A common theme emerging from the group postings?

Assignment Help Basic Computer Science
Reference no: EM13897713

Employability Skills

Beyond the technical skills your degree does/will provide, what other skills are employers seeking? Have a look at job advertisments such as those in CareerOne. Other than technical skills, which skills are employers seeking? (seek.com.au)

Part 1:

1. Compile a list of at least four skills that are listed as essential or desirable from the advertisments you have sighted, that are unrelated to the specifics of the discipline area. Post your list in the discussion forum together with references to the advertisments you have extracted the information from.

2. Is there a common theme emerging from the group postings? Work together in your group to develop a summary of the groups findings.

Your next task is to reflect on which aspects of your formal and informal education are going to help you reach the career goals or direction you identified earlier. You need to refer to the Australian Computer Society Core Body of Knowledge (CBoK) - you will find the link in the Resources folder - and reflect on how the studies you have completed to date fit into each of the knowledge areas listed in the CBoK.

Part 2:

1. Do you think that you need knowledge in all, some or none of those areas in order to have a successful IT career? Why?

2. Can you identify the gaps in your knowledge? Is there a need to address them? If so, how are you going to address them? If not, why not?

3. Post a short message in your group discussion forum on the outcomes of your reflections.

4. Respond to your fellow group members postings. Do you think they are being realistic in their expectations? What advice would you give them to overcome their shortcomings? Remember to be supportive and constructive when providing feedback. Consider what sort of advice you would find useful when giving others advice.

Reference no: EM13897713

Questions Cloud

How steven jobs changed professional nature of journalism : how Steven Jobs as a mass media figure changed the professional nature of journalism,helped forge the social, cultural, political, and economic evolution of our culture, and were instrumental in setting a standard for the "next"mass media revoluti..
What later existentialists describe as the inauthentic life : Explain how Tolstoy's character Ivan Ilyich exemplifies what later existentialists describe as the inauthentic life. How, according to Tolstoy, does Ilyich overcome his inauthenticity
The unemployment rate and the rate of in?ation : "Between 1930 and 1990, macroeconomic theory went through a full circle. The classical view of the 1920s was discarded in the 1930s and 1940s by Keynesian theory, but the latter, in turn, was gradually eroded to the point that the dominant theory ..
What challenges does this epistemological view face : What are the central tenets of a rationalist approach to epistemology? What challenges does this epistemological view face
A common theme emerging from the group postings? : Is there a common theme emerging from the group postings?
What are some of the reasons given for this persistence : Present a model with rational expectations and the new Keynesian supply function. If policy makers and the public have the same information, can stabilization policies in a stochastic context affect aggregate demand and output (i) in the short r..
What is jini technology? : What is JINI technology?
What is civil governments role in protecting the environment : Environmental Protection - How does man's stewardship responsibility to God apply to environmental protection? How should that stewardship be carried out? What is civil government's role in protecting the environment?
Is there a genuine difference between these theories : Present a model with rational expectations and the Friedman-Lucas supply function. If policy makers and the public have the same information, can stabilization policies in a stochastic context change aggregate demand and output (i) in the short r..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Make a connectionless protocol reliable?

make a Connectionless Protocol reliable?

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

  Program to find out median selling price

Input selling prices of all homes in Botany Bay sold during year 2002 and find out median selling price. The median of a list of N numbers is.

  Draw the hieararchy chart and then plan the logice program

draw the hieararchy chart and then plan the logice for a program that calculates a person's body mass index BMI. BMI is a statistical measure that compares the person's weight and height.

  Two strings and prints the two strings

Write a method that takes in two strings and prints the two strings in alphabetical order. Assume the strings are lowercase. End with newline.

  Installation options for customer tracking system

Which installation options are available for the Customer Tracking System? Which would you recommend? How can you determine if implementation has been successful?

  Write bash shell script filestatic to examine number files

Write bash shell script filestatic. Script should examine the number files in directories given as arguments (parameters) to this script.

  Importance of preinstallation and postinstallation tasks

Describe the importance of preinstallation and postinstallation tasks

  Explain your hypothesis of what has occurred

Determine your next steps chronologically in investigating this issue and describe the parties you would involve and the extent of their involvement - explain your hypothesis of what has occurred.

  Find a solution to storage dilemma

Mr Green owns ABC Music, which is a shop that sells music CD's to customers. Currently sales data is stored using a paper based system and Mr Green is running out of room to store ABC's sales records. Mr Green has approached you to find a solu..

  Organizing function of management

Discuss and explain the company function of management as it relates to at least two of the organizational resources:

  What type of damage these computer infections can do to data

Virus, Trojan, Worm, Rootkit, Describe how each applies to the realm of data communication. Also, discuss what type of damage these computer infections can do to data in a computer.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd