Desklib: SEO Title Suggestions

Verified

Added on  2023/06/12

|9
|3724
|431
AI Summary
This output provides SEO title, meta title, meta description, slug, summary, subject, course code, course name, and college/university for Desklib - an online library for study material. The summary includes a paragraph from each of the ten tasks assigned in COIT 20246 course. The tasks cover topics such as modern CPUs, GUI operating systems, LPWANs, VoIP protocols, blockchain, net neutrality, and ICT automation.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
It will be necessary to use literature/online resources to complete this
assignment, please ensure you cite and reference any such materials using
the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not
use your own words!
Please complete your assignment using this submission template file,
inserting your responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
Tutor’s Name

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is a
table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Week 1
The text discusses how modern CPUs function. Recently a critical flaw in microprocessor
design has been discovered that allows two extremely serious security exploits: Spectre and
Meltdown. Find and summarise ONE resource that describes how either of these exploits
work. The resource (and your summary) should focus on what is occurring in the CPU that
allows these exploits to occur.
Title: Exploit of Spectra and Meltdown
Reference: Meltdownattack.com. (2018). Meltdown and Spectre. [online] Available at:
https://meltdownattack.com/ [Accessed 12 May 2018].
Summary:
The main aspect for the section of the article is that the attack which is related to the
meltdown are explained in deep with emphasis on the aspect of the attack which are
generated in the system. It can be stated here that the attack generally breaks the isolation
which is between the operating system and the user application. The attack generally allows
the attackers to indulge into activity which are related accessing the memory and thus also
the secrets which are related to the programming language. It can be stated that if the system
of the organization is using unpatched operating system and has a vulnerable processor they
should not deal with data which are vulnerable. This is due to the fact that most of the time
the critical data of the organization are very important for the working of the organization if
these data are lost it can directly impact the overall working of the organization. The concept
can be applied to the cloud infrastructure as well as the personal computer of the user or the
organization. Luckily it can be stated that there are different types of patches which are
involved into the concept to safe guard the data of the user or the organization.
Week 2
Prior to 1985, there were very few Operating Systems (OSes) that used Graphical User
Interfaces (GUIs). Find and summarise ONE resource that describes ONE of these GUI
operating systems. The OS must have been release prior to 1985 so cannot be Microsoft
Windows.
Title: GUI Operating system
Reference: Templates, B. (2018). List of GUI-Based Operating System and Its History.
[online] E-techinnews.blogspot.in. Available at: http://e-techinnews.blogspot.in/2012/06/list-of-
gui-based-operating-system-and.html [Accessed 12 May 2018].
Summary:
The main aim of the article is to take into consideration all the GUI (Graphical user interface)
operating system. The main selection of the resource is due to the factor that is gives a broad
idea of all the GUI based operating system and indulge the aspect with history involved into it.
A graphical user interface directly allows the user to interact with the hardware of the
computer in manner which is user friendly. Over the years there are a range of GUI’s that
have been developed in the different operating system such as the Macintosh, linux,
Document Page
windowsamiga and the Symbian OS. The main focus point of the article is to take into
consideration the Mac OS System 1.0.
The Mac OS system 1.0 can be considered as an operating system which was first developed
GUI for the Macintosh. Some of the features which are related to the concept are very much
latest taking into consideration the aspect of each of the window accompanied by an icon.
Taking into consideration the windows it can be moved with the help of the mouse and are
not just limited to the aspect of the windows, folder or files which can be copied by simple
placing and dragging or how the people know in term of dragging and drop to the desired
location or the target user. This concept can be applied to the aspect of the Apple on the
MAC until now which is already a version of the OSX snow leopard. This concept can be said
to be making the Mac concept very much simple if compared to other types of GUI and
became an operating system which is claimed to have one of the best features which are
related to the GUI system as compared to other operating system.
Week 3
Low-Powered Wide-Area Networks (LPWANs) are wireless communication networks that are
characterised by linking devices over large distances. Devices (including simple sensors)
typically can only communicate at very low bit rates, however, the communication and
associated electronics consume very little power. As such, LPWAN devices can be battery
powered and operate independently for many months or even years. Find and summarise
ONE resource that describes ONE platform or technology that implements a LPWAN.
Title: Technology that implements a LPWAN
Reference: Bhatia, R. (2018). What is LPWAN and why is it considered critical for IoT?.
[online] IoT India Magazine. Available at: https://www.iotindiamag.com/2017/03/lpwan-
considered-critical-iot/ [Accessed 13 May 2018].
Summary:
The main justification which can be given in regards to the selection of the resource is that it
gives a precise overview of the concept of the LPWAN and how it can be implemented in the
technology of internet of things. The focus point is how the technology gets its advantage
from the LPWAN concept.
The main reason for the selection of the article is that it gives a direct overview which is
related to the aspect of the LPWAN in the framework of the internet of things concept. The
main focus point of the report is to take into consideration different aspect which are related to
the concept of the internet of things and how different types of advantage which can be
achieved from the aspect.
The concept of the LPWAN helps in directly achieving the connectivity which is related to the
aspect of the internet of things devices. The basic need relating to the device can be
considered to be in the concept of the communication between the standard devices which
are related to the aspect in the internet of things. The concept which is applicable to the
LPWAN can be utilized in the sector of building, transportation, utility sector and health care
sector. The aspect of the low power wide area network in the concept of the internet of things
can be considered as one of the hottest topic in the sector of the working in the technology of
the cost effective nature.
Week 4
Voice over IP (VoIP) is a group of hardware and software technologies that allow users to
communicate via voice and video over the Internet. VoIP uses a number of different software
protocols, depending on the application. Find and summarise ONE resource that describes
ONE of these VoIP protocols.
Document Page
Title: VoIP Protocols
Reference: Voice over Internet Protocol (VoIP) Based IP PBX System Design. (2016).
International Journal of Science and Research (IJSR), 5(2), pp.1380-1385.
Summary:
The main reason which can be stated with relate to the selection of the resources gives a
direct overview of the concept of the protocol of the VoIP. The main protocol which is selected
in the process is the H.248 protocol. The main functionality which is related to the concept is
that it can be directly be related to the aspect of the gateway which is related to the interface
control between the PSW 2200 and the VXSM gateway. It can be stated here that it directly
supplements the aspect which is related to the protocol of the MGCP. The main functionality
which is related to the aspect is that it directly interfaces with the IP telephony network with
the PSTN network which directly passes the voice traffic from one section of the network to
another section. Although it can be stated here that the H.248 is designed for the aspect of
the generic support which is related to the support if the different kind of media, the PGW can
be designed for the act as an MGC and only the interwork with the gateway of the trunking.
Week 5
One of the many uses of cryptography has been the development of the blockchain.
Blockchains are commonly used as the basis for maintaining the data integrity of crypto
currencies, though have many, many more applications. Find and summarise ONE resource
that describes how blockchains work. Note that the resource should focus on the blockchain
mechanism, NOT crypto currencies.
Title: How blockchain works.
Reference: Happiest Minds. (2018). What is Blockchain Technology | Blockchain
Applications. [online] Available at: https://www.happiestminds.com/Insights/blockchain/
[Accessed 13 May 2018].
Summary: The concept of the blockchain can be considered as an encrypted, database which
is distributed that records data. In simple language it can be stated as a ledger of transaction
which is digital in nature and contracts – records which has to be individually recorded.
The main functionality which is related to the blockchain can be considered as a model which
is related to storing of the data in the concept of the ledger. The main reason of the selection
of the article is due to the factor that it gives a direct overview of the concept of the blockchain
and how it can be implemented and what are the advantage which can be achieved from the
concept. Hash function can be considered one of the most advantageous sector which is
related to the working within the concept of the blockchain technology. With the
implementation of the concept of the blockchain it can be stated that it directly secures the
data of the user and involves different aspects which are related to the aspect of the security
into the working. The main technique which is used is that the data is converted into a hash
by means of mathematical function which are only accessible by the authorized user. it
incorporates direct security of the data. Due to the implementation and the factor of the
security it can be stated that the concept of the blockchain can be implemented within the
concept of the finance sector.
Week 6
One controversial practical application of network traffic management is in the contravention
of the principle of “net neutrality”. Find and summarise ONE resource that describes what net
neutrality is and how its contravention could impact on individual and business users of the

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Internet.
Title: Net neutrality
Reference: Finley, K., Hempel, J., Graff, G., Tiku, N., Matsakis, L., Simonite, T. and
Lapowsky, I. (2018). Net Neutrality: Here's Everything You Need To Know. [online] WIRED.
Available at: https://www.wired.com/story/guide-net-neutrality/ [Accessed 14 May 2018].
Summary: Net neutrality can be considered as a technology which can be used in the aspect
of blocking unwanted users to keep unwanted users away from the system. Taking into
consideration in the near future it can be stated as an advantageous aspect due to the
blocking aspect which is involved into the concept. Several organization due to the factor of
keeping unwanted users away from the aspect of working of the organization are lending
focus towards the concept of the net neutrality. The main functionality which is related to the
concept of the net neutrality is that it should not allow data into the fast lanes while the
concept of the blocking or the aspect of the determination against the material. The
technology in simple manner can be stated to block user in an organization to block the user
in some specific activity which in common manner can be related to the aspect of the Skype
or slowing down of the concept of the Netflix.
Document Page
Week 7
Information Systems have led to greater and greater degrees of automation in the workplace.
There is currently extensive speculation on which jobs will cease to be performed by humans
in the near future. Find and summarise ONE resource that discusses jobs that are likely to
not exist in the future due to ICT based automation. Note that the resource must clearly link
the loss of the job(s) to advances in ICT.
Title: Job lost due to ICT automation
Reference: TechCrunch. (2018). Technology is killing jobs, and only technology can save
them. [online] Available at: https://techcrunch.com/2017/03/26/technology-is-killing-jobs-and-
only-technology-can-save-them/ [Accessed 14 May 2018].
Summary:
The selection of the article is due to the factor that it gives a direct overview of the concept
which gives an explanation about how the concept of the ICT would be involved in the sector
of the loss of the jobs. The main aspect which can be related to the concept is that in the near
future all the process would be very much automatic and would be involving less human
involvement. There can be different advantage and disadvantage which are related to the
concept. The main advantage with the automation of the ICT would be that it would involve
less errors as human oriented error can be ignored in most of the cases. On the other hand
the main disadvantage with the sector of the automation would be that due to the process of
automation there would be loss of job. Automation can be directly be linked with less human
activity in the system. One of the aspects which are related to the concept of the automation
in the ICT is that it would be altering the internal and the external of the organization.
Sometimes it can be stated that automation may include loss of job but on the other the
person who would be involved into the activity has to be very much professional.
Week 8
With the advent of mass data collection and storage has come the use of these datasets for
machine learning. Find and summarise ONE resource that describes what machine learning
is and how it is being used.
Title: Concept of Machine Learning
Reference: Sas.com. (2018). Machine Learning: What it is and why it matters. [online]
Available at: https://www.sas.com/en_in/insights/analytics/machine-learning.html [Accessed
14 May 2018].
Summary:
The main concept which can be applicable to the aspect of the machine learning can be
related to the different machines being able to learn from the data which is feed into the
system or the machine. The concept of the machine learning can be directly related to the
aspect of artificial intelligence which directly involve the security aspect of the data and
altering the capability to perform different types of task. Some of the sector which can be
stated here that directly involve the sector of the machine learning is the Google self-driving
car were the car directly makes decision by the aspect of the data which is given to the
system. It can be stated here that the aspect which is related to the machine learning does
not involve any type of human oriented activity so it can be stated here that the involvement
area would be very much less and it would be directly involving decision which are directly
machine based. In most of the times it can be seen that the machine learning aspect which is
done can be indulged into various type of sector were the involvement of the machine
learning can be implemented.
Week 9
Document Page
Critical to application development are the languages used to implement the specifications.
Find and summarise ONE resource that describes ONE programming language that has
been developed since 2008. The resource (and your summary) should include information
on the principle uses and features of the language.
Title: Pure Programming Language
Reference: Purelang.bitbucket.io. (2018). Pure Programming Language. [online] Available at:
https://purelang.bitbucket.io/ [Accessed 14 May 2018].
Summary: The main reason for the selection of the article is that it directly proves a brief
overview of the programming language. The main focus would be on the pure programming
language which can into existence in the year 2008. The main aspect which is related to the
concept can be applicable to the aspect of modern function based programming language.
The main offering of the programming language is in the sector of equation which matching of
the pattern, dynamic typing and full symbolic rewriting. The main aspect which is taken into
consideration is that due to the vast range of advantage it can be directly be implemented by
programmer who can directly indulge into the activity. One of the successors which are
related to the pure programming language is the R programming language. In this concept it
can be stated that the add ones are very much effective and can give a wide range of benefit
to the programmer. The system support which is related to the concept can be in the sector of
Mac OS X, FreeBSD and the windows.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Week 10
While information systems and technology deliver many benefits to society, they can also
result in negative effects and outcomes. One recent controversy, the propagation of fake
news and its influence on elections, has been linked to a type of software called a “bot”. Find
and summarise ONE resource that describes what bots are and how they can be used for
disseminating misinformation and affecting human behaviour.
Title:
Reference: Us.norton.com. (2018). What Are Bots?. [online] Available at:
https://us.norton.com/internetsecurity-malware-what-are-bots.html [Accessed 13 May 2018].
Summary:
Bots or internet bots can be considered as spider, crawler and web bots. The main
functionality which is related to the bots are in the sector of the utilization of the perform
perspective which is related to the search engine. There are basically two types of bots which
are mainly bad bots and good bots. The goods bots are basically those which directly interact
with messaging and involve in the concept of the instant replay to the chat and assorted
interfaces of the web. The bad sector which is related to the bots are that it can directly
propagate to other machine and directly infect the system. The server functions such as
“control center and command” for the concept of the botnet or the network which is
compromised similar devices and computer. The concept of bots can be used for infecting a
number of computer system at one instant of time. These directly from the bots network or a
bot which is related to a network of network. Most of the time the propagation of the bots from
one machine to another machine can be done without any media.
Document Page
MARKING SHEET - DO NOT DELETE
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content / contains content not contained in the resource)
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]