Author: grossjessica08

Information Technology | Autocad

Floor Plan, 1 Elevation and Site Plan

demonstrate the use of the design process and apply it in the design and construction of a prototype or model. identify pertinent information from appropriate resources to help in the design of a model or prototype demonstrate the safe and appropriate use of tools and equipment used in the construction of a prototype or model.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/07/Technology.pdf” width=”100%” height=”400″ ]

COSC1284 | Assignment 2 Programming Techniques | IT

Overview

For this assignment you need to write a console application in the Java programming language which implements a simulation for hiring items from a movie store called Movie Master.

The staff at Movie Master will need to be able to maintain the details for rental items that are available for hire by Movie Master customers.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/07/COSC1284.pdf” width=”100%” height=”400″ ]

COIT20247 | Database Design and Development | Database

You need to download the (partial) solution for assignment 2 from the unit website and familiarize with the Relations provided in that solution.  Select any one relation and provide column specifications/data dictionary for it. The column specifications should include the following properties of each column in that relation:

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/07/SAdbA2Spec-1-1.pdf” width=”100%” height=”400″ ]

COIT12204 | Practical Assessment 1 ASP.NET 4.5.1 | C#

The header must contain the logo. The actual logo displayed will depend on the theme. Your Colour theme uses a student created logo or can use the supplied headerlogo.jpg. The Monochrome theme uses headerlogo.jpg and is copied from the supplied Stylesheet.css file in the starter kit.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/07/edited_coit12204-Assn11.pdf” width=”100%” height=”400″ ]

Access Control Policy | Management

Write an Access Control Policy that captures the principles and restrictions of who, how and what can access the organisation’s environment. The audience of such a policy would be security specialists, technical IT and networks staff as well as non-technical staff at all levels of the organisation.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/07/Access-Control-Policy1.pdf” width=”100%” height=”400″ ]

ITC568 | Assessment item 5 Privacy Security and Ethical Reflection | Cloud Computing

Task

This assignment is designed to enable you to reflect on privacy, security and ethics based on your studies in this subject. You may include personal approaches and feelings on privacy, security and the ethics of some of these approaches.

Consider:

The charity scenario introduced in assignment 4. This assignment looked at the practice of Governments divesting some of their administrative functions to NGOs (Non Government Organisations). This practice often, but not always, includes paying the NGO a sum of money to process and administer clients on behalf of the Government. This assignment saw the NGO process members of society, who they would normally help and support, on behalf of the Government for various support services. This also included identifying the client and assisting them to create a digital ID to access these services.

But, any approach to divestment comes with risks to information security and privacy and may also have an ethical effect.

Tasks:

  1. Discuss what you see as the personal and ethical implications for the privacy of individual clients of an NGO that has adopted the MySupport approach. Will these personal implications lead to possible behavioural changes?(30 marks)
  2. Discuss what you see as the personal and ethical implications for the security of individual clients of an NGO that has adopted the MySupport approach. (30 marks)
  3. Discuss what you would recommend to a client of an NGO that has adopted the MySupport approach in order to protect their individual privacy and the security of their information and digital ID. (40 marks)

Your overall score for this assignment will be scaled out of 10. As a guide, your word limit for this assignment should be around 3,000 words

Rationale

This assessment task will assess the following learning outcome/s:

  • be able to critically analyse the legal, ethical and business concerns for the security and privacy of data to be deployed to the cloud.

ITC556 | Assessment item 2 Modelling | Database Systems

Bruce is a volunteer football (soccer) coach at XYZ United. At this stage, to announce training sessions, Bruce sends an SMS to his players. While this system works for him, it does not help him with getting accurate numbers of those who are coming to training sessions, especially when there are last minute changes.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/07/Assessment-item-2-copy-1.pdf” width=”100%” height=”400″ ]

ITC548 | Assessment Item 2 Requirements Gathering | System Analysis

Task
Further background
Refer to background information provided in Assessment 1 regarding the NewAccess project. Headspace in NSW was one organisation tasked with trialling NewAccess with people aged as young as 12. In 2005 the Australian Government allocated $54 million to establish the National Youth Mental Health Foundation (later to be named Headspace).

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/07/Assessment-item-2-1.pdf” width=”100%” height=”400″ ]

ITC542 | Networking Fundamentals | Internetworking with TCP IP

Task

This assessment aims to develop and gauge student understanding of the key topics covered so far by answering the following questions. Answering these questions will help you build some understanding for the next assessment item as well as for the entire subject. It is expected that answers to the assignment questions be succinct (i.e. precise and concise) with all sources of information fully referenced as per APA referencing style. You have to reference the textbook and any additional material you have used in your answers.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/07/Assessment-item-2.pdf” width=”100%” height=”400″ ]

Case Project | Research

The portfolio is based on the delivery system of the Case project, where students use real life project as the vehicle for learning and developing their competencies in this unit of study.

The case project should be selected by students in their field of interst.
The portfolio includes three components:
1. Literature review on the case project including the typical delivery models and contexts.
2. Development of the methodology for case project delivery system.
3. Implementation of the methodology from 2. to design case project delivery systems. Students will also deiscuss results and expected outcomes and suggest implementation plan for the case project.

Assignment 1 Vino Veritas | Digital Marketing

Vino Veritas is an online retailer of fine wines with an award-winning ecommerce website. Established in 2012, they have quickly built a reputation for excellent customer service, offering a broad selection of quality wines and competitive pricing. They are not a wine club and have chosen to remain an ‘on demand’ retailer.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/07/Vino_Veritas_2017_Assignment_1_V41.pdf” width=”100%” height=”400″ ]

Behavioral Finance | Finance

Referencing Styles : Harvard

Behavioral finance holds important implications for the practice of corporate finance. The traditional approach to corporate finance, embodied by the practice of value- based management which is based on three concepts: (1) rational behavior, (2) the capital asset pricing model (CAPM) and (3) efficient markets. Proponents of behavioral finance argue that psychological forces interfere with all three components of the traditional paradigm. They maintain that psychological phenomena prevent decision makers from acting in a rational manner, which security risk premiums are not fully determined by security betas, and that market prices are regularly at odds with fundamental values.

There are two key behavioral obstacles to the process of value maximization, one internal to the firm and other external. The first obstacle to value creation is behavioral costs. Behavioral costs are tend to undermine value creation. They are the costs or alternatively, the loss in value associated with errors that managers make because of cognitive imperfections and emotional influences. The second obstacle stems from behavioral errors by analysts and investors. These errors can create a wedge between fundamental values and market prices. Proponents of behavioral finance argue that risk is not priced in accordance with the CAPM and the market prices often deviate from fundamental values. There is ample evidence that market prices and fundamental values often part company.

These issues can be connected to corporate decision making. Practitioners who follow a value-based management approach often assume that fundamental values and market values coincide. However, when these values differ, manager who seeks to maximize fundamental value may find that their actions lower the market value of their firm. Managers may find themselves unsure of how to factor the errors of analysts and investors into their own decision making.

Required:  
a.    Critically analyze some of the more prominent behavioral characteristics of decision making.
b.    Describe how these characteristics create internal and external obstacles to value maximization in the context of real-world examples.