Premium Essay

Computer Lab Plan

In:

Submitted By hersh
Words 4005
Pages 17
| Computer Lab PlanAssignment One | Hersh Gulati | 5/27/13 | Project Management | |

| Computer Lab PlanAssignment One | Hersh Gulati | 5/27/13 | Project Management | |

Executive Summary
Auckland University of Technology (AUT) is ranked in the top 500 universities of the world. The university has experienced a significant increase in the number of students enrolling in its Business and Law faculty over the years. Its Business and Management Studies was ranked as one of the top 200 in the world.
As a result, there has been an increasing requirement for using computer systems in all its faculties, including the non-technological subject areas. Due to the growth envisioned over the next five years, AUT has decided that it requires two new computer labs to accommodate its Business and Law faculty students.To meet this requirement, level 7 of WF building will be refurbished to accommodate the new computer labs, instead of the exisiting seven classrooms.
The renovation will be carried out as a 6 months long project commencing on 30th June 2015. Taking the Christmas and New Year’s holiday period into account, the project will be completed by 22nd December 2015, before the beginning of Term 1, 2016. The calculated budget for the project is $1.294 million, which includes 10% of contingency amount. The key deliverables for the project are: * Lab designs and architectural layouts for the computer labs * Two new computer labs
The major tasks that will be involved in the project are: * Refurbishment of existing classrooms * Acquiring furniture and equipment * Placement of furniture and hardware installation * Commissioning * Go Live
The outcome of this project will be that WF building will have a floor dedicated for computer labs, which will be beneficial for the Business and Lay faculty students. From AUT University’s

Similar Documents

Free Essay

It113 Project Scope

...that the company obtains a high performance network for a reasonable price. Project description MK Institute of Higher Learning is purposing a project with the description to network a classroom based floor. This floor will consist of three wings. Each wing accommodates one distribution closet, which must be interconnected to one another. Each wing also has eight classrooms and one computer lab. Classrooms will need 2 drops and the computer labs will need 44 drops, resulting in 60 drops in all per wing. The ISP connection will be entering from the north wing’s distribution room. The institute will also be requiring that a wireless access coverage to the central lobby area, allowing 100 users simultaneously, to be made possible. Also noting that the central lobby area consists of three solid supports, holding a 25’ ceiling. Major Deliverables * The networking of the MK Institute of Higher Learning. * Placing needed hardware. * Wiring the hardware and network. * Interconnecting distribution rooms. * 3 wings, each consisting of 8 classrooms = 16 drops, one computer lab = 44, and one distribution room. * Wireless central lobby allowing 100+ users simultaneously. * Fully functional Networking...

Words: 607 - Pages: 3

Premium Essay

Information Centre

...Computer Lab Rules & Regulations Swinburne University computing facilities may only be used by current Swinburne students and staff. Swinburne identity card must be presented upon request. The computing facilities should only be used for educational and research purposes. The following rules and regulations apply to all lab computers on campus. Lab Rules & Regulations 1. The computer lab provided by the University is solely for educational and research activities. Students are prohibited from using the lab for any other reasons. 2. Students must have a valid student ID card to use the computer labs. 3. Students must abide by all rules and regulations, such as those shown on booking sheets, computer screens, and notices near the computers or on the wall. 4. Two-hour Usage Rule: When the lab is full and students are waiting for a vacant computer, the two-hour rule will apply. Students will be limited to 2 hours on the computer per session. 5. All users must abide by the license requirements of any software or resources being used on the computer. 6. The downloading of non-coursework related materials is strictly prohibited on the campus network as it uses much of the network bandwidth, thus slowing down all internet access. 7. All personal data must be saved on a floppy disk, handy drive or on your Home drive. Do not save personal data on the computer hard drive. 8. Please be reminded to scan your handy...

Words: 484 - Pages: 2

Premium Essay

Rules

...Lab Rules & Regulations 1. The computer lab provided by the University is solely for educational and research activities. Students are prohibited from using the lab for any other reasons. 2. Students must have a valid student ID card to use the computer labs. 3. Students must abide by all rules and regulations, such as those shown on booking sheets, computer screens, and notices near the computers or on the wall. 4. Two-hour Usage Rule: When the lab is full and students are waiting for a vacant computer, the two-hour rule will apply. Students will be limited to 2 hours on the computer per session. 5. All users must abide by the license requirements of any software or resources being used on the computer. 6. The downloading of non-coursework related materials is strictly prohibited on the campus network as it uses much of the network bandwidth, thus slowing down all internet access. 7. All personal data must be saved on a floppy disk, handy drive or on your Home drive. Do not save personal data on the computer hard drive. 8. Please be reminded to scan your handy drive before use to reduce the risk of any virus outbreak. 9. The Management is not responsible for any loss of data or personal belongings regardless of the cause. 10. No moving or unplugging of any equipment in the labs. 11. No pornographic and offensive images & videos. 12. No games (both computer and physical). 13. No...

Words: 413 - Pages: 2

Free Essay

Transmittal Letter

...college of business were our focal point. Surveys were given to students with questions regarding financial hardships caused by laptop requirement and their opinions of the policy among others. Faculty was interviewed on their thoughts and how the policy helped with the classroom. Administration helped with the reasoning behind implementing the policy and some hints to phase outs of the computer labs located in the college of business. We found that students believed that the policy is not effective, but should be enforced. For faculty, some believe that the policy is helpful for learning and welcome laptops in the classroom while others feel that laptops can be a distraction to everyone. The administration implemented the policy because they want students to have the ability to work anywhere at any time with the specialized tools/software needed for courses taken. They also feel laptops are necessary for non-traditional students who may be full time professionals and have the option to complete courses online. Rumors that the laptop requirement was put into place because of possible computer lab phase outs are false, null, and void. To improve the effectiveness of the laptop requirement in the college of business, we recommend the following: * Making sure students/faculty are aware of the laptop requirement * Enforcing consequences for those who don’t have a laptop Thank you for welcoming our concerns and suggestions through this project. We learned a great deal and...

Words: 314 - Pages: 2

Free Essay

Man U

... | - First Come First Serve basis (PJ Campus- 300 students) - First Come First Serve basis (Gombak Campus- 100 students) (EXAMINATION WILL BE HELD IN THE MIDDLE OF THE YEAR 2012) DATE OF M.U.E.T REGISTRATION AS FOLLOWS: |DATE |DAY |TIME |VENUE | |22/03/2012 |Thursday |8:30 AM - 12:30 NOON 2:00 PM - 3:30 PM |MULTI PURPOSE LAB A | | | | |(PJ campus) | |23/03/2012 |Friday |8:30 AM - 12:00 PM | | | | |2:45 PM – 3:30 PM | | |DATE |DAY |TIME ...

Words: 577 - Pages: 3

Free Essay

Game Vending Machine

...return games. Triggering Event: Customers use their Debit/Credit card for games rental, which is charged by Acme’s Bank. Brief Description: Customers enter requirement information and swipe a valid card for games rental. Actors: Customers, Acme’s Bank, and Central computer system of Acme headquarters. Related Use Cases: None. Stakeholders: Security department. Preconditions: System is in stand by mode and ready to perform. Postconditions: System is in performance mode (1 or 2 minutes) before turn to stand by mode. Flow of Events: Actor System 1. Customers choose games through vending machine 2. Customers enter information and pay by a valid card. 3. Acme’s Bank check and charge for rental 4. Acme’s computer system organizes and save customers’ information. 5. Customers return games at vending machine. 6. Customer received a receipt and additional charge via e-mail. 1. Acme’s bank is received customers’ information from vending machine. 2. Acme’s computer system is received customers’ information from vending machine. 3. Vending machine dispended games after customers’ information are approved. 4. Machine received returned games from customers. 5. Information sent to Acme’s bank and Acme’s central computer system. 6. A receipt e-mail to customers for a final charge. Exception Conditions: Bar code reader is error (step 5, actor), lost of internet connection (step 1). Machine errors (step 4) (games are not dispensed, or received). These errors cause customer...

Words: 260 - Pages: 2

Premium Essay

Cda Tab B

...Tab D * CS II – Resource Collection Items RC II-1     Science/Sensory RC II-2     Language and Literacy RC II-3     Creative Arts RC II-4     Fine Motor (choose an indoor activity) RC II-5     Gross motor (choose an outdoor activity) RC II-6     Self Concept RC II-7     Emotional Skills/Regulation RC II-8     Social Skills RC II-9     Mathematics Age Group: Preschool 4-5yrs | | | | | RC II | Description: | Intended Goals: | Materials: | Teaching Process: | 1     Science/Sensory | | | | | 2     Language and Literacy | | | | | 3     Creative Arts | | | | | 4     Fine Motor (choose an indoor activity) | Making a necklace: Threading beads on a precut piece of yarn. | Threading at least 10 beads on precut piece of yarn. | Precut yarnSeveral colorful big beads for 3-5yr already in small containers per child | Pre-made necklace for example.Show & tell work. Hold yarn and place bead on yarn.Then continue activity with children. | 5     Gross motor (choose an outdoor activity) | Playing Sam Says, which is the same as Simon says. | To follow directions of what Ms. Sam is saying to do and to listen careful because I will try to trick them. | Open space and Myself. | First, space the children out to give each arm room. 2ndly, I will explain the game and show example. Ex: Ms. Sam says touch your ear and I touch my ear. Then I say Ms. Sam rub her head and I rub my head and I say stop but I keep rubbing my head because I didn’t say Ms. Sam… | 6    ...

Words: 263 - Pages: 2

Premium Essay

Unit 1 Labs

...Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are applied to various types of enterprises. * Draw the four...

Words: 16182 - Pages: 65

Premium Essay

Police Abuse Essay

...GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are applied to various types of enterprises...

Words: 16043 - Pages: 65

Premium Essay

Diploma

...(Subject to pre-arrangement only) COURSE OBJECTIVE This course is a comprehensive introduction to the realm of Principles of Information Technology. This is an introductory module to the current and evolving technologies in today’s computer systems. It introduces information technology concepts and principles. This module explains major components of information systems and demonstrates applications of information systems in business. Students are provided with sophisticated knowledge and necessary skills of information technology. Principles of Information Technology is a course that will provide students with computer skills necessary to be successful in “real world” personal and business situations. Students will use Microsoft Office to learn word processing, desktop publishing, presentation software, spreadsheets, and databases. COURSE OUTCOMES On completion of the course, students will be able to: 1. Demonstrate an understanding of basic information technology concepts and principles 2. Describe major components of information systems 3. Discuss business applications of information systems 4. Use Office application software and apply the computer skills effectively METHODS OF TEACHING Lectures and tutorials/lab practices INSTRUCTIONAL MATERIALS Major Reference Texts: |Author |Date |Title/ISBN |Publisher | |Gary B. Shelly and Misty|2009...

Words: 1347 - Pages: 6

Premium Essay

Introduction to Networking

...GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are applied to various types of enterprises...

Words: 16043 - Pages: 65

Free Essay

Network Research Proposal

...cultural knowledge to the growing student population UMUC has recently purchased an building and is moving forward with the plan to utilize it as a computer education and lab facility. The building is named as “ Library and Communication Center”. Establishment of this facility will provide the current and future students and faculty members to gain and impart computer knowledge in an environment that is technologically proficient in meeting the demands of the ever-increasing computer skills. The purpose of this document is to identify the requirements, develop an overall design and specifications for the Library and Communication Center to be completely functional. Proposed Topology Select one or more topologies to use for this design. This section should be used to provide details of the selected infrastructure or equipment. Include the model, manufacturer, features, and cost. In order to develop a good network layout plan, we have to first understand the layout of the building. The Library and Communication Center is a 50-year-old building. The specifications of the building is as follows: Area | Measurements | Length | 240 ft | Width | 90 ft | Height | 30 ft | The layout of the building is designed to provide the optimum use of the facility in the following way: 1st Floor | 2nd Floor | | | Computer Lab (Room 1,2,4) | Computer Lab (Room 1,2,5) | Server Room (1 server room) | Server Room (1 server...

Words: 1674 - Pages: 7

Premium Essay

Instructional Design Plan: Introduction to Internet Explorer

...[pic] ACME Global Transportation Company Corporate Training Department Instructional Design Plan: Introduction to Internet Explorer Instructional Designer: James Smith Scenario The accounting division of ACME Global Transportation has recently implemented an Intranet that is to be used by the supervisory staff to access the new web based version of the corporate Human Resource Management System (HRMS). The new system is being phased in over a 90-day period. The supervisors are tasked with entering on-line, on a weekly basis, the regular and over-time hours worked by their staff. They are also supposed to print out a report of the hours that they have entered, and submit this to the manager of the department in which they work. They also have the option of sending the report to the manager via e-mail. The HRMS system is accessed via the corporate standard browser, Internet Explorer (IE). Thirty days into the implementation of the new HRMS package, the payroll manager has complained to the I/T director that the hours worked by staff are not being accurately captured. The department managers have also complained that they are not getting their payroll reports on a timely basis from their supervisors. A meeting was held to discuss the problems with the new version of the HRMS system. In attendance was the I/T team responsible for the HRMS project as well as the department managers...

Words: 3947 - Pages: 16

Free Essay

Replication Management

...LAB 4 WORKSHEET WORKING WITH ACTIVE DIRECTORY SITES This lab contains the following exercises: Exercise 4.1 Replication Management Exercise 4.2 Preparing Your Infrastructure Exercise 4.3 Configuring a Site Exercise 4.4 Configuring a New Subnet Exercise 4.5 Moving Computers and Creating Site Links Post-Lab Cleanup Estimated lab time: 100 minutes Exercise 4.1 Replication Management Overview Now that you have added a new domain controller to the Domain99.Local domain, you want to ensure replication is occurring properly. You have reviewed the replication error messages in the Event Viewer Directory Service log and identified some errors that you are anxious to resolve. First, you plan to force replication. Then, you plan to create a manual connection object. Finally, you will use repadmin to troubleshoot any further problems. Completion time 60 minutes  PART A: Forcing Replication Question 1 What is the name of the site that was created by default when you installed the Active Directory Domain Services role?Default –first-site-name Question 2 What servers are listed within this folder? Server2 Question 3 What connection objects are configured in this folder? Automatically generated from Server2  PART B: Managing Connection Objects Question 4 Forcing replication on the new connection object was described in the previous section. How can you tell which connections are the automatically generated connections and which ones have been...

Words: 804 - Pages: 4

Premium Essay

Security Policies and Implementation Week Four Lab

...------------------------------------------------- Sara ------------------------------------------------- 10/11/2014 ------------------------------------------------- Week 4 Laboratory: Part 1 Part 1: Identify Necessary Policies for Business Continuity - BIA & Recovery Time Objectives Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Identify the major elements of a Business Continuity Plan (BCP) * Align the major elements of a Business Continuity Plan with required policy definitions * Review the results of a qualitative Business Impact Analysis (BIA) for a mock organization * Review the results of defined Recovery Time Objectives (RTOs) for mission-critical business functions and applications * Create a BCP policy defining an organization’s prioritized business functions from the BIA with assigned RTOs Week 4 Lab Part 1: Assessment Worksheet (PART A) Sample Business Impact Analysis for an IT Infrastructure Overview When conducting a BIA, you are trying to assess and align the affected IT systems, applications, and resources to their required recovery time objectives (RTOs). The prioritization of the identified mission-critical business functions will define what IT systems, applications, and resources are impacted. The RTO will drive what type of business continuity and recovery steps are needed to maintain IT operations within the specified time...

Words: 1852 - Pages: 8