Appendix A: Capstone Project

Project Description
Five doctors decide to form a partnership and to consolidate their businesses to leverage their investments and provide better service to their patients. Each of the existing five offices will remain intact. There is one located in the center of the city, one in the north, another in the south, and the remaining two on the east and west sides. Each of the lead doctors would like to be able to see their patients at any of the sites, and access any of their patients¶ information from any of the sites. The doctors¶ offices can be open 6 to 14 hours per day (7 a.m.-9 p.m.), depending on when the doctors are in. Currently, all of the offices use dated personal computers that are not capable of accommodating certain modern medical insurance and information applications, nor can they support the processing demand of specific digital images of medical graphics. Dot matrix printers with proprietary software that date back to 1986 are still used to manage the patients¶ information. These computer systems (hardware as well as software) will need to be upgraded and the existing data will need to be transferred into the new computer system. The office in the center of the city has a local area network (LAN) in the building; however, it will require upgrades in software and hardware because all the equipment, including the server and personal workstations as well as network devices for the LAN, are all very dated. The upgrades will ensure the system capability and capacity that can provide a centralized solution to the data storage and management for the new partnership among all the five offices as well as meeting the additional information and communications needs for the distributed nature of the new partnership. Therefore, this office will be the official central office that handles all the data communications for the entire business. Patient information and major services such as billing and insurance will be hosted in this location for access by all sites. Currently a Novell 4.5 server provides the network services (mainly for files, printing, and backup functions) between the server and all the existing workstations running Windows 98. Currently the entire building has two PCs in the front, one in the nurses¶ office and one in the supervisor¶s office, which is shared by the office supervisor and the billing manager. Currently, both the East and West offices also have an identical LAN that interconnects the PCs in a peer-to-peer mode on each site. Because those two doctors used to be in some kind of partnership, they have been using a shared billing and insurance management software application installed on a low-end SCO Unix machine located in Appendix A: Capstone Project
©ITT Educational Services, Inc. 57 Date: 01/12/2010

the West office with directly attached terminals on its site and a remote terminal in the East office connected through a legacy point-to-point dedicated circuit. These machines are outdated and need to be replaced. Recently some work has been done to fix the network connectivity problems between the two offices in preparation for replacement of the SCO machine and terminals. It is believed that this fix would allow the network connection between the two sites to be capable of the Internet services. Both the North and South offices are equipped with standalone personal computers of different ages. No networking capability exists within and between the sites. Each site has a dedicated computer that handles the billing and insurance using a 56Kbps modem.

Each office keeps patient information and other related data on several personal computers scattered in the offices, and all patients¶ records are manually filed with the hardcopy printouts the in the old fashion. Each computer in both offices has a locally attached low-end printer.

Growth Expectations
The doctors expect their business to grow. By the end of the project, they expect to have added four more doctors and a proportional number of nurses to the staff (for the entire partnership), as well as an office manager overseeing all the administrative operations of all offices. They are also planning to sponsor internships for new doctors and nurses. They are not sure about the number of interns per year, but current thoughts are to limit it to one of each per quarter. The doctors have concerns and need guidance regarding technology, maintenance, upgrades, and warranties. Some thoughts for the future are the use of wireless laptops and PDAs for use of viewing records during a patient visit, Voice-over-IP phones among offices and possibly to the external to reduce cost in their telephony, and dictation devices so the patient visits are transcribed. They are also not sure when to upgrade or what hardware/software warranties they need. They are expecting the winning technology consulting firm will provide a solution that can address their needs in such a way that the merger of the five offices can take place without slowing down the current service at any location.

Security, Disaster Recovery, Risk Analysis
The doctors are not sure about security requirements. However, they know they must provide physical security in addition to complying with the current HIPAA laws. Currently, the only machine backed up is the Novell server in the central office. A backup to tape is performed once a week. After the backup is completed, the administrative assistant takes the tape home with the thought of returning it if it is required. To date, they have had a few instances when certain data needed to be restored, which caused the office at least half a day to get the lost data back. With the new partnership, all doctors realize this aspect will have to be more effective and efficient. Additionally, as the management of patient information is going to be centralized, each site needs to be able to see patients even if the main network connectivity between the Appendix A: Capstone Project
©ITT Educational Services, Inc. 58 Date: 01/12/2010

offices is temporarily lost. That means the doctors would like some redundant connectivity available. They would like to see a solution that will allow access to a replicated copy of the patient information hosted in a hot standby server located outside of the central office on the central site, in case of any disaster.

Network Infrastructure Scope
The scope is to design an infrastructure that connects each remote office to the central office that will meet all stated requirements for the integrity, storage, and movement of related data and the applications that process such data, and the networking and communications infrastructure that supports such applications covering all desired functions in security, redundancy, and operability, etc. The office computers, servers, and all network-related equipment need to be upgraded to meet the requirements as well. Workstations from all sites will need to be connected to the Internet all the time for

research and Web-based applications. The new partnership is also seeking professional guidance and procedures on whether it makes sense to hire a full-time staff to manage the networking/telecommunications infrastructure and related services, or if leaving such services to an external consulting firm will be more effective and efficient. Each office will have its own local area network (LAN) with an operating speed that will permit data transfer at high speeds with minimum chance of bottlenecks. The doctors need to know if it would be best to have the data accessed by all offices be on its own LAN. As of today, data sharing among workstations is minimal. Dedicated high-speed Internet access is not available at any site.

Office and Building Dimensions
The main part of the new partnership is to upgrade their office building with the same type of structure and functions. Each office building is 92' wide x 66' deep. The height from floor to false ceiling is 10'. The height from the false ceiling to the roof is another 4'. The passageways are four feet wide. The rooms are equal in width. The length of the rooms is the same in most cases. In the central office, the print room is six feet in length, storage is 20 feet in length, and the IT/telecom room is 16 feet in length. A diagram of the office layout follows.

Remote Office Requirements
One file/print server Two high-speed network printers/copiers/scanners One fax machine Voice messaging with beeping services Ten workstations at each location, with one at the front desk for the receptionist, one dedicated to the billing person, one dedicated to the insurance claims staff, one station for the patient records staff, one station for the doctor, and the rest for nurses, interns, and potential growth. Connections for laptops used by the billing manager and the office manager when visiting the remote offices. Appendix A: Capstone Project
©ITT Educational Services, Inc. 59 Date: 01/12/2010

Network devices that support the LAN and WAN connection²router, firewall, switch At any time, at least one doctor and one nurse must be at each location for at least six hours (but could be as long as 14 hours). Phone calls into the office to a specific doctor will be routed to doctors in other offices when the specific office is not open. Each doctor and nurse will have a separate workstation.

Main Office Requirements
The same list as each remote office An application server hosting the Medical Manager Software installed to track all their patients, demographics, insurance, and bills A separate server that hosts business management applications such as accounting, HR, and other assets management tools A separate server that provides necessary network services such as Active Directory, DNS, and DHCP A Web server for the business Network connection²router, firewall, switch

One file/print server Three network printers/copiers/scanners A separate station for each nurse, which is to grow to three A separate station for each doctor, which is to grow to three One station for the office manager Email service is to be provided by an external provider and is accessible via email client software and/or Web access.

Software per Workstation
Microsoft Office 2007 Email client software Web browser Network connectivity to centralized patient information, billing and insurance claim applications, and the Internet

Deliverables
Your task is to identify the equipment required at each office and the LAN and WAN design that will provide information and communications services for the new partnership with all necessary security and disaster planning to meet HIPAA requirements at a reasonable cost.

Documentation
Document briefly summarizing the problems and proposed solutions for each of the problem; each solution must be backed up with sound justification o Diagrams for all the LAN and WAN solutions o Document detailing all proposed equipment with cost o Document detailing configurations of each equipment Appendix A: Capstone Project
o

©ITT Educational Services, Inc. 60 Date: 01/12/2010

Document detailing all proposed software with cost Document detailing all require services (from external provider) with cost o Document detailing the planning, implementation and maintenance of the project (project management) o Document detailing user training information o Document detailing the technical solution to the client
o o

Timelines
o o

Timeline 1: Project response Timeline 2: Installation, implementation, testing, and training

Timeline 1
In the timelines, the milestones may differ from the deliverables. The first timeline is to show the tasks, resources, milestones, and time required for the development of the project. Items to be included are the requirements analysis, network diagram, equipment selection, cost analysis, disaster recovery, and the second timeline creation. This will need to be presented and explained to the doctors, office manager, and billing manager prior to the implementation of the second timeline.

Timeline 2
The second timeline is to represent the tasks, resources, milestones for the installation, configuration, implementation, testing, and training in the use of the

equipment and software.

Network Diagrams: Existing and Proposed
The network diagram will depict the network and components of each office as well as the connectivity between and within the offices. Label the components, include their IP addresses, and identify their uses. Basic floor plans have been provided showing the rooms, sizes, and the locations.

Equipment Selection and Cost Analysis
Research equipment to obtain prices and specifications. Include connectivity capabilities and the redundancy capabilities. Software suggested for use is MS Excel. The preparer can list each piece of equipment, quantity, and value. There are columns for each item. As a suggestion, the equipment can be grouped via office or equipment type.

Security, Disaster Recovery, and Risk Analysis
This area will be used to discuss redundancy, disaster recovery, backups, and how security will exist and be maintained. In addition, discuss risk analysis in this area. Disaster recovery means that if something breaks, a plan exists outlining how to repair it. For risk analysis, a determination will need to be made outlining what requires attention first and in what priority if multiple items are broken. Determine Appendix A: Capstone Project
©ITT Educational Services, Inc. 61 Date: 01/12/2010

which failure would cause the most expense or damage to the business. Another item to review is the time required to repair. For security, identify how the data and resources housing the data will be protected from unauthorized entry.

Presentation to Doctors
Use Microsoft PowerPoint to discuss the various deliverables and highlights of the project. Use the previous deliverables during the presentation if detailed questions occur and require references. Appendix A: Capstone Project
©ITT Educational Services, Inc. 62 Date: 01/12/2010
Reception area Chart Room Conference / Break Room Restroom Restroom Manager Financial Manager Billing / Collection Laundry Restroom Nurses Supervisor Storage IT/Telcom Doctor 3 Doctor 2 Doctor 1 Room 1 Room 2 Room 3 Room 4 Room 5 Room 6 Room 7 Room 8 Copier network printer Copier Network Printer Fax Server Server Rack Central Office

Office Floor Plan

Appendix A: Capstone Project
©ITT Educational Services, Inc. 63 Date: 01/12/2010

Parts include the following: Scope Document and Project Charter The definition of the problem or need The definition of the project¶s goals and objectives²aligning the IT strategy . Criteria weights correspond to points. Proposed solutions should be clear and complete to enable the evaluators to understand all aspects of each proposal. the proposal with the highest raw score receives the maximum points. Other factors that influence the final decision are customer references. other scores receive a fraction of the points based on the ratio of their scores to the highest raw score. 64 Date: 01/12/2010 project. Each team¶s total score is the sum of the weighted scores. but not limited to. Project Documentation Use the information and knowledge gained about flowcharting. Inc. Refer to the student syllabus for categories and assigned percentages. Using the project management approach to project planning. simulating all of the information and tools you learned throughout the program. Project Documentation 2. This project is to be prepared and printed using. The final decision of the panel will be based on the scoring process. submit. based on the defined evaluation factors. For a specific evaluation criterion. financial stability. The aim is to help the client select a project team that provides the best combination of attributes. Class Walkthrough and Presentation Details on each deliverable follow. and project planning to prepare. and the willingness of the apparently successful vendor to agree to the client¶s contractual requirements. The evaluation criteria for the capstone project proposal are: Team Project Category Grading Weight Documentation 20% Teamwork 10% Presentation 10% Network Solution 45% Teams will receive a score of zero to 100 for each evaluation criterion. Network Solution 3. List of Deliverables: The deliverables for this course consist of: 1. Microsoft Office Project and Microsoft Word. and pricing. and present the proposed solution for the client. prepare a detailed Appendix A: Capstone Project ©ITT Educational Services.PROPOSAL EVALUATION Evaluation Procedures The class instructor and an evaluation team comprising the school¶s advisory board members will evaluate each proposal. serving as the client representing the doctors¶ group described in the Capstone Project The evaluators will consider how well each project team¶s proposed solution meets the needs of the client. technical expertise. Gantt charting. 1. The evaluation process is not designed to simply award the contract to the lowest-cost vendor.

Detailed network drawings using a network diagramming tool such as Microsoft Visio: ‡ Physical: List all network devices and endpoints ‡ Logical: IP network diagram²data flow²per location (LANs) Additional drawings to include: ‡ Cable run table ‡ Office floor plans ‡ Equipment power requirements ‡ Wiring Security/maintenance plan²the top priorities must include: ‡ Intruder deterrence ‡ Theft prevention ‡ Disaster prevention ‡ Internal security and confidentiality Test and Quality Assurance (QA) Plans Provide an outline of the QA/Quality Control (QC) activities that will be implemented during the installation of the proposed systems. 65 Date: 01/12/2010 Work Breakdown Structure (WBS) for the team Training Plan This plan can include: Introduction Training approach Schedule Evaluation Tracking and reporting Outcome measurement Assumptions Risks Implementation Plan . Inc. Change Management Plan Ensure that the plan addresses ways to reduce the risk of project failure by describing how to lessen the impact when there is a change in technology: Redeployment of systems²software and hardware Retraining of the organization¶s personnel²displaced after the internal transfer process Communication strategy²how changes will be communicated to the organization¶s workforce Appendix A: Capstone Project ©ITT Educational Services.to the business value The project plan The definition of the resources needed to complete the project A cost analysis matrix that indicates how much the project will cost A payment plan that explains how the client will pay for the services Prototype of the system design²solution Create a requirements document to address the connectivity design recommendations for the proposed LAN/WAN system.

that reflects the client¶s products and services. posted on the Web server.Post-implementation Plan Disaster recovery Plan Preferred Documentation Style Your entire documentation should be printed on 8. You may retrieve a copy of the software from your instructor. Network Solution From a hands-on perspective and an application approach. Each team is responsible for creating its own class of IP addresses along with the appropriate number of subnets. logical. 66 Date: 01/12/2010 o Physical topology o Logical diagram with an IP addressing scheme o A prototype environment of the following equipment: ‡ An installed and configured Windows 2003 server with running Active Directory ‡ An installed and configured Web and FTP server (IIS) function ‡ An installed and configured Red Hat Linux server ‡ A minimum of two installed and configured Windows XP workstations ‡ An intranet home page. incorporate the available LAN/WAN equipment in the network diagram that must be created using network diagramming tool Microsoft Visio. They refer to the editorial style that many social and behavioral sciences have adopted to present written material. In addition to the Physical Simulated Network diagrams along with a minimum of five hard disk drives from each team. Inc. All references must follow the American Psychological Association (APA) style. every team must successfully complete and present the following: o A site LAN logical topology with an IP addressing scheme o Site WAN and LAN diagrams depicting the conceptual. and physical views of the proposed systems for each location specified within the RFP o A systems requirements document detailing the connectivity strategy for LAN and WAN: ‡ Protocols ‡ Hardware ‡ Software ‡ Implementation and post-implementation procedures ‡ WAN diagrams Appendix A: Capstone Project ©ITT Educational Services. servers. The text should be single-spaced. Use 12-point Arial Narrow font. ‡ A database using Microsoft Access or SQL Every team will use the preconfigured templates to document all network services. and computers.´ they do not mean the writing style. switches.5-x-11-inch. such as routers. paper with margins of one inch on all sides. You need to also create a diagram to complete the Point-to-Point Protocol (PPP) and simulate the Integrated Services Digital Network (ISDN) and Frame Relay . 2. or letter-size. Special note: When editors or teachers ask you to write in the ³APA style.

All the team members must participate in the final presentation. 2007) Appendix A: Capstone Project ©ITT Educational Services. Suggested Templates The following section contains sample templates that you may use or modify according to your project requirements. Based on this physical simulated network diagram²not the teams¶ theoretical designs from the RFP²the following WAN/LAN specifications must be successfully completed and are subject to the instructor¶s verification: o Connectivity to and from any node in the LANs and the WAN. from any node on the network. The members should be able to discuss their solutions with the instructor and the rest of the class before submitting the final project. including all servers o No TELNET allowed from any nodes in all LANs to the core routers o No TELNET allowed from any nodes on the networks to any routers o The ability to transfer a text or document file from any node on the network to the FTP server o The ability to download. 68 Date: 01/12/2010 Team Meeting Agenda/Meeting Minutes . a driver file from the FTP and Web servers 3. YEAR (Format: DECEMBER. Inc. Each team will present their final project in Unit 11. STATE MONTH. Appendix A: Capstone Project ©ITT Educational Services.implementation. 67 Date: 01/12/2010 Cover Page (Required) for the Completed Project Documents PROJECT TITLE SUBTITLE (if applicable) A COMPREHENSIVE NETWORK DEVELOPMENT PROJECT SUBMITTED TO THE IT/COMPUTER NETWORK SYSTEMS PROGRAM IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE ASSOCIATE DEGREE by STUDENT NAME STUDENT NAME 2 (if applicable) STUDENT NAME 3 (if applicable) STUDENT NAME 4 (if applicable) STUDENT NAME 5 (if applicable) ADVISOR ² NAME(S) OF THE FACULTY ITT TECHNICAL INSTITUTE CITY. Inc. Class Walkthrough and Presentation A walkthrough is a semiformal presentation/evaluation of a product at its appropriate development stage for the purpose of finding errors in the product.

Team Meeting Date: Time: Location: Meeting called Facilitator: Facilitator: Timekeeper: Attendees: Please read: Please bring: Minutes Agenda item: Presenter: Discussion: Conclusions: Action items Person responsible Deadline Agenda item: Presenter: Discussion: Conclusions: Action items Person responsible Deadline Appendix A: Capstone Project ©ITT Educational Services. Inc. 69 Date: 01/12/2010 Agenda item: Presenter: Discussion: Conclusions: Action items Person responsible Deadline Agenda item: Presenter: Discussion: Conclusions: Action items Person Deadline Other Information Observers: Resources: Special notes: Appendix A: Capstone Project .

or other business relationships²that will influence the project¶s success. when. Out-of-Scope Specifications Mention the tasks or issues not related to the project. reachable steps of action. Project Deliverables Explain how dependencies will influence the project. Constraints Identify any resources²human and nonhuman²that will prevent the project from completion. Determine how success will be defined and measured on this project. Scope Specifications Provide a high-level breakdown of the goals and objectives of the project. Purpose Address the ³how. Inc. when. Provide a description of the situation that leads to the recognition that this solution should be built. 4. where. Appendix A: Capstone Project ©ITT Educational Services. List the major business risks associated with developing this product. 6. or implementation issues. Project Context Describe the project¶s alignment with the company goals and mission. and why´ questions. This section summarizes the rationale for the solution. It would be a good idea to estimate the severity of the risks and identify risk mitigation actions that can be taken. These departments are either affected by the outcome of the project or can influence the outcome. Stakeholders Mention the organization departments involved in the project process. 5. Describe the important business objectives of the solution in a way that is quantitative and measurable. 10. . such as marketplace competition. Assumptions Record any assumptions you make when starting the project and writing the vision and scope document. Stakeholders establish realistic expectations based on the scope and limitations. The objectives must answer the ³how. and describe the factors that are likely to have the greatest impact on achieving that success. 71 Date: 01/12/2010 development partners. 8. user acceptance. 9. The project scope defines the concept and range of the proposed solution. It is important to define what will not be included in the product. 3. Success Criteria Specify the desired performance related to a project and the desired outcome. Include external factors and factors within the direct control of the organization. 7. 2. Inc. where. 70 Date: 01/12/2010 Scope Document and Project Charter 1. 11. Goals and Objectives Specify clear. and why´ questions that clarify or support a project. Risks Summarize any unforeseen events that might derail the project.©ITT Educational Services. Note any major dependencies²such as technologies.

training. 13. Describe the key stakeholders and methods of communication. Include information on: o How measures will be captured and reported o How security will be monitored and reported 5. risk identification and mitigation. 7. 2. data sharing. Customer/Business Owner Management and Security Describe how the stakeholders and customers will be involved in or informed about maintenance and security operations activities. 73 Date: 01/12/2010 8. and other support staff. Recommended Project Approach Describe the strategies. problem report management. Governance and Management/Security Approach Identify new methodologies or reference the existing ones to establish maintenance and security priorities and other change management strategies. Documentation Strategies Describe new documentation standards and expectations or reference the existing . 4. processes. maintenance and security operations team leads. documentation. Cost Matrix It is imperative to incorporate the principle of cost management when implementing a project. Inc. Introduction and Background Provide a high-level description of the product or services to be maintained and secured in the scope of maintenance and security operations activities. methodologies. Standard Operation and Business Practices Identify or reference the methodologies. Roles and Responsibilities Identify the roles and responsibilities associated with maintenance and security operations and the skill set needed to perform these roles. and security. The following table can be used to create the cost matrix for individual items required. 3. In this section. and tools used for change control and configuration management. Appendix A: Capstone Project ©ITT Educational Services. and technologies to be used to complete the project. Item Description Function in Project Item Location Quantity Price Appendix A: Capstone Project ©ITT Educational Services. each team member will create a cost matrix and submit it to the project manager for approval and inclusion in the budget of the project. disaster recovery. Performance Measures and Reporting Identify the key performance measures for maintenance activities and security operations for product or service performance. 72 Date: 01/12/2010 Security/Maintenance Plan 1. 6. Budget Identify the budget associated with the security and maintenance of operations activities. customer or help desk support. The key roles to be identified include the primary business contact. strategies. lifecycle testing.12. storage. Inc. key technical staff. customer support. where known.

The checklist assists designated reviewers on the project team in determining whether the project specifications meet the criteria established in the Project Plan. Security Describe the ongoing security activities. usage. such as product/service documentation. and change information. provide a schedule of the QA activities for the duration of the project. 10. Appendix A: Capstone Project ©ITT Educational Services. The tasks may include: ‡ Identifying standards and guidelines ‡ Evaluating: o Software tools o Facilities o The software products review process o Project planning. Include descriptions of documentation that will be routinely produced. and user. problem. 74 Date: 01/12/2010 Quality Assurance Plan This section contains a checklist to conduct the evaluation process for the Quality Assurance Plan. Inc. tracking. 11. and oversight processes o The requirements analysis process o The design process o Evaluating the code and unit testing process o The integration testing process o The acceptance testing process o The release process . Include details on where documentation is stored and how to access it. To be Completed by Team To be Completed by Reviewer Requirement Performed by Comments Comply? Y N Reviewer Comments SCHEDULE OF TASKS AND RESPONSIBILITIES Based on the tasks described in your Project Plan. reports. The objective of the evaluation is to determine whether the document complies with the client¶s RFP requirements. 9. Training Describe the ongoing training activities. Acceptance Define the point at which the project and maintenance staff agrees that implementation and transition activities are complete and maintenance activities may begin.ones.

the documents in the following subsections: Initiate Phase: ‡ Needs statement ‡ Project plan. 75 Date: 01/12/2010 To be Completed by Team To be Completed by Reviewer Requirement Performed by Comments Comply? Y N Reviewer Comments o The storage and handling process o Software development o The configuration management process o The risk management process ‡ Certifying non-deliverable software ‡ Performing configuration audits SYSTEM DOCUMENTATION Documents by Phase: List and briefly describe the documentation expected to be produced during this project. Depending on the size of your project. but is not limited to. the list may include. 76 Date: 01/12/2010 To be Completed by Team To be Completed by Reviewer Requirement Performed by Comments Comply? Y N Reviewer Comments Define Phase: ‡ System support and acquisition plan² initial ‡ Functional requirements document ‡ Data requirements document ‡ System security and privacy plan ‡ Internal audit plan ‡ Project plan²updated Design Phase: ‡ System/subsystem specifications . Inc. including WBS ‡ Configuration management plan ‡ Quality assurance plan ‡ Feasibility study ‡ Cost/benefit analysis ‡ Risk analysis Appendix A: Capstone Project ©ITT Educational Services.o The corrective action process o The media certification process Appendix A: Capstone Project ©ITT Educational Services. Inc.

verification. Purpose Describe the purpose of the Test Plan.1. 78 Date: 01/12/2010 Test Plan <Project Name> <Month. Year> A. Introduction A. Inc.‡ Database specifications ‡ Program specifications ‡ System support and acquisition plan² final ‡ Validation. 77 Date: 01/12/2010 To be Completed by Team To be Completed by Reviewer Requirement Performed by Comments Comply? Y N Reviewer Comments ‡ Project plan²updated Evaluate Phase: ‡ Test results and evaluation reports ‡ Installation and conversion plan²final ‡ Project plan²updated Operate Phase: ‡ Pilot test results ‡ Training material ‡ Project plan²updated Discipline for Documentation Standard Practices: Describe the criteria that will be applied to review and evaluate all lifecycle documents.2. A. Inc. Appendix A: Capstone Project ©ITT Educational Services. and testing plan²initial ‡ Training plan²initial ‡ Project plan²updated Build Phase: ‡ Installation and conversion plan² initial ‡ Test plan ‡ User¶s manual ‡ Operations manual ‡ Maintenance manual ‡ Validation. and testing plan²final ‡ Training plan²final Appendix A: Capstone Project ©ITT Educational Services. verification. System Overview .

with detailed descriptions of any deviations from the expected results B. Summary C.3. and personnel. B. Test # Constraints Describe any anticipated limitations imposed on the test because of system or test conditions such as timing.4. Test Analysis Identify the tests being conducted and describe each test in brief. Test # Test <name> Provide a test name and identifier (#) for reference in the remainder of the section. B.2.8. B. B. its . Assess the manner in which the test environment may be different from the operational environment and the effect of this difference on the capability. Recommended Improvements Explain any recommendation²following the testing²to improve the system. Demonstrated Capability Provide a statement on the capability of the system as demonstrated by the test. and control versions of the test data. equipment.7.1. Test # Performance Quantitatively compare the performance characteristics of the system with the requirements stated in the scope document. Test # Requirements to be Tested Describe the system and program requirements that will be tested using this particular test. Identify the functions that are tested²later. interfaces. 79 Date: 01/12/2010 B. C. B. maintain. Test # Expected Outcome Describe or depict the expected result of each test.Provide a brief system overview description as a point of reference for the remainder of the document.1. Test # Functional Capability Describe the functional capability the way it has been demonstrated. B. C. Include the following information when recording the results of a test: o Name and version number of the application or document tested o Input data used in the test o Hardware and operating systems on which the test was run o Time.3.5. reports on these tests are prepared. Test # Data Handling Describe how you will identify.6. Appendix A: Capstone Project ©ITT Educational Services. C. Identify and describe the security issues or weaknesses discovered during the testing. and location of the test o Names of the team members involved in the test o Output data. date. System Deficiencies Provide an individual statement for each deficiency discovered during the testing. Security Considerations Describe the security requirements built into the system and verified during system acceptance testing.2. Inc. B. compared with the requirements and security considerations.

3. Schedule Prepare a training schedule to include information such as identification and development of course content and materials. General Training Prerequisites Summarize the general training prerequisites for each type of training mentioned in this plan. Training Prerequisites Identify any prerequisites for individuals to receive training. Include any additional functionality seen as a potential improvement for the user even if the functionality is not specified in the requirements document. System Overview Provide a brief system overview description as a point of reference for the remainder of the document. Introduction 1. training manuals. Year> 1. Scope Describe the scope of the Training Plan as it relates to the project. 1.2.3. classroom facilities. 1. 1. Purpose Describe the purpose of the Training Plan. 80 Date: 01/12/2010 Training Plan <Project Name> <Month.2.4. 2. such as online terminals or PC workstations.4.5. hands-on practical sessions. Roles and Responsibilities Identify the team members and their responsibilities in developing the training materials. 2. . or related procedures. Inc. Inc.performance.4. 2. self-paced written manuals. 2. Identify who will conduct the training. These techniques may include computer-based instructions. Training Requirements Describe or list the skills required to support the project lifecycle activities. Training Approach 2. classroom lectures. 81 Date: 01/12/2010 2. Identify the tools needed for the training. and post-training reporting. Techniques and Tools Describe the training techniques to be used. Match the requirements to the existing team skill sets to determine the training needed for the project. Appendix A: Capstone Project ©ITT Educational Services. training dates. peer training.1. Appendix A: Capstone Project ©ITT Educational Services.1. or any combination of these techniques. C. System Acceptance State whether the testing has shown that the system is ready for release testing and subsequent production operation. and any computer center resources. Develop a strategy regarding prerequisite training.

Identify the organization¶s staff. Evaluation What method of evaluation is being used to determine the success of the overall plan? How often will the evaluation occur? Calculate the Return On Investment to determine whether the client is receiving his or her money for implanting this process within the .3. You can use a table similar to this: Course Title/Offering Audience Message Method When/How Often Responsible Name the product or service. such as hands-on workshops and seminars. Identify the date of training and the number of times the training will take place. Identify the person responsible for conducting the training sessions² external consultants or in-house technical training staff. Identify the type of training. 4. Curriculum Briefly describe the curriculum for each proposed training class or attach the course description from the vendor. Identify the job roles that require training.

Implementation Plan B. Outcome Measurement What is the expected overall outcome of the plan? How will you judge its success? Appendix A: Capstone Project ©ITT Educational Services.1. B. Introduction A. Risks What risks or barriers exist to the implementation. Implementation Timetable The project will commence on [dd/mm/yyyy].project. System Overview Provide a brief system overview description as a point of reference for the remainder of the document. training. A. Inc.2. Tracking and Reporting How will the education. 5. How often will assessments be done and the plan reviewed and evaluated? 8.1. 82 Date: 01/12/2010 7. and sustainability of the training plan? Appendix A: Capstone Project ©ITT Educational Services. Assumptions What assumptions have you made in the development of the training plan? 9. Purpose Describe the purpose of the Implementation Plan. of the implementation and how these actions will achieve the objectives. drills. Its duration will be [insert duration]. execution. Inc. Implementation activities Describe the actions. and exercises included in the plan be tracked and reported? 6. 83 Date: 01/12/2010 Implementation Plan A. Sustainability Describe how the training plan will be sustained. or outcomes.2. B. Technological System Implementation Plan Recommended Actions Specific Action Lead Support Key Outputs Milestones Actions Achieved by Identify the task to be completed² .

Identify who will continue to support the process.server installation or server patch. Identify the person or persons on the project team responsible for leading this task. Describe how the action will be performed. Provide the details of the outcomes of the task to be completed and the results if the task was successfully completed. . Identify whether the task is a milestone to a specific phase of the project.

describe the key reasons for the variance. Costs Projected Note the anticipated project costs. Executive Summary Briefly summarize the project. as per the project charter. In addition. Results B. Explain how they are implemented. C. 85 Date: 01/12/2010 Post-Implementation Plan A. Appendix A: Capstone Project ©ITT Educational Services. for example. explain how the Open Systems Interconnection (OSI) model created by the International Organization for Standardization (ISO) group and Institute of Electrical and Electronics Engineers (IEEE) org Electronic Industries Alliance . ‡ What infrastructure is required? ‡ How will it be implemented? ‡ What architecture is being used? ‡ What is the time schedule for implementation? ‡ Who will it affect? Include the physical and logical drawings of the LAN and WAN. B.Telecommunication Industry Association (EIA-TIA) wiring standards was implemented. discuss the impact of nonconformance with industry standards and protocols.Identify the person on the project team responsible for carrying out the task. 84 Date: 01/12/2010 B.3. Inc. Technological Infrastructure Identify and describe the technology infrastructure and changes that are expected as a result of the project. . Actual Note the actual start and end dates of the project.1. Appendix A: Capstone Project ©ITT Educational Services. Reasons for Variance If there is a variance between the projected and actual schedules. B. Inc. as proposed in the project charter. Schedule Projected Note the anticipated start and end dates of the project.2. Standards Implementation Consider all the protocols and Industry Standard committees and practices.

Actual Describe the objectives achieved from the project and progress toward the goals. Actual Note how the functionality delivered meets the requirements.5. Appendix A: Capstone Project ©ITT Educational Services. describe the key reasons for the variance. Reasons for Variance If there is a variance between the anticipated and actual benefits. Benefits Projected Note the benefits anticipated at the beginning of the project. describe the key reasons for the variance. Lessons Learned Provide the information obtained from the Lessons Learned exercise.4. Requirements and Functionality Projected Note the functionality proposed in the project planning materials and key requirements documentation. Reasons for Variance If there is a variance between the projected goals and objectives and the actual results. describe the key reasons for the variance. Inc. You can modify the following list based on the lessons learned information reported for your project. describe the key reasons for the variance. If there is a variance between the documented requirements and the delivered functionality. Reasons for Variance If there is a variance between the projected costs and the actual costs. Discuss the impact of delayed measurement or evaluation. Reasons for Variance If there is a variance between the projected and actual functionality.3. Actual Note the benefits realized or projected as a result of the project. C. B. describe the key reasons for the variance.Actual Note the actual project costs. B. The following are the commonly cited lesson categories. mentioned earlier. o Vendor Solicitation and Selection o Contract Negotiation and Management o Technology o Project Management o Communications Plan o Technical Design Specifications o Data Conversion o Testing . Goals and Objectives Projected Note the project goals and objectives outlined in the project charter. 86 Date: 01/12/2010 B.

and the next week. 1-3 days 1 week Office Division (such as Development. 87 Date: 01/12/2010 Disaster Recovery Plan Purpose This document describes how to plan for. Communications . record. This plan will assist you in gathering specific information relevant in the different stages of a disaster. Finance) Application Workstation/ Server ID San Jose Clinic Finance PeaceTree Spica Appendix A: Capstone Project ©ITT Educational Services. 88 Date: 01/12/2010 2. Technology Priorities Assessment Use the following chart to identify the key applications required to keep your organization running over the next 24 hours. Technology Refresh: Key Recovery Staff Assuming all the staff is available. Inc. The plan also outlines the measures that organizations should take to prepare for a disaster of any magnitude. Operations Use the following charts and guidelines to identify the technology and personnel required to keep your operations going in the aftermath of a disaster. Appendix A: Capstone Project ©ITT Educational Services. Inc. the following table helps you to identify the key personnel required to recover your systems and the location from where these systems will be recovered. and recover from a disaster. Service Type Assigned Personnel Location System Profile For each system configured. the next three days. Recommendations Based on the lessons learned from the project. you must complete a comprehensive analysis to determine how critical the system is to the organization. describe the recommendations that the project team has for future or similar projects. 1. Location Division Workstation/ Server ID Critical: Yes/No Fixed Asset: Y/N Manufacturer Needed Within 24 hrs.o Training o Implementation o Production and Operations D.

The proposer responds with only a ³yes´ or ³no´ when . Technology Recovery Contacts Name Role (network. state ³Internal´): Departmental Function: Recovery Objectives: Number of Employees: Appendix A: Capstone Project ©ITT Educational Services. etc. etc. systems. OVERVIEW OF THE BUSINESS UNIT Location: Organizational Focus: Main Constituency (if internal. ³Proposer´ refers to the student. Inc. Business Unit Information This chart can be used to record the functions of each business unit in your organization.) Location Type of Vendor (consultant. indicate your assessment of the business impact of not performing a function following a major incident or disaster.Use the following forms to keep track of the contacts you will need during recovery.) Internal Escalation Contact List Name Role in Recovery Location Job Scope Phone Number 3. email. Inc. Operation Immediacy (such as in the next three days or next week) Potential Impact Assumptions & Justification Appendix B: Instructor¶s Technical Requirements Point-Scoring Rubrics ©ITT Educational Services. On this scale: 0: Signifies no value. You can keep it in a known repository at the recovery site for reference. Estimate the potential impact if a function is not performed following a disaster. database. firm) Contact Info (Phone. Business Impact Assessment Business Process What are the business processes performed by each of your departments? Name and briefly describe each business process. The raw point scale used during the evaluation process is from zero (0) to four (4). The proposer ignores or does not meet the project requirement. 90 Date: 01/12/2010 Appendix B: Instructor¶s Technical Requirements Point-Scoring Rubrics Use this rubric to grade student¶ final project presentations. 89 Date: 01/12/2010 Consequences of Not Performing a Function Under the following headings. 1: Indicates a poor response.

such as the age of a company. such as the age of a company. the response is somewhat detailed. If the statement is meant to obtain specific information.greater detail is required. the overall impression of the response is favorable. The proposer provides a reasonably good response to the statement. the overall impression of the response is somewhat unfavorable. (3) Describe the innovative approaches in production and design. 2: Signifies a marginal response. o The solution meets and exceeds customer expectations of a system that is flexible and Final Presentation Evaluation Sheet (RFP Response) . The additional information provided is detailed. the overall impression of the response is altogether unfavorable. (2) Describe the problems that are anticipated and the proposals for solving them. and relevant to the statement and reflects a high level of the proposer¶s skill and commitment. If the statement is meant to obtain specific information. such as the age of a company. 3: Indicates that the response is acceptable. If the statement is meant to obtain specific information. The proposer¶s response goes well beyond the expectations of the RFP statement. creative. 4: Implies that the response is superior. it is detailed and relevant to the RFP statement. Inc. 91 Date: 01/12/2010 Criteria Description Score Maximum Introduction ‡ Did the project manager open the presentation with a brief introduction and an overview of the project? ‡ Did the project manager introduce the team members and their roles within the scope of project? ‡ Did the project manager communicate clearly? Present Proposed Design Approach for the Project TECHNICAL INFRASTRUCTURE NARRATIVE The narrative should include the following information in the specified order: (1) Describe the proposed design philosophy. If the statement is meant to obtain specific information. The response is complete and addresses all the significant information. ‡ Did the proposed solution address all the technical aspects of the project identified in the RFP? o The solution meets the infrastructure specifications required by the client. but significant information is missing or most of the details provided are irrelevant to the RFP statement. the overall impression of the response is acceptable. but the response misses some significant information or the response is detailed but not entirely relevant to the RFP statement in question. such as the age of a company. Appendix B: Instructor¶s Technical Requirements Point-Scoring Rubrics ©ITT Educational Services.

o Did student accurately describe and demonstrate his or her role in the project? o Did the student accurately answer questions and discuss the project with the instructor and guests during presentation? o Did the team exhibit a balance among the project management.scalable for future growth. Inc. and graphical aspects? Project Management Methodology REQUESTS FOR PROPOSAL SCHEDULING Management Structure within the Team o Did the project manager walk the instructor and guests through the four phases of the project management life cycle? Appendix B: Instructor¶s Technical Requirements Point-Scoring Rubrics ©ITT Educational Services. Team Composition and Experience ‡ The project is technically sound and demonstrates the student¶s knowledge of the subject matter. o The solution is cost-effective to maintain after installation. 92 Date: 01/12/2010 Criteria Description Score Maximum o Did the project team satisfy the documentation requirements? Scope WBS Project Plan Cost Analysis Maintenance Plan o Did the project team incorporate quality accreditation standards and/or practices² especially testing and debugging? Schedule Control o What techniques are planned to ensure that the schedule is met? o Who will be responsible for ensuring that the schedule is met? Understanding of the Needs ‡ Did the project team propose value-added propositions and recommendations to include new . technical.

Software issues o Probability of failure o Impact of the failure o Estimated incidents of failure per year o Annualized loss expectancy o Cost of mitigation Cost Control and Estimating Effectiveness ‡ What control techniques are planned? ‡ Who is responsible for control? ‡ Did the project manager break down the cost of all the materials and labor for the project? ‡ Did the project team use cost-effective methods to . 93 Date: 01/12/2010 Criteria Description Score Maximum o Cost of mitigation 3. Inc. Networking issues o Probability of failure o Impact of the failure o Estimated incidents of failure per year o Annualized loss expectancy Appendix B: Instructor¶s Technical Requirements Point-Scoring Rubrics ©ITT Educational Services.technology for future expansion? ‡ Did the proposed solution articulate relevant problems or issues that the client has not considered? Quality/ Maintenance and Warranty ‡ Project execution and implementation o Did the project team demonstrate the solution using actual hardware and software? o Did the project team display and review the steps the client can execute to test and maintain the network environment after implementation? o Did the students incorporate a training plan for the client? Disaster Recovery A Disaster Recovery Plan (DRP) should address three main technical areas: 1. Hardware issues o Probability of failure o Impact of the failure o Estimated incidents of failure per year o Annualized loss expectancy o Cost of mitigation 2.

the ability to listen and answer questions clearly and professionally ‡ Portrays enthusiasm for the project and demonstrates a professional approach Final Presentation ‡ Did the presentation connect with the audience? ‡ Did the presentation exceed the allotted time? ‡ Did the project team provide complete responses to all sections of the RFP? Total Comments: _____________________________________________________________________ ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ Appendix B: Instructor¶s Technical Requirements Point-Scoring Rubrics ©ITT Educational Services. 94 Date: 01/12/2010 ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ .produce a high-quality technology plan? ‡ What was the average hourly rate proposed ‡ Did the customer receive value for money? Communication Skills ‡ Displays clarity and readability of the written proposal ‡ Conveys a collaborative ethos²for example. Inc.

You are building a LAN in a company that develops insurance management software.______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ Evaluated by: ____________________________________ Print name: ______________________________________ Date:___________________________________________ Appendix C: Student Individual Skills Assessment Questionnaire ©ITT Educational Services. IT1220) Learning Level 2: Application/Analysis Question: 1. 95 Date: 01/12/2010 Appendix C: Student Individual Skills Assessment Questionnaire Individual Assessment Skills Questionnaire Topic 1: Hardware Learning Level 3: Synthesis/Evaluation Question: 1. IT103) Learning Level 1: Knowledge/Comprehension Question: 1. (TB143) Topic 2: Programming . What hardware requirements should be taken into consideration? (TB143. (TB143. Inc. Identify all of the different types of input ports commonly available on a modern computer. Describe how the memory manager divides up and allocates memory.

You are asked to set up a peer-to-peer Windows XP LAN using four computers with a LinkSys home Internet router with five built-in Ethernet switch ports. The LinkSys . What techniques can be used to install new software on Fedora? (IT250) 2. You are building a database to track a family tree. (IT302) Learning Level 2: Application/Analysis Question: 1. A small lab of Linux machines contains two servers. When would you use each? Learning Level 1: Knowledge/Comprehension Question: 1. Explain the difference between passing a piece of data ³by value´ and passing a piece of data ³by reference. What are the basic components of a database? (IT203) Topic 4: Linux Learning Level 3: Synthesis/Evaluation Question: 1.Learning Level 3: Synthesis/Evaluation Question: 1. Explain the ³scope´ of a data statement. 2. What are the implications of misidentifying a local and a global variable? (IT104) Appendix C: Student Individual Skills Assessment Questionnaire ©ITT Educational Services. an ³insert´ query. What file system is used on a Linux system? Appendix C: Student Individual Skills Assessment Questionnaire ©ITT Educational Services. Inc. 96 Date: 01/12/2010 Learning Level 1: Knowledge/Comprehension Question: 1. What are the three key control structures in programming and what are they used for? (IT104) Topic 3: Databases Learning Level 3: Synthesis/Evaluation Question: 1. (IT203) Learning Level 1: Knowledge/Comprehension Question: 1. How would you structure your database? (IT203) Learning Level 2: Application/Analysis Question: 1.´ (IT104) Learning Level 2: Application/Analysis Question: 1. 97 Date: 01/12/2010 Topic 5: OSI Model Learning Level 3: Synthesis/Evaluation Question: 1. Name and describe the server processes needed on the servers. Explain the differences among a ³select´ query. Inc. The administrator wishes to permit user settings and project files to be available when users log in on any machine. and an ³update´ query.

Topic 7: LANs/WANs Learning Level 3: Synthesis/Evaluation Question: 1. Using the OSI model as a reference. and the broadcast address for the network. (IT113) Topic 8: Windows . describe how you would troubleshoot a connectivity problem.128 /25.1. number of hosts. When you implement the new subnet on the two machines. IT320. Inc. What does an Access Control List (ACL) block and why do you need to place it as close to the source as possible? (IT320.10. the first host.0.255. (IT220. Describe the major types of cabling used in networks and what they are used for. List the address range of the first octet. Identify the address classes in IPv4. (IT220) Learning Level 2: Application/Analysis Question: 1. IT320) Learning Level 2: Application/Analysis Question: 1. the last host.0. Compare and contrast the major pieces of networking equipment used to construct an Ethernet network. (IT220. identify the network address. IT320. Your network address is 192. (IT220. 98 Date: 01/12/2010 2. What must be done for users on this network to communicate with the rest of the world through the Internet? (IT220. and the broadcast address. IT321) Learning Level 1: Knowledge/Comprehension Question: 1.router serves as the DHCP server for the entire network. Explain the purpose and components of the OSI model. only the machines on the original subnet are talking to each other. IT321) Topic 6: TCP/IP Learning Level 3: Synthesis/Evaluation Question: 1. Identify the subnets.255. and any special designations for each. IT321) Appendix C: Student Individual Skills Assessment Questionnaire ©ITT Educational Services. You have a subnet of 255. so you decide to put two of the machines on a separate subnet while still retaining communication between the two subnets. Identify what logical configurations you need in order to establish and test the connectivity.25 with a subnet mask of 255.255.255. the subnet mask. Given the IP address 192. 2. IT321) Learning Level 1: Knowledge/Comprehension Question: 1. Learning Level 1: Knowledge/Comprehension Question: 1. What might have gone wrong and how would you fix it? Learning Level 2: Application/Analysis Question: 1.168. host address. You have confirmed all the four computers are talking to each other.168. IT320. IT320.

What are the two ways you can create or edit a Group Policy Object (GPO)? Appendix C: Student Individual Skills Assessment Questionnaire ©ITT Educational Services. IT222. (IT109. IT221. Describe the difference between workgroups and domains in the context of information security. IT221. IT109. Inc. IT260. IT260. IT221. IT222. 99 Date: 01/12/2010 Topic 9: Windows (Operating Systems) Learning Level 3: Synthesis/Evaluation Question: 1. Inc. IT260) Learning Level 1: Knowledge/Comprehension Question: 1. What is an operating system? (IT103. IT260) Appendix C: Student Individual Skills Assessment Questionnaire ©ITT Educational Services. IT260) Learning Level 1: Knowledge/Comprehension Question: 1. (IT221. IT250. How do you configure an operating system to interface with a network? (TB143IT103. With regards to the MMC. IT222. Topic 10: Windows/MMC Learning Level 3: Synthesis/Evaluation Question: 1. IT221. IT222. When would you choose each? Learning Level 2: Application/Analysis Question: 1. IT250. IT260. IT321) 2. What are the primary tasks of a system administrator? (IT220. IT221. What does each task accomplish? Learning Level 2: Application/Analysis Question: 1.Learning Level 3: Synthesis/Evaluation Question: 1. IT302) Learning Level 1: Knowledge/Comprehension Question: 1. IT302) Learning Level 2: Application/Analysis Question: 1. IT222. IT222. IT109. IT260) 2. (IT103. IT222. IT221. IT222. What is an MMC with reference to Microsoft Windows operating systems? Describe several snap-ins related to the MMC. Provide some examples of operating systems. IT109. IT320. IT260) 2. what is the difference between ³author mode´ and ³user mode´? (IT221. Describe the services performed on a domain controller that would not be performed on a workgroup. IT109. What considerations should you take into account when preparing to install an operating system? (IT103. 100 Date: 01/12/2010 Topic 11: DNS Learning Level 3: Synthesis/Evaluation Question: .

IT260) 2.1. What are some of the ways you would troubleshoot a DNS problem? (IT221. 101 Date: 01/12/2010 Topic 13: Windows XP Learning Level 3: Synthesis/Evaluation Question: 1. IT260) Topic 12: Linux. What are the three components of a Fully Qualified Domain Name (FQDN)? (IT221. Advanced Topics Learning Level 3: Synthesis/Evaluation Question: 1. What is an information security policy? 2. What best practices should be considered when designing and implementing a security policy? Explain. How would you design and implement a backup and restore plan? Justify your choices. A Fedora server is storing security logs that contain a vast array of data. IT260) Learning Level 2: Application/Analysis Question: 1. The Apache Web server on Fedora is not returning data to the outside world. What could you do to check what might be wrong? Learning Level 1: Knowledge/Comprehension Question: 1. IT222. Learning Level 2: Application/Analysis Question: . Compare and contrast a workgroup with a domain. Learning Level 2: Application/Analysis Question: 1. What is the difference between a System Access Control List (SACL) and a Discretionary Access Control List (DACL)? Topic 14: Setup and Installation Learning Level 3: Synthesis/Evaluation Question: 1. IT222. Design a tool chain that would contact an administrator via email in specific risk scenarios. What is the significance of each component? Learning Level 1: Knowledge/Comprehension Question: 1. Inc. and would otherwise provide daily updates. Learning Level 2: Application/Analysis Question: 1. Which directories are most important on Linux and what do they contain? Appendix C: Student Individual Skills Assessment Questionnaire ©ITT Educational Services. When would you use each of them? Learning Level 1: Knowledge/Comprehension Question: 1. IT222. What are the components of DNS? (IT221.

What components should you install when setting up an Exchange Server? Learning Level 1: Knowledge/Comprehension Question: 1. Inc. What is required for an unattended installation or a remote installation of WinXP beyond what is required for an attended installation? Appendix C: Student Individual Skills Assessment Questionnaire ©ITT Educational Services. IT1220) Correct Response Criteria: . You may use the scoring table at the end of the questionnaire to tally the student¶s score. For each topic. Explain the difference between connecting to a network using a Domain Server and one using Workgroups. What hardware requirements should be taken into consideration? (TB143. 103 Date: 01/12/2010 Appendix D: Individual Skills Assessment Questionnaire for the Instructor Directions: The following questionnaire contains the Individual Skills Assessment that must be administered to each student individually as a panel interview. Inc. Note: Each topic includes questions at three levels: o Level 3: Synthesis/Evaluation (Most-challenging questions) o Level 2: Application/Analysis (Medium-level questions) o Level 1: Knowledge/Comprehension (Least-difficult questions) Appendix D: Individual Skills Assessment Questionnaire for the Instructor ©ITT Educational Services. Please see the Instructor Guide section of this courseware for complete instructions on how to conduct the interviews. How does a virtual private network (VPN) work and when you would want to put one into effect? Learning Level 2: Application/Analysis Question: 1. 104 Date: 01/12/2010 Individual Assessment Skills Questions with Correct Response Criteria Topic 1: Hardware Learning Level 3: Synthesis/Evaluation Question: 1.1. Learning Level 1: Knowledge/Comprehension Question: 1. start with Learning Level 3. 102 Date: 01/12/2010 Topic 15: Network Application Services Learning Level 3: Synthesis/Evaluation Question: 1. Print enough copies of the ISA Questionnaire so that each interviewer has one copy per student before the panel interview begins. Inc. You are building a LAN in a company that develops insurance management software. What is the purpose and function of IIS? Appendix D: Individual Skills Assessment Questionnaire for the Instructor ©ITT Educational Services. Circle each of the response criteria that the student successfully includes in his or her response.

The student addresses why each is important: PC resources needed: Memory.´ (IT104) Correct Response Criteria: The student identifies the following data types and describes how each piece of data is passed: Parameter Argument Parameter list Data type Compatibility Reference address Learning Level 2: Application/Analysis . 105 Date: 01/12/2010 SCSI Topic 2: Programming Learning Level 3: Synthesis/Evaluation Question: 1. processor size Networking resources: Category 5e cable. hub. (TB143. IT103) Correct Response Criteria: The student identifies the following memory concepts and describes how each works: Virtual memory Shared memory Paged memory Contiguous memory Non-contiguous memory Multi-programming Learning Level 1: Knowledge/Comprehension Question: 1. switch. Describe how the memory manager divides up and allocates memory. router Learning Level 2: Application/Analysis Question: 1. Inc. Identify all of the different types of input ports is available on a modern computer? (TB143) Correct Response Criteria: The student identifies the following ports: USB Serial Parallel Video /audio RJ45 FireWire Appendix D: Individual Skills Assessment Questionnaire for the Instructor ©ITT Educational Services. disk drive size. Explain the difference between passing a piece of data ³by value´ and passing a piece of data ³by reference. bridge.

How would you structure your database? (IT203) Correct Response Criteria: The student explains how to do each of the following: Identify the entities in the database Select the unique identifier/primary key Identify appropriate attributes Select the appropriate data types Create a recursive relationship Identify the cardinality of a relationship Learning Level 2: Application/Analysis Question: 1. You are building a database to track a family tree.Question: 1. (IT203) Correct Response Criteria: The student identifies the following: Select query: Selects data from a table based on the arguments in the query Insert query: Inserts a single record or multiple record into a table Update query: Updates records in a table . 106 Date: 01/12/2010 Decision/branching Repetition/looping/iteration Topic 3: Databases Learning Level 3: Synthesis/Evaluation Question: 1. Inc. 2. an ³insert´ query. What are the implications of misidentifying a local and a global variable? (IT104) Correct Response Criteria: The student identifies the following concepts and explains how misusing a global and a local variable affects the output of a program: Knowledge of a local variable and how it is used Knowledge of a global variable and how it is used Module/subroutine/function Unique name/duplicate name/fully qualified name Data hiding Learning Level 1: Knowledge/Comprehension Question: 1. Explain the ³scope´ of a data statement. What are the three key control structures in programming and what are they used for? (IT104) Correct Response Criteria: The student identifies the following concepts and describes how they are used: Sequence Unconditional/conditional statements Appendix D: Individual Skills Assessment Questionnaire for the Instructor ©ITT Educational Services. and an ³update´ query. Explain the differences among a ³select´ query.

un-installation. Name and describe the server processes needed on the servers.´ Learning Level 1: Knowledge/Comprehension Question: 1. This is best suited for advanced users. (IT302) Correct Response Criteria: The student identifies the following: Required: NIS or LDAP Required: NFS (to permit exporting user home directories) Extra: Firewall concerns. NIS is insecure (so use NIS+ or LDAP) Learning Level 2: Application/Analysis Question: 1. Tar/gz²Building software from source code. What are the basic components of a database? (IT203) Correct Response Criteria: The student addresses the following concepts: Tables/entities Rows/instances/tuples Columns/attributes Primary key Relationships Foreign key Appendix D: Individual Skills Assessment Questionnaire for the Instructor ©ITT Educational Services. upgrading.Learning Level 1: Knowledge/Comprehension Question: 1. Tar originally derived from ³tape archive. querying. Inc. The administrator wishes to permit user settings and project files to be available when users log in on any machine.´ the archives are commonly referred to as ³tarballs. and verifying. 107 Date: 01/12/2010 Topic 4: Linux Learning Level 3: Synthesis/Evaluation Question: 1. What techniques can be used to install new software on Fedora? (IT250) 2. A small lab of Linux machines contains two servers. What file system is used on a Linux system? Correct Response Criteria: The student identifies the following file systems: Ext2 Ext3 . When would you use each? Correct Response Criteria: The student identifies the following: Yum²Yellowdog Update Modified: Automated software installation used when you have groups of computers to install and do not want to have to manually update each individually. RPM²Red Hat Package Management system: Command line-driven installation package that allows installation.

static IP configuration for the separate subnet. etc. developing. subnetting. Using the OSI model as a reference. NIC. Explain the purpose and components of the OSI model.Ext4 Appendix D: Individual Skills Assessment Questionnaire for the Instructor ©ITT Educational Services. What might have gone wrong and how would you fix it? Correct Response Criteria: The student identifies the following: Logical configurations: DHCP on the computers. When you implement the new subnet on the two machines. tracert. Physical connectivity: Cable. IT321) Correct Response Criteria: The student describes the troubleshooting that takes place on each of the following layers of the OSI model: Application Presentation Session Transport Network Data Link Physical Appendix D: Individual Skills Assessment Questionnaire for the Instructor ©ITT Educational Services. (IT220. IT320.). Identify what logical configurations you need in order to establish and test the connectivity. 108 Date: 01/12/2010 Topic 5: OSI Model Learning Level 3: Synthesis/Evaluation Question: 1. Learning Level 2: Application/Analysis Question: 1. 109 Date: 01/12/2010 Learning Level 1: Knowledge/Comprehension Question: 1. Inc. etc. IT320. . You are asked to set up a peer-to-peer Windows XP LAN using four computers with a LinkSys home Internet router with five built-in Ethernet switch ports. 2. DHCP configuration on the LinkSys router (range. power for all devices Troubleshooting: Routing between the two subnets on the router Troubleshooting: Testing commands such as ping. mask. describe how you would troubleshoot a connectivity problem. so you decide to put two of the machines on a separate subnet while still retaining communication between the two subnets. (IT220. IT321) Correct Response Criteria: The student identifies the following: Purpose: Standardization in designing. etc. Inc. only the machines on the original subnet are talking to each other. You have confirmed all the four computers are talking to each other. gateway. switch ports. The LinkSys router serves as the DHCP server for the entire network. manufacturing.

168.implementing.129 Appendix D: Individual Skills Assessment Questionnaire for the Instructor ©ITT Educational Services. Given the IP address 192. and any special designations for each. Session. IT320) Correct Response Criteria: The student identifies each of the following: IPv4.168.168. Inc. troubleshooting.10.10.127 and 192.168. You have a subnet of 255. What must be done for users on this network to communicate with the rest of the world through the Internet? (IT220. host address.168.168.168. Correct Response Criteria: The student identifies the characteristics of each of the following: Class A First octet: 1-126 Subnet mask: 255.255 Learning Level 1: Knowledge/Comprehension Question: 1. IT320.0 and 192.255. the last host.10. Correct Response Criteria: The student identifies the following: Subnet: 192.10.10. Identify the subnets.255 Routing Network Address Translation (NAT) Learning Level 2: Application/Analysis Question: 1.0 Begins with binary number: 0000 . (IT220.168.126 and 192.1.128 First host: 192.0. number of hosts.10. and the broadcast address.0 Host address: 192.1. subnet Private vs. 110 Date: 01/12/2010 Last host: 192.10.255.128 /25.0.168. and the broadcast address for the network.168. Transport.255.. Logical Link. Your network address is 192.255.25 Number of hosts: 254 Broadcast address for the subnet: 192. Presentation.0. public addresses Network address: 192.1 and 192.168. classes.168. IT321) 2. Identify the address classes in IPv4. IT320. the subnet mask.1.1. etc.10. Network.254 Broadcast address: 192. and Application Topic 6: TCP/IP Learning Level 3: Synthesis/Evaluation Question: 1. for computerized communication systems Components: Physical.10. List the address range of the first octet. identify the network address.25 with a subnet mask of 255. the first host.168.0.

IT321) Correct Response Criteria: The student identifies the following: ACL blocks the source address. Do not use this. Switch²LAN device.0 Begins with binary number: 1000 Class C First octet: 192-223 Subnet mask: 255. Describe the major types of cabling used in networks and what they are used for. Defines each subnet. Each port is a collision domain.Class B First octet: 128-191 Subnet mask: 255. ACL is placed close to the source to conserve bandwidth.255. Compare and contrast the major pieces of networking equipment used to construct an Ethernet network. Different types pass different levels of traffic. 111 Date: 01/12/2010 Bridge²Bridges two networks. Inc.0 Begins with binary number: 1100 Class D First octet: 224-239 Multi-cast Begins with binary number: 1110 Class E First octet 240-255 Government/Experimental Begins with binary number 1111 Topic 7: LANs/WANs Learning Level 3: Synthesis/Evaluation Question: 1. What does an Access Control List (ACL) block and why do you need to place it as close to the source as possible? (IT320. Router²Network gateway device. One big collision domain.255.255. (IT113) Correct Response Criteria: The student identifies the following cable types and describes what each is used for: 10/100BaseT²twisted pair . Learning Level 2: Application/Analysis Question: 1. (IT220) Correct Response Criteria: The student identifies the following pieces of network gear and describes their purpose: Hub²Peep-to-peer networking.0. Learning Level 1: Knowledge/Comprehension Question: 1. Appendix D: Individual Skills Assessment Questionnaire for the Instructor ©ITT Educational Services.

a hierarchical naming convention IIS/Web services: Internet Information Services. stores. IT321) 2. (IT109. allows the system administrator to administer and maintain a Web presence Active Directory: Identifies. IT221. IT222. and manages access to all network components Mail: Component responsible for mail WINS: Window Internet Name Service Learning Level 1: Knowledge/Comprehension Question: 1.10Base2²thinnet 10Base5²thicknet 100BaseFx UTP / STP Category 5e Topic 8: Windows Learning Level 3: Synthesis/Evaluation Question: 1. IT260. What does each task accomplish? Correct Response Criteria: The student identifies the following: Backups²allow recovery from lost data or system crashes Upgrades (software/hardware) ²keep network current and more secure System monitoring²contributes to network continuity and security Documentation²communication tool essential for continuity Appendix D: Individual Skills Assessment Questionnaire for the Instructor ©ITT Educational Services. IT222. 112 Date: 01/12/2010 Adding and maintaining Active Directory/user accounts²security Archiving²facilitates system recovery and record keeping Designing system and procedures²updates system and procedures Replying to user requests²keeps the users happy Learning Level 2: Application/Analysis Question: 1. IT221. What are the primary tasks of a system administrator? (IT220. IT320. Describe the services performed on a domain controller that would not be performed on a workgroup. Inc. IT222. IT260) Correct Response Criteria: The student identifies the following: Management services: Services built into Windows to allow the system administrator to manage network resources Directory services: Server component that organizes and stores file systems DNS services: Domain Name Service. Describe the difference between workgroups and domains in the context of information security. (IT221. IT260) Correct Response Criteria: The student identifies the following: Workgroups (peer-to-peer networks)²Local user accounts have their own .

Network profiles allow limited access to resources. many systems still offer this type connection Parallel²also not used in recent history due to speed limitations and distance Dial-up modem LAN connection via Internet Carrier and cable modems or DSL DHCP or static Learning Level 2: Application/Analysis Question: 1. Installation concerns include minimum hardware requirements and backward compatibility to older applications. IT260. Client/server²Local and user account access possible. IT109. IT302) Correct Response Criteria: The student identifies the following: Installation can be accomplished a number of different ways. IT260. IT109. Provide some examples of operating systems. Files can be stored on network resources. IT109. IT221. 113 Date: 01/12/2010 Correct Response Criteria: The student identifies the following: Network interface card (NIC ) driver installation Protocol installation²often done automatically using TCP/IP NIC. flash. How do you configure an operating system to interface with a network? (TB143IT103. IT221. IT222. Also you must consider interoperability with other computers via some sort of interface or network. IT260) 2. IT302) Appendix D: Individual Skills Assessment Questionnaire for the Instructor ©ITT Educational Services. What is an operating system? (IT103. If you can physically access the computer. What considerations should you take into account when preparing to install an operating system? (IT103. Learning Level 1: Knowledge/Comprehension Question: 1. Active Directory controls access to network resources. from another hard disk. to include disk media. IT250. . IT222. dual installation or more. allowing data to be properly secured. Installation includes installing on a blank computer.profile. or replacing an OS with a completely different one.Local area connection²Types of NICs ‡ Wired ‡ Wireless ‡ USB Serial connection²although not used due to speed limitations. in the case of upgrade. IT222. IT250. Inc. from an FTP site or HTTP. you can own it. upgrading to a newer OS from an existing one. Topic 9: Windows (Operating Systems) Learning Level 3: Synthesis/Evaluation Question: 1. IT221.

115 Date: 01/12/2010 Learning Level 1: Knowledge/Comprehension Question: . Examples of snap-ins: ‡ Computer Management ‡ Event Viewer ‡ Local Users and Groups ‡ Services ‡ Shared Folders Active Directory types of MMCs Appendix D: Individual Skills Assessment Questionnaire for the Instructor ©ITT Educational Services. IT260) Correct Response Criteria: The student identifies the following: Microsoft Management Console Snap-ins are the different ³applets´ that allow you to administer all aspects of a Windows computer. Sun. DNOS. Inc. DirectX Examples: Windows. What is an MMC with reference to Microsoft Windows operating systems? Describe several snap-ins related to the MMC. IT109. IT221. what is the difference between ³author mode´ and ³user mode´? (IT221.Correct Response Criteria: The student identifies the following: Interface between hardware and user Responsible for management and coordination of activities and sharing resources for the applications on the computer Responsible for sharing of resources Appendix D: Individual Skills Assessment Questionnaire for the Instructor ©ITT Educational Services. Inc. IT222. Linux. monitor. With regards to the MMC. User Mode²ability to ³execute´ a task setup by some administrator. (IT103. Mac OS. Often used for end users or department managers for tasks like changing domain passwords for subordinates Learning Level 2: Application/Analysis Question: 1. IT222. etc. cars. 114 Date: 01/12/2010 Manages hardware to alleviate the need for applications doing this. for example. DOS. When would you choose each? Correct Response Criteria: The student identifies the following: Author Mode²ability to ³change´ the MMC to adapt to a particular task. IT260) 2. Topic 10: Windows/MMC Learning Level 3: Synthesis/Evaluation Question: 1. imbedded OSs in phone. This is normally used by a system administrator when creating or changing MMC tasks. DX10 BSD.

Anything to the right of ³root´ signifies files or documents within a directory structure on the ³host´ computer. This example represents a company: Microsoft.Ch 7) Topic 11: DNS Learning Level 3: Synthesis/Evaluation Question: 1. IT222. IT260) Correct Response Criteria: The student identifies the following: Domain Namespace . find the OU you want to create/edit. ‡ Redmond. What are some of the ways you would troubleshoot a DNS problem? (IT221. Inc. What are the two ways you can create or edit a Group Policy Object (GPO)? Correct Response Criteria: The student identifies the following: First method: Open the MMC and browse Active Directory.microsoft. right-click. What is the significance of each component? Correct Response Criteria: The student identifies the following: Example: Computer1. What are the components of DNS? (IT221. IT260) 2. IT260) Correct Response Criteria: The student identifies the following: ping ipconfig /all nslookup from the command line to verify DNS entries are correct dcdiag /v to diagnose errors http://support.1.Redmond. IT222. What are the three components of a Fully Qualified Domain Name (FQDN)? (IT221. IT222. (70-294 . select Properties.Microsoft.Microsoft. located in a city: Redmond. Second method: In Active Directory Users and Computers. then go to the Group Policy tab.com ‡ Computer1 = Host: This is the individual computer or server being accessed. then choose the GPO you wish to edit.com = Domain: This is the ³owner´ of the domain.com Check the event viewer for errors or warnings. 116 Date: 01/12/2010 ‡ The period following ³com´ signifies root. Appendix D: Individual Skills Assessment Questionnaire for the Instructor ©ITT Educational Services. Learning Level 2: Application/Analysis Question: 1. Learning Level 1: Knowledge/Comprehension Question: 1.

The Apache Web server on Fedora is not returning data to the outside world. Correct Response Criteria: The student identifies the following: grep: parses the logs for lines containing certain data sed: can be used to format those lines into a more meaningful format Regular Expressions: used to match and create pattern replacement rules for the above two commands bash/perl: container scripting languages that permit automation of the above tasks. Advanced Topics Learning Level 3: Synthesis/Evaluation Question: 1. among other things Topic 13: Windows XP Learning Level 3: Synthesis/Evaluation . Which directories are most important on Linux and what do they contain? Correct Response Criteria: The student identifies the following: /etc: System configuration information /usr: Large executables (office suites. including the ³mail´ command to construct the email cron: scheduling service that permits interval-based of more static logs Learning Level 2: Application/Analysis Question: 1. mv. Inc. cp.DNS Zones Types of DNS name servers DNS resource records Topic 12: Linux. Design a tool chain that would contact an administrator via email in specific risk scenarios. A Fedora server is storing security logs that contain a vast array of data. 117 Date: 01/12/2010 iptables±list to verify that http connections are permitted /etc/httpd/conf/httpd. What could you do to check what might be wrong? Correct Response Criteria: The student identifies the following: ifconfig²a to check that the network card is up and has an address. ls) /boot: Kernel and bootloader config /home: User home directories /var: Logs. /sbin: System-wide basic commands (ping.conf: This file contains individual directory permissions based on IP. mount. Learning Level 1: Knowledge/Comprehension Question: 1. and would otherwise provide daily updates. service httpd status to verify the Web server thinks it¶s running Appendix D: Individual Skills Assessment Questionnaire for the Instructor ©ITT Educational Services. browsers) /bin. too. A basic ping would help.

Compare and contrast a workgroup with a domain. Correct Response Criteria: The student¶s answer includes: Differential backup. resources. Inc. How would you design and implement a backup and restore plan? Justify your choices. controlled administratively by policies or administrators DACL: Lists of users or groups that have been granted access to an object at the discretion of the owner Topic 14: Setup and Installation Learning Level 3: Synthesis/Evaluation Question: 1. incremental backup. What best practices should be considered when designing and implementing a security policy? Explain. and monthly backup Learning Level 2: Application/Analysis Question: 1.Question: 1. 118 Date: 01/12/2010 ‡ Client/server ‡ Active Directory controls access to network services. What is an information security policy? 2. Correct Response Criteria: The student identifies the following: InfoSec Policy is a document that outlines how your network will be . and management ‡ Domain is the gatekeeper for logins and permissions ‡ Essential for corporate networks Learning Level 1: Knowledge/Comprehension Question: 1. full backup Daily. When would you use each of them? Correct Response Criteria: The student identifies the following characteristics: Workgroup: ‡ Peer-to-peer ‡ No centralized management ‡ No centralized security ‡ Basic ³share´ permissions only ‡ Adequate for home use Domain: Appendix D: Individual Skills Assessment Questionnaire for the Instructor ©ITT Educational Services. What is the difference between a System Access Control List (SACL) and a Discretionary Access Control List (DACL)? Correct Response Criteria: The student identifies the following: SACL: Defined by the OS. weekly.

Explain the difference between connecting to a network using a Domain Server and one using Workgroups. so if you have access to one computer. User account permissions are set up in Active Directory and control every aspect of the user¶s ability to traverse the network. There is no centralized management.secured and protected from intruders. Learning Level 1: Knowledge/Comprehension Question: 1. Domain Server: All access to a domain is controlled on the domain controller. you just have to log on to one computer in the workgroup. you can normally access any computer in the workgroup. and users Learning Level 2: Application/Analysis Question: 1. All access to network resources is controlled using Active Directory. Correct Response Criteria: The student identifies the following: Workgroup: When connecting to a workgroup. What is required for an unattended installation or a remote installation of WinXP beyond what is required for an attended installation? Correct Response Criteria: . malicious acts. malicious code. Best practices: ‡ Perform a risk assessment to determine what is: Low risk²would not disrupt business or cause legal issues Medium risk²moderate disruption of service High risk²extreme disruption of service or causing legal/financial difficulties ‡ Determine the types of users and what types of access they would require Administrative access Privileged access User access Guest access Groups ‡ Network management procedures Appendix D: Individual Skills Assessment Questionnaire for the Instructor ‡ Software and hardware installation procedures and techniques ‡ How software updates are implemented: Pushed or pulled Tested prior to implementation ‡ User account management Password policy Network access controls ‡ Protection from viruses. and users.

How does a virtual private network (VPN) work and when you would want to put one into effect? Appendix D: Individual Skills Assessment Questionnaire for the Instructor ©ITT Educational Services. mailbox store. It can be used for a corporate intranet or to host a Web site on the Internet.exe Topic 15: Network Application Services Learning Level 3: Synthesis/Evaluation Question: 1. A VPN would be used to connect remote offices of a corporate network that are geographically separated. MAPI client. prescriptive checklist. domain server (remote install).The student identifies the following: Activation. It used private key encryption. such as the Internet. Inc. public folder store. answer file. domain controller. forestprep. DNS server.sif Setupmgr. Appendix D: Individual Skills Assessment Questionnaire for the Instructor ©ITT Educational Services. Learning Level 2: Application/Analysis Question: 1. mailbox enabling Learning Level 1: Knowledge/Comprehension Question: 1. Communication takes place on the Data Link Layer and the Network Layer of the OSI model. connection object. What is the purpose and function of IIS? Correct Response Criteria: The student identifies the following: IIS is Microsoft¶s Internet Information Service and was designed to allow the ability to host Web sites and Web-based applications programs. The VPN sits on top of the public network the Internet uses but does not necessarily have access to the Internet. virtual machines. Inc. Exchange System Manager console. and tunneling protocols to provide a secure environment. to provide connectivity between remote sites geographically separated. sysprep Remote installation service (RIS). Risetup. DHCP (remote install). virtual PC. . 121 Date: 01/12/2010 Point Scoring Table Student Name: _________________________________ . It is also used for employees who telecommute. What components should you install when setting up an Exchange Server? Correct Response Criteria: The student identifies the following: Active Directory. public key encryption. IIS allows you to have a Web site front end and a database backend.exe. LDAP. domainprep. 120 Date: 01/12/2010 Correct Response Criteria: The student identifies the following: A VPN is a secure corporate wide area network (WAN) that uses public network infrastructure.

each team member is required to complete this Teamwork Evaluation Form.0 = ____ x 0. Inc. Fill in this form after your final Project Presentation and submit it to your instructor along with the team¶s Project Documentation.8 = ____ x 0. where 1 means ³poor´ and 5 means ³excellent. On a scale of 1-5.6 = ____ Knowledge/Comprehension 0. 2 Point value for that level Points earned (Col.6 No or incorrect responses for all three levels 0 x 0.0 = ____ Total points earned Appendix D: Individual Skills Assessment Questionnaire for the Instructor ©ITT Educational Services.´ how do you view your colleagues¶ and your own participation in this project? Name _________________________ 1 2 3 4 5 (Print Name) Name _________________________ 1 2 3 4 5 (Print Name) Name _________________________ 1 2 3 4 5 (Print Name) .Levels of Knowledge Topic number(s) of highest level achieved Number of topics listed in Col. 122 Date: 01/12/2010 Appendix E: Teamwork Evaluation Form To maximize the teamwork experience. Areas for evaluation will be: ‡ Each of your teammates¶ participation in this project ‡ Each of your teammates¶ organizational contributions ‡ Each of your teammates¶ interpersonal communication performance ‡ Each of your teammates¶ subject-area expertise contributions ‡ Self-evaluation in the above four areas 1. 2 x Col. Information on this sheet will be used as part of the criteria to award the 15% of the total grade for each student²including you²who has participated in the project.8 x 1. 3) Synthesis/Evaluation 1 Application/Analysis 0.

where 1 means ³poor´ and 5 means ³excellent. 123 Date: 01/12/2010 2. where 1 means ³poor´ and 5 means ³excellent. On a scale of 1-5. On a scale of 1-5. Inc.Name _________________________ 1 2 3 4 5 (Print Name) Name _________________________ 1 2 3 4 5 (Print Name) Name _________________________ 1 2 3 4 5 (Print Name) Myself ________________________ 1 2 3 4 5 (Print Name) Appendix D: Individual Skills Assessment Questionnaire for the Instructor ©ITT Educational Services.´ how do you view your colleagues¶ and yours own organizational contributions to this project? Name _________________________ 1 2 3 4 5 (Print Name) Name _________________________ 1 2 3 4 5 (Print Name) Name _________________________ 1 2 3 4 5 (Print Name) Name _________________________ 1 2 3 4 5 (Print Name) Name _________________________ 1 2 3 4 5 (Print Name) Name _________________________ 1 2 3 4 5 (Print Name) Myself ________________________ 1 2 3 4 5 (Print Name) 3.´ how do you view your colleagues¶ and your own technological understanding of and contributions to this project? . On a scale of 1-5.´ how do you view your colleagues¶ and your own interpersonal communications in this project? Name _________________________ 1 2 3 4 5 (Print Name) Name _________________________ 1 2 3 4 5 (Print Name) Name _________________________ 1 2 3 4 5 (Print Name) Name _________________________ 1 2 3 4 5 (Print Name) Name _________________________ 1 2 3 4 5 (Print Name) Name _________________________ 1 2 3 4 5 (Print Name) Myself_________________________ 1 2 3 4 5 (Print Name) Appendix D: Individual Skills Assessment Questionnaire for the Instructor ©ITT Educational Services. where 1 means ³poor´ and 5 means ³excellent. Inc. 124 Date: 01/12/2010 4.

Explain the use of Gantt charts to view a project schedule.10.3. 2. Please use the same scale for evaluation.12.4. 1.7. 1. 1. 1. Identify the key principles that lead to better project team performance.). Describe the phases of a project life cycle. Define goals of project management practice and industry standards.) 5. 2. Use Microsoft Office Project to help plan and manage the actual capstone project. Determine the progress of a project by comparing the project timeline to . learning experience. Inc. 2.5. Demonstrate how to enter tasks and their duration in Microsoft Office Project. 1. 1. Explain milestones and recurring tasks and how they are used in a project plan.7.6. Network Development Capstone Project ©ITT Educational Services.8.2. Identify key principles for controlling project risks.2. 1. Determine team members. a company name.5. 125 Date: 01/12/2010 Appendix Z: Course Design Tool Course Objectives and Enabling Objectives 1. 1. Apply important concepts of project management to the actual capstone project proposed for this course.9. Identify essential components for successfully managing stakeholders¶ expectations.3. 2.Name _________________________ 1 2 3 4 5 (Print Name) Name _________________________ 1 2 3 4 5 (Print Name) Name _________________________ 1 2 3 4 5 (Print Name) Name _________________________ 1 2 3 4 5 (Print Name) Name _________________________ 1 2 3 4 5 (Print Name) Name _________________________ 1 2 3 4 5 (Print Name) Myself_________________________ 1 2 3 4 5 (Print Name) (Please use additional paper to include more team members. 2.11.4. Examine and identify existing processes. Determine the performance parameters that best specify each of the organization¶s design goals for the network infrastructure. Explain the essential steps and tools for effective risk management. Use additional paper if necessary.1.1. 2. 2. 1. Please write down any comments you have about this project (on team performance. 1. 2. Construct responsibilities to team members using Microsoft Office Project. and a company logo for a project. 1. Define the tasks and subtasks undertaken in the planning phase. etc. Identify and describe new system boundaries and processes. Determine what constitutes project management and what does not. Describe features of Microsoft Office Project 2003. 1. Define a project and the concept of project success.6.

5. 3. 3. Design presentation material and present solutions to demonstrate knowledge of subject matter. Demonstrate business and professional presentation skills. 3. Design a project schedule to manage the progress of a project. Describe the technologies used in the previous quarters. Identify the support of legacy equipment. Integrate and apply the knowledge acquired in the program to provide effective technological solutions for given problems. 7. Create the Work Breakdown Structure (WBS) to detail the steps of a project. Identify the implementation timescale.3.1.2. 4.4. Design a network with all hardware. Create test scripts to ensure the functionality of systems.6. Identify user needs and manage project deliverables. Use project planning techniques to avoid commonly made mistakes. and within the scope does not guarantee success. Demonstrate the best practices of project communication. and panel formats in a professional manner. Explain why completing a project on time.3. 4. 3. 3. Describe the business process.2. Summarize information required to implement defined protocols within a network environment. Work in teams to construct a large-scope project. 3.3. and status reporting. executed activities. 4. Identify any design constraints: 5. Incorporate a unique network specification and policy.2. 126 Date: 01/12/2010 4. Determine the progress of a project by comparing the project timeline to resource assignment.3. Network Development Capstone Project ©ITT Educational Services. Inc. Analyze the requirements for the capstone project.1.7.1.2.4. 5.2. 5.1.1. and solutions in a weekly journal. Conduct a quality assurance check. technology. Use testing scripts and team members to resolve outstanding issues. 7. 4. Construct internal and external analyses.4.1.4.2. services. and management details using the case study approach.resource assignment. 5. 4. Present and defend a proposal in spoken. 3.8. Set targets for the relevant network performance parameters.4. written. 4. Identify the best techniques for communication plans.6. 5.3. 3.4. problems encountered.4.1.2. meetings. 6. Document solutions to a problem in detail by applying critical thinking and problemsolving skills. software. Record planned activities. 3. 5. 6. 3. within the budget.5. 7.3.5. Determine key elements for successfully initiating a project. Submit detailed documentation to support a team¶s design vision and final . 5.2. 5.4. 3. Compare and contrast a Request for Proposal (RFP) and a case study. Determine the core business problem. 7. implementation. 3. Match the skill set with the technological deliverables of the project.2.

Complete a comprehensive skills assessment for the program of study. 8.proposed solution. .

Sign up to vote on this title
UsefulNot useful