CHAPTER ONE
1.0. ABOUT THE INDUSTRIAL TRAINING FUND (ITF)
in 1971, the Industrial Training Fund has operated consistently and
painstakingly within the context of its enabling laws Decree 47 of 1971 as
Amended in the 2011 ITF ACT. The objective for which the Fund was
established has been pursued vigorously and efficaciously. In the four decades
of its existence, the ITF has not only raised training consciousness in the
economy, but has also helped in generating a corps of skilled indigenous
manpower which has been manning and managing various sectors of the
national economy.
Over the years, pursuant to its statutory responsibility, the ITF has expanded
its structures, developed training programmes, reviewed its strategies,
operations and services in order to meet the expanding, and changing demands
for skilled manpower in the economy. Beginning as a Parastatal “B” in 1971,
headed by a Director, the ITF became a Parastatal “A” in 1981, with a
Director-General as the Chief Executive under the aegis of the Ministry of
Industry. The Fund has a 13 member Governing Council and operates with 10
Departments and 4 Units at the Headquarters, 38 Area Offices, 4 Skills
Training Centres, and a Centre for Industrial Training Excellence.
1.1 ABOUT SIWES
The Students Industrial Work Experience Scheme (SIWES) is a skills training
programme designed to expose and prepare students of universities and other
tertiary institutions for the Industrial Work situation they are likely to meet
after graduation. It is also a planned and structured programme based on
stated and specific career objectives which are geared towards developing the
occupational competencies of participants (Mafe, 2009). Consequently, the
SIWES programme is a compulsory graduation requirement for all Nigerian
university students offering certain courses.
The Students Industrial Work Experience Scheme (SIWES), is the accepted
training programme, which is part of the approved Minimum Academic
Standard in the various degree programmes for all Nigerian Universities. The
scheme is aimed at bridging the existing gap between theory and practice of
Sciences, Agriculture, Medical Sciences (including Nursing), Engineering
and Technology, Management, and Information and Communication
Technology and other professional educational programmes in the Nigerian
tertiary institutions. It is aimed at exposing students to machines and
equipment, professional work methods and ways of safeguarding the work
areas and workers in industries, offices, laboratories, hospitals and other
organizations.
Prior to establishing the Scheme, industrialists and other employers of labour
felt concerned that graduates of Nigeria Universities were deficient in
practical background studies preparatory for employment in Industries and
other organizations. The employers thus concluded that the theoretical
education being received in our higher institutions was not responsive to the
needs of the employers of labour. Consequently, the rationale for initiating
and designing the scheme by the Industrial Training Funds ITF, in 1973.
1.2 AIMS AND OBJECTIVE OF SIWES
The aims and objective of siwes is to bridge the gap between the level of
knowledge acquired in tertiary institutions and the practical application of
such knowledge in the field of work.
The aims and objectives are:
❖ To provide an avenue for students in the Nigerian universities to acquire
industrial skills and experience during their course of study;
❖ To prepare students for the work situation they are likely to meet after
graduation;
❖ To expose the students to work methods and techniques in handling
equipment and machinery that may not be available in their universities;
❖ To allow the transition phase from school to the world of working
environment easier and facilitate students’ contact for later job placements;
❖ To provide students with an opportunity to apply their theoretical knowledge
in real work situation thereby bridging the gap between theory and practice.
CHAPTER TWO
2.1 Introduction
About KADGIS
Land administration reform is one of the five priority areas of the Governor’s
Restoration Agenda His Excellency, Governor Malam Nasiru El-rufa’i that
supports right to good life and poverty reduction. As part of the reforms, the
Kaduna State Ministry of Lands, Survey and Country Planning Kaduna was
replaced by the Kaduna Geographic Information Service (KADGIS) through
the passage of KADGIS Law. KADGIS was Established on the 23rd
December 2015 with the aim to provide modern and efficient land
administration as per the law. KADGIS collate, gather, analyze and digitize
all geospatial data and store it in a central database that can deliver products
such as maps, satellite imageries, survey plans, reports, certificates of
occupancy etc. that can be used in decision making process. KADGIS serves
as primary geospatial data sources to land related Departments and Agencies
The reform has improved security of land documents that curtails activities of
land syndicates and cases of forgery. Security enhanced and serialized R of
O, C of O and other title documents with improved face value for ease of
detection.
Strategically KADGIS will gather, collate and digitise all geospatial data,
store this information in a central database, and, through the KADGIS Service
Centre, deliver products including maps, reports and analysis, supporting
informed decision in all Kaduna State Ministries, Departments and Agencies
(MDA).
Over 50 civil servants were posted to the KADGIS Annex on Tuesday
1st March and operations have begun with mass data capture activities and the
commencement of the transfer of land files, survey files and maps into the
new archive.
KADGIS will eventually have over 340 staff with 280 computer seats and will
be the largest GIS agency in Nigeria
2.2 Services Offered at KADGIS
To support the quick registration of all land in Kaduna state several systematic
programmes have been initiated, targeting different sectors. These
programmes provide stakeholders an opportunity to obtain the new digital
Certificate of Occupancy at reduced fees and rates.
2.3 Aims and Objectives of KADGIS
Efficient customer services for the public, professionals, and government
officials in all land related matters in Kaduna State.
Comprehensive information and application guidelines for the direct
allocation of land, the registration of land, and all land transactions, and, with
the assurance given by the secure digital land registry, the legal protection of
land and property.
Certainty, offered by the Kaduna Land Use Regulations, that ensure
transparency and equity in the processing and execution of all land related
applications, transactions, and the administration of land and all land related
activities in Kaduna State.
To expedite all land related processes and transactions provided that all the
information and documentation supplied by the Applicant has been properly
verified, and all relevant fees, rates and rents have been paid. Applications
and transactions will be executed within 30 working days from the applicant’s
acceptance of the terms and conditions.
CHAPTER THREE
3.1 Introduction to Computer
A computer is an electronic device that accepts data, performs operations,
displays results, and stores the data or results as needed. It is a combination of
hardware and software resources that integrate together and provides
various functionalities to the user. Hardware is the physical components of a
computer like a processor, memory devices, monitor, keyboard, etc., while
software is a set of programs or instructions that are required by the hardware
resources to function properly.
3.2 Components of a Computer
There are basically three important components of a computer:
1. Input Unit
2. Central Processing Unit(CPU)
3. Output Unit
1. Input Unit:
The input unit consists of input devices that are attached to the computer. These
devices take input and convert it into binary language that the computer understands.
Some of the common input devices are keyboard, mouse, joystick, scanner etc.
• The Input Unit is formed by attaching one or more input devices to a
computer.
• A user input data and instructions through input devices such as a keyboard,
mouse, etc.
• The input unit is used to provide data to the processor for further processing.
2. Central Processing Unit:
Once the information is entered into the computer by the input device, the processor
processes it. The CPU is called the brain of the computer because it is the control
centre of the computer. It first fetches instructions from memory and then interprets
them so as to know what is to be done. If required, data is fetched from memory or
input device. Thereafter CPU executes or performs the required computation, and
then either stores the output or displays it on the output device. The CPU has three
main components, which are responsible for different functions: Arithmetic Logic
Unit (ALU), Control Unit (CU) and Memory registers
A. Arithmetic and Logic Unit (ALU): The ALU, as its name suggests performs
mathematical calculations and takes logical decisions. Arithmetic calculations
include addition, subtraction, multiplication and division. Logical decisions involve
the comparison of two data items to see which one is larger or smaller or equal.
• Arithmetic Logical Unit is the main component of the CPU
• It is the fundamental building block of the CPU.
• Arithmetic and Logical Unit is a digital circuit that is used to perform
arithmetic and logical operations.
B. Control Unit: The Control unit coordinates and controls the data flow in and out
of the CPU, and also controls all the operations of ALU, memory registers and also
input/output units. It is also responsible for carrying out all the instructions stored in
the program. It decodes the fetched instruction, interprets it and sends control signals
to input/output devices until the required operation is done properly by ALU and
memory.
• The Control Unit is a component of the central processing unit of a computer
that directs the operation of the processor.
• It instructs the computer’s memory, arithmetic and logic unit, and input and
output devices on how to respond to the processor’s instructions.
• In order to execute the instructions, the components of a computer receive
signals from the control unit.
• It is also called the central nervous system or brain of the computer.
3. Output Unit :
The output unit consists of output devices that are attached to the computer. It
converts the binary data coming from the CPU to human understandable form. The
common output devices are monitor, printer, plotter, etc.
• The output unit displays or prints the processed data in a user-friendly format.
• The output unit is formed by attaching the output devices of a computer.
• The output unit accepts the information from the CPU and displays it in a
user-readable form.
3.3 Characteristics of a Computer
1. Speed: Computers can perform millions of calculations per second. The
computation speed is extremely fast.
2. Accuracy: Because computers operate on pre-programmed software, there
is no space for human error.
3. Diligence: They can perform complex and long calculations at the same
time and with the same accuracy.
4. Versatile: Computers are designed to be versatile. They can carry out
multiple operations at the same time.
5. Storage: Computers can store a large amount of data/ instructions in its
memory, which can be retrieved at any point of time.
3.4 WHAT IS A COMPUTER NETWORK
A computer network comprises two or more computers that are connected—
either by cables (wired) or WiFi (wireless)—with the purpose of transmitting,
exchanging, or sharing data and resources. You build a computer network
using hardware (e.g., routers, switches, access points, and cables) and
software (e.g., operating systems or business applications).
Geographic location often defines a computer network. For example, a LAN
(local area network) connects computers in a defined physical space, like an
office building, whereas a WAN (wide area network) can connect computers
across continents. The internet is the largest example of a WAN, connecting
billions of computers worldwide.
You can further define a computer network by the protocols it uses to
communicate, the physical arrangement of its components, how it controls
traffic, and its purpose.
Computer networks enable communication for every business, entertainment,
and research purpose. The internet, online search, email, audio and video
sharing, online commerce, live-streaming, and social networks all exist
because of computer networks.
3.5 COMPUTER NETWORK TYPES
As networking needs evolved, so did the computer network types that serve
those needs. Here are the most common and widely used computer network
types:
• LAN (local area network): A LAN connects computers over a relatively
short distance, allowing them to share data, files, and resources. For example,
a LAN may connect all the computers in an office building, school, or
hospital. Typically, LANs are privately owned and managed
• WLAN (wireless local area network): A WLAN is just like a LAN but
connections between devices on the network are made wirelessly
• WAN (wide area network): As the name implies, a WAN connects
computers over a wide area, such as from region to region or even continent
to continent. The internet is the largest WAN, connecting billions of
computers worldwide. You will typically see collective or distributed
ownership models for WAN management
• MAN (metropolitan area network): MANs are typically larger than LANs
but smaller than WANs. Cities and government entities typically own and
manage MANs
• PAN (personal area network): A PAN serves one person. For example, if
you have an iPhone and a Mac, it’s very likely you’ve set up a PAN that shares
and syncs content—text messages, emails, photos, and more—across both
devices
• SAN (storage area network): A SAN is a specialized network that provides
access to block-level storage—shared network or cloud storage that, to the
user, looks and works like a storage drive that’s physically attached to a
computer. (For more information on how a SAN works with block storage.
• VPN (virtual private network): A VPN is a secure, point-to-point
connection between two network end points (see ‘nodes’ below). A VPN
establishes an encrypted channel that keeps a user’s identity and access
credentials, as well as any data transferred, inaccessible to hackers
3.6 IMPORTANT TERMS AND CONCEPTS
The following are some common terms to know when discussing computer
networking:
• IP address: An IP address is a unique number assigned to every device
connected to a network that uses the Internet Protocol for communication.
Each IP address identifies the device’s host network and the location of the
device on the host network. When one device sends data to another, the data
includes a ‘header’ that includes the IP address of the sending device and the
IP address of the destination device
• Nodes: A node is a connection point inside a network that can receive, send,
create, or store data. Each node requires you to provide some form of
identification to receive access, like an IP address. A few examples of nodes
include computers, printers, modems, bridges, and switches. A node is
essentially any network device that can recognize, process, and transmit
information to any other network node
• Routers: A router is a physical or virtual device that sends information
contained in data packets between networks. Routers analyze data within the
packets to determine the best way for the information to reach its ultimate
destination. Routers forward data packets until they reach their destination
node
• Switches: A switch is a device that connects other devices and manages node-
to-node communication within a network, ensuring data packets reach their
ultimate destination. While a router sends information between networks, a
switch sends information between nodes in a single network. When discussing
computer networks, ‘switching’ refers to how data is transferred between
devices in a network. The three main types of switching are as follows:
o Circuit switching, which establishes a dedicated communication path
between nodes in a network. This dedicated path assures the full
bandwidth is available during the transmission, meaning no other traffic
can travel along that path
o Packet switching involves breaking down data into independent
components called packets which, because of their small size, make
fewer demands on the network. The packets travel through the network
to their end destination
o Message switching sends a message in its entirety from the source node,
traveling from switch to switch until it reaches its destination node
• Ports: A port identifies a specific connection between network devices. Each
port is identified by a number. If you think of an IP address as comparable to
the address of a hotel, then ports are the suites or room numbers within that
hotel. Computers use port numbers to determine which application, service,
or process should receive specific messages
• Network cable types: The most common network cable types are Ethernet
twisted pair, coaxial, and fiber optic. The choice of cable type depends on the
size of the network, the arrangement of network elements, and the physical
distance between devices
3.6. COMPUTER NETWORKS AND THE INTERNET
The internet is actually a network of networks that connects billions of digital
devices worldwide. Standard protocols allow communication between these
devices. Those protocols include hypertext transfer protocol (the ‘http’ in
front of all website addresses). Internet protocol (or IP addresses) are the
unique identifying numbers required of every device that accesses the internet.
IP addresses are comparable to your mailing address, providing unique
location information so that information can be delivered correctly.
Internet Service Providers (ISPs) and Network Service Providers (NSPs)
provide the infrastructure that allows the transmission of packets of data or
information over the internet. Every bit of information sent over the internet
doesn’t go to every device connected to the internet. It’s the combination of
protocols and infrastructure that tells information exactly where to go.
CHAPTER FOUR
4.1 HOW DO THEY WORK?
Computer networks connect nodes like computers, routers, and switches using
cables, fiber optics, or wireless signals. These connections allow devices in a
network to communicate and share information and resources.
Networks follow protocols, which define how communications are sent and
received. These protocols allow devices to communicate. Each device on a
network uses an Internet Protocol or IP address, a string of numbers that
uniquely identifies a device and allows other devices to recognize it.
Routers are virtual or physical devices that facilitate communications between
different networks. Routers analyze information to determine the best way for
data to reach its ultimate destination. Switches connect devices and manage
node-to-node communication inside a network, ensuring that bundles of
information traveling across the network reach their ultimate destination.
4.2 Architecture
Computer network architecture defines the physical and logical framework of a
computer network. It outlines how computers are organized in the network and what
tasks are assigned to those computers. Network architecture components include
hardware, software, transmission media (wired or wireless), network topology, and
communications protocols.
4.3 Main types of network architecture
There are two types of network architecture: peer-to-peer (P2P) and
client/server. In P2P architecture, two or more computers are connected as
“peers,” meaning they have equal power and privileges on the network. A P2P
network does not require a central server for coordination. Instead, each .4
computer on the network acts as both a client (a computer that needs to access
a service) and a server (a computer that serves the needs of the client accessing
a service). Each peer makes some of its resources available to the network,
sharing storage, memory, bandwidth, and processing power.
In a client/server network, a central server or group of servers manage
resources and deliver services to client devices in the network. The clients in
the network communicate with other clients through the server. Unlike the
P2P model, clients in a client/server architecture don’t share their resources.
This architecture type is sometimes called a tiered model because it's designed
with multiple levels or tiers.
4.4 Network topology
Network topology refers to how the nodes and links in a network are arranged.
A network node is a device that can send, receive, store, or forward data. A
network link connects nodes and may be either cabled or wireless links.
Understanding topology types provides the basis for building a successful
network. There are a number of topologies but the most common are bus, ring,
star, and mesh:
• A bus network topology is when every network node is directly
connected to a main cable
• In a ring topology, nodes are connected in a loop, so each device has
exactly two neighbors. Adjacent pairs are connected directly; non-adjacent
pairs are connected indirectly through multiple nodes
• In a star network topology, all nodes are connected to a single, central hub
and each node is indirectly connected through that hub
• A mesh topology is defined by overlapping connections between nodes.
You can create a full mesh topology, where every node in the network is
connected to every other node. You can also create partial mesh topology
in which only some nodes are connected to each other and some are
connected to the nodes with which they exchange the most data. Full mesh
topology can be expensive and time-consuming to execute, which is why
it's often reserved for networks that require high redundancy. Partial mesh
provides less redundancy but is more cost effective and simpler to execute
4.5 SECURITY
Computer network security protects the integrity of information contained by
a network and controls who access that information. Network security policies
balance the need to provide service to users with the need to control access to
information.
There are many entry points to a network. These entry points include the
hardware and software that comprise the network itself as well as the devices
used to access the network, like computers, smartphones, and tablets. Because
of these entry points, network security requires using several defense
methods. Defenses may include firewalls—devices that monitor network
traffic and prevent access to parts of the network based on security rules.
Processes for authenticating users with user IDs and passwords provide
another layer of security. Security includes isolating network data so that
proprietary or personal information is harder to access than less critical
information. Other network security measures include ensuring hardware and
software updates and patches are performed regularly, educating network
users about their role in security processes, and staying aware of external
threats executed by hackers and other malicious actors. Network threats
constantly evolve, which makes network security a never-ending process.
The use of public cloud also requires updates to security procedures to ensure
continued safety and access. A secure cloud demands a secure underlying
network.
4.6 MESH NETWORKS
As noted above, a mesh network is a topology type in which the nodes of a
computer network connect to as many other nodes as possible. In this
topology, nodes cooperate to efficiently route data to its destination. This
topology provides greater fault tolerance because if one node fails, there are
many other nodes that can transmit data. Mesh networks self-configure and
self-organize, searching for the fastest, most reliable path on which to send
information.
Type of mesh networks:
There are two types of mesh networks—full mesh and partial mesh.
• In a full mesh topology, every network node connects to every other
network node, providing the highest level of fault tolerance. However, it
costs more to execute. In a partial mesh topology, only some nodes
connect, typically those that exchange data most frequently
CHAPTER FIVE
5.1 CONCLUSION
My SIWES experience was a valuable and rewarding one. It gave me the
opportunity to apply the theoretical knowledge I had learned in the
classroom to real-world situations. I also gained valuable hands-on
experience and developed new skills.
One of the most important things I learned during my SIWES internship was
the importance of teamwork and communication. In a professional setting, it
is essential to be able to work effectively with others and to communicate
clearly and concisely. I also learned the importance of being organized and
efficient, and of being able to manage my time effectively.
Overall, I am very grateful for the opportunity to have participated in the
SIWES program. It was a valuable learning experience that has prepared me
well for my future career.
5.2 Recommendations
I would highly recommend the SIWES program to all students who are
interested in gaining practical experience in their chosen field. The program
is a great way to develop new skills, learn about the industry, and make
contacts that could be beneficial to your future career.
Here are some specific recommendations for students who are considering
participating in the SIWES program:
• Start planning early. It can take some time to find a suitable placement, so it
is important to start your search early.
• Be proactive. Don't wait for companies to come to you. Reach out to
potential employers and let them know that you are interested in a SIWES
internship.
• Be prepared to learn. The SIWES program is a great opportunity to learn
new skills and knowledge. Be open to new experiences and be willing to ask
questions.
• Be professional. Be on time, dress appropriately, and be respectful of your
supervisors and colleagues.
REFERENCE
• getseminar.in/showthread.php?tid=11313
• nou.edu.ng/students-industrial-work-experience-scheme-s
• original on 16 November 2016. Retrieved 19 August 2021.
• Robson, Eleanor (2008). Mathematics in Ancient Iraq. Princeton University
Press. p. 5. ISBN 978-0-691-09182-2.: calculi were in use in Iraq for
primitive accounting systems as early as 3200–3000 BCE, with commodity-
specific counting representation systems. Balanced accounting was in use by
3000–2350 BCE, and a sexagesimal number system was in use 2350–2000
BCE.
• Flegg, Graham. (1989). Numbers through the ages. Houndmills,
Basingstoke, Hampshire: Macmillan Education. ISBN 0-333-49130-0.
OCLC 24660570.
• The Antikythera Mechanism Research Project Archived 28 April 2008 at the
Wayback Machine, The Antikythera Mechanism Research Project.
Retrieved 1 July 2007.
• Marchant, Jo (1 November 2006). "In search of lost time". Nature. 444
(7119): 534–538. Bibcode:2006Natur.444..534M. doi:10.1038/444534a.
PMID 17136067. S2CID 4305761.
• G. Wiet, V. Elisseeff, P. Wolff, J. Naudu (1975). History of Mankind, Vol 3:
The Great medieval Civilisations, p. 649. George Allen & Unwin Ltd,
UNESCO.
• Fuat Sezgin "Catalogue of the Exhibition of the Institute for the History of
Arabic-Islamic Science (at the Johann Wolfgang Goethe University",
Frankfurt, Germany) Frankfurt Book Fair 2004, pp. 35 & 38.
• Charette, François (2006). "Archaeology: High tech from Ancient