77
ABUBAKAR TAFAWA BALEWA UNIVERSITY BAUCHI PMB 0248 BAUCHI, NIGERIA STUDENTS’ INDUSTRIAL WORK EXPERIENCE SCHEME (S.I.W.E.S.) UNDERTAKEN AT: NIGERIAN PORTS AUTHORITY No. 26/28 Marina, Lagos. (MAY 23, 2009 - NOV, 23 2009) AND BLUECHIP TECHNOLOGIES (SENSE-D CONSULTING) 16 Boyle Street Onikan, Lagos.

IT REPORT 1

Embed Size (px)

Citation preview

Page 1: IT REPORT 1

ABUBAKAR TAFAWA BALEWA UNIVERSITY

BAUCHIPMB 0248 BAUCHI, NIGERIA

STUDENTS’ INDUSTRIAL WORK EXPERIENCE SCHEME (S.I.W.E.S.)

UNDERTAKEN AT:

NIGERIAN PORTS AUTHORITY

No. 26/28 Marina, Lagos.

(MAY 23, 2009 - NOV, 23 2009)

AND

BLUECHIP TECHNOLOGIES

(SENSE-D CONSULTING)

16 Boyle Street Onikan, Lagos.

(NOV 24, 2009 – MAY 31, 2010)

Page 2: IT REPORT 1

A TECHNICAL REPORT

IN

PARTIAL FULFILLMENT FOR THE AWARD OF

BACHELOR’S DEGREE (B.TECH) IN COMPUTER

SCIENCE

BY

HAUWA MAULUDATU ABDULLAHI

MATRICULATION NUMBER: 05/15998/1

MATHEMATICAL SCIENCES PROGRAMME

SCHOOL OF SCIENCE

ABUBAKAR TAFAWA BALEWA, UNIVERSITY

BAUCHI.

CERTIFICATION

Page 3: IT REPORT 1

This is to certify that, this report conform with the

acceptable standards of scholarly presentation as regards

the industrial training undertaken by HAUWA

MAULUDATU ABDULLAHI of the Mathematical sciences

program (Computer science) in the school of Science

Technology of the ABUBAKAR TAFAWA BALEWA

UNIVERSITY BAUCHI at the Nigerian Ports Authority No.

26/28 Marina, Lagos and Bluechip Technologies Limited No

16. Boyle Street Onikan, Lagos.

.

………………………………….

…………………….

SIWES COODINATOR DATE

…………………………………

…………………….. COORDINATOR (MSP)

DATE

Page 4: IT REPORT 1

DEDICATIONI dedicate this write up to ALLAH who saw me through the period of my

Industrial Training attachment. I also dedicate this report to my family for their support, encouragement and understanding while I was on the industrial training attachment.

Page 5: IT REPORT 1

ACKNOWLEDGEMENTWith Kindest regards and heart-felt thanks, I wish to express my

profound gratitude to the entire management and staff of Nigerian Ports Authority (NPA) and Bluechip technologies (Sense-D) for the outstanding attachment I had, and the wonderful opportunity I was offered to work in the companies.More so, my gratitude goes to particular members of staffs of the above named companies whom my attachment would have been a mere sheep-herding. If I were to mention names, I would be most elated to enlist all members of staff. However due to space constraints, I cannot but only say a big thank you to all. My stay was indeed fruitful and memorable. I would not also forget to mention my Industry-based supervisors, Mr. Ibrahim M. Babangida (N.P.A), and Miss Deborah Alelumhe whom where very supportive and helpful during my training. My special regard extends to my parents, sisters, brothers, lectures/faculties friends and colleagues. This is a token of that appreciation.All thanks Belong to Allah…..Amin.

Page 6: IT REPORT 1

PREFACEMan has invented many electronic devices but the computer has made

a greater impact on society than any other device. They have made a potentially significant contribution to the society during the last three decades.

The areas of computer applications are literally too numerous to mention. Computers have become an integral part of man’s everyday life. They dominate every sphere of life be it entertainment, education, banking, insurance, research, medicine, design or manufacturing. They continue to grow and open new horizons of application. One of the primary reasons for the immense popularity of computers is speed with which they can accomplish specified tasks. This makes the computer quite an expensive electronic device

This report is on the experiences gathered on Computer maintenance, Local Area Networking during my industrial attachment at the Nigerian Ports Authority and Software/ application development, Data mining , database development and maintenance, Business intelligence and some little programming experiences at Bluechip Technologies.

Page 7: IT REPORT 1

TABLE OF CONTENTCertification IDedication IIAcknowledgement IIIPreface IV Table of Content V,VI Abstract VII

SECTION 1: INDUSTRIAL TRAINING FUND (ITF)

CHAPTER ONE

1.1.1 HISTORY OF INDUSTRIAL TRAINING FUND (ITF)

1.1.2 STUDENTS’ INDUSTRIAL WORK EXPERIENCE SCHEME

1.1.3 OBJECTIVES OF SIWES

SECTION 2: NIGERIAN PORTS AUTHORITY (NPA)

CHAPTER ONE

2.1.1 PROFILE OF THE ORGANIZATION2.1.2 FUNCTIONS OF NIGERIAN PORTS AUTHORITY

2.1.3 OBJECTIVES OF NIGERIAN PORTS AUTHORITY

2.1.4 BOARD OF DIRECTORS

2.1.5 MISSION STATEMENT 2.1.6 VISION STATEMENT 2.1.7 THE ORGANOGRAM OF NIGERIAN PORTS AUTHORITY (NPA)2.1.8 ORGANIZATIONAL STRUCTURE/ PROFILE OF DEPARTMENTCHAPTER TWO 2.2.1 FIRST DAY EXPERIENCE

2.2.2 CONCEPT OF COMPUTER NETWORKING

2.2.3 TYPES OF NETWORKS2.2.4 LOGICAL CLASSIFICATION OF NETWORKS 2.2.5 NETWORK ADAPTERS2.2.6 COMPUTER NETWORKING DEVICES 2.2.7 NETWORK TOPOLOGY 2.2.8 BASIC TYPES OF TOPOLOGIES 2.2.9 TRANSMISSION MEDIA 2.2.10 SERVER TYPES

Page 8: IT REPORT 1

2.2.11 LOCAL AREA NETWORKING/ TROUBLESHOOTING 2.2.12 CRIMPING OF NETWORK CABLES 2.2.13 SOFTWARE INSTALLATION CHAPTER THREE 2.3.1 WORKDONE/ PROBLEMS IDENTIFIED2.3.2 PROBLEMS IDENTIFIED

SECTION 3: BLUECHIP TECHNOLOGIES (SENSE-D CONSULTING) CHAPTER ONE 3.1.1 PROFILE OF THE ORGANIZATION3.1.2 SERVICES OF BLUECHIP TECHNOLOGIES3.1.3 OBJECTIVES OF BLUECHIP TECHNOLOGIES

3.1.4 MANAGEMENT PROFILE

3.1.5 MISSION STATEMENT 3.1.6 VISION STATEMENT 3.1.6 BLUECHP TECHNOLOGIES ORGANIZATION HIERARCHY CHAPTER TWO 3.2.2 CONCEPT OF SOFTWARE DEVELOPMENT 3.2.3 SOFTWARE DEVELOPMENT PROCESS 3.2.4 SOME AREAS WHERE SOFTWARE/APPLICATION DEVELOPMENT PROCESS ARE APPLIED. 3.2.5 SOME TOOLS/TECHNOLOGIES USED IN SOFTWARE/APPLICATION DEVELOPMENT INCLUDE.3.2.7 PROJECT UNDERTAKEN/ WORK DONE3.2.8 SOFTWARE INSTALLATIONCHAPTER THREE 3.3.1 WORKDONE/ PROBLEMS IDENTIFIED3.3.2 PROBLEMS IDENTIFIED

SECTION 4: RECOMMENDATION/ CONCLUSION

CHAPTER ONE

4.1.1 FOR PROSPECTIVE INTERNS

4.1.2 FOR THE COMPANY

4.1.3 FOR THE INSTITUTION

4.1.4 CONCLUSION

ABSTRACT

Page 9: IT REPORT 1

Student industrial work experience scheme (SIWES) as the name implies is an avenue through which students from various disciplines are given the opportunity to have a feel of what their various professions entails. This is to prepare them for the future as to what the outside world would expect from them when needed. SIWES is an avenue through which many skilled man-power and proficient individuals have been raised for exploration by diverse industries. This report gives the profile of industrial training fund (ITF), profile of the Nigerian Ports Authority(NPA) and Bluechip Technologies(Sense-D) in which the SIWES programme was undertaken with their organizational charts (organ gram). Work experience during the programme is also elaborated upon this report, which basically is on computer networking, types of networking based on scale, various networking devices, types of network topology, Business application developments, Relational database design and implementation, web content development, java programming ,Data mining, Data warehousing, e.t.c. Work done and the various problems encountered is succinctly stated in this report which covers the area of local area networking / troubleshooting a LAN connection, crimping of network cables and software installation on computer systems, web scripting, application development, applet programming ,database administration and development e.t.c. Finally, recommendations were made for prospective interns and the companies, for future reference, and conclusion of what the report actually entails.

Page 10: IT REPORT 1

SECTION 1: INDUSTRIAL TRAINING FUND (ITF)

CHAPTER ONE

1.1.1 HISTORY OF INDUSTRIAL TRAINING FUND (ITF)

The Federal Military Government established the Industrial Training

Fund (ITF) in 1971 during the second national plan within the period 1970-

1974. The decree number 47 of 1971 was charged with the responsibility of

promoting and encouraging the acquisition of skills in industry and

commerce. This was done with the view of generating a pull of indigenous

trained manpower sufficient to meet the needs of the economy. The

Students’ Industrial Work Experience Scheme is one of the projects that is

carried out under the Industrial Training Fund.

1.1.2 STUDENT’S INDUSTRIAL WORK EXPERIENCE SCHEME: The

student’s Industrial Work Experience Scheme (SIWES) is the accepted skills

training programme, which forms part of the approved Minimum Academic

standards in the various degree programmes for all the Nigerian Universities.

It is an effort to bridge the gap existing between theory and practice of

engineering and technology, sciences, agriculture, medical, management

and other profession educational programmes in the Nigerian tertiary

institutions. It is aimed at exposing students to machines and equipment,

professional work methods and ways of safe-guarding the work areas and

workers in industries and other organizations. The minimum duration for the

SIWES should normally be 24 weeks except for engineering and technology

programmes where the minimum duration is 40 weeks. The scheme is a

tripartite programme, involving the students, the universities and the

industry (employers of labour). It is funded by the Federal Government of

Nigeria and jointly coordinated by the Industrial Training Fund (ITF) and the

National Universities Commission.

Page 11: IT REPORT 1

1.1.3 OBJECTIVES OF SIWES: Specifically, the objectives of the Students

Industrial Work Experience Scheme are to:

i. Provide an avenue for students in the Nigerian universities to acquire

industrial skills and experience in their course of study;

ii. Prepare students to work situation they are likely to meet after

graduation;

iii. Expose students to work methods and techniques in handling

equipment and machinery that may not be available in the

universities;

iv. Make the transition from the university to the world of work easier, and

thus enhance students’ contacts for later job placement;

v. Provide students with an opportunity to apply their theoretical

knowledge in real work situation, thereby bridging the gap between

university graduates for employment in industry; and

vi. Enlist and strengthen employers’ involvement in the entire educational

process of preparing university graduate for employment in industry.

Page 12: IT REPORT 1

SECTION 2: NIGERIAN PORTS AUTHORITY (NPA)

CHAPTER ONE

2.1.1 PROFILE OF THE ORGANIZATION

Company History: The development of a seaport in Nigeria started in the

mid 19th-century in the era of explorers and traders. Although limited

initially to the opening up of the Lagos lagoon, it however resulted in the

opening of ports at Apapa and Harcourt. This led eventually to the

establishment of the Nigerian Ports Authority (NPA) in 1954 to maintain the

ports as well as load and discharge cargo. The NPA commenced operation on

1st April, 1955. It made remarkable progress and on the 15th of June 1992,

The Nigeria Ports Plc was incorporated. However, in consideration of its full

ownership while recognizing its commercial status the company in October

1996, reverted to its former name - Nigerian Ports Authority. In pursuance of

government efforts to ensure the efficiency of public enterprises, the

operation of the Nigerian Ports Authority became fully commercialized in May

1992.

The Nigerian Ports Authority today is a wholly government owned

organization under the supervision of the Federal Ministry of Transport with

eight ports in different locations in the country, they are:

Apapa Port, Tin Can Port, Roro Port , Warri Port, Port Harcourt Port, Calabar

Port, Ocean and Lighter Terminal, Container Port.

There is also the NPA International.

2.1.2 FUNCTIONS OF NIGERIAN PORTS AUTHORITY: The functions of the

Nigerian Ports Authority are as follows- Pilot age, Towage, Supply of water,

Ship repair, Security services, Fire Service, Medical Services,

Computerization of Ports, Subsidiary Companies and Auxiliary Services.

Page 13: IT REPORT 1

2.1.3 OBJECTIVES OF NIGERIAN PORTS AUTHORITY: To promote

operational efficiency, cost effectiveness and customer satisfaction through a

committed workforce while ensuring adequate returns on stakeholders

investments, with the ports serving purely as operational transit point for

cargo and regional ports for the sub-region.

2.1.4 BOARD OF DIRECTORS:

2.1.5 MISSION STATEMENT

To promote competitiveness of Nigerian Ports, through the efficient

provision, development and management of port/marine infrastructure, port

regulation and land administration, as well as adapting to the changing

demands of maritime trade to play a leading role in the African region.

2.1.6 VISION STATEMENT

Developing safe and secure Nigerian Ports into a distribution platform from

where the West and Central African Sub-region can be served.

MD (C.E.O)

E. D. Marine & Operations

E. D.Finance

E. DCorporate Service

E. D. Engineering/ Tech. Services

Page 14: IT REPORT 1

2.1.7 THE ORGANOGRAM OF NIGERIAN PORTS AUTHORITY (NPA)

M.D (C.E.O)

Special AssistantGeneral Manager Audit

Assistant General Manager P/Affairs

E. Director Eastern Zone

E. Director Western

E. Director Corp Services Finance

G. Manager

G. ManagerG. Manager

G. ManagerAsst. G.M

Asst. G.M Asst. G.MAsst. G.M

Port Managers Port Managers

Prin. Managers

Prin. Managers

Snr. Manager

Manager

Asst. Manager

Snr. Officer

Officer 1

Page 15: IT REPORT 1

2.1.8 Organizational Structure/ Profile of Department:

I worked in the Data Processing/Management and Information

Systems Department. The department has the function supplying and

managing (maintaining) of the computers used in the company and also the

printing out of staff pay slip.

The subsequent chapters are a full description of what I learnt and did as an

Industrial Training student in the department.

CHAPTER TWO

Officer 2

GM MIS

AGM Budget AGM CP&S AGM Data Processing

Page 16: IT REPORT 1

WORK EXPERIENCE

2.2.1 FIRST DAY EXPERIENCE

On resumption of work at NPA, I was given a letter of appointment by

the Assistant General Manager of the training department and was asked to

take the letter to the Data Processing department for further instructions.

After all was said and done, I was escorted to the networking unit by one of

the computer personnel. When I got to the networking unit (popularly called

Server Room in NPA), and was introduced to my industry based supervisor

whose name is Mr. Ibrahim M. Babangida. He gave me a vague description of

the kind of work that is expected to be carried out (network maintenance

and troubleshooting), the time of resumption and closure (8am to 5pm) as

well as other general information that would aid in the proper conduct of the

training. He also introduced some of the other personnel that work in the

networking unit as well as a few other interns from other higher institutions

that are also on industrial training.

2.2.2 CONCEPT OF COMPUTER NETWORKING

Computer networking is a collection of computers connected to each

other. The networks allow computers to communicate with each other and

share resources and information. Computer networks can be classified based

on their scale, according to the hardware and software technology that is

used to interconnect the individual devices in the network, according to the

functional relationships which exist among the elements of the network and

according to the network topology upon which the network is based.

Networking arose from the need to share data in a timely fashion. Computers

that are part of a network can share data, messages, graphics, printers, fax

machines, modems and other hardware resources.

Page 17: IT REPORT 1

2.2.3 TYPES OF NETWORKS

Listed below are various types of computer networks in order of their scale

of distribution:

a. Personal area network (PAN): is a computer network used for

communication among computer devices close to one person.

Examples of devices used in PAN are scanners, fax machines, printers,

telephone, and PDAs.

b. Local area network (LAN): is a computer network covering a small

physical area like a home, office, or small group of buildings, such as a

school or, an airport. Current LANs are most likely to be based on

Ethernet technology. For example, a library may have a wired or

wireless LAN for users to interconnect local devices (e.g., printers and

servers) and to connect to the internet. The principle of a local area

network is that multiple users each with their own system can share

resources which may be expensive (like hard disk or a common value

such as a centralized set of department records.LAN networks are

characterized by workstations that are usually microcomputers, LAN

network usually contain peripherals such as hard disk units and

printers to which all users have access via the network.

c. Campus area network (CAN): is a computer network made up of an

interconnection of local area networks (LANs) within a limited

geographical area. A campus area network is larger than a local area

network but smaller than a wide area network (WAN).

d. Metropolitan area network (MAN): is a network that connects two

or more local area networks or campus area networks together but

does not extend beyond the boundaries of the immediate town/city.

Routers, switches and hubs are connected to create a metropolitan

area network.

e. Wide area network (WAN): is a computer network that covers a

broad area (i.e., any network whose communications links cross

metropolitan, regional, or national boundaries. Less formally, a WAN is

Page 18: IT REPORT 1

a network that uses routers and public communications links. The

largest and most well-known example of a WAN is the internet. WAN

connects large numbers of computers and terminals over a long

distance. In WAN network is usually nationwide or even worldwide. The

workstations are terminals or even microcomputers. Computing power

of the network maybe provided by a number of mainframe computers

which maybe remote from each other connected by high speed data

links, users will usually be able to connect to a point on the network

near to them. The advantages of WAN are that the user has a fast

means of communicating with other users where ever they are and

access is provided to other mainframe facilities.

2.2.4 LOGICAL CLASSIFICATION OF NETWORKS

Networks can be divided into two main categories:

1. Peer-to-peer (Workgroup Network) Network: This means

computer-to-computer. This network provides a simple and

inexpensive way to interconnect less than ten computers. It is

common in small offices or departments in a large organization.

Each computer can access files stored on any of the computers

stored on the network. Each computer acts as both a client and a

server, there are no dedicated severs or hierarchy among the

computers. There is no one to be assigned administrator

responsibilities for the entire network. The user on each

computer determines what data on their computer gets shared

on the network.

2. Client-Server (Server based) Network: This is a server-based

network that is essentially used for sharing data such as

Accounts/Order processing systems, and other resources. It

provides a better security as all resources of the computer are

centrally located on the server. A server based network is such

that other computers called clients, request services and other

Page 19: IT REPORT 1

computers, called servers respond to the requests. In a

client/server network, there is usually a dedicated central system

called sever on which the files of every user connected to the

network are stored. Client/server network provides an efficient

way of connecting computers (10 or more systems) to share

information. This type of network has dedicated servers that only

function as severs and are not used as clients or workstation.

There are different servers that have been specialized for

different functions such as print servers, file servers, Application

servers, fax servers etc. Clients are computers or workstations

that can access information stored on Servers.

2.2.5 NETWORK ADAPTERS

There are two widely-used adapters. They are:

(a) Ethernet adapter: This is the most widely used method of

exchanging information on a network. Ethernet works in a way similar

to how people talk in a polite discussion. Each workstation waits for a

pause before sending information so as to avoid collision. Collision

occurs when two workstation send information at the same time. There

is a HUB which is a device that centrally connects all the cables in a

network. This hub arrangement gives rise to a “star-sired” tree

topology.

(b) Token ring adapter: Beside the fiber optic cables, this is the most

expensive connection. The workstations in a network continuously pass

an electronic token among themselves. A token is a small message

that indicates that the network is free. To send a file the workstation

waits for a token, gets the token attaches it to the network to indicate

free traffic.

2.2.6 COMPUTER NETWORKING DEVICES

Computer networking devices are units that mediate data in a computer

Page 20: IT REPORT 1

network. Computer networking devices are also called network equipment,

Intermediate Systems (IS) or Interworking Unit (IWU). Units which are the last

receiver or generate data are called hosts or data terminal equipment.

Common basic network devices:

Gateway: device sitting at a network node for interfacing with another

network that uses different protocols.

Bridge: a device that connects multiple network segments along the

data link layer.

Router: a specialized network device that determines the next

network point to which to forward a data packet toward its destination.

Unlike a gateway, it cannot interface different protocols.

Switch: a device that allocates traffic from one network segment to

certain lines (intended destination(s)) which connect the segment to

another network segment. So unlike a hub a switch splits the network

traffic and sends it to different destinations rather than to all systems

on the network.

Hub: connects multiple Ethernet segments together making them act

as a single segment. When using a hub, every attached device shares

the same broadcast domain and the same collision domain.

Page 21: IT REPORT 1

Repeater: device to amplify or regenerate digital signals received

while setting them from one part of a network into another.

2.2.7 NETWORK TOPOLOGY

Network topology is the study of the arrangement or mapping of the

elements (links, nodes, etc.) of a network, especially the physical (real) and

logical (virtual) interconnections between nodes. It refers to how computers

in a network are physically connected. A local area network (LAN) is one

example of a network that exhibits both a physical topology and a logical

topology. Any particular network topology is determined only by the

graphical mapping of the configuration of physical and/or logical connections

between nodes. Thus topology can be categorized into physical and logical

topologies. The physical topology describes the routes of the network cables

as they link each node while the logical topology refers to how messages

flow from one station to another.

Page 22: IT REPORT 1

2.2.8 BASIC TYPES OF TOPOLOGIES

There are six basic types of topology in networks:

BUS: This type of network topology is the one in which all of the nodes

of the network are connected to a common transmission medium

which has exactly two endpoints (this is the 'bus', which is also

commonly referred to as the backbone, or trunk) – all data that is

transmitted between nodes in the network is transmitted over this

common transmission medium and is able to be received by all nodes

in the network virtually simultaneously. In a bus network configuration,

each node is connected to one main communications line. With this

arrangement, even if one of the nodes goes down, the rest of the

network can continue to function normally.

BUS TOPOLOGY

STAR: This is the type of network topology in which each of the nodes

of the network is connected to a central node with a point-to-point link

in a 'hub' and 'spoke' fashion, the central node being the 'hub' and the

nodes that are attached to the central node being the 'spokes' (e.g., a

collection of point-to-point links from the peripheral nodes that

Page 23: IT REPORT 1

converge at a central node) – all data that is transmitted between

nodes in the network is transmitted to this central node, which is

usually some type of device that then retransmits the data to some or

all of the other nodes in the network.

STAR TOPOLOGY

RING: This is the type of network topology in which each of the nodes

of the network is connected to two other nodes in the network and with

the first and last nodes being connected to each other, forming a ring –

all data that is transmitted between nodes in the network travels from

one node to the next node in a circular manner and the data generally

flows in a single direction only. In a ring network, messages travel in

one direction around a ring from node to node. As each node receives

a message, it checks the message address. If the message is not for

that particular node, the message is regenerated and passed on. This

regeneration allows messages to travel farther in a ring network than

in other network configurations.

Page 24: IT REPORT 1

RING TOPOLOGY

MESH: This is the type of network topology in which each of the nodes

of the network is connected to each of the other nodes in the network

with a point-to-point link.

MESH TOPOLOGY

TREE: also known as hierarchical network is a type of network

topology in which a central 'root' node (the top level of the hierarchy)

is connected to one or more other nodes that are one level lower in the

hierarchy (i.e., the second level) with a point-to-point link between

each of the second level nodes and the top level central 'root' node.

Page 25: IT REPORT 1

TREE TOPOLOGY

HYBRID: This is the type of network topology that is composed of one

or more interconnections of two or more networks that are based upon

the same physical topology, but where the physical topology of the

network resulting from such an interconnection does not meet the

definition of the original physical topology of the interconnected

networks.

HYBRID TOPOLOGY

THE INTERNET TOPOLOGY

Connecting individual computers to each other creates networks.

The Internet is a series of interconnected networks. Personal computers

and workstations are connected to a Local Area Network (LAN) by either a

dial-up connection through a modem and standard phone line or by being

directly wired into the LAN. Other modes of data transmission that allow

for connection to a network include T-1 connections and dedicated lines.

Page 26: IT REPORT 1

Bridges and hubs link multiple networks to each other. Routers transmit

data through networks and determine the best path of transmission.

INTERNET TOPOLOGY

2.2.9 TRANSMISSION MEDIA

There are many data transmission media. They are:

1) CABLES: Most networks are connected by some sort of wire or cable

which acts as some sort of medium carrying signal between

computers. There is a variety of cable that can meet the varying needs

and sizes of networks. The major types of cabling include:

i) Coaxial-consists of a core made up of solid paper surrounded by

insulation, a braided metal shielding and an outer cover. Coaxial

cable is mostly used in the TV industry and some LANS. Coaxial

cable is of two types:

Thin (thinnet)- which is flexible and about 25 inch thick and

can carry a signal up to approximately 185 meters.

Thick (thicknet)- is a relatively rigid coaxial cable about 0.5

inch in diameter. Sometimes referred as standard Ethernet .

Page 27: IT REPORT 1

The thick cable has greater immunity for noise and is more

durable. The thin cable on the other hand carries signals over a

short distance.

ii) Twisted-pair Cable-it consists of insulated strands of copper

wire twisted around each other .this is of two types, unshielded

twisted pair and shielded twisted pair. Twisting reduces electrical

interference (crosstalk).The shielded cable has increased amount

of insulation and hence it is noise-immune. It is used in many

network topologies including Ethernet, ARCNet, and IBM token

ring topologies. Telephone companies mostly use the unshielded.

iii) Fiber optic cable: this consists of a single bundle of hair-like

glass fiber along which signals travel as pulses of light. Fiber

optic cables use light instead of electricity to carry information.

This medium is however expensive but transmits at high speed

and is very immune to interference.

2) MICROWAVE LINK: microwaves are electromagnetic waves, which

travel in straight lines and the quality of signal reduces as they move

farther away from the source. There are microwave towers serving as

boosters that amplify and retransmit the signals to the next station. It

is used for wireless connections.

3) SATELLITE LINK: A geosynchronous satellite which orbits about

23,000 miles above the surface of the earth is used for information

communication. The satellite is permanently stationed at a point in the

planet so that it is continuously available for communication with all

the points within its range.

Page 28: IT REPORT 1

2.2.10 SERVER TYPES

In the Nigerian Ports Authority the server room housed four main

servers which have Windows Server 2003 Service pack 1 installed on

them. These servers include;

DOMAIN CONTROLLER: This connects the computers to each

other over the network. On Windows Server Systems, a domain

controller (DC) is a server that responds to security authentication

requests (logging in, checking permissions, etc.) within the

Windows Server domain. A domain is a concept introduced in

Windows NT whereby a user may be granted access to a number of

computer resources with the use of a single username and

password combination.

SAGE SERVER: this server is used to save accounting data at the

end of each day the data that has been worked upon on the sage is

backed up and saved to an external storage device. It contains

accounting software packages that can be accessed by employees

of the company. Sage server works under the domain controller

and also stores Cooperate version of the MacAfee antivirus

software which is shared by all members of the organization. The

updates to the antivirus are downloaded every five minutes from

MacAfee.

ISA SERVER: Microsoft's Internet Security and Acceleration Server

(ISA SERVER) provides the two basic services of an enterprise

firewall and a Web proxy/cache server. ISA Server's firewall screens

all packet-level, circuit-level, and application-level traffic. The Web

cache stores and serves all regularly accessed Web content in

order to reduce network traffic and provide faster access to

frequently-accessed Web pages. ISA Server also schedules

download of Web page updates for non-peak times. ISA Server

allows administrators to create policies for regulating usage based

Page 29: IT REPORT 1

on user, group, application, destination, schedule, and content type

criteria.

INTRANET SERVER: An intranet is a private computer network

that uses Internet Protocol technologies to securely share any part

of an organization's information or network operating system within

that organization. The term is used in contrast to internet, a

network between organizations, and instead refers to a network

within an organization. Sometimes the term refers only to the

organization's internal website, but may be a more extensive part

of the organization's information technology infrastructure. It may

host multiple private websites and constitute an important

component and focal point of internal communication and

collaboration.

2.2.11 LOCAL AREA NETWORKING/ TROUBLESHOOTING

During my SIWES programme in Nigerian Ports Authority (NPA), I was

able, with the basics learnt on networking from my industry-based

supervisor, to link computers together using the star network topology

especially. I was able to link the various computers in the fire service

department, special duties department, civil engineering department, e.t.c.

This local area network that I carried out required the use of hubs, Ethernet

network cables, RJ-45, crimping tool and a LAN tester to test if the crimped

cable is well crimped for the networking process about to be put in place.

However, there are situations a times that I am been caught up with

when carrying out a local area network connections which requires

troubleshooting procedures to detect why the computers or certain

computers on that same network are not seeing the network. As a result of

these developments what I often do is to check if the Local area network on

that particular computer is disabled so as to re-enable back.

Page 30: IT REPORT 1

At times after all connections have been carried out and the computer

is not connected I would need to restart the system as a form of refreshing

its operating system to recognise the newly connected device. Another

problem often identified is that some computers are assigned IP addresses,

which is not meant to be because the nature of the network detection

operated on in NPA is a domain host configuration protocol (DHCP), which

requires an automatic for of network detection. These are some of the

problems I encounter after carrying out my connections, which I have to

resolve so as enable the connected computers see the network.

2.2.12 CRIMPING OF NETWORK CABLES

Most often I crimp network cables needed for a local area connection.

Before I crimp any network cable I have to make sure I Know the length of

the cable required for the LAN connection so as not to result into waste of

available RJ-45. When I crimp a network cable what I often put into

consideration is that both ends of the crimped cable must align to enable it

work when put to use. The arrangement of the embedded cables when

crimped follows thus; brown, white-brown, green, white-blue, blue, white-

green, pink and then white-pink. The problem I usually encounter here is that

of edge-alignment for a proper grip when clip with the aid of the crimping

tool. Therefore, I try as much as possible to overcome this because most of

the time it results into wastes of RJ-45.

2.2.13 SOFTWARE INSTALLATION

Installation of software is one basic work I do while on my SIWES

programme. I often carry out this duty when new computers are bought in

the department. Before the installation proper I have to make sure that I

uninstall any available trial versions of the software I am about to install so

as to avoid software conflict when the operating system is running. The

software I usually install includes Microsoft office 2007, McAfee antivirus,

Java, e.t.c. The problem I face here is mostly from the installation of McAfee,

Page 31: IT REPORT 1

which update that take long period of time on the internet for effective

performance.

CHAPTER THREE

2.3.1 WORKDONE/ PROBLEMS IDENTIFIED

a. Local area networking/ troubleshooting

b. Crimping of Ethernet network cable

c. Software installation

d. Backing-up of files on external storage devices

e. Deployment of McAfee antivirus on newly bought computers

2.3.2 PROBLEMS IDENTIFIED

a. Unavailability of network cables and RJ-45

b. Shortage of tools per personnel which often make job execution slow

c. The industry based supervisor was not always available to instruct us

when we run into difficulties trying to solve problems

d. Less fund in the area of transportation

e. Erratic power supply

Page 32: IT REPORT 1

SECTION 3: BLUECHIP TECHNOLOGIES (SENSE-D CONSULTING)

CHAPTER ONE

3.1.1 PROFILE OF THE ORGANIZATION

Company history: Bluechip Technologies Limited started in the year 2008

it was originally know as Sense-D consulting which was owned and

established by Kazeem Tewogbade. Later a partnership establishment was

proposed by Olumide Soyombo which brought about the birth of Bluechip

Technologies Limited, with Kazeem Tewogbade and Olumide Soyombo as

major share holders. It had Multiliks as its first client then later, Zain, MTN,

etisalat, MTN-Zambia NDIC and Bank PHB. Bluechip Technologies is a wholly

owned Nigeria Company specialized typically on IT solutions and services;

application development and support, implementation and other IT value

added services. We have our presence in Nigeria and Zambia.

3.1.2 SERVICES OF BLUECHIP TECHNOLOGIES: The services of Bluechip

Technologies include Business Requirement Analysis, Data warehouse design

and construction, Data Management, Customer Analytics, Custom

Application Development, and Business Performance Measurement

3.1.3 OBJECTIVES OF BLUECHIP TECHNOLOGIES: To provide high quality

and cost effective data warehousing solutions for enterprises. To assist our

clients in extracting business meaning from their data and developing

competitive advantage by creating custom designed information

management strategies and solutions through the use of data warehousing,

data mining, knowledge management, and other business intelligence

disciplines. To balance our data management knowledge with a healthy

understanding, of the human element, to information technology solutions.

To establish strategies that is custom fit to each unique business challenge.

Page 33: IT REPORT 1

We work to sustain reputation for excellent customer service and helping our

clients discover the key to their organizational intelligence.

3.1.4 MANAGEMENT PROFILE

Kazeem Tewogbade (Senior Manager)

• B.Sc Computer Science(Ibadan) 1st Class

• Certified Project Management Professional

• Over 13 years Systems Integration Experience

• Experience in Nigeria and Southern Africa

Olumide Soyombo (Manager)

• B.Sc Systems Engineering(Lagos)

• M.sc Business and I.T (Birmingham, UK) Distinction

• Certified Business Analysis Professional (CBAP, IIBA)

• Over 8 years Business Analysis and Data Modelling experience

• Experience in Nigeria, Southern Africa and U.K

Rilwan Lateef (Manager)

• B.Sc Computer Science (Ibadan) 1st Class

• Master of Business Administration (Lagos)

• Over 14 years Systems Integration and Solution Development

Experience.

• Last 3 years at senior management position in a Nigerian Telco

• Experience in Nigeria and Southern Africa

3.1.5 MISSION STATEMENT: To turn our clients’ vital business data into a

competitive, advantage by implementing integrated business application

solutions.

3.1.6 VISION STATEMENT: To be the premier specialist business

application consulting firm delivering world-class services and values in

Page 34: IT REPORT 1

Nigeria and beyond.

3.1.6 BLUECHP TECHNOLOGIES ORGANIZATION HIERARCHY:

Senior Manager (SM)

Consultant 1 Consultant 2 Consultant 3

Manager 3Manager 2Manager 1

Analyst 3Analyst 2Analyst 1

Youth Coppers

BITP Trainees

Industrial Trainees

Drivers

Office Assistant/

Page 35: IT REPORT 1

CHAPTER TWO

WORK EXPERIENCE

3.2.1 FIRST DAY EXPERIENCE

On my first day of work at Bluechip Technologies, I was given a letter of

appointment by the Human Resource Manager of the company and was

asked to the wait to see the Company Manager, Mr. Olumide to have a chat

with him after a few minutes I was asked to go into his office where he

explained to me what the company bluechip Technologies was all about,

their services, the types of clients they service, What they do, and how they

go about in carrying out those services in terms of the technologies they use.

He also told me to be a very inquisitive person and to be free to ask any

member of staff any arising questions that I may have. After my chat with

Mr. Olumide he then introduced me to my supervisor Miss. Deborah

Alelumhe and told me that she will provide me with anything I need, she

would also be responsible for signing my log books and other documents. I

was also introduced some of the other members of staff that work in the

company as well as a two other interns from other higher institutions that

are also on industrial training.I was also informed that their working hours

was from 9:00am to 5:00pm.

3.2.2 CONCEPT OF SOFTWARE DEVELOPMENT

Software development (also known as Application Development, Software

Design, Designing Software, Software Engineering, Software Application

Development, Enterprise Application Development, and Platform

Development) is the development of a software product in a planned and

structured process to meet specific needs of a specific client/business, to

meet a perceived need of some set of potential users, or for personal use. It

is the set of activities that results in software products. Software

development may include research, new development, modification, reuse,

re-engineering, maintenance, or any other activities that result in software

Office Assistant/

Page 36: IT REPORT 1

products. The term software development may also refer to computer

programming, the process of writing and maintaining the source code.

Software development can also refer to applications development which is

the development of a software product in a planned and structured process.

Application development involves creating a computer program, or set of

programs to perform tasks, from keeping track of inventory and billing

customers to maintaining accounts, speeding up business process and, in

fact, even improving application effectiveness. Application development

involves higher levels of responsibility (particularly for requirement capturing

and testing).

3.2.3 SOFTWARE DEVELOPMENT PROCESS

A software development process, also known as a software development

lifecycle, is a structure imposed on the development of a software product. It

can also be known as software life cycle and software process. The process

of software development consists of various stages and activities some of

which include.

1. User Requirements . The important task in creating a software product

is extracting the requirements or requirements analysis. The essential

purpose of this phase is to find the need and to define the problem

that needs to be solved. It answers the questions, what does the user

want? Interview and interact with the users to determine their

expectations. What should the program do for them? An understanding

of the business need helps. Getting user needs requires good

communications and business skills. 

2. Functional Specification . Here user expectations are written as

"specifications" that describe the details and functions of the program.

It will specify what the program will do.

Page 37: IT REPORT 1

3. Design and Develop . The program must be designed to meet the

specifications and the design and specifications must be converted to

computer code. Coding, writing the program in the chosen

programming language based on the specifications, is regarded by

many as the core programming skill. Coding must be done with

functionality, security, resilience, usability and future maintenance of

the software application in mind.

4. Testing . Completed programs need to be tested for bugs or mistakes.

Is the program working to specification? Testing can be done within the

programming team. Testing can be done with the users to ensure it

meets specification. Interaction with users enables you to get feedback

on the program’s actual performance. And note that insufficient and

inadequate testing is a major cause of bad software – software that

doesn’t work to specification, software that is ridden with bugs.

5. Documentation . Documentation for user and system procedures are

written and reviewed. This is helpful and is a key requirement for

future maintenance.

6 Maintenance . As a programmer, you may need to change an existing

program to meet user requirements or to remove bugs. Debugging,

tracking errors in a program is in fact a critical programming skill.

7 Technical assistance . You will get enquiries from users regarding

programming errors, problems or questions. Training of users could be

part of your duties. Such interaction with users again requires first-

class interpersonal and business skills.

Page 38: IT REPORT 1

SOFTWARE DEVELOPMENT LIFE CYCLE (SDLC)

3.2.4 SOME AREAS WHERE SOFTWARE/ APPLICATION

DEVELOPMENT PROCESS ARE APPLIED

1) CUSTOM APPLICATION DEVELOPMENT: This is another

subset of software development. Custom software

development, also known as custom software engineering, is

defined as omitting of pre-developed (template or boxed)

solutions and views. If a customer believes that their needs are

unique and want to put their ideas into practice, custom

software development technologies can address their issues.

Finding new creative decisions in order to meet the specific

requirements and preferences of the customer as quickly as

possible may be achieved with custom software development.

The goal of custom software solutions may be to develop not for

the mass audience (users), but rather developed to be unique,

for a single customer (user) or a group. Custom developed

software is encouraged to take under one umbrella progressive

Page 39: IT REPORT 1

technologies along with preferences and expectations of the

customer. Custom developed software may be designed in

stage by stage processes, allowing all nuances and possible

hidden dangers to be taken into account, including issues which

were not mentioned in the specifications.

2) INFORMATION SYSTEM DEVELOPMENT: Information

System (IS) is any combination of information technology and

people's activities using that technology to support operations,

management, and decision-making.the term information

system is used to refer to the interaction between people,

algorithmic processes, data and technology. it is refers not only

to the information and communication technology (ICT) an

organization uses, but also to the way in which people interact

with this technology in support of business processes. Classes of

information systems include:

Transaction processing systems: are applications that

capture and process data about business transactions.

Management information systems: are information

system applications that provide for management

oriented reporting, these reports are usually generated

or predetermined schedule appear in a prearranged

format.

Decision support systems: applications that provide its

users with decision-oriented information whenever a

decision making situation arises. These systems are

sometimes called executive information systems when

Page 40: IT REPORT 1

applied to executive managers,

Expert systems: are an extension of decision making

systems that capture and reproduce the knowledge

and expertise of an expert problem solver or decision

maker then stimulate the “thinking” and “action” of

that expert.

Office automation systems (OA): and workgroup

support a Wide range of business activities that

provide for improved workflow and communication

between workers, regardless of whether or not these

workers are located in the same area. While workgroup

information systems are those designed to meet the

needs of a workgroup they are designed to boost

groups productivity.

The process of information systems development

also applies the processes of software development hence

information systems development is a subset of software

development.

The Process of Information Systems Development:

Systems development methodology (system analysis and

design) it is a very formal and precise system development

process that defines a set of activities methods, best

practices deliverables and automated tools for system

developers and project managers to use to develop and

maintain most or all information systems and software.

Phases and activities for system development include:

Page 41: IT REPORT 1

preliminary analysis/investigation

problem analysis

requirement analysis

decision analysis

design

construction

implementation

3) DATABASE DESIGN: A database is the data resource for all

computer based information systems. Database design is the

process of producing a detailed data model of a database. This

logical data model contains all the needed logical and physical

design choices and physical storage parameters needed to

generate a design in a Data Definition Language, which can

then be used to create a database. The term database design

can be used to describe many different parts of the design of an

overall database system, it can be thought of as the logical

design of the base data structures used to store the data. In the

relational model these are the tables and views. In an object

database the entities and relationships map directly to object

classes and named relationships. Database design could also be

used to apply to the overall process of designing, not just the

base data structures, but also the forms and queries used as

part of the overall database application within the database

management system (DBMS).The process of doing database

design generally consists of a number of steps which will be

carried out by the database designer. Usually, the designer

must: Determine the relationships between the different data

elements. And superimpose a logical structure upon the data on

the basis of these relationships. The diagram below shows the

Page 42: IT REPORT 1

database design cycle.

DATABASE DESIGN LIFE CYCLE

4) WEBSITE PROGRAMMIG (WEB DEVELOPMENT): The name

Web development is a broad term for the work involved in

developing a web site for the Internet (World Wide Web) or an

intranet (a private network). This can include web design, web

content development, client liaison, client-side/server-side

scripting, web server and network security configuration, and e-

commerce development. However, among web professionals,

"web development" usually refers to the main non-design

aspects of building web sites: writing markup and coding. Web

development can range from developing the simplest static

single page of plain text to the most complex web-based

internet applications, electronic businesses, or social network

services. Web development may be a collaborative effort

between departments rather than the domain of a designated

department. Web Development can be split into many areas

Page 43: IT REPORT 1

and a typical and basic web development hierarchy might

consist of: Client Side Coding, Server Side Coding, Client Side +

Server Side, Database Technology.

5) BUSSINESS PROCESS AUTOMATION (BPA): Business

Process Automation is the practice of analyzing, documenting,

optimizing and then automating business processes. Well-

developed business processes can create a seamless link from

initial customer interface through the supply chain. Business

process automation, or BPA, is the process a business uses to

contain costs. It consists of integrating applications,

restructuring labor resources, and using software applications

throughout the organization. BPA is the use of "technology

components to substitute and/or supplement manual processes

to manage information flow within an organization to lower

costs, reduce risk, and increase consistency.

6) BUSSINESS INTELLIGENCE: Business intelligence usually

refers to the information that is available for the enterprise to

make decisions on. Business Intelligence (BI) refers to

computer-based techniques used in spotting, digging-out, and

analyzing business data, such as sales revenue by products or

departments or associated costs and incomes. Most companies

collect a large amount of data from their business operations.

To keep track of that information, a business and would need to

use a wide range of software programs, such as Excel, Access

and different database applications for various departments

throughout their organization. Using multiple software programs

makes it difficult to retrieve information in a timely manner and

Page 44: IT REPORT 1

to perform analysis of the data. The term Business Intelligence

(BI) represents the tools and systems that play a key role in the

strategic planning process of the corporation. These systems

allow a company to gather, store, access and analyze corporate

data to aid in decision-making. Generally these systems will

illustrate business intelligence in the areas of customer

profiling, customer support, market research, market

segmentation,

product profitability, statistical analysis, and inventory and

distribution analysis to name a few. Business intelligence (BI) is

a broad category of applications and technologies for gathering,

storing, analyzing, and providing access to data to help

enterprise users make better business decisions. BI applications

include the activities of decision support systems, query and

reporting, online analytical processing (OLAP), statistical

analysis, forecasting, and data mining.

7) DATA WAREHOUSING: A data warehouse is a relational

database that is designed for query and analysis rather than for

transaction processing. It usually contains historical data

derived from transaction data, but can include data from other

sources. Data warehouses separate analysis workload from

transaction workload and enable an organization to consolidate

data from several sources. In addition to a relational database,

a data warehouse environment includes an extraction,

transportation, transformation, and loading (ETL) solution,

online analytical processing (OLAP) and data mining

capabilities, client analysis tools, and other applications that

Page 45: IT REPORT 1

manage the process of gathering data and delivering it to

business users. A data warehouse can be used to analyze a

particular subject area. For example, "sales" can be a particular

subject. A data warehouse integrates data from multiple data

sources. For example, source A and source B may have

different ways of identifying a product, but in a data warehouse,

there will be only a single way of identifying a product.

Historical data is kept in a data warehouse. For example, one

can retrieve data from 3 months, 6 months, 12 months, or even

older data from a data warehouse. This contrasts with a

transactions system, where often only the most recent data is

kept. For example, a transaction system may hold the most

recent address of a customer, where a data warehouse can hold

all addresses associated with a customer. Once data is in the

data warehouse, it will not change. So, historical data in a data

warehouse should never be altered. A data warehouse is a copy

of transaction data specifically structured for query and

analysis.

8) DATA MINING: Extraction of consumer information from a

database by utilizing software that can isolate and identify

previously unknown patterns or trends in large amounts of data.

It is the process of extracting patterns from data. Data mining is

a closely related field in which a large body of information is

analyzed to identify patterns. For example, mining the sales

records from a store could identify shopping patterns to help

guide the store in stocking its shelves more effectively. Data

mining is becoming an increasingly important tool to transform

this data into information. Data mining can be used to uncover

patterns in data but is often carried out only on samples of

Page 46: IT REPORT 1

data.

9) DATA MIGRATION: This is the process of transferring data

between storage types, formats, or computer systems. Undergo

a Data migration is the process of making an exact copy of an

organization’s current data from one device to another device

preferably without disrupting or disabling active applications

and then redirecting all input/output (I/O) activity to the new

device. Data migration is usually performed programmatically

to achieve an automated migration, freeing up human

resources from tedious tasks. It is required when organizations

or individuals change computer systems or upgrade to new

systems, or when systems merge (such as when the

organizations that use them merger/takeover)

Page 47: IT REPORT 1

3.2.5 TOOLS/TECHNOLOGIES USED IN SOFTWARE/APPLICATION

DEVELOPMENT INCLUDE;

1) PROGRAMMING LANGUAGES

A programming language is a computer language programmers use to

develop applications, scripts, or other set of instructions for a computer to

execute. Some examples of programming languages include:

JAVA: java is an object-oriented programming language that was

designed to meet the need for a platform independent

language.java is used to create applications that can run on a single

computer as well as a distributed network.java is both a language

and a technology used to develop stand-alone and internet based

applications. Some types of java application are applications that

use character user interface (CUI) and applications that use

graphical user interface (GUI), applets, servelets, packages etc.java

is platform independent language.

C#: Has roots in C, C++ and Java adapting the best features of

each and adapting new features of its own# is object oriented and

contains a powerful class library of prebuilt components, enabling

programmers to develop applications quickly and easily it is an

event driven visual programming language in which programs are

created using an integrated development environment(IDE).C# is

appropriate for demanding application development tasks,

especially for building today’s popular web base applications.

2) SCRIPTING LANGUAGES

A scripting language is a programming language that is designed

for website programming and also to enable user write programs

easily. Such programs are generally interpreted at runtime and are

generally embedded in a web page. Examples of scripting languages

Page 48: IT REPORT 1

include;

JAVA SCRIPT: is a compact object based scripting language

developed by Netscape Communications Corporation. Which is used

extensively in HTML documents to validate end user inputs,

JavaScript is event driven, is platform independent and enables

rapid development it is also easy to learn and those not produce

stand-alone applets.

JSCRIPT: Is Microsoft’s version of java script. It also contains

several other objects and features such as file handling capabilities,

which can be used only through internet explorer

VBSCRIPT: is a scripting language developed by Microsoft. It is a

pure interpreter that processes the source code embedded directly

in the HTML document. VBScript code does not produce stand-alone

applets but is used to add intelligent and interactivity to HTML

documents.

ASP.NET a server-side scripting language that adds interactivity to

Web sites and Web pages.

3) MARKUP LANGUAGES

A markup language is a set of words and symbols for describing

the identity of pieces of a document. Programs can use this with a

stylesheet to create output for screen, print, audio, video etc. Some

markup languages only describe appearances (‘this is italics’, ‘this is

bold’), but this method can only be used for display, and is not

normally re-usable for anything else. A markup language is a modern

system for annotating a text in a way that is syntactically

distinguishable from that text. A well-known example of a markup

language in widespread use today is Hypertext Markup Language

(HTML), one of the document formats of the World Wide Web.

Page 49: IT REPORT 1

XML: XML is the shorthand name for Extensible Markup

Language. XML is a markup language much like HTML and was

designed to describe data. XML tags are not predefined. You

must define your own tags according to your needs. This is a

World Wide Web consortium (W3C) standard for structuring and

describing data for a web. The need for a common data

interchange format in web applications resulted in the evolution

of (XML). XML is a markup similar to hypertext markup language

it contains information embedded within element it has a set of

predefined tags and allows you to create your own elements or

vocabulary.xml concentrates only on content and not on the

presentation of the content within the tags.

HTML: Hypertext Markup Language (HTML) in computer science,

the standard text-formatting for documents on the

interconnected computing network known as the World Wide

Web. HTML documents are text files that contain two parts:

content that is meant to be rendered on a computer screen; and

markup or tags, encoded information that directs the text format

on the screen and is generally hidden from the user. Some tags

in an HTML document determine the way certain text, such as

titles, will be formatted. Other tags cue the computer to respond

to the user's actions on the keyboard or mouse. HTML also

includes markups for forms that let the user fill out information

and electronically send, or e-mail, the data to the document

author, and initiate sophisticated searches of information on the

Internet, or order goods and services. The software that permits

the user to navigate the World Wide Web and view HTML-

encoded documents is called a browser. It interprets the HTML

tags in a document and formats the content for screen display.

Most sites on the World Wide Web adhere to HTML standards

Page 50: IT REPORT 1

and, because HTML is easy to use, the World Wide Web has

grown rapidly. HTML continues to evolve, however, so browsers

must be upgraded regularly to meet the revised standards.

XHTML: XHTML stands for Extensible Hypertext Markup

Language and is the next step in the evolution of the Internet.

XHTML is a stricter form of HTML and as such is a subset of XML

which is an extremely useful, powerful and very strict way of

marking up pure data. In XML you can declare your own rules.

XHTML is significantly better than HTML, as it encourages good

practice. This is a cleaner and stricter version of HTML 4.01.

XHTML was developed by the W3C to help web developers make

the transition from HTML to XML.

4) DATABASE TECHNOLOGIES

A database consists of an organized collection of data for one or

more uses, typically in digital form. One way of classifying databases

involves the type of their contents, for example: bibliographic,

document-text, statistical. Digital databases are managed using

database management systems, which store database contents,

allowing data creation and maintenance, and search and other access.

Database Technology includes theory and experimental methodology

for building computer systems that Handles large data volumes.

Central is development of concepts, languages, software, and methods

for Describing, storing, searching, analyzing, distributing, and other

data processing to make access of data simple, efficient, scalable,

reliable, and adaptable for new application areas. Query languages

such as structured query language (SQL) are used to access data from

a database.

DATABASE MANAGEMENT SYSTEMS

The database management system is a complex software system

Page 51: IT REPORT 1

which constructs, expands and maintains the database. It also provides

the interface between the user and the data in the base. The DBMS

allocates storage to the data it maintains indices so that any required

data can be retrieved and any required data can be cross-referenced.in

a DBMS data records can be added deleted amended and expanded.

The DBMS also provides security for data. The dbms also provides

backup and other facilities. DBMS can be categorized according to the

database model they support such as relational or XML or the query

language that access the database such as SQL. Examples of DBMS

include;

Oracle Database: The Oracle Database (commonly referred to as

Oracle RDBMS or simply as Oracle) is an object-relational database

management system (ORDBMS), produced and marketed by Oracle

Corporation. The Oracle DBMS can store and execute stored

procedures and functions within it. Data in the oracle database can

be accessed through the use of SQL. PL/SQL (Oracle Corporation's

proprietary procedural extension to SQL), or the object-oriented

language Java can invoke such code objects and/or provide the

programming structures for writing them. The Oracle RDBMS stores

data logically in the form of tablespaces and physically in the form

of data files ("datafiles").Tablespaces can contain various types of

memory segments, such as Data Segments, Index Segments, etc.

Segments in turn comprise one or more extents. Extents comprise

groups of contiguous data blocks. Data blocks form the basic units

of data storage.

Microsoft SQL server: this is a fast, reliable, secure and scalable

relational database management system from Microsoft that

adheres to the client server architecture it provides various features

to manage data such as web-enabled features to facilitate easy and

secure access to data via the web. You can also use http to sent

queries to the sever Microsoft SQL is highly scalable and reliable it

Page 52: IT REPORT 1

also provides tools to move data from various sources it reduces

time taken to develop an application from design to completion.sql

provide various backup strategies to improve reliability, you can

easily perform complex computations and analyze data. It provides

management tools to manage the server. Microsoft SQL server has

added features to the base-level syntax of SQL and has its own SQL

called transact-SQL

5) INTEGRATED DEVELOPMENT ENVIRONMENTS

Integrated development environments(IDE’s) are software

programs/applications that help programmers create, run, test and debug

programs and applications conveniently and effectively thereby reducing

the time it takes to produce a working program to a fraction of the time it

would have taken without using the (IDE).some examples of IDE’s

include;

Microsoft visual studio- Microsoft Visual Studio is an integrated

development environment (IDE) from Microsoft. It can be used to

develop console and graphical user interface applications along with

Windows Forms applications, web sites, web applications, and web

services.. Other built-in tools include a forms designer for building GUI

applications, web designer, class designer, and database schema

designer. Visual Studio supports different programming languages

such as C/C++ (via Visual C++), C# (via Visual C#). Support for other

languages such as M, Python, and Ruby among others is also available

via language services installed separately. It also supports XML,

HTML/XHTML, JavaScript and CSS. Individual language-specific versions

of Visual Studio also exist which provide more limited language

services to the user: Microsoft Visual Basic, Visual J#, Visual C#, and

Visual C++.

Page 53: IT REPORT 1

Macromedia Dreamweaver - Adobe Dreamweaver (formerly

Macromedia Dreamweaver) is a web development application

originally created by Macromedia, and is now developed by Adobe

Systems, which acquired Macromedia in 2005.Dreamweaver is

available for both Mac and Windows operating systems. It supports

web technologies such as HTML, CSS, JavaScript, and various server-

side scripting languages and frameworks including ASP and PHP.

Microsoft FrontPage- Microsoft FrontPage (full name Microsoft Office

FrontPage) is a “What You See Is What You Get” (WYSIWYG) HTML

editor and web site administration tool from Microsoft for the Microsoft

Windows line of operating systems. It was branded as part of the

Microsoft Office suite from 1997 to 2003. As a WYSIWYG editor,

FrontPage is designed to hide the details of pages' HTML code from the

user, making it possible for novices to easily create web pages and

sites. FrontPage 2003 also includes support for programming

3.2.6 SKILLS AQUIRED

During my SIWES programme in Bluechip I was able to learn the

basics of software development and maintenance. I acquired some skills

in areas such as HTML, JavaScript, Relational database design and

implementation, database administration, and some programming skill in

java programming language. I was also able to learn how to query and

Page 54: IT REPORT 1

administer databases using oracle DBMS and Microsoft SQL server. I was

also able to learn essentials of the Linux operating system.

3.2.7 PROJECTS UNDERTAKEN/ WORK DONE

At bluechip technologies I was involved in the execution of the

Stratplan project for the National Petroleum Investment Management

Service (NAPIMS) which is a subsidiary of NNPC. The project involves the

creation of an application which is web based and used to generate

strategic plans for oil companies such as chevron, Mobil, NNPC, shell etc

by NAPIMS. The application generates reports after data has been

imputed through the application either by using the web controls or by

imputing using an excel sheet. The data input has to be done carefully

because error in a part of the input might cause deletion to be made from

the back end, in most cases there always exists a referential integrity

issue which prevents records that have been inserted from being updated

or deleted. Sometimes after insertion of StratPlan values the application

throws an error complaining that the values inserted are out of range in

which case I am required to identify the value causing the error and

rectify it by changing the value to zero this sometimes causes

inconsistencies in the database. The project the application frequently

undergoes changes which causes me to change the way in which I use the

application. The clients (NAPIMS) are always adding new requirements to

the system. The NAPIMS project was created with three technologies, C#,

ASP.NET and HTML for the front end and Microsoft SQL server for the back

end. Below are some samples of how the NAPIMS project user interface

looks like.

Page 55: IT REPORT 1

LOGIN PAGE

HOME PAGE

I also took part in the data migration project for liquidated banks that

was done for the Nigerian deposit insurance corporation (NDIC). It was

Page 56: IT REPORT 1

implemented by the use of oracle database and it was installed in

windows server 2003. The project is about the migration/consolidation of

data from all the liquidated banks into a single database and a common

format. My job in the project was mainly to update the database, Using

SQLPlus or toad software to access the oracle database.

Some simple projects I did during my attachment include:

Creation of simple web pages with JavaScript and HTML, using

Microsoft FrontPage as an IDE. This project was titled

“MYROADSHOW” included my designing a website using Microsoft

FrontPage for the company my road show on their 5oth anniversary

celebration. The project included a ticket booking page for the

anniversary page as shown below other pages included the

comments and suggestions page, the voting page which can be

accessed via the television events page by the use of a hyperlink,

upcoming events page etc. I included JavaScript in the development

which enabled me carry out client side verification on the web forms

and also to display a message on the status bar of the web browser.

Page 57: IT REPORT 1

Creation of applets, using Java I used notepad to create this

applet which is linked to three other applets. It is an applet for a

simple project titled “KNOWLEDGEONWEB” where graduate

students can apply for various post graduate courses online by

providing their personal details and qualifications details as shown

by the applet above e.g.

Design of a simple database; the project was titled

“NEWPROJECTLIMITED”. I designed a simple database for a

company called New Project Limited that gives staffs on

contracts to work on client sites and executes projects with the

aid of Timecards. I employed relational database design

methodology and used Microsoft SQL server 2003 to develop the

database.

3.2.8 SOFTWARE INSTALLATION

At Bluechip Technologies Installation of software such as Microsoft SQL

server, oracle database, Microsoft visual studio, antivirus, operating systems

Page 58: IT REPORT 1

etc was one basic work I do while on my SIWES programme. I often carry out

this duty when either I or other staffs of the organization need the software

to carry out a project and sometimes when new computers are bought in the

company for the staffs. Before the installation proper I have to make sure

that I uninstall any available versions of the software I am about to install so

as to avoid software conflict when the operating system is running. I also

install java runtime environments (JRE) and java development kits (JDK) so as

to run programs that are written in java on the systems e.t.c. The problem I

face here is mostly from the installation of McAfee, which update that take

long period of time on the internet for effective performance.

CHAPTER THREE

3.3.1 WORKDONE/ PROBLEMS IDENTIFIED

Uploading of data into database using web application or excel

sheets.

Software installation such as oracle and SQL server.

Backing-up of database, files on external storage devices.

Recovery of database.

Creation of database.

Modification of application using Microsoft visual studio.

3.3.2 PROBLEMS IDENTIFIED

Page 59: IT REPORT 1

Compatibility issues of software version and O/S.

Proper project scope is not specified while project is being executed

hence project completion is not on time.

Absence of industry based supervisor for instructions when I run

into difficulties trying to solve problems.

Application I used for data upload contains a lot of errors and bugs

Inconsistent data types in the database.

Lack of proper communication between the client and the

company/project development team.

Client is always changing the data that we have to work with hence

resulting in an inconsistent database.

No proper documentation during the course of the project and

hence modifications are always difficult.

SECTION 4: RECOMMENDATION AND CONCLUSION

CHAPTER ONE

4.1.1 FOR PROSPECTIVE INTERNS

1. Forthcoming Interns should start early in their search for companies

where they can secure placement. This will help them get a place in

time.

2. Forthcoming Interns should not secure placement based on how much

the company will pay. This is because the intern might end up getting

a place where he/she will be well paid but may not acquire any skill at

the end of the training.

4. 1.2 FOR THE COMPANIES

Page 60: IT REPORT 1

1. The Nigerian Ports Authority (NPA) should try as much as possible to

pay students who are on industrial training or give them stipends as

this will help to ease the burden of transportation and feeding.

2. NPA should also assign more than one supervisor to students who are

on industrial training so that if one supervisor is not around, the other

supervisors will be around to administer instructions to the students on

how to carry out a task.

3. Bluechip Technologies should make sure that the proper definition of

the project scope is made and understood by both the client and the

company so that a project would not be dragged unnecessarily(i.e.

requirement specification should be strictly adhered to)

4. The company (Bluechip Technologies) should provide materials on the

theoretical aspect for students to study so that students can

understand the work that is being done well.

5. Constant supervision should be made available for the students by the

company so that errors and mistakes are easily detected and rectified.

4.1.3 FOR THE INSTITUTION

1. The School should assist students in getting IT placement

2. The institution based supervisors should also try to visit students while

they are on industrial training.

4.1.4 CONCLUSION

In conclusion, the industrial training was a very wonderful experience

for me because it has exposed me to the way things are done in a working

environment and has also given me the opportunity to practice what I have

learnt in school. It has also enabled me to appreciate the field of computer

science even more and has inspired me to further pursue the study of

Computer Science and information systems development. It has also

afforded me the opportunity to make sense of what I have been taught in

school and it will enable me have a better understanding of what I would be

taught further in my study.