Monday, October 21, 2019

MDG Presentation Essays

MDG Presentation Essays MDG Presentation Essay MDG Presentation Essay Abstraction The Importance of Information Technology ( IT ) can non be over emphasized as it is really necessary in all plants of life ; Agriculture. Health. Education. Security. Entertainment etc. It provides new chances for bettering public presentation and strategic fight. However. few organisations have successfully grasped the chances enabled by IT. mostly due to their limited ability to measure the impact of IT on steadfast public presentation and ignorance. My Industrial Training Programme has exposed me to the IT industry with hands-on practical experience on Computer technology and package development. The practical side of calculating can be seen everyplace. Nowadays. practically everyone is a computing machine user. and many people are even computing machine coders. Geting computing machines to make what you want them to make requires intensive hands-on experience. But computing machine scientific discipline can be seen on a higher degree. as a scientific discipline of job resolution. Computer scientists must be adept at patterning and analysing jobs. They must besides be able to plan solutions and verify that they are right. Problem work outing requires preciseness. creativeness. and careful logical thinking. Computer scientific discipline besides has strong connexions to other subjects. Many jobs in scientific discipline. technology. wellness attention. concern. and other countries can be solved efficaciously with computing machines. but happening a solution requires both computing machine scientific discipline expertness and cognition of the peculiar application sphere. Theref ore. computing machine scientists frequently become adept in other topics. Company PROFILE ABOUT CONNECT TECHNOLOGIES LIMITED In 1986. the laminitis had a dream and the impulse to deploy Information Technology Solutions and take part actively in the Nigerian Economy. His mission so. was to work the untapped resources of the nation’s Information Technology ( IT ) Industry. With over 100 man-years connate professional exposure fused in. Connect Technologies Limited was in 2000 incorporated as a taking specializer IT Solutions Provider. Goal Our clients’ success is our growth MISSION STATEMENT Connect Technologies Limited is dedicated to achievement of its vision and mission by using the following value chain’ attack: Customer Focus – Customer First Doctrine: We will work diligently to understand our clients’ IT needs. and strive to run into or transcend their outlooks. utilizing the best pattern attack. Our Peoples – Connect Technologies’ Management Team is its greatest plus. The Team understands the Nigerian IT needs and challenges in the competitory planetary economic system. Commitment – To supply the highest degree of committedness to quality service and merchandises to our clients. CAPABILITY STATEMENT – EXPERIENCE Connect Technologies’ entry into the information engineering industry is backed with more than 100 man-years of blood relation and relevant professional experience of its prima practicians. Connect Technologies’ professional and managerial work force base. no uncertainty. represents one of the best in the industry today. Working in coaction with our proficient spouses in Nigeria. Asia–India. Europe and the USA. we possess the capableness to plan. supply. put in LAN-based/multi-tier Application Software. train. and keep complex information engineering systems. both domestic and abroad. Vision To be and stay a taking IT Solutions Provider with capablenesss to introduce and present functional hi-tech Software undertakings with maximal benefits to all clients. Our construct of client satisfaction is derived from the fact that we aspire to cut down our execution downtime to the barest lower limit while increasing our clients’ productiveness at least cost to them. PROFESSIONAL SERVICES Connect Technologies pattern and carry on the concern of Informatics and Information with peculiar mention to all related activities and trade in the Information and Communications Technology ( ICT ) industries and services – affecting Software Development and Hardware constellation solutions. The nucleus service is focused on concern of design. and development of Information Technology Knowledge Infrastructure undertakings with peculiar mention to the design of Application Software and Solutions and interfacing them with Local Information Infrastructure ( LII ) . National Information Infrastructure ( NII ) and Global Information Infrastructure ( GII ) . As professional IT trainers. Connect Technologies’ organizes and manages particular I. T Seminars. Workshops and Conferences for corporate organisations – particularly the banking industry for the intent of upgrading the cognition and operational expertness of Informatics Technology. The customized preparation embraces in-house preparation on Information Technology and Communications Technology – particularly Internet Development and Operation Training. CORE COMPETENCE Capabilities: Design. automate. Integrate. Support and Manage complex technology-driven Application Software systems – Our Solutions are 100 % autochthonal attempt. Human Resources Highly skilled Software Development A ; Implementation Team Solutions A ; Servicess LAN Groupware Applications and Solutions Internet Solutions A ; Web Portal Design Design and Installation of Local A ; Wide Area Networks Offshore Software Project Development Technical Training Facilities Management Undertaking Management Expertness Connect Technologies Limited has strong foundation in Infrastructural. Financial. Technical. Merchandise and Marketing Resources. Today. this expertness in Retail Banking Consultancy. Software Development. Networking and other services will profit major Bankss and concern organisations all over the state. CONNECT TECHNOLOGIES SOLUTIONS EPortal Solutions Enterprise eGovernment Operation Solutions Enterprise Educational Portal Solutions Enterprise Business Intelligent Solutions Enterprise Campus-wide Knowledge Solutions Enterprise Recruitment Solutions Enterprise Cooperative Financial ( CoopFinance ) Web-based Financial Application designed to automatize all Cooperative activities from Member Registration. Savings A ; Loan Application. Approval Process and Repayment Processes. Journal Posting. Account Management. Pool Fund Management. Payable A ; Receivables ( Members A ; Third Party ) . Enterprise Banker? ( CT2001 ) Banking package specially designed to automatize all banking activities. from banking demands of retail clients. everyday banking demands of investings and trade-finance activities to full activity study sum-up. Enterprise Stock Master? Stock Application targeted towards mid-ranged stock and Stock Brokerage. Financial and Investment Houses in its range. It is specially designed to automatize all stock activities. from stockholder enrollment of clients and stock demands of investings and trade-finance activities to full activity study sum-up. Enterprise Inventory/Payment System Enterprise Manufacturing and Inventory System is designed to optimise the efficiency of Trading/Sales Network. Gross saless Warehouses and Manufacturing capableness. It is a complete Manufacturing/Inventory System [ With Customer Support System. Financial Management System. Inventory Control System ] [ Including Gross saless. Purchase. Bills Receivable and Payable. Income and Expense care ] With assorted utile Reports. Money Transfer Management Systems MTMS. version CT2003 is a full Multi-Currency Solution targeted towards commercial Bankss. Merchant Bankss. Savingss and Loans. Financial. Passenger Traffic Systems and Investment Houses. It is specially designed to automatize all on-line money transportation activities. from directing and receiving of money to rapprochement of histories and full activity study sum-up. The Application is unafraid and dependable. Digital Image / Account Security System Digital Image / Account Security System is an application designed to supervise customer’s histories and supply equal Account Security through Digital Image Capturing and Confidential Data Protection. MAJOR PROJECT REFERENCES Signal-to-noise ratio Client Nature of Undertaking Status 1 NITDA Supply of e-Learning Application System to RITC Completed 2 NITDA ICT Consultancy on Development of Computer Network Security Standards Completed 3 NITDA Part of Consortium of ICT Consultants that developed Framework Architecture and Standards for e-Government Applications Completed 4 Shell-East Cooperative Investment Limited. Ph IT Financial Consultant. Deployment and Implementation of Enterprise Cooperative Financials Software Completed and is being supported 5 NITDA ICT Consultancy A ; Implementation of eGovernment Undertaking for Federal Government Completed 6 NITDA e-Government Workflow PS-NET Pilot Application deployed at FMST. Presidency. National Assembly. Finance Ministry. BOF ( Budgets Office ) . Civil Service Commission. EFCC. PARP and Ministry of Education Completed 7 Akwa-Ibom State Government ICT Consultancy on SIT Park Project Completed 8 Trithel International Consulting E-Business Solutions ( e-commerce portal ) Completed 9 Akwa Savings A ; Loan – Uyo. Unical Community Bank – Calabar. Olomi Community Bank – Ibadan. Karakata Investment Limited – Ogbomosho. Aniocha Community Bank etc Deployment of our Enterprise Banker Completed and is being supported 10 Riggs Securities. Lagos Deployment of our Enterprise Stock Master? Solutions Completed 11 Toyota Nigeria Limited E-Business Solutions Completed 12 Henrich Boll Foundation. Socio Economic Rights Initiative. NOTAP ( National Office for Technology Acquisition and Promotion ) . ITAN ( Information Technology Association of Nigeria ) 13 SIM Registration with Chams Plc Completed PROFILE OF KEY PERSONNEL CHRIS UWAJE ( FNCS. FIAP ) Born in Lagos. Nigeria. 4th August. 1951. Christopher Uwaje ( FNCS. FIAP ) is the Principal Consultant. Chief Software Architect and Chief Executive Officer: Connect Technologies Limited–CTL. He is the Originator/Pioneer of National Information Technology Policy for Nigeria. Guest Student on Information sciences. University of Hamburg. Graduate of Informatics. British Institute of Engineering Technology and Control Data Institute. Frankfurt. Germany. Post Graduate Qualifications. Over Three Decades of on-the-job IT Practice as Computer Scientist – Spread across three continents ( Europe/Africa and America ) . specialising in IT-Strategy Consulting – integrating SIT Park undertaking conceptualisation. design. execution. undertaking direction and Technical Support. Software Engineering Solutions ; Research. Design and Development ( RD A ; D ) . Particular Professional focal point: National A ; Regional IT Policy ; Coordinating Chairman. Council for West Africa Information Technology Professionals ( CWAITP ) . Immediate Past President of Information Technology Association of Nigeria ( ITAN ) and 1St Vice President of Institute of Software Practitioners Association of Nigeria ( ISPON ) . Member. National Inter-Ministerial Committee on Software development. PROFESSIONAL CREDENTIALS AND ASSOCIATIONS Alumnus of Informatics. British Institute of Engineering Technology and Control Data Institute. Frankfurt. Germany. Post Graduate Qualifications. IMMEDIATE-PAST PRESIDENT: INFORMATION TECHNOLOGY ASSOCIATION OF NIGERIA ( ITAN ) IMMEDIATE PAST PRESIDENT: INSTITUTE OF SOFTWARE PRACTITIONERS OF NIGERIA ( ISPON ) FELLOW NIGERA COMPUTER SOCIETY NCS ) Chap: Institute OF ANALYSTS AND PROGRAMMERS. U. K. Chap: Institute OF CERTIFIED PROFESSIONAL OF U. K. Member: COMPUTER PROFESSIONAL REGISTRATION COUNCIL OF NIGERIA. ( CPN ) MEMBER: Institute OF MANAGEMENT SPECIALIST. BRITAIN. Past President: ROTARY INTERNATIONAL DISTRICT 9110. NIGERIA. OLUYINKA TANIMOWO Born on March 14th 1971 in Abeokuta. Ogun State. Nigeria. Happily married with two lovely girls and one handsome male child. B. SC ( Hons ) . Computer Science ( First Class Honours ) from University of Benin. Benin-City. Edo State ( 1993 ) Award Best graduating pupil in Faculty of Science during 1992/1993 Academic Session Best pupil in Computer Science during 1992/93 Session Best pupil in Computer Science during 1991/92 Session Nigerian Breweries PLC. Prize Winner. 1991/92 Session Best pupil in Computer Science during 1990/91 Session Best Student in Mathematics. 1988 ( Secondary School ) EXPERIENCE – SUMMARY Over 10 old ages of active Software Development. Hardware/OS Platforms: Have worked on assorted platforms that range from DOS. Windows 3. ten. Windows 95/98. NT/Win 2000. Advanced Server 2002 and higher. Windows XP. Software/Internet Technologies: Experienced with the followers: VB. Internet. ASP. Internet. C # . Ocular C/C++ . MFC. ActiveX Controls. Visual Basic. HTML. ASP. DHTML. VB Script. JavaScript. XML. CGI. JAVA. Windows NT. Client/Server Software Development. TCP/IP. ODBC. MS SQL Server. COBOL. MS Visual SourceSafe. Others: Object-Oriented Analysis A ; Design ( OOA A ; D ) . UML. Rational Rose A ; Requirement Analysis. Chapter ONE Introduction Therefore. pupils most particularly in higher establishment of larning are expected to hold an Industrial Training experience in order to better their practical accomplishments in their different class of survey and besides be computing machine literate. 1. 1 Industrial Training Program. Industrial Training plan provides pre-professional work experience with specific assignments and duties. An Industrial Training should be relevant to a student’s personal calling involvements and academic classs of survey. functioning as a span between university and the universe of work. Productive Industrial Trainings aid pupils to do informed determinations and better their marketability after graduation. 1. 2 Aims of Industrial Training. To supply avenue for pupils in higher establishment of larning get industrial accomplishments and experience in their assorted class of survey. To fix pupils for work state of affairs they are likely to run into after graduation. To expose pupils to work methods and techniques in managing equipment and machinery that may non be available in the University. To do passage from University to the universe of work easier and therefore enhance competitions for subsequently occupation arrangements. To supply pupils with an chance to use their theoretical cognition in existent work state of affairs. thereby bridging the spread between University work and existent pattern. To enlist and beef up employers’ engagement in the full educational procedure of fixing University alumnuss for employment in the industry. 1. 4a Brief History of Connect Technology Ltd. 1. 4b Structure of the Company. 1. 4c Training Procedure of Connect Technology Ltd. At Connect Technology Ltd is a perfect mixture of theory and practical plants besides the execution of web-based instructions to enable pupils on Industrial Training acquire a clasp of whatever is taught. Connect Technology Ltd is a extremely organized house that non merely satisfies clients but besides ensures that pupils learn a batch that pertains to their class of survey. 1. 4d Features of Training Methodologies. Assignments: At the terminal of each talk. pupils are to make their assignments and submit. Scores possibly awarded to maintain cheque on advancement degree of pupils. Seminars: This is an synergistic forum where pupils including staffs come together to speak about plants they have executed. locating the challenges and besides make programs for farther plants or undertakings. Textbooks: Students are allowed to travel through the firm’s press release and read more pertaining to what has been taught. Internet: Students are besides given the chance to travel on-line to read up on different subjects. which may non needfully be what have been discussed at work but must be relevant so as to add more cognition to the pupil. Chapter 2 WORK DONE The first twenty-four hours of work at Connect Technologies Ltd was on the 3rd of August. 2012. I was given an orientation in the company by one of the staff by name Pius Ekeh Junior. he told me of the regulations and ordinance of the company. showed me around different offices in the company. the services they render to the society. and he besides gave a occupation description. and all that is expected of me during my Industrial Attachment. I was assigned to the hardware section. where we did occupations like arranging a system unit. ghosting of difficult thrusts. matching system. changing of damaged motherboard constituents and fixs of computing machine if the demand arises. among others. Every Friday. everybody including staffs and IT pupils are enjoined in a seminar where they are given appraisal on plants done during the hebdomad. discourse on challenges encountered during the week’s work and program in front for farther occupations and undertakings. Monthly. I assist my co-workers in disc killing. disc atomization. antivirus update. and besides give a well elaborate study to the staff in charge of IT ( Industrial Training ) pupils. During the first hebdomad. no much work was done since I was new in the company. but as clip went on. I was been thought on computing machine rudimentss. how to utilize Microsoft. WordPad. Command Prompt. Viruses. Malware. Spyware and how they affect the computing machine system. I besides learnt on the definition of discs. their different types which are Basic and Dynamic discs. their utilizations. and how to change over from one signifier or province to another i. e. change overing a disc in its Basic province to a Dynamic disc or from its Dynamic province to a Basic disc. DISK CLEAN This is a procedure where the computing machine gets rid of irrelevant plans from its memory. It is used to unclutter fresh files on the difficult disc and offers more options than merely emptying the recycle bin but besides observing impermanent cyberspace files. Files such as temporal office apparatuss and old restore points can be removed in one operation. this besides offers more flexibleness for file remotion. To make this Right Click the My Computer Icon Then Click on Properties Following Click Disk Cleanup Click the points to be removed Choice Yes to corroborate omission Then Click Ok to complete By these actions. the files are removed from the difficult disc and the infinites occupied are being freed. RECYCLE BIN When a file is deleted from the computing machine. it is non completed deleted from the computing machine alternatively it is saved in the Recycle Bin. where it can be restored should in instance it was deleted by error. Merely when a file is deleted from the Recycle Bin. is it for good deleted from the computing machine. The Recycle Bin should be emptied on a regular footing. SCAN DISK This is used to look into the unity of the file systems. besides to scan the physical difficult disc for bad sectors. These bad sectors can take to data loss or corruptness and this is one of the first marks of falling difficult discs. When bad sectors are detected. Scan Disk efforts to mend these sectors mark them as UNUSABLE’ . GHOSTING This means making a ringer of its contents so that they may be transferred to a different and larger sized difficult disc. It is non purely the same as copying. but instead a agency of accessing files and package without holding to travel through all the problem of reinstalling them. Ghosting is typically done on a computing machine so as to upgrade it to a larger difficult disc. It is besides really of import to observe that when making this both difficult discs should be compatible. in footings theoretical account and trade name. It is sometimes called Cloning. CONFIGURATION OF SYSTEMS System constellation is the procedure of puting up the hardware devices and delegating resources to them so that they work together without struggles. A decently configured system will let the user avoid resource struggle jobs. and makes it easier for the user to upgrade the system with new equipments in the hereafter. An improperly configured system will take to storage mistakes and jobs. and do upgrading really hard. Stairss in Puting up or Configuration a Computer. Power on the Computer On Set up window. choose state or part. clip. currency and keyboard layout Click Next’ Accept the licence footings required to utilize your computing machine Click Next’ Enter username and watchword. so take a default image for the usage history Enter computing machine name e. g. Helen-pc Click Next’ and chink on Ask me once more if any message comes up’ Here set clip and day of the month clip zone Finally snap on Start’ After constellation of the computing machine. the user can now let the window to look into the public presentation of the computing machine and fix the desktop. At this occasion the user can put in and download any necessary applications that are needed on the computing machine. UPGRADING WINDOWS XP to WINDOWS 7. It is the same stairss taken when configuring a computing machine ; the difference is that during the constellation. the following are done: Insert the OS cadmium for Windows 7 Restart the computing machine When prompted to boot to boot from Cadmium. it any key on the keyboard to continue Then all the instructions carefully and you will hold your Windows XP upgraded to Windows 7 After that install the drivers and applications that are necessary to assist the user work handily on the computing machine. Energizing WINDOWS. Triping Windows is necessary for Microsoft to cognize it is a echt version of the Operating System. It besides aids in upgrading any Operating System to any version. These are the stairss required: Click on the Start button Right Click on My Computer Select Properties Click on Activate Windows Follow all instructions including the EULA understanding You will necessitate to type the merchandise key of the computing machine and it is ever at the top of the system unit After that you will be required to wait for some proceedingss so that Windows can be activated. TROUBLESHOOTING OF A COMPUTER SYSTEM. Troubleshooting is a procedure of finding the cause of. and finally the solution to. a job. It is a signifier of job work outing. most frequently applied to mend of failed merchandises and procedures. It is a logical and systematic hunt for the beginning of a job. so that it can be solved. and so the merchandise or procedure can be made operational once more. It is besides needed to develop and keep complex systems. where the symptoms of a job can go forth many possible jobs. By using a logical. consistent method to the troubleshooting procedure. you make your work easier. and shorten the clip it takes to detect the root of the job. Acquire information about the job by oppugning the user and placing any alteration the user has made to the computing machine recently. In geting the information. you will happen out that sometimes the user has the job. Some complain of non being able to link to the cyberspace or non being able to utilize the pressman and applications. All that is needed is to look into the machine which of all time it is and seek to proffer a solution.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.