page-header

In: Information Technology

08
Jan

(COST – 130AUD) COIT 20246 Assignment | 10 tasks

Note:  Each resource summary should be a maximum of 300 words. Week 1 Task The past decade has witnessed tremendous advances in computing, wired and wireless communication, and storage technologies. Discuss the main features and applications of two mass storage technologies namely: direct-attached storage and network-attached storage. Summary Title and Reference:   Evolution of DAS and NAS.   Anon, 2017, [online] viewed on 13-Nov-2017, <https://www.siemon.com/us/white_papers/14-07-29-data-center-storage-evolution.asp> Summary:   Week 2 Task Real-time operating systems are operating systems that guarantee a certain capability within a specified time constraint. Discuss the main benefits of real-time operating systems for the health sector. Summary Title and…

26
Dec

IT Assignment | C# assignment

The submission is in the form of five documents/files: 1.         Stage 1 – Development Document 2.         Stage 2 – Report (IDE Evaluation)    3.         Stage 3 – Report (Debugging Evaluation) 4.         Stage 4 – Report (Evaluation Report) including fully commented source code    5.         An installable and executable version of your application  You are required to make use of appropriate structure, including headings, paragraphs, subsections and illustrations as appropriate, and all work must be supported with research and referenced using the Harvard referencing system.   Unit Learning Outcomes:     LO1 Define basic algorithms to carry out an operation and outline the process…

15
Dec

COIT20248 Information Systems Analysis and Design Assignment 1 – About Systems Development

 Assignment 1 – About Systems Development Objectives This assessment relates to course learning outcomes 1, 2, 3 and 4 stated in the e-course profile. Assessment 1 is an individual assessment. In assessment 1, you are assigned tasks which assess your course knowledge gained between weeks 1 and 5 about different facets of systems development. All students will have to write a report showing the answers to the questions in tasks 1-5 below. Please note that ALL submitted A2-reports are passed through a computerized copy detection system and it is extremely easy for teaching staff to identify copied or otherwise plagiarised work. •…

15
Dec

COIT20248 – Information Systems Analysis & Design

The Case: Brisbane Multi-Faith Temple “Brisbane Multi-Faith Temple” (BMT) is a charitable organisation run by a group of volunteers and the chairman of the organisation is Sam Sharma. Sam along with other volunteers started the first temple at Mount Cotton. The multi faith temple gained huge popularity in a short period of time and due to its increased patronage the organisation decided to open additional temples in Rocklea, Toowoomba, Sunshine Coast and Gold Coast. Collectively all the sites serve over 2,500 people per day. When the initial temple was opened at Mount Cotton, it had two priests, 1 admin staff and…

11
Dec

COIT20248 Information Systems Analysis and Design

Objectives This assessment relates to course learning outcomes 1, 2, 3 and 4 stated in the e-course profile. Assessment 1 is an individual assessment. In assessment 1, you are assigned tasks which assess your course knowledge gained between weeks 1 and 5 about different facets of systems development. All students will have to write a report showing the answers to the questions in tasks 1-5 below. Please note that ALL submitted A2-reports are passed through a computerized copy detection system and it is extremely easy for teaching staff to identify copied or otherwise plagiarised work. • Copying (plagiarism) can incur penalties…

11
Dec

Assignment 1: Cryptography – Cryptography Assignment Help

Assignment 1: Cryptography Due Week 4, Worth 10%   Question 1: Security professionals need to ensure that they keep up to date with the latest threats and security issues. This allows them to update their risk profiles, such as identifying if their systems are vulnerable. In order to determine what the risk to an organisation is, you need to know what the problems could be. In this assignment, your task is to identify a recently announced security vulnerability and write a profile of the threat. The profile should contain the name of the threat, the systems it attacks, how it…

28
Nov

COIT 20268 – Responsive Web Design (RWD)

Main Task Select and undertake an in-depth evaluation of the following website: Website:  (Queensland University of Technology(QUT)) Upon the completion of the task, you are to provide a formal report documenting your critical evaluation of the website. The review is to be carried within the context of responsive web design (RWD) and development principles. The report should draw particular attention to the interactive aspects and design aspects relating to responsiveness of the overall website. Support your critique with appropriate RWD principles. What to Review The purpose of the report is to provide a critical evaluation of the nominated website and to support your observations and comments…

07
Oct

INF60012 Communication Practical Report

INF60012 Communication Practical Report (30% of total mark) Semester 2, 2017 Case Study: Mobile Health Electronics Ltd Manufacturing – Make to stock Background Mobile Health Electronics Ltd (MHE) is an Australian manufacturer of wearable monitoring devices that are sold for use in hospitals and retail outlets. Their home office is in Melbourne, which is also the headquarters for the main sales office. A sales office is also located in Sydney, NSW. The company has two manufacturing plants in Australia: one in Melbourne, and another one in Liverpool, NSW. Distribution centres are also located at each of the current manufacturing plants. The…

28
Sep

COIT 20253 Assignment 3 Creating a Big Data Strategy

Objectives This assessment relates to course learning outcomes 2, 3, 4, 5, 6 and 7 stated in the e-course profile. Assessment 3 is an individual assessment. Please note that ALL submitted A2-reports are passed through a computerized copy detectionsystem and it is extremely easy for teaching staff to identify copied or otherwise plagiarised work. • Copying (plagiarism) can incur penalties ranging from deduction of marks to failing the course or even exclusion from the University. • Please ensure you are familiar with the Academic Misconduct Procedures, available from: The tasks In recent years, the ability of Business Intelligence (BI) technologies to…

27
Sep

IT risk management

All your report should be written on the COMPANY you CHOOSE. NOT in general.  Choose 1 company of your choice with in Australia.  Preferably any IT Security company or any company where one of the following aspects can be discussed.  Choose 1 project out of the following for writing your report.  Allowing employees to bring their own devices (laptops, tablets and mobile phones for example) into the workplace to be used as their main or sole devices in achieving their work tasks. • Migrating business-critical applications and their associated data sources to an External Cloud hosting solution….