Develop a detailed capstone project proposal and plan

Assignment Help Computer Network Security
Reference no: EM13908746

Question:

I need your help in making my assignment. it''s like a research project. so i have selected the topic

"CONTACTLESS BIOMETRICS". so in this assignment its the intoduction of the topic. so have to cover these three main areas. that is

1) RESEARCH ISSUES

2) APPLICATIONS

3) TECHNOLOGY

and the referncing should be done in APA style 6th edition with in-text citation. for further information on how to do the assignment or what things need to be covered in the topic.

Task

WHAT TO DO:

1. Follow the Study Schedule and work with the Topics (Modules) in Interact as they provide a "scaffold" for your learning in this subject.

2. Develop a detailed Capstone Project Proposal and Plan using project management software (as listed in the Study Schedule) and the skills you have acquired from IT Project Management to develop a project plan with a Work Breakdown Structure (WBS), milestones and Gantt chart. These tools may help.
1. MicrosoftProject Pro (https://office.microsoft.com/en-au/project/);
2. Open source tools like GanttProject (https://www.ganttproject.biz/);
3. OpenProj(https://sourceforge.net/projects/openproj/)
4. OpenProject (https://www.openproject.org/about).
5. ProjectLibre (https://www.projectlibre.org/)

3. Begin a 'project blog' for your chosen emerging technology topic.
1. The blog is a way to not only "think by writing" and make your notes but also store project files and links in a cloud-based service.
2. Consider sharing the site with your peers as a way to harness each others knowledge.
3. For Distance mode students, the Blog can be used for your Weekly Progress Reports (as an alternative to the Discussion Board) in Assessment Item 3.

4. CSU Thinkspace at https://thinkspace.csu.edu.au/ (use your CSU Login ID) is recommended or Wordpress, Google's Blogger (https://www.blogger.com/home) are common blogging systems, but you may have your own favourite site to use.
1. Choose and develop a limited blogger profile and enter a suitable TITLE for your blog (e.g. Joe's Wireless Technology Project) - not your full name
2. For WEB ADDRESS - use your student number as your account name (URL) or other unique identifier.
3. Make a first post - a short introduction about you and the project - remember to save, then Publish the blog entry. Check with a friend or family member to ensure that he/she can see your first posting.
4. This is also to check you have the right URL to include in this proposal and plan for your project.

5. The blog is ideally updated each week with 3 or 4 entries, at a minimum standard and will become a valuable tool for the Weekly Progress ReportsAND/OR for documenting your project notes and as the foundation for editing and writing the Capstone Project Report. An ideal blog entry will have around 50-150 words (150-600 words a week).

6. Describe how you intend to submit/present your Weekly Progress Reports to peers from Week 2:
1. In Class (only option for on-campus students)
2. Interact2 Discussion Board
3. My Project Blog (provide Website address)

7. Group Work OPTION for Assessment Items (Not recommended for Distance mode students): The Group Capstone Project Proposal and Plan is submitted by the team of three (3 maximum group size) for a group mark on a project proposal and plan that clearly indicates the Work Breakdown Structure (WBS), Role and Responsibilities of EACH member to carry an equal share of the load in the project work.

Rationale
The Capstone Topic Project Plan allows for a broad range of project areas like systems administration, database systems, IT security, mobile technology etc. Often the project has a sponsor and is linked to your interest or workplace needs. The proposal has a research component (Assessment Item 2 Literature Review) so in some cases you may need to find a supervisor willing to accept you as a candidate.
The Learning Outcomes being assessed in this item include how you interpret and evaluate an overview of recent trends in emerging technologies and innovation and begin to to plan, execute, record and present your research and project work as a capstone experience.

Your Capstone Project Proposal and Plan will be evaluated with a series of questions that you can use as a Checklist:

• Is the capstone topic area appropriate?

• Has the Project Blog been setup?

• Has there been sufficient justification of the choice of the topic?

• Is there enough scope for a sufficiently deep/complex analysis?

• Is the scope appropriate for what might be reasonably expected in the capstone project subject?

• Is the methodology proposed clear?

• Are the deliverables clearly set out?

• Are the deliverables sufficiently complex to justify a pass in this activity?

• Is it likely that the proposed activities can be reasonably carried out?

• Is it likely that the student will have access to the necessary resources to do a satisfactory job?

• Is the time line proposed realistic?

Reference no: EM13908746

Questions Cloud

Calculate value of operations : Mac Industries' free cash flow last year was $ 1million (i.e., FCFo = $1 million). You project the company's free cash flow to grow 20 percent this year (i.e., FCF1 = $1.2 million) and 15 percent next year. After two years its free cash flow is expec..
Calculate your monthly mortgage payment : TVM. Recently, you purchased a house with a market value of $500,000. The loan terms include a 20% down payment, an annual interest rate of 7% and a term of 30 years. Calculate your monthly mortgage payment, assuming that payments are made at the end..
Describe understanding of advance communications management : Describe your understanding of Advance Communications Management in an organizations or businesses or personal life in 1 page or less
Deficits could increase productivity and long-run growth : Based on your understanding, are there circumstances in which it might be possible that deficits could increase productivity and long-run growth
Develop a detailed capstone project proposal and plan : Develop a detailed Capstone Project Proposal and Plan using project management software (as listed in the Study Schedule) and the skills you have acquired from IT Project Management to develop a project plan with a Work Breakdown Structure (WBS), ..
Calculate the total amount of revenue : Calculate the total amount of revenue (gross profit) that will be lost if the engraver breaks and is down for 18 business days
Compute the net operating income for first year of operation : Using the given information, compute the net operating income (NOI) for the first year of operations. Include capital expenditures as an expense.
Compute the various measures of typicality : The ages (in years) of Academy Award (Oscar) winners for Best Actress and Best Actor are given. Compute the 1) various measures of typicality, 2) measures of spread
Structure plan in matlab : Tic-Tac-Toe (a.k.a. Noughts and crosses) is a game played by two players (‘X' and ‘O') on a 3x3 grid. In MATLAB, use a 3x3 cell array to hold the board information. Take it in turns to play the game, inserting ‘X's and ‘O's at various spots. Imple..

Reviews

Write a Review

Computer Network Security Questions & Answers

  How is biometric method more beneficial than keypad

Those links are just for downloading required files. There is no work needed from any links. How is this biometric method more beneficial than keypad where the employee just presses in Pin number?

  Famous financial corporation

Your submission should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insight relating directly to the topic. Your response should reflect scholarly writing and APA stan..

  What might be your three most important concerns

Many hackers claim to believe that "access to computers should be unlimited and total" and that "all information should be free." Do you agree with these statements? Why or why not?

  Evaluate computer forensic analysis procedures and

computer crime and forensic analysisprovide two examples to distinguish the difference between what is considered a

  Case study on byod

Identify the primary benefits of BYOD in organizations, and determine the key ways in which its concepts can enhance an end user's overall working experience.

  Define the repository usernames and passwords

Install the distributed revision control system subversion from the Debian package of the same name. After installation you will need to configure subversion to be usable.

  Paper on physical secuirty

You will write a paper on what area you chose and why. You will explain what in this area you want to expand also why this important to the company.

  Des operating on a general plaintext input

DES operating on a general plaintext input 1st with key K1 and then with key K2 manufactures the same output as if K2 were first used and then K1.

  Dealing with computer security

Computer Security is very important for organizations and if not impliedproperly it may have a very big impact on its overall working system.

  Personal information security through public wi-fi

Write paper on Personal information security through public Wi-Fi

  The outline is security threats & vulnerabilities

the outline is Security Threats & Vulnerabilities, You must provide a 1-page outline of your paper by the end of Week 3. Your outline must include citations to three references and a brief summary of at least three references that you will use in..

  Secure communication if organization uses symmetric cipher

An organization has 300 members. It is desired that each member of the organization be able to communicate securely with any other member. The organization uses a symmetric cipher.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd