Category Archives: IT

Need Help-Case Study


ORDER NOW your custom essay to have it completed successfully on time.Need Help-Case Study:

Background:

Task 1

Tele-health can reduce socioeconomic demands by reducing travelling for face-to-face visits. Technology can be successfully applied in community-based patient care to enhance the capacity of nurses to deliver medications management for clients, resulting in increased efficiency of service delivery as well as staff and patient satisfaction. Tele-health in patients’ homes supplements delivery of care, can reduce unplanned medical visits and improve self-management of an illness. Remote healthcare can supplement the delivery of care, providing support to clients and healthcare staff. For this project we are using the Tunstall tele-health monitoring equipment as an example of the type of equipment that is used. See the series of 2 minute videos on the following site to see what their current technology looks like for tablet interaction with older people: http://www.tunstallhealthcare.com.au/what-we-do/telehealth

The aim of the project is to improve the tablet computer interaction for the end-user of tele-health hardware and software in the homes of older people living in the community. We will assume that the community-dwelling older people live in regional, rural and remote locations in the central west of NSW. The solution involves a cloud-based mobile application, although you might also identify other possible delivery methods for the interaction.

You need to create a Project Vision Document which contains:
• Problem
• Capabilities
• Benefits

Specific analysis techniques have not been taught yet, so this assignment does not require technical descriptions.

Solution:

Task 2

tele-health monitoring equipment assesses a core set of measurements (such as blood pressure, heart rate, and weight) and obtains custom measurements depending on each client’s health condition e.g., heart failure, chronic obstructive pulmonary disorder, hypertension and diabetes. The clinical/triage team from a service provider will ascertain the custom measurements for each client. That service provider (make up your own fictitious name) will hire equipment from an organisation such as Tunstall. You are to assume that current users have complained repeatedly about wanting to be able to engage in better self-management. The remote monitoring is helpful, because their vital signs are daily transferred to the monitoring service (Tunstall or other) and in case of problems their service provider is notified. But the users also want better feedback about their conditions, to reduce reliance on medical staff intervening, and to gain confidence about understanding their own situation and managing their own care.

You are the business systems analyst assigned to the project, you will need to produce:

Stakeholder map
• Draw stakeholder role names on a stakeholder map with 4 quadrants, Internal-Operation, Internal-Executive, External-Operation, External-Executive

Questionnaire
• Write 5 questions, either open and/or closed ended questions that you would send to stakeholders
• This should be written as a questionnaire that could be distributed
• The questions should aim to help you identify further details about the environment, the problem area and/or how the system would operate to help solve the problem
• Only write the questions, you should not write the answers

Use Case diagram and descriptions
• Draw a use case model for the information system
• Write brief Use Case description for each Use Case in the diagram
• Write one fully developed Use Case description for one of the important Use Cases identified

Solution

 

Task 3

This is the final part of the Tele-Health project. You need to answer these questions within the context of that project.

Mobile and cloud based solutions should be investigated. Furthermore, data security also needs to be further investigated, which includes data ownership, data security in the cloud and who has access permission, and to what level of access, etc.

Non-Functional Requirements
• This sets out the critical system qualities, system interfaces, user interface requirements, and system constraints.
• Use to ‘FURPS+’ acronym as reference, and ensure you at cover the non-functional aspects of the acronym, Usability, Reliability, Performance and Security.

Review of cloud based solutions
A review of strengths and weaknesses of cloud based solutions. Taking into consideration the environment in which the solution would be deployed.

SDLC Approach
Write brief description of the Pros and Cons to approaching the project using the ‘Predictive’ SDLC, then the Pros and Cons to approach the project as ‘Adaptive’ SDLC. Then recommend either Predictive or Adaptive to the SDLC for the project and briefly describe why.

Presentation

Your answer should be approx. 7 pages, Times Roman size 12 (title page and references are not part of page count). You should use your own words and avoid lengthy quotations.

Need Help-Case Study:

ORDER NOW your custom essay to have it completed successfully on time.

Homework Help


Homework Help

Person 1:

 

Write about the company ‘YELP’10 Pages (Research Paper)

(Instructions given in the attached image ‘Instructions.jpeg’)

 

Write about the Wearable Computing – 10 Pages (Research Paper)

 

(Instructions given in the attached image ‘instruction.jpeg’)

 

Make Power Point Presentation About : Wearable Computing – 8 Slides (Simple and Easy Words to Explain with Speaker Notes)

 

Person 2:

 

Instructions for doing everything for person 2 in the attached image ‘Instructions_1.jpeg’ and ‘Instructions_2.jpeg’

 

Case #2 – 6 Pages

Ethics (Page: #18) – 4 Pages

 

Technoogy – Security Issues of Mobile Devices:How to protect them – 10 Pages

 

Presentation About : Case #18 (Simple and Easy Words to Explain with Speaker Notes)

The Case has a question for discussion at the end of the case. Please answer them too.

In the PPT, it will be similar like you did last time

 

In the book attached, you will find the ethics and the case

 Homework Help

Network LAN Design with VoIP and Wireless Services


Buy paper about this assignment here (Email us: writersestate@gmail.com)

Network LAN Design with VoIP and Wireless Services

Design Requirements

 

This section will specify the scope of the work, which will address the concerns of stakeholders while meeting overall business needs.

 

You are required to submit business need and Design Requirements of Entire WWTC Project. The requirements include but are not limited to

 

  • Design Requirements of LAN, VOIP and Wireless
  • Design Requirements of Security
  • Design Requirements of Active Directory

 

Network LAN Design with VoIP and Wireless Services

 

This section will provide a detailed LANdesign of network with VoIP services, Wireless services, protocols, devices, and interconnectivity, with WAN.

 

This section must include but is not limited to

 

  • Equipment List
  • Hierarchical IP scheme and VLAN
  • Link IP addresses
  • High Level Diagram
  • Voice and Wireless Design

 

Security Policies and Network Security Design

 

This section will specify organizational security policies, standards, procedures, and guidelines in compliance with the appropriate laws and regulations. This section will lay out network security design implementing organizational security policies in compliance with the appropriate laws and regulations

 

Deliverables

  • Determine the most important assets of the company, which must be protected
  • Determine general security architecture for the company
  • Develop a list of 12specific policies that could be applied.
  • Write specific details along with the rationale for each policy
  • Review the written policies and select the 12 most important policies for inclusion in the Security Policy Document
  • Integrate and write up the final version of the Security Policy Document for submittal
  • Develop a High availability secure design for this locations addressing above considerations and mitigating 4 primary networks attacks categories mentioned below.
  • Write up specific role of devices will play in securing
  • Develop high level security diagram.

 

Active Directory Design and Active Directory Implementation

 

This section will specify organizational Active Directory design, and develop and implement Active Directory as per organizational standards and policies.

 

Deliverables

  • Create Active directory policies to include recommended features
  • Create and implement forest named WWTC.com
  • Create OU for each Department under forest WWTC.com.
  • Link WWTC.com to headquarters.
  • Create Global, Universal, Local groups for each domain. Each global group will contain all users in the corresponding department. Membership in the universal group is restrictive and membership can be assigned on the basis of least privileged principle. (For design purpose, you can assume that WTC as a Single Forest with multiple domains).
  • Create GPO and GPO policies (All domains will be serviced and managed by IT staff at World-Wide Trading Company

 

 

Project Implementation Plan

 

This section will lay out the implementation plan of the entire AAP design, which include configuration of key networking devices, detailing milestones, activities, resources, and budgets, as well as providing a deliverables schedule.

 

 

PowerPoint Presentation

 

This section will include an online presentation in PowerPoint. Presentations should include the information in parts 1 through 4 of the AAP. You will be evaluated on the content and design of your presentation.

 

The purpose of this presentation is to get approval from upper level management. This presentation is geared towards upper management level. In this presentation two much details, or by providing too much technical content you could lose your audience. You need a balance approach. That means keep your focus on key business goals and explain them in simple language how this project will help in meeting those goals. There is no minimum or maximum numbers of slides for this presentation.

 

 

Comprehensive Authentic Assessment Plan Deliverables

 

For this course AAP is a response for customer’s RFP or customer’s design requirements and type of solution used in network design. Typically a customer’s RFP includes following topics.

 

  • Business goals for the project
  • Scope of the project
  • Information on existing network
  • Information on new applications
  • Technical requirements, including scalability, availability, network performance, security, manageability, usability, adaptability, and affordability
  • Warranty requirements for products
  • Environmental or architectural constraints
  • Training and support requirements
  • Preliminary schedule with milestones and deliverables
  • Legal contractual terms and conditions

 

Your AAP should include responses to all of customer’s RFP and should include logical and physical component pf the design, information on technologies used in design solution, and proposal to implementing the design. The following sections describe the format of AAP:

 

A: Executive Summary (ES)

The executive summary briefly states and emphasizes the major points of the customer’s requirements. The ES should be no more than one page and should be directed at key decision maker of the project who will decide whether to accept your design. The ES can have minimum technical information but NO technical details. The technical information should be summarized and organized in order of the customer’s highest-priority objectives for the design project. The ES should be organized customer top requirements.

 

B: Project Goal

This section should state the primary goal for the network design. The goal should be business oriented and related to an overall objective that organization has to become more successful in core business. Your objective is to make it clear to decision maker that you understand the primary purpose and importance of the network design project. Below is an example of project goal was written for an actual design.

 

“The goal of this project is to develop a wide area network (WAN) that will support new high bandwidth and low-delay multimedia applications. The new applications are key to the successful implementation of new training programs for the sales force. The new WAN facilitate of increasing sales in the USA by 50% in the next fiscal year.”

 

C: Project Scope

The project scope section provides information on extent of the project, including a summary of departments, field offices networks that will be affected by the project. The project scope section specifies whether the project is new network or modifications to an existing network. It indicates whether the design is for a single network segment, a set of LANs, a building or campus network, or a set of WAN or remote access network, VoIP, or enhancing security

 

D: Design Requirements

In this section, you provide major business and technical requirements of the network in priority order. In business goal explain the role network design will play in helping an organization provide better products and services.

 

The technical requirement sections explain in general term how propose technical improvement is better than or meet the customer requirement.

 

Network Application: This section lists and characterizes the new and existing network applications.

 

E: Current State of the Network:

This section briefly describes the structure and performance of the network. It should include a high-level network map that identifies the location of connecting devices, server farm, storage systems, and network segment

 

F: Design Solution:

This section includes:

  • Logical Network topology which include high level one or more drawings to illustrate logical architecture of the proposed network
  • Recommended LAN design to implement Client’s key requirements.
  • Recommended Voice over IP solution,
  • Recommend solution to implement client’s key security requirements.
  • Recommend solution to implement client’s key Active Directory requirements
  • Recommend network management processes and products

 

 

 

 

 

 

 

G: Implementation Plan:

The implementation plan includes your recommendations for deploying the network design. The design implementation description should be detailed as possible. Implementation of a network design consists of several phases (buy and install hardware, configure system, test system and so forth). Each phase consists of several steps, and documentation for each step should contain the following:

 

  • A project schedule
  • Plans with vendors or service providers for installation of links, equipment or services
  • Plan or recommendations for outsourcing the implementation or management of the network
  • A plan for communicating the design to end users, network administrators, and management
  • A training plan for network administrators and end users
  • A plan for measuring the effectiveness of the design after it has been implemented
  • A list of known risks that could delay the project
  • A fallback plan if the network implementation fails
  • A pan for evolving the network design as new application requirements goals arise

 

 

 

 

Sample Project Schedule Template

Date of Completion Project Milestone
August 1 Design completed and a beta version of the design document distributed to key executives, managers, network administrators, and end users (end users depends on management)
August 15 Comments on the design document due
August 22 Final design document distributed
August 25 Installation of leased lines between all buildings completed by WAN service provider
August 28-29 Network administrators trained on new system
August 30-31 End users trained on new system
September 6 Pilot implementation completed in Building 1 or head office or branch office
September 20 Feedback received on pilot from network administrators and users
September 27 Implementation completed on Buildings 2-5 or floors 1-6
October 10 Feedback received from buildings 2-5 from network administrators and users
October 17 Implementation completed in the rest of buildings or floors
Ongoing or December 31 New system monitored to verify that it meets goals

 

H: Project Budget

This section should contain the funds the customer needs for equipment purchases, maintenance, and support agreements, service contracts, software licenses, training, and staffing. The budget can also include consulting fees and outsourcing expenses.

 

I: Design Document Appendix

Most design documents include one or more appendixes that present supplemental information about the design and implementation. Supplemental information can include detailed topology drawings, device configurations, network addressing and naming details and comprehensive results from the testing of the network design. You can include business information such as list of contact name, numbers and e-mail addresses. The appendix can include warranty on devices, legal agreement, and any information which is not critical for design, but you have noted in your gathering information process.

 

Writing Instructions

Paper must have a minimum of 25 pages and a maximum of 35 pages of text excluding the required title page and bibliography and optional tables. Text must be Times New Roman, 12 font, 1″ margin on all sides, and double spaced.

 

Students must follow “Publication Manual of the American Psychological Association, Fifth Edition (APA- 5)”, also known as APA style or format. Only a Microsoft Word file will be accepted as the final submission; no HTML or PDF files allowed.

 

All sources must be properly cited and must be credible. At least two sources must be Internet sources (for help in evaluating the credibility of web sources, go tohttp://www.umuc.edu/library/guides/evaluate.shtml). Once you have completed a good draft, it is strongly advised that you submit it to UMUC’s Effective Writing Center (EWC). In order to allow sufficient time for their review, you need to submit the draft to EWC two weeks prior to the paper’s due date.

Buy paper about this assignment here (Email us: writersestate@gmail.com)

Mathematics in IT


Mathematics in IT

Buy Research paper about this assignment here (Email us: writersestate@gmail.com)

Complete the following questions 1-14:

  1. Simplify the following Boolean expression: AB(A + B)(C + C)

 

  1. Design the combinatorial circuit for: (p’ *r) + q

 

  1. Design the combinatorial circuit for:

 

  1. Complete the truth table of the following Boolean expression:

 

  1. Prove or disprove that the following 2 expressions are equivalent. Use either the related laws for your proof, or complete the two truth tables:
    • (A + C)(AD + AD’) + AC + C
    • A + C

 

  1. The following is a message coded in ASCII using one byte per character and then represented in hexadecimal notation. What is the message?
    • 4469736372657465204D617468656D617469637320697320434F4F4C21

 

  1. Convert each of the following signed binary byte representations to its equivalent base-ten representation. What would each byte represent in Binary Coded Decimal? Show your work step by step.
    • 00010001
    • 01011100
    • 1111010

What is the signed binary sum of 1011100 and 1110101 in decimal? Show all of your work.

  1. Convert each of the following base-ten representations to its equivalent two’s complement in 7 bits. Show all of your work.
    • 12
    • -2
    • -8
    • 0

Define the highest and lowest integer that can be represented in this 7-bit two’s complement representation.

  1. What bit patterns are represented by the following hexadecimal notations? Show all of your work.
    • 9A88
    • 4AF6
    • DA

What is the hexadecimal sum of 9A88 and 4AF6 in hexadecimal and decimal? Show all of your work for all problems

  1. Consider the following graph:
    • Complete this table by finding the degree of each vertex, and identify whether it is even or odd:
Vertex Degree Even/Odd
A    
B    
C    
D    
E    
F    
G    
H    
    1. What is the order of the graph?
    2. Construct the 10 x 10 adjacency matrix for the graph.
  1. The graph below illustrates a switching network. The weights represent the delay times, in nanoseconds, travelled by a data packet between destinations, represented by the vertices.
    1. Complete the following table by finding the shortest distance and the path for that distance from vertex A to the other vertices:
Vertex Shortest Distance from A Path from A
B    
C    
D    
E    
F    
G    
H    
I    
    1. What is the shortest distance between A and J and the path for that distance?
  1. The following graph represents a portion of the subway system of a city. The vertices on the graph correspond to subway stations, and the edges correspond to the rails. Your job is to write a program for a cleaning car to efficiently clean this portion of the subway system.
    1. Using Euler’s theorem, explain why it is possible to pass through all of the stations by traversing every rail only once.
    2. Using Fleury’s algorithm, provide an optimal path to clean all the rails by passing through them only once.
    3. Is it possible to find an optimal path described in question 3-b that starts on any station? Explain your answer.
    4. Is it possible to find an optimal path described in question 3-b that starts and ends at the same station? Explain why or why not.
  1. A network engineer lives in City A, and his job is to inspect his company’s servers in various cities. The graph below shows the cost (in U.S. dollars) of travelling between each city that he has to visit.
    • Find a Hamiltonian path in the graph.
    • Find a Hamiltonian circuit that will allow the engineer to inspect all of the servers. How much will the cost be for his trips?
    • Is there another Hamiltonian circuit that will allow the engineer to inspect all of the servers other than your answer in question 4-b? If so, calculate the cost.
  1. Consider the following binary tree:
    • What is the height of the tree?
    • What is the height of vertex H?
    • Write the preorder traversal representation of the tree.
    • Write the array representation of the tree by completing the following table:

 

Vertex Left Child Right Child
A    
B    
C    
D    
E    
G    
H    
I    
J    
K    
L    
M    
N    
O    
P    
Q    
R    
S    
T    

 

Buy Research paper about this assignment here (Email us: writersestate@gmail.com)

CIS2005-S2-16-Assignment 2 – SAP Practical Written Report


Buy Order Now for the complete paper here.
Buy research paper on this assignment here (Email us: writersestate@gmail.com)

 

Description 

Due date: 26th August 2016

CIS2005-S2-16-Assignment 2 – SAP Practical Written Report

Assignment 2 – SAP Practical Written Report

Marks : 100

Weighting: 15%

The key concepts and frameworks covered in modules 1–4 are particularly relevant for this assignment. Assignment 2 relates to the specific course learning objectives 1, 2 and 3:

1. analyse information security vulnerabilities and threats and determine appropriate controls that can be applied to mitigate the potential risks

2. demonstrate an ability to communicate effectively both written and orally about the management of information security in organisations And assesses the following graduate skills: The Academic & Professional Literacy and Written & Oral Communication at level 2. Assignment 2 consists of three specific tasks regarding SAP R/3 System Security.

Your Assignment 2 report must be structured as follows:

● Cover page for your assignment 2

● Table of contents

● Body of report – main section for each task with appropriate use of subsections for each task sub report

● Task 1 Login to SAP System Student Account and Complete and Save System/User Profile/Own Data Fields

● Task 2 – Eight reports as specified (include an Excel spreadsheet or Access database) with your submission of Assignment 2 report

● Task 3 – SAP System Security Settings

● List of References

Task 1 Specifications – Login to SAP R/3 System using your student SAP userid and password and Complete System/User Profile/Own Data fields that are currently blank as per Screenshot below

Task 1 Requirements – Complete and save following fields in your SAP R/3 Student Account User Profile Title, Last name, First name, Function, Department, Room Number, Floor and Building and provide a screen capture of completed fields in System/User Profile/Own Data Screen in your SAP R/3 Student Account for Task 1 in your Assignment 2 Report 2

Task 2 Specifications – Analyze SAP Security Audit Log Data.

Userdata.xls is a spreadsheet log file containing summarized records of user activity on a client’s SAP R/3 system. Each record contains the following fields:

Field Description

USERID USERID identifies an unique user

YYYYMM YYYYMM describes when the user action took place.

YYYYMM is useful for summarising user activity by month.

TCODE TCODE refers to the transaction (option on the menu) performed by the user.

TEXT TEXT describes the outcome of the transaction action, including its success or failure. Some tcodes are blank.

TCODESTAT TCODESTAT is an invented transaction code for each action indicating whether the action was successful (-0) or failed (-1).

TCD TCD is the same as TCODESTAT, except there is no -0 or -1.

TSTATUS TSTATUS indicates whether the action was successful or not (0/1).

TCOUNT TCOUNT is the number of times the user has performed this action, with this outcome, in the month

YYYYMM. TTEXT TTEXT is the narrative description of the TCODE.

Task 2 Requirements Use a software of your choice (spreadsheet, database, statistical package etc) to analyze the provided SAP Security Audit Log File (Userdata.xls), and generate the required eight user activity reportslisted below and provide a brief description for each user activity report (About 500 words in total for all eight required reports/graphs) (hint this assignment 2 task 2 is best done using MS Excel pivot tables or Microsoft Access database SQL queries). The required eight user activity reports are: 1. Alphabetic list of all actions and their frequency by any selected user, e.g. USER-040. 2. List of users performing unsuccessful activities. 3. List of transaction codes performed, with their frequency by each user. 4. List of users engaging in security-related actions. 5. Top 10 users in terms of frequency of activity. 6. List of users who are dormant – in the range USER-001 to USER-050. 7. You should also produce at least 2 reports or charts based on any of the above previous reports that summarise user activity over time using YYYYMM date format. 3 TASK 3 Specifications – Analyze and discuss SAP System-Wide Security Settings. You are required to review the system-wide security settings on a SAP R/3 system. The data file SAP_RSPARAM_Basis.xlsx contains an extract from the client’s system. Note you should open this file using an excel spreadsheet to view the system-wide security settings so the fields are aligned correctly. Hint you can use the search function to locate the appropriate SAP system wide security settings and their related values in the data file SAP_RSPARAM_Basis.xlsx. Note you will need to research the relevant SAP System Security literature in order to determine what are recommended values for each SAP System Security Setting. Task 3 Requirements complete the following sub tasks: Task 3a) For each SAP System Security Setting listed in Table 1 complete the User Defined Value, System Default Value and Recommended Value based on your analysis of the SAP_RSPARAM_Basis.xlsx file and the relevant SAP System Security Literature. GLOBAL BIKE COMPANY Table 1 SAP System-Wide Security Settings Date: Prepared by: SAP System Security Settings User-Defined Value System Default Value Recommended Value No auto user SAP* Failed logins to end Failed logins to lock Auto failed unlock Min password length Password expiry (days) Idle Screen logout (seconds) No check on Tcodes Login client No Task 3b) Provide a written evaluation of each SAP System Security Setting, in terms of User Defined Value, System Default Value and Recommended Value in the completed Table 1, describing the SAP System security setting, highlighting any weaknesses exist and if so provide recommendations for improving the current SAP System Security Setting. Your discussion here should be supported by appropriate in-text references (1000 words approx). Note some relevant literature resources on SAP System Security Settings will be provided in Tutorials and Assignment 2 discussion forum. Note: Submission of your assignment 2 report documents will be via the Assignment 2 submission link on the course studydesk. Assignment 2 submission consists of two documents (1) a word document for the Assignment 2 report and (2) an accompanying spreadsheet or an Access database for task 2 of Assignment 2. Note carefully University policy on Academic Misconduct such as plagiarism, collusion and cheating. If any of these occur they will be found and dealt with by the USQ Academic Integrity Procedures. If proven Academic Misconduct may result in failure of an individual assessment, the entire course or exclusion from a University program or programs.

Order Now for the complete paper here.

Buy paper on this assignment here (Email us: writersestate@gmail.com)

CIS5101 S2 2016: Assignment 1, Research Proposal on Business/Organization


Buy paper (Research Proposal)  on this assignment here (Email us: writersestate@gmail.com)

 

CIS5101 S2 2016: Assignment 1; Research Proposal on Business/Organization

Marking Criteria

Student name: Student No:
Mark Comments
1. Preliminary Research Findings (company background, business strategy
and objectives, structure, revenue model, etc.)
20 Excellent A perfect piece of work.
18 Very good A very good piece of work that meets all specified criteria
15 Good Competently meets the criteria specified. 20
10 Average Adequately meets the criteria as specified.
6 Poor Did not sufficiently meet the criteria as specified.
3 Very poor Clearly does not meet criteria to pass.
0 Not Attempted No attempt made or irrelevant.
2. Company capabilities (skills, qualifications, testimonials, exemplars)
15 Excellent A perfect piece of work.
13 Very good A very good piece of work that meets all specified criteria
11 Good Competently meets the criteria specified. 15
8 Average Adequately meets the criteria as specified.
6 Poor Did not sufficiently meet the criteria as specified.
3 Very poor Clearly does not meet criteria to pass.
0 Not Attempted No attempt made or irrelevant.
3. Web Design Components (design, promotion, security, maintenance)
30 Excellent A perfect piece of work.
25 Very good A very good piece of work meeting all specified criteria.
20 Good Competently meets the criteria specified. 30
15 Average Adequately meets the criteria as specified.
6 Poor Did not sufficiently meet the criteria as specified.
3 Very poor Clearly does not meet criteria to pass.
0 Not Attempted No attempt made or irrelevant.
4. Cost and Deliverables (Costs, deliverables, timelines)
20 Excellent A perfect piece of work.
18 Very good A very good piece of work meeting all specified criteria.
15 Good Competently meets the criteria specified. 20
10 Average Adequately meets the criteria as specified.
6 Poor Did not sufficiently meet the criteria as specified.
3 Very poor Clearly does not meet criteria to pass.
0 Not Attempted No attempt made or irrelevant.

Page 1 of 2

5. PRESENTATION (Structure; appropriate graphics, images, animations,
tables, etc; speaker’s notes; bullet points; spelling, punctuation, grammar etc.)
15 Excellent
13 Very good
11 Good presentation 15
8 Average
6 Poor
3 Very poor
0 Little or no attempt to make appropriate use
TOTAL (maximum 100) 0
Marker’s initials: _________________________ Date:  _________________

Markers general comments and feedback

Buy paper (Research Proposal)  on this assignment here (Email us: writersestate@gmail.com)

  1. Your web design consultancy company has been invited to tender for the design of a web site for a newly formed business/organization.
  2. As part of the tender process you are required to present a proposal to the management team of the company.
  3. If your proposal is eventually accepted, you will be asked to develop a prototype of your design in WordPress in Assignment 2.
  4. The client’s business category/model will be supplied to you via email in the first week of the semester (along with your cloudaccess.net/WordPress credentials).
  5. Your design proposal MUST address the specific and unique needs of the business category/model you have been assigned. You are also required to ensure that both your Assignments 1 and 2 meet the criteria to be classed within, and is directly related to, the business category assigned to you. Failure to do so will result in your assignments being rejected and no marks will be allocated to them.
  6. You have been asked to do some preliminary research into the needs of the company and then demonstrate your capabilities and what you and your company can offer.
  7. Your company has been told from the outset that the website must incorporate a high-end and responsive web design that provides a great user experience while creating an atmosphere of trust and professionalism.
  8. You sent the management of the business a questionnaire and interviewed them for more information about the project and their requirements.
  9. You analysed the information they provided and promised to send them a proposal in the next few days.

 

  1. Prepare a professional web design and development proposal in the form of a PowerPoint presentation (16-30 slides) that will inform and impress the client.
  2. Include speaker’s notes for each slide, as well as images, graphics, tables, animations, etc. where appropriate.
  3. Do not include citations in your slides. Place all your sources of reference on your final slide.

 

Presentation Guidelines

 

Your PowerPoint presentation slides should include (but are not confined to):

  1. Title -. 0 slide
  2. Table of contents -. . 0 slide
  3. Preliminary research findings – 1 slide

Demonstrate that you know the client and you understand what they want. This is the first step in appealing to the client’s individual needs. 2 slide

  1. Your capabilities 2-slides
  • Present your capabilities by referring back to the client’s needs and state your relevant experience. 1 slide
  • Provide previous examples/references Major components -1 slide
  1. Web Design
  • Overall design strategy 1 slide
  • Site name registration 1 slide
  • Site design, features and functionalities 1 slide
  • Content Management System 1 slide
  • Custom Programming 1 slide
  • Major web technologies 1 slide
  1. Web promotion, SEO and analytics 2-3 slide
  2. Website maintenance Costs and deliverables 1 slide
  3. Provide cost and deliverable information based on the information you have Propose a detailed timeline for the work. Contact information . 1 slide
  4. Conclusion References . 0 slide

 

Buy paper (Research Proposal)  on this assignment here (Email us: writersestate@gmail.com)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Page 2 of 2

Business/organization customizable electronic goods


Buy paper on this assignment here (Email us: writersestate@gmail.com)

Business/organization customizable electronic goods

  1. Your web design consultancy company has been invited to tender for the design of a web site for a newly formed business/organization.
  2. As part of the tender process you are required to present a proposal to the management team of the company.
  3. If your proposal is eventually accepted, you will be asked to develop a prototype of your design in WordPress in Assignment 2.
  4. The client’s business category/model will be supplied to you via email in the first week of the semester (along with your cloudaccess.net/WordPress credentials).
  5. Your design proposal MUST address the specific and unique needs of the business category/model you have been assigned. You are also required to ensure that both your Assignments 1 and 2 meet the criteria to be classed within, and is directly related to, the business category assigned to you. Failure to do so will result in your assignments being rejected and no marks will be allocated to them.
  6. You have been asked to do some preliminary research into the needs of the company and then demonstrate your capabilities and what you and your company can offer.
  7. Your company has been told from the outset that the website must incorporate a high-end and responsive web design that provides a great user experience while creating an atmosphere of trust and professionalism.
  8. You sent the management of the business a questionnaire and interviewed them for more information about the project and their requirements.
  9. You analysed the information they provided and promised to send them a proposal in the next few days.

 

  1. Prepare a professional web design and development proposal in the form of a PowerPoint presentation (16-30 slides) that will inform and impress the client.
  2. Include speaker’s notes for each slide, as well as images, graphics, tables, animations, etc. where appropriate.
  3. Do not include citations in your slides. Place all your sources of reference on your final slide.

 

Presentation Guidelines

 

Your PowerPoint presentation slides should include (but are not confined to):

  1. Title -. 0 slide
  2. Table of contents -. . 0 slide
  3. Preliminary research findings – 1 slide

Demonstrate that you know the client and you understand what they want. This is the first step in appealing to the client’s individual needs. 2 slide

  1. Your capabilities 2-slides
  • Present your capabilities by referring back to the client’s needs and state your relevant experience. 1 slide
  • Provide previous examples/references Major components -1 slide
  1. Web Design
  • Overall design strategy 1 slide
  • Site name registration 1 slide
  • Site design, features and functionalities 1 slide
  • Content Management System 1 slide
  • Custom Programming 1 slide
  • Major web technologies 1 slide
  1. Web promotion, SEO and analytics 2-3 slide
  2. Website maintenance Costs and deliverables 1 slide
  3. Provide cost and deliverable information based on the information you have Propose a detailed timeline for the work. Contact information . 1 slide
  4. Conclusion References . 0 slide

 

Buy paper on this assignment here (Email us: writersestate@gmail.com)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Task 2 Specifications – Analyze SAP Security Audit Log Data.


ORDER NOW your custom paper to have it completed successfully on time.
Buy research paper on this assignment here (Email us: writersestate@gmail.com)

 

Task 2 Specifications – Analyze SAP Security Audit Log Data.

 

Userdata.xls is a spreadsheet log file containing summarized records of user activity on a client’s SAP R/3 system. Each record contains the following fields: Field Description
USERID USERID identifies an unique user
YYYYMM YYYYMM describes when the user action took place. YYYYMM is useful for summarising user activity by month.
TCODE TCODE refers to the transaction (option on the menu) performed by the user.
TEXT TEXT describes the outcome of the transaction action, including its success or failure. Some tcodes are blank.
TCODESTAT TCODESTAT is an invented transaction code for each action indicating whether the action was successful (-0) or failed (-1).
TCD TCD is the same as TCODESTAT, except there is no -0 or -1.
TSTATUS TSTATUS indicates whether the action was successful or not (0/1).
TCOUNT TCOUNT is the number of times the user has performed this action, with this outcome, in the month YYYYMM.
TTEXT TTEXT is the narrative description of the TCODE.

 ORDER NOW your custom paper to have it completed successfully on time.

Task 2 Requirements

Use a software of your choice (spreadsheet, database, statistical package etc) to analyze the provided SAP Security Audit Log File (Userdata.xls), and generate the required eight user activity reports listed below and provide a brief description for each user activity report (About 500 words in total for all eight required reports/graphs) (hint this assignment 2 task 2 is best done using MS Excel pivot tables or Microsoft Access database SQL queries). The required eight user activity reports are:

 

  1. Alphabetic list of all actions and their frequency by any selected user, e.g. USER-040.
  2. List of users performing unsuccessful activities.
  3. List of transaction codes performed, with their frequency by each user.
  4. List of users engaging in security-related actions.
  5. Top 10 users in terms of frequency of activity.
  6. List of users who are dormant – in the range USER-001 to USER-050.
  7. You should also produce at least 2 reports or charts based on any of the above previous reports that summarise user activity over time using YYYYMM date format.

 ORDER NOW your custom paper to have it completed successfully on time.

TASK 3 Specifications – Analyze and discuss SAP System-Wide Security Settings.

You are required to review the system-wide security settings on a SAP R/3 system. The data file SAP_RSPARAM_Basis.xlsx contains an extract from the client’s system. Note you should open this file using an excel spreadsheet to view the system-wide security settings so the fields are aligned correctly. Hint you can use the search function to locate the appropriate SAP system wide security settings and their related values in the data file SAP_RSPARAM_Basis.xlsx. Note you will need to research the relevant SAP System Security literature in order to determine what are recommended values for each SAP System Security Setting.

Task 3 Requirements complete the following sub tasks:

Task 3a) For each SAP System Security Setting listed in Table 1 complete the User Defined Value, System Default Value and Recommended Value based on your analysis of the SAP_RSPARAM_Basis.xlsx file and the relevant SAP System Security Literature.

 

Table 1 SAP System-Wide Security Settings User-Defined Value System Default Value Recommended

Value

User-Defined Value
No auto user SAP* 0 0 0 0
Failed logins to end 0 3 3 0
Failed logins to lock 5 5 5 5
Auto failed unlock 0 0 1 0
Min password length 0 6 7 0
Password expiry (days) 0 0 40 0
Idle Screen logout (seconds) 1800 1800 900-1200 1800
No check on Tcodes 0 0 Y 0
Login client No 100 100 100 100

 

Task 3b) Provide a written evaluation of each SAP System Security Setting, in terms of User Defined Value, System Default Value and Recommended Value in the completed Table 1, describing the SAP System security setting, highlighting any weaknesses exist and if so provide recommendations for improving the current SAP System Security Setting. Your discussion here should be supported by appropriate in-text references (1000 words approx). Note some relevant literature resources on SAP System Security Settings will be provided in Tutorials and Assignment 2 discussion forum.

 

1.      No auto user SAP*
2.      Failed logins to end
3.      Failed logins to lock
4.      Auto failed unlock
5.      Min password length
6.      Password expiry (days)
7.      Idle Screen logout (seconds)
8.      No check on Tcodes
9.      Login client No

 

Buy research paper on this assignment here (Email us: writersestate@gmail.com)
ORDER NOW your custom paper to have it completed successfully on time.

CIS30111 Project Specification


Buy Report on CIS30111 Project

CIS30111 Project Specification

The project is about the non- profit organisation the organization is AKSHYA foundation this foundation accepts the donations from the sponsors and help the poor for the studies

Report Structure

Report contains all of the required parts listed below:

  • Letter of Transmittal
  • Report Title Page
    • Team Name
    • All students’ names and student numbers
  • Executive Summary
  • Table of Contents
  • List of References

Project Schedule

Project Schedule with project’s tasks, major milestones and timetable.  Tasks are broken down into relevant subtasks which are allocated to individual members.   Schedule also clearly identifies ALL student activities, personal or school/work related, which will impact on the project.

Project Background

Provide the context in which the project exists.  If the project is for a specific organisation, discuss the organisations background first and then discuss the project within the context of the organisation.  This section must provide a sufficient briefing on the project background and any technology it incorporates such that the reader will understand the context and importance of your project.  Remember, do not assume any prior technical knowledge.  All technical terms must be explained and all acronyms defined.

Purpose of App

Describe the purpose of your project.  Explain to your reader what problem(s) you are trying to solve and why it is important to do so.  Keep in mind that the purpose of the report you are writing is to persuade whoever you need to fund your project, that your project is worth funding from a ‘Why should I care?’ point of view and also for the anticipated intrinsic and intangible benefits gained by the organisation due to the deployment of  your application.

Problem Solution

Discuss how you plan to address the problem outlined above.  Make sure you clearly describe how your proposed solution will address the problems(s) you’ve discussed.

CIS30111 Project Specification Marking Criteria

 

Report Structure   / 10
Professional appearance   / 5
Written Presentation   / 15
Executive Summary   / 10
Project Background   / 10
Purpose of App   / 10
Problem Solution   / 10
Project Schedule   / 20
PENALTIES    
Original Project/

Non- profit Organisation

  -25

 

TOTAL    
Comments:

 

 

 

Report Structure 10  
  /5 HD [5] A [4] B [ 3]: C [2] F [0]
    Report contains all of the required parts listed below:

·         Letter of Transmittal

·         Report Title Page

o    Team Name

o   All students’ names and student numbers

·         Executive Summary

·         Table of Contents

·         List of References

·         Appropriate use of Appendices [optional]

Letter of Transmittal /5 HD [5] A [4] B [ 3]: C [2] F [0]
See guidelines and example in the Communications Skills Handbook   □       The letter meets all formatting requirements.

□       Body of letter meets all content requirements: positive opening, a further explanation, and a goodwill message.

□       The letter meets most formatting requirements.

□       Body of letter meets most content requirements: positive opening, a further explanation, and a goodwill message.

 

□       The letter meets some formatting requirements.

□       Body of letter meets some content requirements: positive opening, a further explanation, and a goodwill message.

 

□       The letter meets few of the formatting requirements.

□       Body of letter meets few of the content requirements: positive opening, a further explanation, and a goodwill message.

□       The letter was either missing or incomplete or unsuitable.

 

Professional appearance 5  
  / 5 HD [5] A [4] B [ 3] C [2] F [0]
See guidelines in the Communications Skills Handbook   □       Appropriate use of Headers and/or Footers.

□       Page numbers match the Table of Contents and are numbered appropriately (roman numerals for executive summary, etc)

□       Headings and Sub-headings should be numbered per Table of Contents example 2., 2.1, 2.1.1

Written Presentation 15  
  / 15 HD [15 – 12.75] A [12.5 – 11.25] B [ 11 – 9.75]: C [9.5 – 7.5] F [7 – 0]
Overall mark for this section    
Writing style is tailored for the intended audience.   HD A B C F
    □       Writing style is consistent throughout report.

□       Writing style is specifically tailored for the intended (non-technical) audience.

□       Writing style is mostly consistent throughout report.

□       Writing style is mostly tailored for the intended (non-technical) audience.

□       Writing style is sometimes consistent throughout report.

□       Writing style is sometimes tailored for the intended (non-technical) audience.

□       Writing style is rarely consistent throughout report.

□       Writing style is rarely tailored for the intended (non-technical) audience.

□       Writing style is inconsistent or non-existent throughout report.
Clear and appropriate paragraphing   HD A B C F
    □       All paragraphs are appropriately structured so each contains a single topic, and  evidence and argument within them are logically ordered. □       Paragraphs are mostly appropriately structured so that each contains one topic and evidence and arguments within them are logically ordered. □       Paragraphs generally contain a single topic with related evidence and argument.

□       Some are less well developed (fragments) or have more than one topic (overly long).

□       Paragraphs show some arrangement into related ideas but the topic is implicit or unclear.

□       Paragraphs tend to be fragmentary or overly long.

□       Paragraph topics are unclear and there is little structure for ideas.  

□       Paragraphs are generally fragmentary or overly long.

Grammar, punctuation, spelling   HD A B C F
    □       Your paper is free of grammatical and syntactic errors and demonstrates clarity, and sophistication, of expression. □       Only a few grammatical or syntactic errors with generally clear written expression. □       Some grammatical and syntactic errors but not so many so as to significantly affect the clarity of your written expression. □       Significant evidence of grammatical and syntactic errors, which has affected the clarity of your written expression. □       You have made many grammatical and syntactic errors, so your written expression is difficult to follow.
Appropriate in-text referencing   HD A B C F
    □       In-text references skilfully integrated into the essay in a way that increases its authority. □       All research appropriately referenced but some awkward instances. □       Most ideas/evidence is reference but there are gaps or too much reliance on direct quotes. □       Only some ideas are referenced;

□       Too much reliance on direct quotes for issues and concepts;

□       Only direct quotations referenced.

□       Few (if any) referenced ideas, facts or opinions.
Appropriate reference list   HD A B C F
    □       Fully compliant with current Harvard system. Few (if any) errors. □       Compliant with Harvard system, with some errors. □       Broadly compliant but inconsistent use of Harvard format.

□        Missing page numbers.

□       Non-Harvard system used and/or many errors are present.

□       No consistent referencing standard applied.
Project elements 70  
Project Schedule /20 HD [20 – 16.5] A [16 – 14.5] B [ 14 – 12.5]: C [12 – 5] F [10 – 0]
    □       Project Schedule with project’s tasks, major milestones and timetable.  Tasks are broken down into relevant subtasks which are allocated to individual members.   Schedule also clearly identifies ALL student activities, personal or school/work related, which will impact on the project.
Executive Summary /15 HD [15 – 12.75] A [12.5 – 11.25] B [ 11 – 9.75]: C [9.5 – 7.5] F [7 – 0]
See guidelines in the Communications Skills Handbook   □       The executive summary is an appropriate length (10% under or over inclusive).

□       The summary meets all formatting requirements.

□       The summary meets all content requirements: purpose, analysis, findings, and recommendations.

□       The executive summary is an appropriate length (10% under or over inclusive)..

□       The summary meets most formatting requirements.

□       The summary meets most content requirements: purpose, analysis, findings, and recom-mendations.

□       The executive summary is an appropriate length (10% under or over inclusive)..

□       The summary meets some formatting requirements.

□       The summary meets some content requirements: purpose, analysis, findings, and recom-mendations.

□       The executive summary is slightly over or under the required length (exceeding 10%).

□       The summary meets few of the formatting requirements.

□       The summary meets few of the content requirements: purpose, analysis, findings, and recom-mendations.

□       The executive summary was either missing or incomplete or unsuitable.

 

Project Background /15 HD [15 – 12.75] A [12.5 – 11.25] B [ 11 – 9.75]: C [9.5 – 7.5] F [7 – 0]
    Provide the context in which the project exists.  If the project is for a specific organisation, discuss the organisations background first and then discuss the project within the context of the organisation.  This section must provide a sufficient briefing on the project background and any technology it incorporates such that the reader will understand the context and importance of your project.  Remember, do not assume any prior technical knowledge.  All technical terms must be explained and all acronyms defined.
Purpose of App /10 HD [10 – 8.5] A [8 – 7.5] B [ 7 – 6.5]: C [6 – 5] F [4.5 – 0]
    Describe the purpose of your project.  Explain to your reader what problem(s) you are trying to solve and why it is important to do so.  Keep in mind that the purpose of the report you are writing is to persuade whoever you need to fund your project, that your project is worth funding from a ‘Why should I care?’ point of view and also for the anticipated intrinsic and intangible benefits gained by the organisation due to the deployment of  your application.
Problem Solution /10 HD [10 – 8.5] A [8 – 7.5] B [ 7 – 6.5]: C [6 – 5] F [4.5 – 0]
    Discuss how you plan to address the problem outlined above.  Make sure you clearly describe how your proposed solution will address the problems(s) you’ve discussed.
  /100 TOTAL MARKS

 

IT Paper


IT Paper

If you have not installed Microsoft Visual Studio Software in a prior course, follow these instructions for installation steps.
Download the provided Unit2.zip document and save it to your computer. Click here to download the Unit2.zip document.
Right-click the Unit2.zip folder and Extract All.
Open Visual Studio and select File > Open Web Site from the menu.Navigate to the extracted Unit2 folder and select it to open the Website in Visual Studio.
Select Website > Add New Item from the menu and select Style Sheet from Add New Item dialog box. Name the style sheet Unit2.css.
Add style rules to Unit2.css to accomplish the following:
Ensure that the semantic elements format in older browsers.
Eliminate the default spacing around all elements.
Use the Verdana font or any available sans-serif font for the text.
Set the font size for the body to 80% of the browser’s default font size.
Set the width of the window to display the document to 700.
Center the text in the header.
Provide spacing at the top of the level-one heading in the header to the equivalent of one capital M without affecting the spacing of the image.
Set the font size for the level-one heading in the header to three times the browser’s default font size.
Display the image in the header to the right of the text.
Ensure the text of the section does not flow around the image in the header.
Display the image in the first paragraph to the left of the text.
Set the font size for the level-one heading in the section to two times the browser’s default font size.
Center the text in the level-one heading in the section.
Provide spacing at the bottom of the level-one heading in the section to the equivalent of one capital M.
Set the font size for the level two headings in the section to one and one-half times the browser’s default font size.
Center the text in the level two headings in the section.
Center the text in the navigation.
Provide spacing at the bottom of the navigation to the equivalent of two capital Ms.
Bold the text of a hyperlink when the user hovers over the hyperlink or a hyperlink gets the focus.
Set the text of a hyperlink to red when the user hovers over the hyperlink or a hyperlink gets the focus.
Display the footer on the right side of the page.
Set the font size of the text in the footer to 75% of the browser’s default font size .
Validate the CSS style rules.
Zip (compress) the Visual Studio project folder into a .zip file to submit.

%d bloggers like this: