Sie sind auf Seite 1von 4

RICHFIELD GRADUATE INSTITUTE OF TECHNOLOGY (PTY) LTD

FACULTY OF BUSINESS ADMINISTRATION MANAGEMENT & COMMERCIAL SCIENCE


QUALIFICATIONS
ASSIGNMENT COVER SHEET
Name & Surname: ______________________ ICAS No: _________________________
Qualification: __________________ Year: _______ Module Name: ____________________
Specialization: _________________________ Assignment Due Date: _______________
ID Number: __________________ Date submitted: __________ Semester: _______________
MARK EXAMINERS MODERATORS
ASSESSMENT CRITERIA REMARKS
ALLOCATION MARK MARKS
MARKS FOR CONTENT
QUESTION ONE
QUESTION TWO
QUESTION THREE
TOTAL 90
MARKS FOR TECHNICAL ASPECTS
1. TABLE OF CONTENTS 3
Accurate numbering according to the
numbering in text and page numbers
2. LAYOUT AND SPELLING 3
Font Calibri 12
Line Spacing -1.0
Margin should be Justified
3. REFERENCE 4
According to the Harvard Method
TOTAL MARKS 10
TOTAL MARKS FOR ASSIGNMENT 100
EXAMINERS COMMENTS

MODERATORS COMMENTS

Name of the Examiner: __________________ Name of the Moderator: __________________

Signature of Examiner: __________________ Signature of Moderator: __________________

Date: ___________________ Date: ____________________

NB: 1. Candidates are advised to read the guide lines in the study guide.

2. Each student is required to do an oral presentation of their assignments and marks to be


allocated as above rubric.

3. For reference use prescribed, recommended books and other resources you may come
across.

4. Correct Harvard referencing carries (5 Marks).


The purpose of an assignment is to ensure that the Student is able to:

Use methods of enquiry and research in a disciplined field.

Interpret and evaluate text.

Have a sound understanding of key principles and theories, rules and awareness.

Solve unfamiliar problems using correct procedures as well as investigate and critically analyse
information and report thereof.

Present and communicate information reliably and coherently.

Instructions and guidelines for writing assignments

1. Use the correct cover page provided by the institution.


2. All essay type assignments must include the following:
2.1. Table of contents
2.2. Introduction
2.3. Main body with subheadings
2.4. Recommendations and Conclusions
2.5. Bibliography
3. The length of the entire assignment must have minimum of 5 pages. Typed with font size 12
Calibri
4. The quality of work submitted is more important than the number of assigned pages.
5. Copying is a serious offence which attracts a severe penalty and must be avoided at all costs. If
any student transgresses the institution Plagiarism policy, that student will be subjected to the
penalty as per the institution Plagiarism policy.
6. While attempting the Assignments students are advised to comply with the plagiarism
guidelines provided to you before the commencement of the academic work for the semester.
Any deviation from the guidelines would attract undue penalty.
7. Harvard Referencing to be adhered to at all times while attempting the assignments.
8. The above provided Rubric is applicable only for theory modules and the Modules which are
quantitative in nature will have different Rubric which will provided separately along with the
respective assignment questions.
BUSINESS INFORMATION SYSTEMS 512
Question 1 (40)
Today, many people rely on computers to do homework, work, and create or store useful
information. Therefore, it's important for the information to be stored and kept properly. It's
also extremely important to protect computers from data loss, misuse and abuse. For
example, businesses need to keep their information secure and shielded from hackers. Home
users also need to ensure their credit card numbers are secure when participating in online
transactions. A computer security risk is any action that could cause loss of information to
software, data, processing incompatibilities or damage to computer hardware.
An intentional breach in computer security is known as a computer crime,
1. Discuss computer ethics including copyright law, software piracy, digital rights
management, the Digital Millennium Copyright Act, as well as plagiarism and ways to
identify plagiarism. (15)
2. Discuss cybercrimes including creation of malicious programs such as viruses, worms,
Trojan horses, and zombies as well as denial of service attacks, Internet scams, identity
theft, cyberbullying, rogue Wi-Fi hotspots, and data manipulation. (15)
3. Identify ways to safeguard computer against each of the following risk viruses, worms,
Trojan horses, botnets, denial of service attacks, back doors and spoofing (10)

Question 2
The topic for this assignment is on Internet of Things (IOT). (25)
Whats the buzz? The Internet of Things revolves around increased machine-to-machine
communication; its built on cloud computing and networks of data-gathering sensors; its
mobile, virtual, and instantaneous connection; and they say its going to make everything in
our lives from streetlights to seaports smart
You will write about the:
2.1 History (5)
2.2 Current applications (10)
2.3 Pick a Future (possible) utilization to focus on. (10)
Sections one and two are observations that you can verify. The third portion is possible
developments of the discipline. In the last section (Future) write about the positive
contributions and the possible negatives that could occur with the specific new IOT
technology that you choose to write on.
Question 3 (25)
You are supposed to create and save a database with tables, relationships, queries and
reports using MS Access 2007, according to the instructions given below.
3.1 You need to create a database for a public library to store book details. For this,
create a blank database and save it with your ICAS no and the Question number.:Eg:
ICASno_Q1 (2)
3.2 Create a table called Books with the following fields. (5)

Field Name Type Field Size Constraints


ID Number Primary Key
Title Text Field 50 Characters
Description Text Field 30 Characters
Category Number
No of copies Number

3.3 Create a form to enter details about books and save it as Books Form. (5)
3.4 Add following records to the Books table using the Books Form. ID Title
Description Category No of copies (5)

ID Title Description Category No of


Copies
1 word Hard cover 2 2
2 Computers Hard cover 4 2
3 Access Paperback 2 2
4 Art Hard cover 1 1
5 Science Paperback 3 1

3.5 Create Queries from books table above:


a. List all of the books that are described as hard covers, using title and category.
Sort the query in ascending order according category. (4)
b. List all the books that have 2 copies. Sort the query in descending order according
ID and category. (4)

Das könnte Ihnen auch gefallen