Identify url of the website and your assigned business model

Assignment Help Computer Network Security
Reference no: EM13833756

Assignment

PROTOTYPE & BRIEFING REPORT

This assignment must be your own work. It is acceptable to discuss course content with others to improve your understanding and clarify requirements, but solutions to assignment questions must be done on your own. You must not copy from anyone, including tutors and fellow students, nor allow others to copy your work. All Assignments will be checked using collusion monitoring tools to ensure that each assignment is the original work of the submitting student. Assignments that do not adhere to this requirement will be deemed as being the result of collusion or plagiarism. This may lead to severe academic penalties as outlined in USQ Policy Library: Academic Integrity Policy and Procedure. It is your own responsibility to ensure the integrity of your work. Refer to the USQ Policy Library for more details:

• Academic Integrity Policy

• Academic Integrity Procedure

In completing this assignment, you are expected to use available resources such as the practical activities in the study modules, the Course Study Desk - especially the Discussion Forums (click the Study Desk link on UConnect - https://uconnect.usq.edu.au ), as well as exploring and experimenting on your own.

Learning objectives

This assignment relates to your ability to demonstrate your understanding of the various components of an online business, aligning them with a business' strategic requirements and objectives and communicating them to the client as a tangible product for their consideration and evaluation.

Assignment Requirements

Your web site proposal and presentation was accepted, subject to any feedback you may have received.

As the second stage of the tender process, your company has been asked to develop and present a prototype (a minimal viable product) of your suggested website before a final decision is taken whether to take on your services or not.

TASK 1: PROTOTYPE IMPLEMENTATION

1. Use the assigned URL supplied to you by your Course Leader to develop a preliminary prototype of your proposed e-commerce website.

a. REMINDER: Ensure that the prototype is directly and obviously related to the business model/category that was assigned to you. Failure to do so will result in your assignment being rejected and a zero mark awarded.

2. Configure the site with a menu and navigation links to (at the very minimum) the following content pages:

a. Home page (including a company banner and logo, and navigation menu)

b. About page

c. Product/information page/s (include descriptions, prices and images)

d. Company Policies page

i. Returns and refunds

ii. Security

iii. Privacy and confidentiality

e. Contacts page

You will not be required to install WordPress on your computer.

Instead you will be provided access to a pre-installed WordPress development environment provided by cloudaccess.net via a url link assigned to each student.

Instructions to access your cloudaccess.net website will be provided on the StudyDesk.

Task 1 will be assessed for completeness and working functionality based on an inspection of your website.

TASK 2: BRIEFING REPORT essay format

Prepare and submit a briefing document (about 1000 words) with appropriate numbering, headings and sub-headings on completion of the development of the prototype. Include the following in your briefing document:

1. Identify the URL of the website and your assigned business model/category in the first part of the report.

2. Describe the website structure and the purpose of each element (include snapshots and diagrams where appropriate).

3. List the WordPress components and features you used in the development of the prototype.

4. Describe the components and features you plan to include in the final product (should your company be awarded the contract).

5. Explain any changes you have implemented (or plan to implement) that deviates from your initial proposal and presentation.

6. List and briefly describe any links and resources that you have used, as well as any that you are likely to use in the building of the fully functional website.

Reference no: EM13833756

Questions Cloud

What selling price per unit is necessary to achieve : Question 1 (Break-even point and selling price) Parks Casting Inc. will manufacture and sell 210,000 units next year. Fixed costs will total $300,000 and variable costs will be 50 percent of sales.a.       The firm wants to achieve a level of earning..
Which of these mixtures are heterogenous : Which of these mixtures are heterogenous
Quick ratio formula : The appendix containing a list and calculations of the ratios. A list of the calculations shown with formulas and the resulting answer.
What is the ploidy of the dna at the end of meiosis : What is the ploidy of the DNA at the end of meiosis I? What about at the end of meiosis II - How are meiosis I and meiosis II different - Why do you use non-sister chromatids to demonstrate crossing over?
Identify url of the website and your assigned business model : Identify the URL of the website and your assigned business model/category in the first part of the report. Describe the website structure and the purpose of each element (include snapshots and diagrams where appropriate).
What position should the company take : [Hedge Equity Portfolio]It is July 16. A company has a portfolio of stocks worth $12 million. The beta of theportfolio is 1.5. The company would like to use the CME December futures contract onthe S&P 500 to change the beta of the portfolio to 1.2 du..
When an offeree uses a nonauthorized means of acceptance : Which of the following under the UCC is true about the way to communicate acceptance? A) any means deemed reasonable by the court in light of the circumstances is an authorized way of acceptance B) a means slower and safer than the way the offer was ..
Cfo predicts that the firm’s operating expenses : Question 1 (Financial forecasting)Zapatera Enterprises is evaluating its financing requirements for the coming year. The firm has been in business for only 1 year, but its CFO predicts that the firm’s operating expenses, current assets, net fixed ass..

Reviews

Write a Review

Computer Network Security Questions & Answers

  What is the definition of privacy as it relates to

1introduction to the management of information security?2.which trend in it has eliminated the we have technology

  Network design paper

Network Design Paper

  How system with capabilities as access control mechanism

Consider how a system with capabilities as its access control mechanism could deal with Trojan Horses.

  Analyze the fundamentals of pki

Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.

  Fundamental security properties

List the three fundamental security properties and for each give an example of failure. Justify your answer based on literature and Explain why asynchronous I/O activity is a problem with many memory protection schemes, including base/bounds and pag..

  Stuxnet virus and choicepoint data breach

Select a research topic from the list below. After selecting your topic, research the incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry. Stuxnet virus and ChoiceP..

  Dubbing was coined as a term of copying

Dubbing was coined as a term of copying media in the 1980's for all mediums. What term was a major issue during the process of continously dubbing media? Digitization cured this issue.

  Forensic challenge in mobile network

As a forensic investigator firstly we have to know the details of the student like height, color and which dress he is wearing during the time of missing as his mobile is found in his room. It is easy to trace by checking the details in his mobile..

  Explain two-bit system noninterference-secure

The initial state is not output (in contrast to the example). Is this version of two-bit system noninterference-secure with respect to Lucy? Why or why not?

  Analysis of the network security

You have just been hired as the security administrator of a major organization that was recently breached by a social engineer. After a thorough analysis of the network security

  Key generation of the simplified des algorithm

What is the history of DES and describe the key generation of the Simplified DES algorithm

  How should organizations respond to security threats your

how should organizations respond to security threats? your response should be at least 200 words in length. you are

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd