Report Trainig

  • Upload
    -

  • View
    225

  • Download
    0

Embed Size (px)

Citation preview

  • 8/8/2019 Report Trainig

    1/15

    AN INTERNSHIP REPORT ONTitle of your report

    FOR

    Bahwan CyberTek

    Prepared for

    Dr. Rafi AshrafiHead of Information Systems Department

    Collage of Commerce and Economics

    by

    Naama Said Al-Saidi 80733/06 (INFS)

    October 2, 2010

  • 8/8/2019 Report Trainig

    2/15

    Introduction

    There is a way to pass on practical working knowledgethat might not be explained

    or properly understood in an academic program.Training allows students to apply

    the theoretical knowledge which they have learned.This summer I made training in

    Bahwan CyberTek for a period of 8 weeks (16/06/10-11/08/10) so, the purpose of

    training are to :

    1- -Expose students to a real world working environmentenabling them to gain

    working experience.

    2- Assist students in understanding what their responsibilities which are need in

    work's environment.

    In this report, I will describe in details about where did the training? As well as in

    which organization I made the training and give some overview of the company

    structure. In addition, I will discuss in details what are the tasks that I did in the

    training like installation some software programs, learn networking, SQL program.

    Also, I focus on what are the problems that I was faced in the training. Finally, I give

    some recommendations to improve the training in the organization.

  • 8/8/2019 Report Trainig

    3/15

    Company Profile

    Bahwan CyberTek, BCT, has more than 1300 employees worldwide our operations

    span United States, MENA and Asia. Our CUECENT line of products offer a complete

    BPM suite and several BPM/SOA based products and solution frameworks targeting

    BFS, Government, Oil and Gas, and High Tech business domains.

    Customers

    Throughout our evolution into a New Economy Services company, we have built an enviable track

    record, e-transforming ideas and enterprises in the Middle East and across the world.

    We believe in building partnerships through "effective, efficient, enjoyable, enthusiastic and ethical"

    relationships that are personally, professionally and profitably rewarding.

    Our clients are from various industry segments, including the Banking and Financial Industry,

    Government and Enterprise.

  • 8/8/2019 Report Trainig

    4/15

    Core center

    The training covered the activities of the BCT in different divisions including: Net

    works and Database. In addition, the trainee has covered our daily operations in the

    BCT company such as management operation.

    Network Division:

    A network consists of two or more computers that are linked in order to share resources

    (such as printers and CDs), exchange files, or allow electronic communications. Thecomputers on a network may be linked through cables, telephone lines, radio waves,

    satellites, or infrared light beams. To built network they need to know Rooting switching,

    security, wireless, storing storming design, technical and server agreement.

    In this division I learned two types of networks areas. These are:

    1) Local area network (LAN).

    2) Wide area network (WAN).

    A local area network (LAN) is a group of computers and devices that share a common

    communications line or wireless link and typically share the resources of a single

    processor or server within a small geographic area ( for example, within an office

    building or a campus area). Usually, the server has application and data storage that

    are shared in common by multiple computer users. A local area networks my serve

    as two or three users (for example, in a home network) or many as thousands of

    users (for example, the University LAN, the SQUNET).

  • 8/8/2019 Report Trainig

    5/15

    Two types of local area networks. These are:

    1) Ethernet. It is the most widely installed local area network technology.

    2) Token Ring. It is a local area network in which all computers are connected in a

    ring or star topology and a digital or token-passing scheme is used in order to

    prevent the collision of data between two computers that want to send messages at

    the same time.

    On other hand, a wide area network (WAN) is a geographically dispersed

    telecommunications network. The term distinguishes a broader telecommunication

    structure from a local area network.

    A wide area network may be privately owned or rented, but the term usually

    connotes the inclusion public (shared user) networks. An intermediate from of

    network in terms of geography is a metropolitan area network (MAN). The most

    commonly known wide area network is the Internet.

    Moreover, cable is the medium through which information usually moves from one

    network device to another. The types of cables that are used in networks. These are:

    1) Unshielded Twisted Pair (UTP) Cable. It is the most popular and is generally the

    best option for installations where there are limited high intensity radio frequency

    interference networks.

  • 8/8/2019 Report Trainig

    6/15

    2) Shielded Twisted Pair (STP) cable. It includes extra shielding to guard against

    interference, so is suitable for environments with electrical interference. Its

    disadvantages are its higher cost, as well as its extra bulk. Shielded twisted pair is

    often used in networks using Token Ring technology.

    3) Coaxial Cable. Coaxial Cabling has a single copper conductor at its centre. A plastic

    layer provides insulation between the centre conductor and a braided metal shield.

    4) Fiber Optic Cable. It consists of a thin glass centre core surrounded by several

    layers of protective materials.

    Network switching

    A network switch is a small hardware device that joins multiple computers together

    within one local area network (LAN). In addition, Network switch is a marketing term

    rather than a technical one. Switches may operate at one or more OSI layers, including

    physical, data link, network, or transport.You can see hair picture for switching device:

  • 8/8/2019 Report Trainig

    7/15

    Network router

    Network router is a device of software in a computer that forwards and routes

    data packets along networks. Also, network router connects at least two

    networks, commonly two LANs or WANs or a LAN and its ISP network. However a

    router is often included as part of a network switch.

    Databases

    A database management system (DBMS) is software that has been created to allow

    the efficient use and management of databases, including ensuring that data is

    consistent and correct and facilitating its updating.A database is a set of data that

  • 8/8/2019 Report Trainig

    8/15

    has a regular structure and that is organized in such a way that a computer can easily

    find the desired information.

    Structured query language(SQL) is a common standard for describe and queries

    database and is available with many commercial relational database products,

    including DB2,Oracal, Microsoft Access and MySQL.

    Bahwan CyberTekcompany use SQL relation to built database so, I installed SQL

    PLUS in my laptop to learn and practice. I learned many things from this program for

    example:

    1-Create Table

    The CREATE TABLE statement is used to create a table in a databaseis as follows:

    CREATE TABLE table_name

    (

    column_name1 data_type,

    column_name2 data_type,

    column_name3 data_type,

    ....

    )

    2-Constraints

    Constraints are used to limit the type of data that can go into a table.In addition,

    Constraints can be specified when a table is created (with the CREATE TABLE

    statement) or after the table is created (with the ALTER TABLE statement).

    I was focusing on the following constraints:

    NOT NULL

    UNIQUE

    PRIMARY KEY

    FOREIGN KEY

    CHECK

    DEFAULT

    NOT NULL Constraint

  • 8/8/2019 Report Trainig

    9/15

    The NOT NULL constraint enforces a column to NOT accept NULL values. Also, the

    NOT NULL constraint enforces a field to always contain a value. This means that you

    cannot insert a new record, or update a record without adding a value to this field.

    The following creates a NOT NULL constraint on the "P_Id" column when the

    "Persons" table is created:

    CREATE TABLE Persons

    (

    P_Id int NOT NULL,

    LastName varchar(200) NOT NULL,

    FirstName varchar(200),

    E-mail varchar(200),

    Country varchar(200)

    )

    UNIQUE Constraint

    The UNIQUE constraint uniquely identifies each record in a database table.

    Moreover the UNIQUE and PRIMARY KEY constraints both provide a guarantee for

    uniqueness for a column or set of columns.A PRIMARY KEY constraint automatically

    has a UNIQUE constraint defined on it.

    The following creates a UNIQUE constraint on the "P_Id" column when the

    "Persons" table is created:

    CREATE TABLE Persons

    (

    P_Id int NOT NULL,

    LastName varchar(200) NOT NULL,FirstName varchar(200),

    E-mail varchar(200),

    Country varchar(200),

    UNIQUE (P_Id)

    )

    PRIMARY KEY Constraint

  • 8/8/2019 Report Trainig

    10/15

    The PRIMARY KEY constraint uniquely identifies each record in a database table.

    Primary keys must contain unique values.However, each table should have a

    primary key, and each table can have only ONE primary key.

    The following creates a PRIMARY KEY constraint on the "P_Id" column when the

    "Persons" table is created:

    CREATE TABLE Persons

    (

    P_Id int NOT NULL,

    LastName varchar(200) NOT NULL,

    FirstName varchar(200),

    E-mail varchar(200),Country varchar(200),

    PRIMARY KEY (P_Id)

    )

    CHECK Constraint

    The CHECK constraint is used to limit the value range that can be placed in a column.

    If you define a CHECK constraint on a single column it allows only certain values for

    this column. Also, if you define a CHECK constraint on a table it can limit the values in

    certain columns based on values in other columns in the row.

    CREATE TABLE Persons

    (

    P_Id int NOT NULL,

    LastName varchar(200) NOT NULL,

    FirstName varchar(200),

    E-mail varchar(200),

    Country varchar(200),

    CHECK (P_Id>0)

    )

    DEFAULT Constraint

    The DEFAULT constraint is used to insert a default value into a column.

    The default value will be added to all new records, if no other value is specified

  • 8/8/2019 Report Trainig

    11/15

    CREATE TABLE Persons

    (

    P_Id int NOT NULL,LastName varchar(200) NOT NULL,

    FirstName varchar(200),

    E-mail varchar(200),

    Country varchar(255) DEFAULT 'Sandnes'

    )

    3-The SELECT Statement

    The SELECT statement is used to select data from a database.The result is stored in a

    result table, called the result-set.

    SELECT Syntax:

    SELECT * FROM table_name

    Data requirement

    In terms of the number of employees in BCT company me and others trainee tried to

    build a program that help Executive Secretary to know all details of the employees

    passport.

    So, we were creating a program in excel show in figure (1). The aim for this project

    arranging the process of taking and returning back the employees passport.

    Functions:

    - The system should show the details of the employees passport.

    - The system should warn the user if the employees do not return back their

    passport in the specified date.

  • 8/8/2019 Report Trainig

    12/15

    Construction

    1- Collect data about the employees and their passport.

    2- Specify three columns:

    y Date of taking passport.

    y Date of returning passport.

    y Date of warning the employee to return passport.

    3- If the sys date returning date = 7 days the system will highlight the returning

    date.4- If the sys date = date of expiration then the system will highlight the date of

    expiration.

    Management operation

    In the last week I worked with a group of five employees. Where we make an interview

    to a Diploma and Bachelor graduated student in order to occupy an IT teacher job in

    Digital Oman project. My particularly job was to collect the CVs and divided them

    according to the majors and the type of certificateand degree. Moreover, I called them

    and determined the day to come to make an interview. I learned how to deal with

    candidates if they fail in the interview politely. Moreover, I learned the process of

    recruitment and organizing the interviews.Likewise , I enjoy the group work as well as I

    was committed with my individual job.

  • 8/8/2019 Report Trainig

    13/15

    Limitations

    Nothing in the world is perfect. So, There are several limitations in our training. For

    instance:

    1- Responsibility and Confidence. Some staffs are not trust the trainees so they did

    not take them sensitive work.

    2- Limited time. The time is not enough for information systems trainees because they

    deal with technology .For example, when the computer stack does not work, they

    need to wait for replay.

    3- Boring Days. Sometime I feel boring because no tasks for doing.

  • 8/8/2019 Report Trainig

    14/15

    Conclusion

    The training is effectual way to convert theoretical lessons to the practical lessons.

    Bahwan CyberTek are a good example for effectual training environment. The

    training covered the activities of the company different divisions including: oracle,

    Networks ,management task . Limited time, boring days and does not trust the trainee

    are the most important problems which I faced during the training. So, there are some

    suggestions for improving the training.

  • 8/8/2019 Report Trainig

    15/15

    Recommendation

    Related to my problems which are faced in our training there are some

    recommendation.

    y To improve training course, the organization should be prepare a clear

    planning for trainees.

    y Should the department of information system in bahwan Cybertek company

    takes the trainee responsibility and trust them when they work and doing the

    tasks.

    y I recommend to Provide trainees with PC and password that help them to

    search through internet and expires their work.

    y Give trainees opportunity to work with project to increase practical said

    rather than theoretical.

    y Field education is more important to refine the knowledge.