Tag: it assignment samples

UNIX | Information Technology

Submit your responses to the following questions in APA6 report format. Please keep in mind the point weight for the questions – one-line, short paragraph and non-relevant answers will not get ANY points.

1)    Access Control [20 points – 5 points each]

a)     Describe what an access control list is.

b)    Explain how UNIX permissions can be regarded as access control lists.

c)     Describe capability-based access control.

d)    Contrast access control lists and capability-based access control.

2)    Cloud security [20 points] Describe the mechanisms and protocols used by the Trusted Third Party method of cloud security to provide confidentiality, integrity, and authenticity.

3)    IS Management [20 points] Describe the conclusions reached by Soomro, et al with respect to information security management. What relationship should the technical, management, and human dimensions have?  Whose responsibility is information security in an organization?

4)    Design Principles [40 points à 5 points each] – In their seminal 1975 paper, Saltzer and Schroeder articulated eight principles for “The Protection of Information in Computer Systems”. These principles are:

A.    Least Privilege

B.    Fail-safe Defaults

C.    Economy of Mechanism

D.    Complete Mediation

E.    Open Design  

F.     Separation of Privilege

G.    Least Common Mechanism

H.    Psychological Acceptability

Give a short description of each of the principles.  the statements in the paper – there need to be explanations in your own words, with examples provided to demonstrate your understanding.

ME504 | Advanced Networking | Information Technology

Assignment Description


There are two parts to this assignment, i.e. part A and part B.

  1. Investigate, design and develop a suitable network for an SME by addressing the following criteria. See detailed instruction in the next section.                  80 marks
  2. Presentation                                                                                                            20 marks

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/ME504-Advanced-Networking-Information-Technology.pdf” width=”100%” height=”400″ ]


ICTNWK505 | Design, Build and Test a Network Server | Information technology

Student Instructions:

  • Your answers should be on a separate document using word processing software such as MS Word & or other software (hand written submissions are only acceptable with prior approval from your Trainer)
  • Your document should be professionally formatted and include
  • Your Name
  • Your Student ID o Unit Code

Assessment Number (i.e. ICTNWK505 Assessment 1)

  • Please reference to each question number and retype each question with your answers
  • This is an open book assessment, you must answer every question and provide enough information to demonstrate sufficient understanding of what has been asked to achieve Please ask your Trainer/Assessor if you are unsure what is sufficient detail for an answer
  • Ask your trainer/assessor if you do not understand a question. Whist your trainer/assessor cannot tell you the answer, he/she may be able to re-word the question for you or provide further assistance based on the Institute’s “Reasonable Adjustment Policy”
  • Answers should be your own work, in your own words and not 4lagiarized, nor copied. However, if an answer is cut & pasted (such as a definition), then the source should be referenced

Assessment Resources ICTNWK505

  1. What are the Network operating systems available currently? Describe three key features of two network operating systems (NOS) in your own words. (Not more than 200 words)
  2. List resources or tools that can help you determine whether (i) whether particular hardware is compatible with Windows Server 2012; and (ii) whether an application will run on Windows Server 2012.
  3. Briefly discuss the roles of the following services in a computer network (Not more than 50 words for each item):
  • Domain name system (DNS) –
  • Dynamic host configuration protocol (DHCP)
  • File transfer protocol (FTP)
  • Mail
  • Network time protocol (NTP)
  • Proxy
  • Server messages block (SMB)
  • Web
  1. Describe the commands you would use to perform the following network service management configuration tasks: (not more than 50 words for each item)
  • Start – how to start a service under Windows Server
  • Stop – how to stop a service under Windows Server
  • Restart – how to restart a service under Windows Server
  • Start on boot – how to configure a network service to start on boot
  1. What are two security features of server firewall configuration? Describe in your own words. (Not more than 100 words for each item).
  2. What are two tools and techniques used in troubleshooting? Describe network diagnostic utilities briefly in your own words. (Not more than 100 words for each item).
  3. Describe the common operating system installation and operation issues of the following as they apply to Windows Server installations: (Not more than 50 words for each item).
  • Installation media – list three different installation media/types supported by Windows 2012
  • Boot process and diagnosing boot failures – give an example of the type of error I could encounter when booting a server
  • Operating system rescue environment – describe how I could recover from a boot error on Windows
  • Operating system help and support utilities – list two utilities that could help me troubleshoot Windows problems
  • Performance monitoring tools and tuning options – list one utility I can use to monitor hardware performance under Windows
  • High availability options for servers – list two features that I could deploy to increase my server availability

Assessment Resources ICTNWK505

  • File and print management – list the name of the protocol that I use to share file and printers in a Windows server environment
  1. Describe the following data security and storage measures required on a networked server (Not more than 50 words for each item):
  • User authentication and directory services – name the feature that provides these capabilities under Windows 2012 server
  • Best practice procedures for implementing backup and recovery – list two best practices that I should apply when implementing a backup and recovery solution
  • Error and event logging and reporting. List three types of logs I can consult on a Windows 2012 Server
  • Storage options, including file systems and disk partitioning schemes – list two file systems supported by Windows, and list the name of the utility I can use to repartition disks
  1. Describe the following process of managing a project (Not more than 100 words for each item):
  • Documentation skills required for networks – list two items that I should include in the documentation of a network
  • Process or task management – List the name of the utility under Windows that allows me to view running tasks and processes
  • Task scheduling utilities – list the name of the utility I can use to set up scheduled tasks in Windows

Assessor Use Only

Satisfactory (S) Not Satisfactory (NS) Assessor Signature: _______________________________ Date: _____________

Assessment Resources ICTNWK505

Assessment 2: Case Study

Instructions to Students

This assessment task can be undertaken in groups of up to three students per group. You need to list your group members in the introduction to the report. You should use the provided report template to help you structure the report (see Learner Resources for the subject). Each student needs to attach a copy of the group report to their assessment summary when they hand in their tasks


You are working as an IT System & Network Engineer at Perfect Technology. You have been given a project to design a server to a new customer called First Couriers Pty Ltd.

First Couriers Pty Ltd is a courier service agency. Currently First Couriers has got 2 Windows 2008 workgroup servers (one in each office) and two network printers. Management is planning to open two new branches in Werribee & Thomastown and planning to have 5 more computers and a Printer each.

Each of the Werribee and Thomastown sites will have a network switch to provide interconnection to all the devices within each office, and a WAN link of 1 Gbps will be used to link the two sites together. You have been told that there are ports available on both switches to connect a server if required. Spare network cables are also available, so these do not need to be purchased. You have also been told that the new server should be located in the Werribee office, as there are more employees connecting in at the Werribee office

The management wants to make IT management simple since they don’t have a full-time IT support officer. Mr. Jones, the First Couriers Office Manager, has been designated as the customer contact for you do discuss specific requirements. Mr. Jones has also made it clear that the implementation budget for this new server is $10,000 (includes both hardware, software, and labour costs). Mr Jones will be the person who will arrange your access to the site, and the client person who will sign your work off once you have completed the installation of the server. You will need to confirm any out-of-hours access to the site you require with Mr. Jackson, the facilities manager, who is responsible for physical security for the site overall.

You have costed your labour costs at $2000, and your software licensing costs at $2000. That leaves $6,000) for server hardware. Preliminary analysis by your colleagues has identified the Dell Power Edge T440 Tower Server as a good fit for First Courier.

First Couriers also has 500 GB of data on their old Windows 2008 servers, and they want to make sure that they can migrate that data onto the new servers. They will keep the old Windows 2008 servers, but they want to make sure they will not lose any data in the migration exercise.

First Couriers has approached Perfect Technology to provide a solution to manage their IT needs easily.

You as an IT System Engineer must prepare a design report and submit it to First Couriers for their feedback. Once the client agreed to the design, you will have to install and setup the servers.

Assessment Resources ICTNWK505

First Couriers are very security conscious and want to know what security measures exist in the server to secure their environment.

First Couriers are also very safety conscious and want to make sure all work on their servers is done in a way that is consistent with all applicable workplace health and safety requirements. You should also explain how any risks encountered in implementing the server will be managed.

First Courier currently run a SQL Server 2012 application, and want to know whether this will run on the new server.

First Courier want to be able to monitor hardware resource usage by the server, and to be able to sop and start network services as needed. They are unsure as to whether they need a third party application for this and would like your advice.

In your design report, you must propose to implement a Windows domain network and run a local active directory server with DHCP, DNS, File Server and other services. You also need to provide details of server applications compatibility issues and resolution procedures.

                                                                                              callnow Button

Following tasks must be done to finish the design report

  1. Identify the client, and verify the requirements that the client has expressed in this case study
  2. Address the business problems, opportunities, scope, objectives and budget. (For this task, you should write down what you believe the key business problem to address is with the server installation, and also think how you would orally question/confirm this with Mr. Jones (as your trainer will question you about this in the classroom or labs).
  3. Specify the server specifications.
  4. Specify the required network services.
  5. List the server applications
  6. Identify and document server applications compatibility issues and resolution procedures
  7. List the security requirements, including authentication and authorization.
  8. Plan and explain redundancies.
  9. Produce the installation check list.
  10. Identify any required third-party applications that are required to meet the customer requirements
  11. Describe how the new server will be implemented, and whether any prototyping of the solution will be done. You should also produce a design of your server implementation, documenting which services will be installed on the server
  12. Analyse and describe data migration methods required for the client.
  13. Develop test plans to check system requirement
  14. Develop test plan to check the performance
  15. Describe how you will ensure the work is completed according to WHS requirements, including any risk management procedures needed
  16. Explain the work sign-off procedure to the customer, including any cleanup required of the worksite and handover procedures
  17. Describe a backup and restore strategy for the server
  18. Describe how you will liaise with the customer representative and other personnel to gain access to the site
  19. Describe how the server will be connected to the existing network


This assessor checklist is to be used when assessing the students in the associated task. The checklist below must be completed for each student. Please refer to separate mapping document for specific details relating to alignment of this task to the unit requirements.

Student Name:

Assessor Name:

The student must satisfactorily complete Written Report to the standards outlined below.


Has the Student?

  1. Identified the client and verified the requirements
  2. Addressed the business problem.
  3. Specified the server specification.
  4. Specified the required services.
  5. Listed the server applications.
  6. Listed the security requirements
  7. Identified server applications compatibility issues and resolution procedures
  8. Documented server application compatibility issues and resolution procedures
  9. Planned and explained redundancies.
  10. Produced the installation check list.
  11. Identified any required third-party applications
  12. Created a prototype of the design and documented it

Assessment Resources ICTNWK505

13. Explained data migration methods to server from computers. r r
14. Developed test plans to check system requirement r r
15. Developed test plan to check the performance r r
16. Explained high availability options for servers r r
17. Notified the client in written about the server status r r
18. Documented the configuration details. r r
19. Prepared the site according to enterprise WHS processes and r r
20. Identified the safety and risk measures r r

Assessor Use Only

Assessor Comments

Satisfactory (S)

Assessor Signature: _______________________________

Not Satisfactory (NS)

Date: _____________

Assessment Resources ICTNWK505


Instructions to students:

Read through the scenario, complete the assigned tasks, and take screen prints as directed and attach to your assessment resources summary to prove you completed the labs as required.

General comments about labs

  • Always prepare a test plan to test your configurations
  • When working with electrical equipment, you should keep the WHS requirements in mind for real life installations. See Managing Electrical risks in the workplace (in Learner Resources)
  • Troubleshoot your configurations as required, using operating system help utilities, information sources (such as Google) and Learner resources as required.
  • Don’t forget to save your evidence into your workbook as we go


  1. You will install Windows 2012 in a virtual machine running on VM Workstation on one of the computers in the level 10 labs (rooms 4 and 5)
  2. Note that the install files for Windows 2012 Server are present in the c:\lab-files folder. You will also need to enter a 25 digit product key during the install process. The product key you need is: D2N9P-3P6X9-2R39C-7RTCD-MDVJX.
  3. You should install Windows 2012 Server with the GUI option, and you also should configure static IP parameters for the server.
  4. To secure your server, you should make a new Admin1 account, and set a secure password on the account.
  5. You should set your hostname/computer name to Snnnnn (where Snnnnn is your student id)
  6. You should set the IP address to, the subnet mask to, and the default gateway to (you need the static address because you are going to install network services like DNS and DHCP in later labs)
  7. You also need to ensure your operating system code is secure and up to date. The easiest way to do this is go into Windows Update and set updates to automatic. This ensures critical security patches are automatically installed on your server, which would be appropriate given First Couriers want a low maintenance solution

Once you have completed the install and configured Windows Update as described above, take a screen shot of Windows Update on the server to show the updates being automatically applied and attach it to your assessment resources summary. The screen shot should look similar to that below.

Lab 2 Setting up DNS

Requirement. Your need to set up a DNS Server on the Windows 2012 Server instance you installed in Lab 1. You need to add DNS server as a feature in Server Manager, and then create a forward lookup zone called Snnnnn.com (where Snnnnn is your student id). You also need to create a single host record (A type) for the Windows 2012 server IP address ( you set up in lab 1

Requirement. Your need to set up a DHCP Server on the Windows 2012 Server instance you installed in Lab 1.

You need to create a DHCP scope for the address range –, and activate it for use.

Lab 4 Setting up SMTP Relay service

Requirement. Your need to set up an SMTP relay on the Windows 2012 Server instance you installed in Lab 1. The reason you are doing this is that the client wants emails forwarded for a particular domain to another mail server in their network.

You need to create an SMTP relay to forward SMTP email where the domain name is Snnnnn (where nnnnn is your student id)

Lab 5 Setting up FTP Server service

Requirement. Your need to set up an FTP site on the Windows 2012 Server instance you installed in Lab 1.

You need to install FTP Server and create a single FTP site called SnnnnnFTP (where nnnnn is your student id)

Once you have completed the lab as described above, take a screen shot of the site on the server to attach it to your assessment resources summary. The screen shot should look similar to that below. Note: your student id should show, not S12345

Lab 6 Configuring Windows Firewall

Requirement. Your need to add a rule to the Windows Firewall on the server you installed in Lab 1 to allow incoming traffic on port 1045. This is because the customer has advised you that an in-house application is using that port and needs to be enabled

Set up a new Windows Firewall rule called SnnnnnFirewallRule (where nnnnn is your student id) to allow incoming traffic on port 1045.

You need to install FTP Server and create a single FTP site called SnnnnnFTP (where nnnnn is your student id)

Once you have completed the lab as described above, take a screen shot of the firewall rule on the server to attach it to your assessment resources summary. The screen shot should look similar to that below. Note: your student id should show, not S12345

Lab 7 Troubleshoot a customer problem

Requirement. You have received notification from a colleague that he is unable to connect to the network because he is getting an error message that there is an IP conflict (duplicate address) with a printer in the customer’s network that has address You need to make a configuration change to DHCP so that error no longer occurs, i.e. the address is no longer given out by your DHCP server.

Make the change so that the DHCP server no longer gives out the IP address You also have to complete a problem report form (see below) advising the customer that the problem as been resolved.

Once you have completed the lab as described above, take a screen shot of the configuration change on the server to attach it to your assessment resources summary. It should look similar to that below

You should also complete the form below, and paste into your workbook for evidence

Incident Report 23/January 30, 2018
number/date of incident
Reported Problem Duplicate IP address on network
Problem Contact Mr. Jones, Office Manager, F
Action taken to resolve (briefly describe the action you took to resolve the problem)
Date of Action (put the date of your lab here)
Engineer Signature (Sign here)

Lab 8 Backup/Restore and Scheduling

Requirement. As part of your high availability strategy for the server, you are installing Windows Backup Server on the server. You are also setting up a scheduled task on the server to copy a folder C:\DATA to C:\BACKUP every night at 10PM

Install Windows Backup Server on the Windows 2012 Server you set up earlier. Use the task scheduler to create a task that copies the contents of C:\DATA to C:\BACKUP every night at 10PM (NB to test this, you will need to create the folders first)

Once you have installed Windows Backup Server on the server, take a screen shot of the configuration for evidence. It should look similar to that below.

Assessment Resources ICTNWK505

Once you have set up the scheduled task, take a screenshot for evidence. It should look similar to that below

Lab 9 – Performance Monitoring

Requirement. First Couriers have reported that the server is running slowly. You need to log into the server and set up a performance monitor on CPU usage, to see whether that could be the performance problem

Go into Performance Monitor on the server, and set up a real time counter to monitor CPU usage

Once you have installed the performance counter on the server, take a screen shot of the configuration for evidence. It should look similar to that below



Lab 1 – Installing Windows 2012 Server

Lab 2 – Setting up DNS

Lab 3 -Setting up DHCP

Lab 4- Setting up SMTP Relay Service

Lab 5- Setting up FTP Server Service

Lab 6 – Configuring Windows Firewall

Lab 7 – Troubleshooting a customer problem

Lab 8 – Backup and Restore

Lab 9 – Performance Monitoring

This assessor checklist is to be used when assessing the students in the associated task. The checklist below must be completed for each student. Please refer to separate mapping document for specific details relating to alignment of this task to the unit requirements.

Student Name:

Assessor Name:

The student must satisfactorily complete Lab tasks to the standards outlined below.

Has the student?
1. Identified Customer requirements by consulting appropriate r r
2. Identified Business Problems, scope, opportunities and r r
objectives by consulting appropriate person
3. Documented the Server specification requirement. r r
4. Installed network operating system (i.e. Windows Server 2012) r r
5. Patched and updated the OS and applications r r
6. Configured IP addressing r r

Assessment Resources ICTNWK505

7.  Updated Windows Server 2012 r r
8.  Installed and configured DNS Server r r
9.  Installed and configured DHCP Server r r
10. Installed and configured FTP Server r r
11. Configured automatic update on server and applications r r
12. Configured mail server and web access mail. r r
13. Tested the server and record the result. r r
14. Identified the server problem and Troubleshoot using tools. r r
15. Analyzed the errors to make the changes r r
16. Performed the testing again. r r
17. Documented the configuration details. r r

Assessor Use Only

Satisfactory (S) Not Satisfactory (NS) Assessor Signature: _______________________________ Date: _____________

COIS13013 | VISUAL DSS | Information Technology

This assessment item relates to course learning outcomes numbers 1, 2 and 6 as stated on the course profile. This part emphasizes on the use of a DDS tool, and students are required to demonstrate proficiency with Visual DSS™ (a DSS development language/DSS generator).

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/COIS13013-VISUAL-DSS-Information-Technology.pdf” width=”100%” height=”400″ ]




Linear Project | Information Technology

A section of a new High Speed Railway (HSR) route will cross a large estuary on a twin track viaduct.  The total length of the viaducts required to achieve this together with the approach sections on land are as follows.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/Linear-Project-Information-Technology.pdf” width=”100%” height=”400″ ]



CSG 5308 | Wireless Security | Information security

Wireshark is a network sniffer and analyser tool which can be used by IT administrators, developers, hackers, incident response or security researchers to capture and analyse wired or wireless traffic. This allows you to “see” all traffic that is sent and received when computers interact with one another. A few examples of this include downloading a file from the Internet.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/CSG-5308-Wireless-Security-Information-security.pdf” width=”100%” height=”400″ ]


Parallel System | Information Technology

Consider the system shown in Figure 1, which is a model of an active redundant generator at a main exchange of Telecommunication Company.


 Figure 1: Active redundant generator pair

Assume that the reliability of each subsystem (or component) i has the reliability.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/Parallel-System-Information-Technology.pdf” width=”100%” height=”400″ ]


ITAP1004 | Website Development | Information technology

You are to develop from the beginning a web site about yourself with regard to accommodation. This web site provides certain required details about your experience in accommodation in which you have stayed. You will design and develop your web site with Notepad/Notepad++, HTML, Java Script and CSS.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/ITAP1004-Website-Development-Information-technology.pdf” width=”100%” height=”400″ ]



COIT20267 | Computer Forensics | Information Technology

This assignment is designed to encourage the development of ability to apply a systematic approach in a digital investigation through the conduct of computer forensics procedures and the use of computer forensics tools, and to encourage the ability to identify the legal issues involved in a computer forensic investigation across jurisdictions. Please refer to the unit profile to see how this assessment item relates to the unit learning outcomes.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/COIT20267-Computer-Forensics-Information-Technology.pdf” width=”100%” height=”400″ ]


Abstracts | Information Technology

Write four (4) abstracts: each abstract should be 300 words . the four (4) nominated readings in the Reading Material and Exercises book (RME). The nominated readings for the current study session are listed below. 1. Under each of the four (4) abstracts, write a 150 word example of how each reading relates to your work experience, or how they could relate to an imaginary work situation.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/ABSTRACTS-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]


COIT20245 | Console Application Assignment 2 | Java


In this assignment, you are to implement a console application that supports simple BMI (Body Mass Index) analysis functionality. A phased implementation approach is recommended; refer to Appendix 2 for further details.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/COIT20245-CONSOLE-APPLICATION-ASSIGNMENT-2-JAVA.pdf” width=”100%” height=”400″ ]


COIT 20246 | ICT service management | Information Technology


It will be necessary to use literature/online resources to complete this assignment, please ensure you cite and reference any such materials using the Harvard format.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/COIT-20246-ICT-SERVICE-MANAGEMENT-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]


SIT719 | Security and privacy issues in analytics | Information security

Assessment Information

These could relate to the government department you have selected and their possible usage of data and analytics systems. You will also need to recognise and apply the relevant ethical, regulatory and governance constraints on the department when dealing with data and analytics and then describe your findings.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/SIT719-SECURITY-AND-PRIVACY-ISSUES-IN-ANALYTICS-INFORMATION-SECURITY.pdf” width=”100%” height=”400″ ]

Research Report on Music | Information Systems


Your introduction should tell us what the report is about and why it was written.

It may also contain:

  • clarification of your chosen industry: for example, if you chose “Identity & access management to maintain integrity of tunes”, which ones/types did you focus on?

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/RESEARCH-REPORT-ON-MUSIC-INFORMATION-SYSTEMS.pdf” width=”100%” height=”400″ ]

Research Report on Film | Information Systems


Your introduction should tell us what the report is about and why it was written.

It may also contain:

  • clarification of your chosen industry: for example, if you chose “Security and risk management of films”, which ones/types did you focus on?

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/RESEARCH-REPORT-ON-FILM-INFORMATION-SYSTEMS.pdf” width=”100%” height=”400″ ]

CIS5308 | Management of IT Services Report 1 | Information Technology

Report 1 Specification

Report 1 requires you to watch a webinar video, then draw on the course materials and research relevant academic sources (e.g. textbook, journal/ conference papers) to prepare a report as per the requirements presented below.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/CIS5308-MANAGEMENT-OF-IT-SERVICES-REPORT-1-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]

ITECH1100 | Understanding The Digital Revolution | Information technology

Assignment 1 – Book Zone           Overview

For this individual assignment, you will use skills acquired through practical laboratory exercises to automate a business process, and to visualize the impact of the automation.

You should use Microsoft Excel (or equivalent open-source software) for this assessment task.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/ITECH1100-UNDERSTANDING-THE-DIGITAL-REVOLUTION-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]

INFS 5093 | Business Systems Analysis Textbooks | Information Systems


This document extends the instructions on the course website. Read the instructions on the course website in addition to this document.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/INFS-5093-BUSINESS-SYSTEMS-ANALYSIS-TEXTBOOKS-INFORMATION-SYSTEMS.pdf” width=”100%” height=”400″ ]

CIS8009 | Management of Business Telecommunications | IT Assignment


The size of these organisations is important as their current and future requirements would be different. When you are selecting these organisations, consider their footprint, such as are they operating within one country only, are they branching out to another country or are planning to do so, or are they already operating on a global scale?

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/CIS8009-MANAGEMENT-OF-BUSINESS-TELECOMMUNICATIONS-IT-ASSIGNMENT.pdf” width=”100%” height=”400″ ]

COIT20263 | Information Security Management (CQU Handbook) | IT


This assessment task can be undertaken in a group of up to 4 members or individually. You will analyse the scenario given on page 3, and develop and document the specified Issue Specific Security Policy (ISSP) for the organisation.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/COIT20263-INFORMATION-SECURITY-MANAGEMENT-CQU-HANDBOOK-IT.pdf” width=”100%” height=”400″ ]

COIT20265 | Networks and Information Security CQU | Information Security

Task Description

This is the major piece of assessment for this unit where you are required to provide a technical report on your network security project. For this assessment, you are required to work on a project as a group with up to four team members. Please contact the unit coordinator if you have a genuine problem and are unable to participate in a group.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/COIT20265-NETWORKS-AND-INFORMATION-SECURITY-CQU-INFORMATION-SECURITY.pdf” width=”100%” height=”400″ ]

ENCIV 7060 | Road And Traffic Engineering | Information technology

Funding has been received to construct a new freeway section to relieve the congestion on an existing freeway section. Construction of the new freeway will begin this year and is expected to take a minimum of three years to complete. In the interim, the authorities have decided to evaluate the most congested section of the existing freeway for immediate improvements that would keep traffic flow at less than capacity on this section while the new freeway is under construction.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/ENCIV-7060-ROAD-AND-TRAFFIC-ENGINEERING-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]

MKT520 | Innovation webpage | Information technology


Your task is to create a webpage (using Padlet or Weebly*) that very clearly and concisely reports on selected aspects of the innovation capabilities of the organisation you will be critically evaluating in assessment 2.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/MKT520-INNOVATION-WEBPAGE-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]

CIS8500 | Assignment 1 Applied Research for Information System Professionals | Information System Professionals

Assignment 1 Specification

Assignment 1 requires you to read and critically analyse a research article sourced from the Australasian Conference on Information Systems (ACIS) held in Wollongong in early December 2016: or the most recent one held in Tasmania in 2017: Your research article will be emailed to you during the second week.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/CIS8500-ASSIGNMENT-1-APPLIED-RESEARCH-FOR-INFORMATION-SYSTEM-PROFESSIONALS-INFORMATION-SYSTEM-PROFESSIONALS.pdf” width=”100%” height=”400″ ]



Assignment 2

The value of this assessment is 25% of the total marks for the unit. The length of this assessment is maximum of 30 slides excluding end text references end text reference list.  This assignment builds on assignment 1. You have now been re-hired to educate current and future employees on how they can ensure that their online account remains safe and secure when using their personal computer.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/CSI1101-COMPUTER-SECURITY-ASSIGNMENT-GUIDE-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]



You have been asked by your client to design and create code to automate a process.

1. Create a ‘guess the number’ game using the following brief:

The system automatically generates a number for the player to ‘guess’

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/ICTPRG405-AUTOMATE-PROCESSES-CREATE-CODE-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]


Assignment item 3
Network Research Design

The value of this assessment is 25%.

This is a practical task and it will improve and check your practical skills and knowledge relevant to the subject topic. You are needed to arrange simple network using minimum 3 PCs and minimum two routers or use simulation software to arrange the similar network.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/ITC542-INTERNETWORKING-WITH-TCP-IP-NETWORK-RESEARCH-DESIGN-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]

ITECH 5500 | Professional Research and Communication Sample | IT

Part A


This assignment intensely focuses on the aspect of self-efficacy to generate sustainable knowledge about the use and importance of it for every individual of every possible trait. This assignment has also depicted the definition of self-efficacy that enhances the behavioural efficiency to imbue confidence in a person. The major factors that contribute to the self-efficacy is discussed here along with its basic and operational difference with efficacy or collective efficacy. This assignment has also dealt with literature review based on the topic of self-efficacy in sports with four different article journals to reveal sustainable knowledge about the usefulness of this aspect.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/02/ITECH-5500-Professional-research-and-communication-sample-Information-Technology.pdf” width=”100%” height=”400″ ]

COIT 20246 | Assignment Submission | Information Technology


There are ten (10) tasks, one for each week:  the tasks are detailed below.  There is a table to complete for each task.  Please fill in the information required.  An example of a completed task is below.  Note the first response is good – so aim for something like this.  The second response is not acceptable, so if you submit anything like it, you won’t pass the assignment!  The reasons?  Poor resource selection (Wikipedia), no Harvard reference and a block cut and paste from the site (no citation, no original content).

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/02/COIT-20246-Assignment-Submission-Information-Technology.pdf” width=”100%” height=”400″ ]



This is a practical assessment and will enhance and test your practical skills related to the subject topic. You are required to set up a simple network using minimum three PCs and minimum two routers, or use simulation software to set up the same network.
To complete this assessment you are expected to refer to information beyond the text book. This assignment is open; in that you are free to choose the devices or software you use to complete the specified tasks. Students are expected to accomplish this task by utilising the necessary commands discussed in lectures and also described in the prescribed text book.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/02/ITC-542-ASSESSMENT-ITEM-4-NETWORK-DESIGN-IMPLEMENTATION-Networking.pdf” width=”100%” height=”400″ ]



You are to develop at least two different initial concept designs that would meet the requirements of the Local Farm Shop. These designs will be wireframe only designs at this stage.
The Local Farm Shop case study is located in Interact Resources. You need to read this case study before starting this assessment item.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/02/ITC504-DESIGN-CONCEPT-USER-INTERFACE.pdf” width=”100%” height=”400″ ]