Introduction to Information Technology

Instructions
1. Answer ALL questions in this assignment. Each answer MUST be in your own words. Copying paragraphs verbatim from the textbook or any other source will result in zero marks, and the possibility of a plagiarism charge. 2. This assignment is based on Topics 6 – 10 and Practical sessions 6 – 11, and is worth 25% of your final grade for this unit and consists of 250 marks. 3. Your submission must be typed and formatted using Microsoft Word 2007 or 2010 and MS Excel 2007 or 2010 will be used to completed Task 5. ? ? Each page of your assignment should have a header with your full names and student number and page number on the footer (except cover and table of content page). If your first language is not English, it is suggested that you have a native English speaker proof read your work before submission.

4. This assignment is an individual assignment and must be all your own work. 5. If you require an extension, you MUST apply to: F.Mwagwabi@murdoch.edu.au BEFORE the assignment due date. Extension requests submitted on the due date will not be approved. 6. Late submissions will be penalized at the rate of 10% (of the total possible marks) per day late or part thereof. For example, if you hand in the assignment two hours late, the maximum mark you can receive is 90%. 7. If you submit your assignment past due date, you will not be guaranteed to have the marks back before the exam. 8. Email submissions will not be accepted. 9. You must keep a copy of this assignment and be prepared to provide it on request.

Page 3 of 10

ICT105 Introduction to Information Technology, S1 2014, Assignment 2

Task 1 – 4 must be completed using Microsoft Word 2007 or 2010, numbered pages, built-in Table of Contents and Times New Roman font size 12. Use Chicago Style referencing where referencing is required. You do not have to use the built-in MS Word referencing tool. Your work/paragraphs should be properly structured for readability. Check that your files are named correctly.

Assignment Scenario
Consider the following scenario before completing tasks 1 – 4. As the owner of a growing Accounting firm, you have decided to offer accounting services via an ecommerce website in addition to the services offered onsite. You would also like to re-design your main office network to accommodate the growing number of employees. Since your home is about 20 miles away from the main office, you mostly work from home where you already have a home network consisting of a Windows 8 desktop PC, a Windows XP SP3 laptop, one iPad and a shared printer. The laptop and iPad are connected to the home network using Wi-Fi with a WEP security option. The devices in your home network are shared by your family, including two teenagers. Your teenagers prefer the Windows laptop for social networking and online gaming due to its portability. As you have not warmed up to Windows 8 yet, you prefer to use the Windows laptop to complete your work related tasks both at home and at work. In the main office, all customer records are processed and managed using a relational database and stored on a dedicated database server. For security reasons, the database is only accessible from the main office and only from computers connected to the main office network. The relational database management program used to manage accounting data records is only compatible with Windows 7 or later and Internet Explorer 8 or later. Being the owner of the accounting firm, you are the only one allowed to connect a personal laptop to the main office network. As the owner, your main job is processing and managing payroll for your employees and making sure customer details stored in the relational database are up-to-date. However, since your Windows laptop is running Windows XP SP3 and Internet Explorer 7 you have to export employee and customer records to a flat-file management program using a spare office computer, save the files onto a network drive and then transfer the files onto your Windows laptop. Since you mostly work from home, you usually email a copy of employee payroll information and customer details via Yahoo! e-mail to the head accountant who would later update the main database. The main office has the following computing equipment and requirements: ? ? ? ? 10 Windows 7 desktop PCs, 2 Windows 7 laptops, 1 iMac for the web developer and 1 tablet PC for customer self-check-in. The following shared resources: 2 printers. 1 Switch, 1 Wireless Access Point and 1 router. 3 servers (a web server, a database server and a file server).
Page 4 of 10

ICT105 Introduction to Information Technology, S1 2014, Assignment 2

Remember: Read the above scenario carefully before completing tasks 1 – 4.

Task 1 Networks (40 marks)
A. Using MS Word (Packet Tracer is not allowed), draw a network diagram for your home network with the ability to connect to the Internet. The diagram should include all computers and any necessary communication devices, labeled appropriately (Example Windows 8 desktop etc.). For copyright reasons, use the Clip Art provided in MS Word. Do not use Shapes. You can use a generic tablet clipart for the iPad tablet. The diagram should be on a separate page, not a separate documents or marks will be deducted – landscape orientation (Note, use Portrait orientation for the rest of the assignment document). [40 marks]

Task 2 Databases (20 marks)
A. Discuss one potential data redundancy issue and one potential data integrity issue that could occur in this scenario. In your own words, briefly define the terms data redundancy and data integrity in your discussion. [20 marks – at 10 lines each]

Page 5 of 10

ICT105 Introduction to Information Technology, S1 2014, Assignment 2

Task 3 Internet and Security (30 marks)
B. In considering the scenario described in page 4 and the design of the home network depicted in Task 1 (A), describe two security vulnerabilities within the home network that might directly affect the main office network. Discuss a potential security incident that is likely to occur within the main office network (as a result of the identified security vulnerability). Provide least one security countermeasure you would apply at the home network and one countermeasure at the main office to prevent potential security incidents. You must provide at least two references to support your answers. Important reference requirements: ? ? ? ? Use a minimum of one website articles and a minimum of one academic journal articles written no earlier than 2006. Strictly no Wikipedia Each reference must have an Author(s) name and year of publication. Example of an academic journal article: Moore, David (2006)., “Inferring Internet denial-of-service activity”. ACM transactions on computer systems (0734-2071), 24(2), 115 Example of a website article (with author and year): Bogdan, Calin (2009)., “Statistics from 10,000 leaked Hotmail passwords”, http://www.acunetix.com/blog/news/statistics-from-10000-leaked-hotmailpasswords/ Accessed: 21 April 2014. [30 marks – at least 15 lines each]

?

Task 4 Referencing and Presentation (30 marks)
Assignment presentation and referencing for Tasks 1 to 3 See formatting instructions on page 4.

Page 6 of 10

ICT105 Introduction to Information Technology, S1 2014, Assignment 2

Task 5 Excel: (130 marks)
Your company is growing exponentially. Therefore, you are looking to upgrade the Main Office as follows: (Proposed Main Office Upgrade devices) ? 17 Windows 7 desktop PCs, 3 Windows laptops, 2 iMacs and 2 iPads ? 5 servers (1 web server, 2 database server and 1 file server, 1 email server) ? Shared resources: 2 laser printers, 1 inkjet printer. ? 2 Switches, 1 Wireless Access Point and 1 router. The Current Main Office is as follows: (Current Main Office devices) ? 10 Windows 7 desktop PCs, 2 Windows 7 laptops, 1 iMac for the web developer and 1 tablet PC for customer self-check-in ? The following shared resources: 2 printers ? 1 Switch, 1 Wireless Access Point and 1 router ? 3 servers (a web server, a database server and a file server) Create a cost estimate spreadsheet comparing the cost of the Current Main Office and a Proposed Main Office Upgrade. You are free to design the spreadsheet to your liking however, it must be presented in a professional manner and with minimum redundancies. The following must also be included: Four worksheets; A worksheet for: Current Main Office; Proposed Main Office Upgrade; Summary of Cost Estimates; Charts, with an appropriately named worksheets and Titles. (Total of four separate worksheets)

v2 Update – Device cost: You can make up the cost as long as it is realistic – but it will probably
be easier to go to any computer vendor’s website and find a suitable device and price, e.g. HP ENVY 700-Windows 7 | $849.99 – – no need to provide a reference or URL Note: A sample spreadsheet can be downloaded from Assignment 2 page, then select ? Sample Spreadsheet.pdf. Use it as a guide only – that is you will need to format your spreadsheet to make it look professional e.g., make sure values are appropriately formatted, formulas correctly applied. (a) Current Main Office and Proposed Main Office Upgrade worksheets should each include: Current Main Office worksheet must include all devices listed under current main office and Proposed Main Office Upgrade worksheet must also include all devices listed under Proposed Main Office Upgrade devices
Page 7 of 10

ICT105 Introduction to Information Technology, S1 2014, Assignment 2

[total 60 marks] 1. 2. 3. 4. One table for all personal computing devices/servers and their costs. One table for Resources, i.e., Printers and their costs. One table Communication Devices and their costs. A summed up totals for the above listed in a separate table or section.

(b) Cost Summary worksheet should include: [50 marks] 1. A table showing cost information for personal computing devices/servers, shared resources, communication devices and Total Estimated Cost. [10 marks] 2. Values in cost summary worksheet should be linked to the Current Main Office and Proposed Main Office Upgrade worksheets. [10 marks] 3. Format all values using a two-color scale conditional formatting (Green for values lower than $15,000 and Red for values higher than $15,000). [10 marks] 4. Include a separate section or column where an If Function will be applied to alert you if the total cost of the Proposed Upgrade is 50% more than the cost of the Current computing equipment. The separate section/column should show “Above Budget – Upgrade not Approved” if the Proposed Upgrade amount is 50% more than the current cost and “Upgrade Approved” if it is below 50%. [20 marks]
Page 8 of 10

ICT105 Introduction to Information Technology, S1 2014, Assignment 2

(c) Charts worksheet: should include: [20 marks] 1. One Pie Chart comparing Total Current Main Office costs and Total Proposed Upgrade total costs in Dollars. The Pie Chart must be linked to the values in the Cost Summary worksheet – however the Pie Chart and Column Charts should be on a separate worksheet created just for Charts.

2. Two separate Column Charts presenting the Cost Summary data in a Column chart with anything above $15,000 shown in a different color. (see Example Spreadsheet.pdf).

Page 9 of 10

ICT105 Introduction to Information Technology, S1 2014, Assignment 2

Submission checklist
Create a .zip file named SurnameFirstname.zip. The zipped file will contain two separate files as follows: 1. Excel document: SurnameFirstname.xls or SurnameFirstname.xlsx 2. Word document: SurnameFirstname.doc or SurnameFirstname.docx

Please Note: Due date is 5PM Friday 23 May 2014. If you submit this assignment on or before the due date, it will be marked and returned to you prior to the final examination. You may submit the assignment up until 5PM Friday 30 May 2014; however, late penalty will be applied and you will not be guaranteed to have the marks back before the exam.

Page 10 of 10
PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET AN AMAZING DISCOUNT 🙂

© 2020 customphdthesis.com. All Rights Reserved. | Disclaimer: for assistance purposes only. These custom papers should be used with proper reference.