Digital Technologies and Professional Practice: CW2

Verified

Added on  2022/08/26

|13
|3314
|17
AI Summary
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Digital Technologies and Professional Practice: CW2
Module Title: Digital Technologies and
Professional Practice Module Code: CO454
Assignment No/Title: CW2 Assessment
Weighting: 60%
Module Tutor: Hilary Milano Degree/Foundation: Foundation and
Degree
Student ID: Student Name:
Course:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
ENTER YOUR FULL NAME AND YOUR STUDENT ID NUMBER HERE
Table of Contents
1. My Toolkit........................................................................................................................................3
2. My Inspiration..................................................................................................................................5
3. My Software Application..................................................................................................................7
4. My Software Tutorials......................................................................................................................8
5. My Goals.........................................................................................................................................9
References........................................................................................................................................11
CO454 Digi-Tech CW2 Page 2 of 13
Document Page
ENTER YOUR FULL NAME AND YOUR STUDENT ID NUMBER HERE
1. My Toolkit
Being a student, I have chosen two applications Net Beans and Wireshark. The application Net
Beans will be used for developing a software whereas Wireshark will be used as a packet analyser
for software analysis.
NetBeans
NetBeans is basically a combined development infrastructure also known as IDE (Integrated
Development Environment). It is mainly used for developing a software or application in java. Along
with java, it supports several programming languages like C, PHP, C++, JavaScript and HTML.
NetBeans application runs on a large variety of platforms like Linux, Windows, Solaris and macOS
which enables different industrial personnel to run a particular programme from different OS
platforms. This results in easing the accessibility problems which industrial people face in many case
while creating or altering a program using other IDE (Arzoo, Prof and Rathod 2017).
With the use of the NetBeans application, I can develop a GUI (Graphical User Interface)
based ‘.jar’ extension software (in case of java programming). People without any knowledge in java
can also run this software to get their desired output. Keeping this GUI based software creation
techniques as the core of my future developing projects I will be able to develop many network based
application; used for transferring valuable/ confidential information of one point/branch of an
organization to another point/branch. The data transferring will be done in an encrypted way. As a
result the point-to-point data transfer (encrypted client-server communication) will be fully secured.
On successful completion of this, it will provide a huge positive impact in my future career
development (Wielenga 2015).
While using NetBeans, there are some special writing techniques by using which, a coder
does not have to write a whole set of lines. The IDE NetBeans will auto-generate the lines on its own.
Some of them are psvm (shortcut for public static void main()), sout (shortcut for
System.out.println()), fori (shortcut for for-loop), trycatch (shortcut for try-catch block in exception
handling) and many more. In order to use these keyboard shortcuts, the coder just need to write the
shortcut keyword and press tab; and then the respective code template will auto generate and the
coder can use them in his/her code. Few shortcut keys like Shift+F11 and F6 can be used to clean
and build main project, and run the main project respectively. As for the guidance for using NetBeans
from beginner level to that of the specialized one, I have got all the learning material from the Official
NetBeans website (Schreckmann 2014).
Wireshark
Initially known as Ethereal, the network analysis tool wireshark, captures real time packets and gives
an output in a human understandable setup. It has various features like filtering packets, color coding
them and numerous other features helps an analyser dig deep into network traffic and check each
CO454 Digi-Tech CW2 Page 3 of 13
Document Page
ENTER YOUR FULL NAME AND YOUR STUDENT ID NUMBER HERE
and every packets. Experts use wireshark to check network traffic flow of any programs that they
thinks as suspicious. By analysing these traffic flow, troubleshooting network problems is easy
(Chappell 2017).
After installing and launching Wireshark, I just need to select the networking interface by (double
clicking) the name of the interface I want to analyse and wireshark will start capturing packets from
the selected interface; an example can be taken into consideration in order to get a better
understanding about this matter. Let us assume that I want to take a note of my Wi-Fi network
connection, I just need to select the name of my Wi-Fi interface and all the details from the time of
starting the packet tracing is displayed. It consists of the packet number in a serial order along with
time in seconds taken for each packets. The analysis report also displays the source and destination
IP address of the packets in IPV6 format. In next column, the protocol of each packets is displayed.
Protocols mat be TLS or TCP. In the last two sections, the lengths of each packets are displayed and
the information of the packets are shown in the last segment (Bagyalakshmi et al. 2018).
The Statistics and Analyze menus are used to get a graph based detailed statistical analysis of
packets. Additionally, packets can be highlighted by means of color coding. It helps the analyser keep
track of any specific packet is a very easy way. Similarly, filters can also be used to view only
selected conditional packets as per analyser requirement. I have got all the learning material from the
learn section of the Official Wireshark website (Pavithirakini et al. 2016).
CO454 Digi-Tech CW2 Page 4 of 13
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
ENTER YOUR FULL NAME AND YOUR STUDENT ID NUMBER HERE
2. My Inspiration
My education in the academic section mainly focuses on two subjects. They are ‘Business’
and ‘IT’. My inspiration, Steve Jobs, also has also put a vast impact in both the IT and Business
Industry. He was born in 1955 in San Francisco. In the year 1968, at the age of thirteen years, Jobs
gets his first job in the IT industry (at HP factory). He got in the industry via Bill Hewlett. In the year
1972, Steve Jobs along with Steve Wozniak assembled ‘blue box’ and sold them illegally; it allows
the user of blue box make free phone calls. In 1974, Jobs got a job at a game maker Atari.
In the month of March, year 1976, Steve along with Woz present their first Apple I prototype board at
Homebrew Computer Club. In the month of April in the same year, Apple Computer Inc. got united by
Steve Jobs, Ron Wayne and Steve Wozniak. On 17th April 1977, in the ‘West Coast Computer Faire’,
Apple creates a massive impression by means of their Apple II prototype. In the year 1978, Apple II
becomes the first ever mass-market PC. In the next year, pioneer spreadsheet software ‘Visicalc’
was brought into the market and the sales rose steeply from then. On the end (December) of 1979,
Jobs introduced the first GUI based Xerox PARC. By the end of 1980, Apple goes public; it result in
Steve Jobs’ bank balance to rise above $200 million (Hiner 2014).
In the early1981, Steve Jobs takes over the Macintosh project. In the month of August, IBM
PC was launched by IBM. It pose apple as their biggest threat. In the year 1985, All the board
members of Apple takes side with John Sculley in a coup d’état and bans Steve out from doing his
duties and he had to part ways from Apple.
In the month of September 1985, Steve Jobs quits Apple and begins his own company NeXT along
with five more persons from Apple. Steve purchases the computer division of George Lucas ILM with
a lump sum amount of $10 million and integrates it as Pixar in the end of January, 1986 (Sarfraz
2017).
Pixar uncovers John Lasseter’s short film ‘LuxoJr.’ and got admired by knowledgeable
spectators as the first computer based dynamic animation work. In the year 1988 NeXT forms
partnership with IBM and the NeXT systems run on IBM machines (Yoffie and Cusumano 2015).
In the month of November 1995, Pixar goes to public. It gave a hike in Steve’s wealth to a
whopping $1.5 billion. This happened just after one week from the release of the Toy Story animated
movie; by the end of 1996, Apple was in serious need for a new and revised operating system. In the
end, they bought NeXT for around $400 million and Steve became the “informal advisor” (Steinwart
and Ziegler 2014).
In the month of May, year 1998, Steve Jobs introduced the ground-breaking iMac for the first time in
Cupertino auditorium. In the month of October 2001, Steve introduced the present iPod in a minor
television event held within apple’s estate. In the mid of 2006, Apple brings forward the famous ‘Mac
vs PC’ campaign. The campaign lasted for approximately three years (Hammershøj 2018).
CO454 Digi-Tech CW2 Page 5 of 13
Document Page
ENTER YOUR FULL NAME AND YOUR STUDENT ID NUMBER HERE
Steve introduced iPhone in January 2007 at Macworld. At that point of time, he publicised the
modification of company name. The name got changed from Apple Computer Inc. to Apple Inc. On
January 2010, Steve Jobs uncovered the long-awaited iPad and the new tablet works on the very
same OS (operating system) to that of the iPhone. In July 2010, iPhone 4 was his last contribution to
the industry and after that, he resigned as CEO of Apple in August 2011 (Bell and Taylor 2016).
CO454 Digi-Tech CW2 Page 6 of 13
Document Page
ENTER YOUR FULL NAME AND YOUR STUDENT ID NUMBER HERE
3. My Software Application
The application software that I can develop is a network-based system simulation system. This
will also interest my potential employer as my created application can calculate what time it will take
for a real machine to work on a process and give the out is a similar process but in a relatively
smaller amount of time. In order to get a clear idea, let us take the following example.
Suppose there are three work stations Work Station A (WA), Work Station B (WB) and Work
Station Delivery (WD) in a delivery system. WA is the main production unit, WB checks for defective
parts and does a rework on them; on the other hand, WD is for packaging purpose. Out of these
three only WA is fully automated unit whereas both WB along with WD are semi-automatic
workstations.
Time taken for manufacturing in WA is 1 minute /unit, time taken for repairing in WB is 20
minute /unit and time for packaging in WD is 30 minute /package of 30 units. A package contains a
maximum of 30 units. There is a probability of getting 1 % error in every 100 units produced in WA.
A customer can place order at any point of time. The orders placed by the customers will
process sequentially; in other words, if a customer order arrives at Work Station A and finds a busy
notification from WA, it (the order) will enter into a queue and wait for WA to be empty. When the WA
gets empty, the first order that got into the queue will enter into WA and then the remaining orders will
wait and proceed accordingly.
Work Station Delivery (WD) will pack a number of 30 units; if the customer’s order is less than
30 units, then the workstation will pack that amount of units but the time take will still be 30 minutes.
My current software application is targeted towards the large companies or service providing
companies that works with large workstation-based systems or manufacturing of the same.
Developing this current application, I will need knowledge about basic as well as core java
coding, GUI (Graphic User Interface) in java and how to obtain runnable software in java. Depending
on the situation I may also require knowledge about how the implement the software in such a way
that the same simulation will work in web browser (Goodrich, Tamassia and Goldwasser 2014).
Marketing of my application will be done through fliers and include them with the newspapers;
it will also be done by creating a blog and sharing them via various e-marketing methods like Search
Engine Marketing (SEM) and Search Engine Optimization (SEO). Social Media Marketing (SMM) can
also be done. SMM may include posting advertisements in Facebook, YouTube, Twitter, Instagram or
many more. Email marketing can also be done in order to market about my current application and
get potential customers (Isaenko and Tarasov 2014).
CO454 Digi-Tech CW2 Page 7 of 13
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ENTER YOUR FULL NAME AND YOUR STUDENT ID NUMBER HERE
CO454 Digi-Tech CW2 Page 8 of 13
Document Page
ENTER YOUR FULL NAME AND YOUR STUDENT ID NUMBER HERE
4. My Software Tutorials
CO454 Digi-Tech CW2 Page 9 of 13
Document Page
ENTER YOUR FULL NAME AND YOUR STUDENT ID NUMBER HERE
5. My Goals
The next three years is very crucial for me; it is so because from my childhood, it was my
dream to become the head of an organisation. Achieving the dream may seem hard or unrealistic for
many people, but starting up a new company with the right preparation is the best course of action I
can make to make my dream come true. This made me decide that I want to become an
entrepreneur, market and develop my software application even further. I have decided to follow the
below timeline to achieve my final goal.
In the initial stage, in other words during the first year, I have thought of doing a detailed
analysis on
how I can achieve my final goal of becoming an entrepreneur,
how I can successfully establish a company,
what things I should do to maintain my company and its reputation,
how many individuals I may need depending on the situation of marketing, sales, technical
development, ideation, maintenance, expansion, help assistance (customer support) and
many more.
I also need to think of a unique innovation and patent them so that other companies with the same
developing background may not copy my ideas and as a result to that, being the only company
providing that innovation, I will stand a chance in the market.
CO454 Digi-Tech CW2 Page 10 of 13
Year 1
Goal analysis, technical skill
gathering and taking
courses for any update
required for
entrepreneurial
establishment.
Year 2
Establishment of new
company based on the
gathered knowledge and
research done
Year 3
Maintaining the company
and finding new ways and
ideas for expansion
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
ENTER YOUR FULL NAME AND YOUR STUDENT ID NUMBER HERE
During this evaluation period, if I find that I am lacking in any ground (area) and need detailed
knowledge to proceed with that particular matter, I will do small crash courses from verified online
sources like Udemy, Skillshare, Khan Academy, Lynda, Codecademy and Master class. These sites
have a large base of online learning tutorials available. It will help me to cope up in those deficit
grounds. These will consume one full from my next three-year goal plan.
The plan for my second year will consist of choosing a business name and register the domain
name for my business at the same time. Next, I will apply for getting Permit and license for my
business; here most of the paperwork part for setting my business will be done. A suitable business
location will be chosen depending on the accounting system and working environment needed at that
point of time. On completion of all these tasks, I will start hiring employees in order to fill the positions
that I have chalked out that I might need in the previous year. In the end, I will promote my business
and start attracting our new possible customers and clients. I can do that by featuring my unique
selling point at that point of time, along with a marketing plan (Keeble and Wever 2016).
On the third year, judging by the requirements of the customer I will try to expand my business
by opening branch offices in other location, form an alliance with other companies to expand my
growth in the market and try to win a government contract as it will give a huge boost to my company
and will maintain the business to at least keep the delivered product level intact (Engeström 2015).
CO454 Digi-Tech CW2 Page 11 of 13
Document Page
ENTER YOUR FULL NAME AND YOUR STUDENT ID NUMBER HERE
References
Arzoo, M.K., Prof, A. and Rathod, K., 2017. K-Means algorithm with different distance metrics in
spatial data mining with uses of NetBeans IDE 8. 2. Int. Res. J. Eng. Technol, 4(4), pp.2363-2368.
Bagyalakshmi, G., Rajkumar, G., Arunkumar, N., Easwaran, M., Narasimhan, K., Elamaran, V.,
Solarte, M., Hernández, I. and Ramirez-Gonzalez, G., 2018. Network vulnerability analysis on brain
signal/image databases using Nmap and Wireshark tools. IEEE Access, 6, pp.57144-57151.
Bell, E. and Taylor, S., 2016. Vernacular mourning and corporate memorialization in framing the
death of Steve Jobs. Organization, 23(1), pp.114-132.
Chappell, L., 2017. Wireshark 101: Essential Skills for Network Analysis-Wireshark Solution Series.
Laura Chappell University.
Engeström, Y., 2015. Learning by expanding. Cambridge University Press.
Goodrich, M.T., Tamassia, R. and Goldwasser, M.H., 2014. Data structures and algorithms in Java.
John Wiley & Sons.
Hammershøj, L.G., 2018. Conceptualizing creativity and innovation as affective processes: Steve
Jobs, Lars von Trier, and responsible innovation. Philosophy of Management, 17(1), pp.115-131.
Hiner, J., 2014. Apple’s first employee: the remarkable odyssey of Bill Fernandez. Tech Republic.
Isaenko, E.V. and Tarasov, A.S., 2014. Automobiles selling organizations’ marketing communications
assessment directions. Life Sci J, 11(9s), p.1097.
Keeble, D. and Wever, E., 2016. New firms and regional development in Europe. Routledge.
Pavithirakini, S., Bandara, D.D.M.M., Gunawardhana, C.N., Perera, K.K.S., Abeyrathne, B.G.M.M.
and Dhammearatchi, D., 2016. Improve the Capabilities of Wireshark as a tool for Intrusion Detection
in DOS Attacks. International Journal of Scientific and Research Publications, 6(4), pp.378-384.
Sarfraz, H., 2017. Strategic leadership development: simplified with Bloom’s taxonomy. Industrial and
Commercial Training, 49(1), pp.40-47.
Schreckmann, D., 2014. An Introduction to Java Development with NetBeans IDE. Net Beans IDE
Project Basics Tutorial.
Steinwart, M.C. and Ziegler, J.A., 2014. Remembering Apple CEO Steve Jobs as a" Transformational
Leader": Implications for Pedagogy. Journal of Leadership Education, 13(2).
Wielenga, G., 2015. Beginning netbeans ide: For java developers. Apress.
CO454 Digi-Tech CW2 Page 12 of 13
Document Page
ENTER YOUR FULL NAME AND YOUR STUDENT ID NUMBER HERE
Yoffie, D.B. and Cusumano, M.A., 2015. Strategy Rules: Five Timeless Lessons from Bill Gates,
Andy Grove, and Steve Jobs. Harper Business.
CO454 Digi-Tech CW2 Page 13 of 13
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]