Collect ideas for experiences to implement with children according to their interests. Organize these in a Resource Folder (template linked below), connect to the five EYLF Learning Outcomes, and provide information for implementation.
Equivalent to 3500 words
50%
Sunday September 8
learning outcomes
The learning outcomes assessed are:
LO 1: Critically engage with major theorists and articulate theories regarding children and childhoods aged 3 to 5 years.
LO 3: Negotiate with a mentor teacher to design, implement and critically reflect on an educational program that responds to the Victorian Early Years Learning and Development Framework (VEYLDF- for Victorian students) and/or the Early Years Learning Framework (EYLF).
Assessment Structure
Download the template linked below and use it to complete the assessment.
These resources/links will help you understand and plan for different age groups
Explore the developmental stages of early childhood by visiting four informative links focused on Babies, Toddlers, and Preschoolers, School-aged children to gain valuable insights into their growth and care.
Rubric
Rubric for Assessment Assessment 2: Electronic Resource Folder
Instructions
To complete your assessment task, follow the below instructions.
You will collect ideas for experiences to implement with children according to their interests. You will think of experiences that are related to physical, language, social, emotional and cognitive development, and connect to the five EYLF Learning Outcomes. EYLF-2022-V2.0.pdf
The task must draw from the course materials on VU Collaborate.
Using the Resource Folder template, your experiences will be listed under Physical, Language, Social, Emotional and Cognitive Development and specific to the Birth – 2, 2 – 3 and 3 – 5 age groups.
In the template, please indicate the following for each experience:
Name of experience
Resources
Suggested implementation strategies
Learning possibilities
EYLF Learning outcomes
Related theory
Submission Instructions
Submit your completed assessment via the Assessment Dropbox: Assessment 2 : Resource Folder
Alpha’s Murals is a company that paints interior and exterior murals for both business and residential customers. Write a program named Beta App that performs the following tasks:
Task 1: Display your personal information including your last name, first name and your student ID. Make these surrounded by a border composed of asterisks.
Task 2: The application prompts the user to enter the number of orders for interior and exterior murals. This number has to be between 0 and 30 (inclusive). Otherwise, the program prompts the user to re-enter the number.
Task 3: Display the number of orders of interior and exterior murals. Compute and display the expected revenue for each type of mural and the total revenue from both types. Interior murals cost $500.00 each, and exterior murals cost $750.00 each.
Note that all revenues should be displayed using currency format.
Task 4: Display a statement based on the following conditions:
If the number of exterior murals ordered is greater than the number of interior murals, the program should display “Exterior murals are becoming more attractive!”, else, the program displays “Interior murals are becoming popular!”.
If the number of the orders are equal, then display “Both types are equally preferred!”
Task 5: The user is prompted to input information for interior mural orders. Each interior mural order includes customer name and mural code: L for landscape, S for seascape, A for abstract, and O for others. Make sure that all the entered codes are valid (L, S, A or O), and, if not, prompt the user to re-enter the correct code. The number of orders should be the same as the number of interior murals ordered in Task 2.
After the data entry for all the customers is complete, display a count of the number of customers ordering each type of interior mural.
Then, continuously prompt the user for a mural code until the user enters a sentinel value. For each code entry, display a list of the customers ordering that type of mural, or display a message that the code is not valid, and re-prompt the user for a valid mural code.
Note: You must use arrays in Task 5 in order to achieve the maximum marks.
A sample screenshot for Task 2, 3, 4 and first part of Task 5 is provided below.
In completing your assignment, please take note of the following:
You should not use any C# concepts which have not been taught as part of Lectures 1 – 5 and covered in Tutorials 1 – 5.
You should develop your code using simple logic.
Test your code using your own test data covering multiple data sets.
Your final code should not have any compilation/execution errors.
Project Deliverable:
Zip your project file and upload this zipped file onto Canvas using the link IFN555 Programming Assignment under Assessment 2 in Modules. The link will be available only from Friday 23 August 2024.
You can only upload ONCE
Note:
Assessment submitted after the due date without an approved extension will not be marked and will receive a grade of 1 or 0%. If special circumstances prevent you from meeting the assessment due date, you can apply for an extension through the Student Services in SEF. If you do not have an approved extension you should submit the work you have completed by the due date and it will be marked against the assessment criteria.
In this task you are required to write an SQL script that builds a database to match the relational model below. Your database should be named “Heavenly Department Store”.
The SQL statements in the script must be provided in the correct order.
Heavenly Department Store relational model is as follows:
Note: Primary keys are denoted by bold and underlineand foreign keys are in italics
Supply (SupplierNr, ItemNr, QtyNr)
Use (ItemNr, DeptCode)
Item (ItemNr, ItemName, CountryMade)
Note: 1.1 ItemNr or Name both possible PK using ItemNr as preferred PK
All primary and foreign key attributes that you use are strings (not text) comprising eight digits (8).
INTEGER type must be used for QtyNr is mandatory and must be greater than 0.
TEXT type must be used for all other attributes.
SupplierName and ItemName must contain a value (you will need to add values to these attributes)
(Insert snapshots of tables and values here)
Task 2 [14 marks]
We have provided you with the Hotel database (Filename: IFN554_5C_Hotels.sql you can download from Canvas) to be used with MySQL Workbench. You must use this database in MySQL Workbench to extract the necessary information as per the following query requirements.
Note: All tasks requiring SQL must provide as a screen snapshot of the execute SQL tab in MySQL Workbench that includes all sections. Snapshots must be readable
SQL Query code
Result Grid (table, view, update, new information etc.). The teaching team must be able to see the successful execution of the code
Action Output result
Schemas (where necessary)
In your database – a booking commences at 2 pm (check in) and finishes at 10 am the following day (check out). Example: A booking for 3 nights is made on Tuesday 8th August with a check-in date of Thursday 10th August from 2pm and a check-out time of Sunday 13th August at 10 am.
Write an SQL script for querying data for the following information.
2a.
List the hotelNo which has 2 or more single rooms [2 marks]
2a response
Insert code and result snapshot here
2b.
How many different guests visited the Meriton Hotel? [2 marks]
2b. response
Insert code and result snapshot here
2c.
What is the total income from bookings for the Meriton Hotel?
[3 marks]
2c. response
Insert code and result snapshot here
2d.
List the guests’ names who have visited more than 2 times [3 marks]
2d response
Insert code and result snapshot here
2e.
For each hotel, list the room type, for each room type list the number of each room type and the number with bookings [4 marks]
2e. response
Insert code and result snapshot here
Task 3 [5 marks] – Individual
Perform the following tasks.
3a.
Write a command to create an index on hotel name and show the results [1 mark]
3a. response
Insert code and result snapshot here
3b.
Create a user with the name ‘Mickey’ @ local host with password ‘iloveORM’ and force the user to update the password [01 mark].
Show the results. [1 mark]
3b. response
Insert code and result snapshot here
3c.
Create a view called HotelSummaryView – list the hotelNo, type and price of each room. Order the result by hotelNo, room type and price [1 mark]
3c.
response
Insert code and result snapshot here
3d.
Grant permissions to select and read this view . Show results[1 mark]
3d. response
Insert code and result snapshot here
3e.
Revoke permissions and show results [1 mark]
3e. response
Insert code and result snapshot here
Task 4 [5 marks]
Perform the following tasks continue using the Hotel database provided.
4a.
Update the prices of all single rooms by 5% and show results [1 mark]
4a. response
Insert code and result snapshot here
4b.
Insert 2 rows of new data in the table Guest and Booking [2 marks]
4b. response
Insert code and result snapshot here
4c.
Delete one of the rows your inserted into the Guest table [2 marks]
4c response
(Insert snapshot here)
Task 5 [10 marks]
Using the following table structure, identify all functional dependencies and then decompose this table into a set of 3NF relations. The table is in 0NF so please apply all rules accordingly.
Assumptions:
Product Price is Per Unit
There are not multi values
Order No
Order Time
(dd/mm/yyyy/hh:mm)
Cust DOB (dd/mm/yyyy)
Total (AUD$)
Item #
Order Prod
Order Qty
Customer
No
Customer
Name
Product
No.
Product Name
Supplier
Prod
RRP (AUD$)
Age
1
05/11/2023 15:00
01/11/1962
600
1
P4567
3
007
James Bond
P4567
Wristwatch
Seiko
200
62
23
05/12/2023 15:00
01/11/1950
360
1
T1245
1
024
Sean Connery
T1245
Cufflinks
Harrods
20
74
23
05/12/2023 15:00
01/11/1950
360
2
P1299
1
024
Sean Connery
P1299
Tie Clip
Harrods
120
74
23
05/12/2023 15:00
01/11/1950
360
3
T1304
1
024
Sean Connery
T1304
Shoes
Sketchers
220
74
Insert response here All tables must be in 3NF.
Task 6 [10 marks]
The use of Generative AI such as ChatGPT is not permitted for this task. QUT policy states the following: “If you submit an assessment “that has been produced or modified, wholly or in part, by an artificial intelligence tool, algorithm, or computer generator where such actions are not authorised in the assessment task”, this may be treated as a breach of our Academic Integrity Policy and appropriate penalties imposed.
This task is a reflective task. You are required to answer the question below in your own words. Your answer should be your opinions, experience and personal perspective. Your response should be supported by research to validate your viewpoints. Provide in text referencing where appropriate. Your response should be between 400 and 600 words not including references.
Interaction Design and Usability (ICT710 ) Assignment Help
ICT710 Interaction Design and Usability Semester-2, 2024
Assessment Overview
Assessment tasks
Learning Outcome Mapping
Assessment ID
Assessment Item
When due
Weighting
ULO#
CLO# for
BITS
1
Critique (individual) (1000 words)
Session 4
20%
1, 2
1, 2
2
Needs Analysis and Usability Test Report (Individual) (1500 Words)
Session 9
40%
2, 3, 4
1, 2
3*
Part A – Design Report
(Group)
Part A – Session 13 (Study Week)
30%
1, 2, 3, 4, 5
1, 2, 3, 4, 5
Part B Presentation (Group)
Part B – Session 14 (Exam Week)
10%
1, 2, 3, 4, 5
1, 2, 3, 4, 5
Note: * denotes ‘Hurdle Assessment Item’ that students must achieve at least 40% in this item to pass the unit.
Referencing guides
You must reference all the sources of information you have used in your assessments. Please use the IEEE referencing style when referencing in your assessments in this unit. Refer to the library’s referencing guides for more information.
Academic misconduct
VIT enforces that the integrity of its students’ academic studies follows an acceptable level of excellence. VIT will adhere to its VIT Policies, Procedures and Forms where it explains the importance of staff and student honesty in relation to academic work. It outlines the kinds of behaviors that are “academic misconduct”, including plagiarism.
Late submissions
In cases where there are no accepted mitigating circumstances as determined through VIT Policies,Procedures and Forms, late submission of assessments will lead automatically to the imposition of a penalty. Penalties will be applied as soon as the deadline is reached.
Short extensions and special consideration
Special Consideration is a request for:
• Extensions of the due date for an assessment, other than an examination (e.g. assignment extension).
• Special Consideration (Special Consideration in relation to a Completed assessment, including an end-of-unit Examination).
Students wishing to request Special Consideration in relation to an assessment the due date of which has not yet passed must engage in written emails to the teaching team to Request for Special Consideration as early as possible and prior to start time of the assessment due date, along with any accompanying documents, such as medical certificates.
For more information, visit VIT Policies, Procedures and Forms.
Inclusive and equitable assessment
Reasonable adjustment in assessment methods will be made to accommodate students with a documented disability or impairment. Contact the unit teaching team for more information.
Contract Cheating
Contract cheating usually involves the purchase of an assignment or piece of research from another party. This may be facilitated by a fellow student, friend or purchased on a website. Other forms of contract cheating include paying another person to sit an exam in the student’s place.
Contract cheating warning:
• By paying someone else to complete your academic work, you don’t learn as much as you could have if you did the work yourself.
• You are not prepared for the demands of your future employment.
• You could be found guilty of academic misconduct.
• Many of the pay contract cheating companies recycle assignments despite guarantees of “original, plagiarism-free work” so similarity is easily detected by TurnitIn.
• Penalties for academic misconduct include suspension and exclusion.
• Students in some disciplines are required to disclose any findings of guilt for academic misconduct before being accepted into certain professions (e.g., law).
• You might disclose your personal and financial information in an unsafe way, leaving yourself open to many risks including possible identity theft.
• You also leave yourself open to blackmail – if you pay someone else to do an assignment for you, they know you have engaged in fraudulent behavior and can always blackmail you.
Grades
We determine your grades to the following Grading Scheme:
Grade
Percentage
A
80% – 100%
B
70% – 79%
C
60% – 69%
D
50% – 59%
F
0% – 49%
Assessment Details for Assessment Item 1:
Overview
Assessment tasks
Learning Outcome Mapping
Assessment ID
Assessment Item
When due
Weighting
ULO#
CLO# for BITS
1
Case Study Report (individual)
Session 6
20%
1
1, 2
Introduction
You will submit work in assessment 1 submission link on week 4. This is an individual assessment.
Students are to write a critique by selecting a research paper from the proquest. Type interface design in the search box. Select any scholarly journal article only. The paper needs to be related to the interaction design. The critique should not exceed 1000 words. Below shows steps for writing a critique:
The example of how to write a critique is provided by clicking here.
Submission Instructions
All submissions are to be submitted through Turnitin. Drop-boxes linked to Turnitin will be set up in Moodle. Assessments not submitted through these drop boxes will not be considered. Submissions must be made by the end of session 6.
The Turnitin similarity score will be used to determine any plagiarism of your submitted assessment. Turnitin will check conference websites, Journal articles, online resources, and your peer’s submissions for plagiarism. You can see your Turnitin similarity score when you submit your assessments to the appropriate drop-box. If your similarity score is of concern, you can change your assessment and resubmit. However, re-submission is only allowed before the submission due date and time. You cannot make re-submissions after the due date and time have elapsed.
Note: All work is due by the due date and time. Late submissions will be penalized at 20% of the assessment final grade per day, including weekends. Marking Criteria/Rubric
You will be assessed on the following marking criteria/Rubric:
Assessment criteria
Exceptional >=80%
Admirable 70% – 79%
Creditable 60% – 69%
Acceptable 50% – 59%
Unsatisfactory <=49
Introduction
5 marks
Introduction summarized all of the article and was able to highlight the importance.
8 points
Introduction covers most of the article in a detailed manner. Some important points are highlighted.
4 points
Introduction covers most of the article but in a brief manner
3 points
Introduction summarized some content of the article in a brief manner
2 points
Introduction does not reflect the paper and is not relevant to the unit
1 points
Content and Analysis
10 marks
The contentis professionally done.
10 points
The contentis well done and includes most of the facts.
8 points
The content is fairly well done and includes some of the facts.
6 points
The contentis ok but there is room for improvement.
4 points
The contentis briefly
explained.
2 points
Structure and
Organization
5 marks
Report Layout is consistent and professionally done.
There are no grammatical errors.
5 points
Report layout is consistent and professionally done. There are a few grammatical errors.
4 points
Report layout is
consistency. There are a
few grammatical errors.
3 points
Report layout is consistent. There are some grammatical errors.
2 points
The report layout is not
consistent and there are many grammatical errors.
1 points
Assessment Details for Assessment Item 2:
Overview
Assessment tasks
Learning Outcome Mapping
Assessment ID
Assessment Item
When due
Weighting
ULO#
CLO# for
BITS
2
Needs Analysis and Usability Test Report (Individual) (1500 Words)
Session 9
40%
2, 3, 4
1, 2
Introduction
Students are required to use the findings of a needs analysis and usability test conducted on VitEat mobile app for the report. VitIate mobile app is a Mobile Food Delivery App. A mobile food delivery app that:
• connects customers with local restaurants
• offering a platform to browse menus
• place orders
• track deliveries.
The purpose of this report was to identify user needs, evaluate the product’s usability, and provide recommendations for improvement.
Needs Analysis
To understand the needs and expectations of target users in relation to VitIate mobile app.
• Understanding user preferences for food types, cuisines, and dietary restrictions.
• Identifying pain points in the current food ordering process (e.g., long wait times, difficulty finding desired options). • Assessing user expectations for delivery speed, accuracy, and customer service.
• Determining the importance of features like order customization, payment options, and loyalty programs.
Usability Testing
To evaluate the usability of VitEat mobile app and identify areas for improvement.
• Evaluating the ease of navigation within the app (e.g., finding restaurants, browsing menus, placing orders).
• Assessing the clarity and effectiveness of information displayed (e.g., menu items, pricing, delivery times).
• Testing the checkout process for efficiency and user-friendliness.
• Evaluating the order tracking experience and its usefulness to users.
• Assessing the overall user satisfaction with the app’s design and functionality.
Below is the format for the report:
1. Executive Summary
2. Introduction
3. Methodology
3.1. Needs Analysis
3.2. Usability Testing
4. Findings
4.1. Needs Analysis
4.2. Usability Testing
5. Analysis and Discussion
6. Recommendations
7. Conclusion
8. Appendices
9. Visuals
Students need to use tool the following tools for this assessment:
1. Figma
2. Mock Flow
3. Canva
4. Lucid chart
5. Visual Paradigm
Submission Instructions
All submissions are to be submitted through Turnitin. Drop-boxes linked to Turnitin will be set up in Moodle. Assessments not submitted through these drop boxes will not be considered. Submissions must be made by the end of session 9.
The Turnitin similarity score will be used to determine any plagiarism of your submitted assessment. Turnitin will check conference websites, Journal articles, online resources, and your peer’s submissions for plagiarism. You can see your Turnitin similarity score when you submit your assessments to the appropriate drop-box. If your similarity score is of concern, you can change your assessment and resubmit. However, resubmission is only allowed before the submission due date and time. You cannot make re-submissions after the due date and time have elapsed.
Note: All work is due by the due date and time. Late submissions will be penalized at 20% of the assessment final grade per day, including weekends.
Marking Criteria/Rubric
You will be assessed on the following marking criteria/Rubric:
Assessment criteria
Exceptional >=80%
Admirable 70% – 79%
Creditable 60% – 69%
Acceptable 50% – 59%
Unsatisfactory <=49
Methodology
15 marks
Clearly articulated research design, appropriate methodology chosen, detailed explanation of data collection and analysis methods.
13 – 15 points
Adequate research design, appropriate methodology chosen, explanation of data collection and analysis methods are sufficient.
9 – 12 points
Adequate research design, appropriate methodology chosen, some explanation of data collection and
analysis methods.
8 – 10 points
Basic research design,
limited explanation of
methodology, some gaps in data collection and
analysis..
5 – 7 points
Inadequate research design, inappropriate methodology, insufficient explanation of methods.
0 – 5 points
Finding
15 marks
Clear and comprehensive
presentation of findings,
supported by data, insightful analysis and interpretation..
13 – 15 points
Relevant findings presented, supported by some data,
analysis and interpretation. 9 – 12 points
Relevant findings
presented, supported by some data, basic analysis and interpretation.
8 -10 points
Limited findings presented, insufficient data support, superficial analysis.
5 – 7 points
Inaccurate or irrelevant
findings, lack of data support, no analysis.
0 – 5 points
Report layout & spelling 5 marks
Report Layout is consistent and professionally done.
5 points
Report Layout is consistent and professionally done.
4.5 points
Report Layout is
consistency.
4 points
Report layout is consistent. There are some grammatical errors.
3 points
The report layout is not
consistent and there are many grammatical errors.
2 points
Visual
5 marks
Effective use of visuals to
enhance understanding, clear and informative, appropriate use of graphics.
5 points
Some use of visuals, generally effective,some minor issues with clarity or relevance.
4 points
Limited use of visuals, lack of clarity or relevance,
inappropriate graphics.
3 points
ineffective use of visuals. 2 points
No or ineffective use of
visuals
0 points
Assessment Details for Assessment Item 3:
Overview
Assessment tasks
Learning Outcome Mapping
Assessment ID
Assessment Item
When due
Weighting
ULO#
CLO# for
BITS
3
Part A – Design Report (Group)
Session 13 (Study Week)
30%
1, 2, 3, 4, 5
1, 2, 3, 4, 5
Part B – Presentation (Group)
Session 14 (Exam Week)
10%
Introduction
Students will submit work in the Design report during the study period and the presentation will happen during the class time. This is a group assessment. The group will comprise 4 – 5 students. The group leader is responsible for submitting the report and the group members are required to submit the group participation form.
This is the continuation of the previous assessment. Students will choose the analysis & usability report from the group members and use it for the design report. Below is the structure for the report:
1. Introduction
2. Design Process
3. Design Rationale
4. User Interface Design
5. Usability Evaluation
6. Conclusion
For the presentation, students are expected to prepare a 10-minute presentation for part B. The presentation should not exceed 10 minutes. Every minute exceeded will occur with a 5% penalty. All students in the team are required to participate in presentations.
Submission Instructions
All submissions are to be submitted through Turnitin. Drop-boxes linked to Turnitin will be set up in Moodle. Assessments not submitted through these drop boxes will not be considered. Submissions must be made by the end of session 13.
The Turnitin similarity score will be used to determine any plagiarism of your submitted assessment. Turnitin will check conference websites, Journal articles,
online resources, and your peer’s submissions for plagiarism. You can see your Turnitin similarity score when you submit your assessments to the
Victorian Institute of Technology CRICOS Provider No. 02044E, RTO No: 20829
appropriate drop-box. If your similarity score is of concern, you can change your assessment and resubmit. However, re-submission is only allowed before the submission due date and time. You cannot make re-submissions after the due date and time have elapsed.
Note: All work is due by the due date and time. Late submissions will be penalized at 20% of the assessment final grade per day, including weekends.
Wireless Networks and Security (MN603 Assessment-2) Assignment Help
Assessment Details and Submission Guidelines
Trimester
T2 2024
Unit Code
MN603
Unit Title
Wireless Networks and Security
Assessment
Type
Assignment 2 (Group assignment, 3-4 members per group)
Assessment
Title
Implementation of Wireless networks and performance evaluation
Purpose of the assessment
(with ULO Mapping)
The purpose of the assignment is to compare NS3 simulators with other current network simulators. Developed, modified and studied wireless routing protocols performance with NS3 simulator. Design and implement Wireless Local Area Network (WLAN) technology based on IEEE 802.11 standards to ensure efficient and secure data transmission.
Students will be able to complete the following ULOs:
• Analyze and compare wireless communication protocols. • Compare standard-based technologies used in various networks. • Test and evaluate various wireless networks performance.
Weight
20%
Total Marks
60
Word limit
2500-3500
Due Date
Week 11; 27/09/2024
Submission
Guidelines
• All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.
• The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.
• Reference sources must be cited in the text of the report and listed appropriately at the end in a reference list using IEEE referencing style.
Extension
• If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at:
• Academic Misconduct is a serious offense. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at
For further information, please refer to the Academic Integrity Section in your Unit Description.
Use of
Generative
Artificial
Intelligence
(GenAI) in
Assessments
• More information about the use of Gen AI in student assessment can be found in the full policy and procedure available at: Further support can be found in the
• Further details on the type of assessment tasks, and whether Gen AI is permitted to be used or not are provided in the assessment brief.
Artificial
Intelligence
(AI) Score
Limit.
• Not acceptable AI score more than 30%. Please check your assignment AI score before submission.
Assignment Description
This assignment consists of three tasks.
Task 1 Study and analysis two network simulation software tools. Study the latest version of the NS3 simulator tool. Describe the new API and model change history of NS3.
Task 2. Involving analysis and modification of the NS3 lab exercises code. Task 3 It is a case study task. You need to analyze and answer three specific questions.
Q1. Explore and analyze the following network simulator and write a short comparative study report.
• NS3
• NS2
Q2. What is the latest version of NS3 simulator? What new features are added in the latest version of the NS3 simulator? Write a short report on the Changes from NS-3.38 to the latest version of NS3 simulator. Describe the new API and model change history of NS3.
Q2. Write a Multihop Ad Hoc wireless networks program for simulating in the NS3 simulator. Name the program as your group number. Your program should generate 5 packet captured files. Also give the name of the xml file as “Your Group name.xml.” Execute the program and execute NetAnim for visualization of the performance of your Multihop Ad Hoc program. Take a screenshot of the created .xml file in the NetAnimdisplay. Screenshot of 5 packet captured files that your program generates. Attach the code of your program in the submission report particularly 5 packet captured generation code.
[Hints: You can use Lab-3 task (aodv.cc) program and modify it according to the Task2]
Many wireless devices use wireless technology, yet they lack the necessary security protections. In an Australian Information Security Association (AISA) members gathering in Melbourne a security researcher, who has himself a diabetic, demonstrated a wireless attack on an insulin pump that could change the delivery of the patient. In this gathering another AISA member who is a security vendor found that they can scan a public space from up to 91 meters (300 feet) away, find vulnerable pumps made by a specific medical device manufacturer, and then force these devices to dispense fatal insulin doses.
Based on the above scenario, write a short report and answer the following questions: a) Conduct research on the current state of the attacks on wireless medical devices and proposed defenses to mitigate the attack.
b) Should the vendors who make this wireless medical device be forced to add security to their devices? What should be the penalty if they do not?
c) As per Australian cyber security laws, what should be the penalty for an attacker who manipulates a wireless device.
Source: Book: Security Awareness: Applying Practical Cybersecurity in your world, Mark Ciampa, Cengage.
————————————————-:End of Task:—————————————————
Marking Guide
Section to be included in the report
Description of the section
Marks
Task-1:
Q1. Explore and analyze NS2 and NS3 network simulators and write a short comparative study report. Q2. What is the latest version of NS3 simulator? What new features are added in the latest version of the NS3 simulator? Write a short report on the Changes from NS-3.38 to latest version of NS3 simulator. Describe the new API and model change history of NS3.
Q1. Detail Comparative study report on NS2 and NS3 Network simulators. Each simulator description in the study will be 5 marks each.
Q2. Correct and appropriate answers to this question. 10 marks.
5+5+10=20
Task-2: NS3 Simulation
Correctly written the Multihop Ad Hoc wireless networks program for generation of 5 packets captured files and appropriately created .xml file. Provided codes.
15
Task-3: Case Study
Introduction
Introduction
2
Conduct research on the current state of the attacks on wireless medical devices and proposed defenses to mitigate the attack.
Research the current state of the attacks on wireless medical devices and proposed defenses to mitigate the attack.
10
Should the vendors who make this wireless medical device be forced to add security to their devices? What should be the penalty if they do not?
Appropriate answers on question part b.
4
As per Australian cyber security laws, what should be the penalty for an attacker who manipulates a wireless device.
As per Australian cyber security laws, currently explained the penalty for an attacker who manipulates a wireless device.
3
Conclusion
Write a summary of the report highlighting the positive and negative points.
2
Reference style
Follow the IEEE reference style. Reference should be cited in the body of the report.
2
Format of the report
Report Layout and Format. Format must look professional.
2
Marking Rubric for Assignment #2: Total Marks 60
Grade
Mark
HD
80-100
D
70-79
CR
60-69
P
50-59
Fail
<50
Excellent
Very Good
Good
Satisfactory
Unsatisfactory
Task 1
Written
comparative
study report on NS2 and NS3
network
simulators. /20
Explored, studied, and compared their features on NS2
and NS3 simulators.
Relevant and soundly
analyzed
and wrote a comparative study report.
Generally
relevant and
comparative
study reported.
Comparative
study reported but not up to
the standard.
Comparative
study report is poorly written
Task 2
NS3
Simulation/7
Correctly written the Multihop Ad Hoc wireless networks program using and generated 5 packet capture files.
Provided codes.
Very good. Written the Multihop
Ad Hoc
wireless
networks
program and generated 5 packet
capture files. Provided
codes.
Good in writing the Multihop Ad Hoc wireless networks
program.
generated 5 packet capture files. Provided codes.
Satisfactorily
writing the Multihop Ad Hoc wireless
networks
program.
Generated 5 packet capture files. Provided codes but hard to find the location where change has been done.
Poorly or not
attempt writing the code.
Task 2
NS3
Simulation/8
Appropriately
created .xml file. And generated 6 packets captured files. Provided Valid Screenshots.
Created .xml file. And generated
packets
captured
files.
Provided
relevant
screen shots.
Properly named the
.xml file. And
generated
packets
captured files. Provided
relevant visible screen shots
Satisfactorily
named the
.xml file. And
generated
packets
captured files. Relevant screenshots are not
clearly visible
Poor
screenshots.
Hard to find the .xml
File. No output of the screen
shots.
Task 2
Case study
Introduction/2
All topics are
pertinent and
covered in depth.
Topics are
relevant and
Generally
relevant and
analyzed.
Some relevance and briefly
presented.
This is not
relevant to the
Ability to think
critically and source material is
demonstrated
soundly
analyzed.
assignment
topic.
Research the
current state of the attacks on wireless medical devices and
proposed
defenses to
mitigate the
attack./10
Demonstrated
excellent ability to think critically and present an
exceptional
research report and attack mitigation techniques.
Demonstrate
ed good
ability to
think
critically and present a
research
report and
attack
mitigation
techniques.
Demonstrated good ability to think critically and present a good research report and
attack
mitigation
techniques.
Demonstrated ability to think critically and
present a fair
research report and attack
mitigation
techniques.
Did not
demonstrate
ability to think
critically and
present poor
research report and attack
mitigation
techniques.
Should the
vendors who
make this
wireless medical device be
forced to add
security to their devices? What should be
penalty if they do not? /4
Excellently
proposal for dog vendor penalty
Very good
proposal for dogy vendor penalty
Good proposal for dogy vendor penalty
Fair proposal for dogy vendor
penalty .
Poor proposal for dogy vendor penalty .
As per
Australian cyber security laws,
what should be the penalty for an attacker who manipulates a wireless
device./3
Excellent strategy for an attacker who manipulates a
medical wireless
device.
Very good of your proposed strategy for an attacker
who
manipulates a medical
wireless
device.
Good strategy for an attacker who
manipulates a medical
wireless device.
Fair strategy of for an attacker who
manipulates a
medical wireless device.
Not relevancy of your prosed
strategy for an attacker who
manipulates a medical wireless device.
Conclusion/2
Excellent summary of the report
highlighting all the positive and
negative points
Very good
summary of the report
highlighting most of the positive and negative
points
Good
summary of the report
highlighting
significant
number of the positive and
negative points.
Fair summary of the report
highlighting a
few numbers of the positive and negative points.
Poor summary of the report.
Failed to be
highlighting
positive and
negative points.
Reference
style/2
Clear styles with
excellent source of references. Cited well in the body of the report.
Accounting for Managers (HM5001 T2) Assignment Help
Individual Assignment
Case Study
Procurement Scenario
GBI re-sells a range of bicycles. There is a request for the Deluxe Touring Bike (black). After reviewing the stock, you realize that stock is required, and you are required to start the procurement process. The Deluxe Touring Bike (black) is purchased from the vendor; Olympic Protective Gear. This vendor is already created in the system. You create a purchase order for the Deluxe Touring Bike (black), which is forwarded
to the vendor. The goods arrive, and you will create a goods receipt and verify the physical receipt in stock. An invoice will arrive, which will need to be entered into the system. Payments will be posted to the vendor, and you will review the impact the purchase has on General Ledger.
Your task is to complete the procurement process from a specified scenario and produce several screenshots to verify the completion of the process. The screenshots are to be inserted (pasted) in the specified areas below. If you are unsure how to take a screenshot, please refer to Google.
Required Steps
Purchase Order Data
Field
Description
Value
Purchasing
Organization
BI US
US00
Vendor
Olympic Protective Gear 101### (where ### is
your logon number)
Purchase Group
North America
N00
Material
Deluxe Touring Bikes (black)
DXTR1### (where ### is your logon number)
Quantity
4
Net Price
$1400 each
Currency
USD
Plant
DC Miami
MI00
Deliverable: Procurement
1. Insert a screenshot of your Purchase Order
Screenshot:
Note:
You could take a screenshot once the process is complete or use the Display Purchase Order functionality
Goods Receipt Data
Field
Description
Value
Storage Location Finished Goods US00
Invoice Data
Field
Description
Value
Company Code GBI Americas US00
Tax
XI (Input tax)
Payment Data
Field
Description Value
Posting Date
Today’s date
Journal Entry Date
Today’s date
Value Date
Today’s date
Period
Today’s month
G/L Account
100000
House Bank
Bank
Amount
5600
Currency
USD
Deliverable:
Procurement
2. Insert a screenshot of your Process Flow
Screenshot:
Note:
Deliverable:
Procurement
3. Insert a screenshot of your Post Outgoing Payments
Screenshot:
Note:
Fulfillment Scenario
GBI re-sells a range of bicycles. The company have had an Inquiry from an existing customer (The Bike Zone ###) for 4 Deluxe Touring Bike (Black). As indicated, the customer is already in the system. Once you create the Inquiry, the customer has requested a formal Quotation. The customer receives the quotation and sends GBI a Purchase Order
which is entered into the system as a Sales Order. As there is enough stock, you will complete the Delivery process. An Invoice will be created, and sent to the customer, and then GBI will receive Payment from the Customer.
Note: If you did the exercise, then your customer will be there. If not, then you will have to create the customer. The process of creating a new customer is given on page 68 of the SAP Tutorial.
Your task is to complete the fulfillment process from a specified scenario and produce several screenshots to verify the completion of the process. The required data for various steps is displayed below. All other data is the same as the exercise you have previously completed. The screenshots are to be inserted (pasted) in the specified areas below.
Required Steps
Create an Inquiry
Field
Description
Value
Sales Organization
US East
UE00
Distribution Channel Wholesale
WH
Division
Bikes
BI
Sold to Party
Bike Zone ###
City
Orlando
Cust Ref
###
Cust Ref Date
Today’s date
Valid From
Today’s date
Valid to
one month from today
Material
Deluxe Touring Bike (Black) DXTR1###
Order Quantity
4
Deliverable:
Fulfillment
4. Insert a screenshot of your Inquiry
Screenshot:
Note:
Create a Quotation with a Reference
Field
Description Value
Cust Ref
###
Cust Ref Date
Today’s date
Valid From
Today’s date
Valid to
one month from today
Req Deliv Date
Today’s date
Create Sales Order with Reference
Field
Description Value
Purchase Order No
###
Cust Reference
###
Cust Ref Date
Today’s date
First date
Tomorrow’s date
Deliverable:
Fulfillment
5. Insert a screenshot of your Sales Order
Screenshot:
Note:
Delivery Process
Field
Description
Value
Ship to Party
Bike Zone ###
Planned Creation date
Due up until next week
Picking Quantity
4
Storage Location
Finished Goods FG00
Create Invoice
Field
Description
Value
Ship to Party
Bike Zone ###
Billing Date From
Today’s date
Post Receipt of Customer Payment
Field
Description
Value
Company Code
UNS
US00
Posting Date
Today’s date
Journal Entry date
Today’s date
Journal Entry Type Billing Doc. Transfer RV
Period
Current Month
G/L Account
100000
Amount
12000
Currency
USD
Deliverable:
Fulfillment
6. Insert a screenshot of your Journal Entry
Screenshot:
Note:
Deliverable:
Fulfillment
7. Insert a screenshot of your Process Flow
Screenshot:
Note:
Marking Criteria
Marking criteria
Weighting in
Total Grades
1. Insert a screenshot of your Purchase Order 4%
2. Insert a screenshot of your Process Flow 4%
3. Insert a screenshot of your Post Outgoing Payments 6%
4. Insert a screenshot of your Inquiry 4%
5. Insert a screenshot of your Sales Order 4%
6. Insert a screenshot of your Journal Entry 4%
7. Insert a screenshot of your Process Flow 4%
TOTAL Weight
30%
Academic Integrity
Holmes Institute is committed to ensuring and upholding Academic Integrity, as Academic Integrity is integral to maintaining academic quality and the reputation of Holmes’ graduates. Accordingly, all assessment tasks need to comply with academic integrity guidelines. Table 1 identifies the six categories of Academic Integrity breaches. If you have any questions about Academic Integrity issues related to your assessment tasks, please consult your lecturer or tutor for relevant referencing guidelines and support resources. Many of these resources can also be found through the Study Skills link on Blackboard.
Academic Integrity breaches are a serious offense punishable by penalties that may range from deduction of marks, failure of the assessment task or unit involved, suspension of course enrolment, or cancellation of course enrolment.
Table 1: Six categories of Academic Integrity breaches
Plagiarism
Reproducing the work of someone else without attribution. When a student submits their own work on multiple occasions this is known as self-plagiarism.
Collusion
Working with one or more other individuals to complete an assignment, in a way that is not authorized.
Copying
Reproducing and submitting the work of another student, with or without their knowledge. If a student fails to take reasonable precautions to prevent their own original work from being copied, this may also be considered an offense.
Impersonation
Falsely presenting oneself, or engaging someone else to present as oneself, in an in-person examination.
Contract cheating
Contracting a third party to complete an assessment task, generally in exchange for money or other manner of payment.
Data fabrication and falsification
Manipulating or inventing data with the intent of supporting false conclusions, including manipulating images.
Source: INQAAHE, 2020
Marking Rubric
Excellent
Very Good
Good
Satisfactory
Unsatisfactory
(80-100%)
(70-79%)
(60-69%)
(50-59%)
(0-49%)
Insert a
screenshot of your Purchase Order [4
Marks]
All the steps are followed properly, and all the
screenshots
are pasted
according to the given
instructions.
Almost all the steps are
followed, and almost all the screenshots
are pasted
according to the given
instructions.
Most of the
steps are
followed, and the relevant
screenshots
are pasted
according to the given
instructions.
Some steps are followed, and some relevant screenshots
are pasted
according to the given
instructions.
Most of the
steps are not followed
properly.
However,
some relevant screenshots
are pasted.
Insert a
screenshot of your Process Flow [4
Marks]
All the steps are followed properly, and all the
screenshots
are pasted
according to the given
instructions.
Almost all the steps are
followed, and almost all the screenshots
are pasted
according to the given
instructions.
Most of the
steps are
followed, and the relevant
screenshots
are pasted
according to the given
instructions.
Some steps are followed, and some relevant screenshots
are pasted
according to the given
instructions.
Most of the
steps are not followed
properly.
However,
some relevant screenshots
are pasted.
Insert a
screenshot of your Post
Outgoing
Payments [6 Marks]
All the steps are followed properly, and all the
screenshots
are pasted
according to the given
instructions.
Almost all the steps are
followed, and almost all the screenshots
are pasted
according to the given
instructions.
Most of the
steps are
followed, and the relevant
screenshots
are pasted
according to the given
instructions.
Some steps are followed, and some relevant screenshots
are pasted
according to the given
instructions.
Most of the
steps are not followed
properly.
However,
some relevant screenshots
are pasted.
Insert a
screenshot of your Inquiry [4 Marks]
All the steps are followed properly, and all the
screenshots
are pasted
according to the given
instructions.
Almost all the steps are
followed, and almost all the screenshots
are pasted
according to the given
instructions.
Most of the
steps are
followed, and the relevant
screenshots
are pasted
according to the given
instructions.
Some steps are followed, and some relevant screenshots
are pasted
according to the given
instructions.
Most of the
steps are not followed
properly.
However,
some relevant screenshots
are pasted.
Insert a
screenshot of your Sales
Order [4
Marks]
All the steps are followed properly, and all the
screenshots
are pasted
according to the given
instructions.
Almost all the steps are
followed, and almost all the screenshots
are pasted
according to the given
instructions.
Most of the
steps are
followed, and the relevant
screenshots
are pasted
according to the given
instructions.
Some steps are followed, and some relevant screenshots
are pasted
according to the given
instructions.
Most of the
steps are not followed
properly.
However,
some relevant screenshots
are pasted.
Insert a screenshot of
All the steps are followed properly, and all the
Almost all the steps are followed, and almost all the
Most of the steps are followed, and the relevant
Some steps are followed, and some relevant screenshots
Most of the steps are not followed properly.
your Journal Entry [4 Marks]
screenshots are pasted according to the given
instructions.
screenshots are pasted according to the given
instructions.
screenshots are pasted according to the given
instructions.
are pasted according to the given instructions.
However, some relevant screenshots are pasted.
All the steps
Almost all the
Most of the
Some steps are followed, and some relevant screenshots are pasted according to the given instructions.
System Analysis and Design (HI5030 T2) Assignment Help
Individual Assessment Cover page
Instructions
Assignment Title: Practical Application and Research on Contemporary Systems Analysis and Design Issues
Assessment Overview:
This assessment relates to the unit learning outcomes as in the Unit of Study Guide. This assessment is designed to give students skills to explore the latest system analysis and design trends, challenges, and future directions.
In this individual research paper, you will explore a contemporary issue in systems analysis and design, integrating academic research with practical application. The assignment is designed to deepen your understanding of the selected issue and its real-world impact on business information systems. You will critically analyse the issue, apply relevant methodologies to a real-world or hypothetical scenario, and propose solutions to address the challenges it presents.
1. Issue Selection:
What You’ll Do: Choose a contemporary issue from the list provided by the unit coordinator. Some examples of issues you might consider include:
Agile vs. Waterfall Methodologies: The challenges and benefits of agile methodologies compared to traditional waterfall approaches in system development.
Data Privacy and Security: How emerging privacy regulations, such as GDPR, impact system design and the challenges of ensuring compliance while maintaining system efficiency.
Integration of AI in System Design: The opportunities and challenges of incorporating artificial intelligence into business information systems, including issues related to data quality, bias, and explainability.
Cloud-Based Systems vs. On-Premises Systems: The considerations and trade-offs involved in choosing cloud-based solutions over traditional on-premises systems, including security, cost, and scalability.
User-Centred Design: The importance of user experience (UX) in systems analysis and design, and the challenges of balancing user needs with technical requirements.
2. Research and Practical Application:
What You’ll Do: Start by conducting a literature review on your chosen issue. Look for academic articles, industry reports, and case studies that discuss the issue in depth. Then, apply the insights from your research to a practical scenario. For example:
Agile vs. Waterfall Methodologies: After reviewing the strengths and weaknesses of both approaches, you could apply them to a project management scenario in a software development company. You might create a prototype or design document showing how an agile approach could be adapted to a traditionally waterfall project, highlighting the potential benefits and challenges.
Data Privacy and Security: If your issue is data privacy, you could apply your research to a company that needs to redesign its information systems to comply with GDPR. This could involve proposing specific changes to data storage and processing practices and demonstrating how these changes would be implemented.
3. Impact and Solution Analysis:
What You’ll Do: Analyse how the selected issue impacts the design and implementation of business information systems in your scenario. Discuss how the issue affects system functionality, data management, and the communication of requirements to stakeholders. Then, propose practical solutions or methodologies that could address these challenges. For example:
Agile vs. Waterfall Methodologies: Your analysis might reveal that while agile offers greater flexibility, it may be less effective in highly regulated industries where detailed documentation is required. You could propose a hybrid approach that incorporates the flexibility of agile with the structure of waterfall.
Integration of AI in System Design: You might identify that the use of AI introduces new challenges in data quality and bias. To address this, you could propose a framework for regular audits of AI systems to ensure they are fair and transparent.
4. Documentation and Communication:
What You’ll Do: Compile your findings, analysis, and proposed solutions into a well-organized research paper. Your paper should clearly articulate both the theoretical research and the practical application. Ensure your writing is accessible to both technical and non-technical audiences, using clear explanations and supporting your arguments with evidence from your research and application.
The report submission structure is as follows:
Cover Page
Executive Summary
Overview: Briefly summarize the issue, your research approach, key findings, and proposed solutions.
Key Takeaways: Highlight the most critical points of your analysis and conclusions.
Table of Contents
List all the sections and sub-sections with corresponding page numbers.
Introduction
Background: Provide an overview of the selected issue and its relevance in the context of systems analysis and design.
Purpose: State the purpose of the report and what you intend to achieve through your analysis.
Scope: Outline the scope of your research, including the specific business information system you are focusing on.
Structure: Briefly describe the structure of the report to guide the reader.
Literature Review
Theoretical Background: Discuss the key concepts, theories, and methodologies relevant to the selected issue.
Current Research: Summarize the findings of recent studies and reports related to your issue, identifying any gaps or areas of debate.
Relevance to Business Information Systems: Connect the literature to the business information system you are analysing, explaining how the issue impacts this system.
Analysis of the Issue
Description of the Issue: Provide a detailed explanation of the issue, including any challenges and implications for system design and implementation.
Impact on Business Information System: Analyse how the issue affects the specific business information system you are focusing on. Use examples or case studies to illustrate your points.
Comparison of Methodologies/Approaches: Compare different methodologies or approaches that could be used to address the issue within the context of the selected system.
Practical Application
Scenario Description: Describe the real-world or hypothetical business scenario where the issue is being addressed.
Application of Methodologies: Explain how you applied the selected methodologies or techniques to address the issue in this scenario.
Outcome: Discuss the results of your application, including any improvements or challenges encountered.
Proposed Solutions
Solution Description: Present the solutions or strategies you propose to address the issue within the selected business information system.
Justification: Justify your proposed solutions based on your research and practical application, including any advantages or potential limitations.
Implementation Plan: Outline a high-level plan for implementing the proposed solutions, including key steps, resources required, and potential risks.
Conclusion
Summary of Findings: Recap the key findings from your research and analysis.
Implications: Discuss the broader implications of your findings for the field of systems analysis and design.
Future Research: Suggest areas for future research that could build on your work.
Recommendations
Actionable Steps: Provide specific recommendations for organizations or practitioners dealing with the selected issue in the context of the business information system.
Best Practices: Highlight best practices that could be adopted based on your findings.
References
Student Assessment Citation and Referencing Rules
Adapted Harvard Referencing Rules
Holmes has implemented a revised Harvard approach to referencing. The following rules apply:
Reference sources in assignments are limited to sources that provide full-text access to thesource’s content for lecturers and markers.
The reference list must be located on a separate page at the end of the essay and titled: “References”.
The reference list must include the details of all the in-text citations, arranged A-Z alphabetically by author surname with each reference numbered (1 to 10, etc.) and each reference MUST
include a hyperlink to the full text of the cited reference source. For example:
All assignments must include in-text citations to the listed references. These must include the surname of the author/s or name of the authoring body, year of publication, page number of the content, and paragraph where the content can be found. For example, “The company decided to implement an enterprise-wide data warehouse business intelligence strategies (Hawking et al., 2004, p3(4)).”
Non-Adherence to Referencing Rules
Where students do not follow the above rules:
As per the Student Handbook, late penalties will apply each day after the student/s has been notified of the due date.
Students who comply with rules and the citations are “fake” may be reported for academic misconduct
For students who submit assignments that do not comply with the rules, a 10% penalty will be applied.
TECH2100 Introduction to Information Networks Assignment Help
Assessment 2 Information
Subject Code:
TECH2100
Subject Name:
Introduction to Information Networks
Assessment Title:
Report Evaluation
Assessment Type:
Individual
Word Count: 1,500 Words (+/-10%)
Weighting:
30 %
Total Marks:
30
Submission:
MyKBS
Due Date:
Week 10
Your Task
This assessment is to be completed individually. In this assessment, you will prepare a written report that evaluates the network architecture and communication protocols of an organization and provide recommendations to address any problems identified.
Assessment Description
You are an IT consultant who has been hired by a small business that provides web design services to clients. The business has experienced growth in recent years and has expanded its operations to multiple locations. The management has noticed that the network has become slow and unreliable, and the employees are having difficulty accessing the resources they need to perform their work.
Your task is to evaluate the organization’s network architecture and communication protocols, identify any problems, and provide recommendations to address them. Your report should include an executive summary, an overview of the organization’s network architecture and communication protocols, a summary of the problems identified, and your recommendations for addressing them.
Case Study:
ABC Web Design is a small business that provides web design services to clients. The business has grown rapidly in recent years and has expanded its operations to multiple locations. The company’s employees work remotely from different locations and rely on the company’s network to access the resources they need to perform their work.
The company’s network architecture consists of a central server located at the head office, which is connected to satellite offices and remote employees via a virtual private network (VPN). The communication protocols used by the company include Transmission Control Protocol/Internet Protocol (TCP/IP) and Simple Mail Transfer Protocol (SMTP).
Recently, the company’s employees have experienced slow and unreliable network performance, and they have difficulty accessing the resources they need to perform their work. Additionally, there have been instances of lost or delayed emails, which have caused communication breakdowns with clients.
You have been hired by ABC Web Design to evaluate the organization’s network architecture and communication protocols, identify any problems, and provide recommendations to address them.
This assessment aims to achieve the following subject learning outcomes:
LO1
Evaluate the main technologies, models and protocols used in data communications and networking.
LO3
Identify problems that emerge among the networks that constitute today’s internet architecture.
LO4
Recommend and apply solutions for common internet architecture problems.
Assessment Instructions
• Your report should be submitted in Word Document or PDF format and be approximately 1500 words in length, excluding references and appendices.
• Your report should include an executive summary, an introduction, a discussion of the organization’s network architecture and communication protocols, a summary of the problems identified, and your recommendations for addressing them.
• You should include relevant diagrams or figures to support your analysis and recommendations. • Your report should be properly formatted with headings and subheadings. • Your report should include a minimum of ten (10) academic references from credible sources,
such as peer-reviewed journal articles, industry reports, or academic books. These references should be cited using KBS Harvard referencing style.
• Please refer to the assessment marking guide to assist you in completing all the assessment criteria.
Important Study Information
Academic Integrity and Conduct Policy
KBS values academic integrity. All students must understand the meaning and consequences of cheating, plagiarism and other academic offenses under the Academic Integrity and Conduct Policy.
Please read the policy to learn the answers to these questions:
• What is academic integrity and misconduct?
• What are the penalties for academic misconduct?
• How can I improve my grade?
Late submission of assignments (within the Assessment Policy)
Length Limits for Assessments
Penalties may be applied for assessment submissions that exceed prescribed limits.
Study Assistance
Students may seek study assistance from their local Academic Learning Advisor or refer to the resources on the MyKBS Academic Success Centre page. Further details can be accessed at
Generative AI Traffic Lights
Please see the level of Generative AI that this assessment is Level 2 has been designed to accept:
Traffic Light
Amount of Generative Artificial Intelligence (Generative AI) usage
Evidence Required
This
assessment (✓)
Level 1
Prohibited:
No Generative AI allowed
This assessment showcases your individual knowledge, skills and/or personal experiences in theabsence of Generative AI support.
The use of generative AI is prohibited for this assessment and may potentially result in penalties for academic misconduct, including but not limited to a mark of zero for the assessment.
Level 2
Optional:
You may use Generative AI for research and content generation that is appropriately
referenced.
See assessment instructions for details
This assessment allows you to engage with Generative AI as a means of expanding your understanding, creativity, and idea generation in the research phase of your assessment and to produce content that enhances your assessment. I.e., images. You do not have to use it.
The use of Gen AI is optional for this
assessment.
Your collaboration with Generative AI must be clearly referenced just as you would reference any other resource type used. Click on the link below to learn how to reference Generative AI.
In addition, you must include an appendix that documents your Generative AI collaboration including all prompts and responses used for the assessment.
Unapproved use of generative AI as per
assessment details during the content generationparts of your assessment may potentially result in penalties for academic misconduct, including but not limited to a mark of zero for the
assessment. Ensure you follow the specific assessment instructions in the section above.
✓
Level 3
Compulsory:
You must use Generative AI to complete your assessment
See assessment instruction for details
This assessment fully integrates Generative AI, allowing you to harness the technology’s full potential in collaboration with your own expertise.
Always check your assessment instructions carefullyas there may still be limitations on what constitutes acceptable use, and these may be specific to each assessment.
You will be taught how to use generative AI and assessed on its use.
Your collaboration with Generative AI must be clearly referenced just as you would reference any other resource type used. Click on the link below to learn how to reference Generative AI.
In addition, you must include an appendix that documents your Generative AI collaboration including all prompts and responses used for the assessment.
Unapproved use of generative AI as per
assessment details during the content generationparts of your assessment may potentially result in penalties for academic misconduct, including but not limited to a mark of zero for the
assessment. Ensure you follow the specific assessment instructions in the section above.
Assessment Marking Guide
Marking Criteria
F (Fail)
P (Pass)
C (Credit)
D (Distinction)
HD (High Distinction)
_____| 30 marks
0 – 49%
50 – 64%
65 – 74%
75 – 84%
85 – 100%
Research and
Analysis
_____| 8 marks
Little or no evidence of research or analysis. The report lacks any meaningful analysis of the organization’s
network architecture and communication protocols.
Some evidence of
research and analysis but lacks depth or
clarity. The report
provides a basic
analysis of the
organization’s network architecture and
communication
protocols but fails to identify all relevant
issues.
Thorough research and analysis, with clear evidence and
explanation. The report provides a
comprehensive
analysis of the
organization’s network architecture and
communication
protocols, with a clear explanation of all
relevant issues.
Extensive research and analysis, with insightful recommendations. The
report provides an in depth analysis of the organisation’s network architecture and
communication
protocols, with insightful recommendations that are well-supported by evidence.
Exceptional research and analysis, with insightful and original recommendations. The report provides an exceptional analysis of the organisation’s network architecture and communication protocols, with insightful and original recommendations that demonstrate a deep understanding of the subject matter.
Recommendations or Solutions
_____| 8 marks
Fails to provide any recommendations or solutions. The report does not offer any
recommendations or solutions for addressing the problems identified.
Provides some
recommendations or solutions, but they may not be well-supported or practical. The report provides some
recommendations or solutions for addressing the problems identified, but they are not well supported by evidence or may not be practical to implement.
Provides practical and well-supported
recommendations or solutions. The report provides practical and well-supported
recommendations or solutions for addressing the problems identified, which are based on sound analysis and evidence.
Provides innovative and well-supported recommendations or solutions that go
beyond the scope of the instructions. The report provides
innovative and well supported
recommendations or solutions for addressing the problems identified, which demonstrate creativity and
originality, and go
Provides creative,
evidence-based
recommendations or solutions that
demonstrate
exceptional critical
thinking skills. The
report provides
exceptional and
creative
recommendations or solutions for addressing the problems identified, which demonstrate exceptional critical
beyond the scope of the instructions.
thinking skills and
originality.
Clarity and Depth of Discussion
_____| 6 marks
The report provides a superficial discussion of the organization’s
network architecture and communication protocols. The
discussion lacks depth, coherence, and
relevance to the
assignment
instructions.
The report provides a basic discussion of the organization’s network architecture and
communication
protocols but may lack coherence and
relevance to the
assignment instructions in some sections.
The report provides a clear and coherent
discussion of the
organization’s network architecture and
communication
protocols, with a focus on the assignment
instructions.
The report provides a thorough and insightful discussion of the
organisation’s network architecture and
communication
protocols, which is well organised and relevant to the assignment
instructions.
The report provides an exceptional and
engaging discussion of the organisation’s
network architecture and communication protocols, which
demonstrates a deep understanding of the subject matter and
exceeds the
requirements of the assignment
instructions.
Quality of Writing
_____| 4 marks
Numerous errors that make the report difficult to read and
understand. Writing is poorly organized and lacks coherence.
Several errors that
occasionally detract from the overall
readability and
understanding of the report. Writing is
organized but lacks coherence in some sections.
Minimal errors that do not detract from the overall readability and understanding of the report. Writing is well organized with a clear structure.
No errors. Writing is clear, concise, and
well-organised with a coherent structure.
No errors. Writing is of exceptional quality, with a clear and concise structure that is highly coherent and engaging.
Use of Evidence and Sources
_____| 4 marks
Fails to use any
sources or evidence to support claims.
Uses sources or
evidence
inappropriately or
without sufficient
relevance to support claims.
Uses sources or
evidence appropriately and effectively to
support claims, with some minor errors in referencing or citation.
Uses sources or
evidence effectively and accurately to
support claims, with accurate referencing and citation.
Uses sources or
evidence exceptionally effectively and
accurately to support claims, with exceptional referencing and citation that
The Olympic historical dataset “Olympic_Athletes.zip” is available on iLearn. This dataset contains information about athletes who participated in the Summer and Winter Olympic Games from 1896 to 2022.
Programming Environment:
• MongoDB & Studio 3T: Used for creating databases and importing datasets into collections. • Pymongo: Used for connecting to MongoDB and extracting information from documents within collections.
• Mrjob: Used for implementing MapReduce programs.
Task 1: Data Curation (20 marks)
• Task 1.1 – Data Extraction (10 marks): Extract information about medal-winning athletes in the Summer Olympics from the 1980 edition to the 2020 edition. Note that you need to verify whether the athlete participated in the Summer Olympics and whether they won a medal (gold, silver, or bronze). Then, extract the following values:
For each qualified athlete, create an entry in the format: <id, country, year, event, medal>. Store these entries in a text file named “athletes.txt”. Refer to the following screenshot for formatting (note that the screenshot is for reference purpose only; actual results may vary).
You can also use other delimiters, such as commas, semicolons, underscores, or quotation marks, to separate each line’s values. The “athletes.txt” text file will then serve as the input for the subsequent MapReduce programs.
• Task 1.2 – Data Organization (10 marks): Using the generated “athletes.txt” file as input, implement a MapReduce program to sort the data in ascending order based on the athlete id. The partial results of Task 1.2 are similar to the following screenshot (note that the screenshot is for formatting reference only; actual results may vary).
Note that for records with the same athlete ID, there is no specific requirement regarding their order.
Task 2: Data Analysis with MapReduce (60 marks)
Using the generated “athletes.txt” file as input, implement three MapReduce programs to complete the following analysis tasks.
• Task 2.1 (20 marks) Find the top three athletes who won the most number of medals in each category (gold, silver, and bronze) in 1980-2020. Firstly, you need to calculate the total number of medals each athlete has earned in gold, silver, and bronze categories, respectively. Next, sort the athletes in descending order based on their medal counts for each category. Finally, for each medal category, output the top three athletes along with their respective medal counts.
Note that there is no specific requirement regarding the order of medal categories. The partial results of Task 2.1 are similar to the following screenshot (the screenshot is for formatting reference only; actual results may vary).
• Task 2.2 (20 marks) Find the top three countries with the most number of gold medals in 1980-2020. First, you need to count the total number of each medal type (gold, silver, and bronze) for each country. Then, sort the countries in descending order based on their gold medal count. Finally, output the top three countries along with their medal counts for all medal types (gold, silver, and bronze).
The partial results of Task 2.2 are similar to the following screenshot (note that the screenshot is for formatting reference only; actual results may vary).
• Task 2.3 (20 marks) Find the top three events with the highest medal counts for each decade in 1980- 2020. Firstly, for each decade (e.g., 2010-2020, 1980-1989, etc.), you need to find the event with the greatest number of medals for each country, i.e., calculate the total medal count by summing gold, silver, and bronze medals. Then, within each decade, sort the events by their total medal count in descending order, and output the medal counts of the top 3 events (Note: The decades should be listed in descending order, and the medal counts for the top 3 events within each decade should be also sorted in descending order).
The partial results of Task 2.3 are similar to the following screenshot (note that the screenshot is for formatting reference only; actual results may vary).
Task 3: MapReduce Flowcharts (20 marks)
For the three MapReduce programs in Task 2, create a 3-4 page Word or PDF document that includes flowcharts to illustrate the process of each MapReduce program. You can use specific data examples to clarify the processes. Note that your flowcharts should be consistent with your code. You can refer to the following example provided in the Week 5 lecture notes as an example.
To create your diagrams, we recommend using the online diagramming tool. If you choose to use online tools, you can include the diagram link in your document.
Programming Environment:
You are required to use Python to complete all code-related parts of this assignment. The use of other programming languages is strictly prohibited and will result in a loss of all marks.
For Task 1.2 and Tasks 2.1-2.3, you are required to use only the MapReduce model to complete the corresponding tasks. The use of any additional Python programs is not allowed. Even if correct results are obtained, failing to use MapReduce will result in 0 marks.
Submission:
Submit a zip file named ‘FirstName_LastName_Assignment1.zip’ via iLearn. The submission should include the following items:
• Source code for Task 1: ‘task1_1.py’ and ‘task1_2.py’.
• Source code for Task 2: ‘task2_1.py’, ‘task2_2.py’, and ‘task2_3.py’.
• Output files for Task 1: ‘athletes.txt’ and ‘output1_2.txt’.
• Output files for Task 2: ‘output2_1.txt’, ‘output2_2.txt’, and ‘output2_3.txt’.
Choose a topic found on the HFMA website. Provide an overview of the topic in one paragraph.
Be sure to include an explanation regarding how it applies to something that you learned in the course. How do you think the HFMA can support your career growth and development?
Be sure to respond to at least one of your classmates’ posts.
The post How do you think the HFMA can support your career growth and development? first appeared on Courseside Kick.