ICTSAS304 Provide basic system administration LMS 1
Project Assessment
{` Unit code, name ICTSAS304 - Provide basic system administration (1) ICTNWK301 - Provide network systems administration (1) Qualification/Course code, name and release number ICT30118 - Certificate III in Information, Digital Media and Technology (1) Tafe NSW `}
Assessment instructions
Table 1 Assessment instructions
Assessment details |
Instructions |
Assessment overview |
The objective of this assessment is to assess your knowledge and performance to: · maintain security access records · record software licenses · contribute to the formulation of a disaster recovery plan and provide the client with an optimised network that complies with the organisational guidelines. |
Assessment Event number |
1 of 2 |
Instructions for this assessment |
This is a project-based assessment and will be assessing you on your knowledge and performance of the unit. This assessment is in four parts: 1. Manage software in a networked system 2. Record security access 3. Provide input into disaster recovery plan 4. Perform a backup and restore under supervision This assessment is also supported by: · Assessment feedback This will be provided after you have submitted your assessment for marking. |
Submission instructions |
When you have completed this assessment, submit it online for marking by your assessor. Ensure you have typed your name at the bottom of each page of every document you create. Submit the following documents or files for each part: · Part 1: Manage software in a networked system o Provide network systems administration— · Part 2: Record security access o Provide network systems administration— o This document including screenshots of you completing the tasks for question 3. · Part 3: Provide input into disaster recovery plan o Provide network systems administration— · Part 4: Perform a backup and restore o A recording of your meeting with your client (teacher) where you clarify the task requirements. o This assessment document including: § screenshots and questions for task 1 § backup/restore record for task 2. It is important that you keep a copy of all electronic and hardcopy assessments submitted to TAFE and complete the assessment declaration when submitting the assessment. |
What do I need to do to achieve a satisfactory result? |
To achieve a satisfactory result for this assessment all questions must be answered correctly and all demonstrations must be marked satisfactory. |
Assessment conditions |
Assessment conditions will replicate the workplace, including noise levels, production flow, interruptions and time variances. Make sure there is background noise, such as music for example, and interruptions while you are completing this assessment. |
What do I need to provide? |
· A personal computer with the following minimum specification – 4GB RAM, 2GHz processor. · Internet access and login details. · A word processor, such as Microsoft Word for creating the documentation required as part of this assessment. · Access to screen capture software such as the Snipping Tool to take screenshots of the demonstration tasks you complete on a computer. · Access to MS Teams or Skype to meet with your client (teacher). · Speakers and a microphone (headset/webcam) to be used with your computer. · A USB drive or other storage method with enough free space to save work to. · Virtualisation software, for example Virtual Box, to set up a virtual machine. See instructions in assessment under ‘Preparation instructions’. |
What will the assessor provide? |
· Access to the Learning Management System. · Provide network systems administration—Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1) · The virtual hard disk file named CentOS7-LinuxClass-VB which is included in Cl_SysAdmin_AE_Pro_1of2_SR2.zip file. |
Due date and time allowed |
Indicative time to complete assessment: · Parts one to three—three hours · Part four— twenty minutes. |
Supervision |
Your assessor may ask for additional evidence to verify the authenticity of your submission and confirm that the assessment task was completed by you. |
Reasonable adjustment |
If you have a permanent or temporary condition that may prevent you from successfully completing the assessment event(s) in the way described, you should talk to your assessor about ‘reasonable adjustment’. This is the adjustment of the way you are assessed to take into account your condition, which must be approved BEFORE you attempt the assessment. |
Assessment feedback, review or appeals |
Appeals are addressed in accordance with Every Student’s Guide to Assessment in TAFE NSW. |
Specific task instructions
The instructions and the criteria in the tasks and activities below will be used by the assessor to determine whether the tasks and activities have been satisfactorily completed. Use these instructions and criteria to ensure you demonstrate the required knowledge.
For Parts 1 to 3 of this assessment, use the Provide network systems administration—Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1) to document your answers.
For both Part 2—Task 3 and Part 4—Task 1, you will use a virtual hard disk file called CentOS7-LinuxClass-VB to perform the tasks.
Preparation instructions
If you already have VirtualBox installed on your computer, you will not need to install it again.
- Install VirtualBox:
- Go to https://www.virtualbox.org/wiki/Downloads
- Under VirtualBox platform packages, select Windows hosts or OS X hosts (depending on your operating system) to download the .exe file.
- Install VirtualBox by double-clicking the VirtualBox package.
- Create a virtual machine:
- Watch Creating a new Virtual Machine (VM) in Virtual Box (Vimeo 9:00 min) and follow the steps in the video to create a virtual machine using the virtual hard disk file called CentOS7-LinuxClass-VB (in zip).
- Login credentials are as follows:
- Administrative account username: root
- Password: rootpassword
Part 1: Manage software in a networked system
Document your answers in the Provide system administration—Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1) Part 1. Ensure you have cited all references (web links, books, etc.) in the Bibliography section of the above document.
- Refer to the BSA | The Software Alliance official website (www.bsa.org) to understand the legal and regulatory responsibilities in relation to security access and software. Based on this research, state five reasons why it is important to be a responsible software user.
- State three responsibilities of a systems administrator regarding copyright in an organisation.
- Refer to the Software asset management guide on the BSA website.
- Briefly outline in your own words, how you can keep an inventory of installed software in a networked system. (This process is also known as software auditing).
Your answer should include a minimum of 50 and no more than 85 words.
- List three questions you can answer to confirm understanding of an accurate software inventory.
- Briefly outline what information or material you need to collect regarding the software installed computers in a networked system.
- Briefly outline how you can determine what software is authorised or unauthorised (legal or illegal) in a networked system. Your answer should include a minimum of 50 and no more than 85 words.
- What is the best way of reporting to your manager if you found that certain users in your organisation are downloading illegal software? Select the appropriate form, channel and mode of communication for reporting the illegal software. Provide a sample of your communication in which you should include the following:
- Address the communication to the right person.
- State the situation.
- Explain the threat to the organisation.
Part 2: Record security access
Read the scenario given below to understand organisational requirements regarding client access requirements and clearance levels for different user groups.
Question 3 requires you to use screen capture software such as the snippet or snipping tool to take screenshots of the tasks you complete.
Scenario
North Sydney IT is an IT institute providing IT-related education to students both international and local. North Sydney IT, teaching section have different access levels for resources provided for different user groups, who are classified as students, teachers, managers and staff
Read the following security access guidelines given by management carefully.
Students
- Can only view and copy resources from the shared folder: /nsit/learn
- All students belong to their own user private group.
- Students also belong to a secondary group called students
Teachers
- Can view, copy, write and modify resources in the shared folder: /nsit/learn
- Can view, copy, write and modify resources in the shared folder: /nsit/teach
- Can only view and copy resources in the shared: /nsadmin/policies
- All teachers belong to a primary group called teachers and a secondary group called staff
Head Teachers
- Can view, copy, write and modify resources in the shared folder: /nsit/learn
- Can view, copy, write and modify resources in the shared folder: /nsit/teach
- Can view, copy, write and modify resources in the shared folder: /nsadmin/policies
- All head teachers belong to a primary group called “teachers” two secondary groups called staff and management
Staff
- All nsit employees including belong to the primary group called staff
- All staff members should be able to access the shared folder: /nsadmin/policies
Administrator/super-user (root)
Systems administrator is responsible for creating and maintaining the following resources, thus he has the user ownership of all the following resources:
- /nsit/learn
- /nsit/teach
- /nsadmin/policies
You are provided with some information about new students and new staff members at North Sydney IT. Obtain client access requirements ad clearance levels according to the scenario given.
Following are names of new students enrolled in courses
- James Brown
- Teresa Green
- Mary White
Following are names of new teachers employed at North Sydney IT
- Bob Martin
- Sam Jenkins
- Melany Triso
Following are names of new Head Teachers employed at North Sydney IT
- Pete Evans
- Tina Homes
All login names should be created in the following format
Example: if the client name is John Smith, the user login name should be jsmith
- Provide a summary of:
- two general functions of an operating system
- two networking features of an operating system
- two basic features of Linux operating system used in the above scenario.
Document your answer in Part 2 of the Provide system administration—Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1).
- Identify the primary and secondary group associations for all the new students, teachers and head-teachers in the scenario given. Document your answers in the table given in Part 2 of the Provide system administration—Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1).
- Identify which user groups in North Sydney IT have access to which system resources. Document your answers in the sample template for a security access register given in Part 2 of Provide system administration—Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1). The security access register must be maintained in line with the organisational guidelines provided in the scenario.
- Using the virtual machine that you set up at the beginning of the assessment, configure the user accounts, groups and resources given in the scenario and document the steps (take step-by-step screenshots). Follow the guidelines given below when performing this task. Record the commands that you used and include any screenshots from the system to support your answers.
- Create the new user accounts for students, teachers and head-teachers according to the scenario. Ensure the users’ full name is included in the comments field of the user account configuration file.
Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.
- Set temporary passwords for the new user accounts created. Ensure that these temporary passwords are set to expire when the user logs into the system for the first time.
Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.
- Create the necessary groups according to the scenario.
Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.
- Add the users into the correct primary and secondary groups as documented in Question 1.
Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.
- Create the following resources at the top of the directory structure:
- /nsit/learn
- /nsit/teach
- /nsadmin/policies
Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.
- Configure the correct user and group ownerships for the above resources as identified in Question 2.
Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.
- Configure the correct permissions for the system resources as identified in Question 2.
Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.
- Login as one of the new student user accounts and test the system for correct functionality.
Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.
- Login as one of the new teacher’s user accounts and test the system for correct functionality.
Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.
- Login as one of the new head teacher’s user accounts and test the system for correct functionality.
Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.
- Using the scenario above, outline at least five guidelines and procedures all students and staff must follow with respect to security and network. This can include common measures around emails, storage devices, internet usage, etc.
Use the following table for your answer. Include images if required. (Approx. 100 words).
Part 3: Provide input into disaster recovery plan
Document your answers in Part 3 of the Provide system administration—Project report (Cl_SysAdmin_AE_Pro_1of2_SR1).
Ensure you have cited all references (web links and books, for example) in the bibliography section of the above document.
- Research different backup methods such as full backups, incremental backups and differential backups. Document your answers in the table given in Part 3, 1. Different backup methods in the Provide system administration—Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1).
- Research organisational standards on labelling and storing backups and then:
- List five things you would include on a tape drive backup label.
- List three things you should consider when storing backups.
- List five things you can do to maintain records of backups.
- Research and describe five key elements that can be found in a typical IT disaster recovery policy.
- List three possible ways how you can communicate or publicise the disaster recovery plan to others as required.
Scenario
Assume that you are the systems administrator of your organisation. The information systems data is vital for your organisation to operate. You now need to decide on a disaster recovery plan concerning your organisations data.
Take into consideration that your organisation operates from Monday to Friday (from 9am – 5pm) and Saturday (9am – 3pm) every week. You are planning to use tape drives for taking backups.
Extracts from company backup rotation policy
Offsite tape rotation
Every Monday, the tapes from the weekend’s full backups are removed from the on-site tape library and stored in the off-site storage safe located in room 505 at the XYZ Building. Tapes stored off-site that are due to return to service are taken back to the data-centre for re-use.
Because the tapes may contain sensitive or restricted data, during transit to and from the off-site location, the courier may not make any stops or leave the tapes unattended at any time. The tape inventory log is updated to reflect the new location of tapes.
- Document your backup strategy/ schedule as part of your disaster recovery plan for the given scenario. Outline the following in your answer:
- day of the week, the backup is taken
- type of backup (full, incremental, differential)
- time of backup
- tape drive label and
- storage location
- restore details – state what is required for a system restore in case if a disaster occurs.
- Using the scenario, outline a backup service-level agreement (SLA) for the company. Describe the policies and procedures for deleting, restoring and archiving files. Consider the following and include in the SLA:
- what will be backed up
- regularity of the backup
- response times for recovering data
- whether you can recover all data
- whether you can guarantee the reliability of data after a particular time
- whether you can guarantee the latest copy of data
- how users can contribute to a successful backup.
Part 4: Perform a backup and restore under supervision
Scenario
You are working for an IT company and have been assigned to implement a system backup and restore for a client.
Your first step is to meet with the supervisor to clarify requirements before starting each task. Book an appointment with your teacher to complete this step.
The meeting will be conducted using a web meeting platform such as Skype or Zoom. Your teacher will provide you with instructions on how to access the meeting and will take you through a few steps before you begin to enable you to turn on and adjust your microphone appropriately. Make sure the meeting is recorded.
You are also required to capture screenshots using the snipping tool, for each task you complete below for this assessment.
Refer to the checklists to see the skills that you need to demonstrate.
The first part of the checklist has the tasks that need to be performed. In this part you will demonstrate your skills in carrying out the required tasks.
The second part of the checklist assesses your oral communication skills demonstrated during the meeting role play with your client (teacher).
1. Perform a backup and restore procedure using a test environment
Instructions:
Meeting role play (oral communication skills)
- Before you begin each task, you must have a meeting with your client (teacher) to clarify the requirements of the task.
- During the meeting make sure you:
- Confirm the client’s requirements for the backup and restore.
- Ask appropriate questions to clarify the task requirements.
- Use clear and appropriate language including specific and relevant technical terms suitable for the client.
- Use appropriate listening and questioning techniques to confirm understanding of the requirements of the task.
Demonstration task
- Use the virtual machine you set up at the beginning of this assessment.
- Use the snipping tool to take step-by-step screen shots of the demonstration tasks listed below. Ensure all screenshots capture the entire virtual machine window which shows the virtual machine name along with the date and time at the bottom.
Email task
- When you have completed the tasks email your supervisor (teacher) to confirm that you have satisfactorily met the requirements.
Demonstration tasks |
Task completed (Tick if done) |
1. Find out the total size of the class-files directory located at the top of the directory structure. a. What is the absolute pathname of class-files: __________ b. What is the size of the class-files directory________ Include step-by-step screenshots of this activity here: |
☐ |
2. Perform a backup of the class-files directory into the /backup directory. To do this, create a compressed archive of class-files and all its contents. The compressed archive should be named class-files.tar.bz2 and should be created inside the /backup directory. Include step-by-step screenshots of this activity here: |
☐ |
3. Check if the backup was created successfully in the /backup directory. Include step-by-step screenshots of this activity here: |
☐ |
4. Delete the original class-files directory including all its contents from the system. Include step-by-step screenshots of this activity here: |
☐ |
5. Restore the class-files directory to its original location. Include step-by-step screenshots of this activity here: |
☐ |
6. Check if the class-files directory was successfully restored. a. What is the total size of the class-files directory? ____________ b. Is it the same as documented in Question 1a? ______________ Include step-by-step screenshots of this activity here: |
☐ |
Oral communication skills |
Task completed (Tick if done) |
7. Ask questions to clarify task requirements with the client |
☐ |
8. Uses listening and questioning techniques to confirm understanding |
☐ |
9. Confirms task requirements with the client |
☐ |
10. Articulates information clearly using specific and relevant technical language suitable to the client |
☐ |
2. Backup/Restore record
As per company guidelines, the form below needs to be filled out to record the completed restore.
Backup / Restore procedure | |||
Date: |
Test performed by: | ||
Objects recovered: | |||
Test performed in a test environment |
YES ☐ |
NO ☐ | |
Test result |
Successful ☐ |
Unsuccessful ☐ Recommendations: |
Diploma Universities Assignments
Laureate International Universities Assignment
Holmes Institute Assignment
Tafe NSW
Yes College Australia
ACC508 Informatics and Financial Applications Task 2 T2, 2019
ACC512 Accounting
ACC520 Legal Regulation of Business Structures Semester 2, 2019
ACCT20074 Contemporary Accounting Theory Term 2 Assessment 3
AERO2463 Computational Engineering Analysis : Assignment 4
B01DBFN212 Database Fundamentals Assessment 1
BE01106 - Business Statistics Assignment
BFA301 Advanced Financial Accounting
BFA504 Accounting Systems Assessment 3
BSB61015 Advanced Diploma of Leadership and Management
BSBADV602 Develop an Advertising Campaign
BSBCOM603 Plan and establish compliance management systems case study
BSBCOM603 Plan and establish compliance management systems Assessment Task 1
BSBCOM603 Plan and establish compliance management systems Assessment Task 2
BSBCOM603 Plan and establish compliance management systems Assessment Task 3
BSBFIM501 Manage Budgets And Financial Plans Assessment Task 1
BSBHRM602 Manage Human Resources Strategic Planning
BSBINM601 Manage Knowledge and Information
BSBWOR501 Assessment Task 3 Plan Personal Development Plan Project
BSBMGT517 Manage Operational Plan
BSBWHS521 Ensure a Safe Workplace For a Work Area
BSBWRK510 Manage employee relations
BUSS1030 Accounting, Business and Society
CAB202 Microprocessors and Digital Systems Assignment Help
CHC40213 Certificate IV in Education Support
CHCAGE001 Facilitate the empowerment of older people
CHCAGE005 Provide support to people living with dementia
CHCCCS023 Support independence and wellbeing
CHCCCS025 Support relationships with carers and families
CHCCOM005 Communicate and CHCLEG001 Work Legally Ethically
CHCDIS002 Follow established person-centred behaviour supports
CHCECE019 Early Childhood Education and Care
CHCHCS001 Provide home and community support services
COMP10002 Foundations of Algorithms
COMP90038 Algorithms and Complexity
COSC2633/2637 Big Data Processing
COSC473 Introduction to Computer Systems
CPCCBC5011A Manage Environmental Management Practices And Processes In Building And Construction
CPCCBC5018A Apply structural Principles Medium rise Construction
CSE3OSA Assignment 2019
ELEC242 2019 Session 2
ENN543 Data Analytics and Optimisation
ENN543 Data Analytics and Optimisation Semester 2, 2019
FINM202 Financial Management Assessment 3 Group Report
Forensic Investigation Case Assignment ECU University
HA2042 Accounting Information Systems T2 2019
HC1010 Holmes Institute Accounting For Business
HC2112 Service Marketing and Relationship Marketing Individual Assignment T2 2019
HC2121 Comparative Business Ethics & Social Responsibility T2 2019
HI5002 Holmes Institute Finance for Business
HI5003 Economics for Business Trimester 2 2019
HI5004 Marketing Management T1 2020 Individual Report
HI5004 Marketing Management T1 2020 Group Report
HI5004 Holmes Institute Marketing Management
HI5014 International Business across Borders Assignment 1
HI5014 International Business across Borders
HI5017 Managerial Accounting T2 2019
HI5017 Managerial Accounting T1 2019
HI5019 Tutorial Questions 1
HI5019 Strategic Information Systems for Business and Enterprise T1 2020
HI5019 Holmes Institute Strategic Information Systems T2
HI5019 T2 2019
HI5019 T1 2019
HI5020 Corporate Accounting T3 2019
HI5020 Corporate Accounting T2 2019
HI6005: Management and Organisations in a Global Environment
HI6006 Tutorial questions
HI6006 Competitive Strategy Individual T1 2020
HI6006 Holmes Institute Competitive Strategy
HI6006 Competitive Strategy T3 2019
HI6007 Statistics for business decisions
HI6007 Assessment 2 T1 2020
HI6007 T1 2019
HI6008 T2 2019
HI6008 Holmes Institute Research Project
HI6025 Accounting Theory and Current Issues
HI6026 Audit, Assurance and Compliance Assignment Help
HI6026 Audit, Assurance and Compliance
HI6027 business and corporate law tutorial Assignment T1 2021
HI6027 Business and Corporate Law T3 2019
HI6027 Business and Corporate Law T2 2019
HI6028 Taxation Theory, Practice and Law T2 2021
Hi6028 taxation theory, practice and law Final Assessment t1 2021
HI6028 Taxation Theory, Practice and Law T2 2019
HI6028 Taxation Theory T1 2019
HI6028 Taxation Law Holmes
HLTAAP001 Recognise healthy body systems
HLTWHS002 Follow safe practices for direct client care
HOTL5003 Hotel Property and Operations
HPS771 - Research Methods in Psychology A
HS2021 Database Design
ICTICT307 Customise packaged software applications for clients
IFN619 Data Analytics for Strategic Decision Makers
INF80028 Business Process Management Swinburne University
ISY2005 Case Assignment Assessment 2
ISYS326: Information Systems Security Assignment 2, Semester 2, 2019
ITAP3010 Developing Data Access Solutions Project
ITECH1103- Big Data and Analytics – Lab 3 – Working with Data Items
ITECH1103- Big Data and Analytics Assignment Semester 1, 2020
ITECH 5500 Professional Research and Communication
Kent Institute Australia Assignment
MA5830 Data Visualisation Assignment 2
MGMT7020 Project Management Plan
Mgt 301 Assessment 3
MGT215 Project Management Individual Assignment
MIS102 Data and Networking Assignment Help
MITS4002 Object Oriented Software Development
MITS5002 Software Engineering Methodology
MKT01760 Tourism Planning Environments Assessment 4
MKT01760 Tourism Planning Environments
MKT01906 International Tourism Systems
MKT5000 Marketing Management S2 2019
MNG03236 Report Writing SCU
MRE5003 Industrial Techniques In Maintenance Management Assignment 4
MRE5003 Industrial Techniques In Maintenance Management Assignment 3
MRE5003 Industrial Techniques In Maintenance Management
Network Security and Mitigation Strategies Answers
NIT2213 Software Engineering Assignment
NSB231 Integrated Nursing Practice Assessment Task 1
Science Literacy Assessment 4
SIT323 Practical Software Development T 2, 2019
SIT718 Using aggregation functions for data analysis
SITXCOM002 Show Social and Cultural Sensitivity
TLIL5055 Manage a supply chain
TLIR5014 Manage Suppliers
USQ ACC5502 Accounting and Financial Management
UTS: 48370 Road and Transport Engineering Assessment 2
CHCAGE001 Facilitate the empowerment of older people
CHCAGE005 Provide support to people living with dementia
CHCCCS011 Meet personal support needs
CHCCCS015 Provide Individualised Support
CHCCCS023 Support independence and wellbeing
CHCCCS025 Support relationships with carers and families
CHCCOM005 Communicate and work in health or community services
CHCDIS001 Contribute to ongoing skills development
CHCDIS002 Follow established person-centred behaviour supports
CHCDIS003 Support community participation and social inclusion
CHCDIS005 Develop and provide person-centred service responses
CHCDIS007 Facilitate the empowerment of people with disability
CHCDIS008 Facilitate community participation and social inclusion
CHCDIS009 Facilitate ongoing skills development
CHCDIS010 Provide person-centred services
CHCDIV001 Work with diverse people
CHCHCS001 Provide home and community support services
CHCLEG001 Work legally and ethically
CHCLEG003 Manage legal and ethical compliance
HLTAAP001 Recognise healthy body systems
HLTAID003 Provide First Aid
HLTHPS007 Administer and monitor medications
HLTWHS002 Follow safe work practices for direct client care
Assignment 2 Introduction to Digital Forensics
MGT603 Systems Thinking Assessment 1
MGT603 Systems Thinking Assessment 2
Hi5017 Managerial Accounting T1 2021
HI6028 Taxation Theory, Practice and Law T1 2021
OODP101 Assessment Task 3 T1 2021
ITNE2003R Network Configuration and Management Project
Australia Universities
ACT
Australian Catholic University
Australian National University
Bond University
Central Queensland University
Charles Darwin University
Charles Sturt University
Curtin University of Technology
Deakin University
Edith Cowan University
Flinders University
Griffith University
Holmes Institute
James Cook University
La Trobe University
Macquarie University
Monash University
Murdoch University
Queensland University of Technology
RMIT University
Southern Cross University
Swinburne University of Technology
University of Adelaide
University of Ballarat
University of Canberra
University of Melbourne
University of Newcastle
University of New England
University of New South Wales
University of Notre Dame Australia
University of Queensland
University of South Australia
University of Southern Queensland
University of Sydney
University of Tasmania
University of Technology Sydney
University of the Sunshine Coast
University of Western Australia
University of Wollongong
Victoria University
Western Sydney University
Year 11 - 12 Certification Assignment
Australian Capital Territory Year 12 Certificate
HSC - Higher School Certificate
NTCE - Northern Territory Certificate of Education
QCE - Queensland Certificate of Education
SACE - South Australian Certificate of Education
TCE - Tasmanian Certificate of Education
VCE - Victorian Certificate of Education
WACE - Western Australia Certificate of Education
Assignment Service Australia | CDR Writing Help | TAFE Assignment Help | Perth Assignment Help | Melbourne Assignment Help | Darwin Assignment Help | Adelaide Assignment Help | Assignment Help Victoria | Sydney Assignment Help | Canberra Assignment Help | Brisbane Assignment Help | CDR for Australian immigration | Course For Australian History