Harvard Format Week Marks Awarded

Verified

Added on  2022/09/16

|12
|4289
|18
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=965540
1

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Example
The “Internet of things” is an emerging trend towards smart interconnected embedded technologies that
allow us to monitor and control our environment. Collect and summarise an online resource that describes
ONE example or application of the Internet of things.
Title, Link and Reference:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-revolution-vice-versa/
Lars, N 2014, ‘Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?’,
Wired, June 2014, viewed 1 February 2017,
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-revolution-vice-versa/
Note: You may use abbreviated URLs (to the website) in the reference, however you must provide the
FULL link above it that, when pasted into the Web Browser, will take the marker directly to the resource.
Using full URLs in the reference (as in this example) is fine too.
Summary:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
This article describes the emergence of the Internet of Things (IoT) in the context of medical devices. I
chose this article because it not only examines the applications of a very useful class of IoT devices, but it
also highlights the need for ways of collecting and processing the data they produce.
In the article, the author describes how many medical monitoring devices are now capable of connecting to
the Internet and are becoming a normal part of patient care. These devices allow remote monitoring of
patient health wirelessly and can collect data on a wide range of vital signs and indicators. Data can be
collected from a range of sensors reading everything from heart rate and blood pressure through to blood
sugar levels and temperature.
In addition to passive monitors, IoT medical devices provide the ability to proactively prompt patients to do
things, for example to warn them of their blood pressure or to alert them that they need more medication.
The article points out that many of these notifications are the result of apps (software) interacting with both
the devices and the patients.
Perhaps the most interesting aspect of the article is the author’s discussion of what happens to the data that
the IoT medical devices produce. The author explains that many devices can send data directly to the
cloud for storage and analysis and that this data constitutes a wealth of information that will potentially
improve healthcare in the future.
I found this article useful because it not only highlighted the increasing ubiquity of Internet-connected
medical devices, but also made me think about how the data is collected, where it is stored and how it could
be used – both positively and negatively – in the future.
2
Document Page
3
Week 1
The text discusses about different architectures for parallel processing used for Multiprocessor
Machines such as multiple-instruction stream - multiple-data stream (MIMD), single-instruction stream -
multiple-data stream (SIMD) etc. Find and summarise ONE resource that compares between MIMD
and SIMD architectures. The resource, and your summary, must focus only on MIMD and SIMD
architectures.
Difference between MIMD and SIMD
https://www.techwalla.com/articles/differences-between-simd-and-mimd
Difference between SIMD and MIMD - GeeksforGeeks (2019). Difference between SIMD and MIMD -
GeeksforGeeks. [online] GeeksforGeeks. Available at: https://www.geeksforgeeks.org/difference-between-simd-
and-mimd.
Summary:
This article describes the differences between SIMD and MIMD. The author differentiates the two
factors on the basis of many criteria such as:
In SIMD:
One program and the PE or the processing element operates synchronously. A single copy of the
program is stored. Scalable both in size and the performance. It comprises of less complexity. A single
decoder is there in the control unit. Execution time in SIMD is equal to the sum of the maximal
execution time taken by all the processors. The overall cost of this architecture is low. An example of
SIMD architecture is the processors which have the local memory comprising of the various data with
identical instruction in the synchronized way.
In MIMD architecture:
Many communication programs and the PE operates asynchronously. Each PE loads its program
individually. Huge size but performance wise is good. It contains high complexity. Each PE contains a
single decoder. Execution time in MIMD is equal to the maximum execution time taken by a given
processor. Execution time in MIMD is equal to the maximum execution time taken by a given
processor. The overall cost of this architecture is high. The MIMD computing can or cannot be in a
synchronous way. It is usually used for the problems which break down the algorithms in various
independent division.
Document Page
4

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
5
Week 2
The text discusses about one of the common problems that can arise during resource allocation in
operating systems, which is known as deadlock. Find and summarise ONE resource that describes
an algorithm of either deadlock avoidance or deadlock prevention. The resource, and your summary,
must focus on a single algorithm of either deadlock avoidance or deadlock prevention, NOT both.
Deadlock Prevention
https://www.geeksforgeeks.org/deadlock-prevention/
Deadlock Prevention And Avoidance - GeeksforGeeks (2019). Deadlock Prevention And Avoidance -
GeeksforGeeks. [online] GeeksforGeeks. Available at: https://www.geeksforgeeks.org/deadlock-prevention.
Summary:
The selected article showcases the deadlock prevention technique. The methods used in the
deadlock prevention leads in short device usage as well as decrease the throughput, thus, an
alternative process to avoid the deadlock is gather proper knowledge regarding the process about
how the resources are requested and how they are transmitted to the receiver. The sequence should
also be analysed such that the deadlock is avoided. A simple algorithm should display the maximum
number of the resources. Deadlock avoidance algorithm examine resource allocation methods such
that it can guarantee that the circular wait situation never arises. For example: P0, p1 and P2 has
maximum allocation of 10, 4 and 9 respectively and the current allocation of these three systems are
5, 2 and 2 respectively. The total tapes is equal to 10 and the available tapes is 3. Thus, it can be said
that the system is safe. Now, 5 available tapes can be allocated to the P0. After this allocation the
remaining 10 tapes are released and seven tapes will be allocated to the P2. Now in case an unsafe
situation arises when request form P2 for one tape is granted. The various approaches of deadlock
avoidance are as follows: Highest resource requirement should be displayed in advance, all the
processes that are under consideration should be independent, number of resources should be fixed
and process should not exit when they are holding the resources. The writer states the whole
mechanism of the deadlock prevention in an efficient way.
Document Page
Week 3
Internet of things (IoT) is an emerging trend towards smart interconnected embedded technologies that
allow us to monitor and control our environment. Find and summarise ONE resource that describe
applications of the Internet of things in the field of Smart Farming. The resource, and your summary,
must focus on application of IoT ONLY in the field of smart farming.
Application of IoT in the Farming industry
https://www.iotforall.com/iot-applications-in-agriculture/
IoT Applications in Agriculture | IoT For All (2019). IoT Applications in Agriculture | IoT For All. [online] IoT For All.
Available at: https://www.iotforall.com/iot-applications-in-agriculture.
Summary:
The various IoT application that are used in the smart farming are as follows:
1. Raspberry Pi: It is the small size computer that is utilized to perform some small networking
and computing operations associated with the smart farming. It contains many versions. Huge
amount of data can be stored in the cloud. It is the credit card sized computer system which
utilizes ARM1176JZF-S core. It requires an operating system for operating.
2. DHT 11 Sensor: It is the low cost and basic digital humidity and temperature sensor. It is used
by the farmers to detect the temperature and humidity of the atmosphere. Basically it helps
them to be aware for any natural disaster in advance. Capacitive sensor is used to sense the
humidity of the atmosphere. It gives the output in the digital form. The sensor operates with 3.3
– 5 V.
3. Soil Moisture Sensor: It is used by the farmer to evaluate the quantity of water present in the
soil. The water content is detected using the electrical resistance of soil. The sensor operates
with -400C to +600C. The calculated property and the soil moisture are calibrated and then it is
varied according to some environmental factors like soil type, electrical conductivity and
temperature.
Week 4
The text discusses about IPv4, however, IPv6 is the emerging protocol which is in the process of
superseding IPv4. Find and summarise ONE resource that describes about the technologies that are
used to run both protocols simultaneously over the same internet infrastructure.
Dual Stack Network
https://whatismyipaddress.com/dual-stack
Addresses, I. and Stack, D. (2019). What is IPv4/IPv6 Dual Stack?. [online] WhatIsMyIPAddress.com. Available
at: https://whatismyipaddress.com/dual-stack.
Summary:
The selected article describes the dual stack network. A network where both IPv4 and IPv6 are
enabled in every nodes is known as the dual stack network. This is seen in the router where the initial
node in the prescribed network can be resisted by the outside with some traffic. Thus the dual stack
networking process is the best network which has the ability of processing both the IPv4 as well as
IPv6. One of the disadvantage of this type of network is that is costlier than other networking schemes.
Basically, Dual stack is a type of transition technology where both the IPv4 and IPv6 operate
simultaneously over some distributed or dedicated links. In this case the network infrastructure can
manage both IPv4 and IPv6 adjacencies and addressing. The network infrastructure needs the ability
to deploy the IPv6. The IPv6 requires to be activated. The dual stack network routes the proper traffic
as needed in a device. If the internet sites do not support the IPv6 it can be connected by utilizing the
6
Document Page
IPv4. Now, if an organization utilizes the ISP which does not support IPv6, it can simply utilize the IPv6
tunnel broker for connecting to the IPv6 addresses. The writer efficiently described all the factors
associated with the Dual stack network.
Week 5
Network security has become a major concern of ICT world, and user authentication is one of the
popular tools to assure network security. Find and summarise ONE resource that describes any ONE
authentication mechanism except password. The resource, and your summary, should focus purely on
ONLY ONE type of authentication mechanism.
Multi factor Authentication
https://www.centrify.com/privileged-access-management/privileged-access-service/mfa-vault/
Multifactor Authentication - MFA at Vault | Centrify (2019). Multifactor Authentication - MFA at Vault | Centrify. [online]
Centrify.com. Available at: https://www.centrify.com/privileged-access-management/privileged-access-service/mfa-vault.
Summary:
The selected article describes the multifactor authentication technique. Authentication is the primary
threats for many business. Initially only one method of the authentication is used in the business but due
to the data threats many organizations are using multi factor authentication to successfully protect their
data. This helps the organization to keep the data secure. An organization is concerned with many
sensitive data which needs additional assistance. The data flow process should also be protected such
that the data is not lost in the mid - way of the transmission line. The multifactor authentication used
three types of verification process like knowledge, ownership and Biometric factor of an individual. In the
first step some data is verified which is known only by the user such as some secrets of the user that is
only known by the user, the second step of the verification deals with the ownership factor where the
user should verify his own cards, tokens or smart phones. In the third process of the verification, some
biometric data or the behaviour is verified with the data provided by the user. These three process of the
verification process is known as the multi factor authentication. The writer describes all the factors used
in the multi factor authentication technique.
Week 6
The text discusses about a massive data breach that happened in Target company, which is referred as ‘Target
Breach’. Find and summarise ONE resource that describes another recent (within last 5 years) well-publicised
attack or security breach on a public company or government organisation. The resource, and your summary,
should describe about A SINGLE EXAMPLE of security breach.
Australian’s post Bill scanner
https://www.itnews.com.au/news/ausposts-bill-scanner-caught-up-in-gmail-privacy-sweep-522917?
eid=1&edate=20190327&utm_source=20190327_AM&utm_medium=newsletter&utm_campaign=daily_newsletter
Crozier, R. and Crozier, R. (2019). AusPost's Bill Scanner caught up in Gmail privacy sweep. [online] iTnews. Available at:
https://www.itnews.com.au/news/ausposts-bill-scanner-caught-up-in-gmail-privacy-sweep-522917?
eid=1&edate=20190327&utm_source=20190327_AM&utm_medium=newsletter&utm_campaign=daily_newsletter.
Summary:
The selected article describes the data breach incident caused in the Australia post due to the Bill scanner. Bill
Scanner is the device that was developed by the Australian Post. When this device is linked in the webmail
account it extracts the information from the bills sent to the account, grouped the payment details in the list. The
Google reported that the bill scanner is associated with some add in it which have the ability to breach all the data
of the organization. The officials found that the data are not following the security rules and regulations of the
7

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
organization. The data breach can negatively impact the business operation which can decrease the reputation of
the organization. After the incident the authority stated that third party application will be unable to access any
information by using the client g-mail address. The authority also announced that the bill scanner will tie up other
application to develop their web services and protect all the data associated with the organization. The data
breach notification laws should be known by all the people those are associated with the organization. This article
is selected as it described the data breach incident in details which includes the cause, effects and mitigation
technique used in that situation.
Week 7
The text briefly discusses about e-commerce and e-business. Find and summarise ONE resource that
discusses the relationship between e-commerce and e-business. The resource, and your summary,
should describe similarities and difference between e-commerce and e-business.
E-Commerce and E-Business
http://courseecommerce.blogspot.com/2016/07/e-commerce-e-business-1.html
E-Business, D. (2019). Distinguish between E-Commerce And E-Business. [online]
Courseecommerce.blogspot.com. Available at: http://courseecommerce.blogspot.com/2016/07/e-commerce-e-
business-1.html.
Summary:
The selected article differentiate the e-commerce from the e-business.
In case of
E-Commerce:
It deals with the commercial transaction that are conducted over the internet. E-Commerce is the
subset of the E-Business. It requires only a single website. It is associated with only buying and selling
the products from various online sources. It is usually used in B2C based business. The use of internet
is mandatory in this context.
E-Business:
It is the conduct of business methods used in the internet. It is the superset of the E-Commerce. It
deals with the usage of the CRM, ERP which links various business methods. It is associated with
different pre-sale and post-sale efforts. It is used in B2B based business. In this case the business can
use either internet or intranet or Extranet.
The author is successful in illustrating the different factors which differentiate the ecommerce and
ebusiness.
8
Document Page
Week 8
The text book discusses about the success story of ARI (Automotive Resources International) company
after implementing SAP BusinessObjects Explorer and integrating it with HANA. HANA is SAP’s in-
memory computing platform that is deployable as an on-premise hardware and software appliance or in
the cloud. Find and summarise ONE resource that describes the success story of adapting SAP HANA
by another local or international company. The resource, and your summary, should focus on the story
about ONE single company (which is not ARI company).
Cisco
https://www.cisco.com/c/en/us/solutions/data-center-virtualization/data-center-solutions-sap/index.html
Services, C. and Applications, D. (2019). Cisco UCS Solutions for SAP HANA. [online] Cisco. Available at:
https://www.cisco.com/c/en/us/solutions/data-center-virtualization/data-center-solutions-sap/index.html.
Summary:
In this selected article the organization namely, Cisco explained their successful implementation of the
SAP HANA in the organization. Cisco with its partners provide some deployment models of the SAP
HANA. The main purpose of implementing the SAP HANA in the Cisco is to develop their database
services, data analysis with processing, enhance the security of the organization and to grow the
business with the multi - engine feature of the SAP HANA. The models include SAP HANA appliance
model, SAP HANA cloud model and SAP HANA tailored datacentre Integration model. This particular
approach provides flexibility to the manager of the application data centres. The TDI model of the SAP
HANA is a preconfigured that needed all the elements which are given by the certified SAP HANA
hardware partner. The SAP HANA technology also allow the Cisco to gather knowledge regarding other
technologies. Each and every SAP HANA application should be installed in the specified isolated
infrastructure environment. The cisco is beneficiated by many factors like: Scale economies, well
developed operational efficiency, consistency, redundancy, develop the management strategy simple.
The author illustrates various implementation details in this article which helps other to trust on the
company’s services more.
Week 9
Rapid application development (RAD) is a process of creating a workable system in a very short period
of time. There are few recently developed frameworks available in market to undertake RAD. Find and
summarise ONE recent (within last two years) resource that describes and recommends about ONE
framework for RAD.
RAD Framework
https://kissflow.com/rad/rapid-application-development-framework-to-boost-app-development/
Rapid Application Development Framework: Stop Slow Development (2019). Rapid Application Development Framework:
Stop Slow Development. [online] Kissflow. Available at: https://kissflow.com/rad/rapid-application-development-framework-
to-boost-app-development.
Summary:
The selected article showcases the RAD layout. RAD frameworks consists of a list of functions, libraries,
classes and the reusable objects depending on the rapid application development methodology. RAD is
most appropriate for developing the software which is driven by the user interface requirements. The
RAD tools are also known as the Graphical user interface builders. Some approaches of RAD framework
are agile, spiral, unified and adaptive. . This framework helps to save the time and also helps to structure
all the methods seamlessly. The main advantage of RAD layout includes better quality, risk control and
more projects. Some disadvantages of this framework are the risk of the innovative projects, lack iin the
9
Document Page
non – functional requirements and less control. The framework consists of some steps such as:
1. Determining the requirements
2. Creating the prototypes in a fast speed
3. Receiving all the feedback from the end users
4. Testing
5. Launching the system.
The best RAD layout is the OutSystems as it provides wide range of facilities and also helps the user to
operate his or her operation seamlessly. All digital transformation operation can be handled in the
OutSystems.
The writer restlessly described all the frameworks of RAD.
Week 10
The failure to successfully implement large scale IS has led to the downfall of many previously successful
companies. Find and summarise ONE resource that describes few reasons of implementation failure for
large scale IS. The resource, and your summary, should analyse at least three reasons of the failure.
Reason behind failure in the implementation of IS
https://blog.cake.hr/main-reasons-behind-implementing-failures-hr-software/
What are the Main Reasons behind Implementing Failures of IS? (2019). What are the Main Reasons behind Implementing
Failures of IS?. [online] CakeHR Blog | Easy to implement HR tips!. Available at: https://blog.cake.hr/main-reasons-behind-
implementing-failures-hr-software.
Summary:
The selected article described various reasons behind the failure in the implementation of the IS in an
organization. Every IS implementation should have a specific motive or special reasons. It is to ensure
that the implementation of the IS can fulfil all the requirements of the organization. The implementation
should be handled to some experts and all the officials should guide the new comer about the IS
operation and the motive of the IS in the organization. The training session will play an important role in
the development of the services provided by the organization. Implementation of large scale IS in an
organization requires high skills and thus the whole implementation process can fail due to some reasons
like:
1. Deficiency of the defined goals
2. Undefined or misunderstanding of the project scope
3. Expectation mismatch caused due to the overselling of the products by ERP vendor
4. Deficiency in change management
5. Customization
6. Deficiency in proper training and creating the internal capacity
7. Deficiency in the identified resources
8. Managing the user resistance
9. Deficiency in the communication among the ERP vendor
10. The User Expectations are not cleared or distinct.
The writer described many reasons behind the failure in the implementation of IS in an organization.
10

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
11
Document Page
MARKING SHEET - DO NOT DELETE
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content/contains content not contained in the resource) OR
Multiple resources used for a single task
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
12
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]