Identify url of the website and your assigned business model

Assignment Help Computer Network Security
Reference no: EM13833756

Assignment

PROTOTYPE & BRIEFING REPORT

This assignment must be your own work. It is acceptable to discuss course content with others to improve your understanding and clarify requirements, but solutions to assignment questions must be done on your own. You must not copy from anyone, including tutors and fellow students, nor allow others to copy your work. All Assignments will be checked using collusion monitoring tools to ensure that each assignment is the original work of the submitting student. Assignments that do not adhere to this requirement will be deemed as being the result of collusion or plagiarism. This may lead to severe academic penalties as outlined in USQ Policy Library: Academic Integrity Policy and Procedure. It is your own responsibility to ensure the integrity of your work. Refer to the USQ Policy Library for more details:

• Academic Integrity Policy

• Academic Integrity Procedure

In completing this assignment, you are expected to use available resources such as the practical activities in the study modules, the Course Study Desk - especially the Discussion Forums (click the Study Desk link on UConnect - https://uconnect.usq.edu.au ), as well as exploring and experimenting on your own.

Learning objectives

This assignment relates to your ability to demonstrate your understanding of the various components of an online business, aligning them with a business' strategic requirements and objectives and communicating them to the client as a tangible product for their consideration and evaluation.

Assignment Requirements

Your web site proposal and presentation was accepted, subject to any feedback you may have received.

As the second stage of the tender process, your company has been asked to develop and present a prototype (a minimal viable product) of your suggested website before a final decision is taken whether to take on your services or not.

TASK 1: PROTOTYPE IMPLEMENTATION

1. Use the assigned URL supplied to you by your Course Leader to develop a preliminary prototype of your proposed e-commerce website.

a. REMINDER: Ensure that the prototype is directly and obviously related to the business model/category that was assigned to you. Failure to do so will result in your assignment being rejected and a zero mark awarded.

2. Configure the site with a menu and navigation links to (at the very minimum) the following content pages:

a. Home page (including a company banner and logo, and navigation menu)

b. About page

c. Product/information page/s (include descriptions, prices and images)

d. Company Policies page

i. Returns and refunds

ii. Security

iii. Privacy and confidentiality

e. Contacts page

You will not be required to install WordPress on your computer.

Instead you will be provided access to a pre-installed WordPress development environment provided by cloudaccess.net via a url link assigned to each student.

Instructions to access your cloudaccess.net website will be provided on the StudyDesk.

Task 1 will be assessed for completeness and working functionality based on an inspection of your website.

TASK 2: BRIEFING REPORT essay format

Prepare and submit a briefing document (about 1000 words) with appropriate numbering, headings and sub-headings on completion of the development of the prototype. Include the following in your briefing document:

1. Identify the URL of the website and your assigned business model/category in the first part of the report.

2. Describe the website structure and the purpose of each element (include snapshots and diagrams where appropriate).

3. List the WordPress components and features you used in the development of the prototype.

4. Describe the components and features you plan to include in the final product (should your company be awarded the contract).

5. Explain any changes you have implemented (or plan to implement) that deviates from your initial proposal and presentation.

6. List and briefly describe any links and resources that you have used, as well as any that you are likely to use in the building of the fully functional website.

Reference no: EM13833756

Questions Cloud

What selling price per unit is necessary to achieve : Question 1 (Break-even point and selling price) Parks Casting Inc. will manufacture and sell 210,000 units next year. Fixed costs will total $300,000 and variable costs will be 50 percent of sales.a.       The firm wants to achieve a level of earning..
Which of these mixtures are heterogenous : Which of these mixtures are heterogenous
Quick ratio formula : The appendix containing a list and calculations of the ratios. A list of the calculations shown with formulas and the resulting answer.
What is the ploidy of the dna at the end of meiosis : What is the ploidy of the DNA at the end of meiosis I? What about at the end of meiosis II - How are meiosis I and meiosis II different - Why do you use non-sister chromatids to demonstrate crossing over?
Identify url of the website and your assigned business model : Identify the URL of the website and your assigned business model/category in the first part of the report. Describe the website structure and the purpose of each element (include snapshots and diagrams where appropriate).
What position should the company take : [Hedge Equity Portfolio]It is July 16. A company has a portfolio of stocks worth $12 million. The beta of theportfolio is 1.5. The company would like to use the CME December futures contract onthe S&P 500 to change the beta of the portfolio to 1.2 du..
When an offeree uses a nonauthorized means of acceptance : Which of the following under the UCC is true about the way to communicate acceptance? A) any means deemed reasonable by the court in light of the circumstances is an authorized way of acceptance B) a means slower and safer than the way the offer was ..
Cfo predicts that the firm’s operating expenses : Question 1 (Financial forecasting)Zapatera Enterprises is evaluating its financing requirements for the coming year. The firm has been in business for only 1 year, but its CFO predicts that the firm’s operating expenses, current assets, net fixed ass..

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  The proposed cyber security act

Review the May 2011 Cyber Security Legislative Proposal, the proposed Cyber Security Act of 2012, Executive Order (EO) 13636 Improving Critical Infrastructure Cyber security, and Presidential Policy Directive (PPD) 21 Critical Infrastructure Secur..

  Desktop publishing system used to produce documents

Consider a desktop publishing system used to produce documents for various organizations. Give an example in which system availability is the most impotent requirement. Please be very brief.

  Determine the primary security concerns

Determine the primary security concerns regarding the scenario in question. Explain the controls you would implement in order to lessen those concerns.

  Value of the challenge text sent by the ap

What is the value of the challenge text sent by the AP and what is the value of the IVcaptured by the attacker - what is the value of the response to the challenge?

  What data can you leak when using public hotspots

What data can you leak when using public hotspots and how can you protect yourself when using them

  What is the principle of adequate protection

What is the principle of adequate protection? Do you agree with the principle? What difficulties are associated with implementing it?

  Describe how a hacker might go about cracking

Describe how a hacker might go about cracking a message encrypted with each type of algorithm -  algorithm where the advantages clearly outweigh the disadvantages.

  Analyze the basic attacks that occur in cyberspace each

analyze the basic attacks that occur in cyberspace. each type of threat actor attempts to achieve certain goals

  Explain computer forensics software or services

Use a web search engine to search for companies specializing in computer forensics software or services. Select two or three and write a one- to two-page report comparing what each company does.

  What is the definition of privacy as it relates to

1introduction to the management of information security?2.which trend in it has eliminated the we have technology

  Security goal if someone modifies critical information

If an attacker breaks into a corporate database, modifies some information and deletes critical files, against what security goal or goals is this attack aimed?

  Define cyber-attack simulator systems

Identify at least three (3) benefits or key knowledge points that could be derived from using cyber-attack simulator systems and research, and suggest how this insight could assist in defining the needs for security within an organization.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd