CONLUSION AND RECOMMANDATION
Chapter 6
CONLUSION
AND RECOMMANDATION
Conclusion
My practical training was something which gave me
a clear vision
under
this industry of information
technology. Much more, I
would like to say this
program has enriched me with
practical skills more than that
I learned
from class. Therefore
I have got experience on how to maintain the computer
hardware and software by theoretically and practically.
In addition, I go an
experience on good
communication skills with other
workers.
Recommendation
Sincerely, I
recommended that the UCC (University of Computing Centre) have to help students to go for the
field because it enables
a student to be equipped
with a lot
extra knowledge and skills
and build competence and confidence to
the work, I recommended this because I have proved it through the works I have
been doing at the field (UCC).
METHODOLOGY
Chapter 5
METHODOLOGY
a.
Observation
In this way, I can observe tasks done by other staffs then I can
try to do it.
b.
Interview
This is face-to-face verbal exchange of staff members.
Technically staff they can elaborate to me procedures to follow in
order to perform the specific task.
c.
Document analysis
In this way, I can
analyze from different presentations.
COMMUNICATION
Chapter Four
COMMUNICATION
There is good
communication between members
of office and outside
of the office .
there is socialization from
one workers to
another because there
is sharing of
views ideas.
Through communication, it
helps the workers
to build good
relationship among them
and nearby workers
of this school
of META SECONDARY
SCHOOL. Also there
was good communication between
me and student
who teaching.
Thought communication used
to develop my
communication with other
people and it
helps me how
to communicate with
different group of
people and how
to organize my
self before send
my message to
other people, how
to share my
ideas with people
in a work
place. In my
side, I gain
a knowledge on
how to teach
and communicate with
student and other
workers in the
office.
PRESENTATION OF RESULTS AND DISCUSSION OF RESULTS
Chapter Three
I have
been performing different
activities in field
and most concerning
with computer activities
and I have
been doing it
through co-operative with
workmate. My work
is related to
the whole process
of the firm
because my field
is generally based
on IT activities
like operating the
computer, to repair
and maintain computer.
Also I was
based on teaching
student the topics
of introduction to
computer, computer generation
and MS-Office.
Before
engaging in practical training
first I searched
a place that is
good for me to perform a practical and then I send my application
letter
to META SECONDARY
SCHOOL and soon later they replay
to me that
they have accepted
my applications. And they gave
me a date to start my
practical.
I had chosen META SECONDARY because it has a department
that relates with my
practical training.
My goal was to do better in practical
training, also to
get an experience in working
process,
and to relate
my theory study with practical
one.
Before
my practical training my skills and abilities was normal but it developed to the higher level
during my practical
training and I gained different
abilities. I learned PC maintenance
through mending the PC. The
situation that I learned most is in PC maintenance
because before I was not
experience a lot in
PC maintenance but during my practical training
I
found myself deeply
in this area.
I
think computer skills is
needed a lot in daily working life
because there are different
activities that need the skills of
computer in working place and also how
to handle the computer, computer maintenance
and computer regulation for the
future benefit.
I
apply well the theory that I had learned at the UCC ltd to my working place and
I used it effectively and almost all subjects I find that they are useful and
are connected with my practical training but the ones are PC maintenance,
office automation, and communication skills.
WHAT I HAVE BEEN COVERED IN MY PRACTICAL TRAINING
Chapter Two
WHAT I HAVE
BEEN COVERED IN
MY PRACTICAL TRAINING
Assembling computer
Is a
large part a
technician job. As
a technician, you
will need to
work in a
logical methodical manner
when working with
computer component. As
with any learned
trade computer assembly
skills will improve
dramatically with practice.
Prepare the
work space before
opening the case,
there should be
adequate, lighting, ventilation
and comfortable room
temperature. The workbench
or table should
be accessible for
all sides. Avoiding
cluttering the surface
of the workbench
or table with
tools and computer
component. An antistatic
mat the table
will help prevent
physical and ESD
damage to equipment.
Small containers can
be used to
hold small screws
and other parts
as they are
being removed.
The process
of assembling PC
is just to
install hardware or
device in its
position setting configuration
and become complete
PC, all hardware
and device are
plug in or
installed in motherboard.
Devices to plug
are power supply,
RAM, CPU and
its fan, hard
disk, CD-ROM, floppy
drive and good
main body.
Windows installation
Window is
a computer
operation which enable
to ran programs
installed in hard
disk there are
several operating eg. Window
vista, Window XP,
Windows 2000, Windows
2003 there is
latest which are
not command prompt
and user friendly.
Window
XP
Window XP
was released in
2001 and presents
the first as
built on NT
that was directly
target towards home
user friendly, file
sharing and network
configuration for setting
up home networks
In this
window all hard
disk arrangement are
done by portable
window CD which
is unlikely to
window 98 soon
after bios setup
configuration and allocate
computer to boot
from CD so
as to ready
with window CD
so as to
ready with window
CD and save
changes in Bios
setup.
PC restart and lunch a
Window XP SETUP, after crating
portion and format then set up will copy window file in the
hard disk, soon PC restart
and
lunch a Window XP SETUP,
after crating
portion and format then set up will copy window file in the hard disk,
soon PC will restart
and lunch window display still setup continue to copy some file
and
other configuration like network
connection customizing and other after finalizing
then installation
is complete.
Microsoft office
installation
Microsoft office
is the collection
of all application programs
such as MS-office
word, MS-office access,
MS-office excel, MS-office
publisher and MS-office
power point. Microsoft
office divided into
various version like
MS-office 2003, MS-office
2007, MS-office 2010
and MS-office 2013.
Installation of
Microsoft office can
be done by
using CD which
become compatible drivers.
You can install
Microsoft office by using
serial number or
without using serial
number. Also you
can install Microsoft
office by using
a USB storage
device like flash
disk.
Printer installation
Printer :- This
is an output
device which convert
file from softcopy
to hardcopy. Printer
is connected to
a computer using
a Universal Serial
Bus or parallel cables according
to the type
of printer and
it’s compatibility.
Installation of printer
depends on a
package CD which
become with compatible
drivers or you
can download drivers
through an internet.
After installation printout
taste page to
know that printer
works printer works
properly.
Sharing printer
over a network
First stage, click start menu and then select
printers and faxes after that select add printer in the Dialog box of printer.
Dialog box of printer task the printer,
the printer wizard will
appear click next
after that there are two option local or network printer. I choose network printer then I
specifies printer name, I click next Final
stage, I browse the printer in a net work
by typing the name which
I specified the list of
printer, Which are on the network will appear
and I choose one which
I want to
share and connect.
Computer
Generation
This is
a topic which
I have been
taught the students
in my practical
training at Meta
Secondary School.
Computer Generation
is a change in technology a computer is/was being used. Initially, the
generation term was used to distinguish between varying hardware technologies.
But nowadays, generation includes both hardware and software, which together
make up an entire computer system.
There are
totally
five computer
generations known till date.
Each
generation has
been discussed in detail
along
with their time period,
characteristics. We've used approximate dates against each generation which are normally accepted. The
following are the main
five generations of computers;
First
Generation; The period of this generation was started
1946-1959. It was
started using vacuum tubes as the
basic components for memory and circuitry for CPU(Central Processing Unit).
These tubes like electric bulbs produced a lot of heat and were prone to
frequent fusing of the installations, therefore, were very expensive and could
be afforded only by very large organizations.
In this generation mainly batch processing
operating system were used. In this generation Punched cards, Paper tape,
Magnetic tape Input & Output device were used.
Some of computer in this
generation were ENIAC,
EDVAC, UNIVAC, IBM-701 and IBM-650
The
following are the
characteristics of this
generation;
·
Vacuum tube technology
·
Unreliable
·
Supported Machine language only
·
Very costly
·
Generate lot of heat
·
Slow Input/Output device
·
Huge size
·
Need of A.C.
·
Non portable
Second Generation; The period of
this generation was started 1959-1965.
This generation using the transistor
was cheaper, consumed
less power, more
compact in size,
more reliable and faster
than the first
generation machines made
of vaccum tubes.
In this generation, magnetic
cores were used
as primary memory
and magnetic tape
and magnetic disks as
secondary storage devices.
In this generation assembly language and high
level programming language like FORTRAN, COBOL was used.
Some
of computer in
this generation were
IBM 1620, IBM 7094, CDC 1604, CDC 3600, and UNIVAC 1108.
The
following are the
characteristics of this
generation;
i.
Use of transistors
ii.
Reliable as compared to First generation computers
iii.
Smaller size as compared to First generation computers
iv.
Generate less heat as compared to First generation
computers
v.
Consumed less electricity as compared to First
generation computers
vi.
Faster than first generation computers
vii.
Still very costly
viii.
A.C. needed
ix.
Support machine and assembly languages
Third
Generation; The period of this
generation was started 1965-1971.
This generation of computer
is marked by
the use of
Integrated Circuits (IC's) in
place of transistors. A single I.C
has many transistors,
resistors and capacitors
along with the associated
circuitry. The I.C was invented
by Jack Kilby. This development
made computers smaller
in size, reliable
and efficient.
In this generation Remote processing,
Time-sharing, Real-time, Multi-programming Operating System were used.
High level language (FORTRAN-II TO IV, COBOL,
PASCAL PL/1, BASIC, ALGOL-68 etc.) were used during this generation.
Some
computers of this generation were
IBM-360 series, Honeywell-6000 series, PDP(Personal Data Processor),
IBM-370/168 and TDC-316.
The
main features of
Third Generation are;
i.
IC used
ii.
More reliable
iii.
Smaller size
iv.
Generate less heat
v.
Faster
vi.
Lesser maintenance
vii.
Still costly
viii.
A.C needed
ix.
Consumed lesser electricity
x.
Support high level language
Fourth
Generation; The period of this Generation was started
1971-1980. The fourth generation of
computers is marked
by the use
of Very Large Scale
Integrated (VLSI) circuits. VLSI
circuits having about
5000 transistors and
other circuit elements
and their associated
circuits on a
single chip made it
possible to have
microcomputers of fourth generation. Fourth
Generation computers became
more powerful, compact, reliable,
and affordable. As a
result, it gave rise to
personal computer (PC)
revolution.
In
this generation Time
sharing, Real time, Networks,
Distributed Operating System
were used.
All
the Higher level
languages like C and
C++, DBASE etc. were used
in this generation.
Some
computers of this
generation were DEC 10,
STAR 1000, PDP 11, CRAY-1(Super Computer) and CRAY-X-MP(Super Computer).
The main features of Fourth Generation are;
i.
VLSI technology used
ii.
Very cheap
iii.
Portable and reliable
iv.
Use of PC's
v.
Very small size
vi.
Pipeline processing
vii.
No A.C. needed
viii.
Concept of internet was introduced
ix.
Great developments in the fields of networks
x.
Computers became easily available
Fifth
Generation; The period
of Fifth Generation is 1980-till
date. In this generation, the VLSI technology
became ULSI (Ultra
Large Scale Integration) technology, resulting
in the production of
microprocessor chips having ten
million electronic components.
This generation
is based on parallel
processing hardware and AI
(Artificial Intelligence) software.
AI is an
emerging branch in
computer science, which
interprets means and method
of making computers
think like human
beings. All the Higher level
languages like C and C++, Java, .Net etc. are
used in this
generation.
AI includes:
i.
Robotics
ii.
Neural
networks
iii.
Game
Playing
iv.
Development
of expert systems
to make decisions
in real life
situations.
v.
Natural
language understanding and
generation.
Some
Computer types of
this generation are
Desktop, Laptop, NoteBook, UltraBook
and ChromeBook.
The main features
of Fifth Generation
are:
i.
ULSI technology
ii.
Development
of true artificial
intelligence
iii.
Development
of Natural language
processing
iv.
Advancement In
Parallel Processing
v.
Advancement
in Superconductor technology
vi.
More user friendly
interfaces with multimedia
features
vii.
Availability of
very powerful and
compact computers at
cheaper rates
Introduction to computer
Also
this is a
topic which I
have been taught
the student at
Meta Secondary School
in my practical
training. The explanation
of this topic
it found in
CHAPTER 1 at page
number 1.
INTRODUCTION AND PURPOSE OF THE STUDY
Introduction
Computer is
an electronic that
can receive and
process data or
instruction very quickly
according to the
instruction provided by
the user and
generate the desire
output. There are
two main component
of the computer
these are computer
hardware, which refers
to the physical
parts that you
can touch and
see and touch
it like mouse,
keyboard, monitor, CPU
and printers. Another
is computer software
which are the
physical parts that
you can see
but you cannot
touch. These software
describe the program,
that are used
to operate the
computer system.
The computer
hardware devices can be categories
into four types
which are input
devices, processing devices,
storage devices and
output devices. The
input devices are
the devices which
are used to
enter data in
the computer example
mouse, keyboard, digital
camera and microphones.
Processing device
is the main
central device of
the computer system
that is used
to process data
which are displayed
on the monitor.
It is also
known as microprocessor. It is
the brain of
the computer because
it control all
functions on the
computer.
Storage devices
are the devices
which store data
permanently or temporary to
the internal or
external of the
computer. The examples
of external storage
devices are flash
disk, compact disk (CD)
and floppy disk
and the examples
of internal storage
devices are hard disk
and RAM Which
is a temporary
storage device.
Output devices
are the devices
of the computer
system which are
used to give
the display of
information in the
computer. The examples
of output devices
are monitors, printers,
speakers and projectors.
Taking care
your system and
a establish a
preventive maintenance routine
are critical to
ensure that you
have reliable system
that perform a
top efficient year
after year. The
only way to
prevent to caring
for your system
hardware. These include
all factors that
affects the system
as a whole.
Computer maintenance
it consist of
PC assembly, software
installation, troubleshooting, power
supply maintenance and
measuring.
Computer
background
Some of the theories
and ideas that would eventually come together to help make up the modern
computer were conceived back in the 19th century.
In the 1830s, Charles
babage (an English inventor) invented several mechanical
calculating machines. His analytical engine (although never actually built) was
designed to perform some of the tasks digital computer perform some to day e.g.
for instruction perform calculations and have permanent memory (punched cards
would have been used)
Had
it been built it would have been huge-covering an area about the size of a
football pitch.
In 1840s George Boole
devised a system of mathematics which becomes know as Boolean algebra. The
system used binary (True/false logical and is central to how computers made
decisions. By the end of century analogue computing appeared. Herman Hollerith
(a US inventor) patented a calculating machine. It used to punch cards and in
1890 it was used to compute census data.
It was during the 20th
century that the major developments leading to our modern computers took place.
In the first quarter of
the century Hollerith his tabulating machine company experienced several
mergers. In 1924 it was final absorbed into a company which adopted the name
international Business Machine corporation (IBM).
The Second World War
provided a huge stimulus to computer development. Howard Aiken (an American)
led the development of computer to decode messages from the German Enigma
machine.
Shortly
after the war the Americans built the ENIAC-the most sophisticated computer of
it time
In 1947 Bell
laboratories in the USA invented the transistor. A few years later the
microchip and microprocessor were invented. These could store and manipulate information
in a small space.
In 1974 micro
instrumentation telemetry systems in New Mexico release the Altair 8800-the
first personal computer.
In 1975 the Microsoft
Corporation was founded by William H. Gates 111 (bill Gates) and Paul Allen.
First version of the BASIC programming language for the MITS Altair. They moved
Microsoft to a suburb of their home town of Seattle, Washington in 1979. Two
years later they took their first step in diversifying beyond programming
language when they released the original IBM PC. Microsoft went on to convince
other PC manufactures to license MD-DOS, which made it the defector software
standard for PCs.
Microsoft moved into
application software, eg.word and excel and extended beyond the PC In 1984 they
began to produce application software for the Apple Macintosh. The 1970s and early 1980s saw the
development of ARPA net a long distance computer
network developed by
the US Government’s Advanced Research Project Agency and its evolution into the
first stage of four computers, another 200 in military and research
Establishments
throughout the USA were linked using this network during the 1980 several
academic networks had been setup.
The combined with the
ARPA net to form the internet. Computers
become progressively smaller, better and cheaper in the 1980s, and by 1992 the
computer industry was fastest growing industry in the world.
1991 saw the end of collaboration between
Microsoft and IBM. IBM chose to pursue former joint venture with Microsoft on
the OS/2 operating system, while Microsoft chose to evolve its windows
operating system delivering window 3.1 in 1992. There was the farthest
development of the windows operating system through the 1990s and by the end of
the century Microsoft had cornered the lion’s share of the PC software market
with window, its desktop application and internet browsers. These computers in
a daily life the computer are used in a different are some of the including in
education department at home in industrials and in offices.
Some of the functions
as a follows:
Airline booking on-line
banking insurance claim processing are done using computers.
Money-Automatic Teller
machine (ATMs) or debit and credit cards use computers to records transaction.
Today there are different types of computer
such as;
Personal
computer, Laptop, Han-held devices, Palmtops and Minicomputer.
Among of this
types of computers in my report am going to deals with personal
computer
The purpose
of this is
apply back taught
into more practice
to work on
organization like UCC to be
an instructor/ Technical staff.
Also it enable
to develop my
skills and ability
that supports my
professionals studies eg. (Computer
Maintenance and repairing)
and prepare for
responsibilities for daily
work as technician.
Practical training enable
to have enough
experience and confidence
to work at
any organization or
to open your
owned company and expand
carrier. Not only
but also practical
training is very
important study of
computer technology whereby
it transfer theory
into practice and
that the way
help the student
to understand in deeply
about information technology,
also gives me
confidence on working
to different devices
of computers.
Practical training
is important study
of computer technology
whereby it transfer
theory into practice
and that is
the way of
helping student to
understand clear the
subject into both
sides (Theoretically &
practically).
Identifying Technical Constraints
Identifying Technical Constraints
Technical constraints often focus on architecture decisions that limit your solution design. They tend to be inflexible and unchanging, and can have an impact on your solution implementation. They include areas such as development languages, hardware, other infrastructure, and software that must be used for your project.
The assumptions and constraints are an important aspect of your project requirements. You need to make sure that you analyze and document them appropriately on your projects. Although they are not requirements, I often recommend documenting them along with the requirements that they impact. It is a simple step to manage and communicate the requirements assumptions and constraints once you have them identified and documented. You may also identify new project risks related to your project’s assumptions and constraints that need to be added to your risk register.
Remember, any project stakeholder may be involved with identifying and defining the assumptions and constraints for your project, so keep your ears open! The project team should use these assumptions and constraints to identify potential risks that may impact project implementation and delivery or have a negative impact on end-user expectations of the resulting solution. It is essential to keep a handle on the assumptions and constraints that are part of your project.
Qn3: Identifying Project Assumptions and Constraints
Qn3: Identifying Project Assumptions and Constraints
Assumptions and constraints show up frequently on our projects. Successful project managers and business analysts keep an eye out for the assumptions and constraints present on their projects. After all, they can impact your project across a number of variables, including your project requirements and your resulting solution. Giving the risks that assumptions and constraints can add to your project, I think it’s worth taking a closer look at what they are and how we should identify and manage them.
Experienced project
managers look for three elements as they and the team define, analyze, and
document the assumptions and constraints on their project: assumptions,
business constraints and technical constraints. Let’s have a closer look
at each of these elements.
Identifying Project
Assumptions
Assumptions are factors
that we believe to be true, although these factors are not confirmed to be
true. Assumptions add risk to a project since it is possible that they will
turn out to be false. Assumptions can impact any part of your project
life cycle and resulting solution implementation, so it is important
to document and analyze them.
Identifying Business
Constraints
Business constraints
limit the solution based upon the current organizational state.
They usually focus on the available time, money and resources for a
project. Common business constraints include budget and time restrictions,
resource limitations, and resource skill limitations. For example, your
project’s business case may contain assumptions about realizing the business
benefits for your project. Any assumptions about a specific business
benefit should be documented and linked to the requirements that will deliver
those benefits. This may introduce additional risk into the premises contained
in the business case, since it is possible that the assumptions you are
assuming to be true may not be true in the end.
Qn2: Network Design Process - Effective Network Planning and Design Overview
Qn2: Network Design Process - Effective
Network Planning and Design
Overview
The network planning and
design methodology describes a process with nine specific steps and a sequence
for those activities. As mentioned it is an engineering life cycle that
supports technical initiatives such as Windows migration, IP telephony and
wireless design to name a few examples. The methodology begins with examining
company business requirements. It is absolutely essential that you understand
the company business model, business drivers and how they are growing from a
business perspective. That will build the foundation for a design proposal that
serves the business, technical and operational requirements of the company.
Step 1: Business
Requirements
Any design project
starts with an understanding of what the company does and what they need to
accomplish from a business perspective. This begins with an understanding of
their business model, which really describes how their company works from an
operational and business perspective to generate revenues and reduce costs.
Many vendors today have conducted their own return on investment (ROI) studies
for new implementations such as Unified Communications and Telephony. It is an
effective sales tool that illustrates the cost benefits compared with
investment over a specified period of time.
This is a list of some
typical business drivers:
o Reduce Operating Costs
o Generate Revenue
o Client Satisfaction
o Employee Productivity
o Generate Revenue
o Client Satisfaction
o Employee Productivity
This is a list of some
typical project business requirements:
o Budget Constraints
o Office Consolidations
o Company Mergers and Acquisitions
o Business Partner Connectivity
o Telecommuter Remote Access
o Implement New Offices and Employees
o New Data Center Applications
o Reduce Network Outage Costs
o Cost Effective Network Management
o Vendor Contracts
o Office Consolidations
o Company Mergers and Acquisitions
o Business Partner Connectivity
o Telecommuter Remote Access
o Implement New Offices and Employees
o New Data Center Applications
o Reduce Network Outage Costs
o Cost Effective Network Management
o Vendor Contracts
Step 2: Design
Requirements
Now that you understand
the basic business requirements of the company, you can determine the standard
and specific design requirements. Standard Design Requirements
o Performance
o Availability
o Scalability
o Standards Compatibility
o Rapid Deployment
Step 3: Network Assessmento Availability
o Scalability
o Standards Compatibility
o Rapid Deployment
A network assessment is conducted after we have finished the business and design requirements of the company. A network assessment provides a quick snapshot of the current network with an examination of the infrastructure, performance, availability, management and security.
Step 4: Infrastructure Selection
After doing an network assessment we are ready to start selecting specific infrastructure components for the network design.
The following numbered list describes the specific infrastructure components and their particular sequence.
1. Enterprise WAN Topology
2. Campus Topology
3. Traffic Model
4. Equipment Selection
5. Circuits
6. Routing Protocol Design
7. Addressing
8. Naming Conventions
9. IOS Services
10. Domain Name Services
11. DHCP Services
Step 5: Security Strategy
We must now define a security strategy for securing the infrastructure. The need for enterprise network security shouldn't be ignored with the proliferation of the Internet. Companies are continuing to leverage the public infrastructure for connecting national and international offices, business partners and new company acquisitions.
Step 6: Network Management Strategy
This section will define a network management strategy for managing all equipment defined from infrastructure and security.
o 7 Management Groups
o SNMP Applications
o Monitored Devices and Events
Step 7: Proof of Concept
All infrastructure, security and management components must now be tested with a proof of concept plan.
1. Prototype Design
2. Provision Equipment
3. Define Tests
4. Build Equipment Scripts
5. Review Test Results
Step 8: Design Proposal⁄Review
With the proof of concept finished, you are now ready to build a design proposal for the design review meeting. Your intended audience could be the Director, CIO, CTO, Senior Network Engineer, Consultant or anyone that is approving a budget for the project. It is important to present your ideas with clarity and professionalism. If a presentation is required, power point slides work well and could be used to support concepts from the design proposal document. The focus is on what comprises a standard design proposal and the sequence for presenting that information.
Step 9: Implementation
The final step will have us defining an implementation process for the specified design. This describes a suggested implementation methodology of the proposed design, which should have minimal disruption to the production network. As well it should be efficient and as cost effective as possible. As with previous methodologies there is a sequence that should be utilized as well.
video here..
video
Subscribe to:
Posts (Atom)