代做Fundamental of Computing帮做R编程

- 首页 >> OS编程

Modules Information:

Module

Fundamental of Computing

Session

May 2024

Programme

MASTER IN INFORMATION TECHNOLOGY(MITLS)

Summary of Coursework Breakdown:

(as stated in course structure)

No

Description of coursework

Learning Outcomes covered

Marks allocated

1

Individual Assignment (Part 1)

CLO1

30%

2

Individual Assignment (Part II)

CLO2

40%

3

Individual Assignment (Part III)

CLO3

30%

 

CONTRIBUTION OF THE COURSEWORK TO THE COURSE

100%

 

 

 

 

TOTAL

100%

Penalty for late submission:

1 day - minus 20% of total mark awarded

2 days - minus 50% of total mark awarded

3 days - 0 mark for this piece of coursework

 

Coursework #1

Modules Information:

Module

Fundamental of Computing

Session

May 2024

Programme

MASTER IN INFORMATION TECHNOLOGY(MITLS)

Coursework Type

Individual Assignment

Percentage

100%

Handout Date

Week 3 Monday

Due Date

Week 6 Wednesday, 19th June 2024 before 11.00 pm.

Student’s Declaration:

By attempting this individual assignment 1, Iacknowledge that:

    I have read and understand the conduct requirements for this individual assignment.

    I understand what is meant by plagiarism.

Learning Outcomes Assessed:

CLO1

Evaluate the basic principles of system modelling in systems analysis, design and development according to life cycle methodology. (C4, PLO1)

CLO2

Construct appropriate database techniques in conceptual and logical modeling to complete related activities. (P3, PL06)

CLO3

Relate the importance of information security and ethical concerns towards computing context. (C4, PLO2)

 

Penalty

Penalty

Student will be awarded ZERO if he/she does not complete their individual assignment (without valid reasons). The lecturer has the right NOT to extend the due date for the absentee, except in the case of protracted (and / or certified) illness.

Instructions: This assignment consists of THREE (3) parts as follows; Part 1

Read the Bright Future School Case Study below: Bright Future School

Bright Future School is a small private school that has retained your services as a systems

analyst to assist in the development of a new information system for the school’s administrative needs.

Background

Based  on  preliminary  research  and  fact-finding,   the  proposed  billing  system  includes components for registering students, generating drop-in reports, generating bills, recording payments, generating receipts, and generating monthly reports. You will now proceed with the systems analysis phase by developing an object-oriented model of the billing system.

Tasks

1.            Design at least four class objects for Bright Future’s new system including attributes and methods.

2.         Create a class diagram for the system classes that you identified in Task 1 (above).

3.         Are there any classes in Bright Future School’s system that can be grouped into subclasses? Why would you want to group data elements into subclasses?

4.         Design a use case model for a method in the new system.

Part 2

Based on the Case Study from Part 1, you are required to design and develop a small

database for Bright Future School using Microsoft Office Access. You are expected to

complete the following tasks; Tasks;

1.   Identify relevant business rules related to the Case Study

2.   Identify relevant entities and attributes.

3.   Draw an Entity-Relationship Diagram (ERD) related to the Case Study

4.   From the  ERD,  create database Table with proper primary key, foreign  keys and database relationship.

Upon completion of the above tasks, you are required to document all the completed task including the screenshot of created Tables and relationships.

Part 3

Based on the Case Study from Part 1, as the Chief Network Security Officer, you are required to investigate and produce a report on the network security requirements needed for this firm.

You are to produce a complete set of computer security policies and procedure for the director. The breakdown of the report is as follow:

1.0                      Executive Summary

2.0                      Background Introduction 3.0                      Business Strategy

4.0                      Threat, Risk & Vulnerability Analysis 5.0                      Policies and Goal Security

6.0                      Security Policy

7.0                      Physical Security

8.0                      Network Security architectures, designs 9.0                      Operating System and Data Security

10.0                    Cryptography

11.0                   Ethics

12.0                   Privacy

13.0                   Intellectual Property

14.0                   Conclusion

15.0                   References



站长地图