Blog

  • LO 1: Critically engage with major theorists and articulate theories regarding children and childhoods aged 3 to 5 years. LO 3: Negotiate with a mentor teacher to design, implement and critically reflect

    ECE6012 Assessment -2 Assessment Help

    Assessment Overview


    Overview

    Length or Duration

    Worth

    Due

    Collect ideas for experiences to implement with children according to their interests. Organize these in a Resource Folder (template linked below), connect to the five EYLF Learning Outcomes, and provide information for implementation. 

    Equivalent to 3500  words

    50%

    Sunday September 8

    learning outcomes 

    The learning outcomes assessed are:

    • LO 1: Critically engage with major theorists and articulate theories regarding children and childhoods aged 3 to 5 years.
    • LO 3: Negotiate with a mentor teacher to design, implement and critically reflect on an educational program that responds to the Victorian Early Years Learning and Development Framework (VEYLDF- for Victorian students) and/or the Early Years Learning Framework (EYLF).

     Assessment Structure

    Download the template linked below and use it to complete the assessment. 

    PLEASE NOTE:

    ECE6012 Assessment 2 Resource Folder Planning Template.docx

     ADDITIONAL RESOURCES:

    These resources/links will help you understand and plan for different age groups

    Explore the developmental stages of early childhood by visiting four informative links focused on Babies, Toddlers, and Preschoolers,  School-aged children to gain valuable insights into their growth and care.

    Rubric

    Rubric for Assessment Assessment 2: Electronic Resource Folder

     Instructions 

     

    To complete your assessment task, follow the below instructions.

    1. You will collect ideas for experiences to implement with children according to their interests. You will think of experiences that are related to physical, language, social, emotional and cognitive development, and connect to the five EYLF Learning Outcomes. EYLF-2022-V2.0.pdf
    2. The task must draw from the course materials on VU Collaborate.
    3. Using the Resource Folder template, your experiences will be listed under Physical, Language, Social, Emotional and Cognitive Development and specific to the Birth – 2, 2 – 3 and 3 – 5 age groups.
    4. In the template, please indicate the following for each experience:
      1. Name of experience
      2. Resources
      3. Suggested implementation strategies
      4. Learning possibilities
      5. EYLF Learning outcomes
      6. Related theory

    Submission Instructions

    Submit your completed assessment via the Assessment Dropbox: Assessment 2 : Resource Folder

  • Alpha’s Murals is a company that paints interior and exterior murals for both business and residential customers. Write a program named Beta App that performs the following tasks:

    IFN555 Programming Assignment

    Weighting: 50%    Total Marks: 100    Individual

    Due Date: 11.59 pm Friday 30th August 2024

    Submission: Online via QUT Canvas

    Problem Specification:

    Alpha’s Murals is a company that paints interior and exterior murals for both business and residential customers. Write a program named Beta App that performs the following tasks:

    Task 1: Display your personal information including your last name, first name and your student ID. Make these surrounded by a border composed of asterisks.

    Task 2: The application prompts the user to enter the number of orders for interior and exterior murals. This number has to be between 0 and 30 (inclusive). Otherwise, the program prompts the user to re-enter the number. 

    Task 3: Display the number of orders of interior and exterior murals. Compute and display the expected revenue for each type of mural and the total revenue from both types. Interior murals cost $500.00 each, and exterior murals cost $750.00 each. 

    Note that all revenues should be displayed using currency format.

    Task 4: Display a statement based on the following conditions:

    • If the number of exterior murals ordered is greater than the number of interior murals, the program should display “Exterior murals are becoming more attractive!”, else, the program displays “Interior murals are becoming popular!”. 
    • If the number of the orders are equal, then display “Both types are equally preferred!”

    Task 5: The user is prompted to input information for interior mural orders. Each interior mural order includes customer name and mural code: L for landscape, S for seascape, A for abstract, and O for others. Make sure that all the entered codes are valid (L, S, A or O), and, if not, prompt the user to re-enter the correct code. The number of orders should be the same as the number of interior murals ordered in Task 2.

    After the data entry for all the customers is complete, display a count of the number of customers ordering each type of interior mural. 

    Then, continuously prompt the user for a mural code until the user enters a sentinel value. For each code entry, display a list of the customers ordering that type of mural, or display a message that the code is not valid, and re-prompt the user for a valid mural code.  

    Note: You must use arrays in Task 5 in order to achieve the maximum marks.

    A sample screenshot for Task 2, 3, 4 and first part of Task 5 is provided below.

     

    In completing your assignment, please take note of the following:

    1. You should not use any C# concepts which have not been taught as part of Lectures 1 – 5 and covered in Tutorials 1 – 5.
    2. You should develop your code using simple logic.
    3. Test your code using your own test data covering multiple data sets.
    4. Your final code should not have any compilation/execution errors.

    Project Deliverable:

    Zip your project file and upload this zipped file onto Canvas using the link IFN555 Programming Assignment under Assessment 2 in Modules. The link will be available only from Friday 23 August 2024.  

    You can only upload ONCE

    Note: 

    Assessment submitted after the due date without an approved extension will not be marked and will receive a grade of 1 or 0%. If special circumstances prevent you from meeting the assessment due date, you can apply for an extension  through the Student Services in SEF. If you do not have an approved extension you should submit the work you have completed by the due date and it will be marked against the assessment criteria.

  • Task 2 [14 marks]  We have provided you with the Hotel database (Filename: IFN554_5C_Hotels.sql you can download from Canvas) to be used with MySQL Workbench. You must use this database

    ask 1 [6 marks] 

    In this task you are required to write an SQL script that builds a database to match the relational model below. Your database should be named “Heavenly Department Store”.

    The SQL statements in the script must be provided in the correct order. 

    Heavenly Department Store relational model is as follows:

    Note: Primary keys are denoted by bold and underline and foreign keys are in italics

    • Supply (SupplierNr, ItemNr, QtyNr)
    • Use (ItemNr, DeptCode)
    • Item (ItemNrItemName, CountryMade) 

    Note: 1.1 ItemNr or Name both possible PK using ItemNr as preferred PK

     

    • Supplier (SupplierNrSupplierNameFaxNr, SupplierCountry)

    Note: 1.1 SupplierNr or FaxNr or SupplierName are all possible PK using SupplierNr as preferred PK

    FOREIGN KEYS

    • Supply (SupplierNr) references Supplier (SupplierNr)
    • Supply (ItemNr) references Item (ItemNr)
    • Use (ItemNr) references Item (ItemNr)

    Other Constraints and Remarks

    • All primary and foreign key attributes that you use are strings (not text) comprising eight digits (8).
    • INTEGER type must be used for QtyNr is mandatory and must be greater than 0.
    • TEXT type must be used for all other attributes.
    • SupplierName and ItemName must contain a value (you will need to add values to these attributes)

    (Insert snapshots of tables and values here)

    Task 2 [14 marks] 

    We have provided you with the Hotel database (Filename: IFN554_5C_Hotels.sql you can download from Canvas) to be used with MySQL Workbench. You must use this database in MySQL Workbench to extract the necessary information as per the following query requirements. 

    Note: All tasks requiring SQL must provide as a screen snapshot of the execute SQL tab in MySQL Workbench that includes all sections. Snapshots must be readable

    • SQL Query code
    • Result Grid (table, view, update, new information etc.). The teaching team must be able to see the successful execution of the code
    • Action Output result
    • Schemas (where necessary)

    In your database – a booking commences at 2 pm (check in) and finishes at 10 am the following day (check out). Example: A booking for 3 nights is made on Tuesday 8th August with a check-in date of Thursday 10th August from 2pm and a check-out time of Sunday 13th August at 10 am.

     

     

    Write an SQL script for querying data for the following information.

    2a.

    List the hotelNo which has 2 or more single rooms [2 marks]

    2a response

    Insert code and result snapshot here

    2b.

    How many different guests visited the Meriton Hotel? [2 marks]

    2b. response

    Insert code and result snapshot here

    2c.

    What is the total income from bookings for the Meriton Hotel? 

    [3 marks]

    2c. response

    Insert code and result snapshot here

    2d.

    List the guests’ names who have visited more than 2 times [3 marks]

    2d response

    Insert code and result snapshot here

    2e.

    For each hotel, list the room type, for each room type list the number of each room type and the number with bookings [4 marks]

    2e. response

    Insert code and result snapshot here

    Task 3 [5 marks] – Individual

    Perform the following tasks.

    3a.

    Write a command to create an index on hotel name and show the results [1 mark]

    3a. response

    Insert code and result snapshot here

    3b.

    Create a user with the name ‘Mickey’ @ local host with password ‘iloveORM’ and force the user to update the password [01 mark]. 

    Show the results. [1 mark]

    3b. response

    Insert code and result snapshot here

    3c.

    Create a view called HotelSummaryView – list the hotelNo, type and price of each room. Order the result by hotelNo, room type and price [1 mark]

    3c.

    response

    Insert code and result snapshot here

    3d.

    Grant permissions to select and read this view . Show results[1 mark]

    3d. response

    Insert code and result snapshot here

    3e.

    Revoke permissions and show results [1 mark]

    3e. response

    Insert code and result snapshot here

    Task 4 [5 marks] 

    Perform the following tasks continue using the Hotel database provided.

     

    4a.

    Update the prices of all single rooms by 5% and show results [1 mark]

    4a. response

    Insert code and result snapshot here

    4b.

    Insert 2 rows of new data in the table Guest and Booking [2 marks]

    4b. response

    Insert code and result snapshot here

    4c. 

    Delete one of the rows your inserted into the Guest table [2 marks]

    4c response

    (Insert snapshot here)

    Task 5 [10 marks] 

    Using the following table structure, identify all functional dependencies and then decompose this table into a set of 3NF relations. The table is in 0NF so please apply all rules accordingly.

     

    Assumptions:

    • Product Price is Per Unit
    • There are not multi values

    Order No

    Order Time

    (dd/mm/yyyy/hh:mm)

    Cust DOB (dd/mm/yyyy)

    Total (AUD$)

    Item #

    Order Prod

    Order Qty

    Customer

    No

    Customer

    Name

    Product

    No.

    Product Name

    Supplier

    Prod

    RRP (AUD$)

    Age

    1

    05/11/2023 15:00

    01/11/1962

    600

    1

    P4567

    3

    007

    James Bond

    P4567

    Wristwatch

    Seiko

    200

    62

    23

    05/12/2023 15:00

    01/11/1950

    360

    1

    T1245

    1

    024

    Sean Connery

    T1245

    Cufflinks

    Harrods

    20

    74

    23

    05/12/2023 15:00

    01/11/1950

    360

    2

    P1299

    1

    024

    Sean Connery

    P1299

    Tie Clip

    Harrods

    120

    74

    23

    05/12/2023 15:00

    01/11/1950

    360

    3

    T1304

    1

    024

    Sean Connery

    T1304

    Shoes

    Sketchers

    220

    74

    Insert response here All tables must be in 3NF.

    Task 6 [10 marks]

    The use of Generative AI such as ChatGPT is not permitted for this task. QUT policy states the following: “If you submit an assessment “that has been produced or modified, wholly or in part, by an artificial intelligence tool, algorithm, or computer generator where such actions are not authorised in the assessment task”, this may be treated as a breach of our Academic Integrity Policy and appropriate penalties imposed.

    This task is a reflective task. You are required to answer the question below in your own words. Your answer should be your opinions, experience and personal perspective. Your response should be supported by research to validate your viewpoints. Provide in text referencing where appropriate. Your response should be between 400 and 600 words not including references.

  • Interaction Design and Usability (ICT710 ) Assignment Help ICT710  Interaction Design and Usability  Semester-2, 2024 Assessment Overview

    Interaction Design and Usability (ICT710 ) Assignment Help

    ICT710  Interaction Design and Usability  Semester-2, 2024

    Assessment Overview 

     

    Assessment tasks 

    Learning Outcome Mapping

    Assessment ID 

    Assessment Item 

    When due 

    Weighting 

    ULO# 

    CLO# for  

    BITS

    Critique (individual) (1000  words) 

    Session 4 

    20% 

    1, 2 

    1, 2

    Needs Analysis and Usability  Test Report (Individual) (1500  Words)

    Session 9 

    40% 

    2, 3, 4 

    1, 2

    3* 

    Part A – Design Report  

    (Group)

    Part A – Session 13 (Study  Week) 

    30% 

    1, 2, 3, 4, 5 

    1, 2, 3, 4, 5

    Part B Presentation (Group) 

    Part B – Session 14 (Exam Week) 

    10% 

    1, 2, 3, 4, 5 

    1, 2, 3, 4, 5

    Note: * denotes ‘Hurdle Assessment Item’ that students must achieve at least 40% in this item to pass the unit.

     

    Referencing guides 

    You must reference all the sources of information you have used in your assessments. Please use the  IEEE referencing style when referencing in your assessments in this unit. Refer to the library’s  referencing guides for more information. 

    Academic misconduct 

    VIT enforces that the integrity of its students’ academic studies follows an acceptable level of excellence. VIT will adhere to its VIT Policies, Procedures and Forms where it explains the importance of  staff and student honesty in relation to academic work. It outlines the kinds of behaviors that are  “academic misconduct”, including plagiarism. 

    Late submissions 

    In cases where there are no accepted mitigating circumstances as determined through VIT Policies, Procedures and Forms, late submission of assessments will lead automatically to the imposition of a  penalty. Penalties will be applied as soon as the deadline is reached. 

    Short extensions and special consideration 

    Special Consideration is a request for: 

    • Extensions of the due date for an assessment, other than an examination (e.g. assignment  extension). 

    • Special Consideration (Special Consideration in relation to a Completed assessment, including an end-of-unit Examination). 

    Students wishing to request Special Consideration in relation to an assessment the due date of which  has not yet passed must engage in written emails to the teaching team to Request for Special  Consideration as early as possible and prior to start time of the assessment due date, along with any  accompanying documents, such as medical certificates. 

    For more information, visit VIT Policies, Procedures and Forms

    Inclusive and equitable assessment 

    Reasonable adjustment in assessment methods will be made to accommodate students with a  documented disability or impairment. Contact the unit teaching team for more information. 

    Contract Cheating 

    Contract cheating usually involves the purchase of an assignment or piece of research from another  party. This may be facilitated by a fellow student, friend or purchased on a website. Other forms of  contract cheating include paying another person to sit an exam in the student’s place.

    Contract cheating warning: 

    • By paying someone else to complete your academic work, you don’t learn as much as you  could have if you did the work yourself. 

    • You are not prepared for the demands of your future employment. 

    • You could be found guilty of academic misconduct. 

    • Many of the pay contract cheating companies recycle assignments despite guarantees of  “original, plagiarism-free work” so similarity is easily detected by TurnitIn. 

    • Penalties for academic misconduct include suspension and exclusion. 

    • Students in some disciplines are required to disclose any findings of guilt for academic  misconduct before being accepted into certain professions (e.g., law). 

    • You might disclose your personal and financial information in an unsafe way, leaving yourself  open to many risks including possible identity theft. 

    • You also leave yourself open to blackmail – if you pay someone else to do an assignment for  you, they know you have engaged in fraudulent behavior and can always blackmail you. 

    Grades 

    We determine your grades to the following Grading Scheme:

    Grade 

    Percentage

    80% – 100%

    70% – 79%

    60% – 69%

    50% – 59%

    0% – 49%

    Assessment Details for Assessment Item 1: 

    Overview 

    Assessment tasks 

    Learning Outcome Mapping

    Assessment ID 

    Assessment Item 

    When due 

    Weighting 

    ULO# 

    CLO# for BITS

    1

    Case Study Report (individual) 

    Session 6 

    20% 

    1, 2

    Introduction 

     

    You will submit work in assessment 1 submission link on week 4. This is an individual assessment. 

    Students are to write a critique by selecting a research paper from the proquest. Type interface design in the search box. Select any scholarly journal article  only. The paper needs to be related to the interaction design. The critique should not exceed 1000 words. Below shows steps for writing a critique: 

    The example of how to write a critique is provided by clicking here.

     

    Submission Instructions 

    All submissions are to be submitted through Turnitin. Drop-boxes linked to Turnitin will be set up in Moodle. Assessments not submitted through these drop boxes will not be considered. Submissions must be made by the end of session 6. 

    The Turnitin similarity score will be used to determine any plagiarism of your submitted assessment. Turnitin will check conference websites, Journal articles,  online resources, and your peer’s submissions for plagiarism. You can see your Turnitin similarity score when you submit your assessments to the  appropriate drop-box. If your similarity score is of concern, you can change your assessment and resubmit. However, re-submission is only allowed before  the submission due date and time. You cannot make re-submissions after the due date and time have elapsed. 

    Note: All work is due by the due date and time. Late submissions will be penalized at 20% of the assessment final grade per day, including weekends. Marking Criteria/Rubric 

    You will be assessed on the following marking criteria/Rubric:

    Assessment criteria 

    Exceptional >=80% 

    Admirable 70% – 79% 

    Creditable 60% – 69% 

    Acceptable 50% – 59% 

    Unsatisfactory <=49

    Introduction 

    5 marks 

    Introduction summarized all of the article and was able to highlight the importance. 

    8 points

    Introduction covers most of the article in a detailed manner. Some important points are highlighted. 

    4 points

    Introduction covers most of the article but in a brief manner 

    3 points 

    Introduction summarized some content of the article in a brief manner 

    2 points

    Introduction does not reflect the paper and is not relevant to the unit 

    1 points 

    Content and Analysis 

    10 marks

    The contentis professionally done. 

    10 points 

    The contentis well done and includes most of the facts. 

    8 points 

    The content is fairly well done and includes some of the facts. 

    6 points 

    The contentis ok but there is room for improvement. 

    4 points 

    The contentis briefly 

    explained. 

    2 points

    Structure and  

    Organization 

    5 marks

    Report Layout is consistent and professionally done. 

    There are no grammatical errors. 

    5 points 

    Report layout is consistent and professionally done. There are a few grammatical errors. 

    4 points 

    Report layout is 

    consistency. There are a 

    few grammatical errors. 

    3 points 

    Report layout is consistent. There are some grammatical errors. 

    2 points 

    The report layout is not 

    consistent and there are many grammatical errors. 

    1 points

     

    Assessment Details for Assessment Item 2: 

    Overview 

    Assessment tasks 

    Learning Outcome Mapping

    Assessment ID 

    Assessment Item 

    When due 

    Weighting 

    ULO# 

    CLO# for  

    BITS

    Needs Analysis and Usability  Test Report (Individual) (1500  Words)

    Session 9 

    40% 

    2, 3, 4 

    1, 2

    Introduction 

    Students are required to use the findings of a needs analysis and usability test conducted on VitEat mobile app for the report. VitIate mobile app is a  Mobile Food Delivery App. A mobile food delivery app that: 

    • connects customers with local restaurants 

    • offering a platform to browse menus 

    • place orders 

    • track deliveries. 

    The purpose of this report was to identify user needs, evaluate the product’s usability, and provide recommendations for improvement. 

    Needs Analysis 

    To understand the needs and expectations of target users in relation to VitIate mobile app. 

    • Understanding user preferences for food types, cuisines, and dietary restrictions. 

    • Identifying pain points in the current food ordering process (e.g., long wait times, difficulty finding desired options). • Assessing user expectations for delivery speed, accuracy, and customer service. 

    • Determining the importance of features like order customization, payment options, and loyalty programs. 

    Usability Testing 

    To evaluate the usability of VitEat mobile app and identify areas for improvement. 

    • Evaluating the ease of navigation within the app (e.g., finding restaurants, browsing menus, placing orders). 

    • Assessing the clarity and effectiveness of information displayed (e.g., menu items, pricing, delivery times).

    • Testing the checkout process for efficiency and user-friendliness. 

    • Evaluating the order tracking experience and its usefulness to users. 

    • Assessing the overall user satisfaction with the app’s design and functionality. 

    Below is the format for the report: 

    1. Executive Summary 

    2. Introduction 

    3. Methodology 

    3.1. Needs Analysis 

    3.2. Usability Testing 

    4. Findings 

    4.1. Needs Analysis 

    4.2. Usability Testing 

    5. Analysis and Discussion 

    6. Recommendations 

    7. Conclusion 

    8. Appendices 

    9. Visuals 

    Students need to use tool the following tools for this assessment: 

    1. Figma 

    2. Mock Flow 

    3. Canva 

    4. Lucid chart 

    5. Visual Paradigm 

    Submission Instructions 

    All submissions are to be submitted through Turnitin. Drop-boxes linked to Turnitin will be set up in Moodle. Assessments not submitted through these drop boxes will not be considered. Submissions must be made by the end of session 9. 

    The Turnitin similarity score will be used to determine any plagiarism of your submitted assessment. Turnitin will check conference websites, Journal articles,  online resources, and your peer’s submissions for plagiarism. You can see your Turnitin similarity score when you submit your assessments to the  appropriate drop-box. If your similarity score is of concern, you can change your assessment and resubmit. However, resubmission is only allowed before the submission due date and time. You cannot make re-submissions after the due date and time have elapsed. 

    Note: All work is due by the due date and time. Late submissions will be penalized at 20% of the assessment final grade per day, including weekends. 

    Marking Criteria/Rubric 

    You will be assessed on the following marking criteria/Rubric:

    Assessment criteria 

    Exceptional >=80% 

    Admirable 70% – 79% 

    Creditable 60% – 69% 

    Acceptable 50% – 59% 

    Unsatisfactory <=49

    Methodology 

    15 marks

    Clearly articulated research design, appropriate methodology chosen, detailed explanation of data collection and analysis methods. 

    13 – 15 points 

    Adequate research design, appropriate methodology chosen, explanation of data collection and analysis methods are sufficient. 

    9 – 12 points 

    Adequate research design, appropriate methodology chosen, some explanation of data collection and 

    analysis methods. 

    8 – 10 points 

    Basic research design, 

    limited explanation of 

    methodology, some gaps in data collection and 

    analysis.. 

    5 – 7 points 

    Inadequate research design, inappropriate methodology, insufficient explanation of methods. 

    0 – 5 points

    Finding 

    15 marks 

    Clear and comprehensive 

    presentation of findings, 

    supported by data, insightful analysis and interpretation.. 

    13 – 15 points

    Relevant findings presented, supported by some data, 

    analysis and interpretation. 9 – 12 points

    Relevant findings 

    presented, supported by some data, basic analysis and interpretation. 

    8 -10 points

    Limited findings presented, insufficient data support, superficial analysis. 

    5 – 7 points

    Inaccurate or irrelevant 

    findings, lack of data support, no analysis. 

    0 – 5 points 

    Report layout & spelling 5 marks

    Report Layout is consistent and professionally done. 

    5 points

    Report Layout is consistent and professionally done. 

    4.5 points

    Report Layout is 

    consistency. 

    4 points

    Report layout is consistent. There are some grammatical errors. 

    3 points

    The report layout is not 

    consistent and there are many grammatical errors. 

    2 points

    Visual 

    5 marks

    Effective use of visuals to 

    enhance understanding, clear and informative, appropriate use of graphics. 

    5 points

    Some use of visuals, generally effective,some minor issues with clarity or relevance. 

    4 points

    Limited use of visuals, lack of clarity or relevance, 

    inappropriate graphics. 

    3 points

    ineffective use of visuals. 2 points

    No or ineffective use of 

    visuals 

    0 points

    Assessment Details for Assessment Item 3: 

     

    Overview 

    Assessment tasks 

    Learning Outcome Mapping

    Assessment ID 

    Assessment Item 

    When due 

    Weighting 

    ULO# 

    CLO# for  

    BITS

    3

    Part A – Design Report (Group) 

    Session 13 (Study Week) 

    30%

    1, 2, 3, 4, 5 

    1, 2, 3, 4, 5

    Part B – Presentation (Group) 

    Session 14 (Exam Week) 

    10%

    Introduction 

    Students will submit work in the Design report during the study period and the presentation will happen during the class time. This is a group  assessment. The group will comprise 4 – 5 students. The group leader is responsible for submitting the report and the group members are  required to submit the group participation form. 

    This is the continuation of the previous assessment. Students will choose the analysis & usability report from the group members and use it for the  design report. Below is the structure for the report: 

    1. Introduction 

    2. Design Process 

    3. Design Rationale 

    4. User Interface Design 

    5. Usability Evaluation 

    6. Conclusion 

    For the presentation, students are expected to prepare a 10-minute presentation for part B. The presentation should not exceed 10 minutes. Every  minute exceeded will occur with a 5% penalty. All students in the team are required to participate in presentations. 

    Submission Instructions 

    All submissions are to be submitted through Turnitin. Drop-boxes linked to Turnitin will be set up in Moodle. Assessments not submitted through these drop boxes will not be considered. Submissions must be made by the end of session 13. 

    The Turnitin similarity score will be used to determine any plagiarism of your submitted assessment. Turnitin will check conference websites, Journal articles,

    online resources, and your peer’s submissions for plagiarism. You can see your Turnitin similarity score when you submit your assessments to the

    Victorian Institute of Technology CRICOS Provider No. 02044E, RTO No: 20829 

    appropriate drop-box. If your similarity score is of concern, you can change your assessment and resubmit. However, re-submission is only allowed before  the submission due date and time. You cannot make re-submissions after the due date and time have elapsed. 

    Note: All work is due by the due date and time. Late submissions will be penalized at 20% of the assessment final grade per day, including weekends.

  • Task 1 Study and analysis two network simulation software tools. Study the latest version of the NS3  simulator tool. Describe the new API and model change history of NS3.

    Wireless Networks and Security (MN603 Assessment-2) Assignment Help

    Assessment Details and Submission Guidelines

    Trimester 

    T2 2024

    Unit Code 

    MN603

    Unit Title 

    Wireless Networks and Security

    Assessment  

    Type

    Assignment 2 (Group assignment, 3-4 members per group)

    Assessment  

    Title

    Implementation of Wireless networks and performance evaluation

    Purpose of the  assessment  

    (with ULO  Mapping)

    The purpose of the assignment is to compare NS3 simulators with other current  network simulators. Developed, modified and studied wireless routing protocols  performance with NS3 simulator. Design and implement Wireless Local Area  Network (WLAN) technology based on IEEE 802.11 standards to ensure efficient  and secure data transmission. 

    Students will be able to complete the following ULOs: 

    Analyze and compare wireless communication protocols.  Compare standard-based technologies used in various networks.  Test and evaluate various wireless networks performance. 

    Weight 

    20%

    Total Marks 

    60

    Word limit 

    2500-3500

    Due Date 

    Week 11; 27/09/2024

    Submission  

    Guidelines

    All work must be submitted on Moodle by the due date along with a  completed Assignment Cover Page.  

    The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body)  font and 2 cm margins on all four sides of your page with appropriate section  headings.  

    Reference sources must be cited in the text of the report and listed  appropriately at the end in a reference list using IEEE referencing style.

    Extension 

    If an extension of time to submit work is required, a Special Consideration  Application must be submitted directly on AMS. You must submit this  application three working days prior to the due date of the assignment.  Further information is available at:  

    https://www.mit.edu.au/about-us/governance/institute-rules-policies-and plans/policies-procedures-and-guidelines/assessment-policy

    Academic  

    Misconduct 

    Academic Misconduct is a serious offense. Depending on the seriousness of  the case, penalties can vary from a written warning or zero marks to exclusion  from the course or rescinding the degree. Students should make themselves  familiar with the full policy and procedure available at 

    For  further information, please refer to the Academic Integrity Section in your  Unit Description.

    Use of 

    Generative 

    Artificial 

    Intelligence 

    (GenAI) in 

    Assessments

    More information about the use of Gen AI in student assessment can be  found in the full policy and procedure available at: Further support can be found in the  

    Further details on the type of assessment tasks, and whether Gen AI is permitted to be used or not are provided in the assessment brief.

    Artificial 

    Intelligence 

    (AI) Score  

    Limit.

    Not acceptable AI score more than 30%. Please check your assignment  AI score before submission.

    Assignment Description 

    This assignment consists of three tasks.  

    Task 1 Study and analysis two network simulation software tools. Study the latest version of the NS3  simulator tool. Describe the new API and model change history of NS3. 

    Task 2. Involving analysis and modification of the NS3 lab exercises code. Task 3 It is a case study task. You need to analyze and answer three specific questions.  

    [Total Marks 55]  

    ________________________________________________________________________________

    Task1 [Marks 10+10=20]    

    Q1. Explore and analyze the following network simulator and write a short comparative study  report.  

    NS3 

    NS2 

    Q2. What is the latest version of NS3 simulator? What new features are added in the latest version  of the NS3 simulator? Write a short report on the Changes from NS-3.38 to the latest version of NS3  simulator. Describe the new API and model change history of NS3. 

    ______________________________________________________________________________

    Task 2 [Marks 15]   

    Q2. Write a Multihop Ad Hoc wireless networks program for simulating in the NS3 simulator. Name  the program as your group number. Your program should generate 5 packet captured files. Also  give the name of the xml file as “Your Group name.xml.” Execute the program and execute NetAnim  for visualization of the performance of your Multihop Ad Hoc program. Take a screenshot of the  created .xml file in the NetAnim display. Screenshot of 5 packet captured files that your program  generates. Attach the code of your program in the submission report particularly 5 packet  captured generation code.  

    [Hints: You can use Lab-3 task (aodv.cc) program and modify it according to the Task2]

    ________________________________________________________________________

    Task 3 [Marks 25]  

    Q3. Case Study:  

    Many wireless devices use wireless technology, yet they lack the necessary security protections. In  an Australian Information Security Association (AISA) members gathering in Melbourne a security  researcher, who has himself a diabetic, demonstrated a wireless attack on an insulin pump that  could change the delivery of the patient. In this gathering another AISA member who is a security  vendor found that they can scan a public space from up to 91 meters (300 feet) away, find  vulnerable pumps made by a specific medical device manufacturer, and then force these devices to  dispense fatal insulin doses. 

    Based on the above scenario, write a short report and answer the following questions:  a) Conduct research on the current state of the attacks on wireless medical devices and proposed  defenses to mitigate the attack.  

    b) Should the vendors who make this wireless medical device be forced to add security to their  devices? What should be the penalty if they do not?  

    c) As per Australian cyber security laws, what should be the penalty for an attacker who  manipulates a wireless device.  

      

    Source: Book: Security Awareness: Applying Practical Cybersecurity in your world, Mark Ciampa, Cengage.

    ————————————————-:End of Task:—————————————————

    Marking Guide 

    Section to be included in the report 

    Description of the section 

    Marks

    Task-1: 

    Q1. Explore and analyze NS2 and  NS3 network simulators and write a  short comparative study report. Q2. What is the latest version of  NS3 simulator? What new features are added in the latest version of the  NS3 simulator? Write a short report  on the Changes from NS-3.38 to  latest version of NS3 simulator.  Describe the new API and model  change history of NS3.

    Q1. Detail Comparative study report  on NS2 and NS3 Network simulators. Each simulator description in the  study will be 5 marks each.  

    Q2. Correct and appropriate answers  to this question. 10 marks.

    5+5+10=20

    Task-2: NS3 Simulation 

    Correctly written the Multihop  Ad Hoc wireless networks program for  generation of 5 packets captured files and appropriately created .xml file. Provided codes.

    15

    Task-3: Case Study 



    Introduction 

    Introduction 

    2

    Conduct research on the current state  of the attacks on wireless medical  devices and proposed defenses to  mitigate the attack. 

    Research the current state of the  attacks on wireless medical devices  and proposed defenses to mitigate  the attack. 

    10

    Should the vendors who make this  wireless medical device be forced to  add security to their devices? What  should be the penalty if they do not? 

    Appropriate answers on question  part b.

    4

    As per Australian cyber security laws,  what should be the penalty for an  attacker who manipulates a wireless  device.

    As per Australian cyber security laws,  currently explained the penalty for  an attacker who manipulates a  wireless device. 

    3

    Conclusion 

    Write a summary of the report  highlighting the positive and negative  points.

    2

    Reference style 

    Follow the IEEE reference style.  Reference should be cited in the body  of the report.

    2

    Format of the report 

    Report Layout and Format. Format  must look professional. 

    2

    Marking Rubric for Assignment #2: Total Marks 60

    Grade 

    Mark

    HD 

    80-100

    70-79

    CR 

    60-69

    50-59

    Fail 

    <50


    Excellent 

    Very Good 

    Good 

    Satisfactory 

    Unsatisfactory

    Task 1






    Written  

    comparative  

    study report on  NS2 and NS3 

    network  

    simulators. /20

    Explored, studied,  and compared their  features on NS2  

    and NS3 simulators.

    Relevant and  soundly  

    analyzed  

    and wrote a comparative  study report.

    Generally  

    relevant and  

    comparative  

    study reported.

    Comparative  

    study reported  but not up to  

    the standard. 

    Comparative  

    study report is  poorly written

    Task 2  

    NS3  

    Simulation/7

    Correctly written  the Multihop  Ad Hoc wireless  networks program  using and  generated 5 packet  capture files. 

    Provided codes.

    Very good.  Written the  Multihop  

    Ad Hoc 

    wireless  

    networks  

    program and  generated 5 packet  

    capture files. Provided  

    codes.

    Good in writing  the Multihop  Ad Hoc wireless  networks  

    program.  

    generated 5 packet capture  files. Provided  codes.

    Satisfactorily  

    writing the  Multihop Ad Hoc wireless  

    networks  

    program.  

    Generated packet capture  files. Provided  codes but hard  to find the  location where  change has been  done.

    Poorly or not  

    attempt writing  the code. 

    Task 2  

    NS3  

    Simulation/8

    Appropriately  

    created .xml file.  And generated 6  packets captured files. Provided Valid  Screenshots. 

    Created .xml file. And  generated  

    packets  

    captured 

    files.  

    Provided  

    relevant  

    screen shots. 

    Properly named  the  

    .xml file. And  

    generated  

    packets  

    captured files.  Provided  

    relevant visible  screen shots

    Satisfactorily 

    named the  

    .xml file. And  

    generated  

    packets  

    captured files.  Relevant screenshots are not  

    clearly visible

    Poor  

    screenshots.  

    Hard to find the  .xml 

    File. No output  of the screen  

    shots.

    Task 2  

    Case study 






    Introduction/2 

    All topics are  

    pertinent and  

    covered in depth. 

    Topics are  

    relevant and 

    Generally  

    relevant and  

    analyzed.

    Some relevance  and briefly  

    presented.

    This is not  

    relevant to the 


    Ability to think  

    critically and source  material is  

    demonstrated

    soundly  

    analyzed.



    assignment  

    topic.

    Research the  

    current state of  the attacks on  wireless medical  devices and  

    proposed  

    defenses to  

    mitigate the  

    attack./10 

    Demonstrated  

    excellent ability to  think critically and  present an  

    exceptional  

    research report and  attack mitigation  techniques.

    Demonstrate 

    ed good  

    ability to  

    think  

    critically and  present a  

    research  

    report and  

    attack  

    mitigation  

    techniques.

    Demonstrated  good ability to  think critically  and present a  good research  report and  

    attack  

    mitigation  

    techniques.

    Demonstrated  ability to think  critically and  

    present a fair  

    research report  and attack  

    mitigation  

    techniques.

    Did not 

    demonstrate 

    ability to think 

    critically and 

    present poor  

    research report  and attack  

    mitigation  

    techniques.

    Should the  

    vendors who  

    make this  

    wireless medical  device be  

    forced to add  

    security to their  devices? What  should be  

    penalty if they  do not? /4

    Excellently  

    proposal for dog  vendor penalty 

    Very good  

    proposal for  dogy vendor  penalty 

    Good proposal  for dogy vendor  penalty 

    Fair proposal for  dogy vendor  

    penalty . 

    Poor proposal  for dogy vendor  penalty .

    As per  

    Australian cyber  security laws,  

    what should be  the penalty for  an attacker who  manipulates a  wireless  

    device./3

    Excellent strategy  for an attacker who  manipulates a  

    medical wireless  

    device. 

    Very good of  your proposed  strategy for  an attacker  

    who  

    manipulates  a medical  

    wireless  

    device.

    Good strategy  for an attacker  who  

    manipulates a  medical  

    wireless device.

    Fair strategy of  for an attacker  who  

    manipulates a  

    medical wireless  device.

    Not relevancy of  your prosed 

    strategy for an  attacker who  

    manipulates a  medical wireless  device.

    Conclusion/2 

    Excellent summary  of the report  

    highlighting all the  positive and  

    negative points

    Very good  

    summary of  the report  

    highlighting  most of the  positive and  negative  

    points

    Good  

    summary of the  report  

    highlighting  

    significant  

    number of the  positive and  

    negative points. 

    Fair summary  of the report  

    highlighting a  

    few numbers of  the positive and  negative points.

    Poor summary  of the report.  

    Failed to be  

    highlighting  

    positive and  

    negative points.

    Reference  

    style/2

    Clear styles with  

    excellent source of  references. Cited  well in the body of  the report. 

    Clear  

    referencing  

    style and  

    cited in the  

    body of the  report.

    Generally good  referencing  

    style

    Sometimes clear  referencing style

    Lacks  

    consistency  

    with many  

    errors

    Format and the  report Layout. 

    /2

    Exceptional report  layout, style and  

    language used

    Very good  

    report  

    layout, style  and 

    Good report  

    layout, style  

    and language  

    used

    Acceptable  

    report layout,  

    style and  

    language used

    Poor report  

    layout, style and  language used

  • Case Study  Procurement Scenario   GBI re-sells a range of bicycles. There is a request for the Deluxe Touring Bike (black). After

    Accounting for Managers (HM5001 T2) Assignment Help

    Individual Assignment 

    Case Study 

    Procurement Scenario  

    GBI re-sells a range of bicycles. There is a request for the Deluxe Touring Bike (black). After reviewing the stock, you realize that stock is required, and you are required to start the procurement process. The Deluxe Touring Bike (black) is purchased from the vendor; Olympic Protective Gear. This vendor is already created in the system. You create a purchase order for the Deluxe Touring Bike (black), which is forwarded

    to the vendor. The goods arrive, and you will create a goods receipt and verify the physical receipt in stock. An invoice will arrive, which will need to be entered into the system. Payments will be posted to the vendor, and you will review the impact the purchase has on General Ledger. 

    Your task is to complete the procurement process from a specified scenario and produce several screenshots to verify the completion of the process. The screenshots are to be inserted (pasted) in the specified areas below. If you are unsure how to take a screenshot, please refer to Google. 

    Required Steps 

    Purchase Order Data

    Field 

    Description 

    Value

    Purchasing 

    Organization

    BI US 

    US00

    Vendor 

    Olympic Protective Gear 101### (where ### is 

    your logon number)

    Purchase Group 

    North America 

    N00

    Material 

    Deluxe Touring Bikes (black)

    DXTR1### (where ### is your logon number)

    Quantity 


    4

    Net Price 


    $1400 each

    Currency 


    USD

    Plant 

    DC Miami 

    MI00

    Deliverable: Procurement 

    1. Insert a screenshot of your Purchase Order

    Screenshot:


    Note:

    You could take a screenshot once the process is complete or use the Display Purchase Order functionality

    Goods Receipt Data 

    Field 

    Description 

    Value

    Storage Location Finished Goods US00



    Invoice Data 

    Field 

    Description 

    Value

    Company Code GBI Americas US00



    Tax 


    XI (Input tax)

    Payment Data 

    Field 

    Description Value


    Posting Date 


    Today’s date

    Journal Entry Date 


    Today’s date

    Value Date 


    Today’s date

    Period 


    Today’s month

    G/L Account 


    100000

    House Bank 


    Bank

    Amount 


    5600

    Currency 


    USD

    Deliverable: 

    Procurement

    2. Insert a screenshot of your Process Flow

    Screenshot:


    Note:


    Deliverable: 

    Procurement

    3. Insert a screenshot of your Post Outgoing Payments

    Screenshot:


    Note:


    Fulfillment Scenario 

    GBI re-sells a range of bicycles. The company have had an Inquiry from an existing customer (The Bike Zone ###) for 4 Deluxe Touring Bike (Black). As indicated, the customer is already in the system. Once you create the Inquiry, the customer has requested a formal Quotation. The customer receives the quotation and sends GBI a Purchase Order

    which is entered into the system as a Sales Order. As there is enough stock, you will complete the Delivery process. An Invoice will be created, and sent to the customer, and then GBI will receive Payment from the Customer. 

    Note: If you did the exercise, then your customer will be there. If not, then you will have to create the customer. The process of creating a new customer is given on page 68 of the SAP Tutorial. 

     

    Your task is to complete the fulfillment process from a specified scenario and produce several screenshots to verify the completion of the process. The required data for various steps is displayed below. All other data is the same as the exercise you have previously completed. The screenshots are to be inserted (pasted) in the specified areas below. 

    Required Steps 

    Create an Inquiry 

    Field 

    Description 

    Value

    Sales Organization 

    US East 

    UE00

    Distribution Channel Wholesale 


    WH

    Division 

    Bikes 

    BI

    Sold to Party 

    Bike Zone ###


    City 

    Orlando


    Cust Ref 


    ###

    Cust Ref Date 


    Today’s date

    Valid From 


    Today’s date

    Valid to 


    one month from today

    Material 

    Deluxe Touring Bike (Black) DXTR1###


    Order Quantity 


    4

    Deliverable: 

    Fulfillment

    4. Insert a screenshot of your Inquiry

    Screenshot:


    Note:


    Create a Quotation with a Reference




    Field 

    Description Value


    Cust Ref 


    ###

    Cust Ref Date 


    Today’s date

    Valid From 


    Today’s date

    Valid to 


    one month from today

    Req Deliv Date 


    Today’s date

    Create Sales Order with Reference 

    Field 

    Description Value


    Purchase Order No 


    ###

    Cust Reference 


    ###

    Cust Ref Date 


    Today’s date

    First date 


    Tomorrow’s date

    Deliverable: 

    Fulfillment

    5. Insert a screenshot of your Sales Order

    Screenshot:


    Note:


    Delivery Process 

    Field 

    Description 

    Value

    Ship to Party 

    Bike Zone ###


    Planned Creation date


    Due up until next week

    Picking Quantity 


    4

    Storage Location 

    Finished Goods FG00


    Create Invoice 

    Field 

    Description 

    Value

    Ship to Party 

    Bike Zone ###


    Billing Date From 


    Today’s date

    Post Receipt of Customer Payment

    Field 

    Description 

    Value

    Company Code 

    UNS 

    US00

    Posting Date 


    Today’s date

    Journal Entry date 


    Today’s date


    Journal Entry Type Billing Doc. Transfer RV


    Period 


    Current Month

    G/L Account 


    100000

    Amount 


    12000

    Currency 


    USD

    Deliverable: 

    Fulfillment

    6. Insert a screenshot of your Journal Entry

    Screenshot:


    Note:


    Deliverable: 

    Fulfillment

    7. Insert a screenshot of your Process Flow

    Screenshot:


    Note:


    Marking Criteria

    Marking criteria 

    Weighting in 

    Total Grades 

    1. Insert a screenshot of your Purchase Order 4% 

    2. Insert a screenshot of your Process Flow 4% 

    3. Insert a screenshot of your Post Outgoing Payments 6%

    4. Insert a screenshot of your Inquiry 4% 

    5. Insert a screenshot of your Sales Order 4% 

    6. Insert a screenshot of your Journal Entry 4% 

    7. Insert a screenshot of your Process Flow 4% 

    TOTAL Weight 

    30%

    Academic Integrity 

    Holmes Institute is committed to ensuring and upholding Academic Integrity, as Academic Integrity is integral to maintaining academic quality and the reputation of Holmes’ graduates. Accordingly, all assessment tasks need to comply with academic integrity guidelines. Table 1 identifies the six categories of Academic Integrity breaches. If you have any questions about Academic Integrity issues related to your assessment tasks, please consult your lecturer or tutor for relevant referencing guidelines and support resources. Many of these resources can also be found through the Study Skills link on Blackboard.  

    Academic Integrity breaches are a serious offense punishable by penalties that may range from deduction of marks, failure of the assessment task or unit involved, suspension of course enrolment, or cancellation of course enrolment. 

    Table 1: Six categories of Academic Integrity breaches

    Plagiarism 

    Reproducing the work of someone else without attribution. When a student submits their own work on multiple occasions this is known as self-plagiarism.

    Collusion 

    Working with one or more other individuals to complete an assignment, in a way that is not authorized.

    Copying 

    Reproducing and submitting the work of another student, with or without their knowledge. If a student fails to take reasonable precautions to prevent their own original work from being copied, this may also be considered an offense.



    Impersonation 

    Falsely presenting oneself, or engaging someone else to present as oneself, in an in-person examination.

    Contract cheating 

    Contracting a third party to complete an assessment task, generally in exchange for money or other manner of payment.

    Data fabrication and falsification

    Manipulating or inventing data with the intent of supporting false conclusions, including manipulating images.

    Source: INQAAHE, 2020 

    Marking Rubric


    Excellent 

    Very Good 

    Good 

    Satisfactory 

    Unsatisfactory


    (80-100%) 

    (70-79%) 

    (60-69%) 

    (50-59%) 

    (0-49%)

    Insert a 

    screenshot of your Purchase Order [4 

    Marks]

    All the steps are followed properly, and all the 

    screenshots 

    are pasted 

    according to the given 

    instructions.

    Almost all the steps are 

    followed, and almost all the screenshots 

    are pasted 

    according to the given 

    instructions.

    Most of the 

    steps are 

    followed, and the relevant 

    screenshots 

    are pasted 

    according to the given 

    instructions.

    Some steps are followed, and some relevant screenshots 

    are pasted 

    according to the given 

    instructions.

    Most of the 

    steps are not followed 

    properly. 

    However, 

    some relevant screenshots 

    are pasted.

    Insert a 

    screenshot of your Process Flow [4 

    Marks]

    All the steps are followed properly, and all the 

    screenshots 

    are pasted 

    according to the given 

    instructions.

    Almost all the steps are 

    followed, and almost all the screenshots 

    are pasted 

    according to the given 

    instructions.

    Most of the 

    steps are 

    followed, and the relevant 

    screenshots 

    are pasted 

    according to the given 

    instructions.

    Some steps are followed, and some relevant screenshots 

    are pasted 

    according to the given 

    instructions.

    Most of the 

    steps are not followed 

    properly. 

    However, 

    some relevant screenshots 

    are pasted.

    Insert a 

    screenshot of your Post 

    Outgoing 

    Payments [6 Marks]

    All the steps are followed properly, and all the 

    screenshots 

    are pasted 

    according to the given 

    instructions. 

    Almost all the steps are 

    followed, and almost all the screenshots 

    are pasted 

    according to the given 

    instructions.

    Most of the 

    steps are 

    followed, and the relevant 

    screenshots 

    are pasted 

    according to the given 

    instructions.

    Some steps are followed, and some relevant screenshots 

    are pasted 

    according to the given 

    instructions.

    Most of the 

    steps are not followed 

    properly. 

    However, 

    some relevant screenshots 

    are pasted.

    Insert a 

    screenshot of your Inquiry [4 Marks]

    All the steps are followed properly, and all the 

    screenshots 

    are pasted 

    according to the given 

    instructions.

    Almost all the steps are 

    followed, and almost all the screenshots 

    are pasted 

    according to the given 

    instructions.

    Most of the 

    steps are 

    followed, and the relevant 

    screenshots 

    are pasted 

    according to the given 

    instructions.

    Some steps are followed, and some relevant screenshots 

    are pasted 

    according to the given 

    instructions.

    Most of the 

    steps are not followed 

    properly. 

    However, 

    some relevant screenshots 

    are pasted.

    Insert a 

    screenshot of your Sales 

    Order [4 

    Marks]

    All the steps are followed properly, and all the 

    screenshots 

    are pasted 

    according to the given 

    instructions.

    Almost all the steps are 

    followed, and almost all the screenshots 

    are pasted 

    according to the given 

    instructions.

    Most of the 

    steps are 

    followed, and the relevant 

    screenshots 

    are pasted 

    according to the given 

    instructions.

    Some steps are followed, and some relevant screenshots 

    are pasted 

    according to the given 

    instructions.

    Most of the 

    steps are not followed 

    properly. 

    However, 

    some relevant screenshots 

    are pasted.

     

     

    Insert a screenshot of

    All the steps are followed properly, and all the

    Almost all the steps are followed, and almost all the

    Most of the steps are followed, and the relevant

    Some steps are followed, and some relevant screenshots

    Most of the steps are not followed properly.

    your Journal Entry [4 Marks]

    screenshots are pasted according to the given

    instructions.

    screenshots are pasted according to the given

    instructions.

    screenshots are pasted according to the given

    instructions.

    are pasted according to the given instructions.

    However, some relevant screenshots are pasted.

     

    All the steps

    Almost all the

    Most of the

    Some steps are followed, and some relevant screenshots are pasted according to the given instructions.

  • In this individual research paper, you will explore a contemporary issue in systems analysis and design, integrating academic research with practical application. The assignment is designed to deepen y

    System Analysis and Design (HI5030 T2) Assignment Help

    Individual Assessment Cover page

    Instructions

    Assignment Title: Practical Application and Research on Contemporary Systems Analysis and Design Issues

    Assessment Overview:

    This assessment relates to the unit learning outcomes as in the Unit of Study Guide. This assessment is designed to give students skills to explore the latest system analysis and design trends, challenges, and future directions.

    In this individual research paper, you will explore a contemporary issue in systems analysis and design, integrating academic research with practical application. The assignment is designed to deepen your understanding of the selected issue and its real-world impact on business information systems. You will critically analyse the issue, apply relevant methodologies to a real-world or hypothetical scenario, and propose solutions to address the challenges it presents.

    1. Issue Selection:

    • What You’ll Do: Choose a contemporary issue from the list provided by the unit coordinator. Some examples of issues you might consider include:
      • Agile vs. Waterfall Methodologies: The challenges and benefits of agile methodologies compared to traditional waterfall approaches in system development.
      • Data Privacy and Security: How emerging privacy regulations, such as GDPR, impact system design and the challenges of ensuring compliance while maintaining system efficiency.
      • Integration of AI in System Design: The opportunities and challenges of incorporating artificial intelligence into business information systems, including issues related to data quality, bias, and explainability.
      • Cloud-Based Systems vs. On-Premises Systems: The considerations and trade-offs involved in choosing cloud-based solutions over traditional on-premises systems, including security, cost, and scalability.
      • User-Centred Design: The importance of user experience (UX) in systems analysis and design, and the challenges of balancing user needs with technical requirements.

    2. Research and Practical Application:

    • What You’ll Do: Start by conducting a literature review on your chosen issue. Look for academic articles, industry reports, and case studies that discuss the issue in depth. Then, apply the insights from your research to a practical scenario. For example:
      • Agile vs. Waterfall Methodologies: After reviewing the strengths and weaknesses of both approaches, you could apply them to a project management scenario in a software development company. You might create a prototype or design document showing how an agile approach could be adapted to a traditionally waterfall project, highlighting the potential benefits and challenges.
      • Data Privacy and Security: If your issue is data privacy, you could apply your research to a company that needs to redesign its information systems to comply with GDPR. This could involve proposing specific changes to data storage and processing practices and demonstrating how these changes would be implemented.

    3. Impact and Solution Analysis:

    • What You’ll Do: Analyse how the selected issue impacts the design and implementation of business information systems in your scenario. Discuss how the issue affects system functionality, data management, and the communication of requirements to stakeholders. Then, propose practical solutions or methodologies that could address these challenges. For example:
      • Agile vs. Waterfall Methodologies: Your analysis might reveal that while agile offers greater flexibility, it may be less effective in highly regulated industries where detailed documentation is required. You could propose a hybrid approach that incorporates the flexibility of agile with the structure of waterfall.
      • Integration of AI in System Design: You might identify that the use of AI introduces new challenges in data quality and bias. To address this, you could propose a framework for regular audits of AI systems to ensure they are fair and transparent.

    4. Documentation and Communication:

    • What You’ll Do: Compile your findings, analysis, and proposed solutions into a well-organized research paper. Your paper should clearly articulate both the theoretical research and the practical application. Ensure your writing is accessible to both technical and non-technical audiences, using clear explanations and supporting your arguments with evidence from your research and application.

    The report submission structure is as follows:

    1. Cover Page
    2. Executive Summary
    • Overview: Briefly summarize the issue, your research approach, key findings, and proposed solutions.
    • Key Takeaways: Highlight the most critical points of your analysis and conclusions.
    1. Table of Contents
    • List all the sections and sub-sections with corresponding page numbers.
    1. Introduction
    • Background: Provide an overview of the selected issue and its relevance in the context of systems analysis and design.
    • Purpose: State the purpose of the report and what you intend to achieve through your analysis.
    • Scope: Outline the scope of your research, including the specific business information system you are focusing on.
    • Structure: Briefly describe the structure of the report to guide the reader.
    1. Literature Review
    • Theoretical Background: Discuss the key concepts, theories, and methodologies relevant to the selected issue.
    • Current Research: Summarize the findings of recent studies and reports related to your issue, identifying any gaps or areas of debate.
    • Relevance to Business Information Systems: Connect the literature to the business information system you are analysing, explaining how the issue impacts this system.
    1. Analysis of the Issue
    • Description of the Issue: Provide a detailed explanation of the issue, including any challenges and implications for system design and implementation.
    • Impact on Business Information System: Analyse how the issue affects the specific business information system you are focusing on. Use examples or case studies to illustrate your points.
    • Comparison of Methodologies/Approaches: Compare different methodologies or approaches that could be used to address the issue within the context of the selected system.
    1. Practical Application
    • Scenario Description: Describe the real-world or hypothetical business scenario where the issue is being addressed.
    • Application of Methodologies: Explain how you applied the selected methodologies or techniques to address the issue in this scenario.
    • Outcome: Discuss the results of your application, including any improvements or challenges encountered.
    1. Proposed Solutions
    • Solution Description: Present the solutions or strategies you propose to address the issue within the selected business information system.
    • Justification: Justify your proposed solutions based on your research and practical application, including any advantages or potential limitations.
    • Implementation Plan: Outline a high-level plan for implementing the proposed solutions, including key steps, resources required, and potential risks.
    1. Conclusion
    • Summary of Findings: Recap the key findings from your research and analysis.
    • Implications: Discuss the broader implications of your findings for the field of systems analysis and design.
    • Future Research: Suggest areas for future research that could build on your work.
    1. Recommendations
    • Actionable Steps: Provide specific recommendations for organizations or practitioners dealing with the selected issue in the context of the business information system.
    • Best Practices: Highlight best practices that could be adopted based on your findings.
    1. References

    Student Assessment Citation and Referencing Rules

    Adapted Harvard Referencing Rules

    Holmes has implemented a revised Harvard approach to referencing. The following rules apply:

    1. Reference sources in assignments are limited to sources that provide full-text access to thesource’s content for lecturers and markers.
    2. The reference list must be located on a separate page at the end of the essay and titled: “References”.
    3. The reference list must include the details of all the in-text citations, arranged A-Z alphabetically by author surname with each reference numbered (1 to 10, etc.) and each reference MUST

    include a hyperlink to the full text of the cited reference source. For example:

    1. All assignments must include in-text citations to the listed references. These must include the surname of the author/s or name of the authoring body, year of publication, page number of the content, and paragraph where the content can be found. For example, “The company decided to implement an enterprise-wide data warehouse business intelligence strategies (Hawking et al., 2004, p3(4)).”

    Non-Adherence to Referencing Rules

    Where students do not follow the above rules:

     

    1. As per the Student Handbook, late penalties will apply each day after the student/s has been notified of the due date.
    2. Students who comply with rules and the citations are “fake” may be reported for academic misconduct

    For students who submit assignments that do not comply with the rules, a 10% penalty will be applied.

  • You are an IT consultant who has been hired by a small business that provides web design services  to clients. The business has experienced growth in recent years and has expanded its

    TECH2100 Introduction to Information Networks Assignment Help

    Assessment 2 Information  

    Subject Code: 

    TECH2100

    Subject Name: 

    Introduction to Information Networks

    Assessment Title: 

    Report Evaluation

    Assessment Type: 

    Individual

    Word Count: 1,500 Words (+/-10%)

    Weighting: 

    30 %

    Total Marks: 

    30

    Submission: 

    MyKBS

    Due Date: 

    Week 10

     

    Your Task 

    This assessment is to be completed individually. In this assessment, you will prepare a written report that  evaluates the network architecture and communication protocols of an organization and provide  recommendations to address any problems identified. 

     

    Assessment Description 

    You are an IT consultant who has been hired by a small business that provides web design services  to clients. The business has experienced growth in recent years and has expanded its operations to  multiple locations. The management has noticed that the network has become slow and unreliable,  and the employees are having difficulty accessing the resources they need to perform their work. 

    Your task is to evaluate the organization’s network architecture and communication protocols,  identify any problems, and provide recommendations to address them. Your report should include  an executive summary, an overview of the organization’s network architecture and communication  protocols, a summary of the problems identified, and your recommendations for addressing them. 

    Case Study: 

    ABC Web Design is a small business that provides web design services to clients. The business  has grown rapidly in recent years and has expanded its operations to multiple locations. The  company’s employees work remotely from different locations and rely on the company’s network to  access the resources they need to perform their work. 

    The company’s network architecture consists of a central server located at the head office, which is  connected to satellite offices and remote employees via a virtual private network (VPN). The  communication protocols used by the company include Transmission Control Protocol/Internet  Protocol (TCP/IP) and Simple Mail Transfer Protocol (SMTP). 

    Recently, the company’s employees have experienced slow and unreliable network performance,  and they have difficulty accessing the resources they need to perform their work. Additionally, there  have been instances of lost or delayed emails, which have caused communication breakdowns with  clients. 

    You have been hired by ABC Web Design to evaluate the organization’s network architecture and  communication protocols, identify any problems, and provide recommendations to address them. 

    This assessment aims to achieve the following subject learning outcomes:

    LO1 

    Evaluate the main technologies, models and protocols used in data communications and  networking.

    LO3 

    Identify problems that emerge among the networks that constitute today’s internet  architecture.

    LO4 

    Recommend and apply solutions for common internet architecture problems.

     

    Assessment Instructions  

    • Your report should be submitted in Word Document or PDF format and be approximately 1500  words in length, excluding references and appendices. 

    • Your report should include an executive summary, an introduction, a discussion of the  organization’s network architecture and communication protocols, a summary of the problems  identified, and your recommendations for addressing them. 

    • You should include relevant diagrams or figures to support your analysis and recommendations. • Your report should be properly formatted with headings and subheadings. • Your report should include a minimum of ten (10) academic references from credible sources,  

    such as peer-reviewed journal articles, industry reports, or academic books. These references  should be cited using KBS Harvard referencing style. 

    • Please refer to the assessment marking guide to assist you in completing all the assessment  criteria.

     

    Important Study Information 

    Academic Integrity and Conduct Policy 

    KBS values academic integrity. All students must understand the meaning and consequences of cheating,  plagiarism and other academic offenses under the Academic Integrity and Conduct Policy. 

    Please read the policy to learn the answers to these questions: 

    • What is academic integrity and misconduct? 

    • What are the penalties for academic misconduct? 

    • How can I improve my grade? 

    Late submission of assignments (within the Assessment Policy) 

    Length Limits for Assessments 

    Penalties may be applied for assessment submissions that exceed prescribed limits.  

    Study Assistance 

    Students may seek study assistance from their local Academic Learning Advisor or refer to the resources on  the MyKBS Academic Success Centre page. Further details can be accessed at 

     

    Generative AI Traffic Lights  

    Please see the level of Generative AI that this assessment is Level 2 has been designed to accept:

    Traffic Light 

    Amount of Generative Artificial Intelligence  (Generative AI) usage 

    Evidence Required

    This  

    assessment  ()

    Level 1

    Prohibited: 

    No Generative AI allowed 

    This assessment showcases your individual  knowledge, skills and/or personal experiences in the  absence of Generative AI support.

    The use of generative AI is prohibited for this  assessment and may potentially result in  penalties for academic misconduct, including but  not limited to a mark of zero for the assessment.

     

    Level 2

    Optional: 

    You may use Generative AI for research and  content generation that is appropriately  

    referenced. 

    See assessment instructions for details 

    This assessment allows you to engage with  Generative AI as a means of expanding your  understanding, creativity, and idea generation in the  research phase of your assessment and to produce  content that enhances your assessment. I.e.,  images. You do not have to use it.

    The use of Gen AI is optional for this  

    assessment. 

    Your collaboration with Generative AI must be  clearly referenced just as you would reference  any other resource type used. Click on the link  below to learn how to reference Generative AI. 

    In addition, you must include an appendix that  documents your Generative AI collaboration  including all prompts and responses used for the  assessment. 

    Unapproved use of generative AI as per  

    assessment details during the content generation  parts of your assessment may potentially result  in penalties for academic misconduct, including  but not limited to a mark of zero for the  

    assessment. Ensure you follow the specific  assessment instructions in the section above.

    Level 3

    Compulsory: 

    You must use Generative AI to complete your  assessment 

    See assessment instruction for details 

    This assessment fully integrates Generative AI,  allowing you to harness the technology’s full  potential in collaboration with your own expertise. 

    Always check your assessment instructions carefully  as there may still be limitations on what constitutes  acceptable use, and these may be specific to each  assessment. 

    You will be taught how to use generative AI and  assessed on its use.  

    Your collaboration with Generative AI must be  clearly referenced just as you would reference  any other resource type used. Click on the link  below to learn how to reference Generative AI.  

    In addition, you must include an appendix that  documents your Generative AI collaboration  including all prompts and responses used for the  assessment.  

    Unapproved use of generative AI as per  

    assessment details during the content generation  parts of your assessment may potentially result  in penalties for academic misconduct, including  but not limited to a mark of zero for the  

    assessment. Ensure you follow the specific  assessment instructions in the section above.

     

     

     

    Assessment Marking Guide

    Marking Criteria 

    F (Fail) 

    P (Pass) 

    C (Credit) 

    D (Distinction) 

    HD (High Distinction)  

    _____| 30 marks 

    0 – 49% 

    50 – 64% 

    65 – 74% 

    75 – 84% 

    85 – 100%

    Research and  

    Analysis 

    _____| 8 marks

    Little or no evidence of  research or analysis.  The report lacks any  meaningful analysis of  the organization’s  

    network architecture  and communication  protocols.

    Some evidence of  

    research and analysis  but lacks depth or  

    clarity. The report  

    provides a basic  

    analysis of the  

    organization’s network  architecture and  

    communication  

    protocols but fails to  identify all relevant  

    issues.

    Thorough research and  analysis, with clear  evidence and  

    explanation. The report  provides a  

    comprehensive  

    analysis of the  

    organization’s network  architecture and  

    communication  

    protocols, with a clear  explanation of all  

    relevant issues.

    Extensive research and  analysis, with insightful  recommendations. The  

    report provides an in depth analysis of the  organisation’s network  architecture and  

    communication  

    protocols, with insightful  recommendations that  are well-supported by  evidence.

    Exceptional research and analysis, with insightful and original recommendations. The report provides an exceptional analysis of the organisation’s network architecture and communication protocols, with insightful and original recommendations that demonstrate a deep understanding of the subject matter.

    Recommendations or  Solutions 

    _____| 8 marks

    Fails to provide any  recommendations or  solutions. The report  does not offer any  

    recommendations or  solutions for addressing  the problems identified.

    Provides some  

    recommendations or  solutions, but they may  not be well-supported  or practical. The report  provides some  

    recommendations or  solutions for addressing  the problems identified,  but they are not well supported by evidence  or may not be practical  to implement.

    Provides practical and  well-supported  

    recommendations or  solutions. The report  provides practical and  well-supported  

    recommendations or  solutions for addressing  the problems identified,  which are based on  sound analysis and  evidence.

    Provides innovative  and well-supported  recommendations or  solutions that go  

    beyond the scope of  the instructions. The  report provides  

    innovative and well supported  

    recommendations or  solutions for addressing  the problems identified,  which demonstrate  creativity and  

    originality, and go 

    Provides creative,  

    evidence-based  

    recommendations or  solutions that  

    demonstrate  

    exceptional critical  

    thinking skills. The  

    report provides  

    exceptional and  

    creative  

    recommendations or  solutions for addressing  the problems identified,  which demonstrate  exceptional critical 

     

           

    beyond the scope of  the instructions.

    thinking skills and  

    originality.

    Clarity and Depth of  Discussion 

    _____| 6 marks

    The report provides a  superficial discussion of  the organization’s  

    network architecture  and communication  protocols. The  

    discussion lacks depth,  coherence, and  

    relevance to the  

    assignment  

    instructions.

    The report provides a  basic discussion of the  organization’s network  architecture and  

    communication  

    protocols but may lack  coherence and  

    relevance to the  

    assignment instructions  in some sections.

    The report provides a  clear and coherent  

    discussion of the  

    organization’s network  architecture and  

    communication  

    protocols, with a focus  on the assignment  

    instructions.

    The report provides a  thorough and insightful  discussion of the  

    organisation’s network  architecture and  

    communication  

    protocols, which is well organised and relevant  to the assignment  

    instructions.

    The report provides an  exceptional and  

    engaging discussion of  the organisation’s  

    network architecture  and communication  protocols, which  

    demonstrates a deep  understanding of the  subject matter and  

    exceeds the  

    requirements of the  assignment  

    instructions.

    Quality of Writing 

    _____| 4 marks

    Numerous errors that  make the report difficult  to read and  

    understand. Writing is  poorly organized and  lacks coherence.

    Several errors that  

    occasionally detract  from the overall  

    readability and  

    understanding of the  report. Writing is  

    organized but lacks  coherence in some  sections.

    Minimal errors that do  not detract from the  overall readability and  understanding of the  report. Writing is well organized with a clear  structure.

    No errors. Writing is  clear, concise, and  

    well-organised with a  coherent structure.

    No errors. Writing is of  exceptional quality, with  a clear and concise  structure that is highly  coherent and engaging.

    Use of Evidence and  Sources 

    _____| 4 marks

    Fails to use any  

    sources or evidence to  support claims.

    Uses sources or  

    evidence  

    inappropriately or  

    without sufficient  

    relevance to support  claims.

    Uses sources or  

    evidence appropriately  and effectively to  

    support claims, with  some minor errors in  referencing or citation.

    Uses sources or  

    evidence effectively  and accurately to  

    support claims, with  accurate referencing  and citation.

    Uses sources or  

    evidence exceptionally  effectively and  

    accurately to support  claims, with exceptional  referencing and citation  that

  • COMP6210 – Big Data Assignment help COMP6210 – Big Data Assignment 1

    COMP6210 – Big Data Assignment help

    COMP6210 – Big Data Assignment 1 

    MapReduce 

    Semester 2, 2024 

    School of Computing, Macquarie University 

    Dataset: 

    The Olympic historical dataset “Olympic_Athletes.zip” is available on iLearn. This dataset contains information  about athletes who participated in the Summer and Winter Olympic Games from 1896 to 2022. 

    Programming Environment: 

    MongoDB & Studio 3T: Used for creating databases and importing datasets into collections. • Pymongo: Used for connecting to MongoDB and extracting information from documents within  collections. 

    Mrjob: Used for implementing MapReduce programs. 

    Task 1: Data Curation (20 marks) 

    Task 1.1 – Data Extraction (10 marks): Extract information about medal-winning athletes in the Summer Olympics from the 1980 edition to the 2020 edition. Note that you need to verify whether the athlete  participated in the Summer Olympics and whether they won a medal (gold, silver, or bronze). Then, extract  the following values: 

    For each qualified athlete, create an entry in the format: <id, country, year, event, medal>. Store these entries  in a text file named “athletes.txt”. Refer to the following screenshot for formatting (note that the screenshot  is for reference purpose only; actual results may vary).

    You can also use other delimiters, such as commas, semicolons, underscores, or quotation marks, to separate  each line’s values. The “athletes.txt” text file will then serve as the input for the subsequent MapReduce  programs. 

    Task 1.2 – Data Organization (10 marks): Using the generated “athletes.txt” file as input, implement a  MapReduce program to sort the data in ascending order based on the athlete id. The partial results of Task  1.2 are similar to the following screenshot (note that the screenshot is for formatting reference only; actual  results may vary). 

    Note that for records with the same athlete ID, there is no specific requirement regarding their order.

     

    Task 2: Data Analysis with MapReduce (60 marks) 

    Using the generated “athletes.txt” file as input, implement three MapReduce programs to complete the  following analysis tasks. 

    Task 2.1 (20 marks) Find the top three athletes who won the most number of medals in each category (gold, silver, and bronze) in 1980-2020. Firstly, you need to calculate the total number of medals each  athlete has earned in gold, silver, and bronze categories, respectively. Next, sort the athletes in descending  order based on their medal counts for each category. Finally, for each medal category, output the top three athletes along with their respective medal counts. 

    Note that there is no specific requirement regarding the order of medal categories. The partial results of  Task 2.1 are similar to the following screenshot (the screenshot is for formatting reference only; actual  results may vary). 

    Task 2.2 (20 marks) Find the top three countries with the most number of gold medals in 1980-2020. First, you need to count the total number of each medal type (gold, silver, and bronze) for each country.  Then, sort the countries in descending order based on their gold medal count. Finally, output the top three countries along with their medal counts for all medal types (gold, silver, and bronze). 

    The partial results of Task 2.2 are similar to the following screenshot (note that the screenshot is for  formatting reference only; actual results may vary). 

    Task 2.3 (20 marks) Find the top three events with the highest medal counts for each decade in 1980- 2020. Firstly, for each decade (e.g., 2010-2020, 1980-1989, etc.), you need to find the event with the  greatest number of medals for each country, i.e., calculate the total medal count by summing gold, silver,  and bronze medals. Then, within each decade, sort the events by their total medal count in descending  order, and output the medal counts of the top 3 events (Note: The decades should be listed in descending  order, and the medal counts for the top 3 events within each decade should be also sorted in descending  order). 

    The partial results of Task 2.3 are similar to the following screenshot (note that the screenshot is for  formatting reference only; actual results may vary). 

    Task 3: MapReduce Flowcharts (20 marks) 

    For the three MapReduce programs in Task 2, create a 3-4 page Word or PDF document that includes  flowcharts to illustrate the process of each MapReduce program. You can use specific data examples to clarify  the processes. Note that your flowcharts should be consistent with your code. You can refer to the following  example provided in the Week 5 lecture notes as an example. 

    To create your diagrams, we recommend using the online diagramming tool. If you choose  to use online tools, you can include the diagram link in your document. 

    Programming Environment:  

    You are required to use Python to complete all code-related parts of this assignment. The use of other  programming languages is strictly prohibited and will result in a loss of all marks. 

    For Task 1.2 and Tasks 2.1-2.3, you are required to use only the MapReduce model to complete the corresponding  tasks. The use of any additional Python programs is not allowed. Even if correct results are obtained, failing  to use MapReduce will result in 0 marks. 

    Submission: 

    Submit a zip file named ‘FirstName_LastName_Assignment1.zip’ via iLearn. The submission should include the  following items: 

    • Source code for Task 1: ‘task1_1.py’ and ‘task1_2.py’. 

    • Source code for Task 2: ‘task2_1.py’, ‘task2_2.py’, and ‘task2_3.py’. 

    • Output files for Task 1: ‘athletes.txt’ and ‘output1_2.txt’. 

    • Output files for Task 2: ‘output2_1.txt’, ‘output2_2.txt’, and ‘output2_3.txt’. 

  • How do you think the HFMA can support your career growth and development?

    2 paragraph include reference -SWS FORMAT

     

    Choose a topic found on the HFMA website. Provide an overview of the topic in one paragraph.

    • Be sure to include an explanation regarding how it applies to something that you learned in the course. How do you think the HFMA can support your career growth and development?
    • Be sure to respond to at least one of your classmates’ posts.

    The post How do you think the HFMA can support your career growth and development? first appeared on Courseside Kick.