MELDA'S INDUSTRIAL ATTACHMENT

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 38

NAME: NYARIWO MELDAH ALUOCH.

INSTITUTION: URIRI TECHNICAL AND VOCATIONAL COLLEGE.


FUCULTY/DEPARTMENT: BUSINESS.
COURSE: CERTIFICATE IN INFORMATION COMMUNICATION TECHNOLOGY.
ADMISSION NO:1289.
PHONE: 0796717895.
EMAIL: aluochmelda22@gmail.com

A REPORT ON FIELD ATTACHMENT


AT

Sukari Industries Limited

P.o. box: 237, 40302 Ndhiwa- Kenya

Date From 4th_September to 30th_November

PRACTICAL TRAINING REPORT

An Internship Report Submitted in Partial Fulfilment of the requirements for the award of a
Certificate in information communication technology at Uriri Technical Vocational and
College.

Date Submitted: 30/11/2023


DECLARATION

I do hereby declare without any reasonable doubt that the work presented in this attachment report is
my own original and independent work and it has not been presented before to the Faculty of
information communication and technology department for the award of Certificate in information
communication and technology at Uriri Technical Vocational and College. No part of this report shall
therefore be duplicated without my prior consent.

Sign: ……………………….
Date: ……………………….

2
APPROVAL
This report has been compiled and submitted by Nyariwo Meldah Aluoch under the guidance
of my
Field supervisor at Sukari Industries Ltd with the approval of the following:

Academic Supervisor:

Signature……………….. Date and Stamp………………

MR EDWARD OOKO.

Field Supervisor:

Signature……………….. Date and Stamp………………

MR KENNEDY OCHOLA.

IT Department Manager

Signature……………….. Date and Stamp………………

MR EVANCE OGANDA.

3
DEDICATION

I am humbly dedicating this report to God Almighty for strength, knowledge and wisdom He
granted me in writing this report.
Secondly, I dedicate this report to all the staff of IT Department for their support.

4
ACKNOWLEDGEMENT
I would like to express my gratitude to Sukari Industries Ltd and Uriri Technical and
Vocational college for giving me this opportunity to do an information technology training as
a part of the requirement for the Certificate in Information Communication and Technology.

Throughout this training, I am very honoured and lucky with the encouragement and
guidance
from my supervisors Mr Evance Oganda, Mr Kennedy Ochola and my academic supervisor
Mr Edward Ooko.
I thank the staff of Sukari Industries ltd for being supportive and sparing the time to share
their knowledge in various fields.

In addition, I offer sincere thanks to my fellow trainees for making learning an interesting
team work adventure.

5
ABSTRACT

This report is a presentation of the internship performed at Sukari Industries Limited (SIL)
fulfilling a requirement by the College for the Award of Certificate in IT. The report is
subdivided into four chapters as discussed below;

Chapter one portrays the introduction of the report, background of the field attachment, the
objectives and its relevancy to me as a student; the description of SIL including the nature,
mission, vision. The organizational culture and the main activities carried out in Sukari
Industries Ltd.

In addition to that chapter two shows the experience I gained during the internship period. It
consists of an outlined description of roles and responsibilities that I was engaged in during
the internship and the knowledge and skills gained. It also brings out the challenges faced as
well as the lessons learnt.

More still chapter three shows the level of accomplishment of the duties and responsibilities
assigned, the most interesting experiences, and relatedness of the College Taught programs to
field work.

In a nut shell chapter four portrays the conclusions and recommendations including the major
strength and weakness of internship program and Sukari Industries Limited community,
recommendation both to the organisation and the College for Improvement of the internship
programs.

6
Table of Contents
DECLARATION.................................................................................................................................ii
APPROVAL........................................................................................................................................iii
DEDICATION....................................................................................................................................iv
ACKNOWLEDGEMENT...................................................................................................................v
ABSTRACT........................................................................................................................................vi
CHAPTER ONE..................................................................................................................................1
1.0 INTRODUCTION...........................................................................................................................1
1.0.1About industrial training........................................................................................................1
1.0.2 Objectives of industrial training................................................................................................1
1.0.2.2 Objectives of industrial training to the organization............................................................2
1.0.2.3 Objectives of industrial training to the college......................................................................2
1.1 Company Location........................................................................................................................2
1.2 HISTORICAL BACKGROUND..................................................................................................2
1.3.2 Company’s Vision.......................................................................................................................3
Chief Information Officer (CIO).........................................................................................................7
IT Manager..........................................................................................................................................8
Network Administration.................................................................................................................8
System Administrator........................................................................................................................8
Responsibilities of The IT Department.....................................................................................9
Administration...............................................................................................................................9
Support........................................................................................................................................10
Communications..........................................................................................................................10
Programming...............................................................................................................................11
Company Website........................................................................................................................11
Application Development............................................................................................................11
CHAPTER TWO...............................................................................................................................12
FIELD ATTACHMENT ACTIVITIES......................................................................................................12
2.0 HARDWARE........................................................................................................................12
2.1 System unit...................................................................................................................................12
2.2 Printers.........................................................................................................................................15
2.3 Automatic Voltage Regulator/UPS.............................................................................................15
2.4 Installation of Windows..............................................................................................................16
2.5 System Administration................................................................................................................22
2.6 Networking Activities:.................................................................................................................22
2.7. CRIMPING AN EATHERNET CABLE..................................................................................23

7
3.0 EXPERIENCE.............................................................................................................................24
3.1.1 Lessons and experiences.....................................................................................................24
3.1.2 Challenges and limitations.......................................................................................................25
4.0 CHAPTER FOUR.......................................................................................................................25
4.1.1Summary..............................................................................................................................25
4.5 Weaknesses...................................................................................................................................26
 A computer is connected to a network through network in surface curve also called NIC..........27
 The NIC prepares data from the computer from the network cables............................................27
 Data moves through a computer along paths called buses...........................................................27
 The NIC sends data to another computer.....................................................................................27
 The NIC controls data access to the cable by following specific rules.........................................27
 NIC receives incoming data from the cable and translate it into a form that can be understood by
the computer’s central processing unit.................................................................................................27

8
CHAPTER ONE

1.0 INTRODUCTION

1.0.1About industrial training

As part of Government of Kenya’s policy in education, the Uriri Technical and Vocational
College have initiated a mandatory industrial attachment as part of the student program to
achieve the mission of practical exposure.
This industrial attachment enables every student to acquaint themselves with what has been
learnt in lectures hall and also gives student an exposure to the working environment. The
industrial attachment brings greater benefit since student have more opportunities to be
involved in real practical work in organization and also acquaint themselves through
advancement through innovation of new techniques and a new practice. Students are also
exposed to the real world of work and its challenges which will prepare them towards our
future careers.
Being a student of Uriri Technical and Vocational College studying in order to fit well into
the industry, it is necessary for student to know how some of the industry operates. That is
the main reason why industrial attachment comes in. The industrial attachment helped student
to understand the industrial application of the theories taught in class. It also helps students to
face challenges in the industry and in so doing the students try to find possible solutions to
such challenges. Industrial attachment complements the efforts of lecturers and instructors as
well as giving the student a first-hand experience of the activities of the industry.
The industrial attachment seeks to offer students a practical translation of the theory they
have been taught. It has also got individual benefit of liaising the College to the industries,
hence brightening the employment chances of the students in the College.

1.0.2 Objectives of industrial training


There are several objectives of industrial training to the student, organization and colleges,
and some of them are listed below;

1.0.2.1 Objectives of industrial training to the student


These are some of the objectives of industrial training to the student;
 To give the student an opportunity to put theoretical knowledge learnt in to practice.
 To give the student an opportunity to gain more practical skills.
 To give the student an opportunity to learn how to relate with the people in the field
that is to say be a team player.
 To give the student exposure to the rapidly changing technological world.
 To get exposed to working pressures, learning to cope up with them and
appropriately respond to them i.e., learn to beat deadline.
 To develop the skill of punctuality and responsibility at the work places.
 To learn to easily adapt to new working environments.
 To develop a student’s computing skills in various skills like networking security.
 To improve technical skills by having hands on working experience at the industrial
training places.

1.0.2.2 Objectives of industrial training to the organization


Some of the objectives of industrial training to the organization include;

9
 The organizations aim at tapping new and bright ideas that trainees/interns usually
possess, and such ideas can be used by the companies to improve their services and
their earnings.
 The organizations view industrial training as an opportunity for future recruitment of
employees whereby trainees/interns who display exceptional abilities can be recruited
by the companies in the near future.
 Some organizations view industrial training as an opportunity for tapping cheap
labour
from the interns for that specified period of time.
 It is a compulsory obligation for the companies/organizations to offer training to
students from tertiary institutions such as universities, technical colleges and technical
schools.

1.0.2.3 Objectives of industrial training to the college


Some of the objectives of industrial training to the college include;
 To provide the students with practical work to consolidate the theoretical work taught
at the college.
 To create a working link between the college and the organization where the student
is training from.
 The college views the industrial training places as the partners in the task of
educating the students.
 The students are expected to obtain new ideas from their industrial training places
which when presented to the college through the reports, can help the college to
modify the content of the syllabi so as to suit the job standards.
 Industrial training acts as an evaluation of the colleges by the
companies/ organizations and hence if the student interns display credible knowledge,
the university gets a good recommendation.

1.1 Company Location


Sukari Industries Limited (SIL) is located in Ndhiwa district in a town called Riat- West
Nyokal in Kanyikela about 10km from Ndhiwa Town

1.2 HISTORICAL BACKGROUND


Pioneer of Sukari Industries Limited was Sunil Patel and Lalu as contractor in 2010. At its
inception, there was a lot of political resistance due to fear of local voters being relocated as a
result of acquisition of land for developing the factory. Notable among them was the late
Monica Amollo an aspiring Member of Parliament at the time.

Due to resistance, sensitization was put in place to convince the local community on the
benefits of the factory. Champions of change were the late area Member of Parliament at that
time Honourable Orwa Ojode, His Excellency Governor Okoth Obado (at the time Director
Kenya sugar Board, District Commissioner Aggrey Modenyi, District Commissioner Rata
John, Counselor Nyambero Onyango, Area Chief Okumu Owiti and Assistant Chief Javan
Abuto.

10
The District Commissioner Geoffrey Omoding' and the late Hon. Orwa Ojode instructed the
chief to do a door to door campaign convincing people to give their land for sale at a price of
Ksh. 70,000 per acre to the factory.

Sunil was then advised to pay land owners and transactions done later on in the land office in
Homa Bay in liaison with the land officer/ registrar then Madam Lamu who forthwith issued
title deeds.

The chiefs and assistant chiefs assisted sign forms for widows who had not undertaken land
succession for ease of transfer of title deeds.

The factory started on a 15-acreage piece of land. To date it lies on more than 100 acreage of
land. Full operation was in 2011 with groundbreaking done by sitting H.E. Governor Zachary
Okoth Obado of Migori County.

Currently, this is one of the flagship projects for the Rai Group of Companies that is currently
processing half of Kenyan sugar with other millers located in the former western province.

1.3 MISSION, VISION AND CORE VALUES


1.3.1 Company’s Mission
To produce and market sugar under conditions that conform to the highest internationals’
standard in quality.

1.3.2 Company’s Vision


To be leading sugar producer in Africa, renown at home and abroad for its high quality, value
added product.
To develop the small-scale sugar cane farmer in and around our sugar cane catchment areas
and to contribute to and participate in social responsibility initiatives together with local
communities.

1.3.3 Company’s Core Values


The Company’s policy is to provide equal employment opportunities and to base Human
Resources decisions up to individual merit and capabilities. In pursuit of this policy, staff
members are engaged without regard to race, colour, religion, language, political or other
opinion, ethnic or social origin, nationality, race, sex, disability, pregnancy, HIV status or
marital status.

The company also believes that the term “diversity” incorporates all characteristics that make
employees both alike and unique-backgrounds, cultures, nationalities, lifestyle, identities,
points of view, approaches to solving problems and ways of working. The commitment to
diversity is a business imperative that will propel the Company to greater heights in future.

1.4 Organization profile


Sukari Industries Ltd is a private company processing and producing sugar for human
consumption

Value proposition

11
Teamwork
 To Harness Individual talents and ideas for a common goal.
 We shall promote Team effort, Trust and Partnership to achieve our set goals.

Integrity
We shall serve with accountability, transparency, trust, honest and consistency in all we do.

Respect
We shall highly esteem our clients/ stakeholders while delivering a responsive Service.

Excellence
 Excellence in service, client care, image and presentation.
 We continuously strive to offer a better service today than we did yesterday.
 We aim to exceed client expectations.

1.8 Code of Conduct Expected in SIL


1. Descent dressing is recommended
2. Discipline should be attained
3. Confidentiality is necessary
4. Making loose talks and unguarded statements is not allowed
5. Politics engagement is not allowed
6. Time management mandatory
7. Team work is encouraged

1.9 Organizational structure


Sukari industries Limited is organized into hierarchy with top, middle and operational
management. The company has various departments which assist in the delivery of quality
services to the clients.

12
These departments include the following;

Human Resource Department


This department carries out the recruitment, rewards management, learning and development,
employee communications and administration.

Finance department
This department involves financial policy and management including cash management,
financial accounting, system and budgetary control. It also deals with controlling of cash
around the organization.

Agricultural department
It deals with cane growth and harvesting

Legal department
Legal department is in charge of all legal activities of the company and responsible for
representing the organization in court issues.

Sales and Marketing Department


Responsible for promoting and selling the company's products and by-products. This
department is also responsible for market research and identifying new sales opportunities.

Environmental Health and Safety Department

13
Responsible for managing the company's environmental, health, and safety programs to
ensure a safe and healthy working environment for employees and compliance with
environmental regulations.

Electrical Engineering Department


Responsible for designing, developing, and maintaining electrical systems, including power
distribution systems, lighting systems, and control systems.

Mechanical Engineering Department


Responsible for designing, developing, and maintaining mechanical systems, including
manufacturing equipment, conveyor systems, and material handling equipment.

Process Engineering Department


Responsible for improving manufacturing processes and workflows to increase efficiency and
reduce costs.

Stores and Purchase Department


The department deals with the procurement of materials needed by the company and various
departments.

Auto workshop Department


This department details with the automobile repair and maintenance. The department also
offer recovery of breakdown vehicles in the field of operation

Transport Department
The department takes the sole task of transporting cane from the field to factory for
processing

IT department
This department is responsible for all technological issues within the organization and as well
as ensuring the smooth running of services needed by the workers and staff respectively.

The department offer user/ System support whenever there’s need. IT department also
provide user training in regard to user area of operation related to computer & new
technology involved.

An Information Technology, or IT, Department develops, manages and maintains an


organization's technology-related assets (hardware, software, systems, etc.), policies,
procedures and systems. This includes, but is not limited to, the administration of company
email systems, business intelligence and enterprise resource planning [ERP] platforms,
network setup, data backup and retrieval and document storage. The group also provides
employees with day-to-day technology support to ensure that technology-related problems do
not interfere with their work.

14
IT Structure

IT Manager

Ass. IT Manager

System Network Database Security Application


Administrator Administartor Administrator Administartor Developer

IT Technicians/ Support

IT Assistants/ Helpers

Chief Information Officer (CIO)


A chief information officer (CIO) is the company executive responsible for the management,
implementation, and usability of information and computer technologies.

Because technology is increasing and reshaping industries globally, the role of the CIO has
increased in popularity and importance. The CIO analyses how various technologies benefit
the company or improve an existing business process and then integrates a system to realize
that benefit or improvement.

A CIO must be agile, responding quickly to trends, changes, and the needs of the
organization, its people, and those it serves.
CIOs must employ several hard and soft skills to excel at this job. CIOs need to know how
to run a business because the job requires a lot of knowledge about how a company works
from top to bottom.

15
IT Manager
An IT manager holds a leadership role within an organization's information technology
department. They are responsible for overseeing and managing the organization's IT operations,
systems, and infrastructure. IT managers play a crucial role in aligning technology strategies
with the organization's goals, ensuring the efficient and secure operation of IT resources, and
supporting the overall objectives of the business.

The primary responsibilities of an IT manager include strategic planning, team leadership,


budgeting and resource management, project management, IT operations and support, and
security and risk management. They work closely with stakeholders across different
departments to understand their technology needs and develop solutions that meet those
requirements. They manage teams of IT professionals, coordinate projects, handle budgeting
and procurement, ensure the reliability and security of IT systems, and provide guidance and
support to maintain a robust technology infrastructure.

IT Security
(Common IT Security job titles: Cybersecurity Analyst, Information Security Analyst,
Information Security Engineer)
The IT Security Group is responsible for defining, communicating and enforcing technology-
related policies, standards and procedures. They are tasked with mitigating risk related to
internal and external data breaches and cyber-attacks. IT Security teams also work to develop
security incident management plans and ensure that all technology-related projects meet
defined security requirements. Robust system and network security is especially vital in
industries such as banking, consumer finance and insurance, where large amounts of private
data (social security numbers, bank account information, etc.) reside in company systems.
Network Administration
(Common Network Administration job titles: Network Engineer, Network Administrator,
Systems Administrator)
The IT Network Administration Group manages the company's technology 'backbone' – its
data centres and networks. They plan, design, implement and maintain server configurations,
routing protocols, network configurations and storage environments to facilitate the needs of
the organization. They also configure server backups, monitor network use statistics and
loads, and implement contingency plans to minimize network and system downtime. The
network administration team also works closely with the IT Security Group to ensure that
company servers and networks meet or exceed established security requirements.

System Administrator
A system administrator is an essential IT professional who is responsible for providing a
reliable work environment for an organization—from server and network performance to
security and all other areas that keep an organization’s IT systems running smoothly. System
administrators must have an in-depth understanding of computer software, hardware, and
networks and are highly skilled, valuable members of an organization.

16
At a high level, system administrators are responsible for system performance, design, and
reliability and the security and optimization of computer systems. The breadth of these
responsibilities is dependent upon the size and scale of an organization’s IT-related
infrastructure.

Responsibilities of The IT Department

Many companies, especially those on the path to digitalization, rely on the IT department
for everything related to the smooth operation of their computer network. The IT
department has three main areas of responsibility: managing the company's corporate
systems, maintaining the infrastructure, and the functionality of the systems as a whole.
In addition, IT professionals work with software and hardware in various areas that allow
a business to succeed.

Each IT person in the department plays an important role in the company. Some are
responsible for multiple areas, especially in smaller companies. In other cases, the
company may have only one IT specialist. Here are the main responsibilities of the IT
department:

 Administration
 Technical support
 Communications
 Programming
 Company website
 Application Development

Whether the IT team consists of two people or 20, it seems that there is always an endless
list of tasks that need to be solved quickly. Many employees/ Organizations don't realize
that the IT team is responsible for much more than just fixing computer problems or
helping log in when an employee has forgotten their password.

Administration

IT administrators play an important role within a company and the IT department itself.
They are approached when someone needs help with a technical problem or has just
joined the company and needs help with new equipment. The duties of an administrator
may overlap with those of other team members from time to time. For example, the
positions of the system and network administrators may have a similar organization chart
but a different focus. Some general administrative duties include the following:

 Support for the company's computer infrastructure


 Help new users with computer and software problems
 Training employees on new systems
 Performing software updates
 Renewal of licenses and other legal documents
 Tracking current contracts with suppliers
 Filling in organizational forms

17
 Ensuring compliance with quality standards
 Assessment of potential threats
 Data storage control

Support

When people need access to computer systems or help with troubleshooting, they are
usually referred to a technical support team. Technical support specialists are especially
helpful in solving hardware and software problems, although their role in the company
does not end there. Another big part of their work is educating people and answering
questions about the technologies they use. Here is a list of duties that support staff
performs:

 Installing new software or hardware


 Selection and purchase of IT equipment and consumables
 Participation in asset management and IT inventory
 Assistance in backing up and restoring digital assets
 Troubleshooting network problems
 Creation of work logs
 Process documentation
 Setting up telephone lines
 Ensuring documented processes
 Installation of video and audio conferencing
 Installation and configuration of printing, copying, and other equipment
 Provision and installation of cloud applications/services
 Repair of equipment

Communications

There are several instances in a business environment where the IT team helps make
communication successful between all parties involved. Companies may need to
communicate with potential or existing customers through a variety of technologies.
Thus, with the development of digital technologies, meetings and interviews using the
web are becoming more and more popular. The IT team is trained to assist in the event of
technical failures at these important meetings. Here is a more detailed list of IT
responsibilities related to communications:

 Providing point-to-point telephone connections, as well as conference calls


 Preparing for video and web conferences
 Email maintenance and troubleshooting
 Consultations for heads and employees of business departments
 Coordination of network security systems, adding and deleting users
 Providing end-user support for computer applications
 Create backup copies of data sources
 Loading new data into the system

18
Programming

The company's programming department has employees with the skills of web
developers, programmers, and possibly other IT professionals involved in creating new
programs. The latter often work with software developers and engineers to turn their
projects into workable code. Here is a list of duties specific to this area:

 Development and improvement of business applications


 Create new databases with productivity software
 Convert printed and electronic documents to ASCII, HTML, PDF, and other
formats
 Using graphic applications to edit, copy and save data
 Spreading knowledge about application development languages
 Programming in different languages such as Linux, Java, JavaScript, C++,
Asp.net, C#, SQL, HTML, and PHP

Company Website

In order to create a successful and user-friendly website, you need to follow many steps.
The IT team collaborates with different departments of the company to realize a shared
vision of how the website should look and function. Most often, the marketing team
provides copy and organizational design content for the site and then hands it over to the
IT team for development. IT professionals work to write the code, test the functionality of
web pages, and help resolve any user experience issues. Here is a list of duties that IT
professionals perform on a website:

 Website layout creation


 Writing and implementation of site code
 Website usability testing
 Support for the company's internal network (intranet)

Application Development

Members of the IT team may work to create computer programs or applications that help
the business function better. Business applications are especially useful for content
management, employee communication, customer relationship management, and
enterprise resource planning. Developers put applications through a series of tests that
ultimately lead to useful tools that employees and business owners can use. Here are some
of the main responsibilities related to application development:
 Turning a software concept into working code
 Meetings with clients to discuss new specifications and features of the program
 Creation of program code to perform tasks
 Writing documentation to help users work with new programs

19
CHAPTER TWO

FIELD ATTACHMENT ACTIVITIES

2.0 HARDWARE
Hardware repair and maintenance.
2.1 System unit.
I opened a systems unit/case and disassembled the different components found in it.
The different components that I identified were;
 CPU
 RAM chip
 CMOS battery
 South Bridge
 North Bridge
 HDD
 PCI slots
 Fan
 IDE cables
 SATA cables
 Motherboard
 Heat sink
 CD-drive
 Power Supply Unit
 IDE connectors
 BIOS

20
CPU
The central processing unit (also known as the microprocessor) is the brain of computer it is
where the processing of data takes place. It carries out the instructions of a computer program
by performing basic arithmetic, logical, control and I/O operations.
The CPU has four primary functions: fetch, decode, execute and writeback.

Fetch
The CPU gets the instruction that it needs to run in a program and each instruction in a
program is stored in a specific address.
The CPU has a program counter which keeps track of the CPU’s position in the program.

Decode
Here the compiler of a specific language breaks down the code in Assembly language that the
CPU understands. Then the Assembler translates assembling language into binary code.

Execute
Using the ALU the computer performs extremely complicated mathematical calculations.
Moves data from one location to another
Jumps to different locations based on decisions made by the CPU itself

Writeback
For every process the CPU produces some sort of output and it writes it into the computer
memory.
There are two types of processors and they include;
 Pinned processors
 Pin less processors
Pinned processors

RAM chip
It is best known as computer memory. It is referred to as ‘random access’ because you can
access any memory cell directly if you know the row and column that intersect at that cell.
RAM has volatile memory which means the stored information on it is lost when there is no
power.
RAM is used by the CPU when a computer is running to store information that needs to be
used very quickly, but the information is not stored permanently.

CMOS battery
CMOS is a physical part on the motherboard. It is a memory chip that houses setting
configurations and is powered by an onboard battery. It is reset in case the battery runs out of
energy.
The CMOS battery power codes that runs before the operating system is loaded in a
computer.
The common tasks completed are; activating the keyboard, loading the system drives and
setting the system clock.

South Bridge
South Bridge is an IC on the motherboard responsible for hard drive controller, I/O controller
and integrated hardware.

21
Integrated hardware may include; the sound card, video card if on the motherboard, USB,
PCI, IDE, BIOS and Ethernet.

North Bridge
It is an Intel chipset that communicates with the computer processor and controls interaction
with the memory PCI bus, Level 2 cache and all AGP activities.

Hard Disk Drive


Its purpose is to store data or information permanently.

PCI slots
These refer to a computer bus. It helps the computer to connect to peripheral add-on devices
such as a PCI video card.

Fan
There are two fans in the systems unit, one on the power supply and other on-top of the CPU.
Help in cooling the computer especially the CPU.

IDE cables
The IDE cables connects CD drives and Hard drives to the motherboard. They transfer data
and commands between the devices but not power.

SATA cables
It is computer bus interface for connecting host bus adapters to mass storage devices such as
hard disk drives and optical drives.

CD/DVD drive
The computer uses this to read data encoded digitally on a compact disc.

Power Supply Unit


PSU converts main AC to low-voltage DC power for the internal components of the
computer.

IDE connectors
It helps connect IDE devices to the motherboard. And this is done by the help of the IDE
connectors.
A single IDE channel/connector can more two connected devices thus the two share the
channel that is to say a single request is processed at a time.

BIOS
BIOS works hand in hand with the CMOS and the bios help set up the computer and boot the
operating system.
BIOS has drivers which are low-level drivers that give the computer basic operational control
over your computer’s hardware.
There is a BIOS setup that help in configuration of hardware settings including system
settings like time, date and computer passwords.

Motherboard
It holds many crucial components of a computer together, including the CPU, RAM and
connectors for input and output devices.

22
2.2 Printers
I got the chance to fix printers that had several problems. Some of the problems were;
 Some were depleted cartridges,
 Some had fuser errors i.e. had torn sleeves, Other fuser unit errors were worn-out
pressure roller.
 Paper Jam

For the first problem, the printer was easily fixed by just inserting a cartridge
Toner cartridge is a component of a laser printer. It contains toner powder, a fine dry mixture
of plastic particles, carbon and black or other colourings agents that make an actual image on
the paper. The toner is transferred to paper via an electrostatically charged drum unit, and
fused onto the paper by heated rollers during the printing process.

For the second problem, I removed the fuser and disassembled it so that I could replace the
Sleeve and roller. It was an interesting thing because removing the sleeve needed a lot of skill
and finesse and most importantly something I noted that the work was greasy and the sleeve
shouldn’t have any grease on it.
Fuser Sleeve and Fuser Pressure Roller respectively

The third one is a common error with most printers; this was solved by opening paper tray
and pulling out the stuck paper and wiping the paper picker roller with a soft clean cloth.

2.3 Automatic Voltage Regulator/UPS


The AVR maintains constant voltage and power line conditioning to the equipment load,
even when the input voltage, frequency or system load vary widely.

23
Uninterruptible power supply Unit (UPS) maintains online power even when power goes off.
This enables user to ensure his/her work is saved and no data lost in the event of power
fluctuations

2.4 Installation of Windows


When installing an operating system, you have to insert a storage device like a DVD or flash
that has been made bootable with windows version (7/8/10/11) professional stored on it.
Once it is inserted in the disk slot the PC must be booted or rebooted from it by pressing the
required key press i.e. F12 to access the boot options for selecting the right bootable media.
 A black window will appear while the content on the DVD is read.

 Next a Starting Windows screen will appear

24
 Windows 7/8/11 boots directly into the graphical user interface mode. After a few
minutes the first prompt comes.

 Next choose between the options of Installation or Recovery. Since we are installing
new window, select “Install now”

 Accept the license terms and click on “Next”.

25
 Press the “Custom (Advanced)” installation type button.

This option allows you to do a clean install of Windows 7/8/10/11. This will erase all your
files on the installation drive.
If you do not want to erase all your files, select Upgrade instead. This option requires an
existing Windows installation. You can only upgrade from one Windows edition to another.

 The next phase is to pick the installation partition.


If you don't want to specify a specific partition to install Windows on, or create partitions on
your hard disk, click “Next” to begin the installation.
If you already have another existing partition with enough free space and want to install the
Windows 7 on that partition to create a multi-boot configuration, select the partition you want
to use, and then click Next to begin the installation.
If you want to create, extend, delete, or format a partition, click Drive options (advanced),
click the option you want, and then follow the instructions.

26
NOTE: If the displayed disk partition doesn’t suit your like, you can delete & partition before
you proceed with installation. This is achieved by two commands buttons (Delete (removes
partition) and format (erases partition))
Once partitions are set then remember to select the choice partition (First Primary) to install
OS.

 The setup process will now begin to copy files from the installation DVD media to the
hard disk.

 After all files are installed you will see a restart window noticing you the restart time.

27
 The computer will reboot, and the next thing you'll see is the prompt to set the user's
and computer's name. By default, the computer's name will be username-PC, where
username is the username you've entered. Click on “Next”.

 Enter the user's password. Remember this password, as it will be the ONLY user on
the system, and unless you create an additional user or enable the built-in
administrator account. Click on “Next’.

28
 Type in the product key. If you do not have the product key at hand you can still click
"Next", and proceed with the installation. You will be asked to enter the product key
after Windows is installed.

 Next Select the recommended settings

 Next step Set the time zone, date and time

29
 Lastly, you will get a prompt for network location choose type of connection

2.5 System Administration


This is individual responsibility for maintaining a multi-user computer system, including a
local area network. This can also be defined as the field of work in which someone manages
one or more systems, like software, hardware, servers or workstations and its main goal is
ensuring that the systems are running effectively and efficiently.
All this must be done using an administrative account. Administrator account can do the
following that a mere user cannot do.

 Configure Network Internet Protocols


 Configure Printers and Devices
 Create User Accounts in PC and Server
 Installation and uninstallation of software can only be done with administrative rights
that is to say it’s done by an administrators account.
 Login to network devices i.e. Configuration routers, Wi-Fi Routers, Switches, Nano
stations etc.

30
2.6 Networking Activities:
I did Network Configuration below through admin account after OS installation.

2.7. CRIMPING AN EATHERNET CABLE.


This where you remove the outer cover using strand tool then make the strands straight and
stiff by either hands or using a tester. Arrange the strands as follows;
 White orange.
 Solid orange.
 White green.
 Solid blue.
 White blue.
 Solid green. Crimping tool
standard b color codes
 White brown
 Solid brown.

31
Then connect them by pushing the strands into the connector, push until you see the ends on
the other end of the connector.
Then take a crimping tool and tighten them.
2.8. CREATING A NEW USER’S ACCOUNT.
Steps
Click start button>control panel>user account and family safety>user account>manage
another account>Add a new user in pc settings>Add an account>Insert your email
address>Press enter and finish.

2.9.HOW TO MOUNT A ROOTER ON A WALL.


 Insert the wall anchors into the hole.
 Insert the screws into the wall anchors, leaving 3/16 (0.5 cm) of each screw exposed.
 Place the rooter onto the screws and slide it in the direction of the wall mount slots to
look it into place.

32
3.0 EXPERIENCE
3.1DISCUSSING THE EXPERIENCES & CHALENGES

3.1.1 Lessons and experiences


 A lot of experience as far as the SIL work ethics and day to day activities were
concerned.
 First and foremost, I learnt how to be punctual. SIL is a busy organization and work
had to be done as early as possible especially the service desk section. Arrival time
was 8am but the service desk operates up to 12 midnight.
 I learnt how to terminate cables which is one of the ICT fundamentals. It helped me
learn how to use certain tools like the crimping tool.
 In hardware repair and maintenance was able to learn how to troubleshoot a printer
that is to say find what problem it has. Fix fuser units, replace cartridges.
 I was able to learn how to install operating systems into one computer system.
 At the service desk was able to learn how to create for people accounts using the
active directory tool.
 I was able to install different software like anti-viruses e.g. Kaspersky, even Microsoft
Office.
 I was also able to learn how to work efficiently under minimal supervision since I
was deployed at different departments for support.
 Smartness and decency was emphasized at SIL where I easily maintained my
college’s decent dressing that gave me credit.
 I was able to learn how to troubleshoot a router.
 I also learnt on how to create a new user’s account. It helped me to create my own
account in the computer.

3.1.2 Challenges and limitations.


 Limited time that made it impossible to continue with further training for detailed
understanding of certain things like security
 Some users were impatient when some computers were being worked on.
 Financial constraint especially meals that were costly and were not provided by the
organization. This led to high daily expenses.
 Security concern made it impossible to learn about some areas.
 Sukari industries limited gave out a lot to learn over a short period of time.
 Some users overloaded us with data entry thus unenabling me to gain more practical
skills.

4.0 CHAPTER FOUR


4.1 CONCLUSIONS AND RECOMMENDATIONS
4.1.1Summary
In summary, my industrial attachment provided me with a great opportunity to apply my
academic knowledge to real-life situations. I was able to gain practical skills in different areas

33
such as network administration, hardware maintenance, software installation, troubleshooting
and programming. I also encountered various challenges that enabled me to develop my
problem-solving and communication skills. I am grateful for the invaluable experience and
mentorship provided by my supervisors and colleagues, which has prepared me to face the
demands of the IT industry. Overall, the attachment has been a great learning experience that
has expanded my knowledge and improved my career prospects in the field of IT.

4.2 Conclusion

In conclusion, my industrial attachment experience has been both challenging and interesting.
Throughout the months I took in my attachment, I was able to apply and expand my skills in
various fields. I also gained valuable knowledge in the attachment.
In the attachment I faced some of the challenges and these I overcome with the guidance of
my supervisors and my colleagues.
Overall, this attachment helped me to get different ideas from different people in different
departments.

4.3 Recommendation

Due to continuous training and social development opportunities for us to improve our own
skills and adapt to new technologies.
Continuous communication and learning between different departments have improved our
knowledge and experiences efficiency.

I thorouly enjoyed my time working with my supervisors, colleagues and came to know
them as a truly valuable asset to our team.
They are honest, dependable, and incredibly working. Beyond that they are impressive.

98
4.4 Strengths
 Open to learning new things and new experiences.
 Following instructions.
 Ability to accept and learn from mistakes.
 Problem solving skills.
 Time management.
 Time management.

4.5 Weaknesses
 Fear of failure.
 Lack of enthusiasm.
 Disorganization.
 Procrastination.
 Lack of focus.

4.6 TAKING A PASSPORT PHOTO USING A CAMERA.


Procedures.

34
 The camera should not be too close.
 A portrait lens is helpful.
 A basic two light setup works well.
 Use a smaller a aperture
 Use the lowest 150 you can.
 Use a faster shutter speed.
 Use a tripod and shutter release.

Taking a passport
photo using a digital camera

4.7 NETWORK ADAPTER.


 A computer is connected to a network through network in surface curve also
called NIC.
 The NIC prepares data from the computer from the network cables.
 Data moves through a computer along paths called buses.
 The NIC sends data to another computer.
 The NIC controls data access to the cable by following specific rules.
 NIC receives incoming data from the cable and translate it into a form that can
be understood by the computer’s central processing unit.

35
USB network adapter

4.8 CONFIGURATION OF A ROOTER.


Steps
 Place the rooter next to your host rooter and turn it on.
 Connect a computer to the rooter via an Ethernet cable or wirelessly by using the
SSID and wireless password printed on the label at the bottom of the rooter.
 Launch a web browser and enter http://tplinkwifi.net in the address bar. Use the
admin for both the username and password, and then click Login.

36
 Click Next to start the quick setup. Select Range Extender and follow the step-by-step
instructions of the quick setup to complete the initial configuration.

GLOSSARY
Abbreviations and Acronyms

CMOS Complementary Metal-oxide Semi-


conductor
RAM Random Access Memory
CD Compact Disc
UPS Uninterruptable Power Supply
ROM Read Only Memory
HDD Hard Disk Drive
SATA Serial Advanced Technology Attachment
CPU Central Processing Unit
IDE Integrated Drive Electronics
USB Universal Serial Bus
LAN Local Area Network
WAN Wide Area Network
Wi-Fi Wireless Fidelity
IP Internet Protocol
IC Integrated Circuits
I Intel
MAC Media Access Control
DNS Domain Name System
TCP Transmission Control Protocol
VLAN Virtual Local Area Network
POST Power On Self-Test
IEEE Institute of Electrical and Electronic
Engineers
EMI Electro-magnetic Interference
NIC Network Interface Card
PCI Peripheral Component Interconnect
VGA Video Graphics Adapter
OS Operating System
DOS Disk Operating System
RJ Registered Jack
FAT File Allocation Table
NTFS New Technology File System
FTP Foiled Twisted Pair
STP Shielded Twisted Pair
UTP Unshielded Twisted Pair
MC Media Converter
AVR Automatic Voltage Regulator
I/O Input Output
BIOS Basic Input Output System
PSU Power Supply Unit
BSSA Business Support And System

37
Administration
DVI Digital Visual Interface
WLAN Wireless Local Area Network
IBSS Independent Basic Service Set
BSS Basic Service Set
BSA Basic Service Area
ESA Extended Service Area
AP Access Point
SFP Small Form-factor Pluggable
WLAN Wireless Local Area Network
VPN Virtual Private Network
ACL Access Control Lists
ACE Access Control Entries

REFERENCES
Gumbe, S. M., Svotwa, T. D., & Mupambireyi, F.P. (2012). Students’ perspectives of the
industrial attachment programme: A study of University of Zimbabwe faculty of commerce
students (2010-2011).
International Journal of Physical and Social Sciences, 2(9), 12-36.

Rachet, B. (2014). Swot Analysis of Apple Inc. Docs. school Publications.


Susanto, H. (2016). Revealing the Role of ICT for Business Core Redesign. Available at
SSRN.

http//Google, attachment. Hub. bases/’/.com


www.attachmenthub.com
www.lologattachment/report.com

APPENDIX
I. Work schedule (logbook).
II. Correspondence (With institution/Industry, university, etc.)
III. University/College Supervisor’s evaluation.

38

You might also like