Professional Documents
Culture Documents
COURSE DESCRIPTION
Provides students with the knowledge and skills necessary to perform administration tasks in a peer to peer network or server centric network. Administration topics include installation, configuration, user management, resource management, and security.
INSTRUCTIONAL MATERIALS
Required Resources Zacker, C. (2011). Microsoft Official Academic Course. 70-680: Windows 7 Configuration, Lab Manual. Danvers, MA: John W iley and Sons. Zacker, C. (2011). Microsoft Official Academic Course. 70-680: Windows 7 Configuration, Textbook . Danvers, MA: John W iley and Sons. Microsoft Office, Microsoft Visio, and Microsoft Project or their equivalents such as Open Project, Dia, and OpenOffice are required. Tutorials for Microsoft Office 2010 can be found on Microsofts support site, located at http://office.microsoft.com/en-us/support/training-FX101782702.aspx MOAC Labs Online for MOAC 70-680 Windows 7 Configuration. Wiley. WileyPLUS will be used in this course and is integrated with the online course shell. Students are emailed a registration code for this product when they purchase new course materials from MBS Direct Bookstore, located at http://bookstore.mbsdirect.net/strayer.htm Supplemental Resources Beezix, Inc. (2009). Windows 7 quick reference guide (cheat sheet of instructions, tips & shortcuts laminated card). Salt Lake City, UT: Beezix, Inc. Bott, E., Siechert, C., & Stinson, C. (2011). Windows 7 inside out, deluxe edition. Redmond, W A: Microsoft Press. Karp, D. A. (2010). Windows 7 annoyances: Tips, secrets, and solutions . Sebastopol, CA: OReilly Media, Inc. Microsoft Corporation. (2012). Getting started with Windows 7. Retrieved from http://windows.microsoft.com/en-US/windows7/help/getting-started Microsoft Corporation. (2012). Microsoft accessibility: Technology for everyone, Accessibility tutorials for Microsoft products. Retrieved from http://www.microsoft.com/enable/training/default.aspx Microsoft Corporation. (2012). Windows 7 videos: Check out these featured videos and get to know Windows 7. Retrieved from http://windows.microsoft.com/en-US/windows7/products/videos Pouge, D. (2010). Windows 7: The missing manual. Sebastopol, CA: O'Reilly Media, Inc. Stanek. W. R. (2009). Windows 7 administrator's pocket consultant. Redmond, WA: Microsoft Press. Tulloch, M., Corporation, M., Northrup, T., Honeycutt, J., & Wilson, E. (2010). Windows 7 resource kit. Redmond, W A: Microsoft Press.
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 1 of 25
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 2 of 25
e-Activities o Go to the Microsoft Website to read about W indows 7 editions, located at http://windows.microsoft.com/enUS/windows7/products/compare. Be prepared to discuss. o Go to the TechRepublic Website to read the article titled Plan Clients W indows 7 Upgrade with these useful tips, located at http://www.techrepublic.com/blog/project-management/plan-clientswindows-7-upgrade-with-these-useful-tips/1024. Be prepared to discuss. Activities Discussions Evaluation Graded Evaluation o None Non-Graded W ileyPLUS Optional Evaluation o WileyPLUS Activity: Practice Assignments 01.01 through 01.06 o WileyPLUS Activity: Practice Assignments 02.01 through 02.05 Reading(s) o Lesson 3: Deploying W indows 7 10
Preparation
e-Activity o Go to the Microsoft TechNet Website to read the article titled Building a Standard Image of Windows 7: Step-by-Step Guide, located at http://technet.microsoft.com/enus/library/ee523217(WS.10).aspx. Be prepared to discuss. Activities Discussions Evaluation Graded Evaluation o Quiz 1: Lessons 1 and 2 o Lab 1: MOAC Labs 1, 2, and 3 o Lab 2: MOAC Labs 4 and 5 Non-Graded W ileyPLUS Optional Evaluation o WileyPLUS Activity: Practice Assignments 03.01 through 03.04 10
30 33 22
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 3 of 25
e-Activity o Go to the Seagate W ebsite to read the article title Hard Drive Basics, located at http://www.seagate.com/ww/v/index.jsp?vgnextoid=2df42bb581b51 210VgnVCM1000001a48090aRCRD. Be prepared to discuss. Activities Discussions Evaluation 4 Graded Evaluation o Lab 3: MOAC Lab 6 Non-Graded W ileyPLUS Optional Evaluation o WileyPLUS Activity: Practice Assignments 04.01 through 04.03 Reading(s) o Lesson 5: Connecting to a Network 10
11
Preparation
e-Activity o Go to http://www.openbookconsulting.org/giip/lectures04/lecture2osi-supplimental.pdf to read James Bond Meets the 7 Layer OSI Model; afterward, visit http://www.answersthatwork.com/Download_Area/ATW_Library/Net working/Network 2-List_of_Common_TCPIP_port_numbers.pdf to read List of Common TCP/IP Port Numbers. Be prepared to discuss. Activities Discussions Evaluation Graded Evaluation o Quiz 2: Lessons 3 and 4 o Lab 4: MOAC Lab 7 Non-Graded W ileyPLUS Optional Evaluation o WileyPLUS Activity: Practice Assignments 05.01 through 05.02 Reading(s) o Lesson 6: Sharing Resources 10
30 11
Preparation
e-Activity o Go to the Microsoft TechNet Website to read the article titled Set Permissions on a Shared Resource, located at http://technet.microsoft.com/en-us/library/cc772501.aspx. Be prepared to discuss. Activities Discussions Evaluation 10
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 4 of 25
Preparation
e-Activity o Go to the Microsoft TechNet Website to read the article titled Understanding Application Compatibility, located at http://technet.microsoft.com/en-us/library/ee449431(WS.10).aspx. Be prepared to discuss. Activities Discussions Evaluation Graded Evaluation o Lab 6: MOAC Lab 10 o Assignment 1: IT Consultation for Mr. Green Non-Graded W ileyPLUS Optional Evaluation o WileyPLUS Activity: Practice Assignments 07.01 through 07.03 10
11 100
Preparation Reading(s) o Lesson 8: Managing and Monitoring Windows 7 Performance o Lesson 9: W orking with W orkgroups and Domains e-Activity o Go to the TechRepublic Website to read the article titled Keep tabs on ReadyBoost with W indows 7s Performance Monitor, located at http://www.techrepublic.com/blog/window-on-windows/keep-tabson-readyboost-with-windows-7s-performance-monitor/2257. Be prepared to discuss. Activities Discussions Evaluation Graded Evaluation o Quiz 3: Lessons 6 and 7 o Lab 7: MOAC Labs 11 and 12 Non-Graded W ileyPLUS Optional Evaluation o WileyPLUS Activity: Practice Assignments 08.01 through 09.03 Reading(s) o Lesson 10: Securing Windows 7 e-Activity o Go to the E-Week Website to read the article titled How to Protect 10
30 21
Preparation
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 5 of 25
10
Preparation Reading(s) o Lesson 11: Administering Windows 7 e-Activity o Go to the Apple W ebsite to read the article titled Mac OS 7.x 9.x Troubleshooting Startup Issues, located at http://support.apple.com/kb/TS1926. Be prepared to discuss. Activities Discussions Evaluation Graded Evaluation o Quiz 4: Lessons 8 through 10 o Lab 9: MOAC Labs 14 and 15 o Assignment 2: Windows 7 Workgroup Consultation for Sally Chu Non-Graded W ileyPLUS Optional Evaluation o WileyPLUS Activity: Practice Assignments 11.01 through 11.03 10
30 20 100
10
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 6 of 25
200
11
Preparation Reading(s): None Activities Discussions Evaluation Graded Evaluation o Final Exam: Lessons 5 through 12 Non-Graded W ileyPLUS Optional Evaluation o None 100
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 7 of 25
Tests are open book with a 2-hour time limit and may contain multiple choice, true / false, and essay questions. Participation (20 discussions worth 5 points apiece) Note: W eek 11 discussions are not graded. Total 100 1,000 10% 100%
Points 900 1,000 800 899 700 799 600 699 Below 600
Percentage 90% 100% 80% 89% 70% 79% 60% 69% Below 60%
Grade A B C D F
Writing Assignments The objective of the School of Information Systems writing assignments is to promote attitudes and skills that will improve a students ability to communicate in writing, develop research skills and documentation techniques, and encourage critical analysis of data and conclusions specific to the course learning outcomes in the information systems and technology domain.
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 8 of 25
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 9 of 25
The specific course learning outcomes associated with this assignment are: Identify computing conditions in which a system needs to be reconfigured. Demonstrate the ability to install and configure an operating system and its associated updates. Validate and successfully install a computer operating system. Demonstrate the ability to discuss the migration phases and considerations in an operating system installation. Prepare an enterprise environment for systems deployment using image files. Configure and define the disks and devices in an operating system environment. Use technology and information resources to research issues in desktop administration and operating system environments. Write clearly and concisely about desktop administration and operating system environments using proper writing mechanics and technical style conventions.
Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric. Points: 100 Assignment 1: IT Consultation for Mr. Green Meets Minimum Expectations 60-69% D
Insufficiently listed and insufficiently explained the concerns about Windows 7 Ultimates capabilities that Mr. Green should be aware of currently. Insufficiently listed and insufficiently explained the
Criteria
Fair 70-79% C
Partially listed and partially explained the concerns about Windows 7 Ultimates capabilities that Mr. Green should be aware of currently.
Proficient 80-89% B
Satisfactorily listed and satisfactorily explained the concerns about Windows 7 Ultimates capabilities that Mr. Green should be aware of currently. Satisfactorily listed and satisfactorily explained the
Exemplary 90-100% A
Thoroughly listed and thoroughly explained the concerns about Windows 7 Ultimates capabilities that Mr. Green should be aware of currently. Thoroughly listed and thoroughly explained the
1. List and explain the concerns about Windows 7 Ultimates capabilities that Mr. Green should be aware of currently. Weight: 5%
2. List and explain the concerns about Windows 7 Ultimates capabilities that Mr.
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 10 of 25
3. Use Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, or OpenOffice to illustrate the steps of the most efficient method for Mr. Green to install Windows 7 Ultimate. Weight: 10%
Partially used Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, or OpenOffice to illustrate the steps of the most efficient method for Mr. Green to install Windows 7 Ultimate. Partially explained your graphically depicted solution for the most efficient method for Mr. Green to install Windows 7 Ultimate. Partially described the concerns you have about helping Mr. Green experiment with Windows 7 Ultimate without requiring a commitment to it. Partially listed and described the features of Windows 7 Ultimate that can provide all of this functionality, if
4. Explain your graphically depicted solution for the most efficient method for Mr. Green to install Windows 7 Ultimate. Weight: 10%
5. Describe the concerns you have about helping Mr. Green experiment with Windows 7 Ultimate without requiring a commitment to it. Weight: 10%
6. List and describe the features of Windows 7 Ultimate that can provide all of this functionality, if existent. Weight: 10%
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 11 of 25
8. List the steps necessary for providing a user with the capability of running two (2) different Windows-based operating systems installed on the same computer. Weight: 10%
Did not submit or incompletely listed the steps necessary for providing a user with the capability of running two (2) different Windows-based operating systems installed on the same computer.
Insufficiently listed the steps necessary for providing a user with the capability of running two (2) different Windowsbased operating systems installed on the same computer. Insufficiently explained the reason for choosing a particular hard disk partitioning style, disk type, and file system. Does not meet the required number of references; all references poor quality choices. 7-8 errors present
Partially listed the steps necessary for providing a user with the capability of running two (2) different Windows-based operating systems installed on the same computer. Partially explained the reason for choosing a particular hard disk partitioning style, disk type, and file system.
Thoroughly listed the steps necessary for providing a user with the capability of running two (2) different Windowsbased operating systems installed on the same computer. Thoroughly explained the reason for choosing a particular hard disk partitioning style, disk type, and file system. Exceeds number of required references; all references high quality choices. 0-2 errors present
9. Explain the reason for choosing a particular hard disk partitioning style, disk type, and file system. Weight: 10%
Did not submit or incompletely explained the reason for choosing a particular hard disk partitioning style, disk type, and file system. No references provided
Does not meet the required number of references; some references poor quality choices. 5-6 errors present
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 12 of 25
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 13 of 25
The specific course learning outcomes associated with this assignment are: Describe the properties of user accounts and configure its components. Demonstrate authentication and authorization in configuring secure user accounts. Use technology and information resources to research issues in desktop administration and operating system environments. Write clearly and concisely about desktop administration and operating system environments using proper writing mechanics and technical style conventions.
Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.
Points: 100
Assignment 2: Windows 7 Workgroup Consultation for Sally Chu Meets Minimum Expectations 60-69% D
Insufficiently listed and explained the steps you would take to provide the most-efficient method of creating user accounts for these employees. Insufficiently explained two (2) different forms of authentication methods that Windows 7 supports that can be combined with requiring a password for network access. Insufficiently discussed the advantages and disadvantages of using both
Criteria
Fair 70-79% C
Partially listed and explained the steps you would take to provide the most-efficient method of creating user accounts for these employees. Partially explained two (2) different forms of authentication methods that Windows 7 supports that can be combined with requiring a password for network access. Partially discussed the advantages and disadvantages of using both
Proficient 80-89% B
Satisfactorily listed and explained the steps you would take to provide the most-efficient method of creating user accounts for these employees. Satisfactorily explained two (2) different forms of authentication methods that Windows 7 supports that can be combined with requiring a password for network access. Satisfactorily discussed the advantages and disadvantages of using both
Exemplary 90-100% A
Thoroughly listed and explained the steps you would take to provide the most-efficient method of creating user accounts for these employees. Thoroughly explained two (2) different forms of authentication methods that Windows 7 supports that can be combined with requiring a password for network access. Thoroughly discussed the advantages and disadvantages of using both
1. List and explain the steps you would take to provide the mostefficient method of creating user accounts for these employees. Weight: 10%
2a. Explain two (2) different forms of authentication methods that Windows 7 supports that can be combined with requiring a password for network access. Weight: 5%
3. Discuss the advantages and disadvantages of using both the methods youve chosen.
Did not submit or incompletely discussed the advantages and disadvantages of using both the
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 14 of 25
5. Explain how the firms employees can remain safe from Internet predators by describing at least two (2) Internet threats and how Internet Explorer 8 can help safeguard them against these threats. Weight: 10%
6. Describe the update distribution method you would choose and why. Weight: 10%
7. Explain how you would plan the distribution of updates on the network. Weight: 10%
8. List and describe at least three (3) steps you can take using Windows 7 to try to determine what has been slowing down the
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 15 of 25
9. 3 references Weight: 5%
Does not meet the required number of references; some references poor quality choices. 5-6 errors present
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 16 of 25
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 17 of 25
The specific Course Learning Outcomes associated with this assignment are: Demonstrate authentication and authorization in configuring secure user accounts. Demonstrate operating system troubleshooting techniques. Demonstrate the ability to understand operating system administration activities. Use technology and information resources to research issues in desktop administration and operating system environments. Write clearly and concisely about desktop administration and operating system environments using proper writing mechanics and technical style conventions.
Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric. Points: 200 Technical Paper Project: Disseminating Organizational IT Security and Troubleshooting Best Practices Meets Minimum Expectations 60-69% D
Insufficiently listed and discussed two (2) user authentication policies that you can implement to help improve the networks
Criteria
Fair 70-79% C
Partially listed and discussed two (2) user authentication policies that you can implement to help improve the networks
Proficient 80-89% B
Satisfactorily listed and discussed two (2) user authentication policies that you can implement to help improve the networks
Exemplary 90-100% A
Thoroughly listed and discussed two (2) user authentication policies that you can implement to help improve the networks
1. List and discuss two (2) user authentication policies that you can implement to help improve the networks security. Weight: 5%
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 18 of 25
2b. Create a communication medium that approaches this from the perspective of security best practices and awareness from the user perspective. Weight: 5%
2c. Create a communication medium that includes at least four (4) best practice methods. Weight: 5%
2d. Create a communication medium that includes at least two (2) supplemental graphical renderings of best practice methods through the use of Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice (flowcharts, process diagrams, tables, etc.). Weight: 5%
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 19 of 25
3b. Create a communication medium that approaches this communication from the perspective of specific technologies the IT technicians can implement to tighten IT security. Weight: 5%
3c. Create a communication medium that includes at least four (4) different Windows 7 technologies, excluding authentication. Weight: 5%
4. Create and describe (3) scenarios where there is an IT problem that requires troubleshooting. Weight: 5%
5. Describe the steps you would take to handle the situation by modeling them after an effective troubleshooting methodology for each scenario you previously created in Question four (4). Weight: 5%
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 20 of 25
7. Develop a 3-6 slide PowerPoint presentation in which you illustrate the authentication policies, which you identified in Part 1 Question 1, by including at least two (2) SmartArt diagrams graphically depicting them. Weight: 10%
8. Develop a three to six (3-6) slide PowerPoint presentation in which you describe at least two (2) network security breach scenarios that can be prevented by implementing the authentication policies which you identified in Part 1 Question 1. Weight: 10%
9. Develop a three to six (3-6) slide PowerPoint presentation in which you include PowerPoint speaker notes that will accompany each slide with five to ten (5-10) sentences and provide more detail
Did not submit or incompletely developed a three to six (3-6) slide PowerPoint presentation in which you included PowerPoint speaker notes that will
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 21 of 25
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 22 of 25
Instructional Materials
In order to be fully prepared, obtain a copy of the required textbooks and other instructional materials prior to the first day of class. When available, Strayer University provides a link to the first three (3) chapters of your textbook(s) in eBook format. Check your online course shell for availability. Review the online course shell or check with your professor to determine whether Internet-based assignments and activities are used in this course. Strayer students are encouraged to purchase their course materials through our designated bookstore MBS Direct. http://bookstore.mbsdirect.net/strayer.htm If a lab is required for the course, MBS Direct is the only vendor that sells the correct registration code so that Strayer students may access labs successfully.
Discussions
Students taking this course online are required to post their discussions to a weekly thread in the online course shell. To earn full credit in an online threaded discussion, students must have a total of 3 posts per discussion thread. Additionally, the posts must be made on two different days during the week. Please note: Material in the online class will be made available on the previous Thursday. As it is always possible that students could lose their work due to unforeseen circumstances, it is a best practice to routinely save a working draft in a separate file before posting in the course discussion area. Professors hold discussions during class time for on-ground students. Check with your professor if any additional discussion participation is required in the online course shell outside of class hours.
Tests
Tests (quizzes, midterm and final exams, essay exams, lab tests, etc.) are available for student access and completion through the online course shell. Check the online course shell to determine how you are expected to take the tests. Online students are to complete the test by Sunday midnight the week the test is due. On-ground students are to complete the tests after the material is covered and before the next class session.
Assignments
A standardized performance grading rubric is a tool your professor will use to evaluate your written assignments. Review the rubric before submitting assignments that have grading rubrics associated with them to ensure you have met the performance criteria stated on the rubric. Grades are based on individual effort. There is no group grading; however, working in groups in the online or on-ground classroom is acceptable. Assignments for online students are always submitted through the online course shell. On-ground professors will inform students on how to submit assignments, whether in paper format or through the online course shell.
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 23 of 25
MOAC Labs Online student login instructions: Students accessing MOAC Labs Online for the first time must enter their access code. The access code is located in a black or white envelope along with login instructions specific to the individual code. o Students receiving their access code in a black envelope can access MOAC Labs Online by following the instructions printed on the access card, through the online course shell, or at the following Website: http://moac.microsoftlabsonline.com Students receiving their access code in a white envelope can access MOAC Labs Online by following the instructions printed on the access card, or at the following W ebsite: http://itacademy.microsoftelearning.com/
MOAC Labs Online student support: Additional information is available in the student MLO Guide located in the online course shell under Additional Resources in the Student Center tab. Students may also contact Strayer Online Technical Support by logging in to their iCampus account at https://icampus.strayer.edu/login and submitting a case under Student Center, then Submit Help Ticket. Technical Support is available via phone at (877) 642-2999 option 3. For help with log-in or technical and connectivity issues within the labs, MOAC Lab Support is available at (877) 450-9875 or by emailing moacsup@microsoft.com. Hours: 2 am 6 pm PST, Monday through Friday & 9 am 6 pm PST on Sunday
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 24 of 25
For technical questions, please contact Strayer Online Technical Support by logging in to your iCampus account at https://icampus.strayer.edu/login and submitting a case under Student Center, then Submit Help Ticket. If you are unable to log in to your iCampus account, please contact Technical Support via phone at (877) 642-2999. For concerns with your class, please access the Solution Center by logging in to your iCampus account at https://icampus.strayer.edu/login and submitting a case under Student Center, then Submit Help Ticket. If you are unable to log in to your iCampus account, please contact the IT Help Desk at (866) 610-8123 or at mailto:IThelpdesk@Strayer.edu.
TurnItIn.com is an optional online tool to assess the originality of student written work. Check with your professor for access and use instructions. The Strayer Policies link on the navigation bar in the online course shell contains academic policies. It is important that students be aware of these policies.
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 25 of 25