Beruflich Dokumente
Kultur Dokumente
Student Name
ID No.
Student E-mail
Hand phone No.
Organization Name
Address
Supervisor Name
Telephone No.
Fax No.
:
:
:
:
:
:
ACKNOWLEDGEMENT
OBJECTIVES
ii.
Name
Report Date
: 10 January 2011
Course
Name of Institute
DATE
NO.
SUPERVISOR NAME
BEGIN
1.
iii.
10 Jan 2011
FINISH
29 Apr 2011
EXECUTIVE SUMMARY
Computer Repair Technician
The technician's include building or configuring new hardware, installing and updating
software packages, and creating and maintaining computer networks. Computer repair
technicians work in a variety of settings, encompassing both the public and private
sectors. Because of the relative newness of the profession, institutions offer certificate
and degree programs designed to prepare new technicians, but computer repairs are
frequently performed by experienced and certified technicians who have little formal
training in the field.
A repair technician might work in a corporate information technology department, a
central service center, or a retail computer sales environment. A public sector technician
might work in the military, national security or law enforcement communities, health or
public safety field, or an educational institution. Despite the vast variety of work
environments, all computer technicians perform similar physical and investigative
processes, including technical support. Experienced technicians might specialize in
fields such as data recovery, system administration, or information systems. Some
technicians are self-employed or own a firm that provides services in a regional area.
Some are subcontracted as freelancers or consultants. This type of technician ranges
from hobbyists and enthusiasts that volunteer or make a little side money, to those who
work professionally in the field.
The repair of problems can range from a minor setting that is incorrect, to spyware,
viruses, and as far as replacing hardware or an entire operating system. Some
technicians provide on-site services usually at an hourly rate. Others can provide
services off-site, where the client can drop off at the repair shop. Some have pickup and
drop off services for convenience.
iv.
Hardware Repair
While computer hardware configuration varies widely, a technician will work with five
general categories of hardware; desktop computers, laptops, servers, computer clusters
mobile computing. Technicians also work with and occasionally repair a range of
peripherals, including input devices (like keyboards, mice, and scanners), output
devices (like displays, printers, and speakers), and data storage devices such as internal
and external hard drives and disk arrays. Technicians involved in system administration
might also work with networking hardware, including routers, switches, fiber optics,
and wireless networks.
Software Repair
When possible, repair technicians protect the computer user's data and settings, so that
after repair, the user will not have lost any data and the technician can fully use the
device with little interruption, and then diagnose the problem. Addressing the issue, the
technician could take action as minor as adjusting one or several settings or preferences,
but could also apply more involved techniques like installing, uninstalling, or
reinstalling various software packages. A reliable, but somewhat more complicated,
procedure for addressing software issues is known as a restore, in which the computer's
original installation image (including operating system and original applications) is
reapplied to a formatted hard drive. It should be known though, that anything unique,
such as settings, or personal files will be destroyed if not backed up on external media,
as this reverts everything back to its original unused state.
v.
TABLE OF CONTENTS
NO.
TITLE
PAGES
Acknowledgement
Objectives
ii
iii
Executive Summary
iv
Table of Content
vi
1.0
Company Profile:
1.1 Introduction To Ibizz Shop
1.2 Objectives of the Company
1.3 Vision
1.4 Mission
1.5 Logo
1.6 Business Information
1.7 Business Activity
1.8 Administration and Operations Management
1
1
2
2
2
2
3
4
5
2.0
Technical Department:
2.1 Introduction
2.2 Technical Department Organizational Chart
2.3 Software Used by Technical Department
2.4 Partnership Dealer Supplier
6
6
7
9
10
3.0
15
20
25
38
41
50
3.3 PROJECT 3 : DESIGNING AND DEVELOPING COMPUTER NETWORKAt Cyber Caf Koperasi Koperasi Politeknik
Sultan Abdul Halim MuAdzam Shah
(POLIMAS) Jitra
3.3.1 Task 1
: Setup all Network Cable at Server
3.3.2 Task 2
: Software Installation (TrueCafe)
54
58
70
4.0
74
5.0
Conclusion
75
6.0
Glossary
76
7.0
Bibliography
77
8.0
Appendix
78
vi.
1.
1.2
Objective
To sale and supply world rank laptop and good services to customers.
To set up an office systems and network and computer accessories for office use for
all government and non-government agencies.
To provides services related to IT to customers as quick as we can and accurately.
To provide short courses on IT, systems and networking
to clients, students and government also non-government employees.
1.3 Vision
To be the biggest ICT chain in Malaysia "
1.4 Mission
Ibizz Shop will provide a strong commitment on achieving the objectives of the shop to
become a biggest ICT shop chain in Malaysia with availability on repairing or servicing
laptop and computer and also giving course in ICT.
1.5
Logo
2.
1.6
Business Information
Company Name
IBIZZ SHOP
Company Address
ALOR STAR BRANCH
UUM BRANCH
3.
Computer networking
4.
5.
2. Transfer data from other branch (Maintaining program Inventory from branch
Tangerang) .
3. As a Technical in Windows software, Outlook, Office excel & word (other
software : data text, picture jpg , pdf ect.) . Now Better we use OpenOffice in
linux platform.
4. Software Server : for Internet and anti virus, Avira Anti virus, for email server,
Veritas Backup schedule backup tape daily and full backup, Backup to CD
min or North Gosht once a Month .
5. Protecting computer from virus.
Server work area :
1. User control, password, sharing etc., Backup data : novel and windows, Down
load anti virus Email collecting, Maintaining Hard disk : clean and defrag,
Internet connection regularly.
Handling Trouble Shooting and installation for :
1.
Computer PC and laptop, Canon- HP- Epson & Brother Printer , Aplus
Accounting S/W, Lan & WiFi connection.
6.
Other work :
1. CBN report - Internet connection monitoring report.
2. Transferring data from branch.
3. Create program and modification : from each manager can ask their need in
program by make a coordination to accounting manager.
4. Create or modification program is ask by making a request form or by making a
project report.
5. Transfer data from branch : inventory and transaction data from branch.
PRACTICAL STUDENTS
Technical Support / staff
7.
8.
2.3
Ibizz Shop technician usually done maintenance for schools, office and government
agencies. Many of them used the same operating system like Window XP and the latest
one is Windows Seven. There is some customer that request for linux os and our
technician have the ability on installing linux os.This are the software and the operating
system that we used:
-
Window XP Professional
Linux Ubuntu
Linux Mint
Linux Slax
WinRAR
Avira Anti-Virus
Karpersky Anti-Virus
Adobe Reader
Mozilla Firefox
Google Chrome
Winamp
Photoscape
Picasa
Nero StartSmart
CyberLink YouCam
Most of the time, our technician used Driver pack Solution for search driver on their
own in disk without searching for a long time via internet. This software save time and
its easy to used.
9.
2.4
10.
11.
12.
13.
14.
Determining Resources
The resource can be devide in three area of feasibility, Hardware Feasibility, Finacial
Feasibility and Operational Feasibility.
Hardware Feasibility
- We have buying all the hardware at the computer shop.
- We ensure that all the hardware is working properly and did not have any technical
problem during developing process.
- The hardware we use for setup Pc sets such as, Monitor, keyboard, mouse, hard disk,
Ram, casing pc, processor, dvd-rom, motherboard , printer and speaker.
Finacial Feasibility
The basics resources that we consider to develop this system is;
15.
Operational Feasibility
- Must see carefully to what users really want.
- We must do work in carefully.
- We must makesure that product is more quality.
Bil
Antivirus
Players
Graphic tools
External
Search engine
security
1.
Eset nod32
Realplayer
Picasa
Virus remover
Firefox
2.
Avira premium
Kmplayer
Photoshop
Usb security
Google chrome
3.
Kaspersky
Vlc player
Photoshine
Ccleanner
Opera
4.
AVG Internet
Security
Winamp
Photo magic
Tuneup
Bing
16.
This invoice from our shop to polimas and this invoice description of (9)pc intel sets
then the amout of per Pc.
17.
This invoice description about the computer accessories and the amouts.
18.
This table show the installation of hardware and software in (10) pc sets
(10)Pc sets
Intel dual-core
Amd athlon II
9 pc
1 pc
PROBLEM STATEMENT
Project 1- Complete
19.
Install Window 7
(Clients)
(Administrator Pc)
9 pc (intel)
1 pc (Amd)
We are using a asus motherboard. Put antic-static wrist strap on to prevent the
components from getting affected. Make sure the hands are clean before starting. First
we will be installing the motherboard which is a piece of cake to install.
20.
We are using the intel dual core and Amd athlon II. CPU is the heart of the computer
so make sure to handle it properly and not dropped or was harmed. Also try not to touch
the pins are often so they do not get dirty. Get the user holds the motherboard and CPU.
Need to put the CPU on a white patch broken from the motherboard in a specific way
for it to fit properly. There are signs of gold in the CPU to help assist. Refer to both
your motherboard and CPU manual to see exactly where a suitable position or you can
also use tried all four positions.
After installing the processor we proceed to installing the heat sink. There are different
kinds of heat sinks that are bundled with the processor and each has a different way of
installation. Look into the CPU manual for instructions on how to install it properly.
- Place the heat sink on the processor
- Put the jacks in place
- Secure the heat sink with the lever
21.
We are using DDR3 RAM. Installing the 2 GB RAM is also an easy. The newer RAMs
is DDR3 RAMs are easy to install as you dont have to worry about placing which side
where into the slot. That asus motherboard has 3 slot .
Make sure the both the clips hold the RAM properly
We are using 450v.We will now install the power supply as the components we install
after this will require power cables to be connected to them. There is not much to be
done to install a PSU.
22.
Remove the back plate on the cabinet corresponding to the graphics card
We are using
eagate sata hard disk 500GB. Hard disk is another fragile component of
23.
We are using sony DVD-rom. The installation an optical drive is exactly similar to an
hard drive.
First need to finish setting up internal components and then get on to the external ones.
Next need to consult the motherboard manual for finding the appropriate port for
connecting various cables at the right places on the motherboard.
Connect the large ATX power connector to the power supply port on your
motherboard
Next get hold of the smaller square power connector which supplies power to the
processor and connect it to the appropriate port by taking help from your
motherboard manual
Connect the cabinet cables for power, reset button in the appropriate port of the
motherboard
After windows has loaded files this screen will show telling that windows is starting.
25.
This is the first screen of the setup where get to select the language of the windows
that want to install if there are more than one, the time and currency settings and the
keyboard and input method.
26.
After select these settings according to the state or language and can click next to
continue the setup.
27.
See a screen telling you Setup is starting after that need to select the type of windows
that want to install. For example windows 7 Ultimate x86 which means 32-bit. Click
Next. In the next screen just to accept the license agreement from windows corporation.
Just check the I agree box and click Next.
28.
This is the screen show which one select for to do windows the Windows Setup.To
upgrade from windows XP click on Upgrade and to install a new fresh copy click on
Custom (advanced).
29.
One more thing ,if you dont see anything in the screen, like if there is nothing on the
list, if it is blank, than you have a SATA (Serial ATA) hard drive you will need to
locate the drivers manually if Windows 7 Setup hasnt loaded them. Unlike Windows
XP that searches for the sata drivers from the Floppy disks Windows 7 let`s you browse
your drivers either from a CD or USB Disk.
After created it Format the drive by clicking on Format button. And click Next to
continue Windows 7 Setup.
30.
Now all have to do is wait. This is the worst part of the setup, also the worst part of
everything is waiting. The setup will copy the windows files, than it will expand
windows files, it will install features, install updates and finally will Complete
Installation. After this computer will restart and continue setup.
Computer will restart and vigure will see 2 things happening. First thing is that
windows 7 setup will prepare the computer for first use, and the second one Setup will
check video performance. We are getting towards the end, there are few more steps until
the end, so be patient.
31.
32.
After that enter the password for username and if you like enter a password hint that
when you read your password hint, it will recall the password, in case forget.
33.
Now need to decide if its want to install all windows updates or just important updates
or not install any and be asked after the setup finishes. I recommend the Use
recommended settings. The next step is to setup the time and date settings.
34.
Next step is to select the network are in now for e.g. are you home in work or just a
public network. So the next time the computer will now we are home work or
somewhere in public. This is for the Internet connection. Now wait so windows
connects until to the network and applies settings.
35.
Windows will finalize settings, will prepare the desktop and will show the login screen.
enter that password and hit enter to login. A welcome screen will show after which your
Windows 7 Desktop will be shown. And that was the last step to install windows 7.
36.
37.
The test installation used for this tutorial was in a virtual environment with about 75 GB
of disk space. Windows 7 was installed on this hard drive. The installer automatically
shrinks the space occupied by Windows 7 to make room for Mint. The size it allocates
to Mint depends on the size of the hard drive. It can resize it by positioning the cursor
between both sections as shown below and dragging to the left or right.
This shows the resized partitions. How much space it take for Windows will depend on
how much we want it to have. Click Install Now when you are done resizing the
partitions. Notes : The installer will install GRUB, the boot loader, in the Master boot
Record (MBR) of the hard disk.That means that GRUB will be responsible for dualbooting both operating systems.
38.
After installation and at every reboot or boot up of the computer, you will be presented
with the GRUB menu. Now, you can boot into Mint 10 or Windows 7.
Notice : Mint 10 uses GRUB 2.
39.
40.
oir
41.
METHODOLOGY
Planning of Blog
We first discuss the plan with the manager and the staff at ibizz shop about the blog that
we want to do in the discussion we get many plans such as;
Plan to our posts
We should try to have posts that are ready for publishing for a minimum of one week.
We never know what could happen in a week as viewer might get sick, go on a
vacation, or get busy with family, among other things. This is why planning posts in
advance is a crucial part if customer want our blog and e-business to flourish.
Plan to create products
We want to succeed in business and e-business, then We probably want to create the
own products. We would earn way more than marketing someone elses products if our
goal is to make money. It is crucial to know what products we are going to release this
year and how much time it takes you to complete each product.
We know the products that will be published this year including, We will notify the
customer how long does it take to complete each product.
Plan for our time to Create Blog
We manage your time properly, we will be working on plans to create and post realtime product, which can ensure the success of our blogs and e-business. Time
management is very important to the success of any business blog.
Plan for how to make market strategic
Have our strategic plan is crucial to success in this blog. Our blog is a clear marketing
plan. Think about it, we have a specific plan, for example in the blog we have info on
the computer, How want to download software, How to repair the computer want,
Public knowledge, Entertainments and We provide information for how to do business.
The more time we spend to market, the more traffic we will get.
42.
DETERMINING RESOURCES
The resource can be devide in three area of feasibility, Hardware Feasibility, Finacial
Feasibility and Operational Feasibility.
Hardware Feasibility
- We have all the hardware that use to develop this system.
- We ensure that all the hardware is working properly and did not have any technical
Finacial Feasibility
The basics resources that we consider to develop this system is;
Operational Feasibility
- Determining operational feasibility required creative imagination.
- We must see carefully to what users really want.
- We must know the customer needs.
43.
Header
Header is the first thing most visitors see when they come to our blog and also one of
the most important. It is important for branding and create a separate blog stand out
from the millions of other blogs. I have been highlighting my shop name and I put some
important information about my shop at header.
Content Area
The content area is where the public will spend most of their time when they are in the
blog. It is important to ensure that the area is easy to read and have a minimum of
disruption so I have put the right info about our shop for example, the service we
provide, products we sell, and details about our shop.
Primary Navigation
The primary navigation is the set of links That leads to different areas of our blog. I
have put so many links are always in use by the customer or the public for example I
put a link to download the software easily, I put a link brand computer, not just link the
theory, but I put a link to watch a video about computer and other links I put at primary
navigation.
45.
Secondary Navigation
The Good links i to put in our secondary navigation are popular posts, links to series
pages, and other items of interest that public want readers to have quick access to from
anywhere.
Headlines
The purpose of Headlines is to draw our readers in and make Them want to read the rest
of our blog's post. i put the font and color to make a creative and interesting headline for
a blog. I have put cute icons to draw the user's attention to the date and comments.
Comments
Comments are where the discussion of our posts take place and it is important to design
this area in a way that it promotes communication. we can do this by making it easy to
tell different comments apart, adding numbers so it is easy to refer to other comments,
make the authors comments different enough so that it sticks out and is easy to scan
when a user scrolls down the comments.
Posts Footer
The posts footer element refers to the area at the end of a post and before the comments
section. A posts footer often gets neglected so much it is ridiculous. It is a very
valuable area of real estate on our blog design as it gives you a chance to direct public
readers attention to other important articles on our blog after they have read a post.
Footer
Footers are interesting in that most people dont really use it and just stick a copyright
on the bottom with some basic links. But they are a great way to add more secondary
navigation to our blog without overflowing our sidebar. When people arrive at your
footer, they would have just finished reading our article and maybe some comments.
At this point it is good to provide secondary navigation that can lead them to other great
articles that we have on our blog.
46.
Advertisements
Advertisements on our blog has Become an important element to the business. I have
put some pictures to promote our store and the Computer we sell in the store.
47.
Microsoft Office 2007 help me in edit the project, supports conversion between ODF
and Office Open XML file formats for all three applications
According to ODF
Alliance this support falls short and substantial improvements are still needed for
interoperability in real-world situations. Third-party plugins able to read, edit and save
to the ISO-standard Open Document Format (ODF) are available as a separate
download.
CorelDraw X5
48.
FrontPage 2003
FrontPage 2003 consists of a new Split View option to allow the user to code in Code
View and preview in Design View without the hassle of switching from the Design and
Code View tabs for each review. FrontPage 2003 allowing users to create a single
template that could be used across multiple pages and even the whole blog. FrontPage
2003 includes support for programming in ASP.NET a server-side scripting language
that adds interactivity to Web sites and blog.
49.
This is a first upper page of our blog. link in our blog is www.ibizzshop.blogspot.com
left side i put the clock and right side i put search engine to find more information and
others.
50.
This is a second upper page. Left side i put the Ibizz Shop details and right side i put
followers, free games and others.
51.
This is a middle page. Left side i put the free chat with anyone and can share info, then i
put some videos about computer and the right side i put facebook share, forum ibizz
shop and others.
52.
This is a last lower page. Left side I put the post comment then I put facebook friends
chat and the
PROBLEM STATEMENT
Project 2- Complete
53.
This is the objective which analysis to develop the network by referring the problem
statement.
- To get used of professional ethics in the field of works.
- To solve the students problem and provide the best quality of cyber cafe
- To get exposures, experiences and professional skill to generate and building
individual skill who are skillful and accountable.
PROJECT SCOPE
User scope - Users is the employer and students that mainly targeting to use the cyber
cafe especially during examination period.
METHODOLOGY
Planning
At the first step of this project, the proper plan must be set up. The development of
network might bring the cyber cafe less crowded. The first plan is to upgrade the old
network with 10 new networks. Here I have create a new network line for this 10 new
networks because of the previous tray have too pack with cables. I have create new
network design for the cyber cafe.
54.
55.
ANALYSIS
Cable Cutter
Electric Drill
Ballpen Hammer
56.
Finacial Feasibility
The basics resources that we consider to develop this network project is :
NO
DESCRIPTION
PRICE PER
TOTAL
QUANTITY
UNIT (RM)
PRICE (RM)
100 m
RM 3.00
RM 300.00
100 units
RM 0.50
RM 50.00
1.
2.
RJ45 Connecter
3.
3 units
RM 4.50
RM 13.50
4.
1 units
RM 6.00
RM 6.00
5.
30 units
RM 0.10
RM 3.00
6.
30 units
RM 0.10
RM 3.00
Total (A):
RM 375.50
SERVICES
Cabling Service Charges
PRICE (RM)
RM 150.00
Total (B) :
RM 150.00
Total cost of network cabling at Cyber Cafe Koperasi Politeknik Sultan Abdul
Halim Mu'adzam Shah (Polimas) Jitra :
Total (A) + Total (B) = RM 375.50 + RM 150.00
Total Cost = RM 525.50
PROBLEM STATEMENT
Project 3- Complete
57.
Step 1 : Unroll the required length of network cable and add a little extra wire, just in
case. If a boot is to be fitted, do so before stripping away the sleeve and ensure the boot
faces the correct way.
Step 2: Remove the outer jacket of the cable. When stripping the jacket as to not nick or
cut the internal wiring. One good way to do this is to cut lengthwise with snips or a
knife along the side of the cable, away from yourself, about an inch toward the open
end. This reduces the risk of nicking the wires' insulation. Locate the string inside with
the wires, or if no string is found, use the wires themselves to unzip the sheath of the
cable by holding the sheath in one hand and pulling sideways with the string or wire.
Cut away the unzipped sheath and cut the twisted pairs about 1 1/4" (30 mm). It will
notice 8 wires twisted in 4 pairs. Each pair will have one wire of a certain color and
another wire that is white with a colored stripe matching its partner (this wire is called a
tracer).
58.
Step 3: Inspect the newly revealed wires for any cuts or scrapes that expose the copper
wire inside. If you have breached the protective sheath of any wire, it will need to cut
the entire segment of wires off and start over at step one. Exposed copper wire will lead
to cross-talk, poor performance or no connectivity at all. It is important that the jacket
for all network cables remains intact.
59.
Step 4: Arrange the wires based on the wiring specifications . Press all the wires flat
and parallel between your thumb and forefinger. Verify the colors have remained in the
correct order. Cut the top of the wires even with one another so that they are 1/2" (12.5
mm) long from the base of the jacket, as the jacket needs to go into the 8P8C connector
by about 1/8", meaning that it only have a 1/2" of room for the individual cables.
Leaving more than 1/2" untwisted can jeopardize connectivity and quality. Ensure that
the cut leaves the wires even and clean.
60.
Step 5: Keep the wires flat and in order as push them into the RJ-45 plug with the flat
surface of the plug on top. The white/orange wire should be on the left if you're looking
down at the jack. It can tell if all the wires made it into the jack and maintain their
positions by looking head-on at the plug. we should be able to see a wire located in each
hole, as seen at the bottom right. Maybe have to use a little effort to push the pairs
firmly into the plug. The cabling jacket should also enter the rear of the jack about 1/4"
(6 mm) to help secure the cable once the plug is crimped. It need to stretch the sleeve to
the proper length. Verify that the sequence is still correct before crimping.
61.
Step 6: Place the wired plug into the crimping tool. Give the handle a firm squeeze. We
should hear a ratcheting noise as you continue. Once it have completed the crimp, the
handle will reset to the open position. To ensure all pins are set, some prefer to
double-crimp by repeating this step.
62.
Step 7: Test the cable to ensure that it will function in the field. Mis-wired and
incomplete network cables could lead to headaches down the road. In addition, with
power-over-Ethernet (PoE) making its way into the market place, crossed wire pairs
could lead to physical damage of computers or phone system equipment, making it even
more crucial that the pairs are in the correct order. A simple cable tester can quickly
verify that information for you. Should you not have a network cable tester on hand,
simply test connectivity pin to pin.
63.
Step 8: Set the straightened wires on the 110 punchdown block at the back of the patch
panel. Place each wire in a slot on a punchdown block according to the pinout below,
counting from left to right:
Pin 1 White/Green wire
Pin 2 Green wire
Pin 3 White/Orange wire
Pin 4 Blue wire
Pin 5 White/Blue wire
Pin 6 Orange wire
Pin 7 White/Brown wire
Pin 8 Brown wire
The end of each wire should protrude past the 110 block when positioned in a slot. Press
each wire into its slot, using the punch down tool oriented so that the "Cut" label is
facing the wires being installed.
64.
Step 9: After we punchdown the block at the back of the patch panel. We continue to
measure the width and length to want install cable tray. before we place the tray, we
drill the wall for easy to screw the cable tray.
65.
Step 10: After we screw the cable tray and we put the cable cat 5e inside of cable tray
then close the head of cable tray.
66.
Step 11: Connect the incoming network cable to the switch. Although any slot can be
used on most network switches, it is a good idea to use the first slot so anyone can
quickly identify the incoming cable. the cat 5e cable we are already Connect to the
switch. The cable we connect to switch is gray colour cable
67.
Final step : Connect a Cat5 cable to another slot in the network switch. Connect the
other end to a computer or laptop that want connected to the network. Its ready to use
the internet. Just connect and surf internet.
68.
69.
2. Run TrueCafe
Start TrueCafe: Windows Start > TrueCafe > TrueCafe
Use the default login/password = adm/adm:
70.
3. Install Client
Run TrueCafe installation program on the terminal computers. Select the Client option
for install the client components:
71.
Server IP: type IP address or host name of the server computer (a computer where
TrueCafe Server software is installed).
Terminal type: select whether it's a desktop PC or a thin-client terminal (NComputing,
Windows Terminal Service client, etc.)
Press the Next button once have specified the Server IP address correctly, TrueCafe
adds the terminal icon on the server side.
If got Network error 10061, try disabling your firewalls on both server and terminal
sides, or add TrueCafeServer.exe (www.truecafe.com ) program to your firewall
exception list on the server side.
5. Login on Terminal
When start the terminal computer, TrueCafe Client automatically starts, locks the
terminal screen and displays the login window:
72.
If need to unlock the terminal screen (close down TrueCafe Client program), then leave
login empty, type password = closetruecafe and press Enter.
73.
74.
5.0 CONCLUSION
In conclusion, there ware many thing that I have experience and learned during the 16
weeks of my Industrial Training at Ibizz Shop. The whole training period was very
interesting, instructive and challenging. Through this training I was able to gain new
insights and more comprehensive understanding about the real industry working
condition and practice. The 16 weeks placement also has provided me the opportunities
to develop and improve my soft and functional skills. All of this valuable experience
and knowledge that I have gained were not only acquired through the direct
involvement in task given but also through other aspect of the training such as work
observation, interaction with colleagues, superior, and others third party related to the
company. As a result of the program now I am more confident to enter the employment
world and build my future career.
I also would like to conclude that I have learned a lot of knowledge which I cannot
obtain in the books or references. Even though it is only 16 weeks of training, the
experience in the industry during 16 weeks is valuable for me. I have learned to be
responsible for my position and be punctual on work. It can be said that Patience is
bitter, but its fruit is sweet.
75.
6.0 GLOSSARY
1. Window 7 All in One Full Version, Window Vista all in One Full Version, Window
XP Service Pack 2 & 3, Window XP Professional.
- All types of Window that have been installed.
2. Microsoft Office Enterprise 2003, 2007, 2010, Microsoft Visio 2003
- Software for file organizing
3. Karpersky, Avira, Avast, NOD32
- Antivirus installed
4. Window Media Classic, KM Player, Realplayer, VLC Player
- Software for audio and video player
5. Adobe Reader, Adobe Flash Player, Adobe Dreamveaver, Adobe Photoshop CS3
- Used for file organization for professional use
6. Mozilla Firefox, Google Chrome, Opera
- Internet browser
7. Driver Pack Solution
- Collection of driver
8.Cable Cutter, Network Cable Crimper, Network Cable Tester, Electric Drill, Hammer,
UTP CAT5e, RJ45 Connecter
- tools used for networking setting for wireless.
76.
7.0 BIBLIOGRAPHY
77.
10.0 APPENDIX
78.
79.
80.
81.