Sunteți pe pagina 1din 31

SUMMARY

The report is all about the fieldwork


practical training at Tanzania electric supply company
(TANESCO.) In manyara region, the eight weeks fieldwork
attachment was started from 27th July 2015 to 20th
September 2015, the aim of attachment was to get the link
between the theories learnt in the class programs and their
application in real work. The fieldwork involves the direct
participation of field staff in any activities in computer
technology.

The practical training program which took


eight weeks took place between July and September each
year and it compulsory to the students pursuing Bachelor of
Science in information technology. The practical training
constitutes the first and second year, whereby later the
student has to prepare report on what he or she has
observed, experienced and exposure to the organization in
which a student is attached for such training.

This report examines the current state of


computer technology and outlines operation of computer
parts and how to troubleshoot them. These are integrated
into business and industries to help in problem solving
capabilities that normally are the responsibilities of the
final IT department in TANESCO.
The report is consist of the four parts, the
first part deals with the department roles and
responsibilities of the IT department in general, and second
focus in lessons learned during the practical training period
that focused on computer maintenance and networking
configuration and the third part involves literature review,
analysis, last focus in conclusion and recommendation and
references.

ACKNOLEDGEMENT

First I express my sincere thanks to God


Almighty for granting me the whole period of my practical
training.

The accomplishment of this training is the


result of various ideas and help from various sources
therefore I express my sincere gratitude to all who assisted
me in one way or another especially my lovely family who
were very instrumental during my field attachment.

I wish to pay tribute to Tanesco manyara


management and all staff, Special thanks also go to the
Regional business application officer Mr. Albert Rwezaula
who guided me through various ways to accomplish my
field attachment and this report.

Also the thanks should go to Dr. Dossa


Massa Ifm field supervisor who guide and instruct during
report writing.
My sincere appreciation is extended to my
fellow students who supported me in one way or another
during my preparation of this report and through the whole
period of my training.

I cannot end this list without paying tribute


to the entire IFM, Faculty of computing, information
system and mathematics Lecturers for their constructive
training and the knowledge they have imparted in me
throughout the years training. May God bless you all.

ABBREVIATION

ATM Automated teller


machine

DNS Domain Name


System

DHCP Dynamic Host


Configuration Protocol
TANESCO Tanzania
Electric Supply Company

CD Compact disc

DVD Digital Versatile


Disc / Digital Video Disc

IT Information
technology

OS Operating
system

IFM Institute of
finance management

IPPs Independent
power producers

ZECO Zanzibar
Electricity Corporation

LAN Local Area


Network

TCP/IP Transmission
Control Protocol/Internet Protocol

RJ Registered
Jack

CMD Command
Prompt

WAN Wide Area


Network
MAN Metropolitan
Area Network

FDDI Fiber
Distributed Data Interface

STP Shielded
Twisted Pair

UTP Unshielded
Twisted Pair

TABLE CONTEBTS

TOC \o "1-3" \h \z \u HYPERLINK \l


"_Toc441617716" EXECUTIVE SUMMARY
PAGEREF _Toc441617716 \h i

HYPERLINK \l "_Toc441617717"
ACKNOLEDGEMENT PAGEREF _Toc441617717
\h ii

HYPERLINK \l "_Toc441617718"
ABBREVIATION PAGEREF _Toc441617718 \h iii

HYPERLINK \l "_Toc441617719"
TABLE CONTEBTS PAGEREF _Toc441617719 \h iv

HYPERLINK \l "_Toc441617720"
CHAPTER ONE PAGEREF _Toc441617720 \h 2

HYPERLINK \l "_Toc441617721" 1.0


Overview PAGEREF _Toc441617721 \h 2
HYPERLINK \l "_Toc441617722" 1.1
FIELD WORKS PLACEMENT PAGEREF
_Toc441617722 \h 2

HYPERLINK \l "_Toc441617723" 1.2


REVIEW OF TANZANIA ELECTRIC SUPPLY
COMPANY (TANESCO) PAGEREF _Toc441617723
\h 2

HYPERLINK \l "_Toc441617724" 1.3


ORGANIZATION STRUCTURE OF TANESCO
MANYARA REGIONAL OFFICE PAGEREF
_Toc441617724 \h 3

HYPERLINK \l "_Toc441617725"
CHAPTER TWO PAGEREF _Toc441617725 \h 5

HYPERLINK \l "_Toc441617726" 2.0


TASKS PERFORMED PAGEREF
_Toc441617726 \h 5

HYPERLINK \l "_Toc441617727" 2.1


Networking PAGEREF _Toc441617727 \h 5

HYPERLINK \l "_Toc441617728" 2.2


Computer maintenance General PAGEREF
_Toc441617728 \h 7

HYPERLINK \l "_Toc441617729"
CHAPTER THREE PAGEREF _Toc441617729 \h 10

HYPERLINK \l "_Toc441617730" 3.0


ANALYSIS OF THE TASKS UNDERTAKEN
PAGEREF _Toc441617730 \h 10
HYPERLINK \l "_Toc441617731" 3.1
Computer networking PAGEREF _Toc441617731
\h 10

HYPERLINK \l "_Toc441617732" 3.2


Static IP Addressing and Dynamic Host
Configuration Protocol (DHCP) PAGEREF
_Toc441617732 \h 15

HYPERLINK \l "_Toc441617733" 3.3


How the college knowledge relateS to work done
PAGEREF _Toc441617733 \h 16

HYPERLINK \l "_Toc441617734" 3.3.1


New knowledge and skill gained in my field
attachment PAGEREF _Toc441617734 \h 16

HYPERLINK \l "_Toc441617735"
CHAPTER FIVE PAGEREF _Toc441617735 \h 17

HYPERLINK \l "_Toc441617736" 5.0


RECOMMENDATION TO THE
ORGANIZATION ATTACHED PAGEREF
_Toc441617736 \h 17

HYPERLINK \l "_Toc441617737" 5.1


RECOMMENDATION TO IFM PAGEREF
_Toc441617737 \h 17

HYPERLINK \l "_Toc441617738" 5.2


CONCLUSION PAGEREF _Toc441617738
\h 17
CHAPTER ONE

INTRODUCTION

Overview

I have prepared this report basically for the


purpose of submitting it to the institute of finance
management (IFM) as part of practical training assessment.
Practical training program as it is a very useful tool to
enable the students to apply practically what she or he has
learnt theoretically at the different modules. This is
intended to focus on encouraging students to analyze some
of the causes and implications of many of the most pressing
problems confronting people at their work places. This
enhances and provides thoughts, discussions and debates
among students in their practical experiences.

FIELD WORKS PLACEMENT

The fieldwork placement was eight weeks


program which started from 21st July 2015 to 20th
September 2015 in Tanesco manyara. The fieldwork
program included the involvement of field staff in any IT
department activities under Regional business application
officer supervising for the sake of gaining experience.
However not all activates we involve due to organization
confidentiality and policy.

REVIEW OF TANZANIA ELECTRIC


SUPPLY COMPANY (TANESCO)
Tanzania Electric Supply Company Limited
(TANESCO) is a parastatal organization under the Ministry
of Energy and Minerals. The Company generates,
transmits, distributes and sells electricity to Tanzania
Mainland and sells bulk power to the Zanzibar Electricity
Corporation (ZECO) which in turn sells it to the public in
islands_ Unguja and Pemba

TANESCO’s Generation division is


responsible for all power generation functions and control
other sources of generation are from independent power
producers (IPPs) which feed the National grid and isolated
areas as well. It owns interconnection power grid made up
of generation system transmission and distribution system.
Transmission system comprises of forty three (43)
substations interconnected by transmission lines.
Transmission lines use pylons made of still. Almost all the
transmission lines are radial single circuit lines. The system
is all alternating current (AC) and the system frequency is
50 Hz.

Distribution and Customer Services

The marketing Business Unit stands at the


customer end of the electricity supply chain and is therefore
Tanesco’s major interface with customers. It deals with
distribution of electricity, promotion of services and all
customer service matters. The unit is headed by a General
Manager who is assisted by two senior managers; a senior
manager for marketing and customer service on the one
hand and a senior manager for distribution on the other.
Services of the Marketing Business Unit are delivered to
customers through a network of 24 Tanesco defined
regions. To ensure effective management of operations,
these regions are clustered into five zones each headed by a
Zonal Manager.

Vision

To be an efficient and commercially focused


utility supporting the development of Tanzania

Mission

To generate, transmit and supply electricity


in the most effective, competitive and sustainable manner
possible

ORGANIZATION STRUCTURE OF
TANESCO MANYARA REGIONAL OFFICE

Tanesco Manyara is one of 24 regional


offices across the Tanzania mainland, under management
of Martine Gellege Manager.

Manyara office has several department such


finance department, human resources department, IT and
system administrator department, service and emergency
department and substation main control.
IT and System Administrator

IT and system administrator is committed to


providing excellent training in computing and technology.
The department is responsible for planning, delivering and
implementing the IT policy authority also it is responsible
for the Local Area Network (LAN) control and other
communication links that link TANESCO headquarters and
other TANESCO offices all over the country. Also
provides computer and peripheral device maintenance .This
department is under Regional business application officer
Mr. Albert Rwezaula.

The following are the roles of IT department

Manage the organization's hardware,


software and communication

Maintain information security and


availability

Provide a source of guidance for technology


issues for staff and associated organizations

Supply the guidance and infrastructure to


deliver meaningful information

PC- Maintenance & Repair


CHAPTER TWO

WORKDONE AND LESSON LEARNT

TASKS PERFORMED

There are number of tasks undertaken in


Tanzania Electric Supply Company Limited (TANESCO)
which are mostly problem solving practical as well as the
daily office work. Those tasks gives experiences and
improvement in computer technology field.

Networking

What was being done in the field at large


extent is concerned with networking, sometimes upgrading
and repairing of computer systems, in networking the major
activities were preparation of network cables, network and
internet connection, resource sharing such as printer,
network management and troubleshooting, also responsible
to provide help and support to the other staffs (non-IT
specialists) in upgrading and repairing of computer network
systems.

Preparation of network cables

If the defective cable found it has to be


replaced so as to ensure that the system is operating
effectively. The main source of connection failure is the
presence of defective cables, cables may fail to work
properly due to the number of reasons either the insulation
has been cut off by the time when the exterior cover is
removed.

Network connection

Refers to the process of enabling a computer


system to access the network. The authorization of the user
of the computer system to access the network is done by
the system administrator by assigning unique IP address to
every host computer. There are two ways of assigning IP
address to the computer system that have to be connected to
the internet, the first one allows a user to obtain IP address
automatically and the second one needs the system
administrator to enter IP addresses. The DNS server
configuration and the alternate DNS server configuration.
there are two options for internet configuration either by
allowing the user computer to obtain DNS server address
automatically or by setting the DNS server address
manually by the system administrator ,this allows only the
authorized user to access the internet and others remain
using the TANESCO local area network
The lesson I learnt from the task is that for
any computer system to connect to the network must have a
particular combination of TCP/IP protocol settings, also
there are two ways of connecting the computer to the
internet either by using fixed IP address or allowing to
obtain IP address automatically.

Sharing of resources through the network

Sharing of resources means to enable little


number of resources that you have to be used by a large
number of users, things like files, printers, scanners can be
shared through the network. One of the resources that was
configured to be shared is the printer.

Network printer configuration

The first thing is to make sure that you have


installed drivers for a particular printer. Set up a printer for
sharing means to make it available to the computers
connected to the network. Then choose the “share this
printer option and give the printer a share name. This name
will be used to locate and identify the printer on the
network, so it should be not more than 8 letters and no
spaces or characters.

The lesson I learnt from this task is that, for


any resource to be shared through the network, the devices
need to share the resource must belong to the same
WORKGROUP.

A WORKGROUP is the collection of


individuals who share the same files or other resources over
the LAN.
Network requirement tools used

Router , Link [CAT network cable],


Connectors [RJ], Mail server ,Website server

Computers [personal computer] ,DNS server


,DHCP server

Switches [D-link switches ] 3-com


switches

Computer maintenance General

Blowing

Blowing is the process of removing dust by


using blowers. Computer cleaning involves physically
cleaning the interior and exterior of a computer, including
the removal of dust and debris from cooling fans, power
supplies, and other hardware components. Dust may
accumulate as a result of air cooling. Any filters used to
mitigate this need regular service and changes. If the
cooling system is not filtered then regular computer
cleaning may prevent short circuits and overheating.

Disk Defragmentation

Defragmentation is a process that reduces


the amount of fragmentation. It does this by physically
organizing the contents of the mass storage device used to
store files into the smallest number of contiguous regions
(fragments). It also attempts to create larger regions of free
space using compaction to impede the return of
fragmentation.

Disk Cleanup
Disk Cleanup helps to reduce the number of
unnecessary files on computer drives, which can help PC to
run faster. It can delete temporary files and system files,
empty the Recycle Bin, and remove a variety of other items
that you might no longer need. Delete cookies/temp file
Delete of temp file and cookies, run the %temp%.

Data recovery from shortcut virus

I have learned how to recovery the data


attacked by shortcut virus, procedure’s is by running CMD,
(command prompt) then fix with attrib -h -r -s /s /d g:\*.*
code. Where h: to unhide all files on drive.-r: create the
files in drive is free of read-only attribute.-s: making all
files on drive to be not part of the system again.

Installation of Antivirus software

Anti-virus software is a program installed


for the purpose of detecting viruses and preventing them
from destroying the system or from performing any
undesirable act.

Updating definition files

Every week you need to update the list of


known viruses called the virus definition files, you can do
this manually or automatically through the manufactures
website.

Scanning for viruses


Anti-virus scan is the process in which
antivirus program used to examines the computer suspected
of having a virus and eradicate any viruses if found.

The lesson I learnt from this task is the


installation and update of the viruses’ software so that
viruses developed everyday by different organizations and
individuals for commercial purpose so the regular update of
antivirus will help to identify the new viruses.

Window installation

A Microsoft window is a progression of


interface operating systems developed, marketed, and sold
by Microsoft. This is a person computer operating system
from Microsoft that together with some commonly used
commerce applications such as Microsoft office, has
become a defector for individual users in most corporations
as well as in most homes. There are several versions of
windows such as windows XP, window vista, windows 7,
windows 8 and window 10.

Windows System Requirements

Before installation, you must make sure that


your hardware meets or exceeds the minimum requirements
for the version of Windows you will install.

Hardware Compatibility

We check all hardware to ensure that it is


compatible with the version of windows to install

Repair of Operating system


I did this for those computers which were
not necessary to format them. In the process of repairing an
operating system I inserted a bootable CD containing
operating system to the particular computer and allow
computer to boot from a CD-ROM and in the options we
selected repair window during installation procedure to
repair folders of the operating system which caused
problems.

Driver installation and Update

This is sometimes appears after installation


of windows you now need to check the device manager to
confirm that all the drivers has been loaded or if there are
any conflicts. From the start menu select Start -> Settings -
> Control Panel. Click on the System icon and then from
the System Properties window select the Hardware tab,
then click on Device Manager. If there are any yellow
exclamation mark "!" next to any of the listed device, it
means that no drivers or incorrect drivers has been loaded
for that device. Your hardware should come with
manufacturer supplied drivers. You need to install these
drivers using the automatic setup program provided by the
manufacturer or you need to manually install these drivers.
If you do not have the drivers, check the manufacturer’s
website to download them.
CHAPTER THREE

ANALYSIS

ANALYSIS OF THE TASKS


UNDERTAKEN

What was being done in the field at large


extent is concerned with networking, in networking the
major activities were preparation of network cables,
network and internet connection.

Computer networking

Networking a computer network consists of


a collection of computers, printers and other equipment that
is connected together so that they can communicate with
each other.
There are two types of network
configuration, peer-to-peer networks and client/server
networks.

Peer-to-peer

Peer-to-peer networks are more commonly


implemented where less than ten computers are involved
and where strict security is not necessary. All computers
have the same status, hence the term 'peer', and they
communicate with each other on an equal footing. Files,
such as word processing or spreadsheet documents, can be
shared across the network and all the computers on the
network can share devices, such as printers or scanners,
which are connected to any one computer.

Client/server

Client/server networks are more suitable for


larger networks. A central computer, or 'server', acts as the
storage location for files and applications shared on the
network. Usually the server is a higher than average
performance computer. The server also controls the
network access of the other computers which are referred to
as the 'client' computers. Typically, teachers and students in
a school will use the client computers for their work and
only the network administrator (usually a designated staff
member) will have access rights to the server.

Types of computer networks

Generally, networks are distinguished based


on their geographical span. A network can be as small as
distance between your mobile phone and its Bluetooth
headphone and as large as the internet itself, covering the
whole geographical world.

Local Area Network (LAN)

Local Area Network A computer network


spanned inside a building and operated under single
administrative system is generally termed as Local Area
Network (LAN). Usually, LAN covers an organization
offices, schools, colleges or universities LAN provides a
useful way of sharing the resources between end users. The
resources such as printers, file servers, scanners, and
internet are easily sharable among computers. LAN uses
either Ethernet or Token-ring technology. Ethernet is most
widely employed LAN technology and uses Star topology,
while Token-ring is rarely seen. LAN can be wired,
wireless, or in both forms at once

Metropolitan Area Network (MAN)

The Metropolitan Area Network generally


expands throughout a city such as cable TV network. It can
be in the form of Ethernet, Token-ring, ATM, or Fiber
Distributed Data Interface (FDDI). Metro Ethernet is a
service which is provided by ISPs. This service enables its
users to expand their Local Area Networks. For example,
MAN can help an organization to connect all of its offices
in a city. Backbone of MAN is high-capacity and high-
speed fiber optics. MAN works in between Local Area
Network and Wide Area Network. MAN provides uplink
for LANs to WANs or internet.

Wide Area Network (WAN)


As the name suggests, the Wide Area
Network covers a wide area which may span across
provinces and even a whole country. Generally,
telecommunication networks are Wide Area Network.
These networks provide connectivity to MANs and LANs.
Since they are equipped with very high speed backbone,
WANs use very expensive network equipment.

Computer network topologies

A Network Topology is the arrangement


with which computer systems or network devices are
connected to each other. Topologies may define both
physical and logical aspect of the network. Both logical and
physical topologies could be same or different in a same
network.

Bus Topology

Bus topology, all devices share single


communication line or cable. Bus topology may have
problem while multiple hosts sending data at the same time.
Therefore, Bus topology either uses CSMA/CD technology
or recognizes one host as Bus Master to solve the issue. It
is one of the simple forms of networking where a failure of
a device does not affect the other devices. But failure of the
shared communication line can make all other devices stop
functioning. Both ends of the shared channel have line
terminator. The data is sent in only one direction and as
soon as it reaches the extreme end, the terminator removes
the data from the line

Star Topology

All hosts in Star topology are connected to a


central device, known as hub device, using a point to-point
connection. As in Bus topology, hub acts as single point of
failure. If hub fails, connectivity of all hosts to all other
hosts fails. Every communication between hosts takes place
through only the hub. Star topology is not expensive as to
connect one more host, only one cable is required and
configuration is simple.

Ring Topology

In ring topology, each host machine


connects to exactly two other machines, creating a circular
network structure. When one host tries to communicate or
send message to a host which is not adjacent to it, the data
travels through all intermediate hosts. To connect one more
host in the existing structure, the administrator may need
only one more extra cable. Failure of any host results in
failure of the whole ring. Thus, every connection in the ring
is a point of failure. There are methods which employ one
more backup ring.

Mesh Topology

In this type of topology, a host is connected


to one or multiple hosts. This topology has hosts in point-
to-point connection with every other host or may also have
hosts which are in point-to-point connection with few hosts
only. Hosts in Mesh topology also work as relay for other
hosts which do not have direct point-to-point links. Mesh
technology comes into two types:

Full Mesh: All hosts have a point-to-point


connection to every other host in the network. Thus for
every new host n(n-1)/2 connections are required. It
provides the most reliable network structure among all
network topologies.

Partially Mesh: Not all hosts have point-to-


point connection to every other host. Hosts connect to each
other in some arbitrarily fashion. This topology exists
where we need to provide reliability to some hosts out of
all.

Transmission media

The transmission media is nothing but the


physical media over which communication takes place in
computer networks.

Twisted Pair Cable

A twisted pair cable is made of two plastic


insulated copper wires twisted together to form a single
media. Out of these two wires, only one carries actual
signal and another is used for ground reference. The twists
between wires are helpful in reducing noise (electro-
magnetic interference) and crosstalk.

There are two types of twisted pair cables:


Shielded Twisted Pair (STP) Cable

STP cables comes with twisted wire pair


covered in metal foil. This makes it more indifferent to
noise and crosstalk.

Unshielded Twisted Pair (UTP) Cable

UTP has seven categories, each suitable for


specific use. In computer networks, Cat5, Cat-5e, and Cat-6
cables are mostly used. UTP cables are connected by RJ45
connectors.

Coaxial Cable

Coaxial cable has two wires of copper. The


core wire lies in the center and it is made of solid
conductor. The core is enclosed in an insulating sheath. The
second wire is wrapped around over the sheath and that too
in turn encased by insulator sheath. This all is covered by
plastic cover. Because of its structure, the coax cable is
capable of carrying high frequency signals than that of
twisted pair cable. The wrapped structure provides it a good
shield against noise and cross talk. Coaxial cables provide
high bandwidth rates of up to 450 mbps.

There are three categories of coax cables


namely,

RG-59 (Cable TV),

RG-58 (Thin Ethernet), and RG-11 (Thick


Ethernet).

RG stands for Radio Government.


Cables are connected using BNC connector
and BNC-T. BNC terminator is used to terminate the wire
at the far ends.

Fiber Optics Fiber Optic

Fiber Optics Fiber Optic works on the


properties of light. When light ray hits at critical angle, it
tends to refracts at 90 degree. This property has been used
in fiber optic. The core of fiber optic cable is made of high
quality glass or plastic. From one end of it light is emitted,
it travels through it and at the other end light detector
detects light stream and converts it to electric data. Fiber
Optic provides the highest mode of speed. It comes in two
modes, one is single mode fiber and second is multimode
fiber. Single mode fiber can carry a single ray of light
whereas multimode is capable of carrying multiple beams
of light.

Fiber Optic also comes in unidirectional and


bidirectional capabilities. To connect and access fiber optic
special type of connectors are used. These can be
Subscriber Channel (SC), Straight Tip (ST), or MT-RJ.

Static IP Addressing and Dynamic Host


Configuration Protocol (DHCP)

Static IP Addressing.

Static IP addressing, addresses are assigned


manually, and have to be provisioned carefully so that each
device has its own address with no overlap. When you
connect a new device, you would have to select the
"manual" configuration option and enter in the IP address,
the subnet mask, the default gateway and the DNS
server(s). If you understood any of what I just said, you
probably have the skills and knowledge necessary to
manage static IP addresses on a home network.

Dynamic Host Configuration Protocol


(DHCP)

DHCP takes all of the manual work out of


IP addressing. Generally, the device that's at the "top" of
your home network whether it's a standalone firewall or a
router/gateway device it provide DHCP by default as a
service on the network. When DHCP is enabled, a new
device connected to the network asks the DHCP server for
an address, and the server assigns one from its pool of
unused locations. The server itself tracks which addresses
are used and which addresses are available, and keeps a
record of which addresses have been assigned to the
various devices. This ensures that addresses don't conflict
with each other. However, it also means that, if a device
goes offline, when it reconnects it may not have the same
IP address it had before.

Mixing Configurations

It's entirely possible to mix static IP and


DHCP addressing schemes. Since the default DHCP
address range is between 100 and 149, you'll want to avoid
all of the addresses between 192.168.1.100 and
192.168.1.149 when you're assigning static IP addresses.
That leaves the ranges from 2-99 and from 150-254 wide
open, which is usually plenty for most home networks.

How the college knowledge relateS to work


done

During classes at IFM we were taught a lot


of things. During the fieldwork, I was able to put some of
the theories into practice, while also learning new ones
which will be useful in my future career.

All of activities done at my field work were


70% depended on knowledge gained at IFM and also the
knowledge I gained during my Ordinary Diploma at IFM,
such computer maintenance, networking all this focus into
my past level of study during diploma at IFM and other
knowledge was my own effort during my college studies,

New knowledge and skill gained in my field


attachment

The things I leant during my fieldwork was


working hard and managing the time depending on
organization needs, interact with different people within
the organization and outside it give me a lot of experience
and confidence to pursue more in technology field.

I have been doing a lot of duties both within


and outside my department. Some of these things were very
enjoyable and I was very comfortable doing them. The
things which I enjoyed most doing networking and
computer maintenance, because it relate to my previous
knowledge I experience during my diploma study at IFM.

CHAPTER FIVE

CONCLUSION AND
RECOMMENDATION

RECOMMENDATION TO THE
ORGANIZATION ATTACHED

All my appreciation to TANESCO, it was


very good to do my training around there, I would like to
recommend that the team work is very important aspect
also they should work hard to meet their objective.

The organization should establish policies to


ensure the regular assessment of the system performance;
this will help to identify major critical areas that cause
frequent system failures.

The organization should encourage regular


training to its staffs so as to make sure they are well
knowledgeable and experienced enough for proper control
and management of the system.

RECOMMENDATION TO IFM

During my practical training in the whole


course that I have been taking, I noticed some aspects that I
would like to suggest , first about handling the gap in the
placement process and also second on narrowing the gap
between teaching theories and practical’s. All these
recommendations aims on how to improve the practical
training and how to enhance the students to acquire the
knowledge that they intend to get during the practical
training and also the skills that they get through training

The institution should increase more


practical tools and trainees who have qualified on the use of
the computer technology.

CONCLUSION

I can conclude by saying that I enjoyed


during the training since I got new knowledge, skills about
computer technology as well as on how to interact with
people at the organization of different behaviors and
altitude.

REFERENCES:

Book references

Logbook

HYPERLINK
"https://www.goodreads.com/book/show/505560.The_Prot
ocols" The Protocols TCP/IP Illustrated, Volume 1
) HYPERLINK
"https://www.goodreads.com/author/show/44500.W_Richa
rd_Stevens" W. Richard Stevens

Online references

HYPERLINK
"http://www.pccomputerrepairs.co.uk/"
http://www.pccomputerrepairs.co.uk/

HYPERLINK "http://www.cpointcc.com/"
http://www.cpointcc.com/

S-ar putea să vă placă și