REPORT ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES) TRAINING PROGRAMME (MARCH 2012-AUGUST 2012)
AT
CYBERSPACE NETWORK LTD.
BY
ONIMOE ANN CHINYERE 09CH010437
COMPUTER & INFORMATION SCIENCES COVENANT UNIVERSITY
BEING A REPORT SUBMITTED TO DEAN COLLEGE OF SCIENCE AND TECHNOLOGY IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR
MIS329.
DEAN CST: PROF. F.K HYMORE
SEPTEMBER 2012
DEDICATION
This report is dedicated to God Almighty, To him be all the glory, honour and adoration forever.
And also to the members of my family; my dad, mum, sister and
…show more content…
Below is the company’s organogram showing the various departments alongside their Heads.
CYBERSPACE STAFF ORGANORGRAM
TECHNICAL REPORT
CHAPTER 1 WORK DONE/PARTICIPATION
The period I worked in Cyberspace Network LTD. I worked in three(3) departments.
I worked in the Technical department, Customer Service Unit (CSU) and Software department. I was in both the Technical and Customer Service department at the same time but basically in CSU full-time and Technical part-time, then I moved to the Software department later on.
The Technical department is the department that deals with networking through both software and hardware. This is the department that deals with WIMAX and VSAT internet services. They have field engineers and dispatch drivers which are sent out to a client’s sites to install/ troubleshoot their network. The Customer Service Unit/department is the department in charge of monitoring the client’s internet link/network and also the unit that handles the clients’ information/data. This department notices if there is a problem with a link then escalates it to the engineers in the Technical department, then they visit the site and work on the internet link. The software department is the department in charge of providing software solutions which are strategically tailored to meet an organisation’s goals and requirements like Eduportal/school portal solutions.
From the perspective of the state, what purposes would be served by arresting and torturing Vladimir Tchernavin?
The early version of the worm functioned as a man-in-the-middle attack. It sat between the engineering software and the Siemens controllers for the input and output valves feeding into each centrifuge. The worm would accept commands from the engineering software and give false responses to indicate that these commands were being processed by the controllers. In reality, the worm was regularly allowing the centrifuges to be over-pressurized, which had the effect of causing the centrifuges to wear out and break more quickly. The later version of the software was much more crude. It would take over the centrifuges and refuse to acknowledge signals from the engineering software while an attack was active. The attack operated about once a month and worked by slowing down the centrifuges and then spinning them back up to past their normal full speed. This would cause damage as the centrifuges passed through what was known as a resonance speed, which would destabilize the rotor. Stuxnet managed to increase the rotor speeds at Iran’s Natanz nuclear facility from a normal speed of 63,000 rpm to 84,600 rpm. The worms were carefully designed so that it would not be obvious to someone in the facility that their mechanical systems were being sabotaged. For example, the worm would randomly affect different centrifuges at
Customer Service Department: will provide customer representatives that handle routine inquiries and complaints from or disputes with customers of Kudler.
The framework of security policy is defined to construct a structure by the help of which policy gaps can be identified in an easy manner. A system specific policy would assist to ensure that all employees and management comply with the policies. This is also used to maintain the confidentiality for user authentication would assist in the confidentiality aspect of security, maintain integrity (There are several limiting rules or constraints which are distinct in the relational data model and whose work is to maintain the data’s accuracy and maintain its integrity.), availability and authenticity of the system. Access controls are a collection of mechanisms that work together to create security architecture to protect the assets of an information system. One of the goals of access control is personal accountability, which is the mechanism that proves someone performed a computer activity at a specific point in time. So, the framework acts as the guideline
Customer service involves a consideration of what is needed to treat the customers in a desirable
The information used in this report was collected by consulting multiple articles on the internet which are listed in the reference section of this report.
A research proposal submitted in partial fulfillment of the requirements for the award of the degree of Bachelor of Science in……………in the School of ……., …….. University
“Life is a dream for the wise, a game for the fool, a comedy for the rich, a tragedy for the poor” said by Sholom Aleichem. The quote implies that one can have a good life if one has power or if one is judicious. Also, it is a game for the illiterate, a joke for one that is rich and powerful, and misfortune for needy. In the book, The Crucible by Arthur Miller has certain characters and beliefs that is a part of a huge calamity. It was labeled as the Salem Tragedy because in Salem, plebeians and uninvolved people were accused for witchcraft they never committed. Nineteen people were hanged and liable for the witchcraft. A character in The Crucible, Danforth, honest in his own perception is one of the attribution for the Salem tragedy.
A Research Project Submitted to the Faculty of National University in Partial Fulfillment of the Requirements for the Degree of:
Another advantage of this report is its use of quantitative research. The selection of charts, tables and graphs are highly creditable in terms of measuring validity and reliability. It provides data with precise and non-bias numerical findings.
Should you have any inquires in regard to this report, please do not hesitate to contact me.
Aging brings many behavioral, physiological and psychological changes in human. As many older adults surpass young adults they experience deterioration in cognitive abilities such as memory loss, inability to perceive, reason, and understand as they age. In human brain, capacity is involved in person’s ability to understand and interpret the information presented to them. According to the text book Adult Development and Aging: Biopsychosocial perspective Canadian edition (2015), capacity is referred to as a context-dependent and fluid because, a person may lack capacity for making complicated decision, but they still may have a capacity to outperform simple decisions and their cognitive abilities may diminish as they age (Whitbourne, Whitbourne, & Konnert, 2015, p. 62). In the construct of capacity for any research project, a researcher must receive an informed consent in order to
I certify that I am the author of this work and that any assistance I have received in its preparation is fully acknowledged and disclosed. I have also cited any sources from which I used data, ideas or words, directly quoted or paraphrased. This work was prepared by me specifically for this course.
In the Article outline the major sections are shown and in this research paper the sections are Introduction, Materials and Methods, Results, Discussion. All research
Foremost, I would like to express my sincere gratitude to my advisor Ms. Upekha Manamendra for the continuous support of create this report, for her patience, motivation, enthusiasm and immense knowledge. I could not have imagined having a better advisor and mentor for create my report.