Mohd
Mohd
Mohd
CHAPTER ONE
INTRODUCTION
The student Industrial Work Experience Scheme (SIWES) is a skilled training programmed
designed to expose students of universities, Polytechnics/ Colleges of technology / Colleges of
Agriculture and Colleges of Education for industrial work situation they are likely to meet often
graduation. The scheme presents students the opportunity of familiarizing and exposing
themselves to the needed experience in handling equipment and machineries that are usually not
available in their institution. Before the establishment of the scheme, there was a growing
concern among our industrialist that graduates of our instituting of higher learning lack of
adequate practical background studies preparatory for employment in industries. Thus, the
employers were of the opinion that the theoretical Education going on in higher institution was
not responsive of the need of the employer of labor. It’s against this background that the
rationale for initiating and designing the scheme by the fund during its formative years 1973/
1974 was introduced to acquaint students with the skill of handling employers and machineries.
The ITF solely founded the scheme during its formative years. But as the financial involvement
became unbearable to the fund, it withdrew from the scheme in 1978. The federal Government
handed over the scheme in 1979 to both the National Universities Commission (NUC) and
National Board for Technical Education (NBTE). Later on, the federal Government in November
1984 reversed the management and implementation of the SIWES Programme to Industrial Trust
Found (ITF) and it was effectively taken over by the Industrial Training Found in July, 1985
with the founding solely borne by the Federal Government.
i) To provide the best opportunity for a student to become acquainted with the tools,
machines, process of most individual companies.
ii) To provide real work experience to the student before graduating.
1
iii) To bridge the gap between theories in the class room and practical work situation in
the field.
iv) To build student with ability to work with equipment and machines which they don’t
have in their various schools.
v) Prepare students to face challenges most especially in their field of studies.
vi) Prepare students for employment opportunity after graduation with the knowledge
they acquired during their attachment.
Matrix Solutions Enterprises was established in the year 2000.It was created as an ICT service
provider, which consist of the following arms;
Furthermore, the unit scope of operations is not limited to the aforementioned services as other
activities contained in the memorandum and article of association may be under taken in near
future.
The entire arms which consist of the whole units of the organisation comprise of eleven (11)
staffs whom are all Nigerians and is located at No: 30Sabru House, Atiku Abubakar Road,
Jimeta-Yola, Adamawa State.
The following are services that are fully organized to be rendered to various departments by the
entire units of the organisation.
2
iv) Typing and printing
v) Training of external Students.
vi) Cybercafe business services
The organisations’ main office is headed by the Chief Executive Officer (CEO) who is the
owner of the organisation. He is responsible for coordinating, managing and conducting the
activities and project of the organisation. He is assisted by the three Heads of departments or
units head who coordinate and monitor day to day activities of staff in the various departments.
The Organisation Chart below will depict this.
ORGANISATION CHART
C.E.O
3
CHAPTER TWO
The main objective of this course was to expose Students to the knowledge of how to secure
networks, as well as the use of some security tools such as keylogger and IDS (Intrusion
Detection Systems) in order to counter each attacks that may be coming from various hackers.
2.1 INTRODUCTION
After reporting and having orientation at my IT place i.e Matrix Solutions Enterprises, I was first
introduced to Cyber Security. The lesson covers the current threats on security and the need to
secure systems on a network such as the internet. I learnt that Cyber Security is a body of
technology meant to secure data, networks and computers from attacks, damage and
unauthorized access. Here are some elements of Cyber security as we were taught:-
4
Some Goals of Cyber Security: - I learned that there re certain goals the Cyber security
aims to achieve, these includes;.
Data Integrity
Non – repudiation
Confidentiality
Cryptography was defined as a technology for securing information from intruders. It ensures
that people in a group can exchange information without someone intercepting it. In an instance
where an eavesdropping attack occurs, Cryptography still ensures that the intercepted
information is meaningless to the person (Jude, 2017).
Based on what I learned, the use of Cryptography is mostly in the area of communication and
the military. It also mean that organization that uses communication in some kind of way or the
other will require cryptography. From what I was taught, this technology is intensively used by
the following institutions;
Military
Terrorist
Telecommunication/Internet platforms
Fraternities and secret associations, etc
5
GOALS OF CRYPTOGRAPHY
1. Confidentiality
2. Data integrity
3. Non repudiation
4. Anti-replay
5. Authentication
1. Symmetric key
2. Asymmetric key
a. Symmetric key: In this type of cryptographic algorithm all the users shares one key to
allow them to communicate with each other.
b. Asymmetric key: the asymmetric key infrastructure enable users to obtain both public
keys and private keys for communication as follows:
- Public keys can be shared to everyone.
- Private keys it is only a person private key that can be used to decrypt the public key.
COMMON TERMINOLOGIES
Plain Text: This refers to any intelligible message that everyone can read and understand.
Cipher Text: This is a coded message that is dependent on a plaintext and a secret key.
6
The most common use of cryptography is in communication. Cryptography ensures that when
two principals are communicating, their messages should not be compromised (eavesdropped),
of if compromised, the information should be meaningless to the intruder. Here are the three
main types of ciphers we use for data encryption:
CAESAR CIPHER
The Caesar cipher is done by replacing a letter with three letter further down the alphabets.
For example, where you wish to write A, you will enter D.
ABCDEFGHIJKLMNOPQRSTUVWXYZ
7
3. BOOK (BEALE) CIPHER: This is a cipher where the key is an identify of a particular
book (key) used for this type of cipher you may send the message.
Example: 03250702 (eight numeric characters) which may mean: chapter 3, page 25, line
7, second paragraph.
Cast 128
The objective of this course is to learn how email communication works and how to secure
communications from intruders.
Introduction
Email is the fastest means of communication on the internet. It has advantages such as ability to
send and receive mails, storage and been able to support copying of external roles
SOME CONCEPT
MIME (Multipurpose Internet Mail Extension): Before the introduction of MIME, an ASCII
standard was RFC 822. Due to limitations such as lack of support for executable (.exe) and
binary (.bin) files, the MIME replaces it. The MIME protocol support executable and binary
files.
8
S/MIME (Secure Multipurpose Internet Mail Extension): The secure MIME was later
introduced to tackle the issues of security that is authentication with following features.
Spam: This simply refers to unsolicited emails. They can be divided into two namely:
1. Unsolicited Bulk Emails (UBE): Trying to advertise events that necessarily commercial.
2. Unsolicited Commercial Emails (UCE): Trying to advertise a product or a service.
SPAM DEFENCE
Course Objective
Web Design lesson was taught next. It was aimed at teaching how we can design websites and
the technology platforms used for designing them..
Introduction
Web Design was defined as the process of conceptualization, planning, modeling and execution
of electronic media content delivery through the internet in the form of technologies such as
HTML suitable for interpretation and display by a web- browser or other web based graphic user
interface (GUI’s).
9
Website
Website simply means, a page or group of related web pages typically designed by an individual
or organization and published to the Internet.
We learned many platforms for implementing websites. Some of these include the use of Text
Editors and Content Management System (CMS).
An example of a Text Editor is the Notepad, which comes along with any Computer that runs
windows Operating system.
Starting Notepad
Notepad is the standard text editor that comes with both the 16 and 32 bit versions of the
Microsoft Windows Operating system. To start Notepad in windows in windows 7, follow the
steps below:
1. Click on Start button located at the windows task bar
2. Click on All Programs, then select Accessories.
3. Locate the shortcut Notepad and click the shortcut once.
10
Fig1:A typical Notepad Screenshot
In Notepad you will start a page by creating HTML tags. Example, below;
<Html>
<Head>
<Title> Home page </Title>
</Head>
<Body>
</Body>
</Html>
After creating a website, you’ll need to test it on a web browser to see whether its ok or not.
11
PRIMARY FUNCTION OF A WEB BROWSER
To further press more on web design. The use of a Web browser was explained. A web browser
is a client application that displays your web document. To test a web document that you’ve
created, you need to open a web browser such as Mozilla Firefox, to do this, you normally place
a request. A valid request is given by entering the address of the file. When you insert your
request;
i. It will interpret all Html tags of your web pages.
ii. It will further Display the page, based on the screen
Joomla as a Content Management System was aimed at showing the use of another technology
for easy web design, other than the traditional Html.
Introduction
12
As one of the platforms for building web sites, the Content Management System technology
allows users to create and edit web sites from a central source. To use this technology, you must
install a local server such as Xampp or Wamp. Being an open source technology based on
Php/MySql, the Content Management System has different platforms for designing such web
sites which include;
Drupal
Joomla, and
Wordpress.
13
Fig 4: A screen shot of first Joomla Installation Window showing language settings
14
Fig 6: Third Joomla Installation window showing License settings
15
Fig 8: Fifth window for Joomla Configuration showing FTP Configuration
16
\
Fig 10: The final Joomla Installation window for Joomla 1.5
17
Extracting the Joomla Package zipped fill on the web server such as Xampp
The use of some packages becomes common in the Cyber café Department of the place of IT.
Mostly, the Microsoft office (latest vision) for day to day activities of the commission. The
items that contained in the Microsoft office are as follows:-
a) Microsoft word: - This application was taught as a word application software that
enables the user to type, edit, format, checking for spelling and printing his work. Which
I also used practically for typing documents.
18
Fig12:A typical Ms Word 2016 Screenshot
b) Microsoft excel: - this is an application software run through the windows to solve the
problems of graphical representation, calculation, business budgeting, accounting,
statistical analysis, financial analysis e.t.c.
Types of entry
In Excel, you can either enter any of the following characters:
1. Label/Text - These are alphabetic or numeric characters we can enter into the Excel
spreadsheet, which may not be used for calculations. e.g. Names or Address. When
labels are entered, they usually appear at the left side of the cell.
2. Values/Numbers - they are pure numeric characters we can enter for calculations.
When we enter such characters, they are usually displayed by the right side of the
19
screen.
I was further taught about Database Management System: as a technology for designing and
implementing Databases in Computers. The use of several Database Management Systems
were highlighted. Examples of DBMS are Ms- Access, Oracle DB, My sql, etc
Data Integrity
Aids Planning
STARTING MS ACCESS
Microsoft Access is a Database Management system that can be used to create and
manage database records. I learnt that the program is also a Relational Database
Management System (RDBMS). As a RDBMS, it can allow a user to create multiple
tables and relate them together.
20
To launch the program on your computer system, you can either find a short cut icon on
the desktop or simply do the following;
Click on Start Button
Go to All Programs
Click on Microsoft Office program
Choose Microsoft Office Access 2010 or higher
21
Fig 16: The Design View window where a user can create a Database Table
Having gone through the Database Management System lessons, I gained a lot of lessons. Here I
bullet point few;
22
Filtering:- I learnt that filtering is the process of extracting a specific category of information
from an existing database table. It helps a lot in database management, especially, where you
intend to see records of workers from a specific State of Local Government Area.
Forms: The use of forms is also another important lesson I learnt. A form is seen as an output
screen that allow a user to input data into an existing database table. Create a form becomes
necessary, especially if you wish to secure the contents of your database table and prevent it
from other to see it
Linking To MS Word (Mail Merge):- this feature is an interesting way for personalizing letter
(mails) for group of individuals which may possess the same contents. It is used in a situation
where you are sending the same type of document to many different people. An example is Quit
notice or Wedding Notification
At this point, I will further explain what was taught about computer networks. It will begin with
the definition and types of network.
A network simply refers to a group of connected computers that enable the users to share
information and equipment together. For an organization to establish a network, there must be a
particular service they intend to share or benefit from, such as printing services, internet services,
sharing of documents, etc
a. Local Area Network (LAN) – A connection of two or more computers such as within
the same building. Such networks are connected using cables.
b. Metropolitan Area Network (MAN)- A network of two or more LANs which are
located within the same geographic region. These types of networks are connected using
radio waves.
23
c. Wide Area Network (WAN)- A network of computers that covers a country, a continent
or the entire world. The internet is the largest wide area network in the world.
In the Industrial training, we were taught how to connect systems on a Local Area Network.
To establish a Local Area Network, you need certain tools and equipment as follows;
LAN Tester
Crimping Tool
Switch/Hub
After obtaining these, you’ll need to do cabling, by crimping RJ 45 connectors to the network
Cables. Cables that were crimped should also be tested to ensure continuity in the packet flow
during network. To do this, a LAN tester is commonly used
To connect computers on a Local Area Network, you must assign a IP address to each one of
them. IP stands for Internet Protocol address, which is a logical address that is given to each
computer system on a network. Before assigning an IP address, one must verify whether there is
a NIC Driver (i.e software that interface between your computer and the network resources)
Click on change adapter settings at the top left side of the window
Right click on the Local Area Connection Icon, and select properties
24
Select Internet Protocol Version 4 (TCP/IPv4)
Note: Once an IP address is assigned to each computer and cables are connected, the Local Area
Connection will be established. It is now be the role of the Network administrator to either share
documents or service (e.g printing services) on the network.
The lesson clearly discussed the concept of a Computer software been different from just a mare
computer program. A Software is seen as a computer program with its associated documentation
as well as other supporting files that makes the product to operate smoothly on the users
machine.
I was further taught the art of visual programming. The Visual Basic 6.0 was the programming
language that I leant
25
To load the Microsoft Visual Basic environment, you can locate the application at the programs
menu. In other version earlier that windows 8, you can locate the program under Microsoft
Visual Studio 2012.
The program support the design and implementation of both desktop and web applications .It
allow programmers to design programs visually. Due to its flexibility, it has tools as well as a
code window writing event procedures
26
CHAPTER THREE
My Six Month SIWES experience from the commencement of the Orientation to the last day has
been summarized into a tabular format as shown below
27
WEEK 12 Database Implementation I was taught how to implement
database using MS-ACCESS and to
link database to other application
WEEK 16 Introduction to web design using HTML I learnt how to design a website
structure using HTML tags
WEEK 17 Website Home Page I was able to create some web page
features like home page, contact us,
about us and logo
WEEK 19 Content management System template I was taught how to change template
and how to install Joomla
28
WEEK 23
CHAPTER FOUR
29
Installing a program simply imply that the computer technician transfers a copy of a software
application from a storage media such a Compact Disk(CD) or an External Hard disk into the
target computer system.
Before carrying out program installation, the target computer needs an adequate space or
a minimum system requirement which is often specified by the manufacturers of the software in
question.
Normally, to install an application into a computer system, the technician needs to follow the laid
down procedures as spelled out below;
1. Insert the CD Rom in to the computer (if using an external Hard disk, insert it into the
target computer)
2. When prompted, locate the set up file for the application and double-click on it. If
prompted with an Auto run interface, click on the Install option.
4. Enter the product key for the application (if it has one).
Note: Some manufacturers require that the entire system be re-started in order for the
installation to take effect.
To test an installed software, whether its properly installed, the user needs to load the program
from the desktop. In this case, we are using the Windows XP operating system.
Select All-Programs
30
Locate the specific program folder
Sample screen shots for installing applications on a Computer is resented at the appendix
31
CHAPTER FIVE
5.1 CHALENGES
During my Industrial Training program, l noticed some of the challenges faced by the
organization and these include:
5.2 RECOMMENDATION
Having observed the problems during the program, the following solution is highly
recommended to enhance smooth operations in Matrix Solutions Enterprises.
1. The organization should employ more hands in the place, in order to help with work
burden
2. If possible, more computer facilities should be added.
3. Students should be given allowances for IT before coming for the exercise to
cushion the effect of transport difficulty.
5.3 SUMMARY
At the climax of the SIWES program, I observed that the exercise gave me the opportunity to
see myself in real life working condition. Even though it was a very challenging task, but It
gave me the opportunity to broaden my thinking abilities, display the things that I have learnt
and put most of them into practice. The challenges of modern industrial technological
environment.
32
2.4 CONCLUSION
Having known that the primary aim of SIWES is to expose students to practically oriented
courses as found in the real life industry before the end of their program, the entire
exercise has really provided me and several others with the opportunity to work and
have experiences in a real life scenario. Indeed it was not an easy task but I really appreciate
the effort made by the Federal Government and the policy makers in the establishment and
initiating the move to setup SIWES scheme for students.
33
REFERENCES
4. Olaiyo Ayole (1998); training for industrial development in Nigeria. Ehindero Nig. Ltd. Jos.
34
APPENDIX
MISCELLANOUS
Installing Coreldraw 13
35
Begin installation
36
Installing Microsoft Office 2007
37
Choose the licensed agreement to proceed
Installing an All-In-One-Keylogger
38
Configure the Keylogger
39