Streamlining Python Development: A Guide to a Modern Project Setup
Siwes Pesentation
1.
2. TECHNICAL REPORT
ON
STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME(SIWES)
CARRIED OUT AT INDUSTRIAL TRAINING FUND(ITF) MAITAMA, ABUJA
MODEL AND SKILLS TRAINING CENTRE, ABUJA
BY
MADU, STANLEY IZUCHUKWU
MATRIC NO:UR201401016
SUBMITTED TO
DEPARTMENT OF COMPUTER SCIENCE
FACULTY OF PURE AND APPLIED SCIENCES
FEDERAL UNIVERSITY WUKARI
TARABA STATE.
FROM MAY TO OCTOBER, 2017
SUPERVISED BY: DR. K.A AROWORA
INSERT LOGO
3. INDUSTRIAL TRAINING FUND: Overview
Industrial Training Fund is an Organization made
up 10 Departments and 4 Units. This make it
function smoothly without any hitches. The
Departments and Units, Heads and other Staff
are able, competed and loyal to the cause of the
Fund.
Established in 1971, the Industrial Training Fund
has operated consistently and painstakingly within
the context of its enabling laws decree 47 to 1971
as amended in the 2011 ITF ACT. The objective for
which the fund was established has been pursued
vigorously and efficaciously. In the four decades of
its existence, the ITF has raised training
consciousness in the economy and development of
individuals.
The Industrial Training Fund (ITF) is an
organization with a mission “To set and regulate
training standards and offer direct training
intervention in industries and commercial skills
training and development using a corps of highly
competent and professional staff, modern
techniques and technology.”
4. MSTC: Overview
Amongst The objectives for establishing the
Model Skills Training Centre, Abuja are to:
Produce much needed Technicians for the
nation's economy.
Create opportunities for young School leavers
Model Skills Training Centre is an ITF initiative to
generate income under the Field Services dept. so
as to fulfil its main mission (To set and regulate
standards and offer direct training intervention in
industrial and commercial skills training and
development, using a corps of highly competent
professional staff, modern techniques and
technology.) as a source of revenue to the
organisation.
The Model Skills Training Centre (MSTC), Abuja
was established as a Post-Secondary Technical
Institution on 25th August, 2009. It was
commissioned on 7th October, 2011 by His
Excellency, Dr. Goodluck Ebele Jonathan GCFR,
President and Commander-In-Chief, Federal
Republic of Nigeria.
6. COMPUTER HARDWARE/PREVENTIVE MAINTENANCE
Defragmentation should be performed at least
once a month. When a computer writes data to
a hard disk it tries to write the file in one
contiguous block. If the disk is over about 70
percent filled, the operating system will have to
break the file into segments and scatter them
across the disk. Disk defragmentation tools
reconnect fragmented files and compress all
files together on the disk,. This makes writing to
the disk faster for the operating system
Software should be updated on a regular schedule,
such as once a week, in order to install the latest
security updates and the most bug-free version.
Most software update utilities have a scheduling
system that can be configured to download and
install updates, and restart if necessary, during off
hours. This can help minimize user downtime while
keeping software up to date and secure.
Most computers begin to slow down after a
while, there are a few simple maintenance
activities that can keep a computer running at
peak performance for a long time. A computer
represents a sizable expenditure for most
businesses, and taking care of such an
investment does not have to be an unwelcome
chore.
Occasionally a disk will develop a bad spot on
its surface, and read-write errors will begin to
occur. Disk surface scanning utilities are able to
locate bad or suspect spots on a disk, relocate
the data to a safe spot, and mark the bad spot
as unusable. Surface scans should be run on a
monthly basis to avoid data loss.
7. COMPUTER HARDWARE/PREVENTIVE MAINTENANCE
Utilizing privacy software and anti-virus ensures
the privacy of you and your information on your
computer. Good privacy and anti-virus software
also cleans up your computer, prevents
unauthorized installation of software (spyware,
adware, malware), causes less programs to
access the internet – and as a result speeds up
your internet connection. Keeping your anti-
virus software up-to-date should be a critical
part of any computer maintenance plan.
Operating-system files such as the Windows
registry may require maintenance. A utility such as
a registry cleaner may be used for this. Also inbuilt
Disk defragmenter will also help.
Computers generate heat and internal fans pull
in cooler air to keep the internal components
from overheating. Along with the cool air the
fans also pull in dust, which is computers’ other
worst enemy. The makeup of the silicon
computer chips attracts the dust. A computer
should be opened and blown out with canned
air periodically based on the cleanliness of the
environment.
Occasionally a disk will develop a bad spot on
its surface, and read-write errors will begin to
occur. Disk surface scanning utilities are able to
locate bad or suspect spots on a disk, relocate
the data to a safe spot, and mark the bad spot
as unusable. Surface scans should be run on a
monthly basis to avoid data loss.
8. COMPUTER HARDWARE/PREVENTIVE MAINTENANCE
The following includes the types of security
threats:
Malware, Phishing, Spam, TCP/IP attacks, Zero-
Day attacks and Social Engineering.
A technician is responsible for the security of
data and computer equipment in an
organization. To successfully protect computers
and the network, a technician must understand
both types of threats, Physical - Events or
attacks that steal, damage, or destroy
equipment, such as servers, switches, and
wiring
Data - Events or attacks that remove, corrupt,
deny access to authorized users, allow access to
unauthorized users, or steal information.
The system administrator usually defines a
naming convention for usernames when
creating network logins. Also there are three
levels of password protection recommended;
BIOS, Login and Network.
10. COMPUTER HARDWARE/PREVENTIVE MAINTENANCE
OS problems can result from a combination of
hardware, software, and network issues.
Computer technicians must be able to analyze
the problem and determine the cause of the
error to repair the computer. This process is
called troubleshooting. Below is amongst the
troubleshooting process:
Other troubleshooting process includes:
• Establishing a plan of action to resolve the
problem
• Verifying full system functionality
• Document Findings.
11. THE IT PROFESSIONAL
The laws in different countries and legal
jurisdictions vary, but generally actions such as
the following are considered to be illegal:
• It is not permissible to make a customer’s IT
resources available to unauthorized users.
• It is not permissible to use a customer’s
company IT resources for commercial
purposes.
Ethical considerations in the field of IT include
having respect for your customers as well as there
properties which include:
• Emails
• Phone Lists
• Records or Data on the computer
As an IT professional, you will troubleshoot and
fix computers, and you will frequently
communicate with customers and co-workers. In
fact, troubleshooting is as much about
communicating with the customer as it is about
knowing how to fix a computer. Also it’s
expected of you to use good communication
skills as confidently as you use a screw driver.
Data from computer systems, networks,
wireless communications, and storage devices
may need to be collected and analyzed in the
course of a criminal investigation. The
collection and analysis of data for this purpose
is called computer forensics. Illegal Computer
or Network Usage may include: Identity Theft,
Pornography, Using a computer to sell
counterfeit goods.
12. RECOMMENDATION
To Industrial Training Fund: ITF should
do more concerning the welfare of
students on industrial training. Money
motivates people more.
To the University: The school should
see that supervisor’s are strict with
students with whom they are attached.
To the Students: Students coordination
should reflect that worthy of excellence
in search for knowledge. We are great
crocs, not by words but rather by
actions.