Professional development during the professional exposure

Assignment Help Computer Networking
Reference no: EM132319211

Report should include the following components:

A minimum of 1000 words report outlining your professional development during the professional exposure.

Report should include the following six parts.

1) The first part is a Title page, your name, school and student number.

2) The Second part is technical skills developed during Professional Exposure.

3) The third part is a summary of professional skills developed during Professional industry Exposure.

4) The fourth part is references in IEEE Transactions in Networking referencing style.

5) The fifth part is the signed 'completion of professional exposure/exposure certificate' and/or evidences of attendance of professional events.

Details of Report

The report should be 1000 words long, plus figures, tables and references and any appendices originating from the actual report in industry. Note the appendices mentioned here are different from the weekly diary of activities. The report should have the following sections:

1. Title page, your name, school and student number

2. Technical Skills Developed During Professional Industry Exposure. Write technical reflective journal incorporating the following points:

2.1 Did you have prior knowledge to understand the professional industry expectation? Map all units that was useful during your professional industry exposure and how well did you apply your prior knowledge and skills. Where can you use that exposure in future?

2.2 What are the new technical skills or knowledge you gained from industry exposure?

3. Professional Skills Developed During Professional Exposure. Map your outcome to ACS CBOK knowledge key words

3.1 Identify the specific skills that your specific practical exposure best matches to and state why that is so.

i) Include a relevant example from your practical industry exposure to demonstrate howyou developed the skills identified.

ii) Justify by filling in the "Graduate Outcomes Table" (Appendix A). The justification should reflect the stage you are in your development of the professional skills.

3.2 As you look into the future as a networking graduate, use your professional industry exposure to address the following questions:

i) Based on your professional exposure what changes would you recommend in the way and manner you approach your study? Explain.

ii) What changes would you recommend to those who structure your degree program to to ensure you become a successful networking professional in future?

3.3 Your plans for your future as a networking graduate.

i) What types of work environments attracts you the most?

ii) Are there specific networking challenges that you are more interested in for the future? Explain.

iii) Have your ideas about your future career direction emerged during the practical industry exposure? Explain.

iv) Which specific aspects of your professional industry exposure did you enjoy the most? Which aspects did you not like the most? How will these influence how you think about your future as a network professional?

4. References

You should reference all the materials you have used in preparing this report. Ensure that your report follows the IEEE Transactions in Networking referencing format.

5. Professional Exposure Certificate / evidences of attendance / participation Exposure details.

For each period of work exposure (there should only be one) list of:

5.1. Name of employer

5.2. Type of business

5.3. Your job title

5.4. Dates of the exposure

5.5. Full details of your professional supervisor (name, position, email, phone number)

Attachment:- Industry exposure.rar

Verified Expert

This research paper focuses on my learning from the professional industry exposure, It reveals various learning aspects and developed for the interest for the networking in the industry exposure attended. this professional industry exposure reveals the key aspects of the data mining process and data analysis method was elaborated for the technical decisions making.

Reference no: EM132319211

Questions Cloud

Why and how are they used in business today : What are algorithms? Why and how are they used in business today? Do you foresee the use of algorithms growing, declining or remaining the same?
Prepare time and cost estimates for projects : How do project managers prepare time and cost estimates for their projects, especially when they are not familiar with the project scope?
Difference between economic value and social value : Discuss the difference between economic value and social value. Why do you think organizations tend to focus on the creation of one type of value, but not both?
Describe the four phases of an audit : Describe the four phases of an audit and discuss the key factors that would help you determine how to plan the audit for this company.
Professional development during the professional exposure : What types of work environments attracts you the most - Are there specific networking challenges that you are more interested in for the future? Explain
How to present a bank reconciliation for the company : How to present a bank reconciliation for the company as of 11/30/17 and to record any necessary journal entries for the West company?
What is the labor efficiency quantity variance : What is the labor efficiency quantity variance? A negative number indicates an favorable variance and a positive number indicates an unfavorable variance.
Perform an analysis of HVCs investment problem : Managerial Report - Perform an analysis of HVC's investment problem and prepare a report that presents your findings and recommendations
Calculate the discount amount for this order : In cell F27, use an IF function to calculate the discount amount for this order based on the customer's status (which is found in F16).

Reviews

inf2319211

7/29/2019 4:04:23 AM

Look at the page 13, 14, 16,17. Thanks And don’t worry about the period of work exposure etc. list of name of employers etc. that part I will do. Thanks Which part you are talking about. Can you please send me assignment? I will check Please find the attached image and please add this table not the first one. Please do it ASAP. Only one hour is left for submission. Thanks 336 028_1A320 042-572C-400 8-A0D -A72 FF4A78A0A.png Add whole table like this Just add justification. Please do it asap. Thanks Please add Justification like this how we gained the particular skill from professional exposure. Please find the attached image. Don’t write same . Thanks 3367 707 71155 75-8A- 4493-A 234-D2C5AA108106.jpeg Please do it ASAP thanks

inf2319211

7/29/2019 4:04:10 AM

Please find the attached link. httor g.au/co ntent/d am/acs/ acs -skills/ The- ACS-Core- Body-of-Kn owledge-f or-ICT-Profes sionals- CBOK.pdf Regards

inf2319211

7/29/2019 4:03:26 AM

You can assume what technical and professional skills you have learned. Please look details what points they have said to add, all points should be there. Don’t need to add all from the given link or paper. You can take help from other websites as well. Thanks They have also mentioned in details where we have to use that link. They have given in description for the assignment. Thanks

inf2319211

7/29/2019 4:02:51 AM

points like problem- solving from the paper but you have to add your views what you learned. Paper is just for adding tables for mapping of core units and graduate outcomes table and you can take help from Appendix A in the given link forthese tables. But please don’t add same text. And also cite references in the text. Thanks Kind regards

inf2319211

7/29/2019 4:02:11 AM

Kind regards And please provide separate headings for all points. Thanks Hello We have to add what technical skills and professional skills we have gained or learned from the industry exposure or professional exposure. You should write what we gained from the professional exposure. You can take

inf2319211

7/29/2019 4:01:31 AM

graduate outcomes table ( look at Appendix A in the given link). Please find the attached link. https.org.au/con tent/da m/acs/a cs-s kills /The-ACS-C ore-Bo dy-of- Kno wledge- fo r-ICT-P rof essi onals-CBOK.pdf And please provide me report with plagiarism report. Thanks

inf2319211

7/29/2019 4:00:32 AM

I have paid for the assignment. Please provide quality of work as per the requirements. Please read every detail. This assignment is based on the industry exposure which we have attended and what we have learned from that we have to write in the report. I am sending you a link, this will help you in writing mapping of core units and

inf2319211

7/29/2019 4:00:18 AM

I have to submit this assignment by today evening 10 pm. Can you please give me the solution in 7-9 hours. Thanks ok thanks Hello

Write a Review

Computer Networking Questions & Answers

  What other activities a network administrator monitor

What other activities do you think a network administrator might want to monitor? Why?

  Describe two technical features of two-g gsm

Define AND describe 2 technical features of 2G GSM (ie, the initial version of GSM, NOT how it evolved into 3G) and 2G CDMA.

  What is the maximum data capacity for traffic

What is the maximum data capacity for traffic between Hornsby and North Ryde? What is the maximum data capacity for traffic between Hornsby and the City store?

  Explain all potential security threats on personal computer

Computer security is not the issue for organizations alone. Anyone whose personal computer is connected to the network or Internet faces the potential risk of attack.

  Write a client program to implement simplified http protocol

Write a client program and a server program to implement the following simplified HTTP protocol based on TCP service.

  What rfc describes the gopher protocol

What RFC describes the Gopher protocol? Print and read the first two pages of the RFC and list and illustrate 5 RFCs that describe the IMAP protocol. Print and read the first two pages of one of these RFCs.

  Differences between a context-level diagram

Explain the differences between a context-level diagram and a diagram level 0.

  Identify most common intrusion detection attacks

MN502 - Demonstration of a network security tool Discuss common threats and attacks on networked information systems - Identify most common intrusion detection attacks

  Purchasing and installing hardware

"Purchasing and Installing Hardware" Please respond to the following:

  Justification of network management plan

Describe and explain the network management plan - Describe and explain elements of a network management plan suitable for this organisation

  Do you think ids like snort can easily detect covert channel

Do you think IDS like Snort can easily detect a covert channel? For example, can you write an effective set of Snort rules to prevent any information leak through a covert channel?

  What should you know about website privacy

What should you know about website privacy? How do you know when an online transaction is secure? Why is Anti-spyware software important to my online security?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd