The Directorate of Students Industrial Work Experience Scheme Cloud
The Directorate of Students Industrial Work Experience Scheme Cloud
SCHEME (SIWES)
Level/Semester: 300L/2022_2
Faculty: Science
This report is based on the student industrial work experience scheme (SIWES) held at Lagos
State University Teaching Hospital (LASUTH) located at 1-5 Oba Akinjobi Street GRA Ikeja
Lagos. The Students’ Industrial Work Experience Scheme (SIWES) is a scheme that was set
up by the university commission to enhance and expose students to acquire adequate and
relevant skills that would enable them to perform effectively in their future place of work
and assignment. The work exposes students to work methods and enrich their experiences
in acceptable methods of handling equipment and machinery that may not be available in
the education institution. It is also aimed at exposing students to people from all works of
life, hence enhancing their communication skills and ability to interact with people after
graduation.
The report provides a brief explanation about the SIWES program such as its history,
objectives, aims while also giving a description of the work done mostly in computer
networking field. My industrial work scheme experience was achieved within three main
units of the ICT Department which entails working at the networking unit, maintenance unit
and Software development unit where I was exposed to the basics of the Hypertext mark-up
Language (HTML) used for website developments and management, knowledge about
different network topologies for the administration of the organization network and
internet services, installation of different application software’s and utilities, antivirus
programs, maintenance, repairs, assembly and reassembly of computer systems etc.
The networking operations and components such as the OSI model, TCP/IP, and other
networking protocols. The layers of osi model includes the Application Layer, Session layer,
Transport layer, Network layer, Data link layer, Physical layer and presentation layer.
It finally gives account to some of the machines and equipment used in the various units of
ICT department as well as their functions. It also provides insight in some of the challenges
faced and gives a few recommendations on how to further improve the program.
ACKNOWLEDGEMENT
I am grateful to the Almighty God, the beginning and the end, my creator and my everlasting
father who spared my life throughout the period of my SIWES program. May His name be
glorified and worshiped forever.
I appreciate my school, National Open University of Nigeria, Mushin Study Centre for the
opportunity to learn new skills through this Industrial Training Scheme. This has immensely
broadening my capacity and added to my exposure in the field of information technology.
I also appreciate the Unit Heads of ICT Networking unit, Maintenance unit and Software
Development Unit in persons of , Mr. Oledeoku oluwaseun, my supervisor Engr. Olalekan
Paul, Mr. Adekunle Olugbenga and the entire management staffs of ICT department of Lagos
state university teaching hospital ikeja lagos For their corporation and for accepting me in
the organization for this purpose.
I will not forget my sweet mother Mrs, Olayinka Bioshogun for her prayers and motherly
love to me through the thick and thin and my late father Mr. Bioshogun M.A who this report
is dedicated to may his gentle soul continue to rest in peace till we meet at the feet of the
lord Jesus Christ.
1.0 INTRODUCTION
This technical report is all about the skills and experience I acquired during the six months
SIWES program which I undertook at the Lagos State University Teaching Hospital (LASUTH)
Ikeja-Lagos from 1st September, 2022 to 28th February, 2023.
The report contains the account of all the operations and training received and the training
revolves around three units of the ICT department in Lasuth which are; The Networking unit,
Maintenance unit and Software development unit.
The networking unit is the unit that deals with the operations and administration of Lasuth
network which is built on star topology for the establishment of internet and intranet
services in Lasuth. The operation of IP phones, intercoms, CCTV surveillance, access point’s
installations and so on were taught with dexterity. The modus-operandi of the various
networking components like The Networking switches, Hubs, Bridges, patch panels,
Gateways, OSI model, network topologies etc. were shown to us on a platter of gold.
The maintenance unit is the unit that deals with the procuring, repairing, assembling,
reassembling and maintenance of the hardware components of the computer system. They
deal with identifying and fixing of faults in a faulty computer system. The computer
components such as the CPU, Motherboard, RAM slots, hard disc, etc was identified and
worked upon. While the software unit handles the creation of websites, web developments,
application software development, and configuration of servers, DNS management, and
installation of antivirus.
The student industrial work experience scheme (SIWES) is appreciable skill program, which
forms part of the approved minimum academic standard in the various degree programs for
all the universities. The scheme bridges the gap existing between theory and practice of the
engineering and technology, sciences agriculture, medical and other professional education
programs in the Nigerian tertiary institution. It is aimed at exposing and equipping students
to the real life working experience.
The training lasted for six (6) months, which involve the students, universities and the
industries.
SIWES was established by the federal Government of Nigeria and is jointly coordinated by
the Industrial Training Fund (ITF) and National University Commission (NUC).
SIWES is aimed at providing skills for students in their various fields. Some of the various
objectives why the program put in place are:
1. To provide an avenue for students in institution of higher learning to
2. To prepare students for the industrial work situation they are to meet
after graduation.
4. To make the transition from the school to the world of work easier, and
work situation thereby bridging the gap between theory and practice.
The establishment is Lagos State University Teaching Hospital Ikeja, (LASUTH) located at the
capital of Lagos the center of excellency and Nigeria’s hub of commercial and business city
center. It is a place with broad expertise in contemporary hospital services in Nigeria. Lasuth
evolves from a cottage hospital in the 60’s formally known as Ikeja General Hospital and
fully transformed into a teaching hospital in 1992 now offering a wide range of automated
and integrated solution in broad spectrum of technology driven medical services like
telemedicine, medical teleconferencing, e-medicine etc. using computers and
telecommunication technology in reaching out to their patience remotely. This large
technology-oriented corporation is on record to be the cheapest source for high quality
healthcare services and has a high reputation for performance in proving efficient and
affordable healthcare delivery in Nigeria.
The department is headed by a Director of ICT Mr. Adenuga O.A (GL17) with a team of
seasoned computer Engineers, Data processing officers, System analysts and Programmers
with proven track records in computer and communication business, the department offers
the following wide areas of specialization within the hospital domain;
(i) Repairs, Assembling and Maintenance of computers and I.T services
other consumables
equipment
(vii) Internet and E-mail Services
They manage and monitor the network at the receiving end. They are also responsible for
the operation, administration, and maintenance and provisioning of networked system.
They are also responsible for the upkeep, configuration, and reliable operation of the
computer system most especially multi user computers such as the server.
They are responsible for maintaining all system across the network and other IT peripheral
devices including printers and scanners. Maintenance and improvement of system
performance and online availability. Inventory of all computer equipment, keeping
maintenance records, and ensuring adequate maintenance provision. Identifying
bottlenecks and problems, making recommendations to solve them, keeping standard
software and hardware recommendations under review, and providing input into future IT
strategy. Overseeing computer security and Antivirus precautions and ensuring that
software licenses are adhered to.
The hardware unit also handles the administration of installation of operating systems
especially windows operating system. To install windows 10 or 7 will go through some steps
Upgrading the window entails the installation with cd rom or flash disk with some processes
of installation.
The maintenance unit answers to any complain regarding the malfunctioning of the
hardware part of computer system from anywhere within the hospital premises. The
complaints such as issues with the printer, computer not booting, keyboard problems and
blank- screens etc.
Figure 1.1 below shows the organogram of the company according to the various
departments.
Figure 1.1: Organogram of the Company
EXPERIENCE GAINED
Under this text, I will be writing on what I gained and with brief explanation
on them to at least explain myself out .I gained a lot from the hardware
2.1 HARDWARE
(i) CASE: This is also called a tower or housing, it is the box that encloses
to electrical power, as can be seen in figure 2.1 below. You can find it at
(v) DRIVES: These are devices used for long time storage of
information. The main storages for a computer is the internal hard
drive (also called a hard disk).A typical hard disk is the one in figure
2.3 below.
(iv) CARDS: Cards is used to describe important tools that allow your
term card is used because these items are relatively flat, with the sound
memory that is used to store documents while they are being processed.
Also note that the amount of RAM in a computer is one of the factors that
figure 2.4.
2.5. It performs instructions and calculation that are needed and managed a flow of
information through a computer. Processors are continually evolving and becoming faster
and more powerful. It is measured in MHz (megahertz) or GHz (gigahertz).
Figure 2.5: Processor
2.2 MAINTENANCE
2.2.1 Precaution maintenance: This has to do with the process of taking necessary
preventive measures and putting in place the required resources to prevent a computer
from breaking down. There are some common hardware problems that can be avoided or at
least made less frequent by taking particular preventive measures with computer which are:
1. Dust control: Dust is very harmful to computer part. Excess dust can cause mechanical
failures, particularly on computer components with moving parts. We minimize dust in a
computer lab which is an important part in computer maintenance.
duster).
(ii) When a computer is opened for others repairs, the dust that has built
(i) A laptop computer should not be left running for any length of time
conditional is also good option since the windows can be kept close to
minimize dust.
(i) Purchase protecting power (adapter) strips, these devices contain 4 outlets that are
(ii) Install a surge compressor where the main power enters a computer lab.
The ones I have experienced so far and their possible solutions are:
2.3.1.1 Computer doesn’t turn on at all: When you plug the AC adapter into the laptop,
there are no light turning on at all, even when the power button is pushed, no lights we say
that the laptop is dead because it makes no sounds and no indication of light.
(i) The AC adapter failed and battery has no charge left. In this case test the
one.
(ii) DC jack failed and the motherboard does not receive any power from the
booted (turns on), the power IED light will come up, cooling fan works but
(i) This can be memory failure; it is possible that one of the memory
modules failed. In this case I try resetting memory modules to make sure
they are making good contact with the slot. I can also test the laptop with
(ii) I remove the hard drive, DVD drive, wireless card, keyboard etc. in other
to disassemble the laptop to bare minimum and test again if it still does not
turn on most likely the motherboard has failed or the processor has failed.
2.3. Laptop makes noise while running: When you turn on your computer and everything
works fine, but (except) it makes some constant noise or rattling noise.
(i) In most case this noise comes from the cooling fan or hard drive
(iii) Bad key-board can also cause the noise which will result to change of
key-board.
2.3. Battery not charging properly: It might be that battery has stopped charging properly
or it does not charge at all or it charges only when the AC adapter is adjusted inside the
power connector.
(ii) Failed DC power connector. That is, if it charges well when the AC is
been adjusted.
2.3 Some keyboard keys stopped working: Possible problem and solution
(i) Most likely it might be that there is stuck keys on the keyboard, which
(ii) But I also open the keyboard and dust it properly before replacing
decision is carried
2.4 SOFTWARE SECTION/UNIT
(iii)Productive software
2.4.1 OPERATING SYETEM: These programs are installed in the computer system to manage
and coordinate the activities of the hardware components examples are window xp, vista,
window 8, window 7, window 10 etc.
2.4.2 MAJOR FUNCTIONS OF AN OPERATING SYSTEM
Installation of operating system was one of the key things I did during my industrial
attachment. Install various operating systems such as window 7, vista, xp and Linux
(ubuntu), below are the steps in installing window 7 operating system.
Note: Before installing operating system, it is advisable to backup all important files saved
on the hard drive.
Step 1: Make sure the computer is working properly; the peripherals and
CD/DVD. Select that option. Windows will start loading its files, as can
figure 2.7. This is the part to select Language for your windows. Select
and ‘CUSTOM’, as can be seen in figure 2.8. Right now we are installing a
careful, this is the most important part of the Installation. In this you will
allocate spaces to your drive as seen in figure 2.9 below. If you want to
create a new drive, simply click on a drive and then click ‘NEW’. A new drive
will be created.
Figure 2.9: Step four of installation
Step 5: When you have created the drives, simply select the drive in which
you want to install windows. Click ‘Format’, this will erase all the previous
Step 6: Now your windows will start installing its files, as seen in figure 2.11
below. Grab a cup of coffee and wait for a few minutes while it is installing.
During this process do not plug in or off your device. It might cause
interruption and you might lose your data and have to begin the process all
over again
.
Step 7: Now when your files are installed. Your PC will be rebooted and now you will
see a ‘User
Settings’ Screen. Simply add your Name and password and proceed to ‘NEXT’
Step 8: In this step you have to activate your windows. Simply look at the back of
your Windows CD/DVD cover there will be a PRODUCT KEY. Add this key into your
Step 9: Now you have installed you windows. Give the desired information the
Windows Step guide will ask, like Time Zone, Update Timing and Your Computers
location, as can be seen in figure 2.14 below. There are three types of location.’
WORK’, ‘PUBLIC’ and ‘HOME’. Select on anyone of them according to your location.
Last Step – Congratulations: - You have installed your windows. Now you can see is
your desktop.
It is simple to use, setup your desktop and enjoy!
2.5 UTILITY SOFTWARE: These are broad categories of programs that allow a computer
to perform task that are not parts of the OS, but are still practical and useful. Example
tera-copy, Nero etc.
2.6 PRODUCTIVE SOFTWARE: This is a program that performs standard office computer
task like word processing, presentation, spreadsheet and database software all graphs
software are all common example of productive programs.
(iii) I allow it to load, after few minutes; I open and click on my computer or
window in that environment, I locate the Disk and opened it, and then I choose any
(iv) I click on the program to be installed, it loads, accepts the policy after going
through it.
(i) I make sure that the software I wish to remove is not vital for the function of the
computer, if not sure, I search the internet to learn more about the software.
(ii) Once I am sure that I want to remove the software, I go to the start menu and
select control panel. (Note: in window xp click on the choice for add and remove
programs. In window vista, click on the program then select uninstall the program.
(iii) After clicking on the control panel, a list of software will appear, I choose the
program that I want to uninstall or remove ( guide through the removal steps
appears).
(iv) If not prompted to do so, I restore the computer after completing the removal
processes when the computer restart, I click the list of programs again to make sure
I experience that it is not always easy to know the source of a computer program but
determining whether the problem is from hardware or software will help to give a
computer lab manager some direction for action in trouble shooting and repair.
(i) I make sure I reduced possible “external” problem before proceeding. This
means unplugging any external devices (such as scanner etc.) and remove CD or
(occurred)? Then it is a probably a hardware problem, with most likely culprit being
(iii) Is the computer entirely dead? Or is the screen blank these faults are probably
(iv) Does the computer produce a series of beeps? This is a code that can be used to
(v) Does the computer produce error information after it has booted or only when
(vi) Finally, I opened my control panel any device either hardware or software that
has a problem will have a warning symbol next to it, I double click on the device
NETWORKING SECTION
2.7 NETWORKING: In the world of computer, networking is the practice of linking two
or more computing devices together for the purpose of sharing data. Network is built
with a mix of computer hardware and software. In order to telecommunicate, local,
regional, national, and international telecommunication networks are required. In the
world of computers, networking is the practice of linking two or more computing devices
together for the purpose of sharing data.
Communication and networking go together.
The meaning of the word 'networking' may not be very clear at first, but it is something
we all do. Networking is making contacts, maintaining contacts and using contacts.
Figure 2.15: Computer Network
2.7.1 THE OSI MODEL LAYERS
The OSI Model is not a physical model, though. Rather, it is a set of guidelines that
application developers can use to create and implement applications that run on a
network. It also provides a framework for creating and implementing networking
standards, devices, and internetworking schemes.
The OSI Model has seven different layers, divided into two groups. The top three layers
define how the applications within the end stations will communicate with each other
and with users. The bottom four layers define how data is transmitted end to end.
network.
They are:
(i) The Class A IP addresses: These have 8 bits for network addressing, and 24
bits for host. Example is 171.52.0.6 is a host address under the 171.52.0.0
(iii) The Class C IP addresses: These have 24 bits for network addressing, and 8
bits for host.
2.9 TERMS USED IN NETWORKING
network users (client). Servers are typically powerful computers that run
(ii) Network interface card: The network interface card (NIC), is the expansion
network (i.e. NICs are used to connect PCs to the network). This device
motherboard.
NICs come in three basic varieties: 8bits, 16bits and 32bits. The larger the number
of bits that transfer to the NIC, the faster the NIC can transfer data to the network
cable.
Figure 2.17: Network Interface Card
iii) Router: This is a specialized network device that determines the next point to
which it can forward a data packet towards the ultimate destination of the
packet.
iv) Gateway: This device is placed at a network node and interface with another
network that uses different protocols.
v) Switch: This device allocate traffics from one network segment to certain lines
(intended destination (s)) which connects the segment to another work segment.
Switch splits the network traffic and sends it to different destination to all system
on the network.
vi) Hub: This device connects multiple Ethernet segments, making them act as
a single segment when using a hub, every attached device shares the same
broadcast domain and the same collision domain. Therefore, only one computer
OSI mode connection among the network objects (workstations, servers etc.)
bandwidth which is shared among all the objects in contrast to switches which
provide a connection between individuals nodes can be supported by hub.
vii) Ethernet: This is a family of computer networking technologies for local
area networks (LANs).It has largely replaced competing wired LAN technologies.
Ethernet used coaxial cable as a shared medium. Later the coaxial cables were
replaced by twisted pair and fibre optics links in conjunction with hubs or
switches.
enterprise. It may consist of many interlinked local area networks and also use
leased lines in the wide area network. Typically, an intranet includes connections
through one or more gateway computers to the outside Internet. The main
packet switching which is known as the internet protocol (IP). Internet is such a
x) Frame: This is the protocol data unit of the data link layer. xi) Packet: This
with 32 channels at 64Kbps. 30 channels carries traffic that is, voice and
data, 1 channel is for signaling and the other 1 is for synchronization that is,
xiii) T1: This is a transmission equipment that carries signal at 1.544Mbps with
the
internet protocol (IP) assigned to each microwaves
radio. xv) Link: It is a barrier between a source and
the destination.
(ii) Local Area Network (LAN): LAN consists of a computer network a single sit,
Note: network resources are other peripheral devices that are shared on a
across an entire city, collage campus or small region. Note that: a MAN is larger
mentioned above.
As I have studied, I can summaries that network provides great flexibility, such as:
(iii) All forms of network resources are being shared including accessing the
internet.
(i) Star Topology; In this topology all the computers are connected to a single
hub through a cable the hub is the control node all other nodes are connected to
the node.
(ii) Mesh topology: This forms a ring as each computer is connected to another
computer, with the last one connected to the first two neighbors for each device.
(iii) Ring Topology: This forms a ring as each computer is connected to another
computer, with the last one connected to the first two neighbors for each devices
(iv) Tree Topology: It has a root node and all other nodes are connected to it
(v) Bus Topology: In this topology, all stations are attached to a single cable.
Terminators at the end of the cable prevent the signal from reflecting back to the
sender.
Figure 2.20: Structures of Ring, Star, and Bus and mesh topologies
(i) Transmit voice. All these transmissions are being done due to their
(ii) The data sent is being carried in the form of more related pulse of light or
electronic signals.
2.13 HOW TO MAKE CABLE FOR TRANSMISSING STRIAGHT THROUGH/
Materials needed
A. Cat 5 cable - One can buy a 1000 feet roll of Cat 5 cable at computer stores and
industry supply houses for somewhere between 6 and 10 cents a foot, depending
on the quality. Check to make sure that the color-coding on the wires is easily
recognizable.
RJ-45 connectors: They usually come in bags of 50, 100 etc. Pay attention to the
type of RJ-45 connector you get and make sure it is intended for the type of Cat 5
wire you are using. There are two different kinds of RJ-45 connectors, depending
on whether you use them with solid or stranded wire cable. Using the wrong kind
with the wrong cable will most likely result in a bad connection.
Figure 2.22: RJ-45 connectors
B. Crimping tool: While this is the expensive part of making your own cables, it is
only a one-time startup cost. A good crimping tool has a pair of wire cutters built
in, as well as a blade to strip insulation. It also might support crimping of other
connectors such as RJ-11.
C. Diagonal Cutter Pliers: You will need a pair of this to cut the wires in case
the crimper does not come with a built-in wire cutter. Cutting, Stripping, and
Sorting the Wires Cut a piece of Cat 5 as long as you need. When you cut,
Measure twice, cut once. Make sure the cut on each end is clean and straight.
Strip about an inch of the insulation off the cable. Cut it back nice and square.
Some crimping tools such as the one used here, come with a built-in wire
stripper. You put the cable in to a stop on one side of the cutter. It will cut the
jacket the right length to make a perfect crimp. It is extremely important that you
only cut the plastic insulation or jacket and not the wire. Damaging one of the 8
wires, even if you just nick it or partially cut it, will ruin your cable.
D. Untwist the wires. You will notice that there are 4 pairs of multi-colored
wires inside. Sort the pairs by color. You should end up with wires color coded as
brown/brown-white.
Figure 2.25: Untwist the wires
Now align the wires in the following order from left to right. The order is
important since there is a wiring standard defined by the Telecommunications
Industry
Get the wires lined up and nice and straight. Then clip off the top millimeter so
that they are all the same length and stick out about half an inch from the
insulated part.
Step3. From the task pan bar, I clicked on changing advanced sharing setting
Step4. I turn on all network option e.g. I turn on network discoveries.
Step5. I turn on file and printer sharing, I turn on all sharing in order to
communicate with everyone in the network.
Step6. Finally, I turn off password protection sharing then I clicked on save
SETTING UP AN INTERNET PROTOCAL (IP) ADDRESS
Here is the way you configure ad hoc wireless setting on host computer, so that
other computers can connect to it wirelessly and directly:
up a connection or network.
4. Set up a wireless ad hoc network window will appear, this window will
briefly explain what an ad hoc wireless network is. Click next after the
reading.
7.
8. Security type (encryption) and security key. One can set up the ad hoc
connection without the authentication first, and then enable the encryption
(WEP, WPA2, etc.) once it worked. The encryption should be enabled, if not
every nearby computer can connect to this network. Click next again.
Note: You can click save this network to save it as wireless network profile. If not,
the network setting will not be saved.
The next window will tell you that the ad hoc network is ready for use with
connection setting. Click Close to finish the setup.
Back to your Network and Sharing Center, click on Manage Wireless networks,
you will see the New created ad-hoc network and it is ready to be connected.
You can then use other client computer to connect to the adhoc wireless
network.
available connections, which are dial-up, VPN and wireless connections, but
your focus is on ad hoc wireless connection. Scroll down the list and select
the ad-hoc wireless network and click Connect button. Note: You will be
HTML:
HTML stands for Hypertext Markup Language, and it is the most widely used
language to write Web Pages.
(i) Hypertext refers to the way in which Web pages (HTML documents) are
HTML to
simply "mark-up" a text document with tags that tell a Web browser how to
structure it to display. Originally, HTML was developed with the intent of defining
the structure of documents like headings, paragraphs, lists, and so forth to
facilitate the sharing of scientific information between researchers.
Now, HTML is being widely used to format web pages with the help of different
tags available in HTML language.
HTML Tags: As told earlier, HTML is a markup language and makes use of various
tags to format the content. These tags are enclosed within angle braces <Tag
Name>. Except few tags, most of the tags have their corresponding closing tags.
For example, <html>has its closing tag</html>and
<body>tag has its closing tag </body>tag etc
LESSTHAN <P>
GRATER THAN
ELEMENT
Tag Description
<body>...</body> tags.
<head> This tag represents the document's header which can keep other
<title> The <title> tag is used inside the <head> tag to mention the
document title.
<body> This tag represents the document's body which keeps other HTML
<h1> This tag represents the document's body which keeps other HTML
<ul>, <ol>etc
With the help of HTML Tags a web page can be easy created.
C.S.S explains how HTML elements are to be displayed on screen, web browsers
etc
C.S.S controls a layer of multiple web page all at once also external sheets are
being stored in CSS files.
USE OF C.S.S
We use C.S.S to define style for your documents, including the design, layout and
variations in display for different devices and screen sizes. You can place your
C.S.S in the <head> of a documents with an embedded style sheet, or attached a
separate files and defines your styles with an external style sheet. To link an
external style sheet to your documents you simply add a link to the style sheet in
the <head> of the documents.
When a user displays a web page, the users browsers loads style information
along with the content of the page.
When a user prints a web page, you can provide different style information that
makes printed page easy to read.
In general, we use html to describe the content of the documents, not its style
while we use C.S.S to specify the documents style, not its content
The fore knowledge I had in CIT 311, CIT 321 and Cisco networking essentials book
communications and the training I went through in the organization, I was able to
(i) Teaching and assisting I.Tstudents and other staffs in training through their
lessons, During the Students’ Industrial Work Experience, I was able to put
into practice all that I was taught teaching others too. This really gave me
the opportunity to know what I was taught better.
where they are needed within the hospital : I was able to assist
clients outside and some other staffs that needed ICT services.
(iii) I was able to successfully install Windows 7, despite the fact that I could
the old operating system as many people have been forgetting how to
install this windows. With this I was able to also make positive contribution
to the establishment.
(iv) Attending to the organization needs in the areas of photocopying,
was able to increase the efficiency and proficiency of the ICT department
(v) I was able to successfully troubleshoot, reinstall and replace bad parts of
computer system both desktop and laptop, and I also upgraded some of
(i) Insufficient Vehicles: The shortage of vehicles for work especially when a
to wait for a particular team to return before heading out to site or even take
downtime.
(ii) Distance: The distance between the office and my home was also a major
to go through the rigorous process of securing a waybill. There were also several
(iv) Use of Crude Implements: In some cases, most of the equipment and
facilities used were not up to standard and this had a way of slowing down the
job process. Examples are the rack system configuration, servers, faulty port
configuration.
4.1 CONCLUSION
Through this training I was able to gain new insight and more understanding
about the real industry working condition and practice. I was able to successfully
troubleshoot, reinstall and replace bad parts of computer system both desktop
and laptop, and I also upgraded some of the computers. It has provided me the
opportunities to develop and improve my soft and functional skills. All of this
valuable experiences and knowledge that I had gained were not only acquired
through direct involvement in task given but also through other aspect of the
training such as work observation, interaction with colleagues, superior, and
other people related to the field. From what I have undergone, I am very sure that
industrial training program has achieved its entire primary objectives.
This program has also prepared students to face the real working life. As a result
of the program, now I am more confident to build my future career. So also, the
fore knowledge I had in CIT311 and CIT321 really helped me in ICT department,
due to my knowledge in computer hardware, computer Networking, data
communications and the training I went through in the organization, I was able to
contribute to the establishment in some ways.
4.2 RECOMMENDATION
(ii) Students should be paid monthly in their places of attachment by the SIWES
body.
(iii) Supervisors should always visit students monthly in their various places of
attachment.
(iv) School should always liaise with industries, firm and companies where the
students are doing their industrial training to check and improve their
facilities.
(v) School should organize a seminal for students place of attachment (the
attachment (Lagos State University Teaching Hospital, Ikeja) for schools and
REFERENCES