COIT 20246 Assignment Submission
VerifiedAdded on 2022/11/17
|9
|4000
|134
AI Summary
Get the details of COIT 20246 Assignment Submission including the due date, part, weighting, submission, instructions, tasks, and resources for each week. Desklib provides the best study material with solved assignments, essays, dissertation, etc.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource?
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=886270
1
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource?
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=886270
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Week 1
The text discusses examples of traditional mass storage such as magnetic disk and
solid-state drives. While these still underpin most mass storage, in corporate
environments they are often accessed via Network Attached Storage (NAS) or
Storage Area Network (SAN) technologies. Find and summarise ONE resource that
describes EITHER NAS or SAN storage technologies. The resource, and your
summary, must focus on either NAS or SAN, NOT BOTH.
Title and Reference:Seagate Personal Cloud 2-Bay NAS drive
Seagate.com. (2019). Seagate Personal Cloud 2-Bay User Manual - Welcome to
Your Personal Cloud 2-Bay. [online] Available at:
https://www.seagate.com/in/en/manuals/network-storage/seagate-personal-cloud-
2bay/welcome-to-your-personal-cloud-2-bay/ [Accessed 30 May 2019].
https://www.seagate.com/in/en/manuals/network-storage/seagate-personal-cloud-2bay/welcome-
to-your-personal-cloud-2-bay/
Summary:
NAS or Network Attached Storage is a type of file storage that allow many users and
heterogenous user devices to collect the data from the centralized disk. Each NAS
remains on LAN as the independent network node which is characterized by its
identical IP address (Internet Protocol). It is basically a device used to store data. It is
a NAS based device which connects to the LAN by Ethernet connection. It is mainly
available in three variants 4TB, 6TB and 8TB and manufactured by Seagate. It
provides cloud backup with Ethernet, Gb Ethernet and fast ethernet as data link
protocol. It consists of interface of Ethernet 1000, USB 3.0 and USB 2.0. It is a NAS
storage type. It is supported in Microsoft windows 7, 8,8.1,10 and vista, Apple
MacOS X 10.7 or later. It operates in a single device to handle the data files. It
consist of some components like Seagate dashboard which creates the backup plans
and backup the content of the system automatically, creates and handle the media
library of the system with Smart Copy technique, back up the mobile data to the
system, backup manager which backup the USB attached storage or the other
networks that are attached with the storage device.
Week 2
Operating systems use file managers to interact with mass storage devices.
However, the way in which data is stored and retrieved is dictated by the file system.
There are many types of file systems used by modern operating systems. Find and
summarise ONE resource that describes ONE such file system that is NOT FAT,
FAT32 or ExFAT. The resource, and your summary, must focus on A SINGLE file
system.
Title and Reference: Total Commander 9.22a
Commander 9.22a, T. (2019). Total Commander. [online] TechSpot. Available
at: https://www.techspot.com/downloads/301-total-commander.html [Accessed 30
May 2019].
https://www.techspot.com/downloads/301-total-commander.html
Summary:
Windows user basically prefers the default file manager but there are some other
users who prefer a third party file manager software due to some additional benefits
2
The text discusses examples of traditional mass storage such as magnetic disk and
solid-state drives. While these still underpin most mass storage, in corporate
environments they are often accessed via Network Attached Storage (NAS) or
Storage Area Network (SAN) technologies. Find and summarise ONE resource that
describes EITHER NAS or SAN storage technologies. The resource, and your
summary, must focus on either NAS or SAN, NOT BOTH.
Title and Reference:Seagate Personal Cloud 2-Bay NAS drive
Seagate.com. (2019). Seagate Personal Cloud 2-Bay User Manual - Welcome to
Your Personal Cloud 2-Bay. [online] Available at:
https://www.seagate.com/in/en/manuals/network-storage/seagate-personal-cloud-
2bay/welcome-to-your-personal-cloud-2-bay/ [Accessed 30 May 2019].
https://www.seagate.com/in/en/manuals/network-storage/seagate-personal-cloud-2bay/welcome-
to-your-personal-cloud-2-bay/
Summary:
NAS or Network Attached Storage is a type of file storage that allow many users and
heterogenous user devices to collect the data from the centralized disk. Each NAS
remains on LAN as the independent network node which is characterized by its
identical IP address (Internet Protocol). It is basically a device used to store data. It is
a NAS based device which connects to the LAN by Ethernet connection. It is mainly
available in three variants 4TB, 6TB and 8TB and manufactured by Seagate. It
provides cloud backup with Ethernet, Gb Ethernet and fast ethernet as data link
protocol. It consists of interface of Ethernet 1000, USB 3.0 and USB 2.0. It is a NAS
storage type. It is supported in Microsoft windows 7, 8,8.1,10 and vista, Apple
MacOS X 10.7 or later. It operates in a single device to handle the data files. It
consist of some components like Seagate dashboard which creates the backup plans
and backup the content of the system automatically, creates and handle the media
library of the system with Smart Copy technique, back up the mobile data to the
system, backup manager which backup the USB attached storage or the other
networks that are attached with the storage device.
Week 2
Operating systems use file managers to interact with mass storage devices.
However, the way in which data is stored and retrieved is dictated by the file system.
There are many types of file systems used by modern operating systems. Find and
summarise ONE resource that describes ONE such file system that is NOT FAT,
FAT32 or ExFAT. The resource, and your summary, must focus on A SINGLE file
system.
Title and Reference: Total Commander 9.22a
Commander 9.22a, T. (2019). Total Commander. [online] TechSpot. Available
at: https://www.techspot.com/downloads/301-total-commander.html [Accessed 30
May 2019].
https://www.techspot.com/downloads/301-total-commander.html
Summary:
Windows user basically prefers the default file manager but there are some other
users who prefer a third party file manager software due to some additional benefits
2
gained from the third party application. Total Commander 9.22a is the high level file
manager software which utilizes the classy framework of two vertical frames. It is a
best tool for the users who share a huge amount file regularly. The user can also
verify the transfer progress of the shared files like their progress, resume or pause
option are also available. Many formats of archive are supported by it like GZ, TAR,
ZIP, RAR and so on. It is also helpful in comparing the files with respect to the file
synchronization, merge and split the big contents or files. Renaming file with multi-
name is also available in this software. It is distinguishable from other software by the
search option that is available in it. It also contains built-in FTP client with server to
server (FXP) and HTTP support. This helps in managing the activities within the
system and also ensures that proper file is maintained within the file manager. The
different file formats will increase the usability criteria for the system and will ensure a
better performance of the windows.
Week 3
The National Broadband Network (NBN) is currently being rolled-out across Australia
and there is a mix of technologies that are being used to deliver Internet services (for
example, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite). Find and
summarise ONE resource that describes ONE of these delivery technologies. The
resource, and your summary, must focus on A SINGLE technology.
Title and Reference: FTTP broadband
Thinkbroadband.com. (2019). Fibre Broadband (FTTC / FTTH) Guide |
thinkbroadband. [online] Available at: https://www.thinkbroadband.com/guides/fibre-
fttc-ftth-broadband-guide [Accessed 30 May 2019].
https://www.thinkbroadband.com/guides/fibre-fttc-ftth-broadband-guide
Summary:
FTTP (Fibre to the premises) is also known as FTTH (Fibre to the Home). FTTP is
type of internet delivering system which deals with end-to-end fibre optic based
connection. The major benefits that are offered with FTTP includes providing faster
connection speeds and offers better carrying capacity than other conductors. Thus
this technology is being considered maximum by the customers. This can deliver the
products quickly without any major problems. It delivers faster speed than FTTC
(Fibre to the Cabinet) as it is independent of the distance. The internet speed is not
hampered by the connection distance between the system and the ISP (Internet
Service Provider). The download speed is 330Mbps and the upstream speed is
30Mbps. It basically run over the optical fibre cablefrom telephone exchange to the
user house. The fibre is normally connected outside the user property and a short
OFC gets connected to the modem which provides Ethernet connection to the
broadband router. The connection is more reliable as it is not affected by the VDSL2
and ADSL. There are two layouts of FTTP architecture namely, Passive Optical
Network (PON) and Active Ethernet. The most important features of this type of
delivering systems are physically robust, voice, video support, and long lifetime.
Week 4
The Internet is made up of many interconnected servers and networks. Users are
increasingly aware and concerned that their Internet communications can be
intercepted and monitored. Tor is one technology that allows users to obscure or
hide online their online activities. Find and summarise ONE resource that describes
what Tor is and how it works. The resource, and your summary, must focus purely on
Tor.
Title and Reference: TOR
Lifehacker.com. (2019). [online] Available at: https://lifehacker.com/what-is-tor-and-
3
manager software which utilizes the classy framework of two vertical frames. It is a
best tool for the users who share a huge amount file regularly. The user can also
verify the transfer progress of the shared files like their progress, resume or pause
option are also available. Many formats of archive are supported by it like GZ, TAR,
ZIP, RAR and so on. It is also helpful in comparing the files with respect to the file
synchronization, merge and split the big contents or files. Renaming file with multi-
name is also available in this software. It is distinguishable from other software by the
search option that is available in it. It also contains built-in FTP client with server to
server (FXP) and HTTP support. This helps in managing the activities within the
system and also ensures that proper file is maintained within the file manager. The
different file formats will increase the usability criteria for the system and will ensure a
better performance of the windows.
Week 3
The National Broadband Network (NBN) is currently being rolled-out across Australia
and there is a mix of technologies that are being used to deliver Internet services (for
example, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite). Find and
summarise ONE resource that describes ONE of these delivery technologies. The
resource, and your summary, must focus on A SINGLE technology.
Title and Reference: FTTP broadband
Thinkbroadband.com. (2019). Fibre Broadband (FTTC / FTTH) Guide |
thinkbroadband. [online] Available at: https://www.thinkbroadband.com/guides/fibre-
fttc-ftth-broadband-guide [Accessed 30 May 2019].
https://www.thinkbroadband.com/guides/fibre-fttc-ftth-broadband-guide
Summary:
FTTP (Fibre to the premises) is also known as FTTH (Fibre to the Home). FTTP is
type of internet delivering system which deals with end-to-end fibre optic based
connection. The major benefits that are offered with FTTP includes providing faster
connection speeds and offers better carrying capacity than other conductors. Thus
this technology is being considered maximum by the customers. This can deliver the
products quickly without any major problems. It delivers faster speed than FTTC
(Fibre to the Cabinet) as it is independent of the distance. The internet speed is not
hampered by the connection distance between the system and the ISP (Internet
Service Provider). The download speed is 330Mbps and the upstream speed is
30Mbps. It basically run over the optical fibre cablefrom telephone exchange to the
user house. The fibre is normally connected outside the user property and a short
OFC gets connected to the modem which provides Ethernet connection to the
broadband router. The connection is more reliable as it is not affected by the VDSL2
and ADSL. There are two layouts of FTTP architecture namely, Passive Optical
Network (PON) and Active Ethernet. The most important features of this type of
delivering systems are physically robust, voice, video support, and long lifetime.
Week 4
The Internet is made up of many interconnected servers and networks. Users are
increasingly aware and concerned that their Internet communications can be
intercepted and monitored. Tor is one technology that allows users to obscure or
hide online their online activities. Find and summarise ONE resource that describes
what Tor is and how it works. The resource, and your summary, must focus purely on
Tor.
Title and Reference: TOR
Lifehacker.com. (2019). [online] Available at: https://lifehacker.com/what-is-tor-and-
3
should-i-use-it-1527891029 [Accessed 30 May 2019].
https://lifehacker.com/what-is-tor-and-should-i-use-it-1527891029
Summary:
TOR is the open source software utilized by many people for the purpose of
anonymous internet surfing. It was previously designed, deployed and implemented
in the U.S. Naval Research Laboratory as third generation onion routing project. It
served as a protection in the communication of U.S. navy. It is supported by
Microsoft Windows, Unixlike (macOS, Android and Linux). The major benefits that
are offered with the TOR software ids that it helps in reducing the risks that occurs
with malicious attackers. Onion routing is designed by encrypting the application
layer present in the communication protocol stack. TOR uses the same mechanism.
It utilizes many volunteer networks which direct traffic in internet to the internet to
keep the user identity secret from the interceptor. First step of the mechanism is to
identify the free nodes. Then the client produces the encrypted content which is sent
in the first identified node. The user on the other end decrypts the content and
locates the next free node. This is a continuous process which helps the user to keep
their identity hidden during the internet surfing. Later when the client wants to send
some data it chooses a completely different path which makes difficult for the
interceptor to track the user details.
Week 5
An emerging form of malware is cryptojacking (also known as malicious
cryptomining). Find and summarise ONE resource that describes what cryptojacking
is and how it works. The resource, and your summary, should focus purely on
cryptojacking and NO OTHER form(s) of malware.
Title and Reference: Cryptojacking
Nadeau, M. (2019). What is cryptojacking? How to prevent, detect, and recover from
it. [online] CSO Online. Available at:
https://www.csoonline.com/article/3253572/what-is-cryptojacking-how-to-prevent-
detect-and-recover-from-it.html [Accessed 30 May 2019].
https://www.csoonline.com/article/3253572/what-is-cryptojacking-how-to-prevent-detect-and-
recover-from-it.html
Summary:
With the growing technology and its impacts it has been observed that the threats
have also evolved widely. Cryptojacking is the phenomenon of the hidden usage of
user’s computing device to mine the cryptocurrency. This is one of the emerging
malware that hides in the devices and steals all valuable information. It is carried by
the hacker and whenever a user installs some program which is hacked by the
attacker the system secretly mines the cryptocurrency. It works in many different
ways like the script or the malicious content is attended directly in the website, the
script may be hiddenly loaded in a third party advertisement which pop up after
visiting some malicious websites, it can be present in the installed browser extension
which injects the malicious content in the websites, a device can be infected which
execute cryptomining in background of the operation. Cryptojacking is basically an
illegal operation which can be outlawed by different laws like IT fraud, hacking and so
on. Cryptojacking not only deals with stealing the user’s resources but also it deals
with minimizing the processing power of the system. Cryptojacking is mainly carried
out when the system is on rest because it reduces the chance to track the attacker of
the cryptojacking operation.
4
https://lifehacker.com/what-is-tor-and-should-i-use-it-1527891029
Summary:
TOR is the open source software utilized by many people for the purpose of
anonymous internet surfing. It was previously designed, deployed and implemented
in the U.S. Naval Research Laboratory as third generation onion routing project. It
served as a protection in the communication of U.S. navy. It is supported by
Microsoft Windows, Unixlike (macOS, Android and Linux). The major benefits that
are offered with the TOR software ids that it helps in reducing the risks that occurs
with malicious attackers. Onion routing is designed by encrypting the application
layer present in the communication protocol stack. TOR uses the same mechanism.
It utilizes many volunteer networks which direct traffic in internet to the internet to
keep the user identity secret from the interceptor. First step of the mechanism is to
identify the free nodes. Then the client produces the encrypted content which is sent
in the first identified node. The user on the other end decrypts the content and
locates the next free node. This is a continuous process which helps the user to keep
their identity hidden during the internet surfing. Later when the client wants to send
some data it chooses a completely different path which makes difficult for the
interceptor to track the user details.
Week 5
An emerging form of malware is cryptojacking (also known as malicious
cryptomining). Find and summarise ONE resource that describes what cryptojacking
is and how it works. The resource, and your summary, should focus purely on
cryptojacking and NO OTHER form(s) of malware.
Title and Reference: Cryptojacking
Nadeau, M. (2019). What is cryptojacking? How to prevent, detect, and recover from
it. [online] CSO Online. Available at:
https://www.csoonline.com/article/3253572/what-is-cryptojacking-how-to-prevent-
detect-and-recover-from-it.html [Accessed 30 May 2019].
https://www.csoonline.com/article/3253572/what-is-cryptojacking-how-to-prevent-detect-and-
recover-from-it.html
Summary:
With the growing technology and its impacts it has been observed that the threats
have also evolved widely. Cryptojacking is the phenomenon of the hidden usage of
user’s computing device to mine the cryptocurrency. This is one of the emerging
malware that hides in the devices and steals all valuable information. It is carried by
the hacker and whenever a user installs some program which is hacked by the
attacker the system secretly mines the cryptocurrency. It works in many different
ways like the script or the malicious content is attended directly in the website, the
script may be hiddenly loaded in a third party advertisement which pop up after
visiting some malicious websites, it can be present in the installed browser extension
which injects the malicious content in the websites, a device can be infected which
execute cryptomining in background of the operation. Cryptojacking is basically an
illegal operation which can be outlawed by different laws like IT fraud, hacking and so
on. Cryptojacking not only deals with stealing the user’s resources but also it deals
with minimizing the processing power of the system. Cryptojacking is mainly carried
out when the system is on rest because it reduces the chance to track the attacker of
the cryptojacking operation.
4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Week 6
Redundancy is a critical aspect of network design, implemented in order to cope link
or equipment failure. One frequent cause of failure is damage to fibre optic cables
that connect countries and/or continents. Find and summarise ONE resource that
describes ONE example of such a cable being cut or damaged. The resource, and
your summary, should describe the impacts of A SINGLE EXAMPLE of a link failure.
Note that the failure must relate to a link that connects countries and/or continents.
Title and Reference: Link failure due to the damage of cable
Byrne, J. (2019). The six biggest causes of damage to fiber networks. [online] Ppc-
online.com. Available at: https://www.ppc-online.com/blog/the-six-biggest-causes-of-
damage-to-fiber-networks [Accessed 30 May 2019].
https://www.ppc-online.com/blog/the-six-biggest-causes-of-damage-to-fiber-networks
Summary:
The cable is the primary key of delivering the online services from the ISP (Internet
Service Provider) to the user. Cable plays a major role in transferring the data and
this makes it crucial to have proper control over data transmission process. Damage
in this type of cable can affect hugely in the connection and can intercept many
important operations of the human world. This type of damage in the cable are
caused mainly by six methods namely, animals, vandalism, vehicle damage, little old
ladies and acts of God. Time Warner Cable of Western New York had to change or
repair 87 miles of cable in 2011 caused due to the squirrel chews. Cables are mainly
broken by squirrel, monkeys, rats and so on. Vehicles that are of huge height
sometimes unknowingly tear the cables which interrupts the connection. Natural
disaster can also harm or damage the cables which also cut off the connection
provided by the cables. One of the most important foes in the damage of the cable
are the little old ladies. In 2011, an old lady dug the ground and cut the cable which
leads to cut off internet facility to more 3.2 million Armenians for 5 hours.
Week 7
Since the 1990s, Enterprise Systems (also known as Enterprise Resource Planning
systems) have become critical to the operation modern organisations. Over this
time, ES/ERPs have evolved and continue to change in response to new demands
and emerging technologies. Find and summarise ONE resource that discusses
emerging or future trends for ES/ERPs. The resource should be recent (published
since the beginning of 2017) and it and your summary should clearly identify how
ES/ERPs are, or are about to, change.
Title and Reference: Future trends of ERP
Medium. (2019). Future Trends in ERP Systems. [online] Available at:
https://medium.com/@gracesam989/future-trends-in-erp-systems-42b0fe582b83
[Accessed 30 May 2019].
https://medium.com/@gracesam989/future-trends-in-erp-systems-42b0fe582b83
Summary:
The future trends of ERP are as follows:
More ERP client will choose Cloud: The ERP is vacant of the integrated cloud
computing method so it is expected that many users can switch to the cloud
to gain more advantage and develop in the business growth of the
organization. They can allow the advantages of the comprehensive system by
minimum human resources. It is expected that total cloud based industry will
cross US $411 by 2020. They will allow Enterprise mobility solutions for the
cloud based ERP requirements.
Businesses should be kept ready for the sudden updates- As the system is
5
Redundancy is a critical aspect of network design, implemented in order to cope link
or equipment failure. One frequent cause of failure is damage to fibre optic cables
that connect countries and/or continents. Find and summarise ONE resource that
describes ONE example of such a cable being cut or damaged. The resource, and
your summary, should describe the impacts of A SINGLE EXAMPLE of a link failure.
Note that the failure must relate to a link that connects countries and/or continents.
Title and Reference: Link failure due to the damage of cable
Byrne, J. (2019). The six biggest causes of damage to fiber networks. [online] Ppc-
online.com. Available at: https://www.ppc-online.com/blog/the-six-biggest-causes-of-
damage-to-fiber-networks [Accessed 30 May 2019].
https://www.ppc-online.com/blog/the-six-biggest-causes-of-damage-to-fiber-networks
Summary:
The cable is the primary key of delivering the online services from the ISP (Internet
Service Provider) to the user. Cable plays a major role in transferring the data and
this makes it crucial to have proper control over data transmission process. Damage
in this type of cable can affect hugely in the connection and can intercept many
important operations of the human world. This type of damage in the cable are
caused mainly by six methods namely, animals, vandalism, vehicle damage, little old
ladies and acts of God. Time Warner Cable of Western New York had to change or
repair 87 miles of cable in 2011 caused due to the squirrel chews. Cables are mainly
broken by squirrel, monkeys, rats and so on. Vehicles that are of huge height
sometimes unknowingly tear the cables which interrupts the connection. Natural
disaster can also harm or damage the cables which also cut off the connection
provided by the cables. One of the most important foes in the damage of the cable
are the little old ladies. In 2011, an old lady dug the ground and cut the cable which
leads to cut off internet facility to more 3.2 million Armenians for 5 hours.
Week 7
Since the 1990s, Enterprise Systems (also known as Enterprise Resource Planning
systems) have become critical to the operation modern organisations. Over this
time, ES/ERPs have evolved and continue to change in response to new demands
and emerging technologies. Find and summarise ONE resource that discusses
emerging or future trends for ES/ERPs. The resource should be recent (published
since the beginning of 2017) and it and your summary should clearly identify how
ES/ERPs are, or are about to, change.
Title and Reference: Future trends of ERP
Medium. (2019). Future Trends in ERP Systems. [online] Available at:
https://medium.com/@gracesam989/future-trends-in-erp-systems-42b0fe582b83
[Accessed 30 May 2019].
https://medium.com/@gracesam989/future-trends-in-erp-systems-42b0fe582b83
Summary:
The future trends of ERP are as follows:
More ERP client will choose Cloud: The ERP is vacant of the integrated cloud
computing method so it is expected that many users can switch to the cloud
to gain more advantage and develop in the business growth of the
organization. They can allow the advantages of the comprehensive system by
minimum human resources. It is expected that total cloud based industry will
cross US $411 by 2020. They will allow Enterprise mobility solutions for the
cloud based ERP requirements.
Businesses should be kept ready for the sudden updates- As the system is
5
expected to become a cloud based one, more developed and frequent
updates will be available which should be implemented by the business and
the business should always to kept ready to install the updates to gain the
benefits of the updates and can hold a strong position in this competitive
world.
The blockchain: Blockchain will be introduced in the ERP system, as it is
considered top be one of the trusted platform for every transactional
operations. Blockchain technology will active the supply chain management
and the customer acquisition.
Artificial Intelligence (AI): Machine learning is a major factor that will develop
the ERP system in a rapid way by providing quick error free services. It will
help the business officials to make their business operation an automated
one and will allow the officials to concentrate on the core business methods
for the business growth and to develop the organization.
Week 8
Databases, mass data storage and interrogation technologies underpin virtually all
Information Systems and applications. However, the same tools also make it easier
for data breaches to occur in government departments or private
companies/organisations. In simple terms, a data breach is where private
information is illegally obtained or disclosed. Find and summarise ONE resource that
describes ONE example of a data breach that has occurred since the beginning of
2017. The resource, and your summary, should focus purely on A SINGLE
EXAMPLE of a data breach.
Title and Reference: Exactis data breach incident
Curtis, A. (2019). The Exactis Breach: 5 Things You Need to Know. [online]
Blog.infoarmor.com. Available at: https://blog.infoarmor.com/employees/the-exactis-
breach-5-things-you-need-to-know [Accessed 30 May 2019].
https://blog.infoarmor.com/employees/the-exactis-breach-5-things-you-need-to-know
Summary:
Data breaches possess the ability to impact the performance of an organization.
They stores huge confidential data that needs to have proper security so that they
can perform better functions. This also has the ability to hamper the customers
associated with the organization. Exactis is the data marketing and aggregation
based organization situated in Palm Coast, Florida. One of the major data breach
has been identified within the organization of Exactics that impacted the data of
several customers. The company contains greater than 3.5 billioninformation of their
clients. The data breach was discovered by Vinny Troia in June 2018 by
implementing a search tool namely, Shodan and he founded that around 7000
databases are accessible in the public. The Exactis data breach is one of the largest
breaches that lead to leaking the details related to phone numbers of people, email
address, age, and gender of their child. The data breach exposed nearly 340 million
records of Exactis. According to the survey and researches it has been identified that
around 45 percent Americans got impacted by this data breaches. These records
contain the full details of their stakeholders, including their personal identity, hobbies,
contacts and so on. Vinny Troia immediately informed the officials of Exactis and
FBI.
Week 9
Agile development is an iterative and incremental approach to delivering systems - it
is particularly useful where the requirements are unclear or evolving. Scrum is a
framework for undertaking agile development. Find and summarise ONE resource
6
updates will be available which should be implemented by the business and
the business should always to kept ready to install the updates to gain the
benefits of the updates and can hold a strong position in this competitive
world.
The blockchain: Blockchain will be introduced in the ERP system, as it is
considered top be one of the trusted platform for every transactional
operations. Blockchain technology will active the supply chain management
and the customer acquisition.
Artificial Intelligence (AI): Machine learning is a major factor that will develop
the ERP system in a rapid way by providing quick error free services. It will
help the business officials to make their business operation an automated
one and will allow the officials to concentrate on the core business methods
for the business growth and to develop the organization.
Week 8
Databases, mass data storage and interrogation technologies underpin virtually all
Information Systems and applications. However, the same tools also make it easier
for data breaches to occur in government departments or private
companies/organisations. In simple terms, a data breach is where private
information is illegally obtained or disclosed. Find and summarise ONE resource that
describes ONE example of a data breach that has occurred since the beginning of
2017. The resource, and your summary, should focus purely on A SINGLE
EXAMPLE of a data breach.
Title and Reference: Exactis data breach incident
Curtis, A. (2019). The Exactis Breach: 5 Things You Need to Know. [online]
Blog.infoarmor.com. Available at: https://blog.infoarmor.com/employees/the-exactis-
breach-5-things-you-need-to-know [Accessed 30 May 2019].
https://blog.infoarmor.com/employees/the-exactis-breach-5-things-you-need-to-know
Summary:
Data breaches possess the ability to impact the performance of an organization.
They stores huge confidential data that needs to have proper security so that they
can perform better functions. This also has the ability to hamper the customers
associated with the organization. Exactis is the data marketing and aggregation
based organization situated in Palm Coast, Florida. One of the major data breach
has been identified within the organization of Exactics that impacted the data of
several customers. The company contains greater than 3.5 billioninformation of their
clients. The data breach was discovered by Vinny Troia in June 2018 by
implementing a search tool namely, Shodan and he founded that around 7000
databases are accessible in the public. The Exactis data breach is one of the largest
breaches that lead to leaking the details related to phone numbers of people, email
address, age, and gender of their child. The data breach exposed nearly 340 million
records of Exactis. According to the survey and researches it has been identified that
around 45 percent Americans got impacted by this data breaches. These records
contain the full details of their stakeholders, including their personal identity, hobbies,
contacts and so on. Vinny Troia immediately informed the officials of Exactis and
FBI.
Week 9
Agile development is an iterative and incremental approach to delivering systems - it
is particularly useful where the requirements are unclear or evolving. Scrum is a
framework for undertaking agile development. Find and summarise ONE resource
6
that describes Scrum. The resource, and your summary, should focus purely on
Scrum and discuss some of its key features and attributes.
Title and Reference: Scrum
Cohn, M. (2019). Scrum Methodology and Project Management. [online] Mountain
Goat Software. Available at: https://www.mountaingoatsoftware.com/agile/scrum
[Accessed 30 May 2019].
https://www.mountaingoatsoftware.com/agile/scrum
Summary:
Scrum methodology offers a better way of delivering the project by managing the
software components efficiently. Scrum is the agile layout to manage the knowledge
operations emphasizing on the software development. It is such kind of layout where
an individual can present complex adaptive issues while creating and producing high
value products. It is light weight, difficult to master and user friendly too. The major
benefit that is observed with the use of Crum methodology is that it synchronizes the
work with the team members and focuses on discussing the works that are related to
sprint. It describes a flexible, durable, feasible and holistic product innovation
technique by collaborating the entire team worker to operate together on the same
product. The key features of scrum are:
Minimum documentation process
The process is quite iterative
Prioritization of the requirements are based on the business values and the
updates
High product quality is offered with the use of scrum methodology
Self-organized organization and focused on customer satisfaction factor
High customer involvement.
It becomes easy to identify the risks and also helps in controlling the project
The ROI becomes faster as compared to other methodologies
Week 10
The textbook discusses activities associated with project management. However, it
could be argued that project governance is equally important, especially in very large
projects. Find and summarise ONE resource that describes what project governance
is and what activities it entails. The resource, and your summary, should focus purely
on project governance.
Title and Reference: Project governance
Anon, (2019). [online] Available at:
https://www.pmi.org/learninhttps://www.pmi.org/learning/library/project-governance-
critical-success-9945g/library/project-governance-critical-success-9945 [Accessed 30
May 2019].
https://www.pmi.org/learning/library/project-governance-critical-success-9945
Summary:
Project Governance is a management layout under which the decisions of the
project are prepared. It is important to have proper project governance within every
developing project. The project governance plays an important role in any project as
the responsibilities and the accountabilities are laid down in the business governance
preparations. Thus it becomes essential to implement proper governance project that
will help in managing the activities efficiently. Thus the main function of the project
governance is to provide effective and efficient decision for a project which will help
to develop the business operation and its productivity. It governs the organization
investment in a repeatable, robust and logical technique. Project governance
comprises of three main pillars namely, people, information and the structure. The
main concern behind having an effective project governance framework is to ensure
that proper decision is being taken for the purpose of executing the project. There
7
Scrum and discuss some of its key features and attributes.
Title and Reference: Scrum
Cohn, M. (2019). Scrum Methodology and Project Management. [online] Mountain
Goat Software. Available at: https://www.mountaingoatsoftware.com/agile/scrum
[Accessed 30 May 2019].
https://www.mountaingoatsoftware.com/agile/scrum
Summary:
Scrum methodology offers a better way of delivering the project by managing the
software components efficiently. Scrum is the agile layout to manage the knowledge
operations emphasizing on the software development. It is such kind of layout where
an individual can present complex adaptive issues while creating and producing high
value products. It is light weight, difficult to master and user friendly too. The major
benefit that is observed with the use of Crum methodology is that it synchronizes the
work with the team members and focuses on discussing the works that are related to
sprint. It describes a flexible, durable, feasible and holistic product innovation
technique by collaborating the entire team worker to operate together on the same
product. The key features of scrum are:
Minimum documentation process
The process is quite iterative
Prioritization of the requirements are based on the business values and the
updates
High product quality is offered with the use of scrum methodology
Self-organized organization and focused on customer satisfaction factor
High customer involvement.
It becomes easy to identify the risks and also helps in controlling the project
The ROI becomes faster as compared to other methodologies
Week 10
The textbook discusses activities associated with project management. However, it
could be argued that project governance is equally important, especially in very large
projects. Find and summarise ONE resource that describes what project governance
is and what activities it entails. The resource, and your summary, should focus purely
on project governance.
Title and Reference: Project governance
Anon, (2019). [online] Available at:
https://www.pmi.org/learninhttps://www.pmi.org/learning/library/project-governance-
critical-success-9945g/library/project-governance-critical-success-9945 [Accessed 30
May 2019].
https://www.pmi.org/learning/library/project-governance-critical-success-9945
Summary:
Project Governance is a management layout under which the decisions of the
project are prepared. It is important to have proper project governance within every
developing project. The project governance plays an important role in any project as
the responsibilities and the accountabilities are laid down in the business governance
preparations. Thus it becomes essential to implement proper governance project that
will help in managing the activities efficiently. Thus the main function of the project
governance is to provide effective and efficient decision for a project which will help
to develop the business operation and its productivity. It governs the organization
investment in a repeatable, robust and logical technique. Project governance
comprises of three main pillars namely, people, information and the structure. The
main concern behind having an effective project governance framework is to ensure
that proper decision is being taken for the purpose of executing the project. There
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
are basically four principles related to the project governance
Ensures single point of accountability so that it can ensure better success
towards the project development process
Project ownership is free from the asset ownership and service ownership
Ensures division between the decision-making operations and the
stakeholder management
Ensures division between the organizational governance layout and the
project governance.
8
Ensures single point of accountability so that it can ensure better success
towards the project development process
Project ownership is free from the asset ownership and service ownership
Ensures division between the decision-making operations and the
stakeholder management
Ensures division between the organizational governance layout and the
project governance.
8
MARKING SHEET - DO NOT DELETE
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent,but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content/contains content not contained in the resource) OR
Multiple resources used for a single task
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
9
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent,but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content/contains content not contained in the resource) OR
Multiple resources used for a single task
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
9
1 out of 9
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.