State the uses of emerging technologies within key industry contexts and Explain the concepts of software development within key industries.

OverviewFor this assessment task, you will create a two-minute video and written proposal about the impactof a particular technology on an industry or field.The purpose of this assignment is for you to develop your big-picture thinking, and to explore variousimpacts of the ever-changing IT industry.Timelines and ExpectationsPercentage Value of Task: (See course description for dates)Minimum time expectation: 40 hoursLearning Outcomes AssessedThe following course learning outcomes are assessed by completing this assessment:• A3. Apply business information software for data visualization and analysis purposes;• S2. Review a range of information system applications;• S3. Interpret and construct representations of business data flow and processes;• K2. State the uses of emerging technologies within key industry contexts; and• K6. Explain the concepts of software development within key industries.Assessment DetailsThe Digital Revolution is not limited to the past – we should expect changes to continue for theforeseeable future. The aim of this assessment is for you to explore how IT might change a particularindustry in the future, based on current trends and upcoming technologies.For this assignment, you need to create a short video. There are many different tools available to helpdo this; Windows Movie Maker is available in the labs. It is also acceptable to perform a single-takevideo using a smart device or webcam.Your topic must be automatically generated, based on your student ID. Please use the TopicGenerator link in Moodle, and choose only one of the topics available.Topics are of the form:“The potential impact of {Technology} on {Industry or Activity}”.Not all options are strictly technologies – some are applications of technologyCRICOS Provider No. 00103D Assessment Task – Video and Disruption Report.docx Page 2 of 6PreliminariesCreate an ePortfolio page which you will use to submit your work. Make sure you keep the pageprivate – you do not need to set the visibility of your ePortfolio to public for this assessment task.Access the Topic Generator through Moodle, and choose one of the available topics.Part one – ResearchThe first step to creating your video and report is to explore both the technology and the industry, tounderstand the potential impacts.Write a short description of the technology and the industry (150-300 words each), and add bothto your ePortfolio page. You may use any relevant sources, including websites, blogs, tweets, journalarticles and textbooks. Ensure you reference any sources appropriately.Part two – BrainstormingFor your topic, list at least three ways the technology may change or disrupt the industry. Include thislist on your ePortfolio page.If you are having trouble, remember that this is a creative task – it’s ok for your ideas to be 10 or 30years in the future. The more you can come up with at this stage the better, even if you think yourideas are completely implausible.Some hints:• Consider the impact of the technology on the people in the industry; will itmake their lives easier or harder?• Can you draw parallels to other industries where your technology may havehad impact?• Are there other technologies you’re aware of that might, together with yourchosen technology, have a stronger combined impact?• Creative thinking requires a dedicated block of time and the freedom to playaround with ideas. Don’t leave it to the last minute!Once you have brainstormed a number of impacts, choose one to focus on for the next twoassignment parts. Review the rest of this assignment specification before choosing.Part three – Regulation and EthicsChoose one technology impact from the previous exercise, and identify at least four factors orconstraints that make this impact possible, or which might prevent it occurring.Frame these within Lawrence Lessig’s regulations – Market, Law, Architecture (Physical/Natural) andNorm(Social/Ethical). Include them in your ePortfolio page.At least one of the factors or constraints should be ethical in nature.You may choose to identify one factor or constraint for each of Lessig’s categories,or have multiple in one category. For example, it is ok to have three Marketconstraints and one Norm constraint

What is the difference between Infrastructure and ad hoc modes in WLAN?

Assignment No 21. Convert the binary data “011010” into analog waveforms using following modulationtechniques:a. Two level Amplitude Shift Keyingb. Two level Frequency Shift Keyingc. Two level Phase Shift Keyingd. Differential Phase shift keyinge. Four level Amplitude Shift Keyingf. Four level Phase Shift Keyingg. Eight level Amplitude Shift Keying2. With fc = 500 kHz, fd = 25 kHz, and M = 16 (L = 4 bits), compute the frequencyassignments for each of the sixteen possible 4-bit data combinations.3. Draw the approximate Analog Modulation and Frequency Modulation waveforms incomplete steps for the following signal:4. Draw the 16 QAM Constellation Diagram having two different amplitude levels and eightdifferent phase levels.5. Explain and draw the Error Detection Process for Cyclic Redundancy Check (CRC).6. Compute the frame check sequence for the following information:Message = 10111100, Pattern = 110117. Compute the transmitted signal using Direct Sequence Spread Spectrum for thefollowing information:Input: 1011, Locally Generated PN bit stream: 101011011010, T = 3Tc8. What is the difference between Infrastructure and ad hoc modes in WLAN? Draw theirrelative diagrams as well.9. Compare the differences of TCP and OSI protocols for wired and wireless LANs usingdiagrams.10. Explain why the square and circle shapes cells for cellular communications are notappropriate as compared to hexagonal shape cells.

Understand the fundamental principles of the networking and data requirements of a network.

The purpose of this assignment is to develop data models and map Database System into a standard development environment to gain understanding of data model development. Then implement the data model using a commercially available database management system development tool.On completion of this assignment students will be able to:a. Understand the fundamental principles of the networking and data requirements of a network.b. Identify organisational information requirements.c. Model organisational information requirements using conceptual data modelling techniques.d. Convert the conceptual data models into relational data models and verify their structural characteristics with normalisation techniques.e. Implement and utilise a relational database using a database system.Questions:1. Complete the information-level design for a database that satisfies the following constraints and user view requirements. In order to complete this information–level design you are required to answer the questions given below 1(a) – (e).Mindful Body Fitness Company is planning to design a data model to hold information relating to their programs, coaches, exercise logs and their customers. As a database designer for Mindful Body Fitness, you need to ensure that each Exercise Log has a unique ID number, Date, Exercise category, Exercise sub category, Time spent, calories burnt.Each customer has a unique Cust_number and their first name, last name, address, program number, program tile and Payment must be recorded.Every program has a program number (PNum) that uniquely identifies the program. The program title, StartDate, Finish Date, Price must also be recorded.Each coach has a unique ID number. Their first name, last name, date of birth, address, contactNo, user name and password must be recorded.A coach can work on only one program. A program can have one or more coaches associated with it. One customer can enrol for only one program at one time.Write down any assumptions you make, if they are not explicitly described here.a. Identify and list entities described in all user requirements given above. (5 Marks)b. Add attributes to these entities and represent them as a collection of tables and attributes (Database schema): e.g. Customer (Customer_Num, Cust_First_Name,. . . . . . )Note: Select and underline suitable primary key for each table. (5 Marks)c. Outline 3 business rules that describe the relationships between entities. (5 Marks)Note: You can make assumptions to create certain relationships, if it is not specifically mentioned in the given business rules.e.g. A Coach can work on only one program.d. Determine the functional dependences. (5 Marks)e.g. Customer_Num ? Cust_First_Name e. Then normalise these tables. Make the normalization to 3NF. State for every step in the normalization, which functional dependency causes it.

Define views and formulate efficient queries using a query language, and Be knowledgeable about issues relating to data access and retrieval, storage, ethics and privacy.

a)b)c)To gather, critically analyse, manage and present inmeaningful ways information and data, andTo act as an ethical practitioner while demonstrating skillsin data analysis, database design, system design, webdesign and software development and testing.To implement and document user experience analysis,design and testing.a)b)c)Design and build relational databases.Define views and formulate efficient queries using a querylanguage, andBe knowledgeable about issues relating to data access andretrieval, storage, ethics and privacy.ASSESSMENT DESCRIPTION:This assessment is an individual Project.International Parcel Service (IPS) has asked you to design and implement their system. Thecompany wants to store the records of customers, employees, retail centres and items being shipped.The heart of IPS system is the item being shipped.DescriptionThe shipment process starts when items are received into the system at a single retail centre.Retail centres are characterized by their type, uniqueID, address and employees that are working inthat centre. The system records the name of the employee who has received the item at the retailE.g. a task marked out of 40 will incur a 2 mark penalty .Student Policies and FormsKent Institute Australia Pty. Ltd.Assessment Brief ABN 49 003 577 302 CRICOS Code: 00161E RTO Code: 90458Version: as atTEQSA Provider Number: PRV12051centre. Shipped items can be characterized by item number (unique), weight, dimensions, insuranceamount, destination, final delivery date and any special instructions given by the customerregarding handling of the item.Once an item is received, a receipt is generated which is given to the customer. The receipt containsthe information such as item number, date on which item is received, and the charges paid. Shippeditems make their way to their destination using many transportation modes such as flights or trucks.The transportation of every single item is recorded with transportation events which arecharacterized by a unique scheduleNumber, a type (e.g, flight, truck), and a deliveryRoute.Tasks to be completedGiven the above information:1. Create a complete ERD with all entities and relationships to support the IPS needs asdescribed above. The entities should have appropriate attributes and suitable data types.Every relationships should have appropriate connectivity and cardinalities.2. Convert the ERD to a set Relational tables in at least 3NF and draw a dependency diagram.3. Create a database using MS ACCESS – with primary keys, foreign keys and other attributesmentioned for each entity using proper constraints.4. Create a form to input/update data for ITEMS.5. Input some significant data in each table showing your understanding of the scenario.6. Create three queries – SELECT, JOIN and one NUMERIC Function query; you can use anytables and any fields.7. Create a report using any one of the above queries.List any additional business rules that you may assume to submit the ERD and database as completeas possible.ASSESSMENT SUBMISSION:The assignment must be submitted online in Moodle. All materials MUST be submittedelectronically in Microsoft Word format. Other formats (e.g., pdf or MAC file) may not bereadable by markers. Please be aware that any assessments submitted in other formats will beconsidered LATE and will lose marks until it is presented in MS Word. No paper based orhardcopy submission will be accepted.

Demonstrate project leadership skills; identify and assess risk in designing, executing a major project.

The purpose of this assignment is to develop a well-researched project planning document based on the overall parameters of a networking related project, establish an appropriate project management plan, and quality environment required to complete the chosen project. Furthermore, analyse project issues, conduct post-project review (i.e., lessons learned) and make recommendations for improvements for future projects. It addresses the following learning outcomes:b. demonstrate project leadership skills; identify and assess risk in designing, executing a major project;c. critically reflect on current project management ethics, research, and theory and practice;d. lead and manage projects effectively through planning, leadership, monitoring, teamwork, and global awareness;

Document Preview:

Assessment Details and Submission GuidelinesUnit CodeMN601Unit TitleNetwork Project ManagementPeriodTrimester-1, 2019Assessment Assignment-2TypeIndiviual Assignment Purpose of the assessment (with ULO Mapping)The purpose of this assignment is to develop a well-researched project planning document based on the overall parameters of a networking related project, establish an appropriate project management plan, and quality environment required to complete the chosen project. Furthermore, analyse project issues, conduct post-project review (i.e., lessons learned) and make recommendations for improvements for future projects. It addresses the following learning outcomes:

b. demonstrate project leadership skills; identify and assess risk in designing, executing a major project;
c. critically reflect on current project management ethics, research, and theory and practice;
d. lead and manage projects effectively through planning, leadership, monitoring, teamwork, and global awareness;Weight20%Total Marks100Word count1800 – 2000Submission GuidelinesAll work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.
The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.
Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using APA or IEEE referencing style.ExtensionIf an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School’s Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available at:
HYPERLINK “http://www.mit.edu.au/about” http://www.mit.edu.au/about HYPERLINK…

Critically analyse and use complex decision making to research and determine the appropriate Software Engineering tools and methodologies to utilize in a given situation.

OverviewThis assignment provides students with the opportunity to apply the knowledge and skills developedduring the semester. Students work in small teams (3-4) for assignment 2, in which they complete aformal specification for a library system.Timelines and Expectations(week 11)Percentage Value of Task: 20%Minimum Time Expectation: more than 10 hoursStudents will design, implement and test a specification for a system and answering questions relatingto the artifacts provided.Learning Outcomes AssessedThe following course learning outcomes are assessed by completing this assessment:Skills:S1. Critically analyse and use complex decision making to research and determine the appropriateSoftware Engineering tools and methodologies to utilize in a given situation.S2. Apply professional communication skills to support and manage the engineering of a large softwaresystem.S3. Review, critically analyse and develop artefacts to define processes for quality assurance, riskmanagement and communication in large software development projects.S4. Implement quality assurance activities in order to verify user requirements and validate designdecisions.Application of knowledge and skills:A1. Analysis of a large system development problem to decide upon the best methodological approach.A2. Development of appropriate artefacts to support and manage the software engineering process suchas change control and configuration management.CRICOS Provider No. 00103D ITECH7410 Assignment 2 – Group Page 2 of 3Assessment Details1. Students will need to develop schema that will model a library – containing only books – andbe able to perform the following tasks:• Add a book• Add a borrower• Delete a book• Delete a borrower• Lend a book to a borrower• Return a book from a borrower• Enquire about a book• Reserve a book• Enquire about a reservation• Cancel a reservation• Buy a Book• Receive a Book• Report of Books on Loan2. The schema must be consistent and be shown to work using examples3. Schema need to be annotated so that the Z statements are clearly expressed in plainlanguage4. Write three (3) non-trivial predicate statements about your system; explain them and showthat they are trueSubmissionSubmit your specification, via Moodle, as a Word document labelled in the following way:StudentID1_StudentID2 ? ? ? .docxAttach all files that are needed (the report plus up to 4 files) in order to mark this assignment by yourlecturer/tutor

Identify and discuss how easy is it for a threat actor to use Google dorking?

A. Google Dorking (maximum 600 Words)Google Dorking, or using advanced Google search techniques to find sensitive information, has been linked to “online dumpster diving.” Use Library/Internet resources to research Google dorking. Based on your research address following:1. How the following advanced Google search engine operators are used:allintext, allintitle, allinurl, cache, filetype, inanchor, intest, intitle, link, site, +, |, and *2. Use at least four of the operators to create potential Google dorking searches and provide discussion with snapshots.3. Identify and discuss how easy is it for a threat actor to use Google dorking?4. Provide recommendations for users and organisations to combat Google dorking.B. Recommended Cryptoperiods (maximum 600 Words)A cryptographic key is a value (essentially a random string of bits) that serves as input to an algorithm, which then transforms plain text into ciphertext (and vice versa for decryption). One of the important characteristic that determines key strength is its cryptoperiod. Or the length of time for which the key is authorised for use.1. From current literature survey, critically analyse and discuss cryptoperiods for hash, symmetric, and asymmetric algorithms. Find at least three sources for each of the algorithms (select two algorithms from each category).2. Draw a table to list the algorithms and the recommend time, and then calculate the average of each.3. Provide recommendation on the cryptoperiods for each selected algorithm.E. ReferencesMust consider at least five current references from journal/conference papers and books. Must follow IEEE Transactions on Networking style.

List and discuss the basic categories of NoSQL databases and Outline the differences between these categories and give examples where these are used.

TaskThis Assessment comprises two parts. Please refer to the submission instructions section for submission of each part.Assessment Part A: (10 MARKS)From Resources under Main Menu in Interact 2 go to Assignment 5 FolderNOTES• This assignment requires you to use SQL Workbench to complete the tasks.Instruction sheet on how to install SQL Workbench will be placed under ‘student resources’ on Interact2.• You will need to download and use the file ‘Assignment5’, from Interact2 Student Resources in the ‘Assignment 5 – SQL DB’ folder.• Queries need to have the correct syntax and must show the results after execution:Typing the SQL statements or the results is NOT acceptable.Write and run SQL statements to complete the following tasks1. List the names and codes of vendors and the number of products each vendor has supplied, i.e. vendor AA has supplied xxx products, and vendor BB has supplied yyy products etc.2. Show the total value of invoices for each customer with the customer the Last Name, and a column heading showing ‘Total_invoice_value’ in the results.3. List the names of the customers and how many times a customer generated an invoice: make sure the new column heading reads “Num_Of_Invoices”.4. Through a calculation, show the Total unit price (aliased column) for the units and line price.5. Show the details of the invoice that has the minimum subtotal.6. List all the purchases made by customer Orlando. (use a natural join).7. Add a new vendor row/record in the vendor table and use your teacher’s name and your choice of other details. (1m)8. Add a new row/record to the `customer` table to include your actual student_ID in the CUS_CODE, your last_name as the CUS_LNAME` and your first name as CUS_FNAME. Add any other details of your choice in all the other fields.9. Add a new attribute (field) ‘Customer_rating’ with data type and length ‘VARCHAR(14) to the vendor table.10. Update ‘Customer_rating’ for the Customer that has ‘your student ID and name’ from point 2, to show ‘GREAT’.Assessment Part B (approx. 500-550 words): 10 MARKSNote: you are expected to conduct research about current and future Database technologies by answering the below question:Research Question: List and discuss the four basic categories of NoSQL databases: outline the differences between these categories and give examples where these are used.Note: Use proper references in the APA style.Submission Instructions:You are required to submit the following file:A Word document with 2 parts –Part A: the SQL statements for each query (should be copied from your Workbench software into your Word assignment file): The screenshots of the results of the SQL statements copied and pasted into your submission file immediately after you execute the SQL query and under the SQL statements for the question.Part B: Your researched answer in about 500-550 words on NoSQL database technologies.Rationaleback to topThis assessment task will assess the following learning outcome/s:• be able to use complex SQL commands to query a database.• be able to research a recent development in the field of database technology.

Apply professional communication skills to support and manage the engineering of a large software system.

OverviewThis assignment provides students with the opportunity to apply the knowledge and skills developedduring the semester. Students work in small teams (3-4) for assignment 2, in which they complete aformal specification for a library system.Timelines and Expectations Percentage Value of Task: 20%Minimum Time Expectation: more than 10 hoursStudents will design, implement and test a specification for a system and answering questions relatingto the artifacts provided.Learning Outcomes AssessedThe following course learning outcomes are assessed by completing this assessment:Skills:S1. Critically analyse and use complex decision making to research and determine the appropriateSoftware Engineering tools and methodologies to utilize in a given situation.S2. Apply professional communication skills to support and manage the engineering of a large softwaresystem.S3. Review, critically analyse and develop artefacts to define processes for quality assurance, riskmanagement and communication in large software development projects.S4. Implement quality assurance activities in order to verify user requirements and validate designdecisions.Application of knowledge and skills:A1. Analysis of a large system development problem to decide upon the best methodological approach.A2. Development of appropriate artefacts to support and manage the software engineering process suchas change control and configuration management.CRICOS Provider No. 00103D ITECH7410 Assignment 2 – Group Page 2 of 3Assessment Details1. Students will need to develop schema that will model a library – containing only books – andbe able to perform the following tasks:• Add a book• Add a borrower• Delete a book• Delete a borrower• Lend a book to a borrower• Return a book from a borrower• Enquire about a book• Reserve a book• Enquire about a reservation• Cancel a reservation• Buy a Book• Receive a Book• Report of Books on Loan2. The schema must be consistent and be shown to work using examples3. Schema need to be annotated so that the Z statements are clearly expressed in plainlanguage4. Write three (3) non-trivial predicate statements about your system; explain them and showthat they are trueSubmissionSubmit your specification, via Moodle, as a Word document labelled in the following way:StudentID1_StudentID2 ? ? ? .docxAttach all files that are needed (the report plus up to 4 files) in order to mark this assignment by yourlecturer/tuto

Analyse and report on the current and future state of the internetworking infrastructure and its applications.

This assignment is designed to assess students’ knowledge and skills related to thefollowing learning outcomes:d. Analyse and report on the current and future state of the internetworkinginfrastructure and its applications.e. Implement a process to support the administration and management ofinternetworking.All work must be submitted on Moodle by the due date along with a title Page.The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) fontand 2.54 cm margins on all four sides of your page with appropriate sectionheadings.Reference sources must be cited in the text of the report, and listed appropriatelyat the end in a reference list using IEEE referencing style.If an extension of time to submit work is required, a Special ConsiderationApplication must be submitted directly to AMS. You must submit this applicationthree working days prior to the due date of the assignment. Further informationis available at:http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/specialconsiderationdeferment

1 2 3 211