ICTSAS304 Provide basic system administration LMS 1

Project Assessment

{`
  Unit code, name
  ICTSAS304 - Provide basic system administration (1)
  ICTNWK301 - Provide network systems administration (1)
  Qualification/Course code, name and release number
  ICT30118 - Certificate III in Information, Digital Media and Technology (1)
  Tafe NSW
  `}

Assessment instructions

Table 1 Assessment instructions

Assessment details

Instructions

Assessment overview

The objective of this assessment is to assess your knowledge and performance to:

· maintain security access records

· record software licenses

· contribute to the formulation of a disaster recovery plan and provide the client with an optimised network that complies with the organisational guidelines.

Assessment Event number

1 of 2

Instructions for this assessment

This is a project-based assessment and will be assessing you on your knowledge and performance of the unit.

This assessment is in four parts:

1. Manage software in a networked system

2. Record security access

3. Provide input into disaster recovery plan

4. Perform a backup and restore under supervision

This assessment is also supported by:

· Assessment feedback

This will be provided after you have submitted your assessment for marking.

Submission instructions

When you have completed this assessment, submit it online for marking by your assessor.

Ensure you have typed your name at the bottom of each page of every document you create.

Submit the following documents or files for each part:

· Part 1: Manage software in a networked system

o Provide network systems administration—
Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1).

· Part 2: Record security access

o Provide network systems administration—
Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1)

o This document including screenshots of you completing the tasks for question 3.

· Part 3: Provide input into disaster recovery plan

o Provide network systems administration—
Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1) and screenshots for question 3.

· Part 4: Perform a backup and restore

o A recording of your meeting with your client (teacher) where you clarify the task requirements.

o This assessment document including:

§ screenshots and questions for task 1

§ backup/restore record for task 2.

It is important that you keep a copy of all electronic and hardcopy assessments submitted to TAFE and complete the assessment declaration when submitting the assessment.

What do I need to do to achieve a satisfactory result?

To achieve a satisfactory result for this assessment all questions must be answered correctly and all demonstrations must be marked satisfactory.

Assessment conditions

Assessment conditions will replicate the workplace, including noise levels, production flow, interruptions and time variances. Make sure there is background noise, such as music for example, and interruptions while you are completing this assessment.

What do I need to provide?

· A personal computer with the following minimum specification – 4GB RAM, 2GHz processor.

· Internet access and login details.

· A word processor, such as Microsoft Word for creating the documentation required as part of this assessment.

· Access to screen capture software such as the Snipping Tool to take screenshots of the demonstration tasks you complete on a computer.

· Access to MS Teams or Skype to meet with your client (teacher).

· Speakers and a microphone (headset/webcam) to be used with your computer.

· A USB drive or other storage method with enough free space to save work to.

· Virtualisation software, for example Virtual Box, to set up a virtual machine. See instructions in assessment under ‘Preparation instructions’.

What will the assessor provide?

· Access to the Learning Management System.

· Provide network systems administration—Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1)

· The virtual hard disk file named CentOS7-LinuxClass-VB which is included in Cl_SysAdmin_AE_Pro_1of2_SR2.zip file.

Due date and time allowed

Indicative time to complete assessment:

· Parts one to three—three hours

· Part four— twenty minutes.

Supervision

Your assessor may ask for additional evidence to verify the authenticity of your submission and confirm that the assessment task was completed by you.

Reasonable adjustment

If you have a permanent or temporary condition that may prevent you from successfully completing the assessment event(s) in the way described, you should talk to your assessor about ‘reasonable adjustment’. This is the adjustment of the way you are assessed to take into account your condition, which must be approved BEFORE you attempt the assessment.

Assessment feedback, review or appeals

Appeals are addressed in accordance with Every Student’s Guide to Assessment in TAFE NSW.

Specific task instructions

The instructions and the criteria in the tasks and activities below will be used by the assessor to determine whether the tasks and activities have been satisfactorily completed. Use these instructions and criteria to ensure you demonstrate the required knowledge.

For Parts 1 to 3 of this assessment, use the Provide network systems administration—Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1) to document your answers.

For both Part 2—Task 3 and Part 4—Task 1, you will use a virtual hard disk file called CentOS7-LinuxClass-VB to perform the tasks.

Preparation instructions

If you already have VirtualBox installed on your computer, you will not need to install it again.

  • Install VirtualBox:
    • Go to https://www.virtualbox.org/wiki/Downloads
    • Under VirtualBox platform packages, select Windows hosts or OS X hosts (depending on your operating system) to download the .exe file.
    • Install VirtualBox by double-clicking the VirtualBox package.
  • Create a virtual machine:
    • Watch Creating a new Virtual Machine (VM) in Virtual Box (Vimeo 9:00 min) and follow the steps in the video to create a virtual machine using the virtual hard disk file called CentOS7-LinuxClass-VB (in zip).
    • Login credentials are as follows:
      • Administrative account username: root
      • Password: rootpassword

Part 1: Manage software in a networked system

Document your answers in the Provide system administration—Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1) Part 1. Ensure you have cited all references (web links, books, etc.) in the Bibliography section of the above document.

  1. Refer to the BSA | The Software Alliance official website (www.bsa.org) to understand the legal and regulatory responsibilities in relation to security access and software. Based on this research, state five reasons why it is important to be a responsible software user.
  2. State three responsibilities of a systems administrator regarding copyright in an organisation.
  3. Refer to the Software asset management guide on the BSA website.
    1. Briefly outline in your own words, how you can keep an inventory of installed software in a networked system. (This process is also known as software auditing).

Your answer should include a minimum of 50 and no more than 85 words.

  1. List three questions you can answer to confirm understanding of an accurate software inventory.
  2. Briefly outline what information or material you need to collect regarding the software installed computers in a networked system.
  3. Briefly outline how you can determine what software is authorised or unauthorised (legal or illegal) in a networked system. Your answer should include a minimum of 50 and no more than 85 words.
  1. What is the best way of reporting to your manager if you found that certain users in your organisation are downloading illegal software? Select the appropriate form, channel and mode of communication for reporting the illegal software. Provide a sample of your communication in which you should include the following:
    1. Address the communication to the right person.
    2. State the situation.
    3. Explain the threat to the organisation.

Part 2: Record security access

Read the scenario given below to understand organisational requirements regarding client access requirements and clearance levels for different user groups.

Question 3 requires you to use screen capture software such as the snippet or snipping tool to take screenshots of the tasks you complete.

Scenario

North Sydney IT is an IT institute providing IT-related education to students both international and local. North Sydney IT, teaching section have different access levels for resources provided for different user groups, who are classified as students, teachers, managers and staff

Read the following security access guidelines given by management carefully.

Students

  • Can only view and copy resources from the shared folder: /nsit/learn
  • All students belong to their own user private group.
  • Students also belong to a secondary group called students

Teachers

  • Can view, copy, write and modify resources in the shared folder: /nsit/learn
  • Can view, copy, write and modify resources in the shared folder: /nsit/teach
  • Can only view and copy resources in the shared: /nsadmin/policies
  • All teachers belong to a primary group called teachers and a secondary group called staff

Head Teachers

  • Can view, copy, write and modify resources in the shared folder: /nsit/learn
  • Can view, copy, write and modify resources in the shared folder: /nsit/teach
  • Can view, copy, write and modify resources in the shared folder: /nsadmin/policies
  • All head teachers belong to a primary group called “teachers” two secondary groups called staff and management

Staff

  • All nsit employees including belong to the primary group called staff
  • All staff members should be able to access the shared folder: /nsadmin/policies

Administrator/super-user (root)

Systems administrator is responsible for creating and maintaining the following resources, thus he has the user ownership of all the following resources:

  • /nsit/learn
  • /nsit/teach
  • /nsadmin/policies

You are provided with some information about new students and new staff members at North Sydney IT. Obtain client access requirements ad clearance levels according to the scenario given.

Following are names of new students enrolled in courses

  • James Brown
  • Teresa Green
  • Mary White

Following are names of new teachers employed at North Sydney IT

  • Bob Martin
  • Sam Jenkins
  • Melany Triso

Following are names of new Head Teachers employed at North Sydney IT

  • Pete Evans
  • Tina Homes

All login names should be created in the following format

Example: if the client name is John Smith, the user login name should be jsmith

  1. Provide a summary of:
    • two general functions of an operating system
    • two networking features of an operating system
    • two basic features of Linux operating system used in the above scenario.

Document your answer in Part 2 of the Provide system administration—Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1).

  1. Identify the primary and secondary group associations for all the new students, teachers and head-teachers in the scenario given. Document your answers in the table given in Part 2 of the Provide system administration—Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1).
  1. Identify which user groups in North Sydney IT have access to which system resources. Document your answers in the sample template for a security access register given in Part 2 of Provide system administration—Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1). The security access register must be maintained in line with the organisational guidelines provided in the scenario.
  2. Using the virtual machine that you set up at the beginning of the assessment, configure the user accounts, groups and resources given in the scenario and document the steps (take step-by-step screenshots). Follow the guidelines given below when performing this task. Record the commands that you used and include any screenshots from the system to support your answers.
  3. Create the new user accounts for students, teachers and head-teachers according to the scenario. Ensure the users’ full name is included in the comments field of the user account configuration file.

Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.

  1. Set temporary passwords for the new user accounts created. Ensure that these temporary passwords are set to expire when the user logs into the system for the first time.

Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.

  1. Create the necessary groups according to the scenario.

Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.

  1. Add the users into the correct primary and secondary groups as documented in Question 1.

Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.

  1. Create the following resources at the top of the directory structure:
  • /nsit/learn
  • /nsit/teach
  • /nsadmin/policies

Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.

  1. Configure the correct user and group ownerships for the above resources as identified in Question 2.

Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.

  1. Configure the correct permissions for the system resources as identified in Question 2.

Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.

  1. Login as one of the new student user accounts and test the system for correct functionality.

Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.

  1. Login as one of the new teacher’s user accounts and test the system for correct functionality.

Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.

  1. Login as one of the new head teacher’s user accounts and test the system for correct functionality.

Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.

  1. Using the scenario above, outline at least five guidelines and procedures all students and staff must follow with respect to security and network. This can include common measures around emails, storage devices, internet usage, etc.

Use the following table for your answer. Include images if required. (Approx. 100 words).

Part 3: Provide input into disaster recovery plan

Document your answers in Part 3 of the Provide system administration—Project report (Cl_SysAdmin_AE_Pro_1of2_SR1).

Ensure you have cited all references (web links and books, for example) in the bibliography section of the above document.

  1. Research different backup methods such as full backups, incremental backups and differential backups. Document your answers in the table given in Part 3, 1. Different backup methods in the Provide system administration—Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1).
  2. Research organisational standards on labelling and storing backups and then:
    1. List five things you would include on a tape drive backup label.
    2. List three things you should consider when storing backups.
    3. List five things you can do to maintain records of backups.
  3. Research and describe five key elements that can be found in a typical IT disaster recovery policy.
  4. List three possible ways how you can communicate or publicise the disaster recovery plan to others as required.

Scenario

Assume that you are the systems administrator of your organisation. The information systems data is vital for your organisation to operate. You now need to decide on a disaster recovery plan concerning your organisations data.

Take into consideration that your organisation operates from Monday to Friday (from 9am – 5pm) and Saturday (9am – 3pm) every week. You are planning to use tape drives for taking backups.

Extracts from company backup rotation policy

Offsite tape rotation

Every Monday, the tapes from the weekend’s full backups are removed from the on-site tape library and stored in the off-site storage safe located in room 505 at the XYZ Building. Tapes stored off-site that are due to return to service are taken back to the data-centre for re-use.

Because the tapes may contain sensitive or restricted data, during transit to and from the off-site location, the courier may not make any stops or leave the tapes unattended at any time. The tape inventory log is updated to reflect the new location of tapes.

  1. Document your backup strategy/ schedule as part of your disaster recovery plan for the given scenario. Outline the following in your answer:
  • day of the week, the backup is taken
  • type of backup (full, incremental, differential)
  • time of backup
  • tape drive label and
  • storage location
  • restore details – state what is required for a system restore in case if a disaster occurs.
  1. Using the scenario, outline a backup service-level agreement (SLA) for the company. Describe the policies and procedures for deleting, restoring and archiving files. Consider the following and include in the SLA:
    • what will be backed up
    • regularity of the backup
    • response times for recovering data
    • whether you can recover all data
    • whether you can guarantee the reliability of data after a particular time
    • whether you can guarantee the latest copy of data
    • how users can contribute to a successful backup.

Part 4: Perform a backup and restore under supervision

Scenario

You are working for an IT company and have been assigned to implement a system backup and restore for a client.

Your first step is to meet with the supervisor to clarify requirements before starting each task. Book an appointment with your teacher to complete this step.

The meeting will be conducted using a web meeting platform such as Skype or Zoom. Your teacher will provide you with instructions on how to access the meeting and will take you through a few steps before you begin to enable you to turn on and adjust your microphone appropriately. Make sure the meeting is recorded.

You are also required to capture screenshots using the snipping tool, for each task you complete below for this assessment.

Refer to the checklists to see the skills that you need to demonstrate.

The first part of the checklist has the tasks that need to be performed. In this part you will demonstrate your skills in carrying out the required tasks.

The second part of the checklist assesses your oral communication skills demonstrated during the meeting role play with your client (teacher).

1. Perform a backup and restore procedure using a test environment

Instructions:

Meeting role play (oral communication skills)

  • Before you begin each task, you must have a meeting with your client (teacher) to clarify the requirements of the task.
  • During the meeting make sure you:
    • Confirm the client’s requirements for the backup and restore.
    • Ask appropriate questions to clarify the task requirements.
    • Use clear and appropriate language including specific and relevant technical terms suitable for the client.
    • Use appropriate listening and questioning techniques to confirm understanding of the requirements of the task.

Demonstration task

  • Use the virtual machine you set up at the beginning of this assessment.
  • Use the snipping tool to take step-by-step screen shots of the demonstration tasks listed below. Ensure all screenshots capture the entire virtual machine window which shows the virtual machine name along with the date and time at the bottom.

Email task

  • When you have completed the tasks email your supervisor (teacher) to confirm that you have satisfactorily met the requirements.

Demonstration tasks

Task completed (Tick if done)

1. Find out the total size of the class-files directory located at the top of the directory structure.

a. What is the absolute pathname of class-files: __________

b. What is the size of the class-files directory________

Include step-by-step screenshots of this activity here:

2. Perform a backup of the class-files directory into the /backup directory.

To do this, create a compressed archive of class-files and all its contents.

The compressed archive should be named class-files.tar.bz2 and should be created inside the /backup directory.

Include step-by-step screenshots of this activity here:

3. Check if the backup was created successfully in the /backup directory.

Include step-by-step screenshots of this activity here:

4. Delete the original class-files directory including all its contents from the system.

Include step-by-step screenshots of this activity here:

5. Restore the class-files directory to its original location.

Include step-by-step screenshots of this activity here:

6. Check if the class-files directory was successfully restored.

a. What is the total size of the class-files directory? ____________

b. Is it the same as documented in Question 1a? ______________

Include step-by-step screenshots of this activity here:

Oral communication skills

Task completed (Tick if done)

7. Ask questions to clarify task requirements with the client

8. Uses listening and questioning techniques to confirm understanding

9. Confirms task requirements with the client

10. Articulates information clearly using specific and relevant technical language suitable to the client

2. Backup/Restore record

As per company guidelines, the form below needs to be filled out to record the completed restore.

Backup / Restore procedure

Date:

Test performed by:

Objects recovered:

Test performed in a test environment

YES ☐

NO ☐

Test result

Successful ☐

Unsuccessful ☐

Recommendations:

Diploma Universities Assignments

Laureate International Universities Assignment

Holmes Institute Assignment

Tafe NSW

Yes College Australia

ACC508 Informatics and Financial Applications Task 2 T2, 2019

ACC512 Accounting

ACC520 Legal Regulation of Business Structures Semester 2, 2019

ACCT20074 Contemporary Accounting Theory Term 2 Assessment 3

AERO2463 Computational Engineering Analysis : Assignment 4

B01DBFN212 Database Fundamentals Assessment 1

BE01106 - Business Statistics Assignment

BFA301 Advanced Financial Accounting

BFA504 Accounting Systems Assessment 3

BSB61015 Advanced Diploma of Leadership and Management

BSBADV602 Develop an Advertising Campaign

BSBCOM603 Plan and establish compliance management systems case study

BSBCOM603 Plan and establish compliance management systems Assessment Task 1

BSBCOM603 Plan and establish compliance management systems Assessment Task 2

BSBCOM603 Plan and establish compliance management systems Assessment Task 3

BSBFIM501 Manage Budgets And Financial Plans Assessment Task 1

BSBHRM602 Manage Human Resources Strategic Planning

BSBINM601 Manage Knowledge and Information

BSBWOR501 Assessment Task 3 Plan Personal Development Plan Project

BSBMGT517 Manage Operational Plan

BSBWHS521 Ensure a Safe Workplace For a Work Area

BSBWRK510 Manage employee relations

BUSS1030 Accounting, Business and Society

CAB202 Microprocessors and Digital Systems Assignment Help

CHC40213 Certificate IV in Education Support

CHCAGE001 Facilitate the empowerment of older people

CHCAGE005 Provide support to people living with dementia

CHCCCS023 Support independence and wellbeing

CHCCCS025 Support relationships with carers and families

CHCCOM005 Communicate and CHCLEG001 Work Legally Ethically

CHCDIS002 Follow established person-centred behaviour supports

CHCECE019 Early Childhood Education and Care

CHCHCS001 Provide home and community support services

COMP10002 Foundations of Algorithms

COMP90038 Algorithms and Complexity

COSC2633/2637 Big Data Processing

COSC473 Introduction to Computer Systems

CPCCBC5011A Manage Environmental Management Practices And Processes In Building And Construction

CPCCBC5018A Apply structural Principles Medium rise Construction

CSE3OSA Assignment 2019

ELEC242 2019 Session 2

ENN543 Data Analytics and Optimisation

ENN543 Data Analytics and Optimisation Semester 2, 2019

FINM202 Financial Management Assessment 3 Group Report

Forensic Investigation Case Assignment ECU University

HA2042 Accounting Information Systems T2 2019

HC1010 Holmes Institute Accounting For Business

HC2112 Service Marketing and Relationship Marketing Individual Assignment T2 2019

HC2121 Comparative Business Ethics & Social Responsibility T2 2019

HI5002 Holmes Institute Finance for Business

HI5003 Economics for Business Trimester 2 2019

HI5004 Marketing Management T1 2020 Individual Report

HI5004 Marketing Management T1 2020 Group Report

HI5004 Holmes Institute Marketing Management

HI5014 International Business across Borders Assignment 1

HI5014 International Business across Borders

HI5017 Managerial Accounting T2 2019

HI5017 Managerial Accounting T1 2019

HI5019 Tutorial Questions 1

HI5019 Strategic Information Systems for Business and Enterprise T1 2020

HI5019 Holmes Institute Strategic Information Systems T2

HI5019 T2 2019

HI5019 T1 2019

HI5020 Corporate Accounting T3 2019

HI5020 Corporate Accounting T2 2019

HI6005: Management and Organisations in a Global Environment

HI6006 Tutorial questions

HI6006 Competitive Strategy Individual T1 2020

HI6006 Holmes Institute Competitive Strategy

HI6006 Competitive Strategy T3 2019

HI6007 Statistics for business decisions

HI6007 Assessment 2 T1 2020

HI6007 T1 2019

HI6008 T2 2019

HI6008 Holmes Institute Research Project

HI6025 Accounting Theory and Current Issues

HI6026 Audit, Assurance and Compliance Assignment Help

HI6026 Audit, Assurance and Compliance

HI6027 business and corporate law tutorial Assignment T1 2021

HI6027 Business and Corporate Law T3 2019

HI6027 Business and Corporate Law T2 2019

HI6028 Taxation Theory, Practice and Law T2 2021

Hi6028 taxation theory, practice and law Final Assessment t1 2021

HI6028 Taxation Theory, Practice and Law T2 2019

HI6028 Taxation Theory T1 2019

HI6028 Taxation Law Holmes

HLTAAP001 Recognise healthy body systems

HLTWHS002 Follow safe practices for direct client care

HOTL5003 Hotel Property and Operations

HPS771 - Research Methods in Psychology A

HS2021 Database Design

ICTICT307 Customise packaged software applications for clients

IFN619 Data Analytics for Strategic Decision Makers

INF80028 Business Process Management Swinburne University

ISY2005 Case Assignment Assessment 2

ISYS326: Information Systems Security Assignment 2, Semester 2, 2019

ITAP3010 Developing Data Access Solutions Project

ITECH1103- Big Data and Analytics – Lab 3 – Working with Data Items

ITECH1103- Big Data and Analytics Assignment Semester 1, 2020

ITECH 5500 Professional Research and Communication

Kent Institute Australia Assignment

MA5830 Data Visualisation Assignment 2

MGMT7020 Project Management Plan

Mgt 301 Assessment 3

MGT215 Project Management Individual Assignment

MIS102 Data and Networking Assignment Help

MITS4002 Object Oriented Software Development

MITS5002 Software Engineering Methodology

MKT01760 Tourism Planning Environments Assessment 4

MKT01760 Tourism Planning Environments

MKT01906 International Tourism Systems

MKT5000 Marketing Management S2 2019

MNG03236 Report Writing SCU

MRE5003 Industrial Techniques In Maintenance Management Assignment 4

MRE5003 Industrial Techniques In Maintenance Management Assignment 3

MRE5003 Industrial Techniques In Maintenance Management

Network Security and Mitigation Strategies Answers

NIT2213 Software Engineering Assignment

NSB231 Integrated Nursing Practice Assessment Task 1

Science Literacy Assessment 4

SIT323 Practical Software Development T 2, 2019

SIT718 Using aggregation functions for data analysis

SITXCOM002 Show Social and Cultural Sensitivity

TLIL5055 Manage a supply chain

TLIR5014 Manage Suppliers

USQ ACC5502 Accounting and Financial Management

UTS: 48370 Road and Transport Engineering Assessment 2

CHCAGE001 Facilitate the empowerment of older people

CHCAGE005 Provide support to people living with dementia

CHCCCS011 Meet personal support needs

CHCCCS015 Provide Individualised Support

CHCCCS023 Support independence and wellbeing

CHCCCS025 Support relationships with carers and families

CHCCOM005 Communicate and work in health or community services

CHCDIS001 Contribute to ongoing skills development

CHCDIS002 Follow established person-centred behaviour supports

CHCDIS003 Support community participation and social inclusion

CHCDIS005 Develop and provide person-centred service responses

CHCDIS007 Facilitate the empowerment of people with disability

CHCDIS008 Facilitate community participation and social inclusion

CHCDIS009 Facilitate ongoing skills development

CHCDIS010 Provide person-centred services

CHCDIV001 Work with diverse people

CHCHCS001 Provide home and community support services

CHCLEG001 Work legally and ethically

CHCLEG003 Manage legal and ethical compliance

HLTAAP001 Recognise healthy body systems

HLTAID003 Provide First Aid

HLTHPS007 Administer and monitor medications

HLTWHS002 Follow safe work practices for direct client care

Assignment 2 Introduction to Digital Forensics

MGT603 Systems Thinking Assessment 1

MGT603 Systems Thinking Assessment 2

Hi5017 Managerial Accounting T1 2021

HI6028 Taxation Theory, Practice and Law T1 2021

OODP101 Assessment Task 3 T1 2021

ITNE2003R Network Configuration and Management Project

Australia Universities

ACT

Australian Catholic University

Australian National University

Bond University

Central Queensland University

Charles Darwin University

Charles Sturt University

Curtin University of Technology

Deakin University

Edith Cowan University

Flinders University

Griffith University

Holmes Institute

James Cook University

La Trobe University

Macquarie University

Monash University

Murdoch University

Queensland University of Technology

RMIT University

Southern Cross University

Swinburne University of Technology

University of Adelaide

University of Ballarat

University of Canberra

University of Melbourne

University of Newcastle

University of New England

University of New South Wales

University of Notre Dame Australia

University of Queensland

University of South Australia

University of Southern Queensland

University of Sydney

University of Tasmania

University of Technology Sydney

University of the Sunshine Coast

University of Western Australia

University of Wollongong

Victoria University

Western Sydney University

Year 11 - 12 Certification Assignment

Australian Capital Territory Year 12 Certificate

HSC - Higher School Certificate

NTCE - Northern Territory Certificate of Education

QCE - Queensland Certificate of Education

SACE - South Australian Certificate of Education

TCE - Tasmanian Certificate of Education

VCE - Victorian Certificate of Education

WACE - Western Australia Certificate of Education

citation generator
citaion generator
make money online