This is designed to deepen your understanding of essential word partsprefixes, roots, and suffixesthat form the foundation of medical terminology. As you progress, you’ll enhance your language mastery and fluency in the language of medicine.
Word Part Identification:
Review the terms, prefixes, roots, and suffixes from your chapter reading,
Identify 10 terms and highlight and define the prefixes, roots, and suffixes within each term.
Application Exercise:
Construct 10 sentences or scenarios using the identified words or word parts.
The post This is designed to deepen your understanding of essential word partsprefixes, roots, and suffixesthat form the foundation of medical terminology first appeared on Courseside Kick.
You are a provider of a Haitian patient with a severe open wound infection. How can you deal with this patient that insists that his Vodou priest assure him it would be healed without an antibiotics treatment because of the ceremony performed and the spiritual connections he made the night before?
Submission Instructions
Contribute a minimum of 500 words for your initial post. It should include at least 2 academic sources, formatted and cited in APA.
The post How can you deal with this patient that insists that his Vodou priest assure him it would be healed without an antibiotics treatment because of the ceremony performed and the spiritual connections he made the night before? first appeared on Courseside Kick.
As a leader in the social work field (clinical supervisor, agency director, or academic), how would you frame the issues around the correlation between military service member suicides and moral injury? What steps would you take to identify moral injury and resolve or prevent military members from dying by suicide due to moral injury? Develop a post of at least 350 words, supporting your assertions with properly cited references to recent scholarly research.
The post As a leader in the social work field (clinical supervisor, agency director, or academic), how would you frame the issues around the correlation between military service member suicides and moral injury? first appeared on Courseside Kick.
Cyber Vulnerabilities and Data Analytics (MN623 Assessment-3) Assignment Help
Assessment Details and Submission Guidelines
Trimester
T2, 2024
Unit Code
MN623
Unit Title
Cyber Security and Analytics
Assessment Type
Assessment 3 – Group (4-5 Students per group)
Assessment
Title
Assignment 3 (Cyber Vulnerabilities and Data Analytics)
Purpose of the
assessment (with ULO Mapping)
This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them.
c. Evaluate intelligent security solutions based on data analytics
d. Analyze and interpret results from descriptive and predictive data analysis
e. Propose cyber security solutions for business case studies
Weight
20%
Total Marks
100
Word limit for Group Report
2000-2500 words
Due Date for submission
24/9/2024, Week 11
Submission
Guidelines
• All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.
• The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.
• Reference sources must be cited in the text of the report and listed appropriately at the end in a reference list using IEEE referencing style.
Extension
If an extension of time to submit work is required, a Special Consideration Application Must be submitted directly through AMS. You must submit this application within three working days of the assessment due date. Further information is available at:
Academic
Misconduct
Academic Misconduct is a serious offense. Depending on the seriousness of the case,penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at. For further information, please refer to the Academic IntegritySection in your Unit Description.
Use of
Generative Artificial
Intelligence (GenAI) in
Assessments
More information about the use of Gen AI in student assessment can be found in the full policy and procedure available atFurther support can be found in the MIT LibGuide: Using Gen AI at MIT
Further details on the type of assessment tasks, and whether Gen AI is permitted to be used or not are provided in the assessment brief.
Assignment Description
The assignment has two parts.
Part I: Group Report
Part II: Video Demonstration
Submission Guidelines:
1) Write a group report on the topics listed in Part I.
2) Make a group video demonstration of three cyber security tools implemented for writing a group report.
3) Length of Video: The total length of the video presentation should not be more than 9 minutes (marks would be deducted for longer presentation).
Note: Put the video link of your group video demonstration in the cover page of your Group Report.
Part I – Finding Cyber Vulnerabilities (70 Marks)
Task Description and Questions
After implementing the Part I tasks and questions, take screenshots of your work and provide commentary for each. You will create a report based on the following tasks using the vulnerable virtual machines (vulnerable_vm), including Metasploitable2, DVWA, Mutillidae, and the OWASP Broken Web Applications Project (OWASP BWA). You may also use OWASP Mantra as your web browser to conduct the tests.
• Metasploitable2 is a vulnerable virtual machine designed for practicing penetration testing and gaining unauthorized access to systems.
• Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application intentionally made vulnerable. It is divided into sections that focus on different types of vulnerabilities, with lessons and guidelines on how to exploit them.
• OWASP Mutillidae is a free, open-source, deliberately vulnerable web application used for web-security training. It offers numerous vulnerabilities and hints, making it an ideal environment for labs, security enthusiasts, classrooms, Capture the Flag (CTF) events, and vulnerability assessment tool testing.
• OWASP Broken Web Applications (BWA) Project provides a collection of vulnerable web applications designed for security testing.
Tasks and Questions:
1. Using the Hackbar Add-on for Parameter Probing:
o How can the Hackbar add-on be utilized to streamline parameter probing during security assessments? (Demonstrate using the SQL injection vulnerability in DVWA).
2. Request Viewing and Alteration with ZAP:
o How does ZAP facilitate the viewing and alteration of requests to identify potential vulnerabilities? (Demonstrate using Mutillidae).
3. Capabilities of Burp Suite in Security Assessments:
o What are the capabilities of Burp Suite in viewing and altering requests, and how does it contribute to security assessments? (Demonstrate using Mutillidae).
4. Techniques for Identifying Cross-Site Scripting (XSS) Vulnerabilities:
o What techniques are employed in identifying XSS vulnerabilities during security evaluations? (Demonstrate using DVWA).
5. Identifying and Mitigating Error-Based SQL Injection Vulnerabilities:
o How can error-based SQL injection vulnerabilities be identified and mitigated during security assessments? (Demonstrate using DVWA).
6. Detecting Blind SQL Injection Vulnerabilities:
o What methods are utilized to detect blind SQL injection vulnerabilities, and what are the associated risks? (Demonstrate using DVWA).
7. Identifying and Addressing Cookie Vulnerabilities:
o How are vulnerabilities in cookies identified and addressed to enhance web application security? (Demonstrate using Mutillidae).
8. Analyzing SSL/TLS Configurations with SSLScan:
o What information can be obtained about SSL and TLS configurations using SSLScan, and how does it contribute to security assessments? (Demonstrate using OWASP BWA).
9. Approaches for Detecting File Inclusion Vulnerabilities:
o What approaches are employed in searching for file inclusions as part of security evaluations? (Demonstrate using DVWA).
10. Identifying and Mitigating the POODLE Vulnerability:
o How is the POODLE vulnerability identified and mitigated to enhance the security posture of web applications? (Use the provided script from this link).
11. Reporting Defenses Against Cyber Vulnerabilities:
o Suggest and report defenses against the cyber vulnerabilities identified and exploited from points 1 to 10.
12. Data Analysis on Selected Datasets:
o Demonstrate your data analytic skills on any three datasets available at Fordham University’s Data Mining Datasets.
13. Classification and Evaluation Using Recent Datasets:
o Select a recent dataset from either:
IoT-23 Dataset
LITNET Dataset
o Load the selected dataset into Weka or a tool of your choice, then follow these steps: i. Select the relevant features with rationale (using external references or your own reasoning).
ii. Create training and testing data samples.
iii. Classify the network intrusion provided in the sample data.
iv. Evaluate the performance of the intrusion detection using available tools and technologies (e.g., confusion matrix).
References:
For additional information and to complete Task 13, refer to the following studies:
1. Damasevicius, R., Venckauskas, A., Grigaliunas, S., Toldinas, J., Morkevicius, N., Aleliunas, T., & Smuikys, P. (2020). LITNET-2020: An annotated real-world network flow dataset for network intrusion detection. Electronics, 9(5), 800.
2. Larriva-Novo, X., Villagrá, V. A., Vega-Barbas, M., Rivera, D., & Sanz Rodrigo, M. (2021). An IoT-Focused Intrusion Detection System Approach Based on Preprocessing Characterization for Cybersecurity Datasets. Sensors, 21(2), 656.
3. Tait, Kathryn-Ann, Jan Sher Khan, Fehaid Alqahtani, Awais Aziz Shah, Fadia Ali Khan, Mujeeb Ur Rehman, Wadii Boulila, and Jawad Ahmad. “Intrusion Detection using Machine Learning Techniques: An Experimental Comparison.” arXiv preprint arXiv:2105.13435 (2021).
Part II: Video Demonstration (30 Marks)
1. Make a group video demonstration of three cyber security tools implemented for writing a group report.
Marks distribution for this section include marks for Implementation and Demonstration, Presentation Teamwork and Collaboration, Demo and Viva.
Note:
If you are using the dataset at a) for your research, please reference it as “Stratosphere Laboratory. A labeled dataset with malicious and benign IoT network traffic. January 22. Agustin Parmisano, Sebastian Garcia, Maria Jose Erquiaga.
Students can find “IEEE-Reference-Guide.pdf” available in Assignments Folder after logging into your MOODLE account for referencing purposes.
Marking criteria for Assignment 3:
Part I: Group
Report
Description of the section
Marks
Introduction
State the general topic and give some background for Part I points
5
Report
structure and
report
presentation
• Writing is clear and relevant, with no grammatical and/spelling errors – polished and professional. • Conforming to the IEEE template and format.
• Compile a written report along with your evaluations and recommendations.
• The report must contain several screenshots of evidence and a short description for each snapshot that provides
proof that you completed the work.
60
Conclusion
• A brief summary of the overall findings in relation to the purpose of the study.
• Summary of report argument with concluding ideas that impact the reader.
3
References
section and
body citation
• Must consider at least ten current references
from journal/conference papers and books.
• Strictly follow the order and instruction by IEEE.
2
Total
Total Marks for Part I: Group Report
70
Part II: Video
Demonstration
Description of the section
Marks
Implementation
and
Demonstration
Implement, analyze and discuss the importance of three cyber security tools from Part I during group video demo.
15
Presentation
Teamwork
and
Collaboration
The information and technical knowledge are presented clearly and effectively.
Excellent teamwork and collaboration skills must be demonstrated
5
Demo and Viva
Demo and Viva will be conducted in week 11 lab class.
10
Total
Total Marks for Part II: Video Demonstration
30
Total
Marks
Total Marks for Part I: Group Report Part II: Video Demonstration
100
Example Marking Rubric for Assignment 3
Grade
Mark
HD
80%+
D
70%-79%
CR
60%-69%
P
50%-59%
Fail
< 50%
Excellent
Very Good
Good
Satisfactory
Unsatisfactory
Introduction
Introduction is
clear, easy to
follow, well
prepared and
professional
Introduction is clear and easy to follow.
Introduction is
clear and
understandable
Makes a basic
Introduction to
each of your data analytic tools and platforms
Does not make an introduction to each of
your data
analytic tools and platforms
Evaluation
Logic is clear and easy to follow
with strong arguments
Demonstrated
excellent ability to think critically and sourced reference
material
appropriately
Consistency
logical and convincing
Demonstrated excellent ability to think critically but did not source reference
material
appropriately
Mostly consistent and convincing
Demonstrated
ability to think critically and sourced reference material
appropriately
Adequate
cohesion and conviction
Demonstrated
ability to think critically and did not source reference material appropriately
Argument is confused and disjointed
Did not demonstrate
ability to think
critically and did not source reference
material
appropriately
Demonstration
All elements are present and
very well
demonstrated.
Components
present with
good cohesive
Components
present and
mostly well
integrated
Most components present
Proposal lacks
structure.
Report
structure and
report
presentation
Proper writing. Professionally
presented
Properly
written, with
some minor
deficiencies
Mostly good, but some structure or presentation
problems
Acceptable
presentation
Poor structure, careless
presentation
Reference style
Clear styles with excellent sources of references.
Assume you are an HR business partner and leader in a full-size HR department for your organization. Based on what you have learned about business employment law, what three or four concepts, tools, methods, or practices would you recommend as important best-practice approaches to help organizations implement better policies to safeguard against employment law violations? Be sure to explain why you made these particular choices.
The post Based on what you have learned about business employment law, what three or four concepts, tools, methods, or practices would you recommend as important best-practice approaches to help first appeared on Courseside Kick.
Overview of Software Engineering (MN507Assignment-2) Assignment Help
Assessment Details and Submission Guidelines
Trimester
T2 2024
Unit Code
MN507
Unit Title
Overview of Software Engineering
Assessment Type
Assignment 2-Group Report
Assessment Title
Group Assignment – Design and development of MIT’s Alumni portal
Purpose of the assessment (with ULO Mapping)
This assignment assesses the basic concepts of professional ethics in IT and maps with the following ULOs:
• Understand software engineering principles and design software processes for business requirements.
• Understand agile software development practices and analysis, design, implementation and testing in the context of an agile framework • Compare and contrast different Software Engineering process models: waterfall, evolutionary, spiral, prototyping and others.
• Analyze business problems and elicit user requirements using software engineering methodologies.
• Use appropriate modeling techniques to model business requirements and data requirements.
• Capable of developing architectural designs for software systems and understanding the different architectural design patterns.
• Capable of designing and construction of user interfaces. • Software Engineering, specifically related to object-oriented software engineering.
• Produce a software system plan and framework including implementation, deployment, testing, maintenance, and evolution
Weight
20%
Total Marks
100 Marks
Word limit
2,000-2,500 Words or above
Due Date
Friday, 27/09/2024 (Week 11)
Submission
Guidelines
• Generative AI (GenAI) tools may be used with prior permission Students may use GenAI for this formative assessment with prior approval for understanding, learning and research purposes only. Using these tools to write assignments will be considered as academic misconduct and be penalized. If students are using any of the information from GenAI, then he/she must cite the use of Gen AI in their assessment.
More information of using GenAI can be found via the following link:
• All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.
• The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with
appropriate section headings.
• Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.
Extension
• If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at:
Academic
Misconduct
• Academic Misconduct is a serious offense. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: For further information, please refer to the Academic Integrity Section in your Unit Description.
Assignment Description
This group assignment is the continuation of Assessment 1 case scenarios, MIT’s Alumni portal project. Students should form groups of three or four members for this assignment. The purpose of this assignment is to analyze, design and implement (coding, building, and testing) the project.
MIT would like your group writing up a report, which contains the following activities for designing and developing the Alumni portal:
1. Product Roadmap to outline a general timeframe (e.g., Gantt Chart) for when your group will design, develop, and release identified requirements from Assessment 1.
2. The SRS document (a sample template in Moodle) which contains the following design elements (using UML notations):
Identify and draw a use case diagram(s) for MIT’s Alumni portal
ER diagram with all possible entities and attributes
State chart diagram(s)
Sequence diagram(s)
Class diagram for the entire system with all the attributes, methods, and associations.
3. The design document must include layered architecture and implement using the tools and platform of your choice, a software application with a front-end GUI, middle layer implementing the business logic and backend database.
4. Your group also requires designing a test specification (test cases) based on the project requirements and implementing (verification) them with evidence.
The report contents should include the following headings:
a. Cover page and your group details
b. Executive Summary (state system overview, system users, and system usability) c. Table of Contents
d. Introduction
e. Discussions (expand and explain your group’s supportive arguments)
f. Conclusion and recommendations
g. References and appendices
References
Must consider at least eight references (with at least five current references – not earlier than 2020). Must follow the IEEE referencing style.
Assignment Instructions:
• Do not use Wikipedia as a source or a reference.
Collect ideas for experiences to implement with children according to their interests. Organize these in a Resource Folder (template linked below), connect to the five EYLF Learning Outcomes, and provide information for implementation.
Equivalent to 3500 words
50%
Sunday September 8
learning outcomes
The learning outcomes assessed are:
LO 1: Critically engage with major theorists and articulate theories regarding children and childhoods aged 3 to 5 years.
LO 3: Negotiate with a mentor teacher to design, implement and critically reflect on an educational program that responds to the Victorian Early Years Learning and Development Framework (VEYLDF- for Victorian students) and/or the Early Years Learning Framework (EYLF).
Assessment Structure
Download the template linked below and use it to complete the assessment.
These resources/links will help you understand and plan for different age groups
Explore the developmental stages of early childhood by visiting four informative links focused on Babies, Toddlers, and Preschoolers, School-aged children to gain valuable insights into their growth and care.
Rubric
Rubric for Assessment Assessment 2: Electronic Resource Folder
Instructions
To complete your assessment task, follow the below instructions.
You will collect ideas for experiences to implement with children according to their interests. You will think of experiences that are related to physical, language, social, emotional and cognitive development, and connect to the five EYLF Learning Outcomes. EYLF-2022-V2.0.pdf
The task must draw from the course materials on VU Collaborate.
Using the Resource Folder template, your experiences will be listed under Physical, Language, Social, Emotional and Cognitive Development and specific to the Birth – 2, 2 – 3 and 3 – 5 age groups.
In the template, please indicate the following for each experience:
Name of experience
Resources
Suggested implementation strategies
Learning possibilities
EYLF Learning outcomes
Related theory
Submission Instructions
Submit your completed assessment via the Assessment Dropbox: Assessment 2 : Resource Folder
Alpha’s Murals is a company that paints interior and exterior murals for both business and residential customers. Write a program named Beta App that performs the following tasks:
Task 1: Display your personal information including your last name, first name and your student ID. Make these surrounded by a border composed of asterisks.
Task 2: The application prompts the user to enter the number of orders for interior and exterior murals. This number has to be between 0 and 30 (inclusive). Otherwise, the program prompts the user to re-enter the number.
Task 3: Display the number of orders of interior and exterior murals. Compute and display the expected revenue for each type of mural and the total revenue from both types. Interior murals cost $500.00 each, and exterior murals cost $750.00 each.
Note that all revenues should be displayed using currency format.
Task 4: Display a statement based on the following conditions:
If the number of exterior murals ordered is greater than the number of interior murals, the program should display “Exterior murals are becoming more attractive!”, else, the program displays “Interior murals are becoming popular!”.
If the number of the orders are equal, then display “Both types are equally preferred!”
Task 5: The user is prompted to input information for interior mural orders. Each interior mural order includes customer name and mural code: L for landscape, S for seascape, A for abstract, and O for others. Make sure that all the entered codes are valid (L, S, A or O), and, if not, prompt the user to re-enter the correct code. The number of orders should be the same as the number of interior murals ordered in Task 2.
After the data entry for all the customers is complete, display a count of the number of customers ordering each type of interior mural.
Then, continuously prompt the user for a mural code until the user enters a sentinel value. For each code entry, display a list of the customers ordering that type of mural, or display a message that the code is not valid, and re-prompt the user for a valid mural code.
Note: You must use arrays in Task 5 in order to achieve the maximum marks.
A sample screenshot for Task 2, 3, 4 and first part of Task 5 is provided below.
In completing your assignment, please take note of the following:
You should not use any C# concepts which have not been taught as part of Lectures 1 – 5 and covered in Tutorials 1 – 5.
You should develop your code using simple logic.
Test your code using your own test data covering multiple data sets.
Your final code should not have any compilation/execution errors.
Project Deliverable:
Zip your project file and upload this zipped file onto Canvas using the link IFN555 Programming Assignment under Assessment 2 in Modules. The link will be available only from Friday 23 August 2024.
You can only upload ONCE
Note:
Assessment submitted after the due date without an approved extension will not be marked and will receive a grade of 1 or 0%. If special circumstances prevent you from meeting the assessment due date, you can apply for an extension through the Student Services in SEF. If you do not have an approved extension you should submit the work you have completed by the due date and it will be marked against the assessment criteria.
In this task you are required to write an SQL script that builds a database to match the relational model below. Your database should be named “Heavenly Department Store”.
The SQL statements in the script must be provided in the correct order.
Heavenly Department Store relational model is as follows:
Note: Primary keys are denoted by bold and underlineand foreign keys are in italics
Supply (SupplierNr, ItemNr, QtyNr)
Use (ItemNr, DeptCode)
Item (ItemNr, ItemName, CountryMade)
Note: 1.1 ItemNr or Name both possible PK using ItemNr as preferred PK
All primary and foreign key attributes that you use are strings (not text) comprising eight digits (8).
INTEGER type must be used for QtyNr is mandatory and must be greater than 0.
TEXT type must be used for all other attributes.
SupplierName and ItemName must contain a value (you will need to add values to these attributes)
(Insert snapshots of tables and values here)
Task 2 [14 marks]
We have provided you with the Hotel database (Filename: IFN554_5C_Hotels.sql you can download from Canvas) to be used with MySQL Workbench. You must use this database in MySQL Workbench to extract the necessary information as per the following query requirements.
Note: All tasks requiring SQL must provide as a screen snapshot of the execute SQL tab in MySQL Workbench that includes all sections. Snapshots must be readable
SQL Query code
Result Grid (table, view, update, new information etc.). The teaching team must be able to see the successful execution of the code
Action Output result
Schemas (where necessary)
In your database – a booking commences at 2 pm (check in) and finishes at 10 am the following day (check out). Example: A booking for 3 nights is made on Tuesday 8th August with a check-in date of Thursday 10th August from 2pm and a check-out time of Sunday 13th August at 10 am.
Write an SQL script for querying data for the following information.
2a.
List the hotelNo which has 2 or more single rooms [2 marks]
2a response
Insert code and result snapshot here
2b.
How many different guests visited the Meriton Hotel? [2 marks]
2b. response
Insert code and result snapshot here
2c.
What is the total income from bookings for the Meriton Hotel?
[3 marks]
2c. response
Insert code and result snapshot here
2d.
List the guests’ names who have visited more than 2 times [3 marks]
2d response
Insert code and result snapshot here
2e.
For each hotel, list the room type, for each room type list the number of each room type and the number with bookings [4 marks]
2e. response
Insert code and result snapshot here
Task 3 [5 marks] – Individual
Perform the following tasks.
3a.
Write a command to create an index on hotel name and show the results [1 mark]
3a. response
Insert code and result snapshot here
3b.
Create a user with the name ‘Mickey’ @ local host with password ‘iloveORM’ and force the user to update the password [01 mark].
Show the results. [1 mark]
3b. response
Insert code and result snapshot here
3c.
Create a view called HotelSummaryView – list the hotelNo, type and price of each room. Order the result by hotelNo, room type and price [1 mark]
3c.
response
Insert code and result snapshot here
3d.
Grant permissions to select and read this view . Show results[1 mark]
3d. response
Insert code and result snapshot here
3e.
Revoke permissions and show results [1 mark]
3e. response
Insert code and result snapshot here
Task 4 [5 marks]
Perform the following tasks continue using the Hotel database provided.
4a.
Update the prices of all single rooms by 5% and show results [1 mark]
4a. response
Insert code and result snapshot here
4b.
Insert 2 rows of new data in the table Guest and Booking [2 marks]
4b. response
Insert code and result snapshot here
4c.
Delete one of the rows your inserted into the Guest table [2 marks]
4c response
(Insert snapshot here)
Task 5 [10 marks]
Using the following table structure, identify all functional dependencies and then decompose this table into a set of 3NF relations. The table is in 0NF so please apply all rules accordingly.
Assumptions:
Product Price is Per Unit
There are not multi values
Order No
Order Time
(dd/mm/yyyy/hh:mm)
Cust DOB (dd/mm/yyyy)
Total (AUD$)
Item #
Order Prod
Order Qty
Customer
No
Customer
Name
Product
No.
Product Name
Supplier
Prod
RRP (AUD$)
Age
1
05/11/2023 15:00
01/11/1962
600
1
P4567
3
007
James Bond
P4567
Wristwatch
Seiko
200
62
23
05/12/2023 15:00
01/11/1950
360
1
T1245
1
024
Sean Connery
T1245
Cufflinks
Harrods
20
74
23
05/12/2023 15:00
01/11/1950
360
2
P1299
1
024
Sean Connery
P1299
Tie Clip
Harrods
120
74
23
05/12/2023 15:00
01/11/1950
360
3
T1304
1
024
Sean Connery
T1304
Shoes
Sketchers
220
74
Insert response here All tables must be in 3NF.
Task 6 [10 marks]
The use of Generative AI such as ChatGPT is not permitted for this task. QUT policy states the following: “If you submit an assessment “that has been produced or modified, wholly or in part, by an artificial intelligence tool, algorithm, or computer generator where such actions are not authorised in the assessment task”, this may be treated as a breach of our Academic Integrity Policy and appropriate penalties imposed.
This task is a reflective task. You are required to answer the question below in your own words. Your answer should be your opinions, experience and personal perspective. Your response should be supported by research to validate your viewpoints. Provide in text referencing where appropriate. Your response should be between 400 and 600 words not including references.
Interaction Design and Usability (ICT710 ) Assignment Help
ICT710 Interaction Design and Usability Semester-2, 2024
Assessment Overview
Assessment tasks
Learning Outcome Mapping
Assessment ID
Assessment Item
When due
Weighting
ULO#
CLO# for
BITS
1
Critique (individual) (1000 words)
Session 4
20%
1, 2
1, 2
2
Needs Analysis and Usability Test Report (Individual) (1500 Words)
Session 9
40%
2, 3, 4
1, 2
3*
Part A – Design Report
(Group)
Part A – Session 13 (Study Week)
30%
1, 2, 3, 4, 5
1, 2, 3, 4, 5
Part B Presentation (Group)
Part B – Session 14 (Exam Week)
10%
1, 2, 3, 4, 5
1, 2, 3, 4, 5
Note: * denotes ‘Hurdle Assessment Item’ that students must achieve at least 40% in this item to pass the unit.
Referencing guides
You must reference all the sources of information you have used in your assessments. Please use the IEEE referencing style when referencing in your assessments in this unit. Refer to the library’s referencing guides for more information.
Academic misconduct
VIT enforces that the integrity of its students’ academic studies follows an acceptable level of excellence. VIT will adhere to its VIT Policies, Procedures and Forms where it explains the importance of staff and student honesty in relation to academic work. It outlines the kinds of behaviors that are “academic misconduct”, including plagiarism.
Late submissions
In cases where there are no accepted mitigating circumstances as determined through VIT Policies,Procedures and Forms, late submission of assessments will lead automatically to the imposition of a penalty. Penalties will be applied as soon as the deadline is reached.
Short extensions and special consideration
Special Consideration is a request for:
• Extensions of the due date for an assessment, other than an examination (e.g. assignment extension).
• Special Consideration (Special Consideration in relation to a Completed assessment, including an end-of-unit Examination).
Students wishing to request Special Consideration in relation to an assessment the due date of which has not yet passed must engage in written emails to the teaching team to Request for Special Consideration as early as possible and prior to start time of the assessment due date, along with any accompanying documents, such as medical certificates.
For more information, visit VIT Policies, Procedures and Forms.
Inclusive and equitable assessment
Reasonable adjustment in assessment methods will be made to accommodate students with a documented disability or impairment. Contact the unit teaching team for more information.
Contract Cheating
Contract cheating usually involves the purchase of an assignment or piece of research from another party. This may be facilitated by a fellow student, friend or purchased on a website. Other forms of contract cheating include paying another person to sit an exam in the student’s place.
Contract cheating warning:
• By paying someone else to complete your academic work, you don’t learn as much as you could have if you did the work yourself.
• You are not prepared for the demands of your future employment.
• You could be found guilty of academic misconduct.
• Many of the pay contract cheating companies recycle assignments despite guarantees of “original, plagiarism-free work” so similarity is easily detected by TurnitIn.
• Penalties for academic misconduct include suspension and exclusion.
• Students in some disciplines are required to disclose any findings of guilt for academic misconduct before being accepted into certain professions (e.g., law).
• You might disclose your personal and financial information in an unsafe way, leaving yourself open to many risks including possible identity theft.
• You also leave yourself open to blackmail – if you pay someone else to do an assignment for you, they know you have engaged in fraudulent behavior and can always blackmail you.
Grades
We determine your grades to the following Grading Scheme:
Grade
Percentage
A
80% – 100%
B
70% – 79%
C
60% – 69%
D
50% – 59%
F
0% – 49%
Assessment Details for Assessment Item 1:
Overview
Assessment tasks
Learning Outcome Mapping
Assessment ID
Assessment Item
When due
Weighting
ULO#
CLO# for BITS
1
Case Study Report (individual)
Session 6
20%
1
1, 2
Introduction
You will submit work in assessment 1 submission link on week 4. This is an individual assessment.
Students are to write a critique by selecting a research paper from the proquest. Type interface design in the search box. Select any scholarly journal article only. The paper needs to be related to the interaction design. The critique should not exceed 1000 words. Below shows steps for writing a critique:
The example of how to write a critique is provided by clicking here.
Submission Instructions
All submissions are to be submitted through Turnitin. Drop-boxes linked to Turnitin will be set up in Moodle. Assessments not submitted through these drop boxes will not be considered. Submissions must be made by the end of session 6.
The Turnitin similarity score will be used to determine any plagiarism of your submitted assessment. Turnitin will check conference websites, Journal articles, online resources, and your peer’s submissions for plagiarism. You can see your Turnitin similarity score when you submit your assessments to the appropriate drop-box. If your similarity score is of concern, you can change your assessment and resubmit. However, re-submission is only allowed before the submission due date and time. You cannot make re-submissions after the due date and time have elapsed.
Note: All work is due by the due date and time. Late submissions will be penalized at 20% of the assessment final grade per day, including weekends. Marking Criteria/Rubric
You will be assessed on the following marking criteria/Rubric:
Assessment criteria
Exceptional >=80%
Admirable 70% – 79%
Creditable 60% – 69%
Acceptable 50% – 59%
Unsatisfactory <=49
Introduction
5 marks
Introduction summarized all of the article and was able to highlight the importance.
8 points
Introduction covers most of the article in a detailed manner. Some important points are highlighted.
4 points
Introduction covers most of the article but in a brief manner
3 points
Introduction summarized some content of the article in a brief manner
2 points
Introduction does not reflect the paper and is not relevant to the unit
1 points
Content and Analysis
10 marks
The contentis professionally done.
10 points
The contentis well done and includes most of the facts.
8 points
The content is fairly well done and includes some of the facts.
6 points
The contentis ok but there is room for improvement.
4 points
The contentis briefly
explained.
2 points
Structure and
Organization
5 marks
Report Layout is consistent and professionally done.
There are no grammatical errors.
5 points
Report layout is consistent and professionally done. There are a few grammatical errors.
4 points
Report layout is
consistency. There are a
few grammatical errors.
3 points
Report layout is consistent. There are some grammatical errors.
2 points
The report layout is not
consistent and there are many grammatical errors.
1 points
Assessment Details for Assessment Item 2:
Overview
Assessment tasks
Learning Outcome Mapping
Assessment ID
Assessment Item
When due
Weighting
ULO#
CLO# for
BITS
2
Needs Analysis and Usability Test Report (Individual) (1500 Words)
Session 9
40%
2, 3, 4
1, 2
Introduction
Students are required to use the findings of a needs analysis and usability test conducted on VitEat mobile app for the report. VitIate mobile app is a Mobile Food Delivery App. A mobile food delivery app that:
• connects customers with local restaurants
• offering a platform to browse menus
• place orders
• track deliveries.
The purpose of this report was to identify user needs, evaluate the product’s usability, and provide recommendations for improvement.
Needs Analysis
To understand the needs and expectations of target users in relation to VitIate mobile app.
• Understanding user preferences for food types, cuisines, and dietary restrictions.
• Identifying pain points in the current food ordering process (e.g., long wait times, difficulty finding desired options). • Assessing user expectations for delivery speed, accuracy, and customer service.
• Determining the importance of features like order customization, payment options, and loyalty programs.
Usability Testing
To evaluate the usability of VitEat mobile app and identify areas for improvement.
• Evaluating the ease of navigation within the app (e.g., finding restaurants, browsing menus, placing orders).
• Assessing the clarity and effectiveness of information displayed (e.g., menu items, pricing, delivery times).
• Testing the checkout process for efficiency and user-friendliness.
• Evaluating the order tracking experience and its usefulness to users.
• Assessing the overall user satisfaction with the app’s design and functionality.
Below is the format for the report:
1. Executive Summary
2. Introduction
3. Methodology
3.1. Needs Analysis
3.2. Usability Testing
4. Findings
4.1. Needs Analysis
4.2. Usability Testing
5. Analysis and Discussion
6. Recommendations
7. Conclusion
8. Appendices
9. Visuals
Students need to use tool the following tools for this assessment:
1. Figma
2. Mock Flow
3. Canva
4. Lucid chart
5. Visual Paradigm
Submission Instructions
All submissions are to be submitted through Turnitin. Drop-boxes linked to Turnitin will be set up in Moodle. Assessments not submitted through these drop boxes will not be considered. Submissions must be made by the end of session 9.
The Turnitin similarity score will be used to determine any plagiarism of your submitted assessment. Turnitin will check conference websites, Journal articles, online resources, and your peer’s submissions for plagiarism. You can see your Turnitin similarity score when you submit your assessments to the appropriate drop-box. If your similarity score is of concern, you can change your assessment and resubmit. However, resubmission is only allowed before the submission due date and time. You cannot make re-submissions after the due date and time have elapsed.
Note: All work is due by the due date and time. Late submissions will be penalized at 20% of the assessment final grade per day, including weekends.
Marking Criteria/Rubric
You will be assessed on the following marking criteria/Rubric:
Assessment criteria
Exceptional >=80%
Admirable 70% – 79%
Creditable 60% – 69%
Acceptable 50% – 59%
Unsatisfactory <=49
Methodology
15 marks
Clearly articulated research design, appropriate methodology chosen, detailed explanation of data collection and analysis methods.
13 – 15 points
Adequate research design, appropriate methodology chosen, explanation of data collection and analysis methods are sufficient.
9 – 12 points
Adequate research design, appropriate methodology chosen, some explanation of data collection and
analysis methods.
8 – 10 points
Basic research design,
limited explanation of
methodology, some gaps in data collection and
analysis..
5 – 7 points
Inadequate research design, inappropriate methodology, insufficient explanation of methods.
0 – 5 points
Finding
15 marks
Clear and comprehensive
presentation of findings,
supported by data, insightful analysis and interpretation..
13 – 15 points
Relevant findings presented, supported by some data,
analysis and interpretation. 9 – 12 points
Relevant findings
presented, supported by some data, basic analysis and interpretation.
8 -10 points
Limited findings presented, insufficient data support, superficial analysis.
5 – 7 points
Inaccurate or irrelevant
findings, lack of data support, no analysis.
0 – 5 points
Report layout & spelling 5 marks
Report Layout is consistent and professionally done.
5 points
Report Layout is consistent and professionally done.
4.5 points
Report Layout is
consistency.
4 points
Report layout is consistent. There are some grammatical errors.
3 points
The report layout is not
consistent and there are many grammatical errors.
2 points
Visual
5 marks
Effective use of visuals to
enhance understanding, clear and informative, appropriate use of graphics.
5 points
Some use of visuals, generally effective,some minor issues with clarity or relevance.
4 points
Limited use of visuals, lack of clarity or relevance,
inappropriate graphics.
3 points
ineffective use of visuals. 2 points
No or ineffective use of
visuals
0 points
Assessment Details for Assessment Item 3:
Overview
Assessment tasks
Learning Outcome Mapping
Assessment ID
Assessment Item
When due
Weighting
ULO#
CLO# for
BITS
3
Part A – Design Report (Group)
Session 13 (Study Week)
30%
1, 2, 3, 4, 5
1, 2, 3, 4, 5
Part B – Presentation (Group)
Session 14 (Exam Week)
10%
Introduction
Students will submit work in the Design report during the study period and the presentation will happen during the class time. This is a group assessment. The group will comprise 4 – 5 students. The group leader is responsible for submitting the report and the group members are required to submit the group participation form.
This is the continuation of the previous assessment. Students will choose the analysis & usability report from the group members and use it for the design report. Below is the structure for the report:
1. Introduction
2. Design Process
3. Design Rationale
4. User Interface Design
5. Usability Evaluation
6. Conclusion
For the presentation, students are expected to prepare a 10-minute presentation for part B. The presentation should not exceed 10 minutes. Every minute exceeded will occur with a 5% penalty. All students in the team are required to participate in presentations.
Submission Instructions
All submissions are to be submitted through Turnitin. Drop-boxes linked to Turnitin will be set up in Moodle. Assessments not submitted through these drop boxes will not be considered. Submissions must be made by the end of session 13.
The Turnitin similarity score will be used to determine any plagiarism of your submitted assessment. Turnitin will check conference websites, Journal articles,
online resources, and your peer’s submissions for plagiarism. You can see your Turnitin similarity score when you submit your assessments to the
Victorian Institute of Technology CRICOS Provider No. 02044E, RTO No: 20829
appropriate drop-box. If your similarity score is of concern, you can change your assessment and resubmit. However, re-submission is only allowed before the submission due date and time. You cannot make re-submissions after the due date and time have elapsed.
Note: All work is due by the due date and time. Late submissions will be penalized at 20% of the assessment final grade per day, including weekends.