Sie sind auf Seite 1von 46

HBSCT Report University of Zimbabwe

UNIVERSITY OF ZIMBABWE

FACULTY OF COMMMERCE HONORS DEGREE IN BUSINESS


STUDIES AND COMPUTER SCIENCE

NAME : AMOS VHANDA

REG NUMBER : R158678T

PROGRAM : HBSCT

MODULE : WORK RELATED LEARNING REPORT BS 380

COMPANY NAME : YADAH CONNECT

The report is submitted by Amos Vhanda in Partial Fulfillment of Honors Degree In


Business Studies and Computer Science

Amos Vhanda R158678T HBSCT


HBSCT Report University of Zimbabwe

FACULTY OF COMMMERCE HONORS DEGREE IN BUSINESS STUDIES AND


COMPUTER SCIENCE REPORT
TABLE OF CONTENTS

Chapter 1....................................................................................................................................1
Introduction.........................................................................................................................1
1.1 Background of the organisation.............................................................................1
1.2 Channels.................................................................................................................1
1.3 Competencies.........................................................................................................2
1.4 Structure of the organisation..................................................................................2
Department functions..........................................................................................................3
Human Resource Department......................................................................................3
Administration Department..........................................................................................4
Accounts and Finance Department...............................................................................4
Information and Technology Department....................................................................4
Vsion............................................................................................................................4
Mission.........................................................................................................................5
1.5: Coperate culture...........................................................................................................5
Chapter 2....................................................................................................................................6
Introduction................................................................................................................................6
Duties I carried out during attachment.............................................................................6
PC and Desktop Support Services...............................................................................6
Software Installation and Support...............................................................................9
Server Configuration and Maintenance.....................................................................10
Network Installation, Configuration, Monitoring and Maintenance.........................11
Research and Development in Networking   ...................................................................14
Problem Statement:....................................................................................................14
Solution:.....................................................................................................................14
Problem Statement: Troubleshoot and Fix Pathetically Slow Network?...................15
Solution :....................................................................................................................15
Conclusion..................................................................................................................16
Web Development (Web Contact Database).............................................................17
Problems Discovered:.................................................................................................17
Solution:.....................................................................................................................17
Work carried out during the Yadah Connect project:......................................................18
Installation of SAP to new computers........................................................................18
Installation of operating system and Microsoft office packages................................18
Repairing of computer hardware................................................................................18
Backup........................................................................................................................19
Basis consultancy.......................................................................................................19
Major Activities.................................................................................................................19
Software Installation...................................................................................................19
Adding or installing a printer and scanner to a computer that is networked..............19
Networking.................................................................................................................20
Technologies I have learnt at Yadah Connect...................................................................20
Description of other duties performed........................................................................20
Relevance of the assignment to the degree of HBSCT.............................................22
Chapter 3..................................................................................................................................23
Analysis and Evaluation of the organisation.....................................................................23

Amos Vhanda R158678T HBSCT


HBSCT Report University of Zimbabwe

Introduction.......................................................................................................................23
Nature of industry and industry requirements............................................................23
Salient features of the organisation............................................................................23
Relevance of Theory to Practice.......................................................................................24
Internet Programming, Database Concepts, Software Engineering, Programming...24
ICT Services...............................................................................................................25
Finance, Administration and Human Resources........................................................25
Audit...........................................................................................................................25
Developments in the domain of operation.................................................................26
Products and services markets....................................................................................26
Type of technology used............................................................................................26
Chapter4...................................................................................................................................27
Assuming a role which carries a little of responsibility and accountability;..............27
Working with highly skilled and experienced experts...............................................27
Industry reality...........................................................................................................28
Principles of management-.........................................................................................29
Networking concepts-.................................................................................................29
Computer Hardware and Architecture concepts-.......................................................29
Databases and SQL concepts ....................................................................................29
Operating Systems concepts.......................................................................................30
Principles of communication......................................................................................30
Systems Analysis concepts.........................................................................................30
Software Engineering concepts..................................................................................30
Computer and Network Security................................................................................31
Project Management...................................................................................................31
Chapter 5..................................................................................................................................32
Introduction.......................................................................................................................32
Key skills development..............................................................................................32
Planning skills............................................................................................................32
Organizing skills.........................................................................................................32
Interpersonal skills.....................................................................................................32
Personal development................................................................................................33
Proffessional development.........................................................................................35
Chapter 6..................................................................................................................................37
Introduction.......................................................................................................................37
To University Of Zimbabwe (UZ).............................................................................37
Reality in the Industry................................................................................................38
Challenges faced.........................................................................................................38
Recommendations to the Department of Computer Science......................................38
ABBREVIATIONS & GLOSSARY.......................................................................................40
BIBLIOGRAPHY....................................................................................................................41

Amos Vhanda R158678T HBSCT


HBSCT Report University of Zimbabwe

ABSTRACT

The author joined the Yadah Connect as a trainee for on the job training or work related
learning. In this report the author highlights the challenges that he encountered, the tasks he
was appointed to solve and the actions taken or the solutions reached to solve problems. The
author was able to explore the details of the information technology structure, to deliver and
to learn about technologies in various fields, like system development and support,
procurement of Yadah Connect, user support and training, and hardware and network
maintenance and support. The period of work related learning that the author has been with
Yadah Connect benefited him in terms of knowledge, experience and was able the integrate
theory learnt at college and practice or exposure on the job. It also helps the university to
assess and evaluate the relevance of its program to the society’s needs.

Amos Vhanda R158678T HBSCT


HBSCT Report University of Zimbabwe

ACKNOWLEDGEMENTS
The author is indebted to all the Yadah Connect , IT department and the Security
departmental staff who contributed to the knowledge that was acquired. Authors heartfelt
gratitude is directed to the following people for playing a crucial role during his year of
attachment:
Supervisor Mr Chimhau
Operation Manager (Yadah IT Operation).

A special mention also goes to immediate supervisors in the respective departments at Mr


Mango (IT Software Development), Mr Munzanga (TV Broadcasting Operation), Mr
Manzini (The computer software supervisor), . A warm thank you comes from the author to
all team members that played different roles, thank you for your valuable support and
guidance which is worth remembering

Amos Vhanda R158678T HBSCT


1

HBSCT Report University of Zimbabwe

Chapter 1
Introduction

This chaper is going to explain the sructure of Yadah Connect how the organisation interact
with each other to effectively manage its operations.It will hightlight the background of the
organisation the channel of distribution and the overal structure of the organisation.

1.1 Background of the organisation

Yadah Connect provides consumers, small business enterprises, corporate institutions, public
sector enterprises and stakeholders with a broad range of products and services, through its
various subsidiaries

Founded in 2016, Yadah Connect, operating as a holding company for its cooperatives, is
steadily growing into a strong company with a unique brand impact, objective and drive
respected for its commitment to improving the economic and skill resources of all
stakeholders.

With over 30 Yadah Connect agents represented across all provinces in Zimbabwe, as well
across the globe, the company has made it a mandate to reach and tap into Africa’s vast
resources in order to create a visible sign of invisible grace.

Yadah Connect provides consumers, small business enterprises, corporate institutions, public
sector enterprises and stakeholders with a broad range of products and services, through its
various subsidiaries, covering a vast number of industries, including:

 Mining
 Farming
 Construction
 Transport
 Solar dried products
 Bee keeping
 Software development

1.2 Channels

Yadah Connect’s commitment to serve is demonstrated by a global-wide network of over 30


service agents, and e-service delivery channels, including, among others, Social Media, the
Yadah Connect website and Yadah TV.  It is currently working on mobile solutions which
are in line with the global focus on technology-driven and value-adding initiatives.

Amos Vhanda R158678T HBSCT


2

HBSCT Report University of Zimbabwe

1.3 Competencies
Yadah Connect boasts of a staff compliment with highly skilled consultants whose unique
mix contributes to a successful diverse product and service range designed to address global
needs.

1.4 Structure of the organisation

Yadah Connect Organisational Structure

Amos Vhanda R158678T HBSCT


3

HBSCT Report University of Zimbabwe

The IT department Operatinoal Structure

Department functions

Human Resource Department


It deals with the recruitment, selection of employees as well training and development.
 The department also look at the welfare of employees in terms of their working
conditions solving some disputes between supervisors and the employees
 Moreover the department is responsible for approving leave applications for all
employees.

 Last but not least the department is responsible for employment Law compliance that is
monitoring and implementing applicable federal and state human resource requirements,
developing conducting; and tracking legally required training.

Amos Vhanda R158678T HBSCT


4

HBSCT Report University of Zimbabwe

Administration Department
 Security and Evacuation

 Emergency assembly point


 Steps in requisitions of goods and services (raising Requisition for Goods & Services
(RG) and Payment Requests (PR)
 Office Access (Security alarm and office keys)
 Office Fleet Management
 Assets management
 Tour space of the Office checking on assets and general inventory

Accounts and Finance Department


It is responsible of making the budget of Yadah Connect. It facilitates in the distribution of
money across all departments.
Moreover, the department makes final decisions on salaries in which each employee could
get depending with the grade that he or she may fell under.They monitor the payroll
system, they ensures that each employee’s salary is placed in the correct account.
They are also responsible for monitoring all the payments of Yadah Connect for example
NSSA and ZIMRA.

Information and Technology Department


This department deals with the following:
 Software support
 Network installation and maintenance in different branches
 PC and Desktop Support Services

Vsion
Empowering thousands and giving you a life.

Amos Vhanda R158678T HBSCT


5

HBSCT Report University of Zimbabwe

Mission
Yadah Connect aim to provide the ultimate in professional, reliable, and effective stone
restoration and care for our customers. Their passion for beautifying natural stone combined
with our extensive expertise, state-of-the art technology, and intensive technician training
allows us to fulfill our mission for all our clients, no matter what their needs. From corporate
lobbies and factory floors to private kitchens and personal patios: If it’s made of stone, we’ll
make it like new again.

1.5 Coperate culture

It is defined as a union of values, beliefs, attitudes and behaviour that employees enact and
exhibit, enabling them to think and act in a certain manner that is distinct from other
organizations. Corporate culture can hence make or break the entity. As a result of its
magnitude, employees have an obligation to remain loyal to the organization and its valued
clients, working hand in hand towards common corporate objectives in a manner that
outperforms its competitors.

Chapter 2

Amos Vhanda R158678T HBSCT


6

HBSCT Report University of Zimbabwe

Introduction
This chapter will explain the link between the degree of business studies and computer
science in the work environment and how it is used to sovle problems in the organisation.It
will contain the stages how to sovle a given problem how too notice the computer problems
and how to solve, also how to make the ineternet fast when it is low in the organisation.

Work Related Learning Assignments and Relevance to the Degree Programme

Duties I carried out during attachment


 Software Installation and SupportDesktop and PC Support Services()
 Network Monitoring and Administration.
 Network Installation.
 Network Configuration (Firewalls – Watchguard and Cyberoam).
 Web Development.
 Antivirus Management.

PC and Desktop Support Services


I was responsible for computers repairs and maintenance
Problems Faced Solutions/ Activities Application  to
Theory/Lessons
1. Slow - upgrading  RAM This has applied my
Machines -installing 32 bit  OS on machines with less memory Computer
Reasons being also helped , this is because 64 bit OS would use 64 Architecture Theory
-Higher version bit data units and does many calculations per second to Practise
of OS on and all this requires a lot of memory to process the -RAM size should
lessRAM instructions be relevant with OS
Memory -replacing hard drives version installed
machines -
-poor RAM
Memory
-Faulty Drives

2.Computers -hard reset (removing the battery and press the power
with blank button for  about 10 seconds)
screens failing -remove the CMOS battery and plug it back  , this
to boot was in notion to reset the CMOS which is a memory
chip that houses settings and configurations
3.Malware - malware cleaning using Windows Defender -Learnt malware
Infected -resetting the Operating  System services  can run in
machines the background
occupying
significant amount
of RAM causing the
turnaround of

Amos Vhanda R158678T HBSCT


7

HBSCT Report University of Zimbabwe

machines to be slow
thus in general
making a machine
slow, malware
services can also
chew a lot of
Bandwidth in the
Background
4.Faulty -replacing  faulty parts
screens, VGA
cards, network
ports, USB
ports
5.Loss of User .Google Services -I learnt Google
Data due to (a)Google Drive Installation Sync  contributes
Computer   - installing google drive more on Upload
Crash To sync files between local machine files and the since most of the
online google drive times users work on
(b) Teaching users how to use google docs   their local machines
and a good upload
speed is required
hence as IT
Department when
subscribing for
Bandwidth it is not
only download
speed that has to be
considered but the
Upload speed too ,
for example Cloud
based Companies
like Microcred if
possible should
subscribe for
unlimited Upload
speed
Working in Google
docs  also require a
good upload speed
6.Software -solving through research from Google - with the
problems availability of
-Word network  access I
-Excel learnt users ask
-Libre some simple
-Gmail solutions that are on
- Google ,from this I
learnt the
importance of
Information
Literacy to  every

Amos Vhanda R158678T HBSCT


8

HBSCT Report University of Zimbabwe

person no matter
one’s profession
-I learnt
Information
Literacy techniques
helped me solve the
problems since I
didn’t have all the
theoretical
knowledge.
7.Printer  Setting up network printer It is required to
Connections  Setting up USB printer Connections maintain same
network  addressing
as the client
machine for the
printer to be
accessible

8. Two
different
networks need Setup wireless or cable connection on the
accessing one printer for network A and install USB
printer connection to network B and share the Printer

Software Installation and Support


(Windows OS, CoreTalk, Libre Office, Microsoft Office Products, Antivirus[Optitune] )
Problems Faced Solutions/Activities Application  to Theory/Lessons
1. 6.Software -providing relevant
problems solutions  using Google
-Word Search

Amos Vhanda R158678T HBSCT


9

HBSCT Report University of Zimbabwe

-Excel
-Libre
-Gmail

2. -I could reset the google -Windows Firewall does packets filtering


(a ) Google account ,making sure both -After days of research I realised if a User is
drive Failing to the windows Firewall and blocked to Access Youtube signing in to
sync Watchguard Firewall allow Google Drive will fail, reason being by
(Users Failing to Google drive incoming and having a gmail by default one has Youtube
Sign in to outcoming connections. account and when trying to sign in to Gmail
Google Drive Services there will be packet filtering on
when setting up Firewall which leads to error “There is no
Google drive) internet connectivity” hence the solution
was to setup Google Drive using
unrestricted IP address or connecting
directly to WAN without a Firewall
3. Paynet -troubleshoot the -I learnt how network devices see each
Software availability of the Paynet other  on the LAN , how the DNS Server
Connection Server on the LAN through plays critical role in network devices
Problem the following visibility
1.ping the Server IP address -Windows Firewall can  make a Computer
2.if available check if invisible, you can even fail to ping the
network sharing option is machine
On on the Server
3.if turned On check if the
DNS Server is up and
resolving well
4.if the above is well-remap
the Server C  drive to client
machine for example
Typing \\192.168.2.300\c$
in file explorer or in start
button
On user machine
5.if not still accessible click
on network folder locate the
Server open it or create
shortcut to User
Desktop(this was usually the
final Solution if all  things
failed )
4. Computers -manually trigger the -In Modern Days where Cyber Security
not updating Update service matters it is important run Windows
Windows -fixing Errors  through vast Updates regularly for security fixes
Operating Research using Google and -a machine that is up to date is less likely to
System due to YouTube be attacked by malware
various Errors However I realised Windows chew a lot of
which were all Bandwidth this resulted in pathetically slow
new in my Life network and the solution was to  schedule
Windows updates to run in the evening only

Amos Vhanda R158678T HBSCT


10

HBSCT Report University of Zimbabwe

on the Firewall or Disable update service on


every machine
5. Users need - through research I had to -I had a privilege to see the following
Outlook emails set up the Google account Network Services in action
be exported to on Outlook then drag
Gmail required folders of emails to (POP,IMAP,SMTP)
gmail account by doing this
relevant folders will be
Synced up to Google

-I was responsible for the installation of the above Software and Programs

Server Configuration and Maintenance


(DNS, Email Server, CoreTalk, WSUS Server)
Problems Faced Solutions/Activities Application  to
Theory/Lessons
-I had to set up WSUS Server on a
Windows Server 2012
Windows Updates -the WSUS Server download How to
Chewing much updates overnight and computers on optimize
Bandwidth the LAN  download and install Bandwidth
updates from this Server during day usage  on a
-this has  been effective since there network
were no update downloads during
working hours

2.Request to forward - I and my co-worker set the -how to manage Email


POP/IMAP emails to Windows 2008 Email Server to Server
Gmail for organisation forward domain emails to Gmail for
employees all employees

Amos Vhanda R158678T HBSCT


11

HBSCT Report University of Zimbabwe

-managing AD,DC and DNS


-adding user accounts and
computers on AD

Network Installation, Configuration, Monitoring and Maintenance

Problems Faced Solutions/Activities Application  to


Theory/Lessons
-network physical connections -I learnt how to
-cabling and color coding set up
-connecting Watchguard Firewall and Cisco switches small/medium
firm network
which is the main
aim of Cisco
ICND1 which I
was personally
studying.
-I learnt how LAN
connections can
cause slow
network through
improper cabling,
cascading of
network switches,
cable loop backs,
all this can cause
traffic jams and
LAN congestion.

Configure New 1. Configure Watch-Guard Firewall From this


Watch-Guard - this included basic setup of new Watch-guard experience I now
Firewalls firewalls, choosing LAN addressing and set trust have a general
interfaces, set external  interfaces inputting IPs given idea of Network
by the ISP, the advanced was adding Firewall Firewalls, how
Policies which I could see my Supervisor they work and
implementing However I had the hands of setting up their capabilities ,
ADSL as a backup link and set Load Balancing. I learnt
This was first implemented at Machipisa Branch as Watchguard
part of research and development and got firewall is a a
implemented in other 8 Branches. multifunctional

Amos Vhanda R158678T HBSCT


12

HBSCT Report University of Zimbabwe

device that acts as


1. a Router for
packet switching
Configure Cyberoam Firewall and filtering for
example when
2. load balancing is
applied.
I learnt Firewalls
can be more
I had a priviledge of a hands on experience of effective on
Cyberoam Firewall from initial set up, adding blocking
multiple  WANS and updating and adding unwanted
Policies incoming
connections to our
This opportunity when the Cyberoam LAN and
Password was lost and it was reset and started networks without
configuring it. Firewalls are
prone to security
attack.

Misbehaving -remove ADSL from secondary  external interface of -Gateway  devices


Watch-guard the Firewall and connect it to the Switch, by doing like Firewalls and
Firewall this clients will be now connecting directly to ADSL Routers can be
Causing slow without ADSL interference causes of slow
network network on LAN
-the Probability of
network going
down should not
be calculated only
basing on Links
connected to the
Router or Firewall
but should also be
based on the
Router itself, for
example no matter
both links are up
or down the
probability of
network
availability is 0.5
thus the Gateway
Router or Firewall
can be up or faulty
anytime Hence
this made me
recommend
redundancy of
Gateway
Firewalls and

Amos Vhanda R158678T HBSCT


13

HBSCT Report University of Zimbabwe

Routers.
-configure new machines for internet connection -from this
-adding machines  to a Domain experience I
applied my theory
in network
addressing and I
managed to play
around all
Network
Classes(A,B and
C)
-I learnt how
DHCP service
works, for
example I
regularly
encounter ip
address of
169.x.x.x
network
-this means the
machine couldn’t
find any DHCP
server on the LAN
- I also
encountered
windows IP
conflicts messages
-this made me
understand to
avoid disaster on
LAN Server
Machines should
have static IP
Addresses.
-I learnt how DNS
resolve names to
IPs, learnt it is
easy to manage
domain controlled
machines.
Configure Wireless Connection -it is required to
 Physical connection and installation of Ubiquiti set  static IPs for
Wireless Access Points these Access
 Network configuration of these access points Points and during
assigning IPs to
Access points first
make sure there is
no device with the
same IP on LAN

Amos Vhanda R158678T HBSCT


14

HBSCT Report University of Zimbabwe

else noise will be


created on LAN
because of IP
conflicts and this
will cause slow
network, this
happened during
one of our
projects of
installing Wireless
network and that’s
how I learnt
-a blinking
Ubiquiti Access
Point can be a
sign of IP conflict

-PC and Desktop Network Configuration (IP Addressing, Adding computers to Domain,)
-network connectivity troubleshooting
-Physical Connections (Cable colour coding-RJ45) →exposed to Console Cables, RJ45
Cable,
-Firewall Policy Configuration (WLAN Failover configuration)
Research and Development in Networking   
Problem Statement: Research And Implement How To Add ADSL Link As A
Secondary Or Backup Link On Watch-Guard Firewall?

Solution:
1. First step was  to remove ADSL from DHCP broadcasting
2. Set a Static network Address for ADSL that is different from LAN network (if these
networks were to be the same there would be confusion in the Firewall/Router –
Routing Table Issue)
3. Configure Secondary interface on Firewall and input ADSL ip address
4. Done, now we could have ADSLs in our branches as Backup Links.
This has been implemented in 9 Branches.
Diagram Showing ADSL Connection as Secondary Link:

Amos Vhanda R158678T HBSCT


15

HBSCT Report University of Zimbabwe

Problem Statement: Troubleshoot and Fix Pathetically Slow Network?

Solution :
1. Use of Monitoring Tools like Wireshark and Solarwinds Network
Monitoring Tools to analyse network traffic
2. Above Tools showed a lot of multicast and broadcast traffic.
-Use Elimination Rule (removing network infrastructure thus switches
and computers one by one and see if network improves)
-all this was in notion to find a broadcasting machine but has never been
easy and we couldn’t pick the broadcasting machine
3. To minimise multicast and broadcast traffic we had to block multicast
traffic on each of our  network switches

Amos Vhanda R158678T HBSCT


16

HBSCT Report University of Zimbabwe

4. Check network physical connections – on this step I discovered a cable


that was looping back on same switch this can cause a lot of noise on
LAN, there was a switch which was in the ceiling which network cable
was close to Electric cable this can cause electrical signal interference and
the power voltage produce transient or constant electric noise and
Theoretically noise cause network signal attenuation.
The network cabling was old and it was difficult to replace each cable.

Conclusion
To eliminate this Layer 2 Problem and not to doubt any Layer 1 and 2 infrastructure
we had to install Ubiquiti Access Points and switched the LAN from cable to Wireless.
There was an improvement. However I realised when troubleshooting slow network
checking the ISP link should be the first step for example plugging in a PC direct to the
ISP and check if you get the subscribed bandwidth on your connection this can be
donethrough network speed checking sites like (speedtest.net,speedtest.co.zw ). Not only
the Bandwidth could be checked but also the Latency.
In Summary we had a layer 3 problem on the LAN and a latency issue on the ISP side
that is Liquid Telecoms.

Diagram Showing Old Network Connection

Amos Vhanda R158678T HBSCT


17

HBSCT Report University of Zimbabwe

Diagram Showing New Network Connection

Web Development (Web Contact Database)


Problem Statement : There were  close to 100 users at our HQ Office, these users required to
call each other and would require to refer to printed contact list of about two pages long thus
each user had 2 pages of contact details for the whole organisation including contacts for
users in other 8 branches. Users in each branch would like to have external calls and would
request via the Reception for these calls.

Problems Discovered:
 - Expense of internal calls for requesting external calls
 -delay on trying to find the required contact from printed copies
 -by the time a user request a call on Reception it means External calls are being blocked
momentarily
 -Receptionist would manually capture call logs details, by being overworked the
Receptionist may not record all call logs hence communication not traceable.
Solution: I developed an Ajax powered Web Application that allows
1. . Each department to save, edit and add it’s contact list
2. allows the user to search for required contact using keywords like name and since it was
Ajax powered the application  could bring results quickly through autocomplete just like
what Gmail and other apps does.
3. Any user of any branch and department could first select table of interest for example
(Mutare Branch, Bulawayo Branch, and IT Service Providers) then put a keyword of
name or ISP to search.
 allows user to make a request for a call (each contact result had request call option)

Amos Vhanda R158678T HBSCT


18

HBSCT Report University of Zimbabwe

 -The user must be logged in first ,when user click request call button , the reception
could receive a pop up sound notifying the new request queued in the database the
Reception Interface could update in 20 seconds,
 Reception page interface shows details of person requesting call and the recipient
details after seeing new request the Receptionist makes a call and forward to one
who requested ,on her interface each call request row has Through and failed button
the Receptionist click failed button if the phone failed to get  through and the request will
be deleted from call requests table.

The Receptionist click Through button if phone get through and all call log details will be
saved accordingly – this time the Receptionist does not need to type anything but just click
Success button to compile Call Logs.
Allows a user to request a call for a new contact by populating a relevant form then submit
and the new contact will be automatically saved in contact database.
The Above Application minimise internal communication costs, automatically update contact
database, minimise turnaround for calls requests enhancing effective communication,
automatically creates Call logs report, minimise time in searching a contact in hard copies
since autocomplete powered search replace this manual work, no more costs on  papers to
print contact list for whole organisation workers.
The Above Application was developed and hosted on my personal Web Hosting Server.

Work carried out during the Yadah Connect project:

Installation of SAP to new computers


SAP (System integrated application package) . It is installed like any other software except
that after installation there is need to add sapmsPRD 3600/tcp on its system notepad file in
services. This was done to cater for logon load balancing.

Installation of operating system and Microsoft office packages


Operating system is usually installed on new computers or on formatted computers. Machines
which would have had their hard drives crushed and which were infected by viruses to a
critical extent were usually formatted. After the installation of the operating system Microsoft
packages such as Office and many other basic packages would then be installed.

Repairing of computer hardware


Computers purchased by the projects office are repaired by IT department. Most computers
that come for repair had common problems such as the machine not responding to power,
hard drive crushed, and network card not functioning, resistors on mother board burnt.
Usually the problem of a computer not responding to power would be resolved by the power

Amos Vhanda R158678T HBSCT


19

HBSCT Report University of Zimbabwe

supply with a new one. The malfunctioning of the network card was usually a result of it
being disabled, the solution was to enable it or replace it with a new one if the latter failed.
When resistors on a motherboard were destroyed usually they would be replaced by a new
one.

Backup
Backup of the servers was done daily after working hours. Backup was done to production
(Database), quality assurance (QAS) and development (DEV). The backup process would
take place during the night and it was done on tapes since the dump of the system was very
large

Basis consultancy
SAP users would be helped via the helpdesk or by having technicians sent to their stations.
The common problems that SAP users would have were, they would erase some of the
functional setup files of SAP hence they would be unable to log onto the
System or the system would be infected by the viruses. The latter problems were usually
solved by reinstallations of the SAP package.

Major Activities

Software Installation
This included installation of software to the newly purchased computers or those which
would have corrupted. During the Installation of the software, close attention was to the steps
which needed prompt response accordingly, like clicking next after every step then Finish
after the installation procedure. The student was also taught that after every installation there
is need to restart the computer always then confirm whether the Installation has been
performed correctly by opening all the packaged programmes

Adding or installing a printer and scanner to a computer that is


networked.
Adding a printer to a computer; Procedure: go to the option Printers and faxes-> Add
printer->Next-> then browsed for the printer from the available printers then added it.
For the Scanner :
Use card set for setting up Betting Slip
Open xml template → save

Amos Vhanda R158678T HBSCT


20

HBSCT Report University of Zimbabwe

Comm → list cards → custom.xml → save cfg


Communication select usb port → green light→ load
→ send cards → store cards
Put betting slip in scanner
→ Print test

Networking
We set Up a Local Area Network (LAN) at various centers. During the Networking I was
tasked to make some Straight Through cables using a Cramping Tool. We used UTP Cables
to connect the terminals. I was also tasked to connect the terminals to the server via the
switch.

Technologies I have learnt at Yadah Connect


I also learnt how to set up a local area network and components used in a local area network
I appreciated the advantages of using Cat 6 over Cat 5 cable in transmitting data.
Also I have learnt how to make some straight through cables using a cramping tool,
I also appreciated the difference between a straight through cable and a cross over cable when
they are used in communication

Description of other duties performed


Below are other functions performed during industrial attachment besides working in
projects, at the organisation.

Network trouble shooting and fixing


Non-technical people are in the habit of exploring a lot with IT equipment and settings, by so
doing they usually alter the arrangement and settings that would have been set by IT people
and thus problems arise. The student would go, diagnose and fix in the event of networking
problems.

Networking designs and restructuring


Certain structures that were obsolete and out dated needed redesigning and also new cites
were being built everyday so it was the duty of the student and other experienced personnel to
cater for a smooth transition of these processes.

Amos Vhanda R158678T HBSCT


21

HBSCT Report University of Zimbabwe

Database tuning and maintenance


Database Tuning is the activity of making a database application run more quickly. More
quickly usually means higher throughput, though it may mean lower response time for time-
critical applications.The student would do database tune up to keep the databases in good
shape and state. This was mainly done in the presence of senior personnel and at times it was
done with consultant companies during critical or fatal failures. Indices for all tables would
also be made or rebuilt during periods prior monthly rollovers. This was done to increase the
speed of rollovers

Querying of the database to produce reports for analysis


A query is an inquiry into the database using the SELECT statement regularly, certain
information would be needed by the management staff for analysis so querying of the
database to produce information was an almost day to day business for the payroll
departments (SSB, PENSIONS and the WARVET systems).
Software Installation.
This included installation of software to the newly purchased computers or those which
would have corrupted. During the Installation of the software, close attention was to the steps
which needed prompt response accordingly, like clicking next after every step then Finish
after the installation procedure. The student was also taught that after every installation there
is need to restart the computer always then confirm whether the Installation has been
performed correctly by opening all the packaged programmes.
Transferring of files from one computer to the other.
In the event of machines not being on the same network, when transferring files from one
machine to the other, the student made use of cross over cables or other portable storage
devices.

Adding or installing a printer to a computer that is networked.


Adding a printer to a computer; Procedure: go to the option Printers and faxes-> Add
printer->Next-> then browsed for the printer from the available printers then added it.

Producing Request for Proposal(RFP) and Request for Quotation(RFQ)


When Government Ministries and departments want to buy ICT equipment, they consult our

Amos Vhanda R158678T HBSCT


22

HBSCT Report University of Zimbabwe

organisation for the specifications, so they would produce RFPs we would produce RFQs
specifying the required specifications.

Assisting users to evaluate tenders


Most of the government users of the purchased hardware and software had little knowledge
about equipment of ICT, so they needed assistance in evaluating tender documents.
Carrying out acceptance tests
The student assisted government Ministries and departments in carrying out acceptance Tests.
This was to test whether the supplied hardware or software meet the required specifications.

Relevance of the assignment to the degree of HBSCT


Work Related Learning provide a vehicle through which students can gain valuable exposure
to the business environment in which they shall be employed to establish and maintain strong
links with industry and commerce. During my time at the Ministry of Information
Communication Technology and Cyber Security I was involved and exposed to so many
tasks which I never thought I would be involved in. It is because of that involvement and
exposure that led me to develop quite a number of skills which I am proud of today.
All the tasks I was involved in were very relevant to the degree program I am doing as the
tasks were covering almost all of the taught modules at University.

Chapter 3
Analysis and Evaluation of the organisation.
Introduction

This chapter will explain clearly the nature of the the industry requirement and how the
industry link with the modern technolgy.Also explain the mordern technology Yadah connect

Amos Vhanda R158678T HBSCT


23

HBSCT Report University of Zimbabwe

is using in its operation.Although I will go deeper because some of the information are
private and cofidential in the organisation.

Nature of industry and industry requirements

Nature of the industry


Yadah Connect IT service is a department under the Yadah Connect Company . It has sub
departments that fall under it. It helps all the The Information System Center to stay updated
and attuned with the latest Information Communication Technology. This helps in the
transformation of Zimbabwe into a knowledge-based society thereby enhancing the country’s
competitiveness in the world in order to stimulate and sustain economic growth through the
systematic application and innovative use of Information Communication Technology (ICT).

Salient features of the organisation

Functional Departments and Their Core Business


Policy, Coordination and e-Government
 Develop appropriate policies, regulatory frameworks and strategies that enhance
provision of Yadah Connect (YC).
 Develop an enabling environment for the creation of a knowledge based society that
transgresses across all levels of society.
 citizens including disadvantaged groups and rural communities.
 Monitor the conduct and running of ICTC security including the establishment of
standards and their enforcement.
 Promote the interests of consumers of ICTC security in respect of prices, quality and
variety of services provided.
 Monitor the use of radio frequency spectrum.
 Promote the provision of international transit services.

Relevance of Theory to Practice

Amos Vhanda R158678T HBSCT


24

HBSCT Report University of Zimbabwe

Internet Programming, Database Concepts, Software Engineering,


Programming
The above Theory was implemented in my Web Contact Database Application mentioned in
Personal Development section and other personal projects e.g Website.

Computer Architecture
The theory was implemented in PC and Desktop repairs day to day activities e.g increasing
RAM size, expanding computer page size, installing relevant OS on small or large RAM
computers.

Communication Skills
This course theory application has been pivotal in communicating to the whole organisation
via emails, handling users queries and reporting to my co-worker and Superior.
Life skills learnt from helped me balance work and personal development pressure.

Information Literacy
I faced new problems every day on which I had less to no knowledge on how to solve them
but due to good research techniques acquired from this course and personal skills I managed
to solve almost every problem.

Networking and Data Communication


This course theory was the most required according to my job nature, with the understanding
of this course theory I was able to configure new Firewalls, PCs and other network devices
without guidance. OSI model understanding helped me pick Layer 3 was problematic on our
Headquarters branch because of this we went Wireless minimizing Layer 3 devices.

Data Structures and Algorithms


Working with Ajax and PHP requires an algorithmic mind with lot of logic reasoning, it is
logical thinking that made it possible to develop Web Contact Database Application.

Entrepreneurship
Optimizing IT Services requires one who understand that it is essential to meet organisation
goals, objectives and vision. It is not enough to be only technically capable, business
decisions are exercised every day in buying IT Services and infrastructure and this require a
good business understanding.

Research, Development, Monitoring and Evaluation


 Evaluate the impact of Information Communication Technologies, Postal and Courier

Amos Vhanda R158678T HBSCT


25

HBSCT Report University of Zimbabwe

Services on social economic development.


 Introduce and enforce stringent quality of service standards in the provision of ICT,
Postal and Cyber Security.
 Create a conducive environment for investment in the areas of ICT and Cyber
Security through public private partnerships.
 Document and publish best practices in ICTCS sector.
 Establish linkages with ICT research institutions nationally, regionally and
internationally.
 Support research, development and manufacture of ICT products and services.

ICT Services
 Coordinate, monitor and advice on all information technology activities in the Civil
Service that is Systems Requirement Analysis, preparing requirements for proposal
documents, evaluation of tenders, contract negotiations, project monitoring, project
management and implementation.
 Provide a central computer processing facility to government ministries and
departments.
 Facilitate the development of e-Applications and local content.
 Train or facilitate ICT training for civil servants and citizens.

Finance, Administration and Human Resources


 Provide financial management services.
 Provide human resources management services.
 Provide administration services.

Audit
 Monitor and evaluate the internal control systems in the organisation.

Developments in the domain of operation


The ICT industry in which Yadah Connect is operating is rapidly changing. There has been

Amos Vhanda R158678T HBSCT


26

HBSCT Report University of Zimbabwe

an urgent need to increase pace in as far as the ICTs are taking over the world so this has
caused this rapid change. It has been noted that the rate of poverty eradication amongst most
societies is directly proportional to the percentage of their technological advancement and
appreciation so this has caused this industry to operate in ever changing stance. Day in and
day out developments are happening whereby better, faster and cheaper technological
solutions are introduced. Like for example, Voice over Internet Protocol (VoIP) has been
introduced and it is slowly taking over GSM and our conventional Land telephones. The
people in the country are also increasing their rate of appreciation towards ICTs and this has
caused the people in the industry to amplify the intensity of their research towards new things
so as to remain ahead of the society as a whole.

Products and services markets


Yadah Connet is a International business inwhich it operate under the government regulation
and the developments that take place are influenced by the government. Yadah Connect it
manufacture and produce the Marble tiles, the hone product and some other produce from the
mining sector also is offer IT oriented services to all the the different sectors of operation.
The IT services it offers are for ensuring improved and effective operations of the business
and the marketing of its products.

Type of technology used

Yadah Connect uses T24 MIS systems for reports writing, and mac book desktop computer
for development of applications.However in department such as marketing they use digital
signs, Facebook, twitter, linked in workplace, google + community as a way of
communicating within the company and also with our valuable clients.

Computers, printers, scanners and hard drives are used so as to send and receive information,
within and outside of the organization. Most of these computers are connected to the network
of internet and the intranet. Internet is used to send and receive emails and also to search the
information which is beneficial to the organization for decision making. The internet has been
facilitated by the establishment of Wi-Fi at Yadah Connect ICT room. Also, the intranet is
used to share information, devices such as printers, and to share the programs like the pastel
accounting system.  
The management tries to keep in line with technological changes. A lot has been done in
upgrading the computer system such as the use of anti-virus materials and latest software
packages. There is a specific IT department and more computers are purchased to ease
operations.

Amos Vhanda R158678T HBSCT


27

HBSCT Report University of Zimbabwe

Chapter4

Expectationd and industry reality


Just like most students, I had unrealistic expectations. My expectation was that the
supervisor would sit by my side, tutor and guide me on what and what not to do. Apart from
that I expected to be taken as just a student who would contribute insignificantly to the
organization. Bearing on mind that i was just a student i concluded that my contributions
would be needed somehow thus expected to apply the theoretical approach I had acquired for
past two years at college.

I expected to use my own office with own desk and PC a laptop that I would carry home for
mainly unfinished business at work. I expected to go out with our seniors and supervisors
each time they went out for various operations that were work related but it did not happen.

Further expectations of coming across various advanced sophisticated systems and hardware
which would be more disadvantaged by the possession of theory only which I acquired for
the first two years at the university. So lack of experience was going to be a major drawback
to my day to day activities as everything would want hands on experience.

Assuming a role which carries a little of responsibility and


accountability;
Coming into the Yadah Connect and Cyber Security, the student thought that she would be
treated as such, with very little accountability and responsibility. This was different as the
student was quickly assigned responsibilities which included responding and making follow-
ups to creditors, as well as managing asset management reconciliations and other tasks that
the student was assigned.

Working with highly skilled and experienced experts


The student expected an environment where workmates were more focused on carrying out
their duties allowing little nor room for friendly interaction. However, lesson learnt was that
as workmates we are a family with an intention of pursuing one goal at for it to become a
success we ought to complement our tasks.

His perception towards management was wrong too, managers are not there to flex their

Amos Vhanda R158678T HBSCT


28

HBSCT Report University of Zimbabwe

muscles or rather bully their subordinates in fact managers are there to direct, guide,
supervise and control their subordinates and activities in their departments, and to attend to
specific high level issues because of their superior capacities and capabilities in order to fulfil
the organization’s objectives.

Industry reality
Prospects appeared so much different to what appeared to be on the ground. I did not go out
travelling and exploring with my seniors, had no office of my own just a PC depending on
what department i was in. I had no work identity card as well i had to flash my national id
and convince clients by word of mouth about where i worked. At one of the departments I
valued sharing one block of office as it actually encourages and strengthens teamwork. Since
I was more involved in the support side of IT I discovered that the time one spend in the
office is not determined by efficiency and effectiveness one is when executing tasks.

When I got into the industr Yadah Connect and Cyber Security I realized that being an IT
person you are not entitled to the most demanding tasks only everyday of you working life.
This was proved as I sometimes attend to users who were having challenges in accessing
office applications simply because it would have crashed and would be wanting a new
installation. You would not do work alone if you found it challenging, you would get
assistance from colleagues.

Comparing to what we learn as theory learnt at college, could not match precisely with the
practical applications, the student noticed a common approach that was particularly
emphasized by the supervisor. To create effective communication, he was supposed to report
to the supervisor on task he had to do.

Would confess that as a trainee I faced many challenges in maintaining and improving the
ICT structure and services so as to increase IT credibility in the organization. These
challenges were complicated by the demands of an increasingly complex IT environment,
various user problems and at large lack of resources.

Critical analysis of relevence of theory to practise

Amos Vhanda R158678T HBSCT


29

HBSCT Report University of Zimbabwe

During the attachment period I gained lifetime experience in understanding the relationship
between theory and practice. Professional and industrial experience as a product of theory
initiates for a symbiotic relationship between theory and practice. The outlined modules
proved to be of paramount importance to practice and the business environment inclusive.

Principles of management-The contingency theories learnt in management came


proved relevant and applicable to mishaps faced during the industrial attachment period. The
four principles of management that is planning, organization, controlling and leadership
enable me to manage and prioritise business time and to effectively and efficiently meet set
targets timely

Networking concepts- The theoretical knowledge acquired in data communications and


other networking programs was useful in my day to day activities. I was involved in
configuration of ip-address for printers and computers, bring out the idea trouble shooting
networks, testing links for branches by pinging, testing internet connections, checking email
problems. . Also I learnt that a computer network may fail to function properly for many
different reasons. Understanding basic network troubleshooting methods in various situations
helped me to get to cause of any problem.

Computer Hardware and Architecture concepts- The ability of application


programs, compilers, operating systems, to deliver performance depends critically on an
understanding of the underlying computer organization. I had an opportunity to deal with
computer hardware issues e.g. RAM, hard drives, the interoperability of components from
various manufacturers. Replacing faulty components in machines with working ones.

Databases and SQL concepts –On numerous occasions during EOD, I used execute
SQL statements to manipulation data in the various tables in the database. I really appreciated
the database and database design module. I was getting failure with manipulation of data e.g.
I used to check space in the database, back up user data in the database, compressing the
data, making adjustments to FLEXCUBE in the different tables in the database.

Amos Vhanda R158678T HBSCT


30

HBSCT Report University of Zimbabwe

Operating Systems concepts –I got a chance to work with different operating


systems. I worked with Linux which was used for the branch servers. I also did installation of
different types of operating systems on machine, Windows 8 and Windows XP on user
machines. Knowing the hardware specifications required for the operating systems was also a
very important thing learnt.

Principles of communication-Principles of Communication module was very


valuable considering that most of the business in a bank requires several forms of
communication, and involves meeting with users and interacting with colleagues at the
workplace. The course went a long way in preparing me to converse in appropriate business
language, when discussing business related issues. It was also very useful when I was doing
help desk administration which required excellent customer service and communication
skills.

Systems Analysis concepts- Systems are created to solve problems. One can think of
the systems approach as an organized way of dealing with a problem. In this dynamic world,
The subject System Analysis and Design, mainly deals with the software development
activities. There were various systems at and being an IT person I got a chance to take part in
User Acceptance Testing stage during the development of various systems. I installed the
various software used during the test like Oracle Client, SQL developer and many other
software. Being involved in this stage also enables me to understand the system that was
being implemented so as to help the various users who would use the system.

Software Engineering concepts- Software engineers view computer software, as


being made up of the programs, documents, and data required to design and build the system.
Software users are only concerned with whether or not software products meet their
expectations and make their tasks easier to complete. I was not involved in software
engineering but the various concepts i learnt were very useful during my work related
learning period. I installed software on machines almost on a daily basis. I only realised the
importance of knowing the various operating systems during the software installation
process. So during the various UAT (user acceptance test) I kept that at the back of my mind.

Computer and Network Security-term computer systems security implies the

Amos Vhanda R158678T HBSCT


31

HBSCT Report University of Zimbabwe

collective processes and mechanisms by which sensitive and valuable information assets and
key services are protected from unintended tampering or publication by unauthorized
individuals. My task in computer security was to install antivirus on every machine which is
good for scanning your hard drives and any removable disks that you may attach to your
computer. Password controls were also used in the organization and my task was to ensure
that whenever a user request a password reset an email is sent requesting a reset for audit
purposes. Also we used to keep inventory of all the hardware by keeping an asset register
which was always updated whenever hardware was dispatched. I was also did backup during
EOD process for FLEXCUBE, Leasepac (system used in Asset Finance) and Bankers Realm
(system used in Microfinance). The purpose of the backup is to protect the database against
data loss and reconstruct the database after data loss.

Project Management-project management is the area of expertise which encompasses


the components necessary for the completion of a project. During my work related period,
MICTCS involved in various projects including opening of new branches and development of
new systems. My task during project management for the opening of new branches was to
configure all the computers needed for the new branch in the specified time. By the time the
machines were needed they would be ready so that there was no delay in the opening of the
new branch.

Amos Vhanda R158678T HBSCT


32

HBSCT Report University of Zimbabwe

Chapter 5
Introduction

Key skills development


Work Related Learning provide a vehicle through which students can gain valuable exposure
to the business environment in which they shall be employed to establish and maintain strong
links with industry and commerce. During my time at the Yadah Connect I was involved and
exposed to so many tasks which I never thought I would be involved in. It is because of that
involvement and exposure that led me to develop quite a number of skills which I am proud
of today.

Planning skills
Voluminous nature of workloads at Yadah connect and Cyber Security made me appreciate
and apply various planning techniques. This has equipped me with proper planning skills.
For example, as the administrator, l learnt to set SMART objectives .I used to set my work
objectives at the start of each day and I followed the work plan. Through this, I was able to
tackle workloads and handle conflicting demands without difficulties.

Organizing skills
Voluminous and challenging nature of IT activities has equipped me with organising skills. I
have come to apply Fayol’s principle of order, “Records have to be at the right place at the
right time”. I have learnt to keep all my things in order and this has helped in solving issues.
Proper organisation has made it possible to tackle my work without hassles.

Interpersonal skills
Involvement in various forms of communication ranging from telephone conversations to
emails has improved my communication skills. I have come to appreciate the importance and
applicability of principles of communication. These skills were also strengthened through in
help desk administration since this requires effective communication skills such as good
listening and presentation solutions to users’ queries.

Amos Vhanda R158678T HBSCT


33

HBSCT Report University of Zimbabwe

Conceptual skills
Working in IT Department, supporting various departments has enabled me to see things in a
holistic approach. I have come to understand the concept of synergy and would try by all
means to assess the implications of my actions to the whole system before implementing
them.

Time management and Task management


Having realized the importance of time in the industry, I learnt that every task has to be
executed within a specific period of time otherwise one would have work pilling up every
second. I also learnt that when executing tasks you have to prioritise, major and urgent tasks
first and the others later.

Personal development
Since I had never been employed, I had the zeal to experience the working lifestyle; I had
eagerness to harness as much information about the surroundings as possible. My very first
day at Yadah Connect I wanted to be given tasks to do so that I could have a feel of what
working is all about. During the period I noticed that I had my strengths and weaknesses
which I have listed below and I can proudly say the strengths outweigh the weaknesses.
The “ability to work with others in a team, communicate and persuade and have interpersonal
sensitivity”, the “ability to desire to learn for oneself and improve one’s self-awareness and
performance” and “technical ability”

Flexibility
During the time I was being taught on how to execute certain tasks I discovered that I am just
the way I am at school because it could not took thrice explanations except on some very few
tasks which were a bit complex. I could easily fit myself into the workplace as well as the
tasks I was required to carry out.

Communication
I have managed to keep consistent communication between myself, my IT colleagues and all
the workmates at the bank. Because I have accepted that I am at Yadah Connect to learn and
contribute what I know I could easily consult whenever I need assistance. Actually I decided
ask more questions doing the right thing unlike less questions doing the wrong thing as this
reduces my dignity as well as the university’s. One of my duties was to talk to users
whenever they had problems. As a result the attachee learnt to be polite, patient and tolerant

Amos Vhanda R158678T HBSCT


34

HBSCT Report University of Zimbabwe

with different characters. With particular attention to verbal skills, the student noticed a big
improvement.

Responsibility
I never been responsible in my life but I can safely say Yadah Connect has strengthened my
responsibility. I can easily say when assigned a task I have to make sure that I execute it
responsibly minding my own business. I was developed in such a way that now I know when
one is responsible he is also accountable

Tolerance
The strength helped me a lot especially in improving the social side of me. At times when
attending to user, one would be watch timing you treating you as if do not know what you
doing. Some would be saying frustrating statements but thank God that I do not get upset
easily instead I tolerate and continue with my task.

Acceptance
By accepting that I am on work related learning seeking to advance my career as well as
building acceptable image for my university institution I could easily find myself listening to
users’ contribution towards the tasks I will be executing as well as my career. Actually I have
come to the realisation that not only the IT colleagues can help you but anyone else can do.

Time management
Time management encompasses planning, allocating, setting goals, delegating tasks,
analysing time spent on tasks, organizing, scheduling, and prioritising tasks according to their
level of importance. I really have more developments on how to manage my tasks. When I
got to Yadah Conneect one of my strengths was good time management as I had never come
to work late and also received less complains from the users when solving their problems.
What helps me out was task prioritisation.

Self confidence
Because of the help I got from the people I worked with, I grew confident in everything that I
did and this helped me to improve myself and be exposed to many things and be involved in
many assignments. At times I could execute tasks that I was not familiar with because of the
confidence I have. Actually this was one of my greatest strengths that helped me develop the
skills I have now. Being confident helped me gain respect from the MICTCS staff.

Amos Vhanda R158678T HBSCT


35

HBSCT Report University of Zimbabwe

Conflict handling skills


Sometimes the attaché’s interests would conflict with those of the company. For instance, just
like any other employee one may need money to survive but sometimes the company may not
have that money. Or the money may be there but for other purposes. Considering the fact that

Work Related Learning is there to arm students with practical skills on what they have
learned theoretically, the student had to concentrate on learning. The more she did the work
the more she learned.

Proffessional development
is process of obtaining the skills, qualifications, and experience that allow you to make
progress in your career.

Handling conflict between personal and organisationa objectivesES


The principal objective of industrial attachment is to get exposed to the industrial arena where
one is expected to explore and put into practice the theoretical learnt at the school. As a
student I was expecting to be given some time to write my academic report but that was not
the fact. During the time I would want to work on my report I could have some work
assigned to me, so I have to make sure that I quickly execute the tasks at my best and then
revert to my report.

As a student I was ambitious and eager to have my hands on each and every task that was
being done at the workplace. I experienced there as I would like to go in the field to
implement some tasks I thought would extend my knowledge base so that I will increase my
competitive edge on completion of my degree program. All these efforts were daydreaming
as theYadah Connect has certain parameters to be followed so that only limited individuals
have rights to certain tasks in the system in order to prevent funds fraudulent.

Therefore the need to fulfil my personal goals and existing organizational goals sometimes
diverged and conflicted. As a way to handling there I would do my assigned tasks diligently
and then revert to my own tasks. The main reason was because my own tasks I was able to do

them at my spare time whereas on assigned tasks I was contributing to the credibility of the
IT department so they have to be done first as there may also increase the university’s

Amos Vhanda R158678T HBSCT


36

HBSCT Report University of Zimbabwe

credibility.

Amos Vhanda R158678T HBSCT


37

HBSCT Report University of Zimbabwe

Chapter 6

Introduction
Recommendation to the department of computer science to meet the expectation in the
industrial attachment period.

To University Of Zimbabwe (UZ)


Apart from the fact that the student was in the process of learning he managed to add value
to the organisation through his academic knowledge and innovation which he had attained at
college and in his life prior to his arrival at the organisation. However, there are certain
recommendations that need to be highlighted to the college.

The college should have a research centre where all IT students go and further their academic
knowledge into practical knowledge. This IT centre would provide an opportunity for the
mixing and mingling of different students who will then show case their talents and
innovation through research and experiments. By so doing, most students would benefit from
each other.

One alternative issue conjointly, a research centre would offer a platform for the invitation of
other corporate bodies who will then add expert advice knowledge and all other forms of
support like monetary support. These stake holders may even provide invitation trips to their
organisations and thus improving the exposure of all participating students.
The course modules should be adapted to fit industrial standards like for example moving
from Visual Basic 6 to VB.NET which is currently used the most in industries. This will
allow students to quickly familiarise with it when they go on work related learning.
The university should consider allowing students to be attached to more than one
organisation over the period of attachment to allow the students to experience a variety of
exposure.
The college should add a project module for students on attachment. An attachment project
would keep the students on the urge and thus helping them not to lose their academic touch
during attachment. This can also help in broadening the innovative stance of students
especially if they would be given `challenging tasks.

Amos Vhanda R158678T HBSCT


38

HBSCT Report University of Zimbabwe

Reality in the Industry

According to my personal experience there are more Companies that are ready for IT Support

practitioners than Software Development. Starting from interviews I have been called for few

to no Companies does Software Development. Finally I was interned at Yadah Connect

where IT Support is the main function of IT Department.

Challenges faced

Unfamiliarity to network infrastructure.

-with better position of theoretical knowledge of how networking works

unfamiliarity to the infrastructure portrays ignorance and it stressed me since

personally it seemed to prove incompetence.

Recommendations to the Department of Computer Science


I appreciate the rich Theory offered by our Department in almost all courses, However I
recommend the Department to embrace practicality in its learning strategies. Yes I
understand the purpose of attachment is to apply theory to practise and that is literally true
but to be honest with you in the Industry when we set for attachment interviews we are being
treated like we are looking for jobs and they expect us to practically know something.
Unfamiliarity to some hardware made some of our colleagues loose in interviews.

May the department do something on this to change how the Industry perceives us. Existence
of an experimental Lab with all networking hardware, web Servers, Printers and all IT related
hardware and any  I may not have mentioned can well prepare us for the Industry.

Conclusion
Having the oppotunity to work at Yadah Connect It has greatly empower me to bridge the
gap between theory and practice. This has a great impact in daily problem sovling in the
computer science field and I had greatly benefited with this on field practise. Yes it was of
great impotance for the university of Zimbabwe to put all undergraduate degree programmes
under industrial practise.I salute Yadah connect For this great oppotunity to learn and

Amos Vhanda R158678T HBSCT


39

HBSCT Report University of Zimbabwe

empower myself to be a better programmer in yes to come.

Amos Vhanda R158678T HBSCT


40

HBSCT Report University of Zimbabwe

ABBREVIATIONS & GLOSSARY


ICTs - Information Communication Technologies
ICTCS -Information Communication Technologies and Cyber Security
IT -Information Technology
PFMS - Public Fund Management System
SAP -System Integrated Application Package
UZ -University Of Zimbabwe

Amos Vhanda R158678T HBSCT


41

HBSCT Report University of Zimbabwe

BIBLIOGRAPHY
Reference
1. http://www.yadahconnect.com
2. Transforming Regional Economies and Communities with Information Technology 
Stewart Marshall; Wallace Taylor; Xinghuo Yu.
3. Software engineering Ian Sommerville 7th edition
4. Marketing
5. Yadah Connect Strategic plan 2016 - 2018

Amos Vhanda R158678T HBSCT