Professional Documents
Culture Documents
IT Internship Report
IT Internship Report
TECHNOLOGIES LIMITED
FROM 29th March TO May 2021
BY
TANGOMBE ATAHIRE TRESOR
STUDENT ID: 039-933
E-mail: tangombetresor83@gmail.com
DECEMBER 2021
DECLARATION
I TANGOMBE ATAHIRE TRESOR declare that the information that is contained in this
industrial training report was written and compiled by me with all the details its containing and
no one should try to claim for it.
Signature……………………… Date………………………
i
APPROVAL
This industrial training report has been submitted for examination with the approval of the
following supervisors.
Company supervisor
Tel: +256-777840016
Email: info@supercom.co.ug
University supervisor
Name………………………………………….
ii
ACKNOWLEDGEMENT.
I am very thankful to the almighty God for providing to me the gift of wisdom and energy in the
preparation of this report.
I would like to acknowledge the contribution of personalities who have made the completion of
this internship possible each in their capacity. I am very grateful to my parents and ENG Ahabwe
Rodgers and Mr. Tumuhimbise Lucky of Supercom Technologies Limited who provided
constant guidance throughout all stages of internship and encouraged me on every time of the
way.
I thank the entire team of Supercom technologies for being so hospitable and resourceful,
especially my group members during the different discussions about different ideas.
I also acknowledge the co-operation of fellow internees whom we were doing this internship
together they have been so important and supportive to me during the course of my industrial
internship training at Supercom.
iii
TABLE OF CONTENTS
DECLARATION..............................................................................................................................i
APPROVAL....................................................................................................................................ii
ACKNOWLEDGEMENT..............................................................................................................iii
LIST OF FIGURES.......................................................................................................................vii
LIST OF TABLES.......................................................................................................................viii
LIST OF ACHRONOMS/ ABREVIATIONS...............................................................................ix
ABSTRACT....................................................................................................................................x
CHAPTER ONE..............................................................................................................................1
1.1 Background to the internship............................................................................................1
1.1.1 Objectives of the internship................................................................................................1
1.1.2 Specific Training Objectives..............................................................................................2
1.2 Benefits of the Internship.......................................................................................................2
1.2.1 Benefits to the Student....................................................................................................2
1.2.2 Benefits to the Employers...............................................................................................3
1.2.3 Benefits to the Faculty, University, college and community..........................................4
1.3 Background of the company..................................................................................................5
1.4 Aims of its department:.........................................................................................................8
CHAPTER TWO.............................................................................................................................9
LITERATURE REVIEW AND ACTIVITIES DONE DURING THE INDUSTRIAL
TRAINING......................................................................................................................................9
2.0 INTRODUCTION.................................................................................................................9
2.1 Hardware identification and software installation.................................................................9
2.1 Hardware identification.........................................................................................................9
2.1.1 system case.....................................................................................................................9
2.1.2. Mother board...................................................................................................................10
2.1.3. Central Processing Unit (CPU)........................................................................................11
2.2. Software installation...........................................................................................................13
2.2.1. Operating system.........................................................................................................13
2.3. Making a flash bootable device..........................................................................................14
2.3.1. Using command prompt..............................................................................................14
2.3.2. using Rufus..................................................................................................................15
iv
2.3.3. using power iso............................................................................................................15
2.3.4. How to install an OS from a flash...................................................................................16
2.4. Trouble shooting.................................................................................................................17
2.4.1. How to check and update drivers on the operating system.............................................17
2.4.2. How to increase the computers virtual memory..............................................................17
2.2.3. How to remove temporary files on a storage device.......................................................17
2.4.4. How to change the computers name................................................................................17
2.5. Networking.........................................................................................................................17
2.5.1. Components of a network............................................................................................18
2.5.2. Ad-Hoc networking;....................................................................................................19
2.5.3. IP Sub netting..............................................................................................................22
2.5.3. Configuring a network.................................................................................................24
2.6. Cable termination................................................................................................................28
2.7. Website designing...............................................................................................................29
2.7.1. Requirements to design websites.;...............................................................................29
2.7.2. Wamp server................................................................................................................30
2.7.3. creating a project on a website using word press........................................................30
2.7.4. creating a database using wamp server........................................................................31
2.7.5. correction of errors for execution time........................................................................31
2.7.6. creation and editing of pages.......................................................................................31
2.8. Uploading of themes...........................................................................................................32
2.8.1. Frontier theme..............................................................................................................32
2.8.2 Enigma theme...............................................................................................................33
2.8.3 Consulting theme..........................................................................................................33
2.9. Uploading plugins...............................................................................................................34
2.10. Website export and import of database............................................................................35
2.10.1. website database export.............................................................................................35
2.10.2. website database import.............................................................................................36
3.11 Requesting and reserving a domain...................................................................................36
2.11. Software development......................................................................................................37
2.11.1. Database.....................................................................................................................37
2.11.2. Database normalization.............................................................................................38
v
2.12. Creation of Database.........................................................................................................39
2.13. Creation of queries............................................................................................................41
2.14 Designing Web Application..............................................................................................45
CHAPTER THREE: CHALLENGES ENCOUNTERED DURING THE TRAINING PERIOD
AT SUPERCOM...........................................................................................................................51
3.0 introduction..........................................................................................................................51
3.1 Personal challenges..............................................................................................................51
3.2 Organizational challenges....................................................................................................52
CHAPTER FOUR: CONCLUSIONS AND THE EXPERIENCES ATTAINED ABOUT THE
TRAINING EXERCISE AT SUPERCOM TECHNOLOGIES LTD...........................................53
4.0 Introduction..........................................................................................................................53
4.1 In Conclusions;....................................................................................................................53
4.2 Experiences Attained;..........................................................................................................54
4.2.1 Skills Gained.................................................................................................................54
4.2.2 Interpersonal skills........................................................................................................54
4.2.3 Team working skills.....................................................................................................54
4.2.4 Communication skills...................................................................................................54
CHAPTER FIVE: RECOMMENDATIONS................................................................................55
5.0 INTRODUCTION...............................................................................................................55
REFERENCES..............................................................................................................................57
APPENDICES:..............................................................................................................................58
vi
LIST OF FIGURES.
Figure 1: parts of the motherboard................................................................................................11
Figure 2 Showing landgrid array proccesser.................................................................................12
Figure 3:pin grid array CPU..........................................................................................................12
Figure 4:checking system info using control panel.......................................................................13
Figure 5:how to check windows version using cmd......................................................................14
Figure 6: making a flash bootable using command prompt..........................................................15
Figure 7 Showing GPT disk format...............................................................................................16
Figure 8:components of a network................................................................................................19
Figure 9: running the command prompt as an administrator.........................................................20
Figure 10: setting hosted network..................................................................................................20
Figure 11:starting hostednetwork..................................................................................................20
Figure 12: open the control panel..................................................................................................21
Figure 13: turn on network discovery............................................................................................22
Figure 14:steps to configure a network.........................................................................................24
Figure 15:securing the network.....................................................................................................25
Figure 16: steps of telneting a device............................................................................................26
Figure 17:steps of encrypting a device using SHH.......................................................................27
Figure 18: creating a VLAN..........................................................................................................28
Figure 19: classes of cable termination.........................................................................................29
Figure 20: localhost homepage......................................................................................................31
Figure 21: view of myphpadmin....................................................................................................31
Figure 22: WordPress frontier theme............................................................................................32
Figure 23: WordPress enigma theme.............................................................................................33
Figure 24: WordPress with visual composer.................................................................................34
Figure 25: inserting slides using revolution slider plugin.............................................................35
Figure 26: login phpmyadmin.......................................................................................................35
Figure 27: exporting database........................................................................................................36
Figure 28: importing the database.................................................................................................36
Figure 29: database creation using mysql console........................................................................39
Figure 30:database creation using visual paradigm.......................................................................40
Figure 31 Showing school system landing page............................................................................46
Figure 32 Login and account creation forms.................................................................................47
Figure 33 showing adminstrative tools..........................................................................................49
Figure 34 Showing administrator landing page after successful login..........................................50
Figure 35 Showing me and my group member presenting our system.........................................58
vii
LIST OF TABLES.
Table 1:class A of network bits.....................................................................................................23
Table 2: class c of network bits.....................................................................................................23
Table 3: standards of cable termination.........................................................................................28
Table 4: requirements of software dev't.........................................................................................38
viii
LIST OF ACHRONOMS/ ABREVIATIONS.
CMOS…………………………Complementary Metal Oxide Semiconductor.
RJ………………………………Registered Jerk.
SB………………………………Standard B.
SA………………………………Standard A.
ix
ABSTRACT.
This report contains four chapters and these chapters includes in the following information;
CHAPTER ONE: The following chapter has the introduction like about the nature of internship,
where and the period of internship, name and physical location of the company, services
provided by the company tasks involved while in the industry and the management and
organization structure showing departments and the flow of responsibilities.
CHAPTER TWO: The following chapter has literature review that explains the different
hardware and software tools that I used or interacted with during the training like hardware
components like the motherboard, power supply among others and the software like cisco packet
tracer, word press, wampserver, VMware workstation.
CHAPTER THREE: The following chapter has the different detailed activities that I carried out
during the training period right from day one like ideation, hardware component identification
and its function, database creation and normalization, computer and printer repair, trouble
shooting, networking like ad hoc networking and Sub netting among others.
CHAPTER FOUR: The following chapter has challenges that I encountered during the training
period at Supercom and these ranged from personal to organizational challenges.
CHAPTER FIVE: The following chapter has conclusion about the training environment,
financing and duration, activities support from the industry, the university and the activities.
x
CHAPTER ONE.
Internship is a form of experimental learning that integrates knowledge and theory learnt in the
classroom with practical application and skill development in a professional setting. Internships
give students opportunity to gain valuable applied experience and make connections in
professional fields they are considering for career paths and give employers the opportunity to
guide and evaluate talent.
It could also refer to a period of work experience offered by an employer to give students
and graduates exposure to the working environment, often within a specific industry,
which relates to their field of study. Defined by NACE.
This is a detailed report of the Internship Program that took place between 29th March and
May 2021 at Supercom Technologies Ltd office in Kabalagala, Nsambya. The intention of the
Internship program is to enable the students to employ the knowledge given by their lecturers in
class theoretically into practical terms. The Internship gives the students an opportunity to apply
that knowledge in the field and in return they prepare a detailed report of the experience attained
in the field which is graded as a part of their three years Bachelor Degree course.
1.1.1 Objectives of the internship.
The intended Objectives of the Internship program as per the University arrangements are;
The sole purpose of the training is to impact practical skills to students especially the
first-year students before they interact with the field and outside world and to meet the
required job-related competences of their future employers. It also serves as a link
between the University and the various sectors who consume the products and services of
the University
To allow students to apply evaluate, test and integrate academic knowledge and
theoretical concepts in a work place setting.
To provide Awareness of one’s own learning process.
To provide a Reflective practice for life-long learning.
To provide students with experience in the disciplined and discriminatory use of evidence
in making decisions and solving problems in a work setting.
1
To encourage students to take a greater responsibility for their education and life and
develop self-reliance, personal style, values and beliefs in a manner consistent with
becoming a responsible and productive individual.
To reduce students to gain access to knowledge and equipment not available on the
University environment.
To improve and expand students’ knowledge about themselves and their abilities, goals,
and career interests in a work environment setting.
To reduce students’ intellectual and geographic parochialism.
2
The coordination of work and study tends to increase student motivation and, in some
cases, may result in improved academic performance.
Students have opportunities to sample their chosen career fields early in their studies.
For many students, the internship experience contributes to a greater sense of
responsibility for their own efforts and greater dependence on their own judgment.
Students gain a head start in their career fields and sometimes secure full-time
employment with their internship site upon graduation.
As a result of participation, students may earn money to support their college expenses.
Students gain real-world experience often learning about latest technology and equipment
used in the workplace.
Students learn job seeking and job holding skills and as a result, gain maturity,
professionalism, and confidence.
3
program lets you benefit from added manpower while more accurately assessing
candidates.
Increased productivity. Speaking of additional manpower setting up an internship
program allows you to take advantage of short-term support. The extra sets of hands help
your employees be more productive prevent them from becoming overburdened by side
projects as well as free them up to accomplish more creative tasks or those where higher-
level strategic thinking or expertise is required.
Increased employee retention rate. Employers who hire internship students indicate that
these students usually provide better employee performance evidenced by higher
performance ratings and lower absenteeism and tardiness/lateness thus they are legible to
be retained for work.
Enhance perspective. It’s not just the extra sets of hands that make interns advantageous
especially in an organization of only 12 to 15 employees, new people bring with them
new novel perspective, fresh ideas and specialized strengths and skill sets. These augment
the ability of the professional work force.
Take advantage of low-cost labor. Interns are an in-expensive resource. Their salaries are
significantly low if any than staff employees and you aren’t obligated to pay un-
employment or a severance package should you not hire them on fulltime. Moreover,
while their wage requirements are modest, they are among the most highly motivated of
the work force.
Find free of charge. Internships.com allows you to post your employer profile completely
free of charge. This means you get extensive exposure to the top collages and candidates
without putting a dent in your recruiting budget.
Give back to the community. As a small business, you likely relay on community
support.
Creating an internship program is an excellent way to give back. Hiring interns not only
helps students in your community get started, it enhances the local workforce as a whole.
4
The employment community can provide training on technical and highly specialized
equipment, thus enabling the educational institution to expend its funds on other needs.
Internship positions can provide a source of financial aid for students who might not
qualify for other financial aid programs (e.g. international students)
Our Mission: To Empower businesses and the Community with Suitable and affordable digital
technologies that simply meet and reach their needs.
Creativity
Simplicity
5
Perfection
Righteousness
Commitment
Location and Address: Our office is located at Tirupati Mazima Mall, Suite 88 Ggaba Road,
Nsambya.
Contact us on: Phone: +256 (0) 701 330532, Fax: +256 (0) 77 840016, Hotline: +256 (0) 777 84-
00-16. Visit our website : https://www.supercom.co.ug or E-mail: info@supercom.co.ug
Products:
Services:
Consumers:
6
Government and Private Organization (B2B)
Consumer (B2C)
Company Structure:
7
1.4 Aims of its department:
Development of information systems.
Management of IT hardware, software and infrastructure.
Provision of user support and IT training service.
Promote information sharing with in Supercom.
Improve technological infrastructure following technological trend.
8
CHAPTER TWO.
2.0 INTRODUCTION.
This chapter consists of activities done during the industrial internship training and its details
both practical and theory.it also involve the activities that I got involved in myself during the
period day after day of the week from December 14th2020 to January to 2021.
10
17. Audio jack sockets. These are used to connect output sound devices like microphone,
headsets and others.
18. PS2. It connects the analog devices.
19. Computer chip sets. These are chips that manages/controls all computer components.
like the north that handles communication between high performance devices such as
RAM, CPU and graphics and south bridge that handles communication between low
performance devices such as VGA, SATA, IDE, PCI, USB. It also controls input and
output devices.
11
Figure 2 Showing landgrid array proccesser
12
2.2. Software installation.
2.2.1. Operating system.
This is a program that enables the user to use the computer.
Types of operating system.
Full installation. Deletes everything one the computer.
New installation. Shrinks the computer hard disk into different partitions.
Upgrade installation. This allows upgrade of the O.S version, Like from windows 7 to
10
Dual installation. This involves installation of two O.S on one computer and running
them at the same time.
Downgrade installation. This allows in lowering the version of an O.S. like from
windows 10 to 7.
13
Using the command prompt.
Step1: Run the command prompt.
Step2: Type system info and press enter key.
14
5. Type create partition primary. (if it shows not enough, type clean and the retype the
command)
6. Select partition 1.
7. Format file system(fs).
8. Type active.
9. Type exit.
15
5. Select Linux.
6. Click open.
7. Click on the dropdown to select a flash.
8. Click ok.
9. Click start.
How to check the disk format whether it is MBR or UFI.
The following are the steps taken;
1. Open this pc.
2. Right click on local disk.
3. Click on properties.
4. Right click on the volume.
5. Click on properties.
6. Click on hardware.
7. Select the volume.
8. Select populate.
9. Click on change settings.
10. Click on volumes and populate to show the type of the disk.
16
3. Click next, repair the computer if it is necessary to convert from MBR to GPT.
4. Click install setup.
5. Enter the license key if you have it, if no say I don’t have.
6. Click custom installation and select a partition and click next.
17
2.5. Networking.
This is the interconnection of computer components in order to sharing resources. There are
many types of networking which includes LAN (local area network), WAN (wide area network)
and others.
2.5.1. Components of a network.
A network has 3 components namely devices, services and media.
i. Devices:
Examples of devices include the following;
Internetworking devices. These are devices that connect one network to another
network e.g routers (wireless and non-wireless). A router is a device that controls
the incoming and outgoing packets on a network. It consists of manageable and
non-manageable types. It also consists of 4 LANs.
Intermediary devices. These are devices that connects end devices to the network.
like switches, hubs, wireless access point and network accessories.
End devices. These are the devices that the users of the network connect with. For
examples include computers, mobile phones, etc.
ii. Medias. These are wireless and wired devices like Bluetooth, Wi-Fi and network cables
of different types like cross over, roll over and straight through.
iii. Services. Include internet service provider (ISP) and internetwork operating system
(IOS). This is the OS of network device.
18
Figure 8:components of a network.
19
Step1: Run the command prompt as an administrator.
Step2: type netsh wlan show drivers and press enter key in order to see the available drivers
whether the computer supports the service
20
Figure 12: open the control panel
step7: open network and sharing center.
Step8: click on change advanced sharing center then turn on network discovery and turn on file
and printer sharing and save changes.
21
Figure 13: turn on network discovery
Step9: Then go to the other computer and allow its network file sharing.
Step 10: get a folder you want to share and allow its access then use the other computer to watch
a video or share the file.
22
has one octet network address and 3 octet bit host addresses. This in decimal is represented as
255.0.0.0 with a default /8.
ii. Class B. This class can be identified by using the first digit of the address that lies
between 128 and 191. The first octet bit is 10. Represented as N.N.H.H which implies
that a class B address has two network octet bits and two host octet bits and in binary is
represented as 255.255.0.0 with a default /16
iii. Class C. This class can be identified by using the first digit of the address that lies
between 192 and 223. The first octet bit is 110. Represented as N.N.N.H which implies
that a class C address has three network octet bits and one host octet bits also
represented in decimal as 255.255.255.0 with a default /24.
23
ii. Then assign IP Addresses on all the devices on the network.
iii. If it is a LAN topology, then a router is not required since all devices are connected on
the same network. For a WAN, a router, an inter network device, will be required to
allow communication among the devices on all networks.
iv. This configuration can be shown using the following steps clearly shown in the
screenshot.
24
2.5.3.1 Console:
In the console of the device, to configure the user privileged mode, follow the following
commands in steps;
Step1: type in Enable the device, switch.
Step 2: type in Configure the terminal.
Step 3: Type in line console 0.
Step 4: type in Then enter the password.
Step 5: type in After entering the password, then login and end.
To secure the user execution mode, follow the following steps;
Step 1: type in Enable the device.
Step 2: type in Configure the terminal.
Step 3: type in Type enable secret and then put a password.
Step 4: type in Then end.
25
6. Step 5: type in Then ensure it is powered on by saying no shutdown.
7. Step 6: type in Then type line VTY and assign the number of devices you would like to
telnet i.e. 0 5
8. Step 7: type in Type transport input telnet.
9. Step 8: type in Assign the device a password and then login and end.
26
Step 3: type in Type line VTY 0 5.
Step 4: type in Type transport input SSH.
Step 5: type in Type login local.
Step 6: type in Assign a password.
Step7:typeinend.
27
2.5.3.4 Vlan.
This was done using the commands below as shown in steps;
Standard A Standard B
White green White orange
Green Orange
White orange White green
Blue Blue
28
White blue White blue
Orange Green
White brown White brown
Brown Brown
This refers to a software application that is used in the creation of databases on a local host. We
installed wamp server on our computers under local disk c. We used wamp server in the creation
of databases for our projects done in website designing using phpmyadmin that is found under
tools of wamp server when run in the browser. We also used wampserver in the database
creation, selection, insertion and practice database normalization under the MySQL console.
30
Open the extracted word press to confirm whether it has a lot of files inside it.
Rename the extracted word press the name of your own project.
Go to the internet explorer and type in local host.
Click on the project formed and run it.
31
2.7.6. creation and editing of pages.
Step1: Hover on pages under the dashboard, click on add new.
Step2: Type in the name of the page and click on publish until you finish page creation.
Step3: If you want to edit, click on edit page and then click on update after you are done
editing.
i. Extract the zipped folder of the theme and paste it in your project under themes.
ii. Then go to your admin panel and activate the theme.
32
This theme makes use of the wow slider to input slides in the site pages.
To customize this theme, go under appearances, customize and then all the necessary
modifications. Alternatively, we can use plugins like the wow slider to give slides to pages and
the contact form used by clients to contact us.
33
Figure 23: WordPress enigma theme
Step1: Extract the zipped folder of the theme in the www folder of WAMP.
Step2: After extracting, copy the consulting purchased folder and paste it in the project.
Step3: The theme is then activated in the admin panel of the site.
34
Figure 24: WordPress with visual composer
ii. Revolution slider.
This plugin is used as follows;
After creating the element in visual composer, go to revolution slider and add a
new slide.
Enter the slide name and alias which will give you a short code that is put in the
elements on the home page.
Then add an image that will be viewed in the slider.
35
Figure 25: inserting slides using revolution slider plugin
Step 3: Click on databases and then click on export in the top bar.
Step4: Select customize.
Step5: Deselect test database there is there by default.
36
Figure 27: exporting database
37
i. Local top level domain or the local domain. These are domains within your home
country. For example, .co.ug, .ac.ug, .com.ug, .co etc. local domains have an advantage
of showing the people who visit your site the location of your company.
ii. Top level domain or international domain. This is a domain on an international level for
example .com, .biz, .org, .info, .net etc.
A database is an organized collection of data, generally stored and accessed electronically from
a computer system. Database is also a storage location which store the input data. In database
creation, there are draft requirements like database, tables/entity, attributes and values. we also
looked at the how the sketch of someone developing an app or software should look like as
below;
38
Table 4: requirements of software dev't.
39
3. 3rd normal form.
It involves of 1st NF and 2nd NF.
Transitivity
It involves elimination of repeated data.
It has a primary key and a foreign key.
40
b. using visual paradigm.
We also used visual paradigm in creation of database. We installed visual paradigm on our
computers and created database using it.
Data definition – Creation, modification and removal of definitions that define the
organization of the data.
Update – Insertion, modification, and deletion of the actual data.
Retrieval – Providing information in a form directly usable or for further processing by
other applications. The retrieved data may be made available in a form basically the same
as it is stored in the database or in a new form obtained by altering or combining existing
data from the database.
Administration – Registering and monitoring users, enforcing data security, monitoring
performance, maintaining data integrity, dealing with concurrency control, and
recovering information that has been corrupted by some event such as an unexpected
system failure.
41
CREATE TABLE persons (person_Id int(11) not null AUTO_INCREMENT, primary
key(person_Id));
ii. Foreign keys. To create a table with a foreign key, follow the syntax below;
i. CREATE TABLE marks (marks_id int(2) PRIMARY KEY, tests int(20) NOT NULL,
exam int(20) NOT NULL, person_id int(2), FOREIGN KEY (person_id) REFERENCES
Persons(person_id).
2.13. Creation of queries.
Queries of a database. These include;
42
v. DELETE: The delete statement is used to delete records in a table. The where clause
specifies which record should be deleted. if you omit the where clause, all records will be
deleted! The SQL delete Syntax is as follows;
DELETE FROM tablename WHERE columnname=value;
vi. Alter. The alter table statement is used to add, delete, or modify columns in an existing
table. SQL ALTER TABLE Syntax
To add a column in a table, use the following syntax:
ALTER TABLE tablename ADD columnname datatype (size);
The AFTER keyword statement is used to add a column after a given column
name. SQL AFTER KEYWORD Syntax
ALTER TABLE tablename ADD COLUMN columnname datatype(size) AFTER
columname;
The FIRST keyword is used to add a column at the beginning of the table SQL
FIRST KEYWORD Syntax
ALTER TABLE tablename ADD COLUMN columnname datatype(size) FIRST;
The CHANGE keyword is used to change a column from one place to another
The modify keyword can also be used to change a column from one place to
another and also change the datatype. SQL MODIFY KEYWORD Syntax
ALTER TABLE tablename MODIFY columnname datatype(size) AFTER
columnname;
Or
ALTER TABLE tablename MODIFY COLUMN columnname newdatatype (new
size)
To delete a column in a table, use the following syntax (notice that some database
systems don't allow deleting a column):
ALTER TABLE tablename DROP COLUMN columnname;
To rename a table in a database, use the following syntax
43
RENAME TABLE databasename.oldtablename TO databasename.newtablename ;
Or
RENAME TABLE oldtablename TO newtablename ;
44
mysql>insert into student values('1','Odeke
Moses','07590694244','1','2','1');
Query OK, 1 row affected (0.00 sec)
mysql>select
student.sname,student.phone,university.uname,course.cname,year.yn
ame from student,university,course,year
where(student.uid=university.uid and student.cid=course.cid and
student.yid=year.yid);
+-------------+-----------+-------+-------+-------+
| sname | phone | uname | cname | yname |
+-------------+-----------+-------+-------+-------+
45
| Tangombe Tresor | 0754095959 | CUU | BCE | 2021 |
| Mariam | 07590694244 | CUU | BCE | 2021 |
+-------------+-----------+-------+-------+-------+
2 rows in set (0.13 sec)
Whereby every user type has got its functions as listed and illustrated below.
1. Admin.
46
Create account
Login
View status like new students and new applications.
Add locations
Add university
2. Student
Create account
Login
Visit universities
Apply to the universes
Follow up on the application
This is the landing page of my school system where all both students and administrators
land after using the system domain.
The images bellow also shows the different security measures for an administrator before
he or she logs in.
47
Figure 32 Login and account creation forms
48
Figure 33 showing adminstrative tools
49
The above image shows the update form that an administrator uses to update the
information.
Lastly, the admin can click on admin in top right Conner and then logout to unset all the
sessions and return to login where he or she can click on back on login page to go back to
the portal or landing page.
50
CHAPTER THREE: CHALLENGES ENCOUNTERED DURING
THE TRAINING PERIOD AT SUPERCOM.
3.0 introduction
This chapter highlights the challenges which includes personal, company that I encountered or
hindered me from understanding very well some of the concepts of particular activities that were
done on particular days during the training period and these ranged from the first day up to the
last day of the training as shown below;
Overwork
after given session we would be assigned different work like working on different projects which
needed a lot of time, so in this case I would even end up curing some work to my place of
residence in order to complete it in time.
51
Understanding teamwork.
Provision of meals
Supercom technologies limited do not provide meals to interns. People go out of the organization
premises for lunch and some delay to return to company which affects the performance of the
company since the number of hours’ employees are required to be at work are reduced.
52
CHAPTER FOUR: CONCLUSIONS AND THE EXPERIENCES
ATTAINED ABOUT THE TRAINING EXERCISE AT
SUPERCOM TECHNOLOGIES LTD.
4.0 Introduction
This chapter, highlights the conclusions about the training process on the activities all done in
details, training environment and experience gained during the training among others.
4.1 In Conclusions;
The training period at Supercom Technologies was good because I managed to gain skills and
learnt what I had not expected and I also gained a lot of experience right from practical work to
ways of communicating with others.
I was able to learn how to repair both computer system hardware and software and that for the
laptop like installing of windows using a bootable flash disk though I faced some challenges like
backing up of all the information that was on my flash when making it bootable among others
and also differentiating the different components of hardware found in the system unit and I also
learnt the concept of ideation, innovation and co-creation like we came up with an idea of E-safe.
I also managed to understand how to create an ad hoc network for sharing resources like files
and folders and the components of networking like devices, media and services. I also learnt how
to access another computer remotely. I also managed to learn the different types of networks and
also on how to configure a switch and router among others,
I managed to learn website development without writing any single codes through the use of
word press with customizing of themes like enigma, frontier; consulting and plugins like woo
commerce, visual composer among others.
I also managed to learn more about website development using different themes that are fully
paid up like consulting which comes with most of the plugins like woo commerce, bookings,
visual composer among others and we also reviewed the concept paper of our previous ideas
developed during the course of internship and also report documenting for both internship and
Supercom weekly.
53
I managed to learn how reserve, register and hosting a domain using the service provider of my
own choice and this was Supercom. I also learnt database creation, selection, insertion and
practice approach on normalization of the database.
I also managed to learn on how to develop a web application where I was working as full stark
developer whereby I learnt how to develop database using sql language, graphical use interfaces
using HTML and CSS and connect it with database using scripting languages like php.
4.2.2 Interpersonal skills. This was obtained through interacting and establishing a good
relationship with staff in different departments and fellow interns at Supercom. I learnt to work
in teams, being polite, greeting others.
4.2.3 Team working skills
This was gained through performing tasks assigned in groups with fellow trainees who enabled
me to acquire ideas from other group members and also appreciate the importance of working in
teams to increase efficiency.
54
CHAPTER FIVE: RECOMMENDATIONS.
5.0 INTRODUCTION
The following below are my ways forward to foster the activities of the industry, the university
and the training in order to ensure long term and sustained continuity of the industry and
activities and they are basically to my fellow internees, to the company and to the university and
these are as shown below;
55
(b) To the Company;
I recommend that the company should be able to communicate at the start of the
internship that people are expected to make the monthly company reports so that
we people are not unconvinced at the last week of the month that they are
supposed to make reports.
I recommend that the company should be able provide free internet during the
internship period because it makes it hard when given a task like to do a given
project in case you want to download something when you don’t have internet
because images are needed.
I recommend that the company should provide lunch to the trainees so ha a lot of
time is not wasted because of going outside to look for lunch especially for those
who can accommodate.
(c) To the students;
I recommend that fellow students whom we always have internship with should
keep time this is because it widens on our coverage through discouraging the need
for the supervisor from going back where he/she started from to repeat for late
comers.
I also recommend that fellow students who go for internship should also always
have a laptop so that to help him/her during internship this is because internship is
full of practical.
I also recommend that Students should continue with the spirit showcased during
the internship period which helps prepare them for their careers in the future and
also helps them keep practicing their theoretical knowledge obtained in class.
I also recommend that Students should continue with internship or even volunteer
in organizations since it helps them develop an understanding of the work ethics,
employment responsibilities and demands.
56
REFERENCES.
1. Supercom Technologies ltd. (www.supercom.co.ug).
57
APPENDICES:
Appendix 1: Showing me and my internship company supervisor showing the certificate I was
awarded after the completion of my internship program at Supercom Technologies ltd.
58