CIS-4017-N System Administration and Security

Module Title:   System Administration and SecurityModule Leader:Chunyan Mu
  Module Code:  CIS-4017-N
Assignment Title:   Cryptography basics, security analysis, design and implementationDeadline Date:11 May, 2022
  Deadline Time:  4:00pm
Submission Method:   Online (Blackboard Ultra)

System Administration and Security CIS4017-N SAS

ICA                 2021-22

Introduction

This assessment includes two parts:

  • Part I involves a set of short questions on the topic of cryptography and will consider the correctness and completeness of the solutions and your understanding of the concepts and will assess learning outcomes PTS1, PKCS3, PKCS4.
  • Part II involves written design exercises and will addess learning outcomes PTS1, PTS2, PKCS3, PKCS4, PKCS5, PKCS6, PKCS7. You are required to analyse three scenarios, select and justify appropriate security techniques as part of solving the problem in the scenarios, deign/implement the solution, and communicate that design as a written report, including rationales, comparisons and alternatives. The use of security related terms and the demonstration of relevant legal, social, ethical and professional issues is included where needed.

You must submit original work written by yourself, you must not share your work with your classmates. If you submit multiple attempts, then I will mark the last submission received before the deadline, or if no submissions are received before the deadline, the submission received first after the deadline will be marked. If you hand in late, I will only mark within 7 days and your work will be capped to a pass.

Part I Cryptography questions (25%)

Basic concept

  1. Explain the difference between symmetric and asymmetric encryption. Describe a method of asymmetric encryption, and discuss the vulnerabilities of it.

Simple encryption and decryption

  • Decrypt OHW PHR XWC CC using the Caesar cipher (shift of 3).

[5 marks]

[5 Marks]

RSA

  • Assume a public key for RSA encryption given by the pair (143,11). Find the private key corresponding to this pair.

[5 marks]

  • Using the pair (143, 11), decode the encrypted message (111 4 88 57 116 67) assuming the letters were represented by ASCII values

(recall that the ASCII values are 65->A, 66->B, … and 97->a, 98->b, …)

[5 marks]

Diffie-Hellman protocol

  • Describe in detail the Diffie-Hellman protocol for three parties Alice, Bob and Carol.

[5 Marks]

Part II Security analysis and design (75%)

Scenario I – Security models                                                                                           [20 Marks]

MGB Ltd. is a company providing security solutions to public services. You are asked to help the MGB Ltd to design a security model for the national defence department – a part of an e-government project on secure information control in managing troops. Assume the armed forces be classified as: {army, navy, air force, marines}, the security levels are typed as: {high, low}.

Your tasks: You should produce a short report (around 500 words) to formalise a Bell Lapadula model to address the confidentiality properties for the specified scenario, and to discuss the strength and weakness of your model.

Hint: You need to describe the model (specify subjects, objects, possible operations – which can be flexible, design your own but need to show your understanding of specifying and applying the BLP model in a real case), the security lattice (a graph can be helpful), the policy and the security properties for the given scenario above.

Scenario II – Security Analysis and Solutions to Conference Management Systems                                                                                         [25 Marks]

A conference manage system is a web-based management system which allows researchers submit research papers, the program committee (PC) members (reviewers) to browse papers and contribute reviews, scores and discussion, and release decisions (such as rejection or accept) via the Web. In one arrangement, the conference chair downloads and hosts the appropriate server software. (A good example is easychair: https://easychair.org/conference)

The system allows users to submit papers, enter reviews & scores and access reviews & scores associated with events (conferences or workshops) regarding to the role of the uses. A user is granted access to the system by providing a role (chair, reviewer, or author) along with a user-id and associated password. Permissible roles for each user are specified at the time a new event is added to the management system. Reviews & scores on papers are initially assigned by chairs (chairs assign papers to reviewers for reviewing, one reviewers can be assigned multiple papers, one paper can be allocated to multiple reviewers). Reviewing are done by reviewers. And a chair can perform any and/or all of these actions, but a chair’s updates can only be changed by the chair. An author, in addition to learning about his or her reviews & grades on individual papers, is entitled to learn the acceptance statistics (but not other papers’ reviews), and the conference program.

Threat model: The adversary is a user who desires to learn the reviews & scores, changes reviews & scores, or prevent others from learning or changing reviews & scores. The adversary has access to the management system and also can read, delete, and/or update network messages in transit. The adversary cannot physically access or run programs on a user’s machine that is running a browser to access the management system. And the adversary can not physically access or run programs on the server hosting the management system.

Your tasks: You are asked to produce a report (1500-2000words) to provide contemplate descriptions of the above Web-based Conference Management System. You should address the following issues:

  1. Demonstrate a broad understanding of the professional, ethical and legal compliance considerations around network security.
    1. Analyse a range of security concepts, security models, principles and practice in an appropriate environment.
  • Evaluate potential secure infrastructures to meet an appropriate system requirement.
    • Select and justify appropriate security techniques to meet an appropriate system requirement.
    • Operate ethically in order to implement and test a secure infrastructure to meet an appropriate business requirement.
    • Communicate effectively and professionally in writing.

Hint: Assuming that the manager is not a technical person, craft your explanation in a way that can be explained to a layman and include figures where necessary. You could think about:

  • Assets and security properties: what objects should be protected, what security properties might we expect the system to enforce? For each such security property, label it with one of: confidentiality, integrity, or availability?
  • Vulnerability: explain the vulnerability in the system and use an attack tree/model to describe how an attack could be mounted. Restrict your consideration to the threat model provided.
  • Protection: what cost-effective protections are available against the threats that you identify. Remember the focus is on software vulnerabilities.

Scenario III- Design and Implementation of a Secure Network

[30 marks]

This task involves designing and implementing an Internet-connected secure network for a medium-sized company requiring 500 machines named Smith Logistics, UK. They want to implement a secure network that uses Class C network address with multiple subnets – They have asked you for a price quote as well. But they want to see a packet tracer implementation and simulation results before they commit to purchasing anything.

You can use Packet tracer/Opnet/Omnet++ for the implementation and security measures. The implementation of the network should consist of core, distribution and access layer.

It should use a minimum of two routers at the distribution and a further 2-4 for the core layer. All router interfaces must be tested for the correct subnet operations.

Your tasks: You should write a report with the appropriate design and implementation solution (2500 words max, but flexible) documenting all that you have done, including how the network is set up. Use the tasks below as a guideline to write.

  1. Using a drawing tool of your choice design the network. Draw a simple network diagram of your network.

Hints: Design the logical diagram. You can ignore the device location in a logical design. Use Visio or any drawing tool for the diagram. Don’t forget to label the diagram core, access and distribution layer.

  • Design and Implement an IPv4 subnetting scheme. You can use any address in class c.
  • Hint: Test a small subsection of the network before implementing the full addressing scheme in packet tracer.
  • The report must describe the design and all of the decisions that you have made in the process of developing the design. This will include a discussion of the design model, Security, WAN protocol, Layer 2, 3 and wireless protocols that you have decided to use. Hint: Restrict your discussion to the main layer 1,2 and 3 protocols
  • Show the detailed cost of implementing your solution in a table format. You can try to show two different costs for the company to choose from.

Hints: Research on the costs of servers (hardware and software), switches, workstations, cables, etc.

  • Show all references used in the report, using appropriate referencing.

Hints: Harvard referencing can be used and make sure the format is fully followed.

Deliverable and deadline

You should submit your report as a PDF document via Blackboard by the deadline of 1600hrs 11 May 2021.

Advice and assistance

Consult the module tutors during a scheduled session or email the module tutors.

Learning outcomes to be assessed (details see assessment criteria)

  1. [PTS1] Communicate complex issues in cybersecurity and system administration to both specialist and non-specialist audiences.
  2. [PTS2] Evaluate, select and use effectively appropriate security and system administration tools.
  3. [PKCS3] Demonstrate a comprehensive and critical understanding of concepts, theories and issues relating to cybersecurity and system administration.
  4. [PKCS4] Research, evaluate and implement modern cybersecurity and cryptography techniques.
  5. [PKCS5] Integrate and synthesise diverse knowledge, evidence, concepts, theory and practice in system administration, including security issues, to solve problems.
  6. [PKCS6] Provide detailed arguments and present conclusions about system administration and security issues, including scenarios with limited or inaccurate information.
  7. [PKCS7] Demonstrate an awareness of ethical conduct in systems administration and cybersecurity scenarios.

Assessment criteria

The criteria below is necessarily incomplete as we cannot anticipate every possible ICA submission.

Q1 (5)Understanding of the concepts
Q2 (5)correctness
    Q3 (5)5 marks for correct solutions of the private key and details provided; if correct p is given: 2 marks; if correct q is given: 2 marks.
    Q4 (5)5 marks for correct decrypt message and details provided; 4 marks if understanding shown but final computation is incorrect, 1 mark for one correct part of the message.
Q5 (5)Correctness and completeness
Grade Part II : scenario I (20) Learning Outcomes to be assessed: PTS1, PTS2, PKCS3, PKCS5, PKCS6
State machine (5)Sound description of the model
Security lattice (5)Correct description on the partial ordering of the security labels
Security properties (5)Reasonability and completeness of the description
Strength and weakness (3)Reasonability and completeness of the description
Writing and reference (2) 
Grade Part II: scenario II (25) Learning Outcomes to be assessed: PTS1, PTS2, PKCS3, PKCS5, PKCS6, PKCS7
      70-100%Excellent   [SYNTHESIS] Demonstrate a broad understanding of the professional, ethical and legal compliance considerations around network security, and an excellent understanding of modern information and network security properties and system threat & vulnerabilities is demonstrated with excellent links to the specified scenario. There is clear evidence of work beyond taught material.   [DESIGN] An excellent analysis of security protection techniques and their application is demonstrated in relation to the specified scenario. There is clear evidence of work beyond taught material.   [WRITE] A very clear and readable report, with excellent structuring, good use of grammar and referencing. Document submitted as PDF.
  60-69%Substantially correct/appropriate (based on taught material & module requirements)   [SYNTHESIS] Demonstrate a good understanding of the professional, ethical and legal compliance considerations around network security, a very good understanding of modern information and network security properties and threats is demonstrated with clear linkage to the specified scenario.   [DESIGN] A very good analysis of security protection techniques and their application is demonstrated in relation to the specified scenario.
   [WRITE] A clear and readable report, with appropriate structuring and referencing. Document submitted as PDF.
                50-59%Minor errors/omissions/issues   [SYNTHESIS] Demonstrate a reasonable understanding of the professional, ethical and legal compliance considerations around network security, and a generally/mostly good understanding of modern information and network security properties and threats is demonstrated with clear linkage to the specified scenario.   [DESIGN] A generally/mostly good analysis of security protection techniques and their application is demonstrated in relation to the specified scenario/task.   [WRITE] A clear and readable report, with minor errors in writing, structure or referencing. Document submitted as PDF.
            40-49%Major errors/omissions/issues   [SYNTHESIS] Demonstrate a limited understanding of the professional, ethical and legal compliance considerations around network security, an a limited understanding of modern information and network security properties and threats is demonstrated and/or limited linkage to the specified scenario.   [DESIGN] A limited analysis of security protection techniques and their application is demonstrated in relation to the specified scenario/task.   [WRITE] A report, with major issues of writing, structure or referencing. Document submitted as PDF.
                  30-39%Unsatisfactory   [SYNTHESIS] Demonstrate a vert limited understanding of the professional, ethical and legal compliance considerations around network security, and a very limited understanding of modern information and network security properties and threats is demonstrated.   [DESIGN] A very limited analysis of security protection techniques and their application is demonstrated.   [WRITE] A report that is difficult to read or comprehend but includes some attempt at structure and referencing OR document is not submitted as a PDF.
0-29%Inadequate   [SYNTHESIS] Demonstrate little understanding of the professional, ethical
 and legal compliance considerations around network security, and little to nothing demonstrated in relation to modern information and network security properties and threats.   [DESIGN] Little to no analysis of security protection techniques and their application.   [DESIGN] A report that is very difficult to read and comprehend, and makes no attempt at referencing.
Grade Part II: scenario III (30)
Learning Outcomes to be assessed: PTS2 , PKCS3 and PKCS5
Task 1 (12)Network Design and Implementation (6 marks); IP and subnetting (6 marks);
  Task 2 (8)Discussion of the relevant protocols and hardware used to design this network and How the protocols meet the requirements.
Task 3 (7)Cost of implementation
Task 4 (3)Professional writing and good use of reference.
Order Now

Get expert help for CIS-4017-N System Administration and Security and many more. 24X7 help, plag free solution. Order online now!

Universal Assignment (February 14, 2026) CIS-4017-N System Administration and Security. Retrieved from https://universalassignment.com/cis-4017-n-system-administration-and-security/.
"CIS-4017-N System Administration and Security." Universal Assignment - February 14, 2026, https://universalassignment.com/cis-4017-n-system-administration-and-security/
Universal Assignment August 2, 2022 CIS-4017-N System Administration and Security., viewed February 14, 2026,<https://universalassignment.com/cis-4017-n-system-administration-and-security/>
Universal Assignment - CIS-4017-N System Administration and Security. [Internet]. [Accessed February 14, 2026]. Available from: https://universalassignment.com/cis-4017-n-system-administration-and-security/
"CIS-4017-N System Administration and Security." Universal Assignment - Accessed February 14, 2026. https://universalassignment.com/cis-4017-n-system-administration-and-security/
"CIS-4017-N System Administration and Security." Universal Assignment [Online]. Available: https://universalassignment.com/cis-4017-n-system-administration-and-security/. [Accessed: February 14, 2026]

Please note along with our service, we will provide you with the following deliverables:

Please do not hesitate to put forward any queries regarding the service provision.

We look forward to having you on board with us.

Most Frequent Questions & Answers

Universal Assignment Services is the best place to get help in your all kind of assignment help. We have 172+ experts available, who can help you to get HD+ grades. We also provide Free Plag report, Free Revisions,Best Price in the industry guaranteed.

We provide all kinds of assignmednt help, Report writing, Essay Writing, Dissertations, Thesis writing, Research Proposal, Research Report, Home work help, Question Answers help, Case studies, mathematical and Statistical tasks, Website development, Android application, Resume/CV writing, SOP(Statement of Purpose) Writing, Blog/Article, Poster making and so on.

We are available round the clock, 24X7, 365 days. You can appach us to our Whatsapp number +1 (613)778 8542 or email to info@universalassignment.com . We provide Free revision policy, if you need and revisions to be done on the task, we will do the same for you as soon as possible.

We provide services mainly to all major institutes and Universities in Australia, Canada, China, Malaysia, India, South Africa, New Zealand, Singapore, the United Arab Emirates, the United Kingdom, and the United States.

We provide lucrative discounts from 28% to 70% as per the wordcount, Technicality, Deadline and the number of your previous assignments done with us.

After your assignment request our team will check and update you the best suitable service for you alongwith the charges for the task. After confirmation and payment team will start the work and provide the task as per the deadline.

Yes, we will provide Plagirism free task and a free turnitin report along with the task without any extra cost.

No, if the main requirement is same, you don’t have to pay any additional amount. But it there is a additional requirement, then you have to pay the balance amount in order to get the revised solution.

The Fees are as minimum as $10 per page(1 page=250 words) and in case of a big task, we provide huge discounts.

We accept all the major Credit and Debit Cards for the payment. We do accept Paypal also.

Popular Assignments

Assignment Faculty of Business, Computing and Digital Industries

Module Handbook Faculty of Business, Computing and Digital Industries School of Business (On-campus) E-Business and E-Marketing Module. 2025-26 Contents Module Introduction Module Leader Welcome Hello A very warm welcome to the E-Business and E-Marketing module. I hope that you find this Module Handbook helpful in supporting your studies and that

Read More »

Assignment Brief BMM6422: Business and Management Strategies

Assignment Brief BMM6422: Business and Management StrategiesComponent numberAssignment 1Assignment typeReportLearning outcomes for this assessment(Please see module Handbook for all learning outcomes)Upon completion of this module students should be able to:1 Evaluate the benefits to organisations of strategic planning within the business environment.2 Employ specific techniques, methods and models used in

Read More »

ASSIGNMENT Business and Management Strategy

Module Handbook Faculty of Business, Computing and Digital Industries School of Business (On-campus) Business and Management Strategy BMM6422 2025-26 Contents Module Introduction Module Leader Welcome Welcome to Business and Management Strategy Hello I hope that you find this Module Handbook helpful in supporting your studies and that it provides you

Read More »

BMM6302 Entrepreneurship and Creativity 

Assignment Brief – Cohort 06 BMM6302 Entrepreneurship and Creativity  Component number Assignment 2 Assignment type 02 Dragon’s Den Presentation (Live Presentation) Learning outcomes for this assessment (Please see module Handbook for all learning outcomes) Compare and contrast a variety of strategic models to develop and critically evaluate business start-up ideas.

Read More »

BMM6302 Entrepreneurship and Creativity 

Assignment Brief – Cohort 07 BMM6302 Entrepreneurship and Creativity  Component number Assignment 1 Assignment type 01 Business Idea (Video Presentation – Panopto) Learning outcomes for this assessment (Please see module Handbook for all learning outcomes) Compare and contrast a variety of strategic models to develop and critically evaluate business start-up

Read More »

LCRM301 Researching Criminology

LCRM301 Researching CriminologyTopic: Introduction to theoryand the research processand undertaking acriminological literaturereviewAcknowledgement ofcountryPART ONE: Preparingcriminological research(Weeks 1-5)In the first part of the unit, we focus on preparing criminologicalresearch and decision-making processes. This includes deciding onthe topic you want to focus on, the kinds of methods to use and thetypes of

Read More »

LCRM301 Researching criminology

LCRM301 Researching criminologyWorksheet 1This worksheet will be disseminated to students in Week 3 and will assist them in the planning and development of the second assessment task: literature review. PART 1: Refining your topicThe topic I am interested in is: I am interested in this topic because: This is an

Read More »

LCRM301 Researching Criminology

LCRM301 Researching CriminologyTopic: Planningcriminological research andformulating effectiveresearch questionsAcknowledgement ofcountryLecture structure Example?How do police perceptions of their own organization influence their views of the public,specifically their trust of people in the areas they patrol?How do women with insecure migration status experience and seek help for family violenceand what are their experiences

Read More »

ASSESSMENT NO.2 – COURT APPLICATION FACT PATTERN

FACULTY OF LAW AND BUSINESSThomas More Law SchoolLAWS201: CIVIL PROCEDURE & ADRSEMESTER TWO, 2025 – NATIONAL –ASSESSMENT NO.2 – COURT APPLICATION FACT PATTERN(AND THE FACT PATTERN FOR THE PLEADINGS WORKSHOP IN WEEK 5)BackgroundRachel Richardson is a printer by trade although she currently works in art design fora fashion magazine based

Read More »

Assessment 2: Court Application

02/09/2025, 20:3430 Points PossibleAssessment 2: Court ApplicationAssessment 2: Court ApplicationDetailsAssessment task 2: Court Application (worth 30% of the final total mark for this unit)Add commentA simulated court application will be run in weeks 6 and 7 of semester on selected topics from the first five weeks of the unit. Your

Read More »

APPENDIX B: ASSESSMENT TASK 2 – COURT APPLICATION

APPENDIX B: ASSESSMENT TASK 2 – COURT APPLICATION (30% OF FINAL MARK)General informationThis Assessment task is worth 30 marks of your final mark.The task is either making (Applicant) or opposing (Respondent) an application before theSupreme Court in your respective state based on a fact scenario, which will be uploaded on

Read More »

Assessment task Assessment 1 – ASSIGNMENT

Assessment Task 1 (30% of the final mark)This Week30 Points PossibleIn ProgressNEXT UP: Submit assignmentUnlimited Attempts Allowed11/08/2025Attempt 1 Add commentDetails Assessment task Assessment 1 – ASSIGNMENTPurpose To give students the opportunity to produce a well-written piece of formal analysis on a topic inland law. Graduate capabilities GC1,3,7-11 are covered by

Read More »

Assessment Brief- Assessment 3- Map-Reduce Programming Challenge

Assessment Brief- Assessment 3- Map-Reduce Programming Challenge Unit Code/Description ICT313 Big Data for Software DevelopmentCourse/Subject Bachelor of Information TechnologySemester S1 – 2025Unit Learning OutcomesAddressedULO3: Critically assess and implement advanced data pre-processing andanalytics strategies in a software development context, focusing on tasks like datacleansing, transformation, and feature selection.ULO4: Design, develop, and

Read More »

Assessment 2 Infographic and Reflection

Assessment 2 Infographic and Reflection Part 1 Infographic and Part 2 Reflection using the Gibbs CycleThis assessment is worth 35% of your final grade (Infographic 18% + Reflection 17%). Assessment InstructionsPart 1: InfographicCreate an A3 size infographic (portrait layout).Submit as a .pdfTOPIC:Create your infographic as a poster (A3 paper size)

Read More »

CHCCSM013 Facilitate and review case management

ContentsAbout this document 4Student details section 4The community services work environment 5Workplace hours 6Responsibilities 6Evidence collection 7Section 1: Determine response for case management 9Section 2: Conduct case management meetings and develop case management plan 18Section 3: Monitor and review case work activities and processes 24Section 4: Supervisor report 28 About

Read More »

BMM6302 Entrepreneurship and Creativity Assignment help

Assignment Brief – Cohort 07 BMM6302 Entrepreneurship and Creativity  Component number Assignment 1 Assignment type 01 Business Idea (Video Presentation – Panopto) Learning outcomes for this assessment (Please see module Handbook for all learning outcomes) Compare and contrast a variety of strategic models to develop and critically evaluate business start-up

Read More »

BMM6582: eBusiness and eMarketing 02 Analytical Review Assignment Help

Assignment Brief BMM6582: eBusiness and eMarketing Component number Assignment 2 Assignment type 02 Analytical Review Learning outcomes for this assessment (Please see module Handbook for all learning outcomes) Compare, contrast, and analyse approaches used to evaluate a company’s current positioning in the traditional and electronic marketplaces. Appraise various options for

Read More »

BMM6582: eBusiness and eMarketing Assignment 2 Assignment Help

Assignment Brief BMM6582: eBusiness and eMarketing Component number Assignment 2 Assignment type 02 Analytical Review Learning outcomes for this assessment (Please see module Handbook for all learning outcomes) Compare, contrast, and analyse approaches used to evaluate a company’s current positioning in the traditional and electronic marketplaces. Appraise various options for

Read More »

BMM6582: eBusiness and eMarketing Assignment Help

Assignment Brief BMM6582: eBusiness and eMarketing Component number Assignment 1 Assignment type 01 Video presentation (Panopto) Learning outcomes for this assessment (Please see module Handbook for all learning outcomes) Compare, contrast, and analyse approaches used to evaluate a company’s current positioning in the traditional and electronic marketplaces. Appraise various options

Read More »

Business and Management Strategy Assignment Help

Business and Management Strategy: Assignment Guidelines and Suggested Structure (3,000 Words) 1. Introduction (approx. 250–300 words) 2. Industry Analysis and Competitive Environment (400–450 words) 3. Competition and Customer Requirements (550–600 words) 4. Resources and Strategy Implementation (500–550 words) 5. Strategic Capabilities & Sustainable Advantage (400–450 words) 6. Development of Resources

Read More »

BMM6452 – Professional Learning Through Work Assignment Help

Assignment Brief  BMM6452 – Professional Learning Through Work Assignment type  Final Assessment (Assessment 3)-To be Negotiated Learning outcomes   (Please see module Handbook for all learning outcomes)  By the end of this module, the student should be able to:  Demonstrate enhanced graduate employability skills, knowledge, behaviours and attitudes developed through working

Read More »

CSE2/4DBF (2025) – Assignment 1

CSE2/4DBF (2025) – Assignment 1 Page 1/3 CSE2/4DBF 2025Assignment 1 (20%)Due date: this week AIMS AND OBJECTIVES:✓ to represent a problem description given in natural language as an (Enhanced) EntityRelationship modelThis is an individual Assignment. You are not permitted to work as a group when writingthis assignment. The use of

Read More »

Can I Pay Someone to Do My Assignment? A Complete Student Guide

If you’re a student juggling multiple deadlines, exams, part-time work, or personal responsibilities, you may have found yourself asking: can I pay someone to do my assignment? You’re not alone. This is one of the most searched academic questions today, especially among university and college students worldwide. In this blog,

Read More »

Project Development and Analysis in Emerging Technologies

Assessment Brief- Assessment 2 Unit Code/Description ICT305 – Topics in IT Course/Subject BIT Semester 2024- S1 Unit Learning Outcomes Addressed ULO 1, 2, and 3. Assessment Objective The primary objective of this assessment is to provide students with hands-on experience in designing, implementing, and analysing a project in one of

Read More »

EDUC1006 Interdisciplinary Studies: Crossing the line

ASSESSMENT 2: Report Summary Title Assessment 2 Type Report Due Date Thursday 17 April, 11.59 pm (end of Week 6) Length 1500 words or equivalent Weighting 50% Academic Integrity The use of GenAI is allowed but limited for this assessment task. Submission Word document or PDF submitted to Turnitin Unit

Read More »

Writing in Community Development

Assessment Overview Overview Length or Duration Worth Due This essay should demonstrate a coherent argument, which is backed up by evidence from relevant journal articles, books and websites. You are expected to make two direct quotations only; and the rest should be paraphrases. You should also list at least eight sources.   If you are unsure of

Read More »

Counselling Theory and Practice in Schools

Assignment 1 Requirements Word limit 2500 words; excluding references Referencing You’re required to follow APA Academic Integrity Please refer to the Guidelines Task Purpose 🎯 This assessment task is designed to develop and assess students’ critical thinking and reflective skills, essential for counselling professionals in educational contexts. By engaging in a literature

Read More »

PSY1040 Cultural Responsiveness Self-Assessment

PSY1040 Cultural Responsiveness Self-Assessment The below self-assessment tool has been adapted from the following resource: Bennett, B., & Morse, C. (2023). The Continuous Improvement Cultural Responsiveness Tools (CICRT): Creating more culturally responsive social workers. Australian Social Work, 76(3), 315–329. Bennett’s collection of Cultural Responsiveness Self-Assessment Tools is designed for social workers

Read More »

Can't Find Your Assignment?