ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment

ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment

Section C – Instructions to students
Task instructions:
Part 1 – Observation


Part 1 of the assessment will be completed as a scenario and observed and assessed by the assessor. 
 
You work as a developer in a production house which is meeting with new client. The client is creating a website with a game aimed at students who are young and have visual impairment. They are asking you questions about their project and what you can provide for them.

In this scenario you will be meeting with your client. You will work in pairs to complete this meeting. One person will play the part of the client, and another will play the part of the developer and then you will swap roles. The client will need to systematically ask each of the questions in Part 1 of this assessment. The developer is then required to answer each of the questions posed by the client.

It is recommended that you prepare for the meeting by noting answers to the questions that will be asked by the client.

SEE SUPPORTING DOCUMENTATION FOR OBSERVATION QUESTIONS.
 
Part 2 – Knowledge Questions
This part of assessment requires learners to answer a range of knowledge questions related to copyrights, ethics, and privacy.  Some of these questions refer to scenarios and others will relate to the topics which have been discussed in class. The typical length for an answer would be 2 to 3 sentences.
 
– Learners are required to correctly answer all questions. 
– Once learners have completed all the questions, the assessment must be uploaded and submitted to Brightspace.
– If a supplied answer is incorrect or requires further information the learner will be requested to correct the issues and resubmit the assessment via Brightspace.
– Learners must contribute to and abide by organisational standards including intellectual property and privacy
– You may use the internet for research purposes.
Section D – Conditions for assessment
Conditions: Student to complete and attach Assessment Submission Cover Sheet to the completed Assessment Task.
–  This assessment is to be completed individually.
–  You must meet all criteria listed in the marking guide to be satisfactory in this task.
–  You may resubmit this task if not successful within the enrolment period as per Holmesglen conducting
   assessment procedure.
–  This is an individual task; however, you are required to get information, feedback and ideas from your assessor, peers and industry to help complete the assessment planning guide. 
–  It is expected all documents will be completed and submitted electronically but if this is not possible, make alternative arrangements for submitting the documents with your assessor.
–  You will have the opportunity to resubmit if any part of the assessment is deemed unsatisfactory (one resubmit allowed per task).
–  You can appeal an assessment decision according to the Holmesglen Assessment Complaints and Appeals Procedure.
–  If you feel you require special allowance or adjustment to this task, please decide with your assessor within one week of commencing this assessment,
–   The learner may use the internet research answers for this assessment.
 
Part 1
–    Learners will need to pair up with one other learner, one taking the role of the client and the other the role of the developer.
–    Once all the questions have been answered they will need to swap roles based on the scenario provided.
–    This must be completed in class

Learners will be provided with:
– Copyright legislation
– APP Principles
– Australian Accessibility standards
– Privacy Policy template


Equipment/resources students must supply:Equipment/resources to be provided by the RTO:
USB / Online Storage
computer
internet connection
headset with mic
webcam
Computer
Internet connection
Word processor
WebEx Teams

Section E – Marking Sheet – Student Answer Sheet
Unit code:(W4)

ICTICT418
Unit title:(Ethics)

Contribute to copyright, ethics and privacy in an ICT environment

Part 1 – Observation task

Skills to be observed during this task to the required standard1. Date:2. Date:3. Date:Comment
   
SatisfactorySatisfactorySatisfactory
YesNoYesNoYesNo
1.The learner has articulated and communicated the principles of web design accessibility and equity in relation to the ICT industry.  
2.The learner has identified, established, and articulated where to find current state and federal legislation and standards in relation to accessibility standards and web design. 
3.The learner has contributed, articulated, and investigated into negative consequences of failure to incorporate accessibility and equity in relation to website or web design. 
4.The learner has investigated, identified, and reviewed the client’s current copyright policy, in addition to contributing and to creation and updates to their client’s copyright policy and procedures to align with legislation and industry standards. 
5.The learner has identified, established, and articulated where to find current state and federal legislation and standards in relation to privacy standards and web design. 
6.The learner has articulated privacy expectations in accordance with current legislation standards and how to implement these privacy standards for an organization. 
7.The learner has identified, investigated and articulated WHS issues and expectations that need to maintain in accordance to current legislation and industry standards. 
8.The learner has identified, established, and articulated where to find current state and federal legislation and standards in relation to WHS and web design. 
9.The learner has investigated and articulated current legislation and standards in relation to intellectual property and copyright in work practices. 
10.The learner has identified and established where to find current state and federal legislation and standards in relation to intellectual property and copyright in the ICT industry. 
11.The learner has articulated implementation of new policy and procedures to stakeholders, in addition to identifying how to distribute, implement and review new ethics codes and ethical work practices to stakeholders with feedback being collected and implemented. 
12The learner has reviewed and discussed work practices to ensure server operating system security in accordance with the client’s organisational policy.   
13The learner has outlined standard organisational communication processes and procedures in relation to privacy policy and ethics. 

Part 2 – Knowledge task

Questions: Provide your responses in the boxes below each question.
Q1.You are required to contribute to the code of ethics. Please refer to the Supporting documents section of this document. You are required to contribute by filling in the missing statement points under each heading. Please write you answer in red.   This policy must include the following topics with at least three (3) points per category:   Privacy and confidentiality (with clients and also students)Copyright procedures for all assessmentsEthical behaviour as a designer in classWHS procedure and issuesCommunication strategy and class behaviour  Satisfactory response
Yes ☐No ☐
Answer: Privacy and confidentiality (with clients and also students) a. I will keep any information supplied by customers, other students, and staff secret. b. Your Student ID is used for administration and to help secure your information.   c. Any information obtained from a customer about facts, details, or data should be treated as confidential. This is applicable to information that is not widely known or in the public domain. Copyright procedures for all assessments   a. I agree that any work given is original and not covered by copyright.   b. If you utilized pictures or fonts downloaded from the internet that are copyrighted and not licensed, you must obtain permission from the owner before using them. c. Follow the directions for crediting the owner, or refer to their rules of use in their terms and conditions. Ethical behaviour as a designer in class a. I will always act ethically with clients, other students, and staff. b. Produce unique work c. Obey the laws and regulations governing privacy, intellectual property, and discrimination. WHS procedure and issues a. Understand and follow WHS procedures b. I will ensure that WHS requirements are followed and that information is kept up to date. c. Take part in WHS consultations as needed and offer comments Communication strategy and class behaviorIn class, be kind and nice.b. In relation to Holmesglen, I shall exclusivelyutilizee Brightspace and other communication means for academic purposes (not private)b. Be conscious of your outside-of-class communication tools, such as Brightspace or email.Comment:  
Q2.How would you distribute and educate your peers about this policy or any future policy changes?   List two (2) methods.Satisfactory response
Yes ☐No ☐
Answer: By Webex chatBy EmailComment:  
Q3.How would you collect feedback and review your new policy?   List three (3) methods.Satisfactory response
Yes ☐No ☐
Answer: 1. Questionnaires 2. e-mail 3. Individualized conversationsComment:
Q4.What are the three (3) ways you can protect your IP in web/game design? (Intellectual Property).Satisfactory response
Yes ☐No ☐
Answer: 1. Obtain Trademark Registration 2. Obtain Patent Registration 3. Intellectual property rights  Comment:  
Q5.Outline the system security in your current work area.   List at least three (3) observations. Satisfactory response
Yes ☐No ☐
Answer: 1. Separate logins 2. Accounts for administrators 3. Log out automaticallyComment:  
Q6.Based on Q5, is your work area system security secure?Satisfactory response
Yes ☐No ☐
Answer: Yes, by using these the system will be absolutely Secure.Comment:  
Q7.Explain what a “system security procedure” is referring to in one paragraph or less.Satisfactory response
Yes ☐No ☐
Answer: A sequence of actions, tasks, procedures, judgments, computations, and other processes that culminate in a specific security task or function.Comment:  
Q8.List two (2) ways a business communicates in the ICT industry?Satisfactory response
Yes ☐No ☐
Answer: By Policy, terms & conditions.Via the Internet.Comment:  
Q9.List three (3) customer service requirements in the ICT industry?Satisfactory response
Yes ☐No ☐
Answer: 1. To be deserving of clients’ trust 2. to be truthful 3. to be skilled.Comment:  
Q10.Write a letter to ACS (Australian Computer Society) asking for permission to use their logo.  https://www.acs.org.au. This should be no longer than one paragraphs. Satisfactory response
Yes ☐No ☐
Answer: To, Australian Computer Society Q534 Queen Victoria Building, Sydney NSW 1230   Subject: Copyright permission for the logo   Dear Sir,   I’m writing to request copyright permission to use your company’s logo on my website. These resources are designed for non-profit educational purposes, and I would appreciate free permission to use them. Please confirm your approval here and submit this request in the self-addressed, stamped envelope supplied. I’ve included a duplicate of this request for your records. Permission was given.Permission is given subject to the following conditions:Permission has been refused.   Regards, Name Department Company   Signature Date:  Comment:  
Q11.Research the Australian Privacy Principles from oaic.gov.au? List all ten (10) with a brief description as bullet points.  Satisfactory response
Yes ☐No ☐
Answer: NPP1: Method and Purpose of Collection An organisation must not gather personal information unless absolutely essential, and collection must be done in a legitimate and fair manner (unintrusive). Torganizationion must take reasonable efforts to ensure that the individual is informed of the purpose, to who it will be revealed, the repercussions for failing to provide, how to contact the organization, and how to acquire access to the information gathered.   NPP2: Data Utilization and Disclosure Organizations must only use or disclose information about individuals for the primary purpose for which it was collected unless a secondary purpose applies to the first and the individual would reasonably expect the organization to disclose OR the individual has consented to the use or disclosure OR the information is not sensitive AND the use is for research purposes.  NPP3-4: Data Security and Quality 3. The organisation shall take reasonable means to ensure that the personal information it collects and discloses is accurate, full, and up to date.   4. The organisation shall take reasonable precautions to protect personal information against abuse and loss as a result of unauthorized access. Organizations must also take reasonable efforts to discard or permanently de-identify personal information that is no longer required for the original purpose for which it was produced.   NPP5-6: Access and Openness   5. The organization’s policy on the management of personal information must be clearly stated. These policies must be made available to anybody who requests them. On request, organizations must take reasonable measures to provide information about the information obtained, why it was gathered, and how it was collected, stored, utilized, and disclosed. 6. Individuals must be granted access to their personal information by an organisation UNLESS it could cause serious/imminent harm to any individual, it could unreasonably infringe on the privacy of others, the request is frivolous or vexatious, relates to legal proceedings involving the individual, access would be unlawful, denying access is required by law or other stipulations.   NPP7: Identifiers   Other organisations’ or agencies’ IDs must not be utilized or disclosed by the organisation.   NPP8: Confidentiality   Individuals must have the choice of staying anonymous if lawful and possible.   NPP9: Flaws in Cross-Border Data   Under certain instances, an organisation in Australia (or an external territory) may transfer personal information about an individual to someone (other than the individual or the organisation) in a foreign nation. NPP10: Confidential Information   An organisation may not acquire sensitive information on an individual unless the subject has agreed, the law requires it, or there are other conditions.  Comment:  
Q12.Source the ACS Privacy Policy. Provide url.Satisfactory response
Yes ☐No ☐
Answer: https://www.acs.org.au/privacy-policy.html  Comment:  
Q13.Does the ACS Privacy Policy support the principles of privacy legislation? This should be no longer than one paragraph.Satisfactory response
Yes ☐No ☐
Answer: Yes. It explains why and how it gathers and stores information, as well as how to access and change it, as well as how to complain, and who to contact.Comment:  
Q14.Source the ACS Code of Ethics. Provide url.Satisfactory response
Yes ☐No ☐
Answer:   https://www.acs.org.au/content/dam/acs/acs-documents/Code-of-Ethics.pdf  Comment:  
Q15.Does the ACS Code of Ethics support the main fundamentals of workplace ethics? Satisfactory response
Yes ☐No ☐
Answer: Yes, it promotes integrity, professional growth, professionalism, and competence.  Comment:  
Scenarios …The scenarios below will apply your knowledge of workplace ethics in the workplace.
Q16.Scenario 1: Jean’s problem solving. Jean, a statistical database programmer, is trying to write a large statistical program needed by her company. Programmers in this company are encouraged to write about their work and then publish their algorithms in professional journals. This is detailed in the company code of conduct. After months of tedious programming, Jean has found herself stuck on several parts of the program.  Her manager, not recognising the complexity of the problem, wants the job completed within the next few days. Not knowing how to solve the problems, Jean remembers that a co-worker had given her source code listings from his current work and from an early version of a commercial software package developed at another company. On studying these programs, she sees two areas of code which could be directly incorporated into her own program. She uses segments of code from both her co-worker and the commercial software but does not tell anyone or mention it in the documentation.  She completed the project and turns it in a day ahead of time. Jean says that she is unaware of the company code of conduct. How do you see this situation? Choose the correct answer(s) below. Jean should take the day off and reward herself with a massage.Jean should have waited until the deadline and not a day earlier, before turning her work in early. Now her manager may give her extra work.Jean could have approached her manager about the complexity of the issue and discussed her concerns.Jean needs to ask permission before using the code from her co-workers. Jean needs to mention her co-workers, and the use of their code, giving them credit for their work in her documentation. Acknowledgement: Burmeiser, OK (2000), ‘Applying the ACS code of ethics’, Journal of Research and Practice in Information Technology. Vol. 32, no.2, pp. 107-120.  Satisfactory response
Yes ☐No ☐
Answer: Jean could have approached her manager about the complexity of the issue and discussed her concerns Because rest of them does not apply because, while the work was developed by a co-worker, it was created while they were employed by a corporation, and as such, that firm owns the and also they do not apply because no permission was sought. Giving credit does not imply.Comment:  
Q17.How would you ensure that current and future employees understand their obligations and the rights of others in Q16?Satisfactory response
Yes ☐No ☐
Answer: By checking three and six months after implementation, as well as once a year during performance evaluations. We can ensure through team meetings or directly soliciting comments from employees and also by HR incident reports.Comment:  
Q18.Scenario 2: The Employment Agency request An employment agency is determining requirements for an information system to be used. The agency’s organizational policy discusses equal opportunity employment in alignment with state and federal government laws. The agency has consulted with you as a programmer to develop the IT software to develop the software design. At a production meeting the client explains that when displaying applications whose qualifications appear to match those required for a particular job, the names of white applicants are to be displayed ahead of those of non-white applicants. An additional requirement is for the names of male applicants are to be displayed ahead of female applicants. What would you do? Choose the correct answer(s) below: Say nothing, go home and go to your pump class – that cute instructor is running the class tonight ;)Change it to female applicants to be displayed ahead of male applicants.You take steps in rectifying the matter by contacting your manager about the issue and discussing your concerns with the client. Demand a pay rise. Acknowledgement: Burmeiser, OK (2000), ‘Applying the ACS code of ethics’, Journal of Research and Practise in Information Technology. Vol. 32, no.2, pp. 107-120.Satisfactory response
Yes ☐No ☐
Answer: c.         You take steps in rectifying the matter by contacting your manager about the issue and discussing your concerns with the client.Comment:  
Q19.What is the main issue in Q18?Satisfactory response
Yes ☐No ☐
Answer: Racism and sexism are on display! This is an ethical issue since discrimination should be included in a company’s code of conduct, regardless of whether it is legal under federal or state law.  Comment:  
Q20.Where would find standards or legislation to support your choices for Q19?Satisfactory response
Yes ☐No ☐
Answer: Within the framework of anti-discrimination legislation (particularly the Racial Discrimination Act of 1975 and the Sex Discrimination Act of 1984), as well as my organization’s Code of Conduct.Comment:  
Q21.Scenario 3: Joseph’s logo design. Joseph is a Melbourne based designer and has been asked to design an original logo for a local small business. He commences research and creates a few original concept designs. After he shows his client his initial designs the client is unhappy with those concepts. Joseph goes away and works on a new design but the client emails through an image of a logo design that they like. The logo is of a competitor and the client wants their logo to look the same, but with only a small change to the lettering only. What should Joseph do? Choose the correct answer(s) below. Joseph should just follow the instructions of the client and complete the job he can buy those new pair of shoes on sale with the money he makes.Joseph should discuss his ethical concerns with his client. Joseph should just design a logo he likes regardless of what the client requests or needs and disregard the email entirely. Who cares?Joseph should design an original design and use the emailed logo as a reference.Run away and curl up in a ball somewhereSatisfactory response
Yes ☐No ☐
Answer: Joseph should discuss his ethical concerns with his client. Joseph should design an original design and use the emailed logo as a referenceComment:  
Q22.What would you say to your client to support your answer(s) at Q21?  Write no more than two paragraphs.Satisfactory response
Yes ☐No ☐
Answer: In Australia, copyright law is automatically applied to original work, which includes the logo sample you submitted. Unfortunately, we cannot utilise this design without exposing your company to potential Copyright difficulties; however, we could get permission from the company to use it. Alternatively, I may utilise this as a starting point to create something unique for you.Comment:  
Q23.Where would find standards or legislation to support your answer for Q22?Satisfactory response
Yes ☐No ☐
Answer: Source: Copyright Act 1968 https://www.legislation.gov.au/  Comment:  
Q24.Scenario 4: Deedee and her data. Deedee has been asked to collect data from a competition to determine the demographics of the online magazine readers. The competition terms and conditions state that information will only be used for demographic research purposes only once the competition has ended. Deedee receives the final spread sheet with the competition entrants detailing each persons’ name, age, email, and location. The information is secure on Deedee’s computer and only she has access to that data. Jules has asked for access to the spreadsheet so she can email each person weekly email newsletter selling online products. There is no provision in the terms and conditions Deedee used to collect the data for other purposes other than research. It is extremely specific. You find that the company privacy policy is very vague and general. It is not in accordance with National Privacy Principles. Jules asks for Deedee’s log in. What should Deedee do? Choose the correct answer below. Deedee should go ahead and give Jules the access to the spread sheet. The more products Jules and Deedee can sell online means the possibility of a monthly bonus. Deedee is saving to go on vacation to Ibiza. She needs a holiday!Deedee should inform Jules this is not a good decision and advises against using the data to email each customer directly.Everyone in the office should have access to Deedee’s data.  Satisfactory response
Yes ☐No ☐
Answer: Deedee should inform Jules this is not a good decision and advises against using the data to email each customer directly.  Comment:  
Q25.In less than one paragraph, discuss your reasons for your answer for Q24. You may use bullet points instead.Satisfactory response
Yes ☐No ☐
Answer: The terms and conditions specifically declare that individuals’ information would be gathered solely for research purposes; no mention of marketing or newsletters was made. 
Q26.Where would you find standards or legislation to support your choices for Q24? What is the main issue here?Satisfactory response
Yes ☐No ☐
Answer: The National Privacy Principles OR the Privacy Act of 1988. It would be a violation of privacy to distribute newsletters or commercial materials.Comment:  
Q27.Does the privacy policy in Q24 need to be reviewed? Why?Satisfactory response
Yes ☐No ☐
Answer: Yes, because the policy is ambiguous and broad, and therefore violates the National Privacy Principles.Comment:  
Q28.Scenario 5: Deedee and her policy After the debacle above in scenario 4, Management are impressed with Deedee’s work ethic. She has now been asked to update the company privacy policy to be alignment with the National Privacy Principles. This new policy change should then be applied to upholding competition term and conditions in future or changing them to be in accordance with the APP when appropriate. Deedee has written a draft and the policy is now more specific, detailing the rights of all stakeholders and mentions the principles in detail. The company code of conduct has also been reviewed and now includes the duties of staff to maintain the privacy rights of all customers along with general ethical conduct in the workplace such as professional development and good moral conduct. Deedee interviews the staff members in her work area about the new policy update. She asks them to source the company privacy policy and code of conduct, discuss its relevance to their job and records their feedback. After the interview she discovers the following: Two staff members do not actually know where to find the code of conduct or privacy policy. Five do not understand the guidelines behind the National Privacy Principles Only 2 understand the potential consequences of breaching the APP and do not see the big deal.Three mention the wording is too complicated and too wordy.5 say the type is too small and they struggle to read the documents.Five staff still do not understand what this has to do with their competition terms and conditions that they email out to customers or put on raffle tickets on a regular basis.Management have asked for all staff to undergo training in some manner and for Deedee to organize this.You realize that customer data files have are not backed up. What should Deedee do? Choose the correct answer(s) below. Deedee should consider this a job well done.Deedee should panic, take an aspirin go to bed. Let someone else deal with this rubbish.Deedee should update the policy again incorporating her recorded feedback, distribute it again and revise the policy again in future?Deedee should make the wording even more difficult to read because she doesn’t really understand it either.Deedee need not worry about educating the staff about the APP. Most staff leave the company within a few months, so why waste so much time and money?Satisfactory response
Yes ☐No ☐
Answer: Deedee should consider this a job well done.   Deedee should update the policy again incorporating her recorded feedback, distribute it again and revise the policy again in future?  Comment:  
Q29.If the policy were to be updated again what feedback should be considered based on the interviews in Q28?Satisfactory response
Yes ☐No ☐
Answer: Objectives To explain the ideas underlying the national privacy principles.Where can I find the code of conduct and privacy statement?As far as feasible, simplify the phrasing (without changing meaning)Describe the ramifications of violating the NPP.Increase type sizeCreate more meetings to explain why this is significant to all information gathered Implement data file backupsComment:  
Q30.List two (2) ways you could advise staff about the location of the policy and the fact it has been updated again?Satisfactory response
Yes ☐No ☐
Answer: 1. Via Meetings 2. Via emailComment:  
Q31.How would staff be trained / educated about the APP and its relevance to their competitions?Satisfactory response
Yes ☐No ☐
Answer: Create a training package that includes one-on-one conversations, tests, group discussions, and so on.Comment:  
Q32.How would you review the final policy once you updated it? Satisfactory response
Yes ☐No ☐
Answer: Distribute to employees and solicit feedback.Comment:  
Q33.List one (1) way you check that staff are understanding and applying the new codes?   Satisfactory response
Yes ☐No ☐
Answer: Monitoring and team meetings are used to accomplish this.Comment:  
Q34.List one (1) way Deedee could improve the security of customer data based on the information given at Q28??Satisfactory response
Yes ☐No ☐
Answer: Ensure that server backup are stored both locally and in the cloud, that they are encrypted, and that access to them is controlled.Comment:  

 

 

 

Assessment Submission Cover Sheet (VET)

By submitting this assessment task and signing the below, I acknowledge and agree that: This completed assessment task is my own work. I understand the serious nature of plagiarism and I am aware of the penalties that exist for breaching this.I have kept a copy of this assessment task. The assessor may provide a copy of this assessment task to another member of the Institute for validation and/or benchmarking purposes.
Student ID:Student name:
Submission or observation date: 
Student signature For electronic submissions: By typing your name in the student signature field, you are accepting the above declaration. 
Section F – Feedback to Student
Has the student successfully completed this assessment task?YesNo
Additional Assessor comments (as appropriate):
 
Resubmission allowed:Yes ☐No ☐Resubmission due date: 
Assessor name: 
Assessor signature: 
Date Assessed: 


Supporting documents

Observation task


Unit code:
(W4)

ICTICT418
Unit title:(Ethics)

Contribute to copyright, ethics and privacy in an ICT environment

Part 1 – Observation task

Skills to be observed during this task to the required standard
1.Setup
Client: We are looking for a developer. Our current website has become very popular and we want to incorporate new website content, including a new game with some in app purchases. Developer: Could you tell me about the target audience? Client: Oh, our main users are teenagers in schools who read our site forums, and play our games while on the way to school, or in class, when they should be doing work. We have also discovered our site is popular with students with various issues. Developer: What type of issues? Client: Our research shows we have become popular with several schools who have a lot of blind and vision impaired students. Developer: Oh ok. We need to consider this when creating your new content to improve accessibility for those users. Client: We heard something about this, but we were not really sure what we could do or what it is.   Question  Client: Please discuss the importance of web design accessibility and equity in the ICT industry? Please describe two (2) examples of how to apply this. Answer:   Allow access to the keyboard For visually handicapped users, keyboard shortcuts can make navigation much easier. Because it demands hand-eye coordination, navigating with a mouse is not possible. This is especially true for blind people who use screen readers to navigate the site. Keyboard instructions allow persons with low vision to visit a website without having to strain their eyes to focus and follow a mouse pointer across the screen.   We can provide PDF on the website, so that screen readers can read the text. Also, we need to add some quizzes or games with the content, so that users can engage with the site.  
2.Setup

Client: Thanks for this information. Is this mandatory? Developer: There are accessibility standards and guidelines. Question Client: Where would you source state or federal law about these standards? Answer: Developers who wish to produce high-quality websites and web tools without excluding people from using their services must consider accessibility. Web Content Accessibility Guidelines 2.0 Level AA, as defined on www.w3.org, are required in Australia.
3.Setup

Client: Interesting stuff. So we kind of understand the laws and reasons why we need these standards. Thanks. So far our website implements some of these but not all of what you have suggested. Question Client: What would be a negative consequence of failing to incorporate accessibility and equity into a website or game design? I mean, why should we care about a minority of users? Please mention two (2) consequences.   Answer: Excluding individuals with disabilities from accessing any or all of your websites is not only discriminatory and may be illegal in some countries, but it is also a failure as a business, perhaps causing your business to lose out to a rival. You might lose a lot of prospective consumers if your site isn’t accessible to everyone in your target market. They will rapidly lose interest, struggle to find information, and may quit the site with negative feedback.
4.Setup 

Client: Are there any other laws or guidelines we should be aware of? Developer: We can take a look at your current privacy policy, copyright policy and code of ethics and check your staff are implementing these. Client: We don’t have a formal policy. We wouldn’t know where to start. I mean, it’s just kids on our site for the most part. Developer: We can help you create and flesh out the policies for you. Client: Where do we begin? Questions Client: Could you show me where to download a privacy policy template? Answer: You can download a privacy policy template from: https://www.iubenda.com/en/?utm_source=adwords&utm_medium=ppc&utm_campaign=aw_brand_global_bmm&utm_term=privacy%20policy%20generator&utm_content=585587635886&gclid=CjwKCAjwopWSBhB6EiwAjxmqDcE7xNruR-NlAOu0d-8DHxGti6Yzee7BrO6E7iW0Uycy75lm8zeEbBoC84kQAvD_BwE The above link. Client: Can you show us how to fill it in? Answer: 1. Login with your mail and password and enter your website name. 2. Substitute your company’s details for the bold elements in square brackets. 3. Update material to reflect your company’s privacy policies. 4. Use the amended wording to create or edit the privacy policy page on your website. Client: Can you show us what a copyright policy looks like? Answer: Here is the sample: https://www.universalassignment.com/copyright-policy  
5.Setup Client: Are there any other laws or guidelines we should be aware of regarding privacy? Developer:  Yes there are. Question Client: Where would you source state or federal law information about these standards? Answer: Here is the link: https://www.oaic.gov.au/privacy/the-privacy-act  
6.Setup

Client: Applying these laws seems complicated. I need a little more information.   Question Client: Please describe two (2) privacy expectations in the ICT industry? Answer: 1. Comply with national privacy rules regarding data collection, customer choices, data access, and security. 2. In all subscriptions, there are opt-out choices. By using this the website will look more loyal and engageable to the customers. How can we apply these in our own company? Answer:  Don’t disclose client information or personal information               Any information that, if made public, might harm a company’s reputation or ability to conduct business. Such data is confidential or sensitive in nature. Follow your company’s privacy policies A privacy policy is a document that specifies how an organization handles any information obtained from customers, clients, or employees throughout its operations. The privacy policies of most websites are visible to site users. Inform users about any website cookies (optional) A cookie file is stored on your PC, phone, or tablet when you visit a website that uses cookies. It saves the name of the website as well as a unique ID for you as a user. That way, the website will recognize you if you visit it again. Stay up to date on these laws and rules  
7.Setup

Client: Oh my. This is great. Just to let you know, this has opened a can of worms for us, I think we also need to also look at WHS in our company. Developer:  We can help you Question Client: Describe two (2) WHS issues/expectations in the ICT industry which we need to apply. Answer: Maintain a safe working environment, which includes keeping workplaces clean and neat. Consider how frequently, and in what manner, you communicate the significance of workplace safety to your staff. Is it discussed on a monthly basis? Quarterly? Annually? Consider making workplace safety an essential part of your company’s culture if you want to prevent workplace injuries. To begin, learn the fundamental causes of your most significant workplace accidents and do frequent workplace surveys for possible safety concerns in equipment and job design. Keep a record of all instances. Keeping incident records gives a wealth of information about the situation and aids in the development of a better plan for future incident prevention.
8.Setup

Client: Thanks. Are there laws or guidelines we should be aware of? Developer:  Yes there are. Question Client: Where would you source state or federal law information about WHS? Answer: Here is the source : https://business.gov.au/Risk-management/Health-and-safety/Work-health-and-safety  & https://www.safeworkaustralia.gov.au/  
9.Setup

Client: Thanks. Could we talk about our website? We need a new logo for the new game we want and need to protect it legally. Does it cost money to have it protected? I’ve heard Australia has specific laws about this. Developer:  You’re talking about Copyright law and Intellectual Property. Question Client: Could you please discuss three (3) points about copyright law in Australia and how it applies our logo? Answer: Authorship’s Contribution Prerequisite: What is the definition of a work of authorship? The term “copyright” refers to a wide variety of works, both published and unpublished, such as All types of literary or linguistic works (including novels, short stories, biographies, articles, news stories, poems, outlines, letters, email messages, etc.). Sculptural, graphic, and pictorial works. Works that are musical, theatrical, or coordinated or performances of songs, public speeches, books on tape). The Originality Requirement: “Originality” is a constitutional requirement, but it is a minimum requirement under copyright, not analogous to the patent “no obviousness” criterion. So long as it is not plagiarised from earlier work and includes a smidgeon of inventiveness, a hackneyed or trivial work might be considered unique enough for copyright protection. What would be an example of a lack of creativity? Putting names in alphabetical order in a phone directory. The Fixation Requirement: In order to enjoy copyright protection, a work must be “fixed” under copyright law. This does not imply that it must be the ultimate or well-thought-out version of the work. Rather, the phrase alludes to the demand that an embodiment of the work is set down or “fixed in a concrete medium of expression” for a longer than the transitory length of time. A book draught on paper, “rushes” from a film before editing, a beta version of computer software on a CD-ROM drive, a snapshot on film, or the flash memory of a digital camera are all “fixed” works under copyright law. The most brilliant and creative improvisation, on the other hand, is not “fixed” if it is unscripted and documented.   The Commonwealth Copyright Act 1968 applies immediately to original work such as your logo. You do not need to file a copyright application, and the logo is copyright protected throughout the creator’s lifetime (70 years).  
10.Setup

Client: Thanks. Are there laws or guidelines we should be aware of? Developer:  Yes there are. Question Client: Where would you source state or federal law information about copyright? Answer:, you’ll find a useful information and easy-to-understand fact sheets on www.copyright.org.au  
11.Setup Client: Wow I’ve learnt so much today. You have been a great help. Joe Blog across the road, who worked on our site last year, didn’t advise us of any of this. Developer:  Seriously? That’s not good.  We have a strict code of ethics and we believe in abiding by these, not just for ourselves, but for the benefit and betterment of all our clients businesses also. Client: That’s good to hear. Client: Tell us about this code of ethics. What can we do to improve our own code of ethics? Questions: Client: What are code of ethics? Answer: A code of ethics is a set of guidelines for your staff to follow in order to do business with honesty. In the same way that a code of conduct specifies behavior requirements for workers and third parties, a code of ethics does the same. A code of ethics, on the other hand, is closer since it delves further into the principles that should govern their behavior and addresses concerns like harassment, safety, and conflicts of interest. This code is frequently seen as an ethical code. Client: How should we go about implementing a code of ethics in our business? Describe at least seven (7) steps needed in implement a code of ethics. Answer: Seven Steps to Code of Ethics Success to assist firms in developing a good code of ethics for their the company, not just their leadership team: 1. Be specific about the goals you want the code to achieve. 2. Obtain code support and suggestions from all levels of the company. 3. Stay up to date on the newest changes in the rules and regulations that influence your sector. 4. Write in as few words and as clearly as possible. Avoid using legal language and broad generalizations. 5. Respond to questions and circumstances from real life. 6. Provide resources for further knowledge and direction. 7. Make it user-friendly in all forms; ultimately, a code fails if it is not used.
12Setup  Developer: As part of a code of ethics and protecting privacy you must also think about your business’s hardware and software. What about your own server security? Have you taken steps to secure your servers and the data they hold? Client: We aren’t sure. What can we do to ensure or customer data is safe? Can we have more info on this? Questions:  Client: Could you please discuss at least two (2) features of a secure server / operating system? Answer: Firewall The deployment of a firewall is a common approach for improving system security. Between an internal computer network and the Internet, a firewall is made up of software and hardware. The rules for the firewall to filter out undesirable incursions are set up by a computer network manager. Unauthorized access is significantly more difficult to get with these regulations in place. For example, a system administrator might determine that only users inside the firewall have access to certain files, or that those outside the firewall have restricted the ability to edit the files. You may also set up a firewall on your own computer, which is incorporated into the operating system on many computers. Encryption Encryption is one method for keeping files and data secure. This is frequently used when data is sent over the Internet, where it may be seen by others. Encryption is the practise of encrypting communications so that only authorised persons may access them. To render the communication unreadable, an encryption key is employed, and a secret decryption key is utilised to decipher the message. Encryption is commonly employed in systems such as e-commerce and Internet banking, where databases store highly sensitive data. If you’ve ever made an online transaction using a credit card, you’ve almost certainly utilised encryption. Client: what can we do to ensure any data we have collected is safe? Describe at one (1) way to do this. Answer: Having each employee have their own log in for the system is an excellent approach to safeguard the data acquired. If necessary, you might even limit access to particular folders and files to only a few employees.  
13Setup  Developer: Now that you have a new code of ethics and a privacy policy you must apply these in your day to day business. Client: Thank you for this. This is going to improve our work culture J Questions  Client: How often should I check to see if my staff are adhering to my policies? Give one (1) answer. Answer: Once every three months we should check to see if my staff are adhering to my policies Client: Describe at least one (1) ways we can check to see if they are being applied and understood? Answer: One to one meeting: A frequent check-in between two persons in an organization, usually a manager and an employee, is known as a one-to-one meeting. It’s utilized to provide feedback, keep each other informed, manage problems, and assist participants to advance in their professions. Client: Describe at least two (2) ways we can collect feedback from staff? Answer: Suggestion box for employees An old-fashioned employee suggestion box still has a place in an age of digital innovation. Employees may be hesitant to provide candid criticism through alternative channels for fear of reprisal. They can provide anonymous comments in a suggestion box without leaving a digital imprint. Place the box somewhere that is easy to find but not where people congregate. Employees might, for example, drop their criticism in a box at the front desk on their way home, but they could feel uneasy if the box was in a highly used break room. Employee engagement polls Employee engagement surveys, whether yearly, biennial, or quarterly, are an excellent method to collect huge quantities of employee input at once. These are frequently fairly extensive, concentrating on anything and everything that might be influencing employee happiness, engagement, and retention. Increase survey completion rates by talking with your staff about the purpose of the survey and ensuring that input is anonymous. Sharing the findings and acting on comments can help to guarantee that future polls are favourably received as well.  


Classroom Code of Ethics 2020

As a class member you must uphold the law, maintain good morals and undergo professional development. In addition to being a good citizen you adhere to the following: 

  1. Privacy and confidentiality
    1. <YOUR STATEMENT>
    2. Your Student ID is used for administration purposes and help provide security of your information.
    3. You should treat any information received pertaining to facts, details or data from a client as confidential. This is relevant to information that is not common knowledge or part of the public domain.
  2. Copyright procedures for all assessments
    1. <YOUR STATEMENT>
    2. If you have used images or fonts downloaded from the internet which are protected by copyright and not licensed, you must seek permission from the owner before you use it.
    3. Follow instructions on how to credit the owner or refer to their terms of use within their terms & conditions.
  3. Ethical behaviours as a designer/developer in class
    1. <YOUR STATEMENT>
    2. Create original work
    3. Follow the Laws and standards pertaining to Privacy, Copyright and Discrimination.
  4. WHS procedure and issues
    1. Be aware of and abide by WHS procedures
    2. <YOUR STATEMENT>
    3. Participate in WHS consultation as required and provide feedback
  5. Communication strategy and class behaviour
    1. Be courteous and polite in class
    2. <YOUR STATEMENT>
    3. Be aware of your communication methods outside of class, i.e. via Brightspace or email.
Universal Assignment (May 13, 2024) ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment. Retrieved from https://universalassignment.com/ictict418-2/.
"ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment." Universal Assignment - May 13, 2024, https://universalassignment.com/ictict418-2/
Universal Assignment June 26, 2022 ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment., viewed May 13, 2024,<https://universalassignment.com/ictict418-2/>
Universal Assignment - ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment. [Internet]. [Accessed May 13, 2024]. Available from: https://universalassignment.com/ictict418-2/
"ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment." Universal Assignment - Accessed May 13, 2024. https://universalassignment.com/ictict418-2/
"ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment." Universal Assignment [Online]. Available: https://universalassignment.com/ictict418-2/. [Accessed: May 13, 2024]
Order Now
No Fields Found.
Universal Assignment (May 13, 2024) ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment. Retrieved from https://universalassignment.com/ictict418-2/.
"ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment." Universal Assignment - May 13, 2024, https://universalassignment.com/ictict418-2/
Universal Assignment June 26, 2022 ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment., viewed May 13, 2024,<https://universalassignment.com/ictict418-2/>
Universal Assignment - ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment. [Internet]. [Accessed May 13, 2024]. Available from: https://universalassignment.com/ictict418-2/
"ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment." Universal Assignment - Accessed May 13, 2024. https://universalassignment.com/ictict418-2/
"ICTICT418 Contribute to copyright, ethics and privacy in an ICT environment." Universal Assignment [Online]. Available: https://universalassignment.com/ictict418-2/. [Accessed: May 13, 2024]

Please note along with our service, we will provide you with the following deliverables:

Please do not hesitate to put forward any queries regarding the service provision.

We look forward to having you on board with us.

Categories

Get 90%* Discount on Assignment Help

Most Frequent Questions & Answers

Universal Assignment Services is the best place to get help in your all kind of assignment help. We have 172+ experts available, who can help you to get HD+ grades. We also provide Free Plag report, Free Revisions,Best Price in the industry guaranteed.

We provide all kinds of assignmednt help, Report writing, Essay Writing, Dissertations, Thesis writing, Research Proposal, Research Report, Home work help, Question Answers help, Case studies, mathematical and Statistical tasks, Website development, Android application, Resume/CV writing, SOP(Statement of Purpose) Writing, Blog/Article, Poster making and so on.

We are available round the clock, 24X7, 365 days. You can appach us to our Whatsapp number +1 (613)778 8542 or email to info@universalassignment.com . We provide Free revision policy, if you need and revisions to be done on the task, we will do the same for you as soon as possible.

We provide services mainly to all major institutes and Universities in Australia, Canada, China, Malaysia, India, South Africa, New Zealand, Singapore, the United Arab Emirates, the United Kingdom, and the United States.

We provide lucrative discounts from 28% to 70% as per the wordcount, Technicality, Deadline and the number of your previous assignments done with us.

After your assignment request our team will check and update you the best suitable service for you alongwith the charges for the task. After confirmation and payment team will start the work and provide the task as per the deadline.

Yes, we will provide Plagirism free task and a free turnitin report along with the task without any extra cost.

No, if the main requirement is same, you don’t have to pay any additional amount. But it there is a additional requirement, then you have to pay the balance amount in order to get the revised solution.

The Fees are as minimum as $10 per page(1 page=250 words) and in case of a big task, we provide huge discounts.

We accept all the major Credit and Debit Cards for the payment. We do accept Paypal also.

Popular Assignments

AT1 PREPARATION REFLECTION TEMPLATE

Weighting: 5 marks (10%) of the assignment. COMPLETE & SUBMIT INDIVIDUALLY. This is the second of THREE documents required for submission for the assignment. Complete the following, describing and reflecting upon your involvement with the preparation for the Group Presentation, including your interaction with other members of your team in

Read More »

SUMMATIVE ASSIGNMENT – Mathematics for Science

IMPORTANT INFORMATION 1 Electric power is widely used in industrial, commercial and consumer applications. The latter include laboratory equipment for example water baths, spectrophotometers, and chromatographs. If you have 17.3 kA and 5.5 MV, what is the power? Give the appropriate unit.                                                                                                               (3 marks) 2 Oil immersion objective lenses

Read More »

Assignment CW 2. Foundations of Biology

The instructions in RED are the ones which are mark-bearing and need to be answered as part of the assignment. The instructions in BLACK tell you how to carry out the simulation Diffusion simulation: Results table Use Excel to calculate the mean and standard deviation. The functions are AVERGAGE and

Read More »

MA Education Dissertation Proposal

Student Name Click here to enter text. Student ID                       Proposed title of research project Click here to enter text.       State the background references on which your research is based (ideally 4 or 5) Click here to

Read More »

Assignment: Implement five dangerous software errors

Due: Monday, 6 May 2024, 3:00 PM The requirements for assessment 1: Too many developers are prioritising functionality and performance over security. Either that, or they just don’t come from a security background, so they don’t have security in mind when they are developing the application, therefore leaving the business

Read More »

LNDN08003 DATA ANALYTICS FINAL PROJECT

Business School                                                                 London campus Session 2023-24                                                                   Trimester 2 Module Code: LNDN08003 DATA ANALYTICS FINAL PROJECT Due Date: 12th APRIL 2024 Answer ALL questions. LNDN08003–Data Analytics Group Empirical Research Project Question 2-The project (2500 maximum word limit) The datasets for this assignment should be downloaded from the World Development Indicators (WDI)

Read More »

Imagine you are an IT professional and your manager asked you to give a presentation about various financial tools used to help with decisions for investing in IT and/or security

Part 1, scenario: Imagine you are an IT professional and your manager asked you to give a presentation about various financial tools used to help with decisions for investing in IT and/or security. The presentation will be given to entry-level IT and security employees to understand financial investing. To simulate

Read More »

DX5600 Digital Artefact and Research Report

COLLEGE OF ENGINEERING, DESIGN AND PHYSICAL SCIENCES BRUNEL DESIGN SCHOOL DIGITAL MEDIA MSC DIGITAL DESIGN AND BRANDING MSC DIGITAL DESIGN (3D ANIMTION) MSC DIGITAL DESIGN (MOTION GRAPHICS) MSC DIGITAL DESIGN (IMMERSIVE MIXED REALITY) DIGITAL ARTEFACT AND RESEARCH REPORT                                                                 Module Code: DX5600 Module Title: MSc Dissertation Module Leader: XXXXXXXXXXXXXXXXX Assessment Title:

Read More »

Bsc Public Health and Health Promotion (Top up) LSC LONDON

Health and Work Assignment Brief.                 Assessment brief: A case study of 4,000 words (weighted at 100%) Students will present a series of complementary pieces of written work that:   a) analyse the key workplace issues; b) evaluate current or proposed strategies for managing them from a public health/health promotion perspective

Read More »

6HW109 Environmental Management and Sustainable Health

ASSESSMENT BRIEF MODULE CODE: 6HW109 MODULE TITLE: Environmental Management and Sustainable Health MODULE LEADER: XXXXXXXXX ACADEMIC YEAR: 2022-23 1        Demonstrate a critical awareness of the concept of Environmental Management linked to Health 2        Critically analyse climate change and health public policies. 3        Demonstrate a critical awareness of the concept of

Read More »

PROFESSIONAL SECURE NETWORKS COCS71196

PROFESSIONAL SECURE NETWORKS– Case Study Assessment Information Module Title: PROFESSIONAL SECURE NETWORKS   Module Code: COCS71196 Submission Deadline: 10th May 2024 by 3:30pm Instructions to candidates This assignment is one of two parts of the formal assessment for COCS71196 and is therefore compulsory. The assignment is weighted at 50% of

Read More »

CYBERCRIME FORENSIC ANALYSIS – COCS71193

CYBERCRIME FORENSIC ANALYSIS – COCS71193 Assignment Specification Weighted at 100% of the module mark. Learning Outcomes being assessed by this portfolio. Submission Deadline: Monday 6th May 2024, 1600Hrs. Requirements & Marking Scheme General Guidelines: This is an individual assessment comprised of four parts and is weighted at 100% of the

Read More »

Social Media Campaigns (SMC) Spring 2024 – Winter 2024

Unit: Dynamic Websites Assignment title: Social Media Campaigns (SMC) Spring 2024 – Winter 2024 Students must not use templates that they have not designed or created in this module assessment. This includes website building applications, free HTML5 website templates, or any software that is available to them to help with

Read More »

ABCJ3103 NEWS WRITING AND REPORTING Assignment

ASSIGNMENT/ TUGASAN _________________________________________________________________________ ABCJ3103 NEWS WRITING AND REPORTING PENULISAN DAN PELAPORAN BERITA JANUARY 2024 SEMESTER SPECIFIC INSTRUCTION / ARAHAN KHUSUS Jawab dalam bahasa Melayu atau bahasa Inggeris. Jumlah patah perkataan: 2500 – 3000 patah perkataan tidak termasuk rujukan. Hantar tugasan SEKALI sahaja dalam PELBAGAIfail. Tugasan ini dihantar secara ONLINE. Tarikh

Read More »

ABCM2103 INFORMATION TECHNOLOGY, MEDIA AND SOCIETY Assignment

ASSIGNMENT/ TUGASAN _________________________________________________________________________ ABCM2103 INFORMATION TECHNOLOGY, MEDIA AND SOCIETY TEKNOLOGI MAKLUMAT, MEDIA DAN MASYARAKAT JANUARY 2021 SPECIFIC INSTRUCTION / ARAHAN KHUSUS Jawab dalam Bahasa Melayu atau Bahasa Inggeris. Jumlah patah perkataan : 2500 – 3000 patah perkataan tidak termasuk rujukan. Hantar tugasan SEKALI sahaja dalam SATU fail. Tugasan ini dihantar

Read More »

ABCR3203 COMMUNICATION LAW Assignment

ASSIGNMENT/ TUGASAN _________________________________________________________________________ ABCR3203 COMMUNICATION LAW UNDANG-UNDANG KOMUNIKASI JANUARY 2024 SEMESTER SPECIFIC INSTRUCTION / ARAHAN KHUSUS Jawab dalam Bahasa Melayu atau Bahasa Inggeris. Jumlah patah perkataan : 2500 – 3000 patah perkataan tidak termasuk rujukan. Hantar tugasan SEKALI sahaja dalam SATU fail. Tugasan ini dihantar secara ONLINE. Tarikh penghantaran        :

Read More »

ORGANISATIONAL STRATEGY PLANNING AND MANAGEMENT ASSIGNMENT

POSTGRADUATE DIPLOMA IN BUSINESS MANAGEMENT ORGANISATIONAL STRATEGY PLANNING AND MANAGEMENT ASSIGNMENT NOTE: At postgraduate level, you are expected to substantiate your answers with evidence from independent research. INTRODUCTION TO THE ASSIGNMENT • This assignment consists of FOUR compulsory questions. Please answer all of them. • When you answer, preferably use

Read More »

Solution: Scenario 1, Mirror therapy in patients post stroke

Title: Scenario 1, Mirror therapy in patients post stroke Part 1 : Summary Ramachandran and colleagues developed mirror therapy to treat amputees’ agony from phantom limbs. Patients were able to feel their amputated limb without experiencing any pain by presenting them a mirror image of their healthy arm. Since then,

Read More »

Solution: Exploring the Dominance of Silence

Slide 1: Title – Exploring the Dominance of Silence The title, “Exploring the Dominance of Silence,” sets the stage for a deep dive into the portrayal of silence in Philip K. Dick’s “Do Androids Dream of Electric Sheep?” Our presentation will dissect the literary techniques used by the author to

Read More »

Solution: Assessment: Critical Reflection S2 2023

The policies that hampered the cultural survival of Indigenous groups have a major effect on their health (Coffin, 2007). Cultural isolation can cause an identity crisis and a sense of loss, which can exacerbate mental health problems. Indigenous people have greater rates of chronic illness and impairment due to historical

Read More »

Solution: The Market – Product and Competition Analysis

Section 1: The Market – Product and Competition Analysis Industry and Competition Analysis: The baking mix market is very competitive, but My Better Batch is entering it anyhow. The prepackaged baking mixes sold in this market allow busy people to have bakery-quality products on the table quickly without sacrificing quality

Read More »

Solution: PDCA model for Riot

Student Name: Student ID: University Name: Date: Learning Outcome 1: Engage actively in recognizing a new product/service for Riot and detect the vital tasks required for its effective growth. In this comprehensive learning outcome, Riot’s progress towards innovation superiority is characterized by a deliberate scheme that draws on components from

Read More »

Solution: EDEN 100 – ASSIGNMENT 1

Part 1: Reflections on the Register Variables Use the questions in Column 1 and analyse the sample oral interactions provided under the assessment tile. The transcript for Viv’s conversation is provided on pages 4-5. Probe Questions  Link to readings and theory Interaction 1 Interaction 2 PART 1 – ANALYSING THE

Read More »

Solution: TCP/IP Questions

Table of Contents Question 1. 1 1. IPSec datagram protocol 1 2. Source and destination IP addresses in original IP datagram.. 1 3. Source and destination IP addresses in new IP header 2 4. Protocol number in the protocol field of the new IP header 2 5. Information and Bob.

Read More »

Can't Find Your Assignment?

Open chat
1
Free Assistance
Universal Assignment
Hello 👋
How can we help you?