Mohd

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 39

20D/360099

CHAPTER ONE

INTRODUCTION

1.1 BACKGROUND OF STUDENTS INDUSTRIAL WORK EXPERIENCE SCHEME


(SIWES)

The student Industrial Work Experience Scheme (SIWES) is a skilled training programmed
designed to expose students of universities, Polytechnics/ Colleges of technology / Colleges of
Agriculture and Colleges of Education for industrial work situation they are likely to meet often
graduation. The scheme presents students the opportunity of familiarizing and exposing
themselves to the needed experience in handling equipment and machineries that are usually not
available in their institution. Before the establishment of the scheme, there was a growing
concern among our industrialist that graduates of our instituting of higher learning lack of
adequate practical background studies preparatory for employment in industries. Thus, the
employers were of the opinion that the theoretical Education going on in higher institution was
not responsive of the need of the employer of labor. It’s against this background that the
rationale for initiating and designing the scheme by the fund during its formative years 1973/
1974 was introduced to acquaint students with the skill of handling employers and machineries.
The ITF solely founded the scheme during its formative years. But as the financial involvement
became unbearable to the fund, it withdrew from the scheme in 1978. The federal Government
handed over the scheme in 1979 to both the National Universities Commission (NUC) and
National Board for Technical Education (NBTE). Later on, the federal Government in November
1984 reversed the management and implementation of the SIWES Programme to Industrial Trust
Found (ITF) and it was effectively taken over by the Industrial Training Found in July, 1985
with the founding solely borne by the Federal Government.

1.2 AIMS AND OBJECTIVES OF SIWES

The main objectives of SIWES are;

i) To provide the best opportunity for a student to become acquainted with the tools,
machines, process of most individual companies.
ii) To provide real work experience to the student before graduating.

1
iii) To bridge the gap between theories in the class room and practical work situation in
the field.
iv) To build student with ability to work with equipment and machines which they don’t
have in their various schools.
v) Prepare students to face challenges most especially in their field of studies.
vi) Prepare students for employment opportunity after graduation with the knowledge
they acquired during their attachment.

1.3 BRIEF HISTORY AND LOCATION OF MATRIX SOLUTIONS


ENTERPRISES.

Matrix Solutions Enterprises was established in the year 2000.It was created as an ICT service
provider, which consist of the following arms;

 Consultancy Service Unit

 Maintenance Unit, and

 Cybercafe Business Unit.

Furthermore, the unit scope of operations is not limited to the aforementioned services as other
activities contained in the memorandum and article of association may be under taken in near
future.

The entire arms which consist of the whole units of the organisation comprise of eleven (11)
staffs whom are all Nigerians and is located at No: 30Sabru House, Atiku Abubakar Road,
Jimeta-Yola, Adamawa State.

1.4 THE SERVICES RENDERED BY THE ENTIRE UNITS

The following are services that are fully organized to be rendered to various departments by the
entire units of the organisation.

i) Supply of computers and computer accessories.


ii) Minor servicing and maintenance of computer relevant spare part
iii) Computer assembling

2
iv) Typing and printing
v) Training of external Students.
vi) Cybercafe business services

1.5 ORGANIZATIONAL STRUCTURE OF THE ORGANISATION

The organisations’ main office is headed by the Chief Executive Officer (CEO) who is the
owner of the organisation. He is responsible for coordinating, managing and conducting the
activities and project of the organisation. He is assisted by the three Heads of departments or
units head who coordinate and monitor day to day activities of staff in the various departments.
The Organisation Chart below will depict this.

ORGANISATION CHART

C.E.O

Head of Manager Cybercafe


Head Consultancy
Maintenance Unit
Services

Café Staff Secretary


Secretary Head of Training

Instructor Instructor Technical Staff

3
CHAPTER TWO

2.0 CYBER SECURITY

OBJECTIVES OF THE TRAINING

The main objective of this course was to expose Students to the knowledge of how to secure
networks, as well as the use of some security tools such as keylogger and IDS (Intrusion
Detection Systems) in order to counter each attacks that may be coming from various hackers.

2.1 INTRODUCTION

After reporting and having orientation at my IT place i.e Matrix Solutions Enterprises, I was first
introduced to Cyber Security. The lesson covers the current threats on security and the need to
secure systems on a network such as the internet. I learnt that Cyber Security is a body of
technology meant to secure data, networks and computers from attacks, damage and
unauthorized access. Here are some elements of Cyber security as we were taught:-

i) Authentication: - This is another aspect of Cyber security that attempts to confirm


whether the users are the people they claimed to be. Mostly usernames and passwords
are expected to be entered or some form of authorization and authentication are
carried out.
ii) Information Security: - It is concerned about the security of Data which a user store
on a server via a network.
iii) Network Security: - It is the main aspect of security that ensures that the network
connection is properly monitored to avoid cyber-attacks The most important thing to
do is to ensure that the computer and other electronic devices that give function to the
network are protected from hackers and other cyber criminals..
iv) End User Education: - This is one of the main aspects of cyber security. The
computer network comprises of so many devices and users. So, as a Cyber security
expert, one is expected to educate lay men that don’t have this knowledge, they will
need to be coached on how to protect their networks and data from intruders.

4
Some Goals of Cyber Security: - I learned that there re certain goals the Cyber security
aims to achieve, these includes;.

 Data Integrity
 Non – repudiation
 Confidentiality

FIVE (5) STEPS FOR HACKING

1. Reconnaissance: In intelligence gathering about a particular thing.


2. Scanning: It means to use different tools to check life transmission on the target network.
3. Gaining Access: Is to exploit a computer be penetrating a server.
4. Maintaining Access: It means to create a back door to always access the victim’s
computer.
5. Covering Tracks: This is the technology of hiding a trace of a hacker from view.

2.2 INTRODUCTION TO CRYPTOGRAPHY

Cryptography was defined as a technology for securing information from intruders. It ensures
that people in a group can exchange information without someone intercepting it. In an instance
where an eavesdropping attack occurs, Cryptography still ensures that the intercepted
information is meaningless to the person (Jude, 2017).

FUNCTIONAL USES OF CRYPTOGRAPHY

Based on what I learned, the use of Cryptography is mostly in the area of communication and
the military. It also mean that organization that uses communication in some kind of way or the
other will require cryptography. From what I was taught, this technology is intensively used by
the following institutions;

 Military
 Terrorist
 Telecommunication/Internet platforms
 Fraternities and secret associations, etc

5
GOALS OF CRYPTOGRAPHY

1. Confidentiality
2. Data integrity
3. Non repudiation
4. Anti-replay
5. Authentication

TYPES OF CRYPTOGRAPHIC ALGORITHM

1. Symmetric key
2. Asymmetric key

a. Symmetric key: In this type of cryptographic algorithm all the users shares one key to
allow them to communicate with each other.
b. Asymmetric key: the asymmetric key infrastructure enable users to obtain both public
keys and private keys for communication as follows:
- Public keys can be shared to everyone.
- Private keys it is only a person private key that can be used to decrypt the public key.

COMMON TERMINOLOGIES

Plain Text: This refers to any intelligible message that everyone can read and understand.

Cipher Text: This is a coded message that is dependent on a plaintext and a secret key.

Encryption: This is the process of converting from a plaintext to a Cipher text.

Decryption: this means to restore a Cipher text back to a plaintext.

CLASSICAL ENCRYPTION TECHNIQUES

6
The most common use of cryptography is in communication. Cryptography ensures that when
two principals are communicating, their messages should not be compromised (eavesdropped),
of if compromised, the information should be meaningless to the intruder. Here are the three
main types of ciphers we use for data encryption:

(a.) substitution Cipher


(b.) Transposition Cipher
(c.) Book (Beale) Cipher
1. SUBSTITUTION CIPHER: Here I was taught about the substitution ciphers as one in
which the contents of letters are substituted with other letters. The earliest known
examples of such cipher in the Caesar Cipher

CAESAR CIPHER

The Caesar cipher is done by replacing a letter with three letter further down the alphabets.
For example, where you wish to write A, you will enter D.

An example of both plaintext and ciphers text are shown below;

ABCDEFGHIJKLMNOPQRSTUVWXYZ

Plain Text: We are Discovered

Cipher text: ZH DUH GLVFRYHUHG

2. TRANSPOSITION CIPHER: In this technique a user performs some sort of


permutation on an existing plain text letters. A typical example is the rail fence technique
in which a plain text is written down as a sequence of diagonals and then read off as a
sequence of rows.
Example:
Plain text: Meet me after the toga party
mematrhtgpry
etefeteoaat
Cipher text: mematrhtgpry etefeteoaat
Meet me after the toga party.

7
3. BOOK (BEALE) CIPHER: This is a cipher where the key is an identify of a particular
book (key) used for this type of cipher you may send the message.
Example: 03250702 (eight numeric characters) which may mean: chapter 3, page 25, line
7, second paragraph.

EXAMPLES OF MODERN CRYPTOGRAPHIC

RSA (Rivest Shamir and Addleman)

RC4 (Rivest Cipher 4)

MD5 (Message Digest 5)

Cast 128

AES (Advanced Encryption Standard)

DES (Data Encryption Standard).

2.3 EMAIL SECURITY

Main Objective of The Course

The objective of this course is to learn how email communication works and how to secure
communications from intruders.

Introduction

Email is the fastest means of communication on the internet. It has advantages such as ability to
send and receive mails, storage and been able to support copying of external roles

SOME CONCEPT

MIME (Multipurpose Internet Mail Extension): Before the introduction of MIME, an ASCII
standard was RFC 822. Due to limitations such as lack of support for executable (.exe) and
binary (.bin) files, the MIME replaces it. The MIME protocol support executable and binary
files.

8
S/MIME (Secure Multipurpose Internet Mail Extension): The secure MIME was later
introduced to tackle the issues of security that is authentication with following features.

1. Data origin (Repudiation)


2. Data integrity
3. Encryption (Digital Envelope)
4. PGP (Pretty Good Privacy): Is a program that enforces encryption on an email client
program such as MS-outlook. It functions with S/MIME. To use the application, you
most configure MS-outlook as your mail change.

SPAM/ JUNK MAILS

Spam: This simply refers to unsolicited emails. They can be divided into two namely:

1. Unsolicited Bulk Emails (UBE): Trying to advertise events that necessarily commercial.
2. Unsolicited Commercial Emails (UCE): Trying to advertise a product or a service.

SPAM DEFENCE

5. Block Known Signatures


6. Block Unknown Addresses
7. Legislature

2.2 WEB DESIGN TECHNOLOGY

Course Objective
Web Design lesson was taught next. It was aimed at teaching how we can design websites and
the technology platforms used for designing them..
Introduction
Web Design was defined as the process of conceptualization, planning, modeling and execution
of electronic media content delivery through the internet in the form of technologies such as
HTML suitable for interpretation and display by a web- browser or other web based graphic user
interface (GUI’s).

9
Website
Website simply means, a page or group of related web pages typically designed by an individual
or organization and published to the Internet.

We learned many platforms for implementing websites. Some of these include the use of Text
Editors and Content Management System (CMS).

An example of a Text Editor is the Notepad, which comes along with any Computer that runs
windows Operating system.

Starting Notepad
Notepad is the standard text editor that comes with both the 16 and 32 bit versions of the
Microsoft Windows Operating system. To start Notepad in windows in windows 7, follow the
steps below:
1. Click on Start button located at the windows task bar
2. Click on All Programs, then select Accessories.
3. Locate the shortcut Notepad and click the shortcut once.

10
Fig1:A typical Notepad Screenshot

HTML: is a programming language used for creating web pages


HTML: Stands for HyperText Markup Language.

In Notepad you will start a page by creating HTML tags. Example, below;

<Html>
<Head>
<Title> Home page </Title>
</Head>
<Body>
</Body>
</Html>
After creating a website, you’ll need to test it on a web browser to see whether its ok or not.

11
PRIMARY FUNCTION OF A WEB BROWSER
To further press more on web design. The use of a Web browser was explained. A web browser
is a client application that displays your web document. To test a web document that you’ve
created, you need to open a web browser such as Mozilla Firefox, to do this, you normally place
a request. A valid request is given by entering the address of the file. When you insert your
request;
i. It will interpret all Html tags of your web pages.
ii. It will further Display the page, based on the screen

Fig2: A typical screen shot of the Mozilla Firefox Web Browser.

2.3 CONTENT MANAGEMENT SYSTEM: USING JOOMLA

Main Aim of the Joomla Lesson

Joomla as a Content Management System was aimed at showing the use of another technology
for easy web design, other than the traditional Html.

Introduction

12
As one of the platforms for building web sites, the Content Management System technology
allows users to create and edit web sites from a central source. To use this technology, you must
install a local server such as Xampp or Wamp. Being an open source technology based on
Php/MySql, the Content Management System has different platforms for designing such web
sites which include;

 Drupal

 Joomla, and

 Wordpress.

Fig3: Xampp Admin Panel (web server)

During my industrial training, I was introduced to Joomla platform.

13
Fig 4: A screen shot of first Joomla Installation Window showing language settings

Fig 5: Second Joomla Installation window showing pre-installation setting

14
Fig 6: Third Joomla Installation window showing License settings

Fig7; Fourth Joomla Installation window showing database configuration settings

15
Fig 8: Fifth window for Joomla Configuration showing FTP Configuration

Fig 9: The sixth Installation window showing Main Configuration

16
\

Fig 10: The final Joomla Installation window for Joomla 1.5

Fig 11: The Control Panel for Joomla 1.5 Package

2.3.1Extracting and Installing the Joomla Package

The Joomla package can be used for creating websites by;

17
 Extracting the Joomla Package zipped fill on the web server such as Xampp

 After extracting it, you’ll need to install the Joomla website

 Select needed templates and edit your website

 Host the Website

2.4 APPLICATION PACKAGES

The use of some packages becomes common in the Cyber café Department of the place of IT.
Mostly, the Microsoft office (latest vision) for day to day activities of the commission. The
items that contained in the Microsoft office are as follows:-

a) Microsoft word: - This application was taught as a word application software that
enables the user to type, edit, format, checking for spelling and printing his work. Which
I also used practically for typing documents.

To start Microsoft word

 click on start button


 Select All programs
 Click on Microsoft office
 Select Microsoft word Then a page will open for you where you can do whatever you
wish.

18
Fig12:A typical Ms Word 2016 Screenshot
b) Microsoft excel: - this is an application software run through the windows to solve the
problems of graphical representation, calculation, business budgeting, accounting,
statistical analysis, financial analysis e.t.c.
Types of entry
In Excel, you can either enter any of the following characters:
1. Label/Text - These are alphabetic or numeric characters we can enter into the Excel
spreadsheet, which may not be used for calculations. e.g. Names or Address. When
labels are entered, they usually appear at the left side of the cell.
2. Values/Numbers - they are pure numeric characters we can enter for calculations.
When we enter such characters, they are usually displayed by the right side of the

19
screen.

Fig 13: A typical Ms Excel 2016 Screenshot

2.5 DATABASEMANAGEMENT SYSTEM (DBMS)

I was further taught about Database Management System: as a technology for designing and
implementing Databases in Computers. The use of several Database Management Systems
were highlighted. Examples of DBMS are Ms- Access, Oracle DB, My sql, etc

Below are some benefits of Database Management systems;

 Data Integrity

 Allow sharing of Data

 Ensures data security

 Aids Planning

STARTING MS ACCESS
Microsoft Access is a Database Management system that can be used to create and
manage database records. I learnt that the program is also a Relational Database
Management System (RDBMS). As a RDBMS, it can allow a user to create multiple
tables and relate them together.

20
To launch the program on your computer system, you can either find a short cut icon on
the desktop or simply do the following;
 Click on Start Button
 Go to All Programs
 Click on Microsoft Office program
 Choose Microsoft Office Access 2010 or higher

Fig 14: Ms Access 2016 Window for creating a blank database

Fig 15: Window displaying a Blank Database screen

21
Fig 16: The Design View window where a user can create a Database Table

StudentName Class DOB

Saliha Jamil 2C 1/7/94

John Ati 3C 6/8/99

James Augustine 4D 8/3/99

Fig 17: An example of Students Database Table

BRIEF LESSONS LEARNT IN DATABASE MANAGEMENT SYSTEM

Having gone through the Database Management System lessons, I gained a lot of lessons. Here I
bullet point few;

22
Filtering:- I learnt that filtering is the process of extracting a specific category of information
from an existing database table. It helps a lot in database management, especially, where you
intend to see records of workers from a specific State of Local Government Area.

Forms: The use of forms is also another important lesson I learnt. A form is seen as an output
screen that allow a user to input data into an existing database table. Create a form becomes
necessary, especially if you wish to secure the contents of your database table and prevent it
from other to see it

Linking To MS Word (Mail Merge):- this feature is an interesting way for personalizing letter
(mails) for group of individuals which may possess the same contents. It is used in a situation
where you are sending the same type of document to many different people. An example is Quit
notice or Wedding Notification

2.6 NETWORKING COMPUTERS

At this point, I will further explain what was taught about computer networks. It will begin with
the definition and types of network.

A network simply refers to a group of connected computers that enable the users to share
information and equipment together. For an organization to establish a network, there must be a
particular service they intend to share or benefit from, such as printing services, internet services,
sharing of documents, etc

2.3.1 Types of Computer Networks

Basically, we limit the types of computer networks to the following;

a. Local Area Network (LAN) – A connection of two or more computers such as within
the same building. Such networks are connected using cables.

b. Metropolitan Area Network (MAN)- A network of two or more LANs which are
located within the same geographic region. These types of networks are connected using
radio waves.

23
c. Wide Area Network (WAN)- A network of computers that covers a country, a continent
or the entire world. The internet is the largest wide area network in the world.

In the Industrial training, we were taught how to connect systems on a Local Area Network.

To establish a Local Area Network, you need certain tools and equipment as follows;

 Network Cables (Cat 5 cables).

 RJ (registered Jack) connector

 LAN Tester

 Crimping Tool

 Computer with NIC ports.

 Switch/Hub

After obtaining these, you’ll need to do cabling, by crimping RJ 45 connectors to the network
Cables. Cables that were crimped should also be tested to ensure continuity in the packet flow
during network. To do this, a LAN tester is commonly used

2.3.2 Configuring Systems on a Network

To connect computers on a Local Area Network, you must assign a IP address to each one of
them. IP stands for Internet Protocol address, which is a logical address that is given to each
computer system on a network. Before assigning an IP address, one must verify whether there is
a NIC Driver (i.e software that interface between your computer and the network resources)

To assign an IP address to your computer system in Windows 7;

 Right click on the network icon at the task bar

 Select Open network and sharing centre

 Click on change adapter settings at the top left side of the window

 Right click on the Local Area Connection Icon, and select properties

24
 Select Internet Protocol Version 4 (TCP/IPv4)

 Click on properties button

 Assign the IP address eg 192.168.0.1

 Set the sub net mask to 255.255.255.0

 Click on Ok, to clear the dialog boxes

Note: Once an IP address is assigned to each computer and cables are connected, the Local Area
Connection will be established. It is now be the role of the Network administrator to either share
documents or service (e.g printing services) on the network.

2.4 INTRODUCTION TO SOFTWARE ENGINEERING

In general, Software Engineering was introduced to us as an Engineering discipline that is


concerned with all activities involved in software production. The history of this discipline was
discussed as well as its future prospects. The entire lesson is divided into the following;

 Introduction to Software Engineering


 Software Documentation
 Principles of Software Design
 Software features
 Implementing A Software, etc

The lesson clearly discussed the concept of a Computer software been different from just a mare
computer program. A Software is seen as a computer program with its associated documentation
as well as other supporting files that makes the product to operate smoothly on the users
machine.

I was further taught the art of visual programming. The Visual Basic 6.0 was the programming
language that I leant

25
To load the Microsoft Visual Basic environment, you can locate the application at the programs
menu. In other version earlier that windows 8, you can locate the program under Microsoft
Visual Studio 2012.

The program support the design and implementation of both desktop and web applications .It
allow programmers to design programs visually. Due to its flexibility, it has tools as well as a
code window writing event procedures

26
CHAPTER THREE

3.1 SUMMARY OF DUTIES

My Six Month SIWES experience from the commencement of the Orientation to the last day has
been summarized into a tabular format as shown below

WEEKS ACTIVITIES DONE LESSONS

WEEK1 Orientation about the IT place Orientation about the place

WEEK2 Software Engineering Introduction How to design a Software and all


necessary processes

WEEK3 Project on Software Engineering A team work as setup for all IT


students to develop a software project

WEEK4 Software Application I was exposed to so many


applications on a Computer

WEEK5 2023 GENERAL ELECTION BREAK ELECTION BREAK

WEEK 6 2023 GENERAL ELECTION BREAK ELECTION BREAK

WEEK 7 2023 GENERAL ELECTION BREAK ELECTION BREAK

WEEK 8 Visual Basic I learnt how to declare variable,


dialog box and clipboard tool

WEEK 9 Visual Basic I was able to create login form usig


Visual Basic, and also learnt about
concatenation

WEEK 10 Introduction to Database I was taught about Database ad


RDBMS Database

WEEK 11 Database Design I learnt relationship, entities and table


in database design

27
WEEK 12 Database Implementation I was taught how to implement
database using MS-ACCESS and to
link database to other application

WEEK 13 Database Implementation I was taught how to implement


relationship in database by creating
different tables and linking them
using, I also learnt query

WEEK 14 Introduction to SQL I learnt the concept of SQL


commands and how to create report I
MS-ACCESS

WEEK 15 Introduction To Website Structure using I learnt the concept of Website


HTML Structure using HTML using notepad

WEEK 16 Introduction to web design using HTML I learnt how to design a website
structure using HTML tags

WEEK 17 Website Home Page I was able to create some web page
features like home page, contact us,
about us and logo

WEEK 18 Content management System Joomla was taught as a Content


Management System

WEEK 19 Content management System template I was taught how to change template
and how to install Joomla

WEEK 20 Joomla Menus I was taught search engine


optimization

WEEK 21 Hosting of Web site I was taught hosting of web site

WEEK 22 Introduction To Networks I learnt the concept of Computer


Networks

28
WEEK 23

Introduction to Cyber Security Cyber Security was introduced

WEEK 24 Project on Cryptography I used Caesar Cipher for projects

CHAPTER FOUR

4.1 INSTALLING A PROGRAM

29
Installing a program simply imply that the computer technician transfers a copy of a software
application from a storage media such a Compact Disk(CD) or an External Hard disk into the
target computer system.

Before carrying out program installation, the target computer needs an adequate space or
a minimum system requirement which is often specified by the manufacturers of the software in
question.

4.2 PROCEDURE FOR INSTALLING AN APPLICATION

Normally, to install an application into a computer system, the technician needs to follow the laid
down procedures as spelled out below;

1. Insert the CD Rom in to the computer (if using an external Hard disk, insert it into the
target computer)

2. When prompted, locate the set up file for the application and double-click on it. If
prompted with an Auto run interface, click on the Install option.

3. Follow the installation wizard’s instructions to the end.

4. Enter the product key for the application (if it has one).

5. Complete the installation.

Note: Some manufacturers require that the entire system be re-started in order for the
installation to take effect.

3.3 TESTING THE INSTALLED APPLICATION

To test an installed software, whether its properly installed, the user needs to load the program
from the desktop. In this case, we are using the Windows XP operating system.

To load the application;

 Click on Start from the Desktop

 Select All-Programs

30
 Locate the specific program folder

 Click on the program file to load the newly installed application

Sample screen shots for installing applications on a Computer is resented at the appendix

31
CHAPTER FIVE

CHALENGES, RECOMMENDATION, SUMMARY AND CONCLUSION

5.1 CHALENGES

During my Industrial Training program, l noticed some of the challenges faced by the
organization and these include:

1. Few computer facilities in the lab.


2. Inadequate organization of activities
In another view, I also observe lack of unity and at times lateness in coming, of which
some complain of distance and sometimes lack of transportation.

5.2 RECOMMENDATION

Having observed the problems during the program, the following solution is highly
recommended to enhance smooth operations in Matrix Solutions Enterprises.

1. The organization should employ more hands in the place, in order to help with work
burden
2. If possible, more computer facilities should be added.
3. Students should be given allowances for IT before coming for the exercise to
cushion the effect of transport difficulty.

5.3 SUMMARY

At the climax of the SIWES program, I observed that the exercise gave me the opportunity to
see myself in real life working condition. Even though it was a very challenging task, but It
gave me the opportunity to broaden my thinking abilities, display the things that I have learnt
and put most of them into practice. The challenges of modern industrial technological
environment.

32
2.4 CONCLUSION

Having known that the primary aim of SIWES is to expose students to practically oriented
courses as found in the real life industry before the end of their program, the entire
exercise has really provided me and several others with the opportunity to work and
have experiences in a real life scenario. Indeed it was not an easy task but I really appreciate
the effort made by the Federal Government and the policy makers in the establishment and
initiating the move to setup SIWES scheme for students.

33
REFERENCES

1. Smart Jude (2016) Introduction to Content Management System: Using Joomla

2. Wikipedia, the free encyclopedia ;computer. http://en.wikipedia.org/wiki/computer

3 Smart Jude (2017); Introduction To Cryptography (unpublished Textbook)

4. Olaiyo Ayole (1998); training for industrial development in Nigeria. Ehindero Nig. Ltd. Jos.

5. Smart Jude (2015): Introduction To Database Management Systems Using MS Access


(unpublished textbook)

5. William H, Gates (1999) Business At The Speed of Thought

34
APPENDIX

MISCELLANOUS

Installing Coreldraw 13

Double click to Open the program

Choose the features to Install

35
Begin installation

Launching the application on your system

36
Installing Microsoft Office 2007

Double Click on the Application to begin installation

Choose Install Now to Begin Installation

37
Choose the licensed agreement to proceed

Installing an All-In-One-Keylogger

1 Double click the setup file


2 Continue the Installation

Enter the Password to always open the keylogger

38
Configure the Keylogger

39

You might also like