report trainig
TRANSCRIPT
-
8/8/2019 Report Trainig
1/15
AN INTERNSHIP REPORT ONTitle of your report
FOR
Bahwan CyberTek
Prepared for
Dr. Rafi AshrafiHead of Information Systems Department
Collage of Commerce and Economics
by
Naama Said Al-Saidi 80733/06 (INFS)
October 2, 2010
-
8/8/2019 Report Trainig
2/15
Introduction
There is a way to pass on practical working knowledgethat might not be explained
or properly understood in an academic program.Training allows students to apply
the theoretical knowledge which they have learned.This summer I made training in
Bahwan CyberTek for a period of 8 weeks (16/06/10-11/08/10) so, the purpose of
training are to :
1- -Expose students to a real world working environmentenabling them to gain
working experience.
2- Assist students in understanding what their responsibilities which are need in
work's environment.
In this report, I will describe in details about where did the training? As well as in
which organization I made the training and give some overview of the company
structure. In addition, I will discuss in details what are the tasks that I did in the
training like installation some software programs, learn networking, SQL program.
Also, I focus on what are the problems that I was faced in the training. Finally, I give
some recommendations to improve the training in the organization.
-
8/8/2019 Report Trainig
3/15
Company Profile
Bahwan CyberTek, BCT, has more than 1300 employees worldwide our operations
span United States, MENA and Asia. Our CUECENT line of products offer a complete
BPM suite and several BPM/SOA based products and solution frameworks targeting
BFS, Government, Oil and Gas, and High Tech business domains.
Customers
Throughout our evolution into a New Economy Services company, we have built an enviable track
record, e-transforming ideas and enterprises in the Middle East and across the world.
We believe in building partnerships through "effective, efficient, enjoyable, enthusiastic and ethical"
relationships that are personally, professionally and profitably rewarding.
Our clients are from various industry segments, including the Banking and Financial Industry,
Government and Enterprise.
-
8/8/2019 Report Trainig
4/15
Core center
The training covered the activities of the BCT in different divisions including: Net
works and Database. In addition, the trainee has covered our daily operations in the
BCT company such as management operation.
Network Division:
A network consists of two or more computers that are linked in order to share resources
(such as printers and CDs), exchange files, or allow electronic communications. Thecomputers on a network may be linked through cables, telephone lines, radio waves,
satellites, or infrared light beams. To built network they need to know Rooting switching,
security, wireless, storing storming design, technical and server agreement.
In this division I learned two types of networks areas. These are:
1) Local area network (LAN).
2) Wide area network (WAN).
A local area network (LAN) is a group of computers and devices that share a common
communications line or wireless link and typically share the resources of a single
processor or server within a small geographic area ( for example, within an office
building or a campus area). Usually, the server has application and data storage that
are shared in common by multiple computer users. A local area networks my serve
as two or three users (for example, in a home network) or many as thousands of
users (for example, the University LAN, the SQUNET).
-
8/8/2019 Report Trainig
5/15
Two types of local area networks. These are:
1) Ethernet. It is the most widely installed local area network technology.
2) Token Ring. It is a local area network in which all computers are connected in a
ring or star topology and a digital or token-passing scheme is used in order to
prevent the collision of data between two computers that want to send messages at
the same time.
On other hand, a wide area network (WAN) is a geographically dispersed
telecommunications network. The term distinguishes a broader telecommunication
structure from a local area network.
A wide area network may be privately owned or rented, but the term usually
connotes the inclusion public (shared user) networks. An intermediate from of
network in terms of geography is a metropolitan area network (MAN). The most
commonly known wide area network is the Internet.
Moreover, cable is the medium through which information usually moves from one
network device to another. The types of cables that are used in networks. These are:
1) Unshielded Twisted Pair (UTP) Cable. It is the most popular and is generally the
best option for installations where there are limited high intensity radio frequency
interference networks.
-
8/8/2019 Report Trainig
6/15
2) Shielded Twisted Pair (STP) cable. It includes extra shielding to guard against
interference, so is suitable for environments with electrical interference. Its
disadvantages are its higher cost, as well as its extra bulk. Shielded twisted pair is
often used in networks using Token Ring technology.
3) Coaxial Cable. Coaxial Cabling has a single copper conductor at its centre. A plastic
layer provides insulation between the centre conductor and a braided metal shield.
4) Fiber Optic Cable. It consists of a thin glass centre core surrounded by several
layers of protective materials.
Network switching
A network switch is a small hardware device that joins multiple computers together
within one local area network (LAN). In addition, Network switch is a marketing term
rather than a technical one. Switches may operate at one or more OSI layers, including
physical, data link, network, or transport.You can see hair picture for switching device:
-
8/8/2019 Report Trainig
7/15
Network router
Network router is a device of software in a computer that forwards and routes
data packets along networks. Also, network router connects at least two
networks, commonly two LANs or WANs or a LAN and its ISP network. However a
router is often included as part of a network switch.
Databases
A database management system (DBMS) is software that has been created to allow
the efficient use and management of databases, including ensuring that data is
consistent and correct and facilitating its updating.A database is a set of data that
-
8/8/2019 Report Trainig
8/15
has a regular structure and that is organized in such a way that a computer can easily
find the desired information.
Structured query language(SQL) is a common standard for describe and queries
database and is available with many commercial relational database products,
including DB2,Oracal, Microsoft Access and MySQL.
Bahwan CyberTekcompany use SQL relation to built database so, I installed SQL
PLUS in my laptop to learn and practice. I learned many things from this program for
example:
1-Create Table
The CREATE TABLE statement is used to create a table in a databaseis as follows:
CREATE TABLE table_name
(
column_name1 data_type,
column_name2 data_type,
column_name3 data_type,
....
)
2-Constraints
Constraints are used to limit the type of data that can go into a table.In addition,
Constraints can be specified when a table is created (with the CREATE TABLE
statement) or after the table is created (with the ALTER TABLE statement).
I was focusing on the following constraints:
NOT NULL
UNIQUE
PRIMARY KEY
FOREIGN KEY
CHECK
DEFAULT
NOT NULL Constraint
-
8/8/2019 Report Trainig
9/15
The NOT NULL constraint enforces a column to NOT accept NULL values. Also, the
NOT NULL constraint enforces a field to always contain a value. This means that you
cannot insert a new record, or update a record without adding a value to this field.
The following creates a NOT NULL constraint on the "P_Id" column when the
"Persons" table is created:
CREATE TABLE Persons
(
P_Id int NOT NULL,
LastName varchar(200) NOT NULL,
FirstName varchar(200),
E-mail varchar(200),
Country varchar(200)
)
UNIQUE Constraint
The UNIQUE constraint uniquely identifies each record in a database table.
Moreover the UNIQUE and PRIMARY KEY constraints both provide a guarantee for
uniqueness for a column or set of columns.A PRIMARY KEY constraint automatically
has a UNIQUE constraint defined on it.
The following creates a UNIQUE constraint on the "P_Id" column when the
"Persons" table is created:
CREATE TABLE Persons
(
P_Id int NOT NULL,
LastName varchar(200) NOT NULL,FirstName varchar(200),
E-mail varchar(200),
Country varchar(200),
UNIQUE (P_Id)
)
PRIMARY KEY Constraint
-
8/8/2019 Report Trainig
10/15
The PRIMARY KEY constraint uniquely identifies each record in a database table.
Primary keys must contain unique values.However, each table should have a
primary key, and each table can have only ONE primary key.
The following creates a PRIMARY KEY constraint on the "P_Id" column when the
"Persons" table is created:
CREATE TABLE Persons
(
P_Id int NOT NULL,
LastName varchar(200) NOT NULL,
FirstName varchar(200),
E-mail varchar(200),Country varchar(200),
PRIMARY KEY (P_Id)
)
CHECK Constraint
The CHECK constraint is used to limit the value range that can be placed in a column.
If you define a CHECK constraint on a single column it allows only certain values for
this column. Also, if you define a CHECK constraint on a table it can limit the values in
certain columns based on values in other columns in the row.
CREATE TABLE Persons
(
P_Id int NOT NULL,
LastName varchar(200) NOT NULL,
FirstName varchar(200),
E-mail varchar(200),
Country varchar(200),
CHECK (P_Id>0)
)
DEFAULT Constraint
The DEFAULT constraint is used to insert a default value into a column.
The default value will be added to all new records, if no other value is specified
-
8/8/2019 Report Trainig
11/15
CREATE TABLE Persons
(
P_Id int NOT NULL,LastName varchar(200) NOT NULL,
FirstName varchar(200),
E-mail varchar(200),
Country varchar(255) DEFAULT 'Sandnes'
)
3-The SELECT Statement
The SELECT statement is used to select data from a database.The result is stored in a
result table, called the result-set.
SELECT Syntax:
SELECT * FROM table_name
Data requirement
In terms of the number of employees in BCT company me and others trainee tried to
build a program that help Executive Secretary to know all details of the employees
passport.
So, we were creating a program in excel show in figure (1). The aim for this project
arranging the process of taking and returning back the employees passport.
Functions:
- The system should show the details of the employees passport.
- The system should warn the user if the employees do not return back their
passport in the specified date.
-
8/8/2019 Report Trainig
12/15
Construction
1- Collect data about the employees and their passport.
2- Specify three columns:
y Date of taking passport.
y Date of returning passport.
y Date of warning the employee to return passport.
3- If the sys date returning date = 7 days the system will highlight the returning
date.4- If the sys date = date of expiration then the system will highlight the date of
expiration.
Management operation
In the last week I worked with a group of five employees. Where we make an interview
to a Diploma and Bachelor graduated student in order to occupy an IT teacher job in
Digital Oman project. My particularly job was to collect the CVs and divided them
according to the majors and the type of certificateand degree. Moreover, I called them
and determined the day to come to make an interview. I learned how to deal with
candidates if they fail in the interview politely. Moreover, I learned the process of
recruitment and organizing the interviews.Likewise , I enjoy the group work as well as I
was committed with my individual job.
-
8/8/2019 Report Trainig
13/15
Limitations
Nothing in the world is perfect. So, There are several limitations in our training. For
instance:
1- Responsibility and Confidence. Some staffs are not trust the trainees so they did
not take them sensitive work.
2- Limited time. The time is not enough for information systems trainees because they
deal with technology .For example, when the computer stack does not work, they
need to wait for replay.
3- Boring Days. Sometime I feel boring because no tasks for doing.
-
8/8/2019 Report Trainig
14/15
Conclusion
The training is effectual way to convert theoretical lessons to the practical lessons.
Bahwan CyberTek are a good example for effectual training environment. The
training covered the activities of the company different divisions including: oracle,
Networks ,management task . Limited time, boring days and does not trust the trainee
are the most important problems which I faced during the training. So, there are some
suggestions for improving the training.
-
8/8/2019 Report Trainig
15/15
Recommendation
Related to my problems which are faced in our training there are some
recommendation.
y To improve training course, the organization should be prepare a clear
planning for trainees.
y Should the department of information system in bahwan Cybertek company
takes the trainee responsibility and trust them when they work and doing the
tasks.
y I recommend to Provide trainees with PC and password that help them to
search through internet and expires their work.
y Give trainees opportunity to work with project to increase practical said
rather than theoretical.
y Field education is more important to refine the knowledge.