Internship Report Sample
Internship Report Sample
Internship Report Sample
UNIVERSITY
. .
REGISTRATION NUMBER: ...
STUDENT NUMBER:
Email: ...
PLACE OF TRAINING:.
SUBMITTED IN PARTIAL FULFILMENT FOR THE AWARD OF
BACHELORS DEGREE IN COMPUTER SCIENCE
OF MAKERERE UNIVERSITY, KAMPALA
AUGUST, 2015
Academic Supervisor:.
DECLARATION;
I hereby declare to the best of my knowledge that this report is as a result of the training
activities and knowledge I have acquired from my place of attachment and that all
the content of this report is my own original piece and it has never been submitted to any other
institution or department for any academic award.
Student name
........
Signature
Date
APPROVAL
The report has been submitted for examination to the department of Computer Science under the
School of Computing and Informatics Technology Makerere University, with approval of my
field supervisor.
Signature
NAME..
FIELD SUPERVISOR
DATE
..
ii
DEDICATION
I dedicate the success of this work to my parents who have supported me materially, financially
and spiritually throughout my course and my entire life. To my friends and coursemates for their
constant support academically, spiritually, socially and psychologically.
iii
ACKNOWLEDGEMENT
I thank the almighty God for giving me the strength to work and acquire more knowledge at
. He has given me life and the courage acquire several skills.
I also appreciate the tremendous and selfless assistance from my field supervisor ........I convey
my heartfelt appreciation for the advice and corrections from the beginning of this industrial
training to the end. I really appreciate all his efforts throughout my training. I wish to thank in a
special way my academic supervisor . for his inspiration and
encouragement. I also thank my fellow workmates who have tirelessly assisted me in
understanding my course more and successfully building it up. I cannot forget my entire family
for the moral, physical and financial support offered during the course of this study. I can not
forget to thank the School of Computing and Informatics Technology for granting me such a
wonder moment to train at one of their highly trained
I highly acknowledge the services rendered by my field supervisors colleague. I thank
Mr. Mr .... and for the great work done. They have really enabled me
gain more practical skills under the Computing and IT field.
iv
ABSTRACT
Internship is a period of time during which a student gets practical experience in his or her
career. The School of Computing and Informatics Technology on award of the Bachelors degree
of Computer Science in Makerere University requires second year students at the end of
academic year to undertake industrial training .This training is intended for acquisition of more
practical skills and knowledge to the students.
This report includes all activities I carried out during the entire training at the CoCIS Makerere
and these include installing operating system, Computer Hardware and maintenance, setting up a
network ,routing ,switching, wireless networks, cable termination, server management applying
system updates, web hosting, file sharing, resource sharing ,network trouble shooting and server
services.
This report shows the experiences that I have gained in my training and also shows the
challenges that I have encountered during the course of my training.
It also gives the conclusion and also recommendation to School of Computing and Informatics
Technology, references for the Organization at which I undertook my training in compiling this
report and a list of appendices page.
The activities that I have written in this report have enabled me to acquire more practical skills,
having more experience, confidence, professional skills and competence in my career field.
On addition to the training, I have learnt team work, time management, patience, working
without supervision and all those have changed me positively. The purpose of the field
attachment was to enable interns gain more knowledge and acquire practical skills.
LIST OF ACRONYMS
IT-
Information Technology
Operating system
Compact Disk
TABLE OF CONTENTS
vi
DECLARATION;.............................................................................................................................i
APPROVAL.....................................................................................................................................ii
DEDICATION................................................................................................................................iii
ACKNOWLEDGEMENT..............................................................................................................iv
ABSTRACT....................................................................................................................................v
LIST OF ACRONYMS..................................................................................................................vi
TABLE OF CONTENTS...............................................................................................................vii
CHAPTER ONE..............................................................................................................................1
1.0
Background...........................................................................................................................1
1.1
Introduction...........................................................................................................................1
1.2
Vision statement:.............................................................................................................................2
To be leaders in computing and ICT training research and service internationally.........................2
Mission statenent:............................................................................................................................2
Values statement:.............................................................................................................................2
Field attachment activities...............................................................................................................7
2.0 COMPUTER HARDWARE AND MAINTENANCE...........................................................7
Power supply:..................................................................................................................................7
2.1 NETWORKING....................................................................................................................10
3.1.1 Challenges encountered during the training.........................................................................17
CHAPTER FOUR.........................................................................................................................18
4.1.0 Conclusions...........................................................................................................................18
4.1.1 Recommendations.................................................................................................................18
APPENDICES...............................................................................................................................20
Appendix 7: Internship schedule...................................................................................................24
vii
viii
CHAPTER ONE
1.0 Background
Industrial training is a period of time during where a student or a new graduate gets practical
experience in a job. The training exposes the interns to working environments and gives them a
chance to acquire more skills to be employed in the practical and competitive world. Industrial
training should thus be undertaken by student to enhance their practicability at work.
1.1 Introduction
This report involves activities during my industrial training at CoCIS Makerere. It contains
activities conducted during my stay and work at the organization. These activities among others
include cable termination, server management, applying system updates, file sharing, resource
sharing, network trouble shooting and server services.
1.2 Profile of CoCIS Makerere
The College of Computing and Information Sciences Makerere University was opened on 13th
December 2010. It is made up of the School of Computing and Informatics Technology and the
East African School of Library and Information Science (EASLIS). COCIS is one of the largest
computing and ICT training, , research, information science and consultancy colleges in Africa
has maintained its place as a recognized institute worldwide. It is committed to delivering
standard services under Computing, Library, Records and Information Sciences and attracts both
local and international students. COCIS boasts of the state of the art infrastructure including
lecture theaters, giant computer laboratories, specialized computer laboratories and a college
library. Its three buildings can accommodate over 10,000 students in one sitting.
The established academic staff strength of the College is about 300 teaching staff including 30
visiting and local professors. Over twenty of these staff members hold doctorate, with many
others
in
advanced
stages
of
completing
their
PhD
studies.
Formation of the College of Computing and Information Science is based on the criteria of
relatedness, compatibility, interdisciplinary, capacity to form a viable college, synergy in mission
and objectives, potential for modularization and baseline resources (number of students,
programmes, academic staff, space, library and computing facilities) and other capacity
indicators considered by the National Council for Higher education (NCHE).
This merger has seen a pool of resources and facilities like computer laboratories, specialized
laboratories, book libraries, journals, cameras, and personnel both administrative and academic
staff.
The college is an active centre for Research and Outreach. It produces a journal, the International
1
Journal of Computing and ICT Research (IJCIR). It also hosts an annual international
conference, the International Conference on Computing and ICT Research (ICCIR). The College
is interested in in-depth research in the areas of Machine learning, Security, ICT for
development, Model and web based systems, E-Learning, Mobile computing and
Communication, Documentary Heritage , Records Management Education, Information Policy
and Publishing, Knowledge Management, ICTs for Libraries and LIS Curriculum.
The College of Computing and Information Sciences is poised to continue being a modal college
in Makerere University and the region, by providing first class teaching, learning and research
that directly answers to both local and international demands
Vision statement:
To be leaders in computing and ICT training research and service internationally.
Mission statenent:
To provide first class teaching reach and services in computing and ICT responsive to national
and international needs.
Values statement:
The college of computing and information technology is an innovative and industry oriented
college, persuing excellence, teaching, learning, writing edge value added research and
consultancy, community outreach as well as providing a vibrant student life
1.3 Projects
The Department of Innovations and Software Development has a core team of full-time
employees who have considerable experience in their relevant areas and carry out extensive
software development activities in accordance with detailed business designs and plans.
Some of the Projects currently undertaken are: Students' Exam Grading, Epi Handy, Ossis,
Online Student's Course Selection, Students Results Management System, MobileHRS, Epi
Handy Mobile, HEITML, OMEVAC, OpenMRS, etc.
1.3.1 Internal Projects
2
7. MOBILEHRS
A mobile client for data collection tool for DSS (Demographic Surveillance) sites running on
PDA (Personal Digital Assistant) with Windows CE specifically for household information. It is
based on epihandy forms engine. It synchronizes data to the HRS server. Makerere University
College of Computing and Information Sciences in conjunction with the University of Bergen,
Norway and University of Southern Maine, USA provide software development assistance on
this project.
8. EPIHANDY MOBILE.
It is a generic data collection tool for mobile phones. It utilizes the new mobile technology to
improve data collection and handling processes. It is a new solution that revolutionizes the way
in which surveys and data collection is done in Health and development research. Makerere
University College of Computing and Information Sciences in conjunction with the University of
Bergen, Norway provides software development services to extend the tool.
9. HEITML (On-going)
It is a framework for developing web application. Makerere University College of Computing
and Information Sciences represents that it has expertise in the area of web application
development with heitml and javaScript, and is able to provide original software development
assistance to HEI InformationSsysteme GmbH, Germany.
10. OMEVAC (On-going)
A proposal titled 'OMEVAC (Open Mobile Electronic Vaccine Trials)', an interdisciplinary
project to improve quality of vaccine trials in low-resource settings was accepted for funding.
The project Primary objective is to develop OMEVAC, a complete secure, mobile and electronic
system for data collection and management in vaccine trials, from source to publication and
using and complying to international standards and requirements.
11. OpenMRS (On-going)
This is a free opensource clinical data collection system. CoCIS has carried out the pilot
implementation of it at Mbarara, Masaka and Mbale hospitals. CoCIS is also actively involved in
developing additional modules for that.
1.4 PHEA Projects and Grants
CIT staff members won two competitive research grants in May 2007 from the Partnership for
Higher Education in Africa (PHEA). These include:
a. The project Survey Data Collection Using Mobile Phones by Mr. P. Bagyenda
involves carrying out research on how mobile phones can be used to collect information
that is vital in Health management in the African/rural setting. With mobile phones fast
4
becoming the most immediately accessible ICT device as a result of the benefits and
convenience they offer at low cost. By leveraging the accessibility and low-cost of
mobile phones and the benefits of electronic data collection, efficiencies can be derived.
With the grant from PHEA, researchers are able use mobile phones for data collection.
This project is on-going.
b. Another project by Prof. H.N. Muyingi Low-class Communities Income-generating ebusiness: Outreach Action-driven e-business for Rural and Art-craft Women
Communities, also received a grant from PHEA. The main objective of this project is to
harness ICT as a driver of socio-economic development within low-income communities
in Uganda by collaboratively helping to increase the income generation of participating
groups of women selling African artifacts and cultural goods around Kampala and
organized in cooperative or small or medium enterprises (SMEs), by use of appropriate
web technologies.
Furthermore, this project will allow rural communities to have access to cash money from
any mobile telecommunication end-point service providers (TESP) in their immediate
1.5
The College comprise of two schools that is School of Computing and Informatics Technology
(CIT) and East African School of Library and Information Science (EASLIS). The College is
managed by an administrative team led by a College Principal. Each School is headed by a Dean.
The School of Computing and Informatics Technology (CIT) has four academic departments and
the East African School of Library and Information Science (EASLIS) has two academic
departments. The College has an academic staff establishment of about 330 members.
School of Computing
and Informatics
Technology
Department of
Computer science
Department of
Information
Technology
Department of
Information
Systems
Department of
Networks
Department of
Records and
Arcives
Management
Department
of Library
and
information
sciences
Tele-Education Centre
CHAPTER TWO
system unit.
DVD-ROM
ram chips
hard disk
processor
Motherboard
power supply
I learnt more about the IDE connectors, SATA and the jumpers.
I learnt how to come up with a master and slave hard disk. The hard disk with a jumper
becomes the master and the one without the jumper becomes the slave.
Random-access memory (RAM): It provides temporary data storage for the CPU while the
computer is operating.
The various types of the random access memory which I learnt about are SDR and DDR.
SDRAM refering to Synchronous Dynamic Random Access Memory and DDR standing for
Double Data Rate. I learnt that DDR perfoms better work than SDR and the difference between
DDR and SDR is that the DDR has one notch and SDR has two notches. I learned how to
identify a computer with no RAM or when the chip is not fixed properly and that is according to
the beep codes generated when rebooting.
testing the RAM chip in a working computer if it doesnt work then exchange with a working
RAM, ensuring that the chip(s) are fixed properly then closing the System Unit and powering the
computer again.
2.0.2 Software installation:
Installation of Windows XP Operating system:
These are the procedures I learnt on how to install windows XP operating system.
The computer should be capable of booting from the CD-ROM drive since the windows XP CDs
are bootable.
Choose whether you want to install windows XP or repair the existing one. In our case of
installing a fresh copy of XP, press enter key and the installation begins.
Accept the user license agreement and failure to accept with the license agreement
installation can not proceed.
The next screen displays the available partitions from which the operating system can be
installed and prompts to select the partition you want are available. Press enter key to
move to the next screen to select a file system.
There are two file systems available and those are the File Allocation Table 32 (FAT32)
and New Technology File System (NTFS) being the best since it allows security features
and stability that are not possible with FAT32.You then select the file system and press
F10 key to run.
Installation will continue until you reach another reboot. The process proceeds for 39
minutes.
Follow all the steps prompted and those are basically settings.Activate the software and
enter your preferred username.
9
2.1 NETWORKING
Networking refers to the exchange of information or services among individual, groups or
institutions over a given network. Networks are systems that are formed by links.
I learnt the different different classes and the different types of modes and their respective signs.
The modes were as follows;
configuration/Global mode switch (config)#
User mode switch >
Privilege mode switch#
I learnt some of the commands used when working under the above modes.
Under the User mode, we have commands like:ipconfig :- for showing the ip address of the computer in use.
show :- for showing the commands used so far.
ping :- for pinging a given ip address.
Other commands were nslookup, trace route among the others.
Under the Privilege mode, we have commands like;
ping, trace route, copy run start, delete flash, show commands.
I learnt Cable termination. This involves coming up with the different types of cables
considering the two standards used namely Standard A and B. The cables terminated were the
Straight through, the console or roll-over and the Cross over cables
a) Straight through connects unlike devices and it has standard A on both sides.
b) Cross over connects like devices and it has standard A on one side and standard B on the
other side.
10
I also learnt how to subnet, how to come up with a network topology and learnt the various
routing protocols which are as follows:2.1.5 Routing Protocols
Routing Information Protocol (RIP): It has version 1 and 2
Open Shortest Path Fast (OSPF): It is another routing protocol and the last one being EIGRP.
Those are the three routing protocols configured under routing. I was also able to learn the
DHCP and DNS configurations.
2.1.6 Switching:
I learnt how to assign VLANs in a given network, the three categories of Access List Control
namely: Standard Access Control List which is configured closest to where traffic is heading.
Extended Access Control List which is configured closest to the destination.
Named Access Control List which is another type of access control. Access control
involves denying a given computing device from reaching or accessing the other for example a
denying a computer from accessing a given router.
I learnt how to one can access the others computer in the same LAN provided his ip address.
I was able to run commands under the windows prompt terminal and among the others were the
ping command that can enable one to access the others computer given his ip address. An
example could be ping 192.168.1.1. It can also be used to ping a given website when the
packets of data being sent are low that is to say when the web browser takes long to respond.
One can type ping cisco.com under that terminal so as to increase the packets being sent.
12
13
CHAPTER THREE
I learnt Virtual Local Area Network (VLAN) configuration and configuration of switches.
I learnt Access Control List, the three categories that is Standard Access, Extended
Control List and Named Access List.
I learnt how to use computers in a workgroup and a domain. We configured DHCP and
DNS on the Windows Server 2003.
I learnt how to install a Linux Server and that was Open Suse Linux Server.
I learnt shell scripting under Linux and how I can come up with scripts of various
categories using some of the basic linux commands.
I learnt different commands that can enable me to check my computers ip address using
Windows and Linux operating systems. I also learnt how to create ip addresses for an
upcoming company provided the number of branches or subnetworks they want .
I learnt the two types of subnetting and that is Class Less Subnetting which we were
recommended to use because it does not leave unutilized ip addresses in comparison to
Class Full Subnetting which wastes ip addresses.
I learnt troubleshooting a VLSM addressing design and Inter-VLAN routing.
Under server management, I also learnt a lot. I learnt the basic commands for Server
configurations, how to use Vi, Vim and Nano as the editors in the Linux command
terminal. Under Server management, I learnt how to copy files from the computer acting
as a server to other client computers as well as assigning them rights using the server.
Among the other commands, I learnt some that can enable me to create a new user
account used in case we can not login as the administrator to access full rights.
I have also learnt team work, being Honest, Creative and innovative and Modest as well.
I had an introduction to system administration and networking in my recess term but we
did not get enough practical sessions. I have gained more in this training because I
personally could not terminate cables, connecting networking devices like routers,
switches and computers in a network. I really thank my place of attachment for the lots of
skills that they have enabled me to acquire.
15
We covered server services and I was able to configure the backup domain controller and
installation with LDAP and Samba on Open Suse Server.
I also learnt how to set up idap client in Linux and how to use PAM to activate the
directory to login.
I was exposed to new technology for example the internet access point. I learnt that it is
through that internet access point that wireless is connected. I learnt that the WAP can
work as a four port switch and as a router
Under sharing resources and files, I learnt how to block ones password and spreading a
virus to ones documents.
Apart from windows XP installation, I also learnt how to install programs on the
computer and uninstall them.
CoCIS Makerere has guided me perfect in that I been able to attain the following values
during my stay at the place. These include:
Competency
Hard work and team work
Solidarity
Respect
Creativity and innovation
I met new individuals and interacted with them. This has improved my interpersonal
communication skills.
During my training, Mr Seth Muhairwe my field supervisor encouraged my to be
optimistic and to be eager in acquiring more skills. In addition he encouraged me to be
diverse in all the IT fields and that I can earn a living as an IT specialist. He said that
mere troubleshooting computers for my customers can help me earn. I can also come up
with an internet caf since I have got enough knowledge about networking
16
Some of my workmates were not social, some were mean and never wanted to
share their knowledge with others yet they seemed to be more skilled.
I did not get to interact with all the IT related activities due to the short scheduled
internship period. IT being wide is hard to exhaust but I have gained a lot.
CHAPTER FOUR
This chapter covers conclusions and recommendations I have come up with during my entire
period of the industrial training at CoCIS Makerere.
4.1.0 Conclusions.
The main Purpose of the industrial training has been achieved to a greater extent. I have gained a
lot for this part of my course load that is to say what I have acquired in the past two years all
being done practically. I do believe that the practical skills I have acquired in this training will be
of great importance as I pursue my career. I have met different personalities and as a result I have
been able to respond to each one of them accordingly. I have learnt how to handle such people
when at work. The training has also helped me discover my strengths and weakness as I struggle
to become an IT specialist.
4.1.1 Recommendations
The industrial training should be emphasized in order to solve the problem of students knowing
only the theory part minus the practical skills.
Enhancement in training facilities, would enable trainees have more practical training sessions
and able to demonstrate their skills to the interns.
The scheduled period offered by the faculty for industrial training should be noted carefully
because some areas of placement take long to start the training hence interns lose out. This would
be made possible through having partnerships with those places of placement so that as soon as
the internship period starts, they take up students from the university for the training. This will
reduce the time wasted by students in getting placements and also the placements to start off
immediately. The students will then be able to train for the ten weeks as stipulated by the
university.
References
18
16th,
June, 2014
Englander, I. (2000). The Architecture of computer hardware and systems software. John
Wiley, USA, p272.
http://www.manageengine.com/products/applications_manager/system-management
APPENDICES
Appendix 1: The procedures that were undertaken during repairing of Windows XP
operating system are discussed below;
19
We set the CD-ROM drive as the first boot in the computers Basic BIOS, inserted a
bootable Windows XP Compact Disk in the CD-ROM Drive, saved the changes and
we restarted the computer.
At booting, we pressed F12 to boot from CD-ROM, then pressed any key on the
keyboard and the windows setup started.
We either used the repair console or the normal windows setup depending on ones
internship training group. We pressed the ENTER key to continue.
We pressed F8 key to accept the terms and conditions.
After the setup detecting the previous windows installations, the repair option was
given.
We then pressed R option to begin the repairing.
All necessary files for the setup were copied to the drive that contained the preinstalled Operating System and then rebooted to begin installation.
We then followed all the steps until the repair was complete.
Those were the steps involved in repairing Windows XP operating system.
Appendix 2: The steps that I undertook during the termination of cross over cable include
the following;
I held the cable and used a crimp tool blade to cut both ends of the cable.
20
I arranged the cable wires in their right order starting with white orange, orange, white
green, blue, white blue, green, white brown and brown(standard B) on one side and white
green, green, white orange, blue, white blue, orange, white brown, brown(standard A) on
the other end respectively.
Straightened them and used a crimp tool blade to cut them at the same level.
Held the RJ45 connector while the clip was facing downwards, pushed in the wires
Appendix 3: The steps that I undertook during the termination of straight through cable
include the following;
I held the cable and used a crimp tool blade to cut both ends of the cable.
I arranged the cable wires in their right order starting with white orange, orange, white
green, blue, white blue, green, white brown and brown in that order.(standard A) on both
sides.
Straightened them and used a crimp tool blade to cut them at the same level.
Held the RJ45 connector while the clip was facing downwards, pushed in the wires
Appendix 4: The steps that were taken when setting up a Local Area Network (LAN) are
discussed below;
We placed a network switch on a flat surface acting as a center of convergence of all
nodes on the network.
21
We connected cables to the wireless modem that was connected to the server and from
the server to the client computers.
Different IP addresses of class C network were distributed to different computers, the
default gateway and the subnet mask were all the same.
Pinging anothers computer was done using the ping command to check for connectivity
that is to check whether we were within the same network and the LAN was created.
Appendix 5: Under resource sharing, the following steps were taken;
We set up a network and configurations were made and a folder was created on the
desktop.
I right clicked on the folder that was going to be shared by everyone on the network.
I then I clicked sharing and security
Clicked on the link.
I then marked the checkbox which reads Share this folder on the network and then I
clicked OK.
Finally all computers on the network were able to access the folder.
Processor
22
Slow computers
same time.
an updated antivirus.
- Low memory.
- Corrupt system files
- Faulty Motherboard
RAM
Power supply
13th -17th
ITEM/COURSE:
Computer Hardware
- Software
- Assemble, Disassemble
- Windows Operating system
- Unix Operating System
- Cloning
23
Networking
20th June
Server Management
1st 15th July
Services
16th 23 th July
- Applications
- Databases
- Web hosting
24