Tag: it assignment help

ITC505 | Assessment 3 Charter | IT

Part One:
MOV – Measurable Organisational Value
(This is the goal of the project and is utilised to define the value that your team project will bring to your client)
•Identify the desired area of impact – Rank the following areas in terms of importance: Strategy / Customer / Financial / Operational / Social
•With reference to your project, identify one or two of the following types of value:

  • Better – is improving quality important to your client?
  • Faster – does your client want to increase efficiency?
  • Cheaper – is cutting costs important?
  • Do more – does your client want to continue its growth?
  • Develop an appropriate metric – this sets the target and expectation of all the stakeholders. It is important to determine a quantitative target that needs to be expressed as a metric in terms of an increase or decrease of money.
    •Determine the timeframe for achieving the MOV – ask yourselves, when do we want to achieve this target metric?

Part Two:
Define Scope and produce a Scope Management Plan
Define the scope of the project and detail how the scope will be managed.
Provide a list of Resources
Identify and detail the resources for the project using MS Project where appropriate, including:

  • People (and their roles), plus any extra personnel that is required for the project.
  • Technology – any hardware, network and software needs to support the team and your client.
  • Facilities – where will most of the teamwork be situated?
  • Other – for example, travel, training etc.

Part Three: 

Using MS Project, develop a schedule using a high level Work Breakdown Structure (WBS). It should include:

  • Milestones for each phase and deliverable
    • This will tell everyone associated with the project that the phase or deliverable was completed satisfactorily.
  • Activities / Tasks
    • Define a set of activities / tasks that must be completed to produce each deliverable.
  • Resource Assignments
    • Assign people and resources to each individual activities.
  • Estimates for Each Activity / Task
    • Develop a time estimate for each task or activity to be completed.
  • Project Budget
    • Develop a budget using the time and resources estimated for each task or activity

Part Four: 

Project Risk Analysis and Plan

  • Document any assumptions you have made about the project
  • Using the Risk Identification Framework outlined in your text as a basis, identify five risks to the project – one for each of the five phases of the methodology.
  • Analyse these risks, assign a risk to an appropriate member, and describe a strategy for the management of each specific risk.

Part Five: 

Quality Management Plan. It should include:

  • A short statement that reflects your team’s philosophy or objective for ensuring that you deliver a quality system to your client.
  • Develop and describe the following that your project team could implement to ensure quality;
    • A set of verification activities
    • A set of validation activities

Part Six:
Closure and Evaluation

Researching for the closure checklist and project evaluation

  1. To prepare for this task, you will be required to provide an annotated bibliography. (550 words)

Write an Annotated Bibliography for three (3) relevant texts or readings around project evaluation. The Annotated Bibliography is a critical examination of the most relevant, recent and scholarly research on the topic area that is not just a summary of the articles you have read.

You will submit this as an appendix to your project evaluation documentation.

Ensure that the AB submitted by you is your own work and has not been submitted elsewhere and comply with the University’s requirements for academic integrity.

Use the following resource to guide you around the research tools:

b. Develop a closure checklist that the project team will use to ensure that the project has been closed properly.
c. Develop a project evaluation –outline and discuss how your project’s MOV will be evaluated.

UNIX | Information Technology

Submit your responses to the following questions in APA6 report format. Please keep in mind the point weight for the questions – one-line, short paragraph and non-relevant answers will not get ANY points.

1)    Access Control [20 points – 5 points each]

a)     Describe what an access control list is.

b)    Explain how UNIX permissions can be regarded as access control lists.

c)     Describe capability-based access control.

d)    Contrast access control lists and capability-based access control.

2)    Cloud security [20 points] Describe the mechanisms and protocols used by the Trusted Third Party method of cloud security to provide confidentiality, integrity, and authenticity.

3)    IS Management [20 points] Describe the conclusions reached by Soomro, et al with respect to information security management. What relationship should the technical, management, and human dimensions have?  Whose responsibility is information security in an organization?

4)    Design Principles [40 points à 5 points each] – In their seminal 1975 paper, Saltzer and Schroeder articulated eight principles for “The Protection of Information in Computer Systems”. These principles are:

A.    Least Privilege

B.    Fail-safe Defaults

C.    Economy of Mechanism

D.    Complete Mediation

E.    Open Design  

F.     Separation of Privilege

G.    Least Common Mechanism

H.    Psychological Acceptability

Give a short description of each of the principles.  the statements in the paper – there need to be explanations in your own words, with examples provided to demonstrate your understanding.

ME504 | Advanced Networking | Information Technology

Assignment Description


There are two parts to this assignment, i.e. part A and part B.

  1. Investigate, design and develop a suitable network for an SME by addressing the following criteria. See detailed instruction in the next section.                  80 marks
  2. Presentation                                                                                                            20 marks

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/ME504-Advanced-Networking-Information-Technology.pdf” width=”100%” height=”400″ ]


ICTNWK505 | Design, Build and Test a Network Server | Information technology

Student Instructions:

  • Your answers should be on a separate document using word processing software such as MS Word & or other software (hand written submissions are only acceptable with prior approval from your Trainer)
  • Your document should be professionally formatted and include
  • Your Name
  • Your Student ID o Unit Code

Assessment Number (i.e. ICTNWK505 Assessment 1)

  • Please reference to each question number and retype each question with your answers
  • This is an open book assessment, you must answer every question and provide enough information to demonstrate sufficient understanding of what has been asked to achieve Please ask your Trainer/Assessor if you are unsure what is sufficient detail for an answer
  • Ask your trainer/assessor if you do not understand a question. Whist your trainer/assessor cannot tell you the answer, he/she may be able to re-word the question for you or provide further assistance based on the Institute’s “Reasonable Adjustment Policy”
  • Answers should be your own work, in your own words and not 4lagiarized, nor copied. However, if an answer is cut & pasted (such as a definition), then the source should be referenced

Assessment Resources ICTNWK505

  1. What are the Network operating systems available currently? Describe three key features of two network operating systems (NOS) in your own words. (Not more than 200 words)
  2. List resources or tools that can help you determine whether (i) whether particular hardware is compatible with Windows Server 2012; and (ii) whether an application will run on Windows Server 2012.
  3. Briefly discuss the roles of the following services in a computer network (Not more than 50 words for each item):
  • Domain name system (DNS) –
  • Dynamic host configuration protocol (DHCP)
  • File transfer protocol (FTP)
  • Mail
  • Network time protocol (NTP)
  • Proxy
  • Server messages block (SMB)
  • Web
  1. Describe the commands you would use to perform the following network service management configuration tasks: (not more than 50 words for each item)
  • Start – how to start a service under Windows Server
  • Stop – how to stop a service under Windows Server
  • Restart – how to restart a service under Windows Server
  • Start on boot – how to configure a network service to start on boot
  1. What are two security features of server firewall configuration? Describe in your own words. (Not more than 100 words for each item).
  2. What are two tools and techniques used in troubleshooting? Describe network diagnostic utilities briefly in your own words. (Not more than 100 words for each item).
  3. Describe the common operating system installation and operation issues of the following as they apply to Windows Server installations: (Not more than 50 words for each item).
  • Installation media – list three different installation media/types supported by Windows 2012
  • Boot process and diagnosing boot failures – give an example of the type of error I could encounter when booting a server
  • Operating system rescue environment – describe how I could recover from a boot error on Windows
  • Operating system help and support utilities – list two utilities that could help me troubleshoot Windows problems
  • Performance monitoring tools and tuning options – list one utility I can use to monitor hardware performance under Windows
  • High availability options for servers – list two features that I could deploy to increase my server availability

Assessment Resources ICTNWK505

  • File and print management – list the name of the protocol that I use to share file and printers in a Windows server environment
  1. Describe the following data security and storage measures required on a networked server (Not more than 50 words for each item):
  • User authentication and directory services – name the feature that provides these capabilities under Windows 2012 server
  • Best practice procedures for implementing backup and recovery – list two best practices that I should apply when implementing a backup and recovery solution
  • Error and event logging and reporting. List three types of logs I can consult on a Windows 2012 Server
  • Storage options, including file systems and disk partitioning schemes – list two file systems supported by Windows, and list the name of the utility I can use to repartition disks
  1. Describe the following process of managing a project (Not more than 100 words for each item):
  • Documentation skills required for networks – list two items that I should include in the documentation of a network
  • Process or task management – List the name of the utility under Windows that allows me to view running tasks and processes
  • Task scheduling utilities – list the name of the utility I can use to set up scheduled tasks in Windows

Assessor Use Only

Satisfactory (S) Not Satisfactory (NS) Assessor Signature: _______________________________ Date: _____________

Assessment Resources ICTNWK505

Assessment 2: Case Study

Instructions to Students

This assessment task can be undertaken in groups of up to three students per group. You need to list your group members in the introduction to the report. You should use the provided report template to help you structure the report (see Learner Resources for the subject). Each student needs to attach a copy of the group report to their assessment summary when they hand in their tasks


You are working as an IT System & Network Engineer at Perfect Technology. You have been given a project to design a server to a new customer called First Couriers Pty Ltd.

First Couriers Pty Ltd is a courier service agency. Currently First Couriers has got 2 Windows 2008 workgroup servers (one in each office) and two network printers. Management is planning to open two new branches in Werribee & Thomastown and planning to have 5 more computers and a Printer each.

Each of the Werribee and Thomastown sites will have a network switch to provide interconnection to all the devices within each office, and a WAN link of 1 Gbps will be used to link the two sites together. You have been told that there are ports available on both switches to connect a server if required. Spare network cables are also available, so these do not need to be purchased. You have also been told that the new server should be located in the Werribee office, as there are more employees connecting in at the Werribee office

The management wants to make IT management simple since they don’t have a full-time IT support officer. Mr. Jones, the First Couriers Office Manager, has been designated as the customer contact for you do discuss specific requirements. Mr. Jones has also made it clear that the implementation budget for this new server is $10,000 (includes both hardware, software, and labour costs). Mr Jones will be the person who will arrange your access to the site, and the client person who will sign your work off once you have completed the installation of the server. You will need to confirm any out-of-hours access to the site you require with Mr. Jackson, the facilities manager, who is responsible for physical security for the site overall.

You have costed your labour costs at $2000, and your software licensing costs at $2000. That leaves $6,000) for server hardware. Preliminary analysis by your colleagues has identified the Dell Power Edge T440 Tower Server as a good fit for First Courier.

First Couriers also has 500 GB of data on their old Windows 2008 servers, and they want to make sure that they can migrate that data onto the new servers. They will keep the old Windows 2008 servers, but they want to make sure they will not lose any data in the migration exercise.

First Couriers has approached Perfect Technology to provide a solution to manage their IT needs easily.

You as an IT System Engineer must prepare a design report and submit it to First Couriers for their feedback. Once the client agreed to the design, you will have to install and setup the servers.

Assessment Resources ICTNWK505

First Couriers are very security conscious and want to know what security measures exist in the server to secure their environment.

First Couriers are also very safety conscious and want to make sure all work on their servers is done in a way that is consistent with all applicable workplace health and safety requirements. You should also explain how any risks encountered in implementing the server will be managed.

First Courier currently run a SQL Server 2012 application, and want to know whether this will run on the new server.

First Courier want to be able to monitor hardware resource usage by the server, and to be able to sop and start network services as needed. They are unsure as to whether they need a third party application for this and would like your advice.

In your design report, you must propose to implement a Windows domain network and run a local active directory server with DHCP, DNS, File Server and other services. You also need to provide details of server applications compatibility issues and resolution procedures.

                                                                                              callnow Button

Following tasks must be done to finish the design report

  1. Identify the client, and verify the requirements that the client has expressed in this case study
  2. Address the business problems, opportunities, scope, objectives and budget. (For this task, you should write down what you believe the key business problem to address is with the server installation, and also think how you would orally question/confirm this with Mr. Jones (as your trainer will question you about this in the classroom or labs).
  3. Specify the server specifications.
  4. Specify the required network services.
  5. List the server applications
  6. Identify and document server applications compatibility issues and resolution procedures
  7. List the security requirements, including authentication and authorization.
  8. Plan and explain redundancies.
  9. Produce the installation check list.
  10. Identify any required third-party applications that are required to meet the customer requirements
  11. Describe how the new server will be implemented, and whether any prototyping of the solution will be done. You should also produce a design of your server implementation, documenting which services will be installed on the server
  12. Analyse and describe data migration methods required for the client.
  13. Develop test plans to check system requirement
  14. Develop test plan to check the performance
  15. Describe how you will ensure the work is completed according to WHS requirements, including any risk management procedures needed
  16. Explain the work sign-off procedure to the customer, including any cleanup required of the worksite and handover procedures
  17. Describe a backup and restore strategy for the server
  18. Describe how you will liaise with the customer representative and other personnel to gain access to the site
  19. Describe how the server will be connected to the existing network


This assessor checklist is to be used when assessing the students in the associated task. The checklist below must be completed for each student. Please refer to separate mapping document for specific details relating to alignment of this task to the unit requirements.

Student Name:

Assessor Name:

The student must satisfactorily complete Written Report to the standards outlined below.


Has the Student?

  1. Identified the client and verified the requirements
  2. Addressed the business problem.
  3. Specified the server specification.
  4. Specified the required services.
  5. Listed the server applications.
  6. Listed the security requirements
  7. Identified server applications compatibility issues and resolution procedures
  8. Documented server application compatibility issues and resolution procedures
  9. Planned and explained redundancies.
  10. Produced the installation check list.
  11. Identified any required third-party applications
  12. Created a prototype of the design and documented it

Assessment Resources ICTNWK505

13. Explained data migration methods to server from computers. r r
14. Developed test plans to check system requirement r r
15. Developed test plan to check the performance r r
16. Explained high availability options for servers r r
17. Notified the client in written about the server status r r
18. Documented the configuration details. r r
19. Prepared the site according to enterprise WHS processes and r r
20. Identified the safety and risk measures r r

Assessor Use Only

Assessor Comments

Satisfactory (S)

Assessor Signature: _______________________________

Not Satisfactory (NS)

Date: _____________

Assessment Resources ICTNWK505


Instructions to students:

Read through the scenario, complete the assigned tasks, and take screen prints as directed and attach to your assessment resources summary to prove you completed the labs as required.

General comments about labs

  • Always prepare a test plan to test your configurations
  • When working with electrical equipment, you should keep the WHS requirements in mind for real life installations. See Managing Electrical risks in the workplace (in Learner Resources)
  • Troubleshoot your configurations as required, using operating system help utilities, information sources (such as Google) and Learner resources as required.
  • Don’t forget to save your evidence into your workbook as we go


  1. You will install Windows 2012 in a virtual machine running on VM Workstation on one of the computers in the level 10 labs (rooms 4 and 5)
  2. Note that the install files for Windows 2012 Server are present in the c:\lab-files folder. You will also need to enter a 25 digit product key during the install process. The product key you need is: D2N9P-3P6X9-2R39C-7RTCD-MDVJX.
  3. You should install Windows 2012 Server with the GUI option, and you also should configure static IP parameters for the server.
  4. To secure your server, you should make a new Admin1 account, and set a secure password on the account.
  5. You should set your hostname/computer name to Snnnnn (where Snnnnn is your student id)
  6. You should set the IP address to, the subnet mask to, and the default gateway to (you need the static address because you are going to install network services like DNS and DHCP in later labs)
  7. You also need to ensure your operating system code is secure and up to date. The easiest way to do this is go into Windows Update and set updates to automatic. This ensures critical security patches are automatically installed on your server, which would be appropriate given First Couriers want a low maintenance solution

Once you have completed the install and configured Windows Update as described above, take a screen shot of Windows Update on the server to show the updates being automatically applied and attach it to your assessment resources summary. The screen shot should look similar to that below.

Lab 2 Setting up DNS

Requirement. Your need to set up a DNS Server on the Windows 2012 Server instance you installed in Lab 1. You need to add DNS server as a feature in Server Manager, and then create a forward lookup zone called Snnnnn.com (where Snnnnn is your student id). You also need to create a single host record (A type) for the Windows 2012 server IP address ( you set up in lab 1

Requirement. Your need to set up a DHCP Server on the Windows 2012 Server instance you installed in Lab 1.

You need to create a DHCP scope for the address range –, and activate it for use.

Lab 4 Setting up SMTP Relay service

Requirement. Your need to set up an SMTP relay on the Windows 2012 Server instance you installed in Lab 1. The reason you are doing this is that the client wants emails forwarded for a particular domain to another mail server in their network.

You need to create an SMTP relay to forward SMTP email where the domain name is Snnnnn (where nnnnn is your student id)

Lab 5 Setting up FTP Server service

Requirement. Your need to set up an FTP site on the Windows 2012 Server instance you installed in Lab 1.

You need to install FTP Server and create a single FTP site called SnnnnnFTP (where nnnnn is your student id)

Once you have completed the lab as described above, take a screen shot of the site on the server to attach it to your assessment resources summary. The screen shot should look similar to that below. Note: your student id should show, not S12345

Lab 6 Configuring Windows Firewall

Requirement. Your need to add a rule to the Windows Firewall on the server you installed in Lab 1 to allow incoming traffic on port 1045. This is because the customer has advised you that an in-house application is using that port and needs to be enabled

Set up a new Windows Firewall rule called SnnnnnFirewallRule (where nnnnn is your student id) to allow incoming traffic on port 1045.

You need to install FTP Server and create a single FTP site called SnnnnnFTP (where nnnnn is your student id)

Once you have completed the lab as described above, take a screen shot of the firewall rule on the server to attach it to your assessment resources summary. The screen shot should look similar to that below. Note: your student id should show, not S12345

Lab 7 Troubleshoot a customer problem

Requirement. You have received notification from a colleague that he is unable to connect to the network because he is getting an error message that there is an IP conflict (duplicate address) with a printer in the customer’s network that has address You need to make a configuration change to DHCP so that error no longer occurs, i.e. the address is no longer given out by your DHCP server.

Make the change so that the DHCP server no longer gives out the IP address You also have to complete a problem report form (see below) advising the customer that the problem as been resolved.

Once you have completed the lab as described above, take a screen shot of the configuration change on the server to attach it to your assessment resources summary. It should look similar to that below

You should also complete the form below, and paste into your workbook for evidence

Incident Report 23/January 30, 2018
number/date of incident
Reported Problem Duplicate IP address on network
Problem Contact Mr. Jones, Office Manager, F
Action taken to resolve (briefly describe the action you took to resolve the problem)
Date of Action (put the date of your lab here)
Engineer Signature (Sign here)

Lab 8 Backup/Restore and Scheduling

Requirement. As part of your high availability strategy for the server, you are installing Windows Backup Server on the server. You are also setting up a scheduled task on the server to copy a folder C:\DATA to C:\BACKUP every night at 10PM

Install Windows Backup Server on the Windows 2012 Server you set up earlier. Use the task scheduler to create a task that copies the contents of C:\DATA to C:\BACKUP every night at 10PM (NB to test this, you will need to create the folders first)

Once you have installed Windows Backup Server on the server, take a screen shot of the configuration for evidence. It should look similar to that below.

Assessment Resources ICTNWK505

Once you have set up the scheduled task, take a screenshot for evidence. It should look similar to that below

Lab 9 – Performance Monitoring

Requirement. First Couriers have reported that the server is running slowly. You need to log into the server and set up a performance monitor on CPU usage, to see whether that could be the performance problem

Go into Performance Monitor on the server, and set up a real time counter to monitor CPU usage

Once you have installed the performance counter on the server, take a screen shot of the configuration for evidence. It should look similar to that below



Lab 1 – Installing Windows 2012 Server

Lab 2 – Setting up DNS

Lab 3 -Setting up DHCP

Lab 4- Setting up SMTP Relay Service

Lab 5- Setting up FTP Server Service

Lab 6 – Configuring Windows Firewall

Lab 7 – Troubleshooting a customer problem

Lab 8 – Backup and Restore

Lab 9 – Performance Monitoring

This assessor checklist is to be used when assessing the students in the associated task. The checklist below must be completed for each student. Please refer to separate mapping document for specific details relating to alignment of this task to the unit requirements.

Student Name:

Assessor Name:

The student must satisfactorily complete Lab tasks to the standards outlined below.

Has the student?
1. Identified Customer requirements by consulting appropriate r r
2. Identified Business Problems, scope, opportunities and r r
objectives by consulting appropriate person
3. Documented the Server specification requirement. r r
4. Installed network operating system (i.e. Windows Server 2012) r r
5. Patched and updated the OS and applications r r
6. Configured IP addressing r r

Assessment Resources ICTNWK505

7.  Updated Windows Server 2012 r r
8.  Installed and configured DNS Server r r
9.  Installed and configured DHCP Server r r
10. Installed and configured FTP Server r r
11. Configured automatic update on server and applications r r
12. Configured mail server and web access mail. r r
13. Tested the server and record the result. r r
14. Identified the server problem and Troubleshoot using tools. r r
15. Analyzed the errors to make the changes r r
16. Performed the testing again. r r
17. Documented the configuration details. r r

Assessor Use Only

Satisfactory (S) Not Satisfactory (NS) Assessor Signature: _______________________________ Date: _____________

COIS13013 | VISUAL DSS | Information Technology

This assessment item relates to course learning outcomes numbers 1, 2 and 6 as stated on the course profile. This part emphasizes on the use of a DDS tool, and students are required to demonstrate proficiency with Visual DSS™ (a DSS development language/DSS generator).

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/COIS13013-VISUAL-DSS-Information-Technology.pdf” width=”100%” height=”400″ ]




MN611 | UML Diagrams to Illustrate the System Architecture | UML

The student must design structural and behavioural UML diagrams for distributed system for an application such as multi-player game or a collaboration tool or a transaction system.

Structural UML diagram must be a class diagram while behavioural diagram can be an activity, sequence and use case diagram.  The user interfaces will have to consider interactions between multiple users.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/MN611-UML-Diagrams-to-Illustrate-the-System-Architecture-UML.pdf” width=”100%” height=”400″ ]


Linear Project | Information Technology

A section of a new High Speed Railway (HSR) route will cross a large estuary on a twin track viaduct.  The total length of the viaducts required to achieve this together with the approach sections on land are as follows.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/Linear-Project-Information-Technology.pdf” width=”100%” height=”400″ ]



TECH 1130 | Draft Technical Report/Technical Report | Mech

TECH 1130 has provided you with the skills and strategies that technicians use to produce strong, technical writing. Your understanding of the pyramid technique, the report format, information and design techniques, paragraph and sentence structure

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/TECH-1130-Draft-Technical-Report-Technical-Report-Mech.pdf” width=”100%” height=”400″ ]


SIT719 | Security and Privacy Issues in Analytics | Information Technology

You need to write up to a 2,500 – 3000-word technology assessment report. Your report must include an implementation guide, or develop a software package to implement a privacy protocol.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/SIT719-Security-and-Privacy-Issues-in-Analytics-Information-Technology.pdf” width=”100%” height=”400″ ]



CSG 5308 | Wireless Security | Information security

Wireshark is a network sniffer and analyser tool which can be used by IT administrators, developers, hackers, incident response or security researchers to capture and analyse wired or wireless traffic. This allows you to “see” all traffic that is sent and received when computers interact with one another. A few examples of this include downloading a file from the Internet.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/CSG-5308-Wireless-Security-Information-security.pdf” width=”100%” height=”400″ ]


SEE705 | Energy Efficiency & Demand Management | Information Technology

Suppose, you have been asked to calculate the energy consumption pattern at your house. You have the facilities to consume energy both from gas and electricity.

You usually use electricity to run the appliances and lighting loads along with split air-conditioning system. The following electricity consumption data are available for your house.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/SEE705-Energy-Efficiency-Demand-Management-Information-Technology.pdf” width=”100%” height=”400″ ]




Parallel System | Information Technology

Consider the system shown in Figure 1, which is a model of an active redundant generator at a main exchange of Telecommunication Company.


 Figure 1: Active redundant generator pair

Assume that the reliability of each subsystem (or component) i has the reliability.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/Parallel-System-Information-Technology.pdf” width=”100%” height=”400″ ]


ITAP1004 | Website Development | Information technology

You are to develop from the beginning a web site about yourself with regard to accommodation. This web site provides certain required details about your experience in accommodation in which you have stayed. You will design and develop your web site with Notepad/Notepad++, HTML, Java Script and CSS.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/ITAP1004-Website-Development-Information-technology.pdf” width=”100%” height=”400″ ]



Usability Engineering | Information technology

Important Instructions

You must work in groups. The recommended (and minimum) group size is 3 and the maximum is 4. Only one submission should be made per group. Make sure that every group member’s name is on the submission.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/Usability-Engineering-Information-technology.pdf” width=”100%” height=”400″ ]



COIT20267 | Computer Forensics | Information Technology

This assignment is designed to encourage the development of ability to apply a systematic approach in a digital investigation through the conduct of computer forensics procedures and the use of computer forensics tools, and to encourage the ability to identify the legal issues involved in a computer forensic investigation across jurisdictions. Please refer to the unit profile to see how this assessment item relates to the unit learning outcomes.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/COIT20267-Computer-Forensics-Information-Technology.pdf” width=”100%” height=”400″ ]


Abstracts | Information Technology

Write four (4) abstracts: each abstract should be 300 words . the four (4) nominated readings in the Reading Material and Exercises book (RME). The nominated readings for the current study session are listed below. 1. Under each of the four (4) abstracts, write a 150 word example of how each reading relates to your work experience, or how they could relate to an imaginary work situation.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/ABSTRACTS-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]


COSC1182/83 | Usability Engineering | Information Technology

Age range and source of participants

Indicate the age range of people you plan to approach. How do you intend to approach people to be involved in the test? (ie. how do you know them?) (up to 50 words)

Write your answer here… [delete this line before submitting]

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/COSC1182-83-USABILITY-ENGINEERING-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]


ACC0071 | Business Case Studies 1 | Finance

This assignment has a 25% weighting in your overall mark for this unit and focuses on content from Topics 3, 4 and 5. It will be marked out of 25. Your total assignment submission will consist of a word document that should not exceed 1,000 words (excluding the reference list), plus a spreadsheet submission.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/ACC0071-BUSINESS-CASE-STUDIES-1-FINANCE.pdf” width=”100%” height=”400″ ]



COIT20247 | Database Design and Development assignment 2 | Database

Map the ERD, from the sample solution, into a set of relations in at least Third Normal Form (3NF). You must ensure that your relations meet 3NF. There is no need to show your Select any two (2) of your relations from the previous step, 1a).

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/COIT20247-DATABASE-DESIGN-AND-DEVELOPMENT-ASSIGNMENT-2-DATABASE.pdf” width=”100%” height=”400″ ]


COIT 20246 | ICT service management | Information Technology


It will be necessary to use literature/online resources to complete this assignment, please ensure you cite and reference any such materials using the Harvard format.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/COIT-20246-ICT-SERVICE-MANAGEMENT-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]


INFS 5095 | Technology Review for Managing Big Data from IoT | IT

About this Assignment

This assignment is giving you practice in matching business needs to data-technology solutions and being able to communicate that. You could imagine you are a big data consultant who has been asked to give a presentation to a group of organisations who are considering whether to invest in big data. Assume that the audience know little about IoT (Internet of Things) or big data.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/INFS-5095-TECHNOLOGY-REVIEW-FOR-MANAGING-BIG-DATA-FROM-IOT-IT.pdf” width=”100%” height=”400″ ]


ITECH1103 | Big Data and Analytics Group Assignment | Information Technology

Task 1- Background information

Write a description of the selected dataset and its importance given the Solar Cities project, i.e. the Solar Cities project is attempting to understand power usage in dwellings, in order to then recommend how to improve the overall efficiency of power consumption in dwellings. Information must be appropriately referenced. [1 Page]

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/ITECH1103-BIG-DATA-AND-ANALYTICS-GROUP-ASSIGNMENT-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]


ITC 542 | Security fundamentals | Information Technology

This assessment aims to develop and gauge student understanding of the key topics covered so far by answering the following questions. Answering these questions will help you build some understanding for the next assessment item as well as for the entire subject. It is expected that answers to the assignment questions be succinct (i.e. precise and concise) with all sources of information fully referenced as per APA referencing style.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/ITC-542-SECURITY-FUNDAMENTALS-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]


Introduction to Weka & Data Preprocessing | Information Technology


The WEKA GUI Chooser window is used to launch WEKA’s graphical environments. WEKA Explorer is an environment for exploring data with WEKA. In this lab, we will be focusing on creating an ARFF file and reading it into WEKA, and using the WEKA Explorer.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/INTRODUCTION-TO-WEKA-DATA-PREPROCESSING-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]


ITECH1100 | Page Life | Information technology

Assignment 1 – Page Life


For this individual assignment, you will use skills acquired through practical laboratory exercises to automate a business process, and to visualize the impact of the automation.

You should use Microsoft Excel (or equivalent open-source software) for this assessment task.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/ITECH1100-PAGE-LIFE-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]

ITC161 | Computer Organisation And Architecture | Digital Logic


ITC 161 Assignment 1: Computers & Data & Digital Logic (Value: 15%) Submission Method: TURNITIN

Submission Due: 08/04/2018 11:59 pm AEST

Please answer all of the following questions.

  1. Describe Moore’s law. Discuss its implications and limitations with respect to the current trend in computing. [4 marks]
  2. Convert the followings: [6 marks]

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/ITC161-COMPUTER-ORGANISATION-AND-ARCHITECTURE-DIGITAL-LOGIC.pdf” width=”100%” height=”400″ ]

Forum Participation | Information technology


For most topics in this subject you will find an associated “Topic Activity” task. You are encouraged to post a response to each of these questions. You are also encouraged tc make additional posts in response to other students’ postings or to raise issues and to stimulate dialogue.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/FORUM-PARTICIPATION-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]

SIT719 | Security and privacy issues in analytics | Information security

Assessment Information

These could relate to the government department you have selected and their possible usage of data and analytics systems. You will also need to recognise and apply the relevant ethical, regulatory and governance constraints on the department when dealing with data and analytics and then describe your findings.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/SIT719-SECURITY-AND-PRIVACY-ISSUES-IN-ANALYTICS-INFORMATION-SECURITY.pdf” width=”100%” height=”400″ ]

Research Report on Music | Information Systems


Your introduction should tell us what the report is about and why it was written.

It may also contain:

  • clarification of your chosen industry: for example, if you chose “Identity & access management to maintain integrity of tunes”, which ones/types did you focus on?

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/RESEARCH-REPORT-ON-MUSIC-INFORMATION-SYSTEMS.pdf” width=”100%” height=”400″ ]

Research Report on Film | Information Systems


Your introduction should tell us what the report is about and why it was written.

It may also contain:

  • clarification of your chosen industry: for example, if you chose “Security and risk management of films”, which ones/types did you focus on?

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/RESEARCH-REPORT-ON-FILM-INFORMATION-SYSTEMS.pdf” width=”100%” height=”400″ ]