0% found this document useful (0 votes)
12 views14 pages

Field Log Book

Uploaded by

Allan Haule
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views14 pages

Field Log Book

Uploaded by

Allan Haule
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Day one (15/07/2024)

 I worked on HP printer to assign Ip address manually sconce it was


shared printer and was put to assign ip address automatic which lead
to the failure on offering printing services. Thus we assign it manually
to allow it to be shared and the printer was wireless.
 We worked on cellular phone which lost signal due to default on UTP
(unshielded twisted pair) cable which was from access switch we use to
track the default area using cable tracker or cable tracer.
WIRE TRACKER
wire tracker is a tool used to locate and trace wires and cables within a
system. Here are its primary functions:

1. Locating Wires: It helps electricians and technicians find the


exact path of wires behind walls, floors, ceilings, or underground
without causing damage.
2. Identifying Circuits: Wire trackers can identify specific circuits
and breakers, making it easier to troubleshoot electrical issues.
3. Detecting Faults: They are used to locate faults such as breaks,
shorts, or open circuits in wiring systems.
4. Mapping Connections: Wire trackers help map out connections in
complex wiring systems, ensuring proper wiring integrity
R2-D2

CRIMPING TOOL
crimping tool is used to join two pieces of metal or other ductile
material by deforming one or both of them to hold each other. Here are
some common uses:

1. Electrical Work: Crimping tools are often used to attach


connectors to the ends of cables, ensuring a secure and reliable
electrical connection. This is crucial in wiring applications for
electronics, telecommunications, and automotive industries.
2. Networking: They are used to attach RJ-45 connectors to
Ethernet cables, which are essential for creating network
connections.
3. Jewelry Making**: Crimping tools are used to secure clasps and
other components to jewelry wire, creating strong and durable
connections.
4. Plumbing: In some cases, crimping tools are used to join pipes
and fittings, ensuring a leak-proof seal

 I studied java languages


In Java, a method is a block of code that performs a specific task.
Methods are used to perform certain actions, and they are also known
as functions. Here's a breakdown of how methods work and the
different types of methods in Java:

Types of Methods
1. User-defined Methods: These are methods created by the
programmer to perform specific tasks.
2. Standard Library Methods: These are built-in methods provided
by Java's standard library, such as `System.out.println()`.

Declaring a Method

The basic syntax to declare a method is:

returnType methodName(parameters) {
// method body
}

ReturnType: The type of value the method returns. If the method does
not return a value, its return type is `void`.
methodName: The name of the method.
parameters: Values passed to the method (optional).

Example of a User-defined Method

Here's an example of a simple method that adds two numbers:

public class Main {


// create a method
public int addNumbers(int a, int b) {
int sum = a + b;
return sum;
}

public static void main(String[] args) {


int num1 = 25;
int num2 = 15;

// create an object of Main


Main obj = new Main();

// calling method
int result = obj.addNumbers(num1, num2);
System.out.println("Sum is: " + result);
}

In this example:
 The method `addNumbers` takes two parameters `a` and `b`, adds
them, and returns the sum.
 The method is called in the `main` method using an object of the
`Main` class.

Example of a Standard Library Method

Java provides many built-in methods. For example, the `Math.sqrt()`


method calculates the square root of a number:

public class Main {


public static void main(String[] args) {
double number = 25.0;
double result = Math.sqrt(number);
System.out.println("Square root of " + number + " is: " + result);
}
}

Different Ways to Use Methods

Method Overloading: Creating multiple methods with the same name but
different parameters.
public class Main {

// method with two int parameters

public int multiply(int a, int b) {


return a * b;
}

// method with three int parameters


public int multiply(int a, int b, int c) {
return a * b * c;
}

public static void main(String[] args) {


Main obj = new Main();
System.out.println("Product of 2 and 3: " + obj.multiply(2, 3));
System.out.println("Product of 2, 3, and 4: " + obj.multiply(2, 3,
4));

Static Methods: Methods that belong to the class rather than an instance
of the class. They can be called without creating an object of the class.

public class Main {


// static method
public static void displayMessage() {
System.out.println("Hello, World!");
}

public static void main(String[] args) {


// calling static method
displayMessage();

}
Recursive Methods: Methods that call themselves to solve a problem.

public class Main {


// recursive method
public int factorial(int n) {
if (n == 0) {
return 1;
} else {
return n * factorial(n - 1);
}
}

public static void main(String[] args) {


Main obj = new Main();
System.out.println("Factorial of 5: " + obj.factorial(5));
}
}

Day two (16/07/2024)

 Working on computer that fail to power on that is it solved by replacing


new power cable then the problem solved
 Also working on network to due to failure of receiving Internet. Also the
system structure is secure since it only allow user to access account
once he/she is login to institution system via browser this was
happening on 4 computers. We use wire tracker to identify the
connections as well as faults.
1. One of Ethernet wire been scratched

The problem was solved when the cable connection on switch. And
there we just exchanged ports and make connection again

 DOMAINS
DNS
Joining computers on domain
A domain is a unique address used to identify a website on the
internet. It's what you type into your browser to visit a website, like
`www.example.com`. Domains are essential for branding, SEO, and
making websites easily accessible.

Here are the main types of domains with examples:

Top-Level Domains (TLDs):


- These are the highest level in the domain name system hierarchy.
They appear at the end of a domain name.
- Examples: `.com` (commercial), `.org` (organizations), `.net`
(networks), `.info` (informational sites).

Country-Code Top-Level Domains (ccTLDs):


- These are specific to countries or regions.
- Examples: `.us` (United States), `.uk` (United Kingdom), `.tz`
(Tanzania).

Generic Top-Level Domains (gTLDs):


- These are newer TLDs introduced to provide more options beyond
the traditional ones.
- Examples: `.app`, `.blog`, `.shop`.

Second-Level Domains (SLDs):


W - These are directly to the left of the TLD and often represent the
brand or name of the website.
- Example: In `www.example.com`, `example` is the SLD.

Subdomains:
- These are extensions of the main domain, used to organize different
sections of a website.
- Example: `blog.example.com` where `blog` is the subdomain.

Domains play a crucial role in how we navigate the internet and


establish online identities.

DDay03
 Network and internet issue on computer within a domain
 Complete installation of (Microsoft office, Kaspersky, Chrome, sofos
ssl VPN, and ultraviewer to make an easier way to utilize institution
services
Day 6

Switch installation

Broadcast domain

Collision domain

Routing is done to path info from one class of Ip address to another class so
as to ensure communication.

QN

FUNCTIONS OF ROUTERS.

What is routing.

Function of Ip Address

Data mbps

Afrinic africa network providers

Console cable used to connect devices and switches before putting an IP


address

Putty is an application that used to indicate which way can be used in


connecting with switch

Serial port on switch

Device manager

IOS – Internetworking os

Flashfs. Container that hold actions used on switch configuration

Uplink is a stage of making two switches looks together switch port trunk

Day 19

Printer inasenser nyingi kusfisha hatutumii blower yenye nguvu. Na


sensa zinaweza kusababisha malfunction. Pia printer inatabia ya
kuhold katika maana ya kwamba inatunza taarifa za zamani hivyo
upelekea hata kama. 0p

Local installation using usb.

Plug and play kwmba driver y printer inakuwa installed


automatically

Zero day – ni kwamba kitu kimetengenezwa tu na hapohapo


ikajaribiwa kwa kuhack ambapo hiyo mbinu haijawahi tokea.

Duplexer ni kifaa ambacho kinafanya printa iprinti 2 sided ziko za


aina mbili ya photocopy na kuprin

Mkataba lazima iprintiwe 2 sided for security issues

Single path na two path

Printer inaweza kuwa shared na computer moja ikatumika kua kama


server yaana ikaruhusu computers zingine ziwa nina printi kutlpitia
hiko.

Day 21

Tumetengeneza shared folder na tumeshare pia tumeinstall scanner

Camera tracing haionekani kwenye NVR stands for NETWORK VIDEO


RECORDER hapa ni pahala ambapo video zote zinazo kua tracked na
camera zina ifadhiwa.

Day 22

Switch configuration

Docker ni virtual machine learning

Nimetatua tatizo la kupotea kwa chrome kwa sababu ya kersperky


kw aku install chrome mpya

Day 26

Partitions of disk na nimerudishia partititon kidogo kwen

Windows server

Standard CLI

Standard GuI
Datacenter

Datacenter GUI

Upgrade

Costum

Reasons for not installed

Eft

Microsoft Reserved Partition

Tumeinstall sever now tunataka kufanya configuration ili kuspecify


service gani itolewe kwa client

Sever inatakiwa iwe manegable server

Red ni the way ambavyo unaifadhi data zisipotee.

Kwenye red kuna harddisk nyingine inakua kama unahar

Sifa za red na sababu zake na hasara zake

Server inatakiwa iwe inafanyiwa monitoring na inatakiwa iwe set


katika security na alert ⚠️📢

Inaweza kukutumia sms au email

Day 27 21th Aug 2024

Active directory learning

Firewall configuration ili kuruhusu ping command kufanikisha


maongezi ya devices kwenye network

Naming conversation ni mtindo wa jina lako linakuaje


User atakiwi kuamini kua admin anajua password ingawa ni kweli
anaijua lakini haitakiwi kuaminika kwmba anaijua ni principle ya
usalama kwa admin yatokeapo majanaga.

Users hua afutwi ila anakua disabled

Kitu cha kujifunza ni Microsoft management console MMC

Abapo

Day 28

Active Directory Domain services AD DS installation on server and


its role and features

DNS stand for domain name system installation ambapo inakua


inafanya name conversion tcp/ip

Ambapo AD DS na DNS hua zinafanya kazi pamoja yaani


vinategemeana

Vitu vya kusoma

Hy

Day 29 date 23th August 2024

Ili kuadd computer iwe kwenye domain unatakiwa kuwa na vitu


vitatu

1. Ujue administrator username na password


2. Computer inatakiwa iwe na dns server ip address
3. Ping server

Tume join computers kwenye domain iliotengenezwa na tunate


geneza users kwenye servernimetengeneza user kwenye server na
nitry kulogin kwa account ya user kwnye computer zilizopo kwenye
domain

Unatakiwa kutengenza organization structure ambayo inakua


inasaidia kufanya management

Nimetengeneza mfano wa structure ya organization ambapo


zimekua zina

Now group policies

Password policy

Single login ni pale ambapo kunakua na systems nyingi ambapo


inakua tedious kwa users kukariri Passwords zot

Day 30 Date 26th August 2024

Tumesoma kuhusu User account creation na locking situation na


disabling them after the rise of different reasons

Computer accounts creation

Joining an offline using cli Djoin.exe

Day 31

Flutter installation

Creation of computer account, user account and deletion

Creation of boolean functions

Day 32

Learn and practice about enumeration as used in programming

Add and Installing scanner to a computer.


Day 33

Scanner

Host name ni computer name kwa jina jingine

Name ni jina litakatokea kwa printer

Folder path inapatikanaa kwenye share forder

User Name ni yule user ambaye yupo kwenye computer husika na


anapermision ya kuright

Lazima tuweke password

Command ya kuangalia user ni <net user>

Protocal ni sheria au kanuni ambazo zinamruhusu userr kufika na


kuchakata kile anacho kitafuta online

Logic ya kushare folder kwa everyone ni kama devices haipo kwenye


domain au ni local

Kwenye share folder kutoa permission ya read and write maana ake
aweze kutuma documents kwenye hiyo computer

Kwenye advance option

Tunaprefer group ili kuraihicsha

Ntfs ni permission

Procedure 01 kwenye Brower kwenye scanner

Procedure 02 ni kutengeneza share folder kwenye pc husika

Procedure 03 ni kuallow advance sharing kwenye control

Day 34 30th August 2024


Creating group policies to the computers

User on log on message text

Hiding desktop icons

Day 35 2nd September 2024

Pushing project on github using gitbush

Learn about superglobals on php

Day 36

Windows 10 enterprise installation and actvation on my pc

Changing computer name so as it can be added to the domain

Day 37

Group policies and computer policies to restrict usage of computer

Windows installation in a desktop and backup drivers. Installation


was done without formatting targeted disk

Cleaning desktops, switch and router kwa puliza vumbi ambapo


tulitumia blower. Preventive maintenance

Day 38

Learn about batch files programming language and its interpreter

Creating functions

Day 39

Php installation

Excel usage

Introduction to ethical hacking


Day 40

Tumeondoa data cabinet na router nakuzirudisha hq kwaajiri ya


kutumia sehemu nyingine

You might also like