Author: PAPERLINK

  • This is designed to deepen your understanding of essential word partsprefixes, roots, and suffixesthat form the foundation of medical terminology

     This is designed to deepen your understanding of essential word partsprefixes, roots, and suffixesthat form the foundation of medical terminology. As you progress, you’ll enhance your language mastery and fluency in the language of medicine.

    Word Part Identification:

    • Review the terms, prefixes, roots, and suffixes from your chapter reading,
    • Identify 10 terms and highlight and define the prefixes, roots, and suffixes within each term.

    Application Exercise:

    • Construct 10 sentences or scenarios using the identified words or word parts.

    The post This is designed to deepen your understanding of essential word partsprefixes, roots, and suffixesthat form the foundation of medical terminology first appeared on Courseside Kick.

  • How can you deal with this patient that insists that his Vodou priest assure him it would be healed without an antibiotics treatment because of the ceremony performed and the spiritual connections he made the night before?

    Instructions:

    You are a provider of a Haitian patient with a severe open wound infection. How can you deal with this patient that insists that his Vodou priest assure him it would be healed without an antibiotics treatment because of the ceremony performed and the spiritual connections he made the night before? 

    Submission Instructions

    • Contribute a minimum of 500 words for your initial post. It should include at least 2 academic sources, formatted and cited in APA.

    The post How can you deal with this patient that insists that his Vodou priest assure him it would be healed without an antibiotics treatment because of the ceremony performed and the spiritual connections he made the night before? first appeared on Courseside Kick.

  • As a leader in the social work field (clinical supervisor, agency director, or academic), how would you frame the issues around the correlation between military service member suicides and moral injury?

    As a leader in the social work field (clinical supervisor, agency director, or academic), how would you frame the issues around the correlation between military service member suicides and moral injury? What steps would you take to identify moral injury and resolve or prevent military members from dying by suicide due to moral injury? Develop a post of at least 350 words, supporting your assertions with properly cited references to recent scholarly research.

    The post As a leader in the social work field (clinical supervisor, agency director, or academic), how would you frame the issues around the correlation between military service member suicides and moral injury? first appeared on Courseside Kick.

  • Part I – Finding Cyber Vulnerabilities (70 Marks)  Task Description and Questions  After implementing the Part I tasks and questions, take screenshots of your work and provide commentary  for each.

    Cyber Vulnerabilities and Data Analytics (MN623 Assessment-3) Assignment Help

    Assessment Details and Submission Guidelines

    Trimester 

    T2, 2024

    Unit Code 

    MN623

    Unit Title 

    Cyber Security and Analytics

    Assessment Type

    Assessment 3 – Group (4-5 Students per group)

    Assessment 

    Title

    Assignment 3 (Cyber Vulnerabilities and Data Analytics)

    Purpose of the 

    assessment (with ULO Mapping)

    This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them. 

    c. Evaluate intelligent security solutions based on data analytics 

    d. Analyze and interpret results from descriptive and predictive data analysis 

    e. Propose cyber security solutions for business case studies

    Weight 

    20%

    Total Marks 

    100

    Word limit for Group Report

    2000-2500 words

    Due Date for submission

    24/9/2024, Week 11

    Submission 

    Guidelines

    All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. 

    The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. 

    Reference sources must be cited in the text of the report and listed appropriately at the end in a reference list using IEEE referencing style.

    Extension 

    If an extension of time to submit work is required, a Special Consideration Application Must be submitted directly through AMS. You must submit this application within three working days of  the assessment due date. Further information is available at: 

    Academic 

    Misconduct

    Academic Misconduct is a serious offense. Depending on the seriousness of the case,penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at. For further information, please refer to the Academic IntegritySection in your Unit Description.

    Use of  

    Generative Artificial  

    Intelligence  (GenAI) in  

    Assessments

    More information about the use of Gen AI in student assessment can be found in the full  policy and procedure available at Further support can be found in the MIT LibGuide: Using Gen AI at MIT 

    Further details on the type of assessment tasks, and whether Gen AI is permitted to be used or  not are provided in the assessment brief.

    Assignment Description 

    The assignment has two parts. 

    Part I: Group Report 

    Part II: Video Demonstration 

    Submission Guidelines: 

    1) Write a group report on the topics listed in Part I. 

    2) Make a group video demonstration of three cyber security tools implemented for writing a  group report. 

    3) Length of Video: The total length of the video presentation should not be more than 9  minutes (marks would be deducted for longer presentation). 

    Note: Put the video link of your group video demonstration in the cover page of your Group Report. 

    Part I – Finding Cyber Vulnerabilities (70 Marks) 

    Task Description and Questions 

    After implementing the Part I tasks and questions, take screenshots of your work and provide commentary  for each. You will create a report based on the following tasks using the vulnerable virtual machines  (vulnerable_vm), including Metasploitable2, DVWA, Mutillidae, and the OWASP Broken Web Applications  Project (OWASP BWA). You may also use OWASP Mantra as your web browser to conduct the tests. 

    Metasploitable2 is a vulnerable virtual machine designed for practicing penetration testing and gaining  unauthorized access to systems. 

    Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application intentionally made vulnerable. It is  divided into sections that focus on different types of vulnerabilities, with lessons and guidelines on how to  exploit them. 

    OWASP Mutillidae is a free, open-source, deliberately vulnerable web application used for web-security  training. It offers numerous vulnerabilities and hints, making it an ideal environment for labs, security  enthusiasts, classrooms, Capture the Flag (CTF) events, and vulnerability assessment tool testing. 

    OWASP Broken Web Applications (BWA) Project provides a collection of vulnerable web applications  designed for security testing. 

    Tasks and Questions

    1. Using the Hackbar Add-on for Parameter Probing: 

    o How can the Hackbar add-on be utilized to streamline parameter probing during security  assessments? (Demonstrate using the SQL injection vulnerability in DVWA). 

    2. Request Viewing and Alteration with ZAP: 

    o How does ZAP facilitate the viewing and alteration of requests to identify potential  vulnerabilities? (Demonstrate using Mutillidae). 

    3. Capabilities of Burp Suite in Security Assessments:

    o What are the capabilities of Burp Suite in viewing and altering requests, and how does it  contribute to security assessments? (Demonstrate using Mutillidae). 

    4. Techniques for Identifying Cross-Site Scripting (XSS) Vulnerabilities: 

    o What techniques are employed in identifying XSS vulnerabilities during security evaluations?  (Demonstrate using DVWA). 

    5. Identifying and Mitigating Error-Based SQL Injection Vulnerabilities: 

    o How can error-based SQL injection vulnerabilities be identified and mitigated during security  assessments? (Demonstrate using DVWA). 

    6. Detecting Blind SQL Injection Vulnerabilities: 

    o What methods are utilized to detect blind SQL injection vulnerabilities, and what are the  associated risks? (Demonstrate using DVWA). 

    7. Identifying and Addressing Cookie Vulnerabilities: 

    o How are vulnerabilities in cookies identified and addressed to enhance web application  security? (Demonstrate using Mutillidae). 

    8. Analyzing SSL/TLS Configurations with SSLScan: 

    o What information can be obtained about SSL and TLS configurations using SSLScan, and how  does it contribute to security assessments? (Demonstrate using OWASP BWA). 

    9. Approaches for Detecting File Inclusion Vulnerabilities: 

    o What approaches are employed in searching for file inclusions as part of security  evaluations? (Demonstrate using DVWA). 

    10. Identifying and Mitigating the POODLE Vulnerability: 

    o How is the POODLE vulnerability identified and mitigated to enhance the security posture of  web applications? (Use the provided script from this link). 

    11. Reporting Defenses Against Cyber Vulnerabilities: 

    o Suggest and report defenses against the cyber vulnerabilities identified and exploited from  points 1 to 10. 

    12. Data Analysis on Selected Datasets: 

    o Demonstrate your data analytic skills on any three datasets available at Fordham  University’s Data Mining Datasets

    13. Classification and Evaluation Using Recent Datasets: 

    o Select a recent dataset from either: 

    IoT-23 Dataset 

    LITNET Dataset 

    o Load the selected dataset into Weka or a tool of your choice, then follow these steps: i. Select the relevant features with rationale (using external references or your own  reasoning). 

    ii. Create training and testing data samples. 

    iii. Classify the network intrusion provided in the sample data. 

    iv. Evaluate the performance of the intrusion detection using available tools and  technologies (e.g., confusion matrix). 

    References: 

    For additional information and to complete Task 13, refer to the following studies: 

    1. Damasevicius, R., Venckauskas, A., Grigaliunas, S., Toldinas, J., Morkevicius, N., Aleliunas, T., & Smuikys, P.  (2020). LITNET-2020: An annotated real-world network flow dataset for network intrusion detection.  Electronics, 9(5), 800.

    2. Larriva-Novo, X., Villagrá, V. A., Vega-Barbas, M., Rivera, D., & Sanz Rodrigo, M. (2021). An IoT-Focused  Intrusion Detection System Approach Based on Preprocessing Characterization for Cybersecurity Datasets.  Sensors, 21(2), 656. 

    3. Tait, Kathryn-Ann, Jan Sher Khan, Fehaid Alqahtani, Awais Aziz Shah, Fadia Ali Khan, Mujeeb Ur Rehman,  Wadii Boulila, and Jawad Ahmad. “Intrusion Detection using Machine Learning Techniques: An Experimental  Comparison.” arXiv preprint arXiv:2105.13435 (2021). 

    Part II: Video Demonstration (30 Marks) 

    1. Make a group video demonstration of three cyber security tools implemented for writing a group  report. 

    Marks distribution for this section include marks for Implementation and Demonstration, Presentation  Teamwork and Collaboration, Demo and Viva. 

    Note: 

    If you are using the dataset at a) for your research, please reference it as “Stratosphere Laboratory. A labeled dataset with malicious and benign IoT network traffic. January 22. Agustin Parmisano, Sebastian Garcia, Maria Jose Erquiaga. 

    Students can find “IEEE-Reference-Guide.pdf” available in Assignments Folder after logging into your MOODLE account for referencing purposes.

    Marking criteria for Assignment 3:

    Part I: Group 

    Report

    Description of the section 

    Marks

    Introduction 

    State the general topic and give some background for Part I  points

    5

    Report 

    structure and 

    report 

    presentation

    Writing is clear and relevant, with no grammatical  and/spelling errors – polished and professional. Conforming to the IEEE template and format. 

    Compile a written report along with your evaluations  and recommendations. 

    The report must contain several screenshots of  evidence and a short description for each snapshot that provides 

    proof that you completed the work.

    60

    Conclusion 

    A brief summary of the overall findings in relation to  the purpose of the study. 

    Summary of report argument with concluding ideas that impact the reader.

    3

    References 

    section and 

    body citation

    Must consider at least ten current references 

    from journal/conference papers and books. 

    Strictly follow the order and instruction by IEEE.

    2

    Total 

    Total Marks for Part I: Group Report 

    70

    Part II: Video 

    Demonstration 

    Description of the section 

    Marks

    Implementation  

    and 

    Demonstration

    Implement, analyze and discuss the importance of three  cyber security tools from Part I during group video demo.

    15

    Presentation  

    Teamwork 

    and 

    Collaboration

    The information and technical knowledge are presented clearly and effectively. 

    Excellent teamwork and collaboration skills must be demonstrated

    5

    Demo and Viva 

    Demo and Viva will be conducted in week 11 lab class. 

    10

    Total 

    Total Marks for Part II: Video Demonstration 

    30

    Total 

    Marks

    Total Marks for Part I: Group Report Part II: Video Demonstration

    100

    Example Marking Rubric for Assignment 3

    Grade 

    Mark

    HD 

    80%+

    70%-79%

    CR 

    60%-69%

    50%-59%

    Fail 

    < 50%


    Excellent 

    Very Good 

    Good 

    Satisfactory 

    Unsatisfactory

    Introduction 

    Introduction is 

    clear, easy to 

    follow, well 

    prepared and 

    professional

    Introduction is clear and easy to follow.

    Introduction is 

    clear and 

    understandable

    Makes a basic 

    Introduction to 

    each of your data analytic tools and platforms

    Does not make an introduction to each of 

    your data 

    analytic tools and platforms

    Evaluation

    Logic is clear and easy to follow 

    with strong arguments 

    Demonstrated 

    excellent ability to think critically and sourced reference 

    material 

    appropriately 

    Consistency 

    logical and convincing 

    Demonstrated excellent ability to think critically but did not source reference 

    material 

    appropriately 

    Mostly consistent and convincing 

    Demonstrated 

    ability to think critically and sourced reference material 

    appropriately

    Adequate 

    cohesion and conviction 

    Demonstrated 

    ability to think critically and did not source reference material appropriately

    Argument is confused and disjointed 

    Did not demonstrate 

    ability to think 

    critically and did not source reference 

    material 

    appropriately

    Demonstration

    All elements are present and 

    very well 

    demonstrated.

    Components 

    present with 

    good cohesive

    Components 

    present and 

    mostly well 

    integrated

    Most components present

    Proposal lacks 

    structure.

    Report 

    structure and 

    report 

    presentation 

    Proper writing. Professionally 

    presented

    Properly 

    written, with 

    some minor 

    deficiencies 

    Mostly good, but some structure or presentation 

    problems

    Acceptable 

    presentation

    Poor structure, careless 

    presentation

    Reference style

    Clear styles with excellent sources of references.

    Clear 

    referencing/ 

    style

    Generally good 

    referencing/style

    Unclear 

    referencing/style

    Lacks 

    consistency 

    with many 

    errors

  • Based on what you have learned about business employment law, what three or four concepts, tools, methods, or practices would you recommend as important best-practice approaches to help

    Please respond to the following:

    • Assume you are an HR business partner and leader in a full-size HR department for your organization. Based on what you have learned about business employment law, what three or four concepts, tools, methods, or practices would you recommend as important best-practice approaches to help organizations implement better policies to safeguard against employment law violations? Be sure to explain why you made these particular choices.

    The post Based on what you have learned about business employment law, what three or four concepts, tools, methods, or practices would you recommend as important best-practice approaches to help first appeared on Courseside Kick.

  • This group assignment is the continuation of Assessment 1 case scenarios, MIT’s Alumni  portal project. Students should form groups of three or four members for this assignment.

    Overview of Software Engineering (MN507Assignment-2) Assignment Help

    Assessment Details and Submission Guidelines

    Trimester 

    T2 2024

    Unit Code 

    MN507

    Unit Title 

    Overview of Software Engineering

    Assessment Type 

    Assignment 2-Group Report

    Assessment Title 

    Group Assignment – Design and development of MIT’s Alumni portal

    Purpose of the  assessment (with  ULO Mapping)

    This assignment assesses the basic concepts of professional ethics in IT and maps  with the following ULOs: 

    Understand software engineering principles and design software  processes for business requirements.  

    Understand agile software development practices and analysis, design,  implementation and testing in the context of an agile framework  Compare and contrast different Software Engineering process models:  waterfall, evolutionary, spiral, prototyping and others.  

    Analyze business problems and elicit user requirements using software  engineering methodologies.  

    Use appropriate modeling techniques to model business requirements  and data requirements.  

    Capable of developing architectural designs for software systems and  understanding the different architectural design patterns.  

    Capable of designing and construction of user interfaces.  Software Engineering, specifically related to object-oriented software  engineering.  

    Produce a software system plan and framework including  implementation, deployment, testing, maintenance, and evolution

    Weight 

    20%

    Total Marks 

    100 Marks

    Word limit 

    2,000-2,500 Words or above

    Due Date 

    Friday, 27/09/2024 (Week 11)

    Submission  

    Guidelines

    Generative AI (GenAI) tools may be used with prior permission Students may use GenAI for this formative assessment with prior approval for understanding, learning and research purposes only. Using these tools  to write assignments will be considered as academic misconduct and be  penalized. If students are using any of the information from GenAI, then  he/she must cite the use of Gen AI in their assessment.  

    More information of using GenAI can be found via the following link: 

    All work must be submitted on Moodle by the due date along with a  completed Assignment Cover Page. 

    The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri  (Body) font and 2.54 cm margins on all four sides of your page with 


    appropriate section headings. 

    Reference sources must be cited in the text of the report, and listed  appropriately at the end in a reference list using IEEE referencing style.

    Extension 

    If an extension of time to submit work is required, a Special Consideration  Application must be submitted directly on AMS. You must submit this  application three working days prior to the due date of the assignment.  Further information is available at: 

    Academic  

    Misconduct

    Academic Misconduct is a serious offense. Depending on the seriousness of  the case, penalties can vary from a written warning or zero marks to  exclusion from the course or rescinding the degree. Students should make  themselves familiar with the full policy and procedure available at: For  further information, please refer to the Academic Integrity Section in your Unit Description.

    Assignment Description 

    This group assignment is the continuation of Assessment 1 case scenarios, MIT’s Alumni  portal project. Students should form groups of three or four members for this assignment.  The purpose of this assignment is to analyze, design and implement (coding, building, and  testing) the project. 

    MIT would like your group writing up a report, which contains the following activities for  designing and developing the Alumni portal: 

    1. Product Roadmap to outline a general timeframe (e.g., Gantt Chart) for when your  group will design, develop, and release identified requirements from Assessment 1. 

    2. The SRS document (a sample template in Moodle) which contains the following design  elements (using UML notations): 

    Identify and draw a use case diagram(s) for MIT’s Alumni portal 

    ER diagram with all possible entities and attributes 

    State chart diagram(s) 

    Sequence diagram(s) 

    Class diagram for the entire system with all the attributes, methods, and  associations. 

    3. The design document must include layered architecture and implement using the tools and platform of your choice, a software application with a front-end GUI,  middle layer implementing the business logic and backend database. 

    4. Your group also requires designing a test specification (test cases) based on the project requirements and implementing (verification) them with evidence. 

    The report contents should include the following headings: 

    a. Cover page and your group details 

    b. Executive Summary (state system overview, system users, and system usability) c. Table of Contents 

    d. Introduction 

    e. Discussions (expand and explain your group’s supportive arguments) 

    f. Conclusion and recommendations 

    g. References and appendices 

    References 

    Must consider at least eight references (with at least five current references – not earlier  than 2020). Must follow the IEEE referencing style. 

    Assignment Instructions: 

    Do not use Wikipedia as a source or a reference. 

    • Make sure you properly reference. 

    Marking Guide for Assignment 1

    Description 

    Weight

    Introduction 

    8

    Product roadmap (Gantt Chart) 

    10

    Use Case Diagram (at least 8 use cases) 

    8

    ER diagram 

    8

    State chart diagram(s) 

    8

    Sequence Diagram 

    8

    Class Diagram 

    8

    System Architecture (Layered based) 

    8

    GUI Portal 

    10

    Requirement Verification and Validation 

    15

    Conclusion & Recommendation 

    4

    References and Appendices 

    5

    Total 

    100

  • LO 1: Critically engage with major theorists and articulate theories regarding children and childhoods aged 3 to 5 years. LO 3: Negotiate with a mentor teacher to design, implement and critically reflect

    ECE6012 Assessment -2 Assessment Help

    Assessment Overview


    Overview

    Length or Duration

    Worth

    Due

    Collect ideas for experiences to implement with children according to their interests. Organize these in a Resource Folder (template linked below), connect to the five EYLF Learning Outcomes, and provide information for implementation. 

    Equivalent to 3500  words

    50%

    Sunday September 8

    learning outcomes 

    The learning outcomes assessed are:

    • LO 1: Critically engage with major theorists and articulate theories regarding children and childhoods aged 3 to 5 years.
    • LO 3: Negotiate with a mentor teacher to design, implement and critically reflect on an educational program that responds to the Victorian Early Years Learning and Development Framework (VEYLDF- for Victorian students) and/or the Early Years Learning Framework (EYLF).

     Assessment Structure

    Download the template linked below and use it to complete the assessment. 

    PLEASE NOTE:

    ECE6012 Assessment 2 Resource Folder Planning Template.docx

     ADDITIONAL RESOURCES:

    These resources/links will help you understand and plan for different age groups

    Explore the developmental stages of early childhood by visiting four informative links focused on Babies, Toddlers, and Preschoolers,  School-aged children to gain valuable insights into their growth and care.

    Rubric

    Rubric for Assessment Assessment 2: Electronic Resource Folder

     Instructions 

     

    To complete your assessment task, follow the below instructions.

    1. You will collect ideas for experiences to implement with children according to their interests. You will think of experiences that are related to physical, language, social, emotional and cognitive development, and connect to the five EYLF Learning Outcomes. EYLF-2022-V2.0.pdf
    2. The task must draw from the course materials on VU Collaborate.
    3. Using the Resource Folder template, your experiences will be listed under Physical, Language, Social, Emotional and Cognitive Development and specific to the Birth – 2, 2 – 3 and 3 – 5 age groups.
    4. In the template, please indicate the following for each experience:
      1. Name of experience
      2. Resources
      3. Suggested implementation strategies
      4. Learning possibilities
      5. EYLF Learning outcomes
      6. Related theory

    Submission Instructions

    Submit your completed assessment via the Assessment Dropbox: Assessment 2 : Resource Folder

  • Alpha’s Murals is a company that paints interior and exterior murals for both business and residential customers. Write a program named Beta App that performs the following tasks:

    IFN555 Programming Assignment

    Weighting: 50%    Total Marks: 100    Individual

    Due Date: 11.59 pm Friday 30th August 2024

    Submission: Online via QUT Canvas

    Problem Specification:

    Alpha’s Murals is a company that paints interior and exterior murals for both business and residential customers. Write a program named Beta App that performs the following tasks:

    Task 1: Display your personal information including your last name, first name and your student ID. Make these surrounded by a border composed of asterisks.

    Task 2: The application prompts the user to enter the number of orders for interior and exterior murals. This number has to be between 0 and 30 (inclusive). Otherwise, the program prompts the user to re-enter the number. 

    Task 3: Display the number of orders of interior and exterior murals. Compute and display the expected revenue for each type of mural and the total revenue from both types. Interior murals cost $500.00 each, and exterior murals cost $750.00 each. 

    Note that all revenues should be displayed using currency format.

    Task 4: Display a statement based on the following conditions:

    • If the number of exterior murals ordered is greater than the number of interior murals, the program should display “Exterior murals are becoming more attractive!”, else, the program displays “Interior murals are becoming popular!”. 
    • If the number of the orders are equal, then display “Both types are equally preferred!”

    Task 5: The user is prompted to input information for interior mural orders. Each interior mural order includes customer name and mural code: L for landscape, S for seascape, A for abstract, and O for others. Make sure that all the entered codes are valid (L, S, A or O), and, if not, prompt the user to re-enter the correct code. The number of orders should be the same as the number of interior murals ordered in Task 2.

    After the data entry for all the customers is complete, display a count of the number of customers ordering each type of interior mural. 

    Then, continuously prompt the user for a mural code until the user enters a sentinel value. For each code entry, display a list of the customers ordering that type of mural, or display a message that the code is not valid, and re-prompt the user for a valid mural code.  

    Note: You must use arrays in Task 5 in order to achieve the maximum marks.

    A sample screenshot for Task 2, 3, 4 and first part of Task 5 is provided below.

     

    In completing your assignment, please take note of the following:

    1. You should not use any C# concepts which have not been taught as part of Lectures 1 – 5 and covered in Tutorials 1 – 5.
    2. You should develop your code using simple logic.
    3. Test your code using your own test data covering multiple data sets.
    4. Your final code should not have any compilation/execution errors.

    Project Deliverable:

    Zip your project file and upload this zipped file onto Canvas using the link IFN555 Programming Assignment under Assessment 2 in Modules. The link will be available only from Friday 23 August 2024.  

    You can only upload ONCE

    Note: 

    Assessment submitted after the due date without an approved extension will not be marked and will receive a grade of 1 or 0%. If special circumstances prevent you from meeting the assessment due date, you can apply for an extension  through the Student Services in SEF. If you do not have an approved extension you should submit the work you have completed by the due date and it will be marked against the assessment criteria.

  • Task 2 [14 marks]  We have provided you with the Hotel database (Filename: IFN554_5C_Hotels.sql you can download from Canvas) to be used with MySQL Workbench. You must use this database

    ask 1 [6 marks] 

    In this task you are required to write an SQL script that builds a database to match the relational model below. Your database should be named “Heavenly Department Store”.

    The SQL statements in the script must be provided in the correct order. 

    Heavenly Department Store relational model is as follows:

    Note: Primary keys are denoted by bold and underline and foreign keys are in italics

    • Supply (SupplierNr, ItemNr, QtyNr)
    • Use (ItemNr, DeptCode)
    • Item (ItemNrItemName, CountryMade) 

    Note: 1.1 ItemNr or Name both possible PK using ItemNr as preferred PK

     

    • Supplier (SupplierNrSupplierNameFaxNr, SupplierCountry)

    Note: 1.1 SupplierNr or FaxNr or SupplierName are all possible PK using SupplierNr as preferred PK

    FOREIGN KEYS

    • Supply (SupplierNr) references Supplier (SupplierNr)
    • Supply (ItemNr) references Item (ItemNr)
    • Use (ItemNr) references Item (ItemNr)

    Other Constraints and Remarks

    • All primary and foreign key attributes that you use are strings (not text) comprising eight digits (8).
    • INTEGER type must be used for QtyNr is mandatory and must be greater than 0.
    • TEXT type must be used for all other attributes.
    • SupplierName and ItemName must contain a value (you will need to add values to these attributes)

    (Insert snapshots of tables and values here)

    Task 2 [14 marks] 

    We have provided you with the Hotel database (Filename: IFN554_5C_Hotels.sql you can download from Canvas) to be used with MySQL Workbench. You must use this database in MySQL Workbench to extract the necessary information as per the following query requirements. 

    Note: All tasks requiring SQL must provide as a screen snapshot of the execute SQL tab in MySQL Workbench that includes all sections. Snapshots must be readable

    • SQL Query code
    • Result Grid (table, view, update, new information etc.). The teaching team must be able to see the successful execution of the code
    • Action Output result
    • Schemas (where necessary)

    In your database – a booking commences at 2 pm (check in) and finishes at 10 am the following day (check out). Example: A booking for 3 nights is made on Tuesday 8th August with a check-in date of Thursday 10th August from 2pm and a check-out time of Sunday 13th August at 10 am.

     

     

    Write an SQL script for querying data for the following information.

    2a.

    List the hotelNo which has 2 or more single rooms [2 marks]

    2a response

    Insert code and result snapshot here

    2b.

    How many different guests visited the Meriton Hotel? [2 marks]

    2b. response

    Insert code and result snapshot here

    2c.

    What is the total income from bookings for the Meriton Hotel? 

    [3 marks]

    2c. response

    Insert code and result snapshot here

    2d.

    List the guests’ names who have visited more than 2 times [3 marks]

    2d response

    Insert code and result snapshot here

    2e.

    For each hotel, list the room type, for each room type list the number of each room type and the number with bookings [4 marks]

    2e. response

    Insert code and result snapshot here

    Task 3 [5 marks] – Individual

    Perform the following tasks.

    3a.

    Write a command to create an index on hotel name and show the results [1 mark]

    3a. response

    Insert code and result snapshot here

    3b.

    Create a user with the name ‘Mickey’ @ local host with password ‘iloveORM’ and force the user to update the password [01 mark]. 

    Show the results. [1 mark]

    3b. response

    Insert code and result snapshot here

    3c.

    Create a view called HotelSummaryView – list the hotelNo, type and price of each room. Order the result by hotelNo, room type and price [1 mark]

    3c.

    response

    Insert code and result snapshot here

    3d.

    Grant permissions to select and read this view . Show results[1 mark]

    3d. response

    Insert code and result snapshot here

    3e.

    Revoke permissions and show results [1 mark]

    3e. response

    Insert code and result snapshot here

    Task 4 [5 marks] 

    Perform the following tasks continue using the Hotel database provided.

     

    4a.

    Update the prices of all single rooms by 5% and show results [1 mark]

    4a. response

    Insert code and result snapshot here

    4b.

    Insert 2 rows of new data in the table Guest and Booking [2 marks]

    4b. response

    Insert code and result snapshot here

    4c. 

    Delete one of the rows your inserted into the Guest table [2 marks]

    4c response

    (Insert snapshot here)

    Task 5 [10 marks] 

    Using the following table structure, identify all functional dependencies and then decompose this table into a set of 3NF relations. The table is in 0NF so please apply all rules accordingly.

     

    Assumptions:

    • Product Price is Per Unit
    • There are not multi values

    Order No

    Order Time

    (dd/mm/yyyy/hh:mm)

    Cust DOB (dd/mm/yyyy)

    Total (AUD$)

    Item #

    Order Prod

    Order Qty

    Customer

    No

    Customer

    Name

    Product

    No.

    Product Name

    Supplier

    Prod

    RRP (AUD$)

    Age

    1

    05/11/2023 15:00

    01/11/1962

    600

    1

    P4567

    3

    007

    James Bond

    P4567

    Wristwatch

    Seiko

    200

    62

    23

    05/12/2023 15:00

    01/11/1950

    360

    1

    T1245

    1

    024

    Sean Connery

    T1245

    Cufflinks

    Harrods

    20

    74

    23

    05/12/2023 15:00

    01/11/1950

    360

    2

    P1299

    1

    024

    Sean Connery

    P1299

    Tie Clip

    Harrods

    120

    74

    23

    05/12/2023 15:00

    01/11/1950

    360

    3

    T1304

    1

    024

    Sean Connery

    T1304

    Shoes

    Sketchers

    220

    74

    Insert response here All tables must be in 3NF.

    Task 6 [10 marks]

    The use of Generative AI such as ChatGPT is not permitted for this task. QUT policy states the following: “If you submit an assessment “that has been produced or modified, wholly or in part, by an artificial intelligence tool, algorithm, or computer generator where such actions are not authorised in the assessment task”, this may be treated as a breach of our Academic Integrity Policy and appropriate penalties imposed.

    This task is a reflective task. You are required to answer the question below in your own words. Your answer should be your opinions, experience and personal perspective. Your response should be supported by research to validate your viewpoints. Provide in text referencing where appropriate. Your response should be between 400 and 600 words not including references.

  • Interaction Design and Usability (ICT710 ) Assignment Help ICT710  Interaction Design and Usability  Semester-2, 2024 Assessment Overview

    Interaction Design and Usability (ICT710 ) Assignment Help

    ICT710  Interaction Design and Usability  Semester-2, 2024

    Assessment Overview 

     

    Assessment tasks 

    Learning Outcome Mapping

    Assessment ID 

    Assessment Item 

    When due 

    Weighting 

    ULO# 

    CLO# for  

    BITS

    Critique (individual) (1000  words) 

    Session 4 

    20% 

    1, 2 

    1, 2

    Needs Analysis and Usability  Test Report (Individual) (1500  Words)

    Session 9 

    40% 

    2, 3, 4 

    1, 2

    3* 

    Part A – Design Report  

    (Group)

    Part A – Session 13 (Study  Week) 

    30% 

    1, 2, 3, 4, 5 

    1, 2, 3, 4, 5

    Part B Presentation (Group) 

    Part B – Session 14 (Exam Week) 

    10% 

    1, 2, 3, 4, 5 

    1, 2, 3, 4, 5

    Note: * denotes ‘Hurdle Assessment Item’ that students must achieve at least 40% in this item to pass the unit.

     

    Referencing guides 

    You must reference all the sources of information you have used in your assessments. Please use the  IEEE referencing style when referencing in your assessments in this unit. Refer to the library’s  referencing guides for more information. 

    Academic misconduct 

    VIT enforces that the integrity of its students’ academic studies follows an acceptable level of excellence. VIT will adhere to its VIT Policies, Procedures and Forms where it explains the importance of  staff and student honesty in relation to academic work. It outlines the kinds of behaviors that are  “academic misconduct”, including plagiarism. 

    Late submissions 

    In cases where there are no accepted mitigating circumstances as determined through VIT Policies, Procedures and Forms, late submission of assessments will lead automatically to the imposition of a  penalty. Penalties will be applied as soon as the deadline is reached. 

    Short extensions and special consideration 

    Special Consideration is a request for: 

    • Extensions of the due date for an assessment, other than an examination (e.g. assignment  extension). 

    • Special Consideration (Special Consideration in relation to a Completed assessment, including an end-of-unit Examination). 

    Students wishing to request Special Consideration in relation to an assessment the due date of which  has not yet passed must engage in written emails to the teaching team to Request for Special  Consideration as early as possible and prior to start time of the assessment due date, along with any  accompanying documents, such as medical certificates. 

    For more information, visit VIT Policies, Procedures and Forms

    Inclusive and equitable assessment 

    Reasonable adjustment in assessment methods will be made to accommodate students with a  documented disability or impairment. Contact the unit teaching team for more information. 

    Contract Cheating 

    Contract cheating usually involves the purchase of an assignment or piece of research from another  party. This may be facilitated by a fellow student, friend or purchased on a website. Other forms of  contract cheating include paying another person to sit an exam in the student’s place.

    Contract cheating warning: 

    • By paying someone else to complete your academic work, you don’t learn as much as you  could have if you did the work yourself. 

    • You are not prepared for the demands of your future employment. 

    • You could be found guilty of academic misconduct. 

    • Many of the pay contract cheating companies recycle assignments despite guarantees of  “original, plagiarism-free work” so similarity is easily detected by TurnitIn. 

    • Penalties for academic misconduct include suspension and exclusion. 

    • Students in some disciplines are required to disclose any findings of guilt for academic  misconduct before being accepted into certain professions (e.g., law). 

    • You might disclose your personal and financial information in an unsafe way, leaving yourself  open to many risks including possible identity theft. 

    • You also leave yourself open to blackmail – if you pay someone else to do an assignment for  you, they know you have engaged in fraudulent behavior and can always blackmail you. 

    Grades 

    We determine your grades to the following Grading Scheme:

    Grade 

    Percentage

    80% – 100%

    70% – 79%

    60% – 69%

    50% – 59%

    0% – 49%

    Assessment Details for Assessment Item 1: 

    Overview 

    Assessment tasks 

    Learning Outcome Mapping

    Assessment ID 

    Assessment Item 

    When due 

    Weighting 

    ULO# 

    CLO# for BITS

    1

    Case Study Report (individual) 

    Session 6 

    20% 

    1, 2

    Introduction 

     

    You will submit work in assessment 1 submission link on week 4. This is an individual assessment. 

    Students are to write a critique by selecting a research paper from the proquest. Type interface design in the search box. Select any scholarly journal article  only. The paper needs to be related to the interaction design. The critique should not exceed 1000 words. Below shows steps for writing a critique: 

    The example of how to write a critique is provided by clicking here.

     

    Submission Instructions 

    All submissions are to be submitted through Turnitin. Drop-boxes linked to Turnitin will be set up in Moodle. Assessments not submitted through these drop boxes will not be considered. Submissions must be made by the end of session 6. 

    The Turnitin similarity score will be used to determine any plagiarism of your submitted assessment. Turnitin will check conference websites, Journal articles,  online resources, and your peer’s submissions for plagiarism. You can see your Turnitin similarity score when you submit your assessments to the  appropriate drop-box. If your similarity score is of concern, you can change your assessment and resubmit. However, re-submission is only allowed before  the submission due date and time. You cannot make re-submissions after the due date and time have elapsed. 

    Note: All work is due by the due date and time. Late submissions will be penalized at 20% of the assessment final grade per day, including weekends. Marking Criteria/Rubric 

    You will be assessed on the following marking criteria/Rubric:

    Assessment criteria 

    Exceptional >=80% 

    Admirable 70% – 79% 

    Creditable 60% – 69% 

    Acceptable 50% – 59% 

    Unsatisfactory <=49

    Introduction 

    5 marks 

    Introduction summarized all of the article and was able to highlight the importance. 

    8 points

    Introduction covers most of the article in a detailed manner. Some important points are highlighted. 

    4 points

    Introduction covers most of the article but in a brief manner 

    3 points 

    Introduction summarized some content of the article in a brief manner 

    2 points

    Introduction does not reflect the paper and is not relevant to the unit 

    1 points 

    Content and Analysis 

    10 marks

    The contentis professionally done. 

    10 points 

    The contentis well done and includes most of the facts. 

    8 points 

    The content is fairly well done and includes some of the facts. 

    6 points 

    The contentis ok but there is room for improvement. 

    4 points 

    The contentis briefly 

    explained. 

    2 points

    Structure and  

    Organization 

    5 marks

    Report Layout is consistent and professionally done. 

    There are no grammatical errors. 

    5 points 

    Report layout is consistent and professionally done. There are a few grammatical errors. 

    4 points 

    Report layout is 

    consistency. There are a 

    few grammatical errors. 

    3 points 

    Report layout is consistent. There are some grammatical errors. 

    2 points 

    The report layout is not 

    consistent and there are many grammatical errors. 

    1 points

     

    Assessment Details for Assessment Item 2: 

    Overview 

    Assessment tasks 

    Learning Outcome Mapping

    Assessment ID 

    Assessment Item 

    When due 

    Weighting 

    ULO# 

    CLO# for  

    BITS

    Needs Analysis and Usability  Test Report (Individual) (1500  Words)

    Session 9 

    40% 

    2, 3, 4 

    1, 2

    Introduction 

    Students are required to use the findings of a needs analysis and usability test conducted on VitEat mobile app for the report. VitIate mobile app is a  Mobile Food Delivery App. A mobile food delivery app that: 

    • connects customers with local restaurants 

    • offering a platform to browse menus 

    • place orders 

    • track deliveries. 

    The purpose of this report was to identify user needs, evaluate the product’s usability, and provide recommendations for improvement. 

    Needs Analysis 

    To understand the needs and expectations of target users in relation to VitIate mobile app. 

    • Understanding user preferences for food types, cuisines, and dietary restrictions. 

    • Identifying pain points in the current food ordering process (e.g., long wait times, difficulty finding desired options). • Assessing user expectations for delivery speed, accuracy, and customer service. 

    • Determining the importance of features like order customization, payment options, and loyalty programs. 

    Usability Testing 

    To evaluate the usability of VitEat mobile app and identify areas for improvement. 

    • Evaluating the ease of navigation within the app (e.g., finding restaurants, browsing menus, placing orders). 

    • Assessing the clarity and effectiveness of information displayed (e.g., menu items, pricing, delivery times).

    • Testing the checkout process for efficiency and user-friendliness. 

    • Evaluating the order tracking experience and its usefulness to users. 

    • Assessing the overall user satisfaction with the app’s design and functionality. 

    Below is the format for the report: 

    1. Executive Summary 

    2. Introduction 

    3. Methodology 

    3.1. Needs Analysis 

    3.2. Usability Testing 

    4. Findings 

    4.1. Needs Analysis 

    4.2. Usability Testing 

    5. Analysis and Discussion 

    6. Recommendations 

    7. Conclusion 

    8. Appendices 

    9. Visuals 

    Students need to use tool the following tools for this assessment: 

    1. Figma 

    2. Mock Flow 

    3. Canva 

    4. Lucid chart 

    5. Visual Paradigm 

    Submission Instructions 

    All submissions are to be submitted through Turnitin. Drop-boxes linked to Turnitin will be set up in Moodle. Assessments not submitted through these drop boxes will not be considered. Submissions must be made by the end of session 9. 

    The Turnitin similarity score will be used to determine any plagiarism of your submitted assessment. Turnitin will check conference websites, Journal articles,  online resources, and your peer’s submissions for plagiarism. You can see your Turnitin similarity score when you submit your assessments to the  appropriate drop-box. If your similarity score is of concern, you can change your assessment and resubmit. However, resubmission is only allowed before the submission due date and time. You cannot make re-submissions after the due date and time have elapsed. 

    Note: All work is due by the due date and time. Late submissions will be penalized at 20% of the assessment final grade per day, including weekends. 

    Marking Criteria/Rubric 

    You will be assessed on the following marking criteria/Rubric:

    Assessment criteria 

    Exceptional >=80% 

    Admirable 70% – 79% 

    Creditable 60% – 69% 

    Acceptable 50% – 59% 

    Unsatisfactory <=49

    Methodology 

    15 marks

    Clearly articulated research design, appropriate methodology chosen, detailed explanation of data collection and analysis methods. 

    13 – 15 points 

    Adequate research design, appropriate methodology chosen, explanation of data collection and analysis methods are sufficient. 

    9 – 12 points 

    Adequate research design, appropriate methodology chosen, some explanation of data collection and 

    analysis methods. 

    8 – 10 points 

    Basic research design, 

    limited explanation of 

    methodology, some gaps in data collection and 

    analysis.. 

    5 – 7 points 

    Inadequate research design, inappropriate methodology, insufficient explanation of methods. 

    0 – 5 points

    Finding 

    15 marks 

    Clear and comprehensive 

    presentation of findings, 

    supported by data, insightful analysis and interpretation.. 

    13 – 15 points

    Relevant findings presented, supported by some data, 

    analysis and interpretation. 9 – 12 points

    Relevant findings 

    presented, supported by some data, basic analysis and interpretation. 

    8 -10 points

    Limited findings presented, insufficient data support, superficial analysis. 

    5 – 7 points

    Inaccurate or irrelevant 

    findings, lack of data support, no analysis. 

    0 – 5 points 

    Report layout & spelling 5 marks

    Report Layout is consistent and professionally done. 

    5 points

    Report Layout is consistent and professionally done. 

    4.5 points

    Report Layout is 

    consistency. 

    4 points

    Report layout is consistent. There are some grammatical errors. 

    3 points

    The report layout is not 

    consistent and there are many grammatical errors. 

    2 points

    Visual 

    5 marks

    Effective use of visuals to 

    enhance understanding, clear and informative, appropriate use of graphics. 

    5 points

    Some use of visuals, generally effective,some minor issues with clarity or relevance. 

    4 points

    Limited use of visuals, lack of clarity or relevance, 

    inappropriate graphics. 

    3 points

    ineffective use of visuals. 2 points

    No or ineffective use of 

    visuals 

    0 points

    Assessment Details for Assessment Item 3: 

     

    Overview 

    Assessment tasks 

    Learning Outcome Mapping

    Assessment ID 

    Assessment Item 

    When due 

    Weighting 

    ULO# 

    CLO# for  

    BITS

    3

    Part A – Design Report (Group) 

    Session 13 (Study Week) 

    30%

    1, 2, 3, 4, 5 

    1, 2, 3, 4, 5

    Part B – Presentation (Group) 

    Session 14 (Exam Week) 

    10%

    Introduction 

    Students will submit work in the Design report during the study period and the presentation will happen during the class time. This is a group  assessment. The group will comprise 4 – 5 students. The group leader is responsible for submitting the report and the group members are  required to submit the group participation form. 

    This is the continuation of the previous assessment. Students will choose the analysis & usability report from the group members and use it for the  design report. Below is the structure for the report: 

    1. Introduction 

    2. Design Process 

    3. Design Rationale 

    4. User Interface Design 

    5. Usability Evaluation 

    6. Conclusion 

    For the presentation, students are expected to prepare a 10-minute presentation for part B. The presentation should not exceed 10 minutes. Every  minute exceeded will occur with a 5% penalty. All students in the team are required to participate in presentations. 

    Submission Instructions 

    All submissions are to be submitted through Turnitin. Drop-boxes linked to Turnitin will be set up in Moodle. Assessments not submitted through these drop boxes will not be considered. Submissions must be made by the end of session 13. 

    The Turnitin similarity score will be used to determine any plagiarism of your submitted assessment. Turnitin will check conference websites, Journal articles,

    online resources, and your peer’s submissions for plagiarism. You can see your Turnitin similarity score when you submit your assessments to the

    Victorian Institute of Technology CRICOS Provider No. 02044E, RTO No: 20829 

    appropriate drop-box. If your similarity score is of concern, you can change your assessment and resubmit. However, re-submission is only allowed before  the submission due date and time. You cannot make re-submissions after the due date and time have elapsed. 

    Note: All work is due by the due date and time. Late submissions will be penalized at 20% of the assessment final grade per day, including weekends.