Tag: help with assignment

HC2121 | Comparative Business Ethics | Ethics

Provide a short introduction and conclusion (5 marks)

  • Outline and summarize the arguments made in the article including relevant background/history and consider any legal or sanction implications. (5 marks)

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/05/HC2121-Individual-Essay-Assessment-2018-1.pdf” width=”100%” height=”400″ ]

COT20255 | Reliable Training Centre (RTC) | IT

Case Study: Reliable Training Centre (RTC)

The Reliable Training Centre (RTC) started 20 years ago with 10 staff members.  It provides basic security officer training in various major capital cities in Australia (eg. Melbourne, Sydney, Brisbane, Canberra, Perth). The RTC’s head office is located in Melbourne. Now, it employs about 30 highly skilled trainers and 20 administration and support staff.

RTC is open five days a week from Monday to Friday. The RTC offers nationally accredited security officer training programs.  Over the years, RTC training gained reputation for its curriculum, training methods and highly qualified staff.    Many aspiring candidates have completed security officer programs at RTC with the intention to find employment in banking and other sectors.  

The program lasts four weeks involving 20 full days of training from 9am to 6pm. All centres in all major cities run the course 12 times a year, i.e. once a month between January and December. A program usually starts on a Monday and ends on a Friday of week-4. 

At the moment, RTC records their employees’ details, Students, Courses, Enrolments, Payments, Class schedules and Grades manually.  Although, this system is working fine, recording data in the manual system is laborious and time consuming. Moreover, RTC is unable to provide quick answers to several questions including: (1) Total number of students who have completed the security program so far (2) Number of students enrolled at each site (3) Busy periods (4) Amount generated through security programs at each site and so on. 

RTC records bookings/registrations through walk-in enquiries, postal mails, faxes, and emails. Through the paper-copy course brochure, all prospective students can select which dates they want to attend from the list of available programs, dates and provide their details to register as a student in the program. Students can select to be trained at a RTC office located in any preferred Australian capital city.

At the time of registration, students are required to make payment by cash or credit card.  In case of phone bookings, students are required to complete Payment form providing their credit card details or attach a cheque to it before sending it through to RTC for processing. The receipt will be sent to the student by post within 5 working days. In case of enrolment cancellations, students will be charged 12% of total fee.

At this point of time, RTC only runs two nationally accredited basic certificate programs which cost $10,000 per individual trainee per program. Any group or corporation that sends more than 1 but up to 4 students in a single booking/registration will be granted a 5% discount in a payment, 5 to 10 students 20% discount, and 11 or more students 30% discount.

There are eight subjects to complete in both programs. There are two assignments per subject. Students must pass all the assignments in all eight subjects to qualify for a certificate. Occasionally, some students who are sick or have another commitment cannot complete an assignment in time. All assignments are marked on a 100% weighting. Guidelines for grading are: (1) award a ‘Fail’ grade for any subject average mark in the range of 0%-49%; (2) award a ‘Pass’ grade for any subject average mark in the range of 50%-100%; and (3) award a ‘Result Outstanding’ grade for any students who cannot complete and submit a particular assignment in time with an approved extension.

Marks are recorded in RTC’s grades register but grades are made known and given to students in transcripts on completion. A student transcript records results of all subject assignments as ‘Pass’, ‘Fail’, or ‘Result Outstanding’. To complete the course and be awarded a certificate, it is compulsory for all students to clear all assignments within the specified timeline.

The RTC management team believes that a computerised system will not only help them to record the transactions easily but also help them to generate reports to understand the total number of students completed programs so far, no of enrolments at each campus, peak times, payments received/outstanding, total revenue generated, etc.  In addition to this, they believe that an ERP system would be helpful in minimising inconsistencies with data and be able to manage cash flows effectively. The RTC management is keen to use the technology and implement an ERP system with the help of an expert (you) to manage their operations. 

Your Task:

For this assessment, you will develop a report for “Reliable Training Centre (RTC)”, which includes:

  • An argument to persuade management that an ERP is required,
  • Feasibility analysis,
  • Issues that may arise due to incomplete elicitation of requirements and misalignment between the business processes and organisational strategy
  • Risks associated  with BPR and ERP customisation
  • Current business processes
  • Proposed changes to the business processes

Persuade management that an ERP is required.  Your argument should consider at least:

  • The reason for organisational change,
  • Alignment of an ERP with the organisation’s goals.
  • Benefits and limitations of ERPs in the context of this organisation, and
  • The organisational commitment, especially from management, for this organisation.

Remember that there is no right answer or recommendation. Successful arguments can be made for many options. Your task is to present a persuasive and argumentative piece of writing in report form.  From your research and discussions in the report, you are expected to draw and justify your own conclusions.

For this assignment, you are required to use academic literature to support and illustrate your report.  It is important that you look at how issues and potential problems inter-relate and explain the linkages in order to present the risks/issues.   It is up to you to explain and justify why the risks you identify may be a problem.  Use literature to develop your recommendations for strategies or actions that can avoid or mitigate the risks.  Be aware that it may not be possible to avoid or mitigate all risks.

                                                                                                callnow Button

Your audience are non-technical. However, you can assume your readers are intelligent people who understand business arguments.  Remember that there is no single right answer that will address all risks and recommendations.  It is your choice to nominate which of the risks you believe are the most critical and up to you to select the most appropriate mitigation strategies for your recommendations.  You will be assessed on your ability to persuade the reader, so it is essential that you develop factual and logical arguments in your risk and recommendation justifications.

Hints:

Your report should include an Executive summary, Table of contents, Introduction, Discussion, Conclusion and recommendations.

You must use trade and academic literature to inform and support your report.  A minimum of 10 references (sources published 2012 or later) are required, at least 5 of which must be from academic sources (journal, conference or edited book chapter papers). Failure to include these will result in a deduction of marks. A high achieving student will probably have between 15 and 20 references. 

What you should submit:

You are required to submit your report as a Microsoft Word document.

LAW 6000 | Business and Corporate Law | LAW

Instructions:

There are three case studies that you are required to critically analyse.

With respect to each case study:

Identify the legal issue(s) arising from the facts of the case study

Identify the appropriate legal principles that requires discussion in the case study Apply the law to the facts of the case study

Reach a conclusion/ give practical advice to your client.

Your analysis should refer to appropriate cases and statutes and be referenced using the Harvard Reference system.

You will be assessed in accordance with the Assessment Rubric.

Case Study 1

Lance purchases a new ute from Mighty Motors Pty Ltd for $25,000. He tells Lynton, the car salesperson that he is a partner in a herbal products business. Lynton is aware of the business as he has read an article about it in the local newspaper.

The three partners had agreed that a car would be purchased for the business but Lance was instructed not to spend over $20,000.

Lynton is completely unaware that Lance has a purchasing limit.

Will the partnership be bound by this contract? Can the other partners take action against Lance?

Case Study 2

Xiaojing is keen to sell her products. The business produces a lavender and Echinacea moisturiser. The business produces an advertising flyer that states the moisturiser will ‘slow the effects of ageing’. This is false.

The partnership is not happy with the Ute – they think they have bought a ‘lemon’. They decide to sell the car to Saqlaim a refugee from Syria who has little understanding of English. Fast talking and charismatic Lance talks him into purchasing the car. He enters a contract with a finance company to purchase the car.

Will Saqlaim be bound by the contract? Do consumers have a remedy regarding the claims re the moisturiser?

Case Study 3

Felix a uni student aged 20 is keen to earn some income during the summer holidays. He is employed as a casual to pick lavender.

He will be paid $25 cash per bag.

One Sunday Xiaojing tells him that he is doing such great work she will pay him an extral $100 for work he did yesterday clearing garden beds.

She reneges on her promise and Felix is outraged. He wants to know if he can sue Xiaozing for the $100.

Advise Felix.

Learning Rubrics

Assessment Fail Pass Credit Distinction High Distinction
0-49 50-64 65-74 75-84 85-100
Attributes
(Unacceptable) (Functional) (Proficient) (Advanced) (Exceptional)
Evaluation of Limited understanding of key concepts Resembles a recall or Supports personal Discriminates Systematically and
information selected to required to support the case study. summary of key ideas. opinion and information between assertion of critically discriminates
support the case study substantiated by personal opinion and between assertion of
Confuses logic and emotion. Information Often conflates/confuses evidence from the information personal opinion and
taken from reliable sources but without a assertion of personal research/course substantiated by information
20 % coherent analysis or synthesis. opinion with information materials. robust evidence substantiated by robust
substantiated by from the evidence from the
Viewpoints of experts are taken as fact evidence from the Demonstrates a capacity research/course research/course
with little questioning. research/course to explain and apply materials and materials and extended
materials. relevant concepts. extended reading. reading.
Analysis and evaluation Identify logical flaws. Well demonstrated Information is taken
do not reflect expert capacity to explain from sources with a high
judgement, intellectual Questions viewpoints of and apply relevant level of
independence, rigor and experts. concepts. interpretation/evaluation
adaptability. to develop a
Viewpoint of experts
are subject to
questioning.
Analysis and
evaluation reflect
growing judgement,

Case Study Assessment Briefs.docxLaw6000 Assessment Briefs- Case Studies                                                                                                                                                                                                                                

  intellectual comprehensive critical
independence, rigor analysis or synthesis.
and adaptability.
Identifies gaps in
knowledge.
Exhibits intellectual
independence, rigor,
good judgement and
adaptability.
Effective Difficult to understand for audience, no Information, arguments Information, arguments Information, Expertly presented; the
communication while logical/clear structure, poor flow of ideas, and evidence are and evidence are well arguments and presentation is logical,
giving advices to client argument lacks supporting evidence. presented in a way that presented, mostly clear evidence are very persuasive, and well
is not always clear and flow of ideas and well presented, the supported by evidence,
No effort is made to keep audience logical. arguments. presentation is demonstrating a clear
engaged, audience cannot follow the line logical, clear and flow of ideas and
of reasoning. Attempts are made to The audience is mostly well supported by arguments.
keep the audience engaged, line of evidence.
Little use of presentation aids, or the engaged, but not always reasoning is easy to Engages and sustains
10 % presentation aids and material used are successful. Line of follow. Engages the audience’s interest in the
irrelevant. reasoning is often audience, topic, demonstrates high
difficult to follow. Effective use of demonstrates levels of cultural
presentation aids. cultural sensitivity. sensitivity
Presentation aids are
used more for effect Carefully and well Effective use of diverse
than relevance. prepared presentation aids,
presentations aids including graphics and
are used. multi-media.

Case Study Assessment Briefs.docxLaw6000 Assessment Briefs- Case Studies                                                                                                                                                                                                                                 

Application of knowledge to practise while providing appropriate advice to clients

Limited understanding of the internal and Understands the internal Understands the impact Evaluates the impact Demonstrates cultural
external business environment. and external business of financial, social, of financial, social, sensitivity.
environment including political, environmental political,
Lacks a global perspective for potential commercial context and issues on the business. environmental issues Analyses the impact of
market and trends. market forces. on the business; and financial, social, political,
Demonstrates where relevant, as environmental issues on
Uses a limited range of information as the Understands local and commercial awareness of they relate to the business; and where
basis of recommended practice. global markets/trends. product different countries relevant, as they relate to
development/service where the business different countries where
Accesses relevant provision. may operate. the business may
information. operate.
Understands the Demonstrates
Adequately utilises business. commercial Critically demonstrates
information from a awareness of commercial awareness of
variety of sources. Can prepare and product product
presents business development/service development/service
Gathers/utilises cases/proposals. provision and cost provision and cost
competitor knowledge. relationships. relationships.
Understands the Holistic understanding of
business and its risks. business and its risks.
Can prepare and Assesses the impact of
presents business information and
cases/proposals. communication systems
on the operations of the
business.
Critical understanding of
the global market
opportunities and
competitive
environment.

callnow Button

Case Study Assessment Briefs.docxLaw6000 Assessment Briefs- Case Studies                                                                                                                                                                                                                                 

Evaluation and Limited understanding of key concepts Resembles a recall or Supports personal Discriminates Systematically and
Justification of required to support discussion summary of key ideas. opinion and information between assertion of critically discriminates
Information provided substantiated by personal opinion and between assertion of
to client Confuses logic and emotion. Information Often conflates/confuses evidence from the information personal opinion and
taken from reliable sources but without a assertion of personal research/course substantiated by information
coherent analysis or synthesis. opinion with information materials. robust evidence substantiated by robust
20 % substantiated by from the evidence from the
Viewpoints of experts are taken as fact evidence from the Demonstrates a capacity research/course research/course
with little questioning. research/course to explain and apply materials and materials and extended
materials. relevant concepts. extended reading. reading.
Analysis and evaluation Identify logical flaws. Well demonstrated Information is taken
do not reflect expert capacity to explain from sources with a high
judgement, intellectual Questions viewpoints of and apply relevant level of
independence, rigor and experts. concepts. interpretation/evaluation
adaptability. to develop a
Viewpoint of experts comprehensive critical
are subject to analysis or synthesis.
questioning.
Identifies gaps in
Analysis and knowledge.
evaluation reflect
growing judgement, Exhibits intellectual
intellectual independence, rigor,
independence, rigor good judgement and
and adaptability. adaptability.

Case Study Assessment Briefs.docxLaw6000 Assessment Briefs- Case Studies                                                                                                                                                                                                                                

Correct citation of key Demonstrates inconsistent use of good Demonstrates use of Demonstrates use of Demonstrates use of Demonstrates use of
resources and evidence quality, credible and relevant resources to credible and relevant high quality, credible and good quality, high-quality, credible and
support and develop ideas. resources to support and relevant resources to credible and relevant relevant resources to
develop ideas, but these support and develop resources to support support and develop
20 % are not always explicit or ideas. and develop arguments and position
well developed. arguments and statements. Shows
statements. Shows evidence of wide scope
evidence of wide within and without the
scope within the organisation for sourcing
organisation for evidence
sourcing evidence

Hardware Manager | Python

The goal here is to write some software that would assist a system administrator to maintain a list of IT hardware and owners. The assignment will get progressively more complex as it proceeds – the early stages will be reasonable straight forward and will be sufficient for a passing grade.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/Hardware-Manager-Python.pdf” width=”100%” height=”400″ ]

 

ME606 | Digital Signal Processing | Engineering

Introduction

The objective of this assessment is for each student to undertake investigative review of literature and study the techniques for image analysis using a discrete transform. A significant number of discrete transforms may be used for image analysis including the discrete cosine, discrete sine, discrete Fourier transform, Walsh and Hadamard transforms. This assessment is limited to the application of only one of these transforms.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/ME606-Digital-Signal-Processing-Engineering.pdf” width=”100%” height=”400″ ]

ME504 | Advanced Networking | Information Technology

Assignment Description

Tasks:

There are two parts to this assignment, i.e. part A and part B.

  1. Investigate, design and develop a suitable network for an SME by addressing the following criteria. See detailed instruction in the next section.                  80 marks
  2. Presentation                                                                                                            20 marks

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/ME504-Advanced-Networking-Information-Technology.pdf” width=”100%” height=”400″ ]

 

ICTNWK505 | Design, Build and Test a Network Server | Information technology

Student Instructions:

  • Your answers should be on a separate document using word processing software such as MS Word & or other software (hand written submissions are only acceptable with prior approval from your Trainer)
  • Your document should be professionally formatted and include
  • Your Name
  • Your Student ID o Unit Code

Assessment Number (i.e. ICTNWK505 Assessment 1)

  • Please reference to each question number and retype each question with your answers
  • This is an open book assessment, you must answer every question and provide enough information to demonstrate sufficient understanding of what has been asked to achieve Please ask your Trainer/Assessor if you are unsure what is sufficient detail for an answer
  • Ask your trainer/assessor if you do not understand a question. Whist your trainer/assessor cannot tell you the answer, he/she may be able to re-word the question for you or provide further assistance based on the Institute’s “Reasonable Adjustment Policy”
  • Answers should be your own work, in your own words and not 4lagiarized, nor copied. However, if an answer is cut & pasted (such as a definition), then the source should be referenced

Assessment Resources ICTNWK505

  1. What are the Network operating systems available currently? Describe three key features of two network operating systems (NOS) in your own words. (Not more than 200 words)
  2. List resources or tools that can help you determine whether (i) whether particular hardware is compatible with Windows Server 2012; and (ii) whether an application will run on Windows Server 2012.
  3. Briefly discuss the roles of the following services in a computer network (Not more than 50 words for each item):
  • Domain name system (DNS) –
  • Dynamic host configuration protocol (DHCP)
  • File transfer protocol (FTP)
  • Mail
  • Network time protocol (NTP)
  • Proxy
  • Server messages block (SMB)
  • Web
  1. Describe the commands you would use to perform the following network service management configuration tasks: (not more than 50 words for each item)
  • Start – how to start a service under Windows Server
  • Stop – how to stop a service under Windows Server
  • Restart – how to restart a service under Windows Server
  • Start on boot – how to configure a network service to start on boot
  1. What are two security features of server firewall configuration? Describe in your own words. (Not more than 100 words for each item).
  2. What are two tools and techniques used in troubleshooting? Describe network diagnostic utilities briefly in your own words. (Not more than 100 words for each item).
  3. Describe the common operating system installation and operation issues of the following as they apply to Windows Server installations: (Not more than 50 words for each item).
  • Installation media – list three different installation media/types supported by Windows 2012
  • Boot process and diagnosing boot failures – give an example of the type of error I could encounter when booting a server
  • Operating system rescue environment – describe how I could recover from a boot error on Windows
  • Operating system help and support utilities – list two utilities that could help me troubleshoot Windows problems
  • Performance monitoring tools and tuning options – list one utility I can use to monitor hardware performance under Windows
  • High availability options for servers – list two features that I could deploy to increase my server availability

Assessment Resources ICTNWK505

  • File and print management – list the name of the protocol that I use to share file and printers in a Windows server environment
  1. Describe the following data security and storage measures required on a networked server (Not more than 50 words for each item):
  • User authentication and directory services – name the feature that provides these capabilities under Windows 2012 server
  • Best practice procedures for implementing backup and recovery – list two best practices that I should apply when implementing a backup and recovery solution
  • Error and event logging and reporting. List three types of logs I can consult on a Windows 2012 Server
  • Storage options, including file systems and disk partitioning schemes – list two file systems supported by Windows, and list the name of the utility I can use to repartition disks
  1. Describe the following process of managing a project (Not more than 100 words for each item):
  • Documentation skills required for networks – list two items that I should include in the documentation of a network
  • Process or task management – List the name of the utility under Windows that allows me to view running tasks and processes
  • Task scheduling utilities – list the name of the utility I can use to set up scheduled tasks in Windows

Assessor Use Only

Satisfactory (S) Not Satisfactory (NS) Assessor Signature: _______________________________ Date: _____________

Assessment Resources ICTNWK505

Assessment 2: Case Study

Instructions to Students

This assessment task can be undertaken in groups of up to three students per group. You need to list your group members in the introduction to the report. You should use the provided report template to help you structure the report (see Learner Resources for the subject). Each student needs to attach a copy of the group report to their assessment summary when they hand in their tasks

Scenario

You are working as an IT System & Network Engineer at Perfect Technology. You have been given a project to design a server to a new customer called First Couriers Pty Ltd.

First Couriers Pty Ltd is a courier service agency. Currently First Couriers has got 2 Windows 2008 workgroup servers (one in each office) and two network printers. Management is planning to open two new branches in Werribee & Thomastown and planning to have 5 more computers and a Printer each.

Each of the Werribee and Thomastown sites will have a network switch to provide interconnection to all the devices within each office, and a WAN link of 1 Gbps will be used to link the two sites together. You have been told that there are ports available on both switches to connect a server if required. Spare network cables are also available, so these do not need to be purchased. You have also been told that the new server should be located in the Werribee office, as there are more employees connecting in at the Werribee office

The management wants to make IT management simple since they don’t have a full-time IT support officer. Mr. Jones, the First Couriers Office Manager, has been designated as the customer contact for you do discuss specific requirements. Mr. Jones has also made it clear that the implementation budget for this new server is $10,000 (includes both hardware, software, and labour costs). Mr Jones will be the person who will arrange your access to the site, and the client person who will sign your work off once you have completed the installation of the server. You will need to confirm any out-of-hours access to the site you require with Mr. Jackson, the facilities manager, who is responsible for physical security for the site overall.

You have costed your labour costs at $2000, and your software licensing costs at $2000. That leaves $6,000) for server hardware. Preliminary analysis by your colleagues has identified the Dell Power Edge T440 Tower Server as a good fit for First Courier.

First Couriers also has 500 GB of data on their old Windows 2008 servers, and they want to make sure that they can migrate that data onto the new servers. They will keep the old Windows 2008 servers, but they want to make sure they will not lose any data in the migration exercise.

First Couriers has approached Perfect Technology to provide a solution to manage their IT needs easily.

You as an IT System Engineer must prepare a design report and submit it to First Couriers for their feedback. Once the client agreed to the design, you will have to install and setup the servers.

Assessment Resources ICTNWK505

First Couriers are very security conscious and want to know what security measures exist in the server to secure their environment.

First Couriers are also very safety conscious and want to make sure all work on their servers is done in a way that is consistent with all applicable workplace health and safety requirements. You should also explain how any risks encountered in implementing the server will be managed.

First Courier currently run a SQL Server 2012 application, and want to know whether this will run on the new server.

First Courier want to be able to monitor hardware resource usage by the server, and to be able to sop and start network services as needed. They are unsure as to whether they need a third party application for this and would like your advice.

In your design report, you must propose to implement a Windows domain network and run a local active directory server with DHCP, DNS, File Server and other services. You also need to provide details of server applications compatibility issues and resolution procedures.

                                                                                              callnow Button

Following tasks must be done to finish the design report

  1. Identify the client, and verify the requirements that the client has expressed in this case study
  2. Address the business problems, opportunities, scope, objectives and budget. (For this task, you should write down what you believe the key business problem to address is with the server installation, and also think how you would orally question/confirm this with Mr. Jones (as your trainer will question you about this in the classroom or labs).
  3. Specify the server specifications.
  4. Specify the required network services.
  5. List the server applications
  6. Identify and document server applications compatibility issues and resolution procedures
  7. List the security requirements, including authentication and authorization.
  8. Plan and explain redundancies.
  9. Produce the installation check list.
  10. Identify any required third-party applications that are required to meet the customer requirements
  11. Describe how the new server will be implemented, and whether any prototyping of the solution will be done. You should also produce a design of your server implementation, documenting which services will be installed on the server
  12. Analyse and describe data migration methods required for the client.
  13. Develop test plans to check system requirement
  14. Develop test plan to check the performance
  15. Describe how you will ensure the work is completed according to WHS requirements, including any risk management procedures needed
  16. Explain the work sign-off procedure to the customer, including any cleanup required of the worksite and handover procedures
  17. Describe a backup and restore strategy for the server
  18. Describe how you will liaise with the customer representative and other personnel to gain access to the site
  19. Describe how the server will be connected to the existing network

ASSESSOR CHECKLIST

This assessor checklist is to be used when assessing the students in the associated task. The checklist below must be completed for each student. Please refer to separate mapping document for specific details relating to alignment of this task to the unit requirements.

Student Name:

Assessor Name:

The student must satisfactorily complete Written Report to the standards outlined below.

ASSESSOR CHECKLIST S NS

Has the Student?

  1. Identified the client and verified the requirements
  2. Addressed the business problem.
  3. Specified the server specification.
  4. Specified the required services.
  5. Listed the server applications.
  6. Listed the security requirements
  7. Identified server applications compatibility issues and resolution procedures
  8. Documented server application compatibility issues and resolution procedures
  9. Planned and explained redundancies.
  10. Produced the installation check list.
  11. Identified any required third-party applications
  12. Created a prototype of the design and documented it

Assessment Resources ICTNWK505

13. Explained data migration methods to server from computers. r r
14. Developed test plans to check system requirement r r
15. Developed test plan to check the performance r r
16. Explained high availability options for servers r r
17. Notified the client in written about the server status r r
18. Documented the configuration details. r r
19. Prepared the site according to enterprise WHS processes and r r
procedures
20. Identified the safety and risk measures r r

Assessor Use Only

Assessor Comments

Satisfactory (S)

Assessor Signature: _______________________________

Not Satisfactory (NS)

Date: _____________

Assessment Resources ICTNWK505

ASSESSMENT 3 – LAB

Instructions to students:

Read through the scenario, complete the assigned tasks, and take screen prints as directed and attach to your assessment resources summary to prove you completed the labs as required.

General comments about labs

  • Always prepare a test plan to test your configurations
  • When working with electrical equipment, you should keep the WHS requirements in mind for real life installations. See Managing Electrical risks in the workplace (in Learner Resources)
  • Troubleshoot your configurations as required, using operating system help utilities, information sources (such as Google) and Learner resources as required.
  • Don’t forget to save your evidence into your workbook as we go

Requirements:

  1. You will install Windows 2012 in a virtual machine running on VM Workstation on one of the computers in the level 10 labs (rooms 4 and 5)
  2. Note that the install files for Windows 2012 Server are present in the c:\lab-files folder. You will also need to enter a 25 digit product key during the install process. The product key you need is: D2N9P-3P6X9-2R39C-7RTCD-MDVJX.
  3. You should install Windows 2012 Server with the GUI option, and you also should configure static IP parameters for the server.
  4. To secure your server, you should make a new Admin1 account, and set a secure password on the account.
  5. You should set your hostname/computer name to Snnnnn (where Snnnnn is your student id)
  6. You should set the IP address to 192.168.1.1, the subnet mask to 255.255.255.0, and the default gateway to 192.168.1.254. (you need the static address because you are going to install network services like DNS and DHCP in later labs)
  7. You also need to ensure your operating system code is secure and up to date. The easiest way to do this is go into Windows Update and set updates to automatic. This ensures critical security patches are automatically installed on your server, which would be appropriate given First Couriers want a low maintenance solution

Once you have completed the install and configured Windows Update as described above, take a screen shot of Windows Update on the server to show the updates being automatically applied and attach it to your assessment resources summary. The screen shot should look similar to that below.

Lab 2 Setting up DNS

Requirement. Your need to set up a DNS Server on the Windows 2012 Server instance you installed in Lab 1. You need to add DNS server as a feature in Server Manager, and then create a forward lookup zone called Snnnnn.com (where Snnnnn is your student id). You also need to create a single host record (A type) for the Windows 2012 server IP address (192.168.1.1) you set up in lab 1

Requirement. Your need to set up a DHCP Server on the Windows 2012 Server instance you installed in Lab 1.

You need to create a DHCP scope for the address range 192.168.1.100 – 192.168.1.120, and activate it for use.

Lab 4 Setting up SMTP Relay service

Requirement. Your need to set up an SMTP relay on the Windows 2012 Server instance you installed in Lab 1. The reason you are doing this is that the client wants emails forwarded for a particular domain to another mail server in their network.

You need to create an SMTP relay to forward SMTP email where the domain name is Snnnnn (where nnnnn is your student id)

Lab 5 Setting up FTP Server service

Requirement. Your need to set up an FTP site on the Windows 2012 Server instance you installed in Lab 1.

You need to install FTP Server and create a single FTP site called SnnnnnFTP (where nnnnn is your student id)

Once you have completed the lab as described above, take a screen shot of the site on the server to attach it to your assessment resources summary. The screen shot should look similar to that below. Note: your student id should show, not S12345

Lab 6 Configuring Windows Firewall

Requirement. Your need to add a rule to the Windows Firewall on the server you installed in Lab 1 to allow incoming traffic on port 1045. This is because the customer has advised you that an in-house application is using that port and needs to be enabled

Set up a new Windows Firewall rule called SnnnnnFirewallRule (where nnnnn is your student id) to allow incoming traffic on port 1045.

You need to install FTP Server and create a single FTP site called SnnnnnFTP (where nnnnn is your student id)

Once you have completed the lab as described above, take a screen shot of the firewall rule on the server to attach it to your assessment resources summary. The screen shot should look similar to that below. Note: your student id should show, not S12345

Lab 7 Troubleshoot a customer problem

Requirement. You have received notification from a colleague that he is unable to connect to the network because he is getting an error message that there is an IP conflict (duplicate address) with a printer in the customer’s network that has address 192.168.1.115. You need to make a configuration change to DHCP so that error no longer occurs, i.e. the address 192.168.1.115 is no longer given out by your DHCP server.

Make the change so that the DHCP server no longer gives out the IP address 192.168.1.115. You also have to complete a problem report form (see below) advising the customer that the problem as been resolved.

Once you have completed the lab as described above, take a screen shot of the configuration change on the server to attach it to your assessment resources summary. It should look similar to that below

You should also complete the form below, and paste into your workbook for evidence

Incident Report 23/January 30, 2018
number/date of incident
Reported Problem Duplicate IP address on network
Problem Contact Mr. Jones, Office Manager, F
Action taken to resolve (briefly describe the action you took to resolve the problem)
problem
Date of Action (put the date of your lab here)
Engineer Signature (Sign here)

Lab 8 Backup/Restore and Scheduling

Requirement. As part of your high availability strategy for the server, you are installing Windows Backup Server on the server. You are also setting up a scheduled task on the server to copy a folder C:\DATA to C:\BACKUP every night at 10PM

Install Windows Backup Server on the Windows 2012 Server you set up earlier. Use the task scheduler to create a task that copies the contents of C:\DATA to C:\BACKUP every night at 10PM (NB to test this, you will need to create the folders first)

Once you have installed Windows Backup Server on the server, take a screen shot of the configuration for evidence. It should look similar to that below.

Assessment Resources ICTNWK505

Once you have set up the scheduled task, take a screenshot for evidence. It should look similar to that below

Lab 9 – Performance Monitoring

Requirement. First Couriers have reported that the server is running slowly. You need to log into the server and set up a performance monitor on CPU usage, to see whether that could be the performance problem

Go into Performance Monitor on the server, and set up a real time counter to monitor CPU usage

Once you have installed the performance counter on the server, take a screen shot of the configuration for evidence. It should look similar to that below

ASSESSMENT 3 – LAB

ASSESSOR CHECKLIST

Lab 1 – Installing Windows 2012 Server

Lab 2 – Setting up DNS

Lab 3 -Setting up DHCP

Lab 4- Setting up SMTP Relay Service

Lab 5- Setting up FTP Server Service

Lab 6 – Configuring Windows Firewall

Lab 7 – Troubleshooting a customer problem

Lab 8 – Backup and Restore

Lab 9 – Performance Monitoring

This assessor checklist is to be used when assessing the students in the associated task. The checklist below must be completed for each student. Please refer to separate mapping document for specific details relating to alignment of this task to the unit requirements.

Student Name:

Assessor Name:

The student must satisfactorily complete Lab tasks to the standards outlined below.

ASSESSOR CHECKLIST S NS
Has the student?
1. Identified Customer requirements by consulting appropriate r r
person
2. Identified Business Problems, scope, opportunities and r r
objectives by consulting appropriate person
3. Documented the Server specification requirement. r r
4. Installed network operating system (i.e. Windows Server 2012) r r
5. Patched and updated the OS and applications r r
6. Configured IP addressing r r

Assessment Resources ICTNWK505

7.  Updated Windows Server 2012 r r
8.  Installed and configured DNS Server r r
9.  Installed and configured DHCP Server r r
10. Installed and configured FTP Server r r
11. Configured automatic update on server and applications r r
12. Configured mail server and web access mail. r r
13. Tested the server and record the result. r r
14. Identified the server problem and Troubleshoot using tools. r r
15. Analyzed the errors to make the changes r r
16. Performed the testing again. r r
17. Documented the configuration details. r r

Assessor Use Only

Satisfactory (S) Not Satisfactory (NS) Assessor Signature: _______________________________ Date: _____________

MN504 | Networked Application Management | Networking

Assignment Description

A report containing a complete discussion and analysis of the given topic in the required context needs to be submitted on Moodle. The report must have following parts:

Part 1: Blockchain

The students explore network application management of Blockchain by reviewing the literature on the internet as papers, book chapters, and independent scholarly reports by experts, and research based videos. Students participating in the PBL are taught how to do the critical thinking for review of literature. At least three articles related to technology supporting Blockchain need to be analysed in depth by discussing the overall contribution, scope and limitations of each research work. Following aspects related to Blockchain must be discussed:

Architecture Features

Challenges

Part 2: Applications of Blockchain

Students need to discuss at least one application in EACH of the following domains supported by

Blockchain:

Currency

Smart contracts

Part 3: Socio-Technical aspects

The move of traditional computing and storage to decentralised Blockchain has a social bearing on its users and how they perceive these new applications. The socio-technical aspects of the applications mentioned in part 2 need to be discussed in detail.

Turnitin Submission

All assignments should be submitted via Turnitin and the similarity reports should be looked at carefully before the due-date, as students should make sure that there is no plagiarism of any type.

FINC20018 | Managerial Finance – Principles and Applications | Finance

Section1: Overvie

What is a Group?

  • For campus students, the group means 1 or 2 students.
  • For distant learning (FLEX) students, while a group of 1 is likely to be more practical groups of 2 are optional.
  • Important Note 1: Students working as a group, only one member of the group will submit the assignment online by uploading it in Moodle.

The Task

There are 4 calculation-based questions and 2 theory questions assessing work covered in Weeks 1 to 5. All questions are from the prescribed textbook, Managerial Finance – Principles and Applications by Titman et al. (2016)

The Mark sheet

  • The Mark sheet of this assignment is not your coversheet. It merely shows you how the marks will be allocated. Your grader will provide your marks in a mark sheet when they provide feedback.

Marks are awarded for:

  • Answers to calculation questions that include well-presented tables, accurate calculations, worksheets and related formulae.
  • Answers to theory questions should be around 450 words FOR EACH THEORY QUESTION [excluding in-text referencing, reference list and appendix items] and show supporting examples, diagrams and figures.
  • Demonstrations of using your initiative and supporting your answers with interesting references to contemporary issues from newspapers, journals, professional publications, web resources i.e. extracts from podcasts, financial institutional websites etc.
  • Proper referencing of all content including figures, tables and narrative using APA Reference system.
  • Presentation must be 1.5 spacing, 14 pt Bold for Section Headings, 12 pt. for content and Arial, Times Roman or Calibri Font.

References

TITMAN, S., MARTIN, T., KEOWN, A. J. & MARTIN, J. D. 2016. Financial management: Principles and Applications, Melbourne, Pearson Australia.

Section 2: Submission Details

This online submission MUST BE submitted as a word document. PDF submissions will not be accepted.

Issues that will affect your marks include:

  1. Make sure you create your own cover sheet with the names of the students in the group clearly indicated. Please do not include the marking criteria or rubrics or marking sheet in your assessment. Your grader will include a separate feedback and marking sheet after they have graded your assessment in Moodle.
  2. Where copying from other sources results in high percentage similarity, marks will be deducted as shown on the mark-sheet. Therefore, proper use of in-text referencing is important. Avoid direct quotes.

Turnitin will be used to check percentage similarity.

Do not copy the questions from the textbook, as this will increase your percentage similarity.

Under extreme circumstances where high % similarity indicates copying from written works of other students in CQU, other universities or any other institutions world-wide, the assignment will be reviewed by the academic misconduct board. If percentage similarity exceeds 20%, marks will be deducted based on a progressive scale as determined by the course co-ordinator. 

  1. Marks for each question are noted in Section 3 and totals 100 marks.

The assessment is worth 20% total assessment grade.

The final grade with criteria/rubric and marking criteria will be recorded on Moodle as a percentage of 20%.

  1. Penalty for late submission is 5% per calendar day including Saturday and Sunday.

FINC20018 | Group Assignment | Finance

 

Part  is based on a case study and will assess your research, analytical and written skills as well as your understanding of share valuation techniques. The topic draws from material covered in Week 6 – Chapter 10 Share Valuations.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/FINC20018-Group-Assignment-Finance.pdf” width=”100%” height=”400″ ]

 

Presentation | Management

Academic research on consumer behaviour has been an important driving force behind business decisions in the real world. In this assessment task, you as a “consumer behaviour expert” will bring the latest consumer behaviour research into practice. First, please browse the following six research articles recently published in “Journal of Consumer Research.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/Presentation-Management.pdf” width=”100%” height=”400″ ]

 

ACC00716 | Business Case Studies 1 | Finance

This assignment has a 25% weighting in your overall mark for this unit and focuses on content from Topics 3, 4 and 5. It will be marked out of 25. Your total assignment submission will consist of a word document that should not exceed 1,000 words (excluding the reference list), plus a spreadsheet submission.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/ACC00716-Business-Case-Studies-1-Finance.pdf” width=”100%” height=”400″ ]

 

 

BULAW5915 | Corporate Law | Law

847207a7cccf6ffb933854f22d056749118f328732d4.png

To enable you to consider and research a topic of current interest of relevance to Australian corporate law.

The Assignment will be marked out of 100, adjusted to a final mark out of 30 in accordance with the weighting of this assignment to your final grade for the course: 30%.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/BULAW5915-Corporate-Law-Law.pdf” width=”100%” height=”400″ ]

 

 

COSC2473 | Introduction to Computer Systems and Platform Technologies | Database

Please answer the following questions, showing all your working out and intermediate steps.

  1. (6 marks) Convert the last four digits of your RMIT student number to binary. For example, if your student number is “s1234567”, then convert 456710 to binary, octal, and hexadecimal.
  2. (4 marks) Convert the last four digits of your RMIT student number to base 13, where 1010=A13, 1110=B13, 1210=C13.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/COSC2473-Introduction-to-Computer-Systems-and-Platform-Technologies-Database.pdf” width=”100%” height=”400″ ]

 

 

MN611 | UML Diagrams to Illustrate the System Architecture | UML

The student must design structural and behavioural UML diagrams for distributed system for an application such as multi-player game or a collaboration tool or a transaction system.

Structural UML diagram must be a class diagram while behavioural diagram can be an activity, sequence and use case diagram.  The user interfaces will have to consider interactions between multiple users.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/MN611-UML-Diagrams-to-Illustrate-the-System-Architecture-UML.pdf” width=”100%” height=”400″ ]

 

MN604 | Demonstration of Computer Security Tools | Information Security

For this assignment, you will identify security vulnerabilities/ weaknesses in an application(s) or service(s) by evaluating the applications or service or operating system with various penetration testing tools/ techniques on Virtual Box. Marks will be awarded based on the sophistication and the difficulties of the penetration testing techniques.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/MN604-Demonstration-of-Computer-Security-Tools-Information-Security.pdf” width=”100%” height=”400″ ]

 

 

Leadership | Management

The aim of this assessment is for you to critically analyze a leader you know well, identifying their leadership style, their strengths and development needs, the context in which they lead and suggestions on how they might improve their leadership practice. There are two parts to this assessment.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/Leadership-Management.pdf” width=”100%” height=”400″ ]

 

 

CN7026 | Cloud | Cloud Computing |

This assessment should be attempted in groups of 3-4 students to design and implement a system for a backup and restore system for a cloud-based database system. There are two parts to this assignment, a group report and an individual self-reflection report. For more information, please see below.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/CN7026-Cloud-Cloud-Computing.pdf” width=”100%” height=”400″ ]

 

 

Linear Project | Information Technology

A section of a new High Speed Railway (HSR) route will cross a large estuary on a twin track viaduct.  The total length of the viaducts required to achieve this together with the approach sections on land are as follows.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/Linear-Project-Information-Technology.pdf” width=”100%” height=”400″ ]

 

 

TECH 1130 | Draft Technical Report/Technical Report | Mech

TECH 1130 has provided you with the skills and strategies that technicians use to produce strong, technical writing. Your understanding of the pyramid technique, the report format, information and design techniques, paragraph and sentence structure

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/TECH-1130-Draft-Technical-Report-Technical-Report-Mech.pdf” width=”100%” height=”400″ ]

 

MGMT6003 | Operations Management | Management

  • Understand and apply research principles and methods applicable to MBA;
  • Apply operations management knowledge to practise;
  • Utilise creativity and initiative in the assessment;
  • Utilise effective communication.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/MGMT6003-Operations-Management-Management.pdf” width=”100%” height=”400″ ]

 

 

SBM1203 | Project Economics and Finance | Economics

This unit of study will equip students with insights and tools for financial appraisal and decision optimisation. It aims at imparting the basic knowledge and competencies required in project appraisal and financial management, applicable to all sectors of industry and business including services, business investment, R&D, capital projects and projects in local, state and national government departments and agencies.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/SBM1203-Project-Economics-and-Finance-Economics.pdf” width=”100%” height=”400″ ]

 

HI6026 | Audit, Assurance and Compliance | Audit

Research Assessment:

Download a company annual report which is listed in ASX and must be present in ASX S&P 300 index, along with this annual report, student should download corporate statement of same company.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/HI6026-Audit-Assurance-and-Compliance-Audit.pdf” width=”100%” height=”400″ ]

 

 

SIT719 | Security and Privacy Issues in Analytics | Information Technology

You need to write up to a 2,500 – 3000-word technology assessment report. Your report must include an implementation guide, or develop a software package to implement a privacy protocol.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/SIT719-Security-and-Privacy-Issues-in-Analytics-Information-Technology.pdf” width=”100%” height=”400″ ]

 

 

Marine Economics for Managers | Economics

Answer the following short-answer questions. There is no need to have an abstract, introduction and conclusion for this assignment. Your answers should be based on relevant maritime economic concepts, theories and principles covered in Modules 1-5 with a focus on Modules.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/Marine-Economics-for-Managers-Economics.pdf” width=”100%” height=”400″ ]

 

 

CSG 5308 | Wireless Security | Information security

Wireshark is a network sniffer and analyser tool which can be used by IT administrators, developers, hackers, incident response or security researchers to capture and analyse wired or wireless traffic. This allows you to “see” all traffic that is sent and received when computers interact with one another. A few examples of this include downloading a file from the Internet.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/CSG-5308-Wireless-Security-Information-security.pdf” width=”100%” height=”400″ ]

 

Quantitative Methods for Data Analytics and Business Intelligence | Research

The terms Analytics, Advanced Analytics, Data Mining, Machine Learning are at times all jumbled together to be synonymous. Some might even lump it all together as ‘statistics’. Find and cite at least 3 reputable sources in which these distinctions are discussed. Reputable sources are trade journals and publications, and research journals from well-known publishers such as the IEEE and ACM. Write.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/Quantitative-Methods-for-Data-Analytics-and-Business-Intelligence-Research.pdf” width=”100%” height=”400″ ]

 

MMK737 | Applied marketing communication and evaluation and recommendation report for Rhapsody Rooms | Marketing

The purpose of Part A is to give you guidance very quickly in the semester on your approach to completing the assignment. You will get feedback on your approach to addressing the assignment and a sample of your proposed answer. You will then have time to modify Part B which is 4000 words and the major part of the assignment.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/MMK737-Applied-marketing-communication-and-evaluation-and-recommendation-report-for-Rhapsody-Rooms.pdf” width=”100%” height=”400″ ]