How you have acquired the knowledge

Assignment Help Computer Networking
Reference no: EM131119876

You must have Computer Networking experience

I need to complete an ACS (Australian Computer Society) RPL (Recognition of Prior Learning) assessment for the ANZSCO code of 263111 Computer network and systems engineer.

I want someone to complete the RPL assessment document for me.

In this document there are two sections that all applicants must complete -

• The Key Areas of Knowledge - Section 1
• The Project Report Forms - Section 2

RPL applications are for those applicants who do not hold a recognised tertiary ICT qualification and who have a minimum of 6 years of closely related experience. Please refer to the Summary of Criteria for further information.

This document provides the opportunity for applicants to demonstrate knowledge learnt throughout their professional experience.

SECTION 1 - KEY AREAS OF KNOWLEDGE

INFORMATION ABOUT THE AREAS OF KNOWLEDGE

Please read the following document to assist you in completing Section 1 of this document -The ACS Core Body of Knowledge for ICT Professionals (CBOK).

Applicants must detail the relationship between the selected Areas of Knowledge and their learning from their experience and qualifications. This section of the RPL application needs to be specific as to how and where the applicant has acquired the knowledge.

The ICT Key Areas of Knowledge:

Essential Core ICT Knowledge

Topic 1. ICT Professional Knowledge

Sub Topics are -

a. Ethics
b. Professional Expectations
c. Teamwork Concepts and Issues
d. Communication
e. Societal Issues

Topic 2. ICT Problem Solving

Sub Topics are -

a. Modelling Methods
b. Processes to understand problems
c. Methods and tools for handling abstraction

General ICT Knowledge

Topic 3. Technology Resources

Sub Topics are -

a. Hardware and Software Fundamentals
b. Data and Information Management
c. Data Communications and Networking

Topic 4. Technology Building

Sub Topics are -

a. Human Factors
b. Programming
c. Information Systems Development and Acquisition

Topic 5. ICT Management

Sub Topics are -

a. IT Governance and Organisational Issues
b. IT Project Management
c. ICT Service Management
d. Security Management

You are required to select one topic from the Essential Core ICT Knowledge (Topic 1 or Topic 2) and one topic from the General ICT Knowledge (Topic 3, Topic 4 or Topic 5). Please ensure you address at least 2 subtopics from each of the topics chosen. In the following expandable typing areas, explain how you have acquired your in-depth knowledge in these topic areas through your professional experience.

Important:

• Identify the Area of Knowledge topic that you have chosen to explainby entering the name of the Area of Knowledge topic in the box.

• Explain, in the expandable typing area, how you have acquired the knowledge and illustrate the depth of thatknowledge.

• You should NOT address all sub topics included in the Area of Knowledge in your explanation. Address at leastTWO of the sub topics. Enter the sub topic name(s) in the box.

• Be clear and concise in your explanation.

• Limit each explanation to no more than one to one and a half pages.

Essential Core ICT Area of Knowledge:[Enter topic and 2 subtopic names relating to the chosen area]

How have you acquired this knowledge in your working environment? Illustrate your depth of knowledge.

[EXPANDABLE TYPING AREA]

General ICT Area of Knowledge:[Enter topic and 2 subtopic names relating to the chosen area]

How have you acquired this knowledge in your working environment? Illustrate your depth of knowledge.

[EXPANDABLE TYPING AREA]

SECTION 2 - RPL PROJECT REPORTS

A project report is a coherent written description of a project or engagement that provides you with the opportunity to show how you perform as an ICT Professional. Each report is to relate to a significant project or work episode undertaken by you during your professional career.

The purpose of these reports is to enable you to demonstrate your command and implementation of the Areas of Knowledge described in Section 1 of this application.

Please note: You are required to provide two project reports.

Of the two reports, one must pertain to a project undertaken within the last three years, and the other for a project within the last five years.

Projects over two years long may be used for both reports under either of the following conditions:

• The project has clearly-defined work efforts which took place in parallel, each with their own solution development and design activities and their own deliverables.

• The project had clearly-defined phases that were executed in succession, each with its own solution development and design activities and deliverables. Note that a second project phase that constructs and implements the solution developed by the first phase does not meet this requirement.

Depending on the nature of your role in each project, the Project Report should cover an appropriate selection of factors. Appropriate factors will be determined based on the type of ICT project selected. Possible factors include:

• System Analysis and Design and Software Engineering methodologies used;

• Contribution to the processes involved in the design and implementation of enterprise-wide computing systems;

• Programming languages, design paradigms and implementation procedures adopted;

• Database and/or file design and management techniques employed;

• Network topologies, including size, distribution and security facilities installed;

• Project Management and quality assurance techniques followed;

• Internet application design, including database interactivity and security measures implemented;

• ICT managerial activities, demonstrating the nature and extent of responsibilities

Project Summary:

Project Name Start Date End Date
Project 1 mm/yy Mm/yy
Project 2 mm/yy Mm/yy

Instructions

The following pages provide a template for your reports.

When writing your reports please provide your own thoughts - do not just copy project documentation.

Please use the first person in your discussion, so it is clear to the assessor what you did versus what others did - say "I did X" rather than "X was done".

Diagrams from the project documentation may be helpful, but the text should be in your own words. Please ensure that diagrams are relevant, readable, and help the assessor to understand what you did as a member of the project team.

If sections of the Project Report template (see below) are not relevant to your participation in the project, then leave the section blank.

Focus on quality rather than quantity.Each Project Report should be no more than four or five pages in length.

SPECIAL NOTE:

By submitting this RPL Knowledge and Project Report form as a component of your ACS skills assessment application, you agree with the following statement:

The applicant confirms that the explanation of their knowledge and project reports submitted in this application truthfully and accurately describe the applicant and the applicant's personal involvement in the projects. The applicant is aware that plagiarism by the applicant will automatically invalidate this application, will jeopardise any future applicationsfrom the applicant and will be reported by the Australian Computer Society to the Australian Department of Immigration and Border Protection.

Attachment:- ACS-Project-Report-Form-2014.rar

Reference no: EM131119876

Questions Cloud

Foundation for personal integrity : What is your understanding of a moral compass as a foundation for personal integrity and social conscience?  From which Wisdom Tradition(s) do you draw in constructing your moral compass?  What do you value and question about this Wisdom Tradition?
Calculate the selling corporation tax bill : Assuming a corporate income tax rate of 40 percent on all taxable income, calculate the Selling Corporation's tax bill.
What amount needs to be saved at the end of each year : What amount needs to be saved at the end of each year in order for Bob and Carol to reach their financial goals?
Describe the chain of command : Describe the chain of command and the method of public health response that was conducted in this situation. Determine the important public health issues related to medical care in this situation.
How you have acquired the knowledge : Identify the Area of Knowledge topic that you have chosen to explainby entering the name of the Area of Knowledge topic in the box. Explain, in the expandable typing area, how you have acquired the knowledge and illustrate the depth of thatknowledge..
Xplain how internal and external factors affect : Write a 1,050- to 1,400-word paper in which you explain how internal and external factors affect the four functions of management. In your paper, explain how the following internal and external factors affect the four functions of management. Inc..
Question regarding the domestic violence policies : Explain how domestic violence policies evolved in local police departments across the United States. What is the trend in policing today? Discuss the research findings on the impact of mandatory arrest for misdemeanor domestic violence.
Calculate the idaho steel corporation’s tax bill : Last year, Idaho Steel Corporation had taxable ordinary income of $2 million and capital gains income of $500,000. The company also had $50,000 in dividend income and paid its stockholders $150,000 in dividends. Calculate the Idaho Steel Corporation’..

Reviews

Write a Review

Computer Networking Questions & Answers

  Beyond the literal meaning write down the broader

beyond its literal meaning what are the broader implications of the clicheacute keeping the family name alive? or has

  Determine possible routing paths in bgp routing table

In the topology, network S is multi-homed to four providers, i.e., P1, P2, P3 and P4, where P1, P2 and P3 are customers of common provider P while P4 is customer. Now assume D is destination of interest. Determine the possible routing paths to D th..

  Implement a crude version of remote procedure call

You are required to implement a crude version of Remote Procedure Call. Normally this would require some degree of compiler support. However, we will simplify the interface so that the basic RPC is there, and it is only a matter of syntactic sugar..

  What is a mantrap? when should it be used?

What is a mantrap? When should it be used?

  Assume that you can access the caches in the local dns

suppose you can access the caches in the local dns servers of your department. can you propose a way to roughly

  What is the type or name of the message

The TCP or UDP port that a VoIP protocol uses must be kept open in a firewall so that the traffic can pass through. In this same file, what, TCP or UDP port is used in Frame 1

  Identify application architecture in use by the organization

Identify the application architecture in use by the organization, and explain the basic mechanics of how that architecture works.

  Level of internet interaction

Like most technology, the Internet and its uses continue to grow and evolve. Some people use the Internet to take online courses to earn college credit. Others use the Internet for entertainment purposes

  What is transmission time for one cell through one switch

Consider compressed video transmission in an ATM network. Suppose standard ATM cells must be transmitted through five switches. The data rate is 43Mbps. What is the transmission time for one cell through one switch?

  The types and role of distributed software architecture

the types and role of distributed software architecture.

  Attack can be detected and mitigated by stateless firewall

For each of the following attacks, say whether the attack can be detected and mitigated (to a significant degree) by a stateless or stateful firewall. Explain briefly.

  What is the terminal console password for lan

What is the terminal console password for LAN Switch 1 and LAN Switch 2?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd