Information Technology fundamentals Assignment1
VerifiedAdded on 2022/10/02
|10
|2372
|28
Assignment
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: REPORT ON INFORMATION TECHNOLOGY FUNDAMENTALS.
REPORT
ON
INFORMATION TECHNOLOGY FUNDAMENTALS
Name of the Student
Name of the University
Author Note:
REPORT
ON
INFORMATION TECHNOLOGY FUNDAMENTALS
Name of the Student
Name of the University
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1Information Technology fundamentals
Question 1: Explain why we need a 3-way handshake in TCP? Why not just 2-way?
Answer:-
Let us take an example of a TCP conversation in between Bobbie and Alice
Bobbie----->Alice SYNchronize with the specific initial sequence number Y
Bobbie<-----Alice Receiving the syn and acknowledge that it is ready for [Y+1]
Bobbie<-----Alice SYNchronize with the particular initial number Y
Bobbie<-----Alice The syn has been received and it has been acknowledged and is ready for
[Y+1]
It has been noticed that there are basically four events which have been clearly occurring:
1. Bobbie is picking up an ISN and it is being SYNchoronised with Alice.
2. Bobbie ACKowledging the ISN
3. Bobbie is picking up the ISN and SYNchronizing it with Alice
4. Bobbie is ACKnowledging the ISN
The specific two events which are placed in the middle may be occurring within the
same packet. The three way handshake will be ending up as:
Alice <--- Bobbie SYN
Alice ---> Bobbie SYN ACK
Alice <--- Bobbie ACK
Now, coming to the specific question that what is the reason behind not utilising the
two way handshake is that the handshake of two way will be actually allowing one single
party for specifically establishing an ISN and there will be some other party which will be
ready for acknowledging it and this means that only one single party will be able to send the
Question 1: Explain why we need a 3-way handshake in TCP? Why not just 2-way?
Answer:-
Let us take an example of a TCP conversation in between Bobbie and Alice
Bobbie----->Alice SYNchronize with the specific initial sequence number Y
Bobbie<-----Alice Receiving the syn and acknowledge that it is ready for [Y+1]
Bobbie<-----Alice SYNchronize with the particular initial number Y
Bobbie<-----Alice The syn has been received and it has been acknowledged and is ready for
[Y+1]
It has been noticed that there are basically four events which have been clearly occurring:
1. Bobbie is picking up an ISN and it is being SYNchoronised with Alice.
2. Bobbie ACKowledging the ISN
3. Bobbie is picking up the ISN and SYNchronizing it with Alice
4. Bobbie is ACKnowledging the ISN
The specific two events which are placed in the middle may be occurring within the
same packet. The three way handshake will be ending up as:
Alice <--- Bobbie SYN
Alice ---> Bobbie SYN ACK
Alice <--- Bobbie ACK
Now, coming to the specific question that what is the reason behind not utilising the
two way handshake is that the handshake of two way will be actually allowing one single
party for specifically establishing an ISN and there will be some other party which will be
ready for acknowledging it and this means that only one single party will be able to send the
2Information Technology fundamentals
data (Nakhila et al., 2015). But it is to be remembered that TCT is a protocol which is bi-
directional which means that both the ends must be capable of sending data in a reliable way.
Both the parties must be establishing an ISN and they must be properly acknowledging the
ISN of the other (Kolahi et al., 2014). Hence, it is much better to possess three packets in the
total initiation procedure of the connection of TCP.
Question 2: What is RAD? List an advantage and a disadvantage of using RAD.
Answer:-
RAD or the Rapid Application Development is basically the adoption of the specific
model of waterfall and it has its main target towards the development of the software within a
very short period of time (Namazi‐Rad & Steel, 2015). The RAD model will be comprising
of the phases:
1. Modelling of business
2. Modelling of data
3. Modelling of process
4. Generation of application
5. Testing and the turnover
It will be focusing upon the source of input-output and the information’s main
destination and it will be greatly emphasizing upon the delivery of various projects in smaller
pieces (Nordstrom, 2015). All the main features of the model of RAD will be involving the
focus upon the reutilization of various procedures, code as well as various templates.
Advantages:
1. It is very much adaptable as well as flexible towards any kind of alternations.
2. It is very much useful whenever the overall risk of the project is to be lowered.
data (Nakhila et al., 2015). But it is to be remembered that TCT is a protocol which is bi-
directional which means that both the ends must be capable of sending data in a reliable way.
Both the parties must be establishing an ISN and they must be properly acknowledging the
ISN of the other (Kolahi et al., 2014). Hence, it is much better to possess three packets in the
total initiation procedure of the connection of TCP.
Question 2: What is RAD? List an advantage and a disadvantage of using RAD.
Answer:-
RAD or the Rapid Application Development is basically the adoption of the specific
model of waterfall and it has its main target towards the development of the software within a
very short period of time (Namazi‐Rad & Steel, 2015). The RAD model will be comprising
of the phases:
1. Modelling of business
2. Modelling of data
3. Modelling of process
4. Generation of application
5. Testing and the turnover
It will be focusing upon the source of input-output and the information’s main
destination and it will be greatly emphasizing upon the delivery of various projects in smaller
pieces (Nordstrom, 2015). All the main features of the model of RAD will be involving the
focus upon the reutilization of various procedures, code as well as various templates.
Advantages:
1. It is very much adaptable as well as flexible towards any kind of alternations.
2. It is very much useful whenever the overall risk of the project is to be lowered.
3Information Technology fundamentals
3. It is very much easier to properly transfer all the various deliverables as specific scripts as
well as various abstractions of high level.
4. Because of the generators of code and the reuse of it, there is a great reduction of the
coding done manually.
5. Because of the prototyping nature, there is a great possibility of producing much lower
defects.
Disadvantages:
1. It cannot be greatly utilized for all the projects of smaller size.
2. It has been observed that all the applications are not properly compatible with the model
of RAD.
3. Whenever there will be a high risk which will be technical it will not at all be suitable.
4. If all the various developers will not at all be totally committed for the proper delivery of
software, all the projects of RAD can be an entire failure.
5. Several kinds of problems are very much tough to properly be tracked because there is no
proper documentation for demonstrating what has been done actually.
6. Needs developers who will be possessing high skills.
Question 3: Discuss two advantages and two disadvantages of agile methods.
Answer:-
Agile methods are basically required whenever various kinds of alterations are
required to be properly implemented (Lang, 2017). Various kinds of full new alternations can
be properly implemented at a very much lower cost due to the frequency of the production of
the full new increments.
Advantages:
3. It is very much easier to properly transfer all the various deliverables as specific scripts as
well as various abstractions of high level.
4. Because of the generators of code and the reuse of it, there is a great reduction of the
coding done manually.
5. Because of the prototyping nature, there is a great possibility of producing much lower
defects.
Disadvantages:
1. It cannot be greatly utilized for all the projects of smaller size.
2. It has been observed that all the applications are not properly compatible with the model
of RAD.
3. Whenever there will be a high risk which will be technical it will not at all be suitable.
4. If all the various developers will not at all be totally committed for the proper delivery of
software, all the projects of RAD can be an entire failure.
5. Several kinds of problems are very much tough to properly be tracked because there is no
proper documentation for demonstrating what has been done actually.
6. Needs developers who will be possessing high skills.
Question 3: Discuss two advantages and two disadvantages of agile methods.
Answer:-
Agile methods are basically required whenever various kinds of alterations are
required to be properly implemented (Lang, 2017). Various kinds of full new alternations can
be properly implemented at a very much lower cost due to the frequency of the production of
the full new increments.
Advantages:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4Information Technology fundamentals
1. High satisfaction of the customers through rapid as well as continuous delivery of the
software which will be very much useful.
2. All the various people as well as interactions are hugely emphasized rather than all the
various procedures as well as tools (Taibi et al., 2017). There is a constant interaction in
between all the various consumers, developers as well as the testers.
Disadvantages:
1. In certain kinds of cases where there are very large deliverables of software, it is really
very much tough to gain access of the specific effort which is needed during the starting
of the life cycle of the development of software.
2. There is a huge lack of the emphasis on the important documentation as well as the part
of designing.
Question 4: What is scope creep in software development? Explain three way to deal
with scope creep.
Answer:-
In the field of project development scope creep is nothing but a factor which due to
which a significant growth of the project scope is being noticed. Followed by this aspect it
has been noticed that scope creep present in the software development indicates several
changes that holds a huge impact on the future scope of the approached project at the middle
of the project development plan. In case of less effective project development plan, schedule
as well as inefficient project scope definition the possibilities of scope creep increases.
Considering these aspects several significant factors has been identified, who has the ability
to invoke project scope creep which includes the factors of less effective project development
plan, lack of concentration of project sponsor, very poor communication between the
stakeholders, less effective change control (Agyekum-Mensah & Knight 2017). Along with
1. High satisfaction of the customers through rapid as well as continuous delivery of the
software which will be very much useful.
2. All the various people as well as interactions are hugely emphasized rather than all the
various procedures as well as tools (Taibi et al., 2017). There is a constant interaction in
between all the various consumers, developers as well as the testers.
Disadvantages:
1. In certain kinds of cases where there are very large deliverables of software, it is really
very much tough to gain access of the specific effort which is needed during the starting
of the life cycle of the development of software.
2. There is a huge lack of the emphasis on the important documentation as well as the part
of designing.
Question 4: What is scope creep in software development? Explain three way to deal
with scope creep.
Answer:-
In the field of project development scope creep is nothing but a factor which due to
which a significant growth of the project scope is being noticed. Followed by this aspect it
has been noticed that scope creep present in the software development indicates several
changes that holds a huge impact on the future scope of the approached project at the middle
of the project development plan. In case of less effective project development plan, schedule
as well as inefficient project scope definition the possibilities of scope creep increases.
Considering these aspects several significant factors has been identified, who has the ability
to invoke project scope creep which includes the factors of less effective project development
plan, lack of concentration of project sponsor, very poor communication between the
stakeholders, less effective change control (Agyekum-Mensah & Knight 2017). Along with
5Information Technology fundamentals
these it is also essential to define the project objectives as it also holds a significant impact on
reducing the project scope creep. The above mentioned aspects are mostly noticed in
megaproject as in the small projects there is less change to occur the above mentioned
factors. Followed by the investigation of the impact of above mentioned aspects it has been
noticed that, these influencing factors impacts the success of the project which increases the
possibilities of project failure (Barbarić Pardanjac et al., 2018).
After the above discussion it has been noticed that however, the project scope creep
holds significant impact on the project success, there are several mitigation techniques also
present which will reduce the possibilities of scope creep that are listed below:
Development of specific project schedule- will help the project development team to
proceed further as it will help to determine the approximate time, requirements as well
as in this it must include the stakeholder’s engagement. Followed by determining the
project schedule there should be no change in this, in future which will help to avoid
project scope creep (Farok & Garcia 2016).
Identification of stakeholder- is also one of the most effective scope creep
mitigation approach that helps to determine the stakeholders present in the nominated
project as well as it also helps to identify the objective of each stakeholder which will
help to determine the overall project scope. Hence, it can be stated that it will surely
impact on the elimination process of project scope creep (Janssen et al., 2015).
Team engagement- is also one of the most effective project scope creep mitigation
techniques. In which it offers the project to assign and get engaged with the team
members according to the blue print plan prepared before. Thus, after this step it can
be stated that it will surely reduce the possibilities of project scope creep (Madhuri et
al., 2016).
these it is also essential to define the project objectives as it also holds a significant impact on
reducing the project scope creep. The above mentioned aspects are mostly noticed in
megaproject as in the small projects there is less change to occur the above mentioned
factors. Followed by the investigation of the impact of above mentioned aspects it has been
noticed that, these influencing factors impacts the success of the project which increases the
possibilities of project failure (Barbarić Pardanjac et al., 2018).
After the above discussion it has been noticed that however, the project scope creep
holds significant impact on the project success, there are several mitigation techniques also
present which will reduce the possibilities of scope creep that are listed below:
Development of specific project schedule- will help the project development team to
proceed further as it will help to determine the approximate time, requirements as well
as in this it must include the stakeholder’s engagement. Followed by determining the
project schedule there should be no change in this, in future which will help to avoid
project scope creep (Farok & Garcia 2016).
Identification of stakeholder- is also one of the most effective scope creep
mitigation approach that helps to determine the stakeholders present in the nominated
project as well as it also helps to identify the objective of each stakeholder which will
help to determine the overall project scope. Hence, it can be stated that it will surely
impact on the elimination process of project scope creep (Janssen et al., 2015).
Team engagement- is also one of the most effective project scope creep mitigation
techniques. In which it offers the project to assign and get engaged with the team
members according to the blue print plan prepared before. Thus, after this step it can
be stated that it will surely reduce the possibilities of project scope creep (Madhuri et
al., 2016).
6Information Technology fundamentals
Question 5: Fact finding methods to gather data for developing Real Time Glucose
Monitoring system.
Answer:-
After investigating the purpose of the approached application which is based on the
functionalities of monitoring glucose factor in human body by a wrist band. Followed by this
concern it has been noticed that the approached system will be very useful for the
determining the glucose present in human body for diabetics patients, doctors, sports man as
well as for the gym trainers as well. Followed by this aspect it has been noticed that in order
to develop the approached system there is a huge necessity to gather required information
which will indicate its necessity as well as the accuracy of the system. Considering this aspect
it has been noticed that three methods will be very useful to gather the fact findings methods
which includes the online survey method, semi-structure as well as structured interview to
gather the information along with this group discussion will be also very useful to gather the
information required for the development of the approached system (Sindi 2018).
Online Survey- is one of the most effective data collection methods followed by
which it will help to gather the useful information from the people related to the
invention of eth approached system. Along with it the survey will consist the
questionnaires which will analyze the interest of individual towards it from which the
necessity of this invention will be determined.
Interview- Structural as well as semi-structural interviews are also very useful to
gather information related to the innovation of the approached system.
Group Discussion- Followed by the above mentioned data collection methods it has
been also noticed that with the purpose to develop such system in the field of medical
science it is very essential to discuss about it thoroughly. Hence, conduction of group
Question 5: Fact finding methods to gather data for developing Real Time Glucose
Monitoring system.
Answer:-
After investigating the purpose of the approached application which is based on the
functionalities of monitoring glucose factor in human body by a wrist band. Followed by this
concern it has been noticed that the approached system will be very useful for the
determining the glucose present in human body for diabetics patients, doctors, sports man as
well as for the gym trainers as well. Followed by this aspect it has been noticed that in order
to develop the approached system there is a huge necessity to gather required information
which will indicate its necessity as well as the accuracy of the system. Considering this aspect
it has been noticed that three methods will be very useful to gather the fact findings methods
which includes the online survey method, semi-structure as well as structured interview to
gather the information along with this group discussion will be also very useful to gather the
information required for the development of the approached system (Sindi 2018).
Online Survey- is one of the most effective data collection methods followed by
which it will help to gather the useful information from the people related to the
invention of eth approached system. Along with it the survey will consist the
questionnaires which will analyze the interest of individual towards it from which the
necessity of this invention will be determined.
Interview- Structural as well as semi-structural interviews are also very useful to
gather information related to the innovation of the approached system.
Group Discussion- Followed by the above mentioned data collection methods it has
been also noticed that with the purpose to develop such system in the field of medical
science it is very essential to discuss about it thoroughly. Hence, conduction of group
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7Information Technology fundamentals
discussion among the medical students as well as among the other stakeholders will
help to gather required information that will enhance the development procedure of
the approached system.
discussion among the medical students as well as among the other stakeholders will
help to gather required information that will enhance the development procedure of
the approached system.
8Information Technology fundamentals
Reference:
Agyekum-Mensah, G., & Knight, A. D. (2017). The professionals’ perspective on the causes
of project delay in the construction industry. Engineering, Construction and
Architectural Management, 24(5), 828-841.
Barbarić Pardanjac, M., Karuović, D., & Eleven, E. (2018). The interactive whiteboard and
educational software as an addition to the teaching process. Tehnički vjesnik, 25(1),
255-262.
Farok, G., & Garcia, J. (2016). Scope creep monitors level of satisfaction, cost of business
and slippery slope relationships among stakeholders, project manager, sponsor and
PMO to execute project completion report. Journal of International Association of
Advanced Technology and Science (JIAATS), 2(2), 15-23.
Janssen, M., Van Der Voort, H., & van Veenstra, A. F. (2015). Failure of large
transformation projects from the viewpoint of complex adaptive systems:
Management principles for dealing with project dynamics. Information Systems
Frontiers, 17(1), 15-29.
Kolahi, S. S., Alghalbi, A. A., Alotaibi, A. F., Ahmed, S. S., & Lad, D. (2014, October).
Performance comparison of defense mechanisms against TCP SYN flood DDoS
attack. In 2014 6th International Congress on Ultra Modern Telecommunications and
Control Systems and Workshops (ICUMT) (pp. 143-147). IEEE.
Lang, G. (2017). Agile learning: Sprinting through the semester. Information Systems
Education Journal, 15(3), 14.
Reference:
Agyekum-Mensah, G., & Knight, A. D. (2017). The professionals’ perspective on the causes
of project delay in the construction industry. Engineering, Construction and
Architectural Management, 24(5), 828-841.
Barbarić Pardanjac, M., Karuović, D., & Eleven, E. (2018). The interactive whiteboard and
educational software as an addition to the teaching process. Tehnički vjesnik, 25(1),
255-262.
Farok, G., & Garcia, J. (2016). Scope creep monitors level of satisfaction, cost of business
and slippery slope relationships among stakeholders, project manager, sponsor and
PMO to execute project completion report. Journal of International Association of
Advanced Technology and Science (JIAATS), 2(2), 15-23.
Janssen, M., Van Der Voort, H., & van Veenstra, A. F. (2015). Failure of large
transformation projects from the viewpoint of complex adaptive systems:
Management principles for dealing with project dynamics. Information Systems
Frontiers, 17(1), 15-29.
Kolahi, S. S., Alghalbi, A. A., Alotaibi, A. F., Ahmed, S. S., & Lad, D. (2014, October).
Performance comparison of defense mechanisms against TCP SYN flood DDoS
attack. In 2014 6th International Congress on Ultra Modern Telecommunications and
Control Systems and Workshops (ICUMT) (pp. 143-147). IEEE.
Lang, G. (2017). Agile learning: Sprinting through the semester. Information Systems
Education Journal, 15(3), 14.
9Information Technology fundamentals
Madhuri, K. L., Rao, J. J., & Murthy, S. V. (2016). Scope creep: implications on customer
satisfaction index in software industry. International Journal of Productivity and
Quality Management, 19(1), 21-37.
Nakhila, O., Dondyk, E., Amjad, M. F., & Zou, C. (2015, January). User-side wi-fi evil twin
attack detection using ssl/tcp protocols. In 2015 12th Annual IEEE Consumer
Communications and Networking Conference (CCNC) (pp. 239-244). IEEE.
Namazi‐Rad, M. R., & Steel, D. (2015). What level of statistical model should we use in
small area estimation?. Australian & New Zealand Journal of Statistics, 57(2), 275-
298.
Nordstrom, G. (2015). Practitioner inquiry: Articulating a model for RAD research in the
writing center. The Writing Center Journal, 87-116.
Sindi, M. (2018). Scope Creep in Construction Industry of Saudi Arabia. Science, 3(2), 277-
281.
Taibi, D., Lenarduzzi, V., Pahl, C., & Janes, A. (2017, May). Microservices in agile software
development: a workshop-based study into issues, advantages, and disadvantages.
In Proceedings of the XP2017 Scientific Workshops (p. 23). ACM.
Madhuri, K. L., Rao, J. J., & Murthy, S. V. (2016). Scope creep: implications on customer
satisfaction index in software industry. International Journal of Productivity and
Quality Management, 19(1), 21-37.
Nakhila, O., Dondyk, E., Amjad, M. F., & Zou, C. (2015, January). User-side wi-fi evil twin
attack detection using ssl/tcp protocols. In 2015 12th Annual IEEE Consumer
Communications and Networking Conference (CCNC) (pp. 239-244). IEEE.
Namazi‐Rad, M. R., & Steel, D. (2015). What level of statistical model should we use in
small area estimation?. Australian & New Zealand Journal of Statistics, 57(2), 275-
298.
Nordstrom, G. (2015). Practitioner inquiry: Articulating a model for RAD research in the
writing center. The Writing Center Journal, 87-116.
Sindi, M. (2018). Scope Creep in Construction Industry of Saudi Arabia. Science, 3(2), 277-
281.
Taibi, D., Lenarduzzi, V., Pahl, C., & Janes, A. (2017, May). Microservices in agile software
development: a workshop-based study into issues, advantages, and disadvantages.
In Proceedings of the XP2017 Scientific Workshops (p. 23). ACM.
1 out of 10
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.