How you have acquired the knowledge

Assignment Help Computer Networking
Reference no: EM131119876

You must have Computer Networking experience

I need to complete an ACS (Australian Computer Society) RPL (Recognition of Prior Learning) assessment for the ANZSCO code of 263111 Computer network and systems engineer.

I want someone to complete the RPL assessment document for me.

In this document there are two sections that all applicants must complete -

• The Key Areas of Knowledge - Section 1
• The Project Report Forms - Section 2

RPL applications are for those applicants who do not hold a recognised tertiary ICT qualification and who have a minimum of 6 years of closely related experience. Please refer to the Summary of Criteria for further information.

This document provides the opportunity for applicants to demonstrate knowledge learnt throughout their professional experience.

SECTION 1 - KEY AREAS OF KNOWLEDGE

INFORMATION ABOUT THE AREAS OF KNOWLEDGE

Please read the following document to assist you in completing Section 1 of this document -The ACS Core Body of Knowledge for ICT Professionals (CBOK).

Applicants must detail the relationship between the selected Areas of Knowledge and their learning from their experience and qualifications. This section of the RPL application needs to be specific as to how and where the applicant has acquired the knowledge.

The ICT Key Areas of Knowledge:

Essential Core ICT Knowledge

Topic 1. ICT Professional Knowledge

Sub Topics are -

a. Ethics
b. Professional Expectations
c. Teamwork Concepts and Issues
d. Communication
e. Societal Issues

Topic 2. ICT Problem Solving

Sub Topics are -

a. Modelling Methods
b. Processes to understand problems
c. Methods and tools for handling abstraction

General ICT Knowledge

Topic 3. Technology Resources

Sub Topics are -

a. Hardware and Software Fundamentals
b. Data and Information Management
c. Data Communications and Networking

Topic 4. Technology Building

Sub Topics are -

a. Human Factors
b. Programming
c. Information Systems Development and Acquisition

Topic 5. ICT Management

Sub Topics are -

a. IT Governance and Organisational Issues
b. IT Project Management
c. ICT Service Management
d. Security Management

You are required to select one topic from the Essential Core ICT Knowledge (Topic 1 or Topic 2) and one topic from the General ICT Knowledge (Topic 3, Topic 4 or Topic 5). Please ensure you address at least 2 subtopics from each of the topics chosen. In the following expandable typing areas, explain how you have acquired your in-depth knowledge in these topic areas through your professional experience.

Important:

• Identify the Area of Knowledge topic that you have chosen to explainby entering the name of the Area of Knowledge topic in the box.

• Explain, in the expandable typing area, how you have acquired the knowledge and illustrate the depth of thatknowledge.

• You should NOT address all sub topics included in the Area of Knowledge in your explanation. Address at leastTWO of the sub topics. Enter the sub topic name(s) in the box.

• Be clear and concise in your explanation.

• Limit each explanation to no more than one to one and a half pages.

Essential Core ICT Area of Knowledge:[Enter topic and 2 subtopic names relating to the chosen area]

How have you acquired this knowledge in your working environment? Illustrate your depth of knowledge.

[EXPANDABLE TYPING AREA]

General ICT Area of Knowledge:[Enter topic and 2 subtopic names relating to the chosen area]

How have you acquired this knowledge in your working environment? Illustrate your depth of knowledge.

[EXPANDABLE TYPING AREA]

SECTION 2 - RPL PROJECT REPORTS

A project report is a coherent written description of a project or engagement that provides you with the opportunity to show how you perform as an ICT Professional. Each report is to relate to a significant project or work episode undertaken by you during your professional career.

The purpose of these reports is to enable you to demonstrate your command and implementation of the Areas of Knowledge described in Section 1 of this application.

Please note: You are required to provide two project reports.

Of the two reports, one must pertain to a project undertaken within the last three years, and the other for a project within the last five years.

Projects over two years long may be used for both reports under either of the following conditions:

• The project has clearly-defined work efforts which took place in parallel, each with their own solution development and design activities and their own deliverables.

• The project had clearly-defined phases that were executed in succession, each with its own solution development and design activities and deliverables. Note that a second project phase that constructs and implements the solution developed by the first phase does not meet this requirement.

Depending on the nature of your role in each project, the Project Report should cover an appropriate selection of factors. Appropriate factors will be determined based on the type of ICT project selected. Possible factors include:

• System Analysis and Design and Software Engineering methodologies used;

• Contribution to the processes involved in the design and implementation of enterprise-wide computing systems;

• Programming languages, design paradigms and implementation procedures adopted;

• Database and/or file design and management techniques employed;

• Network topologies, including size, distribution and security facilities installed;

• Project Management and quality assurance techniques followed;

• Internet application design, including database interactivity and security measures implemented;

• ICT managerial activities, demonstrating the nature and extent of responsibilities

Project Summary:

Project Name Start Date End Date
Project 1 mm/yy Mm/yy
Project 2 mm/yy Mm/yy

Instructions

The following pages provide a template for your reports.

When writing your reports please provide your own thoughts - do not just copy project documentation.

Please use the first person in your discussion, so it is clear to the assessor what you did versus what others did - say "I did X" rather than "X was done".

Diagrams from the project documentation may be helpful, but the text should be in your own words. Please ensure that diagrams are relevant, readable, and help the assessor to understand what you did as a member of the project team.

If sections of the Project Report template (see below) are not relevant to your participation in the project, then leave the section blank.

Focus on quality rather than quantity.Each Project Report should be no more than four or five pages in length.

SPECIAL NOTE:

By submitting this RPL Knowledge and Project Report form as a component of your ACS skills assessment application, you agree with the following statement:

The applicant confirms that the explanation of their knowledge and project reports submitted in this application truthfully and accurately describe the applicant and the applicant's personal involvement in the projects. The applicant is aware that plagiarism by the applicant will automatically invalidate this application, will jeopardise any future applicationsfrom the applicant and will be reported by the Australian Computer Society to the Australian Department of Immigration and Border Protection.

Attachment:- ACS-Project-Report-Form-2014.rar

Reference no: EM131119876

Questions Cloud

Foundation for personal integrity : What is your understanding of a moral compass as a foundation for personal integrity and social conscience?  From which Wisdom Tradition(s) do you draw in constructing your moral compass?  What do you value and question about this Wisdom Tradition?
Calculate the selling corporation tax bill : Assuming a corporate income tax rate of 40 percent on all taxable income, calculate the Selling Corporation's tax bill.
What amount needs to be saved at the end of each year : What amount needs to be saved at the end of each year in order for Bob and Carol to reach their financial goals?
Describe the chain of command : Describe the chain of command and the method of public health response that was conducted in this situation. Determine the important public health issues related to medical care in this situation.
How you have acquired the knowledge : Identify the Area of Knowledge topic that you have chosen to explainby entering the name of the Area of Knowledge topic in the box. Explain, in the expandable typing area, how you have acquired the knowledge and illustrate the depth of thatknowledge..
Xplain how internal and external factors affect : Write a 1,050- to 1,400-word paper in which you explain how internal and external factors affect the four functions of management. In your paper, explain how the following internal and external factors affect the four functions of management. Inc..
Question regarding the domestic violence policies : Explain how domestic violence policies evolved in local police departments across the United States. What is the trend in policing today? Discuss the research findings on the impact of mandatory arrest for misdemeanor domestic violence.
Calculate the idaho steel corporation’s tax bill : Last year, Idaho Steel Corporation had taxable ordinary income of $2 million and capital gains income of $500,000. The company also had $50,000 in dividend income and paid its stockholders $150,000 in dividends. Calculate the Idaho Steel Corporation’..

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd