SlideShare a Scribd company logo
SIWES TECHNICAL REPORT
BY
SHIMAPEVER ANGELA UMM/SAE/998
SUBMITTED TO THE DEPARTMENT OF
MATHEMATICS AND COMPUTER SCIENCE,
UNIVERSITY OF MKAR,MKAR
IN PARTIAL FULFILMENT OF THE
REQUIREMENT FOR THE AWARD OF B.SC.
COMPUTER SCIENCE
KNOWLEDGE ACQUIRED
COMPUTER MAINTENANCE AND TROUBLESHOOTING
Computer maintenance
• Maintenance is defined as the practice of keeping computer in a good
state of repair planned or unplanned.
Planned maintenance
• This is the necessary work organized and carried out with fore thought ,
control and records to keep or restore facility to an acceptable standard.
• The concept of planned maintenance reduces the requirement of deal
with unforeseen breakdown and to minimize the needs for repair. In
addition , it enables repair to be carried out in an organized manner at a
convenient time without emergency.
Unplanned maintenance
• This is the work carried out without keeping records without control
Maintenance strategy
This are the methods used in maintaining the requirement. The
strategies are in three categories :
• Preventive maintenance : this is performed even if the computer is
still operating in its efficient level. It is done to prevent degradation
of performance
• Corrective / breakdown maintenance : this type of maintenance is
required when a system or sub-system finally collapsed.
• Routine maintenance : this involved a regular scheduled or time
table strictly adhered to by the owner of the computer and the party
offering the maintenance service to perform an overhaul of
machinery.
Troubleshooting
HARDWARE COMPONENTS OF A COMPUTER SYSTEM.
• RAM: RAM is an abbreviation for Random Access Memory. It is a
short term memory that is used to store document while they are
being processed. Also note that the amount of RAM in a computer is
one of the factors that affect the speed of a computer
• Hard drive: This is the device used for long time storage of
information. The main storages for a computer are the internal hard
drive (also called a hard disk).
Motherboard: This is a large electronic board that is used to connect the power supply to various/other electronic parts and
to hold these parts in place of the computer. The computer memory (RAM) and processor are attached to the motherboard.
On the motherboard you also see the BIOS (Basic Input and Output System) chip that is responsible for some fundamental
operation of the computer such as linking hardware and the software. Motherboards also contain small battery like a watch
battery and the chips that work it to store the system time and other computer settings.
System Unit Case: This is also called a tower or housing. It is the box that encloses many of the computer system
components.
NETWORKING CABLES
The Ethernet cable are network cables containing eight wires with different colours. These wires are arranged
and terminated according to the type of connection needed.
We have the straight through terminated cable, for connecting devices that are dissimilar (e.g. computer to
hub/switch, switch to hub etc.)
We also have the cross over cable, for connecting devices that are the same (e.g. computer to computer, switch to
switch, hub to hub etc.)
The colors of the wire are green, orange, blue and brown. Four of these colors in full while the remaining four have
the colours but with the stripes of white along it.
For straight through cables, the color code is:
White/Orange (i.e. orange color striped with white) followed by full orange, white/green-blue, white/blue-green,
white/brown-brown.
For cross over cables, the color code is:
White/green-green, white/orange-blue, white/blue-orange, white/brown-brown.
All these wires are arranged in line and inserted into the RJ-45 connector which is then held in place (crimped) by a
crimping device
We need the following equipment to make a patch cable
RJ-45
LAN cable tester
Crimping tool
Patch panel
Ethernet cable
OTHER ACTIVITIES DURING THE TRAINING
Other activities I carried out during the course of my training includes
i. I learnt how to update the drivers of a computer.
ii. I learnt how to install a printer by using the driver software.
iii. I learnt how to back up a system.
iv. I learnt how to upgrade the operating system of the computer.
v. I learnt how to activate the windows operating system using the activator software.
vi. I learnt how to work as a team with my fellow interns.
vii. I was made a group leader to carry out an assignment and I was able to assign different tasks to my group members.
TECHNICAL SKILLS ACQUIRED
Below is the list of skills I acquired during my industrial training
i. Knowledge of computer maintenance.
ii. Knowledge in computer hardware and assembling of different parts.
iii. Knowledge in network cabling.
SOCIALAND FUNCTIONAL SKILLS ACQUIRED
i. Ability to work with team, identify and solve problems relating to computer maintenance.
ii. Enhanced communication skills.
iii. Decision making, critical thinking, organizing and planning.
iv. Enhanced teaching and effective learning skills.
CHALLENGES ENCOUNTERED
• Challenges I was confronted with at the CASS department were mainly centered on poor inter relationship
among the interns. This was however put in check by the intervention of our supervisor through discussions
and meetings.
• There was also a time when the number of interns at the department was low and this resulted to some of us
being overworked. More students were however deployed to the department during my stay.
Summary, Conclusion and Recommendations.
Summary:
• During the course of my SIWES training at Raw material research and development council . The practical
that carried out include; computer maintenance and Network cables. The staffs and my SIWES colleagues
also contribute to the success of the activities carried out at the Raw material research and development
council. The role of computer science in the technology sector is of great benefit to the nation at large and
for me the training was interesting and well understood.
Conclusion:
Conclusively, this student industrial work experience program (SIWES) is a training exercise that must not be
neglected because of the scientific knowledge. In fact, I will emphasis that the practical knowledge I gained is
very important.
Recommendation:
• Orientation should be given to the students by their department / SIWES before the training exercise is
carried out.
• Students should be supervised by school supervisor and ITF officials regularly at least twice during the
training program; this will make the students to be punctual and serious during the training exercise.
• Schools should kindly assist the students in getting place where their IT can be done in future.
THANKS FOR
LISTENING

More Related Content

Similar to angela.pptx

Aud5_Chapter-26.pptx
Aud5_Chapter-26.pptxAud5_Chapter-26.pptx
Aud5_Chapter-26.pptx
JayLloyd8
 
Kto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicingKto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicing
Alvin Francisco
 
CSS INTRO.pptx
CSS INTRO.pptxCSS INTRO.pptx
CSS INTRO.pptx
JocelynMirasol1
 
Project black book TYIT
Project black book TYITProject black book TYIT
Project black book TYIT
Lokesh Singrol
 
Projectblackbook tyit-170121122010
Projectblackbook tyit-170121122010Projectblackbook tyit-170121122010
Projectblackbook tyit-170121122010
ShivanchalSingh
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
Ali Haydar(Raj)
 
CAP170 lec1.pptx
CAP170 lec1.pptxCAP170 lec1.pptx
CAP170 lec1.pptx
BLACKSHARK22
 
BTEC National in ICT: Unit 3 - Operational Issues
BTEC National in ICT: Unit 3 - Operational IssuesBTEC National in ICT: Unit 3 - Operational Issues
BTEC National in ICT: Unit 3 - Operational Issues
mrcox
 
MAINTAIN AND REPAIR OF COMPUTER SYSTEM PART 1
MAINTAIN AND REPAIR OF COMPUTER SYSTEM PART 1MAINTAIN AND REPAIR OF COMPUTER SYSTEM PART 1
MAINTAIN AND REPAIR OF COMPUTER SYSTEM PART 1
KevinKregelCampollo1
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
Zakaria Hossain
 
Fee collection system
Fee collection systemFee collection system
Fee collection systemharryz18
 
Lecture for the day three in jj3 ppt.pdf
Lecture for the day three in jj3 ppt.pdfLecture for the day three in jj3 ppt.pdf
Lecture for the day three in jj3 ppt.pdf
AhmedWasiu
 
Factors influencing the success of computer architecture
Factors influencing the success of computer architectureFactors influencing the success of computer architecture
Factors influencing the success of computer architecture
Majane Padua
 
SC17 Panel: Energy Efficiency Gains From HPC Software
SC17 Panel: Energy Efficiency Gains From HPC SoftwareSC17 Panel: Energy Efficiency Gains From HPC Software
SC17 Panel: Energy Efficiency Gains From HPC Software
inside-BigData.com
 
Feasibility study of setting up a computer store chapter 1-5
Feasibility study of setting up a computer store chapter 1-5Feasibility study of setting up a computer store chapter 1-5
Feasibility study of setting up a computer store chapter 1-5
Christofer De Los Reyes
 
IP final project
IP final project IP final project
IP final project
SantySS
 
CSS CORE 1 - INSTALL & CONFIGURE COMPUTER SYSTEMS AND NETWORKS
CSS CORE 1 - INSTALL & CONFIGURE COMPUTER SYSTEMS AND NETWORKSCSS CORE 1 - INSTALL & CONFIGURE COMPUTER SYSTEMS AND NETWORKS
CSS CORE 1 - INSTALL & CONFIGURE COMPUTER SYSTEMS AND NETWORKS
Eric Talamisan
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
RichardSugbo
 
FIDP_1_Quarter_CSS1 (1).docx
FIDP_1_Quarter_CSS1 (1).docxFIDP_1_Quarter_CSS1 (1).docx
FIDP_1_Quarter_CSS1 (1).docx
jonathanlabajo2
 
CSS NC II Module : Set-up Computer Networks
CSS NC II Module : Set-up Computer NetworksCSS NC II Module : Set-up Computer Networks
CSS NC II Module : Set-up Computer Networks
Eric Talamisan
 

Similar to angela.pptx (20)

Aud5_Chapter-26.pptx
Aud5_Chapter-26.pptxAud5_Chapter-26.pptx
Aud5_Chapter-26.pptx
 
Kto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicingKto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicing
 
CSS INTRO.pptx
CSS INTRO.pptxCSS INTRO.pptx
CSS INTRO.pptx
 
Project black book TYIT
Project black book TYITProject black book TYIT
Project black book TYIT
 
Projectblackbook tyit-170121122010
Projectblackbook tyit-170121122010Projectblackbook tyit-170121122010
Projectblackbook tyit-170121122010
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
 
CAP170 lec1.pptx
CAP170 lec1.pptxCAP170 lec1.pptx
CAP170 lec1.pptx
 
BTEC National in ICT: Unit 3 - Operational Issues
BTEC National in ICT: Unit 3 - Operational IssuesBTEC National in ICT: Unit 3 - Operational Issues
BTEC National in ICT: Unit 3 - Operational Issues
 
MAINTAIN AND REPAIR OF COMPUTER SYSTEM PART 1
MAINTAIN AND REPAIR OF COMPUTER SYSTEM PART 1MAINTAIN AND REPAIR OF COMPUTER SYSTEM PART 1
MAINTAIN AND REPAIR OF COMPUTER SYSTEM PART 1
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
 
Fee collection system
Fee collection systemFee collection system
Fee collection system
 
Lecture for the day three in jj3 ppt.pdf
Lecture for the day three in jj3 ppt.pdfLecture for the day three in jj3 ppt.pdf
Lecture for the day three in jj3 ppt.pdf
 
Factors influencing the success of computer architecture
Factors influencing the success of computer architectureFactors influencing the success of computer architecture
Factors influencing the success of computer architecture
 
SC17 Panel: Energy Efficiency Gains From HPC Software
SC17 Panel: Energy Efficiency Gains From HPC SoftwareSC17 Panel: Energy Efficiency Gains From HPC Software
SC17 Panel: Energy Efficiency Gains From HPC Software
 
Feasibility study of setting up a computer store chapter 1-5
Feasibility study of setting up a computer store chapter 1-5Feasibility study of setting up a computer store chapter 1-5
Feasibility study of setting up a computer store chapter 1-5
 
IP final project
IP final project IP final project
IP final project
 
CSS CORE 1 - INSTALL & CONFIGURE COMPUTER SYSTEMS AND NETWORKS
CSS CORE 1 - INSTALL & CONFIGURE COMPUTER SYSTEMS AND NETWORKSCSS CORE 1 - INSTALL & CONFIGURE COMPUTER SYSTEMS AND NETWORKS
CSS CORE 1 - INSTALL & CONFIGURE COMPUTER SYSTEMS AND NETWORKS
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
 
FIDP_1_Quarter_CSS1 (1).docx
FIDP_1_Quarter_CSS1 (1).docxFIDP_1_Quarter_CSS1 (1).docx
FIDP_1_Quarter_CSS1 (1).docx
 
CSS NC II Module : Set-up Computer Networks
CSS NC II Module : Set-up Computer NetworksCSS NC II Module : Set-up Computer Networks
CSS NC II Module : Set-up Computer Networks
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 

angela.pptx

  • 1. SIWES TECHNICAL REPORT BY SHIMAPEVER ANGELA UMM/SAE/998 SUBMITTED TO THE DEPARTMENT OF MATHEMATICS AND COMPUTER SCIENCE, UNIVERSITY OF MKAR,MKAR IN PARTIAL FULFILMENT OF THE REQUIREMENT FOR THE AWARD OF B.SC. COMPUTER SCIENCE
  • 2. KNOWLEDGE ACQUIRED COMPUTER MAINTENANCE AND TROUBLESHOOTING Computer maintenance • Maintenance is defined as the practice of keeping computer in a good state of repair planned or unplanned. Planned maintenance • This is the necessary work organized and carried out with fore thought , control and records to keep or restore facility to an acceptable standard. • The concept of planned maintenance reduces the requirement of deal with unforeseen breakdown and to minimize the needs for repair. In addition , it enables repair to be carried out in an organized manner at a convenient time without emergency. Unplanned maintenance • This is the work carried out without keeping records without control
  • 3. Maintenance strategy This are the methods used in maintaining the requirement. The strategies are in three categories : • Preventive maintenance : this is performed even if the computer is still operating in its efficient level. It is done to prevent degradation of performance • Corrective / breakdown maintenance : this type of maintenance is required when a system or sub-system finally collapsed. • Routine maintenance : this involved a regular scheduled or time table strictly adhered to by the owner of the computer and the party offering the maintenance service to perform an overhaul of machinery.
  • 4. Troubleshooting HARDWARE COMPONENTS OF A COMPUTER SYSTEM. • RAM: RAM is an abbreviation for Random Access Memory. It is a short term memory that is used to store document while they are being processed. Also note that the amount of RAM in a computer is one of the factors that affect the speed of a computer • Hard drive: This is the device used for long time storage of information. The main storages for a computer are the internal hard drive (also called a hard disk).
  • 5. Motherboard: This is a large electronic board that is used to connect the power supply to various/other electronic parts and to hold these parts in place of the computer. The computer memory (RAM) and processor are attached to the motherboard. On the motherboard you also see the BIOS (Basic Input and Output System) chip that is responsible for some fundamental operation of the computer such as linking hardware and the software. Motherboards also contain small battery like a watch battery and the chips that work it to store the system time and other computer settings. System Unit Case: This is also called a tower or housing. It is the box that encloses many of the computer system components.
  • 6. NETWORKING CABLES The Ethernet cable are network cables containing eight wires with different colours. These wires are arranged and terminated according to the type of connection needed. We have the straight through terminated cable, for connecting devices that are dissimilar (e.g. computer to hub/switch, switch to hub etc.) We also have the cross over cable, for connecting devices that are the same (e.g. computer to computer, switch to switch, hub to hub etc.) The colors of the wire are green, orange, blue and brown. Four of these colors in full while the remaining four have the colours but with the stripes of white along it. For straight through cables, the color code is: White/Orange (i.e. orange color striped with white) followed by full orange, white/green-blue, white/blue-green, white/brown-brown. For cross over cables, the color code is: White/green-green, white/orange-blue, white/blue-orange, white/brown-brown. All these wires are arranged in line and inserted into the RJ-45 connector which is then held in place (crimped) by a crimping device
  • 7. We need the following equipment to make a patch cable RJ-45 LAN cable tester Crimping tool Patch panel Ethernet cable
  • 8. OTHER ACTIVITIES DURING THE TRAINING Other activities I carried out during the course of my training includes i. I learnt how to update the drivers of a computer. ii. I learnt how to install a printer by using the driver software. iii. I learnt how to back up a system. iv. I learnt how to upgrade the operating system of the computer. v. I learnt how to activate the windows operating system using the activator software. vi. I learnt how to work as a team with my fellow interns. vii. I was made a group leader to carry out an assignment and I was able to assign different tasks to my group members.
  • 9. TECHNICAL SKILLS ACQUIRED Below is the list of skills I acquired during my industrial training i. Knowledge of computer maintenance. ii. Knowledge in computer hardware and assembling of different parts. iii. Knowledge in network cabling. SOCIALAND FUNCTIONAL SKILLS ACQUIRED i. Ability to work with team, identify and solve problems relating to computer maintenance. ii. Enhanced communication skills. iii. Decision making, critical thinking, organizing and planning. iv. Enhanced teaching and effective learning skills.
  • 10. CHALLENGES ENCOUNTERED • Challenges I was confronted with at the CASS department were mainly centered on poor inter relationship among the interns. This was however put in check by the intervention of our supervisor through discussions and meetings. • There was also a time when the number of interns at the department was low and this resulted to some of us being overworked. More students were however deployed to the department during my stay.
  • 11. Summary, Conclusion and Recommendations. Summary: • During the course of my SIWES training at Raw material research and development council . The practical that carried out include; computer maintenance and Network cables. The staffs and my SIWES colleagues also contribute to the success of the activities carried out at the Raw material research and development council. The role of computer science in the technology sector is of great benefit to the nation at large and for me the training was interesting and well understood. Conclusion: Conclusively, this student industrial work experience program (SIWES) is a training exercise that must not be neglected because of the scientific knowledge. In fact, I will emphasis that the practical knowledge I gained is very important. Recommendation: • Orientation should be given to the students by their department / SIWES before the training exercise is carried out. • Students should be supervised by school supervisor and ITF officials regularly at least twice during the training program; this will make the students to be punctual and serious during the training exercise. • Schools should kindly assist the students in getting place where their IT can be done in future.