Recent orders

Building and construction studies

Building and construction studies

Description
A multi-storey commercial building is designed and drawings are given to you to incorporate fire
safety information to the drawings. Your tasks in this project are to address the followings:
Part 1: Building information related to the followings:
NCC Classification
Rise in Storey
Number of required fire compartments
Number of persons accommodated in the building

Part 2: Compliance assessment of the drawings according to the NCC requirements for the
followings:
Number of exits required
Exit travel distance
Distance between alternative exits
Part 3: Fire Resistant Level (FRL) of all building elements should be extracted from the NCC and
written next to them in the drawings. Note: Only columns and lift shafts are loadbearing and the
rest of the elements are non-loadbearing. The nearest boundary to any of building elements is
5m. Also, FRLs of beams are not required.
Important Information:
Floor plans of the second to the seventh floor are typical and you can find them on page 4 of
drawings.
Elevation and structural drawings are not provided.

In addressing the part 1 and 2, reference the NCC sections and page numbers that are used to
answer the requirements. In addition, you should explain all details regarding how you achieved
the answers for part 1 and 2. Just writing the final answer will receive no mark.
For part 3 of the task, print out the drawings in A3 sized sheets and neatly write down all FRLs in
the drawings. For instance, if FRL for a wall in the drawings is 90/90/90, you should write “wall:
90/90/90” next to the wall in the drawing. Then use a scanner (not a smartphone) to scan them
all in one pdf file. Low-quality scans will receive no mark.
Submission items:
A report in A4 sized pdf format which addresses part 1 and 2 of the task.
A drawing set in A3 sized pdf format which addresses part 3 of the task.
Assessment Criteria:
Part 1 (23%) – question a (5%); question b (5%); question c (5%); question d (8%)

Part 2 (27%) – each question worth 9%
Part 3 (40%) – for every missing or wrong FRL, 1% will be reduced from the overall 40%.
Overall report quality (10%) – All submissions should be neat and in an easy to read form.
Only similarities to contents taken from the NCC are acceptable and plagiarism will not be
tolerated.

How children learn in and through science

How children learn in and through science

Assignment 2: Critical essay – how children learn in and through science

(Individual task – 2000 words, 50%)
This task will assess a pre-service teacher’s understanding of science education theory as well as their ability to integrate theory and practice in science education. This will be achieved by outlining theories of teaching and learning in science and then presenting an in-depth discussion as it relates to the design and content of their resource booklet (Assessment 1A) and how it can be used to create a coherent lesson sequence.

  • 2000 words
  • To demonstrate advanced understanding of how children learn in science and the different science teaching approaches used to address particular science concepts.

Assessment criteria

A suggested format for the essay is to write it in two parts – Part 1 will provide a critical discussion of theories of science teaching and learning, and Part 2 will use the resource booklet from Assessment Task 1A as a context for a specific discussion of putting theory into practice.

Part 1: Critical discussion of at least 2 theories of learning and teaching science in a primary school science classroom and demonstrate advanced understanding of how children learn in science.

Part 2: In this section, you should show your understanding of pedagogical approaches, illustrating with reference to the design of your resource booklet (Assessment Task 1A) and describe how it could be used to create a coherent science lesson sequence, including the different science teaching approaches used to address particular science concepts. Critically evaluate how the chosen pedagogical approach integrates science knowledge with the General Capabilities and/or Cross Curriculum Priorities.

Key ideas to be addressed in Part 2 include:

  • Identify and justify the overarching pedagogical approach that you would select when planning a lesson sequence to develop your chosen topic in Physical and/or Material World for a particular stage of learning.
  • Include examples of 4-5 lessons/activities from your resource booklet (Assessment 1A) that illustrate your understanding of the implementation of your chosen approach. (At least 1 should be an investigation/fair test and at least one design task should be included.)
  • Alternative student conceptions and their relationship to planning student learning, with specific examples related to the science content addressed by your resource booklet.
  • The role of assessment within teaching and learning, illustrated with examples from your resource booklet.

Page 16 of 28 EDST342 Semester 1 2020 NSW Version: DRAFT 06/01/2020

  • The importance of differentiation within the teaching of primary science with details of how differentiation could be implemented within the resource booklet to support all learners in the primary science classroom.
  • The value to teachers and students of incorporating cross-curricular links within a science learning sequence, with supporting examples.

The reference list for this assignment should be formatted using APA 6.

You may choose to use headings to organise your ideas and clearly identify the various sections, but this is not a task requirement. Any headings used will be included in the word count.

Ensure you stick strictly to the word count for this task as penalties WILL be enforced.

Please try and incorporate some of these recommended references

Recommended references

Fleer, M. (2015a). Science for Children. Melbourne, VIC: Cambridge University Press.

Fleer, M. (2015b). Technologies for Children. Melbourne, VIC: Cambridge University Press.

Howitt, C., & Blake, E. (Eds.). (2010). Planting the seeds of science: A flexible, integrated and engaging resource for teacher of 3 to 8 year olds. Perth: Curtin University and Australian

Australian Curriculum, Assessment and Reporting Authority (ACARA). Australian Curriculum: F-10 Curriculum: Science. Retrieved from: http://www.australiancurriculum.edu.au/science/curriculum/f-10?layout=1

Basu, S.J., Barton, A.C., & Tan, E. (2011). Democratic science teaching: Building the expertise to empower low-income minority youth in science. Rotterdam; The Netherlands. Sense publishers.

Bencze, J.L. (2010). Promoting student-led science and technology projects in elementary teacher education: Entry into core pedagogical practices through technological design. International Journal of Technology and Design Education, 20(1), 43-62.

Burarrwanga, Laklak, Ritjilili Ganambarr, Merrkiyawuy Ganambarr-Stubbs, Banbapuy Ganambarr, Djawundil Maymuru, Sarah Wright, Sandie Suchet-Pearson, and Kate Lloyd. (2013) Welcome to my country. Sydney: Allan & Unwin.

2 The new syllabus can be downloaded from the NESA website:

http://educationstandards.nsw.edu.au/wps/portal/nesa/k-10/learning-areas/science/science-and-technology-k-6- new-syllabus

3 Planting the seeds of science can be downloaded here:

https://www.researchgate.net/publication/268151595_Planting_the_seeds_of_science_A_flexible_integrated_and_ engaging_resource_for_teachers_of_3_to_8_year_olds

Learning and Teaching Council.

Further references

Country, B., Wright, S., Suchet-Pearson, S., Lloyd, K., Burarrwanga, L., Ganambarr, R., Maymuru,

  1. (2015). Working with and learning from Country: decentring human author-ity. Cultural

Geographies, 22(2), 269-283. DOI: 10.1177/1474474014539248

Page 19 of 28 EDST342 Semester 1 2020 NSW Version: DRAFT 06/01/2020

Fitzgerald, A. (2012). Science in primary schools: Examining the practices of effective teachers. Rotterdam, The Netherlands: Sense Publishers.

Fitzgerald, A. (Ed.). (2013). Learning and teaching primary science. Port Melbourne, Vic: Cambridge University Press.

Harrison,N., & Sellwood, J. (2016). Learning and teaching in Aboriginal and Torres Strait Islander education (3rd ed.). Chapter 10. Learning from Country. Australia, Oxford University Press.

Howitt, C. (2011). Planting the Seeds of Science: Development and evaluation of a new flexible and adaptable early childhood science resource. Teaching Science, 57(3) pp 32-39.

Killeen, R. (2016). Effective teaching strategies: Lessons from research and practice (7th ed.) Cengage Learning Australia.

Loxley, P., Dawes, L., Nicholls, L., & Dore, B. (2014). Teaching primary science: Promoting enjoyment and developing understanding (2nd ed.). Abingdon, Oxon: Routledge; Taylor and Francis.

Meadows, J. (2012). Science and ICT in the primary school: A creative approach to big ideas. Hoboken, NY: Taylor and Francis.

Mitchie, M., Hogue, M. & Rioux, J. (2018) The Application of Both-Ways and Two-Eyed Seeing Pedagogy: Reflections on Engaging and Teaching Science to Post-secondary Indigenous Students. Research in Science Education, 48(6) 1205-1220

Pedretti, E., & Nazir, J. (2011). Currents in STSE education: Mapping a complex field, 40 years on. Science Education, 95(4), 601-626.

Smith, K., Loughran, J., Berry, A., & Dimitrakopoulos, C. (2012). Developing scientific literacy in a primary school. International Journal of Science Education, 34(1), 127-152.

 

Preparing for the IRB:The research is to identify the gap in existing environments of an healthcare organization.

Preparing for the IRB:The research is to identify the gap in existing environments of an healthcare organization.

  1. As applicable (check all that apply):

☐  Recruitment materials (i.e., advertisements, verbal scripts, cover letters, etc.)

☐ Consent Materials (i.e., introductory cover letter, consent script, etc.)

☐ Instrument(s) to be used for data collection** (i.e., surveys, questionnaires, interview questions, assessments, etc.)

☐  Letter(s) granting permission to use off-campus facility for research

  1. Interaction with Research Participants: Will the researcher be collecting data by directly interacting with the participants (electronic, paper, or in person)?  ☒ Yes   ☐ No
  1. Identifiable Private Information: Will identifiable private information be collected from existing records (i.e., medical records, assessment data)? ☐ Yes   ☒ No
  1. Research Activities: Does the study involve and of the following? (Check all that apply)
    1. ☐ prisoners, fetuses, pregnant women (other than coincidental), or human in vitro fertilization?
    2. ☐ the review of medical or other records if the information is recorded in such a way that participants  can be identified directly or through identifiers linked to the participants.
    3. ☐ surveys of interview techniques which include minors as participants
    4. ☐ the observation of minors if the researcher participates in the activities being observed
    5. ☐ techniques which expose participants to discomfort or embarrassment
    6. ☐ the deception of research participants

*Note: is the study involves any of the above, the study is not eligible for exemption

  1. Category 6: Collection of data from voice, video, digital, or image recordings made for research purposes.
  2. Category 7: Research on individual or group characteristics or behavior (including, but not limited to, research on perception, cognition, motivation, identity, language, communication, cultural beliefs or practices, and social behavior) or research employing survey, interview, oral history, focus group, program evaluation, human factors evaluation, or quality assurance methodologies.
  3. Will the study involve any procedures that fall outside the categories selected in Item 1 of this section?
  4. ☒ No             ☐ Yes (apply for full review)
  5. Will the project involve prisoners? ☒ No       ☐Possibly Incidentally         ☐ Yes (full review required)
  6. Subpart C: Additional Protections Pertaining to Biomedical and Behavioral Research Involving Prisoners as Subjects requires full review except for research aimed at involving a broader subject population that only incidentally includes prisoners (i.e., a web-based survey that an inmate may be able to access from a prison computer without the researcher being aware of the prisoner status).
  7. Background (Provide information about the proposed research activities. What is the problem being investigated?)
The research is to identify the gap in existing environments of an healthcare organization. There is been a good quality times spent on the research and analyzing the process and the systems, which are being used in day to day activities in the current environment. It was identified that the systems cybersecurity and privacy is not studied as a mainstream research topic by the researchers for various reasons. There are many methods and approaches used to enhance the cybersecurity and the research does also discuss the perception and its effects on security qualitatively. The gap in research has been identified and analyzed with many research studies. It was also found that the concept of security is only designed based on the number of cyber-attacks and the loss of data. The user perception and usability factors are important because of the rapid increase in the number of applications. I have performed the research more in detail based on the current situation based on the pandemic it was never in thought that their will be a day, where whole world will be in trouble. Due to this situation all the organizations are letting the employees to work from home. They are many operational issues identified during the research and interviews with the relevant teams and business owners. It would be easy to understand if one go through my questionnaire, which I have prepared for the interviews with the resources.
  1. Research Questions (At least 2).
1.       what are the measures taken by an healthcare organization to secure data in WIDOWS, Linux, Unix and MAC OS?

2.       Process of authentication when employee wants to retrieve some specific data?

3.       cyber security measures when the employee performs any download activity?

4.       password strategies?

5.       loss of data and its restoration process?

  1. Study Population. (Describe the characteristics of the study population, including the anticipated

number of subjects, age range, gender, ethnicity, and health status. Specify any inclusion and exclusion criteria.)

I have picked between 8 to 12 members population from various levels, teams and departments.
  1. Subject Recruitment. (Describe the process of identifying and recruiting subjects for the research activities. Attach a copy of any recruitment material, such as flyers, advertisements, cover letters, etc.)
I haven’t printed any kind of a flyer or advertisers are used to perform the research. Since I am also working in the same organization as a business analyst and I have a very close relationship with my colleagues and business owners. I have called them directly on their respective cellphones to seek their permission and willingness to provide me the insight so that I can accomplish my goal of completing my research successfully.
  1. Informed Consent. (Describe how consent will be obtained and documented. Please attach a copy of consent form)
Consent will be obtained verbally through telephone and few by messages and few by IM chat.
I will be interviewing the population either in Skype for business or zoom if it has to be a focus group where multiple people are involved for the iteration process. If it has to happen one on one then I would use the telephonic mode to contact and get the information that could be FaceTime.
  1. Research Procedures. (Describe the procedures that will be used.)
  2. Data Collection and DATA ANALYSIS. (Specify the data collection process that will be used and the data that will be collected from subjects. CITE surveys. Attach all instruments to be used, such as survey instruments, interview guide, assessment tools, and data collection form for existing data. How will you analyze your data?)
The data is collected through using various forms such as telephonic interviews, Skype interviews, zoom interviews etc. that has been scheduled based upon the resources availability to specific users, developers and business owners using secured channels and the data collected is not misused or shared with anyone apart from the researcher. The collected data is analyzed using a qualitative study and approach. There are various statistical methods used to analyze the interview data that use a such as focused groups, deep dive sessions, one on one etc. The analysis involves the classification of the interview questions into different categories and then requires the study of individual questions. Graphs are plotted and dots were connected to understand the meaning of the analysis and how the answers could be used to draw the conclusions. Statistical data analysis software like power BI and spreadsheets and will be used for the further analysis where the numbers are involved in the process to help the quantitative method.

 

Since this exercise is completely based upon the interviews through secured tools and technologies, I do not see any potential risk involved and to be more compliant all appropriate measures and decisions were taken during the process.
  1. Potential Risks. (Describe any potential risks that the study poses to subjects, whether seen or

unforeseen, including physical, social, psychological, legal, or other risks.)

  1. Research Materials, Records, and Privacy Issues. (Identify the sources of material that will be obtained from subjects, what information will be recorded, concerns relating to privacy of subjects, and explain why this information is needed to conduct the research activities.)
Their is no personal data recorded during the process of interviews. The interviews are purely based upon the cybersecurity in regards to the existing tools and technologies so, ensured that no personal information or identification was captured from any of the resources who helped and assisted me in accomplishing the project work.
  1. (Specify the procedures that will be used to safeguard and protect information gathered to maintain privacy and confidentiality. Explain the process that will be used to destroy the information upon conclusion of the study. If the information will be maintained, provide an explanation. Also discuss what safeguards will be used by the researcher if data will be shared with other entities (e.g., aggregate data, de‐identification, etc.)).
Their was no hand to hand material was shared. It was completely an electronic device based interviews where only phones and laptops were used and all the users or the interviewers were requested to wear their respective headphones. Since all are working from home so it was easy to convince everyone and the information captured was on a notepad and later that was transformed into a write up to enhance the document. The results or the out come was demonstrated very well in the chapter 1&3 write up’s.

11.Data: Where and how will research records be stored and then destroyed? (Note: all research-related records must be maintained for three years after the study is completed and these records are subject to audit.

The collected data and the information will be stored in highly secured iCloud or any of the licensed cloud application, which provides an easy access to data as and in needed. The protocols will be taken to make sure that data and the information is not exploited. I will also make sure that data is protected from all the corners and it’s available as and in needed for my research purpose. Post research practice and following the defined three years time frame of storing the data and destroying the data permanently without exploiting to any of the unknown sources.

  1. Application Components:

A completed application package must include the following:

☒  Expedited Form (this application)

☒ Topic Approval letter (If enrolled in 736 Summer 2019 forward)

☒  CITI Training Completion Reports for all investigators, key personnel, and faculty advisors

☐  If applicable: recruitment materials (i.e., advertisements, flyers, telephone scripts, verbal recruitment scripts, cover letters, etc.)

☐  If applicable: consent form, consent script, or introductory cover letter (If working with minors, must have assent letter)

☒  If applicable: Instrument(s) to be used for data collection (i.e., questionnaire, interview questions, or assessment scales)

☐  If applicable: grant/contract proposal narrative (required if study is funded)

☐  If applicable: letter(s) granting permission to use off-campus facility for research