代做Fundamental of Computing帮做R编程
- 首页 >> OS编程
Module’s Information: |
|||||
Module |
Fundamental of Computing |
||||
Session |
May 2024 |
||||
Programme |
MASTER IN INFORMATION TECHNOLOGY(MITLS) |
||||
Summary of Coursework Breakdown: (as stated in course structure) |
|||||
No |
Description of coursework |
Learning Outcomes covered |
Marks allocated |
||
1 |
Individual Assignment (Part 1) |
CLO1 |
30% |
||
2 |
Individual Assignment (Part II) |
CLO2 |
40% |
||
3 |
Individual Assignment (Part III) |
CLO3 |
30% |
||
|
CONTRIBUTION OF THE COURSEWORK TO THE COURSE |
100% |
|||
|
|
|
|||
|
TOTAL |
100% |
|||
Penalty for late submission: |
|||||
1 day - minus 20% of total mark awarded 2 days - minus 50% of total mark awarded 3 days - 0 mark for this piece of coursework |
Coursework #1 |
|||
Module’s Information: |
|||
Module |
Fundamental of Computing |
||
Session |
May 2024 |
||
Programme |
MASTER IN INFORMATION TECHNOLOGY(MITLS) |
||
Coursework Type |
Individual Assignment |
||
Percentage |
100% |
||
Handout Date |
Week 3 Monday |
||
Due Date |
Week 6 Wednesday, 19th June 2024 before 11.00 pm. |
||
Student’s Declaration: |
|||
By attempting this individual assignment 1, Iacknowledge that: I have read and understand the conduct requirements for this individual assignment. I understand what is meant by plagiarism. |
|||
Learning Outcomes Assessed: |
|||
CLO1 |
Evaluate the basic principles of system modelling in systems analysis, design and development according to life cycle methodology. (C4, PLO1) |
||
CLO2 |
Construct appropriate database techniques in conceptual and logical modeling to complete related activities. (P3, PL06) |
||
CLO3 |
Relate the importance of information security and ethical concerns towards computing context. (C4, PLO2) |
||
|
|||
Penalty |
|||
Penalty Student will be awarded ZERO if he/she does not complete their individual assignment (without valid reasons). The lecturer has the right NOT to extend the due date for the absentee, except in the case of protracted (and / or certified) illness. |
Instructions: This assignment consists of THREE (3) parts as follows; Part 1
Read the Bright Future School Case Study below: Bright Future School
Bright Future School is a small private school that has retained your services as a systems
analyst to assist in the development of a new information system for the school’s administrative needs.
Background
Based on preliminary research and fact-finding, the proposed billing system includes components for registering students, generating drop-in reports, generating bills, recording payments, generating receipts, and generating monthly reports. You will now proceed with the systems analysis phase by developing an object-oriented model of the billing system.
Tasks
1. Design at least four class objects for Bright Future’s new system including attributes and methods.
2. Create a class diagram for the system classes that you identified in Task 1 (above).
3. Are there any classes in Bright Future School’s system that can be grouped into subclasses? Why would you want to group data elements into subclasses?
4. Design a use case model for a method in the new system.
Part 2
Based on the Case Study from Part 1, you are required to design and develop a small
database for Bright Future School using Microsoft Office Access. You are expected to
complete the following tasks; Tasks;
1. Identify relevant business rules related to the Case Study
2. Identify relevant entities and attributes.
3. Draw an Entity-Relationship Diagram (ERD) related to the Case Study
4. From the ERD, create database Table with proper primary key, foreign keys and database relationship.
Upon completion of the above tasks, you are required to document all the completed task including the screenshot of created Tables and relationships.
Part 3
Based on the Case Study from Part 1, as the Chief Network Security Officer, you are required to investigate and produce a report on the network security requirements needed for this firm.
You are to produce a complete set of computer security policies and procedure for the director. The breakdown of the report is as follow:
1.0 Executive Summary
2.0 Background Introduction 3.0 Business Strategy
4.0 Threat, Risk & Vulnerability Analysis 5.0 Policies and Goal Security
6.0 Security Policy
7.0 Physical Security
8.0 Network Security architectures, designs 9.0 Operating System and Data Security
10.0 Cryptography
11.0 Ethics
12.0 Privacy
13.0 Intellectual Property
14.0 Conclusion
15.0 References