Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Kaahwa armstrong intern report

283 views

Published on

computer science internship

Published in: Education
  • Be the first to comment

  • Be the first to like this

Kaahwa armstrong intern report

  1. 1. i MAKERERE UNIVERSITY COLLEGE OF COMPUTING AND INFORMATION SCIENCES SCHOOL OF COMPUTING AND INFORMATICS TECHNOLOGY A REPORT ON FIELD ATTACHMENT /INTERNSHIP AT Uganda Broadcasting Corporation Field attachment period (June 6th -August 1st ,2016) BY KAAHWA ARMSTRONG 14/U/288 Field attachment Report submitted to the School of computing and informatics Technology In Partial fulfilment of the requirements for the degree of Computer Science of Makerere University Kampala Name of student: KAAHWA ARMSTRONG Signature: ______________________________________ Date: _________________________ Name of Academic Supervisor: Mr. KIZITO JOHN Signature: ______________________________________ Date: _________________________ Name of Field Supervisor: ONGIIMA PATRICK Signature: _______________________________stamp & Date: _________________________
  2. 2. ii DECLARATION I KAAHWA ARMSTRONG hereby declare that the information in this report is my own original gathered authentic work. It also makes practical and effective fulfilment of the purposes and objectives of this field attachment, and the content of the document has never been previously submitted to any other university or institution for a higher degree or any other award. Except for Citations, Quotations and References to other people’s work used where otherwise acknowledged. Signature……………………………………. Date……………………
  3. 3. iii ACKNOWLEDGEMENT First and foremost, I would like to acknowledge the Almighty God for the successful completion of the Field Attachment period. I would like to say thanks to Uganda broadcasting corporation for the opportunity given to me as an intern in the Information technology section. Special thanks go to my academic supervisor Mr. Kizito John, internship coordinator Mr. Michael Kizito of College of computing and information sciences Makerere University. Many thanks to my field supervisors Mr. Ogiima Patrick and Mr. Tusiime Lucas for their personal efforts, practical skills, professional guidance and direction towards successful internship. Finally, I would like to extend my heartfelt gratitude to my family members especially my mother BIRUNGI MAGRET for all the support, classmates and other friends for their invaluable support throughout my training.
  4. 4. iv ABSTRACT I carried out my internship at Uganda Broadcasting corporation under the information Technology department. Under networking, I dealt with setting up, administering, maintaining and upgrading communication systems, and also local area networks and wide area networks for the organization. The activities carried out included cable termination, over view of network topologies, setting up LANs, router configuration, printer configuration on networks, basic networking software installation (Cisco IOS). Under Web development, the field supervisor overviewed basic understanding of web technologies (client side, server side and databases) using WordPress, database management using MySQL. Under computer maintance and repair, I dealt with basic hardware installation (RAM, HARDDISK, CD-ROM), basic operating system installation and activation i.e. windows xp,7,8,10, system restoration, file recovery, data backup, Wi-Fi hotspot creation, installation of Windows Server 2008 R2. Through work and experiences, I attained networking, trouble shooting, team work, leadership skills, interpersonal and research skills. The challenges faced include: lack of enough equipment, faulty equipment i.e. CD ROMs, RAM, and crimping tool, poor internet connection, failure in troubleshooting for Windows service failures, understanding new technical terms. In my conclusion internship at UBC was so productive with practical hand on skills attained from the different field supervisors. I recommend that We as students need to be taught much more of practical skills in class than theory and be given more time for practice.
  5. 5. v TABLES OF CONTENTS DECLARATION............................................................................................................................ ii ACKNOWLEDGEMENT.............................................................................................................iii ABSTRACT................................................................................................................................... iv LIST OF TABLES.......................................................................................................................viii LIST OF ACRONYMS/ABBREVIATIONS................................................................................ ix 2.2.1. CHAPTER ONE INTRODUCTION ................................................................................ 1 1.1. introduction.............................................................................................................................. 1 1.2. Background of the field attachment......................................................................................... 1 1.3. Objectives of the field attachment ........................................................................................... 1 1.4. Background of the Organization of Field attachment.............................................................. 1 1.5. Organisational culture.............................................................................................................. 2 1.6. The structure of the organisation ............................................................................................. 3 1.7. The main activities of the organisation and ongoing IT projects............................................. 4 2.2.2. CHAPTER TWO STUDENT’S EXPERIENCES............................................................ 5 2.1. Title or position occupied in an organization .......................................................................... 5 2.2. Duties and responsibilities....................................................................................................... 5 2.3. Supervision levels and relationship with the supervisor........................................................ 21 2.4. Work team and its composition ............................................................................................. 21 2.4. Working relationship among the team members and staff .................................................... 22 3.0. CHAPTER THREE EVALUATION ON FIELD ATTACHMENT ................................. 23 3.1. Level of accomplishment of duties and responsibilities assigned ......................................... 23 3.2. New knowledge and skills gained in each of the duties and responsibilities ........................ 23 3.3. Most interesting experiences.................................................................................................. 24
  6. 6. vi 3.4. Relatedness of university’s taught programs to the field work.............................................. 25 3.5. Challenges faced and how managed...................................................................................... 25 3.6. Benefits derived from field attachment.................................................................................. 26 3.7. Adequacy in university’s preparing the student for field attachment.................................... 27 3.8. Preparedness of the agency to receive and manage students for field attachment ................ 27 3.9. Career Motivation.................................................................................................................. 27 4.0. CONCLUSIONS AND RECOMMENDATIONS ................................................................ 27 4.1. Conclusions............................................................................................................................ 27 4.2. RECOMMENDATIONS....................................................................................................... 28 References..................................................................................................................................... 29 Appendices.................................................................................................................................... 30
  7. 7. vii LIST OF FIGURES Figure 1.1: Organizational structure for Uganda Broadcasting corporation................................... 3 Figure 2.1: layers of the OSI model................................................................................................ 6 Figure 2.2: Illustration of common physical topologies ................................................................. 6 Figure 2.3: Network Structure for UBC Administration block ...................................................... 7 Figure 2.4: Illustration showing how to create a straight-through cable ........................................ 8 Figure 2.5: Illustration of the T-568B Straight-Through Ethernet Cable....................................... 8 Figure 2.6: Illustration of the T-568B Straight-Through Ethernet Cable....................................... 9 Cable termination for the different cable standards involves the following................................... 9 Figure 2.7: illustration showing finding ip and MAC addresses. ................................................. 10 Figure 2.8: shows screen shot of add printer wizard running...................................................... 11 Figure 2.9: shows screen shot of shared printer in the add printer wizard .................................. 11 Figure 2.10: Illustration of the DHCP lease process..................................................................... 13 Figure 2.11: shows the difference between DDR and DDR2....................................................... 14 Figure 2.12: shows IDE and SATA connector ............................................................................. 15 Figure 2.13: indicating screen shot of the select command in MySQL........................................ 16 Figure 2.14: Screenshot showing a table selected from products using php MyAdmin console . 16 Figure 2.15: shows activated windows......................................................................................... 18 Figure 2.16: showing how UBC’s domain controller with the clients ......................................... 20
  8. 8. viii LIST OF TABLES Table 2.1: tasks completed and supervisors in charge.................................................................... 5 Table 2.2: showing windows activation errors causes and solutions............................................ 19 Table 3.1: showing relevance of computer science curriculum to field attachment..................... 25
  9. 9. ix LIST OF ACRONYMS/ABBREVIATIONS. UBC Uganda broadcasting corporation IT information technology UTV Uganda television RAM Random Access Memory ROM Read Only Memory LAN Local Area network WAN Wireless Area Network WI-FI Wireless Fidelity SQL Structured Query Language CLI Command Line Interface DNS Domain Name System IP Internet Protocol ISPs Internet Service Providers IANA Internet Assigned Numbers Authority DHCP Dynamic Host Configuration Protocol APIPA Automatic Private IP Addressing NetBIOS Network Basic Input/output System TCP/IP Transmission Control Protocol/Internet Protocol AD DS Active Directory Domain Services. CMOS Complementary Metal Oxide Semiconductor WPA Windows Product Activation
  10. 10. 1 2.2.1. CHAPTER ONE INTRODUCTION 1.1. introduction This field attachment report is about the skills attained, lessons learnt, challenges, relatedness of theory covered in class and recommendations during my internship placement at Uganda Broadcasting corporation(UBC) from 1st June to 1st august 2016 see “appendix A”. The report also represents my experiences, recommendations and benefits of the field attachment. 1.2. Background of the field attachment Field attachment is a field-based practical training experience that prepares trainees for the tasks they are expected to perform on completion of their programs. The main intention is to produce practically oriented graduates that meet the required job-related competences of their future employers 1.3. Objectives of the field attachment  To enable students, get hands-on/real life experience they are expected to work in when they graduate.  To provide an opportunity for students to apply the principles and techniques theoretically learnt into real-life problem solving situations.  To provide an opportunity for students and academic staff to interact with the stakeholders and potential employers and thus appreciate field situations that will also generate information for curricula review and improvement.  To develop student understanding of work ethics, employment demands, responsibilities and opportunities.  To enhance and strengthen linkages between Makerere University and various stakeholders. 1.4. Background of the Organization of Field attachment. Uganda Broadcasting Corporation is the public broadcaster of Uganda. Formally Uganda Television and Radio Uganda (the current Uganda Broadcasting Corporation) was born in 1963 one year after Uganda’s independence. However, radio was born in Uganda in 1954 and TV came in nine years after that. Its main aim was to broadcast through both mediums to the whole country as the national broadcaster.
  11. 11. 2 After independence till the mid 1980’s Uganda was faced with a lot of economic hardships. As a result, Ugandan Government saw the need to restructure the former Uganda Television and Radio Uganda. As a result, Parliament passed the Uganda Broadcasting Corporation Act that established the Uganda Broadcasting Corporation in 2005. This transformed the former UTV and Radio Uganda into the now existent Uganda Broadcasting Corporation. The Corporation started its activities on 16th November, 2005. The Corporation is fully owned (100%) by the Government of Uganda and carries out its activities for and on behalf of the Government. It therefore requires government funding in order to sustain its operation. Vision Broadcasting quality programs for national development. Mission To inform, educate, guide and entertain the public through maintaining a suitable national coverage. Objectives  To develop the broadcasting bodies into a public national broadcasting centre of excellence, for the purpose of providing electronic media and consultancy services that educate and guide the public.  To achieve and sustain comprehensive national radio and television coverage.  To achieve and sustain a common carrier status. 1.5. Organisational culture 1.5.1. values In executing its mandate, UBC is committed to espouse the values of: Trustworthiness, Fairness, Equal opportunity, Ethical conduct, Integrity, Transparency and Professionalism. 1.5.2. Beliefs All workers must adhere to UBC principles. And must commit working hours to official duties
  12. 12. 3 1.6. The structure of the organisation Figure 1.1: Organizational structure for Uganda Broadcasting corporation FINANCE AND ADMINISTRATION BOARD OF DIRECTORS MANAGING DIRECTOR HEAD OF ENGINEERIN G TV MANAGER MARKETING & BUSUNESS DEVELOPMENT MANAGER RADIO MANAGERS HUMAN RESOURCE MANAGER PRESENTERS PRODUCERS PRESENTERS PRODUCERS SALES MANAGER SALES EXECUTIVE MARKETING OFFICERS PROCUREMEN T OFFICER MANAGEMEN T ACCOUNTS STORE’S OFFICER ACCOUNTI NG ASSISTANT CASHIE RS ADMINISTRATIVE OFFICER ASSISTANT ADMINISTRATOR CORPORATION SECRETARY HUMAN RESOURCE OFFICER IT DEPT
  13. 13. 4 1.7. The main activities of the organisation and ongoing IT projects  short wave (SW) transmission and Medium wave(MW) transmission.  Online radio and TV streaming.  Reconstruction of organisation website(www.ubc.ug).  Restructuring of the organisation networks(LAN).  Repair and maintaince of the organisation’s IT equipment i.e. computers and installation of the basic softwares used.
  14. 14. 5 2.2.2. CHAPTER TWO STUDENT’S EXPERIENCES 2.1. Title or position occupied in an organization For the two months of the field attachment, I occupied the position of a full time Intern with work schedule from Monday to Friday 9:00am to 4:00 pm at UBC as indicated in “Appendix A”. Additionally, I worked with other staff occupying other different positions at the company, thereby doing a wide range of roles. 2.2. Duties and responsibilities. The following are the main duties and responsibilities that I undertook during the field attachment at Uganda Broadcasting corporation. Activity Supervisor General Orientation Mr. Ongima Patrick Tour around UBC premises Review of OSI models and network topologies Mr. Tusiime Lucas Operating systems and other application software installation Cable termination Computer repair and maintenance Mr. Tusiime Lucas Database design Web development(websites) Mr. Ongima Patrick Ethernet and Cable termination Data Recovery Mr. Tusiime Lucas Research about Domain controller and active directory Installation and configuration of windows server 2008 R2 Mr. Ongima Patrick Table 2.1: tasks completed and supervisors in charge.  Overview of OSI models and network topologies.OSI reference model describes how information from a software application in one computer moves through a network medium to a software application in another computer. It is a conceptual
  15. 15. 6 model composed of seven layers, each specifying particular network functions. Figure 2.1: layers of the OSI model  Network topologies. A topology is a usually schematic description of the arrangement of a network, including its nodes and connecting lines defined either physically or logically. categories of physical topologies include: ring, mesh, tree, star, bus, Figure 2.2: Illustration of common physical topologies
  16. 16. 7 The UBC network topology in the administration block is a composition of different network topologies like star, bus, and tree Figure 1.3: Network Structure for UBC Administration block
  17. 17. 8  General review of Ethernet cables and Cable termination The TIA/EIA 568-A standard made in 1995, and then replaced by the TIA/EIA 568-B standard in 2002 and has continuously been updated. Both standards define the T-568A and T-568B pin-outs for using Unshielded Twisted Pair cable and RJ-45 connectors for Ethernet connectivity. The figures below show the different colour arrangements of the different cable standards Figure 2.4: Illustration showing how to create a straight-through cable Figure 2.5: Illustration of the T-568B Straight-Through Ethernet Cable RJ-45 Crossover Ethernet Cable This is used to connect two Ethernet devices directly with T-568A and T-568B at the other end without a hub or connecting hubs together
  18. 18. 9 Figure 2.6: Illustration of the T-568B Straight-Through Ethernet Cable Cable termination for the different cable standards involves the following First trimming and Stripping the Ethernet cable to about 1 and ½ inch, then untwist the pairs, arrange them to the required order either straight through or crossover, cut them to 1 inch with flat end, fix them firmly into the RJ 45 connector ensuring that the ends touch the face of the connector, fix them tight using a crimping tool, test them using a tester or using two end devices.  Finding ip and MAC addresses of a network card on a computer Due to the need for connecting computers to printers and other resources, ip addresses were always required. The steps involved include the following 1. Press the Windows Start key to open the Start screen 2. Type cmd and press Enter to launch the command prompt run it as an administrator then use a command ipconfig/all Note when looking for mac address check out for physical address and ip address it is ipv4 address as indicated in figure below
  19. 19. 10 Figure 2.7: illustration showing finding ip and MAC addresses.  Setting up a network printer One of the important things to note is that any network printer must have an IP address and a NIC and the steps include: Powering the computer and printer then configure their IP addresses. Go to printers and devices while in control panel, add a printer, then select the above printer from the available ones on the populated list, follow the instructions until you reach the add Standard TCP/IP printer port Wizard started and click Next to continue, a prompt to enter the printer name or IP address which by default becomes the port name will appear. Another prompt window to print a test page will be displayed then Select yes, and click next.
  20. 20. 11 Figure 2.8: shows screen shot of add printer wizard running Figure 2.9: shows screen shot of shared printer in the add printer wizard.
  21. 21. 12  router configuration The important precautions noted before configuration are: regardless of equipment brand or model identification of the router WAN port and router LAN port was necessary location of proper cables to connect the physical LAN and specifically for Cisco router configuration due to need for proper plugin in the correct cable to the router WAN, LAN, and CONSOLE ports. configuration the router software setup (iOS), configuration of the router to have the proper IP connection scheme such as DNS, IP subnets, etc. in order to make a proper LAN connection work. For Using the CLI (Command Line Interface) basic configuration on one of the machines, installation of the terminal simulator software (HyperTerminal program) was done. The other basic router configuring steps on a network(LAN) include the following.  Ensuring the router is working as expected, by setting several things were need be such as: setting the router to do ip routing and keeping the manufacturer's suggested settings.  Entering the interface configuration mode.  Typing in the interface IP address and subnet mask (configuring ip addresses).  Issuing "no shutdown" command to bring up the interface.  Exiting the interface configuration mode to global configuration mode.  In the global configuration mode, enter the default gateway.  Testing and Saving the configurations.  Overview of Addressing and Name Resolution This involved reviewing the types of ip address and their uses that is to say Public IP Addresses: Which are used for a computer to be visible on the Internet. The IANA assigns ranges of public IP addresses to ISPs. Authorized Private IP Addresses: These are never used on the global Internet but used by individuals who don’t access internet directly.
  22. 22. 13 Unauthorized Private IP Addresses: They are used when there is an absolute certainty that your network will never access the Internet.  Overview of the Types of IP Address Assignment Dynamic Host Configuration Protocol (DHCP), Automatic Private IP Addressing (APIPA), Static IP Addressing, Alternate IP Configuration. Since DHCP is the commest ip address assignment method this was handled widely including the DHCP lease process explained below DHCP Lease Process. The first time that a Windows client (with DHCP enabled) attempts to join a network, it automatically follows an initialization process to obtain a lease from a DHCP server. Figure 2.10: Illustration of the DHCP lease process.  TCP/IP Name Resolution In general, computer users prefer to use computer names instead of IP addresses thus need for ip name resolution thus need for name resolution. Domain Name System. This is used on the Internet to map friendly names to IP addresses, and vice versa. In Microsoft Windows 2000, Microsoft Windows Server™ 2003, and Microsoft Windows XP environments, DNS is the default name resolution method. NetBIOS over TCP/IP. This Provides name resolution and connection services for clients using Microsoft Windows 95, Microsoft Windows 98, and Microsoft Windows Millennium Edition operating systems, applications, and services.  Understanding, Identifying and Upgrading the RAM in a computer Ram is volatile type of memory that a computer uses to run its OS and starting applications RAM which originally was semiconductor chip individually plugged in motherboard but now as clip-in modules. The common different types of ram include: Fast Page Mode(fpm) ram, Extended Data
  23. 23. 14 Out (EDO RAM), Synchronous DRAM, Double Data Rate(DDR) RAM, DDR2 RAM DDR23 RAM. We focused on how to identify the basic and common types of ram (DDR1, DDR2 is PC2, DDR3 is PC3). DDR2 has more pins, and the notch is in a different place. In DDR, the notch should be close to the center, whereas ddr2 is further off-center and has higher pin density. Figure 2.11: shows the difference between DDR and DDR2  Computer cables and connectors Serial ATA(SATA) cables. These are computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives.
  24. 24. 15 IDE/ATA Connectors. The standard IDE/ATA hard disks and ATAPI devices use two different connectors. The first is the data connector, to which the IDE/ATA cable attaches. The second is the power connector, which comes from the power supply, and of course, provides power to the drive. Figure 2.12: shows IDE and SATA connector  Data base management using MySQL and php MyAdmin  Creating and Deleting Databases in MySQL When using show, create database commands, the Back-Quoted Identifiers, Unquoted names such as database name, table name and column name cannot contain blank and special characters unless enclosing them with a pair of back-quote, in the form of ‘name’ for each word.  Understanding Comments and Version Comments There are different types of MySQL comments that is to say multi-line comments (/* and */), end-of-line comments begins with #... and lastly the version comment /*!40100 ...... */  Setting the default database. The use command sets a particular or current database as the default database.  Creating and Deleting/dropping tables. The above commands can be used with the following commands "if exists" or "if not exists”.  inserting rows, querying the database using Comparison Operators modifying data deleting rows, Exporting Data from/to a Text File
  25. 25. 16  string pattern matching, producing summary reports and logical operators (and, or, not, xor, between, not between, is null, is not null, order by clause, limit clause), comparison operators and using the concat and aggregate functions (count, max, min, avg, sum) see “appendix B” for more illustration on the above mentioned commands Figure 2.13: indicating screen shot of the select command in MySQL Figure 2.14: Screenshot showing a table selected from products using php MyAdmin console
  26. 26. 17  Website development using WordPress These are some of the steps followed:  Finding a Domain Name and Host.  Ways of Installing WordPress 1. One-Click-installation from Websites like WordPress.org. 2. Manual install. 3. Set Up WordPress.  Choosing a Theme/Template for your site.  Log into your WordPress dashboard.  Create a Home Page, Add More Pages, Add Widgets  Adding pages to the menu, Adding and editing posts  For Comments and Posts install contact form plugin.  Installation of other required Plugins.  Operating system installation basically windows xp,7,8,8.1,10 I Installed Operating systems like windows7 x64 and x86, windows XP, Post installations like drivers, and application software was also done for programs like cool edit, driver pack solutions, Microsoft office professional. different ways I used while performing windows installation windows on a machine Method 1: Performed a clean installation of Windows In this method involves removing all data from the hard disk by repartitioning and reformatting your hard disk and reinstalling the operating system and programs to an empty (clean) hard disk. Method 2: Upgraded to other higher Windows I used this when upgrading to Windows 8.1 from Microsoft Windows 8 pro however this method requires steady internet. Method 3: Installed Windows to a new hard disk
  27. 27. 18 I used this method to install Windows XP to a new hard disk. I typically used the method when a new hard disk was installed on the computer. Method 4: Installed Windows to a new folder (parallel installation) I used this method in need of parallel installation to run two operating systems to install on one machine then used the same method to retrieve data from a damaged disk.  Performed Windows activation and its types Types of activation 1. Windows Product Activation. In this type the computer sends an installation ID number to Microsoft before Windows is verified and then activated 2. OEM Activation 3.0. This takes place at the factory where by DPK is installed on the motherboard BIOS during the manufacturing process. Windows will activate automatically the first time the computer is connected to the Internet.  Confirmation of windows activation Right click on my computer then go to computer properties. Figure 2.15: shows activated windows
  28. 28. 19  Troubleshooting Windows 8 activation errors Windows activation error Possible cause Possible solution Windows isn't activated  Invalid windows license  trial or evaluation version of Windows was installed Installing the latest version of windows Windows isn't activated There are files on your PC that are preventing activation buy and reinstall a new version of Windows Windows isn't activated computer is not connected to the Internet. connect to the Internet Windows isn't activated Windows is not preinstalled on the computer no product key is configured Enter a new product key Table 2.2: showing windows activation errors causes and solutions  Data Recovery We used Hirens software for the purpose of data recovery in instances of system crash and formatted hard disk. The steps involved include insertion the bootable disk and, choose the option for load mini XP. When the PC is on, run the HBCD and go to the menu, choose recover file, then follow the prompts depending on the problem. After the entire process, connect external storage then copy the recovered files.
  29. 29. 20  Research about Domain controller and active directory I carried out research on Microsoft’s domain controller and active directory, used in Networking. Domain controller. DC is a server that responds to security authentication requests within a Windows Server domain. Basically on Microsoft Windows or Windows NT network that is responsible for allowing host access to Windows domain resources. Active Directory Domain Services .AD DS stores directory data and manages communication between users and domains, including user logon processes, authentication, and directory searches. An Active Directory domain controller is a server that is running AD DS With a single network logon, administrators can manage directory data and organization throughout their network. Authorized network users can also use a single network logon to access resources anywhere in the network. Figure 2.16: showing how UBC’s domain controller with the clients  Installation and configuration of windows Server 2003 R2.  Boot up from install disk and choose the Enterprise version  Accept license terms and choose the Custom  choose Drive options and complete installation
  30. 30. 21  prompt window to change password before logging in appears.  The Initial Configuration Tasks window pops up after logging in 2.3. Supervision levels and relationship with the supervisor 2.3.1. supervision levels My field supervisor was always available, provided corrective feedback, gave clear guidelines for the application of theory, competent enough, and the supervisor provided support of the professional development to me. My supervisors focused on competence with the accomplishment of meeting institutional organization internship goals. 2.3.2. Relationship with supervisor There was a strong supervisory relationship with my supervisor that effectively helped successfully to participate in experiences and acquire competence. Communication and feedback. My supervisors always provided feedback to any asked question this enabled notes taking which was later written in my logbook Time management. My supervisor was very time conscious so I ensured that I was at the organization on a daily basis. Mr. Ogiima my field supervisor usually gave time bound tasks to ensure proper good time management. 2.4. Work team and its composition The work team was created with members of different levels of abilities coming up with cross- functional teams. My work team interacted interdependently to achieve a common objective that was always assigned. Its composition was based on the attributes among individuals that made the team. In addition, the team was made of homogeneous and heterogeneous levels of skills in which team members all contain significant differences among skills, experience, and abilities. Through these contributions in the team this potentially dictated overall performance outcomes for the team which increased performance, employee unity and company culture.
  31. 31. 22 2.4. Working relationship among the team members and staff As a work team intern member I was Honest, straightforward and Shared the Load this was through doing my share of the work increasing team members’ collective motivation. In addition, I was reliable and fair by taking appropriate credit and complementing my work team skills that made the team move forward. For Team work being social I was skilled, and tactful, communicator with a positive attitude.
  32. 32. 23 3.0. CHAPTER THREE EVALUATION ON FIELD ATTACHMENT 3.1. Level of accomplishment of duties and responsibilities assigned To a greater extent I successfully accomplished the duties and responsibilities assigned. Being in the Information Technology department responsibilities included: day to day work and basic configuration; document procedures; application installments e.g. windows installation, adobe premiere pro cc, Microsoft word, avid, driver pack solution; working environment configurations e.g. Checking for computer status(checking hard disk life span) installing and supporting new and existing applications on various server platforms; writing business requirements documents for new projects; level 1 troubleshooting e.g. failure of printing a document when using a LAN printer, failure of a computer to start. 3.2. New knowledge and skills gained in each of the duties and responsibilities During field attachment I accumulated a lot of knowledge and skills. Each of the duties and responsibilities as listed in section 2.2 empowered and greatly impacted on my skills 3.2.1. Knowledge  Web Development. This was through Creation of web layout design, writing code, and usability testing, maintaining company websites and managing site content with the help of my supervisor.  Programming. Through design of systems, I learnt more about object-oriented languages, such as C++, Java.  Technical Support. Providing technical assistance to other departments, from troubleshooting e-mail to training individuals in new software applications  Systems Administration. Basic installing and repair an organization's computer systems. And maintaining communications, such as internet and intranet systems, local area networks (LAN), and wide area networks (WAN).  Project and Technical Services Management. Through overseeing individual projects, from communication to coordinating with team members.
  33. 33. 24 3.2.2. Skills Computer competency, attention to detail, organization, problem solving, critical thinking, clear written and spoken communication, time management, close listening. 3.2.3. Responsibilities Working towards achieving my individual goals, which helped the organization reach its objectives, Taking responsibility for your own professional and career development, Being open and Accepting constructive feedback and take the initiative to improve, Giving others feedback, Completing any development plans assigned to me and applying the learning to improve my performance , Keeping record of my performance achievements, successes and challenges i.e. evaluation sheets in case of assignments , Completing my self-appraisal by the specified deadline. 3.3. Most interesting experiences. During the Field Attachment period, I really enjoyed the experience of working at UBC including the comfortable working atmosphere, the technical guidance on the latest web technologies and the friendly relationship among the field staff. A list of interesting moments, are highlighted below 3.3.1. Internship project. Accomplishing My Project assigned (developing a professional website using word press). The project involved several parts: developing a database for the website using MySQL, responsive, attractive interface. It was a very self-contained project which every intern built up from scratch. 3.3.2. Interaction with experienced people in the field I also had the opportunity to network with potential future employers and gain insight into the types of employees they look for. This made me realize the greatest value of Internship which is providing a unique and exciting experience that is unparalleled in the classroom and to coordinate job experience with academic. 3.3.3. Learning IT area of interest internship offered me the opportunity to essentially customize my placement in order to gain valuable work experience in my areas of interest and I had the opportunity to look at a sever.
  34. 34. 25 3.3.4. Working with experienced and more skilled individuals working with some of the best developers, designers and managers in information technology department, solving problems that you can never face in a school environment, bonding with other interns that make up a very diverse demographic. 3.4. Relatedness of university’s taught programs to the field work With the current curriculum for Undergraduate Bachelor of Computer Science program by NCHE, Revised December 20, 2013 used by Makerere University. In its design goals which include enabling students with computing and communication skills necessary for employment and career opportunities in today’s ICT industries and business organization. Illustration of relevance of computer science curriculum with to field work with few sampled course units. COURSE UNIT USE OF KNOWLEDGE FROM CLASS TO FIELD WORK BIS 1104: Communication Skills for IT Used for effective speaking and listening, meetings and presentation sessions CSC 1100: Computer Literacy The skills learnt in computer literacy such as Microsoft Word and Excel were used to prepare professionally looking and standard documents at work, including this field attachment report BIS 1204: Data and Information management This enabled successful web development sessions due to the different languages learnt in class e.g. MYSQL, php check final project in appendix// BIS 1206: Systems Analysis and Design This was vital during system development CSC 2100: Data Structures and Algorithms This enabled easy developing of problem solving systems. Table 3.1: showing relevance of computer science curriculum to field attachment 3.5. Challenges faced and how managed
  35. 35. 26  Inadequate and delay for supervision facilitation. University policies state that each site/student has to be visited at least three times by the academic supervisors (Makerere University Council, 2011, p. 8) but most students were visited only once, after 8 weeks in the field. This was generally a weakness on the side of the university. But at least the University ensured that internships are offering meaningful learning experiences for their students by providing evaluation sheets which provide feedback from employers to university.  Lack of field-specific knowledge / skills. This arouse from use of specific programming languages which were not taught at school. This was solved by a meeting held between interns and field supervisor in order to identify areas for improvement.  Limited time for the internship program is one of the challenges as it is only scheduled for eight weeks, which makes it not enough to learn experience most of all the activities undertook in a survey.  insufficient work assigned to us at the beginning of an internship. This was solved managing our work by doing our personal research and offering something useful for the organization. And Asking our seniors for guidance.  Assignment of activities that don’t correspond to the internship expectations this was solved by informing the internship field coordinator. 3.6. Benefits derived from field attachment The field attachment was of great importance, some of the benefits include  Internship helped me understand work ethics, employment demands, responsibilities and opportunities.  Field attachment provided career direction and confidence in my abilities by narrowing down the list of potential careers.  My internship gave me the opportunity to try out computer related activities i.e. dismantling a computer which I had not previously considered and broadened my horizons through converting my academic knowledge into industry skills.  It prepared me for the working environment.  It enhanced my CV needed to negotiate future jobs.
  36. 36. 27 3.7. Adequacy in university’s preparing the student for field attachment In my view students having a limited range of skills in areas like communication and team work, with educational experiences that can’t teach them how to solve problems with people whose views are different than their own. With less intercultural skills and an understanding of societies all this showed inadequacy of preparation given to students for field attachment 3.8. Preparedness of the agency to receive and manage students for field attachment The agency shared some insight on the bigger picture and how their projects fit in internship goals can bridge this knowledge gap. With the ability of College students having a lot to offer and will approach things differently and the need to create a job description that is appealing, experience, so it’s important to evaluate your needs and for both parties. This can be instrumental in targeting younger clients and the clear setting of project goals and regular benchmarks to see how we interns are performing clears shows agency was prepared. occasionally, resourceful persons and experts in field always answered queries and also gave tips and shared experiences with the students. This greatly inspired the interns 3.9. Career Motivation For the different values in regards to work and need for different things in the job market today that include satisfaction and fulfillment. from the career motivation attained. This makes me plan a more fulfilling and productive career and create an environment I can thrive in motivation's role in influencing workplace behavior and performance at school. 4.0. CONCLUSIONS AND RECOMMENDATIONS 4.1. Conclusions The internship period revealed that curriculum in our university lacks sufficient input from employers of labour, and the teaching-learning resources were grossly inadequate (computers, servers, routers, switches) academic staff were competent but inadequate in number in some departments.
  37. 37. 28 On the basis of these notices, I conclude saying that result from inadequacies in critical factors influences the quality of programme offering and there are lapses in the preparation of undergraduates for field attachment. 4.2. RECOMMENDATIONS On the basis of the findings and conclusion drawn in this field attachment I recommended that: 4.2.1. Recommendations to the University  The university should urgently restructure the curricula offerings to meet the requirements of the labour market.  This course CSC 2303: Field Attachment, should be shifted to the third year of study, such that it is given more time, at least six months. Many students have concluded that two months internships are too small.  Students teaching-learning resources should be improved, especially the tools for practicals, lecture room capacity, laboratories and workshops.  ICT should be introduced into both teaching and learning activities of every university, so that both staff and students can possess the much needed ICT knowledge and skills.  The University should keep good records of its graduates for feedback purposes; while academic departments should liaise with employers for information on their employed ex- students 4.2.2. Recommendation to the field attachment organization In future, the field organization (UBC) should provide students with large range of computing related aspects and a simple review of technologies used at the organization 4.2.3. Recommendation to future interns As students, good supervisory relationships are pivotal to successful completion of our degrees because supervisors provide expert guidance in your research, and our fields of study thus need for good supervisory relationships with our supervisors.
  38. 38. 29 References Uganda Broadcasting corporation (n.d.). Retrieved July 31, 2016, from http://ubc.ug/index.php/partners/ Internetworking Basics. (n.d.). Retrieved June 08, 2016, from http://www.cisco.com/cpress/cc/td/cpress/fund/ith/ith01gb.htm Network topologies. (n.d.). Retrieved June 12, 2016, from http://whatis.techtarget.com/definition/network-topology Cable termination. (n.d.). Retrieved June 10, 2016, from http://www.incentre.net/tech- support/other-support/ethernet-cable-color-coding-diagram/ MySQL. (2014, September). MySQL Tutorial. Retrieved June 23, 2016, from ` https://www.ntu.edu.sg/home/ehchua/programming/sql/MySQL_Beginner.html. B. (2006, June 27). Types of RAM. Types of RAM: How to Identify and Their Specifications. Retrieved June 15, 2016, from https://www.technibble.com/types-of-ram-how-to-identify- and-their-specifications/. Microsoft. (2014, April 08). How to install or upgrade to Windows. Retrieved June 20, 2016. from https://support.microsoft.com/en-us/kb/978307. (n.d.). Windows 8 Product Activation. Retrieved June 21, 2016, from http://support.hp.com/us- en/document/c03486254 Makerere University Council. (2011). Guidelines for Field Attachment. Retrieved June 5, 2016. from Makerere University Policies Website: http://policies.mak.ac.ug/sites/default/files/policies/GUIDELINES_FOR_FIELD_ATTACHMEN T.pdf NCHE. (2013, December). Curriculum for Bachelor of Computer Science (CSC) Degree Program. Retrieved August 13, 2016, from https://courses.mak.ac.ug/programmes/bachelor- science-computer-science
  39. 39. 30 Appendices “Appendix A”: UBC internship offer letter
  40. 40. 31 “Appendix B” Enter password: Welcome to the MySQL monitor. Commands end with; or g. Your MySQL connection id is 23 Server version: 5.6.17 MySQL Community Server (GPL) Copyright (c) 2000, 2014, Oracle and/or its affiliates. All rights reserved. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners. Type 'help;' or 'h' for help. Type 'c' to clear the current input statement. mysql> CREATE DATABASE student; Query OK, 1 row affected (0.33 sec) mysql> DROP DATABASE student; Query OK, 0 rows affected (0.88 sec) mysql> CREATE DATABASE IF NOT EXISTS student; Query OK, 1 row affected (0.00 sec) mysql> SHOW DATABASES; +--------------------+ | Database | +--------------------+ | information_schema | | mysql | | patrick | | people | | performance_schema | | project | | student | | test | +--------------------+ 8 rows in set (0.58 sec) mysql> USE student; Database changed mysql> SELECT DATABASE(); +------------+ | DATABASE() | +------------+ | student | +------------+
  41. 41. 32 1 row in set (0.00 sec) mysql> SHOW TABLES; Empty set (0.07 sec) mysql> CREATE TABLE IF NOT EXISTS products (productID INT UNSIGNED NOT NULL AUTO_INCREMENT, productCode CHAR(3) NOT NULL DEFAULT '', name VARCHAR(30) NOT NULL DEFAULT '',quantity INT UNSIGNED NOT NULL DEFAULT 0,price DECIMAL(7,2) NOT NULL DEFAULT 99999.99, PRIMARY KEY (productID)); Query OK, 0 rows affected (0.97 sec) mysql> SHOW TABLES; +-------------------+ | Tables_in_student | +-------------------+ | products | +-------------------+ 1 row in set (0.00 sec) mysql> DESCRIBE products; +-------------+------------------+------+-----+----------+---------------- + | Field | Type | Null | Key | Default | Extra | +-------------+------------------+------+-----+----------+---------------- + | productID | int(10) unsigned | NO | PRI | NULL | auto_increment | | productCode | char(3) | NO | | | | | name | varchar(30) | NO | | | | | quantity | int(10) unsigned | NO | | 0 | | | price | decimal(7,2) | NO | | 99999.99 | | +-------------+------------------+------+-----+----------+---------------- + 5 rows in set (0.20 sec) mysql> SHOW CREATE TABLE products G *************************** 1. row *************************** Table: products Create Table: CREATE TABLE ‘products’ ( `productID’ int(10) unsigned NOT NULL AUTO_INCREMENT, `productCode’ char(3) NOT NULL DEFAULT '', `name’ varchar(30) NOT NULL DEFAULT '', `quantity’ int(10) unsigned NOT NULL DEFAULT '0', `price’ decimal(7,2) NOT NULL DEFAULT '99999.99', PRIMARY KEY (`productID’)) Query OK, 1 row in set (0.00 sec) mysql> INSERT INTO products VALUES (1001, 'PEN', 'Pen Red', 5000, 1.23);
  42. 42. 33 Query OK, 1 row affected (0.12 sec) mysql> INSERT INTO products VALUES (NULL, 'PEN', 'Pen Blue',8000,1.25 ),(NULL, 'PEN', 'Pen Black', 2000, 1.25); Query OK, 2 rows affected (0.13 sec) mysql> INSERT INTO products (productCode, name, quantity, price) VALUES ('PEC', 'Pencil 2B', 10000, 0.48),('PEC', 'Pencil 2H', 8000, 0.49); Query OK, 2 rows affected (0.11 sec) mysql> INSERT INTO products (productCode,name) VALUES ('PEC','Pencil HB'); Query OK, 1 row affected (0.10 sec) mysql> SELECT * FROM products; +-----------+-------------+-----------+----------+----------+ | productID | productCode | name | quantity | price | +-----------+-------------+-----------+----------+----------+ | 1001 | PEN | Pen Red | 5000 | 1.23 | | 1002 | PEN | Pen Blue | 8000 | 1.25 | | 1003 | PEN | Pen Black | 2000 | 1.25 | | 1004 | PEC | Pencil 2B | 10000 | 0.48 | | 1005 | PEC | Pencil 2H | 8000 | 0.49 | | 1006 | PEC | Pencil HB | 0 | 99999.99 | +-----------+-------------+-----------+----------+----------+ 6 rows in set (0.07 sec) mysql> DELETE FROM products WHERE productID = 1006; Query OK, 1 row affected (0.18 sec) mysql> SELECT name, price FROM products; +-----------+-------+ | name | price | +-----------+-------+ | Pen Red | 1.23 | | Pen Blue | 1.25 | | Pen Black | 1.25 | | Pencil 2B | 0.48 | | Pencil 2H | 0.49 | +-----------+-------+ 5 rows in set (0.00 sec) mysql> SELECT * FROM products; +-----------+-------------+-----------+----------+-------+ | productID | productCode | name | quantity | price | +-----------+-------------+-----------+----------+-------+ | 1001 | PEN | Pen Red | 5000 | 1.23 | | 1002 | PEN | Pen Blue | 8000 | 1.25 | | 1003 | PEN | Pen Black | 2000 | 1.25 | | 1004 | PEC | Pencil 2B | 10000 | 0.48 | | 1005 | PEC | Pencil 2H | 8000 | 0.49 | +-----------+-------------+-----------+----------+-------+ 5 rows in set (0.00 sec)
  43. 43. 34 mysql> SELECT name, price FROM products WHERE price < 1.0; +-----------+-------+ | name | price | +-----------+-------+ | Pencil 2B | 0.48 | | Pencil 2H | 0.49 | +-----------+-------+ 2 rows in set (0.07 sec) mysql> SELECT name, price FROM products WHERE name LIKE 'PENCIL%'; +-----------+-------+ | name | price | +-----------+-------+ | Pencil 2B | 0.48 | | Pencil 2H | 0.49 | +-----------+-------+ 2 rows in set (0.04 sec) mysql> SELECT * FROM products WHERE quantity >= 5000 AND name LIKE 'Pen %'; +-----------+-------------+----------+----------+-------+ | productID | productCode | name | quantity | price | +-----------+-------------+----------+----------+-------+ | 1001 | PEN | Pen Red | 5000 | 1.23 | | 1002 | PEN | Pen Blue | 8000 | 1.25 | +-----------+-------------+----------+----------+-------+ 2 rows in set (0.00 sec) mysql> SELECT * FROM products WHERE quantity >= 5000 AND price < 1.24 AND name L IKE 'Pen %'; +-----------+-------------+---------+----------+-------+ | productID | productCode | name | quantity | price | +-----------+-------------+---------+----------+-------+ | 1001 | PEN | Pen Red | 5000 | 1.23 | +-----------+-------------+---------+----------+-------+ 1 row in set (0.00 sec) mysql> SELECT * FROM products WHERE (price BETWEEN 1.0 AND 2.0) AND (quantity BETWEEN 1000 AND 2000); +-----------+-------------+-----------+----------+-------+ | productID | productCode | name | quantity | price | +-----------+-------------+-----------+----------+-------+ | 1003 | PEN | Pen Black | 2000 | 1.25 | +-----------+-------------+-----------+----------+-------+ 1 row in set (0.01 sec) mysql> SELECT * FROM products WHERE name LIKE 'Pen %' ORDER BY price DESC; +-----------+-------------+-----------+----------+-------+ | productID | productCode | name | quantity | price | +-----------+-------------+-----------+----------+-------+ | 1002 | PEN | Pen Blue | 8000 | 1.25 | | 1003 | PEN | Pen Black | 2000 | 1.25 |
  44. 44. 35 | 1001 | PEN | Pen Red | 5000 | 1.23 | +-----------+-------------+-----------+----------+-------+ 3 rows in set (0.17 sec) mysql> SELECT * FROM products ORDER BY price LIMIT 2; +-----------+-------------+-----------+----------+-------+ | productID | productCode | name | quantity | price | +-----------+-------------+-----------+----------+-------+ | 1004 | PEC | Pencil 2B | 10000 | 0.48 | | 1005 | PEC | Pencil 2H | 8000 | 0.49 | +-----------+-------------+-----------+----------+-------+ 2 rows in set (0.00 sec) mysql> SELECT CONCAT(productCode,'-',name) AS `Product Description’, price FROM products; +---------------------+-------+ | Product Description | price | +---------------------+-------+ | PEN - Pen Red | 1.23 | | PEN - Pen Blue | 1.25 | | PEN - Pen Black | 1.25 | | PEC - Pencil 2B | 0.48 | | PEC - Pencil 2H | 0.49 | +---------------------+-------+ 5 rows in set (0.04 sec) mysql> SELECT DISTINCT price AS `Distinct Price’ FROM products; +----------------+ | Distinct Price | +----------------+ | 1.23 | | 1.25 | | 0.48 | | 0.49 | +----------------+ 4 rows in set (0.10 sec) mysql> SELECT * FROM products GROUP BY productCode; +-----------+-------------+-----------+----------+-------+ | productID | productCode | name | quantity | price | +-----------+-------------+-----------+----------+-------+ | 1004 | PEC | Pencil 2B | 10000 | 0.48 | | 1001 | PEN | Pen Red | 5000 | 1.23 | +-----------+-------------+-----------+----------+-------+ 2 rows in set (0.01 sec) mysql> SELECT productCode, MAX(price) AS `Highest Price’, MIN(price) AS `LowestPrice` FROM products GROUP BY productCode; +-------------+---------------+--------------+ | productCode | Highest Price | Lowest Price | +-------------+---------------+--------------+ | PEC | 0.49 | 0.48 | | PEN | 1.25 | 1.23 |
  45. 45. 36 +-------------+---------------+--------------+ 2 rows in set (0.07 sec) mysql> UPDATE products SET price = price * 1.1; Query OK, 5 rows affected, 5 warnings (0.24 sec) mysql> LOAD DATA LOCAL INFILE 'E:mysql/products_in.csv' INTO TABLE products COLUMNS TERMINATED BY ',' LINES TERMINATED BY 'rn'; ERROR 2 (HY000): File 'E:mysqlproducts_in.csv' not found (Errcode: 2 - No suchfile or directory) “Appendix c” Screenshots of the internship project done at UBC (website development using WordPress) Screenshot1:WordPressloginusingphp WiththeuseofwampserverinstalledanditbeingonlineIloginedintoWordPressversion4.4.2 Screenshot2:homepageofKivEventswebsitewithsliderfromrighttoleftplusotherpages
  46. 46. 37 Screenshot3:continuationofKivEventswebsitehomepagewiththemeettheteamandfactstabsplusthelatest news Screenshot4:continuationofKivEventswebsitehomepageshowingsuccessstoriestabandcontacticonthat whenclickedtakeyoutorespectivesocialmediaplatforms.ThesocialmediaiconsareincludedinWordPress usingSydneythemeandsiteoriginsocialbundle.
  47. 47. 38 Screenshot5:theaboutuspageindicatingtestimonialscreatedbyaddingnewtestimonialfromthedashboard, contactustabplusthesocialmediaicons
  48. 48. 39 Screenshot6:thisshowstheemployeespageinthatwhenhooveredoveritpopsupsocialmediacontactsofthe differentemployees Screenshot7:theportfoliopageindicatesthedifferentprojectsaccomplishedbytheorganisation Screenshot 8: the blog page created with help of the contact form7 plugin that enables individuals to tweet to the website as indicated in the extreme right of the screen shot
  49. 49. 40 Screenshot9:blogpageshowingwhereanindividualwhohasvisitedthesitecanleaveacomment Screenshot10:thesuccessstories pageincludestheclientsthathaveworkedwiththeorganisation
  50. 50. 41 Screenshot11:thecontactus pageindicatesthegooglemaplocationoftheorganisationwithaformusedtosend emailtoorganisation Screenshot12:illustrationshowinginstallationofoneoftheusedplugin(lightboxpluscolorbox)
  51. 51. 42 “Appendix D” Windows installation Windows XP Steps Taken 1. Start a computer from the Windows XP CD or boot disks. 2. press any key to start the computer from the Windows XP CD then press ENTER to begin Windows XP Setup 3. Read the Microsoft Software License Terms, and then press F8. 4. Follow the instructions on the screen to select and format a partition where you want to install Windows XP till you complete Windows XP Setup. Windows 7 installation 1. Enter your computer's system BIOS by pressing Del, Esc, F2, F10, or F9 depending on your computer’s motherboard. 2. Find your BIOS's boot options menu
  52. 52. 43 3. Select the CD-ROM drive as the first boot device of your computer. 4. Save the changes of the settings 5. Shut off your computer and Power on the PC and the insert the Windows 7 disc into your CD/DVD drive or flash disk 6. Start your computer from the disc., Choose your Windows Setup options, Click the Install Now button, Accept the License Terms, Select the Custom installation, decide on which hard drive and partition you want to install Windows on. Windows 8 installation 1. Insert the Windows 8 Installation Disc into the internal / external DVD. Turn on your computer During the boot up screen, press [F12] on your keyboard to enter Boot Menu and choose the DVD or BD reading device where you insert the installation disc. 2. Press any key on your keyboard when you see the message to reboot from the DVD or BD reading device then Click “Install now” to continue. 3. Insert activation key and Check “I accept the license terms” and click “next”. Note: for clean installation, please select “Custom” to continue. 4. For need to create a new partition with specific size, you should click “New”. Otherwise, click “Next”, When all partition process is done, choose your desired partition for Windows 8 installation, and click “Next”. 5. Final step is to Complete the Windows 8 Installation “Appendix E” Adding Roles in windows server 2008 R2: Go to Server Manager by using shortcuts on the Start menu, then in the Roles Summary Click Add Roles
  53. 53. 44 assigning the IP addresses Log on to Windows Server 2008 R2 computer with Administrator account. Click Start and then click Run(NCPA.CPL) from the menu. On the opened window right-click on the NIC on which static IP address has to be assigned and click Properties. On Local Area Network Properties box make sure that Networking tab is selected and double- click Internet Protocol Version 4 (TCP/IPv4). General tab is selected and click to select Use the following IP address Populate the enabled IP address and Subnet mask fields and click OK button. That is to say IP address: 192.168.2.7, Subnet mask: 255.255.255.0, Default gateway: 192.168.2.1, Preferred DNS server: 196.43.133.5, Alternate DNSC server: 196.43.133.6 click OK to save the changes. creating users open up Server Manager open up the Roles section, next to Active Directory Users and Computers section and finally the Active Directory Users and Computers click on Users section where we are going to create a new User Account. To do so, right-click on the blank section, point to New and select User. In this window type in the user's first name, middle initial and last name. Next create a user's logon name. create a password for the new user and select appropriate options click on the Finish button to complete the creation of new User Account.

×