Author: grossjessica08

Information Technology | Autocad

Floor Plan, 1 Elevation and Site Plan

demonstrate the use of the design process and apply it in the design and construction of a prototype or model. identify pertinent information from appropriate resources to help in the design of a model or prototype demonstrate the safe and appropriate use of tools and equipment used in the construction of a prototype or model.

[googlepdf url=”” width=”100%” height=”400″ ]

COSC1284 | Assignment 2 Programming Techniques | IT


For this assignment you need to write a console application in the Java programming language which implements a simulation for hiring items from a movie store called Movie Master.

The staff at Movie Master will need to be able to maintain the details for rental items that are available for hire by Movie Master customers.

[googlepdf url=”” width=”100%” height=”400″ ]

COIT20247 | Database Design and Development | Database

You need to download the (partial) solution for assignment 2 from the unit website and familiarize with the Relations provided in that solution.  Select any one relation and provide column specifications/data dictionary for it. The column specifications should include the following properties of each column in that relation:

[googlepdf url=”” width=”100%” height=”400″ ]

COIT12204 | Practical Assessment 1 ASP.NET 4.5.1 | C#

The header must contain the logo. The actual logo displayed will depend on the theme. Your Colour theme uses a student created logo or can use the supplied headerlogo.jpg. The Monochrome theme uses headerlogo.jpg and is copied from the supplied Stylesheet.css file in the starter kit.

[googlepdf url=”” width=”100%” height=”400″ ]

End of Day Data | Python

Write a python program(s) to download end-of-day data last 25 years the major global stock market indices from Google Finance, Yahoo Finance, Quandl, City FALCON, or another similar source.

[googlepdf url=”” width=”100%” height=”400″ ]

ACCT6001 | Accounting Information Systems | IT

GAAM is an international company that manufactures mainly hydraulic systems, building systems, and metal products. Specifically, it makes hydraulic equipment such as gear pumps and motors, telescopic cylinders, and control valves.

[googlepdf url=”” width=”100%” height=”400″ ]

Access Control Policy | Management

Write an Access Control Policy that captures the principles and restrictions of who, how and what can access the organisation’s environment. The audience of such a policy would be security specialists, technical IT and networks staff as well as non-technical staff at all levels of the organisation.

[googlepdf url=”” width=”100%” height=”400″ ]

BSBMGT616 | Assignment 4 | Management

In this assessment, you are required to implement the strategic plan within the organisation, monitor progress and develop a report evaluating the implementation.

[googlepdf url=”” width=”100%” height=”400″ ]

BSBMGT616 | Assignment 3 | Management

In this assessment, you are required to develop and document a strategic plan for the organisation based on the research you have conducted. You will also need to communicate the strategic plan to key stakeholders in the organisation.

[googlepdf url=”” width=”100%” height=”400″ ]

BSBMGT616 | Assignment 2 Learner | Management

In this assessment, you are required to complete analyses of the organisational environment to develop an understanding of potential competitors and allies, and the associated risks and benefits.

[googlepdf url=”” width=”100%” height=”400″ ]

BSBMGT616 | Assignment 1 | Management

Performance objective

In this assessment, you are required to manage the review of the currency of the organisational vision and mission, make any necessary changes, and communicate the review process to stakeholders in order to gain their support.

[googlepdf url=”” width=”100%” height=”400″ ]

ITC595 | Assessment item 5 Research project (Report) | Research


In this assessment, you are required to provide a complete report of your research project, that you chose in Assessment 3 (Research Project Abstract) by discussing the following aspects.

[googlepdf url=”” width=”100%” height=”400″ ]

ITC595 | Assessment item 2 Research Report task | Research


Part A: 10 Marks

  1. Search the web for news on computer security breaches that occurred during January-August 2018. Research one such reported incident. Prepare a report focusing on the following issues:

[googlepdf url=”” width=”100%” height=”400″ ]

ITC568 | Assessment item 5 Privacy Security and Ethical Reflection | Cloud Computing


This assignment is designed to enable you to reflect on privacy, security and ethics based on your studies in this subject. You may include personal approaches and feelings on privacy, security and the ethics of some of these approaches.


The charity scenario introduced in assignment 4. This assignment looked at the practice of Governments divesting some of their administrative functions to NGOs (Non Government Organisations). This practice often, but not always, includes paying the NGO a sum of money to process and administer clients on behalf of the Government. This assignment saw the NGO process members of society, who they would normally help and support, on behalf of the Government for various support services. This also included identifying the client and assisting them to create a digital ID to access these services.

But, any approach to divestment comes with risks to information security and privacy and may also have an ethical effect.


  1. Discuss what you see as the personal and ethical implications for the privacy of individual clients of an NGO that has adopted the MySupport approach. Will these personal implications lead to possible behavioural changes?(30 marks)
  2. Discuss what you see as the personal and ethical implications for the security of individual clients of an NGO that has adopted the MySupport approach. (30 marks)
  3. Discuss what you would recommend to a client of an NGO that has adopted the MySupport approach in order to protect their individual privacy and the security of their information and digital ID. (40 marks)

Your overall score for this assignment will be scaled out of 10. As a guide, your word limit for this assignment should be around 3,000 words


This assessment task will assess the following learning outcome/s:

  • be able to critically analyse the legal, ethical and business concerns for the security and privacy of data to be deployed to the cloud.

ITC568 | Privacy and Data Protection | Cloud Privacy and Security

After your successful engagement to provide a security and privacy risk assessment for the charity, you and your team have again been engaged to develop privacy and personal data protection strategies for the charity.

[googlepdf url=”” width=”100%” height=”400″ ]

ITC561 | Security Management and Migration | Cloud Computing

MetaSoft Ltd is a software development company which works across Australia and New Zealand. The company is considering the following strategic proposal:

[googlepdf url=”” width=”100%” height=”400″ ]

ITC596 | Assessment Item 3 Risk Assessment Report | It Risk Management

There will be an online quiz during Week 10 (24th Sep – 30th Sep). The online quiz must be attempted by the students individually on the Interact site for ITC596. The Quiz is worth 5 marks of the overall marks available for assessment 3.

[googlepdf url=”” width=”100%” height=”400″ ]

ITC561 | Assessment item 2 Concepts and Models | Cloud Computing

MetaSoft Ltd is a software development company which works for clients across Australia and New Zealand. The company is considering moving some of its computer infrastructure into the Cloud.

[googlepdf url=”” width=”100%” height=”400″ ]

ITC560 | Assessment Item 3 Iot Research Project | IT

Choose one of the topics given below and submit a research project, which should not exceed 4000 words. The help file is available in the Student Resources Folder on Interact2.

[googlepdf url=”” width=”100%” height=”400″ ]

ITC560 | Packet Tracer Remote IoT Smart Office | Internet of Things

Case Study: You have just joined Ingenious Design and Solutions as an IoT Network Design Engineer. Your first project is to setup an IoT Smart Office. Ingenious Design and Solutions has 2 offices. The main office is located in Sydney and the other at Bathurst.

[googlepdf url=”” width=”100%” height=”400″ ]

ITC556 | Assessment Item 4 Research | Database Systems

You are required to conduct research on how you will implement the web database, described in Assignment 1 (Modelling) business case, in a cloud instance.

[googlepdf url=”” width=”100%” height=”400″ ]

ITC556 | Assessment item 2 Modelling | Database Systems

Bruce is a volunteer football (soccer) coach at XYZ United. At this stage, to announce training sessions, Bruce sends an SMS to his players. While this system works for him, it does not help him with getting accurate numbers of those who are coming to training sessions, especially when there are last minute changes.

[googlepdf url=”” width=”100%” height=”400″ ]

ITC548 | Assessment Item 2 Requirements Gathering | System Analysis

Further background
Refer to background information provided in Assessment 1 regarding the NewAccess project. Headspace in NSW was one organisation tasked with trialling NewAccess with people aged as young as 12. In 2005 the Australian Government allocated $54 million to establish the National Youth Mental Health Foundation (later to be named Headspace).

[googlepdf url=”” width=”100%” height=”400″ ]

ITC548 | Understanding the Problem | System Analysis PG

NewAccess is a mental health intervention which initially targeted youth aged 17 to 25, and is in the process of being expanded to young people as young as 12, and also to Indigenous youth. Headspace is one of several organisations trialling this new system.

[googlepdf url=”” width=”100%” height=”400″ ]

ITC542 | Networking Fundamentals | Internetworking with TCP IP


This assessment aims to develop and gauge student understanding of the key topics covered so far by answering the following questions. Answering these questions will help you build some understanding for the next assessment item as well as for the entire subject. It is expected that answers to the assignment questions be succinct (i.e. precise and concise) with all sources of information fully referenced as per APA referencing style. You have to reference the textbook and any additional material you have used in your answers.

[googlepdf url=”” width=”100%” height=”400″ ]

Case Project | Research

The portfolio is based on the delivery system of the Case project, where students use real life project as the vehicle for learning and developing their competencies in this unit of study.

The case project should be selected by students in their field of interst.
The portfolio includes three components:
1. Literature review on the case project including the typical delivery models and contexts.
2. Development of the methodology for case project delivery system.
3. Implementation of the methodology from 2. to design case project delivery systems. Students will also deiscuss results and expected outcomes and suggest implementation plan for the case project.

Assignment 1 Vino Veritas | Digital Marketing

Vino Veritas is an online retailer of fine wines with an award-winning ecommerce website. Established in 2012, they have quickly built a reputation for excellent customer service, offering a broad selection of quality wines and competitive pricing. They are not a wine club and have chosen to remain an ‘on demand’ retailer.

[googlepdf url=”” width=”100%” height=”400″ ]

Behavioral Finance | Finance

Referencing Styles : Harvard

Behavioral finance holds important implications for the practice of corporate finance. The traditional approach to corporate finance, embodied by the practice of value- based management which is based on three concepts: (1) rational behavior, (2) the capital asset pricing model (CAPM) and (3) efficient markets. Proponents of behavioral finance argue that psychological forces interfere with all three components of the traditional paradigm. They maintain that psychological phenomena prevent decision makers from acting in a rational manner, which security risk premiums are not fully determined by security betas, and that market prices are regularly at odds with fundamental values.

There are two key behavioral obstacles to the process of value maximization, one internal to the firm and other external. The first obstacle to value creation is behavioral costs. Behavioral costs are tend to undermine value creation. They are the costs or alternatively, the loss in value associated with errors that managers make because of cognitive imperfections and emotional influences. The second obstacle stems from behavioral errors by analysts and investors. These errors can create a wedge between fundamental values and market prices. Proponents of behavioral finance argue that risk is not priced in accordance with the CAPM and the market prices often deviate from fundamental values. There is ample evidence that market prices and fundamental values often part company.

These issues can be connected to corporate decision making. Practitioners who follow a value-based management approach often assume that fundamental values and market values coincide. However, when these values differ, manager who seeks to maximize fundamental value may find that their actions lower the market value of their firm. Managers may find themselves unsure of how to factor the errors of analysts and investors into their own decision making.

a.    Critically analyze some of the more prominent behavioral characteristics of decision making.
b.    Describe how these characteristics create internal and external obstacles to value maximization in the context of real-world examples.

7 Evolution Practical Assignment | IT

7 Evolution

Let us consider two n element meters of A-C-T-G              et • • • en, and 1. ti • • • fa. It is conjectured

that I is obtained by s using repeated application of the action rev(i,j),

[googlepdf url=”” width=”100%” height=”400″ ]

HLTINF001 | Control Policies and Procedures | Health

It has been identified that additional evidence is required for you to demonstrate competence in this unit. To meet all criteria for this unit, please select and provide evidence choosing one of the options shown below.

[googlepdf url=”” width=”100%” height=”400″ ]

SBM1300 | Assignment 4 Presentation | Research

References Cited – gives credit to the other researchers and authors whose work was used to develop and validate your study. 9 Interpretation of the findings in relation to research questions, hypotheses, or assumptions.

[googlepdf url=”” width=”100%” height=”400″ ]