Demonstrate a good understanding of the application of DDDM technologies into organisations
SIT716 Computer Networks and Security
Evidence of Learning represents the journal or record of the work you have undertaken in completing a study of the content of the SIT716 unit.
SIT740 Research & Development in Information Technology
This task will investigate various forms of communication of findings from research and development in information technology discipline.
Effective Global Sourcing Strategy
It is like presenting in short brief to management on how start up with London base can be more effective by keeping global sourcing
Where we evaluate and compare the area’s ML models
Provide an overview of the problem and its relevance to your audience
Impact of Visual Communication and Multi-Media Campaigns
1. Title page: Start with giving a clear title to the report that explains your work. Mention your name and the date on which the report was created on this page.
2. Summary: This includes a brief paragraph about the objective of your business report, the data collection strategies you adopted, an overview of the report, and your findings.
3. Table of contents: Include a table of contents in your report to help the reader easily navigate through the content.
4. Introduction: The introduction should include information about your project, the purpose of the report, along with the context and background of the work
Infectious Disease
Points to be covered in the 1000 words:
1- Summarizing the challenges in modeling infectious diseases in crowd events in general
From the large number and diversity of data required and how It is difficult to obtain data.
2- The difficulty of validation of the results of the different proposed models to predict infectious disease
Survey on Security issues in Metaverse
1. Introduction to Metaverse.
2. Metaverse application.
3. Security threats in Metaverse.
4. Possible solutions for securing Metaverse world.
Database Systems
Understand the sources of data in society, how to collect such data, the problems that might occur in collecting and storing such data and the basic statistics that are routinely performed on it.Model databases using techniques such as normalisation, entity relationship diagrams and a document-based approach.
Cyber Concepts and Techniques
The material you submit must be your own work. The penalties for plagiarism are severe. The minimum penalty is
usually zero for that piece of work. Further information is available at Portal > Support Departments > Academic Quality
Support Services > Academic Integrit