SUPERVISOR NAME: CALISTO OYUGI MR. Signature ……………. … Date ………………………. DEDICATION This report is dedicated to my mother,Syprose Anyango for this is the fruit of her seed. ABSTRACT This report summarizes my life experiences with real life operations that I went through at Nairobi Aviation College. The duration of attachment was three months which I spent at the IT s department. It is in line with diploma in Information Technology that I compile this report that summarizes the relation of practical experience I gained to academic education.
Therefore, this report is a feedback to the Mawego Technical Training Institute. The Information Technology department where I was attached at comprised of the following sections Computer hardware and maintenance section Computer networking section Computer software section I gathered data through carrying out specific tasks, sharing ideas, observation and experimental work. The main goal behind this report is to give the conceptual view of the department and how it fits in the overall performance of the firm.
It is also an analysis, evaluation and assessment of whether the department is complying with the recommended IT practices. On the other hand it is there to summarize the extensive work experience that I was exposed to during my stay at KCA University. This report allows the reader to get the real feeling of how things happen in the IT department at KCA University. The intention of this report is to give a brief background of the Industrial Attachment programme as well as to give a report of the host company, its history, core business, present operations and future business prospects.
After the brief background, it will then move to main findings, recommendations and conclusion. ACKNOWLEDGEMENT First and for most, I thank the Almighty God for His unending tender guidance ,encouragement and protection He gave me to enable the successful completion of my three months attachment at Nairobi Aviation College. Apart from the efforts of myself, the success of any project depends largely on the encouragement and guidelines of many others. I take this opportunity to express my gratitude to the people who have been instrumental in the successful completion of this project.
I would like to show my greatest appreciation to Mr. Essanya Evans, The Principal Nairobi Aviation College- Kisumu campus, for giving me a wonderful opportunity for an industrial attachment in his organization. The attachment assisted me to gain a lot of knowledge, skills and experience as far as information Technology is concerned. Words are inadequate in offering my thanks to my supervisor, Mr. Calisto Oyugi for his encouragement and cooperation during my attachment period. I take immense pleasure in thanking Dr.
Jagongo Ambrose PhD, MBA, FKIMCoordinator, Kenyatta University-KIST Learning, for his financial support and healthy advice during my industrial attachment period . In deed this industrial attachment would have not been possible without him. Finally, yet importantly, I would like to express my heartfelt thanks to my beloved mother for their blessings, my friends/classmates for their help and wishes for the successful completion of this attachment. CHAPTER ONE INTRODUCTION This chapter begins with explaining the purpose of the report; follow by its scope and limitations.
It then goes on to give a brief introduction on the history of Nairobi Aviation College and the attached department, Computer Studies and Electrical Engineering. This chapter also covers the educational goals of Nairobi Aviation College, as well as a brief explanation on the services that it offers. This chapter ends by providing an overview of the Hewlett-Packard’s partnership with the universiti 1. 1 PURPOSE OF INDUSTRIAL ATTACHMENT The Industrial Attachment program fulfills part of the requirement in pursuing a diploma in Information Technology in Mawego Technical Training Institute.
This is a training that should last for a minimum of three months. It is intended to expose student to the real life working experience. 1. 2. 1 OBJECTIVES OF INDUSTRIAL ATTACHMENT The objectives of Industrial Attachment are: * To provide an avenue for students in Institutions of Higher Learning to acquire industrial skills and experience in their course of study * To prepare students for the working situation they are to meet after graduation * To expose students to work methods and techniques in handling equipment and machinery that may not be available in educational institutions. To provide students with an opportunity to apply their knowledge in real work situation thereby bridging the gap between university work and actual practice. 1. 1 SCOPE During this attachment period, I associated with the computer support staff members in seeing to it that computer users from all departments in the organization were contented with the computerized services we offered them to enable them run their daily activities. The team was coordinated from a help desk situated in the IT support office. 1. 2 LOCATION OF NAIROBI AVIATION COLLEGE-KISUMU BRANCH
The Nairobi Aviation college is located along side Apindi Street near Garisa Lodge, at Mini Matt building 3rd and 4th floors. 1. 3 VISION To be a centre of academic and professional excellence both locally and internationally. 1. 4 MISSION STATEMENT To produce competent market driven graduates who are conscious of and responsive to the dynamic challenges in the society. 1. 5 Philosophy It is the philosophy of the University that all human beings have a role to play in the society and that each person is uniquely endowed with the necessary abilities to fulfill their role.
CHAPTER TWO 2. 0 KCA UNIVERSITY KISUMU CAMPUS ORGANIZATION STRACTURE MANAGER PRINCIPAL H. O. D I. C. A. D Branch Accountant Library H. O. D Research Dean of students Registrar ADMIN. H. R H. O. D Academics H. O. D S. P. P Marketing Executive Procurement Deputy H. O. D Research Deputy Dean Registrar Assistant Head of Exam Deputy H. O. D SPP Assistant marketing Executive Cashier Deputy Librarian Deputy H. O. D Academics ADMIN/ Customer Care Course Coordinator /Admin. Assistant Library Assistant IT Support Assistants Reception Head of security Driver, Office Assistant 2)Security Assistant 2. 1 HISTORY OF FOUNDATION 1. 2. 1 Attached Company – Nairobi Aviation College Nairobi Aviation College was established in 1999 to offer aviation related courses to the Kenyan population in a bid to supplement government effort in technical, industrial, vocational and entrepreneurial training and is fully registered by the Ministry of Higher Education, Science & Technology i. e. MOEST/PC/774/2002 and its training programmes are always validated by the Commission for Higher Education and Kenya Civil Aviation Authority.
Currently its headquarters is at Kahawa house, 1st and 2nd floor, Hail Salassie Avenue. Nairobi Aviation College is steadily growing and has its branches at Odeon Cinema, Eldoret, Kitale and Kisumu where I was attached. Currently, the college exists as a privet company run by board of directors, among them the branch manager based in Nairobi. The Path to KCA University * The Institute of Certified Public Accountants of Kenya (ICPAK) set up Kenya College of Accountancy (KCA) in May 1989. * The dream of becoming a university was discussed and agreed in a strategic plan retreat in 1997. Collaboration agreement with JKUAT and later UNISA Universities in offering their degree programmes were signed in the year 2000. Diversified to academic programmes. * Applied to the Commission for Higher Education to offer our own degree programmes. First inspection held in the year 2000. * In the year 2002, established satellite colleges in Kisumu and Githunguri as part of the broad strategy of bringing business education to the rural areas. Enrollment increased to over 10,000 students yearly. * KCA University was established as a private university vides a gazette notice No. 895 and shall be the successor to the institution hitherto known as the Kenya College of Accountancy. * The University offers certificates, diplomas and degrees at undergraduate and postgraduate levels, with effect from 26th July 2007. * The University is a body corporate with perpetual succession and a common seal. Before the award of a Charter, the legal framework governing the University is the Universities Act (Cap 210B), Trustees (Perpetual Succession) Act (Cap 164), and Trustees Act (Cap 167) and the Trust Deed. 2. BACKGROUND INFORMATION: KCA Kisumu Campus officially launched its programmes on 14th January 2002. The move marked a special milestone both for KCA and the Western province region. KCA entry into this serene lakeside town added great value to professional, academic and Business training programmes regionally. The principles on which KCA was founded in 1989 by the Institute of Certified Public Accountants of Kenya (ICPAK) regained focus, and the dreams of thousands of professional students within this region became a reality.
The centre enrolled 300 students within the first one month of its operation and the number by the end of the year tripled its enrolment to 980 students. The current annual enrolment stands at 1200 students. The campus capacity has expanded as fast as resources became available making KCA Kisumu campus the fastest growing tertiary center in the western region. It now occupy two floors of the ultra modern Swan Center, up from the one floor we occupied in 2002. KCA Kisumu has adequate physical facilities such as a well stocked library for students’ and lecturers’ references.
It has more than 10,000 e- learning materials used for teaching and research purposes. Besides, the students continue to excel not only in academics but also in extra curriculum activities like colleges annual national drama festivals. To respond to the needs of students and to make education more accessible to students, KCA established KCA Eldoret and KCA Kericho. The two centers continue to attract many students in professional courses. Further, it has comprehensive distance learning materials to cater for the students who would not get adequate time for full time studies.
It is committed to providing first class training in all its constituent colleges to produce qualified and competent professional and academic graduates. It hope to expand satellite colleges to cover all provinces in Kenya 2. 3 FACILITIES The collage is well equipped to handle a wide range of information through the use of several courses like Diploma in Information Technology, Diploma in Business Management, CPA, BscIT, packages Cisco and many others. The collage has enough computer machines and classrooms to facilitate student learning.
The teaching programs are divided into two categories: Academic and Professional programs. The part time classes are also available. 2. 4 INFORMATION TECHNOLOGY IMPLEMENTATION KCA University has invested in phased programmer of information technology (IT) which eventually will cover every aspect of collage operations, from student registration, fee payment, teaching, student clearance and management of all information required in institution. CHAPTER THREE 3. 0 THE MAIN BUSINESS OF THE ORGANISATION
Nairobi Aviation College being a Private Organization is charged with the responsibility of offering various teaching activities in various courses. * Employment of lecturers and support stuffs Nairobi Aviation College employs its lecturers and support staffs on permanent basis to help in the daily operations of the organization. * Registration of students After confirming with the course advisors whether he/she have the qualification to do a certain course, the client is served with admission letter with all the requirements of joining that particular course.
The following requirements apply to all courses:Three colored passport size photos, Copies and originals of result slips, certificates and other testimonials, Copy and original National ID card or Passport,Fees payable during admission plus tuition fees (Amount varies from course to course) Fees payment methods We have different modes of fees payment available to our students, parents and guardians and our clients are free to choose any of them. The following fees payments can be used: 1. You can pay using banker’s cheque addressed Nairobi Aviation College 2. You can deposit you fees into the college bank account.
Each college branch has its own account as follows: The college registers all its students before they could be allowed to attend their classes. The college markets the courses it offers, then the new students take the admission forms which they fill with the required information, at the customer care desk, the students then pay the admission charges with the tuition fees for one month, then they can be allowed to start classesThe students are charged Ksh. 500 for registration. They are also given admission forms which they fill and return to the register for clarity and record keeping.
The school fees is paid in two installments, first installments is during the registration and the last installment is after a month from the registration time. The students are only permitted to attend the classes that they paid for. * Industrial linkages The college has also succeeded in ensuring that all its students are attached through collaboration between its Industrial Liaison Office and the National Industrial Training Authority which is under the Ministry of labor. In addition, the Nairobi Aviation College offers several chances for industrial training of students from other colleges and universities. Teaching Teaching is the fundamental activity of the organization. It offers high level of education and ensures that each and every student is satisfied according to his /her area of specialization. 3. 1 SIZE OF WORK FORCE [STAFFING] At present the college has employed about 39 employees, 30 lecturers and 9 support staffs LEGAL STRUCTURE As far as the legal status is concerned, Nairobi Aviation College exists as a private organization as explained in the brief history above. CHAPTER FOUR DESCRIPTION OF ORGANISATION 4. 0.
THE COMPUTER STUDIES AND ELECTRICAL ENGINEERING DEPARTMENT The objectives of the Computer studies and electrical department aim at supporting mission of Nairobi Aviation College by: * Providing an environment for improved quality and efficiency of data processing. * Ensuring the productive use of computer equipment, applications and systems. * Providing KCA staff with speedy and easy access to information resources. * Making KCA information resources and services available for sharing throughout the Institute and for disseminating worldwide. IT services provided include: * Desktop & application support (hardware and software). Network Infrastructure development, administration and maintenance. Database development, administration and maintenance. * External communications for Internet, email and voice traffic. * Advice and guidance on all IT issues including IT procurements General activities undertaken: 1. Carrying machines from the stores as well as taking them for dispatch. 2. Troubleshooting the system and end user support. 3. Software installation 4. 1: FUNCTIONS AND ROLES For effective discharge of its mandate, the IT department has been able to carry out the following functions: * Systems Security Helpdesk management * Network Administration * Hardware Management * Email Administration * Allocating user accounts and IP address to different users 4. 2 SPECIFIC ACTIVITY UNDERTAKEN A. IT DEPARTMENT Duties and Responsibilities: The following are the duties and responsibilities that I was able to carry out; * User Support: This included: * Attending to end users requests made through phone calls * Assisted end users in working with applications such as Ms Word, excel, QuickBooks, sage etc. * Assisted the end users on the operation of computers and its peripherals e. . printers, scanners, projectors * Moving computers and other devices between offices. * Installation of application and system software at users’ workstation. * Installation of new devices e. g. printers * Helping them access devices shared on the network * Network and Internet Setup: This included: * cable crimping and testing * Wall trucking for network cables. * Connection of computers to the network media and equipment e. g. Ethernet switches, network cards. * Allocation of IP addresses and DNS. * Creation of user accounts and workgroups for end users. Network hardware and software maintenance. * Connection and sharing of network resources such as printers, scanners, projector and storage devices. * Troubleshooting of networking problems e. g. non functional network points, faulty cables, spoilt network interface card or loosely connected ones and failing to connect or communicate to network printer. * Configuration of the new machines into the system allowing it to access the domain as well as ensuring that the addressing is carried in a systematic and orderly way avoiding IP address conflict with each other. Scanning and updating antivirus * Installation of software: These included: * Application software e. g. MS Office, adobe reader, adobe page maker, Dream weaver, SPSS etc. * System Software e. g. Windows XP * Antivirus Software- Kaspersky Antivirus * Installation of antivirus updates. * Installation of drivers- printer and scanner drivers. * Mail configuration It entailed creation of users’ accounts on client’s mail domains and configuring the same on MS Outlook to enable the clients to access their web mail on Ms Outlook. * Maintenance of existing system:
This included reinstallation of some system and application software, repairing, troubleshooting as well as installation of updates. * Hardware Maintenance: It entailed: * Maintaining a detailed account of all machines in the organization and the client’s offices. * Carrying out first hand repairs where necessary. * Shifting of the hardware from one location to another and doing the connections * Naming of the computers for workgroups as well as allocation of the hardware to give users. * Manning the help desk: It entailed: Basically helping end users who called the IT help desk because of various difficulties encountered during their work. This ranged from accessing the network, logon, usage of software or access to printers. This meant either giving them instructions over the phone or if this did not work, moving to their workstations and sorting out the problem at the site. * Preventive Maintenance: This entailed: * Running CHKDISK, SCANDISK AND DEFRAG at end users workstations. * Deleting temporary files. * Running antivirus software to clean viruses. * Backups. * Drivers update. Cleaning of Keyboards, mouse, monitor. * Blowing dust from devices. * Emptying the recycle bin. CHAPER FIVE 5. 0 COMPUTER NETWORK Computer network is a collection of hardware components and computers interconnected by communication channels that allow the sharing of resources and information. Computer networking is therefore the practice of linking devices together with hardware and software that supports data communications across these devices. ————————————————- ————————————————- A diagram illustrating a basic networked system
There are three main kinds of networking LAN- this is the local area network – it is a kind of network that covers small geographical are ie a small organization, offices, home internet cafes etc. MAN-this is the metropolitan area network- it covers urban centers e. g. a city or a town WAN- this is the Wide Area Network- this kind of network covers a large geographical area like a continent, country etc Elements of a computer network The following are the requirements of any network:- Hardware Hardware are the physical tangible parts of the networking system.
They may include | | | | | a) Network interface cardsThe purpose of a Network Interface Card (NIC) is to provide computer with a physical connection to a network and also allows a PC to have a dedicated connection to the LAN (Local Area Network) to transmit data back and forth to and from a server or other workstations. b) Router This is a device that transfers data from one network to another in an intelligent way. It has the task of forwarding data packets to their destination by the most efficient route. It has a micro computer inside it that helps it to perform this.
This micro computer holds a table in memory that contains a list of all networks it is connected to, along with the latest information on how busy each path in the network is, at that moment. This is called routing table. when a data packet arrives, the router does the following:- a) | b) Reads the data packet’s destination address| c) | d) Looks up all the paths it has available to get to that address. | e) | f) Checks on how busy each path is at the moment| g) | h) Sends the packet along the least congested (fastest) path. Other tasks the Router can perform: * | * Exchange Protocol information across networks (see page on protocols). | * | * Filter traffic – useful for preventing hacker attacks for example| Routers operate at the network level of the OSI model. c) The bridgeIt joins two networks together as far as data packets are concerned a bridge is not as capable as a Router – but it is less expensive. Both networks have to be using the same protocol. d) A Network HubIs a networking hardware that allows computers to share data packets within a network.
Each computer will be connected to a single ‘port’ on the hub You can also daisy- chain hubs to allow even more computers to join the network. e) A Network SwitchA switch has a number of ports and it stores the addresses of all devices that are directly or indirectly connected to it on each port. As a data packet comes into the switch, its destination address is examined and a direct connection is made between the two machines. A gateway converts the data passing between dissimilar networks so that each side can communicate with each other, I. e. Converts data into the correct network protocol.
The gateway is a mixture of hardware components and software. This is unlike a standard ‘Bridge’ which simply joins two networks together that share the same protocol. f) Modem| | A modem converts the digital data from the computer into a continuous analogue wave form that the telephone system is designed to deal with (MODulation). The reason for this is that the telephone system was originally designed for the human voice i. e. continuous signals. The modem also converts the analogue signal from the telephone network back into digital data that the computer can understand. (DEModulation).
Standard modems come in two forms. An external box that links to your computer either through a serial or USB port, or an internal modem that is plugged directly to the motherboard inside the computer. An internal Modem An External modem g) Networking cablesAre used to connect one device to another or connect two or more computers to enable them share computing resources like printers and scanners. There are different types of cables e. g. Unshielded twisted pair (UTP cable)It is a network medium that links the computer systems to a central switch it transmits signals.
Its unrepeated length limit is 100 meters. Fiber Optic Cable Fiber optic cabling consists of a center glass core surrounded by several layers of protective materials. It transmits light rather than electronic signals eliminating the problem of electrical interference. This makes it ideal for certain environments that contain a large amount of electrical interference. It has also made it the standard for connecting networks between buildings, due to its immunity to the effects of moisture and lighting. Fiber optic cable has the ability to transmit signals over much longer distances than coaxial and twisted pair.
It also has the capability to carry information at vastly greater speeds. This capacity broadens communication possibilities to include services such as video conferencing and interactive services. The cost of fiber optic cabling is comparable to copper cabling; however, it is more difficult to install and modify. h) network protocol | Defines rules and conventions for communication between network devices. Protocols for computer networking all generally use packet switching techniques to send and receive messages in the form of packets.
Network protocols include mechanisms for devices to identify and make connections with each other, as well as formatting rules that specify how data is packaged into messages sent and received. Some protocols also support message acknowledgement and data compression designed for reliable and/or high-performance network communication. Hundreds of different computer network protocols have been developed each designed for specific purposes and environments. Internet ProtocolsThe Internet Protocol family contains a set of related (and among the most widely used network protocols.
Besides Internet protocol (IP) itself, higher-level protocols like TCP, UDP, HTTP and FTP all integrate with IP to provide additional capabilities. Similarly, lower-level Internet Protocols like ARP and ICMP also co-exist with IP. These higher level protocols interact more closely with applications like Web browsers while lower-level protocols interact with network adapters and other computer hardware. 5. 1 NETWORK ESTABLISHMENTThe network set up is a server-based system where both clients and servers are established. 1.
ClientThis is a computer system that request services from another computer system on the computer network. The client computers are located at different places or rooms in terms of the computer labs, which are five in number. Administrative staffs have computers at their desks, which they use to perform various administrative tasks like write letters, reports, memos, updating member’s records and research purposes. Each office or department has its computer on its desk. 2. ServerIt is a computer terminal that offers services to other computers on the network.
The college had one main server used to control Internet traffic and filter sites to be visited. It also acts as a proxy server and as a gateway. It also acts as a point of communication and validation of users. It runs on windows 2000 server platform. It controls printing issues from remote terminals and enables various users to log in remotely. Users are requested to provide their user name and password to log in successfully for security purposes. It enables automatic updates of antivirus and critical windows updates.
The diagram below explains the relationship between the Server and the client computers. The server The client The diagram showing the relationshiop between the server and client computers on a network5. 2 N COMPUTING CARD TECHNOLOGYI was introduced to N computing card technology. N computing card is a newer technology PCI card that is used together with a multi-box extender to create a multi- user environment. One N Computing card can use three sets of multi user box to make sure that seven users simultaneously share a host of resources.
This hardware component is normally bought together with its software on a CD such as the one shown. For N computing card to function properly, the software must be installed and configured appropriately. The N computing card is normally inserted in one of the expansion slots on the mother board. I used X550 N Computing card above and the extender box below to connect the seven monitors to the host computer. The host computer had to have high capacity RAM and hard drive. The capacity of RAM and hard drive here would determine the number of workstations it would support.
This means that the host computer was very powerful. The multi box had 2 PS/2 ports for a keyboard and a mouse, a network cable port where the UTP cable from the N computing card is hooked, Video Graphics Array for connecting the display unit. In this case a keyboard, mouse and monitor makes one workstation and one extender connects one workstation as shown below:-Multi box Work stations The host computer 5. 3 SOFTWAREThese are coded instructions issued to a computer system to perform a certain task. Importance of Computer software: * Acts as a link between computer hardware and the users. It manages computer memory * It prioritizes work to be executed within the computer system. Computer software is divided into application software and system software. Where application software interacts and provide interface for the end users while system software manages various computer resources and interacts with computer hardware. 5. 4 COMPUTER MAINTENANCE AND SERVICINGWhile in KCA University I also gained skills and experience on how to repair and maintain various types of computers, including desktop PC, laptop, palmtop and notebook computers.
I was trained on how to perform cleanup procedures and use a couple of maintenance facilities. Under this section, I could work in the digital and CISCO laboratories, which were directly under the IT Support Department. I performed the following activities. Computer cleaning. This is a practice of physically cleaning the interior, and exterior, of a computer including the removal of dust and debris from cooling fans, power supplies and hardware components. Under this, I cleaned regularly the exterior parts of the monitors, printers, scanners, mice, keyboards as well as the system unit.
I could use a wet spongy material to wipe them , taking a lot of care not to spill water in to them since water may corrode the inner parts and cause malfunctioning of the machine. It is true that dust, dirt and grime can lead to a serious problem with PC. For this reason I used to clean the interior parts of the system unit. I could also remove all keyboard keys and clean them with a lot of care and then fix them back carefully after every month. Backing up computer dataIn Information Technology, it is the process of making copies of data which may be used to restore the original after a data loss event.
Backup routines balance expense and effort against risk and regular backups are vital insurance against a data- loss problem. Again the cost of backing up data is far less than the often impossible task of recreating data for which no back up exists. In KCA University backups were normally made during the following occasions 1. When a computer had to be fully formatted. 2. Whenever there was serious virus attack to the machine. 3. When a computer had to be moved from a department to another.
Apart from the above, crucial information were also backed up online (backups were made and then sent to the main campus in Nairobi through mail every day for record keeping)Formatting computersFormatting hard drives completely erases all data on the hard disk. Formatting was mostly done when the hard drive was infected by viruses or Trojan that were very difficult to remove. Sometimes it was also done when the drive had bad sectors on it. A hard drive should be divided into small parts to utilize the space effectively. A hard drive can also be formatted to reorganize the space available.
KCA University used the following types of hard drives:-External USB Hard Drive- this was mostly used for backing up data. Internal IDE hard drive. Most computers in KCA University use Integrated Drive Electronics (IDE) hard drives. Internal SATA hard DriveThe Serial Advanced Technology Attachment (SATA) is a newer hard drive technology. In KCA it is used with the student’s computers in Lab 2. Before I could format a machine, I had to do the following:- * Back up data and programs in an external storage device e. g. flash disk. * Ensure that I had the right operating system e. g. windows XP professional service pack 2 etc. Ensure that my CD Rom works properly. * Determine the type of hard disk I was going to format whether SATA or IDE. Disk maintenanceDisk clean up were one of the routine activities that I used to perform at the attachment place. disk clean up is a computer maintenance utility in Microsoft windows designed to free up disk space on computer hard drive. This utility first searches and analyzes the hard drive for files that are no longer of any use and then removes the unnecessary files. Disk maintenance also entails disk defragmentation which is a process that reduces the amount of fragmentation.
It does this by physically organizing the contents of the mass storage device used to store files into the smallest number of contiguous region (fragments). It also attempts to create large region of free space using compaction to impede the return of fragmentation. Computer securityThis was divided into logical security and physical security. In Logical security, I was concerned with the safeguarding of the computer software (data, information and programmes) from theft, corruption or natural disasters – This was mainly achieved through:- 1.
Packaging the CDs containing data or software in dust free casings and then storing them safely in their cabinet. The activation keys were also kept separately. 2. Passwords were also provided to the administrator’s accounts and were changed regularly. No student was authorized to use the administrator’s accounts. 3. Data was also being backed up regularly. In Physical security, I was concerned with the computer hardware protection, through:- 1. Ensuring that all classes using computers are locked whenever there was no session running on. 2.
Locking the peripherals e. g. mouse, monitor, keyboard and printer to the system unit through their cables using padlocks. 3. Scanning any external devices for viruses before installing them to the computers. Computer ServicingThe computers were serviced monthly. During servicing, the computers were blown from dust, memory upgraded, harddisks formatted. This ensured that computers run at their peak performance. Software updatesSoftware packages and operating system were regularly updated to correct software bugs and address security weaknesses.
Configuring Network This involved assigning new computers IP addresses, configuring network settings as well as pinging the network whenever there was a problem. Anti-Virus updating. Anti-virus software is used to prevent, detect and remove malware, virus, worms, Trojan horses, spyware and adware from a computer systemIn KCA University, I commonly used Kersperskey antivirus to protect computers from viruses. There are also other many types of antivirus like McAfee, Avira etc though they were not frequently used in KCA University. The University updates its computers online.
Instructing the students of IT on assembling and formatting computersAssembling computers means putting the parts together to make it function as a unit. During my attachment I could teach the DIT3 and DIT5 students, by demonstration how to assemble all the computer components and also how to format machines I was being guided by my supervisor, Mr. Mwangi. In KCA university especially in CISCO laboratory, there are computers that came into existence through assembling of different components e. g. CPU from different computers. These computers are called cloned computers.
The other computers are just bought new from the manufacturer e. g. Dell, Acer and Compaq computers and are called branded machineDuring the assembling of computers, I gained a lot of knowledge on the components of the system unit like power supply unit, motherboard, SATA and IDE hard drives, CDROM, memory slots and modules, processors, expansion cards and slots, IDE cables etc. I also learnt many things related to Basic Input Output System (BIOS) and the Complementary Metal Oxide Semiconductor (CMOS). The picture below shows most components of the system unit. 5. SETTING DATA PROJECTORS FOR PRESENTATIONSA data projector is used to project the contents of a computer screen onto a big screen or wall so that a large audience can see the information. Data projectors are particularly popular for use with presentation software like power point. In KCA university projectors were commonly used for presentation by lecturers during class sessions. I was therefore assigned the duty of issuing projectors to lecturers. I could give them a book to sign when they are receiving the projectors and when they are returning the same projectors.
These projectors were tagged differently for easy identification. I also had a task of a task of assisting the lecturers in setting these projectors during their lessons. A data projector is used with either laptop or desktop computers. Projectors use S-Video, RCA cables or USB connections to hook to the computer. In classrooms and business presentation rooms, data projectors are often hooked to both computer and video equipment. The most ubiquitous use of a data projector is for presentations in business meetings or classrooms.
Presentation software allows a user to create slide shows of photos, type written information and display graphs. Teachers in high school and college make extensive use of data projectors to give notes or lectures, as do businesspeople making presentations to co-workers or clients. There are a variety of features and functions to consider when purchasing a data projector. Bulbs come in varying brightnesses and have varying degrees of clarity and color replication. Some projectors can be used close to the screen or wall–called ultra short throw projectors–while others need more distance.
Consider all the features before purchasing. How to set a projector * Ensure the availability of the laptop, projector, remote control, video cables, power cords and power adaptor by collecting them from IT Support Office. * Ensure that the laptop and the projector are both turned off before starting to make any connections. * Connect the projector to the lap top using video cable in their correct ports (ensure the adapter/ devices are lined correctly for the signal to be sent and received successfully). * Connect both the projector and laptop to the extension cords. Start the laptop and the projector, make any necessary adjustments to the projector settings (keystone, brightness, color etc). 5. 6 DOCUMENT PROCESSINGA part from the above, I was also introduced to serious document preparation; Nearly all documents in KCA were computerized. I used to prepare documents using word, excel, access, PowerPoint, as well as QuickBooks. This really improved my speed in using input devices like mouse and keyboard. The information gathered from computers were typed and printed then kept for future reference in hard copy form. This really trained me on how to use networked printers.
I also used internet to send e-mails and gained a lot of skills. CHAPTER SIX6. 0 CHALLANGES FACED DURING THE ATTACHMENT PERIODMy attachment period at KCA University was good and enjoyable due to the support that various lecturers and students were able to give me, but still I encountered some challenges that a time threatened to cripple the success of my work experience at the University. I have stated the challenges below as follows:- 1. The frequent loss of the internet could make it difficult to update antivirus in the networked machines, it would therefore require me to adjourn such operations until the internet could be back. 2.
Most of the computer software used at KCA were either slow or corrupted, this could lead to slow way of working. 3. Some students would connect their privet laptops to the network domain unnoticed. This could bring conflict between the computers leading to failure of the entire network system. It would take me the whole day troubleshooting the network through ping process to determine the foreign machine connected to the network domain. 4. I was really challenged at the section of networking since I arrived at the attachment place with very little theoretical and practical knowledge on networking since I dint cover most of the topics.
I therefore found it hard to configure networked computers as well as to ping the network whenever there was need to. 6. 1 OBSERVATIONFor the three months that I was attached at KCA University-Kisumu, I made the following observations:- * Time managementMajority of the students and staff members maintains punctuality as far as reporting to duty and classes at the University is concerned. This enables them to complete their work overdue on time and put their focus on ome other activities * Team workThe staff members have integrity and works jointly as a team to meet the set objectives at KCA University * DedicationEvery member of staff is dedicated to his/her work. This helps ensure the work is done to satisfaction. 6. 2 RECOMMENDATIONFor the benefit of the University and entire employees, I recommend that the management should; * Purchase faster machines for quick data processing * Avail computer maintenance equipment e. g. the dust blowers to enable this service to be done by the organization workers and conserve money paid to the Copycat people. Ensure that the number of computers in the KCA is increased because the number of users outlives the number of computers available. * Should have one site user’s support in each department * Should have daily management and operation of distributed servers * Avail fibred optic wire or wireless means of accessing internet for faster access. 6. 3 CONCLUSSIONFirst and above all, l thank the Lord God Almighty for granting me this chance at my College level to reach my attachment period and also to secure a place at the KCA University, Kisumu Campus. I also thank my supervisors, Mr.
Saidi and Mr. Mwangi for all the support and assistance they gave me during my attachment. At first, the Industrial attachment was not enjoyable to me since I had not familiarized with both my workmates and the working environment. As the time went by it turned out to be fruitful. I gained so much experience and skills. There are a lot of things that I could not do before the attachment for example, formatting a computer that I can do now. I also learnt to appreciate that the theory without practical is dead. Again I learnt how to be patient and tolerant.
I am a better person now due to the attachment experience both at work and personality. In conclusion, The industrial attachment is necessary as it prepares students to the challenges of working environment in their various fields of specialization . They get a chance to put into practice the skills acquired in class though some of it will not be applied. I am grateful for the opportunity I got to do my attachment at KCA University. The experience I got at KCA has enabled me move a step towards advancing my career. | | Declaration | | 2|