Tag: it dependencies diagram

ICTNWK505 | Design, Build and Test a Network Server | Information technology

Student Instructions:

  • Your answers should be on a separate document using word processing software such as MS Word & or other software (hand written submissions are only acceptable with prior approval from your Trainer)
  • Your document should be professionally formatted and include
  • Your Name
  • Your Student ID o Unit Code

Assessment Number (i.e. ICTNWK505 Assessment 1)

  • Please reference to each question number and retype each question with your answers
  • This is an open book assessment, you must answer every question and provide enough information to demonstrate sufficient understanding of what has been asked to achieve Please ask your Trainer/Assessor if you are unsure what is sufficient detail for an answer
  • Ask your trainer/assessor if you do not understand a question. Whist your trainer/assessor cannot tell you the answer, he/she may be able to re-word the question for you or provide further assistance based on the Institute’s “Reasonable Adjustment Policy”
  • Answers should be your own work, in your own words and not 4lagiarized, nor copied. However, if an answer is cut & pasted (such as a definition), then the source should be referenced

Assessment Resources ICTNWK505

  1. What are the Network operating systems available currently? Describe three key features of two network operating systems (NOS) in your own words. (Not more than 200 words)
  2. List resources or tools that can help you determine whether (i) whether particular hardware is compatible with Windows Server 2012; and (ii) whether an application will run on Windows Server 2012.
  3. Briefly discuss the roles of the following services in a computer network (Not more than 50 words for each item):
  • Domain name system (DNS) –
  • Dynamic host configuration protocol (DHCP)
  • File transfer protocol (FTP)
  • Mail
  • Network time protocol (NTP)
  • Proxy
  • Server messages block (SMB)
  • Web
  1. Describe the commands you would use to perform the following network service management configuration tasks: (not more than 50 words for each item)
  • Start – how to start a service under Windows Server
  • Stop – how to stop a service under Windows Server
  • Restart – how to restart a service under Windows Server
  • Start on boot – how to configure a network service to start on boot
  1. What are two security features of server firewall configuration? Describe in your own words. (Not more than 100 words for each item).
  2. What are two tools and techniques used in troubleshooting? Describe network diagnostic utilities briefly in your own words. (Not more than 100 words for each item).
  3. Describe the common operating system installation and operation issues of the following as they apply to Windows Server installations: (Not more than 50 words for each item).
  • Installation media – list three different installation media/types supported by Windows 2012
  • Boot process and diagnosing boot failures – give an example of the type of error I could encounter when booting a server
  • Operating system rescue environment – describe how I could recover from a boot error on Windows
  • Operating system help and support utilities – list two utilities that could help me troubleshoot Windows problems
  • Performance monitoring tools and tuning options – list one utility I can use to monitor hardware performance under Windows
  • High availability options for servers – list two features that I could deploy to increase my server availability

Assessment Resources ICTNWK505

  • File and print management – list the name of the protocol that I use to share file and printers in a Windows server environment
  1. Describe the following data security and storage measures required on a networked server (Not more than 50 words for each item):
  • User authentication and directory services – name the feature that provides these capabilities under Windows 2012 server
  • Best practice procedures for implementing backup and recovery – list two best practices that I should apply when implementing a backup and recovery solution
  • Error and event logging and reporting. List three types of logs I can consult on a Windows 2012 Server
  • Storage options, including file systems and disk partitioning schemes – list two file systems supported by Windows, and list the name of the utility I can use to repartition disks
  1. Describe the following process of managing a project (Not more than 100 words for each item):
  • Documentation skills required for networks – list two items that I should include in the documentation of a network
  • Process or task management – List the name of the utility under Windows that allows me to view running tasks and processes
  • Task scheduling utilities – list the name of the utility I can use to set up scheduled tasks in Windows

Assessor Use Only

Satisfactory (S) Not Satisfactory (NS) Assessor Signature: _______________________________ Date: _____________

Assessment Resources ICTNWK505

Assessment 2: Case Study

Instructions to Students

This assessment task can be undertaken in groups of up to three students per group. You need to list your group members in the introduction to the report. You should use the provided report template to help you structure the report (see Learner Resources for the subject). Each student needs to attach a copy of the group report to their assessment summary when they hand in their tasks

Scenario

You are working as an IT System & Network Engineer at Perfect Technology. You have been given a project to design a server to a new customer called First Couriers Pty Ltd.

First Couriers Pty Ltd is a courier service agency. Currently First Couriers has got 2 Windows 2008 workgroup servers (one in each office) and two network printers. Management is planning to open two new branches in Werribee & Thomastown and planning to have 5 more computers and a Printer each.

Each of the Werribee and Thomastown sites will have a network switch to provide interconnection to all the devices within each office, and a WAN link of 1 Gbps will be used to link the two sites together. You have been told that there are ports available on both switches to connect a server if required. Spare network cables are also available, so these do not need to be purchased. You have also been told that the new server should be located in the Werribee office, as there are more employees connecting in at the Werribee office

The management wants to make IT management simple since they don’t have a full-time IT support officer. Mr. Jones, the First Couriers Office Manager, has been designated as the customer contact for you do discuss specific requirements. Mr. Jones has also made it clear that the implementation budget for this new server is $10,000 (includes both hardware, software, and labour costs). Mr Jones will be the person who will arrange your access to the site, and the client person who will sign your work off once you have completed the installation of the server. You will need to confirm any out-of-hours access to the site you require with Mr. Jackson, the facilities manager, who is responsible for physical security for the site overall.

You have costed your labour costs at $2000, and your software licensing costs at $2000. That leaves $6,000) for server hardware. Preliminary analysis by your colleagues has identified the Dell Power Edge T440 Tower Server as a good fit for First Courier.

First Couriers also has 500 GB of data on their old Windows 2008 servers, and they want to make sure that they can migrate that data onto the new servers. They will keep the old Windows 2008 servers, but they want to make sure they will not lose any data in the migration exercise.

First Couriers has approached Perfect Technology to provide a solution to manage their IT needs easily.

You as an IT System Engineer must prepare a design report and submit it to First Couriers for their feedback. Once the client agreed to the design, you will have to install and setup the servers.

Assessment Resources ICTNWK505

First Couriers are very security conscious and want to know what security measures exist in the server to secure their environment.

First Couriers are also very safety conscious and want to make sure all work on their servers is done in a way that is consistent with all applicable workplace health and safety requirements. You should also explain how any risks encountered in implementing the server will be managed.

First Courier currently run a SQL Server 2012 application, and want to know whether this will run on the new server.

First Courier want to be able to monitor hardware resource usage by the server, and to be able to sop and start network services as needed. They are unsure as to whether they need a third party application for this and would like your advice.

In your design report, you must propose to implement a Windows domain network and run a local active directory server with DHCP, DNS, File Server and other services. You also need to provide details of server applications compatibility issues and resolution procedures.

                                                                                              callnow Button

Following tasks must be done to finish the design report

  1. Identify the client, and verify the requirements that the client has expressed in this case study
  2. Address the business problems, opportunities, scope, objectives and budget. (For this task, you should write down what you believe the key business problem to address is with the server installation, and also think how you would orally question/confirm this with Mr. Jones (as your trainer will question you about this in the classroom or labs).
  3. Specify the server specifications.
  4. Specify the required network services.
  5. List the server applications
  6. Identify and document server applications compatibility issues and resolution procedures
  7. List the security requirements, including authentication and authorization.
  8. Plan and explain redundancies.
  9. Produce the installation check list.
  10. Identify any required third-party applications that are required to meet the customer requirements
  11. Describe how the new server will be implemented, and whether any prototyping of the solution will be done. You should also produce a design of your server implementation, documenting which services will be installed on the server
  12. Analyse and describe data migration methods required for the client.
  13. Develop test plans to check system requirement
  14. Develop test plan to check the performance
  15. Describe how you will ensure the work is completed according to WHS requirements, including any risk management procedures needed
  16. Explain the work sign-off procedure to the customer, including any cleanup required of the worksite and handover procedures
  17. Describe a backup and restore strategy for the server
  18. Describe how you will liaise with the customer representative and other personnel to gain access to the site
  19. Describe how the server will be connected to the existing network

ASSESSOR CHECKLIST

This assessor checklist is to be used when assessing the students in the associated task. The checklist below must be completed for each student. Please refer to separate mapping document for specific details relating to alignment of this task to the unit requirements.

Student Name:

Assessor Name:

The student must satisfactorily complete Written Report to the standards outlined below.

ASSESSOR CHECKLIST S NS

Has the Student?

  1. Identified the client and verified the requirements
  2. Addressed the business problem.
  3. Specified the server specification.
  4. Specified the required services.
  5. Listed the server applications.
  6. Listed the security requirements
  7. Identified server applications compatibility issues and resolution procedures
  8. Documented server application compatibility issues and resolution procedures
  9. Planned and explained redundancies.
  10. Produced the installation check list.
  11. Identified any required third-party applications
  12. Created a prototype of the design and documented it

Assessment Resources ICTNWK505

13. Explained data migration methods to server from computers. r r
14. Developed test plans to check system requirement r r
15. Developed test plan to check the performance r r
16. Explained high availability options for servers r r
17. Notified the client in written about the server status r r
18. Documented the configuration details. r r
19. Prepared the site according to enterprise WHS processes and r r
procedures
20. Identified the safety and risk measures r r

Assessor Use Only

Assessor Comments

Satisfactory (S)

Assessor Signature: _______________________________

Not Satisfactory (NS)

Date: _____________

Assessment Resources ICTNWK505

ASSESSMENT 3 – LAB

Instructions to students:

Read through the scenario, complete the assigned tasks, and take screen prints as directed and attach to your assessment resources summary to prove you completed the labs as required.

General comments about labs

  • Always prepare a test plan to test your configurations
  • When working with electrical equipment, you should keep the WHS requirements in mind for real life installations. See Managing Electrical risks in the workplace (in Learner Resources)
  • Troubleshoot your configurations as required, using operating system help utilities, information sources (such as Google) and Learner resources as required.
  • Don’t forget to save your evidence into your workbook as we go

Requirements:

  1. You will install Windows 2012 in a virtual machine running on VM Workstation on one of the computers in the level 10 labs (rooms 4 and 5)
  2. Note that the install files for Windows 2012 Server are present in the c:\lab-files folder. You will also need to enter a 25 digit product key during the install process. The product key you need is: D2N9P-3P6X9-2R39C-7RTCD-MDVJX.
  3. You should install Windows 2012 Server with the GUI option, and you also should configure static IP parameters for the server.
  4. To secure your server, you should make a new Admin1 account, and set a secure password on the account.
  5. You should set your hostname/computer name to Snnnnn (where Snnnnn is your student id)
  6. You should set the IP address to 192.168.1.1, the subnet mask to 255.255.255.0, and the default gateway to 192.168.1.254. (you need the static address because you are going to install network services like DNS and DHCP in later labs)
  7. You also need to ensure your operating system code is secure and up to date. The easiest way to do this is go into Windows Update and set updates to automatic. This ensures critical security patches are automatically installed on your server, which would be appropriate given First Couriers want a low maintenance solution

Once you have completed the install and configured Windows Update as described above, take a screen shot of Windows Update on the server to show the updates being automatically applied and attach it to your assessment resources summary. The screen shot should look similar to that below.

Lab 2 Setting up DNS

Requirement. Your need to set up a DNS Server on the Windows 2012 Server instance you installed in Lab 1. You need to add DNS server as a feature in Server Manager, and then create a forward lookup zone called Snnnnn.com (where Snnnnn is your student id). You also need to create a single host record (A type) for the Windows 2012 server IP address (192.168.1.1) you set up in lab 1

Requirement. Your need to set up a DHCP Server on the Windows 2012 Server instance you installed in Lab 1.

You need to create a DHCP scope for the address range 192.168.1.100 – 192.168.1.120, and activate it for use.

Lab 4 Setting up SMTP Relay service

Requirement. Your need to set up an SMTP relay on the Windows 2012 Server instance you installed in Lab 1. The reason you are doing this is that the client wants emails forwarded for a particular domain to another mail server in their network.

You need to create an SMTP relay to forward SMTP email where the domain name is Snnnnn (where nnnnn is your student id)

Lab 5 Setting up FTP Server service

Requirement. Your need to set up an FTP site on the Windows 2012 Server instance you installed in Lab 1.

You need to install FTP Server and create a single FTP site called SnnnnnFTP (where nnnnn is your student id)

Once you have completed the lab as described above, take a screen shot of the site on the server to attach it to your assessment resources summary. The screen shot should look similar to that below. Note: your student id should show, not S12345

Lab 6 Configuring Windows Firewall

Requirement. Your need to add a rule to the Windows Firewall on the server you installed in Lab 1 to allow incoming traffic on port 1045. This is because the customer has advised you that an in-house application is using that port and needs to be enabled

Set up a new Windows Firewall rule called SnnnnnFirewallRule (where nnnnn is your student id) to allow incoming traffic on port 1045.

You need to install FTP Server and create a single FTP site called SnnnnnFTP (where nnnnn is your student id)

Once you have completed the lab as described above, take a screen shot of the firewall rule on the server to attach it to your assessment resources summary. The screen shot should look similar to that below. Note: your student id should show, not S12345

Lab 7 Troubleshoot a customer problem

Requirement. You have received notification from a colleague that he is unable to connect to the network because he is getting an error message that there is an IP conflict (duplicate address) with a printer in the customer’s network that has address 192.168.1.115. You need to make a configuration change to DHCP so that error no longer occurs, i.e. the address 192.168.1.115 is no longer given out by your DHCP server.

Make the change so that the DHCP server no longer gives out the IP address 192.168.1.115. You also have to complete a problem report form (see below) advising the customer that the problem as been resolved.

Once you have completed the lab as described above, take a screen shot of the configuration change on the server to attach it to your assessment resources summary. It should look similar to that below

You should also complete the form below, and paste into your workbook for evidence

Incident Report 23/January 30, 2018
number/date of incident
Reported Problem Duplicate IP address on network
Problem Contact Mr. Jones, Office Manager, F
Action taken to resolve (briefly describe the action you took to resolve the problem)
problem
Date of Action (put the date of your lab here)
Engineer Signature (Sign here)

Lab 8 Backup/Restore and Scheduling

Requirement. As part of your high availability strategy for the server, you are installing Windows Backup Server on the server. You are also setting up a scheduled task on the server to copy a folder C:\DATA to C:\BACKUP every night at 10PM

Install Windows Backup Server on the Windows 2012 Server you set up earlier. Use the task scheduler to create a task that copies the contents of C:\DATA to C:\BACKUP every night at 10PM (NB to test this, you will need to create the folders first)

Once you have installed Windows Backup Server on the server, take a screen shot of the configuration for evidence. It should look similar to that below.

Assessment Resources ICTNWK505

Once you have set up the scheduled task, take a screenshot for evidence. It should look similar to that below

Lab 9 – Performance Monitoring

Requirement. First Couriers have reported that the server is running slowly. You need to log into the server and set up a performance monitor on CPU usage, to see whether that could be the performance problem

Go into Performance Monitor on the server, and set up a real time counter to monitor CPU usage

Once you have installed the performance counter on the server, take a screen shot of the configuration for evidence. It should look similar to that below

ASSESSMENT 3 – LAB

ASSESSOR CHECKLIST

Lab 1 – Installing Windows 2012 Server

Lab 2 – Setting up DNS

Lab 3 -Setting up DHCP

Lab 4- Setting up SMTP Relay Service

Lab 5- Setting up FTP Server Service

Lab 6 – Configuring Windows Firewall

Lab 7 – Troubleshooting a customer problem

Lab 8 – Backup and Restore

Lab 9 – Performance Monitoring

This assessor checklist is to be used when assessing the students in the associated task. The checklist below must be completed for each student. Please refer to separate mapping document for specific details relating to alignment of this task to the unit requirements.

Student Name:

Assessor Name:

The student must satisfactorily complete Lab tasks to the standards outlined below.

ASSESSOR CHECKLIST S NS
Has the student?
1. Identified Customer requirements by consulting appropriate r r
person
2. Identified Business Problems, scope, opportunities and r r
objectives by consulting appropriate person
3. Documented the Server specification requirement. r r
4. Installed network operating system (i.e. Windows Server 2012) r r
5. Patched and updated the OS and applications r r
6. Configured IP addressing r r

Assessment Resources ICTNWK505

7.  Updated Windows Server 2012 r r
8.  Installed and configured DNS Server r r
9.  Installed and configured DHCP Server r r
10. Installed and configured FTP Server r r
11. Configured automatic update on server and applications r r
12. Configured mail server and web access mail. r r
13. Tested the server and record the result. r r
14. Identified the server problem and Troubleshoot using tools. r r
15. Analyzed the errors to make the changes r r
16. Performed the testing again. r r
17. Documented the configuration details. r r

Assessor Use Only

Satisfactory (S) Not Satisfactory (NS) Assessor Signature: _______________________________ Date: _____________

COIS13013 | VISUAL DSS | Information Technology

This assessment item relates to course learning outcomes numbers 1, 2 and 6 as stated on the course profile. This part emphasizes on the use of a DDS tool, and students are required to demonstrate proficiency with Visual DSS™ (a DSS development language/DSS generator).

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/COIS13013-VISUAL-DSS-Information-Technology.pdf” width=”100%” height=”400″ ]

 

 

 

TECH 1130 | Draft Technical Report/Technical Report | Mech

TECH 1130 has provided you with the skills and strategies that technicians use to produce strong, technical writing. Your understanding of the pyramid technique, the report format, information and design techniques, paragraph and sentence structure

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/TECH-1130-Draft-Technical-Report-Technical-Report-Mech.pdf” width=”100%” height=”400″ ]

 

CSG 5308 | Wireless Security | Information security

Wireshark is a network sniffer and analyser tool which can be used by IT administrators, developers, hackers, incident response or security researchers to capture and analyse wired or wireless traffic. This allows you to “see” all traffic that is sent and received when computers interact with one another. A few examples of this include downloading a file from the Internet.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/CSG-5308-Wireless-Security-Information-security.pdf” width=”100%” height=”400″ ]

 

Parallel System | Information Technology

Consider the system shown in Figure 1, which is a model of an active redundant generator at a main exchange of Telecommunication Company.

 Input

 Figure 1: Active redundant generator pair

Assume that the reliability of each subsystem (or component) i has the reliability.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/Parallel-System-Information-Technology.pdf” width=”100%” height=”400″ ]

 

ITAP1004 | Website Development | Information technology

You are to develop from the beginning a web site about yourself with regard to accommodation. This web site provides certain required details about your experience in accommodation in which you have stayed. You will design and develop your web site with Notepad/Notepad++, HTML, Java Script and CSS.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/ITAP1004-Website-Development-Information-technology.pdf” width=”100%” height=”400″ ]

 

 

Usability Engineering | Information technology

Important Instructions

You must work in groups. The recommended (and minimum) group size is 3 and the maximum is 4. Only one submission should be made per group. Make sure that every group member’s name is on the submission.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/Usability-Engineering-Information-technology.pdf” width=”100%” height=”400″ ]

 

 

Abstracts | Information Technology

Write four (4) abstracts: each abstract should be 300 words . the four (4) nominated readings in the Reading Material and Exercises book (RME). The nominated readings for the current study session are listed below. 1. Under each of the four (4) abstracts, write a 150 word example of how each reading relates to your work experience, or how they could relate to an imaginary work situation.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/ABSTRACTS-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]

 

COIT 20246 | ICT service management | Information Technology

Instructions

It will be necessary to use literature/online resources to complete this assignment, please ensure you cite and reference any such materials using the Harvard format.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/COIT-20246-ICT-SERVICE-MANAGEMENT-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]

 

ITECH1103 | Big Data and Analytics Group Assignment | Information Technology

Task 1- Background information

Write a description of the selected dataset and its importance given the Solar Cities project, i.e. the Solar Cities project is attempting to understand power usage in dwellings, in order to then recommend how to improve the overall efficiency of power consumption in dwellings. Information must be appropriately referenced. [1 Page]

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/ITECH1103-BIG-DATA-AND-ANALYTICS-GROUP-ASSIGNMENT-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]

 

ITC 542 | Security fundamentals | Information Technology

This assessment aims to develop and gauge student understanding of the key topics covered so far by answering the following questions. Answering these questions will help you build some understanding for the next assessment item as well as for the entire subject. It is expected that answers to the assignment questions be succinct (i.e. precise and concise) with all sources of information fully referenced as per APA referencing style.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/04/ITC-542-SECURITY-FUNDAMENTALS-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]

 

ITECH1100 | Page Life | Information technology

Assignment 1 – Page Life

Overview

For this individual assignment, you will use skills acquired through practical laboratory exercises to automate a business process, and to visualize the impact of the automation.

You should use Microsoft Excel (or equivalent open-source software) for this assessment task.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/ITECH1100-PAGE-LIFE-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]

CIS5308 | Management of IT Services Report 1 | Information Technology

Report 1 Specification

Report 1 requires you to watch a webinar video, then draw on the course materials and research relevant academic sources (e.g. textbook, journal/ conference papers) to prepare a report as per the requirements presented below.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/CIS5308-MANAGEMENT-OF-IT-SERVICES-REPORT-1-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]

INFS 5093 | Systems Planning Assignment | Information Systems

Introduction

This assignment consists of

  • A case study, which requires you to apply your learning from the systems planningmodule.
  • An ethical analysis which requires you to apply one of thereadings provided on the course website.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/INFS-5093-SYSTEMS-PLANNING-ASSIGNMENT-INFORMATION-SYSTEMS.pdf” width=”100%” height=”400″ ]

CIS8009 | Management of Business Telecommunications | IT Assignment

Background

The size of these organisations is important as their current and future requirements would be different. When you are selecting these organisations, consider their footprint, such as are they operating within one country only, are they branching out to another country or are planning to do so, or are they already operating on a global scale?

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/CIS8009-MANAGEMENT-OF-BUSINESS-TELECOMMUNICATIONS-IT-ASSIGNMENT.pdf” width=”100%” height=”400″ ]

Cloud Basics Questions Online Test | Cloud Computing

Question 1

Horizontal scaling out involves allocating:

  • More IT resources that have just been purchased
  • More IT resources of highly capacity
  • More IT resources of the same type

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/03/CLOUD-BASICS-QUESTIONS-ONLINE-TEST-CLOUD-COMPUTING.pdf” width=”100%” height=”400″ ]

ITECH 5500 | Professional Research and Communication Sample | IT

Part A

Abstract

This assignment intensely focuses on the aspect of self-efficacy to generate sustainable knowledge about the use and importance of it for every individual of every possible trait. This assignment has also depicted the definition of self-efficacy that enhances the behavioural efficiency to imbue confidence in a person. The major factors that contribute to the self-efficacy is discussed here along with its basic and operational difference with efficacy or collective efficacy. This assignment has also dealt with literature review based on the topic of self-efficacy in sports with four different article journals to reveal sustainable knowledge about the usefulness of this aspect.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/02/ITECH-5500-Professional-research-and-communication-sample-Information-Technology.pdf” width=”100%” height=”400″ ]

ITC 556 | QUERY AND UPDATE DATABASES USING SQL | IT

Task

NOTES

  • This assignment requires you to use SQLite to complete the tasks listed below.Student can also use SQL Workbench or another software (if they are familiar) to complete the tasks.
  • For guidance on how to install SQLite.
  • For guidance on how to create tables using SQLite.
  • Typing the SQL statements or the results is NOT acceptable.
[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/02/ITC-556-QUERY-AND-UPDATE-DATABASES-USING-SQL-Information-Technology.pdf” width=”100%” height=”400″ ]

ITC504 | DESIGN CONCEPT | USER INTERFACE

Task

Overview
You are to develop at least two different initial concept designs that would meet the requirements of the Local Farm Shop. These designs will be wireframe only designs at this stage.
The Local Farm Shop case study is located in Interact Resources. You need to read this case study before starting this assessment item.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/02/ITC504-DESIGN-CONCEPT-USER-INTERFACE.pdf” width=”100%” height=”400″ ]

ITC544 | Computer Organization and Architecture | IT

This assessment gives the knowledge of the function and designs many computer system components essential to procedure information digitally. It improves understanding of computer hardware and computer organization.

Learning outcomes

After submission of this assessment, you should be able to:

1. Show and use terminologies of computer organization and architecture

2. implement an understanding of data representations and calculations to practical situations;

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/02/ITC544-Computer-Organization-and-Architecture-Information-Technology.pdf” width=”100%” height=”400″ ]

S-ITC513 | WIRELESS NETWORKING CONCEPTS ASSESSMENT ITEM THREE | IT

Task

    1. Compare and contrast three data encryption standards for WiMAX networks? [4 marks]
    2. How is the traffic coordinated in shared wireless medium? Explain additional methods to reduce collisions in shared wireless medium. [4 marks]
    3. Read the two recent research papers on the topic of Internet of Things (IoT) as saved in the resources folder; please give your critical reflection on the topic of Energy Harvest. [4 marks]

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/02/S-ITC513-WIRELESS-NETWORKING-CONCEPTS-ASSESSMENT-ITEM-THREE-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]

 

ITC563 | CRITIQUE IN SYSTEMS AND TECHNOLOGY | IT MANAGEMENT ISSUES

Task

Journal Entry. The Journal function in Interact2 must be used. External journal sites are not permitted. If your country geo-blocks Interact2 website or your circumstance prevents you from accessing the Internet (eg. due to a disability or if you are in a correctional centre), please contact your lecturer immediately. If it is an office/organisation firewall preventing access, you must find an alternative Internet access point to complete this task.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/02/ITC563-CRITIQUE-IN-SYSTEMS-AND-TECHNOLOGY-IT-MANAGEMENT-ISSUES-1.pdf” width=”100%” height=”400″ ]

 

CS-406 | PROGRAMMING ASSIGNMENT 2 QUESTION | IT

Snake Game simulation

In this exercise you will simulate a parallel version of the classic Snake game. In this version, a snake occupies a number of adjacent cells on a square cell grid. It moves through the grid by choosing a direction (up, down, left or right) and moving its head to that position. After the head cell moves, each cell in the body moves, with the first cell of the body moving to where the head was, the second cell moving to where the first was and so on. If the head tries to move to a cell that is currently occupied by another snake or itself, the snake dies and does not move any more. Please note that the snake does not move backwards, thus, at every turn it will only have three directions to chose from. The movement of a snake must appear atomic to other snakes.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/02/CS-406-PROGRAMMING-ASSIGNMENT-2-QUESTION-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]

ITC563 | CASE STUDY ANALYSIS AND EVALUATION | IT MANAGEMENT ISSUES


Task

Journal Entry. The Journal function in Interact2 must be used. External journal sites are not permitted. If your country geo-blocks Interact2 website or your circumstance prevents you from accessing the Internet (eg. due to a disability or if you are in a correctional centre), please contact your lecturer immediately. If it is an office/organisation firewall preventing access, you must find an alternative Internet access point to complete this task.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/02/ITC563-CASE-STUDY-ANALYSIS-AND-EVALUATION-IT-MANAGEMENT-ISSUES-3-files-merged-1.pdf” width=”100%” height=”400″ ]

ITC563 | ICT IN BUSINESS | IT MANAGEMENT ISSUES

Task

Journal Entry. The Journal function in Interact2 must be used. External journal sites are not permitted. If your country geo-blocks Interact2 website or your circumstance prevents you from accessing the Internet (eg. due to a disability or if you are in a correctional centre), please contact your lecturer immediately. If it is an office/organisation firewall preventing access, you must find an alternative Internet access point to complete this task.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/02/ITC563-ICT-IN-BUSINESS-IT-MANAGEMENT-ISSUES.pdf” width=”100%” height=”400″ ]

 

ITC540 | INFRASTRUCTURE MANAGEMENT PG INTRODUCTION | IT

TASK

Provide information and discuss the following topics:

    • An introduction of yourself (your work, hobby, interests …).
    • Why IT is important to your career?
    • What is IT Architecture and how does the benefit outweigh the costs?
    • Why is data mining becoming more important?
    • What are the benefits of cloud computing?
    • What role does personal conflict or politics play in the success of data governance?

ITC540 | INFRASTRUCTURE MANAGEMENT PG DATA GOVERNANCE | IT

Question 1 [4 marks]:

Define and explain the concept of the following terminologies:

  • Electronic Records Management;
  • Business intelligence (BI) and Analytics;
  • Data and text mining;
  • Big data analytics and data discovery;
  • Enterprise architecture;
  • Management information systems;
  • Data life cycle and data principles;
  • Cloud computing.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/02/ITC540-INFRASTRUCTURE-MANAGEMENT-PG-DATA-GOVERNANCE-IT.pdf” width=”100%” height=”400″ ]

 

ITC540 | INFRASTRUCTURE MANAGEMENT PG CASE STUDY | IT

Task

Task A (10 marks):

Study “Case DATA ANALYSIS: AstraZeneca Terminates $1.4B Outsourcing Contract with IBM” in your text book [Chapter 12] and answer the following questions:

  • What mistakes did AstraZeneca make?
  • What mistakes did IBM make?
  • Why are outsourcing contracts for five or more years?
  • Why do you think two major corporations could make such mistakes?
  • Do you think the 2007 SLA was doomed to fail? Explain your answer.
  • What provisions in the 2012 SLAs protect AstraZeneca and the vendors?
  • Why would parties prefer to use an arbitrator instead of filing a lawsuit in court?

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/02/ITC540-INFRASTRUCTURE-MANAGEMENT-PG-CASE-STUDY-IT.pdf” width=”100%” height=”400″ ]

 

ICT705 | DATA AND SYSTEM INTEGRATION TASK 2 | INFORMATION TECHNOLOGY

Task 2

Consists of a demo code package and a technical report for the integration plan. Submit your work as a .zip file, which contains the code files (another .zip file) and your report (a .docx file), to Blackboard Task 2. Please follow the submission instructions described in this document.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/02/ICT705-DATA-AND-SYSTEM-INTEGRATION-TASK-2-INFORMATION-TECHNOLOGY-1.pdf” width=”100%” height=”400″ ]

CSC8512 | ASSIGNMENT 1 | INFORMATION TECHNOLOGY

Instructions

This assignment consists of 4 questions each of equal value. They con-sist of common tasks required of a system administrator—tasks I have had to do at some time in the past Be aware that some questions require that you use the Virtual Machine supplied for the course. The question will clearly state that the course Virtual Machine must be used, if it doesn’t then you are free to use your favourite flavour of Unix.

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/02/CSC8512-ASSIGNMENT-1-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]

COIT20262 | ADVANCE NETWORK SECURITY | INFORMATION TECHNOLOGY

Question 1. Analysis of Protocols with Wireshark [14 marks]

Objective: Gain a good understanding of common Internet protocols as well as using packet capture software (Wireshark)

The   file    a01-assignment-1-question-1-capture.pcap  on  Moodle  contains  packets

captured in an exchange between several computers.

The capture was performed in an internet where all subnets used a /24 mask. The capture was performed on interface eth1 on a computer with the following details:

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/02/COIT20262-ADVANCE-NETWORK-SECURITY-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”401″ ]

 

ITECH 3301 | ELECTRONIC COMMERCE SYSTEM AND TECHNOLOGIES | INFORMATION TECHNOLOGY

Tasks

  1. Clearly state which e-commerce business model you have For each chosen website report the business name, the homepage URL, and include a screenshot of the homepage (as an appendix).
  2. For each chosen website, in one or two paragraphs, explain why the website belongs to that particular e-commerce business
  3. For each chosen website, in one or two paragraphs, identify what you think is/are the principal business goal(s) of the
  4. For each website, consider the following attributes and assess them on the following five-point semantic differential scale and, for each attribute, briefly explain why you give that rating:

[googlepdf url=”https://assignmentquestion4me.com/wp-content/uploads/2018/02/ITECH-3301-ELECTRONIC-COMMERCE-SYSTEM-AND-TECHNOLOGIES-INFORMATION-TECHNOLOGY.pdf” width=”100%” height=”400″ ]