Social Considerations

Most of the companies in the world are striving to care for social responsibilities. This has turned out to be true because they cannot exist as the sole entity because they require the input of another contributing factor to deliver their services well. One of the companies of interest is Safaricom Company. It is one of the leading communication companies in the world and deals with the dissemination and the managing of the network to facilitate communication via the mobile phones. They own the biggest share of the market and, therefore, have an appropriate management that attracts most of the people. They have a concrete plan in their running of the business to deliver the services to people. The company has experienced tremendous growth attributed to the fact that they care for the population in the community hence creating an enabling environment for them to conduct business. The company has played a significant role in ensuring the life of the people is uplifted above the standard. One of the progress it has made is sponsoring the local football clubs by financing them. This has motivated young people to join the clubs and exploit their talents and hence improving their lifestyle. The young people could have been idle but through their financing, they have been able to identify their skills. The company also has been sponsoring the bright children who are from the humble background to go through their education. This is a significant milestone in the performance of the company, and therefore, people have gained trust with it. The society we live in does not need much but require a show of appreciation to create confidence in them that we live to help each other. Safaricom has been in the forefront campaigning for quality education for all. In conclusion, the-the company has for many years catered to the society around it as the people remain to be the sole and first consideration in a business environment.

References
Reader, W. J., & Unilever. (1969). Business & society. London: Information Division, Unilever.
SelectCarroll, A. B., & Buchholtz, A. K. (2003). Business & Society: Ethics and Stakeholder Management. Mason, Ohio: Thomson/South-Western.

Posted in Blog

CHARACTERISTICS OF SLAY QUEENS
The phenomenon of the “slay queen” has been much discussed in social media circles. A slay queen is basically a diva, mostly from urban locations, that has reason to believe she is every man’s eye candy and the envy of every other woman. She believes that women of her kind are superior and should thus be treated as such. However, slay queens are more annoying than interesting. Here are the common characteristics they possess.
1. Blue ticks
Slay queens can ignore your texts until you cry. It’s like your text is a Safaricom message or that “nitumie hizo pesa kwa hii number” message from a Kamiti inmate. You just keep seeing the slay queen of your dreams online most of the time, but she doesn’t respond, because she has “options.” – Lots of options. Fail to respond to her texts however and it becomes the Battle Oi Waterloo. Slay queens have extreme double standards, not just in texting but in general life too. A slay queen can’t stand waiting for a guy for 10 minutes for example. On the other hand, she doesn’t see a big deal in being two hours late for a date.
2. Taking pictures with their legs curved
Look at the pictures of most slay queens and you might think they are suffering from Rickets – the condition that causes bowed legs in some children. Slay queens are obsessed with pictures and when she makes you her photographer, you’ll have to keep repeating the shots until your fingers hurt and she is sure she has the perfect pic. Note that If you like to keep your life private, don’t date a slay queen. Nothing makes her happier than couple photos, most of which are just meant to make her ex mad. You will be exploited for photos with numerous hashtags such as #goofingwithbae, #mymanbetterthanyours #drivingwithbae etc.
3. Life of the party
A slay queen believes that being an obnoxious. Shisha-loving party girl is all part of the good life. Despite the fact that she’s puked in all the washrooms of all Kenyan clubs, a slay queen will pretend to be too cool for local music. Ask her if she’s heard Timmy Tdat’s latest song and she’ll be like “Ati Timmy Tdat? Who’s that? I don’t do local music. I love The Weekend.”
4. Accent
Slay queen’s tweng harder than Dr.Kaluyu. All their speeches are littered with phrases such as “Wharreva”, “So cute”, “Do I look fat?”” I’m done with..” and “Oh my gosh” depending on the mood. Despite the slay queen’s penchant for accents, she has very poor grammar. A slay queen doesn’t know the difference between your and you’re, I’m and Am, as well as many other English connotations. She never will. And she will be offended if you point that out.
5. Outrageous preferences for men
Slay queens have crazy standards when it comes to the kind of men they want, even when they don’t deserve such men at all. They believe that only the best of the best will suffice for their romantic life. A slay queen will dish out statements like “Aki mi I can’t date a guy who doesn’t drive” or “I can only do sleepovers in Kile and Lavi, kama ni Eastlands I kent.” Her worth is too large for just any bloke on the street, no matter how charming or educated. Money is number one for a slay queen, with looks a close second. A slay queen doesn’t care if her boyfriend is smart or a decent human being , so long as he looks cool and has some cash. And as long as he’s buying her Guarana at B-Club. And as long as she can talk to her girls about her boyfriend who buys her Guarana at B-Club, she’s happy
Other Notable Characteristics.
6. Likes oversharing on social media: A slay queen likes to over share with everyone on social media. Examples include, “ugh, feeling gross today,” “depressed,” “That amazing feeling when you get home and take off your bra,” and “My puppy died…..so sad ? RIP Toto….you were so adorable.”
7. Dumbness: A slay queen will know what is the name of Jocelyn’s baby in Love and Hip Hop Atlanta or what was the color of Pendo’s dress on Nairobi Diaries three months ago but she has no idea where Syria is, or what’s going on in the country at any given time.

Posted in Blog

Marketing Assistant in the Fashion Industry
Introduction
Marketing assistant in the fashion industry is a profession that has attracted several career professionals. The highest numbers of those attracted to this career are the fresh graduates with passion in women fashion. Moreover, the fresh graduates are characterized by the need and desire to conduct research on new fashion and latest products in the market. The main reason is to analyze and summarize the data available to get a clue of the choices of a particular company. This paper seeks to examine the career of a Marketing Assistant in the fashion industry with specialization in the fashion magazine. In doing this, the paper will look at the routine activities of a marketing assistant, the reasons attracting people to this career and the academic qualifications of this job. Moreover, the paper will critically evaluate the need for continued education for those already in the fashion industry as a marketing assistant. In addition, the paper will critically evaluate the licenses required and the responsible professional bodies or government agencies for that matter. Finally, the paper will look at the legality involved in the profession of a marketing assistant, criminal records, credentials, and fingerprints before giving a conclusive stand on the career.
The Day-By-Day Activities of the Job
Marketing assistant in the fashion industry is a very cumbersome career that needs a lot of deduction and commitment. A snapshot of people already in this career especially those working in the magazine sectors reveals that the primary activities involved in this job is persuasive convincing of customers to take up whatever the company has to offer for them. “Marketing assistant in the fashion industry entails conducting a feasibility study and market research for company’s products and services before they are launched into the market” (Basye, 22). This means that the marketing assistants who are already in fashion industry must analyze the market conditions and advise the company on the reaction of customers to the new product launched. Similarly, the market assistant job entails continuous selling and promotion of the fashion magazine to increase sales and revenue. A marketing assistant also keeps the record of daily sales and reactions of the customers towards the products and services. Besides, a marketing assistant keeps record of the customers of the company with details of their location, contacts, and loyalty to the company in the fashion magazine. None the less, a marketing assistant is involved in the activities of keeping sales and marketing journals that are used to plan and undertake daily sales activities of a company (Gurton 29). In conducting their duties, marketing assistants in the fashion magazine will need to travel to discover the new fashions in the market. Besides, they will be involved in less writing with more of their time being involved in conducting market research.
What the Career Offers Society
The impact of a career in marketing assistant in the fashion industry to the society is enormous and cannot be overlooked. In addition, the job creates a positive effect on the other members of the community who are involved with the market assistants in one way or the other. “A market Assistant plays a key role in providing crucial information to the customers and members of the public on usability and importance of the fashion magazine” (Field, 34). This is possible through the distribution of fashion magazine. In addition, the marketing assistant helps the community and the society get to understand the nature of products and services offered in the fashion magazine. Similarly, the marketing assistant makes the fashion magazine available to the community and the society. This will go well with the society in ensuring accessibility information in the fashion magazine that are critical and essential to the daily life of citizens (Forsyth, 43). Of significant impact is the provision of an opportunity for the society to interact with products and services on the market by asking questions relevant to the fashion magazine. Therefore, the career of a marketing assistant offers a lot of services to the community and; positively affects the other members of the society.
Why People may be Interested in this Career
A marketing assistant is a professional who is always smart and appealing to members of the public. While on duty, a marketing assistant dresses smartly to improve the public image and personality. This has led to so many fresh graduates dreaming of joining the profession. “The incomes offered for the position of marketing assistant in the fashion industry are huge and attractive, and this creates a lot of interest and desire among new graduates” (Steinberg, 9). In addition, many new graduates are attracted to this career because of the flexibility and convenience of the mode of work and conditions of work. It is a job that can easily fit into the schedule of any individual allowing from for resting and doing private businesses. In addition, the job provides fresh graduates with an opportunity to network and meet news friend thus increasing their knowledge of the perception of the society through the information available in the fashion magazine. The fashion magazine is also attractive and lures so many young graduates to the career (Stair, 28).

Required Education and Degrees
A marketing assistant must be well conversant with the prevailing market dimensions and should have the ability to analyze the situations prevailing in the market. “A market assistant must be capable of handling customer needs and wants in a professional and dedicated manner” (Nagle, 32). Moreover, a marketing assistant must be in possession of problem-solving and analytical skill necessary for tackling the challenges that he or she may face in the market. All these requirements of a market assistant call for a thorough academic qualification to eliminate any case of failure to deliver the expectations of a market assistant.
Therefore, the required educational qualification of a market assistant is degree in fashion marketing with specialization in magazine. Among the field of specialization that a market assistant should be well conversant with are sale, marketing, customer relation, advertising, promotion, fashion design, and professional marketing of the fashion magazine. Similarly, other critical skills like analytical and problem-solving skills are necessary for the market assistant. Moreover, planning and decision-making skills will help a Market Assistant improve the performance in the fashion industry. Of great importance is to pose educational background on communication and convincing skills.
Continuing Education Requirement
For the purposes of ensuring productivity and good performance in the marketing career, continued education is critical for the marketing assistant. Moreover, the market for any product is dynamic and keeps on changing as fashions and trends keep on changing. None the less, the fashion industry is always changing with nothing remaining static. This is facilitated by changes in preferences of the customer as technology keep on changing. Consequently, it will be essential for a good market assistant to cope with the changing technology to remain productive and relevant to the career (Steinberg, 54). This move is only possible through engaging in continued education programs routinely. For instance, the marketing assistant in the fashion industry must attend seminars, fashion shows, and conferences to acquire the latest dynamics in the market. Moreover, short courses that equip the marketing assistant with the immediate problem-solving skills and technological advancement are necessary. Continuous review of the fashion magazine is also important.
Marketing Assistant Salary
Normally, the average salary of a marketing assistant is approximately $35000 per year. However, this salary increases slightly depending on the experience but additional experience does not contribute to major change on the pay. As a result, most marketing assistants go to other positions after about 10 years in this position. According to the report by U.S. Bureau of Labor Statistics 2012, a marketing assistant salary range from $28,000 to $37,000 per year.
Required Licenses, and by Chartered Institute of Marketers
Just like any other profession, fashion marketing has a professional body that regulates the conduct and practices of its members (Kerin, 12). This professional organization is the umbrella body that is charged with the responsibility of ensuring that the members are well behaved and do not get involved in unethical behavior while on duty. The professional body for marketing assistants is the Chartered Institute of Marketers. It provides licenses and regulation framework for all members enlisted in its register. In addition, the Chartered Institute of Marketers works in collaboration with the government to issue licenses and regulate the overall practice of market assistants (Gurton 29).
Besides, this professional organization conducts regular training and advisory services to its members narrowing down to fashion industry and fashion magazine segment. This professional body also arbitrates any conflict between members and the customers.
Legal Requirements; Credentials, Fingerprinting and Criminal Background Check
There are legal frameworks that govern the practice and training of market assistants. The market assistant in the fashion industry will be obliged to comply with the regulatory frameworks that are instituted by the government in conjunction with the Chartered Institute of Markers. These legal requirements include possession of academic credentials of a minimum level of degree or diploma before gaining entry into the profession. This will ensure that the number of quacks marketing assistant is reduced. Moreover, this move helps ensure only qualified market Assistants get access to offers services to the organizations and customers. It will also help to improve the quality of services that the customers get (Clouse & Kathie, 17). In addition, the fingerprints of those seeking admission into the profession as marketing assistants must be taken to ascertain their criminal records. A person with a severe criminal background is not fit for admission as a marketing assistant since the fate of the customers may be put at risk.
Conclusion
Marketing assistant is a profession that lures the fresh graduates because of its attractive remunerations and social status in the society. It is a profession that is under strict regulations by government agencies and the Chartered Institute of Marketers. This is to ensure that the market assistants follow all the legal requirements and poses the relevant academic credentials. Similarly, in order to improve the performance of market assistants, continued education is essential. They do this by monitoring the daily trends and preferences of women in the fashion industry.
Marketing assistant position is essential because marketing assistants create a positive influence on the society with the right services and guidance they provide to the customers. Indeed, being a marketing assistant is a privilege because they are seen as a bridge between organizations and the customer. Therefore, as a marketing assistant, it is such a honor because it does not only lead to personal and professional satisfaction, but market assistants also play a fundamental role in serving other people in the society to meet their needs and preferences particularly customers.

Works Cited
Basye, Anne. Opportunities in Direct Marketing Careers. New York: McGraw-Hill, 2008.
Internet resource.
Clouse, Michael S, and Kathie J. Anderson. Future Choice: Why Network Marketing May Be
Your Best Career Move. Charlottesville, VA: Upline Press, 1996. Print.
Field, S. Advertising and Public Relations. New York: Infobase Pub, 2005. Internet
Resource.
Forsyth, Patrick. Getting a Top Job in Marketing. London: Kogan Page, 2001. Print.
Gurton, Annie. How to Get into Marketing and Pr. London: Continuum, 2003. Print.
Kerin, Roger A. Marketing. Boston, Mass: McGraw-Hill/Irwin, 2003. Print.
Nagle, Jeanne. Careers in Internet Advertising and Marketing. , 2014. Print.
Stair, Lila B, and Leslie Stair. Careers in Marketing. Chicago: VGM Career Books, 2001.
Internet resource.
Steinberg, Margery S. Opportunities in Marketing Careers. New York: McGraw-Hill, 2006.
Print.
WetFeet (Firm). Careers in Marketing. San Francisco, CA: WetFeet, Inc, 2008. Print

Posted in Blog

ISY5007 Assignment – Report on Data Management Plan (S1/2020)
30% of the final assessment
Individual Assessment
1500 words maximum, excluding appendix
Write a data management plan for ONE of the data science project scenarios given below OR seek approval in writing from the Unit Coordinator for an alternate scenario of your choice.
Your data management plan should identify data sources and articulate a reasonable approach to data acquisition, cleaning, integration, archival and analysis.
Consideration should be given to hardware/software and processing requirements.
Consider using measured, estimated, or simulated data to demonstrate the kind of data that you anticipate this project will use.
From a high-level perspective describe in English how you anticipate this data will be analysed. You may consider using pseudo code to illustrate this or use Python or a similar programming language if you have the necessary skills. Note that actually analysing data is not a requirement for this assessment.
The goal of this assessment is to demonstrate
• expectations related to data volume, velocity, and variety, veracity, and value
• planning for metadata content and format
• a reasonable approach to project governance
• recommendations for data storage, publication, archival, and retirement
• strategies to guarantee data quality, security, and privacy
Scenario Choices
Scenario 1: Your organisation aims to use data to assist the WA health department in reducing infections from the COVID-19 virus.
Scenario 2: Your organisation aims to use data for targeted advertising that promotes Western Australia as a travel destination.
Scenario 3: Your organisation aims to use data to predict which students are at risk of being terminated or dropping out of their university course.
Scenario 4: Your organisation aims to use data to predict the winner of the American presidential election.
Scenario 5: Your organisation aims to use data to predict the winner of next year’s Brownlow Medal.
Scenario 6: Your organisation aims to use data to predict the likelihood that a start-up company seeking venture capital will become a profitable business.

Posted in Blog

ASSIGNMENT 2 / Weight 10%
CSC2330 Software Project Management / March Semester 2020
1
1
LEARNING OUTCOMES
This assignment is designed to assess students’ ability on:
• Applying project management tools and techniques in various phases of the project life
cycle.
• Developing lifelong learning skills, through search of relevant materials and
discussion.
TASK 1
Assume that the source selection criteria for evaluating proposals are as follows:
• Management approach, 15%
• Technical approach, 15%
• Past performance, 20%
• Price, 20%
• Interview results and samples, 30%
Using Figure 12-5 (in the slides) and the weighted scoring model template as guides create a
spreadsheet that could be used to enter ratings and calculate scores for each criterion and
total weighted scores for three proposals.
Enter scores for Proposal 1 as 80, 90, 70, 90, and 80, respectively.
Enter scores for Proposal 2 as 90, 50, 95, 80, and 95, respectively.
Enter scores for Proposal 3 as 60, 90, 90, 80, and 65, respectively.
Source: Kathy Schwalbe. Managing Information Technology Projects (201), Revised 7th
Edition
(CLO2: PLO2)
ASSIGNMENT 2 / Weight 10%
CSC2330 Software Project Management / March Semester 2020
2
2
TASK 2
Download a free trial of MindView mind mapping software from
www.matchware.com/itpm and create a mind map of a SWOT analysis for your
organization. Or you may use any appropriate software.
Include at least TWO strengths, weaknesses, opportunities, and threats, and then provide
ideas for ONE potential project. Or, you can use your college or university for the SWOT
analysis, focusing on what it can do to improve services for students.
(CLO2: PLO2)
TASK 3
Use spreadsheet software to create Figure 1. Make sure your formulas work correctly.
Figure 1: Net Present Value (NPV)
(CLO2: PLO2)
ASSIGNMENT 2 / Weight 10%
CSC2330 Software Project Management / March Semester 2020
3
3
Your submission should not exceed 5 pages. Use Times New Roman, Font 12 and 1.5
spacing.
MARKING SCHEME
Tasks Criteria CLO2:PLO2
1 (40%) Spreadsheet must be correct, reflects the given data. 40
2 (30%) The mind map successfully illustrates the SWOT analysis
done
30
3 (30%) Spreadsheet used the correct formula to calculate NPV 30
PERFORMANCE CRITERIA
TASK 1
1 2 3 4
PLO2 Able to use
software tools
and weighted
scoring model
in order to
evaluate
project under
constant
supervision.
Able to use software
tools and weighted
scoring model in
order to evaluate
project under guided
supervision.
Able to use
software tools
and weighted
scoring model in
order to evaluate
project without
supervision.
Able to use
software tools and
weighted scoring
model in order to
evaluate project.
Able to analyse and
interpret data
TASK 2
1 2 3 4
PLO2 Able to use
appropriate
software tools
to perform
SWOT analysis
Able to use
appropriate
software tools to
perform SWOT
analysis in proposing
Able to use
appropriate
software tools to
perform SWOT
analysis in
Able to use
appropriate
software tools to
perform SWOT
analysis in
ASSIGNMENT 2 / Weight 10%
CSC2330 Software Project Management / March Semester 2020
4
4
in proposing
potential
project for
organization
under constant
supervision.
potential project for
organization under
guided supervision.
proposing
potential project
for organization
without
supervision
proposing
potential project
for organization.
Able to provide
good justification
TASK 3
1 2 3 4
PLO2 Able to use
appropriate
software tools
to perform NPV
analysis in
evaluating or
determining
potential
project for
organization
under constant
supervision.
Able to use
appropriate
software tools to
perform NPV
analysis in
evaluating or
determining
potential project for
organization under
guided supervision.
Able to use
appropriate
software tools to
perform NPV
analysis in
evaluating or
determining
potential project
for organization
without
supervision.
Able to use
appropriate
software tools to
perform NPV
analysis in
evaluating or
determining
potential project
for organization
Able to analyse and
interpret data

Posted in Blog

Student Name
Student ID
Student Signature
Assessor
Submission FER1 FER2
Result
Date
Assessor’s
Signature

Technical Support Level 5
Case Study Research
DAT536: Database Development and Design
Version 2, Level 5, Credits 20
Assessor’s Feedback
Submission
FER1
FER2
Instructions and Guidelines for Project Submission
Task completion
 Project will be judged on the basis of completeness, correctness and clarity.
 Complete ALL tasks.
 Warning: All media must be virus free! Media containing viruses or media that
cannot be run directly will result in a FAIL grade.
Format
 The report must have a title page with your name, class and ID number clearly printed.
 All written work must be done in size 12 font with 1.5 line spacing.
 All printouts must include your student ID (or group IDs) in the footer (printed).
 You may need to attach the task cover sheet found on Moodle to the front of the final
submission of your task (please confirm with your tutor).
Submission
 The completed assignment must be handed to the tutor at the beginning of the class
on the due date.
 Submit a printed copy of your report along with the soft copy. Tutor will inform you
on how to submit the soft copy.
Competency-based assessment FER and Re-enrolment
1. Students will have an opportunity to provide further evidence twice.
2. To be eligible for a FER the student must make a reasonable attempt at the questions/tasks in the
assessment.
3. Reasonable is to be defined as a response that at the very least attempts to address the
question/task.
4. Where the student does not make a reasonable attempt at ALL questions/tasks they will not
achieve and will be required to re-enrol in the paper.
5. A fee of $250 is payable for the second FER.
6. The need for further evidence from the students will be noted on the assessment as “FER” and
dated.
7. When the further evidence is deemed adequate the “FER” notation will be crossed out, initialed
and dated.
8. If a student is still deemed not yet competent after the second FER they will be required to re-enrol
in the paper. A fee will apply for re-enrolment and details will be available in the Programme
Handbook, and students will be informed of them at the start of the programme.
9. Additional FER’s are at the discretion of the Head of Faculty.
Reconsideration of Assessments and Appeals
1. Students have the right to a reconsideration of assessment or appeal if they believe an
assessment has been incorrectly marked or graded.
2. The request for reconsideration must be made in writing to the Head of Faculty within five (5)
working days of the return of the assessment. A fee of $40 per assessment applies.
3. Students must be informed that, as a result of the reconsideration of assessment, their result
may be unchanged, raised or lowered.
4. The reconsidered result will be recorded as the final result. Students retain the right to appeal
this result.
Plagiarism
 By submitting your assignment, you agree to Aspire International policy on ‘Academic Dishonesty
and Plagiarism’. Assignments completed using unfair means or plagiarised material will receive a
FAIL grade.
 All tasks must be done in your own words and referenced.
Feedback
 You may request feedback from your lecturer to verify the accuracy of your marks.
Learning Outcomes covered:
1. Apply a broad operational knowledge of database administration to
meet typical organizational data storage and retrieval requirements.
Case Study Scenario:
The UniPharma chain of pharmacies has offered to give you a free lifetime supply of medicine if you
design its database. UniPharma is a small medium enterprise (SME) in terms of company structure
and has four (4) pharmacies in the Auckland region. Being an SME, they would like to keep their
costs down but also to have an efficient solution to manage their back-office administration. Here
is some more information to help you out with the case study:
• Patients are identified by a Social Security Number (SSN), and their names, addresses, and
ages must be recorded.
• Doctors are identified by an SSN. For each doctor, the name, specialty, and years of
experience must be recorded.
• Each pharmaceutical company is identified by name and has a phone number.
• For each drug, the trade name and formula must be recorded. Each drug is sold by a given
pharmaceutical company, and the trade name identifies a drug uniquely from among the
products of that company. If a pharmaceutical company is deleted, you need not keep track
of its products any longer.
• Each pharmacy has a name, address, and phone number.
• Every patient has a primary physician. Every doctor has at least one patient.
• Each pharmacy sells several drugs and has a price for each. A drug could be sold at several
pharmacies, and the price could vary from one pharmacy to another.
• Doctors prescribe drugs for patients. A doctor could prescribe one or more drugs for several
patients, and a patient could obtain prescriptions from several doctors. Each prescription
has a date and a quantity associated with it. You can assume that, if a doctor prescribes the
same drug for the same patient more than once, only the last such prescription needs to be
stored.
• Pharmaceutical companies have long-term contracts with pharmacies. A pharmaceutical
company can contract with several pharmacies, and a pharmacy can contract with several
pharmaceutical companies. For each contract, you have to store a start date, an end date,
and the text of the contract.
• Pharmacies appoint a supervisor for each contract. There must always be a supervisor for
each contract, but the contract supervisor can change over the lifetime of the contract.
1. As the Database Administrator (DBA) write down the relational schema for at least
5 tables of the database in terms of the company’s structure.
2. Draw an ER diagram that captures the preceding information. Identify any
constraints not captured by the ER diagram.
3. How would your design change if each drug must be sold at a fixed price by all
pharmacies?
4. As a part of the UniPharma change management plan how would you
administer changes if the design requirements are as follows:
If a doctor prescribes the same drug for the same patient more than once,
several such prescriptions may have to be stored.
5. UniPharma is concerned about weekly data backup. Formulate and briefly
describe a data backup plan.
Each of the 4 UniPharma pharmacies have a Pharmacy Manager, a data entry operator,
an accountant, 2 pharmacists and database administrator. Keeping this company
hierarchy in mind please answer the following questions6. Describe access privileges level of the five (5) employee types of UniPharma in the
database? and who is the person deciding the access privilege levels?
7. Being the DBA, you have to provide different access levels to the employees;
mention any three (3) access related.
8. Recently 100 tables were updated in the database after new products came in. As
a Database Administrator, what tasks will you perform to ensure consistency of the
database?
9. DBMS is a highly complex system with hundreds of transactions being executed
every second. UniPharma is concerned if it fails or crashes in the middle of
transactions, it is expected that the system would follow some sort of technique to
recover lost data. Discuss categories of failures and methods to formulate a
recovery plan.
Evidence and Judgement Statements
Task
No.
Evidence Judgement Criteria Submission FER1 FER2
1 The candidate shows the
relational schema of the
company’s database in relation
to the case study.
The candidate shows relational
schema of the five tables of the given
company. The candidate clearly
mentions the logical entities in the
table.
The candidate’s answers may vary
but must cover defining concepts as
per assessment schedule.
2 The candidate shows the ER
diagram.
The candidate has clearly presented
the ER diagram. The relevant entities
and the attributes have been logically
created. The relationships between
entities, cardinalities and constraints
have been clearly identified.
Task
No.
Evidence Judgement Criteria Submission FER1 FER2
The candidate’s answers may vary
but must cover defining concepts as
per assessment schedule.
3 The candidate analyses the
design change in the database
system in relation to the case
study.
The candidate has added and deleted
the correct attributes. The
candidate’s answers may vary but
must cover defining concepts as per
assessment schedule.
4 The candidate manages the
change management plan
according to the company’s
requirement in relation to the
case study.
The candidate has created the right
entity sets and has also identified the
relationships.
The candidate’s answers may vary
but must cover defining concepts as
per assessment schedule.
5 The candidate formulates the
weekly data backup plan with
brief description.
The candidate clearly mentions and
explains the backup techniques.
The candidate’s answers may vary
but must cover defining concepts as
per assessment schedule.
Task
No.
Evidence Judgement Criteria Submission FER1 FER2
6 The candidate lists down and
explains the access privilege
level of the employees.
The candidate clearly describes the
access privilege levels for at least five
employees types and identifies the
right decision maker.
The candidate’s answers may vary
but must cover defining concepts as
per assessment schedule.
7 The candidate lists down the
access related commands to
each employee
The candidate lists and explains at
least three access related commands.
8 The candidate maintains the
consistency of the database
after updating the database as
per the case study scenario.
The candidate clearly mentions and
explains all MySQL statements.
9 The candidate lists several
database failure techniques
and mentions the recovery
plan.
The candidate clearly explains the
database failure techniques and
recovery plan.
The candidate’s answers may vary
but must cover defining concepts as
per assessment schedule.

Posted in Blog

Autumn 2020 300575 Networked Systems Design 1
300575 Networked Systems Design:
Network Design Assignment 2020S1
DUE DATE: Friday 5 June 2020 by 17:00 (Submission via vUWS)
Autumn 2020 300575 Networked Systems Design 2
Overview and Objectives
In this assignment you will design an enterprise scale network using the skills and knowledge gained in this
unit and its prerequisites. This assignment is not a trivial task. To complete it as outlined with all the required
documentation will be a significant task.
The assignment scenario describes in general terms, the network that is to be designed. Following the
scenario, the assignment is broken into a number of sections (phases), each of these phases has a detailed
list of requirements. It is important to read and understand each requirement to make sure that the assignment
is completed accurately.
The following tasks are required to complete the assignment:
• Design the network using the diagram and accompanying requirements
• Simulate and test the network using the network simulator tool Cisco Packet Tracer (v7.2.1)
• Correctly configure single area OSPF protocol
• Correctly configure VLANs and 802.1q trunking
• Correctly configure PPP and PPPoE
• Correctly configure DHCP
• Correctly configure GRE
• Correctly configure NAT and PAT
• Create and apply access control lists on the appropriate routers and interfaces
• Verify that all configurations are operational and functioning according to the scenario guidelines
• Provide documentation and configuration files as detailed in the following sections and phases.
Autumn 2020 300575 Networked Systems Design 3
Scenario
Introduction
MegaCon is a company based in the Campbelltown area. Recently, they have opened another site at
Parramatta which will be used to support a number of engineers. Because the engineers are frequently
required at customer sites, they are expected to be working away from the Parramatta office much of the time.
The business has grown rapidly; a proof of concept has been created, the infrastructure design has been
planned and more engineers have been hired to scale the product. This new model will require a larger
location for day-to-day management as well as a number of secure connections between home locations of
newly appointed staff.
It is your task to analyse all the requirements and to develop a report that specifies the implementation of the
requirements, offering realistic alternatives where possible (Final Report). This report will be used as the basis
for a redeveloped network as MegaCon grows.
Your will be required to bench test the design to provide a “proof of concept” to ensure your solution will cater
to MegaCon’s needs. This is an important step because it is essential to understand if the solution will work
correctly before committing contractually to delivering this project. Bench testing in this case will be done with
Cisco’s software emulation package, Packet Tracer Version 7.2.1.
Requirements
Being a growing company, the initial network topology was just a simple router, switch and internet
connection. With the rapid growth generated through hiring developers, MegaCon has managed by
purchasing additional switches and daisy chaining them to create a single flat network.
MegaCon’s Network Requirements
Scalable design which will facilitate business expansion.
Seamless connectivity between their main campus at Campbelltown (Cam1, Cam2 and Cam3) and the newly
opened office at Parramatta (Par).
Secure communication to cloud storage location (reached via ISP).
MegaCon’s Internet Service Provider (In-Tel) will be providing a WAN solution and will be supplying your group
with specific information and partial configuration to assist with bench testing.
Technical consultants have assisted MegaCon in translating the above network requirements into the following
sections, which contain technical requirements you need to incorporate into the solution.
Autumn 2020 300575 Networked Systems Design 4
Section 1: Basic Network
Figure 1: Basic network diagram (proposed topology)
Basic Configuration Requirements
• Configure device names as shown in the topology.
• Disable DNS lookup.
• Disable HTTP on all routers and switches.
• Enable SSH on all router and switches. Use the device name as the username and cisco as the
password on all devices.
• Configure logging synchronous for the console and VTY lines.
• Configure a MOTD banner to warn users that unauthorized access is prohibited.
• Device Security
o Encrypt the plain text passwords.
o Assign class as the privileged EXEC mode secret password.
o Assign cisco as the console and VTY passwords for login.
• For testing purposes MegaCon advises their WAN provider, In-Tel, has set clock rate for all external
WAN serial links to 128000 kbps.
• Configure the IPv4 and IPv6 addresses as listed in the Addressing Table.
ISP
Cam1 Cam2
Cam3
Par
NMPC
Liv
PSW
SwB
SwM
PCP
SPC
LPC
SwT
Autumn 2020 300575 Networked Systems Design 5
Topology Diagrams
When your network design has been finalised you will be required to provide an accurate and detailed logical
and physical topology diagram.
The logical diagram should accurately reflect the implemented addressing scheme.
The physical diagram should include but not be limited to the following:
• Internetworking devices and interface details.
• Link networks and IP address information.
• Routing Domains and static route details.
• Switching details and features e.g. STP, Channel Ports, VLAN information.
The physical topology diagram should be complete enough to allow a third party, for example a network
contractor, to install and configure the network without any additional documentation.
Section 2: Network Addressing
IP Address Scheme
MegaCon will be using the following addressing schemes:
Address Type Address Owner
IPv4 Private Address Allocation 10.100.0.0/19 MegaCon
IPv6 Address Allocation 2001:1:10::/52 MegaCon
IPv4 Public Address Allocation 200.200.0.0/28 Must be allocated across Cam1 and Cam2
IPv4 ISP Point-to-point Cam1 link 90.1.1.0/30 ISP
IPv6 ISP Point-to-point Cam1 link 2001:60:1:1::/64 ISP
IPv4 ISP Point-to-point Cam2link 90.1.2.0/30 ISP
IPv6 ISP Point-to-point Cam2link 2001:60:1:2::/64 ISP
ISP Lo1 for IPv4 5.5.5.5/32 ISP
ISP Lo1 for IPv6 2001:5.5.5.5::5/128 ISP
ISP Lo2 for IPv4 6.6.6.6/32 ISP
ISP Lo2 for IPv6 2001:6:6:6::6/128 ISP
Table 2: IP address block allocations
A data centre provider has been asked to lease some of their public address space for MegaCon’s data centre
infrastructure. In-Tel will provide an internet tail (link) through serial connections to Cam1 and Cam2 and
advertise this address space to the Internet. To achieve this there will be a static route implemented using the
point-to-point link public address space provided in Table 2.
Network Specifics
• All routers, switches and PCs are dual stack devices.
• OSPF router ID will come from the private IPv4 internal addressing.
• PPPoE links between all users on Eng networks and Par will come from internal addressing. Allocate
address space and consider how this can be routed within the network.
• Ensure route aggregation has been built in to the addressing scheme for scalability.
• Gateway addresses will be assigned the first usable address in each subnet for both IPv4/6.
• Router interfaces for IPv6 will use static link-local addressing (keeping the addressing simple).
• MegaCon’s network manager PC (NMPC) is physically connected to the switch SwM. NMPC uses the
last address on the Management VLAN.
Host Requirements
Campbelltown will use IPv6 addresses which are dynamically assigned through SLAAC.
VLAN Information
VLSM is NOT required. An industry standard of /24 addressing for internal IP scheme is desirable. However,
when that is not feasible, larger networks may be used.
Autumn 2020 300575 Networked Systems Design 6
Site VLANs Required
Cam1, Cam2 and Cam3 Accounting/Marketing/Sales/Office
Par Parra Office / Engineering
Both sites Native / Management / Blackhole
Table 3: VLAN Information List
NOTE
Network addressing scheme should take into account route summarisation.
Addressing Requirements
VLAN Host Requirements Growth
Accounting 50 Hosts Yes
Marketing 75 Hosts Yes
Sales 150 Hosts Yes
Office 200 Hosts Yes
Management 5 Hosts (per site) No
Parra Office 40 Hosts Yes
Engineering 20 Hosts Yes
Table 4: Current Host Addressing Requirements
MegaCon expects that it will have to provision for doubling of the sizes of most of its VLANs over the next two
years.
Section 3: Network Switches
MegaCon is moving away from their ad-hoc switch design to a more hierarchical and scalable design. The
deployment of the following technologies should “future proof” the business for further expansion as required.
VLAN Requirements
Switch access ports allocation is three ports per VLAN per switch.
Assign VLAN 100 as the Management VLAN and Native VLAN.
Any unassigned ports are to be placed into a “Blackhole”, an unused and non-routed VLAN (VLAN 999).
Additionally, these ports should be disabled and the vlan deleted.
Allow only configured VLANs to be permitted on trunk links.
Switching Technologies
Enable rapid-PVST+ on all switches.
Manipulate Spanning Tree to load balance VLANs between all HQ switches.
Implement EtherChannel between SwM and SwB. Justify your choice of EtherChannel method chosen.
Implement First Hop Redundancy (FHR) using HSRP on Cam1 and Cam2. Load Balance Active
and Standby between these two physical routers.
Section 4: Network Routing
With the flexible IP address scheme created for MegaCon, integration of the newly created environment using
OSPF is to be deployed throughout.
Routing Requirements
Inter-VLAN Routing: Layer 3 routing at the Campbelltown virtual router and router-on-a-stick at Parramatta.
Summarisation to be implemented where possible with OSPF.
OSPF Router IDs allocated from internal IPv4 addressing.
For best practice and security reasons, unnecessary routing updates shall be prevented.
OSPF Requirements
Configure OSPF throughout the routing domain.
OSPF routing updates and adjacencies between Sydney and Parramatta must occur over the GRE tunnel.
Autumn 2020 300575 Networked Systems Design 7
NOTE
A functional GRE tunnel (in Section 5) is required for exchanging OSPF routes successfully between
Parramatta and Sydney. (While preparing your implementation, you may wish to use static routes temporarily,
for testing purposes.)
Section 5: Security and Monitoring
The following security measures are to be imposed, for both IPv4 and IPv6 addresses:
Users on the Sales VLAN are not to be permitted to access any networks outside their own VLAN.
Users on the Engineering VLAN are permitted to reach of users on their VLAN and the Internet.
NMPC is the network manager’s PC. Ensure that it is the only device which can manage
MegaCon’s routers and switches
NMPC should maintain a log file of all security violations. Unauthorised attempts to connect to either switch
SwT or switch SwB should be reported to NMPC.
Section 6: WAN
For redundancy, an alternate link to ISP is required from Cam2 Router. Because In-Tel cannot guarantee that
its interface on this link will be provided by a Cisco router, MegaCon will have to use PPP with CHAP
authentication on this link.
To improve load balancing, this link must be used for those VLANs for which Cam2 is the Active router.
Appropriate floating static and default static routing is required for this implementation. The two loopback
addresses on ISP will represent cloud storage, and for this exercise it is sufficient that all internal hosts can
successful ping these two loopback addresses using both IPV4 and IPv6 addresses.
To simplify later integration of the Sydney and Parramatta sites, a Virtual Private Network (VPN) is planned.
Even though the link between the two sites is a private network, a business requirement dictates the tunnel
must be encrypted to ensure sensitive data cannot be intercepted by any means.
Your group will demonstrate VPN technology using a GRE tunnel connecting routers Cam3 and Parra. Thus,
addressing this key business requirement, and solving a complex design issue but more importantly instilling
confidence through your technical ability.
To provide home user access PPPoE will be implemented. For the demonstration a single PPPoE connection
is required. However, the addressing and routing should be designed to allow 10 simultaneous PPPoE
connections (this functionality can be demonstrated by LPC which is connected to router Liv, In Figure 1).
To provide internet connectivity and public addressing for webservers Network Address Translation (NAT)
needs to be configured on the border routers at Campbelltown. Public addressing has been leased (see
Section 2) and subnetted from the Data Centre’s public address blocks. This address space will be advertised
to the Internet by In-Tel and traffic redirected back to MegaCon’s network via floating static routes.
WAN Requirements
Statically assign IP addressing for the connecting router’s interfaces.
Site to Site Connectivity
The point-to-point VPN tunnel will use private addresses and will terminate at Cam3 and Parra.
Enable OSPF routing to exchange routes over the tunnel.
Ensure traffic is flowing through the tunnel interfaces not the carrier link.
Network Address Translation (NAT)
All devices within MegaCon’s network are expected to have internet connectivity using the given address
range with overloading.
Internet is to be simulated by a loopback interface on the ISP router.
NOTE
NAT functionality can be tested by simply pinging the ISP loopback (inside-out).
Autumn 2020 300575 Networked Systems Design 8
Deliverables:
1. Documentation
Your documentation must be of a professional standard and conform to the following:
• Formatted for A-4 paper;
• Arial font;
• Minimum main body text font size 10pt;
• Minimum diagram font size 6pt;
• Maximum of 10 pages NOT including any Appendices.
Your documentation at a minimum should contain the following sections:
• Title Page;
• Table of contents;
• Introduction;
• Network Design Summary;
• Logical Diagram;
• Summary Addressing Table/s;
• Network Design Details – Provide all the required information for all the devices in your network design
in a tabular form.
• Appendices containing
• Complete device configs
o Separate highlighted ACLs configs for all relevant devices with comments and descriptions
o Separate highlighted DHCP config/s for all relevant devices with comments and description
o Separate highlighted NAT config/s for all relevant devices with comments and descriptions
2. Files to upload
A single zip archive file must be uploaded to vUWS on or before the specified due date and time (17:00
07JUN2019).
The zip file name must adhere to the following convention:
First name initial followed by last name initial followed by student ID followed by “.zip”
Eg Kim Smith with the student ID 12345678 would name their archive file “KS12345678.zip”. The zip archive
file must contain the following files:
A PDF fie containing your documentation, with the file name adhering to the following convention:
First name initial followed by last name initial followed by student ID followed by “.pdf”
Eg Kim Smith with the student ID 12345678 would name their documentation file “KS12345678.pdf”
Cisco Packet Tracer (v7.2.1) file/s for the assignment in the most current version of Cisco Packet Tracer
(v7.2.1) format. With the file name/s adhering to the following convention:
First name initial followed by last name initial followed by student ID followed by “.pkt”
Eg Kim Smith with the student ID 12345678 with two Cisco Packet Tracer (v7.2.1) files would name each file
as follows “KS12345678_1of2.pkt” & “KS12345678_2of2.pkt”.
Any file format other than a single zip archive with a file name that does not adhere to the naming convention
OR that does not contain the required files in the specified formats and filenames is NOT acceptable and will
have a mark of zero (0) automatically be awarded.
Multiple submissions will be allowed however only the last submission will be assessed. Submission made
after the due date and time will incur a penalty as outlined in the unit learning guide in the section on “Late
Submission” under section “2.6 General Submission Requirements”.
You must NOT include an assignment coversheet with your upload. When uploading your submission to vUWS
you will certify that:
• you hold a copy of this assignment if the original is lost or damaged,
• you hereby certify that no part of this assignment or product has been copied from any other students
work or from any other source except where due acknowledgment is made in the assignment,
• no part of the assignment/product has been written/produced for me by any other person except
where collaboration has been authorised by the subject lecturer/tutor concerned,
Autumn 2020 300575 Networked Systems Design 9
• you are aware that this work may be reproduced and submitted to plagiarism detection software
programs for the purpose of detecting possible plagiarism (Which may retain a copy on its database
for future plagiarism checking.)
• you hereby certify that no part of this assignment or product has been submitted by you in another
(previous or current) assessment, except where appropriately referenced, and with prior permission
from the Lecturer/Tutor/Unit Coordinator for this unit.
Autumn 2020 300575 Networked Systems Design 10
Marking Scheme:
The quality of your deliverables will be evaluated with the following rubric.
CRITERIA Unsatisfactor
y (0%)
Poor
(25%)
Good
(50%)
Very Good
(75%)
Excellent
(100%)
Network
Design/Addressin
g Scheme
25 Marks
Does not
meet any
requirements.
Only just meets
basic
requirements.
Does not account
for growth in any
way. Inefficient
use of available
address space.
Meets basic
requirements.
Accounts for
growth in some
way. Not an
optimal use of
available
address space.
Meets most
requirements.
Accounts for
growth in some
way. Efficient
use of available
address space.
Meets all
requirements.
Accounts for
growth in an
optimal way.
Most efficient
use of available
address space.
Presentation
20 Marks
No
documentatio
n provided or
does not
contain any of
the minimum
required
sections.
The
documentation is
simple and not of
a professional
standard. Hard to
read and
understand or
does not contain
all of the
minimum
required sections.
The
documentation
contains all of
the minimum
required
sections
however it is
simplistic and
only just of a
professional
standard. It is
hard to read
and understand.
The
documentation
is of a
professional
standard, however its
layout is not
optimal or it is
not easy to
read or
understand.
The
documentation
is of a
professional
standard. It is
well written
and clear with
a layout that is
easy to read
and
understand.
Use of Diagrams
10 Marks
No
diagrams
used.
Inaccurate logical
diagram and/or
Illegible or
irrelevant
diagrams.
Accurate logical
diagram poorly
executed.
Accurate
logical diagram
well executed
no other
diagrams used
or do not add
to the
understanding
of the design.
Accurate
logical diagram
very well
executed and
uses diagrams
that aid in the
understanding
of the design.
ACLs
20 Marks
ACLs not
implemente
d
ACL rule
inaccurately
defined and
applied.
ACL rule
accurately
defined but
inappropriately
applied.
ACL rule
accurately
defined and
appropriately
applied but not
optimally.
Optimal ACL
rule accurately
defined and
appropriately
applied.
Packet
Tracer
Implement
and Test.
25 Marks
No Packet
Tracer
implement and
test or the
Packet Tracer
Implementatio
n does not
match the
submitted
design or
given
requirements.
Packet Tracer
Implementation
matches the
submitted design
and given
requirements
however it is
poorly laid out
and not
configured
correctly.
Packet Tracer
Implementation
matches the
submitted
design and
given
requirements
and is well laid
out however not
more than 60%
of the required
configuration
items are
configured
correctly.
Packet Tracer
Implementation
matches the
submitted
design and
given
requirements
and is well laid
out however
not more than
80% of the
required
configuration
items are
configured
correctly.
Packet Tracer
Implementation
matches the
submitted
design and
given
requirements
and is well laid
out with more
than 80% of the
required
configuration
items
configured
correctly.
TOTAL
100 Marks
Appendix 1 Tables
Sample Table A.1 IPv4 Subnetting Table
Subnet
Number Subnet Address Subnet Mask Hosts Required Maximum Hosts in
Subnet
Percentage
growth
In Uses
(Yes or No)
Network
Name
Sample Table A.2 IPv6 Addressing Table
Network
Number IPv6 Prefix/Prefix length
In Uses
(Yes or No)
Network Name
Sample Table A.3 Device Interface IP Addressing Table
Device Interface IPv4 address Subnet Mask IPv6 Address/Prefix Length
ISP
SwT
SPC
LPC
PCP
SwM
SwB
PSW
Liv
MPC
Par
Cam3
Cam1 Cam2
ISP

Posted in Blog

Faculty of Science, Engineering and Technology
CVE20002 Computer Aided Engineering Civil, Semester 1, 2020
Project Brief:
Each group should have a maximum of 2 students. You need to prepare detailed multilevel
building with appropriate furniture and other external and internal features. In this project,
your group is assigned to design a four-level office building utilizing a land of 25m x 40m.
An extensive and efficient utilization of Autodesk Revit software in design is required parallel
to the weekly lab sessions. Furniture and other related objects can be imported from furniture
families within the Revit software to reflect the environment inside the building. Design of a
staircase is required for easy access among all the levels. To assist you with this task, it is
recommended to follow the unit tutorials to achieve your desired objectives. Project work will
be reviewed by your tutor in class every week and he/she will show you examples of previous
group works.
The submission due date is 5th of June 2020 end of the day.
Technical details:
You need to consider the following details in the design:
– The building covers 65% of the land.
– Level height is 3.5m for all levels (ground, first, second and third floors). The ground floor
should be different to all other levels.
– The column size is 300 x 600 mm for rectangular column or 450 mm for circular column.
– The distance between two columns should not be more than 7.5 metres.
– Concrete beams have width of 300mm, and depth of 400 mm and the slab thickness is
120mm.
– Structural foundation slab is to be used with 500mm depth.
– Car parking is to be considered with maximum of 10 parking spots.
– You may use the rest of the area for landscaping.
Deliverables:
The submission should include online submission with following details:
Cover page
a. Student names b. ID numbers c. year, subject code, day and time of class attended
Revit 3D modelling of the building, rendered model and drawings,
Model the complete building in Revit using the knowledge acquired in the tutorial sessions.
In order to present the model effectively, you need to create architectural and structural
drawings sets. Rendering is a great feature which is utilized to showcase your project to your
clients with some realistic views. A soft copy of the Revit model must be attached as
instructed in the submission requirements. You need to submit the drawing sheets for the
plans, elevations, sections and 3D rendered model.

Posted in Blog

COIT11134 Object Oriented Programming (T1 2020) Assignment 2

Due date: Friday of Week 10 (11:45 pm AEST)
Weighting: 20%
Length: N/A

Objectives
This assignment is designed to assess the following learning outcomes.
• Implement object-oriented programs using a modern programming language
• Build interactive software applications using Graphical User Interface components
• Apply self-designed and existing algorithms in problem solutions
• Use complex data structures in software application development
Introduction
This is an individual assignment.
Assignment Task
As part of Assignment 1, you have developed a Java Application for the CQS Solar Power Installers (CQS). CQS has accepted your prototype and has requested you to improve the system by providing the following additional functionalities:
• When the system is started, it should load the data from the relevant file(s) and display the details of the installations that have been already entered into the system (there must be three prestored installation and three preinstalled technician in file). This should include Building Address, start date, end date, and installation design.
• Display the installations that have been performed by a technician chosen by the user.
• Save the data (technicians and installations) in relevant files.
You can continue to develop the Java GUI application that you have created in your Assignment 1. You are also allowed to use the Assignment 1 sample solution that will be released on the Unit web site. If you would like to modify the first part of the application that you have submitted in your Assignment 1, you are free to do so. You can adopt any layout patterns that are suitable for the requirements of the system in this assignment.
Note: During the initial run of your application, your application should read the data from the required file(s). During the subsequent program runs, your application should append all the new data entered by the user into the relevant files.
In order to include these additional changes in the application, you may need to do any or all the following:
• develop additional Java classes
• extend the existing Java classes that you have developed for your Assignment 1
• implement newly created java interface(s)
• Implement file reading and writing.
• Use search algorithms

Note: If you need to make suitable assumptions for the development of the above Java application, please provide them in the form of comments in the test driver file.

GUI Design
You are encouraged to use any layout pattern to implement the user interface. You may need additional controls such as Command Buttons for ‘Load’, and ‘Save’. You may need to use a ComboBox to display the list of Technicians.
Assignment submission
1. You must submit your assignment using the Moodle online submission system.
2. You must submit a zip file containing the text file(s)/csv files(s) and all java source code files including the test driver file (any additional library/jar files used if any).

Assignment 2 Marking criteria
Item Description Maximum
marks
1 Runs without any compilation/ run time errors (2). Displays the controls for additional ‘Display’ or Load and ‘Save’ functionalities (1) 3
2 Reads and stores the input data from the relevant files into suitable data structure 2
3 Allows to select a technician (1) and displays the details of installations performed by that selected technician (2) 3
4 Displays the details of all installations in the subsequent runs 2
5 Saves/appends the data into the relevant files 3
6 Uses Exception handling and provides appropriate error messages 2
7 Student used additional classes and or java interfaces (3); Used best programming practice (comments, indentation, naming and readability) (2) 5
Less late penalty (5% per calendar day)
Less Plagiarism penalty
Total 20
Note: If the program does not compile/run, partial marks may be given based on the submitted-source codes.

Appendix
This section presents information on setting standards and assessing teamwork, setting assessment specific academic integrity guidelines for programming assignments.
1.1 Academic Integrity – getting assistance and source code
This assignment is your chance to obtain the learning outcomes as given under objectives. It is important that you develop skills and deeper understanding of the concepts. You are permitted to use certain resources for completing this assignment as given in the table below. Use of resources outside of what is listed below will be a hurdle in your learning and required development of skills.
The scale of assistance students can get is clearly marked based on the students’ level of mastery and expected learning at various levels.
Note: You can use these as appropriate to the unit you are writing assessments.
The objective is to understand several concepts and apply those concepts to design and build a software solution. At this level you can use the provided materials, online resources for further reading and take assistance from your classmates or teammates to develop deeper understanding of the concepts. You can also sort help to debug the implemented program. But you should implement and test your program on your own.

Unit Textbook, Unit notes and examples Understanding concepts, design
Instructors Understanding concepts, design, debugging
Teammates (in case of teamwork) Understanding concepts, debugging
Classmates, Online resources Understanding concepts,
Everyone else Understanding concepts
No help acceptable Implementing code

Posted in Blog

Global Warming: Fact or Fiction?
Adelaide temperature data analysis
In this exercise you will analyse data about a temperature in Adelaide city. The data was collected by Australian Bureau of Meteorology – the best source of the climate related information in Australia. Two presented data set contain information about daily maximal and minimal temperatures for Adelaide weather station 023034 at Adelaide Airport. You can find these and other locations data at http://www.bom.gov.au/climate/data/index.shtml?bookmark=200
Q 1: You must complete the exercise and provide answers on the following points:
 Write an introduction about what type of analysis you plan to execute. Provide a brief data description: what are your data about; how many variables and observations there; what are highest and lowest temperatures were observed and when?
 Make a function to calculate and (nicely) present descriptive statistics (mean, standard deviation, skewness, kurtosis, median, IQR) for a given month and year. Run it for a maximal temperature for any month of 1961 and 2019. Compare results and discuss. Present appropriate data visualisation to support your discussion.
 Combine two data sets together and calculate a daily range between maximal and minimal temperature. Get an average range for each year, discuss its distribution and change over the time. Provide appropriate data visualisation to support your discussion.
 Count number of days per year with maximal temperature above 35 degrees. Build a graph. Discuss your observations.
 Select and justify a threshold for a minimal temperature and repeat step 4 for the number of days below the chosen threshold.
 Combine results from steps 4 and 5; discuss your finding and implications for the question of climate change.
 Write a conclusion outlining your analysis and results.
You should write the report in MS Word format and R-script with the code.

Posted in Blog