Sie sind auf Seite 1von 13

Off Campus & Assignment Handling

Services ASSIGNMENT
Division of Information Services COVER SHEET
Nathan Campus
Please complete sections GRIFFITH
below UNIVERSITY QLD 4111

Course Code: 1008ICT

Course Name: Business Informatics


Due Date: Friday 21st of October
Assessment #: 1
Enrolment: _____________________
Campus (Enrolled): Nathan

Course Tutor: Md. Masbaul Alam Polash

Course Convenor: Dr Mohammad Awrangjeb


Please provide your STUDENT DETAILS here:

Student Number: S2947290

Student Name: Nakisha Holdsworth

ACADEMIC INTEGRITY DECLARATION

Breaches of academic integrity (cheating, plagiarism, falsification of data, collusion) seriously compromise student learning, as well
as the Universitys assessment of the effectiveness of that learning and the academic quality of the Universitys awards. All
breaches of academic integrity are taken seriously and could result in penalties including failure in the course and exclusion from
the University.

Students should be aware that the University uses text-matching software to safeguard the quality of student learning and that your
assignment will be checked using this software.

I acknowledge and agree that the examiner of this assessment item may, for the purpose of marking this assessment item:
reproduce this assessment item and provide a copy to another Griffith staff member; and/
submit this assessment item to a text-matching service. This web-based service will retain a copy of this assessment item for
checking the work of other students, but will not reproduce it in any form.

Examiners will only award marks for work within this assignment
STUDENTthat is your
CONSENT

own original work. I, hereby certify that :


(to be completed by the student before their essay, assignment or other work is uploaded to an internal/online learning University
except where I have
website or indicated, thispurpose
used for the assignment is my own(not
of moderation work,
to based onif my
be used personal
there is to bestudy and/or
public research.
access to the work)
I have acknowledged all materials and sources used in the preparation of this assignment whether they be books, articles,
Atreports,
Griffithlecture
the usenotes, or any other
of assessment kind of document
exemplars by academic or personal communication.
staff is encouraged to inform students understanding of the performance
standards associated with learning and achievement in the
I have not colluded with another student or person in the production course. An assessment exemplar
of this assessment is an
item authentic
in such a wayexample, actual the
as to undermine
sample
purpose orof
excerpt, of studenttask.
this assessment work that has been annotated to illustrate the ways in which it demonstrates learning, achievement
and quality in relation to the intended learning outcomes (including graduate outcomes) for the course. Assessment exemplars
this
may be assignment
made available has in
not
a been
rangesubmitted
of ways. Infororder
assessment
to collectinassessment
any other course or at any
exemplars otherare
students time in thetosame
asked course
consent, without the
on every
permission of
assessment thesubmitted,
item relevant Course
for theirConvenor.
work, without disclosure of the contributors identity, to be used, and reproduced as an
assessment
I have notexemplar
copied infor standard
part setting
or in whole or and moderation
otherwise activities.
plagiarised the work of other students and/or other persons. I havent made this
piece of work available to another student without the permission of the Course Convenor. Providing this declaration falsely is
I considered
acknowledge a breach
that forof academic
the purpose integrity.
of standard setting and moderation activities the examiner of this assessment item may wish
to store, reproduce, annotate, and communicate my work to others, including future students, without disclosure of my identity.
I have retained a copy of this assessment item for my own records.

I consent to my
Acknowledged by:Work, without disclosure of my personal details, being stored, reproduced
_________________________ Date:annotated and communicated
________________
within the Universitys secure online learning environment.
I dothe
Where notitem
consent to my Work,
is submitted being stored,
electronically Clickingreproduced annotated
I Agree constitutes anand communicated
electronic within
signature for the Universitys
the purpose securedeclaration
of assignment online
learning environment.
compliance.

Acknowledged by: _________________________ Date: ________________

Where the item is submitted electronically Clicking I Agree constitutes an electronic signature for the purpose of assignment declaration compliance.
Extension Requests:
Assessment Item Number: Due Date:

Extension Granted: Amended Due Date:

Extension Approved by: Approval Date:

Examiners Use Only:


Tick Where Appropriate:
Name:
Submitted late without extension returned to student to seek
Mark Given: extension /special assessment.

Suspected plagiarism: referred to the Course Convenor.
Second Examiner:
Returned to student to be resubmitted by: ________ for the

Mark Given: following reasons:

Examiners Comments:

Griffith University collects, stores and uses personal information for administrative purposes only. The information collected is confidential and will not
be disclosed to third parties without your consent, except to meet government, legal or other regulatory requirements. For further information consult
the Universitys Privacy Plan at www.griffith.edu.au/ua/aa/vc/pp/
Question 1: Entity Relationship Diagram (ERD)
Case Study: Griffith University Department
Figure 1: Entity Relationship Diagram of Griffith University Department

Question 2: Data Flow Diagram (DFD)


Case Study: Griffith University Faculty Staff Promotion

Figure 3: Data Flow Diagram of Griffith University Faculty Staff Promotion


Question 3: MS Excel
Case Study: Griffith University Student Grade 2016
Part A:

Figure 3: MS Excel Sheet 1

Part B:

Figure 4: MS Excel Sheet 2


Part C:
Figure 5: MS Excel Student Credit Points in 2016 graph

Part D:

Figure 6: MS Excel Average course grade in 2016 Graph

Part E: The problem is that the spreadsheet is a type of traditional file system.
When the filter is changed, there is a variable mismatch with the referenced data
causing a data inconsistency/anomaly problem. This causes the formula to output
incorrect data as it is referencing the previously correct cell that now has a different
students data contained.

Question 4: MS Access
Case Study: Griffith University Student Grade 2016

Part A:

Figure 7: MS Access Relational diagram

Part B:

Figure 8: MS Access Student Table

Figure 9: MS Access Course Table


Figure 10: MS Access Enrolment Table

Part C:

Figure 11: MS Access Query of average grade of each student in 2016


Part D:

Figure 12: MS Access Report showing all students average course grade in 2016

Part E: The problem seen in Q.3E doesnt exist in Access; this is because Access is
designed to deal with data variables differently due to not requiring the need to
reference a cell for data to be input into a formula.
Question 5: The Porters Competitive Force Model
Case Study: Private Health Insurance Cover

Bargaining power of customers: High

This threat is high as customers have a lot of knowledge about market


options, will look into the service more and due to competitors be critical
of the price.

As there are many services that offer a similar product in the market, there
is no loyalty and there is a legitimate risk that if you raise your price the
consumer will just go somewhere else.

Threat of substitutions: High

This is because of the already vast amount of potential substitute


companies in the market who have varied price and quality differences
making it difficult to know what they will do.

The fact that all products are advertised as part of the business model
means that other vendors may model their pricing specifically to undercut
what the company has offered this makes the threat of substitutes very
high.

Bargaining power of suppliers: Low

The suppliers bargaining power is low due to a large amount of suppliers


offering cloud hosted services, computer hardware and software for the
company. The vast amount of suppliers and options available mean that
the business is in a better position as they have the ability to choose the
right product and switch as required.

As suppliers have little power to influence the global market they cannot
increase the competition within the industry by threatening to raise prices
or reducing the quality of their services as they themselves have to
compete against other suppliers meaning that the company will always be
in a good position in regards to their IT suppliers.
Threat of new entrants: Low

While it is noted that it may be easy to enter the market, there are serious
barriers effecting new entrants as there needs to be a significant amount
of capital invested into the company to build infrastructure prior to having
customers. The need to build a brand for the company is vital in this
market due to key, well-known competitors and again, capital will be
required upfront for advertising and establishing this brand.

The initial product will need to be low priced or unique in order to win over
new customers and this will place a risk on return of the capital
expenditure required for set up. While it may be possible to enter the
market easily, it is not as easy to profit against well-recognised and
established brands in a niche market. New entrants are deemed as a low
threat because of the reasons listed above which makes the threat of new
entrants high.

Rivalry: High

As there are numerous established competitors selling similar products to


the company in an information rich and easy to access environment, the
consumer can be picky when it comes to choosing who they go with.

While in the early stages of introducing the company product, competitors


may intentionally try and make counter deals in order to force the
company to not succeed in the market. This means that the company has
to have a lot of capital or a competitive edge to be able to survive in the
current market. This in turn indicates that rivalry is very high.
Question 6: Social Computing Technologies
Case Study: A New Online University

Part A & B:
I recommend that Griffith University should use the following technologies as a
medium for online integration in their university courses;

Google plus; so that all students can access the universities programs from
their laptop making it easier for them to get things get especially if they dont
have the program.

Discussions boards; that can also host content services for tutoring where
students and teachers can propose such things as questions, answers or
study tips for certain course. This can be in the form of a post, voice recording
or uploading a video.

Online quizzes; that test the knowledge that the students are learning so that
they can practice and see what is expected of them and how the assessment
will be worded.

Video links for learning; that the lecturer or tutor can upload that are from
them or from the Internet so the student can see and learn it from a different
perspective.

Mobile phone application; so the student can have access to all their
information on their phone as well as reminders from the app when things are
coming up as well as when and they have classes.

Live virtual blackboard classes; classes where the lecturer or tutor is able to
give a live stream and input information on to a virtually projected screen,
having this live can assist with class learning and in-depth written
explanations.
Part C:
Guidelines to use technologies:

The majority of technologies should be attached to the learning@griffith website. The


students are to use all technologies as per the acceptable use policies in place and
with a professional manor as other students and members of the university will have
access.

Some restrictions and guidelines should be updated, created and maintained by all
associated with the university. A few of the things recommended to implement are:

Have staff monitor social media sites and student forums to ensure quality
and accuracy of content (e.g. moderators and a dirty word search where
possible) (Australian Competition & Consumer Commission, n.d.).

Have policies for employees (code of conduct) to follow in regards to their


usage (Vast, S, 2014).

Make sure everything published by the university is referenced properly to


avoid the breaching of copyrights, trademark or another persons / companys
rights and regulations (Brown, J, W & Ward, S, J, 2014).

Make sure there are security products and procedures in place to stop
suspicious activity, denial of service to the website and detect malicious
threats.

Content filtering should be applied to limit sites to only professional websites


and remove access to anything that will breach the code of conduct; in
addition to this there should be individual user accounts so that monitoring of
all actions can be accounted for, as well as limiting downloads per user if
required (Stevens, R, 2013).

Include online interaction and input on class forums as part of the overall
mark for each class to encourage higher student input.
Reference List

Australian Competition & Consumer Commission, n.d., Social Media, Australian


Government, viewed 18 October 2016,
<https://www.accc.gov.au/business/advertising-promoting-your-business/social-
media#minimise-your-nbsp-risk>

Brown, J, W & Ward, S, J, 2014, Eight tips for reducing social media legal risks,
HISCOX, viewed 18 October 2016, <http://www.hiscoxbroker.com/shared-
documents/media-liability/13182_US_social_media_whitepaper.pdf>

Stevens, R, 2013, content filtering and the University, University of Oxford,


Viewed 18 October 2016, <https://blogs.it.ox.ac.uk/oxcert/2013/07/18/content-
filtering-and-the-university/>

Vast, S, 2014, How to minimise the risks when using social media for business,
Australian Government, Viewed 18 October 2016,
<http://digitalbusiness.gov.au/2014/09/30/how-to-minimise-the-risks-when-using-
social-media-for-business/>

Das könnte Ihnen auch gefallen