Showing posts with label computerscience. Show all posts
Showing posts with label computerscience. Show all posts

Wednesday, 16 September 2020

IT 8100 DATABASE ARCHITECTURE AND DESIGN

UK assignment helper





 IT 8100 DATABASE ARCHITECTURE

AND DESIGN


Group Activity

3

“Student Information

System”

ERD Conceptual Model and

Structured Query Language (SQL)


Group Activity

3 “Student Information System”

3

ERD Conceptual Model

1.

Create the Entity Relationship

Diagram ERD)

Create the Entity Relationship

Diagram ERD) for the following

tables:

Student

Course

Offering

Faculty

Enrollment




2. Convert the Entity ER

Diagram to Relational

Schemas

Convert the Entity ER

Diagram to Relational

Schemas.

Create the appropriate

Relationships, Cardinality

1 1, 1 N, N 1, M N ), and

Key Fields


Use these attributes for your tables:

Student

stdSSN

stdFirstName

stdLastName

stdCity

stdState

stdZip

stdMajor

stdClass

stdGPA

Course

CourseNo

crsDesc

CrsUnits

O ffering

OfferNo

CourseNo

OffTerm

OffYear

OffLocation

OffTime

FacSSN

OffDays

Faculty

FacSSN

FacFirstName

FacLastName

FacCity

FacState

FacZipCode

FacRank

FacHireDate

FacSalary

FacSupervisor

FacDept

Enrollment

OfferNo

StdSSN

EnrGrade


3

. Write the Structured Query

Language (SQL ) for the Relational

Schemas

Write the Structured Query

Language (SQL) for

the Relational Schemas

Declare the appropriate

column names, data types,

lengths and constraints


4. Write Structured

Query

Language (SQL ) Commands

Write and enter the SQL commands to add records into your

Student Information System tables (at least 5 records in each table).

Write the SQL commands to produce four different reports,

Including joins between tables.

Queries using l ogical, arithmetic, and comparison operators.

Sort the reports by different tables.

Tuesday, 15 September 2020

DATABASE ARCHITECTURE AND DESIGN

UK assignment helper


 




IT 8100 DATABASE ARCHITECTURE AND DESIGN


“Contract-Supplier System”

ERD Conceptual Model

Group Activity 2 “Contract-Supplier System”

3

• A company negotiates contracts with suppliers to provide certain amount of items at a fixed price

 • Orders are placed against any of the already  negotiated contracts 

• A contract could provide items to any number of  orders.

 • An order may include any number of items negotiated in the contract

 • Orders should not exceed the maximum amount of items quoted in the contract 

• All items in an order must be provided as part of a single contract and a single project ERD Conceptual Model

Group Activity 2 “Contract-Supplier System”


Create the Entity Relationship Diagram (ERD) Conceptual Design 

Final Project Guidelines and Rubric

UK assignment helper

 






IT 412: Final Project Guidelines and Rubric 

Overview There are two components to the final project for this course. The first component is a risk analysis paper. The second component is a risk mitigation plan presentation to stakeholders that illustrates an organization’s regulatory position related to a given scenario. This project is divided into two milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Three and Five. The final product will be submitted in Module Seven. 

 

In this assignment, you will demonstrate your mastery of the following course outcomes: 

 

 Evaluate federal, regional, and state cyberlaws and ethics regulations for their impact on organizations’ IT and computing policies and operations  Assess personal and professional ethical violations for the extent to which they impact IT and computing within organizations  Recommend policies and strategies that align with cyberlaw and ethics guidelines for facilitating compliance and addressing non-adherence  Utilize cyberlaw and ethics guidelines in creating IT-specific codes of ethics for mitigating stakeholder and organizational risk 

 

Scenario ABC Healthcare is a startup company with 50 employees. The company’s computer network is shown in Figure 1 below. The healthcare data server contains the company's records, including copies of patient health records with personally identifiable data, patient billing, company financials, and forms. 

 

You have been hired as the IT network security officer, reporting directly to the chief information officer (CIO). Currently, there is a network administrator who has very limited experience and worked as a desktop technician prior to joining ABC. This network administrator helped set up the existing network. In addition, ABC plans to hire a desktop technician and a website developer/programmer who will report directly to the CIO. 

 

There are no policies or guidelines for employees’ usage of the computers and network. Network setup was done by various vendors, and all of the programs use default usernames and passwords. Wireless access has been set up for staff using wireless laptops. The same wireless access point also provides clients access to the internet. Some staff members bring in their own computers and connect them to the network. Employees use the work systems for personal web browsing and to check personal email accounts. 

 

As part of network security, management set up a video monitoring system throughout the office. Employees are not notified of any monitoring. 

There is a copier/printer in the front office that is used by employees. Currently, all unused copies are left next to the copier for recycling. 


 

 

 

 

Figure 1 

 

The administration office room uses an open cubicle structure for its staff. Figure 2 depicts the cubicles and seating of its sta f. Staff members sometimes complain that they can hear each other during the work day. 


 

 

 

Figure 2 

 

 

Prompt Create a comprehensive risk analysis narrative in which you assess ABC Healthcare’s information systems for ethics violations and cyberlaw compliance, and research the framework for creating an acceptable use-of-technology policy and code of ethics. 

 

Next, using PowerPoint, Google Presentation, or Prezi, create a presentation in which you recommend appropriate strategies for remediating the instances of ethics violations and cyberlaw noncompliance you identified in your risk analysis. Propose an organizational code of ethics related to information technology that prevents future violations and noncompliance, and propose an acceptable use-of-technology policy that addresses non-adherence. 


 

 

Specifically, the following critical elements must be addressed: 

 

I. Risk Analysis Paper 1. Describe the information technology structure of the organization in the given scenario. 2. Identify specific cyberlaws and ethics regulations that pertain to the organization and its computing operations in the scenario. 3. Organizational ethics violations i. Classify unethical behaviors with respect to whether they are personal or professional in nature, being sure to support your position with specific examples. ii. Assess the impact of the unethical behaviors on IT and computing within the organization. 4. Cyberlaw noncompliance i. Identify instances of cyberlaw noncompliance, being sure to cite the specific regulation(s) being violated. ii. Assess the impact of the noncompliance on IT and computing within the organization. 5. Acceptable use-of-technology policies research i. Compare and contrast acceptable use-of-technology policies from various organizations. You can find suggested organizations below or use policies of your own choosing. ii. Select aspects of the acceptable use-of-technology policies you have researched that you feel could be adapted to meet the needs of the organization, and explain how you would adapt them. 6. Codes of ethics research i. Compare and contrast IT-specific codes of ethics from various organizations. You can find suggested organizations below or use codes of ethics of your own choosing. ii. Select aspects of the codes of ethics you have researched that you feel could be adapted to meet the needs of the organization, and explain how you would adapt them. 

 

IT Acceptable Use Policies 

 

There are many areas within the field of IT, and each area’s policies may vary based on specialization. IT does not have one rule-making body as other professions do. IT does, however, have many professional organizations that represent different specializations, such as security, operations management, and computing technology. 

 

SANS Institute Acceptable Use Policy ISSA Acceptable Use Policy Pennsylvania College of Technology IT Acceptable Use Policy AT&T Acceptable Use Policy 


 

 

IT Codes of Ethics 

 

Professional organizations provide codes of ethics that may vary slightly, depending on specialization. A code of ethics may also be provided by a business or educational organization. 

 

SANS Institute IT Code of Ethics ISSA Code of Ethics  K-State Information Technology Employee Code of Ethics 

 

Business Codes of Ethics 

 

AT&T Code of Ethics Microsoft Standards of Business Conduct 

 

 

II. Risk Mitigation Plan Presentation: Based on your research, you will create a multimedia presentation (suggested length of 5–10 slides) using a tool of your choice (for example, PowerPoint, Google Presentation, or Prezi). Your audience for this presentation is the organization’s management. This presentation will provide a brief overview of the issues you identified in your risk analysis and present your recommendations for addressing the problems identified in your analysis. The presentation must include the following elements: 

 

o Provide an overview of the issues you identified in your risk analysis. In other words, what were the unethical behaviors and instances of cyberlaw noncompliance? o Propose appropriate strategies that remediate the identified ethics violations and cyberlaw noncompliance. What can the organization do now to address the issues you have identified? o Recommend, based on your research, a brief list of appropriate policy statements that address acceptable use in facilitating future compliance and addressing non-adherence. In other words, how can the organization prevent the same or similar problem(s) in the future? o Recommend, based on your research, a brief IT-specific code of ethics that mitigates the risk of future instances of violation and noncompliance. In other words, how can the organization prevent the same or similar problem(s) in the future? 

 

Guidelines for Presentation: Your final presentation can be submitted in PowerPoint, Google Presentation, or Prezi format. 

 

 You can find various template designs on the internet for your presentation. Prior to selecting a specific style, consider your presentation from the perspective of your audience. Avoid distractions. Be consistent with the style of text, bullets, and sub-points to support a powerful presentation that allows your content to be the focus. 


 

 

 Each slide should include your key point(s). Do not place large blocks of text on the visuals. Add more extensive information in the presenter notes section.  Use clip art, AutoShapes, pictures, charts, tables, and diagrams to enhance, but not overwhelm, your content.  Be mindful of your intended audience. 

 

Below are links that offer helpful tips and examples for developing your presentation: 

 

 Making PowerPoint Slides  Beyond Bullet Points: The Better Way to Use PowerPoint  Really Bad PowerPoint and How to Avoid It 

 

 

 

Milestone One: Draft of Risk Analysis Paper, Sections 1–3 

Milestones 

In Module Three, you will submit a draft of Section 1: Information Technology Structure, Section 2: Cyberlaws and Ethic Regulations, and Section 3: Ethics Violations. This milestone will be graded using the Milestone One Rubric. 

 

Milestone Two: Draft of Risk Analysis Paper, Sections 4–5 In Module Five, you will submit a draft of Section 4: Cyberlaw Noncompliance and Section 5: Acceptable Use Policies of the risk analysis paper. This milestone will be graded using the Milestone Two Rubric. 

 

Final Submission: Risk Analysis Paper and Risk Mitigation Plan Presentation In Module Seven, you will submit the final risk analysis paper and the risk mitigation plan presentation. These should be complete, polished artifacts containing  all of the critical elements of the final product. They should reflect the incorporation of feedback gained throughout the course. This submission will be graded using the Final Project Rubric. 


 

 

Final Project Rubric Guidelines for Submission: Written components of this project must follow these formatting guidelines: double spacing, 12-point Times New Roman font, one- inch margins, and discipline-appropriate citations. The risk analysis paper should be 10–15 pages in length, and the risk mitigation presentation should have 5–10 slides. 

 

 

Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value Paper: Information Technology Structure Meets “Proficient” criteria and uses industry-specific language to establish expertise Comprehensively describes the information technology structure of the organization in the scenario Describes the information technology structure of the organization in the scenario, but description is inaccurate or lacks detail Does not describe the information technology structure of the organization in the scenario 5 Paper: Cyberlaws and Ethics Regulations Meets “Proficient” criteria and provides specific examples from similar organizations encountered during research Identifies specific cyberlaws and ethics regulations that pertain to the organization and its computing operations Identifies specific cyberlaws and ethics regulations but does not connect them to the organization and its computing operations Does not identify specific cyberlaws and ethics regulations 7 Paper: Ethics Violations: Personal or Professional Meets “Proficient” criteria, and examination includes harm caused by unethical behaviors Accurately classifies unethical behaviors as personal or professional in nature and supports position with specific examples Classifies unethical behaviors inaccurately, or does not support position with specific examples Does not classify unethical behaviors as personal or professional in nature 7 Paper: Ethics Violations: Impact Meets “Proficient” criteria and expands on the impact beyond immediate internal stakeholders Assesses the impact of unethical behaviors on IT and computing within the organization Assesses the impact of unethical behaviors but does not connect them to the organization, or discussion lacks detail Does not assess the impact of unethical behaviors on IT and computing within the organization 7 Paper: Cyberlaw Noncompliance: Regulation(s) Meets “Proficient” criteria, and examination includes harm caused by noncompliance Accurately identifies instances of cyberlaw noncompliance and cites specific regulation(s) being violated Identifies instances of cyberlaw noncompliance inaccurately, or does not cite specific regulation(s) being violated Does not identify instances of cyberlaw noncompliance 7 

Paper: Cyberlaw Noncompliance: Impact 

Meets “Proficient” criteria and expands on the impact beyond immediate internal stakeholders 

Assesses the impact of cyberlaw noncompliance on IT and computing within the organization 

Assesses the impact of cyberlaw noncompliance but does not connect it to the organization, or discussion lacks detail 

Does not assess the impact of cyberlaw noncompliance on IT and computing within the organization 


 

 

Paper: Acceptable Use Policies: Comparing and Contrasting 

Meets “Proficient” criteria, and examples are drawn from a broad range of resources 

Comprehensively compares and contrasts acceptable use-of- technology policies 

Compares and contrasts acceptable use-of-technology policies, but discussion lacks detail or is inaccurate 

Does not compare and contrast acceptable use-of-technology policies 

Paper: Acceptable Use Policies: Adaptation 

Meets “Proficient” criteria and provides detailed examples of how the adaptation will support the organization 

Selects aspects of the policies that could be adapted to meet the needs of the organization and explains how they would be adapted 

Selects aspects of the policies that could be adapted to meet the needs of the organization, but does not explain how they would be adapted 

Does not select aspects of the policies that could be adapted to meet the needs of the organization 

Paper: Codes of Ethics: Comparing and Contrasting 

Meets “Proficient” criteria, and examples are drawn from a broad range of resources 

Comprehensively compares and contrasts IT-specific codes of ethics 

Compares and contrasts codes of ethics, but codes are not IT- specific, or discussion lacks detail or is inaccurate 

Does not compare and contrast IT-specific codes of ethics 

Paper: Codes of Ethics: Adaptation 

Meets “Proficient” criteria and provides detailed examples of how the adaptations will support the organization 

Selects aspects of codes of ethics that could be adapted to meet the needs of the organization and explains how they could be adapted 

Selects aspects of codes of ethics that could be adapted to meet the needs of the organization, but does not explain how they would be adapted, or explanation is not accurate 

Does not select aspects of the codes of ethics that could be adapted to meet the needs of the organization 

Presentation: Overview 

Meets “Proficient” criteria and uses industry-specific language to establish expertise 

Provides a comprehensive overview of the issues identified in the risk analysis 

Provides an overview of the issues identified in the risk analysis, but the overview lacks detail 

Does not provide an overview of the issues identified in the risk analysis 

Presentation: Strategies 

Meets “Proficient” criteria and provides detailed examples of how the proposed strategies will remediate the identified issues 

Proposes appropriate strategies that remediate the identified ethics violations and cyberlaw noncompliance 

Proposes strategies that remediate the identified ethics violations or cyberlaw noncompliance, but not both, or the proposed strategies are inappropriate 

Does not propose appropriate strategies that remediate the identified ethics violations and cyberlaw noncompliance 

Presentation: Policy Statements 

Meets “Proficient” criteria and provides detailed examples of how the proposed policy statements will facilitate noncompliance and address non- adherence 

Recommends appropriate policy statements that address acceptable use in facilitating compliance and addressing non- adherence 

Recommends policy statements that address acceptable use in facilitating compliance or addressing non-adherence, but not both, or recommended policy statements are inappropriate 

Does not recommend policy statements that address acceptable use in facilitating compliance and addressing non- adherence 


 

 

Presentation: Code of Ethics 

Meets “Proficient” criteria and provides detailed examples of how the proposed code of ethics will mitigate the risk from the identified issues 

Recommends appropriate code of ethics that mitigates the risk of future instances of violation and noncompliance 

Recommends code of ethics that mitigates risk of future instances of violation or noncompliance, but not both, or the recommended code of ethics is inappropriate 

Does not recommend code of ethics that mitigates risk of future instances of violation and noncompliance 

Articulation of Response 

Submission is free of errors related to citations, grammar, spelling, syntax, and organization and is presented in a professional and easy-to-read format 

Submission has no major errors related to citations, grammar, spelling, syntax, or organization 

Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas 

Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas 

Earned Total 100% 

 

Monday, 14 September 2020

Short Paper Guidelines and Rubric

UK assignment helper





 IT 415 Short Paper Guidelines and Rubric

Short papers offer additional opportunities for analysis of the system design process. In the first short paper, you will discuss a sample system design

document, and in the second short paper, you will summarize each document that will be included in your detailed design.

You are required to write two short papers.

Guidelines for Submission: Submit assignment as a Word document with double spacing, 12-point Times New Roman font, and one-inch margins.

Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value

Content Demonstrates strong or Demonstrates knowledge with Demonstrates knowledge but Fails to demonstrate knowledge 20

adequate knowledge of the some errors or omissions with major errors or omissions of the materials

materials

Critical Analysis Provides a strong critical analysis Provides analysis and Provides analysis and Fails to provide critical analysis 20

and interpretation of the design interpretation of design interpretation of design and interpretation of the design

document document with some errors or document but with major errors document

omissions or omissions

Sources/Examples Sources or examples meet Sources or examples meet Sources or examples meet Source or example selection and 20

required criteria and are well required criteria but are less required criteria but are poorly integration of knowledge from

chosen to provide substance than adequately chosen to chosen to provide substance the course is clearly deficient

and perspectives on the issue provide substance and and perspectives on the issue

under examination perspectives on the issue under under examination

examination

Writing (Mechanics) Paper is clearly organized, well Paper is fairly well organized and Paper is poorly organized with Paper is not organized or well 20

written, and in proper format written, and is in proper format inconsistent and inadequate written; work is of poor quality

with strong sentence and with reasonably good sentence sentence and paragraph and unacceptable in terms of

paragraph structure and few and paragraph structure, but development, and numerous grammar and spelling

errors in grammar and spelling significant number of errors in errors in grammar and spelling

grammar and spelling

Writing (APA) Paper contains proper APA Paper contains few errors in APA Paper contains significant errors Paper contains more than five 20

formatting with no more than formatting in APA formatting significant errors in APA

one significant error formatting

Earned Total 100%

Thursday, 10 September 2020

Case Study Analysis Guidelines and Rubric

UK assignment helper

  




IT 380 Module Three Case Study Analysis Guidelines and Rubric

Overview: This case study analysis will help you analyze a cybersecurity scenario and identify which principles were violated. Each skill in this paper is an essential part of the final project and accompanying milestones in this course.

Prompt: Use the articles from the Module Three required resources to analyze the cyber security occurrence, determine which principles were violated, and recommend appropriate policies to prevent recurrence.

Scenario: In February 2015, as many as 80 million customers of the nation’s second‐largest health insurance company, Anthem Inc., had their account information stolen. This compromise affected customers in at least 14 different states where Anthem provided services.

The hackers gained access to Anthem’s computer system and got information including names, birthdays, medical IDs, Social Security numbers, street addresses, email addresses, and employment information including income data. Both current and former customers were exposed during this breach.

So, while this was an attack against a medical provider and it resulted in a massive data breach, regulatory requirements were not sufficient to help prevent this breach. Because no actual medical information appears to have been stolen, the breach would not come under Health Insurance Portability and Accountability Act (HIPAA) rules, which govern the confidentiality and security of medical information.

Based on the Test Out sections from this module and the additional module resources you have reviewed, your paper should address the following critical elements:

 Identification of cyber security principles that were violated and rationale of cause

 Analysis of cryptography that would have helped prevent this breach

 Recommendation of additional policies that would have been useful to mitigate the breach or even prevent the breach


Rubric

Guidelines for Submission: Your paper should be submitted as a 2‐ to 3‐page (in addition to the cover and reference pages) Microsoft Word document with double spacing, 12‐point Times New Roman font, and one‐inch margins. All sources must be cited in APA format.

Critical Elements

Exemplary (100%)

Proficient (90%)

Needs Improvement (70%)

Not Evident (0%)

Value

Identification of Cybersecurity Principles That Were Violated

Meets “Proficient” criteria and correctly identifies which principles were violated with empirical supporting examples

Correctly identifies which principles were violated with supporting examples

Identifies which principles were violated but supporting examples have gaps

Does not identify a single principle

30

Analysis of Cryptography and Prevention

Meets “Proficient” criteria and analysis demonstrates keen insight of cryptography and prevention methods

Analysis demonstrates accurate knowledge of cryptography and prevention methods

Analysis demonstrates knowledge of cryptography but needs additional information to support prevention ideas

Does not analyze the cryptography and prevention methods

30

Policy Recommendation

Meets “Proficient” criteria and recommendation demonstrates understanding of policies that would remedy the situation appropriately

Recommends policies to ensure proper resolution of scenario

Recommends a single policy to remedy situation but recommendation has gaps in strategic implementation

Does not recommend any policies

30

Proper Use of Writing, Mechanics, and Grammar

Paper is free of errors in organization and grammar with applicable sources cited

Paper is mostly free of errors of organization and grammar; errors are marginal and rarely interrupt the flow; cites applicable sources

Paper contains errors of organization and grammar but errors are limited enough so that assignments can be understood; cites applicable sources

Paper contains errors of organization and grammar making the content difficult to understand

10

Total

100%

Tuesday, 8 September 2020

Computer network design, implementation and testing.

UK assignment helper

 





 

Southampton Solent University

Coursework Assessment Brief

Assessment Details

 

Unit Title:

Networks

Unit Code:

COM712

Unit Leader:

Warren Earle

Level:

7

Assessment Title:

Report referral

Assessment Number:

AE3

Assessment Type:

Report

Restrictions on Time/Word Count:

3000

Consequence of not meeting time/word count limit:

 

There is no penalty for submitting below the word/count limit, but students should be aware that there is a risk they may not maximise their potential mark.

 

Assignments should be presented appropriately in line with the restrictions stated above; if an assignment exceeds the time/word count this will be taken in account in the marks given using the assessment criteria shown.

 

Individual/Group:

Individual

Assessment Weighting:

50%

Issue Date:

July 6th 2020

Hand In Date:

4th September 2020

Planned Feedback Date:

4th September 2020

Mode of Submission:

on-line

Number of copies to be submitted:

Where on-line submission via ‘Solent Online Learning’ is used, students are not required to submit a hard copy.

Anonymous Marking

 

This assessment:

Will be marked anonymously

 

Assessment Task

The assessment task is to rework a report on a computer network design, implementation and testing.

Please see enclosed details

Networking Report – please read very carefully

 

         

XYZ are a company in the South of England. They have an office in Southampton with staff in three departments, Sales, Marketing and Admin. A new network is proposed. Each department will have its own router. The router in the Admin department will have a connection to an Internet Service Provider router to provide Internet connectivity for all departments. The business network must use an interior gateway routing protocol.

 

 


The tasks are as follows:

1)           Design an IPv4 and IPv6 addressing scheme for the network (including the interfaces on the ISP routers connected to the company office).

Use 192.168.0.0/24 network address subnetted into three networks for Sales, Marketing and Admin each with 62 possible usable addresses.

Use 198.51.100.0/30 as the network address for the ISP

Use the following IPv6 network addresses do not subnet them.

2001:db8:cafe:1::/64

2001:db8:cafe:2::/64

2001:db8:cafe:3::/64

  Design, implement and test a network with routers and switches and essential additional services including DHCP, DNS and a webserver to provide network services and business network applications.

2)           Run tests to demonstrate that you have formulated a correct solution to the problem and full network connectivity is possible using ipv4 and ipv6.

3)           Recommend and demonstrate configuration of device security policies  for routers and switches on the network.

Write up your work in the form of a report that discusses and analyses the design of the network and the addressing scheme. Also discuss and analyse the configuration and commands that you used to configure the addresses, routing protocols and authentication. Discuss and analyse the results of the tests that you made on the network.  Formulate conclusions and recommendations from your work and the results. The report should address all points raised in the marking scheme below.

 

 

 

Assessment criteria

Evidence of knowledge, problem solving, implementation and professional skills will be required. See enclosed details.

 

Learning Outcomes

This assessment will enable students to demonstrate in full or in part the learning outcomes identified in the unit

T1      Present information and evaluation on an independently researched topic descriptors.

C1      Design an addressing scheme to fulfil given requirements in IPv4 and IPv6 networks.

P1      Demonstrate a sound justification for the approach adopted in designing an Ethernet network using routers and switches.

 

This assessment will enable students to demonstrate in full or in part the learning outcomes identified in the unit descriptors.

Late Submissions

 

Students are reminded that:

 

i.         If this assessment is submitted late i.e. within 5 working days of the submission deadline, the mark will be capped at 40% if a pass mark is achieved;

ii.        If this assessment is submitted later than 5 working days after the submission deadline, the work will be regarded as a non-submission and will be awarded a zero;

iii.      If this assessment is being submitted as a referred piece of work (second or third attempt) then it must be submitted by the deadline date; any Refer assessment submitted late will be regarded as a non-submission and will be awarded a zero.

 

http://portal.solent.ac.uk/documents/academic-services/academic-handbook/section-2/2o-assessment-policy-annex-1-assessment-regulations.pdf?t=1411116004479

 

Extenuating Circumstances

The University’s Extenuating Circumstances procedure is in place if there are genuine circumstances that may prevent a student submitting an assessment. If students are not 'fit to study’, they can either request an extension to the submission deadline of 5 working days or they can request to submit the assessment at the next opportunity (Defer).  In both instances students must submit an EC application with relevant evidence.   If accepted by the EC Panel there will be no academic penalty for late submission or non-submission dependent on what is requested.  Students are reminded that EC covers only short term issues (20 working days) and that if they experience longer term matters that impact on learning then they must contact a Student Achievement Officer for advice.

 

A summary of guidance notes for students is given below:

 

http://portal.solent.ac.uk/documents/academic-services/academic-handbook/section-4/4p-extenuating-circumstances-procedures-for-students.pdf?t=1472716668952

 

 

Academic Misconduct

Any submission must be students’ own work and, where facts or ideas have been used from other sources, these sources must be appropriately referenced. The University’s Academic Handbook includes the definitions of all practices that will be deemed to constitute academic misconduct.  Students should check this link before submitting their work.

 

Procedures relating to student academic misconduct are given below:

 

http://portal.solent.ac.uk/support/official-documents/information-for-students/complaints-conduct/student-academic-misconduct.aspx

 

 

 

Ethics Policy

The work being carried out by students must be in compliance with the Ethics Policy. Where there is an ethical issue, as specified within the Ethics Policy, then students will need an ethics release or an ethical approval prior to the start of the project.

 

The Ethics Policy is contained within Section 2S of the Academic Handbook:

http://portal.solent.ac.uk/documents/academic-services/academic-handbook/section-2/2s-university-ethics-policy.pdf

 

 

Grade marking

The University uses a letter grade scale for the marking of assessments. Unless students have been specifically informed otherwise their marked assignment will be awarded a letter grade. More detailed information on grade marking and the grade scale can be found on the portal and in the Student Handbook.

 

Policy:             http://portal.solent.ac.uk/documents/academic-services/academic-handbook/section-2/2o-assessment-policy.pdf

 

 

Guidance for online submission through Solent Online Learning (SOL)

 

http://learn.solent.ac.uk/onlinesubmission

 



Criteria

F3...........................................F1

D3..........................................D1

C3.........................................C1

B3.............................................B1

A4..................................................A1

1. Design & implementation of ipv4 and ipv6 addressing scheme & referencing (30%)

Little attempt to produce satisfactory or workable ipv4 and/or no description at how the scheme was derived, and/or no references.

Satisfactory introduction and description of how a workable ipv4 addressing scheme was derived. Some references used.

 

Good introduction and discussion of decisions made that evidence a correctly formulated ipv4 addressing scheme. Supported by a range of references.

Very good introduction and discussion of networking design requirements and discussion of decisions made that evidence a correctly formulated ipv4 addressing scheme. Supported by a good range of references.

Excellent introduction and analysis of networking design requirements and comprehensive justification of decisions made that evidence a full and correctly formulated ipv4 scheme. Analysis is supported by an excellent range of references.

2. Research and specify static routes or  routing protocols to meet defined requirements & referencing (30%)

Poor discussion of an/or evidence of a working solution with little proof of support from tests and /or no references

 

Satisfactory introduction and discussion of working solutions to the problem evidenced by description of test results. Some references used.

Good introduction and discussion and demonstration of a working solution to the problem evidenced by discussion of a sequence of test results. Supported by a range of references.

Introduces and demonstrates very good understanding of the routing design requirements and is able to discuss and prove a working solution to meet them evidenced by analysis of a sequence of test results. Supported by a good range of references.

Introduces and demonstrates excellent and professional understanding of the routing design requirements and is able to comprehensively analyse and prove a fully working solution to meet all of them evidenced by comprehensive analysis of a thorough sequence of test results. Analysis of solutions supported by an excellent range of references.

3. Design, implementation and testing  (20%)

Poor discussion of an/or evidence of a working solutions with little proof of support from tests and/or no references

 

Satisfactory introduction and discussion of working solutions for some additional services evidenced by description of test results. Some references used.

Good introduction and discussion and demonstration of a working solution for additional services evidenced by discussion of a sequence of test results. Supported by a range of references.

Introduces and Demonstrates very good understanding of the additional services required and is able to discuss and prove a working solution to meet them evidenced by analysis of a sequence of test results. Supported by a good range of references.

Introduces and Demonstrates excellent and professional understanding of the additional services required and is able to comprehensively analyse and prove a fully working solution to meet all of them evidenced by comprehensive analysis of a thorough sequence of test results. Analysis of solutions supported by an excellent range of references.

4. Conclusions and recommendations that relate to the case study & referencing P1 (20%)

Poor conclusions and recommendations. Doesn’t relate to the case study and/or no references.

Satisfactory conclusions and recommendations that relate to the case study by evaluating the effectiveness of the solution. Some references used.

Good conclusions and recommendations that relate well to the case study and evaluation of the effectiveness of the solution. Supported by a range of references.

Very good conclusions and recommendations that relate fully to the case study, fully evaluating the solution and alternatives. Supported by a good range of references.

Excellent and professional conclusions and recommendations that are fully justified and meaningful in the context of the case study, including professional evaluation of effectiveness of the solution informed by excellent references.

Report      (50% of unit mark)   Marking scheme