Thursday, 21 September 2017
Friday, 9 June 2017
MOBILE APPLICATIONSANDAGRICULTURAL KNOWLEDGE OF SMALLHOLDER FAMERS IN KURA LOCAL GOVERNMENT, KANO STATE, NIGERIA
MOBILE APPLICATIONSANDAGRICULTURAL KNOWLEDGE OF SMALLHOLDER FAMERS IN KURA LOCAL GOVERNMENT, KANO STATE, NIGERIA
ABSTRACT
This study investigated the relevance of mobile applications in enhancing the agricultural knowledge of smallholder farmers in Kura local government, Kano State, Nigeria. The study was guided by the following objectives: i) to assess the relevance of mobile phones applications in agriculture to smallholder farmers in Kura local government, and ii) to find out the relevance of mobile phones applications in enhancing agriculture knowledge among smallholder farmers in Kura local government. The study used a cross-sectional survey design. The target population was 168,1760 people and the sample size was 384 respondents. The response rate of 73% gave a final participant population of 280 respondents. The main research instrument was questionnaires. Data was analyzed using frequency and percentage tables. The study found that smallholder farmers use mobile phones mostly for making calls (85%), entertainment (50%), making transactions (45%), and social media (40%).Furthermore, the study found that mobile phones seem to be relevant to smallholder farmers to research about market prices (65%), making calls to customers and other farmers (50%), and to get information about the market and availability of different commodities (50%). The study concluded that mobile phones can help smallholder farmers in Kura local government to improve their agricultural productivity by giving them access to basic financial services, new agricultural techniques, and new markets, in turn helping them to secure better prices for crops and better return on investments. As their income improves with each harvest, they can invest in better seeds, fertilizers, and chemicals
This study investigated the relevance of mobile applications in enhancing the agricultural knowledge of smallholder farmers in Kura local government, Kano State, Nigeria. The study was guided by the following objectives: i) to assess the relevance of mobile phones applications in agriculture to smallholder farmers in Kura local government, and ii) to find out the relevance of mobile phones applications in enhancing agriculture knowledge among smallholder farmers in Kura local government. The study used a cross-sectional survey design. The target population was 168,1760 people and the sample size was 384 respondents. The response rate of 73% gave a final participant population of 280 respondents. The main research instrument was questionnaires. Data was analyzed using frequency and percentage tables. The study found that smallholder farmers use mobile phones mostly for making calls (85%), entertainment (50%), making transactions (45%), and social media (40%).Furthermore, the study found that mobile phones seem to be relevant to smallholder farmers to research about market prices (65%), making calls to customers and other farmers (50%), and to get information about the market and availability of different commodities (50%). The study concluded that mobile phones can help smallholder farmers in Kura local government to improve their agricultural productivity by giving them access to basic financial services, new agricultural techniques, and new markets, in turn helping them to secure better prices for crops and better return on investments. As their income improves with each harvest, they can invest in better seeds, fertilizers, and chemicals
Keywords – Cell Phone, Contact, Production, and Smallholder farmers.
LAYER 3 MULTI-PROTOCOL LABEL SWITCHING BASED ON VIRTUAL PRIVATE NETWORK
LAYER 3 MULTI-PROTOCOL LABEL SWITCHING BASED ON VIRTUAL PRIVATE NETWORK
ABSTRACT
This research was devoted to the design of a Layer 3 Multi-protocol Label Switching based on Virtual Private Networks, which is one of the major key technology of Service Providers' Services for corporations who desire to use remote connectivity.
In spite of the complexity of the underlying architecture of Layer 3 Multi-Protocol Label Switching, it was easy to configure and maintain a Virtual Private Network with Layer 3 Multi-Protocol Label Switching as it is flexible and omnipresent in internet service provider`s network
To attain the objectives of this research, we used GNS3, a Graphical Network Simulation tool used by network structural engineering for simulating a real world scenario. A number of steps for configuring various routers and firewall were followed in order to come up with a simple Virtual Private Network structure consisting of two Provider Edge routers, two Provider routers, and four Customer Edge routers.
All configurations were accurate configure, including complete routing tables and end-to-end connectivity verification using the Ping command. The designed implementation is through the Internet Service Provider (ISP).
Therefore, the research would lead to lower costs of the network infrastructure while benefiting from the advantages of fiber optic connectivity among others.
This research was devoted to the design of a Layer 3 Multi-protocol Label Switching based on Virtual Private Networks, which is one of the major key technology of Service Providers' Services for corporations who desire to use remote connectivity.
In spite of the complexity of the underlying architecture of Layer 3 Multi-Protocol Label Switching, it was easy to configure and maintain a Virtual Private Network with Layer 3 Multi-Protocol Label Switching as it is flexible and omnipresent in internet service provider`s network
To attain the objectives of this research, we used GNS3, a Graphical Network Simulation tool used by network structural engineering for simulating a real world scenario. A number of steps for configuring various routers and firewall were followed in order to come up with a simple Virtual Private Network structure consisting of two Provider Edge routers, two Provider routers, and four Customer Edge routers.
All configurations were accurate configure, including complete routing tables and end-to-end connectivity verification using the Ping command. The designed implementation is through the Internet Service Provider (ISP).
Therefore, the research would lead to lower costs of the network infrastructure while benefiting from the advantages of fiber optic connectivity among others.
Friday, 28 April 2017
Where do I start?, How to get into Cyber security world”
Where do I start? What are my options? Why does the same job have over 5 different titles? asked those very same questions by friends and graduates trying to break into the field. In this article, I will attempt to not only answer these questions but to also provide guidance to those looking to gain entry to the field and grow their career.
Red Team members, traditionally consisting of Penetration Testers and Security Auditors, are the folks who are hired to break into your company’s network and expose the security flaws that company has. This is the “Offensive Security” team; the Ethical Hackers. This is the team that tends to draw the media spotlight and that most people gravitate towards because it seems to be the most fun.
Blue Team members, in contrast, are those tasked with the job of Defensive Security. These team members include Security Analysts, Engineers, Forensics Specialists and Incident Handlers. These are the team members that are on the company’s front lines helping to defend it from Cyber Attack and monitor the system logs trying to catch potential intrusions and prevent Malware outbreaks. This is the side of the field that I reside on, for the most part.
In order to build a strong foundation, I always recommend that anyone start off their journey by pursuing the CompTIA Security + certification. As the study material is basically taken from the CISSP exam and watered down, covering a wide variety of basic security concepts that you will need to have fluency over no matter which career path you pursue. Note that it is also possible to start off with the CISSP Associate level exam, and in most cases would be more worthwhile than pursuing the Security+ certification; be aware that the test, however, is much more advanced and will require multiple months of dedicated studying.These will help you get past the initial HR resume filter if you don’t have prior experience or a Bachelor’s Degree in Computer Science or Cybersecurity. Additionally, these certifications meet the Department of Defense Directive 8140 requirement for entry level positions and are well worth the investment either path you take.
It is also helpful to have a background in basic scripting or programming. Even if you are like me and cringe at the thought of having to write code, it is a necessary part of any security professional’s toolkit. The language that you choose doesn’t matter as much as the ability itself, as the syntax of a new language can quickly be picked up. The key point of the matter is that it will be useful to script tasks for automation. My recommendation is Python, Perl or Bash. It will also help to have a basic understanding of Unix/Linux and command line interfaces.
Study Material
Scripting:
https://www.codecademy.com/
https://www.cybrary.it/course/python/
Additionally, once you have a good foundation in the field I highly encourage you to take the Offensive Security Certified Practitioner (OSCP) course from the company “Offensive Security” and take the certification. It totals around $1,000 and is hands on and challenging, but is considered a Gold Standard in Penetration Testing and it is arguably the best course out there to learn Penetration Testing. The reason that I encourage you to build up a solid foundation before pursuing this course is in order to make your life easier. I know a few people who started off in Penetration Testing by taking the OSCP course and succeeded; though these people already had multiple years of experience in a different branch of security. I myself intend to take this course and certification in the near future, even though I reside on the Blue Team.
Penetration Tester / Ethical Hacker: These are security consultants that are hired to break into and exploit networks and systems. Additionally, these are the professionals that are hired in the Government sector for Cyber Warfare and Intelligence. Also, hoodies are mandatory.
Introduction to Metasploit
https://www.cybrary.it/course/metasploit/
Post Exploitation Hacking
https://www.cybrary.it/course/post-exploitation-hacking/
Vulnhub
https://www.vulnhub.com/
Web Application Hacker / Penetration Tester: (Often overlaps with the traditional Pen Tester). These are the security consultants that are hired to find bugs and flaws with web applications. Or are part of a Pen Test team that uses Web Applications as an avenue of getting system level access on a server.
Web Application Hackers Handbook
Web Application Hackers Handbook: Finding and Exploiting Security Flaws
Web Hacking 101
https://leanpub.com/web-hacking-101
Bug Bounty Forum
https://bugbountyforum.com/resources/
Note that any of the below jobs can pop up as “IT Security xxx”, “Cybersecurity xxx”, “Security xxx”, “Security Operations xxx” or some other strange variation. This is in large part due to a lack of standards in the industry. Due to the large variations in job titles, I’ve tried to group the core aspects of Defensive Security down into a few fields. I’ve put together my own explanation of what each field entails, and a few low-cost references that will aide you on your journey into the specialization. I encourage you to research the fields that interest you further in order to construct a fuller picture.
Network Security / Threat Analyst: Reviews logs and network traffic in order to correlate data into potential threats. Uses IOC’s from threats in order to discover if they exist in the network or not. Monitors the security tools and runs vulnerability remediation.
Applied Network Security Monitoring
Intro to Threat Intelligence
https://www.cybrary.it/course/intro-cyber-threat-intelligence/
The Practice of Network Security Monitoring
Forensics / Incident Response: First responders in the event of a breach. These are the teams that will take forensic images of compromise hosts, review the threat vector used (Malware, PowerShell, etc.) and construct a timeline.
Computer Forensics
https://www.cybrary.it/course/computer-hacking-forensics-analyst/
Incident Response and Handling
https://www.cybrary.it/course/incident-response-and-handling/
Memory Forensics
Malware Analyst: Analyzes Malware and Suspect Malware found on the network in order to determine Indicators of Compromise (IOC’s).
Introduction to Malware Analysis
https://www.cybrary.it/course/malware-analysis/
Malware Analysts Cookbook
https://www.amazon.com/Malware-Analysts-Cookbook-DVD-Techniques/dp/0470613033
Practical Malware Analysis
Is there overlap?
Of course! Most organizations, especially in a security program’s early stages, will have their employees wearing multiple hats. And that’s a good thing. The more you do the more exposure you get, and the less likely you are to become burnt out. For example, I work in all categories of the Blue Team, and I get to do some Red Team work on the side.
Blogs and News:
https://krebsonsecurity.com/
https://www.reddit.com/r/netsec/
https://www.hackread.com/
https://arstechnica.com/
http://www.securityweek.com/
http://www.darkreading.com/
Podcasts:
– Recorded Future “Inside Threat Intelligence”
– Risky Business
– The CyberWire
– SANS Internet Stormcast
Introduction to the Security Field
As anyone who works in security knows, the field itself is extremely broad and we often need to have knowledge of facts outside of our immediate domain. For example, it is helpful for someone running a Vulnerability Management program on their company’s Blue Team to have an understanding of how a Red Team member might exploit this vulnerability and the impact that would pose. Red Team and Blue Team are two phrases that you will run into often, what they refer to is Offensive and Defensive Security.Red Team members, traditionally consisting of Penetration Testers and Security Auditors, are the folks who are hired to break into your company’s network and expose the security flaws that company has. This is the “Offensive Security” team; the Ethical Hackers. This is the team that tends to draw the media spotlight and that most people gravitate towards because it seems to be the most fun.
Blue Team members, in contrast, are those tasked with the job of Defensive Security. These team members include Security Analysts, Engineers, Forensics Specialists and Incident Handlers. These are the team members that are on the company’s front lines helping to defend it from Cyber Attack and monitor the system logs trying to catch potential intrusions and prevent Malware outbreaks. This is the side of the field that I reside on, for the most part.
How do I choose?
As far as where to start in Cybersecurity I recommend getting a baseline in the foundational skills as you pursue an entry-level position in the field that appeals to you the most. My advice is that you ask yourself which team appeals to you the most, and then narrow down your choice from there. My second piece of advice is not to limit yourself to one particular area, as often is the case you will find yourself wearing multiple hats anyway. For example, after doing countless hours of research on the internet I decided that I wanted to pursue a career as an analyst. But what kind? Malware analyst, network security analyst, incident response analyst, security operations analyst, the list goes on. I decided to start off looking at a security operations center role, as I was familiar with operations teams and enjoy working collaboratively with others in a group.Foundational Skills and Learning References:
As with anything you want to succeed at in life, mastering the basics is crucial. Before you can become a Professional MMA fighter you first need to learn how to take a proper stance and throw a proper punch. In security, that means gaining a basic understanding of the broad spectrum of security. Do you know what Buffer Overflows, Firewalls, and Host Intrusion Detection Systems are? How about Botnets, Malware, Root Kits, Vulnerabilities, Exploits, and Command and Control Traffic? Encryption, Authentication, and Hashing? How about TCP/IP?In order to build a strong foundation, I always recommend that anyone start off their journey by pursuing the CompTIA Security + certification. As the study material is basically taken from the CISSP exam and watered down, covering a wide variety of basic security concepts that you will need to have fluency over no matter which career path you pursue. Note that it is also possible to start off with the CISSP Associate level exam, and in most cases would be more worthwhile than pursuing the Security+ certification; be aware that the test, however, is much more advanced and will require multiple months of dedicated studying.These will help you get past the initial HR resume filter if you don’t have prior experience or a Bachelor’s Degree in Computer Science or Cybersecurity. Additionally, these certifications meet the Department of Defense Directive 8140 requirement for entry level positions and are well worth the investment either path you take.
It is also helpful to have a background in basic scripting or programming. Even if you are like me and cringe at the thought of having to write code, it is a necessary part of any security professional’s toolkit. The language that you choose doesn’t matter as much as the ability itself, as the syntax of a new language can quickly be picked up. The key point of the matter is that it will be useful to script tasks for automation. My recommendation is Python, Perl or Bash. It will also help to have a basic understanding of Unix/Linux and command line interfaces.
Security:
CompTIA Security +Study Material
Scripting:
https://www.codecademy.com/
https://www.cybrary.it/course/python/
Red Team Jobs and Learning References:
I’ve put together my own explanation of what each field entails, and a few low-cost references that will aide you on your journey into the specialization. I encourage you to research the fields that interest you further in order to construct a fuller picture. The job of an Offensive Security Team Member often entails many different aspects of hacking; traditional computers, IOT Devices, Mobile Devices, Web Applications, etc. While there are many branches to this Team, the core skills lie in traditional Penetration Testing and Web Application Hacking, and as an entry level tester that is where you (in my opinion, others may take a difference stance) should focus your learning efforts.Additionally, once you have a good foundation in the field I highly encourage you to take the Offensive Security Certified Practitioner (OSCP) course from the company “Offensive Security” and take the certification. It totals around $1,000 and is hands on and challenging, but is considered a Gold Standard in Penetration Testing and it is arguably the best course out there to learn Penetration Testing. The reason that I encourage you to build up a solid foundation before pursuing this course is in order to make your life easier. I know a few people who started off in Penetration Testing by taking the OSCP course and succeeded; though these people already had multiple years of experience in a different branch of security. I myself intend to take this course and certification in the near future, even though I reside on the Blue Team.
Penetration Tester / Ethical Hacker: These are security consultants that are hired to break into and exploit networks and systems. Additionally, these are the professionals that are hired in the Government sector for Cyber Warfare and Intelligence. Also, hoodies are mandatory.
RTFM- Red Team Field Manual
The Hacker PlaybookIntroduction to Metasploit
https://www.cybrary.it/course/metasploit/
Post Exploitation Hacking
https://www.cybrary.it/course/post-exploitation-hacking/
Vulnhub
https://www.vulnhub.com/
Web Application Hacker / Penetration Tester: (Often overlaps with the traditional Pen Tester). These are the security consultants that are hired to find bugs and flaws with web applications. Or are part of a Pen Test team that uses Web Applications as an avenue of getting system level access on a server.
Web Application Hackers Handbook
Web Application Hackers Handbook: Finding and Exploiting Security Flaws
Web Hacking 101
https://leanpub.com/web-hacking-101
Bug Bounty Forum
https://bugbountyforum.com/resources/
Blue Team Jobs and Learning References:
What is the difference between an Analyst and an Engineer? To put it simply, an engineer will build out, deploy, and support the infrastructure that will help support the company and keep the users and data safe. An Analyst, on the other hand, will monitor the network and endpoint logs, and use tools in order to analyze data and correlate threats. Per the SANS motto “Know Abnormal…Find Evil!”Note that any of the below jobs can pop up as “IT Security xxx”, “Cybersecurity xxx”, “Security xxx”, “Security Operations xxx” or some other strange variation. This is in large part due to a lack of standards in the industry. Due to the large variations in job titles, I’ve tried to group the core aspects of Defensive Security down into a few fields. I’ve put together my own explanation of what each field entails, and a few low-cost references that will aide you on your journey into the specialization. I encourage you to research the fields that interest you further in order to construct a fuller picture.
Network Security / Threat Analyst: Reviews logs and network traffic in order to correlate data into potential threats. Uses IOC’s from threats in order to discover if they exist in the network or not. Monitors the security tools and runs vulnerability remediation.
Applied Network Security Monitoring
Intro to Threat Intelligence
https://www.cybrary.it/course/intro-cyber-threat-intelligence/
The Practice of Network Security Monitoring
Forensics / Incident Response: First responders in the event of a breach. These are the teams that will take forensic images of compromise hosts, review the threat vector used (Malware, PowerShell, etc.) and construct a timeline.
Computer Forensics
https://www.cybrary.it/course/computer-hacking-forensics-analyst/
Incident Response and Handling
https://www.cybrary.it/course/incident-response-and-handling/
Memory Forensics
Malware Analyst: Analyzes Malware and Suspect Malware found on the network in order to determine Indicators of Compromise (IOC’s).
Introduction to Malware Analysis
https://www.cybrary.it/course/malware-analysis/
Malware Analysts Cookbook
https://www.amazon.com/Malware-Analysts-Cookbook-DVD-Techniques/dp/0470613033
Practical Malware Analysis
Is there overlap?
Of course! Most organizations, especially in a security program’s early stages, will have their employees wearing multiple hats. And that’s a good thing. The more you do the more exposure you get, and the less likely you are to become burnt out. For example, I work in all categories of the Blue Team, and I get to do some Red Team work on the side.
How do I stay up to date?
Staying up to date in the field is often the most overlooked aspect of most career fields in general. In this field, you need to stay up to date not only with additional training but with additional tools as well. As a Blue Team member, you need to be familiar with all tools at your disposal, and all tools that you would be interested in purchasing/using in the future. Including but not limited to, email gateway, antivirus, next-gen antivirus, application whitelisting tools, vulnerability scanners, firewalls, threat intelligence aggregation systems, and honeypots. As a Red Team member, you need to be familiar with these tools as well; in order to figure out how to bypass them. Below I’ve listed a few blogs and podcasts that I follow. In addition, I recommend following the leading specialists in your chosen field on Twitter.Blogs and News:
https://krebsonsecurity.com/
https://www.reddit.com/r/netsec/
https://www.hackread.com/
https://arstechnica.com/
http://www.securityweek.com/
http://www.darkreading.com/
Podcasts:
– Recorded Future “Inside Threat Intelligence”
– Risky Business
– The CyberWire
– SANS Internet Stormcast
Ref: Derek Carlin (https://www.cybrary.it/0p3n/breaking-cybersecurity-field)
Friday, 26 August 2016
Tips & Tricks for some HR interview questions
The Following tips and tricks (in images) will guide you regarding the distinction between over smart and smart answers that can be given for several Human Resource interview questions.
Interviews usually take place face to face and in person, although modern communications technologies such as the Internet have enabled conversations to happen in which parties are separated geographically, such as with video conferencing software, and of course telephone interviews can happen without visual contact. Interviews almost always involve spoken conversation between two or more parties, although in some instances a “conversation” can happen between two persons who type questions and answers back and forth. Interviews can range from unstructured or free-wheeling and open-ended conversations in which there is no predetermined plan with prearranged questions, to highly structured conversations in which specific questions occur in a specified order.
Interviews usually take place face to face and in person, although modern communications technologies such as the Internet have enabled conversations to happen in which parties are separated geographically, such as with video conferencing software, and of course telephone interviews can happen without visual contact. Interviews almost always involve spoken conversation between two or more parties, although in some instances a “conversation” can happen between two persons who type questions and answers back and forth. Interviews can range from unstructured or free-wheeling and open-ended conversations in which there is no predetermined plan with prearranged questions, to highly structured conversations in which specific questions occur in a specified order.
They can follow diverse formats; for example, in a ladder interview, a respondent’s answers typically guide subsequent interviews, with the object being to explore a respondent’s subconscious motives.
Typically the interviewer has some way of recording the information that is gleaned from the interviewee, often by writing with a pencil and paper, sometimes transcribing with a video or audio recorder, depending on the context and extent of information and the length of the interview. Interviews have a duration in time, in the sense that the interview has a beginning and an ending.
Thursday, 28 July 2016
Design Of Police Siren Using NE555
CLASS WORK PROJECT
DESIGN OF POLICE SIREN USING NE555
Introduction
A siren is a loud noise making device.
Sirens are mounted in fixed locations and used to warn of natural disasters or attacks.
Sirens are used on emergency service vehicles such as ambulances, police cars and fire tracks
Background
This police siren simulated electronic project uses two 555timers IC to generate a sound similar to a police siren.
A single 556 timer IC which consists of two 555 timers can also be used. In this circuit both of the timers are configured as a stable circuit.
Problem Statement
Due to the need to alert people in case of emergencies such as police vehicles and ambulances.
Significance of the project
The whole idea of the siren was to alert the public about emergency cases. The Siren finds application in police vehicles, ambulances.
General Objective
The general objective of this project was to understand the operation of a siren. By making a run up of the project, theoretical knowledge was transferred into practice and during the hardware implementation, practical skills such as a printed board implementation, circuit testing and soldering were enhanced.
Specific Objective
To design a simple Police siren.
Scope of the study
The project only focuses on producing loud sound which brings about sound pollution to the environment. Some instruments such as bazar where hard to find and generally expensive.
It took us a lot of time to make a working siren without mistake.
Circuit diagram:
Materials and Quantity
Capacitors
100µF 1
100nF 1
1µF 1
10µF 1
Resistors
68KΩ 2
8.2KΩ 2
1KΩ 1
Diode
1BH62 1
IC NE555 2
Buzzer
64 ohm, 500mW 1
Battery
10v 1
LED
Red &blue 2
Variable resistor 1
Print board 1
Jumpers
Switch 1
TUMUSIIME BENON
SEKITTI HAMIS
ARYAMANYA EDWIN
SEGUYA ENOCK
SISYE GARVIN
KASAMBA GEORGE
ANGURIA MAX
MUTABAZI ARBAN
KIBALAMA JOEL
SITAKU OSCAR
UMA STEPHEN
ARIHO LEWIS
Series and Parallel Connection Of Bulbs and Socket Outlets
CLASS WORK PROJECT
CONNECTION SERIES AND PARALLEL OF BULBS AND SOCKET OUTLETS
Introduction
The project is showing 2-lamps in parallel controlled switch, by 2-way switches with intermediate switch, 1-gang, 1-way switch controlling two series connected lamps, single and double socket outlets connected in parallel and single and double socket outlets connected in series.
The project was to test the lighting of bulbs connected in series and the parallel and voltage of socket outlets connected in parallel and in series .
Objectives
- To compare the advantages and disadvantages of series over parallel circuit.
- To demonstrate the operation of two way switches with intermediate switch
- To equip students with the knowledge of wiring two different wiring system i.e. series and parallel
Challenges
- There was a problem of lack of enough money to buy all the components
- Difficulties in designing the circuit diagram since only a list of materials was given
Tools used
- Pliers: This was used to hold cables as well as peeling off insulators on cables
- Hammer: This was used to fix nails into the board
- Tester: This was used to test the presence of current in a circuit
- Screw driver(flat and star): This was used to loosen and tighten knots
Materials used
- Bulbs
- Lamp holders
- Junction boxes
- Socket outlets
- Switches Cables
- Clips and nails
- Intermediate switch
- Power cable
Safety precautions
- One should always observe insulation of tools to avoid electric shock
- Power must be switched off whenever an equipment is being assembled
- Do not work alone while working with high voltage electric equipments
- Chairs and stools should be under the benches when not in use
- Wearing a ring or watch can be hazardous in an electric lab since such items make good electrodes for the human body
- Never touch electrical equipment while standing on a damp or metal floor
Procedure
The main switch was placed in its position and the power cable connected to it
The main switch was placed in its position and the power cable connected to it
The testing of current was done by use of a tester and then plugged out of the power supply
Junction boxes were fixed in their rightful position with two on either sides of the main switch and the cables of 1.5mm and 2.5mm were connected to the switches, lamp holders and socket outlets respectively from and in the junction boxes
To the right, a single socket outlet and a double outlet were connected to one junction box in parallel and another single socket outlet and double socket outlet were connected to the second junction box in series
To the left, one junction box was connected to lamp holders in series with 1gang switch and their circuit closed. Another junction box was connected to lamp holders in parallel and two 2-way switches with an intermediate switch in between them
Conclusion
All the bulbs light but with two bulbs in series blinking
When the intermediate switch is turned off, the 2-way switches do not function or do any task and the bulbs in parallel do not light
The 1gang switch controls both bulbs in series since current flows along only in one path
All the bulbs light but with two bulbs in series blinking
When the intermediate switch is turned off, the 2-way switches do not function or do any task and the bulbs in parallel do not light
The 1gang switch controls both bulbs in series since current flows along only in one path
ALIGANYIRWA YOSIA
NUWAMANYA ANANIA
MUGABE WILSON ROBERT
WESENE AMEDI
MUTESI BRENDA
NAMBUYA RECHEAL
ASIIMWE ROBERT
TURYAHABWE FRANK
MUSHABE AUGUSTUS
BWAMBALE JOSEPH
KAMUMBERE PAUL
NUWAMANYA ANANIA
MUGABE WILSON ROBERT
WESENE AMEDI
MUTESI BRENDA
NAMBUYA RECHEAL
ASIIMWE ROBERT
TURYAHABWE FRANK
MUSHABE AUGUSTUS
BWAMBALE JOSEPH
KAMUMBERE PAUL