This document is an industrial attachment logbook for Paullaster Amolo Okoth, an undergraduate student in the Department of Information Technology at Multimedia University of Kenya. Over the course of a 7 week internship period from May 6th to August 6th 2019, the logbook details the various IT-related tasks completed each day, including configuring networks and printers, installing software, troubleshooting connectivity issues, and providing other technical support. The logbook is submitted in partial fulfillment of the requirements for a Bachelor of Science degree in Information Technology.
Sample of A logbook for Bachelor of Science in computer science , software en...Paullaster Okoth
Â
This is a well summarised internship/attachment logbook that has covered critical areas in information technology that any computer science student or any related course might want to learn...
The student completed an 8-week field attachment with Tanzania Telecommunication Company Limited (TTCL) in their information technology department. Over this period, the student learned how to perform several key tasks including connecting telephones via drop wires, troubleshooting and repairing broken drop wires, maintaining air conditioner condensers, modifying and configuring telephones and routers, and installing computer operating systems. The field attachment provided hands-on experience in various IT and network-related roles within TTCL's infrastructure and operations.
Paullaster Amolo Okoth completed a 3-month internship at Samasource Kenya from January 4th to April 2nd, 2021. As part of fulfilling the requirements for a Bachelor of Science degree in Information Technology from Multimedia University of Kenya, Okoth gained practical work experience in Samasource's Service Delivery department. During the internship, Okoth worked on coding projects such as a Bluetooth chat application and an API monitoring tool. Okoth also contributed to platform improvements and provided support to agents. The internship provided valuable skills in areas like coding, cloud, web services, problem solving, and agile methodologies. Okoth concluded that the experience was important for their IT career and recommended establishing stronger partnerships between
This document outlines the requirements and procedures for a student internship logbook. It explains that the internship will be assessed based on supervisor evaluations, the student report, and the logbook. The logbook is to be used by students to record their daily activities and skills learned. Supervisors will provide weekly comments and an overall evaluation. Students must notify their placement, submit weekly summaries, and get approval for any changes. They are also expected to create an organization chart and report on their experiences at the end of the internship. The document provides forms for students to document their placement details, progress each week, and overall reflections.
This document provides details about Julius Kipchumba Kemboi's industrial attachment report at Mount Kenya University Eldoret campus. It includes sections on the background of Mount Kenya University, Julius' experiences and tasks during the attachment, the skills and competencies he acquired, and challenges faced. The main tasks Julius performed were assisting with computer repairs and maintenance, setting up new computers, and helping students. He gained skills in troubleshooting, networking, and customer service. Some challenges included technical issues and a heavy workload. In conclusion, Julius states it was a great learning experience despite the challenges.
This is my report that i did for my industrial placement or what one would call internship. It has some detailed information that can help anyone in the field of IT.
It has all sorts of topics like networks, systems administration and many others.
Sample of A logbook for Bachelor of Science in computer science , software en...Paullaster Okoth
Â
This is a well summarised internship/attachment logbook that has covered critical areas in information technology that any computer science student or any related course might want to learn...
The student completed an 8-week field attachment with Tanzania Telecommunication Company Limited (TTCL) in their information technology department. Over this period, the student learned how to perform several key tasks including connecting telephones via drop wires, troubleshooting and repairing broken drop wires, maintaining air conditioner condensers, modifying and configuring telephones and routers, and installing computer operating systems. The field attachment provided hands-on experience in various IT and network-related roles within TTCL's infrastructure and operations.
Paullaster Amolo Okoth completed a 3-month internship at Samasource Kenya from January 4th to April 2nd, 2021. As part of fulfilling the requirements for a Bachelor of Science degree in Information Technology from Multimedia University of Kenya, Okoth gained practical work experience in Samasource's Service Delivery department. During the internship, Okoth worked on coding projects such as a Bluetooth chat application and an API monitoring tool. Okoth also contributed to platform improvements and provided support to agents. The internship provided valuable skills in areas like coding, cloud, web services, problem solving, and agile methodologies. Okoth concluded that the experience was important for their IT career and recommended establishing stronger partnerships between
This document outlines the requirements and procedures for a student internship logbook. It explains that the internship will be assessed based on supervisor evaluations, the student report, and the logbook. The logbook is to be used by students to record their daily activities and skills learned. Supervisors will provide weekly comments and an overall evaluation. Students must notify their placement, submit weekly summaries, and get approval for any changes. They are also expected to create an organization chart and report on their experiences at the end of the internship. The document provides forms for students to document their placement details, progress each week, and overall reflections.
This document provides details about Julius Kipchumba Kemboi's industrial attachment report at Mount Kenya University Eldoret campus. It includes sections on the background of Mount Kenya University, Julius' experiences and tasks during the attachment, the skills and competencies he acquired, and challenges faced. The main tasks Julius performed were assisting with computer repairs and maintenance, setting up new computers, and helping students. He gained skills in troubleshooting, networking, and customer service. Some challenges included technical issues and a heavy workload. In conclusion, Julius states it was a great learning experience despite the challenges.
This is my report that i did for my industrial placement or what one would call internship. It has some detailed information that can help anyone in the field of IT.
It has all sorts of topics like networks, systems administration and many others.
This document contains a career profile for a network and system administration professional. It includes a career objective, summary of skills and technical skills. The candidate has over 6 years of experience in roles such as network engineer, system administrator and desktop support engineer. They have extensive skills in networking, system administration, hardware maintenance and various operating systems like Linux, Windows and MS-DOS. Their professional experience includes positions at the Indian Institute of Technology Jaipur, CompuVision Service Center and AnjumComputer Clinic, where they performed duties such as network administration, server management, technical support and service engineering.
The document provides details about the intern's 3-month industrial attachment at the Centre for National Culture in Accra, Ghana. It includes:
- An introduction to the Centre including its mission, departments, staff size, and district offices.
- A description of the intern's duties in various departments like accounting, marketing, and procurement. This involved tasks like data entry, client services, and stock management.
- New knowledge gained around negotiating with customers and handling pressures.
- Challenges faced such as low funds and persuading customers.
- Contributions made by providing additional support and recommendations.
- General observations of employee attitudes and impressions of the learning experience.
Final Internship Report by kiyimba Bill (International University Of East Afr...Bill Kiyimba
Â
An Internship / Field Attachment report sample format for fulfillment of the requirements of the degree in Software engineering, Computer science and Information Technology.
Kaaahwa Armstrong completed a field attachment at Uganda Broadcasting Corporation (UBC) from June to August 2016. During this time, they worked under the supervision of several managers in the IT department. Their duties included networking tasks like cable termination, router configuration, and setting up local area networks. They also installed and configured operating systems, databases, and websites. Through hands-on experience with computer repair, networking, and software installation, Armstrong gained valuable practical skills to supplement their university computer science education. While the attachment provided valuable learning opportunities, challenges included limited equipment and understanding new technical concepts. Overall, the internship helped Armstrong apply their academic knowledge in a real-world work environment.
The document is a report submitted by Isaac Murambi Muchika on his 3-month industrial attachment at Africa Merchant Assurance Company Limited (AMACO). The report provides an overview of AMACO, including that it is a leading general insurance company in Kenya established in 2000. It also describes the student's responsibilities in the Underwriting department, including policy scheduling, issuance of certificates, documentation, and preparation of quotations. The report evaluates the student's experience at AMACO and provides recommendations to improve the company's operations.
The document is an industrial attachment report submitted by a student from Koforidua Polytechnic. It summarizes the student's 6-week attachment with Adolescent Friendly & Peer Educators Organization (AFPEO) in Odumase Krobo, Ghana.
The student was appointed as the project coordinator and was involved in various activities including requisitioning funds, collecting and analyzing health data, presenting reports, and monitoring project activities. The report provides details on the organization's background, operations, and the student's responsibilities and contributions during the attachment period.
Computer science industrial training report carried out at web info net ltd ...rashid muganga
Â
The intern disassembled and assembled a computer system at Web Info-Net Ltd. This involved disconnecting cables, removing components like the motherboard, RAM, hard drive and installing them in reverse order. The intern also performed tasks like installing operating systems, networking, web development, and Linux administration to gain practical skills in various areas of IT. The 3 month internship helped the intern develop both knowledge and skills to prepare for employment in the field of computer science.
INDUSTRIAL ATTACHMENT REPORT BBM_11_11_12Brian Bor
Â
The document is an industrial attachment report submitted by Brian Kiprotich Bor to fulfill requirements for a Bachelor of Business Management degree. It details his 3-month attachment at the Human Resource department of Kenya Revenue Authority. The report includes an introduction to KRA and its HR department, a description of tasks performed during the attachment, an analysis of skills and knowledge gained, and recommendations.
This document provides details of the author's field attachment at Prideland Tours and Travel (PT&T) in Kisumu, Kenya. It describes the background of PT&T including its vision, mission, and target groups. It then outlines the general activities performed during the attachment such as office administration, customer relationship management, and client bookings. Specifically, it details modules completed including software installation, schedule and restore backups, and data recovery tasks. The report provides insights into the skills and experience gained from the attachment.
Innocent Nsengimana completed a 10-week industrial attachment from June 11th to August 24th, 2018 with Expand Engineering Services Ltd. During this time, he gained practical experience in various civil engineering tasks related to the construction of classrooms in Nyabihu District, including setting out, steel reinforcement, carpentry works, masonry, and concreting operations. He also increased his knowledge of teamwork, time management, and working under pressure through participating in the construction project. The report evaluates the training and makes recommendations to improve future internship programs.
The document provides details of the author's industrial placement as an IT technician at a high school. During the placement, the author undertook various IT support tasks including imaging computers, creating user accounts, troubleshooting issues, and installing software. The author also began a mini-project to set up a virtual Linux network to mimic the school's system but was unable to complete it due to time constraints. The document describes several software programs used at the school such as Microsoft Deployment Toolkit, Request Tracker, and PaperCut.
The document provides details about the author's internship at Kaz Software Limited. It discusses the company profile including services provided, tools and technologies used, office location and culture. It also outlines two projects the author worked on around bug fixing and feature development. The author reflects on learning new skills and technologies as well as professional and personal growth during the internship experience.
Industrial Report - Ndlovu Kevin MehluliKevin Ndlovu
Â
This document is an industrial attachment report submitted by Ndlovu Kevin Mehluli for their Diploma in Computer Science from Swaziland College of Technology. The report provides details of Kevin's 12-week internship at Informatics Africa, including an overview of the company, descriptions of their main work areas in customer care, testing, networking and other duties, and highlights of major tasks completed in networking, testing and server technology. The report is organized into chapters with an introduction, general outline of the company, work area descriptions and details of major completed tasks.
The document summarizes the student's 8-week industrial attachment at the Kenya Forest Service Headquarters. The student was attached to the Information Center department, which handles GIS and IT functions. During the attachment, the student digitized forest maps, created a spatial database of forest information, helped implement a new Forest Management Information System, and verified data using satellite imagery. The student gained experience applying GIS skills and found the attachment reinforced their interest in pursuing a career in geomatics engineering. Some challenges included learning new software and limited computer access, but these were overcome through observation, participation, and discussion with officers. Overall, the attachment was a success in providing real-world work experience relevant to the student's field of study.
This is my technical report on my 6 months Industrial Training on Web Design (i.e HTML, CSS, JAVASCRIPT, PHP, DATABASE) using the format as stated in the SIWES Hand Book.
This document provides background information on ResilientAfrica Network (RAN) and the internship program. It describes the objectives of industrial training and RAN's mission to promote resilience in Africa. The internship focused on RAN's Eastern Africa Resilience Innovation Lab (EARILab), which develops technologies and solutions. It involved learning about RAN's communication network, projects, and transforming their website using the Joomla content management system to make it more user-friendly.
The document is an internship report submitted by Brhane Fitsum detailing their 4 month internship at the Adigrat University ICT/Data Center in Ethiopia. It provides an overview of the university and ICT center, outlines Brhane's duties which included analyzing the campus network infrastructure and designing improvements, and describes tasks like configuring switches, implementing VLANs, and setting up IP networking. The report evaluates Brhane's experience and performance during the internship.
This document outlines an internship report for an internship completed at the Advanced Vocational Training Centre (AVTC) in Limbe, Cameroon. Over the course of 8 weeks, the intern learned skills including assembling and disassembling computers, building network cables, network configuration using Cisco Packet Tracer, troubleshooting laptop issues, resetting passwords, graphic design, computer security, and database management. The internship provided beneficial work experience and mentorship. Challenges included electricity outages and limited workspace, but the intern recommends the program and suggests obtaining a generator.
This document provides an overview of computer science topics including the history and evolution of computers from early machines like ENIAC that used punch cards to modern mobile and user-friendly computers. It discusses key concepts like computer literacy, the world wide web, software development, and major hardware components of computers like the central processing unit, motherboard, hard drive, RAM, and video/sound cards. The document traces how computers and technology have advanced significantly from early machines to what we have now and enabled new ways of connecting to the internet and each other.
This document contains a career profile for a network and system administration professional. It includes a career objective, summary of skills and technical skills. The candidate has over 6 years of experience in roles such as network engineer, system administrator and desktop support engineer. They have extensive skills in networking, system administration, hardware maintenance and various operating systems like Linux, Windows and MS-DOS. Their professional experience includes positions at the Indian Institute of Technology Jaipur, CompuVision Service Center and AnjumComputer Clinic, where they performed duties such as network administration, server management, technical support and service engineering.
The document provides details about the intern's 3-month industrial attachment at the Centre for National Culture in Accra, Ghana. It includes:
- An introduction to the Centre including its mission, departments, staff size, and district offices.
- A description of the intern's duties in various departments like accounting, marketing, and procurement. This involved tasks like data entry, client services, and stock management.
- New knowledge gained around negotiating with customers and handling pressures.
- Challenges faced such as low funds and persuading customers.
- Contributions made by providing additional support and recommendations.
- General observations of employee attitudes and impressions of the learning experience.
Final Internship Report by kiyimba Bill (International University Of East Afr...Bill Kiyimba
Â
An Internship / Field Attachment report sample format for fulfillment of the requirements of the degree in Software engineering, Computer science and Information Technology.
Kaaahwa Armstrong completed a field attachment at Uganda Broadcasting Corporation (UBC) from June to August 2016. During this time, they worked under the supervision of several managers in the IT department. Their duties included networking tasks like cable termination, router configuration, and setting up local area networks. They also installed and configured operating systems, databases, and websites. Through hands-on experience with computer repair, networking, and software installation, Armstrong gained valuable practical skills to supplement their university computer science education. While the attachment provided valuable learning opportunities, challenges included limited equipment and understanding new technical concepts. Overall, the internship helped Armstrong apply their academic knowledge in a real-world work environment.
The document is a report submitted by Isaac Murambi Muchika on his 3-month industrial attachment at Africa Merchant Assurance Company Limited (AMACO). The report provides an overview of AMACO, including that it is a leading general insurance company in Kenya established in 2000. It also describes the student's responsibilities in the Underwriting department, including policy scheduling, issuance of certificates, documentation, and preparation of quotations. The report evaluates the student's experience at AMACO and provides recommendations to improve the company's operations.
The document is an industrial attachment report submitted by a student from Koforidua Polytechnic. It summarizes the student's 6-week attachment with Adolescent Friendly & Peer Educators Organization (AFPEO) in Odumase Krobo, Ghana.
The student was appointed as the project coordinator and was involved in various activities including requisitioning funds, collecting and analyzing health data, presenting reports, and monitoring project activities. The report provides details on the organization's background, operations, and the student's responsibilities and contributions during the attachment period.
Computer science industrial training report carried out at web info net ltd ...rashid muganga
Â
The intern disassembled and assembled a computer system at Web Info-Net Ltd. This involved disconnecting cables, removing components like the motherboard, RAM, hard drive and installing them in reverse order. The intern also performed tasks like installing operating systems, networking, web development, and Linux administration to gain practical skills in various areas of IT. The 3 month internship helped the intern develop both knowledge and skills to prepare for employment in the field of computer science.
INDUSTRIAL ATTACHMENT REPORT BBM_11_11_12Brian Bor
Â
The document is an industrial attachment report submitted by Brian Kiprotich Bor to fulfill requirements for a Bachelor of Business Management degree. It details his 3-month attachment at the Human Resource department of Kenya Revenue Authority. The report includes an introduction to KRA and its HR department, a description of tasks performed during the attachment, an analysis of skills and knowledge gained, and recommendations.
This document provides details of the author's field attachment at Prideland Tours and Travel (PT&T) in Kisumu, Kenya. It describes the background of PT&T including its vision, mission, and target groups. It then outlines the general activities performed during the attachment such as office administration, customer relationship management, and client bookings. Specifically, it details modules completed including software installation, schedule and restore backups, and data recovery tasks. The report provides insights into the skills and experience gained from the attachment.
Innocent Nsengimana completed a 10-week industrial attachment from June 11th to August 24th, 2018 with Expand Engineering Services Ltd. During this time, he gained practical experience in various civil engineering tasks related to the construction of classrooms in Nyabihu District, including setting out, steel reinforcement, carpentry works, masonry, and concreting operations. He also increased his knowledge of teamwork, time management, and working under pressure through participating in the construction project. The report evaluates the training and makes recommendations to improve future internship programs.
The document provides details of the author's industrial placement as an IT technician at a high school. During the placement, the author undertook various IT support tasks including imaging computers, creating user accounts, troubleshooting issues, and installing software. The author also began a mini-project to set up a virtual Linux network to mimic the school's system but was unable to complete it due to time constraints. The document describes several software programs used at the school such as Microsoft Deployment Toolkit, Request Tracker, and PaperCut.
The document provides details about the author's internship at Kaz Software Limited. It discusses the company profile including services provided, tools and technologies used, office location and culture. It also outlines two projects the author worked on around bug fixing and feature development. The author reflects on learning new skills and technologies as well as professional and personal growth during the internship experience.
Industrial Report - Ndlovu Kevin MehluliKevin Ndlovu
Â
This document is an industrial attachment report submitted by Ndlovu Kevin Mehluli for their Diploma in Computer Science from Swaziland College of Technology. The report provides details of Kevin's 12-week internship at Informatics Africa, including an overview of the company, descriptions of their main work areas in customer care, testing, networking and other duties, and highlights of major tasks completed in networking, testing and server technology. The report is organized into chapters with an introduction, general outline of the company, work area descriptions and details of major completed tasks.
The document summarizes the student's 8-week industrial attachment at the Kenya Forest Service Headquarters. The student was attached to the Information Center department, which handles GIS and IT functions. During the attachment, the student digitized forest maps, created a spatial database of forest information, helped implement a new Forest Management Information System, and verified data using satellite imagery. The student gained experience applying GIS skills and found the attachment reinforced their interest in pursuing a career in geomatics engineering. Some challenges included learning new software and limited computer access, but these were overcome through observation, participation, and discussion with officers. Overall, the attachment was a success in providing real-world work experience relevant to the student's field of study.
This is my technical report on my 6 months Industrial Training on Web Design (i.e HTML, CSS, JAVASCRIPT, PHP, DATABASE) using the format as stated in the SIWES Hand Book.
This document provides background information on ResilientAfrica Network (RAN) and the internship program. It describes the objectives of industrial training and RAN's mission to promote resilience in Africa. The internship focused on RAN's Eastern Africa Resilience Innovation Lab (EARILab), which develops technologies and solutions. It involved learning about RAN's communication network, projects, and transforming their website using the Joomla content management system to make it more user-friendly.
The document is an internship report submitted by Brhane Fitsum detailing their 4 month internship at the Adigrat University ICT/Data Center in Ethiopia. It provides an overview of the university and ICT center, outlines Brhane's duties which included analyzing the campus network infrastructure and designing improvements, and describes tasks like configuring switches, implementing VLANs, and setting up IP networking. The report evaluates Brhane's experience and performance during the internship.
This document outlines an internship report for an internship completed at the Advanced Vocational Training Centre (AVTC) in Limbe, Cameroon. Over the course of 8 weeks, the intern learned skills including assembling and disassembling computers, building network cables, network configuration using Cisco Packet Tracer, troubleshooting laptop issues, resetting passwords, graphic design, computer security, and database management. The internship provided beneficial work experience and mentorship. Challenges included electricity outages and limited workspace, but the intern recommends the program and suggests obtaining a generator.
This document provides an overview of computer science topics including the history and evolution of computers from early machines like ENIAC that used punch cards to modern mobile and user-friendly computers. It discusses key concepts like computer literacy, the world wide web, software development, and major hardware components of computers like the central processing unit, motherboard, hard drive, RAM, and video/sound cards. The document traces how computers and technology have advanced significantly from early machines to what we have now and enabled new ways of connecting to the internet and each other.
David Epperson interned at Energizer Holdings for 12 weeks where he gained hands-on experience in server administration, networking, end-user support, and information security. Over the course of the internship, he learned to build virtual machines, configure Hyper-V clusters, set up new phone systems, track assets, help desk support, and more. The internship provided valuable experience beyond his coursework and better prepared him for an IT career.
1. The roommate configured the printer on his computer to be shared, but now that he is gone the printer is no longer available on the network.
2. When installing a new video game and nothing happens, the next step is to check that the installation disc is free of scratches or defects and ensure the computer meets the minimum requirements.
3. If a portable media player is reporting low battery soon after being charged, it could be a sign the battery is failing and needs replacing.
4. To determine if an older operating system can run new software, check the software's minimum system requirements against the computer's specifications.
5. If an optical disc won't be read, the disc may
5 assessment instrument evidence_ tos_ written t_est_etcMCabz1
Â
1. The document outlines an evidence plan and assessment for the qualification of Computer System Servicing – NC II.
2. It details the units of competency that will be covered, including installing and configuring computer systems.
3. Evidence of skills will be collected through observation, demonstration, questioning, and portfolios.
4. The assessment includes a written test covering operating systems, installation procedures, multimedia, peripherals, and software application.
The document discusses the role and responsibilities of a network administrator. It describes how computers are now integrated into many organizational systems and must operate reliably to support functions like phone systems, heating, and more. As a network administrator, key responsibilities include installing and upgrading software and hardware, troubleshooting issues, monitoring systems for security and performance, and ensuring critical infrastructure like servers and backups are functioning properly. Attention to detail, ability to think ahead and consider many scenarios, and strong documentation skills are important for the job.
Case study instructions director’s request for p cs complete solutions correc...Song Love
Â
Case Study Instructions Director’s Request for PCs complete solutions correct answers key
Find the solution at
http://www.coursemerit.com/solution-details/15234/Case-Study-Instructions-Directors-Request-for-PCs-complete-solutions-correct-answers-key
The document discusses advanced troubleshooting techniques for various computer components. It describes six steps for advanced troubleshooting of computer components and peripherals: 1) identify the problem, 2) establish a theory of probable cause, 3) test the theory, 4) establish a plan of action, 5) verify functionality, and 6) document findings. Common problems and solutions are provided for operating systems, networks, laptops, printers, and security. Lab exercises are included for hands-on practice of troubleshooting various issues.
IT Essentials (Version 7.0) - ITE Chapter 11 Exam AnswersITExamAnswers.net
Â
This document provides the answers to exam questions for IT Essentials (ITE v6.0 + v7.0) Chapter 11. It includes 30 multiple choice questions covering topics like Windows file systems, control panel functions, Internet Explorer configuration, Windows events, RAID levels, boot issues, Active Directory group policy, and Windows file sharing options. The answers are meant to help students prepare for the ITE v6.0 + v7.0 Chapter 11 exam.
The document summarizes an internship at a county MIS department where the intern worked on several IT projects including setting up cubicles, recycling old data by destroying hard drives and tapes, building a "lamp server" running Ubuntu and WordPress, installing various software and upgrades, building a domain with a Windows server, and learning about networking equipment, applications, and telecommunications. The internship provided hands-on experience with servers, switches, computers, printers, and other IT equipment as well as applications like Windows, Linux, MySQL, PHP, and virtualization software.
The applicant is applying for a Desktop/Hardware & Network Engineer position. He has over 6 years of experience in technical support, hardware/network configuration, and troubleshooting. He is seeking a challenging role where he can utilize his education and experience in desktop support, networking, software installation, and ensuring company policies/procedures are followed. He has included his resume and contact information and is available to discuss the position further.
The document provides details of a lesson plan to teach students how to reformat a computer using Windows 7. The teacher engages students in a discussion about computer issues like viruses and the need to reformat. Key points that are covered include backing up important files, having the necessary Windows 7 installation files and product key, and steps for reformatting including setting the BIOS to boot from an installation device. The lesson concludes with a review of common reasons for reformatting a computer and important steps in the reformatting process.
Avinash Sanju Jaiswar is a Network Engineer with over 8 years of experience working in roles such as Broadcast Engineer and Manager Broadcasting. He has extensive experience installing, maintaining and troubleshooting networking hardware and software. Currently, he works as the Manager of Broadcasting at R-Vision India Pvt. Ltd., where he oversees daily operations and coordinates with vendors to ensure smooth operations.
Case study on Pamplona National High School Local Area NetworkJude Rainer
Â
The document proposes a centralized local area network for Pamplona National High School to address issues with their current computer network. It would include installing a server with services like DHCP, DNS, FTP, proxy, and web server to provide shared resources and improve security and management. A budget of 300,000 pesos is proposed to cover equipment, installation, and salaries for a system administrator and assistant to manage the new network over five years.
Scalable TensorFlow Deep Learning as a Service with Docker, OpenPOWER, and GPUsIndrajit Poddar
Â
This document discusses scaling TensorFlow deep learning using Docker, OpenPOWER systems, and GPUs. It provides an overview of distributing TensorFlow in a cluster with parameter servers and worker nodes. Example Dockerfiles are shown for creating deep learning images. The discussion also covers infrastructure components like Docker, OpenStack, and Mesos for managing compute resources in a deep learning cluster as a service.
An operating system manages computer hardware and software resources and provides a consistent way for applications to interact with hardware without needing to know specific hardware details. Real-time operating systems are optimized for time-sensitive and embedded applications. Popular operating systems include Windows, macOS, and Linux distributions like Ubuntu. Each has advantages and disadvantages for different use cases like desktop, server, or development environments. Key factors to consider when choosing an operating system include cost, security, stability, supported hardware, available software and applications, and administrative needs.
Upgrading to a new laptop powered by Intel Core i5, Pentium, or Celeron proce...Principled Technologies
Â
Whether you notice it or not, little seconds of your day spent waiting on an aging laptop can add up quickly. A few here, a few there—before you know it, you’ve lost valuable time that could have been used elsewhere. Thanks to advances in processor technology, laptops powered by the newer generation of Intel Core i5, Pentium, and Celeron processors are quicker than laptops from 2010, which can translate to better performance and longer battery life. In our testing, we found that with each of these Intel processor families, replacing a four-year-old laptop with a laptop using the newer-generation processor boosted both responsiveness and battery life. Don’t keep waiting—update your laptop to one with a 2014 Intel processor to do more and wait less.
The document provides instructions for an assessment of an ICT support candidate. The candidate will complete 4 projects testing their skills in connecting hardware, installing software, protecting systems, and responding to user requests. They have 2 hours and 30 minutes to complete the projects which will assess their competencies in areas like installing applications, setting up security features, and creating user accounts. The projects involve tasks like connecting devices, installing antivirus software, and prioritizing support requests from different departments.
The document defines a computer as a programmable machine that can execute a set of instructions in a well-defined manner and can run prerecorded programs. It discusses the key characteristics of computers including their speed, storage capacity, accuracy, and versatility. The document also outlines the main parts of a computer including the screen, monitor, mouse, system unit, keyboard, speaker, and microphone. Finally, it categorizes different types of computers such as super computers, mainframe computers, minicomputers, and microcomputers.
Similar to Student's industrial attachment logbook (20)
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Â
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Â
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Â
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Â
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
Â
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Jeffrey Haguewood
Â
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on automated letter generation for Bonterra Impact Management using Google Workspace or Microsoft 365.
Interested in deploying letter generation automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfflufftailshop
Â
When it comes to unit testing in the .NET ecosystem, developers have a wide range of options available. Among the most popular choices are NUnit, XUnit, and MSTest. These unit testing frameworks provide essential tools and features to help ensure the quality and reliability of code. However, understanding the differences between these frameworks is crucial for selecting the most suitable one for your projects.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Â
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
Â
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Â
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. 🚀 This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. đź’»
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. 🖥️
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. 🌟
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
Â
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
Â
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Â
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
1. INDUSTRIAL ATTACHMENT LOGBOOK
NAME: PAULLASTER AMOLO OKOTH
REGISTRATION NUMBER: CIT-221-057/2017
LEVEL OF STUDY: UNDERGRADUATE
DEPARTMENT: INFORMATION TECHNOLOGY
COURSE: BSC. INFORMATION TECHNOLOGY
STATION: MULTIMEDIA UNIVERSITY OF KENYA
PERIOD: 06/05/2019- 06/08/2019
REPORT SUBMITTED IN PARTIAL FULFILLMENT OF THE
REQUIREMENTS FOR THE AWARD OF DEGREE IN BACHELOR OF
SCIENCE IN INFORMATION TECHNOLOGY.
SUBMITTED TO THE DEPARTMENTOFINFORMATION TECHNOLOGY.
DATE OF SUBMISSION: 14TH
SEPTEMBER 2019
2. WEEK 1
DATE/DAY WORK DONE HOURS
WORKED
REMARKS BY INTERNS
Monday Sharing printer among the staff
on the network.
Configuring network connectivity
and internet access in the
computer lab
8 hours
Successfully learned to configure
printers.
Learned to troubleshoot network
connectivity.
Tuesday Added the computers in the lab to
the student domain.
Updating Kaspersky antivirus
database.
Installed SPSS software for data
analysis.
8 hours
Learned how to join computers to
active directory.
Wednesday Installation of Epson printer
drivers.
Sharing hp printer among staff.
8 hours
Successfully learned working
with printers.
Thursday Installed Microsoft ERP
(enterprise Resource Planning)
software solution on a staff
computer.
Recovering staff password.
Solving boot loop for a staff PC.
8 hours
Learned configure different
software and diversity of
software.
Friday Troubleshooting ETR printer.
Dual booting PC in the computer
lab.
Installation of software on the PC
in the computer lab.
Rebooted the router to
troubleshoot internet access.
8 hours
Successfully learned how to
operate ETR printers.
Learned how to troubleshoot
internet access.
Saturday
Remarks by
Supervisor
Field Supervisor Signature………………………………………… Date ………………………….
3. WEEK 2
DATE/DAY WORK DONE HOURS
WORKED
REMARKS BY INTERN
Monday Rebooted a student’s DHCP
server.
Configured network access in
library E-resource section.
Installed windows on PCs in the
lab.
Installed eNPS software on PC in
the lab to aid comfortable
learning in the lab.
8 hours
Successfully learned how a
DHCP server works and leases IP
addresses
Learned how to work with virtual
networking tools
Tuesday Crimping Ethernet cables.
Setting up and configuring and
router.
Recovered a staff password.
Troubleshooted an ETR printer at
conference.
Troubleshooting a printer that
was not able to print and shared it
among staff PC.
8 hours
Learned different ways of
crimping and learned how to
crimp Ethernet cables.
Wednesday Troubleshooted internet access in
the security office.
Restarted a switch for the
network line that was done.
8 hours
Learned troubleshooting internet
access.
Learned how to operate a switch.
Thursday Installed Hp printer on staff PC
and shared it among the staff.
Installed Epson L850 on staff PC
and shared it among staff PCs
Troubleshooted HP printer that
was unable to print in the game’s
office.
8 hours
Learned successfully how to
handle and operate printers from
different vendors.
Friday Troubleshooted a printer that was
unable to print in the business
department.
Troubleshooted a staff PC that
was too slow.
Formatted a staff PC affected
with virus after backing up her
files and documents.
8 hours
Learned how to troubleshoot slow
running PCs.
Saturday
Remarks by
Supervisor
Field Supervisor Signature………………………………………… Date ………………………….
4. WEEK 3
DATE/DAY WORK DONE HOURS
WORKED
REMARKS BY INTERN
Monday Setting up and managing domain
account.
Troubleshooted a PC that was not
able to turn on due to hardware
failure.
Installed Windows 7 on staff PC.
Troubleshooted network problem
on a staff PC at the printing press
department.
8 hours
Successfully learned how to work
with active directory.
Learned how to install Microsoft
Windows operating System.
Tuesday Configured a Cisco switch.
Configured a Comfast router.
Troubleshooted internet access on
a staff PC.
Rebooted a staff server that was
down.
8 hours
Learned how to and successfully
configured an access point.
Wednesday Joined a staff PC to the staff
network domain.
Troubleshooted a Laptop that was
unable to boot because of
corrupted files on the command
prompt by use of commands and
transferred the configuration files
and security files to a
configuration folder.
8 hours
Learned troubleshooting PC
booting problems and
successfully solved the problem.
Thursday Installed Windows 10 operating
system on a staff PC.
Installed Ubuntu 18.04LTS
operating system on interns PC.
Configured Ubuntu operating
System repositories.
8 hours
Learned how to install Microsoft
Windows operating system.
Learned how to dual boot
operating system on PCs
Friday Installed Hp printer drivers on
staff PC and shared the printer
among the staff.
Troubleshooting network
connection and internet access on
a staff PC and Joined the staff PC
to the domain.
8 hours
Learned to troubleshoot advanced
network connectivity problems.
Learned how to troubleshoot
advanced printer problems.
Saturday
Remarks by
Supervisor
Field Supervisor Signature………………………………………… Date ………………………….
5. WEEK 4
DATE/DAY WORK DONE HOURS
WORKED
REMARKS BY INTERN
Monday Troubleshooted hard disk failure
on intern PC.
Configured Cisco router.
Formatted a staff PC after
backing up the data and files that
were on the PC.
Rebooted the staff that was down
and inaccessible.
8 hours
Learned how to successfully
troubleshoot hard disk failure.
Learned to successfully configure
Cisco access point.
Tuesday Deleted user temporary files and
cleared the recycle bin for PCs in
the computer lab that were
running slow.
Updating network drivers for a
staff PC that had no network and
access to the internet.
Troubleshooted network
inaccessibility problem at the
conference reception
8 hours
Removed temporary files and the
machine started running faster.
Learned how to update utility
programs and software drivers on
a PC.
Wednesday Checking the status of PCs in lab
to enhance efficient learning in
the lab.
Installing printer drivers on a
staff PC and sharing the printer
among staffs on the network.
Updated Kaspersky on a staff PC.
8 hours
Successfully shared printer
among staffs PC.
Thursday Troubleshooted a network printer
by removing and adding it back
on the PC from the network.
Installed Adobe package suite on
PC in the computer lab.
Formatted a staff PC that was
running slow after backing up the
data and files.
8 hours
Learned how to operate network
printer and successfully
troubleshooted the problem.
Friday Recovered a staff password.
Deleted user accounts on a staff
PC that was running slow.
Installed windows on a staff
laptop and updated all drivers.
Configured a D links router.
8 hours
Learned how to support other
staff workers and successfully
recovered the password.
Saturday
Remarks by
Supervisor
Field Supervisor Signature………………………………………… Date ………………………….
6. WEEK 5
DATE/DAY WORK DONE HOURS
WORKED
REMARKS BY INTERN
Monday Installed hp printer driver on a
staff PC.
Installed GroupWise on a staff
PC.
Troubleshooted a printer which
was unable to print when
connected to a laptop by
installing the drivers on the
laptop.
8 hours
Learned how to install and
configure software.
Troubleshooted printer problem
successfully and it printed.
Tuesday Documentation of all computers
and all computers devices.
Troubleshooted a PC which was
not able to boot successfully by
disassembling hardware and
connection cables.
8 hours
Learned and understood the
function and operation of the
mother components.
Wednesday Setting up computer and installed
Microsoft Dynamic (NAV).
Troubleshooted network
connectivity and access to the
internet on a staff PC.
Installing software on PC in the
computer lab.
Learned how to successfully
troubleshoot network
connectivity and internet access.
Thursday Configuring Ubiquity router.
Installing hp printer drivers on a
staff PC.
Installing GroupWise on a staff
PC.
Formatted a PC in the library e-
learning section and installed
software.
8 hours
Learned how to configure access
to the printer.
Learned how to safely format PC.
Friday Deleted temporary files and
emptied recycle bin.
Crimped patch connection cables.
Updated Kaspersky antivirus
database.
Installed MATLAB software on a
staff laptop.
Re-installed printer software.
8 hours
Learned how to install and
learned how MATLAB software
functions.
Saturday
Remarks by
Supervisor
Field Supervisor Signature………………………………………… Date ………………………….
7. WEEK 6
DATE/DAY WORK DONE HOURS
WORKED
REMARKS BY INTERN
Monday Troubleshooted UPS that was
emitting bad smell by
disconnecting power from the
UPS and leaving it to cool.
Installation of windows 7 on a
staff PC.
8 hours
Learned about UPS and learned
how to troubleshoot problems
involving.
Tuesday Installed windows 7 on a staff PC
and installed application
software.
Troubleshooted network
connectivity and access to the
internet.
Installed hp scanner jet on a staff
PC.
8 hours
Learned how to troubleshoot
network connectivity.
Learned how to install hp scanner
on a PC.
Wednesday Troubleshooted network
connectivity and internet access.
Troubleshooted a keyboard that
was not responding to button
press by changing keyboard
setting and updating keyboard
drivers.
8 hours
Learned how to successfully
troubleshoot computer
peripherals problems.
Thursday Helped a staff who was not able
to logon GroupWise to login by
correcting the username for the
staff.
Installed Microsoft Dynamics on
a staff PC.
Joined new staff account to the
domain.
8 hours
Successfully provided support to
staff.
Successfully worked with active
directory. .
Friday Retrieved backed up files for a
staff whose PC was formatted.
Shared a printer among staff by
installing the printer on one PC
and enabled sharing option to
make it visible to other PC on the
network and added it to the other
PCs. Updated Kaspersky database
on staff PC.
8 hours
Learned how to safely format PC.
Learned troubleshooting advance
printer problems.
Successfully updated Kaspersky
database and enhanced protection
to the PC.
Saturday
Remarks by
Supervisor
Field Supervisor Signature………………………………………… Date ………………………….
8. WEEK 7
DATE/DAY WORK DONE HOURS
WORKED
REMARKS BY INTERN
Monday Joined a staff computer to staff
network domain.
Installed windows 7 on a staff PC
and added it to the staff network
domain.
Installed hp printer drivers on a
staff PC.
8 hours
Learned how to troubleshoot
window missing drivers and I
successfully installed and updated
drivers for newly installed
windows 7.
Tuesday Installed Epson printer drivers on
a staff and shared it among staff.
Troubleshooted network
connectivity and access to the
internet.
Updated Kaspersky antivirus
database which was out of date
8 hours
Learned how to add and share
printer over the network.
Learned how to troubleshoot
network connectivity and internet
problems.
Wednesday Updated Ethernet drivers for
network adapter and enabled the
settings to troubleshoot network
connectivity on a staff PC.
Troubleshooted a hp printer that
was not able to print by removing
it and adding it on the PC.
8 hours
Learned how to troubleshoot
LAN connection problems.
Learned how to perfectly solve
and troubleshoot advanced printer
problems.
Thursday Formatted a staff PC that was
running slow after backing up the
data.
Installed windows 10 on a staff
PC and joined the PC to the
domain.
Configured a Cisco switch in the
server room to be able to set a
port as an access point.
8 hours
Learned how to configure and
configured successfully a Cisco
access point.
Perfectly installed windows 10
and added the basic software.
Friday Troubleshooted a PC that was not
able to boot up successfully by
configuring files and transferring
corrupted files using command
prompt. Formatted a staff PC to
eradicate all the virus that had
corrupted all the computer files
and software. Shared a network
printer among staff’s PC.
8 hours
Successfully troubleshooted
booting problems and transferred
the corrupted folders to other
folders successfully using the
command prompt.
Saturday
Remarks by
Supervisor
Field Supervisor Signature………………………………………… Date ………………………….
9. WEEK 8
DATE/DAY WORK DONE HOURS
WORKED
REMARKS BY INTERN
Monday Configuring and setting a router.
Troubleshooted network
connectivity and internet access.
Installing hp printer driver
software on a staff PC and shared
the printer among staff PCs.
Configuring switch in the server
room.
8 hours
Successfully configured router.
Learned installing printers’
different vendors.
Learned how to configure a
switch and successfully
configured a switch.
Tuesday Installing GroupWise software on
a staff PC.
Updating Kaspersky antivirus
database. Troubleshooting a
printer that was not able to print.
Diagnosing network connectivity
on a staff PC.
8 hours
Successfully installed group wise
and learned how it works to
connect all staffs.
Successfully troubleshooted
network connection and internet
access.
Wednesday Documenting status of PCs in the
computer lab.
Deleting of temporary files on PC
and emptying the recycle bin.
Recovering a staff password.
8 hours
Learned various ways to solve
slowly running PC.
Learned how to recover
passwords on a PC.
Thursday Formatting a staff PC after
backing up the files and data that
were stored on the hard disk.
Installing Microsoft Dynamic
software on a staff PC.
Troubleshooting a printer that
was not able to print and shared it
among the staff’s PCs.
8 hours
Learned how to safely slave a
hard disk to back up data to other
hard disk and formatted
successfully without losing any
file or data.
Friday Troubleshooting boot loop on a
staff PC. Troubleshooting a
Laptop that could not boot up
successfully.
Deleting user accounts on a PC
that was running slow.
Joined a staff PC to staff network
domain.
Diagnosing network connectivity
problem and access to the
internet.
8 hours
Learned how to solve stack boot
loop on PC.
Learned how to troubleshoot
slowly running PC by deleting
user accounts.
Learned how to troubleshoot
network connectivity and internet
access problems.
Saturday
Remarks by
Supervisor
Field Supervisor Signature………………………………………… Date ………………………….
10. STUDENT’S WEEKLY REPORT (WEEK 1)
May 06, 2019 through May 10, 2019.
After orientation by the supervisor on the first day, my first task was to share a printer among staff
in the same office. I first disconnected the printer cable from the PC. I inserted a DVD-CD with the
appropriate software for the printer in the DVD driver on the PC and executed the executable file. I
connected the printer cable when prompted for by a screen in the installation process and the printer
was detected. I installed the drivers successfully. I viewed my printer and devices from the control
panel and set the printer as default and printed a taste page in the printer properties. I checked the
sharing option in advanced settings and changed the printer sharing name that was appropriate and
easy to identify as per the department.
I then went to other PCs for other staffs and first pinged on the command the IP address of the PC
on which the printer was installed to check if they were able to communicate and whether they were
on the same network.
On the run window I inserted the name of the PC on which the printer was installed clicked on the
printer and it was added to this PC and set it as a default printer after printing a test page with this
PC to confirm connectivity.
Interacting with printer greatly contribute to my understanding of computer peripherals and getting
used to real life electronic and technology devices and tools that make up to support business and
office activities.
It was interesting learning how to connect and share printer and it was a big challenge to me being
that it was my first day working with printers.
I learned how to share resources and files in offices and business areas and how to work with
printers.
I got used to the computer, printers and successfully connected printers and shared it among staff.
It was a great experience and I recommend that the unit of computer fundamentals should be
extended to capture computer peripherals to give students prior experience with computer
peripherals.
Student Signature …………………………………………… Date ……………………………….
11. STUDENT’S WEEKLY REPORT (WEEK 2)
May 13, 2019 through May 17, 2019
Crimping Ethernet cables using RJ45 was the major task on my second week. Under the
instructions, I crimped Ethernet cables that were to use to set up access point. Here I learned to
major crimping standards, that is; T568A or T568B Wiring Standard. The T568A and T568B are
the two-color codes used for wiring eight-position RJ45 modular plugs. Both are allowed
under the ANSI/TIA/EIA wiring standards. The only difference between the two-color
codes is that the orange and green pairs are interchanged.
There are no transmission differences between T568A and T568B cabling schemes. North
America’s preference is for T568B. Both ends must use the same standard. It makes no difference to
the transmission characteristics of data.
T568B wiring pattern is recognized as the preferred wiring pattern.
Wiring an RJ45 to the T56B Specification
Learning to Crimped broadened my networking knowledge and made me understand how to
connect to networking devices such as hub, switch, routers and bridges.
I was greatly challenged in identifying and matching colors but it was a wonderful experience to
successfully crimp Ethernet cables.
It was a very important learning new skills, getting experience.
Interacting with the networking Ethernet cables, RJ45 gave me the real experience of the skills and
knowledge required of me in the job market.
I recommend to the faculty to introduce practical networking sessions and to set up at least one
networking lab for the student to get experience and test what they learn in class and get exposure
and hands-on skills required of them.
Student Signature ………………………………………. Date ………………………………….
12. STUDENT’S WEEKLY REPORT (WEEK 3)
May 20, 2019 through May 24, 2019
Troubleshooting computer boot loop successfully was a great experience on the third week of my
attachment. Boot Loop occurs when a specific change or damage to the computer's hardware or
software happens. When you turn on the computer and it fails to complete its booting (starting
sequence) it will enter a loop which means the starting sequence (boot) will run continuously and
repeatedly thus having a boot loop.
Troubleshooting this problem gave me a better understanding of the hardware and software issues.
This was the screen displayed on the monitor every time I boot. To solve this, I Attempted to boot in
Safe Mode, disabled auto-reboot function, and Attempt an in-place repair or a fresh install a new
operating system.
This problem became too hard to solve when executing commands on the command prompt
because I couldn’t get access to files that were corrupted.
I had a vast learning experience troubleshooting windows boot loop problems on the command
prompt and gained a lot of experience and understanding of hardware problems.
I recommend to friends to learn to work with windows power shell or command prompt.
Student Signature ……………………………………… Date ……………………………….
13. STUDENT’S WEEKLY REPORT (WEEK 4)
May 27, 2019 through May 31, 2019
Configuring a Cisco.
Configuring Global Parameters.
configure terminal
2. hostname name
3. enablesecret password
4. no ip domain-lookup
Configuring Gigabit Ethernet WAN Interfaces
configure terminal
2. interface gigabitethernet slot/port
3. ip address ip-address mask
4. no shutdown
5. exit
Configuring a Loopback Interface
configure terminal
2. interface type number
3. ip address ip-address mask
4. exit
Configuring Command-Line Access
configure terminal
2. line [aux| console |tty | vty] line-number
3. password password
4. login
5. exec-timeout minutes [seconds ]
6. line [aux| consoletty |vty] line-number
7. password password
8. login
9. end
Configuring a Cisco router broadened my networking proficiency and working knowledge of
routers, gateways and access point and how the broadcast.
I recommend to the faculty to introduce a lab session where student is practically taught to
configure access points and routers from different vendors.
15. STUDENT’S WEEKLY REPORT (WEEK 5)
June 3, 2019 through June 7 ,2019
My task this week was to troubleshoot network connectivity and access to the internet.
On troubleshooting I checked the following;
ď‚·Checked if proxy has been added to the browser or operating system;
ď‚·high-speed modem and/or router need resetting or is disconnected;
ď‚·Checked if the network cable was disconnected.
ď‚·computer needs to reboot;
ď‚·Firewall or software security misconfigured,
ď‚·Software is misconfigured for access to the Internet.
It was a quite challenging and frustrating problem to solve for the first time due to lack of
the knowledge of what might have caused the problem. Solving the problems made me
understand the role of Proxy.
Student Signature ……………………………………. Date ………………………………….
16. STUDENT’S WEEKLY REPORT (WEEK 6)
June 10, 2019 through June 14, 2019
Hardware problems such has hard disk failure, power supply problem, CMOS problems, UPS
producing bad smell was some of the interesting problems to solve which broadened my
understanding of computer hardware parts, role of hardware components, and fixing hardware
components into their right place.
This problem was ideal to acquiring a working knowledge of computers by first understanding
computer hardware which is the basics of computer.
Besides troubleshooting hardware problems, I learned how to format a PC safely after backing up
all important files and data where I learned why data need to backed up. Formatting a PC was
interesting solution to help eradicate all virus that affected the PC.
Student Signature …………………………………………. Date ……………………………...
17. STUDENT’S WEEKLY REPORT (WEEK 7)
June 17, 2019 through June 21, 2019
Software drivers besides Hardware adapters are essential for an operating system to efficiently
complete some tasks. For the operating system to accomplish like connecting to the internet,
connecting to nearby Bluetooth devices, the respective software drivers must be installed.
Microsoft windows operating system come with pre-installed drivers but in case of windows 7
drivers must be added after the operating system has successfully install. It was frustrating working
without network adapters for LAN and WAN and the USB adapters too were out of date which left
me with only DVD drive as the option to use to install driver pack to update USB drivers and
Network adapters.
Solving the problem gave me a vast experience of how to add and update missing drivers in a
situation where all the drivers are missing.
Solving a PC which was running slowly. From the past experience the only solution I knew was to
warm boot the PC which didn’t help solving this problem. I deleted all temporary files that might
have been making the PC to run slow after which I went to system configuration to check it was
virus that was eating into PC resources. I deleted the other user accounts to that might have stored
too much unnecessary files.
Student Signature …………………………………………. Date ……………………………….
18. STUDENT’S WEEKLY REPORT (WEEK 8)
June 24, 2019 through June 28, 2019
On the 8th week of my attachment I learned Active Directory. Active Directory (AD) is a Microsoft
product that consists of several services that run on windows server to manage permissions and
access to networked resources. active Directory stores data as objects. An object is a single element,
such as a user, group, application or device, such as a printer. Objects are normally defined as either
resource -- such as printers or computers -- or security principals -- such as users or groups.
Active Directory categorizes objects by name and attributes. For example, the name of a user might
include the name string, along with information associated with the user, such as passwords
and(Secure Shell (SSH)keys.
The main service in Active Directory is Domain Services (AD DS), which stores directory
information and handles the interaction of the user with the domain. AD DS verifies access when a
user signs into a device or attempts to connect to a server over a network. AD DS controls which
users have access to each resource. For example, an administrator typically has a different level of
access to data than an end user.
Working knowledge of active directory broadened my understanding of windows server and Ssh
server even though it seemed difficult to work with on the first encounter.
Student Signature ……………………………………………… Date …………………………….