COIT 20246 Assignment: MIMD, SIMD, IoT, Deadlock, IPv6, Dual Stack
VerifiedAdded on 2022/11/09
|16
|5014
|252
Homework Assignment
AI Summary
This COIT 20246 assignment comprises ten tasks, each focusing on a specific week's topic. The assignment requires students to find and summarize online resources related to various computer science concepts. Week 1 focuses on comparing MIMD and SIMD architectures, highlighting their differences in instruction and data streams and their implications for parallel processing. Week 2 addresses deadlock prevention algorithms, specifically the one-shot algorithm, explaining its mechanisms to avoid resource allocation issues. Week 3 explores the Internet of Things (IoT) applications in smart farming, detailing how IoT technologies are used to improve agricultural practices. Week 4 examines technologies for running IPv4 and IPv6 simultaneously, focusing on dual stack technology. The summaries provide detailed explanations of each resource, including their relevance, key points, and usefulness in understanding the concepts. The assignment underscores the importance of citing and referencing materials using the Harvard format and emphasizes the use of original words rather than direct copying from resources.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=965540
1
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=965540
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Example
The “Internet of things” is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Collect and summarise
an online resource that describes ONE example or application of the Internet of things.
Title, Link and Reference:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Lars, N 2014, ‘Connected Medical Devices, Apps: Are They Leading the IoT Revolution —
or Vice Versa?’, Wired, June 2014, viewed 1 February 2017,
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Note: You may use abbreviated URLs (to the website) in the reference, however you must
provide the FULL link above it that, when pasted into the Web Browser, will take the
marker directly to the resource. Using full URLs in the reference (as in this example) is fine
too.
Summary:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
This article describes the emergence of the Internet of Things (IoT) in the context of
medical devices. I chose this article because it not only examines the applications of a
very useful class of IoT devices, but it also highlights the need for ways of collecting and
processing the data they produce.
In the article, the author describes how many medical monitoring devices are now capable
of connecting to the Internet and are becoming a normal part of patient care. These
devices allow remote monitoring of patient health wirelessly and can collect data on a wide
range of vital signs and indicators. Data can be collected from a range of sensors reading
everything from heart rate and blood pressure through to blood sugar levels and
temperature.
In addition to passive monitors, IoT medical devices provide the ability to proactively
prompt patients to do things, for example to warn them of their blood pressure or to alert
them that they need more medication. The article points out that many of these
notifications are the result of apps (software) interacting with both the devices and the
patients.
Perhaps the most interesting aspect of the article is the author’s discussion of what
happens to the data that the IoT medical devices produce. The author explains that many
devices can send data directly to the cloud for storage and analysis and that this data
constitutes a wealth of information that will potentially improve healthcare in the future.
I found this article useful because it not only highlighted the increasing ubiquity of Internet-
connected medical devices, but also made me think about how the data is collected, where
it is stored and how it could be used – both positively and negatively – in the future.
2
The “Internet of things” is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Collect and summarise
an online resource that describes ONE example or application of the Internet of things.
Title, Link and Reference:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Lars, N 2014, ‘Connected Medical Devices, Apps: Are They Leading the IoT Revolution —
or Vice Versa?’, Wired, June 2014, viewed 1 February 2017,
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Note: You may use abbreviated URLs (to the website) in the reference, however you must
provide the FULL link above it that, when pasted into the Web Browser, will take the
marker directly to the resource. Using full URLs in the reference (as in this example) is fine
too.
Summary:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
This article describes the emergence of the Internet of Things (IoT) in the context of
medical devices. I chose this article because it not only examines the applications of a
very useful class of IoT devices, but it also highlights the need for ways of collecting and
processing the data they produce.
In the article, the author describes how many medical monitoring devices are now capable
of connecting to the Internet and are becoming a normal part of patient care. These
devices allow remote monitoring of patient health wirelessly and can collect data on a wide
range of vital signs and indicators. Data can be collected from a range of sensors reading
everything from heart rate and blood pressure through to blood sugar levels and
temperature.
In addition to passive monitors, IoT medical devices provide the ability to proactively
prompt patients to do things, for example to warn them of their blood pressure or to alert
them that they need more medication. The article points out that many of these
notifications are the result of apps (software) interacting with both the devices and the
patients.
Perhaps the most interesting aspect of the article is the author’s discussion of what
happens to the data that the IoT medical devices produce. The author explains that many
devices can send data directly to the cloud for storage and analysis and that this data
constitutes a wealth of information that will potentially improve healthcare in the future.
I found this article useful because it not only highlighted the increasing ubiquity of Internet-
connected medical devices, but also made me think about how the data is collected, where
it is stored and how it could be used – both positively and negatively – in the future.
2

Week 1
The text discusses different architectures for parallel processing used for
Multiprocessor Machines such as multiple-instruction stream - multiple-data stream
(MIMD), single-instruction stream - multiple-data stream (SIMD) etc. Find and
summarise ONE resource that compares between MIMD and SIMD architectures.
The resource and your summary must focus only on MIMD and SIMD architectures.
Title, Link and Reference:
SIMD and MIMD
techdifferences.com. (2019) Difference between SIMD and MIMD [ONLINE]
Available from https://techdifferences.com/difference-between-simd-and-mimd.html
[Accessed 16/09/2019].
Summary:
This resource states various areas amid MIMD and SIMD architectures and I
prefer this resource as it explicitly defines both MIMD and SIMD in details with
its associated aspects i.e. instruction and data stream.
The author has described SIMD (Single Instruction stream, Multiple Data
stream) as an arrangement of parallel architecture where a single instruction
is executed to a cluster of the data stream. On the contradictory side, MIMD
(Multiple Instruction Multiple Data Stream) comprises of systems having
various processing units and data streams. There is more efficiency in MIMD
as compare to SIMD, however, is considered as one of the most complex
configurations.
MIMD and SIMD can be differentiated in terms of mechanism and processing
as there is a synchronous mechanism in SIMD, whereas, in MIMD, there is
asynchronous processing in relation with numerous communication driver.
There is also requirement of less memory in case of SIMD as only one copy
of program is kept. However, MIMD requires more amount of memory and so
also costlier than SIMD due to decryption of each memory element. Ultimately
in overlapping of uniform control unit, SIMD provider’s higher performance but
MIMD performs greater in non-uniform CU overlap. Therefore, both have
processing used for Multiprocessor Machines equal importance in their respective
area processing used for Multiprocessor Machines in different architectures.
I can effectively say that this article is valuable as it clearly states about MIMD
and SIMD with providing a clear glimpse to choose which architecture is
better in which area. It also highlights some major similarities and
3
The text discusses different architectures for parallel processing used for
Multiprocessor Machines such as multiple-instruction stream - multiple-data stream
(MIMD), single-instruction stream - multiple-data stream (SIMD) etc. Find and
summarise ONE resource that compares between MIMD and SIMD architectures.
The resource and your summary must focus only on MIMD and SIMD architectures.
Title, Link and Reference:
SIMD and MIMD
techdifferences.com. (2019) Difference between SIMD and MIMD [ONLINE]
Available from https://techdifferences.com/difference-between-simd-and-mimd.html
[Accessed 16/09/2019].
Summary:
This resource states various areas amid MIMD and SIMD architectures and I
prefer this resource as it explicitly defines both MIMD and SIMD in details with
its associated aspects i.e. instruction and data stream.
The author has described SIMD (Single Instruction stream, Multiple Data
stream) as an arrangement of parallel architecture where a single instruction
is executed to a cluster of the data stream. On the contradictory side, MIMD
(Multiple Instruction Multiple Data Stream) comprises of systems having
various processing units and data streams. There is more efficiency in MIMD
as compare to SIMD, however, is considered as one of the most complex
configurations.
MIMD and SIMD can be differentiated in terms of mechanism and processing
as there is a synchronous mechanism in SIMD, whereas, in MIMD, there is
asynchronous processing in relation with numerous communication driver.
There is also requirement of less memory in case of SIMD as only one copy
of program is kept. However, MIMD requires more amount of memory and so
also costlier than SIMD due to decryption of each memory element. Ultimately
in overlapping of uniform control unit, SIMD provider’s higher performance but
MIMD performs greater in non-uniform CU overlap. Therefore, both have
processing used for Multiprocessor Machines equal importance in their respective
area processing used for Multiprocessor Machines in different architectures.
I can effectively say that this article is valuable as it clearly states about MIMD
and SIMD with providing a clear glimpse to choose which architecture is
better in which area. It also highlights some major similarities and
3

dissimilarities.
Week 2
The text discusses about one of the common problems that can arise during
resource allocation in operating systems, which is known as deadlock. Find and
summarise ONE resource that describes an algorithm of either deadlock avoidance
or deadlock prevention. The resource, and your summary must focus on a single
algorithm of either deadlock avoidance or deadlock prevention, NOT both.
Title, Link and Reference:
Deadlock Prevention Algorithms
cs.uregina.ca. (2018) One-shot Algorithm [ONLINE] Available from:
http://www2.cs.uregina.ca/~hamilton/courses/330/notes/synchro/deadlock-
ex.html [Accessed 31/08/2019].
Summary:
This resource states various sorts of algorithms in deadlock prevention and I
prefer this resource as the algorithms are stated in series of steps making any
user easier to understand.
One-shot Algorithms with example –
if process P has ever acquired any resources before, then
refuse the request
else if any resource R1, ... Rn does not exist then
refuse the request
else
{
if any resource R1, ... Rn is not free, then
wait until all resources R1, ... Rn are free
end if
grant process P exclusive access to resources R1, ... Rn
}
end if
For example,
4
Week 2
The text discusses about one of the common problems that can arise during
resource allocation in operating systems, which is known as deadlock. Find and
summarise ONE resource that describes an algorithm of either deadlock avoidance
or deadlock prevention. The resource, and your summary must focus on a single
algorithm of either deadlock avoidance or deadlock prevention, NOT both.
Title, Link and Reference:
Deadlock Prevention Algorithms
cs.uregina.ca. (2018) One-shot Algorithm [ONLINE] Available from:
http://www2.cs.uregina.ca/~hamilton/courses/330/notes/synchro/deadlock-
ex.html [Accessed 31/08/2019].
Summary:
This resource states various sorts of algorithms in deadlock prevention and I
prefer this resource as the algorithms are stated in series of steps making any
user easier to understand.
One-shot Algorithms with example –
if process P has ever acquired any resources before, then
refuse the request
else if any resource R1, ... Rn does not exist then
refuse the request
else
{
if any resource R1, ... Rn is not free, then
wait until all resources R1, ... Rn are free
end if
grant process P exclusive access to resources R1, ... Rn
}
end if
For example,
4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Think an individual requires board and marker to write.
Person P1 needs board and marker and person P2 also needs board
and marker.
Board and marker are requested by person P1 and person P2 also
requests market and board.
From one of P1 and P2, only one will be granted the resources.
Suppose it is P1. Hence, it is mandatory for P2 to wait.
Board and marker will be used by person P1 until ended.
Now, board and marker will be released by person P1.
Because the resources that P2 was waiting for are free, P2 is approved
both the board and marker.
Person P2 uses the board and market until end.
The board and marker will be released by Person P1.
P2 will be allowed to use both marker and board as the resources that
P2 waiting for are free.
Until end, the board and marker will be used by person P2.
At last, Board and markers will be released by person Ps.
This article is beneficial it clearly states the deadlock prevention algorithms
with explaining an effective example.
5
Person P1 needs board and marker and person P2 also needs board
and marker.
Board and marker are requested by person P1 and person P2 also
requests market and board.
From one of P1 and P2, only one will be granted the resources.
Suppose it is P1. Hence, it is mandatory for P2 to wait.
Board and marker will be used by person P1 until ended.
Now, board and marker will be released by person P1.
Because the resources that P2 was waiting for are free, P2 is approved
both the board and marker.
Person P2 uses the board and market until end.
The board and marker will be released by Person P1.
P2 will be allowed to use both marker and board as the resources that
P2 waiting for are free.
Until end, the board and marker will be used by person P2.
At last, Board and markers will be released by person Ps.
This article is beneficial it clearly states the deadlock prevention algorithms
with explaining an effective example.
5

Week 3
Internet of things (IoT) is an emerging trend towards smart interconnected
embedded technologies that allow us to monitor and control our environment. Find
and summarise ONE resource that describes applications of the Internet of things
in the field of Smart Farming. The resource and your summary must focus on
application of IoT ONLY in the field of smart farming.
Title, Link and Reference:
Internet of things in the field of Smart agriculture
Gorli, R. and G, Y. (2017). Future of Smart Farming with Internet of Things. Journal of
Information technology and Its Applications. 2(1). pp.27-38.
(https://www.researchgate.net/publication/323244229_Future_of_Smart_Farming_with_Int
ernet_of_Things )
Summary:
This resource offers clear meaning of IoT and its various uses in agriculture
area. I prefer this resource as it accurately defines many IoT applications
relying on farming and its impact in future.
The resource defines that IoT has the capability to influence the industries
doing technological advancements, urban and rural areas and the world
where we consumer various things in the marketplace. From future
perspectives, there will be noteworthy rise in the farming practices to satisfy
the needs of world population. Considering statistical reports, the population
of the world by 2030 will be increased by 7.3 billion.
Adopting IoT based farming can help in various situation such as
environmental issues, as it can create smart farming concept linked to IoT
benefit in reducing waste and increasing productivity. Smart farming can be
defined as adopting of IT technology in the agriculture such as sensors that
help in observing crops in the area from perspective of light and humidity,
soil moisture and so forth. Some of the significant use in IoT farming
includes smart greenhouse, drones, watching of livestock and precise
farming. For example, many types of fertilizers can be spread by drones
during the agriculture practice and it can also be used for various types of
security purposes. Executing various application in association with IoT in
greenhouse can be said as more effective than conventional means as it
consistently evaluation the condition of all the parameters requirements for
6
Internet of things (IoT) is an emerging trend towards smart interconnected
embedded technologies that allow us to monitor and control our environment. Find
and summarise ONE resource that describes applications of the Internet of things
in the field of Smart Farming. The resource and your summary must focus on
application of IoT ONLY in the field of smart farming.
Title, Link and Reference:
Internet of things in the field of Smart agriculture
Gorli, R. and G, Y. (2017). Future of Smart Farming with Internet of Things. Journal of
Information technology and Its Applications. 2(1). pp.27-38.
(https://www.researchgate.net/publication/323244229_Future_of_Smart_Farming_with_Int
ernet_of_Things )
Summary:
This resource offers clear meaning of IoT and its various uses in agriculture
area. I prefer this resource as it accurately defines many IoT applications
relying on farming and its impact in future.
The resource defines that IoT has the capability to influence the industries
doing technological advancements, urban and rural areas and the world
where we consumer various things in the marketplace. From future
perspectives, there will be noteworthy rise in the farming practices to satisfy
the needs of world population. Considering statistical reports, the population
of the world by 2030 will be increased by 7.3 billion.
Adopting IoT based farming can help in various situation such as
environmental issues, as it can create smart farming concept linked to IoT
benefit in reducing waste and increasing productivity. Smart farming can be
defined as adopting of IT technology in the agriculture such as sensors that
help in observing crops in the area from perspective of light and humidity,
soil moisture and so forth. Some of the significant use in IoT farming
includes smart greenhouse, drones, watching of livestock and precise
farming. For example, many types of fertilizers can be spread by drones
during the agriculture practice and it can also be used for various types of
security purposes. Executing various application in association with IoT in
greenhouse can be said as more effective than conventional means as it
consistently evaluation the condition of all the parameters requirements for
6

the corps production.
The resource was found to be beneficial as it explicitly defines about many
IoT applications that can be exploited in future to save environment and
farming.
Week 4
The text discusses about IPv4, however, IPv6 is the emerging protocol which is in
the process of superseding IPv4. Find and summarise ONE resource that
describes about the technologies that are used to run both protocols
simultaneously over the same internet infrastructure.
Title, Link and Reference:
Dual Stack to run on both IPv6 and IPv4
Jain, V., Tiwari, D., Singh, S. and Sharma, S. (2018) Impact of IPv4, IPv6 and Dual Stack
Interface over Wireless Networks. International Journal of Computer Network and
Information Security, 10(4), p.65.
(https://www.researchgate.net/publication/324477841_Impact_of_IPv4_IPv6_and_Dual_St
ack_Interface_over_Wireless_Networks)
Summary:
This resource states about the technology that can run both protocols
simultaneously and the name of this technology is dual stack. I prefer this
article as it starts with explaining about dual stack technology from various
perspectives and undertake many diagrams for effective gaining information
about the technology and its association with IPv6 and IPv4.
Over time, implementation of IPv6 protocol has been significantly increased
and the old protocol i.e. IPv4 applications use is decreasing considering
front end and back end network in relation with front and back end
applications.
Considering background, IPv6 deployments increase over time, the natural
next step will be decreasing the role of IPv4 and back ends networks of
management and front end applications.
Dual stack technology enables a device interface to operate both IPv4 and
IPv6 protocols so it can communicate with both types of networks. Along
with the infrastructure, both of protocol is totally executed and every aspect
of it needs to comprise both IPv6 and IPv4. With regards to this, systems,
7
The resource was found to be beneficial as it explicitly defines about many
IoT applications that can be exploited in future to save environment and
farming.
Week 4
The text discusses about IPv4, however, IPv6 is the emerging protocol which is in
the process of superseding IPv4. Find and summarise ONE resource that
describes about the technologies that are used to run both protocols
simultaneously over the same internet infrastructure.
Title, Link and Reference:
Dual Stack to run on both IPv6 and IPv4
Jain, V., Tiwari, D., Singh, S. and Sharma, S. (2018) Impact of IPv4, IPv6 and Dual Stack
Interface over Wireless Networks. International Journal of Computer Network and
Information Security, 10(4), p.65.
(https://www.researchgate.net/publication/324477841_Impact_of_IPv4_IPv6_and_Dual_St
ack_Interface_over_Wireless_Networks)
Summary:
This resource states about the technology that can run both protocols
simultaneously and the name of this technology is dual stack. I prefer this
article as it starts with explaining about dual stack technology from various
perspectives and undertake many diagrams for effective gaining information
about the technology and its association with IPv6 and IPv4.
Over time, implementation of IPv6 protocol has been significantly increased
and the old protocol i.e. IPv4 applications use is decreasing considering
front end and back end network in relation with front and back end
applications.
Considering background, IPv6 deployments increase over time, the natural
next step will be decreasing the role of IPv4 and back ends networks of
management and front end applications.
Dual stack technology enables a device interface to operate both IPv4 and
IPv6 protocols so it can communicate with both types of networks. Along
with the infrastructure, both of protocol is totally executed and every aspect
of it needs to comprise both IPv6 and IPv4. With regards to this, systems,
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

switchers, routers and other devices drive Ip4 and Ip6 in Dual-IP stacks with
gaining effective assistance from various significant vendors of networks
and operating systems. Dual Stack can be proved to be an ultimate
resolution however there are two execution barriers faced by companies
and ISPs. For instance, there are various challenges associated to software
and hardware updates in the existing infrastructure network that has the
power to deploy Ipv6. In addition, there is also requires activation of IPv6 on
various network elements and to meet the needs, the existing network must
be reformed.
This resource can be accommodating as it gets me aware about various
related concepts of dual stack technology and with connection to the two
mentioned protocols.
Week 5
Network security has become a major concern of the ICT world, and user
authentication is one of the popular tools to assure network security. Find and
summarise ONE resource that describes any ONE authentication mechanism
except password. The resource and your summary should focus purely on ONLY
ONE type of authentication mechanism.
Title, Link and Reference:
Authentication Mechanism
Saevanee, H., Clarke, N., Furnell, S. and Biscione, V. (2015) Continuous user
authentication using multi-modal biometrics. Computers & Security, 53(1), pp.234-246.
(https://pearl.plymouth.ac.uk/bitstream/handle/10026.1/3033/2014Saevanee10263960PhD.
pdf?sequence=1)
Summary:
This resource states about one of the standardised authentication
mechanism known as biometric authentication and I prefer this resource as
it clearly defines various types of biometric authentication and their
applications.
Biometric authentication mechanism system includes various means to
assure network security such as fingerprint scan, face scan, retina scan and
voice recognition. Its uses and accessibility can be measured by various
smartphone companies’ practices as they are using this security
mechanism with hardware support in the smartphones. Not only this, it is
8
gaining effective assistance from various significant vendors of networks
and operating systems. Dual Stack can be proved to be an ultimate
resolution however there are two execution barriers faced by companies
and ISPs. For instance, there are various challenges associated to software
and hardware updates in the existing infrastructure network that has the
power to deploy Ipv6. In addition, there is also requires activation of IPv6 on
various network elements and to meet the needs, the existing network must
be reformed.
This resource can be accommodating as it gets me aware about various
related concepts of dual stack technology and with connection to the two
mentioned protocols.
Week 5
Network security has become a major concern of the ICT world, and user
authentication is one of the popular tools to assure network security. Find and
summarise ONE resource that describes any ONE authentication mechanism
except password. The resource and your summary should focus purely on ONLY
ONE type of authentication mechanism.
Title, Link and Reference:
Authentication Mechanism
Saevanee, H., Clarke, N., Furnell, S. and Biscione, V. (2015) Continuous user
authentication using multi-modal biometrics. Computers & Security, 53(1), pp.234-246.
(https://pearl.plymouth.ac.uk/bitstream/handle/10026.1/3033/2014Saevanee10263960PhD.
pdf?sequence=1)
Summary:
This resource states about one of the standardised authentication
mechanism known as biometric authentication and I prefer this resource as
it clearly defines various types of biometric authentication and their
applications.
Biometric authentication mechanism system includes various means to
assure network security such as fingerprint scan, face scan, retina scan and
voice recognition. Its uses and accessibility can be measured by various
smartphone companies’ practices as they are using this security
mechanism with hardware support in the smartphones. Not only this, it is
8

also used by various other industries too in relation to secure their product
as per consumer convienience.
Through a secured cryptographic protocol, individual local authentication to
the device can be communicated to a server within standard architecture. It
shows that the days of username and password combinations are coming to
an end due to this next-generation authentication mechanism.
Biometric authentication has been extensively viewed as the most foolproof
or at least the hardest to spoof authentication mechanism relying on several
physical characteristics of the user. Some of the major types of biometrics
include signature dynamics, typing patterns, eye scans, fingerprint
recognition, facial and voice recognition. However, due to the ease of use
and convenience, fingerprint authentication is becoming technology of
greatest choice. For instance, many numbers of computer peripherals and
notebook PCs are coming with built-in fingerprint options allowing user to
retain encrypted passwords as their unique fingerprint style with offering two
factor authentication.
This resource can be accommodating as it gets me aware about different
types of biometric authentication mechanism and its importance in
comparison with conventional authentication mechanism systems.
9
as per consumer convienience.
Through a secured cryptographic protocol, individual local authentication to
the device can be communicated to a server within standard architecture. It
shows that the days of username and password combinations are coming to
an end due to this next-generation authentication mechanism.
Biometric authentication has been extensively viewed as the most foolproof
or at least the hardest to spoof authentication mechanism relying on several
physical characteristics of the user. Some of the major types of biometrics
include signature dynamics, typing patterns, eye scans, fingerprint
recognition, facial and voice recognition. However, due to the ease of use
and convenience, fingerprint authentication is becoming technology of
greatest choice. For instance, many numbers of computer peripherals and
notebook PCs are coming with built-in fingerprint options allowing user to
retain encrypted passwords as their unique fingerprint style with offering two
factor authentication.
This resource can be accommodating as it gets me aware about different
types of biometric authentication mechanism and its importance in
comparison with conventional authentication mechanism systems.
9

Week 6
The text discusses about a massive data breach that happened in Target company,
which is referred as ‘Target Breach’. Find and summarise ONE resource that
describes another recent (within last 5 years) well-publicised attack or security
breach on a public company or government organisation. The resource, and your
summary should describe A SINGLE EXAMPLE of security breach.
Title, Link and Reference:
National Australia Bank Security Breach
Anantharaman, M. (2019) Australia's NAB says 13,000 customers' personal data breached
[ONLINE] Available from https://www.reuters.com/article/us-nab-cyber/australias-nab-says-
13000-customers-personal-data-breached-idUSKCN1UL16P [Accessed 16/09/2019].
Summary:
This online resource states of data breach at Australia fourth largest financial
institution i.e. National Australia Bank and I prefer this resource as it is
happening just 3 months back and the issue was a human error.
In July (2019), National Australia Bank publicly states the data breach with
contacting 13,000 customers who were being impacted including with their
personal information provided into their account was set up uploaded without
authorisation, to the servers of two data service organisations.
The Chief Data Officer at National Australia Bank has stated that the issue
was human error and in breach of NAB data security policies. He also stated
that the information that was uploaded includes names of the customers, their
contact information, DOB and in some scenarios, it also included the
government identity number.
However, the data service organisations informed the institution that the
information they received was deleted within two hours.
All the 13, 000 users whose information was uploaded were calling, emailing
and writing by NAB individually with a special support team in place available
to them 24/7. The institution was also found to conceal the cost of
independent, improved fraud detection identification services for affected
users. In addition, there were also no casualty or sign that the information has
been further disclosed or copied.
10
The text discusses about a massive data breach that happened in Target company,
which is referred as ‘Target Breach’. Find and summarise ONE resource that
describes another recent (within last 5 years) well-publicised attack or security
breach on a public company or government organisation. The resource, and your
summary should describe A SINGLE EXAMPLE of security breach.
Title, Link and Reference:
National Australia Bank Security Breach
Anantharaman, M. (2019) Australia's NAB says 13,000 customers' personal data breached
[ONLINE] Available from https://www.reuters.com/article/us-nab-cyber/australias-nab-says-
13000-customers-personal-data-breached-idUSKCN1UL16P [Accessed 16/09/2019].
Summary:
This online resource states of data breach at Australia fourth largest financial
institution i.e. National Australia Bank and I prefer this resource as it is
happening just 3 months back and the issue was a human error.
In July (2019), National Australia Bank publicly states the data breach with
contacting 13,000 customers who were being impacted including with their
personal information provided into their account was set up uploaded without
authorisation, to the servers of two data service organisations.
The Chief Data Officer at National Australia Bank has stated that the issue
was human error and in breach of NAB data security policies. He also stated
that the information that was uploaded includes names of the customers, their
contact information, DOB and in some scenarios, it also included the
government identity number.
However, the data service organisations informed the institution that the
information they received was deleted within two hours.
All the 13, 000 users whose information was uploaded were calling, emailing
and writing by NAB individually with a special support team in place available
to them 24/7. The institution was also found to conceal the cost of
independent, improved fraud detection identification services for affected
users. In addition, there were also no casualty or sign that the information has
been further disclosed or copied.
10
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

This resource can be said to be beneficial as it can help other business firms
to look into their security protocols as being a big institution in finance
industry, the security measures and standards have been failed.
Week 7
The text briefly discusses about e-commerce and e-business. Find and summarise
ONE resource that discusses the relationship between e-commerce and e-business.
The resource, and your summary should describe similarities and difference between
e-commerce and e-business.
Title, Link and Reference:
e-commerce, e-business
Mazzarol, T., 2015. SMEs engagement with e-commerce, e-business and e-marketing. Small
enterprise research, 22(1), pp.79-90.
(https://www.researchgate.net/publication/276927460_SMEs_engagement_with_e-
commerce_e-business_and_e-marketing)
Summary:
This resource states about various relationships between e-business and e-
commerce and I prefer this article as it explicitly defined how e-commerce is
known to be e-business and what are the key variations and similarities.
To maintain online existence, both e-commerce and e-business adopt the
applications of service-oriented website. The main aim of e-commerce
webpage for any user or business firm is to make the product sell in the
marketplace however on the other side, customers get necessary information
through the e-business webpage regarding about service or product so that to
takeout a better purchase decision. This shows that only online transactions
occurred in e-commerce unlike e-business which includes extensive choice
and arrays of other activities. E-commerce and e-business both operate over
internet and where all business proprietor receives all significant benefits in
terms establishing user base and earning revenue. For instance, using e-
commerce facilities, business can sell their products globally with receiving
payments through electronic medium and deliver consumers a sense of
convenience. On the other hand, E-business has automated and streamlined
internal processes for e-commerce and thus raise levels of collaborations.
This resource can be said to be helpful as it helps to know the exact
relationship and differences of information in summarised form. For instance,
11
to look into their security protocols as being a big institution in finance
industry, the security measures and standards have been failed.
Week 7
The text briefly discusses about e-commerce and e-business. Find and summarise
ONE resource that discusses the relationship between e-commerce and e-business.
The resource, and your summary should describe similarities and difference between
e-commerce and e-business.
Title, Link and Reference:
e-commerce, e-business
Mazzarol, T., 2015. SMEs engagement with e-commerce, e-business and e-marketing. Small
enterprise research, 22(1), pp.79-90.
(https://www.researchgate.net/publication/276927460_SMEs_engagement_with_e-
commerce_e-business_and_e-marketing)
Summary:
This resource states about various relationships between e-business and e-
commerce and I prefer this article as it explicitly defined how e-commerce is
known to be e-business and what are the key variations and similarities.
To maintain online existence, both e-commerce and e-business adopt the
applications of service-oriented website. The main aim of e-commerce
webpage for any user or business firm is to make the product sell in the
marketplace however on the other side, customers get necessary information
through the e-business webpage regarding about service or product so that to
takeout a better purchase decision. This shows that only online transactions
occurred in e-commerce unlike e-business which includes extensive choice
and arrays of other activities. E-commerce and e-business both operate over
internet and where all business proprietor receives all significant benefits in
terms establishing user base and earning revenue. For instance, using e-
commerce facilities, business can sell their products globally with receiving
payments through electronic medium and deliver consumers a sense of
convenience. On the other hand, E-business has automated and streamlined
internal processes for e-commerce and thus raise levels of collaborations.
This resource can be said to be helpful as it helps to know the exact
relationship and differences of information in summarised form. For instance,
11

whenever I will go in future for online shopping, I can give name to the activity
as e-commerce and whenever I went for comparing two products or brands
(like to decide which brand laptop should be purchased), it can be called as e-
business activity.
Week 8
The text book discusses about the success story of ARI (Automotive Resources
International) company after implementing SAP BusinessObjects Explorer and
integrating it with HANA. HANA is SAP’s in-memory computing platform that is
deployable as an on-premise hardware and software appliance or in the cloud.
Find and summarise ONE resource that describes the success story of adapting
SAP HANA by another local or international company. The resource, and your
summary, should focus on the story about ONE single company (which is not ARI
company).
Title, Link and Reference:
SAP S/4HANA implementation in ENEL
sap.com. (2018) How does a global energy provider scale in the cloud to meet goals and
compliance [ONLINE] Available from https://d.dam.sap.com/m/x9k6ZDv/ENEL_%20How
%20Does%20a%20Global%20Energy%20Provider%20Scale%20in%20the%20Cloud
%20to%20Meet%20Goals%20and%20Compliance_.pdf [Accessed 17/09/2019].
Summary:
This resource defines the importance of adopting SAP S/4HANA to gain
high development. I prefer this because ENEL organisation recently
adopted this platform to meet its compliance and thus help in gaining
contemporary information in relation to this new platform.
ENEL, an international utilities giant, initiated an innovative program to
transfer its IT environment from on premise to the cloud and enable its
digital transformation. With implementing SAP S/4HANA, the company aim
to enhance its billing cycle speed with the purpose of handling more than
one million printed statements per hour and fulfil with authorities of Italian
regulatory. However, it was a challenge to implement this cloud based
solution but ENEL depends on association with SAP Digital Business
Service to manage this transition.
Some of the key benefits for the company with implementing of this platform
include – decrease billing process time by 50%, improve cash flow, increase
processing of invoice, decrease the number of exception and enhance
12
as e-commerce and whenever I went for comparing two products or brands
(like to decide which brand laptop should be purchased), it can be called as e-
business activity.
Week 8
The text book discusses about the success story of ARI (Automotive Resources
International) company after implementing SAP BusinessObjects Explorer and
integrating it with HANA. HANA is SAP’s in-memory computing platform that is
deployable as an on-premise hardware and software appliance or in the cloud.
Find and summarise ONE resource that describes the success story of adapting
SAP HANA by another local or international company. The resource, and your
summary, should focus on the story about ONE single company (which is not ARI
company).
Title, Link and Reference:
SAP S/4HANA implementation in ENEL
sap.com. (2018) How does a global energy provider scale in the cloud to meet goals and
compliance [ONLINE] Available from https://d.dam.sap.com/m/x9k6ZDv/ENEL_%20How
%20Does%20a%20Global%20Energy%20Provider%20Scale%20in%20the%20Cloud
%20to%20Meet%20Goals%20and%20Compliance_.pdf [Accessed 17/09/2019].
Summary:
This resource defines the importance of adopting SAP S/4HANA to gain
high development. I prefer this because ENEL organisation recently
adopted this platform to meet its compliance and thus help in gaining
contemporary information in relation to this new platform.
ENEL, an international utilities giant, initiated an innovative program to
transfer its IT environment from on premise to the cloud and enable its
digital transformation. With implementing SAP S/4HANA, the company aim
to enhance its billing cycle speed with the purpose of handling more than
one million printed statements per hour and fulfil with authorities of Italian
regulatory. However, it was a challenge to implement this cloud based
solution but ENEL depends on association with SAP Digital Business
Service to manage this transition.
Some of the key benefits for the company with implementing of this platform
include – decrease billing process time by 50%, improve cash flow, increase
processing of invoice, decrease the number of exception and enhance
12

accuracy for commercial and technical operations. All this allow e-
distribuzione (part of ENEL Group) to print up to 1.3 million invoices per
hour, hence, boosting cash flow and enhancing quality of data. Other than
this, adoption of SAP S/4Hana also help the organisation to synchronise the
internal process with various division of business so as to improve the
service delivery.
This resource is useful as it states that how an organisation can reap
various benefits in areas like operations and manufacturing with
implementing SAP S/4HANA. With regards to this, adoption of this platform
suite improves customer base for the comoany.
Week 9
Rapid application development (RAD) is a process of creating a workable system in a
very short period of time. There are few recently developed frameworks available in
market to undertake RAD. Find and summarise ONE recent (within last two years)
resource that describes and recommends about ONE framework for RAD.
Title, Link and Reference:
OUTSYSTEM FRAMEWORK
IDLE, J. (2018) OutSystems 11 released so what’s new? [ONLINE] Available from
https://www.greenlemoncompany.net/2018/10/25/outsystems-11-released-so-whats-new/
[Accessed 16/09/2019].
Summary:
This online resource states about OUTSYSTEM framework for RAD and I prefer
this article due to its simplicity and various applications listed there.
Rapid application development tools are a dime a dozen in the market, but the
trick is to find something that works. OutSystems 11 is here to change the
established view on developing applications and software and the apps made of
web and mobile are up to x10 faster than .NET and coding JAVA. For instance, it
will only take 6-8 weeks on completion of 1 year project. This shows that resource
savings are huge and really help company to undertake digital transformation.
Some of the major benefits of OutSystems includes faster app building, screen
templates, architectural agility at scale, improved dependency management, low
code microservices, higher productivity and team partnerships. In future, this
framework will also come up with service studio for mac as well as AI algorithms.
13
distribuzione (part of ENEL Group) to print up to 1.3 million invoices per
hour, hence, boosting cash flow and enhancing quality of data. Other than
this, adoption of SAP S/4Hana also help the organisation to synchronise the
internal process with various division of business so as to improve the
service delivery.
This resource is useful as it states that how an organisation can reap
various benefits in areas like operations and manufacturing with
implementing SAP S/4HANA. With regards to this, adoption of this platform
suite improves customer base for the comoany.
Week 9
Rapid application development (RAD) is a process of creating a workable system in a
very short period of time. There are few recently developed frameworks available in
market to undertake RAD. Find and summarise ONE recent (within last two years)
resource that describes and recommends about ONE framework for RAD.
Title, Link and Reference:
OUTSYSTEM FRAMEWORK
IDLE, J. (2018) OutSystems 11 released so what’s new? [ONLINE] Available from
https://www.greenlemoncompany.net/2018/10/25/outsystems-11-released-so-whats-new/
[Accessed 16/09/2019].
Summary:
This online resource states about OUTSYSTEM framework for RAD and I prefer
this article due to its simplicity and various applications listed there.
Rapid application development tools are a dime a dozen in the market, but the
trick is to find something that works. OutSystems 11 is here to change the
established view on developing applications and software and the apps made of
web and mobile are up to x10 faster than .NET and coding JAVA. For instance, it
will only take 6-8 weeks on completion of 1 year project. This shows that resource
savings are huge and really help company to undertake digital transformation.
Some of the major benefits of OutSystems includes faster app building, screen
templates, architectural agility at scale, improved dependency management, low
code microservices, higher productivity and team partnerships. In future, this
framework will also come up with service studio for mac as well as AI algorithms.
13
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

It was also predicted that embedding AI into Framework will help a user or
organisation to save 25 per cent more time while building or editing current
OutSystems applications. Hence, it is proved as a disruptive solution with
increase in efficiency in various areas, i.e. manufacturing, operations, supply
chain and many more.
The resource is really helpful as it helps me to gain various advantage of
OutSystems in relation to RAD framework and its uses in the organisation for
various purposes. In RAD, it is one of the evolving framework in the market
competition with other including Bizagi, Appian and Kissflow.
Week 10
The failure to successfully implement large scale IS has led to the downfall of
many previously successful companies. Find and summarise ONE resource that
describes few reasons of implementation failure for large scale IS. The resource,
and your summary, should analyse at least three reasons of the failure.
Title, Link and Reference:
Information systems failures for large scale
Dwivedi, Y.K., Wastell, D., Laumer, S., Henriksen, H.Z., Myers, M.D., Bunker, D., Elbanna,
A., Ravishankar, M.N. and Srivastava, S.C., 2015. Research on information systems
failures and successes: Status update and future directions. Information Systems
Frontiers, 17(1), pp.143-157.
(https://www.researchgate.net/publication/273482112_Research_on_information_systems_
failures_and_successes_Status_update_and_future_directions)
Summary:
This resource embraces over many causes of failure of large scale IS and I
prefer this article as it provides more information to begin to break through
the mega failures paradox.
The first reasons in implementation of large scale IS includes critical
expertise as it is only possible to finish the project after a surge of technical
expertise and a contributing factor in this is frequent changes in leadership.
In the absence of necessary expertise’s, there can be the biggest failure of
any scale implementation of IS as due to shortage of required skills and
capabilities in an individual. The next reason is the politics which can also
doom any IT projects as it focuses on “ideologies” rather than “device” or
14
organisation to save 25 per cent more time while building or editing current
OutSystems applications. Hence, it is proved as a disruptive solution with
increase in efficiency in various areas, i.e. manufacturing, operations, supply
chain and many more.
The resource is really helpful as it helps me to gain various advantage of
OutSystems in relation to RAD framework and its uses in the organisation for
various purposes. In RAD, it is one of the evolving framework in the market
competition with other including Bizagi, Appian and Kissflow.
Week 10
The failure to successfully implement large scale IS has led to the downfall of
many previously successful companies. Find and summarise ONE resource that
describes few reasons of implementation failure for large scale IS. The resource,
and your summary, should analyse at least three reasons of the failure.
Title, Link and Reference:
Information systems failures for large scale
Dwivedi, Y.K., Wastell, D., Laumer, S., Henriksen, H.Z., Myers, M.D., Bunker, D., Elbanna,
A., Ravishankar, M.N. and Srivastava, S.C., 2015. Research on information systems
failures and successes: Status update and future directions. Information Systems
Frontiers, 17(1), pp.143-157.
(https://www.researchgate.net/publication/273482112_Research_on_information_systems_
failures_and_successes_Status_update_and_future_directions)
Summary:
This resource embraces over many causes of failure of large scale IS and I
prefer this article as it provides more information to begin to break through
the mega failures paradox.
The first reasons in implementation of large scale IS includes critical
expertise as it is only possible to finish the project after a surge of technical
expertise and a contributing factor in this is frequent changes in leadership.
In the absence of necessary expertise’s, there can be the biggest failure of
any scale implementation of IS as due to shortage of required skills and
capabilities in an individual. The next reason is the politics which can also
doom any IT projects as it focuses on “ideologies” rather than “device” or
14

“instrument” of the policy. The other is the perception of knowing that IS will
resolve any issue, however, it is important to know that it is just an enabler
or tool and so without assistance and necessary training, it can cause
serious failure to the project. At last, training and coaching to use the
information system is also important for the employees so as to prevent
failure to happen. Hence, these are the various reasons of failure of IS
implementation at a large scale. In the digital century, IS failure due to such
reasons can be perceived as a serious threat for the organisation as it can
hamper company sustainability at a large scale.
This article is beneficial as it helps me to understand more than three
failures in relation with implementation of large scale IS.
MARKING SHEET - DO NOT DELETE
15
resolve any issue, however, it is important to know that it is just an enabler
or tool and so without assistance and necessary training, it can cause
serious failure to the project. At last, training and coaching to use the
information system is also important for the employees so as to prevent
failure to happen. Hence, these are the various reasons of failure of IS
implementation at a large scale. In the digital century, IS failure due to such
reasons can be perceived as a serious threat for the organisation as it can
hamper company sustainability at a large scale.
This article is beneficial as it helps me to understand more than three
failures in relation with implementation of large scale IS.
MARKING SHEET - DO NOT DELETE
15

Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content/contains content not contained in the resource) OR
Multiple resources used for a single task
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
16
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content/contains content not contained in the resource) OR
Multiple resources used for a single task
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
16
1 out of 16
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.