Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

project 1

3/25/24, 9:24 PM Assignment Information

1/4

IT 200 Project One Technology Hardware and Software Guidelines and Rubric

Competency

In this project, you will demonstrate your mastery of the following competency:

Describe the technologies, hardware, and software used within the information technology �eld

Scenario

You are working as a contracted information technology specialist. You have been contacted by James Otis Tax Associates, a small tax preparation company. The company is growing rapidly

and is opening a new of�ce. They are focused on hiring and retaining the best in the �eld, and they believe that one way to do this is to provide every employee with the appropriate tools and

technology they need to effectively complete their work. Your company has been asked to provide its expertise in identifying the technology components needed for the computer systems and

network for the three employees in the new of�ce. They would also like you to address the security needs of the various employees.

Directions

The manager at James Otis Tax Associates has asked you to submit a report describing the technology hardware and software needed to build a computer network for the new of�ce. The

manager has asked you to describe the computer system for each new employee, including an explanation of the purpose for each selected technology component, and to identify speci�c

software programs that the employees would need. He has also asked you to describe the security measures needed to support the systems. In your explanation, include how your knowledge

of human-computer interaction (HCI) impacted your choices for each component.

The manager has provided the following employee descriptions:

Certi�ed Public Accountant (CPA): The CPA is a senior position at a tax preparation company. The CPA will be not only handling sensitive customer data from personal tax returns but

also preparing tax returns for corporate clients. The CPA is also responsible for the personal tax returns �lled out by the tax and data-entry specialist employees.

Tax Specialist: The tax specialist has the dual role of entering data and verifying that tax returns are correct. This position involves customer interaction in gathering data for minimizing

taxes owed or maximizing tax refunds.



3/25/24, 9:24 PM Assignment Information

2/4

Data-Entry Specialist: This position requires data entry for personal tax returns for customers who walk in the door. Although the data-entry specialist works with sensitive customer

data, they do not have access to the tax returns once the returns are submitted to the tax specialist for review.

For each employee, you must:

Describe all hardware components, including peripherals, needed to create the systems

Identify speci�c software programs (more than one) that would be bene�cial to each identi�ed employee. Programs could include:

Operating systems

Applications such as:

Of�ce automation products

Security products

Describe security measures needed to support this system. Security measures could focus on:

Access

Administration and user passwords

Firewalls

Along with each description, explain the purpose of each technology component in each system. In your explanation, include how your knowledge of human-computer interaction (HCI)

impacted your choices for components.

Finally, choose a network topology that could be used to connect all of the new employees identi�ed by the manager. Create a Visio diagram to identify the networking equipment needed to

enable the work�ow between the employees.

What to Submit

To complete this project, you must submit the following:

Technology Needs Report

Your technology needs report should be 3–5 pages in length. For each of the new employees, you must describe all hardware components needed to create the system, identify speci�c

software programs that the employees would need, and describe security measures needed to support the systems. Along with each description, explain the purpose of each technology

component in each system. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for each component.

Network Diagram

You have also been asked to include a visual representation of the topology you selected and the network equipment needed to support interactions between these employees. Use Visio to

create a 1-page (or 1-slide) diagram that identi�es the networking equipment needed to enable the work�ow between these employees.

3/25/24, 9:24 PM Assignment Information

3/4

Supporting Materials

Technology Needs Template Word Document

This template can be used as a note-taking or organizational tool. You may submit it along with your report and diagram, but it is not a requirement and it will not be graded.

Project One Technology Hardware and Software Rubric

Criteria Exemplary (100%) Pro�cient (85%) Needs Improvement (55%) Not Evident (0%) Value

Hardware Components Exceeds pro�ciency in an

exceptionally clear, insightful,

sophisticated, or creative

manner

Describes all hardware

components, including

peripherals, needed to create

each system

Shows progress toward

pro�ciency, but with errors or

omissions; areas for

improvement may include

misestimating level of

equipment needed to �t the

needs of the system or missing

key hardware components

Does not attempt criterion 15

Software Exceeds pro�ciency in an

exceptionally clear, insightful,

sophisticated, or creative

manner

Identi�es speci�c software

programs that would be

bene�cial to each employee

Shows progress toward

pro�ciency, but with errors or

omissions; areas for

improvement may include

recommending software with

insuf�cient functionality or

outside of the norms for budget

and purpose

Does not attempt criterion 15

Security Exceeds pro�ciency in an

exceptionally clear, insightful,

sophisticated, or creative

manner

Describes security measures

needed to support each system

Shows progress toward

pro�ciency, but with errors or

omissions; areas for

improvement may include

thoroughness in descriptions

and security recommendations

Does not attempt criterion 15

Component Purpose Exceeds pro�ciency in an

exceptionally clear, insightful,

sophisticated, or creative

manner

Explains the purpose of each

technology component in each

system

Shows progress toward

pro�ciency, but with errors or

omissions; areas for

improvement may include

thoroughness in explanations

addressing each component

Does not attempt criterion 15

3/25/24, 9:24 PM Assignment Information

4/4

Criteria Exemplary (100%) Pro�cient (85%) Needs Improvement (55%) Not Evident (0%) Value

Human-Computer

Interaction

Exceeds pro�ciency in an

exceptionally clear, insightful,

sophisticated, or creative

manner

Explains how knowledge of

human-computer interaction

(HCI) impacted choices for

components

Shows progress toward

pro�ciency, but with errors or

omissions; areas for

improvement may include

thoroughness in explanations

addressing each component

and correct use of human-

computer interaction concepts

throughout the explanation

Does not attempt criterion 15

Network Components Exceeds pro�ciency in an

exceptionally clear, insightful,

sophisticated, or creative

manner

Identi�es all equipment needed

to create a functioning network

for the employees

Shows progress toward

pro�ciency, but with errors or

omissions; areas for

improvement may include

ensuring the size and scope of

the equipment match the needs

of the network and addressing

all key hardware components

Does not attempt criterion 15

Articulation of Response Exceeds pro�ciency in an

exceptionally clear, insightful,

sophisticated, or creative

manner

Clearly conveys meaning with

correct grammar, sentence

structure, and spelling,

demonstrating an

understanding of audience and

purpose

Shows progress toward

pro�ciency, but with errors in

grammar, sentence structure,

and spelling, negatively

impacting readability

Submission has critical errors in

grammar, sentence structure,

and spelling, preventing

understanding of ideas

5

Citations and Attributions Attributes sources where

applicable using citation

methods with very few minor

errors

Attributes sources where

applicable, but with consistent

minor errors

Attributes sources where

applicable, but with major

errors

Does not attribute sources

where applicable

5

Total: 100%

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Computer Science 2 Assignments

Operational Excellence Week 2 Assignment Information Systems for Business and Beyond Questions: · Chapter 3 – study questions 1-8, Exercise 2, 4 & 5 Information Technology and Organizational Learning Assignment: Chapter 3 – Complete the two essay assignments noted below:  · Review the strategic integration section.  Note what strategic integration is and how

Discussion 3: generative adversarial nets

  Generative adversarial nets are mentioned in 2014 by Ian Goodfellow et al.  Why is generative adversarial network a key turning point in the history of generative modeling? Why is the field of image generation important? 

Week 3 – Linear Regression & Business Decision Making

attached file.  An asset management company must replace the manager of its two signature mutual funds, who is about to retire. Two candidates have been short-listed. The management team is divided and cannot decide which of the two candidates would make the better mutual fund manager. The retiring manager presents

data science

Final Exam Due Saturday 11:59 pm (Week 15) You cannot use any of the datasets in our assignments, class notes, and your own midterm project. If you are using the same one, you will receive 0 for your final project. 1. Question Formulation (5 points): You need to devise a

Letter of Recommendations

Hi  Attached is the sample of Letter of recommendation  Please write about it accordingly  1. Write about author :AUTHOR WILL BE professor David Kimble I will give links about his Biography write accordingly or you can use your own search engines about him to write it. 2 . How the

Letter of Recommendations

Hi  Attached is the sample of Letter of recommendation  Please write about it accordingly  1. Write about author :AUTHOR WILL BE professor David Kimble I will give links about his Biography write accordingly or you can use your own search engines about him to write it. 2 . How the

data science

Final Exam Due Saturday 11:59 pm (Week 15) You cannot use any of the datasets in our assignments, class notes, and your own midterm project. If you are using the same one, you will receive 0 for your final project. 1. Question Formulation (5 points): You need to devise a

IT 202

5/15/24, 10:59 AM Assignment Information 1/3 IT 202 Project One Milestone Guidelines and Rubric Overview For the purposes of this assignment, imagine that you are a systems architect at a medium-sized publishing company with 130 employees. The company primarily publishes books, both in print and online. It also produces other

Assessments

Perimeter defense techniques Evaluate the types of assessments, select one that you might use, and explain why it is important. Of the top eight areas to research when conducting an assessment, select no less than three and explain how one should approach the research and why it should be approached

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

Week 2 understanding on Python.

PDF for reference purpose other file is requirement Python Installation & Examples Atif Farid Mohammad PhD 1. Open any Browser 2. Go to 3. Click at Download button 4. Go to your Download Folder (In both Windows and Mac) a. In Windows you will have the file: Anaconda3-2022.05-Windows-x86_64.exe b. Double

Computer Science Assignments

Operational Excellence Week 2 Assignment information Systems for Business and Beyond Questions · Chapter 2 – study questions 1-10, Exercise 2      Information Technology and Organizational Learning Questions · Chapter 2 – Note why the IT organizational structure is an important concept to understand.  Also, note the role of

Computer Science IT project assignment

Pg. 01 Project I Project Deadline: Sunday 12/5/2024 @ 23:59 [Total Mark is 14] Introduction to Database IT244 College of Computing and Informatics Project Instructions · You can work on this project as a group (minimum 2 and maximum 3 students). Each group member must submit the project individually with

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

coding

Assignment 6 Due Saturday 11:59 pm (Week 14) Part 1 (50 points) We will explore the Marvel Network Universe. The dataset which you will find in Blackboard consists of the hero’s networks. For this dataset, you will need to ask yourself 3 questions (i.e which superhero knows more superheroes?) ,

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

How hackers get info

Identify at least two ways in which hackers gather information about companies. What can companies do to limit this access, specifically to the ways you have identified? Which type of information can be gathered with enumeration? How and why should companies protect themselves against enumeration attempts?