT
ON
STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME(SIWES)
CARRIED OUT AT INDUSTRIAL TRAINING FUND(ITF) MAITAMA, ABUJA
MODEL AND SKILLS TRAINING CENTRE, ABUJA
BY
MADU, STANLEY IZUCHUKWU
MATRIC NO:UR201401016
SUBMITTED TO
DEPARTMENT OF COMPUTER SCIENCE
FACULTY OF PURE AND APPLIED SCIENCES
FEDERAL UNIVERSITY WUKARI
TARABA STATE.
FROM MAY TO OCTOBER, 2017
SUPERVISED BY: DR. K.A AROWORA
INSERT LOGO
INDUSTRIAL TRAINING FUND: Overview
Industrial Training Fund is an Organization made
up 10 Departments and 4 Units. This make it
function smoothly without any hitches. The
Departments and Units, Heads and other Staff
are able, competed and loyal to the cause of the
Fund.
Established in 1971, the Industrial Training Fund
has operated consistently and painstakingly within
the context of its enabling laws decree 47 to 1971
as amended in the 2011 ITF ACT. The objective for
which the fund was established has been pursued
vigorously and efficaciously. In the four decades of
its existence, the ITF has raised training
consciousness in the economy and development of
individuals.
The Industrial Training Fund (ITF) is an
organization with a mission “To set and regulate
training standards and offer direct training
intervention in industries and commercial skills
training and development using a corps of highly
competent and professional staff, modern
techniques and technology.”
MSTC: Overview
Amongst The objectives for establishing the
Model Skills Training Centre, Abuja are to:
Produce much needed Technicians for the
nation's economy.
Create opportunities for young School leavers
Model Skills Training Centre is an ITF initiative to
generate income under the Field Services dept. so
as to fulfil its main mission (To set and regulate
standards and offer direct training intervention in
industrial and commercial skills training and
development, using a corps of highly competent
professional staff, modern techniques and
technology.) as a source of revenue to the
organisation.
The Model Skills Training Centre (MSTC), Abuja
was established as a Post-Secondary Technical
Institution on 25th August, 2009. It was
commissioned on 7th October, 2011 by His
Excellency, Dr. Goodluck Ebele Jonathan GCFR,
President and Commander-In-Chief, Federal
Republic of Nigeria.
Activities & Skills Gained During
Industrial Training
COMPUTER HARDWARE/PREVENTIVE MAINTENANCE
Defragmentation should be performed at least
once a month. When a computer writes data to
a hard disk it tries to write the file in one
contiguous block. If the disk is over about 70
percent filled, the operating system will have to
break the file into segments and scatter them
across the disk. Disk defragmentation tools
reconnect fragmented files and compress all
files together on the disk,. This makes writing to
the disk faster for the operating system
Software should be updated on a regular schedule,
such as once a week, in order to install the latest
security updates and the most bug-free version.
Most software update utilities have a scheduling
system that can be configured to download and
install updates, and restart if necessary, during off
hours. This can help minimize user downtime while
keeping software up to date and secure.
Most computers begin to slow down after a
while, there are a few simple maintenance
activities that can keep a computer running at
peak performance for a long time. A computer
represents a sizable expenditure for most
businesses, and taking care of such an
investment does not have to be an unwelcome
chore.
Occasionally a disk will develop a bad spot on
its surface, and read-write errors will begin to
occur. Disk surface scanning utilities are able to
locate bad or suspect spots on a disk, relocate
the data to a safe spot, and mark the bad spot
as unusable. Surface scans should be run on a
monthly basis to avoid data loss.
COMPUTER HARDWARE/PREVENTIVE MAINTENANCE
Utilizing privacy software and anti-virus ensures
the privacy of you and your information on your
computer. Good privacy and anti-virus software
also cleans up your computer, prevents
unauthorized installation of software (spyware,
adware, malware), causes less programs to
access the internet – and as a result speeds up
your internet connection. Keeping your anti-
virus software up-to-date should be a critical
part of any computer maintenance plan.
Operating-system files such as the Windows
registry may require maintenance. A utility such as
a registry cleaner may be used for this. Also inbuilt
Disk defragmenter will also help.
Computers generate heat and internal fans pull
in cooler air to keep the internal components
from overheating. Along with the cool air the
fans also pull in dust, which is computers’ other
worst enemy. The makeup of the silicon
computer chips attracts the dust. A computer
should be opened and blown out with canned
air periodically based on the cleanliness of the
environment.
Occasionally a disk will develop a bad spot on
its surface, and read-write errors will begin to
occur. Disk surface scanning utilities are able to
locate bad or suspect spots on a disk, relocate
the data to a safe spot, and mark the bad spot
as unusable. Surface scans should be run on a
monthly basis to avoid data loss.
COMPUTER HARDWARE/PREVENTIVE MAINTENANCE
The following includes the types of security
threats:
Malware, Phishing, Spam, TCP/IP attacks, Zero-
Day attacks and Social Engineering.
A technician is responsible for the security of
data and computer equipment in an
organization. To successfully protect computers
and the network, a technician must understand
both types of threats, Physical - Events or
attacks that steal, damage, or destroy
equipment, such as servers, switches, and
wiring
Data - Events or attacks that remove, corrupt,
deny access to authorized users, allow access to
unauthorized users, or steal information.
The system administrator usually defines a
naming convention for usernames when
creating network logins. Also there are three
levels of password protection recommended;
BIOS, Login and Network.
COMPUTER HARDWARE/PREVENTIVE MAINTENANCE
Virtualization also has advantages for small
office/home office (SOHO) users, because it
can provide access to programs that are not
available on a specific OS.
COMPUTER HARDWARE/PREVENTIVE MAINTENANCE
OS problems can result from a combination of
hardware, software, and network issues.
Computer technicians must be able to analyze
the problem and determine the cause of the
error to repair the computer. This process is
called troubleshooting. Below is amongst the
troubleshooting process:
Other troubleshooting process includes:
• Establishing a plan of action to resolve the
problem
• Verifying full system functionality
• Document Findings.
THE IT PROFESSIONAL
The laws in different countries and legal
jurisdictions vary, but generally actions such as
the following are considered to be illegal:
• It is not permissible to make a customer’s IT
resources available to unauthorized users.
• It is not permissible to use a customer’s
company IT resources for commercial
purposes.
Ethical considerations in the field of IT include
having respect for your customers as well as there
properties which include:
• Emails
• Phone Lists
• Records or Data on the computer
As an IT professional, you will troubleshoot and
fix computers, and you will frequently
communicate with customers and co-workers. In
fact, troubleshooting is as much about
communicating with the customer as it is about
knowing how to fix a computer. Also it’s
expected of you to use good communication
skills as confidently as you use a screw driver.
Data from computer systems, networks,
wireless communications, and storage devices
may need to be collected and analyzed in the
course of a criminal investigation. The
collection and analysis of data for this purpose
is called computer forensics. Illegal Computer
or Network Usage may include: Identity Theft,
Pornography, Using a computer to sell
counterfeit goods.
RECOMMENDATION
To Industrial Training Fund: ITF should
do more concerning the welfare of
students on industrial training. Money
motivates people more.
To the University: The school should
see that supervisor’s are strict with
students with whom they are attached.
To the Students: Students coordination
should reflect that worthy of excellence
in search for knowledge. We are great
crocs, not by words but rather by
actions.
THANK
YOU FOR
Visit: https//:
to see a copy of this including the
detailed Report
LISTENING

More Related Content

What's hot

A PRESENTATION ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME
A PRESENTATION ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEMEA PRESENTATION ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME
A PRESENTATION ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEMEIbrahim Yusuf Salihu
 
Siwes report original
Siwes report originalSiwes report original
Siwes report originalBrightnyt Pun
 
SIWES Industrial Training report (NIGERIA)
SIWES Industrial Training report (NIGERIA)SIWES Industrial Training report (NIGERIA)
SIWES Industrial Training report (NIGERIA)Stephen Ahiante
 
Student Industrial Workshop Experience Scheme (SIWES) Report
Student Industrial Workshop Experience Scheme (SIWES) ReportStudent Industrial Workshop Experience Scheme (SIWES) Report
Student Industrial Workshop Experience Scheme (SIWES) ReportOkpehHarrison
 
SIWES TECHNICAL REPORT BY OLADEJI ADEOLA
SIWES TECHNICAL REPORT BY OLADEJI ADEOLASIWES TECHNICAL REPORT BY OLADEJI ADEOLA
SIWES TECHNICAL REPORT BY OLADEJI ADEOLAG_ade
 
Computer Basics - A SIWES Report.
Computer Basics - A SIWES Report.Computer Basics - A SIWES Report.
Computer Basics - A SIWES Report.Abah Joseph Israel
 
Ajayi samson aduragbemi siwes report
Ajayi samson aduragbemi siwes reportAjayi samson aduragbemi siwes report
Ajayi samson aduragbemi siwes reportSamsonAjayi4
 
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNSIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNEjiro Ndifereke
 
Abolarin james siwes powerpoint
Abolarin james  siwes powerpointAbolarin james  siwes powerpoint
Abolarin james siwes powerpointjabolarin
 
Siwes Report by odubiyi kazeem akionola (ENGKEEN),electrical enginieering,YAB...
Siwes Report by odubiyi kazeem akionola (ENGKEEN),electrical enginieering,YAB...Siwes Report by odubiyi kazeem akionola (ENGKEEN),electrical enginieering,YAB...
Siwes Report by odubiyi kazeem akionola (ENGKEEN),electrical enginieering,YAB...ENG KEEN
 
Report slides SIWES ABIOYE MAYOWA JOHNSON
Report slides SIWES ABIOYE MAYOWA JOHNSON Report slides SIWES ABIOYE MAYOWA JOHNSON
Report slides SIWES ABIOYE MAYOWA JOHNSON Abioye Hephzibah
 
SIWES I.T REPORT ON WEB DESIGN
SIWES I.T REPORT ON WEB DESIGNSIWES I.T REPORT ON WEB DESIGN
SIWES I.T REPORT ON WEB DESIGNEjiro Ndifereke
 

What's hot (20)

MY SIWES REPORT
MY SIWES REPORTMY SIWES REPORT
MY SIWES REPORT
 
A PRESENTATION ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME
A PRESENTATION ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEMEA PRESENTATION ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME
A PRESENTATION ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME
 
Siwes report original
Siwes report originalSiwes report original
Siwes report original
 
SIWES Industrial Training report (NIGERIA)
SIWES Industrial Training report (NIGERIA)SIWES Industrial Training report (NIGERIA)
SIWES Industrial Training report (NIGERIA)
 
SIWES Presentation
SIWES PresentationSIWES Presentation
SIWES Presentation
 
Student Industrial Workshop Experience Scheme (SIWES) Report
Student Industrial Workshop Experience Scheme (SIWES) ReportStudent Industrial Workshop Experience Scheme (SIWES) Report
Student Industrial Workshop Experience Scheme (SIWES) Report
 
SIWES TECHNICAL REPORT BY OLADEJI ADEOLA
SIWES TECHNICAL REPORT BY OLADEJI ADEOLASIWES TECHNICAL REPORT BY OLADEJI ADEOLA
SIWES TECHNICAL REPORT BY OLADEJI ADEOLA
 
Richard siwes presentation
Richard siwes presentationRichard siwes presentation
Richard siwes presentation
 
It report
It reportIt report
It report
 
Computer Basics - A SIWES Report.
Computer Basics - A SIWES Report.Computer Basics - A SIWES Report.
Computer Basics - A SIWES Report.
 
KOHequity SIWES report
KOHequity SIWES reportKOHequity SIWES report
KOHequity SIWES report
 
Technical Report
Technical ReportTechnical Report
Technical Report
 
Ajayi samson aduragbemi siwes report
Ajayi samson aduragbemi siwes reportAjayi samson aduragbemi siwes report
Ajayi samson aduragbemi siwes report
 
Siwes it report
Siwes it reportSiwes it report
Siwes it report
 
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNSIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
 
SIWES PPT
SIWES PPTSIWES PPT
SIWES PPT
 
Abolarin james siwes powerpoint
Abolarin james  siwes powerpointAbolarin james  siwes powerpoint
Abolarin james siwes powerpoint
 
Siwes Report by odubiyi kazeem akionola (ENGKEEN),electrical enginieering,YAB...
Siwes Report by odubiyi kazeem akionola (ENGKEEN),electrical enginieering,YAB...Siwes Report by odubiyi kazeem akionola (ENGKEEN),electrical enginieering,YAB...
Siwes Report by odubiyi kazeem akionola (ENGKEEN),electrical enginieering,YAB...
 
Report slides SIWES ABIOYE MAYOWA JOHNSON
Report slides SIWES ABIOYE MAYOWA JOHNSON Report slides SIWES ABIOYE MAYOWA JOHNSON
Report slides SIWES ABIOYE MAYOWA JOHNSON
 
SIWES I.T REPORT ON WEB DESIGN
SIWES I.T REPORT ON WEB DESIGNSIWES I.T REPORT ON WEB DESIGN
SIWES I.T REPORT ON WEB DESIGN
 

Similar to Siwes Pesentation

Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Ajay Jassi
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint securityhassan latifi
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET Journal
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A SurveyIRJET Journal
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityMeg Weber
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjripublishers Ijri
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15Eric
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxbartholomeocoombs
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxannette228280
 
Module 1 / Unit 5 Digital Cybersecurity
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity SMKCreations
 
Aging Services Expo Presentation
Aging Services Expo PresentationAging Services Expo Presentation
Aging Services Expo PresentationMary Derrick Cook
 
IET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India
 

Similar to Siwes Pesentation (20)

css 1.pptx
css 1.pptxcss 1.pptx
css 1.pptx
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
NCSC_SBG_Actions.pdf
NCSC_SBG_Actions.pdfNCSC_SBG_Actions.pdf
NCSC_SBG_Actions.pdf
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint security
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individuality
 
Mis
MisMis
Mis
 
Wilbert M David
Wilbert M  DavidWilbert M  David
Wilbert M David
 
Policy for PDO
Policy for PDOPolicy for PDO
Policy for PDO
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
 
Module 1 / Unit 5 Digital Cybersecurity
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity
 
Aging Services Expo Presentation
Aging Services Expo PresentationAging Services Expo Presentation
Aging Services Expo Presentation
 
IET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote working
 
ICT Awareness Programme
ICT Awareness ProgrammeICT Awareness Programme
ICT Awareness Programme
 

Recently uploaded

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Siwes Pesentation

  • 1.
  • 2. TECHNICAL REPORT ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME(SIWES) CARRIED OUT AT INDUSTRIAL TRAINING FUND(ITF) MAITAMA, ABUJA MODEL AND SKILLS TRAINING CENTRE, ABUJA BY MADU, STANLEY IZUCHUKWU MATRIC NO:UR201401016 SUBMITTED TO DEPARTMENT OF COMPUTER SCIENCE FACULTY OF PURE AND APPLIED SCIENCES FEDERAL UNIVERSITY WUKARI TARABA STATE. FROM MAY TO OCTOBER, 2017 SUPERVISED BY: DR. K.A AROWORA INSERT LOGO
  • 3. INDUSTRIAL TRAINING FUND: Overview Industrial Training Fund is an Organization made up 10 Departments and 4 Units. This make it function smoothly without any hitches. The Departments and Units, Heads and other Staff are able, competed and loyal to the cause of the Fund. Established in 1971, the Industrial Training Fund has operated consistently and painstakingly within the context of its enabling laws decree 47 to 1971 as amended in the 2011 ITF ACT. The objective for which the fund was established has been pursued vigorously and efficaciously. In the four decades of its existence, the ITF has raised training consciousness in the economy and development of individuals. The Industrial Training Fund (ITF) is an organization with a mission “To set and regulate training standards and offer direct training intervention in industries and commercial skills training and development using a corps of highly competent and professional staff, modern techniques and technology.”
  • 4. MSTC: Overview Amongst The objectives for establishing the Model Skills Training Centre, Abuja are to: Produce much needed Technicians for the nation's economy. Create opportunities for young School leavers Model Skills Training Centre is an ITF initiative to generate income under the Field Services dept. so as to fulfil its main mission (To set and regulate standards and offer direct training intervention in industrial and commercial skills training and development, using a corps of highly competent professional staff, modern techniques and technology.) as a source of revenue to the organisation. The Model Skills Training Centre (MSTC), Abuja was established as a Post-Secondary Technical Institution on 25th August, 2009. It was commissioned on 7th October, 2011 by His Excellency, Dr. Goodluck Ebele Jonathan GCFR, President and Commander-In-Chief, Federal Republic of Nigeria.
  • 5. Activities & Skills Gained During Industrial Training
  • 6. COMPUTER HARDWARE/PREVENTIVE MAINTENANCE Defragmentation should be performed at least once a month. When a computer writes data to a hard disk it tries to write the file in one contiguous block. If the disk is over about 70 percent filled, the operating system will have to break the file into segments and scatter them across the disk. Disk defragmentation tools reconnect fragmented files and compress all files together on the disk,. This makes writing to the disk faster for the operating system Software should be updated on a regular schedule, such as once a week, in order to install the latest security updates and the most bug-free version. Most software update utilities have a scheduling system that can be configured to download and install updates, and restart if necessary, during off hours. This can help minimize user downtime while keeping software up to date and secure. Most computers begin to slow down after a while, there are a few simple maintenance activities that can keep a computer running at peak performance for a long time. A computer represents a sizable expenditure for most businesses, and taking care of such an investment does not have to be an unwelcome chore. Occasionally a disk will develop a bad spot on its surface, and read-write errors will begin to occur. Disk surface scanning utilities are able to locate bad or suspect spots on a disk, relocate the data to a safe spot, and mark the bad spot as unusable. Surface scans should be run on a monthly basis to avoid data loss.
  • 7. COMPUTER HARDWARE/PREVENTIVE MAINTENANCE Utilizing privacy software and anti-virus ensures the privacy of you and your information on your computer. Good privacy and anti-virus software also cleans up your computer, prevents unauthorized installation of software (spyware, adware, malware), causes less programs to access the internet – and as a result speeds up your internet connection. Keeping your anti- virus software up-to-date should be a critical part of any computer maintenance plan. Operating-system files such as the Windows registry may require maintenance. A utility such as a registry cleaner may be used for this. Also inbuilt Disk defragmenter will also help. Computers generate heat and internal fans pull in cooler air to keep the internal components from overheating. Along with the cool air the fans also pull in dust, which is computers’ other worst enemy. The makeup of the silicon computer chips attracts the dust. A computer should be opened and blown out with canned air periodically based on the cleanliness of the environment. Occasionally a disk will develop a bad spot on its surface, and read-write errors will begin to occur. Disk surface scanning utilities are able to locate bad or suspect spots on a disk, relocate the data to a safe spot, and mark the bad spot as unusable. Surface scans should be run on a monthly basis to avoid data loss.
  • 8. COMPUTER HARDWARE/PREVENTIVE MAINTENANCE The following includes the types of security threats: Malware, Phishing, Spam, TCP/IP attacks, Zero- Day attacks and Social Engineering. A technician is responsible for the security of data and computer equipment in an organization. To successfully protect computers and the network, a technician must understand both types of threats, Physical - Events or attacks that steal, damage, or destroy equipment, such as servers, switches, and wiring Data - Events or attacks that remove, corrupt, deny access to authorized users, allow access to unauthorized users, or steal information. The system administrator usually defines a naming convention for usernames when creating network logins. Also there are three levels of password protection recommended; BIOS, Login and Network.
  • 9. COMPUTER HARDWARE/PREVENTIVE MAINTENANCE Virtualization also has advantages for small office/home office (SOHO) users, because it can provide access to programs that are not available on a specific OS.
  • 10. COMPUTER HARDWARE/PREVENTIVE MAINTENANCE OS problems can result from a combination of hardware, software, and network issues. Computer technicians must be able to analyze the problem and determine the cause of the error to repair the computer. This process is called troubleshooting. Below is amongst the troubleshooting process: Other troubleshooting process includes: • Establishing a plan of action to resolve the problem • Verifying full system functionality • Document Findings.
  • 11. THE IT PROFESSIONAL The laws in different countries and legal jurisdictions vary, but generally actions such as the following are considered to be illegal: • It is not permissible to make a customer’s IT resources available to unauthorized users. • It is not permissible to use a customer’s company IT resources for commercial purposes. Ethical considerations in the field of IT include having respect for your customers as well as there properties which include: • Emails • Phone Lists • Records or Data on the computer As an IT professional, you will troubleshoot and fix computers, and you will frequently communicate with customers and co-workers. In fact, troubleshooting is as much about communicating with the customer as it is about knowing how to fix a computer. Also it’s expected of you to use good communication skills as confidently as you use a screw driver. Data from computer systems, networks, wireless communications, and storage devices may need to be collected and analyzed in the course of a criminal investigation. The collection and analysis of data for this purpose is called computer forensics. Illegal Computer or Network Usage may include: Identity Theft, Pornography, Using a computer to sell counterfeit goods.
  • 12. RECOMMENDATION To Industrial Training Fund: ITF should do more concerning the welfare of students on industrial training. Money motivates people more. To the University: The school should see that supervisor’s are strict with students with whom they are attached. To the Students: Students coordination should reflect that worthy of excellence in search for knowledge. We are great crocs, not by words but rather by actions.
  • 13. THANK YOU FOR Visit: https//: to see a copy of this including the detailed Report LISTENING