computer science internship report

53
i MAKERERE UNIVERSITY COLLEGE OF COMPUTING AND INFORMATION SCIENCES SCHOOL OF COMPUTING AND INFORMATICS TECHNOLOGY A REPORT ON FIELD ATTACHMENT /INTERNSHIP AT Uganda Broadcasting Corporation Field attachment period (June 6 th -August 1 st ,2016) BY KAAHWA ARMSTRONG 14/U/288 Field attachment Report submitted to the School of computing and informatics Technology In Partial fulfilment of the requirements for the degree of Computer Science of Makerere University Kampala Name of student: KAAHWA ARMSTRONG Signature: ______________________________________ Date: _________________________ Name of Academic Supervisor: Mr. KIZITO JOHN Signature: ______________________________________ Date: _________________________ Name of Field Supervisor: ONGIIMA PATRICK Signature: _______________________________stamp & Date: _________________________

Upload: kaahwa-armstrong

Post on 15-Apr-2017

382 views

Category:

Education


65 download

TRANSCRIPT

Page 1: computer science  internship report

i

MAKERERE UNIVERSITY COLLEGE OF COMPUTING AND INFORMATION SCIENCES

SCHOOL OF COMPUTING AND INFORMATICS TECHNOLOGY

A REPORT ON

FIELD ATTACHMENT /INTERNSHIP AT

Uganda Broadcasting Corporation

Field attachment period (June 6th-August 1st ,2016)

BY

KAAHWA ARMSTRONG

14/U/288

Field attachment Report submitted to the School of computing and informatics Technology

In Partial fulfilment of the requirements for the degree of Computer Science of Makerere

University Kampala

Name of student: KAAHWA ARMSTRONG

Signature: ______________________________________ Date: _________________________

Name of Academic Supervisor: Mr. KIZITO JOHN

Signature: ______________________________________ Date: _________________________

Name of Field Supervisor: ONGIIMA PATRICK

Signature: _______________________________stamp & Date: _________________________

Page 2: computer science  internship report

ii

DECLARATION

I KAAHWA ARMSTRONG hereby declare that the information in this report is my own original

gathered authentic work. It also makes practical and effective fulfilment of the purposes and

objectives of this field attachment, and the content of the document has never been previously

submitted to any other university or institution for a higher degree or any other award. Except for

Citations, Quotations and References to other people’s work used where otherwise acknowledged.

Signature……………………………………. Date……………………

Page 3: computer science  internship report

iii

ACKNOWLEDGEMENT

First and foremost, I would like to acknowledge the Almighty God for the successful completion

of the Field Attachment period.

I would like to say thanks to Uganda broadcasting corporation for the opportunity given to me as

an intern in the Information technology section.

Special thanks go to my academic supervisor Mr. Kizito John, internship coordinator Mr. Michael

Kizito of College of computing and information sciences Makerere University.

Many thanks to my field supervisors Mr. Ogiima Patrick and Mr. Tusiime Lucas for their personal

efforts, practical skills, professional guidance and direction towards successful internship.

Finally, I would like to extend my heartfelt gratitude to my family members especially my mother

BIRUNGI MAGRET for all the support, classmates and other friends for their invaluable support

throughout my training.

Page 4: computer science  internship report

iv

ABSTRACT

I carried out my internship at Uganda Broadcasting corporation under the information Technology

department.

Under networking, I dealt with setting up, administering, maintaining and upgrading

communication systems, and also local area networks and wide area networks for the organization.

The activities carried out included cable termination, over view of network topologies, setting up

LANs, router configuration, printer configuration on networks, basic networking software

installation (Cisco IOS).

Under Web development, the field supervisor overviewed basic understanding of web

technologies (client side, server side and databases) using WordPress, database management using

MySQL.

Under computer maintance and repair, I dealt with basic hardware installation (RAM,

HARDDISK, CD-ROM), basic operating system installation and activation i.e. windows

xp,7,8,10, system restoration, file recovery, data backup, Wi-Fi hotspot creation, installation of

Windows Server 2008 R2.

Through work and experiences, I attained networking, trouble shooting, team work, leadership

skills, interpersonal and research skills.

The challenges faced include: lack of enough equipment, faulty equipment i.e. CD ROMs, RAM,

and crimping tool, poor internet connection, failure in troubleshooting for Windows service

failures, understanding new technical terms.

In my conclusion internship at UBC was so productive with practical hand on skills attained from

the different field supervisors.

I recommend that We as students need to be taught much more of practical skills in class than

theory and be given more time for practice.

Page 5: computer science  internship report

v

TABLES OF CONTENTS

DECLARATION ............................................................................................................................ ii

ACKNOWLEDGEMENT ............................................................................................................. iii

ABSTRACT ................................................................................................................................... iv

LIST OF TABLES ....................................................................................................................... viii

LIST OF ACRONYMS/ABBREVIATIONS. ............................................................................... ix

2.2.1. CHAPTER ONE INTRODUCTION ................................................................................ 1

1.1. introduction .............................................................................................................................. 1

1.2. Background of the field attachment ......................................................................................... 1

1.3. Objectives of the field attachment ........................................................................................... 1

1.4. Background of the Organization of Field attachment. ............................................................. 1

1.5. Organisational culture .............................................................................................................. 2

1.6. The structure of the organisation ............................................................................................. 3

1.7. The main activities of the organisation and ongoing IT projects ............................................. 4

2.2.2. CHAPTER TWO STUDENT’S EXPERIENCES ............................................................ 5

2.1. Title or position occupied in an organization .......................................................................... 5

2.2. Duties and responsibilities. ...................................................................................................... 5

2.3. Supervision levels and relationship with the supervisor ........................................................ 21

2.4. Work team and its composition ............................................................................................. 21

2.4. Working relationship among the team members and staff .................................................... 22

3.0. CHAPTER THREE EVALUATION ON FIELD ATTACHMENT ................................. 23

3.1. Level of accomplishment of duties and responsibilities assigned ......................................... 23

3.2. New knowledge and skills gained in each of the duties and responsibilities ........................ 23

3.3. Most interesting experiences. ................................................................................................. 24

Page 6: computer science  internship report

vi

3.4. Relatedness of university’s taught programs to the field work .............................................. 25

3.5. Challenges faced and how managed ...................................................................................... 25

3.6. Benefits derived from field attachment .................................................................................. 26

3.7. Adequacy in university’s preparing the student for field attachment .................................... 27

3.8. Preparedness of the agency to receive and manage students for field attachment ................ 27

3.9. Career Motivation .................................................................................................................. 27

4.0. CONCLUSIONS AND RECOMMENDATIONS ................................................................ 27

4.1. Conclusions ............................................................................................................................ 27

4.2. RECOMMENDATIONS ....................................................................................................... 28

References ..................................................................................................................................... 29

Appendices .................................................................................................................................... 30

Page 7: computer science  internship report

vii

LIST OF FIGURES

Figure 1.1: Organizational structure for Uganda Broadcasting corporation ................................... 3

Figure 2.1: layers of the OSI model ................................................................................................ 6

Figure 2.2: Illustration of common physical topologies ................................................................. 6

Figure 2.3: Network Structure for UBC Administration block ...................................................... 7

Figure 2.4: Illustration showing how to create a straight-through cable ........................................ 8

Figure 2.5: Illustration of the T-568B Straight-Through Ethernet Cable ....................................... 8

Figure 2.6: Illustration of the T-568B Straight-Through Ethernet Cable ....................................... 9

Cable termination for the different cable standards involves the following ................................... 9

Figure 2.7: illustration showing finding ip and MAC addresses. ................................................. 10

Figure 2.8: shows screen shot of add printer wizard running ...................................................... 11

Figure 2.9: shows screen shot of shared printer in the add printer wizard .................................. 11

Figure 2.10: Illustration of the DHCP lease process ..................................................................... 13

Figure 2.11: shows the difference between DDR and DDR2 ....................................................... 14

Figure 2.12: shows IDE and SATA connector ............................................................................. 15

Figure 2.13: indicating screen shot of the select command in MySQL ........................................ 16

Figure 2.14: Screenshot showing a table selected from products using php MyAdmin console . 16

Figure 2.15: shows activated windows ......................................................................................... 18

Figure 2.16: showing how UBC’s domain controller with the clients ......................................... 20

Page 8: computer science  internship report

viii

LIST OF TABLES

Table 2.1: tasks completed and supervisors in charge. ................................................................... 5

Table 2.2: showing windows activation errors causes and solutions ............................................ 19

Table 3.1: showing relevance of computer science curriculum to field attachment ..................... 25

Page 9: computer science  internship report

ix

LIST OF ACRONYMS/ABBREVIATIONS.

UBC Uganda broadcasting corporation

IT information technology

UTV Uganda television

RAM Random Access Memory

ROM Read Only Memory

LAN Local Area network

WAN Wireless Area Network

WI-FI Wireless Fidelity

SQL Structured Query Language

CLI Command Line Interface

DNS Domain Name System

IP Internet Protocol

ISPs Internet Service Providers

IANA Internet Assigned Numbers Authority

DHCP Dynamic Host Configuration Protocol

APIPA Automatic Private IP Addressing

NetBIOS Network Basic Input/output System

TCP/IP Transmission Control Protocol/Internet Protocol

AD DS Active Directory Domain Services.

CMOS Complementary Metal Oxide Semiconductor

WPA Windows Product Activation

Page 10: computer science  internship report

1

2.2.1. CHAPTER ONE INTRODUCTION

1.1. introduction

This field attachment report is about the skills attained, lessons learnt, challenges, relatedness of

theory covered in class and recommendations during my internship placement at Uganda

Broadcasting corporation(UBC) from 1st June to 1st august 2016 see “appendix A”. The report also

represents my experiences, recommendations and benefits of the field attachment.

1.2. Background of the field attachment

Field attachment is a field-based practical training experience that prepares trainees for the tasks

they are expected to perform on completion of their programs. The main intention is to produce

practically oriented graduates that meet the required job-related competences of their future

employers

1.3. Objectives of the field attachment

To enable students, get hands-on/real life experience they are expected to work in when

they graduate.

To provide an opportunity for students to apply the principles and techniques theoretically

learnt into real-life problem solving situations.

To provide an opportunity for students and academic staff to interact with the stakeholders

and potential employers and thus appreciate field situations that will also generate

information for curricula review and improvement.

To develop student understanding of work ethics, employment demands, responsibilities

and opportunities.

To enhance and strengthen linkages between Makerere University and various

stakeholders.

1.4. Background of the Organization of Field attachment.

Uganda Broadcasting Corporation is the public broadcaster of Uganda. Formally Uganda

Television and Radio Uganda (the current Uganda Broadcasting Corporation) was born in 1963

one year after Uganda’s independence. However, radio was born in Uganda in 1954 and TV came

in nine years after that. Its main aim was to broadcast through both mediums to the whole country

as the national broadcaster.

Page 11: computer science  internship report

2

After independence till the mid 1980’s Uganda was faced with a lot of economic hardships. As a

result, Ugandan Government saw the need to restructure the former Uganda Television and Radio

Uganda. As a result, Parliament passed the Uganda Broadcasting Corporation Act that established

the Uganda Broadcasting Corporation in 2005. This transformed the former UTV and Radio

Uganda into the now existent Uganda Broadcasting Corporation. The Corporation started its

activities on 16th November, 2005.

The Corporation is fully owned (100%) by the Government of Uganda and carries out its activities

for and on behalf of the Government. It therefore requires government funding in order to sustain

its operation.

Vision

Broadcasting quality programs for national development.

Mission

To inform, educate, guide and entertain the public through maintaining a suitable national

coverage.

Objectives

To develop the broadcasting bodies into a public national broadcasting centre of

excellence, for the purpose of providing electronic media and consultancy services that

educate and guide the public.

To achieve and sustain comprehensive national radio and television coverage.

To achieve and sustain a common carrier status.

1.5. Organisational culture

1.5.1. values

In executing its mandate, UBC is committed to espouse the values of: Trustworthiness, Fairness,

Equal opportunity, Ethical conduct, Integrity, Transparency and Professionalism.

1.5.2. Beliefs

All workers must adhere to UBC principles. And must commit working hours to official duties

Page 12: computer science  internship report

3

1.6. The structure of the organisation

Figure 1.1: Organizational structure for Uganda Broadcasting corporation

FINANCE AND

ADMINISTRATION

BOARD OF DIRECTORS

MANAGING DIRECTOR

HEAD OF

ENGINEERIN

G

TV MANAGER MARKETING & BUSUNESS

DEVELOPMENT MANAGER RADIO

MANAGERS

HUMAN

RESOURCE

MANAGER

PRESENTERS PRODUCERS PRESENTERS PRODUCERS SALES

MANAGER

SALES

EXECUTIVE

MARKETING

OFFICERS PROCUREMEN

T OFFICER

MANAGEMEN

T ACCOUNTS

STORE’S

OFFICER ACCOUNTI

NG

ASSISTANT

CASHIE

RS

ADMINISTRATIVE OFFICER

ASSISTANT

ADMINISTRATOR

CORPORATION

SECRETARY

HUMAN RESOURCE

OFFICER

IT

DEPT

Page 13: computer science  internship report

4

1.7. The main activities of the organisation and ongoing IT projects

short wave (SW) transmission and Medium wave(MW) transmission.

Online radio and TV streaming.

Reconstruction of organisation website(www.ubc.ug).

Restructuring of the organisation networks(LAN).

Repair and maintaince of the organisation’s IT equipment i.e. computers and installation

of the basic softwares used.

Page 14: computer science  internship report

5

2.2.2. CHAPTER TWO STUDENT’S EXPERIENCES

2.1. Title or position occupied in an organization

For the two months of the field attachment, I occupied the position of a full time Intern with work

schedule from Monday to Friday 9:00am to 4:00 pm at UBC as indicated in “Appendix A”.

Additionally, I worked with other staff occupying other different positions at the company, thereby

doing a wide range of roles.

2.2. Duties and responsibilities.

The following are the main duties and responsibilities that I undertook during the field attachment

at Uganda Broadcasting corporation.

Activity Supervisor

General Orientation Mr. Ongima Patrick

Tour around UBC premises

Review of OSI models and network topologies

Mr. Tusiime Lucas

Operating systems and other application software

installation

Cable termination

Computer repair and maintenance

Mr. Tusiime Lucas

Database design

Web development(websites)

Mr. Ongima Patrick

Ethernet and Cable termination

Data Recovery

Mr. Tusiime Lucas

Research about Domain controller and active

directory

Installation and configuration of windows server

2008 R2

Mr. Ongima Patrick

Table 2.1: tasks completed and supervisors in charge.

Overview of OSI models and network topologies.OSI reference model describes

how information from a software application in one computer moves through a

network medium to a software application in another computer. It is a conceptual

Page 15: computer science  internship report

6

model composed of seven layers, each specifying particular network functions.

Figure 2.1: layers of the OSI model

Network topologies. A topology is a usually schematic description of the arrangement of

a network, including its nodes and connecting lines defined either physically or logically.

categories of physical topologies include: ring, mesh, tree, star, bus,

Figure 2.2: Illustration of common physical topologies

Page 16: computer science  internship report

7

The UBC network topology in the administration block is a composition of different

network topologies like star, bus, and tree

Figure 1.3: Network Structure for UBC Administration block

Page 17: computer science  internship report

8

General review of Ethernet cables and Cable termination

The TIA/EIA 568-A standard made in 1995, and then replaced by the TIA/EIA 568-B standard in

2002 and has continuously been updated. Both standards define the T-568A and T-568B pin-outs

for using Unshielded Twisted Pair cable and RJ-45 connectors for Ethernet connectivity.

The figures below show the different colour arrangements of the different cable standards

Figure 2.4: Illustration showing how to create a straight-through cable

Figure 2.5: Illustration of the T-568B Straight-Through Ethernet Cable

RJ-45 Crossover Ethernet Cable

This is used to connect two Ethernet devices directly with T-568A and T-568B at the other end

without a hub or connecting hubs together

Page 18: computer science  internship report

9

Figure 2.6: Illustration of the T-568B Straight-Through Ethernet Cable

Cable termination for the different cable standards involves the following

First trimming and Stripping the Ethernet cable to about 1 and ½ inch, then untwist the pairs,

arrange them to the required order either straight through or crossover, cut them to 1 inch with flat

end, fix them firmly into the RJ 45 connector ensuring that the ends touch the face of the connector,

fix them tight using a crimping tool, test them using a tester or using two end devices.

Finding ip and MAC addresses of a network card on a computer

Due to the need for connecting computers to printers and other resources, ip addresses were

always required.

The steps involved include the following

1. Press the Windows Start key to open the Start screen

2. Type cmd and press Enter to launch the command prompt run it as an

administrator then use a command ipconfig/all

Note when looking for mac address check out for physical address and ip address it is ipv4

address as indicated in figure below

Page 19: computer science  internship report

10

Figure 2.7: illustration showing finding ip and MAC addresses.

Setting up a network printer

One of the important things to note is that any network printer must have an IP address and a NIC

and the steps include:

Powering the computer and printer then configure their IP addresses. Go to printers and devices

while in control panel, add a printer, then select the above printer from the available ones on the

populated list, follow the instructions until you reach the add Standard TCP/IP printer port Wizard

started and click Next to continue, a prompt to enter the printer name or IP address which by

default becomes the port name will appear. Another prompt window to print a test page will be

displayed then Select yes, and click next.

Page 20: computer science  internship report

11

Figure 2.8: shows screen shot of add printer wizard running

Figure 2.9: shows screen shot of shared printer in the add printer wizard.

Page 21: computer science  internship report

12

router configuration

The important precautions noted before configuration are: regardless of equipment brand

or model identification of the router WAN port and router LAN port was necessary

location of proper cables to connect the physical LAN and specifically for Cisco router

configuration due to need for proper plugin in the correct cable to the router WAN, LAN,

and CONSOLE ports.

configuration the router software setup (iOS), configuration of the router to have the proper

IP connection scheme such as DNS, IP subnets, etc. in order to make a proper LAN

connection work.

For Using the CLI (Command Line Interface) basic configuration on one of the machines,

installation of the terminal simulator software (HyperTerminal program) was done.

The other basic router configuring steps on a network(LAN) include the following.

Ensuring the router is working as expected, by setting several things were need

be such as: setting the router to do ip routing and keeping the manufacturer's

suggested settings.

Entering the interface configuration mode.

Typing in the interface IP address and subnet mask (configuring ip addresses).

Issuing "no shutdown" command to bring up the interface.

Exiting the interface configuration mode to global configuration mode.

In the global configuration mode, enter the default gateway.

Testing and Saving the configurations.

Overview of Addressing and Name Resolution

This involved reviewing the types of ip address and their uses that is to say

Public IP Addresses: Which are used for a computer to be visible on the Internet. The IANA

assigns ranges of public IP addresses to ISPs.

Authorized Private IP Addresses: These are never used on the global Internet but used by

individuals who don’t access internet directly.

Page 22: computer science  internship report

13

Unauthorized Private IP Addresses: They are used when there is an absolute certainty that

your network will never access the Internet.

Overview of the Types of IP Address Assignment

Dynamic Host Configuration Protocol (DHCP), Automatic Private IP Addressing (APIPA),

Static IP Addressing, Alternate IP Configuration.

Since DHCP is the commest ip address assignment method this was handled widely including

the DHCP lease process explained below

DHCP Lease Process. The first time that a Windows client (with DHCP enabled) attempts to

join a network, it automatically follows an initialization process to obtain a lease from a DHCP

server.

Figure 2.10: Illustration of the DHCP lease process.

TCP/IP Name Resolution

In general, computer users prefer to use computer names instead of IP addresses thus need for ip

name resolution thus need for name resolution.

Domain Name System. This is used on the Internet to map friendly names to IP addresses, and

vice versa. In Microsoft Windows 2000, Microsoft Windows Server™ 2003, and Microsoft

Windows XP environments, DNS is the default name resolution method.

NetBIOS over TCP/IP. This Provides name resolution and connection services for clients using

Microsoft Windows 95, Microsoft Windows 98, and Microsoft Windows Millennium Edition

operating systems, applications, and services.

Understanding, Identifying and Upgrading the RAM in a computer

Ram is volatile type of memory that a computer uses to run its OS and starting applications RAM

which originally was semiconductor chip individually plugged in motherboard but now as clip-in

modules. The common different types of ram include: Fast Page Mode(fpm) ram, Extended Data

Page 23: computer science  internship report

14

Out (EDO RAM), Synchronous DRAM, Double Data Rate(DDR) RAM, DDR2 RAM DDR23

RAM. We focused on how to identify the basic and common types of ram (DDR1, DDR2 is PC2,

DDR3 is PC3).

DDR2 has more pins, and the notch is in a different place. In DDR, the notch should be close to

the center, whereas ddr2 is further off-center and has higher pin density.

Figure 2.11: shows the difference between DDR and DDR2

Computer cables and connectors

Serial ATA(SATA) cables. These are computer bus interface that connects host bus adapters to

mass storage devices such as hard disk drives, optical drives, and solid-state drives.

Page 24: computer science  internship report

15

IDE/ATA Connectors. The standard IDE/ATA hard disks and ATAPI devices use two different

connectors. The first is the data connector, to which the IDE/ATA cable attaches. The second is

the power connector, which comes from the power supply, and of course, provides power to the

drive.

Figure 2.12: shows IDE and SATA connector

Data base management using MySQL and php MyAdmin

Creating and Deleting Databases in MySQL

When using show, create database commands, the Back-Quoted Identifiers, Unquoted

names such as database name, table name and column name cannot contain blank and

special characters unless enclosing them with a pair of back-quote, in the form

of ‘name’ for each word.

Understanding Comments and Version Comments

There are different types of MySQL comments that is to say multi-line comments (/*

and */), end-of-line comments begins with #... and lastly the version comment /*!40100

...... */

Setting the default database. The use command sets a particular or current database

as the default database.

Creating and Deleting/dropping tables. The above commands can be used with the

following commands "if exists" or "if not exists”.

inserting rows, querying the database using Comparison Operators modifying

data deleting rows, Exporting Data from/to a Text File

Page 25: computer science  internship report

16

string pattern matching, producing summary reports and logical operators (and,

or, not, xor, between, not between, is null, is not null, order by clause, limit clause),

comparison operators and using the concat and aggregate functions (count, max,

min, avg, sum)

see “appendix B” for more illustration on the above mentioned commands

Figure 2.13: indicating screen shot of the select command in MySQL

Figure 2.14: Screenshot showing a table selected from products using php MyAdmin console

Page 26: computer science  internship report

17

Website development using WordPress

These are some of the steps followed:

Finding a Domain Name and Host.

Ways of Installing WordPress

1. One-Click-installation from Websites like WordPress.org.

2. Manual install.

3. Set Up WordPress.

Choosing a Theme/Template for your site.

Log into your WordPress dashboard.

Create a Home Page, Add More Pages, Add Widgets

Adding pages to the menu, Adding and editing posts

For Comments and Posts install contact form plugin.

Installation of other required Plugins.

Operating system installation basically windows xp,7,8,8.1,10

I Installed Operating systems like windows7 x64 and x86, windows XP, Post installations like

drivers, and application software was also done for programs like cool edit, driver pack solutions,

Microsoft office professional. different ways I used while performing windows installation

windows on a machine

Method 1: Performed a clean installation of Windows

In this method involves removing all data from the hard disk by repartitioning and reformatting

your hard disk and reinstalling the operating system and programs to an empty (clean) hard disk.

Method 2: Upgraded to other higher Windows

I used this when upgrading to Windows 8.1 from Microsoft Windows 8 pro however this method

requires steady internet.

Method 3: Installed Windows to a new hard disk

Page 27: computer science  internship report

18

I used this method to install Windows XP to a new hard disk. I typically used the method when a

new hard disk was installed on the computer.

Method 4: Installed Windows to a new folder (parallel installation)

I used this method in need of parallel installation to run two operating systems to install on one

machine then used the same method to retrieve data from a damaged disk.

Performed Windows activation and its types

Types of activation

1. Windows Product Activation. In this type the computer sends an installation ID

number to Microsoft before Windows is verified and then activated

2. OEM Activation 3.0. This takes place at the factory where by DPK is installed on

the motherboard BIOS during the manufacturing process. Windows will activate

automatically the first time the computer is connected to the Internet.

Confirmation of windows activation

Right click on my computer then go to computer properties.

Figure 2.15: shows activated windows

Page 28: computer science  internship report

19

Troubleshooting Windows 8 activation errors

Windows activation

error

Possible cause Possible solution

Windows isn't activated Invalid windows

license

trial or evaluation

version of

Windows was

installed

Installing the latest

version of windows

Windows isn't activated There are files on your PC

that are preventing

activation

buy and reinstall a new

version of Windows

Windows isn't activated computer is not connected

to the Internet.

connect to the Internet

Windows isn't activated Windows is not

preinstalled on the

computer

no product key is

configured

Enter a new product key

Table 2.2: showing windows activation errors causes and solutions

Data Recovery

We used Hirens software for the purpose of data recovery in instances of system

crash and formatted hard disk. The steps involved include insertion the bootable

disk and, choose the option for load mini XP. When the PC is on, run the HBCD

and go to the menu, choose recover file, then follow the prompts depending on the

problem. After the entire process, connect external storage then copy the recovered

files.

Page 29: computer science  internship report

20

Research about Domain controller and active directory

I carried out research on Microsoft’s domain controller and active directory, used

in Networking.

Domain controller. DC is a server that responds to security authentication requests within

a Windows Server domain. Basically on Microsoft Windows or Windows NT network that

is responsible for allowing host access to Windows domain resources.

Active Directory Domain Services .AD DS stores directory data and manages

communication between users and domains, including user logon processes,

authentication, and directory searches. An Active Directory domain controller is a server

that is running AD DS

With a single network logon, administrators can manage directory data and organization

throughout their network. Authorized network users can also use a single network logon to

access resources anywhere in the network.

Figure 2.16: showing how UBC’s domain controller with the clients

Installation and configuration of windows Server 2003 R2.

Boot up from install disk and choose the Enterprise version

Accept license terms and choose the Custom

choose Drive options and complete installation

Page 30: computer science  internship report

21

prompt window to change password before logging in appears.

The Initial Configuration Tasks window pops up after logging in

2.3. Supervision levels and relationship with the supervisor

2.3.1. supervision levels

My field supervisor was always available, provided corrective feedback, gave clear guidelines for

the application of theory, competent enough, and the supervisor provided support of the

professional development to me.

My supervisors focused on competence with the accomplishment of meeting institutional

organization internship goals.

2.3.2. Relationship with supervisor

There was a strong supervisory relationship with my supervisor that effectively helped

successfully to participate in experiences and acquire competence.

Communication and feedback. My supervisors always provided feedback to any asked question

this enabled notes taking which was later written in my logbook

Time management. My supervisor was very time conscious so I ensured that I was at the

organization on a daily basis. Mr. Ogiima my field supervisor usually gave time bound tasks to

ensure proper good time management.

2.4. Work team and its composition

The work team was created with members of different levels of abilities coming up with cross-

functional teams.

My work team interacted interdependently to achieve a common objective that was always

assigned. Its composition was based on the attributes among individuals that made the team. In

addition, the team was made of homogeneous and heterogeneous levels of skills in which team

members all contain significant differences among skills, experience, and abilities. Through these

contributions in the team this potentially dictated overall performance outcomes for the team which

increased performance, employee unity and company culture.

Page 31: computer science  internship report

22

2.4. Working relationship among the team members and staff

As a work team intern member I was Honest, straightforward and Shared the Load this was through

doing my share of the work increasing team members’ collective motivation.

In addition, I was reliable and fair by taking appropriate credit and complementing my work team

skills that made the team move forward.

For Team work being social I was skilled, and tactful, communicator with a positive attitude.

Page 32: computer science  internship report

23

3.0. CHAPTER THREE EVALUATION ON FIELD ATTACHMENT

3.1. Level of accomplishment of duties and responsibilities assigned

To a greater extent I successfully accomplished the duties and responsibilities assigned.

Being in the Information Technology department responsibilities included: day to day work and

basic configuration; document procedures; application installments e.g. windows installation,

adobe premiere pro cc, Microsoft word, avid, driver pack solution; working environment

configurations e.g. Checking for computer status(checking hard disk life span) installing and

supporting new and existing applications on various server platforms; writing business

requirements documents for new projects; level 1 troubleshooting e.g. failure of printing a

document when using a LAN printer, failure of a computer to start.

3.2. New knowledge and skills gained in each of the duties and responsibilities

During field attachment I accumulated a lot of knowledge and skills. Each of the duties and

responsibilities as listed in section 2.2 empowered and greatly impacted on my skills

3.2.1. Knowledge

Web Development. This was through Creation of web layout design, writing

code, and usability testing, maintaining company websites and managing site

content with the help of my supervisor.

Programming. Through design of systems, I learnt more about object-oriented

languages, such as C++, Java.

Technical Support. Providing technical assistance to other departments, from

troubleshooting e-mail to training individuals in new software applications

Systems Administration. Basic installing and repair an organization's

computer systems. And maintaining communications, such as internet and

intranet systems, local area networks (LAN), and wide area networks (WAN).

Project and Technical Services Management. Through overseeing individual

projects, from communication to coordinating with team members.

Page 33: computer science  internship report

24

3.2.2. Skills

Computer competency, attention to detail, organization, problem solving, critical thinking, clear

written and spoken communication, time management, close listening.

3.2.3. Responsibilities

Working towards achieving my individual goals, which helped the organization reach its

objectives, Taking responsibility for your own professional and career development, Being open

and Accepting constructive feedback and take the initiative to improve, Giving others feedback,

Completing any development plans assigned to me and applying the learning to improve my

performance , Keeping record of my performance achievements, successes and challenges i.e.

evaluation sheets in case of assignments , Completing my self-appraisal by the specified deadline.

3.3. Most interesting experiences.

During the Field Attachment period, I really enjoyed the experience of working at UBC including

the comfortable working atmosphere, the technical guidance on the latest web technologies and

the friendly relationship among the field staff. A list of interesting moments, are highlighted below

3.3.1. Internship project.

Accomplishing My Project assigned (developing a professional website using word press). The

project involved several parts: developing a database for the website using MySQL, responsive,

attractive interface. It was a very self-contained project which every intern built up from scratch.

3.3.2. Interaction with experienced people in the field

I also had the opportunity to network with potential future employers and gain insight into the

types of employees they look for. This made me realize the greatest value of Internship which is

providing a unique and exciting experience that is unparalleled in the classroom and to coordinate

job experience with academic.

3.3.3. Learning IT area of interest

internship offered me the opportunity to essentially customize my placement in order to gain

valuable work experience in my areas of interest and I had the opportunity to look at a sever.

Page 34: computer science  internship report

25

3.3.4. Working with experienced and more skilled individuals

working with some of the best developers, designers and managers in information technology

department, solving problems that you can never face in a school environment, bonding with other

interns that make up a very diverse demographic.

3.4. Relatedness of university’s taught programs to the field work

With the current curriculum for Undergraduate Bachelor of Computer Science program by NCHE,

Revised December 20, 2013 used by Makerere University. In its design goals which include

enabling students with computing and communication skills necessary for employment and career

opportunities in today’s ICT industries and business organization.

Illustration of relevance of computer science curriculum with to field work with few sampled

course units.

COURSE UNIT USE OF KNOWLEDGE FROM CLASS TO FIELD

WORK

BIS 1104: Communication Skills for

IT

Used for effective speaking and listening, meetings and

presentation sessions

CSC 1100: Computer Literacy The skills learnt in computer literacy such as Microsoft

Word and Excel were used to prepare professionally

looking and standard documents at work, including this

field attachment report

BIS 1204: Data and Information

management

This enabled successful web development sessions due

to the different languages learnt in class e.g. MYSQL,

php check final project in appendix//

BIS 1206: Systems Analysis and

Design

This was vital during system development

CSC 2100: Data Structures and

Algorithms

This enabled easy developing of problem solving

systems.

Table 3.1: showing relevance of computer science curriculum to field attachment

3.5. Challenges faced and how managed

Page 35: computer science  internship report

26

Inadequate and delay for supervision facilitation. University policies state that each

site/student has to be visited at least three times by the academic supervisors (Makerere

University Council, 2011, p. 8) but most students were visited only once, after 8 weeks in

the field. This was generally a weakness on the side of the university. But at least the

University ensured that internships are offering meaningful learning experiences for their

students by providing evaluation sheets which provide feedback from employers to

university.

Lack of field-specific knowledge / skills. This arouse from use of specific programming

languages which were not taught at school. This was solved by a meeting held between

interns and field supervisor in order to identify areas for improvement.

Limited time for the internship program is one of the challenges as it is only scheduled for

eight weeks, which makes it not enough to learn experience most of all the activities

undertook in a survey.

insufficient work assigned to us at the beginning of an internship. This was solved

managing our work by doing our personal research and offering something useful for the

organization. And Asking our seniors for guidance.

Assignment of activities that don’t correspond to the internship expectations this was

solved by informing the internship field coordinator.

3.6. Benefits derived from field attachment

The field attachment was of great importance, some of the benefits include

Internship helped me understand work ethics, employment demands, responsibilities and

opportunities.

Field attachment provided career direction and confidence in my abilities by narrowing

down the list of potential careers.

My internship gave me the opportunity to try out computer related activities i.e.

dismantling a computer which I had not previously considered and broadened my horizons

through converting my academic knowledge into industry skills.

It prepared me for the working environment.

It enhanced my CV needed to negotiate future jobs.

Page 36: computer science  internship report

27

3.7. Adequacy in university’s preparing the student for field attachment

In my view students having a limited range of skills in areas like communication and team work,

with educational experiences that can’t teach them how to solve problems with people whose

views are different than their own.

With less intercultural skills and an understanding of societies all this showed inadequacy of

preparation given to students for field attachment

3.8. Preparedness of the agency to receive and manage students for field attachment

The agency shared some insight on the bigger picture and how their projects fit in internship goals

can bridge this knowledge gap. With the ability of College students having a lot to offer and will

approach things differently and the need to create a job description that is appealing, experience,

so it’s important to evaluate your needs and for both parties. This can be instrumental in targeting

younger clients and the clear setting of project goals and regular benchmarks to see how we interns

are performing clears shows agency was prepared. occasionally, resourceful persons and experts

in field always answered queries and also gave tips and shared experiences with the students. This

greatly inspired the interns

3.9. Career Motivation

For the different values in regards to work and need for different things in the job market today

that include satisfaction and fulfillment. from the career motivation attained. This makes me plan

a more fulfilling and productive career and create an environment I can thrive in motivation's role

in influencing workplace behavior and performance at school.

4.0. CONCLUSIONS AND RECOMMENDATIONS

4.1. Conclusions

The internship period revealed that curriculum in our university lacks sufficient input from

employers of labour, and the teaching-learning resources were grossly inadequate (computers,

servers, routers, switches) academic staff were competent but inadequate in number in some

departments.

Page 37: computer science  internship report

28

On the basis of these notices, I conclude saying that result from inadequacies in critical factors

influences the quality of programme offering and there are lapses in the preparation of

undergraduates for field attachment.

4.2. RECOMMENDATIONS

On the basis of the findings and conclusion drawn in this field attachment I recommended that:

4.2.1. Recommendations to the University

The university should urgently restructure the curricula offerings to meet the requirements

of the labour market.

This course CSC 2303: Field Attachment, should be shifted to the third year of study, such

that it is given more time, at least six months. Many students have concluded that two

months internships are too small.

Students teaching-learning resources should be improved, especially the tools for

practicals, lecture room capacity, laboratories and workshops.

ICT should be introduced into both teaching and learning activities of every university, so

that both staff and students can possess the much needed ICT knowledge and skills.

The University should keep good records of its graduates for feedback purposes; while

academic departments should liaise with employers for information on their employed ex-

students

4.2.2. Recommendation to the field attachment organization

In future, the field organization (UBC) should provide students with large range of computing

related aspects and a simple review of technologies used at the organization

4.2.3. Recommendation to future interns

As students, good supervisory relationships are pivotal to successful completion of our degrees

because supervisors provide expert guidance in your research, and our fields of study thus need

for good supervisory relationships with our supervisors.

Page 38: computer science  internship report

29

References

Uganda Broadcasting corporation (n.d.). Retrieved July 31, 2016, from

http://ubc.ug/index.php/partners/

Internetworking Basics. (n.d.). Retrieved June 08, 2016, from

http://www.cisco.com/cpress/cc/td/cpress/fund/ith/ith01gb.htm

Network topologies. (n.d.). Retrieved June 12, 2016, from

http://whatis.techtarget.com/definition/network-topology

Cable termination. (n.d.). Retrieved June 10, 2016, from http://www.incentre.net/tech-

support/other-support/ethernet-cable-color-coding-diagram/

MySQL. (2014, September). MySQL Tutorial. Retrieved June 23, 2016, from `

https://www.ntu.edu.sg/home/ehchua/programming/sql/MySQL_Beginner.html.

B. (2006, June 27). Types of RAM. Types of RAM: How to Identify and Their Specifications.

Retrieved June 15, 2016, from https://www.technibble.com/types-of-ram-how-to-identify-

and-their-specifications/.

Microsoft. (2014, April 08). How to install or upgrade to Windows. Retrieved June 20, 2016.

from https://support.microsoft.com/en-us/kb/978307.

(n.d.). Windows 8 Product Activation. Retrieved June 21, 2016, from http://support.hp.com/us-

en/document/c03486254

Makerere University Council. (2011). Guidelines for Field Attachment. Retrieved June 5, 2016.

from Makerere University Policies Website:

http://policies.mak.ac.ug/sites/default/files/policies/GUIDELINES_FOR_FIELD_ATTACHMEN

T.pdf

NCHE. (2013, December). Curriculum for Bachelor of Computer Science (CSC) Degree

Program. Retrieved August 13, 2016, from https://courses.mak.ac.ug/programmes/bachelor-

science-computer-science

Page 39: computer science  internship report

30

Appendices

“Appendix A”: UBC internship offer letter

Page 40: computer science  internship report

31

“Appendix B”

Enter password:

Welcome to the MySQL monitor. Commands end with; or \g.

Your MySQL connection id is 23

Server version: 5.6.17 MySQL Community Server (GPL)

Copyright (c) 2000, 2014, Oracle and/or its affiliates. All rights

reserved.

Oracle is a registered trademark of Oracle Corporation and/or its

affiliates. Other names may be trademarks of their respective

owners.

Type 'help;' or '\h' for help. Type '\c' to clear the current input

statement.

mysql> CREATE DATABASE student;

Query OK, 1 row affected (0.33 sec)

mysql> DROP DATABASE student;

Query OK, 0 rows affected (0.88 sec)

mysql> CREATE DATABASE IF NOT EXISTS student;

Query OK, 1 row affected (0.00 sec)

mysql> SHOW DATABASES;

+--------------------+

| Database |

+--------------------+

| information_schema |

| mysql |

| patrick |

| people |

| performance_schema |

| project |

| student |

| test |

+--------------------+

8 rows in set (0.58 sec)

mysql> USE student;

Database changed

mysql> SELECT DATABASE();

+------------+

| DATABASE() |

+------------+

| student |

+------------+

Page 41: computer science  internship report

32

1 row in set (0.00 sec)

mysql> SHOW TABLES;

Empty set (0.07 sec)

mysql> CREATE TABLE IF NOT EXISTS products (productID INT UNSIGNED

NOT NULL AUTO_INCREMENT, productCode CHAR(3) NOT NULL DEFAULT '',

name VARCHAR(30) NOT NULL DEFAULT '',quantity INT UNSIGNED NOT NULL

DEFAULT 0,price DECIMAL(7,2) NOT NULL DEFAULT 99999.99, PRIMARY KEY

(productID));

Query OK, 0 rows affected (0.97 sec)

mysql> SHOW TABLES;

+-------------------+

| Tables_in_student |

+-------------------+

| products |

+-------------------+

1 row in set (0.00 sec)

mysql> DESCRIBE products;

+-------------+------------------+------+-----+----------+----------------

+

| Field | Type | Null | Key | Default | Extra

|

+-------------+------------------+------+-----+----------+----------------

+

| productID | int(10) unsigned | NO | PRI | NULL | auto_increment

|

| productCode | char(3) | NO | | |

|

| name | varchar(30) | NO | | |

|

| quantity | int(10) unsigned | NO | | 0 |

|

| price | decimal(7,2) | NO | | 99999.99 |

|

+-------------+------------------+------+-----+----------+----------------

+

5 rows in set (0.20 sec)

mysql> SHOW CREATE TABLE products \G

*************************** 1. row ***************************

Table: products

Create Table: CREATE TABLE ‘products’ (

`productID’ int(10) unsigned NOT NULL AUTO_INCREMENT,

`productCode’ char(3) NOT NULL DEFAULT '',

`name’ varchar(30) NOT NULL DEFAULT '',

`quantity’ int(10) unsigned NOT NULL DEFAULT '0',

`price’ decimal(7,2) NOT NULL DEFAULT '99999.99',

PRIMARY KEY (`productID’))

Query OK, 1 row in set (0.00 sec)

mysql> INSERT INTO products VALUES (1001, 'PEN', 'Pen Red', 5000, 1.23);

Page 42: computer science  internship report

33

Query OK, 1 row affected (0.12 sec)

mysql> INSERT INTO products VALUES (NULL, 'PEN', 'Pen Blue',8000,1.25

),(NULL, 'PEN', 'Pen Black', 2000, 1.25);

Query OK, 2 rows affected (0.13 sec)

mysql> INSERT INTO products (productCode, name, quantity, price) VALUES

('PEC', 'Pencil 2B', 10000, 0.48),('PEC', 'Pencil 2H', 8000, 0.49);

Query OK, 2 rows affected (0.11 sec)

mysql> INSERT INTO products (productCode,name) VALUES ('PEC','Pencil HB');

Query OK, 1 row affected (0.10 sec)

mysql> SELECT * FROM products;

+-----------+-------------+-----------+----------+----------+

| productID | productCode | name | quantity | price |

+-----------+-------------+-----------+----------+----------+

| 1001 | PEN | Pen Red | 5000 | 1.23 |

| 1002 | PEN | Pen Blue | 8000 | 1.25 |

| 1003 | PEN | Pen Black | 2000 | 1.25 |

| 1004 | PEC | Pencil 2B | 10000 | 0.48 |

| 1005 | PEC | Pencil 2H | 8000 | 0.49 |

| 1006 | PEC | Pencil HB | 0 | 99999.99 |

+-----------+-------------+-----------+----------+----------+

6 rows in set (0.07 sec)

mysql> DELETE FROM products WHERE productID = 1006;

Query OK, 1 row affected (0.18 sec)

mysql> SELECT name, price FROM products;

+-----------+-------+

| name | price |

+-----------+-------+

| Pen Red | 1.23 |

| Pen Blue | 1.25 |

| Pen Black | 1.25 |

| Pencil 2B | 0.48 |

| Pencil 2H | 0.49 |

+-----------+-------+

5 rows in set (0.00 sec)

mysql> SELECT * FROM products;

+-----------+-------------+-----------+----------+-------+

| productID | productCode | name | quantity | price |

+-----------+-------------+-----------+----------+-------+

| 1001 | PEN | Pen Red | 5000 | 1.23 |

| 1002 | PEN | Pen Blue | 8000 | 1.25 |

| 1003 | PEN | Pen Black | 2000 | 1.25 |

| 1004 | PEC | Pencil 2B | 10000 | 0.48 |

| 1005 | PEC | Pencil 2H | 8000 | 0.49 |

+-----------+-------------+-----------+----------+-------+

5 rows in set (0.00 sec)

Page 43: computer science  internship report

34

mysql> SELECT name, price FROM products WHERE price < 1.0;

+-----------+-------+

| name | price |

+-----------+-------+

| Pencil 2B | 0.48 |

| Pencil 2H | 0.49 |

+-----------+-------+

2 rows in set (0.07 sec)

mysql> SELECT name, price FROM products WHERE name LIKE 'PENCIL%';

+-----------+-------+

| name | price |

+-----------+-------+

| Pencil 2B | 0.48 |

| Pencil 2H | 0.49 |

+-----------+-------+

2 rows in set (0.04 sec)

mysql> SELECT * FROM products WHERE quantity >= 5000 AND name LIKE 'Pen

%';

+-----------+-------------+----------+----------+-------+

| productID | productCode | name | quantity | price |

+-----------+-------------+----------+----------+-------+

| 1001 | PEN | Pen Red | 5000 | 1.23 |

| 1002 | PEN | Pen Blue | 8000 | 1.25 |

+-----------+-------------+----------+----------+-------+

2 rows in set (0.00 sec)

mysql> SELECT * FROM products WHERE quantity >= 5000 AND price < 1.24 AND

name L

IKE 'Pen %';

+-----------+-------------+---------+----------+-------+

| productID | productCode | name | quantity | price |

+-----------+-------------+---------+----------+-------+

| 1001 | PEN | Pen Red | 5000 | 1.23 |

+-----------+-------------+---------+----------+-------+

1 row in set (0.00 sec)

mysql> SELECT * FROM products WHERE (price BETWEEN 1.0 AND 2.0) AND

(quantity BETWEEN 1000 AND 2000);

+-----------+-------------+-----------+----------+-------+

| productID | productCode | name | quantity | price |

+-----------+-------------+-----------+----------+-------+

| 1003 | PEN | Pen Black | 2000 | 1.25 |

+-----------+-------------+-----------+----------+-------+

1 row in set (0.01 sec)

mysql> SELECT * FROM products WHERE name LIKE 'Pen %' ORDER BY price DESC;

+-----------+-------------+-----------+----------+-------+

| productID | productCode | name | quantity | price |

+-----------+-------------+-----------+----------+-------+

| 1002 | PEN | Pen Blue | 8000 | 1.25 |

| 1003 | PEN | Pen Black | 2000 | 1.25 |

Page 44: computer science  internship report

35

| 1001 | PEN | Pen Red | 5000 | 1.23 |

+-----------+-------------+-----------+----------+-------+

3 rows in set (0.17 sec)

mysql> SELECT * FROM products ORDER BY price LIMIT 2;

+-----------+-------------+-----------+----------+-------+

| productID | productCode | name | quantity | price |

+-----------+-------------+-----------+----------+-------+

| 1004 | PEC | Pencil 2B | 10000 | 0.48 |

| 1005 | PEC | Pencil 2H | 8000 | 0.49 |

+-----------+-------------+-----------+----------+-------+

2 rows in set (0.00 sec)

mysql> SELECT CONCAT(productCode,'-',name) AS `Product Description’, price

FROM products;

+---------------------+-------+

| Product Description | price |

+---------------------+-------+

| PEN - Pen Red | 1.23 |

| PEN - Pen Blue | 1.25 |

| PEN - Pen Black | 1.25 |

| PEC - Pencil 2B | 0.48 |

| PEC - Pencil 2H | 0.49 |

+---------------------+-------+

5 rows in set (0.04 sec)

mysql> SELECT DISTINCT price AS `Distinct Price’ FROM products;

+----------------+

| Distinct Price |

+----------------+

| 1.23 |

| 1.25 |

| 0.48 |

| 0.49 |

+----------------+

4 rows in set (0.10 sec)

mysql> SELECT * FROM products GROUP BY productCode;

+-----------+-------------+-----------+----------+-------+

| productID | productCode | name | quantity | price |

+-----------+-------------+-----------+----------+-------+

| 1004 | PEC | Pencil 2B | 10000 | 0.48 |

| 1001 | PEN | Pen Red | 5000 | 1.23 |

+-----------+-------------+-----------+----------+-------+

2 rows in set (0.01 sec)

mysql> SELECT productCode, MAX(price) AS `Highest Price’, MIN(price) AS

`LowestPrice` FROM products GROUP BY productCode;

+-------------+---------------+--------------+

| productCode | Highest Price | Lowest Price |

+-------------+---------------+--------------+

| PEC | 0.49 | 0.48 |

| PEN | 1.25 | 1.23 |

Page 45: computer science  internship report

36

+-------------+---------------+--------------+

2 rows in set (0.07 sec)

mysql> UPDATE products SET price = price * 1.1;

Query OK, 5 rows affected, 5 warnings (0.24 sec)

mysql> LOAD DATA LOCAL INFILE 'E:\mysql/products_in.csv' INTO TABLE

products COLUMNS TERMINATED BY ',' LINES TERMINATED BY '\r\n';

ERROR 2 (HY000): File 'E:mysql\products_in.csv' not found (Errcode: 2 - No

suchfile or directory)

“Appendix c”

Screenshots of the internship project done at UBC (website development using WordPress)

Screenshot 1: WordPress login using php

With the use of wamp server installed and it being online I logined into WordPress version 4.4.2

Screenshot 2: home page of KivEvents website with slider from right to left plus other pages

Page 46: computer science  internship report

37

Screenshot 3: continuation of KivEvents website home page with the meet the team and facts tabs plus the latest

news

Screenshot 4: continuation of KivEvents website home page showing success stories tab and contact icon that

when clicked take you to respective social media platforms. The social media icons are included in WordPress

using Sydney theme and site origin social bundle.

Page 47: computer science  internship report

38

Screenshot 5: the about us page indicating testimonials created by adding new testimonial from the dash board,

contact us tab plus the social media icons

Page 48: computer science  internship report

39

Screenshot 6: this shows the employees page in that when hoovered over it pops up social media contacts of the

different employees

Screenshot 7: the portfolio page indicates the different projects accomplished by the organisation

Screenshot 8: the blog page created with help of the contact form7 plugin that enables

individuals to tweet to the website as indicated in the extreme right of the screen shot

Page 49: computer science  internship report

40

Screenshot 9: blog page showing where an individual who has visited the site can leave a comment

Screenshot 10: the success stories page includes the clients that have worked with the organisation

Page 50: computer science  internship report

41

Screenshot 11: the contact us page indicates the google map location of the organisation with a form used to send

email to organisation

Screenshot 12: illustration showing installation of one of the used plugin (lightbox plus colorbox)

Page 51: computer science  internship report

42

“Appendix D”

Windows installation

Windows XP

Steps Taken

1. Start a computer from the Windows XP CD or boot disks.

2. press any key to start the computer from the Windows XP CD then press ENTER to

begin Windows XP Setup

3. Read the Microsoft Software License Terms, and then press F8.

4. Follow the instructions on the screen to select and format a partition where you want

to install Windows XP till you complete Windows XP Setup.

Windows 7 installation

1. Enter your computer's system BIOS by pressing Del, Esc, F2, F10, or F9 depending

on your computer’s motherboard.

2. Find your BIOS's boot options menu

Page 52: computer science  internship report

43

3. Select the CD-ROM drive as the first boot device of your computer.

4. Save the changes of the settings

5. Shut off your computer and Power on the PC and the insert the Windows 7 disc into

your CD/DVD drive or flash disk

6. Start your computer from the disc., Choose your Windows Setup options, Click the

Install Now button, Accept the License Terms, Select the Custom installation, decide

on which hard drive and partition you want to install Windows on.

Windows 8 installation

1. Insert the Windows 8 Installation Disc into the internal / external DVD. Turn on your

computer During the boot up screen, press [F12] on your keyboard to enter Boot

Menu and choose the DVD or BD reading device where you insert the installation

disc.

2. Press any key on your keyboard when you see the message to reboot from the DVD

or BD reading device then Click “Install now” to continue.

3. Insert activation key and Check “I accept the license terms” and click “next”.

Note: for clean installation, please select “Custom” to continue.

4. For need to create a new partition with specific size, you should click “New”.

Otherwise, click “Next”, When all partition process is done, choose your desired

partition for Windows 8 installation, and click “Next”.

5. Final step is to Complete the Windows 8 Installation

“Appendix E”

Adding Roles in windows server 2008 R2:

Go to Server Manager by using shortcuts on the Start menu, then in the Roles Summary Click Add

Roles

Page 53: computer science  internship report

44

assigning the IP addresses

Log on to Windows Server 2008 R2 computer with Administrator account.

Click Start and then click Run(NCPA.CPL) from the menu.

On the opened window right-click on the NIC on which static IP address has to be assigned and

click Properties.

On Local Area Network Properties box make sure that Networking tab is selected and double-

click Internet Protocol Version 4 (TCP/IPv4).

General tab is selected and click to select Use the following IP address

Populate the enabled IP address and Subnet mask fields and click OK button. That is to say

IP address: 192.168.2.7, Subnet mask: 255.255.255.0, Default gateway: 192.168.2.1, Preferred

DNS server: 196.43.133.5, Alternate DNSC server: 196.43.133.6

click OK to save the changes.

creating users

open up Server Manager

open up the Roles section, next to Active Directory Users and Computers section and finally the

Active Directory Users and Computers

click on Users section where we are going to create a new User Account. To do so, right-click on

the blank section, point to New and select User.

In this window type in the user's first name, middle initial and last name. Next create a user's

logon name.

create a password for the new user and select appropriate options

click on the Finish button to complete the creation of new User Account.