Module’s Information: |
|||||
Module |
Fundamental of Computing |
||||
Session |
May 2024 |
||||
Programme |
MASTER IN INFORMATION TECHNOLOGY(MITLS) |
||||
Summary of Coursework Breakdown: (as stated in course structure) |
|||||
No |
Description of coursework |
Learning Outcomes covered |
Marks allocated |
||
1 |
Individual Assignment (Part 1) |
CLO1 |
30% |
||
2 |
Individual Assignment (Part II) |
CLO2 |
40% |
||
3 |
Individual Assignment (Part III) |
CLO3 |
30% |
||
|
CONTRIBUTION OF THE COURSEWORK TO THE COURSE |
100% |
|||
|
|
|
|||
|
TOTAL |
100% |
|||
Penalty for late submission: |
|||||
1 day - minus 20% of total mark awarded 2 days - minus 50% of total mark awarded 3 days - 0 mark for this piece of coursework |
Coursework #1 |
|||
Module’s Information: |
|||
Module |
Fundamental of Computing |
||
Session |
May 2024 |
||
Programme |
MASTER IN INFORMATION TECHNOLOGY(MITLS) |
||
Coursework Type |
Individual Assignment |
||
Percentage |
100% |
||
Handout Date |
Week 3 Monday |
||
Due Date |
Week 6 Wednesday, 19th June 2024 before 11.00 pm. |
||
Student’s Declaration: |
|||
By attempting this individual assignment 1, Iacknowledge that: I have read and understand the conduct requirements for this individual assignment. I understand what is meant by plagiarism. |
|||
Learning Outcomes Assessed: |
|||
CLO1 |
Evaluate the basic principles of system modelling in systems analysis, design and development according to life cycle methodology. (C4, PLO1) |
||
CLO2 |
Construct appropriate database techniques in conceptual and logical modeling to complete related activities. (P3, PL06) |
||
CLO3 |
Relate the importance of information security and ethical concerns towards computing context. (C4, PLO2) |
||
|
|||
Penalty |
|||
Penalty Student will be awarded ZERO if he/she does not complete their individual assignment (without valid reasons). The lecturer has the right NOT to extend the due date for the absentee, except in the case of protracted (and / or certified) illness. |
Instructions: This assignment consists of THREE (3) parts as follows; Part 1
Read the Bright Future School Case Study below: Bright Future School
Bright Future School is a small private school that has retained your services as a systems
analyst to assist in the development of a new information system for the school’s administrative needs.
Background
Based on preliminary research and fact-finding, the proposed billing system includes components for registering students, generating drop-in reports, generating bills, recording payments, generating receipts, and generating monthly reports. You will now proceed with the systems analysis phase by developing an object-oriented model of the billing system.
Tasks
1. Design at least four class objects for Bright Future’s new system including attributes and methods.
2. Create a class diagram for the system classes that you identified in Task 1 (above).
3. Are there any classes in Bright Future School’s system that can be grouped into subclasses? Why would you want to group data elements into subclasses?
4. Design a use case model for a method in the new system.
Part 2
Based on the Case Study from Part 1, you are required to design and develop a small
database for Bright Future School using Microsoft Office Access. You are expected to
complete the following tasks; Tasks;
1. Identify relevant business rules related to the Case Study
2. Identify relevant entities and attributes.
3. Draw an Entity-Relationship Diagram (ERD) related to the Case Study
4. From the ERD, create database Table with proper primary key, foreign keys and database relationship.
Upon completion of the above tasks, you are required to document all the completed task including the screenshot of created Tables and relationships.
Part 3
Based on the Case Study from Part 1, as the Chief Network Security Officer, you are required to investigate and produce a report on the network security requirements needed for this firm.
You are to produce a complete set of computer security policies and procedure for the director. The breakdown of the report is as follow:
1.0 Executive Summary
2.0 Background Introduction 3.0 Business Strategy
4.0 Threat, Risk & Vulnerability Analysis 5.0 Policies and Goal Security
6.0 Security Policy
7.0 Physical Security
8.0 Network Security architectures, designs 9.0 Operating System and Data Security
10.0 Cryptography
11.0 Ethics
12.0 Privacy
13.0 Intellectual Property
14.0 Conclusion
15.0 References
版权所有:留学生编程辅导网 2020 All Rights Reserved 联系方式:QQ:821613408 微信:horysk8 电子信箱:[email protected]
免责声明:本站部分内容从网络整理而来,只供参考!如有版权问题可联系本站删除。