to the Department of Computer Science and Engineering, Daffodil International University, has been accepted as satisfactory in partial fulfillment of the requirements for the degree of B.Sc. Department of Computer Science and Engineering Faculty of Natural Sciences and Information Technology Påskelilje International University. Gazi Zahirul Islam, Assistant Professor, Daffodil International University's Department of Computer Science and Engineering, in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering.
Gazi Zahirul Islam, Assistant Professor, Department of Computer Science and Engineering, Daffodil International University, Dhaka, for his constant support. I am grateful to Creative IT Institute for providing me with an internship opportunity with their IT operations team. Touhid Bhuiyan, Head of the Department of CSE, as well as other academics and staff of Daffodil International University's CSE Department, for their help in completing my internship.
The Creative IT Institute is a place where we strive to provide a high level of learning to the community. One of the main functions of the IT solutions sector is the maintenance of devices connected to the Internet.
Internship Object
Introduction to the Company
Has empowered more than 1500 women to become self-reliant through completely free IT scholarships. Creative IT Institute has made 100 senior citizens proficient in IT by providing full free scholarships. Meanwhile, Creative IT Institute is successfully working as an academic partner with the National Parliament of the People's Republic of Bangladesh, Ministry of Information and Communication Technology, Ministry of Women and Child Affairs, Bangladesh Computer Council and East Oxford Dhaka University and other reputed universities and colleges.
The Creative IT Institute moves forward with the firm belief of creating a skilled population in the field of IT as well as transforming the population into human resources, including the elimination of unemployment.
Report Layout
Organization Profile
About Creative IT Institute
Mission of Creative IT Institute
Vision of Creative IT Institute
Management Structure
Main Services of Creative IT Institute
Sister Concern of Creative IT Institute
Task Project and Activities
Daily Task and Activities
Event and Activities
Project Task and Activities
- Router Troubleshoot
Once we know how many computers we need to connect, the electrical wiring can be cut according to our needs, we can patch the RJ45 connector, and all the computers can be connected to the network switch. To start, I need a TP-Link router to connect to learn how to set up a TP-Link router. With my laptop, I go to the Wi-Fi menu, search for TP-Link, then click and enter the password to connect to the router.
Once the Win Box login page opens, we type in the password as well as the login name or ID, as well as the MikroTik router's IP or Mac address. After you enter the MikroTik router, the Dashboard appears. In addition, I also studied typical troubleshooting techniques such as issues connecting to the Internet, computer viruses, DNS problems, ping, IP configuration, Blue Screen of Death, DLL file not found, application running very slowly, malware problem and internet network connection problem , among others. Sometimes we can't connect to the internet but stay connected to the network.
This issue can't connect to the internet but stays connected to the network. You can connect your computer or laptop to the Internet after completing all this work [8]. Although sometimes we cannot visit any websites, we can still connect to the network.
Type "ipconfig" at the command prompt. Then you will be able to determine the IP address of any computer. The error is also known as "INACCESSIBLE but device", so let's take a look at the inaccessible yet device error/Blue Screen of Death scenario.
FTP Transfer
Remote Maintenance
- Using Team Viewer
Campus Support
- Adding a new application user to a domain on the server
- Moving application users to different campus
- Adding new e-mail user to Server domain
- In a network domain, resetting an e-mail user's password
- Installation of software on a remote computer
Reselect the user in the User folder, add a new swap activity, and then add specific additional attributes.
Hardware Support
- Introducing a new user to a computer
- Exporting data from one hard disk device to another
When a new computer is delivered, all components are installed as instructed or transported for the main hardware inspection. During the initial check, the computer is checked for component defects, malfunctions, conflicts and other problems. Components are cleaned to remove dirt and dust particles before being delivered for installation with the software.
When it is run for the first time after installing the operating system, according to the IT policy, the computer is given a name that corresponds to the user. The drivers for the graphics card, sound card, chipset and network card are installed on the motherboard. Antivirus software, Office document editor, PDF reader, file compression software, remote access software, relevant banking software and so on are all necessary office software.
The computer is checked again for problems after all hardware and software installations are completed, and if no problems are found, it is sent to the appropriate branch office for the new user. Turned off the power to the CPUs storing the source and destination hard disks. Using the SATA / IDE interface, connected to the chassis CPU that carries the target hard disk.
A converter is used if the two hard drives do not have the same connection ports. Which is connected to the central processing unit of the target USB (Universal Serial Bus). You must ensure that the target CPU's hard drive is set to the highest priority boot device.
After you turn on the computer, the source hard drive partitions appear as separate logical drives in addition to the logical drives in a computer. The required information is then sent from the source hard drives to the logical drives with the required free space on the destination hard drives. The target computer will be turned off and the source hard drive will be disconnected from the target computer once the data transfer is complete.
Network Surveillance
- Host addition using Pine composer (PICO)
Challenges
Competencies and a Well-Planned Strategy
Earned Competencies
Smart Plan
Reflection
Conclusion and Future Career
Conclusions and Discussions
Scope for the future Career