SlideShare uma empresa Scribd logo
1 de 53
Baixar para ler offline
i
MAKERERE UNIVERSITY
COLLEGE OF COMPUTING AND INFORMATION SCIENCES
SCHOOL OF COMPUTING AND INFORMATICS TECHNOLOGY
A REPORT ON
FIELD ATTACHMENT /INTERNSHIP AT
Uganda Broadcasting Corporation
Field attachment period (June 6th
-August 1st
,2016)
BY
KAAHWA ARMSTRONG
14/U/288
Field attachment Report submitted to the School of computing and informatics Technology
In Partial fulfilment of the requirements for the degree of Computer Science of Makerere
University Kampala
Name of student: KAAHWA ARMSTRONG
Signature: ______________________________________ Date: _________________________
Name of Academic Supervisor: Mr. KIZITO JOHN
Signature: ______________________________________ Date: _________________________
Name of Field Supervisor: ONGIIMA PATRICK
Signature: _______________________________stamp & Date: _________________________
ii
DECLARATION
I KAAHWA ARMSTRONG hereby declare that the information in this report is my own original
gathered authentic work. It also makes practical and effective fulfilment of the purposes and
objectives of this field attachment, and the content of the document has never been previously
submitted to any other university or institution for a higher degree or any other award. Except for
Citations, Quotations and References to other people’s work used where otherwise acknowledged.
Signature……………………………………. Date……………………
iii
ACKNOWLEDGEMENT
First and foremost, I would like to acknowledge the Almighty God for the successful completion
of the Field Attachment period.
I would like to say thanks to Uganda broadcasting corporation for the opportunity given to me as
an intern in the Information technology section.
Special thanks go to my academic supervisor Mr. Kizito John, internship coordinator Mr. Michael
Kizito of College of computing and information sciences Makerere University.
Many thanks to my field supervisors Mr. Ogiima Patrick and Mr. Tusiime Lucas for their personal
efforts, practical skills, professional guidance and direction towards successful internship.
Finally, I would like to extend my heartfelt gratitude to my family members especially my mother
BIRUNGI MAGRET for all the support, classmates and other friends for their invaluable support
throughout my training.
iv
ABSTRACT
I carried out my internship at Uganda Broadcasting corporation under the information Technology
department.
Under networking, I dealt with setting up, administering, maintaining and upgrading
communication systems, and also local area networks and wide area networks for the organization.
The activities carried out included cable termination, over view of network topologies, setting up
LANs, router configuration, printer configuration on networks, basic networking software
installation (Cisco IOS).
Under Web development, the field supervisor overviewed basic understanding of web
technologies (client side, server side and databases) using WordPress, database management using
MySQL.
Under computer maintance and repair, I dealt with basic hardware installation (RAM,
HARDDISK, CD-ROM), basic operating system installation and activation i.e. windows
xp,7,8,10, system restoration, file recovery, data backup, Wi-Fi hotspot creation, installation of
Windows Server 2008 R2.
Through work and experiences, I attained networking, trouble shooting, team work, leadership
skills, interpersonal and research skills.
The challenges faced include: lack of enough equipment, faulty equipment i.e. CD ROMs, RAM,
and crimping tool, poor internet connection, failure in troubleshooting for Windows service
failures, understanding new technical terms.
In my conclusion internship at UBC was so productive with practical hand on skills attained from
the different field supervisors.
I recommend that We as students need to be taught much more of practical skills in class than
theory and be given more time for practice.
v
TABLES OF CONTENTS
DECLARATION............................................................................................................................ ii
ACKNOWLEDGEMENT.............................................................................................................iii
ABSTRACT................................................................................................................................... iv
LIST OF TABLES.......................................................................................................................viii
LIST OF ACRONYMS/ABBREVIATIONS................................................................................ ix
2.2.1. CHAPTER ONE INTRODUCTION ................................................................................ 1
1.1. introduction.............................................................................................................................. 1
1.2. Background of the field attachment......................................................................................... 1
1.3. Objectives of the field attachment ........................................................................................... 1
1.4. Background of the Organization of Field attachment.............................................................. 1
1.5. Organisational culture.............................................................................................................. 2
1.6. The structure of the organisation ............................................................................................. 3
1.7. The main activities of the organisation and ongoing IT projects............................................. 4
2.2.2. CHAPTER TWO STUDENT’S EXPERIENCES............................................................ 5
2.1. Title or position occupied in an organization .......................................................................... 5
2.2. Duties and responsibilities....................................................................................................... 5
2.3. Supervision levels and relationship with the supervisor........................................................ 21
2.4. Work team and its composition ............................................................................................. 21
2.4. Working relationship among the team members and staff .................................................... 22
3.0. CHAPTER THREE EVALUATION ON FIELD ATTACHMENT ................................. 23
3.1. Level of accomplishment of duties and responsibilities assigned ......................................... 23
3.2. New knowledge and skills gained in each of the duties and responsibilities ........................ 23
3.3. Most interesting experiences.................................................................................................. 24
vi
3.4. Relatedness of university’s taught programs to the field work.............................................. 25
3.5. Challenges faced and how managed...................................................................................... 25
3.6. Benefits derived from field attachment.................................................................................. 26
3.7. Adequacy in university’s preparing the student for field attachment.................................... 27
3.8. Preparedness of the agency to receive and manage students for field attachment ................ 27
3.9. Career Motivation.................................................................................................................. 27
4.0. CONCLUSIONS AND RECOMMENDATIONS ................................................................ 27
4.1. Conclusions............................................................................................................................ 27
4.2. RECOMMENDATIONS....................................................................................................... 28
References..................................................................................................................................... 29
Appendices.................................................................................................................................... 30
vii
LIST OF FIGURES
Figure 1.1: Organizational structure for Uganda Broadcasting corporation................................... 3
Figure 2.1: layers of the OSI model................................................................................................ 6
Figure 2.2: Illustration of common physical topologies ................................................................. 6
Figure 2.3: Network Structure for UBC Administration block ...................................................... 7
Figure 2.4: Illustration showing how to create a straight-through cable ........................................ 8
Figure 2.5: Illustration of the T-568B Straight-Through Ethernet Cable....................................... 8
Figure 2.6: Illustration of the T-568B Straight-Through Ethernet Cable....................................... 9
Cable termination for the different cable standards involves the following................................... 9
Figure 2.7: illustration showing finding ip and MAC addresses. ................................................. 10
Figure 2.8: shows screen shot of add printer wizard running...................................................... 11
Figure 2.9: shows screen shot of shared printer in the add printer wizard .................................. 11
Figure 2.10: Illustration of the DHCP lease process..................................................................... 13
Figure 2.11: shows the difference between DDR and DDR2....................................................... 14
Figure 2.12: shows IDE and SATA connector ............................................................................. 15
Figure 2.13: indicating screen shot of the select command in MySQL........................................ 16
Figure 2.14: Screenshot showing a table selected from products using php MyAdmin console . 16
Figure 2.15: shows activated windows......................................................................................... 18
Figure 2.16: showing how UBC’s domain controller with the clients ......................................... 20
viii
LIST OF TABLES
Table 2.1: tasks completed and supervisors in charge.................................................................... 5
Table 2.2: showing windows activation errors causes and solutions............................................ 19
Table 3.1: showing relevance of computer science curriculum to field attachment..................... 25
ix
LIST OF ACRONYMS/ABBREVIATIONS.
UBC Uganda broadcasting corporation
IT information technology
UTV Uganda television
RAM Random Access Memory
ROM Read Only Memory
LAN Local Area network
WAN Wireless Area Network
WI-FI Wireless Fidelity
SQL Structured Query Language
CLI Command Line Interface
DNS Domain Name System
IP Internet Protocol
ISPs Internet Service Providers
IANA Internet Assigned Numbers Authority
DHCP Dynamic Host Configuration Protocol
APIPA Automatic Private IP Addressing
NetBIOS Network Basic Input/output System
TCP/IP Transmission Control Protocol/Internet Protocol
AD DS Active Directory Domain Services.
CMOS Complementary Metal Oxide Semiconductor
WPA Windows Product Activation
1
2.2.1. CHAPTER ONE INTRODUCTION
1.1. introduction
This field attachment report is about the skills attained, lessons learnt, challenges, relatedness of
theory covered in class and recommendations during my internship placement at Uganda
Broadcasting corporation(UBC) from 1st
June to 1st
august 2016 see “appendix A”. The report also
represents my experiences, recommendations and benefits of the field attachment.
1.2. Background of the field attachment
Field attachment is a field-based practical training experience that prepares trainees for the tasks
they are expected to perform on completion of their programs. The main intention is to produce
practically oriented graduates that meet the required job-related competences of their future
employers
1.3. Objectives of the field attachment
 To enable students, get hands-on/real life experience they are expected to work in when
they graduate.
 To provide an opportunity for students to apply the principles and techniques theoretically
learnt into real-life problem solving situations.
 To provide an opportunity for students and academic staff to interact with the stakeholders
and potential employers and thus appreciate field situations that will also generate
information for curricula review and improvement.
 To develop student understanding of work ethics, employment demands, responsibilities
and opportunities.
 To enhance and strengthen linkages between Makerere University and various
stakeholders.
1.4. Background of the Organization of Field attachment.
Uganda Broadcasting Corporation is the public broadcaster of Uganda. Formally Uganda
Television and Radio Uganda (the current Uganda Broadcasting Corporation) was born in 1963
one year after Uganda’s independence. However, radio was born in Uganda in 1954 and TV came
in nine years after that. Its main aim was to broadcast through both mediums to the whole country
as the national broadcaster.
2
After independence till the mid 1980’s Uganda was faced with a lot of economic hardships. As a
result, Ugandan Government saw the need to restructure the former Uganda Television and Radio
Uganda. As a result, Parliament passed the Uganda Broadcasting Corporation Act that established
the Uganda Broadcasting Corporation in 2005. This transformed the former UTV and Radio
Uganda into the now existent Uganda Broadcasting Corporation. The Corporation started its
activities on 16th November, 2005.
The Corporation is fully owned (100%) by the Government of Uganda and carries out its activities
for and on behalf of the Government. It therefore requires government funding in order to sustain
its operation.
Vision
Broadcasting quality programs for national development.
Mission
To inform, educate, guide and entertain the public through maintaining a suitable national
coverage.
Objectives
 To develop the broadcasting bodies into a public national broadcasting centre of
excellence, for the purpose of providing electronic media and consultancy services that
educate and guide the public.
 To achieve and sustain comprehensive national radio and television coverage.
 To achieve and sustain a common carrier status.
1.5. Organisational culture
1.5.1. values
In executing its mandate, UBC is committed to espouse the values of: Trustworthiness, Fairness,
Equal opportunity, Ethical conduct, Integrity, Transparency and Professionalism.
1.5.2. Beliefs
All workers must adhere to UBC principles. And must commit working hours to official duties
3
1.6. The structure of the organisation
Figure 1.1: Organizational structure for Uganda Broadcasting corporation
FINANCE AND
ADMINISTRATION
BOARD OF DIRECTORS
MANAGING DIRECTOR
HEAD OF
ENGINEERIN
G
TV MANAGER MARKETING & BUSUNESS
DEVELOPMENT MANAGER
RADIO
MANAGERS
HUMAN
RESOURCE
MANAGER
PRESENTERS
PRODUCERS PRESENTERS PRODUCERS SALES
MANAGER
SALES
EXECUTIVE
MARKETING
OFFICERS
PROCUREMEN
T OFFICER
MANAGEMEN
T ACCOUNTS
STORE’S
OFFICER
ACCOUNTI
NG
ASSISTANT
CASHIE
RS
ADMINISTRATIVE OFFICER
ASSISTANT
ADMINISTRATOR
CORPORATION
SECRETARY
HUMAN RESOURCE
OFFICER
IT
DEPT
4
1.7. The main activities of the organisation and ongoing IT projects
 short wave (SW) transmission and Medium wave(MW) transmission.
 Online radio and TV streaming.
 Reconstruction of organisation website(www.ubc.ug).
 Restructuring of the organisation networks(LAN).
 Repair and maintaince of the organisation’s IT equipment i.e. computers and installation
of the basic softwares used.
5
2.2.2. CHAPTER TWO STUDENT’S EXPERIENCES
2.1. Title or position occupied in an organization
For the two months of the field attachment, I occupied the position of a full time Intern with work
schedule from Monday to Friday 9:00am to 4:00 pm at UBC as indicated in “Appendix A”.
Additionally, I worked with other staff occupying other different positions at the company, thereby
doing a wide range of roles.
2.2. Duties and responsibilities.
The following are the main duties and responsibilities that I undertook during the field attachment
at Uganda Broadcasting corporation.
Activity Supervisor
General Orientation Mr. Ongima Patrick
Tour around UBC premises
Review of OSI models and network topologies
Mr. Tusiime Lucas
Operating systems and other application software
installation
Cable termination
Computer repair and maintenance
Mr. Tusiime Lucas
Database design
Web development(websites)
Mr. Ongima Patrick
Ethernet and Cable termination
Data Recovery
Mr. Tusiime Lucas
Research about Domain controller and active
directory
Installation and configuration of windows server
2008 R2
Mr. Ongima Patrick
Table 2.1: tasks completed and supervisors in charge.
 Overview of OSI models and network topologies.OSI reference model describes
how information from a software application in one computer moves through a
network medium to a software application in another computer. It is a conceptual
6
model composed of seven layers, each specifying particular network functions.
Figure 2.1: layers of the OSI model
 Network topologies. A topology is a usually schematic description of the arrangement of
a network, including its nodes and connecting lines defined either physically or logically.
categories of physical topologies include: ring, mesh, tree, star, bus,
Figure 2.2: Illustration of common physical topologies
7
The UBC network topology in the administration block is a composition of different
network topologies like star, bus, and tree
Figure 1.3: Network Structure for UBC Administration block
8
 General review of Ethernet cables and Cable termination
The TIA/EIA 568-A standard made in 1995, and then replaced by the TIA/EIA 568-B standard in
2002 and has continuously been updated. Both standards define the T-568A and T-568B pin-outs
for using Unshielded Twisted Pair cable and RJ-45 connectors for Ethernet connectivity.
The figures below show the different colour arrangements of the different cable standards
Figure 2.4: Illustration showing how to create a straight-through cable
Figure 2.5: Illustration of the T-568B Straight-Through Ethernet Cable
RJ-45 Crossover Ethernet Cable
This is used to connect two Ethernet devices directly with T-568A and T-568B at the other end
without a hub or connecting hubs together
9
Figure 2.6: Illustration of the T-568B Straight-Through Ethernet Cable
Cable termination for the different cable standards involves the following
First trimming and Stripping the Ethernet cable to about 1 and ½ inch, then untwist the pairs,
arrange them to the required order either straight through or crossover, cut them to 1 inch with flat
end, fix them firmly into the RJ 45 connector ensuring that the ends touch the face of the connector,
fix them tight using a crimping tool, test them using a tester or using two end devices.
 Finding ip and MAC addresses of a network card on a computer
Due to the need for connecting computers to printers and other resources, ip addresses were
always required.
The steps involved include the following
1. Press the Windows Start key to open the Start screen
2. Type cmd and press Enter to launch the command prompt run it as an
administrator then use a command ipconfig/all
Note when looking for mac address check out for physical address and ip address it is ipv4
address as indicated in figure below
10
Figure 2.7: illustration showing finding ip and MAC addresses.
 Setting up a network printer
One of the important things to note is that any network printer must have an IP address and a NIC
and the steps include:
Powering the computer and printer then configure their IP addresses. Go to printers and devices
while in control panel, add a printer, then select the above printer from the available ones on the
populated list, follow the instructions until you reach the add Standard TCP/IP printer port Wizard
started and click Next to continue, a prompt to enter the printer name or IP address which by
default becomes the port name will appear. Another prompt window to print a test page will be
displayed then Select yes, and click next.
11
Figure 2.8: shows screen shot of add printer wizard running
Figure 2.9: shows screen shot of shared printer in the add printer wizard.
12
 router configuration
The important precautions noted before configuration are: regardless of equipment brand
or model identification of the router WAN port and router LAN port was necessary
location of proper cables to connect the physical LAN and specifically for Cisco router
configuration due to need for proper plugin in the correct cable to the router WAN, LAN,
and CONSOLE ports.
configuration the router software setup (iOS), configuration of the router to have the proper
IP connection scheme such as DNS, IP subnets, etc. in order to make a proper LAN
connection work.
For Using the CLI (Command Line Interface) basic configuration on one of the machines,
installation of the terminal simulator software (HyperTerminal program) was done.
The other basic router configuring steps on a network(LAN) include the following.
 Ensuring the router is working as expected, by setting several things were need
be such as: setting the router to do ip routing and keeping the manufacturer's
suggested settings.
 Entering the interface configuration mode.
 Typing in the interface IP address and subnet mask (configuring ip addresses).
 Issuing "no shutdown" command to bring up the interface.
 Exiting the interface configuration mode to global configuration mode.
 In the global configuration mode, enter the default gateway.
 Testing and Saving the configurations.
 Overview of Addressing and Name Resolution
This involved reviewing the types of ip address and their uses that is to say
Public IP Addresses: Which are used for a computer to be visible on the Internet. The IANA
assigns ranges of public IP addresses to ISPs.
Authorized Private IP Addresses: These are never used on the global Internet but used by
individuals who don’t access internet directly.
13
Unauthorized Private IP Addresses: They are used when there is an absolute certainty that
your network will never access the Internet.
 Overview of the Types of IP Address Assignment
Dynamic Host Configuration Protocol (DHCP), Automatic Private IP Addressing (APIPA),
Static IP Addressing, Alternate IP Configuration.
Since DHCP is the commest ip address assignment method this was handled widely including
the DHCP lease process explained below
DHCP Lease Process. The first time that a Windows client (with DHCP enabled) attempts to
join a network, it automatically follows an initialization process to obtain a lease from a DHCP
server.
Figure 2.10: Illustration of the DHCP lease process.
 TCP/IP Name Resolution
In general, computer users prefer to use computer names instead of IP addresses thus need for ip
name resolution thus need for name resolution.
Domain Name System. This is used on the Internet to map friendly names to IP addresses, and
vice versa. In Microsoft Windows 2000, Microsoft Windows Server™ 2003, and Microsoft
Windows XP environments, DNS is the default name resolution method.
NetBIOS over TCP/IP. This Provides name resolution and connection services for clients using
Microsoft Windows 95, Microsoft Windows 98, and Microsoft Windows Millennium Edition
operating systems, applications, and services.
 Understanding, Identifying and Upgrading the RAM in a computer
Ram is volatile type of memory that a computer uses to run its OS and starting applications RAM
which originally was semiconductor chip individually plugged in motherboard but now as clip-in
modules. The common different types of ram include: Fast Page Mode(fpm) ram, Extended Data
14
Out (EDO RAM), Synchronous DRAM, Double Data Rate(DDR) RAM, DDR2 RAM DDR23
RAM. We focused on how to identify the basic and common types of ram (DDR1, DDR2 is PC2,
DDR3 is PC3).
DDR2 has more pins, and the notch is in a different place. In DDR, the notch should be close to
the center, whereas ddr2 is further off-center and has higher pin density.
Figure 2.11: shows the difference between DDR and DDR2
 Computer cables and connectors
Serial ATA(SATA) cables. These are computer bus interface that connects host bus adapters to
mass storage devices such as hard disk drives, optical drives, and solid-state drives.
15
IDE/ATA Connectors. The standard IDE/ATA hard disks and ATAPI devices use two different
connectors. The first is the data connector, to which the IDE/ATA cable attaches. The second is
the power connector, which comes from the power supply, and of course, provides power to the
drive.
Figure 2.12: shows IDE and SATA connector
 Data base management using MySQL and php MyAdmin
 Creating and Deleting Databases in MySQL
When using show, create database commands, the Back-Quoted Identifiers, Unquoted
names such as database name, table name and column name cannot contain blank and
special characters unless enclosing them with a pair of back-quote, in the form
of ‘name’ for each word.
 Understanding Comments and Version Comments
There are different types of MySQL comments that is to say multi-line comments (/*
and */), end-of-line comments begins with #... and lastly the version comment /*!40100
...... */
 Setting the default database. The use command sets a particular or current database
as the default database.
 Creating and Deleting/dropping tables. The above commands can be used with the
following commands "if exists" or "if not exists”.
 inserting rows, querying the database using Comparison Operators modifying
data deleting rows, Exporting Data from/to a Text File
16
 string pattern matching, producing summary reports and logical operators (and,
or, not, xor, between, not between, is null, is not null, order by clause, limit clause),
comparison operators and using the concat and aggregate functions (count, max,
min, avg, sum)
see “appendix B” for more illustration on the above mentioned commands
Figure 2.13: indicating screen shot of the select command in MySQL
Figure 2.14: Screenshot showing a table selected from products using php MyAdmin console
17
 Website development using WordPress
These are some of the steps followed:
 Finding a Domain Name and Host.
 Ways of Installing WordPress
1. One-Click-installation from Websites like WordPress.org.
2. Manual install.
3. Set Up WordPress.
 Choosing a Theme/Template for your site.
 Log into your WordPress dashboard.
 Create a Home Page, Add More Pages, Add Widgets
 Adding pages to the menu, Adding and editing posts
 For Comments and Posts install contact form plugin.
 Installation of other required Plugins.
 Operating system installation basically windows xp,7,8,8.1,10
I Installed Operating systems like windows7 x64 and x86, windows XP, Post installations like
drivers, and application software was also done for programs like cool edit, driver pack solutions,
Microsoft office professional. different ways I used while performing windows installation
windows on a machine
Method 1: Performed a clean installation of Windows
In this method involves removing all data from the hard disk by repartitioning and reformatting
your hard disk and reinstalling the operating system and programs to an empty (clean) hard disk.
Method 2: Upgraded to other higher Windows
I used this when upgrading to Windows 8.1 from Microsoft Windows 8 pro however this method
requires steady internet.
Method 3: Installed Windows to a new hard disk
18
I used this method to install Windows XP to a new hard disk. I typically used the method when a
new hard disk was installed on the computer.
Method 4: Installed Windows to a new folder (parallel installation)
I used this method in need of parallel installation to run two operating systems to install on one
machine then used the same method to retrieve data from a damaged disk.
 Performed Windows activation and its types
Types of activation
1. Windows Product Activation. In this type the computer sends an installation ID
number to Microsoft before Windows is verified and then activated
2. OEM Activation 3.0. This takes place at the factory where by DPK is installed on
the motherboard BIOS during the manufacturing process. Windows will activate
automatically the first time the computer is connected to the Internet.
 Confirmation of windows activation
Right click on my computer then go to computer properties.
Figure 2.15: shows activated windows
19
 Troubleshooting Windows 8 activation errors
Windows activation
error
Possible cause Possible solution
Windows isn't activated  Invalid windows
license
 trial or evaluation
version of
Windows was
installed
Installing the latest
version of windows
Windows isn't activated There are files on your PC
that are preventing
activation
buy and reinstall a new
version of Windows
Windows isn't activated computer is not connected
to the Internet.
connect to the Internet
Windows isn't activated Windows is not
preinstalled on the
computer
no product key is
configured
Enter a new product key
Table 2.2: showing windows activation errors causes and solutions
 Data Recovery
We used Hirens software for the purpose of data recovery in instances of system
crash and formatted hard disk. The steps involved include insertion the bootable
disk and, choose the option for load mini XP. When the PC is on, run the HBCD
and go to the menu, choose recover file, then follow the prompts depending on the
problem. After the entire process, connect external storage then copy the recovered
files.
20
 Research about Domain controller and active directory
I carried out research on Microsoft’s domain controller and active directory, used
in Networking.
Domain controller. DC is a server that responds to security authentication requests within
a Windows Server domain. Basically on Microsoft Windows or Windows NT network that
is responsible for allowing host access to Windows domain resources.
Active Directory Domain Services .AD DS stores directory data and manages
communication between users and domains, including user logon processes,
authentication, and directory searches. An Active Directory domain controller is a server
that is running AD DS
With a single network logon, administrators can manage directory data and organization
throughout their network. Authorized network users can also use a single network logon to
access resources anywhere in the network.
Figure 2.16: showing how UBC’s domain controller with the clients
 Installation and configuration of windows Server 2003 R2.
 Boot up from install disk and choose the Enterprise version
 Accept license terms and choose the Custom
 choose Drive options and complete installation
21
 prompt window to change password before logging in appears.
 The Initial Configuration Tasks window pops up after logging in
2.3. Supervision levels and relationship with the supervisor
2.3.1. supervision levels
My field supervisor was always available, provided corrective feedback, gave clear guidelines for
the application of theory, competent enough, and the supervisor provided support of the
professional development to me.
My supervisors focused on competence with the accomplishment of meeting institutional
organization internship goals.
2.3.2. Relationship with supervisor
There was a strong supervisory relationship with my supervisor that effectively helped
successfully to participate in experiences and acquire competence.
Communication and feedback. My supervisors always provided feedback to any asked question
this enabled notes taking which was later written in my logbook
Time management. My supervisor was very time conscious so I ensured that I was at the
organization on a daily basis. Mr. Ogiima my field supervisor usually gave time bound tasks to
ensure proper good time management.
2.4. Work team and its composition
The work team was created with members of different levels of abilities coming up with cross-
functional teams.
My work team interacted interdependently to achieve a common objective that was always
assigned. Its composition was based on the attributes among individuals that made the team. In
addition, the team was made of homogeneous and heterogeneous levels of skills in which team
members all contain significant differences among skills, experience, and abilities. Through these
contributions in the team this potentially dictated overall performance outcomes for the team which
increased performance, employee unity and company culture.
22
2.4. Working relationship among the team members and staff
As a work team intern member I was Honest, straightforward and Shared the Load this was through
doing my share of the work increasing team members’ collective motivation.
In addition, I was reliable and fair by taking appropriate credit and complementing my work team
skills that made the team move forward.
For Team work being social I was skilled, and tactful, communicator with a positive attitude.
23
3.0. CHAPTER THREE EVALUATION ON FIELD ATTACHMENT
3.1. Level of accomplishment of duties and responsibilities assigned
To a greater extent I successfully accomplished the duties and responsibilities assigned.
Being in the Information Technology department responsibilities included: day to day work and
basic configuration; document procedures; application installments e.g. windows installation,
adobe premiere pro cc, Microsoft word, avid, driver pack solution; working environment
configurations e.g. Checking for computer status(checking hard disk life span) installing and
supporting new and existing applications on various server platforms; writing business
requirements documents for new projects; level 1 troubleshooting e.g. failure of printing a
document when using a LAN printer, failure of a computer to start.
3.2. New knowledge and skills gained in each of the duties and responsibilities
During field attachment I accumulated a lot of knowledge and skills. Each of the duties and
responsibilities as listed in section 2.2 empowered and greatly impacted on my skills
3.2.1. Knowledge
 Web Development. This was through Creation of web layout design, writing
code, and usability testing, maintaining company websites and managing site
content with the help of my supervisor.
 Programming. Through design of systems, I learnt more about object-oriented
languages, such as C++, Java.
 Technical Support. Providing technical assistance to other departments, from
troubleshooting e-mail to training individuals in new software applications
 Systems Administration. Basic installing and repair an organization's
computer systems. And maintaining communications, such as internet and
intranet systems, local area networks (LAN), and wide area networks (WAN).
 Project and Technical Services Management. Through overseeing individual
projects, from communication to coordinating with team members.
24
3.2.2. Skills
Computer competency, attention to detail, organization, problem solving, critical thinking, clear
written and spoken communication, time management, close listening.
3.2.3. Responsibilities
Working towards achieving my individual goals, which helped the organization reach its
objectives, Taking responsibility for your own professional and career development, Being open
and Accepting constructive feedback and take the initiative to improve, Giving others feedback,
Completing any development plans assigned to me and applying the learning to improve my
performance , Keeping record of my performance achievements, successes and challenges i.e.
evaluation sheets in case of assignments , Completing my self-appraisal by the specified deadline.
3.3. Most interesting experiences.
During the Field Attachment period, I really enjoyed the experience of working at UBC including
the comfortable working atmosphere, the technical guidance on the latest web technologies and
the friendly relationship among the field staff. A list of interesting moments, are highlighted below
3.3.1. Internship project.
Accomplishing My Project assigned (developing a professional website using word press). The
project involved several parts: developing a database for the website using MySQL, responsive,
attractive interface. It was a very self-contained project which every intern built up from scratch.
3.3.2. Interaction with experienced people in the field
I also had the opportunity to network with potential future employers and gain insight into the
types of employees they look for. This made me realize the greatest value of Internship which is
providing a unique and exciting experience that is unparalleled in the classroom and to coordinate
job experience with academic.
3.3.3. Learning IT area of interest
internship offered me the opportunity to essentially customize my placement in order to gain
valuable work experience in my areas of interest and I had the opportunity to look at a sever.
25
3.3.4. Working with experienced and more skilled individuals
working with some of the best developers, designers and managers in information technology
department, solving problems that you can never face in a school environment, bonding with other
interns that make up a very diverse demographic.
3.4. Relatedness of university’s taught programs to the field work
With the current curriculum for Undergraduate Bachelor of Computer Science program by NCHE,
Revised December 20, 2013 used by Makerere University. In its design goals which include
enabling students with computing and communication skills necessary for employment and career
opportunities in today’s ICT industries and business organization.
Illustration of relevance of computer science curriculum with to field work with few sampled
course units.
COURSE UNIT USE OF KNOWLEDGE FROM CLASS TO FIELD
WORK
BIS 1104: Communication Skills for
IT
Used for effective speaking and listening, meetings and
presentation sessions
CSC 1100: Computer Literacy The skills learnt in computer literacy such as Microsoft
Word and Excel were used to prepare professionally
looking and standard documents at work, including this
field attachment report
BIS 1204: Data and Information
management
This enabled successful web development sessions due
to the different languages learnt in class e.g. MYSQL,
php check final project in appendix//
BIS 1206: Systems Analysis and
Design
This was vital during system development
CSC 2100: Data Structures and
Algorithms
This enabled easy developing of problem solving
systems.
Table 3.1: showing relevance of computer science curriculum to field attachment
3.5. Challenges faced and how managed
26
 Inadequate and delay for supervision facilitation. University policies state that each
site/student has to be visited at least three times by the academic supervisors (Makerere
University Council, 2011, p. 8) but most students were visited only once, after 8 weeks in
the field. This was generally a weakness on the side of the university. But at least the
University ensured that internships are offering meaningful learning experiences for their
students by providing evaluation sheets which provide feedback from employers to
university.
 Lack of field-specific knowledge / skills. This arouse from use of specific programming
languages which were not taught at school. This was solved by a meeting held between
interns and field supervisor in order to identify areas for improvement.
 Limited time for the internship program is one of the challenges as it is only scheduled for
eight weeks, which makes it not enough to learn experience most of all the activities
undertook in a survey.
 insufficient work assigned to us at the beginning of an internship. This was solved
managing our work by doing our personal research and offering something useful for the
organization. And Asking our seniors for guidance.
 Assignment of activities that don’t correspond to the internship expectations this was
solved by informing the internship field coordinator.
3.6. Benefits derived from field attachment
The field attachment was of great importance, some of the benefits include
 Internship helped me understand work ethics, employment demands, responsibilities and
opportunities.
 Field attachment provided career direction and confidence in my abilities by narrowing
down the list of potential careers.
 My internship gave me the opportunity to try out computer related activities i.e.
dismantling a computer which I had not previously considered and broadened my horizons
through converting my academic knowledge into industry skills.
 It prepared me for the working environment.
 It enhanced my CV needed to negotiate future jobs.
27
3.7. Adequacy in university’s preparing the student for field attachment
In my view students having a limited range of skills in areas like communication and team work,
with educational experiences that can’t teach them how to solve problems with people whose
views are different than their own.
With less intercultural skills and an understanding of societies all this showed inadequacy of
preparation given to students for field attachment
3.8. Preparedness of the agency to receive and manage students for field attachment
The agency shared some insight on the bigger picture and how their projects fit in internship goals
can bridge this knowledge gap. With the ability of College students having a lot to offer and will
approach things differently and the need to create a job description that is appealing, experience,
so it’s important to evaluate your needs and for both parties. This can be instrumental in targeting
younger clients and the clear setting of project goals and regular benchmarks to see how we interns
are performing clears shows agency was prepared. occasionally, resourceful persons and experts
in field always answered queries and also gave tips and shared experiences with the students. This
greatly inspired the interns
3.9. Career Motivation
For the different values in regards to work and need for different things in the job market today
that include satisfaction and fulfillment. from the career motivation attained. This makes me plan
a more fulfilling and productive career and create an environment I can thrive in motivation's role
in influencing workplace behavior and performance at school.
4.0. CONCLUSIONS AND RECOMMENDATIONS
4.1. Conclusions
The internship period revealed that curriculum in our university lacks sufficient input from
employers of labour, and the teaching-learning resources were grossly inadequate (computers,
servers, routers, switches) academic staff were competent but inadequate in number in some
departments.
28
On the basis of these notices, I conclude saying that result from inadequacies in critical factors
influences the quality of programme offering and there are lapses in the preparation of
undergraduates for field attachment.
4.2. RECOMMENDATIONS
On the basis of the findings and conclusion drawn in this field attachment I recommended that:
4.2.1. Recommendations to the University
 The university should urgently restructure the curricula offerings to meet the requirements
of the labour market.
 This course CSC 2303: Field Attachment, should be shifted to the third year of study, such
that it is given more time, at least six months. Many students have concluded that two
months internships are too small.
 Students teaching-learning resources should be improved, especially the tools for
practicals, lecture room capacity, laboratories and workshops.
 ICT should be introduced into both teaching and learning activities of every university, so
that both staff and students can possess the much needed ICT knowledge and skills.
 The University should keep good records of its graduates for feedback purposes; while
academic departments should liaise with employers for information on their employed ex-
students
4.2.2. Recommendation to the field attachment organization
In future, the field organization (UBC) should provide students with large range of computing
related aspects and a simple review of technologies used at the organization
4.2.3. Recommendation to future interns
As students, good supervisory relationships are pivotal to successful completion of our degrees
because supervisors provide expert guidance in your research, and our fields of study thus need
for good supervisory relationships with our supervisors.
29
References
Uganda Broadcasting corporation (n.d.). Retrieved July 31, 2016, from
http://ubc.ug/index.php/partners/
Internetworking Basics. (n.d.). Retrieved June 08, 2016, from
http://www.cisco.com/cpress/cc/td/cpress/fund/ith/ith01gb.htm
Network topologies. (n.d.). Retrieved June 12, 2016, from
http://whatis.techtarget.com/definition/network-topology
Cable termination. (n.d.). Retrieved June 10, 2016, from http://www.incentre.net/tech-
support/other-support/ethernet-cable-color-coding-diagram/
MySQL. (2014, September). MySQL Tutorial. Retrieved June 23, 2016, from `
https://www.ntu.edu.sg/home/ehchua/programming/sql/MySQL_Beginner.html.
B. (2006, June 27). Types of RAM. Types of RAM: How to Identify and Their Specifications.
Retrieved June 15, 2016, from https://www.technibble.com/types-of-ram-how-to-identify-
and-their-specifications/.
Microsoft. (2014, April 08). How to install or upgrade to Windows. Retrieved June 20, 2016.
from https://support.microsoft.com/en-us/kb/978307.
(n.d.). Windows 8 Product Activation. Retrieved June 21, 2016, from http://support.hp.com/us-
en/document/c03486254
Makerere University Council. (2011). Guidelines for Field Attachment. Retrieved June 5, 2016.
from Makerere University Policies Website:
http://policies.mak.ac.ug/sites/default/files/policies/GUIDELINES_FOR_FIELD_ATTACHMEN
T.pdf
NCHE. (2013, December). Curriculum for Bachelor of Computer Science (CSC) Degree
Program. Retrieved August 13, 2016, from https://courses.mak.ac.ug/programmes/bachelor-
science-computer-science
30
Appendices
“Appendix A”: UBC internship offer letter
31
“Appendix B”
Enter password:
Welcome to the MySQL monitor. Commands end with; or g.
Your MySQL connection id is 23
Server version: 5.6.17 MySQL Community Server (GPL)
Copyright (c) 2000, 2014, Oracle and/or its affiliates. All rights
reserved.
Oracle is a registered trademark of Oracle Corporation and/or its
affiliates. Other names may be trademarks of their respective
owners.
Type 'help;' or 'h' for help. Type 'c' to clear the current input
statement.
mysql> CREATE DATABASE student;
Query OK, 1 row affected (0.33 sec)
mysql> DROP DATABASE student;
Query OK, 0 rows affected (0.88 sec)
mysql> CREATE DATABASE IF NOT EXISTS student;
Query OK, 1 row affected (0.00 sec)
mysql> SHOW DATABASES;
+--------------------+
| Database |
+--------------------+
| information_schema |
| mysql |
| patrick |
| people |
| performance_schema |
| project |
| student |
| test |
+--------------------+
8 rows in set (0.58 sec)
mysql> USE student;
Database changed
mysql> SELECT DATABASE();
+------------+
| DATABASE() |
+------------+
| student |
+------------+
32
1 row in set (0.00 sec)
mysql> SHOW TABLES;
Empty set (0.07 sec)
mysql> CREATE TABLE IF NOT EXISTS products (productID INT UNSIGNED
NOT NULL AUTO_INCREMENT, productCode CHAR(3) NOT NULL DEFAULT '',
name VARCHAR(30) NOT NULL DEFAULT '',quantity INT UNSIGNED NOT NULL
DEFAULT 0,price DECIMAL(7,2) NOT NULL DEFAULT 99999.99, PRIMARY KEY
(productID));
Query OK, 0 rows affected (0.97 sec)
mysql> SHOW TABLES;
+-------------------+
| Tables_in_student |
+-------------------+
| products |
+-------------------+
1 row in set (0.00 sec)
mysql> DESCRIBE products;
+-------------+------------------+------+-----+----------+----------------
+
| Field | Type | Null | Key | Default | Extra
|
+-------------+------------------+------+-----+----------+----------------
+
| productID | int(10) unsigned | NO | PRI | NULL | auto_increment
|
| productCode | char(3) | NO | | |
|
| name | varchar(30) | NO | | |
|
| quantity | int(10) unsigned | NO | | 0 |
|
| price | decimal(7,2) | NO | | 99999.99 |
|
+-------------+------------------+------+-----+----------+----------------
+
5 rows in set (0.20 sec)
mysql> SHOW CREATE TABLE products G
*************************** 1. row ***************************
Table: products
Create Table: CREATE TABLE ‘products’ (
`productID’ int(10) unsigned NOT NULL AUTO_INCREMENT,
`productCode’ char(3) NOT NULL DEFAULT '',
`name’ varchar(30) NOT NULL DEFAULT '',
`quantity’ int(10) unsigned NOT NULL DEFAULT '0',
`price’ decimal(7,2) NOT NULL DEFAULT '99999.99',
PRIMARY KEY (`productID’))
Query OK, 1 row in set (0.00 sec)
mysql> INSERT INTO products VALUES (1001, 'PEN', 'Pen Red', 5000, 1.23);
33
Query OK, 1 row affected (0.12 sec)
mysql> INSERT INTO products VALUES (NULL, 'PEN', 'Pen Blue',8000,1.25
),(NULL, 'PEN', 'Pen Black', 2000, 1.25);
Query OK, 2 rows affected (0.13 sec)
mysql> INSERT INTO products (productCode, name, quantity, price) VALUES
('PEC', 'Pencil 2B', 10000, 0.48),('PEC', 'Pencil 2H', 8000, 0.49);
Query OK, 2 rows affected (0.11 sec)
mysql> INSERT INTO products (productCode,name) VALUES ('PEC','Pencil HB');
Query OK, 1 row affected (0.10 sec)
mysql> SELECT * FROM products;
+-----------+-------------+-----------+----------+----------+
| productID | productCode | name | quantity | price |
+-----------+-------------+-----------+----------+----------+
| 1001 | PEN | Pen Red | 5000 | 1.23 |
| 1002 | PEN | Pen Blue | 8000 | 1.25 |
| 1003 | PEN | Pen Black | 2000 | 1.25 |
| 1004 | PEC | Pencil 2B | 10000 | 0.48 |
| 1005 | PEC | Pencil 2H | 8000 | 0.49 |
| 1006 | PEC | Pencil HB | 0 | 99999.99 |
+-----------+-------------+-----------+----------+----------+
6 rows in set (0.07 sec)
mysql> DELETE FROM products WHERE productID = 1006;
Query OK, 1 row affected (0.18 sec)
mysql> SELECT name, price FROM products;
+-----------+-------+
| name | price |
+-----------+-------+
| Pen Red | 1.23 |
| Pen Blue | 1.25 |
| Pen Black | 1.25 |
| Pencil 2B | 0.48 |
| Pencil 2H | 0.49 |
+-----------+-------+
5 rows in set (0.00 sec)
mysql> SELECT * FROM products;
+-----------+-------------+-----------+----------+-------+
| productID | productCode | name | quantity | price |
+-----------+-------------+-----------+----------+-------+
| 1001 | PEN | Pen Red | 5000 | 1.23 |
| 1002 | PEN | Pen Blue | 8000 | 1.25 |
| 1003 | PEN | Pen Black | 2000 | 1.25 |
| 1004 | PEC | Pencil 2B | 10000 | 0.48 |
| 1005 | PEC | Pencil 2H | 8000 | 0.49 |
+-----------+-------------+-----------+----------+-------+
5 rows in set (0.00 sec)
34
mysql> SELECT name, price FROM products WHERE price < 1.0;
+-----------+-------+
| name | price |
+-----------+-------+
| Pencil 2B | 0.48 |
| Pencil 2H | 0.49 |
+-----------+-------+
2 rows in set (0.07 sec)
mysql> SELECT name, price FROM products WHERE name LIKE 'PENCIL%';
+-----------+-------+
| name | price |
+-----------+-------+
| Pencil 2B | 0.48 |
| Pencil 2H | 0.49 |
+-----------+-------+
2 rows in set (0.04 sec)
mysql> SELECT * FROM products WHERE quantity >= 5000 AND name LIKE 'Pen
%';
+-----------+-------------+----------+----------+-------+
| productID | productCode | name | quantity | price |
+-----------+-------------+----------+----------+-------+
| 1001 | PEN | Pen Red | 5000 | 1.23 |
| 1002 | PEN | Pen Blue | 8000 | 1.25 |
+-----------+-------------+----------+----------+-------+
2 rows in set (0.00 sec)
mysql> SELECT * FROM products WHERE quantity >= 5000 AND price < 1.24 AND
name L
IKE 'Pen %';
+-----------+-------------+---------+----------+-------+
| productID | productCode | name | quantity | price |
+-----------+-------------+---------+----------+-------+
| 1001 | PEN | Pen Red | 5000 | 1.23 |
+-----------+-------------+---------+----------+-------+
1 row in set (0.00 sec)
mysql> SELECT * FROM products WHERE (price BETWEEN 1.0 AND 2.0) AND
(quantity BETWEEN 1000 AND 2000);
+-----------+-------------+-----------+----------+-------+
| productID | productCode | name | quantity | price |
+-----------+-------------+-----------+----------+-------+
| 1003 | PEN | Pen Black | 2000 | 1.25 |
+-----------+-------------+-----------+----------+-------+
1 row in set (0.01 sec)
mysql> SELECT * FROM products WHERE name LIKE 'Pen %' ORDER BY price DESC;
+-----------+-------------+-----------+----------+-------+
| productID | productCode | name | quantity | price |
+-----------+-------------+-----------+----------+-------+
| 1002 | PEN | Pen Blue | 8000 | 1.25 |
| 1003 | PEN | Pen Black | 2000 | 1.25 |
35
| 1001 | PEN | Pen Red | 5000 | 1.23 |
+-----------+-------------+-----------+----------+-------+
3 rows in set (0.17 sec)
mysql> SELECT * FROM products ORDER BY price LIMIT 2;
+-----------+-------------+-----------+----------+-------+
| productID | productCode | name | quantity | price |
+-----------+-------------+-----------+----------+-------+
| 1004 | PEC | Pencil 2B | 10000 | 0.48 |
| 1005 | PEC | Pencil 2H | 8000 | 0.49 |
+-----------+-------------+-----------+----------+-------+
2 rows in set (0.00 sec)
mysql> SELECT CONCAT(productCode,'-',name) AS `Product Description’, price
FROM products;
+---------------------+-------+
| Product Description | price |
+---------------------+-------+
| PEN - Pen Red | 1.23 |
| PEN - Pen Blue | 1.25 |
| PEN - Pen Black | 1.25 |
| PEC - Pencil 2B | 0.48 |
| PEC - Pencil 2H | 0.49 |
+---------------------+-------+
5 rows in set (0.04 sec)
mysql> SELECT DISTINCT price AS `Distinct Price’ FROM products;
+----------------+
| Distinct Price |
+----------------+
| 1.23 |
| 1.25 |
| 0.48 |
| 0.49 |
+----------------+
4 rows in set (0.10 sec)
mysql> SELECT * FROM products GROUP BY productCode;
+-----------+-------------+-----------+----------+-------+
| productID | productCode | name | quantity | price |
+-----------+-------------+-----------+----------+-------+
| 1004 | PEC | Pencil 2B | 10000 | 0.48 |
| 1001 | PEN | Pen Red | 5000 | 1.23 |
+-----------+-------------+-----------+----------+-------+
2 rows in set (0.01 sec)
mysql> SELECT productCode, MAX(price) AS `Highest Price’, MIN(price) AS
`LowestPrice` FROM products GROUP BY productCode;
+-------------+---------------+--------------+
| productCode | Highest Price | Lowest Price |
+-------------+---------------+--------------+
| PEC | 0.49 | 0.48 |
| PEN | 1.25 | 1.23 |
36
+-------------+---------------+--------------+
2 rows in set (0.07 sec)
mysql> UPDATE products SET price = price * 1.1;
Query OK, 5 rows affected, 5 warnings (0.24 sec)
mysql> LOAD DATA LOCAL INFILE 'E:mysql/products_in.csv' INTO TABLE
products COLUMNS TERMINATED BY ',' LINES TERMINATED BY 'rn';
ERROR 2 (HY000): File 'E:mysqlproducts_in.csv' not found (Errcode: 2 - No
suchfile or directory)
“Appendix c”
Screenshots of the internship project done at UBC (website development using WordPress)
Screenshot1:WordPressloginusingphp
WiththeuseofwampserverinstalledanditbeingonlineIloginedintoWordPressversion4.4.2
Screenshot2:homepageofKivEventswebsitewithsliderfromrighttoleftplusotherpages
37
Screenshot3:continuationofKivEventswebsitehomepagewiththemeettheteamandfactstabsplusthelatest
news
Screenshot4:continuationofKivEventswebsitehomepageshowingsuccessstoriestabandcontacticonthat
whenclickedtakeyoutorespectivesocialmediaplatforms.ThesocialmediaiconsareincludedinWordPress
usingSydneythemeandsiteoriginsocialbundle.
38
Screenshot5:theaboutuspageindicatingtestimonialscreatedbyaddingnewtestimonialfromthedashboard,
contactustabplusthesocialmediaicons
39
Screenshot6:thisshowstheemployeespageinthatwhenhooveredoveritpopsupsocialmediacontactsofthe
differentemployees
Screenshot7:theportfoliopageindicatesthedifferentprojectsaccomplishedbytheorganisation
Screenshot 8: the blog page created with help of the contact form7 plugin that enables
individuals to tweet to the website as indicated in the extreme right of the screen shot
40
Screenshot9:blogpageshowingwhereanindividualwhohasvisitedthesitecanleaveacomment
Screenshot10:thesuccessstories pageincludestheclientsthathaveworkedwiththeorganisation
41
Screenshot11:thecontactus pageindicatesthegooglemaplocationoftheorganisationwithaformusedtosend
emailtoorganisation
Screenshot12:illustrationshowinginstallationofoneoftheusedplugin(lightboxpluscolorbox)
42
“Appendix D”
Windows installation
Windows XP
Steps Taken
1. Start a computer from the Windows XP CD or boot disks.
2. press any key to start the computer from the Windows XP CD then press ENTER to
begin Windows XP Setup
3. Read the Microsoft Software License Terms, and then press F8.
4. Follow the instructions on the screen to select and format a partition where you want
to install Windows XP till you complete Windows XP Setup.
Windows 7 installation
1. Enter your computer's system BIOS by pressing Del, Esc, F2, F10, or F9 depending
on your computer’s motherboard.
2. Find your BIOS's boot options menu
43
3. Select the CD-ROM drive as the first boot device of your computer.
4. Save the changes of the settings
5. Shut off your computer and Power on the PC and the insert the Windows 7 disc into
your CD/DVD drive or flash disk
6. Start your computer from the disc., Choose your Windows Setup options, Click the
Install Now button, Accept the License Terms, Select the Custom installation, decide
on which hard drive and partition you want to install Windows on.
Windows 8 installation
1. Insert the Windows 8 Installation Disc into the internal / external DVD. Turn on your
computer During the boot up screen, press [F12] on your keyboard to enter Boot
Menu and choose the DVD or BD reading device where you insert the installation
disc.
2. Press any key on your keyboard when you see the message to reboot from the DVD
or BD reading device then Click “Install now” to continue.
3. Insert activation key and Check “I accept the license terms” and click “next”.
Note: for clean installation, please select “Custom” to continue.
4. For need to create a new partition with specific size, you should click “New”.
Otherwise, click “Next”, When all partition process is done, choose your desired
partition for Windows 8 installation, and click “Next”.
5. Final step is to Complete the Windows 8 Installation
“Appendix E”
Adding Roles in windows server 2008 R2:
Go to Server Manager by using shortcuts on the Start menu, then in the Roles Summary Click Add
Roles
44
assigning the IP addresses
Log on to Windows Server 2008 R2 computer with Administrator account.
Click Start and then click Run(NCPA.CPL) from the menu.
On the opened window right-click on the NIC on which static IP address has to be assigned and
click Properties.
On Local Area Network Properties box make sure that Networking tab is selected and double-
click Internet Protocol Version 4 (TCP/IPv4).
General tab is selected and click to select Use the following IP address
Populate the enabled IP address and Subnet mask fields and click OK button. That is to say
IP address: 192.168.2.7, Subnet mask: 255.255.255.0, Default gateway: 192.168.2.1, Preferred
DNS server: 196.43.133.5, Alternate DNSC server: 196.43.133.6
click OK to save the changes.
creating users
open up Server Manager
open up the Roles section, next to Active Directory Users and Computers section and finally the
Active Directory Users and Computers
click on Users section where we are going to create a new User Account. To do so, right-click on
the blank section, point to New and select User.
In this window type in the user's first name, middle initial and last name. Next create a user's
logon name.
create a password for the new user and select appropriate options
click on the Finish button to complete the creation of new User Account.

Mais conteúdo relacionado

Mais procurados

INDUSTRIAL ATTACHMENT REPORT BBM_11_11_12 PART 2(1) (1)
INDUSTRIAL ATTACHMENT REPORT BBM_11_11_12 PART 2(1) (1)INDUSTRIAL ATTACHMENT REPORT BBM_11_11_12 PART 2(1) (1)
INDUSTRIAL ATTACHMENT REPORT BBM_11_11_12 PART 2(1) (1)
Brian Bor
 
JULIUS KIPCHUMBA KEMBOI
JULIUS KIPCHUMBA KEMBOIJULIUS KIPCHUMBA KEMBOI
JULIUS KIPCHUMBA KEMBOI
julius kemboi
 
Report_on_Industrial Placement
Report_on_Industrial PlacementReport_on_Industrial Placement
Report_on_Industrial Placement
Awais Mahmood
 
INDUSTRIAL ATTACHMENT REPORT BBM_11_11_12
INDUSTRIAL ATTACHMENT REPORT BBM_11_11_12INDUSTRIAL ATTACHMENT REPORT BBM_11_11_12
INDUSTRIAL ATTACHMENT REPORT BBM_11_11_12
Brian Bor
 
INDUSTRIAL ATTACHMENT REPORT
INDUSTRIAL ATTACHMENT REPORTINDUSTRIAL ATTACHMENT REPORT
INDUSTRIAL ATTACHMENT REPORT
James Sengu
 

Mais procurados (20)

INDUSTRIAL ATTACHMENT REPORT BBM_11_11_12 PART 2(1) (1)
INDUSTRIAL ATTACHMENT REPORT BBM_11_11_12 PART 2(1) (1)INDUSTRIAL ATTACHMENT REPORT BBM_11_11_12 PART 2(1) (1)
INDUSTRIAL ATTACHMENT REPORT BBM_11_11_12 PART 2(1) (1)
 
INTERNSHIP REPORT
INTERNSHIP REPORTINTERNSHIP REPORT
INTERNSHIP REPORT
 
internship report covert
internship report covertinternship report covert
internship report covert
 
Computer science and information technology
Computer science and information technology Computer science and information technology
Computer science and information technology
 
Attachment report
Attachment report Attachment report
Attachment report
 
JULIUS KIPCHUMBA KEMBOI
JULIUS KIPCHUMBA KEMBOIJULIUS KIPCHUMBA KEMBOI
JULIUS KIPCHUMBA KEMBOI
 
Work Measurement Application - Ghent Internship Report - Adel Belasker
Work Measurement Application - Ghent Internship Report - Adel BelaskerWork Measurement Application - Ghent Internship Report - Adel Belasker
Work Measurement Application - Ghent Internship Report - Adel Belasker
 
AbleMoJah's IT Report
AbleMoJah's IT ReportAbleMoJah's IT Report
AbleMoJah's IT Report
 
Online job advertisement project report
Online job advertisement project reportOnline job advertisement project report
Online job advertisement project report
 
Report_on_Industrial Placement
Report_on_Industrial PlacementReport_on_Industrial Placement
Report_on_Industrial Placement
 
INDUSTRIAL ATTACHMENT REPORT BBM_11_11_12
INDUSTRIAL ATTACHMENT REPORT BBM_11_11_12INDUSTRIAL ATTACHMENT REPORT BBM_11_11_12
INDUSTRIAL ATTACHMENT REPORT BBM_11_11_12
 
DHL...Collins[1]
DHL...Collins[1]DHL...Collins[1]
DHL...Collins[1]
 
Attachment Report
Attachment ReportAttachment Report
Attachment Report
 
Networking
NetworkingNetworking
Networking
 
Attachment report IAT
Attachment report IATAttachment report IAT
Attachment report IAT
 
CSE390 industrial attachment I report
CSE390 industrial attachment I reportCSE390 industrial attachment I report
CSE390 industrial attachment I report
 
Attachment Report
Attachment ReportAttachment Report
Attachment Report
 
Attachment Report
Attachment ReportAttachment Report
Attachment Report
 
Computer Science Student Final attachment Logbook
Computer Science Student Final attachment Logbook Computer Science Student Final attachment Logbook
Computer Science Student Final attachment Logbook
 
INDUSTRIAL ATTACHMENT REPORT
INDUSTRIAL ATTACHMENT REPORTINDUSTRIAL ATTACHMENT REPORT
INDUSTRIAL ATTACHMENT REPORT
 

Destaque

Pattern: An Open Source Project for Migrating Predictive Models from SAS
Pattern: An Open Source Project for Migrating Predictive Models from SASPattern: An Open Source Project for Migrating Predictive Models from SAS
Pattern: An Open Source Project for Migrating Predictive Models from SAS
DataWorks Summit
 
Valgen Case Study - Midsized Apparel Manufacturer
Valgen Case Study - Midsized Apparel ManufacturerValgen Case Study - Midsized Apparel Manufacturer
Valgen Case Study - Midsized Apparel Manufacturer
ValgenMobility
 
Critical appraisal of Stitch Trial by Dr. Akshay Mehta
Critical appraisal of Stitch Trial by Dr. Akshay MehtaCritical appraisal of Stitch Trial by Dr. Akshay Mehta
Critical appraisal of Stitch Trial by Dr. Akshay Mehta
cardiositeindia
 
Transportatopn problm
Transportatopn problmTransportatopn problm
Transportatopn problm
Anshul Singh
 
4. STUDY ONVARIATION OF JOINT FORCES IN STEEL TRUSS BRIDGE
4.	STUDY ONVARIATION OF JOINT FORCES IN STEEL TRUSS BRIDGE4.	STUDY ONVARIATION OF JOINT FORCES IN STEEL TRUSS BRIDGE
4. STUDY ONVARIATION OF JOINT FORCES IN STEEL TRUSS BRIDGE
AELC
 
The fertilizer industry Roydon D'mello
The fertilizer industry  Roydon D'melloThe fertilizer industry  Roydon D'mello
The fertilizer industry Roydon D'mello
Roydon D'mello
 
India : Textiles and apparel Sector Report_August 2013
India : Textiles and apparel Sector Report_August 2013India : Textiles and apparel Sector Report_August 2013
India : Textiles and apparel Sector Report_August 2013
India Brand Equity Foundation
 

Destaque (20)

Pattern: An Open Source Project for Migrating Predictive Models from SAS
Pattern: An Open Source Project for Migrating Predictive Models from SASPattern: An Open Source Project for Migrating Predictive Models from SAS
Pattern: An Open Source Project for Migrating Predictive Models from SAS
 
навигатор N9
навигатор N9навигатор N9
навигатор N9
 
Evaluation task 1
Evaluation task 1 Evaluation task 1
Evaluation task 1
 
Varios cuentos
Varios cuentosVarios cuentos
Varios cuentos
 
Responsive Web Design Chalk Talk
Responsive Web Design Chalk TalkResponsive Web Design Chalk Talk
Responsive Web Design Chalk Talk
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Fashion & customize inspiration
Fashion & customize inspirationFashion & customize inspiration
Fashion & customize inspiration
 
Fashion Illustratie & inspiration
Fashion Illustratie & inspirationFashion Illustratie & inspiration
Fashion Illustratie & inspiration
 
Valgen Case Study - Midsized Apparel Manufacturer
Valgen Case Study - Midsized Apparel ManufacturerValgen Case Study - Midsized Apparel Manufacturer
Valgen Case Study - Midsized Apparel Manufacturer
 
Mas leather international
Mas leather internationalMas leather international
Mas leather international
 
Stich ii trial for supratentorial intra cerebral bleed
Stich ii trial for supratentorial intra cerebral bleedStich ii trial for supratentorial intra cerebral bleed
Stich ii trial for supratentorial intra cerebral bleed
 
Critical appraisal of Stitch Trial by Dr. Akshay Mehta
Critical appraisal of Stitch Trial by Dr. Akshay MehtaCritical appraisal of Stitch Trial by Dr. Akshay Mehta
Critical appraisal of Stitch Trial by Dr. Akshay Mehta
 
stitching details of basic shirt
stitching details of  basic shirtstitching details of  basic shirt
stitching details of basic shirt
 
Урок 8 для 6 класу - Поняття операційної системи, її призначення Графічний ін...
Урок 8 для 6 класу - Поняття операційної системи, її призначення Графічний ін...Урок 8 для 6 класу - Поняття операційної системи, її призначення Графічний ін...
Урок 8 для 6 класу - Поняття операційної системи, її призначення Графічний ін...
 
Scaling Up Improved Seed and Agronomic Practices in Southern Africa
Scaling Up Improved Seed and Agronomic Practices in Southern AfricaScaling Up Improved Seed and Agronomic Practices in Southern Africa
Scaling Up Improved Seed and Agronomic Practices in Southern Africa
 
Transportatopn problm
Transportatopn problmTransportatopn problm
Transportatopn problm
 
4. STUDY ONVARIATION OF JOINT FORCES IN STEEL TRUSS BRIDGE
4.	STUDY ONVARIATION OF JOINT FORCES IN STEEL TRUSS BRIDGE4.	STUDY ONVARIATION OF JOINT FORCES IN STEEL TRUSS BRIDGE
4. STUDY ONVARIATION OF JOINT FORCES IN STEEL TRUSS BRIDGE
 
The fertilizer industry Roydon D'mello
The fertilizer industry  Roydon D'melloThe fertilizer industry  Roydon D'mello
The fertilizer industry Roydon D'mello
 
Final industrial-attachment
Final industrial-attachmentFinal industrial-attachment
Final industrial-attachment
 
India : Textiles and apparel Sector Report_August 2013
India : Textiles and apparel Sector Report_August 2013India : Textiles and apparel Sector Report_August 2013
India : Textiles and apparel Sector Report_August 2013
 

Semelhante a Kaahwa armstrong intern report

AS Solar Charging Station Design Report
AS Solar Charging Station Design ReportAS Solar Charging Station Design Report
AS Solar Charging Station Design Report
Salam Ali
 
UETCL report
UETCL reportUETCL report
UETCL report
Jim Kats
 
Sun blackboardwp10 1_07
Sun blackboardwp10 1_07Sun blackboardwp10 1_07
Sun blackboardwp10 1_07
Steve Feldman
 
REPORT OF UNDERGRADUATE TRAINING ON TELECOMMUNICATION AT ZTE
REPORT OF UNDERGRADUATE TRAINING ON TELECOMMUNICATION AT ZTEREPORT OF UNDERGRADUATE TRAINING ON TELECOMMUNICATION AT ZTE
REPORT OF UNDERGRADUATE TRAINING ON TELECOMMUNICATION AT ZTE
Kulendran Anujan
 
COSMAS turyasingurFINALLS - Copy - Copy.doc
COSMAS turyasingurFINALLS - Copy - Copy.docCOSMAS turyasingurFINALLS - Copy - Copy.doc
COSMAS turyasingurFINALLS - Copy - Copy.doc
AmanyaSylus
 
Internet Traffic Measurement and Analysis
Internet Traffic Measurement and AnalysisInternet Traffic Measurement and Analysis
Internet Traffic Measurement and Analysis
Nikolaos Draganoudis
 

Semelhante a Kaahwa armstrong intern report (20)

MUHUMUZA ONAN
MUHUMUZA ONANMUHUMUZA ONAN
MUHUMUZA ONAN
 
Siwes report on networking by abdullahi yahaya
Siwes report on networking by abdullahi yahayaSiwes report on networking by abdullahi yahaya
Siwes report on networking by abdullahi yahaya
 
final report.docx
final report.docxfinal report.docx
final report.docx
 
Internship report-csit-isp_networking
 Internship report-csit-isp_networking Internship report-csit-isp_networking
Internship report-csit-isp_networking
 
Experience at WSO2 as an Intern
Experience at WSO2 as an InternExperience at WSO2 as an Intern
Experience at WSO2 as an Intern
 
Puvan Dissertation 2
Puvan Dissertation 2Puvan Dissertation 2
Puvan Dissertation 2
 
Student's Work Experience Program (SWEP) by IGINA PAUL
Student's Work Experience Program (SWEP) by IGINA PAUL Student's Work Experience Program (SWEP) by IGINA PAUL
Student's Work Experience Program (SWEP) by IGINA PAUL
 
AS Solar Charging Station Design Report
AS Solar Charging Station Design ReportAS Solar Charging Station Design Report
AS Solar Charging Station Design Report
 
Accident detection and notification system
Accident detection and notification systemAccident detection and notification system
Accident detection and notification system
 
KAWEESI_FINAL
KAWEESI_FINALKAWEESI_FINAL
KAWEESI_FINAL
 
Dual-Band Mobile Phone Jammer
Dual-Band Mobile Phone JammerDual-Band Mobile Phone Jammer
Dual-Band Mobile Phone Jammer
 
UETCL report
UETCL reportUETCL report
UETCL report
 
Capstone Report - Industrial Attachment Program (IAP) Evaluation Portal
Capstone Report - Industrial Attachment Program (IAP) Evaluation PortalCapstone Report - Industrial Attachment Program (IAP) Evaluation Portal
Capstone Report - Industrial Attachment Program (IAP) Evaluation Portal
 
Sun blackboardwp10 1_07
Sun blackboardwp10 1_07Sun blackboardwp10 1_07
Sun blackboardwp10 1_07
 
REPORT OF UNDERGRADUATE TRAINING ON TELECOMMUNICATION AT ZTE
REPORT OF UNDERGRADUATE TRAINING ON TELECOMMUNICATION AT ZTEREPORT OF UNDERGRADUATE TRAINING ON TELECOMMUNICATION AT ZTE
REPORT OF UNDERGRADUATE TRAINING ON TELECOMMUNICATION AT ZTE
 
Report docx
Report docxReport docx
Report docx
 
FYP 2 REPORT AMIRUL ARIFF
FYP 2 REPORT AMIRUL ARIFFFYP 2 REPORT AMIRUL ARIFF
FYP 2 REPORT AMIRUL ARIFF
 
COSMAS turyasingurFINALLS - Copy - Copy.doc
COSMAS turyasingurFINALLS - Copy - Copy.docCOSMAS turyasingurFINALLS - Copy - Copy.doc
COSMAS turyasingurFINALLS - Copy - Copy.doc
 
Internet Traffic Measurement and Analysis
Internet Traffic Measurement and AnalysisInternet Traffic Measurement and Analysis
Internet Traffic Measurement and Analysis
 
AMIZONER: Final Report
AMIZONER: Final ReportAMIZONER: Final Report
AMIZONER: Final Report
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Último (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

Kaahwa armstrong intern report

  • 1. i MAKERERE UNIVERSITY COLLEGE OF COMPUTING AND INFORMATION SCIENCES SCHOOL OF COMPUTING AND INFORMATICS TECHNOLOGY A REPORT ON FIELD ATTACHMENT /INTERNSHIP AT Uganda Broadcasting Corporation Field attachment period (June 6th -August 1st ,2016) BY KAAHWA ARMSTRONG 14/U/288 Field attachment Report submitted to the School of computing and informatics Technology In Partial fulfilment of the requirements for the degree of Computer Science of Makerere University Kampala Name of student: KAAHWA ARMSTRONG Signature: ______________________________________ Date: _________________________ Name of Academic Supervisor: Mr. KIZITO JOHN Signature: ______________________________________ Date: _________________________ Name of Field Supervisor: ONGIIMA PATRICK Signature: _______________________________stamp & Date: _________________________
  • 2. ii DECLARATION I KAAHWA ARMSTRONG hereby declare that the information in this report is my own original gathered authentic work. It also makes practical and effective fulfilment of the purposes and objectives of this field attachment, and the content of the document has never been previously submitted to any other university or institution for a higher degree or any other award. Except for Citations, Quotations and References to other people’s work used where otherwise acknowledged. Signature……………………………………. Date……………………
  • 3. iii ACKNOWLEDGEMENT First and foremost, I would like to acknowledge the Almighty God for the successful completion of the Field Attachment period. I would like to say thanks to Uganda broadcasting corporation for the opportunity given to me as an intern in the Information technology section. Special thanks go to my academic supervisor Mr. Kizito John, internship coordinator Mr. Michael Kizito of College of computing and information sciences Makerere University. Many thanks to my field supervisors Mr. Ogiima Patrick and Mr. Tusiime Lucas for their personal efforts, practical skills, professional guidance and direction towards successful internship. Finally, I would like to extend my heartfelt gratitude to my family members especially my mother BIRUNGI MAGRET for all the support, classmates and other friends for their invaluable support throughout my training.
  • 4. iv ABSTRACT I carried out my internship at Uganda Broadcasting corporation under the information Technology department. Under networking, I dealt with setting up, administering, maintaining and upgrading communication systems, and also local area networks and wide area networks for the organization. The activities carried out included cable termination, over view of network topologies, setting up LANs, router configuration, printer configuration on networks, basic networking software installation (Cisco IOS). Under Web development, the field supervisor overviewed basic understanding of web technologies (client side, server side and databases) using WordPress, database management using MySQL. Under computer maintance and repair, I dealt with basic hardware installation (RAM, HARDDISK, CD-ROM), basic operating system installation and activation i.e. windows xp,7,8,10, system restoration, file recovery, data backup, Wi-Fi hotspot creation, installation of Windows Server 2008 R2. Through work and experiences, I attained networking, trouble shooting, team work, leadership skills, interpersonal and research skills. The challenges faced include: lack of enough equipment, faulty equipment i.e. CD ROMs, RAM, and crimping tool, poor internet connection, failure in troubleshooting for Windows service failures, understanding new technical terms. In my conclusion internship at UBC was so productive with practical hand on skills attained from the different field supervisors. I recommend that We as students need to be taught much more of practical skills in class than theory and be given more time for practice.
  • 5. v TABLES OF CONTENTS DECLARATION............................................................................................................................ ii ACKNOWLEDGEMENT.............................................................................................................iii ABSTRACT................................................................................................................................... iv LIST OF TABLES.......................................................................................................................viii LIST OF ACRONYMS/ABBREVIATIONS................................................................................ ix 2.2.1. CHAPTER ONE INTRODUCTION ................................................................................ 1 1.1. introduction.............................................................................................................................. 1 1.2. Background of the field attachment......................................................................................... 1 1.3. Objectives of the field attachment ........................................................................................... 1 1.4. Background of the Organization of Field attachment.............................................................. 1 1.5. Organisational culture.............................................................................................................. 2 1.6. The structure of the organisation ............................................................................................. 3 1.7. The main activities of the organisation and ongoing IT projects............................................. 4 2.2.2. CHAPTER TWO STUDENT’S EXPERIENCES............................................................ 5 2.1. Title or position occupied in an organization .......................................................................... 5 2.2. Duties and responsibilities....................................................................................................... 5 2.3. Supervision levels and relationship with the supervisor........................................................ 21 2.4. Work team and its composition ............................................................................................. 21 2.4. Working relationship among the team members and staff .................................................... 22 3.0. CHAPTER THREE EVALUATION ON FIELD ATTACHMENT ................................. 23 3.1. Level of accomplishment of duties and responsibilities assigned ......................................... 23 3.2. New knowledge and skills gained in each of the duties and responsibilities ........................ 23 3.3. Most interesting experiences.................................................................................................. 24
  • 6. vi 3.4. Relatedness of university’s taught programs to the field work.............................................. 25 3.5. Challenges faced and how managed...................................................................................... 25 3.6. Benefits derived from field attachment.................................................................................. 26 3.7. Adequacy in university’s preparing the student for field attachment.................................... 27 3.8. Preparedness of the agency to receive and manage students for field attachment ................ 27 3.9. Career Motivation.................................................................................................................. 27 4.0. CONCLUSIONS AND RECOMMENDATIONS ................................................................ 27 4.1. Conclusions............................................................................................................................ 27 4.2. RECOMMENDATIONS....................................................................................................... 28 References..................................................................................................................................... 29 Appendices.................................................................................................................................... 30
  • 7. vii LIST OF FIGURES Figure 1.1: Organizational structure for Uganda Broadcasting corporation................................... 3 Figure 2.1: layers of the OSI model................................................................................................ 6 Figure 2.2: Illustration of common physical topologies ................................................................. 6 Figure 2.3: Network Structure for UBC Administration block ...................................................... 7 Figure 2.4: Illustration showing how to create a straight-through cable ........................................ 8 Figure 2.5: Illustration of the T-568B Straight-Through Ethernet Cable....................................... 8 Figure 2.6: Illustration of the T-568B Straight-Through Ethernet Cable....................................... 9 Cable termination for the different cable standards involves the following................................... 9 Figure 2.7: illustration showing finding ip and MAC addresses. ................................................. 10 Figure 2.8: shows screen shot of add printer wizard running...................................................... 11 Figure 2.9: shows screen shot of shared printer in the add printer wizard .................................. 11 Figure 2.10: Illustration of the DHCP lease process..................................................................... 13 Figure 2.11: shows the difference between DDR and DDR2....................................................... 14 Figure 2.12: shows IDE and SATA connector ............................................................................. 15 Figure 2.13: indicating screen shot of the select command in MySQL........................................ 16 Figure 2.14: Screenshot showing a table selected from products using php MyAdmin console . 16 Figure 2.15: shows activated windows......................................................................................... 18 Figure 2.16: showing how UBC’s domain controller with the clients ......................................... 20
  • 8. viii LIST OF TABLES Table 2.1: tasks completed and supervisors in charge.................................................................... 5 Table 2.2: showing windows activation errors causes and solutions............................................ 19 Table 3.1: showing relevance of computer science curriculum to field attachment..................... 25
  • 9. ix LIST OF ACRONYMS/ABBREVIATIONS. UBC Uganda broadcasting corporation IT information technology UTV Uganda television RAM Random Access Memory ROM Read Only Memory LAN Local Area network WAN Wireless Area Network WI-FI Wireless Fidelity SQL Structured Query Language CLI Command Line Interface DNS Domain Name System IP Internet Protocol ISPs Internet Service Providers IANA Internet Assigned Numbers Authority DHCP Dynamic Host Configuration Protocol APIPA Automatic Private IP Addressing NetBIOS Network Basic Input/output System TCP/IP Transmission Control Protocol/Internet Protocol AD DS Active Directory Domain Services. CMOS Complementary Metal Oxide Semiconductor WPA Windows Product Activation
  • 10. 1 2.2.1. CHAPTER ONE INTRODUCTION 1.1. introduction This field attachment report is about the skills attained, lessons learnt, challenges, relatedness of theory covered in class and recommendations during my internship placement at Uganda Broadcasting corporation(UBC) from 1st June to 1st august 2016 see “appendix A”. The report also represents my experiences, recommendations and benefits of the field attachment. 1.2. Background of the field attachment Field attachment is a field-based practical training experience that prepares trainees for the tasks they are expected to perform on completion of their programs. The main intention is to produce practically oriented graduates that meet the required job-related competences of their future employers 1.3. Objectives of the field attachment  To enable students, get hands-on/real life experience they are expected to work in when they graduate.  To provide an opportunity for students to apply the principles and techniques theoretically learnt into real-life problem solving situations.  To provide an opportunity for students and academic staff to interact with the stakeholders and potential employers and thus appreciate field situations that will also generate information for curricula review and improvement.  To develop student understanding of work ethics, employment demands, responsibilities and opportunities.  To enhance and strengthen linkages between Makerere University and various stakeholders. 1.4. Background of the Organization of Field attachment. Uganda Broadcasting Corporation is the public broadcaster of Uganda. Formally Uganda Television and Radio Uganda (the current Uganda Broadcasting Corporation) was born in 1963 one year after Uganda’s independence. However, radio was born in Uganda in 1954 and TV came in nine years after that. Its main aim was to broadcast through both mediums to the whole country as the national broadcaster.
  • 11. 2 After independence till the mid 1980’s Uganda was faced with a lot of economic hardships. As a result, Ugandan Government saw the need to restructure the former Uganda Television and Radio Uganda. As a result, Parliament passed the Uganda Broadcasting Corporation Act that established the Uganda Broadcasting Corporation in 2005. This transformed the former UTV and Radio Uganda into the now existent Uganda Broadcasting Corporation. The Corporation started its activities on 16th November, 2005. The Corporation is fully owned (100%) by the Government of Uganda and carries out its activities for and on behalf of the Government. It therefore requires government funding in order to sustain its operation. Vision Broadcasting quality programs for national development. Mission To inform, educate, guide and entertain the public through maintaining a suitable national coverage. Objectives  To develop the broadcasting bodies into a public national broadcasting centre of excellence, for the purpose of providing electronic media and consultancy services that educate and guide the public.  To achieve and sustain comprehensive national radio and television coverage.  To achieve and sustain a common carrier status. 1.5. Organisational culture 1.5.1. values In executing its mandate, UBC is committed to espouse the values of: Trustworthiness, Fairness, Equal opportunity, Ethical conduct, Integrity, Transparency and Professionalism. 1.5.2. Beliefs All workers must adhere to UBC principles. And must commit working hours to official duties
  • 12. 3 1.6. The structure of the organisation Figure 1.1: Organizational structure for Uganda Broadcasting corporation FINANCE AND ADMINISTRATION BOARD OF DIRECTORS MANAGING DIRECTOR HEAD OF ENGINEERIN G TV MANAGER MARKETING & BUSUNESS DEVELOPMENT MANAGER RADIO MANAGERS HUMAN RESOURCE MANAGER PRESENTERS PRODUCERS PRESENTERS PRODUCERS SALES MANAGER SALES EXECUTIVE MARKETING OFFICERS PROCUREMEN T OFFICER MANAGEMEN T ACCOUNTS STORE’S OFFICER ACCOUNTI NG ASSISTANT CASHIE RS ADMINISTRATIVE OFFICER ASSISTANT ADMINISTRATOR CORPORATION SECRETARY HUMAN RESOURCE OFFICER IT DEPT
  • 13. 4 1.7. The main activities of the organisation and ongoing IT projects  short wave (SW) transmission and Medium wave(MW) transmission.  Online radio and TV streaming.  Reconstruction of organisation website(www.ubc.ug).  Restructuring of the organisation networks(LAN).  Repair and maintaince of the organisation’s IT equipment i.e. computers and installation of the basic softwares used.
  • 14. 5 2.2.2. CHAPTER TWO STUDENT’S EXPERIENCES 2.1. Title or position occupied in an organization For the two months of the field attachment, I occupied the position of a full time Intern with work schedule from Monday to Friday 9:00am to 4:00 pm at UBC as indicated in “Appendix A”. Additionally, I worked with other staff occupying other different positions at the company, thereby doing a wide range of roles. 2.2. Duties and responsibilities. The following are the main duties and responsibilities that I undertook during the field attachment at Uganda Broadcasting corporation. Activity Supervisor General Orientation Mr. Ongima Patrick Tour around UBC premises Review of OSI models and network topologies Mr. Tusiime Lucas Operating systems and other application software installation Cable termination Computer repair and maintenance Mr. Tusiime Lucas Database design Web development(websites) Mr. Ongima Patrick Ethernet and Cable termination Data Recovery Mr. Tusiime Lucas Research about Domain controller and active directory Installation and configuration of windows server 2008 R2 Mr. Ongima Patrick Table 2.1: tasks completed and supervisors in charge.  Overview of OSI models and network topologies.OSI reference model describes how information from a software application in one computer moves through a network medium to a software application in another computer. It is a conceptual
  • 15. 6 model composed of seven layers, each specifying particular network functions. Figure 2.1: layers of the OSI model  Network topologies. A topology is a usually schematic description of the arrangement of a network, including its nodes and connecting lines defined either physically or logically. categories of physical topologies include: ring, mesh, tree, star, bus, Figure 2.2: Illustration of common physical topologies
  • 16. 7 The UBC network topology in the administration block is a composition of different network topologies like star, bus, and tree Figure 1.3: Network Structure for UBC Administration block
  • 17. 8  General review of Ethernet cables and Cable termination The TIA/EIA 568-A standard made in 1995, and then replaced by the TIA/EIA 568-B standard in 2002 and has continuously been updated. Both standards define the T-568A and T-568B pin-outs for using Unshielded Twisted Pair cable and RJ-45 connectors for Ethernet connectivity. The figures below show the different colour arrangements of the different cable standards Figure 2.4: Illustration showing how to create a straight-through cable Figure 2.5: Illustration of the T-568B Straight-Through Ethernet Cable RJ-45 Crossover Ethernet Cable This is used to connect two Ethernet devices directly with T-568A and T-568B at the other end without a hub or connecting hubs together
  • 18. 9 Figure 2.6: Illustration of the T-568B Straight-Through Ethernet Cable Cable termination for the different cable standards involves the following First trimming and Stripping the Ethernet cable to about 1 and ½ inch, then untwist the pairs, arrange them to the required order either straight through or crossover, cut them to 1 inch with flat end, fix them firmly into the RJ 45 connector ensuring that the ends touch the face of the connector, fix them tight using a crimping tool, test them using a tester or using two end devices.  Finding ip and MAC addresses of a network card on a computer Due to the need for connecting computers to printers and other resources, ip addresses were always required. The steps involved include the following 1. Press the Windows Start key to open the Start screen 2. Type cmd and press Enter to launch the command prompt run it as an administrator then use a command ipconfig/all Note when looking for mac address check out for physical address and ip address it is ipv4 address as indicated in figure below
  • 19. 10 Figure 2.7: illustration showing finding ip and MAC addresses.  Setting up a network printer One of the important things to note is that any network printer must have an IP address and a NIC and the steps include: Powering the computer and printer then configure their IP addresses. Go to printers and devices while in control panel, add a printer, then select the above printer from the available ones on the populated list, follow the instructions until you reach the add Standard TCP/IP printer port Wizard started and click Next to continue, a prompt to enter the printer name or IP address which by default becomes the port name will appear. Another prompt window to print a test page will be displayed then Select yes, and click next.
  • 20. 11 Figure 2.8: shows screen shot of add printer wizard running Figure 2.9: shows screen shot of shared printer in the add printer wizard.
  • 21. 12  router configuration The important precautions noted before configuration are: regardless of equipment brand or model identification of the router WAN port and router LAN port was necessary location of proper cables to connect the physical LAN and specifically for Cisco router configuration due to need for proper plugin in the correct cable to the router WAN, LAN, and CONSOLE ports. configuration the router software setup (iOS), configuration of the router to have the proper IP connection scheme such as DNS, IP subnets, etc. in order to make a proper LAN connection work. For Using the CLI (Command Line Interface) basic configuration on one of the machines, installation of the terminal simulator software (HyperTerminal program) was done. The other basic router configuring steps on a network(LAN) include the following.  Ensuring the router is working as expected, by setting several things were need be such as: setting the router to do ip routing and keeping the manufacturer's suggested settings.  Entering the interface configuration mode.  Typing in the interface IP address and subnet mask (configuring ip addresses).  Issuing "no shutdown" command to bring up the interface.  Exiting the interface configuration mode to global configuration mode.  In the global configuration mode, enter the default gateway.  Testing and Saving the configurations.  Overview of Addressing and Name Resolution This involved reviewing the types of ip address and their uses that is to say Public IP Addresses: Which are used for a computer to be visible on the Internet. The IANA assigns ranges of public IP addresses to ISPs. Authorized Private IP Addresses: These are never used on the global Internet but used by individuals who don’t access internet directly.
  • 22. 13 Unauthorized Private IP Addresses: They are used when there is an absolute certainty that your network will never access the Internet.  Overview of the Types of IP Address Assignment Dynamic Host Configuration Protocol (DHCP), Automatic Private IP Addressing (APIPA), Static IP Addressing, Alternate IP Configuration. Since DHCP is the commest ip address assignment method this was handled widely including the DHCP lease process explained below DHCP Lease Process. The first time that a Windows client (with DHCP enabled) attempts to join a network, it automatically follows an initialization process to obtain a lease from a DHCP server. Figure 2.10: Illustration of the DHCP lease process.  TCP/IP Name Resolution In general, computer users prefer to use computer names instead of IP addresses thus need for ip name resolution thus need for name resolution. Domain Name System. This is used on the Internet to map friendly names to IP addresses, and vice versa. In Microsoft Windows 2000, Microsoft Windows Server™ 2003, and Microsoft Windows XP environments, DNS is the default name resolution method. NetBIOS over TCP/IP. This Provides name resolution and connection services for clients using Microsoft Windows 95, Microsoft Windows 98, and Microsoft Windows Millennium Edition operating systems, applications, and services.  Understanding, Identifying and Upgrading the RAM in a computer Ram is volatile type of memory that a computer uses to run its OS and starting applications RAM which originally was semiconductor chip individually plugged in motherboard but now as clip-in modules. The common different types of ram include: Fast Page Mode(fpm) ram, Extended Data
  • 23. 14 Out (EDO RAM), Synchronous DRAM, Double Data Rate(DDR) RAM, DDR2 RAM DDR23 RAM. We focused on how to identify the basic and common types of ram (DDR1, DDR2 is PC2, DDR3 is PC3). DDR2 has more pins, and the notch is in a different place. In DDR, the notch should be close to the center, whereas ddr2 is further off-center and has higher pin density. Figure 2.11: shows the difference between DDR and DDR2  Computer cables and connectors Serial ATA(SATA) cables. These are computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives.
  • 24. 15 IDE/ATA Connectors. The standard IDE/ATA hard disks and ATAPI devices use two different connectors. The first is the data connector, to which the IDE/ATA cable attaches. The second is the power connector, which comes from the power supply, and of course, provides power to the drive. Figure 2.12: shows IDE and SATA connector  Data base management using MySQL and php MyAdmin  Creating and Deleting Databases in MySQL When using show, create database commands, the Back-Quoted Identifiers, Unquoted names such as database name, table name and column name cannot contain blank and special characters unless enclosing them with a pair of back-quote, in the form of ‘name’ for each word.  Understanding Comments and Version Comments There are different types of MySQL comments that is to say multi-line comments (/* and */), end-of-line comments begins with #... and lastly the version comment /*!40100 ...... */  Setting the default database. The use command sets a particular or current database as the default database.  Creating and Deleting/dropping tables. The above commands can be used with the following commands "if exists" or "if not exists”.  inserting rows, querying the database using Comparison Operators modifying data deleting rows, Exporting Data from/to a Text File
  • 25. 16  string pattern matching, producing summary reports and logical operators (and, or, not, xor, between, not between, is null, is not null, order by clause, limit clause), comparison operators and using the concat and aggregate functions (count, max, min, avg, sum) see “appendix B” for more illustration on the above mentioned commands Figure 2.13: indicating screen shot of the select command in MySQL Figure 2.14: Screenshot showing a table selected from products using php MyAdmin console
  • 26. 17  Website development using WordPress These are some of the steps followed:  Finding a Domain Name and Host.  Ways of Installing WordPress 1. One-Click-installation from Websites like WordPress.org. 2. Manual install. 3. Set Up WordPress.  Choosing a Theme/Template for your site.  Log into your WordPress dashboard.  Create a Home Page, Add More Pages, Add Widgets  Adding pages to the menu, Adding and editing posts  For Comments and Posts install contact form plugin.  Installation of other required Plugins.  Operating system installation basically windows xp,7,8,8.1,10 I Installed Operating systems like windows7 x64 and x86, windows XP, Post installations like drivers, and application software was also done for programs like cool edit, driver pack solutions, Microsoft office professional. different ways I used while performing windows installation windows on a machine Method 1: Performed a clean installation of Windows In this method involves removing all data from the hard disk by repartitioning and reformatting your hard disk and reinstalling the operating system and programs to an empty (clean) hard disk. Method 2: Upgraded to other higher Windows I used this when upgrading to Windows 8.1 from Microsoft Windows 8 pro however this method requires steady internet. Method 3: Installed Windows to a new hard disk
  • 27. 18 I used this method to install Windows XP to a new hard disk. I typically used the method when a new hard disk was installed on the computer. Method 4: Installed Windows to a new folder (parallel installation) I used this method in need of parallel installation to run two operating systems to install on one machine then used the same method to retrieve data from a damaged disk.  Performed Windows activation and its types Types of activation 1. Windows Product Activation. In this type the computer sends an installation ID number to Microsoft before Windows is verified and then activated 2. OEM Activation 3.0. This takes place at the factory where by DPK is installed on the motherboard BIOS during the manufacturing process. Windows will activate automatically the first time the computer is connected to the Internet.  Confirmation of windows activation Right click on my computer then go to computer properties. Figure 2.15: shows activated windows
  • 28. 19  Troubleshooting Windows 8 activation errors Windows activation error Possible cause Possible solution Windows isn't activated  Invalid windows license  trial or evaluation version of Windows was installed Installing the latest version of windows Windows isn't activated There are files on your PC that are preventing activation buy and reinstall a new version of Windows Windows isn't activated computer is not connected to the Internet. connect to the Internet Windows isn't activated Windows is not preinstalled on the computer no product key is configured Enter a new product key Table 2.2: showing windows activation errors causes and solutions  Data Recovery We used Hirens software for the purpose of data recovery in instances of system crash and formatted hard disk. The steps involved include insertion the bootable disk and, choose the option for load mini XP. When the PC is on, run the HBCD and go to the menu, choose recover file, then follow the prompts depending on the problem. After the entire process, connect external storage then copy the recovered files.
  • 29. 20  Research about Domain controller and active directory I carried out research on Microsoft’s domain controller and active directory, used in Networking. Domain controller. DC is a server that responds to security authentication requests within a Windows Server domain. Basically on Microsoft Windows or Windows NT network that is responsible for allowing host access to Windows domain resources. Active Directory Domain Services .AD DS stores directory data and manages communication between users and domains, including user logon processes, authentication, and directory searches. An Active Directory domain controller is a server that is running AD DS With a single network logon, administrators can manage directory data and organization throughout their network. Authorized network users can also use a single network logon to access resources anywhere in the network. Figure 2.16: showing how UBC’s domain controller with the clients  Installation and configuration of windows Server 2003 R2.  Boot up from install disk and choose the Enterprise version  Accept license terms and choose the Custom  choose Drive options and complete installation
  • 30. 21  prompt window to change password before logging in appears.  The Initial Configuration Tasks window pops up after logging in 2.3. Supervision levels and relationship with the supervisor 2.3.1. supervision levels My field supervisor was always available, provided corrective feedback, gave clear guidelines for the application of theory, competent enough, and the supervisor provided support of the professional development to me. My supervisors focused on competence with the accomplishment of meeting institutional organization internship goals. 2.3.2. Relationship with supervisor There was a strong supervisory relationship with my supervisor that effectively helped successfully to participate in experiences and acquire competence. Communication and feedback. My supervisors always provided feedback to any asked question this enabled notes taking which was later written in my logbook Time management. My supervisor was very time conscious so I ensured that I was at the organization on a daily basis. Mr. Ogiima my field supervisor usually gave time bound tasks to ensure proper good time management. 2.4. Work team and its composition The work team was created with members of different levels of abilities coming up with cross- functional teams. My work team interacted interdependently to achieve a common objective that was always assigned. Its composition was based on the attributes among individuals that made the team. In addition, the team was made of homogeneous and heterogeneous levels of skills in which team members all contain significant differences among skills, experience, and abilities. Through these contributions in the team this potentially dictated overall performance outcomes for the team which increased performance, employee unity and company culture.
  • 31. 22 2.4. Working relationship among the team members and staff As a work team intern member I was Honest, straightforward and Shared the Load this was through doing my share of the work increasing team members’ collective motivation. In addition, I was reliable and fair by taking appropriate credit and complementing my work team skills that made the team move forward. For Team work being social I was skilled, and tactful, communicator with a positive attitude.
  • 32. 23 3.0. CHAPTER THREE EVALUATION ON FIELD ATTACHMENT 3.1. Level of accomplishment of duties and responsibilities assigned To a greater extent I successfully accomplished the duties and responsibilities assigned. Being in the Information Technology department responsibilities included: day to day work and basic configuration; document procedures; application installments e.g. windows installation, adobe premiere pro cc, Microsoft word, avid, driver pack solution; working environment configurations e.g. Checking for computer status(checking hard disk life span) installing and supporting new and existing applications on various server platforms; writing business requirements documents for new projects; level 1 troubleshooting e.g. failure of printing a document when using a LAN printer, failure of a computer to start. 3.2. New knowledge and skills gained in each of the duties and responsibilities During field attachment I accumulated a lot of knowledge and skills. Each of the duties and responsibilities as listed in section 2.2 empowered and greatly impacted on my skills 3.2.1. Knowledge  Web Development. This was through Creation of web layout design, writing code, and usability testing, maintaining company websites and managing site content with the help of my supervisor.  Programming. Through design of systems, I learnt more about object-oriented languages, such as C++, Java.  Technical Support. Providing technical assistance to other departments, from troubleshooting e-mail to training individuals in new software applications  Systems Administration. Basic installing and repair an organization's computer systems. And maintaining communications, such as internet and intranet systems, local area networks (LAN), and wide area networks (WAN).  Project and Technical Services Management. Through overseeing individual projects, from communication to coordinating with team members.
  • 33. 24 3.2.2. Skills Computer competency, attention to detail, organization, problem solving, critical thinking, clear written and spoken communication, time management, close listening. 3.2.3. Responsibilities Working towards achieving my individual goals, which helped the organization reach its objectives, Taking responsibility for your own professional and career development, Being open and Accepting constructive feedback and take the initiative to improve, Giving others feedback, Completing any development plans assigned to me and applying the learning to improve my performance , Keeping record of my performance achievements, successes and challenges i.e. evaluation sheets in case of assignments , Completing my self-appraisal by the specified deadline. 3.3. Most interesting experiences. During the Field Attachment period, I really enjoyed the experience of working at UBC including the comfortable working atmosphere, the technical guidance on the latest web technologies and the friendly relationship among the field staff. A list of interesting moments, are highlighted below 3.3.1. Internship project. Accomplishing My Project assigned (developing a professional website using word press). The project involved several parts: developing a database for the website using MySQL, responsive, attractive interface. It was a very self-contained project which every intern built up from scratch. 3.3.2. Interaction with experienced people in the field I also had the opportunity to network with potential future employers and gain insight into the types of employees they look for. This made me realize the greatest value of Internship which is providing a unique and exciting experience that is unparalleled in the classroom and to coordinate job experience with academic. 3.3.3. Learning IT area of interest internship offered me the opportunity to essentially customize my placement in order to gain valuable work experience in my areas of interest and I had the opportunity to look at a sever.
  • 34. 25 3.3.4. Working with experienced and more skilled individuals working with some of the best developers, designers and managers in information technology department, solving problems that you can never face in a school environment, bonding with other interns that make up a very diverse demographic. 3.4. Relatedness of university’s taught programs to the field work With the current curriculum for Undergraduate Bachelor of Computer Science program by NCHE, Revised December 20, 2013 used by Makerere University. In its design goals which include enabling students with computing and communication skills necessary for employment and career opportunities in today’s ICT industries and business organization. Illustration of relevance of computer science curriculum with to field work with few sampled course units. COURSE UNIT USE OF KNOWLEDGE FROM CLASS TO FIELD WORK BIS 1104: Communication Skills for IT Used for effective speaking and listening, meetings and presentation sessions CSC 1100: Computer Literacy The skills learnt in computer literacy such as Microsoft Word and Excel were used to prepare professionally looking and standard documents at work, including this field attachment report BIS 1204: Data and Information management This enabled successful web development sessions due to the different languages learnt in class e.g. MYSQL, php check final project in appendix// BIS 1206: Systems Analysis and Design This was vital during system development CSC 2100: Data Structures and Algorithms This enabled easy developing of problem solving systems. Table 3.1: showing relevance of computer science curriculum to field attachment 3.5. Challenges faced and how managed
  • 35. 26  Inadequate and delay for supervision facilitation. University policies state that each site/student has to be visited at least three times by the academic supervisors (Makerere University Council, 2011, p. 8) but most students were visited only once, after 8 weeks in the field. This was generally a weakness on the side of the university. But at least the University ensured that internships are offering meaningful learning experiences for their students by providing evaluation sheets which provide feedback from employers to university.  Lack of field-specific knowledge / skills. This arouse from use of specific programming languages which were not taught at school. This was solved by a meeting held between interns and field supervisor in order to identify areas for improvement.  Limited time for the internship program is one of the challenges as it is only scheduled for eight weeks, which makes it not enough to learn experience most of all the activities undertook in a survey.  insufficient work assigned to us at the beginning of an internship. This was solved managing our work by doing our personal research and offering something useful for the organization. And Asking our seniors for guidance.  Assignment of activities that don’t correspond to the internship expectations this was solved by informing the internship field coordinator. 3.6. Benefits derived from field attachment The field attachment was of great importance, some of the benefits include  Internship helped me understand work ethics, employment demands, responsibilities and opportunities.  Field attachment provided career direction and confidence in my abilities by narrowing down the list of potential careers.  My internship gave me the opportunity to try out computer related activities i.e. dismantling a computer which I had not previously considered and broadened my horizons through converting my academic knowledge into industry skills.  It prepared me for the working environment.  It enhanced my CV needed to negotiate future jobs.
  • 36. 27 3.7. Adequacy in university’s preparing the student for field attachment In my view students having a limited range of skills in areas like communication and team work, with educational experiences that can’t teach them how to solve problems with people whose views are different than their own. With less intercultural skills and an understanding of societies all this showed inadequacy of preparation given to students for field attachment 3.8. Preparedness of the agency to receive and manage students for field attachment The agency shared some insight on the bigger picture and how their projects fit in internship goals can bridge this knowledge gap. With the ability of College students having a lot to offer and will approach things differently and the need to create a job description that is appealing, experience, so it’s important to evaluate your needs and for both parties. This can be instrumental in targeting younger clients and the clear setting of project goals and regular benchmarks to see how we interns are performing clears shows agency was prepared. occasionally, resourceful persons and experts in field always answered queries and also gave tips and shared experiences with the students. This greatly inspired the interns 3.9. Career Motivation For the different values in regards to work and need for different things in the job market today that include satisfaction and fulfillment. from the career motivation attained. This makes me plan a more fulfilling and productive career and create an environment I can thrive in motivation's role in influencing workplace behavior and performance at school. 4.0. CONCLUSIONS AND RECOMMENDATIONS 4.1. Conclusions The internship period revealed that curriculum in our university lacks sufficient input from employers of labour, and the teaching-learning resources were grossly inadequate (computers, servers, routers, switches) academic staff were competent but inadequate in number in some departments.
  • 37. 28 On the basis of these notices, I conclude saying that result from inadequacies in critical factors influences the quality of programme offering and there are lapses in the preparation of undergraduates for field attachment. 4.2. RECOMMENDATIONS On the basis of the findings and conclusion drawn in this field attachment I recommended that: 4.2.1. Recommendations to the University  The university should urgently restructure the curricula offerings to meet the requirements of the labour market.  This course CSC 2303: Field Attachment, should be shifted to the third year of study, such that it is given more time, at least six months. Many students have concluded that two months internships are too small.  Students teaching-learning resources should be improved, especially the tools for practicals, lecture room capacity, laboratories and workshops.  ICT should be introduced into both teaching and learning activities of every university, so that both staff and students can possess the much needed ICT knowledge and skills.  The University should keep good records of its graduates for feedback purposes; while academic departments should liaise with employers for information on their employed ex- students 4.2.2. Recommendation to the field attachment organization In future, the field organization (UBC) should provide students with large range of computing related aspects and a simple review of technologies used at the organization 4.2.3. Recommendation to future interns As students, good supervisory relationships are pivotal to successful completion of our degrees because supervisors provide expert guidance in your research, and our fields of study thus need for good supervisory relationships with our supervisors.
  • 38. 29 References Uganda Broadcasting corporation (n.d.). Retrieved July 31, 2016, from http://ubc.ug/index.php/partners/ Internetworking Basics. (n.d.). Retrieved June 08, 2016, from http://www.cisco.com/cpress/cc/td/cpress/fund/ith/ith01gb.htm Network topologies. (n.d.). Retrieved June 12, 2016, from http://whatis.techtarget.com/definition/network-topology Cable termination. (n.d.). Retrieved June 10, 2016, from http://www.incentre.net/tech- support/other-support/ethernet-cable-color-coding-diagram/ MySQL. (2014, September). MySQL Tutorial. Retrieved June 23, 2016, from ` https://www.ntu.edu.sg/home/ehchua/programming/sql/MySQL_Beginner.html. B. (2006, June 27). Types of RAM. Types of RAM: How to Identify and Their Specifications. Retrieved June 15, 2016, from https://www.technibble.com/types-of-ram-how-to-identify- and-their-specifications/. Microsoft. (2014, April 08). How to install or upgrade to Windows. Retrieved June 20, 2016. from https://support.microsoft.com/en-us/kb/978307. (n.d.). Windows 8 Product Activation. Retrieved June 21, 2016, from http://support.hp.com/us- en/document/c03486254 Makerere University Council. (2011). Guidelines for Field Attachment. Retrieved June 5, 2016. from Makerere University Policies Website: http://policies.mak.ac.ug/sites/default/files/policies/GUIDELINES_FOR_FIELD_ATTACHMEN T.pdf NCHE. (2013, December). Curriculum for Bachelor of Computer Science (CSC) Degree Program. Retrieved August 13, 2016, from https://courses.mak.ac.ug/programmes/bachelor- science-computer-science
  • 39. 30 Appendices “Appendix A”: UBC internship offer letter
  • 40. 31 “Appendix B” Enter password: Welcome to the MySQL monitor. Commands end with; or g. Your MySQL connection id is 23 Server version: 5.6.17 MySQL Community Server (GPL) Copyright (c) 2000, 2014, Oracle and/or its affiliates. All rights reserved. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners. Type 'help;' or 'h' for help. Type 'c' to clear the current input statement. mysql> CREATE DATABASE student; Query OK, 1 row affected (0.33 sec) mysql> DROP DATABASE student; Query OK, 0 rows affected (0.88 sec) mysql> CREATE DATABASE IF NOT EXISTS student; Query OK, 1 row affected (0.00 sec) mysql> SHOW DATABASES; +--------------------+ | Database | +--------------------+ | information_schema | | mysql | | patrick | | people | | performance_schema | | project | | student | | test | +--------------------+ 8 rows in set (0.58 sec) mysql> USE student; Database changed mysql> SELECT DATABASE(); +------------+ | DATABASE() | +------------+ | student | +------------+
  • 41. 32 1 row in set (0.00 sec) mysql> SHOW TABLES; Empty set (0.07 sec) mysql> CREATE TABLE IF NOT EXISTS products (productID INT UNSIGNED NOT NULL AUTO_INCREMENT, productCode CHAR(3) NOT NULL DEFAULT '', name VARCHAR(30) NOT NULL DEFAULT '',quantity INT UNSIGNED NOT NULL DEFAULT 0,price DECIMAL(7,2) NOT NULL DEFAULT 99999.99, PRIMARY KEY (productID)); Query OK, 0 rows affected (0.97 sec) mysql> SHOW TABLES; +-------------------+ | Tables_in_student | +-------------------+ | products | +-------------------+ 1 row in set (0.00 sec) mysql> DESCRIBE products; +-------------+------------------+------+-----+----------+---------------- + | Field | Type | Null | Key | Default | Extra | +-------------+------------------+------+-----+----------+---------------- + | productID | int(10) unsigned | NO | PRI | NULL | auto_increment | | productCode | char(3) | NO | | | | | name | varchar(30) | NO | | | | | quantity | int(10) unsigned | NO | | 0 | | | price | decimal(7,2) | NO | | 99999.99 | | +-------------+------------------+------+-----+----------+---------------- + 5 rows in set (0.20 sec) mysql> SHOW CREATE TABLE products G *************************** 1. row *************************** Table: products Create Table: CREATE TABLE ‘products’ ( `productID’ int(10) unsigned NOT NULL AUTO_INCREMENT, `productCode’ char(3) NOT NULL DEFAULT '', `name’ varchar(30) NOT NULL DEFAULT '', `quantity’ int(10) unsigned NOT NULL DEFAULT '0', `price’ decimal(7,2) NOT NULL DEFAULT '99999.99', PRIMARY KEY (`productID’)) Query OK, 1 row in set (0.00 sec) mysql> INSERT INTO products VALUES (1001, 'PEN', 'Pen Red', 5000, 1.23);
  • 42. 33 Query OK, 1 row affected (0.12 sec) mysql> INSERT INTO products VALUES (NULL, 'PEN', 'Pen Blue',8000,1.25 ),(NULL, 'PEN', 'Pen Black', 2000, 1.25); Query OK, 2 rows affected (0.13 sec) mysql> INSERT INTO products (productCode, name, quantity, price) VALUES ('PEC', 'Pencil 2B', 10000, 0.48),('PEC', 'Pencil 2H', 8000, 0.49); Query OK, 2 rows affected (0.11 sec) mysql> INSERT INTO products (productCode,name) VALUES ('PEC','Pencil HB'); Query OK, 1 row affected (0.10 sec) mysql> SELECT * FROM products; +-----------+-------------+-----------+----------+----------+ | productID | productCode | name | quantity | price | +-----------+-------------+-----------+----------+----------+ | 1001 | PEN | Pen Red | 5000 | 1.23 | | 1002 | PEN | Pen Blue | 8000 | 1.25 | | 1003 | PEN | Pen Black | 2000 | 1.25 | | 1004 | PEC | Pencil 2B | 10000 | 0.48 | | 1005 | PEC | Pencil 2H | 8000 | 0.49 | | 1006 | PEC | Pencil HB | 0 | 99999.99 | +-----------+-------------+-----------+----------+----------+ 6 rows in set (0.07 sec) mysql> DELETE FROM products WHERE productID = 1006; Query OK, 1 row affected (0.18 sec) mysql> SELECT name, price FROM products; +-----------+-------+ | name | price | +-----------+-------+ | Pen Red | 1.23 | | Pen Blue | 1.25 | | Pen Black | 1.25 | | Pencil 2B | 0.48 | | Pencil 2H | 0.49 | +-----------+-------+ 5 rows in set (0.00 sec) mysql> SELECT * FROM products; +-----------+-------------+-----------+----------+-------+ | productID | productCode | name | quantity | price | +-----------+-------------+-----------+----------+-------+ | 1001 | PEN | Pen Red | 5000 | 1.23 | | 1002 | PEN | Pen Blue | 8000 | 1.25 | | 1003 | PEN | Pen Black | 2000 | 1.25 | | 1004 | PEC | Pencil 2B | 10000 | 0.48 | | 1005 | PEC | Pencil 2H | 8000 | 0.49 | +-----------+-------------+-----------+----------+-------+ 5 rows in set (0.00 sec)
  • 43. 34 mysql> SELECT name, price FROM products WHERE price < 1.0; +-----------+-------+ | name | price | +-----------+-------+ | Pencil 2B | 0.48 | | Pencil 2H | 0.49 | +-----------+-------+ 2 rows in set (0.07 sec) mysql> SELECT name, price FROM products WHERE name LIKE 'PENCIL%'; +-----------+-------+ | name | price | +-----------+-------+ | Pencil 2B | 0.48 | | Pencil 2H | 0.49 | +-----------+-------+ 2 rows in set (0.04 sec) mysql> SELECT * FROM products WHERE quantity >= 5000 AND name LIKE 'Pen %'; +-----------+-------------+----------+----------+-------+ | productID | productCode | name | quantity | price | +-----------+-------------+----------+----------+-------+ | 1001 | PEN | Pen Red | 5000 | 1.23 | | 1002 | PEN | Pen Blue | 8000 | 1.25 | +-----------+-------------+----------+----------+-------+ 2 rows in set (0.00 sec) mysql> SELECT * FROM products WHERE quantity >= 5000 AND price < 1.24 AND name L IKE 'Pen %'; +-----------+-------------+---------+----------+-------+ | productID | productCode | name | quantity | price | +-----------+-------------+---------+----------+-------+ | 1001 | PEN | Pen Red | 5000 | 1.23 | +-----------+-------------+---------+----------+-------+ 1 row in set (0.00 sec) mysql> SELECT * FROM products WHERE (price BETWEEN 1.0 AND 2.0) AND (quantity BETWEEN 1000 AND 2000); +-----------+-------------+-----------+----------+-------+ | productID | productCode | name | quantity | price | +-----------+-------------+-----------+----------+-------+ | 1003 | PEN | Pen Black | 2000 | 1.25 | +-----------+-------------+-----------+----------+-------+ 1 row in set (0.01 sec) mysql> SELECT * FROM products WHERE name LIKE 'Pen %' ORDER BY price DESC; +-----------+-------------+-----------+----------+-------+ | productID | productCode | name | quantity | price | +-----------+-------------+-----------+----------+-------+ | 1002 | PEN | Pen Blue | 8000 | 1.25 | | 1003 | PEN | Pen Black | 2000 | 1.25 |
  • 44. 35 | 1001 | PEN | Pen Red | 5000 | 1.23 | +-----------+-------------+-----------+----------+-------+ 3 rows in set (0.17 sec) mysql> SELECT * FROM products ORDER BY price LIMIT 2; +-----------+-------------+-----------+----------+-------+ | productID | productCode | name | quantity | price | +-----------+-------------+-----------+----------+-------+ | 1004 | PEC | Pencil 2B | 10000 | 0.48 | | 1005 | PEC | Pencil 2H | 8000 | 0.49 | +-----------+-------------+-----------+----------+-------+ 2 rows in set (0.00 sec) mysql> SELECT CONCAT(productCode,'-',name) AS `Product Description’, price FROM products; +---------------------+-------+ | Product Description | price | +---------------------+-------+ | PEN - Pen Red | 1.23 | | PEN - Pen Blue | 1.25 | | PEN - Pen Black | 1.25 | | PEC - Pencil 2B | 0.48 | | PEC - Pencil 2H | 0.49 | +---------------------+-------+ 5 rows in set (0.04 sec) mysql> SELECT DISTINCT price AS `Distinct Price’ FROM products; +----------------+ | Distinct Price | +----------------+ | 1.23 | | 1.25 | | 0.48 | | 0.49 | +----------------+ 4 rows in set (0.10 sec) mysql> SELECT * FROM products GROUP BY productCode; +-----------+-------------+-----------+----------+-------+ | productID | productCode | name | quantity | price | +-----------+-------------+-----------+----------+-------+ | 1004 | PEC | Pencil 2B | 10000 | 0.48 | | 1001 | PEN | Pen Red | 5000 | 1.23 | +-----------+-------------+-----------+----------+-------+ 2 rows in set (0.01 sec) mysql> SELECT productCode, MAX(price) AS `Highest Price’, MIN(price) AS `LowestPrice` FROM products GROUP BY productCode; +-------------+---------------+--------------+ | productCode | Highest Price | Lowest Price | +-------------+---------------+--------------+ | PEC | 0.49 | 0.48 | | PEN | 1.25 | 1.23 |
  • 45. 36 +-------------+---------------+--------------+ 2 rows in set (0.07 sec) mysql> UPDATE products SET price = price * 1.1; Query OK, 5 rows affected, 5 warnings (0.24 sec) mysql> LOAD DATA LOCAL INFILE 'E:mysql/products_in.csv' INTO TABLE products COLUMNS TERMINATED BY ',' LINES TERMINATED BY 'rn'; ERROR 2 (HY000): File 'E:mysqlproducts_in.csv' not found (Errcode: 2 - No suchfile or directory) “Appendix c” Screenshots of the internship project done at UBC (website development using WordPress) Screenshot1:WordPressloginusingphp WiththeuseofwampserverinstalledanditbeingonlineIloginedintoWordPressversion4.4.2 Screenshot2:homepageofKivEventswebsitewithsliderfromrighttoleftplusotherpages
  • 48. 39 Screenshot6:thisshowstheemployeespageinthatwhenhooveredoveritpopsupsocialmediacontactsofthe differentemployees Screenshot7:theportfoliopageindicatesthedifferentprojectsaccomplishedbytheorganisation Screenshot 8: the blog page created with help of the contact form7 plugin that enables individuals to tweet to the website as indicated in the extreme right of the screen shot
  • 51. 42 “Appendix D” Windows installation Windows XP Steps Taken 1. Start a computer from the Windows XP CD or boot disks. 2. press any key to start the computer from the Windows XP CD then press ENTER to begin Windows XP Setup 3. Read the Microsoft Software License Terms, and then press F8. 4. Follow the instructions on the screen to select and format a partition where you want to install Windows XP till you complete Windows XP Setup. Windows 7 installation 1. Enter your computer's system BIOS by pressing Del, Esc, F2, F10, or F9 depending on your computer’s motherboard. 2. Find your BIOS's boot options menu
  • 52. 43 3. Select the CD-ROM drive as the first boot device of your computer. 4. Save the changes of the settings 5. Shut off your computer and Power on the PC and the insert the Windows 7 disc into your CD/DVD drive or flash disk 6. Start your computer from the disc., Choose your Windows Setup options, Click the Install Now button, Accept the License Terms, Select the Custom installation, decide on which hard drive and partition you want to install Windows on. Windows 8 installation 1. Insert the Windows 8 Installation Disc into the internal / external DVD. Turn on your computer During the boot up screen, press [F12] on your keyboard to enter Boot Menu and choose the DVD or BD reading device where you insert the installation disc. 2. Press any key on your keyboard when you see the message to reboot from the DVD or BD reading device then Click “Install now” to continue. 3. Insert activation key and Check “I accept the license terms” and click “next”. Note: for clean installation, please select “Custom” to continue. 4. For need to create a new partition with specific size, you should click “New”. Otherwise, click “Next”, When all partition process is done, choose your desired partition for Windows 8 installation, and click “Next”. 5. Final step is to Complete the Windows 8 Installation “Appendix E” Adding Roles in windows server 2008 R2: Go to Server Manager by using shortcuts on the Start menu, then in the Roles Summary Click Add Roles
  • 53. 44 assigning the IP addresses Log on to Windows Server 2008 R2 computer with Administrator account. Click Start and then click Run(NCPA.CPL) from the menu. On the opened window right-click on the NIC on which static IP address has to be assigned and click Properties. On Local Area Network Properties box make sure that Networking tab is selected and double- click Internet Protocol Version 4 (TCP/IPv4). General tab is selected and click to select Use the following IP address Populate the enabled IP address and Subnet mask fields and click OK button. That is to say IP address: 192.168.2.7, Subnet mask: 255.255.255.0, Default gateway: 192.168.2.1, Preferred DNS server: 196.43.133.5, Alternate DNSC server: 196.43.133.6 click OK to save the changes. creating users open up Server Manager open up the Roles section, next to Active Directory Users and Computers section and finally the Active Directory Users and Computers click on Users section where we are going to create a new User Account. To do so, right-click on the blank section, point to New and select User. In this window type in the user's first name, middle initial and last name. Next create a user's logon name. create a password for the new user and select appropriate options click on the Finish button to complete the creation of new User Account.