Evaluate and Integrate several information sources in analysing Enterprise Systems

You have recently been employed as a Business Analyst and your boss has decided to send you on ashort Enterprise Systems course. You have now returned from your course ad would like to demonstrateyour learning. Create an e-portfolio to provide a synopsis and reflection on your learning duringthe course. You have been requested to document your learning in a portfolio that can be displayed onyour company’s intranet or knowledge portal. This way, the entire organization can access the documentand share in your newly acquired knowledge.This assessment task will address the following ILOs:• Evaluate and Integrate several information sources in analysing Enterprise Systems• Describe the role of enterprise systems as part of the larger IT infrastructure of large scale organisations.• Identify relevant considerations in the implementation of Enterprise Systems.• Demonstrate communication skills to present a coordinated, coherent and independent exposition of knowledgeand ideas in dealing with Enterprise Systems.Time allocation: Approximately 30-40 hoursWeighting: 30%Submission: Using your student e-Portfolio account, create a link from Moodle to your Mahara page asindicated on the submission link. You are required to prepare your responses to the assessment tasks as apage in your Mahara e-Portfolio. (To be submitted in Week 11)Referencing: Your portfolio should be a synthesis of ideas from a variety of sources expressed in yourown words. A minimum of 10 references is recommended. You should use the APA referencing style.The University has published a style guide to help students correctly reference and cite information theyuse in assignments (American Psychological Association (APA) citation style:https://federation.edu.au/__data/assets/pdf_file/0020/313328/FEDUNI-GENERAL-GUIDE-TOREFERENCING-2016-EDITION_ed.pdfEnterprise SystemsePortfolioEnterprise Systems Assessment TaskThe ContextIntended Learning Outcomes (ILOs)Assessment GuidelinesMarking Criteria: A passing grade will be awarded to assignments adequately addressing allassessment criteria. Higher grades require better quality and more effort. For example, a minimum is seton the wider reading required. A student reading vastly more than this minimum will be better preparedto discuss the issues in depth and consequently their report is likely to be of a higher quality. So beforesubmitting, please read through the assessment criteria very carefully. Marking guides are provided.Feedback: Feedback will be provided by the lecturer/tutor via Mahara, and mark via Moodle, no laterthan 2 weeks from the submission date.An ePortfolio is a collection of digital files, images, videos that showcase competencies, skills,application of knowledge and learning journey. The use of ePortfolios in various industries, disciplinesand processes is increasing world-wide, and is in some case the ‘norm’ for job applications or fordisplaying educational learnings.

Prevention better than litigation?

1.0 Case Study – Prevention better than litigation? Monitoring of employee computer use:1.1 Is it ethical for organisations to monitor employees to detect access to pornography andthen sack them if they have accessed it? Discuss. (6 marks)1.2 Giving consideration to your response to 1.1, present an Analytical solution that can avoidthe ethical and privacy issues raised while helping the organisation achieve what they wantto. For your specific solution, discuss the ethical and privacy concerns that may arise andhow they are dealt with. (6 marks)2.0 Case Study – The Ethics of Classification:2.1 Do you think that using attributes such as weight, chronic illness and marital status is ethicalin this specific case study? Why or why not. (3 marks)2.2 Giving consideration to 2.1, what attributes will you consider in your classification model toachieve the same outcome for the hospital? (3 marks)2.3 Is there a better alternative to 2.2’s classification model in your view as a data scientist? If so,discuss your solution to help achieve the hospital’s desired outcome(s)? (3 marks)2.4 In the context of 2.3, discuss the measures that the hospital can take to protect theirpatients’ data from being used unethically? (3 marks)3.0 Case Study – Privacy and security breaches at Acxiom:3.1 What could Acxiom do to increase the security and privacy of its customers’ data? (2 marks)3.2 Based on the article cited in this case study and your own research, do you think thegovernment should have access to private-sector data? (2 marks)3.3 In addition to government, what organisations might need access to private data for securityreasons? (2 marks)

Review, critically analyse and develop artefacts to define processes for quality assurance, riskmanagement and communication in large software development projects.

OverviewThis assignment provides students with the opportunity to apply the knowledge and skills developedduring the semester. Students work in small teams (3-4) for assignment 2, in which they complete aformal specification for a library system.Timelines and Expectations Percentage Value of Task: 20%Minimum Time Expectation: more than 10 hoursStudents will design, implement and test a specification for a system and answering questions relatingto the artifacts provided.Learning Outcomes AssessedThe following course learning outcomes are assessed by completing this assessment:Skills:S1. Critically analyse and use complex decision making to research and determine the appropriateSoftware Engineering tools and methodologies to utilize in a given situation.S2. Apply professional communication skills to support and manage the engineering of a large softwaresystem.S3. Review, critically analyse and develop artefacts to define processes for quality assurance, riskmanagement and communication in large software development projects.S4. Implement quality assurance activities in order to verify user requirements and validate designdecisions.Application of knowledge and skills:A1. Analysis of a large system development problem to decide upon the best methodological approach.A2. Development of appropriate artefacts to support and manage the software engineering process suchas change control and configuration management.CRICOS Provider No. 00103D ITECH7410 Assignment 2 – Group Page 2 of 3Assessment Details1. Students will need to develop schema that will model a library – containing only books – andbe able to perform the following tasks:• Add a book• Add a borrower• Delete a book• Delete a borrower• Lend a book to a borrower• Return a book from a borrower• Enquire about a book• Reserve a book• Enquire about a reservation• Cancel a reservation• Buy a Book• Receive a Book• Report of Books on Loan2. The schema must be consistent and be shown to work using examples3. Schema need to be annotated so that the Z statements are clearly expressed in plainlanguage4. Write three (3) non-trivial predicate statements about your system; explain them and showthat they are trueSubmissionSubmit your specification, via Moodle, as a Word document labelled in the following way:StudentID1_StudentID2 ? ? ? .docxAttach all files that are needed (the report plus up to 4 files) in order to mark this assignment by yourlecturer/tuto

Convert the binary data “011010” into analog waveforms using following modulationtechnique

Assignment No 21. Convert the binary data “011010” into analog waveforms using following modulationtechniques:a. Two level Amplitude Shift Keyingb. Two level Frequency Shift Keyingc. Two level Phase Shift Keyingd. Differential Phase shift keyinge. Four level Amplitude Shift Keyingf. Four level Phase Shift Keyingg. Eight level Amplitude Shift Keying2. With fc = 500 kHz, fd = 25 kHz, and M = 16 (L = 4 bits), compute the frequencyassignments for each of the sixteen possible 4-bit data combinations.3. Draw the approximate Analog Modulation and Frequency Modulation waveforms incomplete steps for the following signal:4. Draw the 16 QAM Constellation Diagram having two different amplitude levels and eightdifferent phase levels.5. Explain and draw the Error Detection Process for Cyclic Redundancy Check (CRC).6. Compute the frame check sequence for the following information:Message = 10111100, Pattern = 110117. Compute the transmitted signal using Direct Sequence Spread Spectrum for thefollowing information:Input: 1011, Locally Generated PN bit stream: 101011011010, T = 3Tc8. What is the difference between Infrastructure and ad hoc modes in WLAN? Draw theirrelative diagrams as well.9. Compare the differences of TCP and OSI protocols for wired and wireless LANs usingdiagrams.10. Explain why the square and circle shapes cells for cellular communications are notappropriate as compared to hexagonal shape cells.