Professional Documents
Culture Documents
PREPARED BY:
NAME: MAKUNGU NGAMBA,
REG#: BIT/12/71954,
PROGRAM: BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY YEAR 3,
DURATION: SEVEN WEEKS.
SUPERVISOR: DANIEL KOLOSENI
DECLERATION
I, MAKUNGU NGAMBA the student of THE INSTITUTE OF FINANCE MANAGEMENT
(IFM) with registration number BIT/12/71954, I declare that this field report work I prepare on
my own with the assistance of different references and my field supervisor, and I identify all
work done and lessons learnt during my field attachment.
Signature: ............................................
Date: ...
BY
MAKUNGU NGAMBA
ii
iii
ACKNOWLEDDGEMENT
A large number of people have contributed over several months to this practical work training
and Id like to thank everyone (IFM, CUHAS, reviewers, students) who have help to come up
with this report. Different constructive suggestions for change as well as many corrections to this
report.
I would particularly like to thank all Departments of Catholic University of Health and Allied
Sciences (CUHAS) for their acceptance, help and support during/after the training which lead me
to achieve more knowledge in system developments and maintenance, some of them are
ISMAEL KHANGANE, Venance Luhemeja, Adeline Urassa, Derick K, and others),
I would particularly like to thank all the IFM Department for their cooperation on my learning as
well as supervisors.
Also I would like to give thanks for the followings students for their contributions during/after
the practical training: David Y, Anna P and Humbo T (3rd year at IFM students), Simon R (3rd
year at UDOM), Jackline P (2nd year at MZUMBE) and other students from different
institutes/universities.
My God bless you all for your cooperation and contribution.
iv
Table of contents
DECLERATION............................................................................................................................................ i
ACKNOWLEDDGEMENT ........................................................................................................................ iv
EXECUTIVE SUMMARY ........................................................................................................................ vii
CHAPTER ONE ......................................................................................................................................... 1
INTRODUCTION....................................................................................................................................... 1
1.0.
1.1.
1.2.
FUNCTIONS OF CUHAS...................................................................................................... 2
1.3.
1.4.
1.5.
3.2.
3.3.
3.4.
3.5.
CHAPTER FOUR..................................................................................................................................... 26
ANALYSIS OF STUDY ....................................................................................................................... 26
4.0.
4.1.
4.2.
4.3.
4.4.
INTRODUCTION................................................................................................................. 28
5.1.
CONCLUSION...................................................................................................................... 28
5.2.
RECOMMENDATION .......................................................................................................... 29
List of Figures
Figure 1 Organization structure of CUHAS (source: CUHAS).............................................................. 3
Figure 3 Use Case (Source: Project Team) ............................................................................................. 12
Figure 4 Sequence diagram (Source: Project Team) ............................................................................. 13
Figure 5 State Chart Diagram (Source: Project Team) ........................................................................ 13
vi
EXECUTIVE SUMMARY
The report describes a report of the field attachment training that was carried out in the period
between 08th July 2014 to 29th August 2014 at Catholic University of Health and Allied Science
(CUHAS). The training ran for seven (7) weeks of which I learnt various aspects on Information
and Communication Technology (ICT) involved the Department of Directorate of Information
System (DIS) and the Department of Decision Support System (DSS) working basically on
System Development and PC Maintenance.
The tasks undertaken during field training work was typically based on project of developing a
Hostel Reservation System. This was involved on Designing the graphic User Interface (GUI),
designing Database and the System Maintenance.
The followings are the task undertaken and their lessons leant during field practical training.
These work done are computer repair and maintenance, PC troubleshooting, windows
installation, calculator design, measuring of heartbeat, system topology, project management,
system cost estimation, system quality management, system analysis and requirement model,
UML diagram, defining system functionality, defining system menus, design of home page,
forms design, database design and data normalization, data modeling, E-learning, system testing
and application software.
vii
CHAPTER ONE
INTRODUCTION
1.0.OVERVIEW OF THE FIELD WORK PLACEMENT
The field practical training was conducted at Catholic University of Health and Allied Sciences
(CUHAS), located at the Bugando Medical Centre, Bugando Hill Nyamagana Mwanza Tanzania.
This field practical training took the time from 08th July 2014 to 29th August 2014. The field
practical training took seven (7). The following are the objectives of field work placement:
Opportunity for practical experience in the organization and to increase their knowledge and skill
in areas consistent with career goals.
a) To enable students to understand and appreciate professional duties and responsibilities
and personnel in the field. To help students determine their professional strength and
weakness.
b) To further enhance a students understanding and conceptualization of professionalism.
Help students use professional terminologies and respectful communication when
interacting with professionals and clients in the practice settings.
c) To assist the Institution from which the student is from with; A perspective for evaluating
student performance and improving curriculum.
1.1.
Schools had their first intake in the Academic Year 2010/2011.The Institute of Allied Health
Sciences was established within the Bugando University of Health Sciences in 2006/2007.
Contribution of the CUHAS Tanzanian organizations. The unique contribution of the partnership
is that we promote interdisciplinary education and research by working across schools
CUHASs contributes the followings
Generates over 50% of Tanzanias health professionals (doctors, graduate nurses, pharmacists and
dentists). Conducts most of the health research in the country. Now, champion in addressing the
gained its charter as a University in 2007 and requested to quadruple its graduate output.
1.2.
FUNCTIONS OF CUHAS
The main function of Catholic University of Health and Allied Sciences (CUHAS) is Teaching
Research & Consultancy Services. This make CUHAS to become an outstanding Tanzanian
Catholic University excelling in health care, training and research and responsive to societal needs.
Other functions are to provide skilled and competent human resources in the health sector that is
vested with moral and ethical values, Search, discover and communicate the truth to advance the
frontiers of knowledge and provide quality services to the community. Role of universities in
addressing the health workforce shortage to generate sufficient health professionals who are
competent to address the health needs of their society through:
a) Service to their communities
b) Provision of leadership in their professions
c) Supportive supervision and mentorship
d) Teaching the next generation
e) Research to improve health outcomes
1.3.
1.4.
The business of the University are the advancement of knowledge, diffusion and extension of
technology and learning, the provision of higher education and research and, so far as is consistent
with those objects, the nurturing of the intellectual, aesthetic, social and moral growth of the
students at the University. It has been set up:
a) To provide higher education in the area of Public Health through teaching and research to
persons suitably qualified and capable of benefiting from such education;
3
b) To disseminate knowledge and the results of research and their applications to the needs
and aspirations of the people of Tanzania.
c) To provide services to those contributing positively to improving the health status and
overall quality of the life of Tanzanians and foster partnership with the community.
1.5.
The core roles of the Catholic University of Health and Allied Sciences (CUHAS) comprises the
following:
a) Work with integrity and maintain an empowering environment based on mutual trust,
respect and partnership among academic and non-academic staff, students and external
units.
b) Apply innovative educational approaches and technologies (including distance learning) to
enhance access to programs with a focus to train high caliber health professionals at all
levels of education.
c) Use modern information and communications technology and other educational tools to
drive its programs wherever possible.
d) Seek through research and service to be relevant to the health needs of Tanzania and
beyond; with future programs relating to emerging challenges and trends in both the health
and education sectors.
e) Be practically oriented by emphasizing community work as a compulsory component of
all programs offered in the School.
f) Develop curriculum that entails effective balance between academic knowledge and
competencies required in the world of work.
g) Collaborate with the Ministries of Health and Education, Ministries, Departments and
Agencies, professional bodies, the private sector and international institutions in the
attainment of the mission of the University.
CHAPTER TWO
WORK DONE AND LESSON LEARNED
2.0.DESCRIPTION OF WORK DONE AND LESSON LEANT
This section describes brief tasks undertaken and lessons leant during field work practical. The
followings are the task undertaken and their lessons leant during field practical training. These
work done are computer repair and maintenance, PC troubleshooting, windows installation,
calculator design, measuring of heartbeat, system topology, project management, system cost
estimation, system quality management, system analysis and requirement model, UML diagram,
defining system functionality, defining system menus, design of home page, forms design,
database design and data normalization, data modeling, E-learning, system testing and application
software. The following are the description of tasks taken and their leant lessons.
give the handful of commands and tools, useful to develop simple as well as semi-complex
6
programs. This needs to understand the project screen box with a lot of dots. This is the form where
you will add the various elements (command buttons, pictures, text boxes, etc.) of the program.
Dragged a label onto the form, and change the caption of the label to "Enter first number". The
caption of a label can be changed using the properties box.
Created a textbox to the right of the first label, and removed any text that appears inside the textbox
by changing blanking the "Text" field in properties box.
I created another label and change the caption to "Enter second number" and create another textbox
to its right and drag and create four command buttons below these two labels. Change the caption
of these command buttons to "Add", "Subtract", "Multiply", "Divide" respectively.
Create another label with a caption "Result" and a textbox to the right of it below the four command
buttons. This textbox will be used to display the result. With this, your design is complete.
To start coding, in the project explorer, I click on the form and then select the left-most button. It
will take you to the coding screen. By clicking on the list box in the top-left of the coding screen.
One by one, click on all the commands (Command1, Command2, etc.) so that the outline coding
of them will be visible to the coding screen.
I declared the variables. To declare: Dim a, b, r as Integer, a is the value entered in the first
textbox, b is the value entered in the second textbox and r is the result. Start the coding for the add
command (Command1). The code will be as follows:
Private Sub Command1_Click()
a = Val(Text1.Text)
b = Val(Text2.Text)
r=a+b
Text3.Text = r
End Sub
Code for the subtract command (Command2). The code will be as follows:
Private Sub Command2_Click()
a = Val(Text1.Text)
b = Val(Text2.Text)
r=a-b
7
Text3.Text = r
End Sub
Code for the multiply command (Command3). The code will be as follows:
Private Sub Command3_Click()
a = Val(Text1.Text)
b = Val(Text2.Text)
r=a*b
Text3.Text = r
End Sub
Code for the divide command (Command4). The coding will be as follows:
Private Sub Command4_Click()
a = Val(Text1.Text)
b = Val(Text2.Text)
r=a/b
Text3.Text = r
End Sub
Then clicked the start button or press F5 to execute the program. Finally saved project and the
form.
LESSON LEANT
All designing and coding procedures must be taken so that to avoid error during program
execution. Visual Basic 10 is a programming language developed by Microsoft which can be easily
learned and used by beginner, as well as advanced programmers.
out sound beat of the amplified heartbeat so that someone can hear such beats. The PC was for
connection of all other components and manage them to work.
LESSON LEANT
The heartbeat of human being can be measured by many connecting devices. A computer can
measure human heartbeat when connected with Amplifier, Microphone and Headphone. Amplifier
can amplifies to the biggest beat from smallest on. The topology diagram is more important
because it show the whole map of the system and their functions.
2.6. COLLECTION OF SYSTEM REQUIREMENTS
As a project team members we visited the hostel area and stockholder to collect system
requirements. This requirements complies both functional and non-functional requirement, user
requirement as well as system requirement in general. We discuss with the students and
stockholder who want and are the user of this required system by using questionnaire methodology
as a technique of collecting information. We structure some of the questions as follows: What are
the problems consign with booking hostel manually? How time did take on competing with hostel
room booking take? How difficulty arise on locating students to respective room? Why they want
to have a system.
The following technologies have being given high priority in this project for development of web
based driven Application. The application will have the client-server fetchers where the program
will be executed at the server (server side application) but it will be serving all the client/users for
their computers as long as they must be in the same Local Area network (LAN).
Software needed was:a) Wamp Server that will be used in the systems database development.
b) Macromedia Dream weaver CS6
c) PHP 5 that will be used to provide a link between the database and the web server.
d) Firefox, Torch, Internet explorer and Google chrome as browsing software.
It sets out the systems functions, services and operational constraints in details. The system was
required to be able to do the following; allow the student to submit personal information and to be
stored in a database, Storing information to the database, System provides feedback report of
9
booking student, student check for room availability before booking process and Staff/system
administrator login/logout, the student also was required to pay through M-pesa.
LESSON LEANT
Requirements collection or discovery also called requirements elicitation deals with gathering
information about the required system and existing systems, and distilling the user and system
requirements from this information. Sources of information during the requirements discovery
phase include documentation, system stakeholders, and specifications of similar systems other
come from the application domain and from other systems that interact with the system being
specified. Requirement gathering interact with stakeholders through interviews and observation
and you may use scenarios and prototypes to help stakeholders understand what the system will
be like. All of these must be considered during the requirements elicitation process.
10
Student inputs her name and student registration number. System verifies the student is eligible to
room booking. If not eligible then the student is informed and use case ends. System displays list
of available hostel rooms. Student chooses a room. System validates the student is eligible to
booking in the chosen room. If not eligible, the student is asked to choose another. System validates
the room fits into the student's schedule. System calculates and displays the total costs and other
informations. Student verifies the cost and either indicates she wants to book or not. The system
prints booking receipt.
Domain model. A domain model identifies fundamental entity types and the relationships between
then. This we done using Class Responsibility Collaborator (CRC) cards and UML class diagram.
This domain model was comprised of enough information: the main domain entities, their major
attributes, and the relationships between these entities.
User interface model. Many proposed interfaces was suggested by team project members by
consider developing some screen sketches and even a user interface prototype.
LESSON LEANT
System analysis is responsible for making the system architecture explicit at an early stage in the
system development which requires some analysis. Architectural design results have a reflective
effect on whether or not the system can meet critical requirements such as performance, reliability,
and maintainability.
A requirements model meets two main needs which are Confirms what users want a new system
to do, must be understandable for users, must be correct and complete. Specifies what designers
must design which not unambiguous. The requirement model also do the followings: describes
what the system should do, represents people, things and concepts important to understand what
is going on, shows connections and interactions among these people, things and concepts, shows
the business situation in enough detail to evaluate possible designs and is organized so as to be
useful for designing the system.
11
The following use-case diagram shows how the hostel management system expected to be
interacted with users/students.
12
LESSON LEANT
System modeling using the UML, which include the following types of diagrams use case
diagrams, class diagrams, sequence diagrams, and state diagrams for modeling a the system. This
system modeling include graphical system models presenting the relationships between the system
13
components, the system, and its environment. The set of models describes the behavior of the
system and is explained with additional information describing, for example, the systems required
performance or reliability. The UML has many diagram types and so supports the creation of many
different types of system model. The UML suppose five diagram types could represent the
essentials of a system:
a) Activity diagrams, show the activities involved in a process or in data processing.
b) Use case diagrams, show the interactions between a system and its environment.
c) Sequence diagrams, show interactions between actors and the system and between system
components.
d) Class diagrams, show the object classes in the system and the associations between these
classes.
e) State diagrams, show how the system reacts to internal and external events.
LESSON LEANT
The functionality of any system must provide components that implement system security, patient
information creation and updating, import and export of patient data from other databases, and
report generators that create management reports. Also system functions includes form and menu
management components that present information to users, and data validation components that
check information consistency.
14
Other system functionalities automate each and every activity of the manual system, which
increases its throughput, to provide a quick response with very accurate information as and when
required, to make the present manual system more interactive, speedy and user friendly, to benefit
any information, whatever and whenever needed, reduce the cost of maintenance.
15
It is advised to follow the principles of design and to be simple by provide plenty of visibility
colors and font size which will make visitors attraction, easy, clearly, navigations to the site.
A web form is one of the best ways to get input from prospective clients and indirectly establish a
friendly relation with them. This form must be validated so that to control and checks for user
input. Validation of user input is analyzing the correctness of the user input. Not validating input
is one of the greatest mistakes that Web-application developers can make. This can lead to system
crashes, malicious database manipulation, and even database corruption.
17
Easy extendibility, as new data may be added without modifying existing records. This is
also known as scalability.
b)
New technology performance, power and flexibility with multiple data requirement
capabilities.
c)
18
LESSON LEANT
The goal of data normalization is to reduce and even eliminate data redundancy, an important
consideration for application developers because it is incredibly difficult to stores objects in a
relational database that maintains the same information in several places. The three most common
forms of normalization ( First normal form (1NF), Second normal form (2NF), and Third normal
form (3NF)) describing how to put entity types into a series of increasing levels of normalization.
19
LESSON LEANT
Data integrity falls into these categories:
a) Entity integrity defines a row as a unique entity for a particular table. Entity integrity
enforces the integrity of the identifier column(s) or the primary key of a table (through
indexes, UNIQUE constraints, PRIMARY KEY constraints, or IDENTITY properties).
b) Domain integrity is the validity of entries for a given column. You can enforce domain
integrity by restricting the type (through data types), the format (through CHECK
constraints and rules), or the range of possible values (through FOREIGN KEY constraints,
CHECK constraints, DEFAULT definitions, NOT NULL definitions, and rules).
c) Referential integrity preserves the defined relationships between tables when records are
entered or deleted. Referential integrity is based on relationships between foreign keys and
primary keys or between foreign keys and unique keys (through FOREIGN KEY and
CHECK constraints). Referential integrity ensures that key values are consistent across
tables. Such consistency requires that there be no references to nonexistent values and that
if a key value changes, all references to it change consistently throughout the database.
2.17. E-LEARNING
This was the presentation which was presented to us by the CUHAS IT Department. It was containing the
following parts: Asynchronous e-Learning, Self-paced Courses, Discussion Groups, Synchronous eLearning, Virtual Classroom, Audio and Video Conferencing, Chat, Shared Whiteboard, Application
Sharing, Instant Messaging, Development and Management, Learning Management Systems, Learning
Content Management Systems, Knowledge Management.
LESSON LEANT
E-Learning is the use of technology to enable people to learn anytime and anywhere. E-Learning can
include training, the delivery of just-in-time information and guidance from experts.
20
CHAPTER THREE
LITERATURE REVIEW
3.0. INTRODUCTION TO LITERATURE REVIEW ON REQUIREMENTS
ENGINEERING
The objective of this chapter is to give literature review on system requirements and to explain
how other authors explain the process involved in discovering and documenting these system
requirements, (Pearson, 2011). When you have read this chapter you will meet with the following
sub-titles explaining the whole system requirements engineering: the concepts of functional and
non-functional requirements, requirements specification, requirements elicitation/gathering and
analysis, the principal requirements engineering activities of validation, and the relationships
between these activities.
The process of finding out, analyzing, documenting and checking these services and constraints is
called requirements engineering. A requirement is simply a high-level, abstract statement of a
service that a system should provide or a constraint on a system. At the other extreme, it is a
detailed, formal definition of a system function. Davis (1993) explains why these differences exist:
If a company wishes to let a contract for a large system development project, it must define its
needs in a sufficiently abstract way that a solution is not predefined.
21
what the system should not do. A user requirement concerned with security, such as a
statement limiting access to authorized users, may appear to be a nonfunctional
requirement. However, when developed in more detail, this requirement may generate
other requirements that are clearly functional, such as the need to include user
authentication facilities in the system.
This shows that requirements are not independent and that one requirement often
generates or constrains other requirements. The system requirements therefore do not just
specify the services or the features of the system that are required; they also specify the
necessary functionality to ensure that these services/features are delivered properly. These
functional user requirements define specific facilities to be provided by the system.
In principle, the functional requirements specification of a system should be both
complete and consistent. Completeness means that all services required by the user
should be defined.
3.1.2. Non-functional requirements, these are constraints on the services or functions offered
by the system. They include timing constraints, constraints on the development process,
and constraints imposed by standards. Non-functional requirements often apply to the
system as a whole, rather than individual system features or services. They may relate to
emergent system properties such as reliability, response time, and store occupancy.
Alternatively, they may define constraints on the system implementation such as the
capabilities of I/O devices or the data representations used in interfaces with other
systems. Non-functional requirements, such as performance, security, or availability,
usually specify or constrain characteristics of the system as a whole. Non-functional
requirements are often more critical than individual functional requirements. The
implementation of these requirements may be diffused throughout the system.
Non-functional requirements may affect the overall architecture of a system rather than
the individual components. For example, to ensure that performance requirements are
met, you may have to organize the system to minimize communications between
components.
22
have some direct or indirect influence on the system requirements. Stakeholders include end-users
who will interact with the system and anyone else in an organization who will be affected by it.
Other system stakeholders might be engineers who are developing or maintaining other related
systems, business managers, domain experts, and trade union representatives. Each organization
will have its own version or instantiation of this general model depending on local factors such as
the expertise of the staff, the type of system being developed, the standards used, etc.
The process activities are:
a) Requirements discovery this is the process of interacting with stakeholders of the system
to discover their requirements. There different methodologies used in requirement
discovery. These are interviews and observation and use scenarios and prototypes.
b) Requirements classification and organization.
c) Requirements prioritization and negotiation inevitably, when multiple stakeholders are
involved, requirements will conflict.
d) Requirements specification.
3.4. REQUIREMENTS VALIDATION
According to (Sommerville et al., 1998), Requirements validation is the process of checking that
requirements actually define the system that the customer really wants. It overlaps with analysis
as it is concerned with finding problems with the requirements. Requirements validation is
important because errors in a requirements document can lead to extensive rework costs when
these problems are discovered during development or after the system is in service.
The cost of fixing a requirements problem by making a system change is usually much greater
than repairing design or coding errors.
During the requirements validation process, different types of checks should be carried out on the
requirements in the requirements document. These checks include:
a) Validity checks: A user may think that a system is needed to perform certain functions.
However, further thought and analysis may identify additional or different functions that are
required.
b) Consistency checks: Requirements in the document should not conflict. That is, there should
not be contradictory constraints or different descriptions of the same system function.
24
c) Completeness checks: The requirements document should include requirements that define
all functions and the constraints intended by the system user.
d) Realism checks: Using knowledge of existing technology, the requirements should be
checked to ensure that they can actually be implemented. These checks should also take
account of the budget and schedule for the system development.
e) Verifiability: To reduce the potential for dispute between customer and contractor, system
requirements should always be written so that they are verifiable.
There are a number of requirements validation techniques that can be used individually or in
conjunction with one another:
a) Requirements reviews: The requirements are analyzed systematically by a team of reviewers
who check for errors and inconsistencies.
b) Prototyping: In this approach to validation, an executable model of the system in question is
demonstrated to end-users and customers. They can experiment with this model to see if it
meets their real needs.
c) Test-case generation: Requirements should be testable. If the tests for the requirements are
devised as part of the validation process, this often reveals requirements problems. If a test
is difficult or impossible to design, this usually means that the requirements will be difficult
to implement and should be reconsidered. Developing tests from the user requirements
before any code is written is an integral part of extreme programming.
25
CHAPTER FOUR
ANALYSIS OF STUDY
4.0.INTRODUCTION TO ANALYSIS
This chapter analyzes different skills acquired, theories learnt in class with what is happening in
the market, experience gained, problem faced and skills lacked during the field practical training
at attained at Catholic University of Health and Allied Science (CUHAS).
4.1.RELATIONSHIP BETWEEN CLASS KNOWLEDGE AND IN MARKET
Although we learn more in class but there is rapid fluctuation of technology. Every day new
technology are being discovered. This changes in order to go with it, there is need of more effort
to be implemented on learning the new technology. This is why there is gaps and problems raised
during field practical training. The theories leant in class help us to open the knowledge of how is
in the market environment.
4.2.SKILLS LEARNT DURING PRACTICAL TRAINING
The following are the skills which I acquired during my field work at Catholic University of Health
and Allied Science.
Computer System Management Skills
There is a clear need to manage systems at all levels. Due to this field training help me to know
how to manage the systems which aim at achieving something system desirable results to the users.
There is a need of managing systems also in the following aspects on system: Risk evaluation,
Backup systems, Particular problems of distributed environments, Importance of good record
keeping and Importance of good communications.
System Development and PC Maintenance Skills
System development need a carefully built, usually by following a project development
methodology that encompasses the life cycle of a project from start to finish. A Web site is never
finished. There are always errors or omissions that were maintained during the development
process. Clients usually find many new uses for a Web site once they have one and request
modifications, additions, and new sections (this is called site maintenance). So at this point, the
project team identifies the new opportunity or enhancement and begins another loop through the
development process.
26
4.3.SKILLS LACKING
However, the following are the skills that I currently lacking according to the organization
environment:
Technical Job Skills
This refers to the talent and expertise a person possesses to perform a certain job or task. Also
called "hard skills," as opposed to soft skills, which are personality and character traits. Example,
this lay on system development technological changes. New technology arise every day, this make
us to still behind over system development technology.
PC Maintenance Skills
PC maintenance seen to be problem, because some of assigned work was not collect well done due
to low knowledge to it.
27
CHAPTER FIVE
CONCLUSION AND RECOMMANDATION
5.0.INTRODUCTION
This chapter gives up the conclusion and recommendation on all about field work practice and the
all written in this report. The field work is about the activities done and the skills acquired during
exercise at Catholic University of Health and Allied Science (CUHAS). The conclusion that
contain the major strengths and weaknesses of the field attachment program and benefits derived
from the field attachment program and recommendation part, concerning improving the gaps in
teaching theory and practice and the suggestions to improve the program in planning and
operational logistic.
5.1.CONCLUSION
Accordingly, practical training is imperative, for it is of paramount to both students and to the
institute as a whole. It enhances students to learn and understand many practical training programs
which are not covered in institute and provides the ground for students to strengthen the theoretical
knowledge obtained in classes into practice necessary for their carriers therefore, students can
integrate their theory into practice.
The training exposes students to new challenges and enables students to experience different
working environments before they are actually employed upon completion of their studies.
During my practical training, it has been quite an experience for me to work with IT Department,
by being placed in this organization, I became familiar with the working environment through
understanding its major services, and its activities performed to deliver quality service to their
customers.
Computer System Management, due to changes in technology and advancement of Information
Technology, the Institute has to adopt these changes by restructuring teaching methods of
Computer System courses and supply sufficient project activities to student because the activities
will drive students to meets the organization needs.
28
5.2.RECOMMENDATION
Recommendation to CUHAS
Catholic University of Health and Allied Science (CUHAS) as a university should keep records
through system and not manual as some record are kept manual.
Recommendation to the IFM
As a professional trainee in the IT department at IFM, such opportunity should go with maximum
support to the student on practice with the purpose of integrating the theoretical knowledge and
the working atmosphere in order to create and provide practical learning experience which will
enhance creativity and understanding towards challenges within the profession, Which is basically
achieved through collaborative supervision and unconditioned consultation. Also the institute
should offer more project activities.
29
REFERENCES
1. Whitten and Bentley (2007), System, Analysis and Design Methods, 7th Edition, McGrawHill.
2. Davis, A. M. (1993). Software Requirements: Objects, Functions and States. Englewood
Cliffs, NJ: Prentice Hall.
3. HOOFFER, J. et al. (2006), Modern System Analysis and Design, Dorling Kindersley,
New Delhi.
4. LEE, B. (2003), Introducing System Analysis and Design, Neercy Galgotia, New Delhi
5. CRINNION, J., (1991), Evolutionary Systems Development, a practical guide to the use
of prototyping within a structured systems methodology, Plenum Press, New York.
6. Ian Sommerville. (Pearson 2011), Software Engineering 9th Edition, BBS.
7. Kotonya, G. and Sommerville, I. (1998). Requirements Engineering: Processes and
Techniques.
8. Stevens, P. and Pooley, R. (2006). Using UML: Software Engineering with Objects
andComponents, 2nd ed. Harlow, UK: Addison Wesley.
30