logo

Sample Assignment on Electronic PDF

   

Added on  2021-06-18

9 Pages3696 Words108 Views
COIT 20246 ASSIGNMENT SUBMISSIONDue date:Thursday Week 11 (2PM AEST)Part:Written AssessmentWeighting:30% of total assessment. Submission:Electronic (see course website for details)InstructionsIt will be necessary to use literature/online resources to complete this assignment, please ensure you cite and reference any such materials using the Harvard format. DO NOT copy content directly from either the text or Internet resources: this assignment is to be in your own words. You will lose marks if you do not use your own words!Please complete your assignment using this submission template file, inserting your responses where indicated.DO NOT delete the marking criteria page – changes are permitted to the formatting of other pages including the headers and footers.Please fill in the following details:Student NameStudent NumberTutor’s Name
Sample Assignment on Electronic PDF_1
TasksThere are ten (10) tasks, one for each week: the tasks are detailed below. There is atable to complete for each task. Please fill in the information required. Note: Each resource summary should be around 200-300 words.Week 1The text discusses how modern CPUs function. Recently a critical flaw in microprocessor design has been discovered that allows two extremely serious security exploits: Spectre and Meltdown. Find and summarise ONE resource that describes how either of these exploits work. The resource (and your summary) should focus on what is occurring in the CPU that allows these exploits to occur.Title: Meltdown attackReference: Meltdownattack.com. (2018). Meltdown and Spectre. [online] Available at: https://meltdownattack.com/ [Accessed 21 May 2018].Summary: The main reason for the selection of the article is that the concept of meltdown isdescribed in a very precise manner. The attack majorly breaks the isolation which is related tothe operating system and the user application. This attack mainly allows a program to accessthe memory and thus allow the access of other program and the operating system. If thecomputer has a processor which is vulnerable and runs on the operating system which isunpatched, it is not a safe option to work with critical data of the organization in these types ofsystem. This is due to the factor that the data of the organization can get leaked in theprocess and it can directly harm the normal functionality of the organization. These aspectcan be related both to the sector of personal computers as well as cloud infrastructure. Inorder to provide a mitigation there are software patches which can be implemented into thesystem which would be directly safe guarding the system from the attack which is related tothe meltdown. Most of the time it can be stated that the safeguard of the data of theorganization can be considered as one of the sector it which proper emphasis should begiven.Week 2Prior to 1985, there were very few Operating Systems (OSes) that used Graphical User Interfaces (GUIs). Find and summarise ONE resource that describes ONE of these GUI operating systems. The OS must have been release prior to 1985 so cannot be Microsoft Windows. Title: GUI Operating systemReference: Templates, B. (2018). List of GUI-Based Operating System and Its History. [online] E-techinnews.blogspot.in. Available at: http://e-techinnews.blogspot.in/2012/06/list-of-gui-based-operating-system-and.html [Accessed 21 May 2018].<Provide the Title of the resource and full Harvard reference here. This should include the URL of the resource>Summary:The concept which directly allow the user to interact with hardware of the computer in amanner which is friendly can be termed as Graphical user interface. In recent times there aremany GUI which are created which are implemented into the operating system which cangive added advantage to the user. The Xerox 8010 star can be considered as one of the fully integrated desktop of the computerwhich directly includes the application and the GUI and is known as “The Xerox Star” whichwas latter termed as “Viewpoint” and again it was renamed as “Globalview”. The system wasdeveloped by the apple with the main motive of the intention of the processing of the
Sample Assignment on Electronic PDF_2
documents in the work station. Unfortunately it can be stated that the work station did not lastlong and directly suffered a setback when the Xerox introduced the apple Machintoshoperating system which was offered in a more affordable priceWeek 3Low-Powered Wide-Area Networks (LPWANs) are wireless communication networks that are characterised by linking devices over large distances. Devices (including simple sensors) typically can only communicate at very low bit rates, however, the communication and associated electronics consume very little power. As such, LPWAN devices can be battery powered and operate independently for many months or even years. Find and summarise ONE resource that describes ONE platform or technology that implements a LPWAN. Title: Technology that implements a LPWANReference: Bhatia, R. (2018). What is LPWAN and why is it considered critical for IoT?. [online] IoT India Magazine. Available at: https://www.iotindiamag.com/2017/03/lpwan-considered-critical-iot/ [Accessed 13 May 2018].<Provide the Title of the resource and full Harvard reference here. This should include the URL of the resource>Summary:The main justification which is related in regards to the section of the resource is that it givesa direct overview of the concept of LPWAN and puts emphasis on the aspect of how it can beimplemented in the concept of the internet of things. The main aspect which is taken intoconsideration is the advantage of the LPWAN technology. The LPWAN directly fuels up the connectivity which is related to the devices which are relatedto the internet of things. The basic advantage which is related to the concept is that it has lessbandwidth need as compared to other devices which are related to the connectivity aspect.The defining characteristics which are related to the concept of the internet of things are highspeed of the connectivity rather than the concept of being scalable, robust “low powerblanket” for the smart phone devices for example sensors and lightning. These type of settingare majorly used in the concept of the industrial setting. The concept which is related to theLPWAN technology can be directly connected to devices with the range of 15 miles and dueto this aspect it is widely used in the sector of building, utility sector, health care sector andtransportation. Week 4Voice over IP (VoIP) is a group of hardware and software technologies that allow users to communicate via voice and video over the Internet. VoIP uses a number of different softwareprotocols, depending on the application. Find and summarise ONE resource that describes ONE of these VoIP protocols.Title: VoIP Protocols Reference: Voice over Internet Protocol (VoIP) Based IP PBX System Design. (2016). International Journal of Science and Research (IJSR), 5(2), pp.1380-1385.Summary:The main reason for the selection of the article is that it gives a direct overview of the conceptwhich is related to the aspect of the VoIP. The protocol which is taken into consideration isthe H.248. The main feature which is related to the aspect of the H.248 protocol is that itdirectly provides a gateway which is between the interface of the PGW 2200 and the VXSM
Sample Assignment on Electronic PDF_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Desklib Online Library for Study Material with Solved Assignments
|8
|3538
|497

Desklib: SEO Title Suggestions
|9
|3724
|431

Literature Resources Assignment
|15
|3813
|76

COIT 20246 : Information and Communication Technology
|9
|4199
|51

Desklib SEO Suggestions
|9
|4156
|238

COIT 20246 Assignment Submission
|9
|3329
|56