COIT 20249 Professional Skills in Information Communication Technology Report 2 Sample

Assessment tasks

In this assessment, you are required to develop a portfolio of written submissions with varying tasks.

The compilation and submission of the written items are progressive throughout the term.

This assessment consists of two portfolio activities – Part A & B, each with varying tasks.

Requirements:

In Week 2, you learnt how to write professional emails and the ways to improve your email communication skills. Emails have long been a dominant tool for business communication, and it is certainly imperative to make the best use of emails to communicate effectively at the workplace.

However, email is not without its limitations. In this task, you are required to evaluate the role of good email etiquette in professional communication.

On the Moodle site (Week 2 tile or under supporting documentation), read three documents “How to email your lecturer”, “Writing effective email and email etiquette” and “Email quality worksheet.” Then, analyse the structure and organisation of the sample email provided on the next page. Finally, write your analysis discussing the following points:

1. How the email meets or misses elements of an effective email.

2. How the email could be further improved.

3. Could an alternative communication method have been used instead of email? If yes, which one and why? If not, why?

*Please note that you are not required to rewrite the email but only discuss the above points.

Task 2

Requirements:

In this part, you are required to utilise the ARE (Analyse, Research and Evaluate) model to develop a mind map. The specific activities that you need to undertake are:

1. Analyse an ICT-related problem or issue, finding out what needs to be researched in order to address it.

2. Research five relevant, reliable and reputable sources of information on your problem or issue and link these to the themes you have defined in your analysis of the problem/issue. References should be from 2022 onwards.

3. Evaluate the evidence to bring it together so that it begins to answer your problem/addresses your issue.

Once you have undertaken the above activities, draw a mind map using an online tool such as Miro or MindMup. The mindmap should include the main problem you analysed, the main themes identified, and the five references. You are only required to submit your mind map.

2. Assessment 2 - Part B

Requirements:

In this part, you need to visit an Australian job search website and look for an entry-level role in

Information Technology/Information Systems that would be your target job upon graduation.

Popular job sites in Australia include but are not limited to:

• Seek.com.au
• Careerone.com.au (powered by monster.com)
• Indeed.com.au
• Jora.com.au
• Adzuna.com.au

Once you find a job of your choice/interest, then you need to complete the following tasks:

Task 1 (Job Cover Letter + Resume): 5 marks

In this task, you are required to:

- Write a one-page job cover letter to express your interest in the position you shortlisted; and

- Prepare a two-page resume to support the shortlisted job.

Task 2

In this task, you are required to create a comparison table with four columns and populate it with the following details.

- The first column of the table should contain the qualities and skills desired by the job you selected.

- The second column should include the qualities and skills you currently have.

- The third column should list qualities and skills you do not have for this particular job.

- The fourth column should outline how you plan to bridge the shortfall or gap in your skills over the next 24 months (Bullet points are acceptable in this column).

Solution

Part A: Evaluate the role of good email etiquette in professional communication

Analysis of the Email

In terms of the email have many crucial elements. When it comes to the categorization, such as a salutation, a descriptive subject line, and a conclusion. But, it also falls short in a variety of other ways. In terms of stating the first factor, it can be stated that, using all capital letters throughout the email is unprofessional and takes away from the message. University Assignment help, Furthermore, the entire sender's authority gets threatened by an evident number of grammatical and typographical errors. In terms of summarising, the email's left-aligned formatting and too condensed paragraphs make it challenging to read. The call to action in the email is unclear; making it impossible for the learner to know what is expected of them.

Improving the Email

The sender might modify a few things to make the email better. First, they might eliminate words with extra capital letters and check that the email is grammatically correct and error-free. Second, by employing brief, succinct paragraphs and aligning the content to the left, they might enhance the email's formatting (Stich et al., 2019). Finally, they may include a crystal-clear call to action, such as requesting that the student arrange a meeting to talk about their time management abilities. Finally, given that students are frequently busy and pressed for time, they should make sure the email is brief and to the point. The subject of the email could be something like “Importance of punctuality in class”. The email instead of starting with “Hello” must have “Dear” followed by the name of the student.

A call to action might be included in the email to make it even better. This may be phrased as "We look forward to hearing from you if you need more support" or "Please let us know if you have any additional questions or issues concerning punctuality or time management." This will motivate the reader to act and contact you if they need assistance (Dada et al., 2019). Messages tailored to each student, such as reminders of attendance history or links to useful resources, can increase the effectiveness of the message.

Alternative Communication Methods

It is observed that email is the most common way for teachers to communicate with students, it’s not the most effective. Other methods may be more appropriate depending on the situation. For example, a phone call or text message may be more appropriate if the matter is urgent or requires a quick response. Face-to-face meetings can be very useful if the topic is complicated or needs a thorough explanation. If the student wants to communicate through another medium, such as a messaging app or social media platform, the professor must be willing to use these methods as well. After that the method of communication should be defined by the nature of the problem, the severity of the situation, and the student’s preferences (Karim et al., 2019). The type of communication selected should be determined by the context and purpose of the message. In this case, email was likely chosen because it was the most efficient way to communicate with a large number of students at once.

Part B: New Technology Integration ICT

Introduction

The process of integrating cutting-edge technologies into existing systems, procedures, or workflows to improve outcomes, efficiency, and performance is referred to as "new technology integration." However, it also comes with difficulties, such as the need to adjust to change, deal with potential security issues, control data privacy, and instruct employees on how to use the new technology effectively.

Integration of New Technology in ICT

The ARE (Secure, Rethink, Broaden) model is a system that can be utilized for coordinating new innovation in the field of Data and Correspondence Innovation (ICT).

Acquire: The first thing that needs to be done at this stage is to find and acquire new technology (Hoffman et al., 2022). This entails studying and evaluating new ICT-relevant technologies.

Reframe: The subsequent step is to reframe the new technology within the ICT framework. Analyzing the new technology's potential impact on existing ICT systems, procedures, and workflows is necessary for this.

Extend: The new technology is incorporated into the existing ICT ecosystem at this stage. This includes executing the vital changes to ICT frameworks, cycles, and work processes to actually integrate the new innovation (Pelucchi et al., 2022).

An organized strategy for incorporating new technology into ICT is provided by the ARE model. The new technology must be acquired and reframed within the ICT framework.

The ARE model has been developed in the Mind map for understanding the Influence of New Technology Integration in ICT which is given below:

Figure 1: Mind Map
(Source: Mind up)

Problems faced in using the integration of new Technology in ICT

Interoperability and compatibility: It may be difficult to seamlessly integrate new technologies because they may not be fully compatible with existing applications, infrastructure, or systems. Data inconsistencies, software conflicts, and disruptions to operations are all possible outcomes of this.

Resources and Prices: Upgrades to the infrastructure, software licenses, training, and ongoing maintenance are all common prerequisites for the successful implementation of new technology. Allocating sufficient funds and resources to support the integration of new technology into an organization's ICT ecosystem may be challenging.

Systems of the past: Incorporating new technology into outdated or obsolete legacy systems that are still in use can be challenging (Tiwari et al., 2022). The seamless integration of new technology may be hampered by these systems' compatibility, interoperability, and scalability limitations.
In conclusion, careful planning, resource allocation, change management, and consideration of various technical, operational, and regulatory factors are all necessary for the successful integration of new technology into ICT ecosystems.

Importance of ICT in adopting new technology

The adoption of new technologies can be accelerated by embracing and utilizing ICT, resulting in increased productivity, innovation, and societal progress (Haghnegahdar et al., 2022). Improving connectivity, making it easier to access information, making it easier to innovate, making automation and efficiency possible, and closing the digital divide, information, and communications technology.

Recommendations for future growth

The ICT industry has room for expansion because there is a significant demand for cutting-edge cybersecurity solutions like threat intelligence, security analytics, identity and access management, and more (Bulturbayevich et al., 2020). These are only a portion of the potential development regions in the field of ICT.

Conclusion

The incorporation of brand-new technology has resulted in significant advancements in numerous facets of our lives; however, it also comes with difficulties that require resolution. We can harness the power of new technology to create a better and more inclusive future for all by carefully considering the ethical implications and mitigating risks.

References

Bulturbayevich, M.B. and Abduvafoyevna, M.M., 2022. Development of Methodology for Managing the Activities of Vertically Integrated Industrial Enterprises. INTERNATIONAL JOURNAL OF RESEARCH IN COMMERCE, IT, ENGINEERING AND SOCIAL SCIENCES ISSN: 2349-7793 Impact Factor: 6.876, 16(06), pp.95-105.

Dada, E.G., Bassi, J.S., Chiroma, H., Adetunmbi, A.O. and Ajibuwa, O.E., 2019. Machine learning for email spam filtering: review, approaches and open research problems. Heliyon, 5(6), p.e01802.

Hoffman, D.L., Moreau, C.P., Stremersch, S. and Wedel, M., 2022. The rise of new technologies in marketing: A framework and outlook. Journal of Marketing, 86(1), pp.1-6.

Karim, A., Azam, S., Shanmugam, B., Kannoorpatti, K. and Alazab, M., 2019. A comprehensive survey for intelligent spam email detection. IEEE Access, 7, pp.168261-168295.

Pelucchi, E., Fagas, G., Aharonovich, I., Englund, D., Figueroa, E., Gong, Q., Hannes, H., Liu, J., Lu, C.Y., Matsuda, N. and Pan, J.W., 2022. The potential and global outlook of integrated photonics for quantum technologies. Nature Reviews Physics, 4(3), pp.194-208.

Stich, J.F., Tarafdar, M., Stacey, P. and Cooper, S.C., 2019. Appraisal of email use as a source of workplace stress: A person-environment fit approach. Journal of the Association for Information Systems, 20(2), p.2.

2. Assessment 2

Task 1

Sincerely,
[Your Name]
[Address]
[City, State, Zip Code]
[Email Address]
[Phone Number]

Objective:

? I want to use my technical knowledge and academic accomplishments to get a first job in the field of information technology or information systems when I finish school.

Education:

? Master of Science (M.S.) in Information Systems Candidate, CQ University
? Expected graduation date: Nov 2023
? Bachelor of Science (B.S.) in Computer Science, XYZ University
? Graduated: May 2021

Skills:

? Extensive knowledge in computer science and related fields, including many programming languages, database systems, and software applications.
? Good ability to express oneself both orally and in writing.
? Competent handling of schedule constraints and attention to detail.
? Outstanding capacity for analytical reasoning and problem solutions.
? Upbeat demeanor, full of good cheer.

Experience:

None yet, but eager to learn and contribute in a professional setting.

Task 2

 

Task 3

I want to actively work to fill my skill gaps so that I can be a strong contender for a store management job in retail. I feel that taking the necessary certification courses, going to workshops, participating in system analysis and design projects, working with seasoned experts, and completing online courses and tutorials will provide me with the information and abilities I need to succeed in this position. Together with what I learn here, I am confident that I will be able to foster an environment where all team members feel valued and supported in their efforts to provide outstanding customer service and achieve operational excellence by virtue of my excellent communication, time management, active listening, customer support, product knowledge, empathy, patience, critical thinking, positive, and friendly demeanor. To achieve my goal of moving up the retail ladder from store supervisor to store manager, I plan to adopt the following techniques over the course of the next 24 months.

References

Haghnegahdar, L., Joshi, S.S. and Dahotre, N.B., 2022. From IoT-based cloud manufacturing approach to intelligent additive manufacturing: Industrial Internet of Things—An overview. The International Journal of Advanced Manufacturing Technology, pp.1-18.

Tiwari, S.P., 2022. Knowledge Management Strategies and Emerging Technologies--An Overview Of the Underpinning Concepts. arXiv preprint arXiv:2205.01100.

Would you like to schedule a callback?
Send us a message and we will get back to you

Highlights

Earn While You Learn With Us
Confidentiality Agreement
Money Back Guarantee
Live Expert Sessions
550+ Ph.D Experts
21 Step Quality Check
100% Quality
24*7 Live Help
On Time Delivery
Plagiarism-Free

Uni Assignment Help
A+ Grade Assured

Assignment Support
Hello!
Struggling with your assignments? Get 30% OFF on your first order.

Chat with experts now!
×
Get Instant Help
University Assignment Help

Still Finding University Assignment Help? You’ve Come To The Right Place!

AU ADDRESS
81 Isla Avenue Glenroy, Mel, VIC, 3046 AU
CONTACT