Develop a detailed capstone project proposal and plan

Assignment Help Computer Network Security
Reference no: EM13908746

Question:

I need your help in making my assignment. it''s like a research project. so i have selected the topic

"CONTACTLESS BIOMETRICS". so in this assignment its the intoduction of the topic. so have to cover these three main areas. that is

1) RESEARCH ISSUES

2) APPLICATIONS

3) TECHNOLOGY

and the referncing should be done in APA style 6th edition with in-text citation. for further information on how to do the assignment or what things need to be covered in the topic.

Task

WHAT TO DO:

1. Follow the Study Schedule and work with the Topics (Modules) in Interact as they provide a "scaffold" for your learning in this subject.

2. Develop a detailed Capstone Project Proposal and Plan using project management software (as listed in the Study Schedule) and the skills you have acquired from IT Project Management to develop a project plan with a Work Breakdown Structure (WBS), milestones and Gantt chart. These tools may help.
1. MicrosoftProject Pro (https://office.microsoft.com/en-au/project/);
2. Open source tools like GanttProject (https://www.ganttproject.biz/);
3. OpenProj(https://sourceforge.net/projects/openproj/)
4. OpenProject (https://www.openproject.org/about).
5. ProjectLibre (https://www.projectlibre.org/)

3. Begin a 'project blog' for your chosen emerging technology topic.
1. The blog is a way to not only "think by writing" and make your notes but also store project files and links in a cloud-based service.
2. Consider sharing the site with your peers as a way to harness each others knowledge.
3. For Distance mode students, the Blog can be used for your Weekly Progress Reports (as an alternative to the Discussion Board) in Assessment Item 3.

4. CSU Thinkspace at https://thinkspace.csu.edu.au/ (use your CSU Login ID) is recommended or Wordpress, Google's Blogger (https://www.blogger.com/home) are common blogging systems, but you may have your own favourite site to use.
1. Choose and develop a limited blogger profile and enter a suitable TITLE for your blog (e.g. Joe's Wireless Technology Project) - not your full name
2. For WEB ADDRESS - use your student number as your account name (URL) or other unique identifier.
3. Make a first post - a short introduction about you and the project - remember to save, then Publish the blog entry. Check with a friend or family member to ensure that he/she can see your first posting.
4. This is also to check you have the right URL to include in this proposal and plan for your project.

5. The blog is ideally updated each week with 3 or 4 entries, at a minimum standard and will become a valuable tool for the Weekly Progress ReportsAND/OR for documenting your project notes and as the foundation for editing and writing the Capstone Project Report. An ideal blog entry will have around 50-150 words (150-600 words a week).

6. Describe how you intend to submit/present your Weekly Progress Reports to peers from Week 2:
1. In Class (only option for on-campus students)
2. Interact2 Discussion Board
3. My Project Blog (provide Website address)

7. Group Work OPTION for Assessment Items (Not recommended for Distance mode students): The Group Capstone Project Proposal and Plan is submitted by the team of three (3 maximum group size) for a group mark on a project proposal and plan that clearly indicates the Work Breakdown Structure (WBS), Role and Responsibilities of EACH member to carry an equal share of the load in the project work.

Rationale
The Capstone Topic Project Plan allows for a broad range of project areas like systems administration, database systems, IT security, mobile technology etc. Often the project has a sponsor and is linked to your interest or workplace needs. The proposal has a research component (Assessment Item 2 Literature Review) so in some cases you may need to find a supervisor willing to accept you as a candidate.
The Learning Outcomes being assessed in this item include how you interpret and evaluate an overview of recent trends in emerging technologies and innovation and begin to to plan, execute, record and present your research and project work as a capstone experience.

Your Capstone Project Proposal and Plan will be evaluated with a series of questions that you can use as a Checklist:

• Is the capstone topic area appropriate?

• Has the Project Blog been setup?

• Has there been sufficient justification of the choice of the topic?

• Is there enough scope for a sufficiently deep/complex analysis?

• Is the scope appropriate for what might be reasonably expected in the capstone project subject?

• Is the methodology proposed clear?

• Are the deliverables clearly set out?

• Are the deliverables sufficiently complex to justify a pass in this activity?

• Is it likely that the proposed activities can be reasonably carried out?

• Is it likely that the student will have access to the necessary resources to do a satisfactory job?

• Is the time line proposed realistic?

Reference no: EM13908746

Questions Cloud

Calculate value of operations : Mac Industries' free cash flow last year was $ 1million (i.e., FCFo = $1 million). You project the company's free cash flow to grow 20 percent this year (i.e., FCF1 = $1.2 million) and 15 percent next year. After two years its free cash flow is expec..
Calculate your monthly mortgage payment : TVM. Recently, you purchased a house with a market value of $500,000. The loan terms include a 20% down payment, an annual interest rate of 7% and a term of 30 years. Calculate your monthly mortgage payment, assuming that payments are made at the end..
Describe understanding of advance communications management : Describe your understanding of Advance Communications Management in an organizations or businesses or personal life in 1 page or less
Deficits could increase productivity and long-run growth : Based on your understanding, are there circumstances in which it might be possible that deficits could increase productivity and long-run growth
Develop a detailed capstone project proposal and plan : Develop a detailed Capstone Project Proposal and Plan using project management software (as listed in the Study Schedule) and the skills you have acquired from IT Project Management to develop a project plan with a Work Breakdown Structure (WBS), ..
Calculate the total amount of revenue : Calculate the total amount of revenue (gross profit) that will be lost if the engraver breaks and is down for 18 business days
Compute the net operating income for first year of operation : Using the given information, compute the net operating income (NOI) for the first year of operations. Include capital expenditures as an expense.
Compute the various measures of typicality : The ages (in years) of Academy Award (Oscar) winners for Best Actress and Best Actor are given. Compute the 1) various measures of typicality, 2) measures of spread
Structure plan in matlab : Tic-Tac-Toe (a.k.a. Noughts and crosses) is a game played by two players (‘X' and ‘O') on a 3x3 grid. In MATLAB, use a 3x3 cell array to hold the board information. Take it in turns to play the game, inserting ‘X's and ‘O's at various spots. Imple..

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd