Develop prototype web-based application for grouping students into teams for improved performance. Research and establish the grouping criteria through interviews and secondary research. Design, develop and test the web-based application.

Critical reflection on my undergraduate dissertatiton

Chapter 1 – Introduction

Being a student in an undergraduate course can be exciting and challenging at the same time. The number of assessments and projects are fairly calculated, so a student can achieve a variety of industry experience and overcome their limitations. But what pushes a student’s impediments is when they are presented with group assignments. When working on complex projects, teamwork experience is essential for a true industry feel. According to Harmer (2007) the most common assignation of groups is either the teacher forms the groups, or the students are allowed to pick who they are going to work with. Most of the times when a student is presented with a group assignment, they are asked to choose their own group. This is where most scholars will choose their newly acquainted colleagues, whilst the other students who are not as social will pair up with who’s left just so they can be done with it. Students will carry out with their formed group throughout the years confronting every group assignment in the same structure. But is this the best way to assign students in groups? Studies have shown groups have better outcomes when they are selected based on a mixture of homogeneous (their average grades) and an assortment of interests or traits (Brickell et al., 1994). This paper will research, propose, and develop an application for grouping students into teams enhanced productivity.

1.1 Aims and Objectives

1.1.1 Aims

Develop prototype web-based application for grouping students into teams for improved performance.

1.1.2 Objectives

Objective 1: Research and establish the grouping criteria through interviews and secondary research.

Objective 2: Design, develop and test the web-based application.

1.2 Ethical Issues

The interview participants have been informed and their consent has been given. All the data collected through interviews is being stored securely on the university cloud storage. The data will be deleted upon finalising the study year. The subjects will keep their anonymity and confidentiality. No sensitive information about the interviewees will be disclosed.

The application will not consist of any real data or APIs. The testing will be done with fictive data to assess the functionality of the web-based application.

In the case of further research into the application, some ethical issues are to be considered such as but not limited to protecting student data, obtaining students consent for holding sensitive data and assessing their interests for the group formation tool.

Analyze the plan and make proper adjustments to meet the timeline requirements, as well as to ensure that resources are properly allocated.

IT 510 Module Two Homework Activity Guidelines

Use Microsoft Project to review the plan provided to you. The project plan is the initial draft based on the case. You will need to analyze the plan and make proper adjustments to meet the timeline requirements, as well as to ensure that resources are properly allocated. Additionally, you will add resource per hour costs so that you can include the estimate of cost for the project. Perform the following tasks and prepare a document that includes the answers to questions in the task list below:

1. Using Microsoft Project, open the plan (Module Two Homework Project File, in the Assignment Guidelines and Rubrics section of the course).

2. Review the different project views. You can do this by using the dropdown arrow on the Gantt Chart icon in the top left of the project menu. Review the following project view:

a) Gantt ChartUsage Table
     i.
From the Gantt Chart view, select the View tab from the top toolbar.
     ii.
On the View tab, select the Tables dropdown and select Usage.

b) Network Diagram

c) Resource Sheet

d) Resource UsageSummary Table
     1.
Select the Resource Usage view from the Gantt Chart dropdown.
     2.
While you are in the Resource Usage view, select the View tab from the top toolbar.
     3.
On the View tab, select the Tables dropdown and select Summary.

e) Task Sheet

f) Timeline
Reviewing these different views provides further insight into the project schedule. Note that the options under dropdown menus in Project will contain different content depending on which tab you have selected on the top toolbar. For example, if you have the Task tab selected, the Gantt Chart drop down will have different options than when the View tab is selected. Similarly, the Tables dropdown will change the view based on the specific chart being displayed.

3. Return to the Gantt Chart view. Notice the total duration is 56 days, which is more than two months.

a) Ensure that Auto Schedule is selected for the project.
i.
The status bar at the bottom of the screen should read, New Tasks: Auto Scheduled. If it does not, click on the New Tasks: . . . text in the status bar and select Auto Scheduled.
1.
You can also change this setting by selecting the Task tab from the top toolbar and clicking the Auto Schedule icon.

b) Change the following 14d tasks to 10d tasks:
     i.
Fact Find
     ii.
Review Existing System
     iii.
Create Web Page Prototype
     iv.
Create iOS Prototype
You realized that you meant two weeks, but that is 10 days in a project and not 14 days. Notice that the total duration is now 48 days and work is 768 hours, which is very close to two months in length.

4.
From the Gantt Chart dropdown, select the Resource Sheet.

a) Notice that two resources are red. These resources are assigned to more work than they have hours available to work. This means they are over allocated.

b) From the Gantt Chart dropdown, select Resource Usage.
i.
While you are in the Resource Usage view, select the View tab from the top toolbar.
ii.
On the View tab, select the Tables dropdown and select Summary. In this view, you can see (in the grid on the right) the number of hours allocated per day for each resource. Numbers in red indicate that there is an overallocation.

c) Note that the following tasks are overallocated:
i.
System Analyst
1.
Fact Find
2.
Review Existing System
3.
Review Solution Architecture
4.
Validate Prototype
ii.
Project Manager
1.
Create Business Case Document
2.
Create Schedule
3.
Fact Find
4.
Review Existing System
5.
Determine Recommendation
6.
Create Executive Presentation

7. Doubleclick the overallocated tasks to get the Assignment Information panel.
8.
On the General tab, change the Units from 100% to 50% and select OK.
9.
Note the change in the number of hours on the task after each change.
a.
Repeat this process for each of the overallocated tasks.
From the Gantt Chart dropdown, return to the Resource Sheet view and note that the resources are no longer in red. All overallocations have been resolved by reducing the units from 100% to 50%.

5. Return to the Gantt Chart. Select the View tab and, from the Tables dropdown, select Usage.
a)
Notice the following:
i.
Duration changed from 48 to 69 days.
ii.
Work remained the same at 768 hours.

b) Navigate to Help in Microsoft Project.
i.
Search for Duration Unit Work Formula.
ii.
Review the article titled Change the task type for more accurate scheduling.

c) In 2 to 3 sentences, respond to the prompt below in a Word document. Use the heading Resource Assignments.”
i.
Why did the duration change and work remain the same when the resource units were changed from 100% to 50%?

6. Change to the Resource Sheet. For each resource, enter the following hourly cost for the standard rate:
a)
Web Developer, $35/h
b)
Mobile Developer, $35/h
c)
Project Manager, $50/h
d)
System Analyst, $50/h

7. Change to the Gantt Chart view. Select the View tab and, from the Tables dropdown, select Cost.
a)
In 2 to 3 sentences, respond to the prompt below in your Word document. Use the heading Project Cost.
i.
What is your total project cost? Referencing the Duration Unit Work Formula, explain how changes in this formula can change your total project cost during the execution of the project plan.

8. Change to the Project tab and select Project Information. Click on the Statistics button. Take a screenshot of the Project Statistics dialog box and include this as the last item in your Word document.

James Anderson works in a team that supports smart water company customers who are struggling to keep up with the payments. He’s just received a call from an uncle of one of the customers, who is asking for details about a customer’s difficulties so that he can help the customer. What do you think James should do in this situation?

Security and threat management

“Launch of “Smart Care” – A Smart Healthcare System”
Smart Care is a start-up established in the South Wales Valleys to offer Smart Health Care digital services across Europe. You have recently joined the company as an employee-partner and asked to do a security and threat analysis and submit a report with recommendations regarding secure launch and operation of Smart Care. The features of Smart Care are following:

• Telemedicine operations
• Smart hospitals
• Augmented Reality/ Virtual Reality patient appointments
• Remote Patient monitoring devices
• Drone-assisted medicine delivery to smart homes

Figure 1: Smart Care at the centre of Digital Health Care Services ecosystem
Figure 1 shows the operating landscape of Smart Care. The main Smart Care participants include patients, healthcare service providers, pharmaceutical companies, regulatory bodies and Government entities. Once you have moved from the Boardroom to the Breakroom, you have scribbled down the following requirements that you aim to complete as a set of activities as part of the more complex process:

Question 1: Identify data assets, their owners, their sensitivity level and specify data handling controls: (marks 18%; approximately 250 words)
a) Identify data assets (minimum five non-overlapping data assets for each participant, namely, doctors, patients and regulatory body) (marks 3%; approximately 30 words)
b) Identify data asset owner for all identified 15 data assets (marks 3%; approximately 30 words)
c) Evaluate data asset classification levels (i.e., sensitivity as high, moderate, and low) for CIA Triad. (marks 3%; approximately 15 words)
d) Identify adequate data handling controls for operations, namely, access control (confidentiality), encryption (confidentiality and integrity) and monitoring (integrity and availability) for high, moderate, and low sensitive data. (marks 9%; approximately 175 words)

Question 2: As a result of a joint-venture with a US organisation, Smart Care is expected to grow as a medium-sized organisation (50 to 249 employees).
You are required to write few sections of an Information Security Management Policy document. (marks 40%; approximately 1150 words)
a) Asset Management (marks 10%; approximately 300 words)
b) Physical Security Controls (marks 10%; approximately 300 words)
c) Disaster Recovery Plan for Business Continuity (marks 20%; approximately 550 words)

Question 3: Solve the following problems: (marks 42%; approximately 1000 words)
A. James Anderson works in a team that supports smart water company customers who are struggling to keep up with the payments. He’s just received a call from an uncle of one of the customers, who is asking for details about a customer’s difficulties so that he can help the customer. What do you think James should do in this situation? (5 marks; approximately 150 words)

B. Catherine runs a large smart transport company. She’s recently advertised for new staff. She’s been inundated with applications and doesn’t have a long time to review them all. She is travelling with a colleague to a conference tomorrow, so she’s planning to take a laptop on the aeroplane, along with the paper CVs she’s received. That way, they can both sort through everything on the journey. How would you advise her to take appropriate actions to protect personal data of applicants? Provide technical advice. (5 marks; approximately 150 words)

C. Meet Mr Khan. He’s got an appointment to visit his doctor, but unfortunately, it doesn’t turn out quite how he expected. As Mr Khan arrives at the surgery, he’s surprised to find personal details about his appointment on display in the waiting room, for all to see. Then when he eventually talks to the doctor, it turns out she’s referring to the wrong patient file. It’s all very annoying. The doctor is unable to find his file anywhere. List the data mismanagement issues and identify possible solutions to avoid this type of situation in the future. (6 marks; approximately 200 words)

D. Know your enemy: identify misclassified threats from the following figure and suggest corrective measure. (14 marks; approximately 300 words) Figure Source: Information Security Essentials – Understanding the Threats (USW)

E. Discuss one example related to Social Engineering Threats in each of the following categories in the smart emergency services scenario: identify a relevant security control and mention its ISO 27001 Standard category: (technical; physical; legal and administrative): (12 marks; approximately 200 words )
a. Authority
b. Liking
c. Reciprocation
d. Social Validation

Provide a brief description of each screen shot about the information it contains. Briefly describe the main steps that you think are necessary and important to locate date and time values while analysing the file.

Digital Forensics – Exploring MFT and Exploring Metadata of File

Hands-on Project 5-2, Exploring MFT and Exploring Metadata of File (7 Marks)

Note this project has the maximum marks in this task and requires advanced knowledge and skills of the topic. Write an MS Word report after completing this project describing what metadata you have discovered from the file you analysed using WinHex editor. Note that if you like, you can use any other Hex editor as well such as HxD or Neo. You are required to compare your results with the information provided in the textbook and comment on any discrepancies that you may have encountered. Provide screen shots of the steps completed in the project showing the results of correct date and time values that you have recorded. Provide a brief description of each screen shot about the information it contains. Briefly describe the main steps that you think are necessary and important to locate date and time values while analysing the file.

Develop a security plan for the network improvement initiative. Conduct a review of the current network security for your target organization. Identify at least 5 major areas of security risk for the network.

Network Security

Unauthorized access to networks and the information they contain can present significant problems to an organization. Part of a good network improvement includes a review of system security and identification of potential problem areas.

For this assignment, you will develop a security plan for the network improvement initiative.

Security Plan

Conduct a review of the current network security for your target organization.

Identify at least 5 major areas of security risk for the network.

For each security risk area, develop and document a plan to reduce the security risk.

Include a description of any software, processes, or other changes necessary to implement the plan.

Anand Vaidya argues that it is a mistake to maintain that business ethics is unintelligible because ethical theories are indeterminate. Write an essay in which you argue Vaidya’s claim that the indeterminacy of ethical theory is not problematic is flawed.

Indeterminacy of ethical theory

Anand Vaidya argues that it is a mistake to maintain that business ethics is unintelligible because ethical theories are indeterminate. Write an essay in which you argue Vaidya’s claim that the indeterminacy of ethical theory is not problematic is flawed.

Complete to demonstrate competency. This document includes the context and conditions of your assessment, the tasks to be completed by you and an outline of the evidence to be gathered. Evaluate this document and provide constructive feedback to their training organisation if they feel that this document can be improved.

Apply advanced programming skills in another language

Student Assessments Pack

What is the purpose of this document?

The Student Pack is the document you, the student, needs to complete to demonstrate competency. This document includes the context and conditions of your assessment, the tasks to be completed by you and an outline of the evidence to be gathered.

 The information includes the following:

  • Information related to the unit of competency
  • Guidelines and instructions to complete each task and activity
  • A student evaluation form

Student Evaluation Form

These documents are designed after conducting thorough industry consultation. Students are encouraged to evaluate this document and provide constructive feedback to their training organisation if they feel that this document can be improved.

Link to other unit documents

  • The Student Pack is a document for students to complete to demonstrate their competency. This document includes context and conditions of assessment, tasks to be administered to the student, and an outline of the evidence to be gathered from the student.
  • The Unit Mapping is a document that contains information and comprehensive mapping with the training package requirements.
  • The Unit Requirements is a document that contains information related to the unit of competency for the Training Organisation staff and students.

Develop an understanding of data structures and programming techniques in context of a programming language. Demonstrate an understanding of how programs are developed i.e. from concept to development and testing. Demonstrate an ability to write programs using appropriate structure and language rules. Assignment Task

Introduction to Programming

Assignment Brief

Description:

The assignment is given as three separate tasks. Each task is to be answered individually. Task 1 has been written and designed to check your knowledge and understand of data structures and programming techniques, including pseudocode. Task 2 checks your knowledge and understanding of Algorithms and arrays, in order for you to put given integers in the correctly stated order. Task 3 gives you the opportunity to write an extended code, once the initial pseudocode has been written. This particular task will check your knowledge and understanding of loops and IF statements.

Note:

The code that you write in order to complete all three tasks will be documented in two ways. The first being screenshotted evidence within your submitted word document, with detailed reasoning and justification for your processes. Secondly, your written code for each task that you have screenshotted, will be copy / pasted into the appendices at the end of your submission, so it can be checked for validity within the software.

 

Learning outcomes:

After completing the modules you should be able to:

  • LO1 Develop an understanding of data structures and programming techniques in context of a programming language.
  • LO2 Demonstrate an understanding of how programs are developed i.e. from concept to development and testing.
  • LO3 Demonstrate an ability to write programs using appropriate structure and language rules.

Assignment Task

Task 1:

Building contractor

You are developer and you wish to build five new houses, all from wood and all uniform. Each house has 3 rooms, all with exactly the same dimensions, i.e. 2m x 4m. Wood prices have been set at £6.00 per meter. You need to determine the total cost of the build of all five houses. Initially, you will need to write the pseudocode to solve the following problem, define the variable name and data types, plus write the code to solve the total build cost.

Hint: Determine the area of each room in each house and the total area of all rooms combined. Thus, giving the total price of the construction.

 

Task 2:

Internet traffic

As a digital business analysist, you have been asked by your line manager to supply the last seven months traffic figures to your company’s website. At the moment, the traffic numbers are not in ascending order. Write the pseudocode to solve the initial problem and then write a Java algorithmic program to sort the array of given traffic figures. The traffic numbers to sort correctly are:  2, -17, 8, 26, 1, 0, 84

Hint: Bubble sort

Task 3

Car repairs

An owner of an auto repair shop wishes to organise his team of mechanics at the beginning of the day. To make the distribution of work equal, he organises cars with an even amount of faults into bay 1 and cars with an odd amount of faults into bay 2. There are nine cars in total Write the pseudocode for the problem, then write a Java program to separate the even and odd number of car faults. Have all even numbers displayed first, then odd numbers at the end. The repairs required for each car are as follows. 18, 14, 12, 6, 4, 21, 19, 9, 3

Using the ABC Auto Detail business project SOW linked into the content, prepare the Work Break Down Structure for Assignment 5A. Use the Visio software to create the graphical break down of project tasks into small work packages.

Work Break Down Structure for new ABC Auto Detail

The Instructions

 Using the  ABC Auto Detail business project SOW linked into the content, prepare the Work Break Down Structure for  Assignment 5A.  Use the Visio software to create the graphical break down of project tasks into small work packages. 

 

The first assignment in Module 5 is the WBS (work breakdown structure) diagram in visio for the term project. See https://www.projectinsight.net/project-management-basics/project-management-schedule for an example. This diagram should contain all the activities and tasks of the project.

For many of the requirements you will need to envision your project – what type of requirements are necessary to complete the project. These will include researching and purchasing the parts of the solution, interviewing stakeholders and users for business requirements, understanding any existing data to be accessible to the acquired system.

The SOW is a starting point for your assignment. Think about the project and envision your open questions as points of discussions with stakeholders to develop the requirements you will need to fulfill to complete this assignment. You can use your previous business experience or knowledge to “fill in” the requirements template.

What time did the attack happen? How did the hacker get into the network? What computers were compromised? What computers were accessed? What data was extracted from the network? What type of attack was conducted? Howl long did the attacker have access to the network? Is there any persistence on the network for future attacks?

Network intrusion

When completing the case study you must have a minimum of 3-5 outside sources cited and referenced in the paper. Your full 3 page term paper is due at the end of week 8. In addition to the 3 pages of the paper itself, you must include a title page and a references page. Your title page must include the title of your paper, the date, the name of this course, your name, and your instructor’s name. Your references page must be written in APA citation style

Scenario: You are hired by JLA Enterprise to conduct a Forensic Examination after a network intrusion occurs at their corporate office. Your job is to determine the source of the network intrusion and provide as much information regarding the attack as possible. Here are some things to consider when explaining what happened during the network intrusion:

What time did the attack happen? How did the hacker get into the network? What computers were compromised? What computers were accessed? What data was extracted from the network? What type of attack was conducted? Howl long did the attacker have access to the network? Is there any persistence on the network for future attacks?