Posts

Showing posts from May, 2019

IT Security

Image
MITS 5004 IT SECURITY Assignment-3 Assignment 3 Research and Presentation on security vulnerability tools using Kali Linux 1. Group Formation For this assignment, students need to form groups of 4 to 5 members under the supervision of Lecturer/Tutor. Each group must be formed of 4 to 5 students. In case there is a small group (such as with remaining two students), then the Lecturer/Tutor can rebalance the groups to ensure that there are no “small” groups. 2. Topic Selection Each group needs to select one of the following security vulnerability testing tools of Kali Linux on a first come first served basis: ·     Hydra ·     Maltego ·     NMap ·     Zed Attack Proxy ·     SqlMap ·     Metasploit Framework ·     Burp Suite If there are more groups than the number of available topics, then one topic can be selected by more than one group. This should be arranged under the discretion of Lecturer/Tutor. If a

Engineering Coursework help

Assignment No 2 1.     Convert the binary data “011010” into analog waveform using following modulation techniques: a.      Two level Amplitude Shift Keying b.     Two level Frequency Shift Keying c.      Two level Phase Shift Keying d.     Differential Phase shift keying e.      Four level Amplitude Shift Keying f.       Four level Phase Shift Keying g.      Eight level Amplitude Shift Keying 2.     With fc = 500 kHz, fd = 25 kHz, and M = 16 (L = 4 bits), compute the frequency assignments for each of the sixteen possible 4-bit data combinations. 3.     Draw the approximate Analog Modulation and Frequency Modulation waveforms in complete steps for the following signal: 4.     Draw the 16 QAM Constellation Diagram having two different amplitude levels and eight different phase levels. 5.     Explain and draw the Error Detection Process for Cyclic Redundancy Check (CRC). 6.     Compute the frame check sequence for the following inf

Behavioral Marketing

Image
Browsing your favorite blogging site or reading some interesting content and you surprisingly notice some ads on the webpage - Isn’t this the same product that you were looking for on an online store a few days back? Why not check it again as you really like this one? Behavioral marketing also called behavioral targeting, checks the prior online behavior of users to decide which ads they would like to see again. This involves a higher level of advertisement customization, allowing businesses to understand and utilize the needs and behavior of consumers for targeting specific products to them. Targeted ads seem exciting to you as they keep in mind your personal preferences to show relevant messages. By understanding the use of behavioral marketing campaigns, businesses can market their products to a more interested audience. Unlike direct marketing where companies send the same content to all the customers, behavioral marketing sends customized messages that instantly inter

Australian Electric Supply (Case Study)

                                 ICT700 Systems Analysis Task 2 Assessment and Submission Details Marks: 35% of the Total Assessment for the Course Case Study: Australian Electric Supply Background: Australian Electric Supply (OZES) is a young business that supplies and distributes electrical equipment throughout Australia. In addition to selling brand new equipment, OZES has casual employees known as associate brokers that buy and sell second hand electrical equipment. They do this trading through online retail and auction portals such as eBay and Gumtree, and part of the brokers job is to choose the best portal for an item, the listing price and reserve in negotiation with the customer and the length of time the item would be listed for. They list the items for sale under OZES but they earn income by taking 20%-40% of the sales profit as a commission depending on the sales price. Before an item is put up for sale the item is delivered to OZE

Case Study

ICT710 ICT Professional Practice & Ethics Task 3 2019 ATMC Semester 1 Assessment and Submission Details Marks: 40% of the Total Assessment for the Course Assignments should be submitted via SafeAssign .      Please follow the submission instructions on Blackboard. All assignments will be checked for plagiarism and/or collusion between individuals. Refer to the assignment rubric on Blackboard for the marking criteria and standards. The assignment will be marked out of a total of 100 marks. Refer to your course outline or the course Blackboard web site for a copy of the “Student Misconduct, Plagiarism and Collusion” guidelines. Requests for an extension to an assignment MUST be made to the Course Coordinator prior to the date of submission and requests made on the day of submission or after the submission date will only be considered in exceptional circumstances. Case Study: Westfield Background: Westfield’s Aust

Content Analysis Assignment

Assignment  Overview   This assignment has three major aims: ·        To help students gain good understanding of all ITECH7400 material. ·        To encourage students to use content analysis summaries to prepare for tests, examinations and to help their understanding of concepts. ·        To encourage students to conduct independent investigation into related topics from books, the Internet, and through practical investigation. Engagement with this assignment should help students to prepare for the weekly multiple choice tests (10%), the theory test (0%) in week 8 and the end of semester examination (60%).         Timelines and Expectations Students are required to analyse the weekly lecture material of weeks 1 to 8 and create concise content analysis summaries of the theoretical concepts contained in the course lecture slides. The content analysis should not exceed ten (10) A4 sides of paper. Suggestions as to possible inclusions in your content an