Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

You must have Computer Networking experience

I need to complete an ACS (Australian Computer Society) RPL (Recognition of Prior Learning) assessment for the ANZSCO code of 263111 Computer network and systems engineer.

I want someone to complete the RPL assessment document for me.

In this document there are two sections that all applicants must complete -

• The Key Areas of Knowledge - Section 1
• The Project Report Forms - Section 2

RPL applications are for those applicants who do not hold a recognised tertiary ICT qualification and who have a minimum of 6 years of closely related experience. Please refer to the Summary of Criteria for further information.

This document provides the opportunity for applicants to demonstrate knowledge learnt throughout their professional experience.

SECTION 1 - KEY AREAS OF KNOWLEDGE

INFORMATION ABOUT THE AREAS OF KNOWLEDGE

Please read the following document to assist you in completing Section 1 of this document -The ACS Core Body of Knowledge for ICT Professionals (CBOK).

Applicants must detail the relationship between the selected Areas of Knowledge and their learning from their experience and qualifications. This section of the RPL application needs to be specific as to how and where the applicant has acquired the knowledge.

The ICT Key Areas of Knowledge:

Essential Core ICT Knowledge

Topic 1. ICT Professional Knowledge

Sub Topics are -

a. Ethics
b. Professional Expectations
c. Teamwork Concepts and Issues
d. Communication
e. Societal Issues

Topic 2. ICT Problem Solving

Sub Topics are -

a. Modelling Methods
b. Processes to understand problems
c. Methods and tools for handling abstraction

General ICT Knowledge

Topic 3. Technology Resources

Sub Topics are -

a. Hardware and Software Fundamentals
b. Data and Information Management
c. Data Communications and Networking

Topic 4. Technology Building

Sub Topics are -

a. Human Factors
b. Programming
c. Information Systems Development and Acquisition

Topic 5. ICT Management

Sub Topics are -

a. IT Governance and Organisational Issues
b. IT Project Management
c. ICT Service Management
d. Security Management

You are required to select one topic from the Essential Core ICT Knowledge (Topic 1 or Topic 2) and one topic from the General ICT Knowledge (Topic 3, Topic 4 or Topic 5). Please ensure you address at least 2 subtopics from each of the topics chosen. In the following expandable typing areas, explain how you have acquired your in-depth knowledge in these topic areas through your professional experience.

Important:

• Identify the Area of Knowledge topic that you have chosen to explainby entering the name of the Area of Knowledge topic in the box.

• Explain, in the expandable typing area, how you have acquired the knowledge and illustrate the depth of thatknowledge.

• You should NOT address all sub topics included in the Area of Knowledge in your explanation. Address at leastTWO of the sub topics. Enter the sub topic name(s) in the box.

• Be clear and concise in your explanation.

• Limit each explanation to no more than one to one and a half pages.

Essential Core ICT Area of Knowledge:[Enter topic and 2 subtopic names relating to the chosen area]

How have you acquired this knowledge in your working environment? Illustrate your depth of knowledge.

[EXPANDABLE TYPING AREA]

General ICT Area of Knowledge:[Enter topic and 2 subtopic names relating to the chosen area]

How have you acquired this knowledge in your working environment? Illustrate your depth of knowledge.

[EXPANDABLE TYPING AREA]

SECTION 2 - RPL PROJECT REPORTS

A project report is a coherent written description of a project or engagement that provides you with the opportunity to show how you perform as an ICT Professional. Each report is to relate to a significant project or work episode undertaken by you during your professional career.

The purpose of these reports is to enable you to demonstrate your command and implementation of the Areas of Knowledge described in Section 1 of this application.

Please note: You are required to provide two project reports.

Of the two reports, one must pertain to a project undertaken within the last three years, and the other for a project within the last five years.

Projects over two years long may be used for both reports under either of the following conditions:

• The project has clearly-defined work efforts which took place in parallel, each with their own solution development and design activities and their own deliverables.

• The project had clearly-defined phases that were executed in succession, each with its own solution development and design activities and deliverables. Note that a second project phase that constructs and implements the solution developed by the first phase does not meet this requirement.

Depending on the nature of your role in each project, the Project Report should cover an appropriate selection of factors. Appropriate factors will be determined based on the type of ICT project selected. Possible factors include:

• System Analysis and Design and Software Engineering methodologies used;

• Contribution to the processes involved in the design and implementation of enterprise-wide computing systems;

• Programming languages, design paradigms and implementation procedures adopted;

• Database and/or file design and management techniques employed;

• Network topologies, including size, distribution and security facilities installed;

• Project Management and quality assurance techniques followed;

• Internet application design, including database interactivity and security measures implemented;

• ICT managerial activities, demonstrating the nature and extent of responsibilities

Project Summary:

Project Name Start Date End Date
Project 1 mm/yy Mm/yy
Project 2 mm/yy Mm/yy

Instructions

The following pages provide a template for your reports.

When writing your reports please provide your own thoughts - do not just copy project documentation.

Please use the first person in your discussion, so it is clear to the assessor what you did versus what others did - say "I did X" rather than "X was done".

Diagrams from the project documentation may be helpful, but the text should be in your own words. Please ensure that diagrams are relevant, readable, and help the assessor to understand what you did as a member of the project team.

If sections of the Project Report template (see below) are not relevant to your participation in the project, then leave the section blank.

Focus on quality rather than quantity.Each Project Report should be no more than four or five pages in length.

SPECIAL NOTE:

By submitting this RPL Knowledge and Project Report form as a component of your ACS skills assessment application, you agree with the following statement:

The applicant confirms that the explanation of their knowledge and project reports submitted in this application truthfully and accurately describe the applicant and the applicant's personal involvement in the projects. The applicant is aware that plagiarism by the applicant will automatically invalidate this application, will jeopardise any future applicationsfrom the applicant and will be reported by the Australian Computer Society to the Australian Department of Immigration and Border Protection.

Attachment:- ACS-Project-Report-Form-2014.rar

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91877439

Have any Question?


Related Questions in Computer Network & Security

1 a firms marginal rate of technical substitution at m p lm

1) A firm's marginal rate of technical substitution at M P L/M P = 3, and the ratio of prices of labor and capital ,w/r, is 4. a) Is the firm minimizing its cost? Why or Why not? b) What can it do to improve its situatio ...

Wireless networks and security assignment - design and

Wireless Networks and Security Assignment - Design and implementation of secure enterprise wireless network Purpose of the assessment - The purpose of this assignment is to design and implement a secure enterprise wirele ...

Question what is active threat in terms of network security

Question: What is active threat in terms of network security? Provide an example. The response must be typed, single spaced, must be in times new roman font (size 12) and must follow the APA format. Note: minimum 300 wor ...

About rsa please answer the following questionsa suppose

About RSA, please answer the following questions. (a) Suppose p=11 and q=7. What is ? (n), where n=p?q? (b) If the public key e is 11, find the private key d. (c) If the ciphertext is 4, what is the plaintext? (d) For en ...

The software company niksoft is selling a new defense

The software company NikSoft is selling a new defense against DDoS attacks. Their software looks at the source IP address on all incoming packets, and if it finds any IP address that accounts for more than 1% of traffic ...

Overview of network security assessment - security

Overview of Network Security Assessment - Security Challenges in Emerging Networks Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be ab ...

In a short paragraph explain the transmission of data for a

In a short paragraph, explain the transmission of data for a TCP connection between a client computer and a web server to request a web page. Assume that the server responds with a web page that fits in one packet. Assum ...

Metasoft ltd is a software development company which works

MetaSoft Ltd is a software development company which works across Australia and New Zealand. The company is considering the following strategic proposal: - They plan to close down the Melbourne data centre rather than up ...

If a firms total cost function is given byt c

If a firm's total cost function is given byT C= 115,000Q-500Q2+Q3, what range of output does the firm have economies of scale?

It networking assignment - networking project areamajor lab

IT Networking Assignment - Networking Project Area Major Lab Scenario - Instructions This lab has a time limit of one term The lab must be completed by individual students, and the completed assessment returned to the as ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As