Chapter One 1.1 Brief History of Siwes
Chapter One 1.1 Brief History of Siwes
1.0 INTRODUCTION
Participation of SIWES has become a necessary pre-condition for the ward of Diploma and
Degree Certificate in specific disciplines in most institutions of higher learning in the country, in
accordance with the education policy of government. This consequently serves as a good training
and preparation of their future career.
1. SIWES will provide students the opportunity to test their interest in a particular career
before permanent commitments are made.
2. SIWES students will develop skills in the application of theory to practical work
situations.
1
3. SIWES students will develop employment records/references that will enhance
employment opportunities.
4. SIWES students will develop skills and techniques directly applicable to their careers.
6. SIWES will provide students the opportunity to develop attitudes conducive to effective
interpersonal relationships.
8. SIWES students will be prepared to enter into full-time employment in their area of
9. SIWES will provide students the opportunity to test their aptitude for a particular career
10. SIWES will provide students the opportunity to understand formal organizational
interrelationships.
13. SIWES Students will be able to provide tools to use in prioritizing tasks of an assigned
project and create with staff a tentative schedule for completion based on these tasks
14. SIWES Students will be able to develop a draft agency or project budget and will be able
15. SIWES Students will be able to outline at least five specific goals with several staff \
members by comparing performance with job duties and develop a draft plan with staff to
accomplish performance needs, supervision plan and rewards.
The 6 months Students Industrial Work Experience Scheme (SIWES) which is a requirement for
the completion of my course of study (Computer Science), was undertaken at Legacy Computer Institute
where I was an Industrial Attaché (IT) at the Networking Department.
2
The Industrial Training was based on working with Personal Computers, laptops, switches,
routers, hubs and computer peripherals. The installation, repair and maintenance and
configurations were all part of my lectures.
Student Industrial Work Scheme (SIWES) is organized by the Industrial Training Fund (ITF) to
Universities, Polytechnics and Colleges of Education specifically for those who offers science
and technical courses that needs much practical exercise.
3
CHAPTER TWO
2.0 ORGANIZATION HISTORY
The Institute was established under Katsina State of Nigeria Law No. 8 of 2013 as an Innovation
Enterprise Institution (IEI) intended to develop home grown technologies and skills in industry
and government.
Envisioned as a forward looking and business friendly technical institute that combines best
practices in school systems in Nigeria and around the world, the Institute was developed as a
technologically advanced Institute of Technology with economic relevance to the practical world
as its first priority and purpose. The initial two schools in technology and business, as well as the
interdisciplinary center of excellence, laboratories and professional training programme would
provide a complete academic and professional education pathway fora wide cross-section of
Nigerian society.
The mission of the Institute is to advance know-how and educate students in science, technology
and engineering as the basis of a holistic education that will best serve our home state, Katsina,
and the nation.
Huawei ICT Academy is a partnership between Katsina State Institute of Technology and
Management (KSITM) which is aimed towards cultivating ICT talents among the students to
prepare them to be future-ready for ICT developments. Through this partnership, this academy
will deliver industry-standard training that offer hands-on experience to develop practical skills
necessary for employment and cultivate a future workforce to fill the global ICT skills gap.
4
(KSITM) is the first and only institution in the state to become a part of the ICT Academy that
has a global presence in 72 countries.
At the initial stage, Huawei ICT Academy will be offering training on routing and switching
(R&S) leading to the certification for the Huawei Certified ICT Associate (HCIA-R&S). To
support this training, the academy will be equipped with IP network equipment and products
donated by Huawei. In addition, the training participants will also be utilizing Huawei’s eNSP
(Enterprise Network Simulation Platform) networking simulator, an essential learning tool that
will help enhance their professional skills and also the opportunity to experience Huawei’s
enterprise network equipment.
The Institute is committed to the growth of our community and beyond by incubating ideas to
productive ends, generating and disseminating research findings to advance technical and
business development, and, training and producing skilled manpower in ICT and Business
studies.
They are a specialized, state-of-the-art school that is dedicated to providing our students with a
complete education that prepares them with the levels of competency, passion, and creativity to
contribute effectively to the betterment of society. To achieve this, they aspire to be a first-class
education provider, globally linked and acclaimed for innovative teaching practices and research
in business studies, information and communication technology and other spheres of higher
learning.
The Institute will also offer a wide range of professional and career enhancement programmes,
seminars and workshops at advanced certificate and diploma levels. Their programmes are dual-
path, with emphasis on both cognitive and practical skills. Enriched by world-class faculty and
teaching facility, our goal is to nurture the development of the much-needed manpower in the
ICT and business sectors for national growth. Courses offered in the Institution includes
School of Technology:
School of Management:
1. Banking Operation
1. CISCO CERTIFICATION
2. HUAWEI CERTIFICATION
6
2.2 ORGANIZATIONAL CHART
The Institute management team comprises educational and academic professionals who bring
with them many years of experience and a continuing passion to deliver quality education at all
levels of society as shown in Fig 1.1
CENTER OF GENERAL
IT SUPPORT UNIT REGISTRAR BURSAR EXCELLENCE STUDENT UNIT
LIBERIAN
7
CHAPTER THREE
KNOWLEDGE ACQUIRED
2.0 INTRODUCTION
Most of the departments in Katsina State Institute of technology and management (KSITM) rely
on information and this information can be passed on faster and efficiently through the use of
computer system and other computer accessories like internet, intranet e.t.c. Thus there is need to
have a department within the organization that will see to the procurement, distribution,
installation, and overall maintenance of these computer systems and their related accessories.
This is where the IT Support department of KSITM comes into play. Also the networking and
system analystSection of the IT support unit serve as help desk for all network related issue and
system designs, such as troubleshooting connectivity, generating username and password for
within the institution,changing cables when necessary and other issues related to networking and
also there is the the programming section of the unit whose assignment is to manage the
institutions website, create new web sites, upload data and manage the database of the institution.
Huawei ICT Academy is a partnership between Katsina State Institute of Technology and
Management (KSITM) which is aimed towards cultivating ICT talents among the students to
prepare them to be future-ready for ICT developments. Through this partnership, this academy
will deliver industry-standard training that offer hands-on experience to develop practical skills
necessary for employment and cultivate a future workforce to fill the global ICT skills gap.
(KSITM) is the first and only institution in the state to become a part of the ICT Academy that
has a global presence in 72 countries.
At the initial stage, Huawei ICT Academy will be offering training on routing and switching
(R&S) leading to the certification for the Huawei Certified ICT Associate (HCIA-R&S). To
support this training, the academy will be equipped with IP network equipment and products
8
donated by Huawei. In addition, the training participants will also be utilizing Huawei’s eNSP
(Enterprise Network Simulation Platform) networking simulator, an essential learning tool that
will help enhance their professional skills and also the opportunity to experience Huawei’s
enterprise network equipment.
3.1.1NETWORK MEDIA
Computer networking devices are units that mediate data in a computer network and are also
called network equipment. Units which are the last receiver or generate data are called hosts or
data terminal equipment.
Fig. 3.1 A Network (Ethernet) cable with an RJ-45 connector terminated at the end.
The Ethernet cable is a network cable consisting of four twisted pair of wires, each with it
different colour. These wires are arranged and terminated according to the type of connection
needed.
First, we have the straight through cable, for connecting devices that are not similar (e.g.
computer to hub/switch, switch to hub etc).
Secondly, we have the crossover cable. This is use for connecting similar devices (e.g. computer
to computer, router to router, switch to switch etc)
And thirdly is the console cable. This is use for router configuration, always light blue in color
and can’t be customized.
9
The colors of the twisted wires are green, green-white, orange, orange-white, blue, blue-white,
brown and brown-white.
All these wires are arranged in line and inserted into the RJ-45 connector which is then held in
place (crimped) by a crimping tool.
3.1.1.2 A Hub
A hub is a layer 1 device that is used in physical topology. It acts as a central connection point
for computers on a network. It is mostly used for small network connection due to it limited
number of ports.
3.1.1.3A Router
A router is a special type of computer. It has the same basic components as a standard desktop PC.
However, routers are designed to perform some very specific functions. Just as computers need operating
systems to run software applications, routers need the Internetwork Operating System software (IOS) to
10
run configuration files. These configuration files contain the instructions and parameters that control the
flow of traffic in and out of the routers.
They both have ports for RJ-45 connectors which computers use to connect to the network.
11
3.1.1.4 A Switch
A switch, such as the one shown in the figure below, is a layer 2 device. It performs all of the same basic
tasks as a hub and mostly has more ports than the hub, but the switch uses a set of internal logic circuits to
establish a dedicated, logical path between the two PCs. This provides for more efficient data transfer
without collision which occurs in the hub.
12
3.1.2Computer Networks
Networks are systems that are formed by links. For example, roads that connect groups of people
together create a physical network. Connections with your friends create your personal network.
Websites that allow individuals to link to each other’s pages are called social networking sites.
A computer network can be define as a group of computer systems and other computing
hardware devices that are linked together through communication channels to facilitate
communication and resource-sharing among a wide range of users. A computer network can also
be seen as a set of computers connected together for the purpose of sharing resources. Computers
on a network are called nodes. The connection between computers can be done via cabling, most
commonly the Ethernet cable, or wirelessly through radio waves.
3.1.2.1TYPES OF A NETWORK
13
Based on the above characteristics the following types are known:
i. Local Area Network (LAN):Different types of networks are given different descriptive
names. An individual network usually spans a single geographical area, providing
services and applications to people within a common organizational structure. This type
of network is called a Local Area Network (LAN). A LAN can be made up of multiple
local networks. All of the local networks within a LAN are under one administrative
control group. This group enforces the security and access control policies of the
network. In this context, the word Local refers to local consistent control rather than
being physically close to each other. Devices in a LAN might be physically close, but this
is not a requirement. A LAN can be as small as a single local network installed in a home
or small office. Over time, the definition of a LAN has evolved to include interconnected
local networks consisting of many hundreds of devices that are installed in multiple
buildings and locations.
ii. Wireless Local Area Network (WLAN):A Wireless LAN (WLAN) is a LAN that uses
radio waves to transmit data between wireless devices. In a traditional LAN, devices are
connected together using copper cabling. In some environments, installing copper cabling
might not be practical, desirable, or even possible. In these situations, wireless devices
are used to transmit and receive data using radio waves. As with LANs, on a WLAN you
can share resources, such as files and printers, and access the Internet.
14
Figure 3.8 Wireless Local Area Network
iii. Personal Area Network (PAN): A personal area network (PAN) is a network that
connects devices, such as mice, keyboards, printers, smartphone, and tablets within the
range of an individual person. All of these devices are dedicated to a single host and are
most often connected with Bluetooth technology.
iv. Metropolitan Area Network (MAN):A metropolitan area network (MAN) is a network
that spans across a large campus or a city. The network consists of various buildings
interconnected through wireless or fiber optic backbones. The communications links and
equipment are generally owned by either a consortium of users or by a network service
provider who sells the service to the users. A MAN can act as a high-speed network to
allow sharing of regional resources.
15
Figure 3.10 Metropolitan Area Network
v. Wide Area Network (WAN):A wide area network (WAN) connects multiple smaller
networks such as LANs that are in geographically separated locations. The most common
example of a WAN is the Internet. The Internet is a large WAN that is composed of
millions of interconnected LANs. WAN technology is also used to connect corporate or
research networks. Telecommunications service providers are used to interconnect these
LANs at different locations.
By function and based on the software installed on the devices, a computer can be classified as
follows:
i. Peer-to-Peer Network:In a peer-to-peer network, there is no hierarchy among the computers,
nor are there any dedicated servers. Each device, also called a client, has equivalent capabilities
16
and responsibilities. Individual users are responsible for their own resources and can decide
which data and devices to share or install. Because individual users are responsible for the
resources on their own computers, the network has no central point of control or
administration.
ii. Client/Server Network:Servers have software installed that enables them to provide services, such as
email or web pages, to clients. Each service requires separate server software. For example, a server
requires web server software to provide web services to the network.
In a client/server network, the client requests information or services from the server. The
server provides the requested information or service to the client. Servers on a client/server
network commonly perform some of the processing work for client machines,
When data is sent over a computer network, it is broken up into small chunks called packets.
Each packet contains source and destination address information. The packet, along with the
address information, is called a frame. It also contains information that describes how to put all
of the packets back together again at the destination. The bandwidth determines the number of
packets that can be transmitted within a fixed period of time.
17
Bandwidth is measured in bits per second and is usually denoted by any of the following units of
measure:
a. b/s- bits per second
b. kb/s- kilobits per second
c. Mb/s- megabits per second
d. Gb/s - gigabits per second
NOTE: 1 byte is equal to 8 bits, and is abbreviated with a capital letter B. 1 MB/s is
approximately 8 Mb/s.
The data that is transmitted over the network can flow using one of three modes: simplex, half-
duplex, or full-duplex.
Simplex
Simplex, also called unidirectional, is a single, one-way transmission. An example of simplex
transmission is the signal that is sent from a TV station to your home TV.
Half-Duplex
When data flows in one direction at a time it is known as half-duplex, as shown in the figure.
With half-duplex, the channel of communications allows alternating transmission in two
directions, but not in both directions simultaneously. Two-way radios, such as police or
emergency communications mobile radios, work with half-duplex transmissions. When you
press the button on the microphone to transmit, you cannot hear the person on the other end. If
people at both ends try to talk at the same time, neither transmission gets through.
Full-Duplex
When data flows in both directions at the same time it is known as full-duplex, as shown in the
figure. Although the data flows in both directions, the bandwidth is measured in only one
direction. A network cable with 100 Mb/s in full-duplex mode has a bandwidth of 100 Mb/s.
A telephone conversation is an example of full-duplex communication. Both people can talk and
be heard at the same time
Transmission Control Protocol/Internet Protocol (TCP/IP) defines the rules computers must
follow to communicate with each other over the Internet. TCP is the primary Internet protocol
18
for the reliable delivery of data. IP provides an addressing structure that is responsible for
delivering data from the source computer to the destination computer.
An IP address is a number that is used to identify a device on the network. Each device on a
network must have a unique IP address to communicate with other network devices. As noted
earlier, a host is a device that sends or receives information on the network. Network devices are
devices that move data across the network.
The IP address is similar to the mailing address of a person. It is known as a logical address
because it is logically assigned based on the host location. The IP address, or network address, is
based on the local network and is assigned to each host by a network administrator. This process
is similar to the local government assigning a street address based on the logical description of
the city or village and neighborhood.
Internet Protocol version4 and Internet Protocol version6
In the early 1990s there was a concern about running out of IPv4 network addresses, which lead
the Internet Engineering Task Force to begin looking for a replacement. This led to the
development of what is now known as IPv6. Currently IPv6 is operating alongside and is
beginning to replace IPv4.
An IPv4 address consists of 32 bits with a potential address space of 2^32. In decimal notation
that is approximately a 4 followed by 9 zeroes, an IPv6 address consists of 128 bits with a
potential address space of 2^128. In decimal notation, that is approximately a 3 followed by 38
zeroes. With IPv6, the number of addresses available per person is approximately 10^30. If the
IPv4 address space is represented by a marble, then the IPv6 address space is represented by a
sphere that is almost the size of the planet Saturn.
19
When a host is configured with an IPv4 address, it is entered as a dotted-decimal number, such
as 192.168.1.5. Imagine if you had to enter the 32-bit binary equivalent of this:
11000000101010000000000100000101. If just one bit were mistyped, the address would be
different, and the host might not be able to communicate on the network.
The logical 32-bit IPv4 address is hierarchical and is composed of two parts. The first part
identifies the network, and the second part identifies a host on that network. Both parts are
required. For example, if a host has the IPv4 address 192.168.18.57, the first three octets,
192.168.18, identify the network portion of the address, and the last octet, 57 identifies the host.
This is known as hierarchical addressing, because routers only need to communicate with
networks and not individual hosts. A router is a networking device that forwards data packets
across networks toward their destinations.
In addition to creating separate classes, the IETF reserved some Internet address space for
private networks. Private networks have no connection to public networks. Private network
addresses are not routed across the Internet. This allows networks in different locations to use the
same private addressing scheme without creating addressing conflicts. An example of when
these private addresses are useful is in a classroom lab where you want to prevent access outside
of your network.
Each of these classes has a range of private IP addresses:
20
IPv4 Subnet Mask
The subnet mask indicates the network portion of an IPv4 address. Like the IPv4 address, the
subnet mask is a dotted-decimal number. Usually all hosts within a LAN use the same subnet
mask. The figure shows the default subnet masks for usable IPv4 addresses that are mapped to
the first three classes of IPv4 addresses:
255.0.0.0 - Class A, which indicates that the first octet of the IPv4 address is the network
portion
255.255.0.0 - Class B, which indicates that the first two octets of the IPv4 address is the
network portion
255.255.255.0 - Class C, which indicates that the first three octets of the IPv4 address is the
network portion
If an organization owns one Class B network but needs to provide IPv4 addresses for four LANs,
the organization must subdivide the Class B address into four smaller parts. Subnetting is a
logical division of a network. It provides a way to divide a network, and the subnet mask
specifies how it is subdivided. An experienced network administrator typically performs
21
subnetting. After the subnetting scheme has been created, the proper IPv4 addresses and subnet
masks can be configured on the hosts in the four LANs.
For effective performance of huawei devices such as routers and switches, some basic
configurations are expected of an administrator to be carried out on these devices. These
configurations are also needed to secure access to the devices in other to prevent unauthorized
access whenever they are used on the network.
22
CTRL+H deletes the character on the left side of the cursor.
CTRL+N displays the next command in the historical command buffer.
CTRL+P displays the previous command in the historical command buffer.
CTRL+W deletes the word on the left side of the cursor.
CTRL+X deletes all the characters on the left side of the cursor.
CTRL+Y deletes all the characters on the right side of the cursor.
ESC+B moves the cursor one word back.
ESC+D deletes the word on the right side of the cursor.
ESC+F moves the cursor forward one word.
Networking protocols define a common format and set of rules for exchanging messages
between devices. For devices to successfully communicate, a network protocol suite must
describe precise requirements and interactions. Some common networking protocols are IP,
HTTP, and DHCP.
23
3.15.3 Internet Protocol
IP is responsible for taking the formatted segments from TCP, encapsulating them into packets,
assigning them the appropriate addresses, and delivering them across the best path to the
destination host.
If you have misplaced your documentation, and you do not see your router listed here,
search on Google for your router name and "default IP address" to find the correct
information.
Another way to locate your router's IP address: on a PC, open the command prompt
(click on Start> Run/Search for cmd) and enter ipconfig. Look for the Default Gateway
line, and try that number.
2. LOG IN. If prompted, enter your router's user name and password, and log into your
router. Not all routers will require this step. If your router defaults to requiring a
password, it will be listed with the documentation. If so, the default password is generally
“admin,” and you may leave the User name field blank.
3 GO TO SETUP -> Basic Setup. Scroll down until you see DHCP Server (Enable) (Disable)
radio buttons. If it is disabled, select Enable
24
4 IF YOU WANT, YOU CAN CHANGE THE NUMBER THAT THE DHCP IP
ASSIGNING STARTS. This is optional, and is totally dependent on personal preference. If
you're not sure what this is, it's totally safe to skip this step.
Some routers let you set the maximum number of DHCP clients. If your router has this
setting, count all the computers, smart phones, and other internet-active devices (such as
Apple TV), then add a couple extra, for guests who may visit with their smart phones and
want to access the internet. Once the pre-defined maximum is reached, no one else can
get an address until one expires!
5 SET THE DNS. Use the DNS servers provided to you by your ISP, or use the following DNS
servers: 205.152.37.254, 205.152.132.235, 205.152.132.23;
6 SAVE YOUR SETTINGS. Click the Save or Apply button, or whatever your router calls the
button that locks in your changes.
7 CONFIGURE YOUR NETWORK DEVICES. Open up the network configurations for the
computers on your network. On a PC, go to Control Panel ->Network Connections ->Local
Area Connection (or Wireless Connection) and select Obtain IP address automatically. On a
Mac, go to System Preferences, then click on Network, and select Using DHCP. On a WiFi-
enabled device, check the WiFi settings, and select DHCP as the source of the IP address after
it’s broken. The same is true for PCs.
3.2.1.1CSS
25
Cascading style sheets, fondly referred to as CSS, is simply design language intended to simplify
the process of making web pages presentable.
CSS handles the look and feel part of a web page. Using CSS, you can control the color of the
text , the style of fonts, the spacing between paragraphs, how columns are sized and laid out ,
what background images or colors are used, layouts designs, variations in display for different
devices and screen sizes as well as a variety of other effects
CSS is easy to learn and understand but it provides powerful control over the presentation of
an HTML document. Most commonly , CSS is combined with makeup language HTML or
XHTML.
26
3.8.3 SAMPLES OF GREATNESS TV SUBSCIPTION SITE
A software system that enables users to define, create, maintain, and control access to the
database.
(Database) application program: a computer program that interacts with database by issuing an
appropriate request (SQL statement) to the DBMS. E.g Xampp, Microsoft visual studio, My
SQL Server etc.
It is a domain-specific language used in programming and design for managing data held in a
relational database management system (RDBMS), or for stream processing in a relational data
stream management system (RDSMS). It is particularly useful in handling structured data, i.e
data incorporating among entities ans variables.
Teleprocessing
File-server
Client-server
3.3.1.4 System catalog: Repository of information (metadata) describing the data in the
database.One of the fundamental components of DBMS.Typically stores:
3.4.1.1 TROUBLESHOOTING: Is a way of finding a problem and applying a proper fix. This
sometimes involves a trial and error technique.
Write down your steps: Once you start troubleshooting, you may want to write
down each step you take. This way, you'll be able to remember exactly what
you've done and can avoid repeating the same mistakes. If you end up asking other
people for help, it will be much easier if they know exactly what you've tried
already.
Take notes about error messages: If your computer gives you an error message, be
sure to write down as much information as possible. You may be able to use this
information later to find out if other people are having the same error.
Always check the cables: If you're having trouble with a specific piece of
computer hardware, such as your monitor or keyboard, an easy first step is to
check all related cables to make sure they're properly connected.
Restart the computer: When all else fails, one of the best things to try is to restart
the computer. This can solve a lot of basic issues you may experience with your
computer.
29
3.4.2 RECOVERY DRIVE
This Windows tool helps you to create a recovery drive of your system, it helps you to reset you
or refresh your system even if it can’t start. You can create a backup on CD/DVD ROMs and
even on Network Locations.
30
FIGURE 12: RECOVERY DRIVE WINDOW
You can start recovery drive by going to Control Panel, (change the view to large or small items
if it’s in category), Click on Recovery and Then click on create a Recovery Drive.
3.4.3TASK MANAGER
Task Manager displays the programs, processes, and services that are currently running on your
computer. You can use Task Manager to monitor your computer’s performance or to close a
program that's not responding.
If you're connected to a network, you can also use Task Manager to view network status and see
how your network is functioning. If more than one person is connected to your computer, you
can see who's connected and what they're working on, and you can send them a message.
You can start task manager by using the keyboard combination of CTRL+SHIFT+ESC
3.4.4 SYSTEM RESTORE (RESTORE POINT)
System Restore can help fix problems that might be making your computer run slowly or stop
responding. System Restore does not affect any of your documents or other personal data, but
recently installed programs might be uninstalled.
31
You can start the system restore by going to Control Panel, (change the view to large or small
items if it’s in category), Click on Configure System Restore to configure or create manual
restore point or click on Open system restore to Open the restore windows.
3.4.5 DISKPART
Diskpart.exe is command-line disk partitioning utility included in Windows 2000 and later,
replacing its predecessor, fdisk.
Diskpart is a text-mode command interpreter that enables you to manage objects (disks,
partitions, or volumes) by using scripts or direct input from a command prompt. Before
you can use Diskpart.exe command on a disk, partitions, or volumes, you must first list
and then select the objects to give it focus. When an object has focus, any Diskpart.exe
commands that you type act on that object.
You can list the available objects and determine an object’s number or letter by using the list
disk, list volume, list partition commands. However the list partition commands only displays
partitions on the disk that has focus. When you use the list command, an asterisk (*) appears next
to the object with focus. While some commands automatically changes the focus, eg. When you
created a new partition the focus will automatically changes to the new partition that you created.
32
You can start Diskpart by going to Command Prompt and then typing the word “Diskpart” and
hitting Enter button.
Installing a motherboard typically means you are essentially building a new computer. You will
need to reinstall your operating system if you are upgrading, and you will need to format any
system drives. You cannot simply upgrade to a new motherboard without reinstalling everything
on your computer.
33
This involves the use of command prompt for clearing and correcting a PC password on a
windows operating system. But this would is most likely to work on Windows 10 of 2015 and
before.
STEPS TO CLEARING PASSWORD ON COMMAND PROMPT
1. Run command prompt as an administrator.
2. Type in “ net user “ in the command prompt.
3. Copy the name of the account you wish to change.
4. Type in “ net user +(account name you wish to change)”
5. Type in “ net user +(account name you wish to change)” and the “ * “.
6. Type in the New password you intend to use in the PC and confirm the password.
7. Then your done.
34
3..6.0 STEPS TO ACHIEVE A SUCCESSFUL WINDOWS7 INSTALLATION
Insert the Windows 7 DVD in your PC’s optical drive and reboot the system. After the
BIOS screen flashes by, you may see a message alerting you to press any key to boot
from the CD or DVD. If so, press a key. Some systems, however, do not provide this
warning and instead boot from the DVD by default. A black screen with a pulsating
Windows logo and the text “Starting Windows” will appear. Eventually, the screen
displays a colored background and the initial Setup window appears, a. Here, you can
reconfigure the language, time and currency formats, and keyboard or input method
you’ll use during Setup.
The default language is English and the keyboard layout is English (United States). Click next
and click on the install now button.
Set Language (Next)
Click (Install Now)
Read and accept the license agreement by Microsoft and click next to choose the
type of installation.
The custom option is selected as the computer hard disk would be formatted. Therefore the user
needs to make a backup of documents and important files before taking this step.
2. Computer Is Restarting
35
3 Starting Services
5. Computer Is Restarting
Next, choose whether to enable Automatic Updates. You should use the recommended settings, in which
Windows automatically downloads and installs all updates. Alternately, you can choose to install only
important updates or be prompted later.
If you are connected to a wired or wireless network, you’ll see the current location screen shown in the
next figure. From here, you can choose whether the network you’re accessing is a Home network (and
thus private), a Work network (also private), or a Public network (such as a library, coffee shop, or
airport). Windows configures networking appropriately in each case.
Now, Windows 7 finalizes your settings, prepares your desktop, and takes you to the desktop, as
shown below.
36
CHAPTER FOUR
4.0 SUMMARY
This report discusses the activities I learn during my long duration of attachment to KSITM
which lasted for 11 months which included my six month official attachment to the institution
that gave me more time and similarly more time to familiarize with the institution, its staffs and
the code of conduct as well which make my areas of learning that covered the Introduction to
Computer system, common operation and appreciation, Introduction to system networking,
installation of software and operating systems and Basic computer system maintenance was also
covered. However this report does not cover all the activities in which I participated in as well as
some other life impacting skills like leadership, dedication, and an understanding for the value
for integrity and sincerity, rather a summary of the program. The SIWES training gave me an in-
dept understanding of how administrative activities are carried out and also it gave me platform
to participate in an International HUAWEI Routing and switching Professional Examination of
which I passed with 770 points which earned me my certification as a Routing and switching
Network engineer.
37
4.1 RECOMMENDATION
Based on the experience I have gotten during my Industrial Training, I would recommend the
following:
4.2 REFERENCES
Carey, P.
Michele, D. (2013). Learning PHP and MySQL. [online] Available at http://www.itbooks.com: IT-Books.
Abdullai, S. (2015) Beginner of Stock Control lectures delivered to siwes at database center
SCMD.
https://e.huawei.com/en/talent/#/personal/myappointments/list
www.ksitm.edu.ng.org
38
World Wide Web school. www.w3school.com
En.wikipedia,org/wiki/computer science
39