0% found this document useful (0 votes)
1K views30 pages

Field Report 2022.

This report summarizes Lucas Kaegele's practical training at Mwalimu Nyerere Memorial Academy. The report outlines tasks performed in areas such as Windows installation, network cabling, router and switch configuration, and computer maintenance. Key lessons learned include skills in networking, troubleshooting, and technical support. The report identifies new skills gained in areas like N-Computing device configuration and provides recommendations to further improve the host organization's IT department.

Uploaded by

lucas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views30 pages

Field Report 2022.

This report summarizes Lucas Kaegele's practical training at Mwalimu Nyerere Memorial Academy. The report outlines tasks performed in areas such as Windows installation, network cabling, router and switch configuration, and computer maintenance. Key lessons learned include skills in networking, troubleshooting, and technical support. The report identifies new skills gained in areas like N-Computing device configuration and provides recommendations to further improve the host organization's IT department.

Uploaded by

lucas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 30

MZUMBE UNIVERSITY

FACULTY OF SCIENCE AND TECHNOLOGY

COMPUTING SCIENCE STUDIES DEPARTMENT

PRACTICAL TRAINING REPORT

Name of Student: LUCAS E. KAEGELE

Registration Number: 13304033/T.19

Year of Study: 2021/2022

Academic Year: Two (2)

Programme: BSc. ICTM

Company Name: MWALIMU NYERERE MEMORIAL ACADEMY


KIGAMBONI

Company Physical Address: P. O BOX 9193, DAR ES SALAAM.

Supervisor’s Name: MR. JUMBE KAPYA and MR. DANIEL SAMWELI

MU Supervisor:
TABLE OF CONTENT
Contents

ACKNOWLEDGEMENT....................................................................................................iv

ABSTRACT...........................................................................................................................v

LIST OF FIGURES.............................................................................................................vii

CHAPTER ONE....................................................................................................................1

1. INTRODUCTION.............................................................................................................1

1.1 OVER VIEW OF THE COMPANY/ORGANIZATION.............................................1

1.1.1 Introduction..................................................................................................................1

1.1.2 Historical background..................................................................................................1

1.1.2 Vision.............................................................................................................................1

1.1.3 Mission..........................................................................................................................2

1.1.4 Main activities done by The Mwalimu Nyerere Memorial Academy.......................2

1.1.5 Services provided..........................................................................................................3

1.1.6 Organization chart of MNMA.....................................................................................3

Figure 1: Organization chart....................................................................................................3

1.1.7 Directorate of Information and Communication Technology (DICT).....................4

Summary................................................................................................................................5

CHAPTER TWO...................................................................................................................6

2. TASKS PERFORMED AND LESSONS LEARNT........................................................6

2.0 Duties Undertaken...........................................................................................................6

i
2.1 WINDOWS INSTALLATION.......................................................................................6

Figure 2: shows RUFUS software for booting flash device.....................................................7

Figure 3: shows the boot order in BIOS setting.......................................................................8

2.2 NETWORK CABLING AND INSTALLATION..........................................................9

2.2.1 Network cables..............................................................................................................9

Figure 4: network cable.........................................................................................................10

2.2.2 Ethernet cable Termination.......................................................................................10

2.2.3 Installing the printer driver.......................................................................................11

Figure 7: shows the troubleshooting tool (gun) and motherboard..........................................11

2.2.4 registered jack – 45 (utp connector)..........................................................................12

Figure 8: Registered Jack – 45..............................................................................................12

2.3 ROUTER AND SWICTH CONFIGURATION..........................................................12

2.4 NETWORK TROUBLESHOOTING..........................................................................13

Figure 10: Ping command results..........................................................................................14

Figure 11: Traceroute commands in cmd..............................................................................15

2.5 MAINTAINCE AND REPAIR.....................................................................................16

Figure 12: Computer maintenance at C 214 laboratory.........................................................16

CHAPTER THREE............................................................................................................17

3. GAPS IN SKILLS AND ANALYSIS.............................................................................17

3.0 New Skills Learnt..........................................................................................................17

ii
Figure 13: shows the computer which has N-computing device connected...........................17

CHAPTER FOUR...............................................................................................................19

4. LEARNING.....................................................................................................................19

4.0 Introduction...................................................................................................................19

CHARPERT FIVE..............................................................................................................20

CONCLUSION AND RECOMMANDATION.................................................................20

5.1 CONCLUSION..............................................................................................................20

5.2. Recommendation to the host 0rganization.................................................................21

REFERENCES....................................................................................................................22

iii
ACKNOWLEDGEMENT
I would like to thanks GOD who gave me enough strength and good physical and mental
Health during my all-time days of field. Also, much thanks to my MU supervisor MR
LUNO and all of the staff member for their support in my field. I would like to
acknowledge my lovely family and my fellow students who we worked together and
helped each other by exchanging ideas, views and skills to assigned tasks during the
entire practical period at the field station at MWALIMU NYERERE MEMORIAL
ACADEMY.

I greatly appreciate Mr. Jumbe Kapaya (IT technician), Mr. Daniel Samwel (IT
technician) and Dr. Mlelwa (IT manager) who has been my mentor on writing this field
report, their guidance and assistance helped me to prepare this work successfully. And
they helped me to complete some tasks that i was assigned to perform in the industry by
giving me enough support to complete those tasks.

Also, thanks to my other workers that I walked together in Mwalimu Nyerere Memorial
Academy from different department, like Electronic department, Human resource
department and so many other they give me too much support and I live with them like
brothers and sisters in a few days and the support that I get from them in my carrier.

I’m LUCAS E. KAEGELE I declare that the contents of this technical report are the
original copy and also original designs of what I went through in my all woks of my field
practical training under the supervision of Mr. Jumbe and Mr. Daniel who is the IT
technician at MWALIMU NYERERE MEMORIAL ACADEMY at KIGAMBONI, Dar
es salaam. also, any of what explained within this report is true information especially in
al task that I was done

iv
ABSTRACT
This field report is divided into five main chapters which are; introduction, task performed
and lessons learnt, interpretation and analysis, gaps in skills and technologies, conclusion and
recommendations. The following is a brief summary of each chapter:

Chapter one: This chapter explains the organization in general including the name, physical
location, historical background, vision, mission and the main functions of the organization. It
also provides an overall picture of all the activities performed by the IT department towards
accomplishment of the core functions of the organization.

Chapter two: This chapter explains the tasks that I was assigned by a supervisor during the
field practical training and the problems from which every particular task arose. It will also
provide a clear description of proposed solutions on solving the problem, technical and non-
technical approaches used to implement proposed solution and the results after
implementation of the proposed solution.

Chapter three: This chapter explains the improved skills and new skills that I and my
colleagues learnt during my field practical training at Mwalimu Nyerere Memorial Academy.
In this chapter there is some description about new skills and improved skills which were
provided during my field practical training at Mwalimu Nyerere Memorial Academy.

Chapter four: In this chapter there is explanation on skills are lacking and need to be
improved and Gap in Technologies about what technology is lacking and need to be
incorporated.

Chapter five: This chapter concludes about my field practice which were performed during
my field studies and it summarizes about all happened when I was in my field practice at
Mwalimu Nyerere Memorial Academy. Also provide some recommendation about what
should be improved in Computing Science training programs and what feedback may help
Mzumbe University to improve further.

v
This report aims to provide the description of attained objective and knowledge obtained from
practical training at Mwalimu Nyerere Memorial Academy at Dar es salaam

The main assigned task to my field was the following:


 Windows 7, window 10 and window 11 installation
 Application Software installation
 Printer Drivers installation
 Printer Troubleshooting
 Network troubleshooting
 Computer troubleshooting
 Data backup and data entry
 Configuration of N-computing system
 Create a network cable
 Update info in Industry Website
 Network cable management
 Troubleshoot Outlook application

vi
LIST OF FIGURES
Figure 1: Organization chart

Figure 2: shows RUFUS software for booting flash device

Figure 3: shows the boot order in BIOS setting

Figure 4: network cable

Figure 5: shows the network wire arrangement

Figure 6: shows the network cable which is ready for use

Figure 7: shows the troubleshooting tool (gun) and motherboard

Figure 8: Registered Jack – 45

Figure 9: Command-line prompt

Figure 10: Ping command results

Figure 11: Traceroute commands in cmd

Figure 12: Computer maintenance at C 101 laboratory

Figure 13: shows the computer which has N-computing device connected

vii
CHAPTER ONE

1. INTRODUCTION

1.1 OVER VIEW OF THE COMPANY/ORGANIZATION.

1.1.1 Introduction
This chapter explains the organization in general including the name, physical
location, historical background, vision, mission and the main functions of the
organization.

1.1.2 Historical background


The Mwalimu Nyerere Memorial Academy is a product of Kivukoni College, which
was established on 29th July, 1961 as a private company under Companies Ordinance
(Cap 212). The primary goal was geared toward spreading understanding of social,
political and economic problems facing underdeveloped countries as Tanganyika by
then. In 1971 Kivukoni College was transformed into an Ideological College. Due to
the worldwide, political and economic changes, which were taking place in the 1980’s
and 1990’s the college, was transformed into an Academic Institution and named
Kivukoni Academy of Social Sciences (KASS).
A national need for expansion of higher education necessitated KASS to be
transformed into a public higher learning institution. In 2005, The Mwalimu Nyerere
Memorial Academy (MNMA) was established by an Act of Parliament No. 6 of 2005.
The Act became operational on 1st October, 2005 by Publication of Government
Notice No. 433 of 23rd December, 2005. The Academy took over functions, assets
and liabilities of the former KASS. MNMA is in Dar es Salaam located along the
Magogoni creek at the ferry.

1.1.2 Vision
 The Mwalimu Nyerere Memorial Academy (MNMA) is recognized as a leading
institution in Africa for demand driven knowledge generation, application,
preservation and dissemination for social, political and economic problems facing
underdeveloped countries as Tanganyika by then in 1971. Later on, became and
transformed into a public higher learning institution in 2005 in United Republic of
Tanzania.

1
1.1.3 Mission
 MNMA’s mission is to dedicate itself to the advancement of lifelong learning through
excellence in teaching, research, consultancy and public service and within (with) a
challenging and supportive learning environment in which pursuit of knowledge;
creative enquiry, critical thinking and applied skills is cultivated and sustained.

1.1.4 Main activities done by The Mwalimu Nyerere Memorial Academy


 To encourage academic staff and students to learn and seek knowledge and
truth;

 To produce highly educated and adequately trained experts well prepared


and equipped with requisite skills for self-employment and manning of key
positions in both public and private sectors;

 To promote, facilitate and sponsor research into technological, social,


economic, political and cultural spheres for the welfare and development
of mankind within and outside the United Republic of Tanzania;

 To seek or institute and award fellowship, scholarships, bursaries, medals,


prizes and other forms of awards, assistance or sponsorship for the
advancement and dissemination of knowledge and pursuit of truth;

 To arrange for the publication and dissemination of material produced in


connection with the work and activities of the University;

 To conduct and administer examination and confer degrees, diplomas,


certificates, and other awards of the University;

 To develop, promote and undertake the provision of adult, continuing and


distance education for the enhancement of good governance and
efficacious solution to socio-economic and political problems;

 To develop and maintain a reference library and provide library services in


the fields of study undertaken by the University;

2
 To cooperate with the government of the United Republic of Tanzania in
the planned and orderly development of quality education, science and
technology in the United Republic of Tanzania;

 To establish links and to cooperate with other national and international


institutions in the initiation and conduct of cooperative research,
publication and training programmer for the mutual benefit of the
cooperating institutions and the United Republic of Tanzania and generally
for the pursuit of the mission of the University.

1.1.5 Services provided


 Provision of knowledge spreading understanding of social, political and economic
problems toward the community.

1.1.6 Organization chart of MNMA.


The University consists of three campus colleges, two schools, three faculties, one institute,
four academic directorates and other organs that performs various activities in order to
accomplish the core functions of the organization.

Below is the structure of The Mwalimu Nyerere Memorial Academy.

Figure 1: Organization chart

3
1.1.7 Directorate of Information and Communication Technology (DICT).
The DICT handles all matters related to information and communication
technology activities at the University. Its major objective is to ensure that the
University has the right technology at the appropriate time and with a right
quantity and quality. It also ensures that the ICT services are readily available to
users in the University and downtime is minimal.

Mission of the Directorate

 The mission of DICT is to provide technical support related to ICT services to all
stakeholders of The Mwalimu Nyerere Memory Academy and its partners.

Vision of the Directorate

 The vision of the Directorate is to facilitate the University with wide access to and
utilization of Information and Communication Technology and to enhance the
position of The Mwalimu Nyerere Memory Academy as centres of academic
excellence, and its contribution to the sustainable development of the society by using
ICTs

Functions of DICT

 To advise the MNMA management on the appropriate ICTs to acquire.


 To advise the MNMA management on the acquisition of both hardware
and software.
 To advise the MNMA management on the segmentation of the LAN to
logical division.
 To advise the MNMA management on the development and maintenance
of corporate and other databases.
 To advise the MNMA management on how to share resources in the LAN.
 To service and repair computer systems and their peripherals.
 To supervise and monitor the usage of computer equipment in staff offices
and students’ laboratories.
 To organize and supervise major repair on ICTs in case MNMA
technicians fail to solve the problem.

4
 To develop and customize computer software.
 To set ICT utilization policy and user guidelines and oversee its
implementation.
 To ensure that the MNMA Local Area Network (LAN) works properly all
the time.
 To develop and maintain MNMA website.
 To design and facilitate specialized computer applications courses; and
Any other function as may be directed by the University Management
through the Deputy Vice Chancellor.

Summary
The Mwalimu Nyerere Memory Academy is a Governmental institution which issues
excellence educational achievements for undergraduate and postgraduate students in
Tanzania. It was established in 1961 as a private company under Companies Ordinance (Cap
212) before transformed into fully public university in 2005.

The University consists of different organs that performs various activities in order to
accomplish the core functions of the organization.
The Mission of the University is to provide opportunities for acquisition, development,
preservation and dissemination of knowledge and skills through training, research,
technical and/or professional services.

The Mwalimu Nyerere Memory Academy is recognized as a leading institution in Africa


for demand driven knowledge generation, application, preservation and dissemination for
socio-economic development by 2005.

The DICT handles all matters related to information and communication technology
activities at the University. Its major objective is to ensure that the University has the
right technology at the appropriate time and with a right quantity and quality. It also
ensures that the ICT services are readily available to users in the University and
downtime is insignificant.

5
CHAPTER TWO

2. TASKS PERFORMED AND LESSONS LEARNT

2.0 Duties Undertaken


This chapter Explain about the task performed during practical training at The
Mwalimu Nyerere Memorial Academy that start 9th August 2022 t. During my practical
training, I was assigned different activities to perform associated IT issues. Some of the
task I was assigned was already learned at my course at Mzumbe university but other was
not. This was very interesting me because I learn more things which improve my
knowledge

During my field practical training at The Mwalimu Nyerere different tasks were
assigned but the main task was Network installation and maintenance. Other
minor tasks were as follows;
 maintenance and repair,
 installation of windows and other application program,
 network troubleshooting,
 driver installation also
 router and switch configuration.

2.1 WINDOWS INSTALLATION


First Window is a collection of programs known as an operating system (OS) that controls a
personal computer, Sometimes OS is called the mother of computer because it controls all part
of computer hardware and software.
During practical training we are practicing on how to install this software and to practice
installing window 11, window 10 and window 7 in different computers. For example, the
following are the stapes to show how to install window 10 in computer
i. We need to check if device meets the Windows 10 system requirements.
CPU: 1GHz or faster processor
RAM: 1GB for Windows 10 32-bit or 2GB for Windows 10 64-bit
Storage: 32GB of space or more
GPU: DirectX 9 compatible or later with WDDM 1.0 driver
Display: 800x600 resolution or higher

6
ii. Create USB installation media/ bootable device, there are application software that
can boot device like RUFUS, power ISO, winUSB and UNetbootin. But in
chemicotex industry they use much RUFUS and the following are stapes to boot
device by using RUFUS application

 Open the program with a double-click


 Select your USB drive in “Device”
 Select “Create a bootable disk using” and the option “ISO Image”
 Right-click on the CD-ROM symbol and select the ISO file
 Under “New volume label”, you can enter whatever name you like for your USB
drive
 You’ll receive the warning “ALL DATA ON THIS DEVICE WILL BE
DESTROYED”, which you can confidently confirm with “OK”– at this point,
you’ve ideally already saved any important files from the USB drive
 Click on “Start”
 As soon as the green bar is full, click on “Finish”
 Eject your bootable USB drive with “Safely eject hardware”

7
Figure 2: shows RUFUS software for booting flash device

iii. Use your installation media. Insert your installation media into your device and
then access the computer’s BIOS or UEFI. These are the systems that allow you to
control your computer’s core hardware. The process of accessing these systems is
unique to each device, but the manufacturer’s website should be able to give you a
helping hand here. Generally, you'll need to press the F2, F12 or Delete keys as
your computer boots up.
iv. Change your computer's boot order. Once you have access to your computer’s
BIOS/UEFI you’ll need to locate the settings for boot order. You need the Windows
10 installation tool to be higher up on the list than the device’s current boot drive:
this is the SSD or HDD that your existing OS is stored on. You should move the
drive with the installer files to the very top of the boot order menu. Now, when
you restart your device the Windows 10 installer should load up first. 

Figure 3: shows the boot order in BIOS setting

v. Restart your device. Save your settings in the BIOS/UEFI and reboot your device.
vi. Complete the installation. Your device should now load up the Windows 10
installation tool on restart. This will guide you through the rest of the installation
process

8
2.2 NETWORK CABLING AND INSTALLATION
Network cabling was the main task that I was assigned always during my practical
training at The Mwalimu Nyerere Memory Academy. The networking system used
at Mwalimu Nyerere Memory Academy is local area network (LAN) and the major
uses of the network is for sharing different resources such as hardware, software,
data and different information from each office which have a computer system.
What was required to be done here is to install the local area network within
different buildings like staff offices in Uhuru building, as well as Library of
University at Mwalimu Nyerere Memory Academy.

2.2.1 Network cables


Cable is the medium through which information usually moves from one
network device to another. There are several types of cable which are
commonly used in LAN’s installation. In some circumstances, a network will
employ only one type of network cable, other networks will use a diversity
types of cable. The type of cable chosen for a network is related to the
network's topology, protocol and size.

Understanding the characteristics of different types of cable and how they


relate to other aspects of a network is necessary for the development of a
successful network.

Here under are the different types of cables used in computer networking

 Unshielded twisted pair (UTP) cable


 Shielded twisted pair (STP) cable
 Coaxial cable
 Fiber optic cable

9
Twisted pair cabling comes in two varieties i.e. shielded and unshielded
twisted pairs. Unshielded twisted pair (UTP) is the most popular and is
generally the best option for school networks.

Figure 4: network cable

2.2.2 Ethernet cable Termination


During my field practical my skills was improved more because I was learned and practice
much to terminate the network cable Also, I was learned to connect these Ethernet cables to
the devices such as switch, hub, printer, computer and other networking device.

Figure 5: shows the network wire arrangement

Figure 6: shows the network cable which is ready for use

10
2.2.3 Installing the printer driver
I improve my skills on installing the printer driver because during my course I learn
theoretical but, in my field, we trained practical on how to install that software/ drives in
printer. So this help to improve my skills because now I know both theoretical and practical
to install drives

 Troubleshoot computer with different problems and to use different troubleshooting


tool to solve those problems like gun

Figure 7: shows the troubleshooting tool (gun) and motherboard

11
2.2.4 registered jack – 45 (utp connector)
The standard connector for unshielded twisted pair cabling is an RJ-45 connector. It is
a plastic connector that looks like a large telephone-style connector (See fig. 2). A slot
allows the RJ-45 to be inserted only one way. RJ stands for Registered Jack, implying
that the connector follows a standard borrowed from the telephone industry. This
standard designates which wire goes with each pin inside the connector.

Figure 8: Registered Jack – 45

2.3 ROUTER AND SWICTH CONFIGURATION


A network switch (also called switching hub, bridging hub, officially MAC Bridge) is a
computer that connects devices together on a computer network, by using packet switching to
receive, process and forward data to the destination device. Unlike less advanced network
hubs, a network switch forwards data only to one or multiple devices that need to receive it,
rather than broadcasting the same data out of each of its ports.

A network switch is also a multiport network bridge that uses hardware addresses to process
and forward data at the data link layer (layer 2) of the OSI model.

Configuration process:

During the configuration of the switch ports, each port was configured individually. This was
done using the PUTTY Terminal with network commands specifically for delivering the
configuration of ports.

After the configuration process then each port was tested to see if there is incoming network
or there is flow of data through the communication network devices. There after we finalize
the installation of network after seeing that all the ports within the switches are working fine.

12
On the issue of router configuration, we configured two routers namely TP- link router and
NETGER router the following were the steps done on the configuration prosses this stapes
conducted for both routers

 the router should be connected to electricity power


supply
 We need to have two Ethernet wires; one should be
connected to network host and the other from router to
computer
 The we used web site link for TP-LINK and Ip address
for NETGEAR router in order to have an access to
router database configuration steps. Where it will
provide an interface for entering user name and
password

2.4 NETWORK TROUBLESHOOTING


In networking, data transfer from source to destination is accomplished if data pass through
the 7 OSI layers which are Application Layer, Presentation Layer, Session Layer,
Transportation Layer, Network Layer, Data Link layer and Physical Layer.
Sometimes data may fail to reach to the destination due to network problems that may occur
in any of the OSI layers.
To solve the problems, we need to identify them by passing at different layers, some of the
problem can be identify using Cisco Commands such as “TRACEROUT and “PING”
commands this is mainly used on the network layer.
Ping command used to check if there is a connection between the Sender and the Receiver
while trace route command is used to trace the path between the sender and the receive

13
Network troubleshooting by PING commands
To troubleshoot a network by using PING command you have to follow the following steps.
Step 1
Open the command prompt found on your Computer, bellow is the screenshot of the
command prompt after you open it.

Figure 9: Command-line prompt


Step 2
Type the following command, PING [IP Address of the destination host] then heat Enter
button,
Examples: - PING192.168.43.107 or
After you heat Enter button, the following output will display on the command prompt as
shown on the following screen shot, but this output will display if the destination is
reachable.

Figure 10: Ping command results

14
How to troubleshooting using traceroute command
TRACEROUTE is a command which can show you the path a packet of information taken
from your computer to one you specify. It will list all the routers it passes through until it
reaches its destination, or fails to and is discarded. In addition to this, it will tell you how long
each 'hop' from router to router takes.

In Windows, select Start > Programs > Accessories > Command Prompt. This will give you
a window like the one below.

Enter the word tracert, followed by a space, then the domain name.

Example
Type the following command on command prompt on windows, trace route
www.mzumbe.ac.tz. After clicking the enter button the following output will be given out.

Figure 11: Traceroute commands in cmd

15
2.5 MAINTAINCE AND REPAIR
Maintaince and repair conducted was based on computer hardware where by is process of
changing, replace the computer hardware from damage to used once.

`Firstly, we started doing some troubleshooting on when pc is starting up, and see how long
does it takes for it to be ready. Then we check the installed Operating system and lastly
installed updates if there we no updates installed then we connect the PC to the internet and
start to do windows update.

Then after we became aware on different hardware problems simply by observing attributes
of computer performance as follow;

i. Printer troubleshooting; printer can fail to print due to this possible problem
jamming paper in which we remove cartridge and removing the jammed paper,
shortage of ink where we replace or refilling to the cartridge inkjet.

ii. The problem with Ram seem to be a very complicated problem for us but only we
did a trial and error method which simply like replacing Random Accessing
Memory(RAM ) with the other one.

iii. The problem with the hard drives; we detected this problem simply because the
system failed to boot and it gave out a certain beeping sound.

Figure 12: Computer maintenance at C 214 laboratory

16
CHAPTER THREE

3. GAPS IN SKILLS AND ANALYSIS

3.0 New Skills Learnt


i. Configuration of N-computing devices
This is the device which help to create visual desktop which enable multiple uses to
simultaneous share a single operating system instance. So in my field I learned on how to
connect and configure n-comping devices

Figure 13: shows the computer which has N-computing device connected

ii. Network printer configuration


I learned new skills to connect the computers in network to share one printer in the same area
so as everyone in the network can print his/her document in the same printer. For example,
the following are steps of connecting computer in the network printer in the window 10
 Turn on your printer and make sure it is connected to the network.
 Open the Control Panel.
 Click the Devices and Printers icon or View devices and printers link, depending on
the view type you are using in the Control Panel.
 In the Devices and Printers window, click the Add a printer link in the menu bar at the
top.
 Add printer in Windows 10
 Let Windows scan for the printer. If detected, select the printer and click Next. If the
printer is not listed, click the printer that I want isn't listed and skip to add the printer
by name or TCP/IP address.
iii. Connection of wireless printer to computer.

17
Also, I learn how to connect a printer in a computer by doing printer installation and
connecting one printer to more than one computer in case there is only one printer. Wireless
printers can be assigned a static IP address through Dynamic Host Configuration Protocol
(DHCP), an interface used to automatically allocate IP addresses to devices that connect to a
network. The static IP address remains with the wireless printer and cannot be assigned to
other devices, reducing device conflicts on the network.

Here are procedures:


o Confirm that the printer is powered on and connected to the local wireless
network.
o Click "Start then Control Panel then Hardware and Sound then Devices and
Printers."
o Click "Add a printer" and choose "Add a Network, Wireless or Bluetooth
Printer" from the options.
o Select the printer from the list of detected devices. If the printer doesn't
appear, click "The Printer That I Want Isn't Listed" and select "Add a Printer
Using a TCP/IP Address or Hostname." Enter the static IP address assigned to
the printer, then click "Next."
o Create a name for the printer or use the default name. Click "Next" and
"Finish" to install the wireless printer to the computer.
o Right-click the printer and select "Printer Properties" from the context menu.
Click the "Ports" tab, and then click "Add Port."
o Select "Standard TCP/IP Port" from the list of available port types. Click
"New Port" and "Next."

18
CHAPTER FOUR

4. LEARNING

4.0 Introduction
Following the challenges and problems that I and my colleagues faced during my field
practical training at MNMA as discussed in the previous chapter, this chapter gives some
recommendations and suggestions that can help in solving them so that after some re –
adjustment and improvement of the current situation, students can be able to learn
without any problem and enjoy the field practical training at MNMA.

Scarce of the resources to doing work


The scarcity of resources such as flash, compact disc, toolkit, case and USB, was also a big
challenge, during working time, field members were to settle for a while to wait for a person
to complete the task so that another can use the resource acquired, this leads to many tasks
not complete at a time like to install window and software in the computers it need resource
like USB drive.

Inadequate knowledge on some assigned tasks:

Some tasks which I was assigned it is the first time for me to do such kind of task so I haven’t
enough knowledge of doing such kind of task. Which makes me to ask for help to my local
supervisor to assist me well on such activity. Toner cartridge installation at the first time and
local cable installation.

A long distance from where I live and the place of work.

There also a challenge on distance from where I lived to place, I worked because the offices
they were sent away for the expansion of the city so that the city would not be rebuilt well.
So, this becomes the challenge to me because sometimes it led me to take motor vehicles
(boda-boda) in order to reach on time at work.

Also, I spend too much cost from where I live to place that I have worked because I used two
(2) Town HiAce (Dala-dala) to reach at work.

19
CHARPERT FIVE

CONCLUSION AND RECOMMANDATION

5.1 CONCLUSION
During my field practical training at MNMA, it was a great opportunity to learn a lot of new
staffs from the task which were assigned to me also from my colleagues. In my field practical
training major tasks like Network cabling was really interesting to me, since during our
classes we only did theories which was not enough to make us be experts in networking.

In networking cabling we did a lot of installation of networking to different buildings, under


the guidance from our supervisor Mr. Jumbe Kapaya and we made it through, sometimes
there were some problems appearing after making some errors during doing a task, hence
proposed solutions may be given out and it can be by technical approach or Non-Technical
approach then providing solution to a problem.

Not only that network cabling but also there’re minor task like computer troubleshooting as
well as other peripheral devices like printers, Mouse, and keyboard. This also was quite
interesting since that it was easy to troubleshoot them cause many times the issue was about
drivers were not installed require for installation or update in order for a particular hardware
like printer to function properly.

During attending to tasks which were assigned sometimes problems appears which
require solutions at a time, so it was our duty to diagnosis what is the problem and what
is the solution; proposed solutions were considered and in turn lead to problem solved
which in turn make theorganization behave positive accordingly to the suggested
solutions which tend to bring about solution concern the particular problem.

Last but not least, during the task assignment we really benefit for sure since that we learned
a lot of new staffs that we never learnt in class, as well as the organization simply enjoyed
our company and support to accomplish tasks like installation of network in different
buildings

20
5.2. Recommendation to the host 0rganization
 Assigned tasks should be within student’s level of coverage

 Supervisors should give clear explanations and guidelines about the task so
that students perform the confidently and in time.

 Among those 10 weeks of field practical training, at least the first 2 weeks
should be used for learning and making things clear about the tasks to be
done so as to accomplishment of assigned tasks could be easy.

 Assigned tasks should not rely on a single field of study since ICT covers a
wide range of fields such as networking, programming, database
management, web design, etc.

 All required tools and resources to complete a specific task should be


available in satisfactory amount so that to accomplish the assigned tasks
effectively, efficiently and in time.

 There should be conducive working environment.

 Supervisors should know the area of interest of different students so as to


enable students to work fully and tackle those tasks accordingly.

21
REFERENCES
Research on modularized curriculum for bachelor degree programme in records, archives and
information management (nta level 8)
Nyerere, J (1995) Our Leadership and the Destiny of Tanzania, Harare: African Printing
Group.

22

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy