Mary Attachment Report
Mary Attachment Report
Mary Attachment Report
By :
Submission date:
1
Declaration
2
Dedication
I would like to dedicate this report to my family,friends, my fellow interns, officers at ICT
department and all those who supported me through the internship period to gain more
experience.
3
Acknowledgement
I would like to thank God for the gift of life and protection that He has given me throughout to
this moment.
I also thank my family and friends for the support throughout the internship period. Thanking
University of Meru management for giving me that chance to build my career and gaining more
skills.
4
Abstract
This report is a summary of my internship period. It basically states the activities and encounters,
the things I achieved and how I got to apply skills learnt in class to practice. In addition it also
states some of the challenges that I encountered during that period.
5
TABLE OF CONTENT
Contents
Declaration.................................................................................................................................................2
Dedication..................................................................................................................................................3
Acknowledgement.....................................................................................................................................4
Abstract......................................................................................................................................................5
CHAPTER ONE..............................................................................................................................................8
1.0 Introduction.......................................................................................................................................8
1.1 Background information of the organization.................................................................................8
1.2 The ICT Department.......................................................................................................................8
Introduction.........................................................................................................................................9
1.3 Functions Delegated to me within the Department....................................................................11
1.4 Contacts and physical location.....................................................................................................12
1.5 Mission, Vision and core values...................................................................................................12
Vision.................................................................................................................................................12
Mission..............................................................................................................................................12
Core Values........................................................................................................................................12
CHAPTER TWO...........................................................................................................................................13
2.0 Introduction.....................................................................................................................................13
2.1 UNISON SACCO ICT Department..................................................................................................13
2.2 MANDATE:...................................................................................................................................14
2.3 OBJECTIVES..................................................................................................................................14
CHAPTER THREE........................................................................................................................................15
SITUATION ANALYSIS OF UNISON SACCO NANYUKI..............................................................................15
3.0 INTRODUCTION............................................................................................................................15
3.1 STRENGHTS..................................................................................................................................15
Adoption of ICT..................................................................................................................................16
6
Availability of Resources....................................................................................................................16
Self-motivation and dedicated staffs.................................................................................................16
3.2 WEAKNESS...................................................................................................................................16
3.3 OPPORTUNITIES...........................................................................................................................17
3.4 THREATS......................................................................................................................................17
CHAPTER FOUR..........................................................................................................................................18
4.0 Duties...........................................................................................................................................18
4.1 Hardware, Software and information systems..........................................................................18
CHAPTER FIVE............................................................................................................................................19
5.0 Conclusion...................................................................................................................................19
5.1 Significance of the course............................................................................................................19
5.2 Signifance of the student learning...............................................................................................19
5.3 Critiques of the organization.......................................................................................................19
5.4 Recommendations.......................................................................................................................20
5.5 References...................................................................................................................................20
7
CHAPTER ONE
1.0 Introduction
The county shares its borders with several neighboring counties, including Samburu County to
the North, Isiolo County to the North East, Meru County to the East, Nyeri County to the South
East, Nyandarua County to the South, Nakuru County to the South West, and Baringo County to
the West.
Economically, Laikipia County thrives primarily through tourism and agriculture. The
agricultural sector is characterized by the cultivation of grain crops, ranching, and greenhouse
horticulture. The county's landscape encompasses the elevated and arid Laikipia Plateau, and it
experiences a cool, temperate climate with distinct rainy and dry seasons. The county shares its
borders with Nyandarua, Nyeri, Samburu, and Baringo counties.
Within the county, you'll find the Laikipia West Constituency, which serves as an electoral
constituency in Kenya. Among the three constituencies in Laikipia County, it was established for
the 1966 elections.
Introduction
In an overall sense, the ICT Department is responsible for providing the infrastructure for
automation. It implements the governance for the use of network and operating systems, and it
assists the operational units by providing them the functionality they need.
It's important to note that although the IT department implements and facilitates the flow of
information, it doesn't create the policy that defines which information is correct or accessible to
others.
Governance refers to the implementation of operational parameters for working units and
individuals' use of IT systems, architecture, and networks. The governance of the master data is
8
based on workflow processes that integrate business rules and subject matter domain expertise.
This is part of the conventional IT security as well as the data assurance for which the IT
department is also responsible.
Infrastructure refers to the hardware components, the network, the circuitry, and all other
equipment necessary to make an IT system function according to the established needs and
system "size" of the company.
Functionality is perhaps the most apparent task performed by the IT department. It refers to
creating and maintaining operational applications; developing, securing, and storing electronic
data that belongs to the organization; and assisting in the use of software and data management
to all functional areas of the organization.
IT Network Responsibilities
The IT department oversees the installation and maintenance of computer network systems
within a company. This may only require a single IT employee, or in the case of larger
organizations, a team. Its primary function is to ensure that the network runs smoothly.
The IT department must evaluate and install the proper hardware and software necessary to keep
the network functioning properly. This includes working within a budget that allocates the
amount of money the company can afford on network devices and software. The IT department
must make sure that the equipment it invests in both optimally serves the needs of the company
without going over budget.
Networks can be simple or extremely complex depending upon their size and composition. In
addition to staying current on trends within business technology, employees may require college
degrees in a computer field to adequately handle the issues that arise in maintaining such a
network.
Network Contingencies
Should a network system go down, the repercussions can be costly -- not just to the company and
its operations, but outside entities that require products or services from the company. These
outside entities could be affected and lose faith in the company's ability to provide them with
what they need. The IT department must put a crisis plan in place that can be implemented
should the system go down. It must be designed to put the network back up quickly or allow it to
switch over to an alternate system until the necessary repairs are completed.
Through the maintenance and planning of a network system, the IT department must forge
professional relationships with outside vendors and industry experts. This helps the department
employees perform their duties more efficiently as well as stay current on the latest technology
that might be beneficial to the company for which they work.
9
Application Development
Quite often, companies see the main role of the IT department as creating the applications that
serve its core business needs. The right applications allow a business to be innovative, more
productive, efficient, and to move ahead of its competitors. In many ways, this makes the IT
department crucial to the success of a business.
The expertise necessary to create the applications that can set a business apart from the others
requires an IT department with programmers, analysts, interface designers, database
administrators, testers, and other professionals. These employees become quite knowledgeable
about the operations of the business itself. As a result, they become valuable to other
departments outside IT.
Telephony
Most people are aware that the IT department focuses on the success of computer operations and
other information technologies needs within a business. However, with many new forms of
electronic communication replacing older technology, communication is being redefined and is
now referred to as "telephony." This includes point to point phone calls as well as conference
calls. Video and web conference also fall under this category and include other forms of
technology necessary to facilitate communication: network drives, electronic mail (email), and
secures servers.
The IT department must fully understand how these systems work and interact with each other.
The department must also ensure that these systems remain operational at all times.
Company Website
The IT department is responsible for creating and maintaining the company's website. It designs
the layout, creates the code, and tests the site for usability. Depending upon the needs of the
company, the IT department can design the site for information only, or create a completely
interactive commercial site that can sell products directly to consumers.
Technical Support
Employees are familiar with having to contact the IT department for computer support. The IT
department provides this service for all the users who need access to the company's computer
systems. This might entail installing new software or hardware, repairing hardware that has
become faulty, training employees in the use of new software, and troubleshooting problems
with the system or with an individual's computer.
It's apparent that not all the IT department does is apparent - it creates and maintains so many
systems that go unseen or unrecognized by employees. These services, however, are integral to
the success of a business. Though they may not be appreciated when business is running
10
1.3 Functions Delegated to me within the Department
Governance refers to the implementation of operational parameters for working units and
individuals' use of IT systems, architecture, and networks. The governance of the master data is
based on workflow processes that integrate business rules and subject matter domain expertise.
This is part of the conventional IT security as well as the data assurance for which the IT
department is also responsible.
Infrastructure refers to the hardware components, the network, the circuitry, and all other
equipment necessary to make an IT system function according to the established needs and
system "size" of the company.
Functionality is perhaps the most apparent task performed by the IT department. It refers to
creating and maintaining operational applications; developing, securing, and storing electronic
data that belongs to the organization; and assisting in the use of software and data management
to all functional areas of the organization.
An important point to note that was accorded to me by my supervisors; nothing would leave the
office without the permission of the supervisor.
Network responsibility
Network contingencies
Application development
Telephony.
Technical support.
Pc maintenance and repair.
11
1.5 Mission, Vision and core value
Vision
"To become a benchmark Sacco that fulfills its constitutional responsibility to the members of
Unison Sacco Nanyuki."
Mission
"We are dedicated to enhancing the financial, social, and personal growth of our members by
providing effective financial services, exceptional customer support, and sustainable growth."
Core Values
At Unison Sacco Nanyuki, we uphold the following principles:
Unity in Diversity: We recognize that our Sacco consists of members from various
backgrounds, all collaborating harmoniously for mutual growth. We operate within this
diverse environment.
Integrity: We are committed to serving all our members with fairness, refraining from
exploiting vulnerabilities or special abilities, ensuring integrity in every interaction.
Collaboration: We emphasize teamwork and collaboration to achieve collective goals,
united in purpose to deliver favorable outcomes.
Impartiality: We treat every member equally, regardless of their background or
capabilities, fostering an environment of equality and respect.
Responsiveness: Our priority is to act efficiently and effectively in all our services,
focusing on prompt and impactful service delivery.
These values guide us as we strive to provide the best possible financial services to our members at
Unison Sacco Nanyuki.
12
CHAPTER TWO
2.0 Introduction
This chapter clearly brings out the management structure in Nyahururu Deputy
Commisioners Offices and more specifically the management in the institutional Information
Technology Services department in which I was operating.
2.2 MANDATE:
The department's mandate rest's on the ICT functions which entails ensuring and maintaining
ICT standards within institution.
It further involves facilitating rapid national economic growth and development through
appropriate application of Information Communication Technology for sustainable performance
improvement, increase productivity/communications and provision of quality public services
13
2.3 OBJECTIVES
14
CHAPTER THREE
3.0 Introduction
This section provides an analysis of the strengths, weaknesses, threats, and opportunities facing
Unison Sacco Nanyuki in its day-to-day operations. These factors encompass both internal and
external elements that either facilitate or impede the organization's performance.
3.1 Strengths
Qualified and Skilled Staff: Unison Sacco Nanyuki boasts a team of well-qualified and skilled
employees who possess extensive expertise and experience in their roles. The Sacco emphasizes
regular in-house training, ensuring that its staff members are well-prepared to navigate and
manage the intricacies of the organization.
Resource Abundance: Unison Sacco Nanyuki is equipped with abundant resources that, when
effectively utilized, could significantly enhance its performance and outcomes. This resource
pool provides a competitive edge and an avenue for efficient implementation of its initiatives.
Motivated and Dedicated Team: The staff at Unison Sacco Nanyuki is characterized by self-
motivation and dedication to their roles, resulting in a workforce that is committed to delivering
excellent service.
3.2 Weaknesses
Skill Shortages: The Sacco faces a challenge of inadequate skills due to the evolving nature of
work within the financial sector. Remedying this, the Sacco has initiated a staff training program
to equip employees with the necessary skills.
Inefficient Working Systems: The existence of multiple systems performing similar tasks
complicates operational processes, hampering smooth workflow. Integrating these systems into a
unified and functional platform would streamline operations.
3.3 Opportunities
Government Policies: Unison Sacco Nanyuki can benefit from favorable financial policies
enacted by the county government, as these policies provide a conducive environment for the
organization to enhance its service delivery using modern information technology.
15
Access to External Support: The Sacco is well-positioned to tap into external support,
including financial, technical, and human resources, through partnerships and collaborations.
This support can bolster the Sacco's ability to fulfill its responsibilities effectively.
By recognizing and addressing these factors, Unison Sacco Nanyuki can navigate its operational
landscape more effectively, leveraging its strengths and opportunities while mitigating
weaknesses and threats.
3.4 THREATS
Power Outage
A power outage (also called a power cut, a power out, a power blackout, power failure or a
blackout) is a short-term or a long-term loss of the electric power to a particular area. Whenever
there is a power outage the computer lab and the whole organization stand still. All the machines
go off which at times causes loss of unsaved work from the staff.
Many are the times that internet connection is low or even when there is no connection at all.
Hence, most of the operations that depend on internet are slowly processed or not done at all.
CHAPTER FOUR
4.0 Duties
The ICT department carried out a number of tasks in the various sub-departments. I was at the
user’s support department where I carried out maintenance work to faulty computers. In addition,
I was also involved in the setting up of switches for networking, server monitoring, internet
connection purposes and also printers that had faults in printing.There was also the installation
of various softwares like Microsoft office, linux, Adobe Reader and many more that enable the
workers and students to carry out their duties efficiently.
16
In summary the internship helped me apply my hardware and software skills in addition to my
knowledge acquired in school. Also the period of internship provided me with the opportunity to
practice my communication skills and build healthy relationships.
As for hardware, when we carried out some maintenance work, I was able to dust the harddisks,
disk drives, I assembled new compute and also upgraded RAM in three computers.
The information systems there included people, that is the network engineers who helped during
networking, the end-users that is students and staff who gave response to the various systems in
use, the hardware and softwares used also contributed to this systems.
CHAPTER FIVE
5.0 Conclusion
The attachment period was significant to me because some of the things learned in class were
well understood after i applied them practically. In addition, it was a great opportunity to relate
with my fellow attachees and exchange knowledge, and by so doing I learned something new
everyday.
17
5.1 Significance of the course
My course was related to the attachment field that is Unison Sacco Nanyuki ICT department and
hence everything i did was significant as it was just putting into practice what i had learnt in
class while acquiring new skills. I got a chance to apply the hardware and skills attained in class
to the organization. In the business field, I got a chance to see some of the areas that could be
improved through automation of the system.
5.4 Recommendations
What i would recomend is for the employees to be open and let attachees take up certain tasks as
that is the only way to learn, practically. Mistakes help us know how to rectify a certain problem
if it occurs again in a different place.
As for the reluctancy in approval of certain suggestions, people should put their individual
interests aside from the interests of the majority.
5.5 References
1. Official Website of Unison Sacco Nanyuki: http://www.unisonsacco.co.ke
2. Unison Sacco Nanyuki ICT Department: Information provided internally.
18