Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

It Report 1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 59

ABUBAKAR TAFAWA BALEWA UNIVERSITY BAUCHI

PMB 0248 BAUCHI, NIGERIA

STUDENTS INDUSTRIAL WORK EXPERIENCE SCHEME (S.I.W.E.S.) UNDERTAKEN AT:

NIGERIAN PORTS AUTHORITY


No. 26/28 Marina, Lagos. (MAY 23, 2009 - NOV, 23 2009)

AND

BLUECHIP TECHNOLOGIES (SENSE-D CONSULTING)


16 Boyle StreetOnikan, Lagos. (NOV 24, 2009 MAY 31, 2010)

A TECHNICAL REPORT

IN

PARTIAL FULFILLMENT FOR THE AWARD OF BACHELOR S DEGREE (B.TECH) IN COMPUTER SCIENCE

BY HAUWA MAULUDATU ABDULLAHI MATRICULATION NUMBER: 05/15998/1

MATHEMATICAL SCIENCES PROGRAMME SCHOOL OF SCIENCE ABUBAKAR TAFAWA BALEWA, UNIVERSITY BAUCHI.

CERTIFICATION This is to certify that, this report conform with the acceptable standards of scholarly presentation as regards the industrial training undertaken by HAUWA MAULUDATU ABDULLAHI of the Mathematical sciences program (Computer science) in the school of Science Technology of the ABUBAKAR TAFAWA BALEWA UNIVERSITY BAUCHI at the Nigerian Ports

Authority No. 26/28 Marina, Lagos and Bluechip Technologies Limited No 16. Boyle Street Onikan, Lagos. .

. SIWES COODINATOR

. DATE

COORDINATOR (MSP)DATE

..

DEDICATION I dedicate this write up to ALLAH who saw me through the period of my Industrial Training attachment. I also dedicate this report to my family for their support, encouragement and understanding while I was on the industrial training attachment.

ACKNOWLEDGEMENT With Kindest regards and heart-felt thanks, I wish to express my profound gratitude to the entire management and staff of Nigerian Ports Authority (NPA) andBluechip technologies (Sense-D) for the outstanding attachment I had, and the wonderful opportunity I was offered to work in the companies. More so, my gratitude goes to particular members of staffs of the above named companies whom my attachment would have been a mere sheep-herding. If I were to mention names, I would be most elated to enlist all members of staff. However due to space constraints, I cannot but only say a big thank you to all. My stay was indeed fruitful and memorable. I would not also forget to mention my Industry-based supervisors, Mr. Ibrahim M. Babangida (N.P.A), and Miss Deborah Alelumhe whom where very supportive and helpful during my training. My special regard extends to my parents, sisters, brothers, lectures/faculties friends and colleagues. This is a token of that appreciation. All thanks Belong to Allah..Amin.

PREFACE Man has invented many electronic devices but the computer has made a greater impact on society than any other device. They have made a potentially significant contribution to the society during the last three decades.

The areas of computer applications are literally too numerous to mention. Computers have become an integral part of mans everyday life. They dominate every sphere of life be it entertainment, education, banking, insurance, research, medicine, design or manufacturing. They continue to grow and open new horizons of application. One of the primary reasons for the immense popularity of computers is speed with which they can accomplish specified tasks. This makes the computer quite an expensive electronic device This report is on the experiences gathered on Computer maintenance, Local Area Networking during my industrial attachment at the Nigerian Ports Authority and Software/ application development, Data mining , database development and maintenance, Business intelligence and some little programming experiences at Bluechip Technologies.

TABLE OF CONTENT Certification Dedication Acknowledgement Preface Table of Content VII

I II III IV V,VIAbstract

SECTION 1:INDUSTRIAL TRAINING FUND (ITF) CHAPTER ONE

1.1.1 HISTORY OF INDUSTRIAL TRAINING FUND (ITF) 1.1.2 STUDENTS INDUSTRIAL WORK EXPERIENCE SCHEME 1.1.3 OBJECTIVES OF SIWES

SECTION 2:NIGERIAN PORTS AUTHORITY (NPA) CHAPTER ONE

2.1.1 PROFILE OF THE ORGANIZATION 2.1.2 FUNCTIONS OF NIGERIAN PORTS AUTHORITY 2.1.3 OBJECTIVES OF NIGERIAN PORTS AUTHORITY 2.1.4 BOARD OF DIRECTORS 2.1.5 MISSION STATEMENT 2.1.6 VISION STATEMENT 2.1.7 THE ORGANOGRAM OF NIGERIAN PORTS AUTHORITY (NPA) 2.1.8 ORGANIZATIONAL STRUCTURE/ PROFILE OF DEPARTMENT CHAPTER TWO 2.2.1 FIRST DAY EXPERIENCE 2.2.2 CONCEPT OF COMPUTER NETWORKING 2.2.3 2.2.4 2.2.5 2.2.6 2.2.7 2.2.8 2.2.9 TYPES OF NETWORKS LOGICAL CLASSIFICATION OF NETWORKS NETWORK ADAPTERS COMPUTER NETWORKING DEVICES NETWORK TOPOLOGY BASIC TYPES OF TOPOLOGIES TRANSMISSION MEDIA

2.2.10 SERVER TYPES 2.2.11 LOCAL AREA NETWORKING/ TROUBLESHOOTING 2.2.12 CRIMPING OF NETWORK CABLES 2.2.13 SOFTWARE INSTALLATION CHAPTER THREE 2.3.1 WORKDONE/ PROBLEMS IDENTIFIED 2.3.2 PROBLEMS IDENTIFIED
SECTION 3: BLUECHIP TECHNOLOGIES (SENSE-D CONSULTING) CHAPTER ONE 3.1.1 PROFILE OF THE ORGANIZATION 3.1.2 SERVICESOF BLUECHIP TECHNOLOGIES 3.1.3 OBJECTIVES OF BLUECHIP TECHNOLOGIES

3.1.4 MANAGEMENT PROFILE 3.1.5 MISSION STATEMENT 3.1.6 VISION STATEMENT 3.1.6 BLUECHP TECHNOLOGIES ORGANIZATION HIERARCHY CHAPTER TWO 3.2.2 CONCEPT OF SOFTWARE DEVELOPMENT 3.2.3 SOFTWARE DEVELOPMENT PROCESS 3.2.4 SOME AREAS WHERE SOFTWARE/APPLICATION DEVELOPMENT PROCESS ARE APPLIED. 3.2.5 SOME TOOLS/TECHNOLOGIES USED IN SOFTWARE/APPLICATION DEVELOPMENT INCLUDE. 3.2.7PROJECT UNDERTAKEN/ WORK DONE 3.2.8 SOFTWARE INSTALLATION CHAPTER THREE 3.3.1 WORKDONE/ PROBLEMS IDENTIFIED 3.3.2 PROBLEMS IDENTIFIED
SECTION 4:RECOMMENDATION/ CONCLUSION CHAPTER ONE

4.1.1 FOR PROSPECTIVE INTERNS 4.1.2 FOR THE COMPANY 4.1.3 FOR THE INSTITUTION 4.1.4 CONCLUSION

ABSTRACT Student industrial work experience scheme (SIWES) as the name implies is an avenue through which students from various disciplines are given the opportunity to have a feel of what their various professions entails.This is to prepare them for the future as to what the outside world would expect from them when needed. SIWES is an avenue through which many skilled manpower and proficient individuals have been raised for exploration by diverse industries. This report gives the profile of industrial training fund (ITF), profile of the Nigerian Ports Authority(NPA) and Bluechip Technologies(Sense-D) in which the SIWES programme was undertaken with their organizational charts (organ gram). Work experience during the programme is also elaborated upon this report, which basically is on computer networking, types of networking based on scale, various networking devices, types of network topology, Business application developments, Relational database design and implementation, web content development,java programming ,Data mining, Data warehousing, e.t.c. Work done and the various problems encountered is succinctly stated in this report which covers the area of local area networking / troubleshooting a LAN connection, crimping of network cables and software installation on computer systems, web scripting, application development, applet programming ,database administration and development e.t.c. Finally, recommendations were made for prospective interns and the companies, for future reference, and conclusion of what the report actually entails.

SECTION 1: INDUSTRIAL TRAINING FUND (ITF)

CHAPTER ONE

1.1.1 HISTORY OF INDUSTRIAL TRAINING FUND (ITF) The Federal Military Government established the Industrial Training Fund (ITF) in 1971 during the second national plan within the period 19701974. The decree number 47 of 1971 was charged with the responsibility of promoting and encouraging the acquisition of skills in industry and commerce. This was done with the view of generating a pull of indigenous trained manpower sufficient to meet the needs of the economy. The Students Industrial Work Experience Scheme is one of the projects that is carried out under the Industrial Training Fund. 1.1.2STUDENTS INDUSTRIAL WORK EXPERIENCE SCHEME: The students Industrial Work Experience Scheme (SIWES) is the accepted skills training programme, which forms part of the approved Minimum Academic standards in the various degree programmes for all the Nigerian Universities. It is an effort to bridge the gap existing between theory and practice of engineering and technology, sciences, agriculture, medical, management and other profession educational programmes in the Nigerian tertiary institutions. It is aimed at exposing students to machines and equipment, professional work methods and ways of safe-guarding the work areas and workers in industries and other organizations. The minimum duration for the SIWES should normally be 24 weeks except for engineering and technology programmes where the minimum duration is 40 weeks. The scheme is a tripartite programme, involving the students, the universities and the industry (employers of labour). It is funded by the Federal Government of Nigeria and jointly coordinated by the Industrial Training Fund (ITF) and the National Universities Commission.

1.1.3 OBJECTIVES OF SIWES: Specifically, the objectives of the Students Industrial Work Experience Scheme are to: i. Provide an avenue for students in the Nigerian universities to acquire industrial skills and experience in their course of study; ii. Prepare students to work situation they are likely to meet after graduation; iii. Expose students to work methods and techniques in handling equipment and machinery that may not be available in the universities; iv. Make the transition from the university to the world of work easier, and thus enhance students contacts for later job placement; v. Provide students with an opportunity to apply their theoretical knowledge in real work situation, thereby bridging the gap between university graduates for employment in industry; and vi. Enlist and strengthen employers involvement in the entire educational process of preparing university graduate for employment in industry.

SECTION 2: NIGERIAN PORTS AUTHORITY (NPA)

CHAPTER ONE 2.1.1 PROFILE OF THE ORGANIZATION


Company History: The development of a seaport in Nigeria started in the mid

19th-century in the era of explorers and traders. Although limited initially to the opening up of the Lagos lagoon, it however resulted in the opening of ports at Apapa and Harcourt. This led eventually to the establishment of the Nigerian Ports Authority (NPA) in 1954 to maintain the ports as well as load and discharge cargo. The NPA commenced operation on 1st April, 1955. It made remarkable progress and on the 15th of June 1992, The Nigeria Ports Plc was incorporated. However, in consideration of its full ownership while recognizing its commercial status the company in October 1996, reverted to its former name - Nigerian Ports Authority. In pursuance of government efforts to ensure the efficiency of public enterprises, the operation of the Nigerian Ports Authority became fully commercialized in May 1992. The Nigerian Ports Authority today is a wholly government owned organization under the supervision of the Federal Ministry of Transport with eight ports in different locations in the country, they are: Apapa Port, Tin Can Port, Roro Port , Warri Port, Port Harcourt Port, Calabar Port, Ocean and Lighter Terminal, Container Port. There is also the NPA International.

2.1.2 FUNCTIONS OF NIGERIAN PORTS AUTHORITY:The functions of the Nigerian Ports Authority are as follows- Pilot age, Towage, Supply of water, Ship repair, Security services, Fire Service, Medical Services, Computerization of Ports, Subsidiary Companies and Auxiliary Services.

2.1.3

OBJECTIVES

OF

NIGERIAN

PORTS

AUTHORITY:

To

promote

operational efficiency, cost effectiveness and customer satisfaction through a

committed workforce while ensuring adequate returns on stakeholders investments, with the ports serving purely as operational transit point for cargo and regional ports for the sub-region. 2.1.4 BOARD OF DIRECTORS:

MD (C.E.O)

E. D. Marine & Operations

E. D. Finance

E. D Corporate Service

E. D.Engineering / Tech.

2.1.5MISSION STATEMENT To promote competitiveness of Nigerian Ports, through the efficient provision, development and management of port/marine infrastructure, port regulation and land administration, as well as adapting to the changing demands of maritime trade to play a leading role in the African region.

2.1.6VISION STATEMENT Developing safe and secure Nigerian Ports into a distribution platform from where the West and Central African Sub-region can be served.

2.1.7THE ORGANOGRAM OF NIGERIAN PORTS AUTHORITY (NPA)

M.D (C.E.O) General Manager Audit Special Assistant

Assistant General Manager P/Affairs

E. Director Corp Services Finance

E. Director Eastern Zone

E. Director Western Zone

G. Manager G. Manager G. Manager G. Manager

Asst. G.M

Prin. Managers Asst. G.M Snr. Manager Port Managers Manager Asst. Manager Prin. Managers Snr. Officer Officer 1 Officer 2 Asst. G.M Asst. G.M

Port Managers

2.1.8 Organizational Structure/ Profile of Department: I worked in the Data Processing/Management and Information Systems Department. The department has the function supplying and managing (maintaining) of the computers used in the company and also the printing out of staff pay slip.

GM MIS

AGM Budget

AGM CP&S

AGM Data Processing

The subsequent chapters are a full description of what I learnt and did as an Industrial Training student in the department.

CHAPTER TWO

WORK EXPERIENCE

2.2.1FIRST DAY EXPERIENCE

On resumption of work at NPA, I was given a letter of appointment by the Assistant General Manager of the training department and was asked to take the letter to the Data Processing department for further instructions. After all was said and done, I was escorted to the networking unit by one of the computer personnel.When I got to the networking unit (popularly called Server Room in NPA), and was introduced to my industry based supervisor whose name is Mr. Ibrahim M. Babangida. He gave me a vague description of the kind of work that is expected to be carried out (network maintenance and troubleshooting), the time of resumption and closure (8am to 5pm) as well as other general information that would aid in the proper conduct of the training.He also introduced some of the other personnel that work in the networking unit as well as a few other interns from other higher institutions that are also on industrial training.

2.2.2 CONCEPT OF COMPUTER NETWORKING Computer networking is a collection of computers connected to each other. The networks allow computers to communicate with each other and share resources and information. Computer networks can be classified based on their scale, according to the hardware and software technology that is used to interconnect the individual devices in the network, according to the functional relationships which exist among the elements of the network and according to the network topology upon which the network is based. Networking arose from the need to share data in a timely fashion. Computers that are part of a network can share data, messages, graphics, printers, fax machines, modems and other hardware resources.

2.2.3TYPES OF NETWORKSListed below are various types of computer networks in order of their scale of distribution:

a. Personal area network (PAN): is a computer network used for communication among computer devices close to one person. Examples of devices used in PAN are scanners, fax machines, printers, telephone, and PDAs. b. Local area network (LAN): is a computer network covering a small physical area like a home, office, or small group of buildings, such as a school or, an airport. Current LANs are most likely to be based on Ethernet technology. For example, a library may have a wired or wireless LAN for users to interconnect local devices (e.g., printers and servers) and to connect to the internet. The principle of a local area network is that multiple users each with their own system can share resources which may be expensive (like hard disk or a common value such as a centralized set of department records.LAN networks are characterized by workstations that are usually microcomputers, LAN network usually contain peripherals such as hard disk units and printers to which all users have access via the network. c. Campus area network (CAN): is a computer network made up of an interconnection of local area networks (LANs) within a limited

geographical area. A campus area network is larger than a local area network but smaller than a wide area network (WAN). d. Metropolitan area network (MAN): is a network that connects two or more local area networks or campus area networks together but does not extend beyond the boundaries of the immediate town/city. Routers, switches and hubs are connected to create a metropolitan area network. e. Wide area network (WAN): is a computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries. Less formally, a WAN is a network that uses routers and public communications links. The largest and most well-known example of a WAN is the internet.WAN connects large numbers of computers and terminals over a long distance. In WAN network is usually nationwide or even worldwide. The workstations are

terminals or even microcomputers. Computing power of the network maybe provided by a number of mainframe computers which maybe remote from each other connected by high speed data links, users will usually be able to connect to a point on the network near to them. The advantages of WAN are that the user has a fast means of communicating with other users where ever they are and access is provided to other mainframe facilities.

2.2.4 LOGICAL CLASSIFICATION OF NETWORKS Networks can be divided into two main categories:
1. Peer-to-peer (Workgroup Network) Network:

This

means

computer-to-computer. This network provides a simple and inexpensive way to interconnect less than ten computers. It is common in small offices or departments in a large organization. Each computer can access files stored on any of the computers stored on the network. Each computer acts as both a client and a server, there are no dedicated severs or hierarchy among the computers. There is no one to be assigned administrator responsibilities for the entire network. The user on each computer determines what data on their computer gets shared on the network.
2. Client-Server (Server based) Network: This is a server-based

network that is essentially used for sharing data such as Accounts/Order processing systems, and other resources. It provides a better security as all resources of the computer are centrally located on the server. A server based network is such that other computers called clients, request services and other computers, called servers respond to the requests. In a

client/server network, there is usually a dedicated central system called sever on which the files of every user connected to the network are stored. Client/server network provides an efficient way

of

connecting

computers

(10

or

more

systems)

to

share

information. This type of network has dedicated servers that only function as severs and are not used as clients or workstation. There are different servers that have been specialized for different functions such as print servers, file servers, Application servers, fax servers etc. Clients are computers or workstations that can access information stored on Servers.

2.2.5 NETWORK ADAPTERS There are two widely-used adapters. They are: (a) Ethernet adapter: This is the most widely used method of exchanging information on a network. Ethernet works in a way similar to how people talk in a polite discussion. Each workstation waits for a pause before sending information so as to avoid collision. Collision occurs when two workstation send information at the same time. There is a HUB which is a device that centrally connects all the cables in a network. This hub arrangement gives rise to a star-sired tree topology. (b) Token ring adapter: Beside the fiber optic cables, this is the most expensive connection. The workstations in a network continuously pass an electronic token among themselves. A token is a small message that indicates that the network is free. To send a file the workstation waits for a token, gets the token attaches it to the network to indicate free traffic.

2.2.6 COMPUTER NETWORKING DEVICES Computer networking devices are units that mediate data in a computer network. Computer networking devices are also called network equipment, Intermediate Systems (IS) or Interworking Unit (IWU). Units which are the last receiver or generate data are called hosts or data terminal equipment.

Common basic network devices: y Gateway: device sitting at a network node for interfacing with another

network that uses different protocols.


y Bridge: a device that connects multiple network segments along the data

link layer.

Router: a specialized network device that determines the next network

point to which to forward a data packet toward its destination. Unlike a gateway, it cannot interface different protocols.
y Switch: a device that allocates traffic from one network segment to

certain lines (intended destination(s)) which connect the segment to another network segment. So unlike a hub a switch splits the network traffic and sends it to different destinations rather than to all systems on the network.
y Hub: connects multiple Ethernet segments together making them act as

a single segment. When using a hub, every attached device shares the same broadcast domain and the same collision domain.

Repeater: device to amplify or regenerate digital signals received while

setting them from one part of a network into another. 2.2.7NETWORK TOPOLOGY Network

topology is the study of the arrangement or mapping of the elements (links, nodes, etc.) of a network, especially the physical (real) and logical (virtual) interconnections between nodes. It refers to how computers in a network are physically connected. A local area network (LAN) is one example of a network that exhibits both a physical topology and a logical topology. Any particular network topology is determined only by the graphical mapping of the configuration of physical and/or logical connections between nodes. Thus topology can be categorized into physical and logical topologies. The physical topology describes the routes of the network cables as they link each node while the logical topology refers to how messages flow from one station to another.

2.2.8 BASIC TYPES OF TOPOLOGIESThere are six basic types of topology in networks:
y BUS: This type of network topology is the one in which all of the nodes of

the network are connected to a common transmission medium which has exactly two endpoints (this is the 'bus', which is also commonly referred to as the backbone, or trunk) all data that is transmitted between nodes in the network is transmitted over this common transmission medium and is able to be received by all nodes in the network virtually simultaneously. In a bus network configuration, each node is connected to one main communications line. With this arrangement, even if one of the nodes goes down, the rest of the network can continue to function normally.

BUS TOPOLOGY

STAR: This is the type of network topology in which each of the nodes of

the network is connected to a central node with a point-to-point link in a 'hub' and 'spoke' fashion, the central node being the 'hub' and the nodes that are attached to the central node being the 'spokes' (e.g., a collection of point-to-point links from the peripheral nodes that converge at a

central node) all data that is transmitted between nodes in the network is transmitted to this central node, which is usually some type of device that then retransmits the data to some or all of the other nodes in the network.

STAR TOPOLOGY

RING: This is the type of network topology in which each of the nodes of

the network is connected to two other nodes in the network and with the first and last nodes being connected to each other, forming a ring all data that is transmitted between nodes in the network travels from one node to the next node in a circular manner and the data generally flows in a single direction only. In a ring network, messages travel in one direction around a ring from node to node. As each node receives a message, it checks the message address. If the message is not for that particular node, the message is regenerated and passed on. This regeneration allows messages to travel farther in a ring network than in other network configurations.

RING TOPOLOGY y MESH: This is the type of network topology in which each of the nodes of

the network is connected to each of the other nodes in the network with a point-to-point link.

MESH TOPOLOGY y TREE: also known as hierarchical network is a type of network topology

in which a central 'root' node (the top level of the hierarchy) is connected to one or more other nodes that are one level lower in the hierarchy (i.e., the second level) with a point-to-point link between each of the second level nodes and the top level central 'root' node.

TREE TOPOLOGY y HYBRID: This is the type of network topology that is composed of one or

more interconnections of two or more networks that are based upon the same physical topology, but where the physical topology of the network resulting from such an interconnection does not meet the definition of the original physical topology of the interconnected networks.

HYBRID TOPOLOGY

THE INTERNET TOPOLOGY

Connecting individual computers to each other creates networks. The Internet is a series of interconnected networks. Personal computers and workstations are connected to a Local Area Network (LAN) by either a dialup connection through a modem and standard phone line or by being directly wired into the LAN. Other modes of data transmission that allow for connection to a network include T-1 connections and dedicated lines.

Bridges and hubs link multiple networks to each other. Routers transmit data through networks and determine the best path of transmission.

INTERNET TOPOLOGY

2.2.9 TRANSMISSION MEDIA There are many data transmission media. They are: 1) CABLES: Most networks are connected by some sort of wire or cable which acts as some sort of medium carrying signal between computers. There is a variety of cable that can meet the varying needs and sizes of networks. The major types of cabling include: i) Coaxial-consists of a core made up of solid paper surrounded by insulation, a braided metal shielding and an outer cover. Coaxial cable is mostly used in the TV industry and some LANS. Coaxial cable is of two types:
y

Thin (thinnet)-which is flexible and about 25 inch thick and can carry a signal up to approximately 185 meters.

Thick (thicknet)- is a relatively rigid coaxial cable about 0.5 inch in diameter. Sometimes referred as standard Ethernet .

The thick cable has greater immunity for noise and is more durable. The thin cable on the other hand carries signals over a short distance.

ii) Twisted-pair Cable-it consists of insulated strands of copper wire twisted around each other .this is of two types, unshielded twisted pair and shielded twisted pair. Twisting reduces electrical interference (crosstalk).The shielded cable has increased amount of insulation and hence it is noise-immune. It is used in many network topologies including Ethernet, ARCNet, and IBM token ring topologies. Telephone companies mostly use the unshielded.

iii) Fiber optic cable: this consists of a single bundle of hair-like glass fiber along which signals travel as pulses of light. Fiber optic cables use light instead of electricity to carry information. This medium is however expensive but transmits at high speed and is very immune to interference.

2) MICROWAVE LINK: microwaves are electromagnetic waves, which travel in straight lines and the quality of signal reduces as they move farther away from the source. There are microwave towers serving as boosters that amplify and retransmit the signals to the next station. It is used for wireless connections. 3) SATELLITE LINK: A geosynchronous satellite which orbits about 23,000 miles above the surface of the earth is used for information

communication. The satellite is permanently stationed at a point in the planet so that it is continuously available for communication with all the points within its range.

2.2.10 SERVER TYPES In the Nigerian Ports Authority the server room housed four main servers which have Windows Server 2003 Service pack 1 installed on them. These servers include;
y DOMAIN CONTROLLER:This connects the computers to each other

over the network. On Windows Server Systems, a domain controller (DC) is a server that responds to security authentication requests (logging in, checking permissions, etc.) within the Windows Server domain. A domain is a concept introduced in Windows NT whereby a user may be granted access to a number of computer resources with the use of a single username and password combination.
y SAGE SERVER: this server is used to save accounting data at the

end of each day the data that has been worked upon on the sage is backed up and saved to an external storage device. It contains accounting software packages that can be accessed by employees of the company. Sage server works under the domain controller and also stores Cooperate version of the MacAfee antivirus software which is shared by all members of the organization. The updates to the antivirus are downloaded every five minutes from MacAfee.
y ISA SERVER: Microsoft's Internet Security and Acceleration Server

(ISA SERVER) provides the two basic services of an enterprise firewall and a Web proxy/cache server. ISA Server's firewall screens all packet-level, circuit-level, and application-level traffic. The Web cache stores and serves all regularly accessed Web content in order to reduce network traffic and provide faster access to frequentlyaccessed Web pages. ISA Server also schedules download of Web page updates for non-peak times. ISA Server allows administrators to create policies for regulating usage based on user, group, application, destination, schedule, and content type criteria.

INTRANET SERVER: An intranet is a private computer network that

uses Internet Protocol technologies to securely share any part of an organization's information or network operating system within that organization. The term is used in contrast to internet, a network between organizations, and instead refers to a network within an organization. Sometimes the term refers only to the organization's internal website, but may be a more extensive part of the organization's information technology infrastructure. It may host multiple private websites and constitute an important component and focal point of internal communication and collaboration.

2.2.11 LOCAL AREA NETWORKING/ TROUBLESHOOTING During my SIWES programme in Nigerian Ports Authority (NPA), I was able, with the basics learnt on networking from my industry-based supervisor, to link computers together using the star network topology especially. I was able to link the various computers in the fire service department, special duties department, civil engineering department, e.t.c. This local area network that I carried out required the use of hubs, Ethernet network cables, RJ-45, crimping tool and a LAN tester to test if the crimped cable is well crimped for the networking process about to be put in place. However, there are situations a times that I am been caught up with when carrying out a local area network connections which requires troubleshooting procedures to detect why the computers or certain computers on that same network are not seeing the network. As a result of these developments what I often do is to check if the Local area network on that particular computer is disabled so as to re-enable back. At times after all connections have been carried out and the computer is not connected I would need to restart the system as a form of refreshing its operating system to recognise the newly connected device. Another problem

often identified is that some computers are assigned IP addresses, which is not meant to be because the nature of the network detection operated on in NPA is a domain host configuration protocol (DHCP), which requires an automatic for of network detection. These are some of the problems I encounter after carrying out my connections, which I have to resolve so as enable the connected computers see the network.

2.2.12 CRIMPING OF NETWORK CABLES Most often I crimp network cables needed for a local area connection. Before I crimp any network cable I have to make sure I Know the length of the cable required for the LAN connection so as not to result into waste of available RJ-45. When I crimp a network cable what I often put into consideration is that both ends of the crimped cable must align to enable it work when put to use. The arrangement of the embedded cables when crimped follows thus; brown, white-brown, green, white-blue, blue, white-green, pink and then white-pink. The problem I usually encounter here is that of edge-alignment for a proper grip when clip with the aid of the crimping tool. Therefore, I try as much as possible to overcome this because most of the time it results into wastes of RJ45.

2.2.13 SOFTWARE INSTALLATION Installation of software is one basic work I do while on my SIWES programme. I often carry out this duty when new computers are bought in the department. Before the installation proper I have to make sure that I uninstall any available trial versions of the software I am about to install so as to avoid software conflict when the operating system is running. The software I usually install includes Microsoft office 2007, McAfee antivirus, Java, e.t.c. The problem I face here is mostly from the installation of McAfee, which update that take long period of time on the internet for effective performance.

CHAPTER THREE

2.3.1 WORKDONE/ PROBLEMS IDENTIFIED


a. Local area networking/ troubleshooting b. Crimping of Ethernet network cable c. Software installation d. Backing-up of files on external storage devices e. Deployment of McAfee antivirus on newly bought computers

2.3.2 PROBLEMS IDENTIFIED


a. Unavailability of network cables and RJ-45 b. Shortage of tools per personnel which often make job execution slow c. The industry based supervisor was not always available to instruct us

when we run into difficulties trying to solve problems


d. Less fund in the area of transportation e. Erratic power supply

SECTION 3: BLUECHIP TECHNOLOGIES (SENSE-D CONSULTING)CHAPTER

ONE 3.1.1 PROFILE OF THE ORGANIZATION


Company history:Bluechip Technologies Limited started in the year 2008 it

was originally know as Sense-D consulting which was owned and established by KazeemTewogbade. Later a partnership establishment was proposed by OlumideSoyombo which brought about the birth of Bluechip Technologies Limited, with KazeemTewogbade and OlumideSoyombo as major share holders. It had Multiliks as its first client then later, Zain, MTN, etisalat, MTN-Zambia NDIC and Bank PHB. Bluechip Technologies is a wholly owned Nigeria Company specialized typically on IT solutions and services; application development and support, implementation and other IT value added services. We have our presence in Nigeria and Zambia.

3.1.2 SERVICES OF BLUECHIP TECHNOLOGIES: The services of Bluechip Technologies include Business Requirement Analysis, Data warehouse design and construction, Data Management, Customer Analytics, Custom Application Development, and Business Performance Measurement

3.1.3 OBJECTIVES OF BLUECHIP TECHNOLOGIES:To provide high quality and cost effective data warehousing solutions for enterprises. To assist our clients in extracting business meaning from their data and developing competitive advantage by creating custom designed information management strategies and solutions through the use of data warehousing, data mining, knowledge management, and other business intelligence disciplines. To balance our data management knowledge with a healthy understanding, of the human element, to information technology solutions. To establish strategies that is custom fit to each unique business challenge. We work to sustain reputation for excellent customer service and helping our clients discover the key to their organizational intelligence.

3.1.4 MANAGEMENT PROFILE


KazeemTewogbade (Senior Manager)

B.Sc Computer Science(Ibadan) 1st Class Certified Project Management Professional Over 13 years Systems Integration Experience Experience in Nigeria and Southern Africa

OlumideSoyombo (Manager)

B.Sc Systems Engineering(Lagos) M.sc Business and I.T (Birmingham, UK) Distinction Certified Business Analysis Professional (CBAP, IIBA) Over 8 years Business Analysis and Data Modelling experience Experience in Nigeria, Southern Africa and U.K

RilwanLateef (Manager)

B.Sc Computer Science (Ibadan) 1st Class Master of Business Administration (Lagos) Over 14 years Systems Integration and Solution Development

Experience.

Last 3 years at senior management position in a Nigerian Telco Experience in Nigeria and Southern Africa

3.1.5MISSION STATEMENT: To turn our clients vital business data into a competitive, advantage by implementing integrated business application solutions.

3.1.6VISION STATEMENT:To be the premier specialist business application consulting firm delivering world-class services and values in Nigeria and beyond.

3.1.6 BLUECHP TECHNOLOGIES ORGANIZATION HIERARCHY:

Senior Manager (SM)

Manager 1

Manager 2

Manager 3

Consultant 1

Consultant 2

Consultant 3

Analyst 1

Analyst 2

Analyst 3

BITP Trainees

Youth Coppers

Industrial Trainees Office Assistant/ Cleaner

Drivers

CHAPTER TWO

WORK EXPERIENCE

3.2.1FIRST DAY EXPERIENCE On my first day of work at Bluechip Technologies, I was given a letter of appointment by the Human Resource Manager of the company and was asked to the wait to see the Company Manager, Mr. Olumide to have a chat with him after a few minutes I was asked to go into his office where he explained to me what the company bluechip Technologies was all about, their services, the types of clients they service, What they do, and how they go about in carrying out those services in terms of the technologies they use. He also told me to be a very inquisitive person and to be free to ask any member of staff any arising questions that I may have. After my chat with Mr. Olumide he then introduced me to my supervisor Miss. Deborah Alelumhe and told me that she will provide me with anything I need, she would also be responsible for signing my log books and other documents. I was also introduced some of the other members of staff that work in the company as well as a two other interns from other higher institutions that are also on industrial training.I was also informed that their working hours was from 9:00am to 5:00pm.

3.2.2 CONCEPT OF SOFTWARE DEVELOPMENT Software development (also known as Application Development, Software Design, Designing Software, Software Engineering, Software Application Development, Enterprise Application Development, and Platform Development) is the development of a software product in a planned and structured process to meet specific needs of a specific client/business, to meet a perceived need of some set of potential users, or for personal use. It is the set of activities that results in software products. Software development may include research, new development, modification, reuse, re-engineering, maintenance, or any other activities that result in software products. The term software development may also refer to computer programming, the process of writing and maintaining

the source code. Software development can also refer to applications development which is the development of a software product in a planned and structured process. Application development involves creating a computer program, or set of programs to perform tasks, from keeping track of inventory and billing customers to maintaining accounts, speeding up business process and, in fact, even improving application effectiveness. Application development involves higher levels of responsibility (particularly for requirement capturing and testing). 3.2.3 SOFTWARE DEVELOPMENT PROCESS A software development process, also known as a software development lifecycle, is a structure imposed on the development of a software product. It can also be known as software life cycle and software process. The process of software development consists of various stages and activities some of which include. 1. User Requirements. The important task in creating a software product is extracting the requirements or requirements analysis. The essential purpose of this phase is to find the need and to define the problem that needs to be solved. It answers the questions, what does the user want? Interview and interact with the users to determine their expectations. What should the program do for them? An understanding of the business need helps. Getting user needs requires good communications and business skills. 2. Functional Specification. Here user expectations are written as

"specifications" that describe the details and functions of the program. It will specify what the program will do. 3. Design and Develop. The program must be designed to meet the specifications and the design and specifications must be converted to

computer code. Coding, writing the program in the chosen programming language based on the specifications, is regarded by many as the core programming skill. Coding must be done with functionality, security, resilience, usability and future maintenance of the software application in mind. 4. Testing. Completed programs need to be tested for bugs or mistakes. Is the program working to specification? Testing can be done within the programming team. Testing can be done with the users to ensure it meets specification. Interaction with users enables you to get feedback on the programs actual performance. And note that insufficient and inadequate testing is a major cause of bad software software that doesnt work to specification, software that is ridden with bugs. 5. Documentation. Documentation for user and system procedures are written and reviewed. This is helpful and is a key requirement for future maintenance. 6 Maintenance. As a programmer, you may need to change an existing program to meet user requirements or to remove bugs. Debugging, tracking errors in a program is in fact a critical programming skill. 7 Technical assistance. You will get enquiries from users regarding programming errors, problems or questions. Training of users could be part of your duties. Such interaction with users again requires first-class interpersonal and business skills.

SOFTWARE DEVELOPMENT LIFE CYCLE (SDLC)

3.2.4SOME AREAS WHERE SOFTWARE/ APPLICATION


DEVELOPMENT PROCESS ARE APPLIED

1) CUSTOM APPLICATION DEVELOPMENT:This is another subset of software development. Custom software development, also known as custom software engineering, is defined as omitting of pre-developed (template or boxed) solutions and views. If a customer believes that their needs are unique and want to put their ideas into practice, custom software development

technologies can address their issues. Finding new creative decisions in order to meet the specific requirements and preferences of the customer as quickly as possible may be achieved with custom software development. The goal of custom software solutions may be to develop not for the mass audience (users), but rather developed to be unique, for a single customer (user) or a group. Custom developed software is encouraged to take under one umbrella progressive technologies along with preferences and expectations of the customer. Custom developed

software may be designed in stage by stage processes, allowing all nuances and possible hidden dangers to be taken into account, including issues which were not mentioned in the specifications.

2) INFORMATION SYSTEM DEVELOPMENT: Information System (IS) is any combination of information technology and people's activities using that technology to support operations,

management, and decision-making.the term information system is used to refer to the interaction between people, algorithmic processes, data and technology. it is refers not only to the information and communication technology (ICT) an organization uses, but also to the way in which people interact with this technology in support of business processes. Classes of

information systems include:


y

Transaction processing systems: are applications that capture and process data about business transactions.

Management information systems: are information system applications that provide for management

oriented reporting, these reports are usually generated or predetermined schedule appear in a prearranged format.
y

Decision support systems: applications that provide its users with decision-oriented information whenever a decision making situation arises. These systems are sometimes called executive information systems when applied to executive managers,

Expert systems: are an extension of decision making systems that capture and reproduce the knowledge and

expertise of an expert problem solver or decision maker then stimulate the thinking and action of that expert.
y

Office automation systems (OA): and workgroup support a Wide range of business activities that provide for improved workflow and communication between

workers, regardless of whether or not these workers are located in the same area. While workgroup information systems are those designed to meet the needs of a workgroup productivity. The process of information systems development also applies the processes of software development hence information systems development is a subset of software development. they are designed to boost groups

The Process of Information Systems Development:Systems

development methodology (system analysis and design) it is a very formal and precise system development process that defines a set of activities methods, best practices deliverables and automated tools for system developers and project managers to use to develop and maintain most or all information systems and software. Phases and activities for system development include:
y y y y

preliminary analysis/investigation problem analysis requirement analysis decision analysis

y y y

design construction implementation

3) DATABASE DESIGN: A database is the data resource for all computer based information systems. Database design is the process of producing a detailed data model of a database. This logical data model contains all the needed logical and physical design choices and physical storage parameters needed to generate a design in a Data Definition Language, which can then be used to create a database. The term database design can be used to describe many different parts of the design of an overall database system, it can be thought of as the logical design of the base data structures used to store the data. In the relational model these are the tables and views. In an object database the entities and relationships map directly to object classes and named relationships. Database design could also be used to apply to the overall process of designing, not just the base data structures, but also the forms and queries used as part of the overall database application within the database management system (DBMS).The process of doing database design generally consists of a number of steps which will be carried out by the database designer. Usually, the designer must: Determine the relationships between the different data elements. And

superimpose a logical structure upon the data on the basis of these relationships. design cycle. The diagram below shows the database

DATABASE DESIGN LIFE CYCLE

4) WEBSITE PROGRAMMIG (WEB DEVELOPMENT): The name Web development is a broad term for the work involved in developing a web site for the Internet (World Wide Web) or an intranet (a private network). This can include web design, web content development, client liaison, client-side/server-

sidescripting, web server and network security configuration, and e-commerce development. However, among web professionals, "web development" usually refers to the main non-design aspects of building web sites: writing markup and coding. Web

development can range from developing the simplest static single page of plain text to the most complex web-based internet applications, electronic businesses, or social network services. Web development may be a collaborative effort between

departments rather than the domain of a designated department. Web Development can be split into many areas and a typical and basic web development hierarchy might consist of: Client Side Coding, Server Side Coding, Client Side + Server Side, Database Technology.

5) BUSSINESS PROCESS AUTOMATION (BPA): Business Process Automation is the practice of analyzing, documenting, optimizing and then automating business processes. Well-developed

business processes can create a seamless link from initial customer interface through the supply chain. Business process automation, or BPA, is the process a business uses to contain costs. It consists of integrating applications, restructuring labor resources, and using software applications throughout the organization. BPA is the use of "technology components to substitute and/or supplement manual processes to manage information flow within an organization to lower costs, reduce risk, and increase consistency.

6) BUSSINESSINTELLIGENCE:Business intelligence usually refers to the information that is available for the enterprise to make decisions on. Business Intelligence (BI) refers to computer-based techniques used in spotting, digging-out, and analyzing business data, such as sales revenue by products or departments or associated costs and incomes. Most companies collect a large amount of data from their business operations. To keep track of that information, a business and would need to use a wide range of software programs, such as Excel, Access and different database applications for various departments throughout their organization. Using multiple software programs makes it difficult to retrieve information in a timely manner and to perform analysis of the data. The term Business Intelligence (BI) represents the tools and systems that play a key role in the strategic planning process of the corporation. These systems

allow a company to gather, store, access and analyze corporate data to aid in decision-making. Generally these systems will illustrate business intelligence in the areas of customer profiling, customer support, market research, market segmentation,

product profitability, statistical analysis, and inventory and distribution analysis to name a few. Business intelligence (BI) is a broad category of applications and technologies for gathering, storing, analyzing, and providing access to data to help enterprise users make better business decisions. BI applications include the activities of decision support systems, query and reporting, online analytical processing (OLAP), statistical analysis, forecasting, and data mining.

7) DATA WAREHOUSING: A data warehouse is a relational database that is designed for query and analysis rather than for transaction processing. It usually contains historical data derived from transaction data, but can include data from other sources. Data warehouses separate analysis workload from transaction workload and enable an organization to consolidate data from several sources. In addition to a relational database, a data warehouse environment includes an extraction, transportation, transformation, and loading (ETL) solution, online analytical processing (OLAP) and data mining capabilities, client analysis tools, and other applications that manage the process of gathering data and delivering it to business users.A data warehouse can be used to analyze a particular subject area. For example, "sales" can be a particular subject. A data warehouse integrates data from multiple data sources. For example, source A

and source B may have different ways of identifying a product, but in a data warehouse, there will be only a single way of identifying a product. Historical data is kept in a data warehouse. For example, one can retrieve data from 3 months, 6 months, 12 months, or even older data from a data warehouse. This contrasts with a transactions system, where often only the most recent data is kept. For example, a transaction system may hold the most recent address of a customer, where a data warehouse can hold all addresses associated with a customer. Once data is in the data warehouse, it will not change. So, historical data in a data warehouse should never be altered. A data warehouse is a copy of transaction data specifically structured for query and analysis.

8) DATA MINING: Extraction of consumer information from a database by utilizing software that can isolate and identify previously unknown patterns or trends in large amounts of data. It is the process of extracting patterns from data. Data mining is a closely related field in which a large body of information is analyzed to identify patterns. For example, mining the sales records from a store could identify shopping patterns to help guide the store in stocking its shelves more effectively. Data mining is becoming an increasingly important tool to transform this data into information. Data mining can be used to uncover patterns in data but is often carried out only on samples of data.

9) DATA MIGRATION: This is the process of transferring data between storage types, formats, or computer systems. Undergo a Data migration is the process of making an exact copy of an organizations current data from one device to another device preferably without disrupting or disabling active applications and

then redirecting all input/output (I/O) activity to the new device. Data migration is usually performed programmatically to achieve an automated migration, freeing up human resources from tedious tasks. It is required when organizations or individuals change computer systems or upgrade to new systems, or when systems merge (such as when the organizations that use them merger/takeover)

3.2.5 TOOLS/TECHNOLOGIES USED IN


SOFTWARE/APPLICATIONDEVELOPMENT INCLUDE;

1) PROGRAMMING LANGUAGES A programming language is a computer language programmers use to develop applications, scripts, or other set of instructions for a computer to execute. Some examples of programming languages include:
y JAVA: java is an object-oriented programming language that was

designed to meet the need for a platform independent language.java is used to create applications that can run on a single computer as well as a distributed network.java is both a language and a technology used to develop stand-alone and internet based applications. Some types of java application are applications that use character user interface (CUI) and applications that use graphical user interface (GUI), applets, servelets, packages etc.java is platform independent language.
y C#: Has roots in C, C++ and Java adapting the best features of each

and adapting new features of its own# is object oriented and contains a powerful class library of prebuilt components, enabling

programmers to develop applications quickly and easily it is an event

driven visual programming language in which programs are created using an integrated development environment(IDE).C# is appropriate for demanding application development tasks, especially for building todays popular web base applications.

2) SCRIPTING LANGUAGES A scripting language is a programming language that is designed for website programming and also to enable user write programs easily. Such programs are generally interpreted at runtime and are generally embedded in a web page. Examples of scripting languages include;

JAVA SCRIPT: is a compact object based scripting language

developed by Netscape Communications Corporation. Which is used extensively in HTML documents to validate end user inputs, JavaScript is event driven, is platform independent and enables rapid development it is also easy to learn and those not produce standalone applets.
y JSCRIPT: Is Microsofts version of java script. It also contains several

other objects and features such as file handling capabilities, which can be used only through internet explorer
y VBSCRIPT: is a scripting language developed by Microsoft. It is a

pure interpreter that processes the source code embedded directly in the HTML document. VBScript code does not produce stand-alone applets but is used to add intelligent and interactivity to HTML documents.
y ASP.NET a server-side scripting language that adds interactivity to

Web sites and Web pages. 3) MARKUP LANGUAGES A markup language is a set of words and

symbols for describing the identity of pieces of a document. Programs can use this with a stylesheet to create output for screen, print, audio,

video etc. Some markup languages only describe appearances (this is italics, this is bold), but this method can only be used for display, and is not normally re-usable for anything else. A markup language is a modern system for annotating a text in a way that is syntactically distinguishable from that text. A well-known example of a markup language in widespread use today is Hypertext Markup Language (HTML), one of the document formats of the World Wide Web.
y XML: XML is the shorthand name for Extensible Markup

Language. XML is a markup language much like HTML and was designed to describe data. XML tags are not predefined. You must define your own tags according to your needs. This is a World Wide Web consortium (W3C) standard for structuring and describing data for a web. The need for a common data interchange format in web applications resulted in the evolution of (XML). XML is a markup similar to hypertext markup language it contains information embedded within element it has a set of predefined tags and allows you to create your own elements or vocabulary.xml concentrates only on content and not on the presentation of the content within the tags.
y HTML: Hypertext Markup Language (HTML) in computer science,

the standard text-formatting for documents on the interconnected computing network known as the World Wide Web. HTML documents are text files that contain two parts: content that is meant to be rendered on a computer screen; and markup or tags, encoded information that directs the text format on the screen and is generally hidden from the user. Some tags in an HTML document determine the way certain text, such as titles, will be formatted. Other tags cue the computer to respond to the user's actions on the keyboard or mouse. HTML also includes markups for formsthat let the user fill out information and electronically

send, or e-mail, the data to the document author, and initiate sophisticated searches of information on the Internet, or order goods and services. The software that permits the user to navigate the World Wide Web and view HTML-encoded documents is called a browser. It interprets the HTML tags in a document and formats the content for screen display. Most sites on the World Wide Web adhere to HTML standards and, because HTML is easy to use, the World Wide Web has grown rapidly. HTML continues to evolve, however, so browsers must be upgraded regularly to meet the revised standards.
y XHTML:

XHTML

stands

for

Extensible

Hypertext

Markup

Language and is the next step in the evolution of the Internet. XHTML is a stricter form of HTML and as such is a subset of XML which is an extremely useful, powerful and very strict way of marking up pure data. In XML you can declare your own rules. XHTML is significantly better than HTML, as it encourages good practice. This is a cleaner and stricter version of HTML 4.01. XHTML was developed by the W3C to help web developers make the transition from HTML to XML.

4) DATABASE TECHNOLOGIES A database consists of an organized collection of data for one or more uses, typically in digital form. One way of classifying databases involves the type of their contents, for example: bibliographic, documenttext, statistical. Digital databases are managed using database

management systems, which store database contents, allowing data creation and maintenance, and search and other access.Database Technology includes theory and experimental methodology for building computer systems that Handles large data volumes. Central is development of concepts, languages, software, and methods for

Describing, storing, searching, analyzing, distributing, and other data processing to make access of data simple, efficient, scalable, reliable, and adaptable for new application areas. Query languages such as structured query language (SQL) are used to access data from a database.

DATABASE MANAGEMENT SYSTEMS

The database management system is a complex software system which constructs, expands and maintains the database. It also provides the interface between the user and the data in the base. The DBMS allocates storage to the data it maintains indices so that any required data can be retrieved and any required data can be cross-referenced.in a DBMS data records can be added deleted amended and expanded. The DBMS also provides security for data. The dbms also provides backup and other facilities. DBMS can be categorized according to the database model they support such as relational or XML or the query language that access the database such as SQL. Examples of DBMS include;
y Oracle Database: The Oracle Database (commonly referred to as

Oracle RDBMS or simply as Oracle) is an object-relational database management system (ORDBMS), produced and marketed by Oracle Corporation. The Oracle DBMS can store and execute stored procedures and functions within it. Data in the oracle database can be accessed through the use of SQL. PL/SQL (Oracle Corporation's proprietary procedural extension to SQL), or the object-oriented language Java can invoke such code objects and/or provide the programming structures for writing them. The Oracle RDBMS stores data logically in the form of tablespaces and physically in the form of data files ("datafiles").Tablespaces can contain various types of memory segments, such as Data Segments, Index Segments, etc. Segments in turn comprise one or more extents. Extents comprise

groups of contiguous data blocks. Data blocks form the basic units of data storage.
y Microsoft SQL server:

this is a fast, reliable, secure and scalable

relational database management system from Microsoft that adheres to the client server architecture it provides various features to manage data such as web-enabled features to facilitate easy and secure access to data via the web. You can also use http to sent queries to the sever Microsoft SQL is highly scalable and reliable it also provides tools to move data from various sources it reduces time taken to develop an application from design to completion.sql provide various backup strategies to improve reliability, you can easily perform complex computations and analyze data. It provides management tools to manage the server. Microsoft SQL server has added features to the base-level syntax of SQL and has its own SQL called transact-SQL

5) INTEGRATED DEVELOPMENT ENVIRONMENTS Integrated development environments(IDEs) are software

programs/applications that help programmers create, run, test and debug programs and applications conveniently and effectively thereby reducing the time it takes to produce a working program to a fraction of the time it would have taken without using the (IDE).some examples of IDEs include;

Microsoft visual studio- Microsoft Visual Studio is an integrated

development environment (IDE) from Microsoft. It can be used to develop console and graphical user interface applications along with Windows Forms applications, web sites, web applications, and web services.. Other built-in tools include a forms designer for building GUI applications, web designer, class designer, and database schema designer. Visual Studio supports different programming languages such as C/C++ (via Visual C++), C# (via Visual C#). Support for other languages such as M, Python,

and Ruby among others is also available via language services installed separately. It also supports XML, HTML/XHTML, JavaScript and CSS. Individual language-specific versions of Visual Studio also exist which provide more limited language services to the user: Microsoft Visual Basic, Visual J#, Visual C#, and Visual C++.

Macromedia Dreamweaver- Adobe Dreamweaver (formerly Macromedia

Dreamweaver) is a web development application originally created by Macromedia, and is now developed by Adobe Systems, which acquired Macromedia in 2005.Dreamweaver is available for both Mac and Windows operating systems. It supports web technologies such as HTML, CSS, JavaScript, and various server-side scripting languages and frameworks including ASP and PHP.

Microsoft FrontPage- Microsoft FrontPage (full name Microsoft Office

FrontPage) is a What You See Is What You Get (WYSIWYG) HTML editor and web site administration tool from Microsoft for the Microsoft Windows line of operating systems. It was branded as part of the Microsoft Office suite from 1997 to 2003. As a WYSIWYG editor, FrontPage is designed to hide the details of pages' HTML code from the user, making it possible for novices to easily create web pages and sites. FrontPage 2003 also includes support for programming

3.2.6 SKILLS AQUIRED

During my SIWES programme in Bluechip I was able to learn the basics of software development and maintenance. I acquired some skills in areas such as HTML, JavaScript, Relational database design and

implementation, database administration, and some programming skill in java programming language. I was also able to learn how to query and administer databases using oracle DBMS and Microsoft SQL server. I was also able to learn essentials of the Linux operating system.

3.2.7 PROJECTS UNDERTAKEN/ WORK DONE At bluechip technologies I was involved in the execution of the Stratplan project forthe National Petroleum Investment Management Service(NAPIMS) which is a subsidiary of NNPC. The project involves the creation of an application which is web based and used to generate strategic plans for oil companies such as chevron, Mobil, NNPC, shell etc by NAPIMS. The application generates reports after data has been imputed through the application either by using the web controls or by imputing using an excel sheet. The data input has to be done carefully because error in a part of the input might cause deletion to be made from the back end, in most cases there always exists a referential integrity issue which prevents records that have been inserted from being updated or deleted. Sometimes after insertion of StratPlan values the application throws an error complaining that the values inserted are out of range in which case I am required to identify the value causing the error and rectify it by changing the value to zero this sometimes causes inconsistencies in the database. The project the application frequently undergoes changes which causes me to change the way in which I use the application. The clients (NAPIMS) are always adding new requirements to the system. The NAPIMS project was created with three technologies, C#, ASP.NET and HTML for the front end and Microsoft SQL server for the back end. Below are some samples of how the NAPIMS project user interface looks like.

LOGIN PAGE

HOME PAGE

I also took part in the data migration project for liquidated banks that was done for the Nigerian deposit insurance corporation (NDIC). It was

implemented by the use of oracle database and it was installed in windows server 2003. The project is about the migration/consolidation of data from all the liquidated banks into a single database and a common format. My job in the project was mainly to update the database, Using SQLPlus or toad software to access the oracle database.

Some simple projects I did during my attachment include:


y Creation of simple web pages

with JavaScript and HTML, IDE.This project was titled

usingMicrosoft

FrontPage

as

an

MYROADSHOW included my designing a website using Microsoft FrontPage for the company my road show on their 5oth anniversary celebration. The project included a ticket booking page for the anniversary page as shown below other pages included the comments and suggestions page, the voting page which can be accessed via the television events page by the use of a hyperlink, upcoming events page etc. I included JavaScript in the development which enabled me carry out client side verification on the web forms and also to display a message on the status bar of the web browser.

Creation of applets, using Java I used notepad to create this applet

which is linked to three other applets. It is an applet for a simple project titled KNOWLEDGEONWEB where graduate students can apply for various post graduate courses online by providing their personal details and qualifications details as shown by the applet abovee.g.

Design of a simple database; the project was titled

NEWPROJECTLIMITED. I designed a simple database for a company called New Project Limited that gives staffs on contracts to work on client sites and executes projects with the aid of Timecards. I employed relational database design methodology and used Microsoft SQL server 2003 to develop the database.

3.2.8 SOFTWARE INSTALLATION At Bluechip Technologies Installation of software such as Microsoft SQL server, oracle database, Microsoft visual studio, antivirus, operating systems etc was one basic work I do while on my SIWES programme. I often carry out this duty

when either I or other staffs of the organization need the software to carry out a project and sometimes when new computers are bought in the company for the staffs. Before the installation proper I have to make sure that I uninstall any available versions of the software I am about to install so as to avoid software conflict when the operating system is running. I also install java runtime environments (JRE) and java development kits (JDK) so as to run programs that are written in java on the systems e.t.c. The problem I face here is mostly from the installation of McAfee, which update that take long period of time on the internet for effective performance.

CHAPTER THREE

3.3.1 WORKDONE/ PROBLEMS IDENTIFIED


y y y y y y

Uploading of data into database using web application or excel sheets. Software installation such as oracle and SQL server. Backing-up of database, files on external storage devices. Recovery of database. Creation of database. Modification of application using Microsoft visual studio.

3.3.2 PROBLEMS IDENTIFIED


y

Compatibility issues of software version and O/S.

Proper project scope is not specified while project is being executed hence project completion is not on time.

Absence of industry based supervisor for instructions when I run into difficulties trying to solve problems.

y y y

Application I used for data upload contains a lot of errors and bugs Inconsistent data types in the database. Lack of proper communication between the client and the

company/project development team.


y

Client is always changing the data that we have to work with hence resulting in an inconsistent database.

No proper documentation during the course of the project and hence modifications are always difficult.

SECTION 4:RECOMMENDATION AND CONCLUSION

CHAPTER ONE 4.1.1 FOR PROSPECTIVE INTERNS 1. Forthcoming Interns should start early in their search for companies where they can secure placement. This will help them get a place in time. 2. Forthcoming Interns should not secure placement based on how much the company will pay. This is because the intern might end up getting a place where he/she will be well paid but may not acquire any skill at the end of the training. 4. 1.2 FOR THE COMPANIES

1. The Nigerian Ports Authority (NPA) should try as much as possible to pay students who are on industrial training or give them stipends as this will help to ease the burden of transportation and feeding. 2. NPA should also assign more than one supervisor to students who are on industrial training so that if one supervisor is not around, the other supervisors will be around to administer instructions to the students on how to carry out a task. 3. Bluechip Technologies should make sure that the proper definition of the project scope is made and understood by both the client and the company so that a project would not be dragged unnecessarily(i.e. requirement specification should be strictly adhered to) 4. The company (Bluechip Technologies) should provide materials on the theoretical aspect for students to study so that students can understand the work that is being done well. 5. Constant supervision should be made available for the students by the company so that errors and mistakes are easily detected and rectified. 4.1.3 FOR THE INSTITUTION 1. The School should assist students in getting IT placement 2. The institution based supervisors should also try to visit students while they are on industrial training. 4.1.4 CONCLUSION In conclusion, the industrial training was a very wonderful experience for me because it has exposed me to the way things are done in a working environment and has also given me the opportunity to practice what I have learnt in school. It has also enabled me to appreciate the field of computer science even more and has inspired me to further pursue the study of Computer Science and information systems development.It has also afforded me the opportunity to make sense of what I have been taught in school and it will enable me have a better understanding of what I would be taught further in my study.

You might also like