Field Report 2022.
Field Report 2022.
MU Supervisor:
TABLE OF CONTENT
Contents
ACKNOWLEDGEMENT....................................................................................................iv
ABSTRACT...........................................................................................................................v
LIST OF FIGURES.............................................................................................................vii
CHAPTER ONE....................................................................................................................1
1. INTRODUCTION.............................................................................................................1
1.1.1 Introduction..................................................................................................................1
1.1.2 Vision.............................................................................................................................1
1.1.3 Mission..........................................................................................................................2
Summary................................................................................................................................5
CHAPTER TWO...................................................................................................................6
i
2.1 WINDOWS INSTALLATION.......................................................................................6
CHAPTER THREE............................................................................................................17
ii
Figure 13: shows the computer which has N-computing device connected...........................17
CHAPTER FOUR...............................................................................................................19
4. LEARNING.....................................................................................................................19
4.0 Introduction...................................................................................................................19
CHARPERT FIVE..............................................................................................................20
5.1 CONCLUSION..............................................................................................................20
REFERENCES....................................................................................................................22
iii
ACKNOWLEDGEMENT
I would like to thanks GOD who gave me enough strength and good physical and mental
Health during my all-time days of field. Also, much thanks to my MU supervisor MR
LUNO and all of the staff member for their support in my field. I would like to
acknowledge my lovely family and my fellow students who we worked together and
helped each other by exchanging ideas, views and skills to assigned tasks during the
entire practical period at the field station at MWALIMU NYERERE MEMORIAL
ACADEMY.
I greatly appreciate Mr. Jumbe Kapaya (IT technician), Mr. Daniel Samwel (IT
technician) and Dr. Mlelwa (IT manager) who has been my mentor on writing this field
report, their guidance and assistance helped me to prepare this work successfully. And
they helped me to complete some tasks that i was assigned to perform in the industry by
giving me enough support to complete those tasks.
Also, thanks to my other workers that I walked together in Mwalimu Nyerere Memorial
Academy from different department, like Electronic department, Human resource
department and so many other they give me too much support and I live with them like
brothers and sisters in a few days and the support that I get from them in my carrier.
I’m LUCAS E. KAEGELE I declare that the contents of this technical report are the
original copy and also original designs of what I went through in my all woks of my field
practical training under the supervision of Mr. Jumbe and Mr. Daniel who is the IT
technician at MWALIMU NYERERE MEMORIAL ACADEMY at KIGAMBONI, Dar
es salaam. also, any of what explained within this report is true information especially in
al task that I was done
iv
ABSTRACT
This field report is divided into five main chapters which are; introduction, task performed
and lessons learnt, interpretation and analysis, gaps in skills and technologies, conclusion and
recommendations. The following is a brief summary of each chapter:
Chapter one: This chapter explains the organization in general including the name, physical
location, historical background, vision, mission and the main functions of the organization. It
also provides an overall picture of all the activities performed by the IT department towards
accomplishment of the core functions of the organization.
Chapter two: This chapter explains the tasks that I was assigned by a supervisor during the
field practical training and the problems from which every particular task arose. It will also
provide a clear description of proposed solutions on solving the problem, technical and non-
technical approaches used to implement proposed solution and the results after
implementation of the proposed solution.
Chapter three: This chapter explains the improved skills and new skills that I and my
colleagues learnt during my field practical training at Mwalimu Nyerere Memorial Academy.
In this chapter there is some description about new skills and improved skills which were
provided during my field practical training at Mwalimu Nyerere Memorial Academy.
Chapter four: In this chapter there is explanation on skills are lacking and need to be
improved and Gap in Technologies about what technology is lacking and need to be
incorporated.
Chapter five: This chapter concludes about my field practice which were performed during
my field studies and it summarizes about all happened when I was in my field practice at
Mwalimu Nyerere Memorial Academy. Also provide some recommendation about what
should be improved in Computing Science training programs and what feedback may help
Mzumbe University to improve further.
v
This report aims to provide the description of attained objective and knowledge obtained from
practical training at Mwalimu Nyerere Memorial Academy at Dar es salaam
vi
LIST OF FIGURES
Figure 1: Organization chart
Figure 13: shows the computer which has N-computing device connected
vii
CHAPTER ONE
1. INTRODUCTION
1.1.1 Introduction
This chapter explains the organization in general including the name, physical
location, historical background, vision, mission and the main functions of the
organization.
1.1.2 Vision
The Mwalimu Nyerere Memorial Academy (MNMA) is recognized as a leading
institution in Africa for demand driven knowledge generation, application,
preservation and dissemination for social, political and economic problems facing
underdeveloped countries as Tanganyika by then in 1971. Later on, became and
transformed into a public higher learning institution in 2005 in United Republic of
Tanzania.
1
1.1.3 Mission
MNMA’s mission is to dedicate itself to the advancement of lifelong learning through
excellence in teaching, research, consultancy and public service and within (with) a
challenging and supportive learning environment in which pursuit of knowledge;
creative enquiry, critical thinking and applied skills is cultivated and sustained.
2
To cooperate with the government of the United Republic of Tanzania in
the planned and orderly development of quality education, science and
technology in the United Republic of Tanzania;
3
1.1.7 Directorate of Information and Communication Technology (DICT).
The DICT handles all matters related to information and communication
technology activities at the University. Its major objective is to ensure that the
University has the right technology at the appropriate time and with a right
quantity and quality. It also ensures that the ICT services are readily available to
users in the University and downtime is minimal.
The mission of DICT is to provide technical support related to ICT services to all
stakeholders of The Mwalimu Nyerere Memory Academy and its partners.
The vision of the Directorate is to facilitate the University with wide access to and
utilization of Information and Communication Technology and to enhance the
position of The Mwalimu Nyerere Memory Academy as centres of academic
excellence, and its contribution to the sustainable development of the society by using
ICTs
Functions of DICT
4
To develop and customize computer software.
To set ICT utilization policy and user guidelines and oversee its
implementation.
To ensure that the MNMA Local Area Network (LAN) works properly all
the time.
To develop and maintain MNMA website.
To design and facilitate specialized computer applications courses; and
Any other function as may be directed by the University Management
through the Deputy Vice Chancellor.
Summary
The Mwalimu Nyerere Memory Academy is a Governmental institution which issues
excellence educational achievements for undergraduate and postgraduate students in
Tanzania. It was established in 1961 as a private company under Companies Ordinance (Cap
212) before transformed into fully public university in 2005.
The University consists of different organs that performs various activities in order to
accomplish the core functions of the organization.
The Mission of the University is to provide opportunities for acquisition, development,
preservation and dissemination of knowledge and skills through training, research,
technical and/or professional services.
The DICT handles all matters related to information and communication technology
activities at the University. Its major objective is to ensure that the University has the
right technology at the appropriate time and with a right quantity and quality. It also
ensures that the ICT services are readily available to users in the University and
downtime is insignificant.
5
CHAPTER TWO
During my field practical training at The Mwalimu Nyerere different tasks were
assigned but the main task was Network installation and maintenance. Other
minor tasks were as follows;
maintenance and repair,
installation of windows and other application program,
network troubleshooting,
driver installation also
router and switch configuration.
6
ii. Create USB installation media/ bootable device, there are application software that
can boot device like RUFUS, power ISO, winUSB and UNetbootin. But in
chemicotex industry they use much RUFUS and the following are stapes to boot
device by using RUFUS application
7
Figure 2: shows RUFUS software for booting flash device
iii. Use your installation media. Insert your installation media into your device and
then access the computer’s BIOS or UEFI. These are the systems that allow you to
control your computer’s core hardware. The process of accessing these systems is
unique to each device, but the manufacturer’s website should be able to give you a
helping hand here. Generally, you'll need to press the F2, F12 or Delete keys as
your computer boots up.
iv. Change your computer's boot order. Once you have access to your computer’s
BIOS/UEFI you’ll need to locate the settings for boot order. You need the Windows
10 installation tool to be higher up on the list than the device’s current boot drive:
this is the SSD or HDD that your existing OS is stored on. You should move the
drive with the installer files to the very top of the boot order menu. Now, when
you restart your device the Windows 10 installer should load up first.
v. Restart your device. Save your settings in the BIOS/UEFI and reboot your device.
vi. Complete the installation. Your device should now load up the Windows 10
installation tool on restart. This will guide you through the rest of the installation
process
8
2.2 NETWORK CABLING AND INSTALLATION
Network cabling was the main task that I was assigned always during my practical
training at The Mwalimu Nyerere Memory Academy. The networking system used
at Mwalimu Nyerere Memory Academy is local area network (LAN) and the major
uses of the network is for sharing different resources such as hardware, software,
data and different information from each office which have a computer system.
What was required to be done here is to install the local area network within
different buildings like staff offices in Uhuru building, as well as Library of
University at Mwalimu Nyerere Memory Academy.
Here under are the different types of cables used in computer networking
9
Twisted pair cabling comes in two varieties i.e. shielded and unshielded
twisted pairs. Unshielded twisted pair (UTP) is the most popular and is
generally the best option for school networks.
10
2.2.3 Installing the printer driver
I improve my skills on installing the printer driver because during my course I learn
theoretical but, in my field, we trained practical on how to install that software/ drives in
printer. So this help to improve my skills because now I know both theoretical and practical
to install drives
11
2.2.4 registered jack – 45 (utp connector)
The standard connector for unshielded twisted pair cabling is an RJ-45 connector. It is
a plastic connector that looks like a large telephone-style connector (See fig. 2). A slot
allows the RJ-45 to be inserted only one way. RJ stands for Registered Jack, implying
that the connector follows a standard borrowed from the telephone industry. This
standard designates which wire goes with each pin inside the connector.
A network switch is also a multiport network bridge that uses hardware addresses to process
and forward data at the data link layer (layer 2) of the OSI model.
Configuration process:
During the configuration of the switch ports, each port was configured individually. This was
done using the PUTTY Terminal with network commands specifically for delivering the
configuration of ports.
After the configuration process then each port was tested to see if there is incoming network
or there is flow of data through the communication network devices. There after we finalize
the installation of network after seeing that all the ports within the switches are working fine.
12
On the issue of router configuration, we configured two routers namely TP- link router and
NETGER router the following were the steps done on the configuration prosses this stapes
conducted for both routers
13
Network troubleshooting by PING commands
To troubleshoot a network by using PING command you have to follow the following steps.
Step 1
Open the command prompt found on your Computer, bellow is the screenshot of the
command prompt after you open it.
14
How to troubleshooting using traceroute command
TRACEROUTE is a command which can show you the path a packet of information taken
from your computer to one you specify. It will list all the routers it passes through until it
reaches its destination, or fails to and is discarded. In addition to this, it will tell you how long
each 'hop' from router to router takes.
In Windows, select Start > Programs > Accessories > Command Prompt. This will give you
a window like the one below.
Example
Type the following command on command prompt on windows, trace route
www.mzumbe.ac.tz. After clicking the enter button the following output will be given out.
15
2.5 MAINTAINCE AND REPAIR
Maintaince and repair conducted was based on computer hardware where by is process of
changing, replace the computer hardware from damage to used once.
`Firstly, we started doing some troubleshooting on when pc is starting up, and see how long
does it takes for it to be ready. Then we check the installed Operating system and lastly
installed updates if there we no updates installed then we connect the PC to the internet and
start to do windows update.
Then after we became aware on different hardware problems simply by observing attributes
of computer performance as follow;
i. Printer troubleshooting; printer can fail to print due to this possible problem
jamming paper in which we remove cartridge and removing the jammed paper,
shortage of ink where we replace or refilling to the cartridge inkjet.
ii. The problem with Ram seem to be a very complicated problem for us but only we
did a trial and error method which simply like replacing Random Accessing
Memory(RAM ) with the other one.
iii. The problem with the hard drives; we detected this problem simply because the
system failed to boot and it gave out a certain beeping sound.
16
CHAPTER THREE
Figure 13: shows the computer which has N-computing device connected
17
Also, I learn how to connect a printer in a computer by doing printer installation and
connecting one printer to more than one computer in case there is only one printer. Wireless
printers can be assigned a static IP address through Dynamic Host Configuration Protocol
(DHCP), an interface used to automatically allocate IP addresses to devices that connect to a
network. The static IP address remains with the wireless printer and cannot be assigned to
other devices, reducing device conflicts on the network.
18
CHAPTER FOUR
4. LEARNING
4.0 Introduction
Following the challenges and problems that I and my colleagues faced during my field
practical training at MNMA as discussed in the previous chapter, this chapter gives some
recommendations and suggestions that can help in solving them so that after some re –
adjustment and improvement of the current situation, students can be able to learn
without any problem and enjoy the field practical training at MNMA.
Some tasks which I was assigned it is the first time for me to do such kind of task so I haven’t
enough knowledge of doing such kind of task. Which makes me to ask for help to my local
supervisor to assist me well on such activity. Toner cartridge installation at the first time and
local cable installation.
There also a challenge on distance from where I lived to place, I worked because the offices
they were sent away for the expansion of the city so that the city would not be rebuilt well.
So, this becomes the challenge to me because sometimes it led me to take motor vehicles
(boda-boda) in order to reach on time at work.
Also, I spend too much cost from where I live to place that I have worked because I used two
(2) Town HiAce (Dala-dala) to reach at work.
19
CHARPERT FIVE
5.1 CONCLUSION
During my field practical training at MNMA, it was a great opportunity to learn a lot of new
staffs from the task which were assigned to me also from my colleagues. In my field practical
training major tasks like Network cabling was really interesting to me, since during our
classes we only did theories which was not enough to make us be experts in networking.
Not only that network cabling but also there’re minor task like computer troubleshooting as
well as other peripheral devices like printers, Mouse, and keyboard. This also was quite
interesting since that it was easy to troubleshoot them cause many times the issue was about
drivers were not installed require for installation or update in order for a particular hardware
like printer to function properly.
During attending to tasks which were assigned sometimes problems appears which
require solutions at a time, so it was our duty to diagnosis what is the problem and what
is the solution; proposed solutions were considered and in turn lead to problem solved
which in turn make theorganization behave positive accordingly to the suggested
solutions which tend to bring about solution concern the particular problem.
Last but not least, during the task assignment we really benefit for sure since that we learned
a lot of new staffs that we never learnt in class, as well as the organization simply enjoyed
our company and support to accomplish tasks like installation of network in different
buildings
20
5.2. Recommendation to the host 0rganization
Assigned tasks should be within student’s level of coverage
Supervisors should give clear explanations and guidelines about the task so
that students perform the confidently and in time.
Among those 10 weeks of field practical training, at least the first 2 weeks
should be used for learning and making things clear about the tasks to be
done so as to accomplishment of assigned tasks could be easy.
Assigned tasks should not rely on a single field of study since ICT covers a
wide range of fields such as networking, programming, database
management, web design, etc.
21
REFERENCES
Research on modularized curriculum for bachelor degree programme in records, archives and
information management (nta level 8)
Nyerere, J (1995) Our Leadership and the Destiny of Tanzania, Harare: African Printing
Group.
22