Week 1-10 Tasks: Resource Summary and Analysis for COIT 20246
VerifiedAdded on 2025/07/24
|13
|4020
|134
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

Question 1COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=965540
1
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=965540
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Example
The “Internet of things” is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Collect and summarise
an online resource that describes ONE example or application of the Internet of things.
Title, Link and Reference:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Lars, N 2014, ‘Connected Medical Devices, Apps: Are They Leading the IoT Revolution —
or Vice Versa?’, Wired, June 2014, viewed 1 February 2017,
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Note: You may use abbreviated URLs (to the website) in the reference, however you must
provide the FULL link above it that, when pasted into the Web Browser, will take the
marker directly to the resource. Using full URLs in the reference (as in this example) is fine
too.
Summary:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
This article describes the emergence of the Internet of Things (IoT) in the context of
medical devices. I chose this article because it not only examines the applications of a
very useful class of IoT devices, but it also highlights the need for ways of collecting and
processing the data they produce.
In the article, the author describes how many medical monitoring devices are now capable
of connecting to the Internet and are becoming a normal part of patient care. These
devices allow remote monitoring of patient health wirelessly and can collect data on a wide
range of vital signs and indicators. Data can be collected from a range of sensors reading
everything from heart rate and blood pressure through to blood sugar levels and
temperature.
In addition to passive monitors, IoT medical devices provide the ability to proactively
prompt patients to do things, for example to warn them of their blood pressure or to alert
them that they need more medication. The article points out that many of these
notifications are the result of apps (software) interacting with both the devices and the
patients.
Perhaps the most interesting aspect of the article is the author’s discussion of what
happens to the data that the IoT medical devices produce. The author explains that many
devices can send data directly to the cloud for storage and analysis and that this data
constitutes a wealth of information that will potentially improve healthcare in the future.
I found this article useful because it not only highlighted the increasing ubiquity of Internet-
connected medical devices, but also made me think about how the data is collected, where
it is stored and how it could be used – both positively and negatively – in the future.
2
The “Internet of things” is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Collect and summarise
an online resource that describes ONE example or application of the Internet of things.
Title, Link and Reference:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Lars, N 2014, ‘Connected Medical Devices, Apps: Are They Leading the IoT Revolution —
or Vice Versa?’, Wired, June 2014, viewed 1 February 2017,
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Note: You may use abbreviated URLs (to the website) in the reference, however you must
provide the FULL link above it that, when pasted into the Web Browser, will take the
marker directly to the resource. Using full URLs in the reference (as in this example) is fine
too.
Summary:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
This article describes the emergence of the Internet of Things (IoT) in the context of
medical devices. I chose this article because it not only examines the applications of a
very useful class of IoT devices, but it also highlights the need for ways of collecting and
processing the data they produce.
In the article, the author describes how many medical monitoring devices are now capable
of connecting to the Internet and are becoming a normal part of patient care. These
devices allow remote monitoring of patient health wirelessly and can collect data on a wide
range of vital signs and indicators. Data can be collected from a range of sensors reading
everything from heart rate and blood pressure through to blood sugar levels and
temperature.
In addition to passive monitors, IoT medical devices provide the ability to proactively
prompt patients to do things, for example to warn them of their blood pressure or to alert
them that they need more medication. The article points out that many of these
notifications are the result of apps (software) interacting with both the devices and the
patients.
Perhaps the most interesting aspect of the article is the author’s discussion of what
happens to the data that the IoT medical devices produce. The author explains that many
devices can send data directly to the cloud for storage and analysis and that this data
constitutes a wealth of information that will potentially improve healthcare in the future.
I found this article useful because it not only highlighted the increasing ubiquity of Internet-
connected medical devices, but also made me think about how the data is collected, where
it is stored and how it could be used – both positively and negatively – in the future.
2

Week 1
The text discusses different architectures for parallel processing used for
Multiprocessor Machines such as multiple-instruction stream - multiple-data stream
(MIMD), single-instruction stream - multiple-data stream (SIMD), etc. Find and
summarise ONE resource that compares between MIMD and SIMD architectures.
The resource and your summary must focus only on MIMD and SIMD architectures.
Title, Link and Reference:
Denning, P.J. and Tichy, W.F., 1990. Highly parallel computation. Science, 250(4985),
pp.1217-1222.
Summary: according to the author (Denning, and Tichy) the MIMD is the multi-data
stream computer can carry out the multiple instructions and also have the single data
stream which can carry out the single instruction. The resource which helps for the
comparison is the parallel processing which works on the process which is internal
architecture and have the interconnection between the structure and this also shows
the information flow in the system. Basically parallel figuring models are the primary
method to achieve the rates which are mentioned by front line intelligent issues. A
period which is demonstrated for the credibility, and back and forth movement
research revolves around which structures are most suitable for explicit dashes of
issues. The model doled out as SIMD and MIMD have made the best results neither
exhibits an authoritative piece of room for most close homogeneous coherent issues.
For coherent issues with various one of kind parts, dynamically hypothetical models,
for instance, neural frameworks or data stream may be required. SIMD is basically
used for the requirements of the computations which have the parallel processor
performing on the problems. The MIMD have the high flexibility of the multiple
threads which helps to control the threads. This also has an efficient statement
because of the independent processor. This has the asynchronous properties which
help to speed up the rate of execution of instruction.
Week 2
The text discusses one of the common problems that can arise during resource
allocation in operating systems, which is known as deadlock. Find and summarise
ONE resource that describes an algorithm of either deadlock avoidance or deadlock
prevention. The resource and your summary must focus on a single algorithm of
either deadlock avoidance or deadlock prevention, NOT both.
Title, Link and Reference:
Chen, H., Wu, N. and Zhou, M., 2016. A novel method for deadlock prevention of
AMS by using resource-oriented Petri nets. Information Sciences, 363, pp.178-189.
Summary: Deadlock: a lot of blocked techniques each holding an advantage and
holding up to get a benefit held by another procedure in the set. The resources used
for deadlock avoidance using the object-oriented Petri net. In light of the frameworks
of central dynamic techniques with assets (S3PR) model, the present procedures
consolidate restrictive figuring to blend a stop revolution controller for robotized
conveying structures (AMS). To diminish the estimation, this work considers this
issue by utilizing an advantage sorted out Petri net (ROPN) model. By uncovering
the relationship between the horrible markings and partner properties of a ROPN, it
familiarizes a system with such an extent; that a gridlock adjusting movement
controller can be gotten by clear figuring. By such a controller, for each unfalteringly
3
The text discusses different architectures for parallel processing used for
Multiprocessor Machines such as multiple-instruction stream - multiple-data stream
(MIMD), single-instruction stream - multiple-data stream (SIMD), etc. Find and
summarise ONE resource that compares between MIMD and SIMD architectures.
The resource and your summary must focus only on MIMD and SIMD architectures.
Title, Link and Reference:
Denning, P.J. and Tichy, W.F., 1990. Highly parallel computation. Science, 250(4985),
pp.1217-1222.
Summary: according to the author (Denning, and Tichy) the MIMD is the multi-data
stream computer can carry out the multiple instructions and also have the single data
stream which can carry out the single instruction. The resource which helps for the
comparison is the parallel processing which works on the process which is internal
architecture and have the interconnection between the structure and this also shows
the information flow in the system. Basically parallel figuring models are the primary
method to achieve the rates which are mentioned by front line intelligent issues. A
period which is demonstrated for the credibility, and back and forth movement
research revolves around which structures are most suitable for explicit dashes of
issues. The model doled out as SIMD and MIMD have made the best results neither
exhibits an authoritative piece of room for most close homogeneous coherent issues.
For coherent issues with various one of kind parts, dynamically hypothetical models,
for instance, neural frameworks or data stream may be required. SIMD is basically
used for the requirements of the computations which have the parallel processor
performing on the problems. The MIMD have the high flexibility of the multiple
threads which helps to control the threads. This also has an efficient statement
because of the independent processor. This has the asynchronous properties which
help to speed up the rate of execution of instruction.
Week 2
The text discusses one of the common problems that can arise during resource
allocation in operating systems, which is known as deadlock. Find and summarise
ONE resource that describes an algorithm of either deadlock avoidance or deadlock
prevention. The resource and your summary must focus on a single algorithm of
either deadlock avoidance or deadlock prevention, NOT both.
Title, Link and Reference:
Chen, H., Wu, N. and Zhou, M., 2016. A novel method for deadlock prevention of
AMS by using resource-oriented Petri nets. Information Sciences, 363, pp.178-189.
Summary: Deadlock: a lot of blocked techniques each holding an advantage and
holding up to get a benefit held by another procedure in the set. The resources used
for deadlock avoidance using the object-oriented Petri net. In light of the frameworks
of central dynamic techniques with assets (S3PR) model, the present procedures
consolidate restrictive figuring to blend a stop revolution controller for robotized
conveying structures (AMS). To diminish the estimation, this work considers this
issue by utilizing an advantage sorted out Petri net (ROPN) model. By uncovering
the relationship between the horrible markings and partner properties of a ROPN, it
familiarizes a system with such an extent; that a gridlock adjusting movement
controller can be gotten by clear figuring. By such a controller, for each unfalteringly
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

related subnet in a ROPN, just one control spot is required with a definitive target
that it is in a general sense direct. Also tolerant controller can be advantageously
gotten, which was never viewed. Models are utilized to display the application and
execution of the proposed procedure. Through applying the Banker's figuring and
reachable assets, the caused strategy to can be considered as a mix of quit killing
action and end avoiding. As an improvement with restricted computational endeavors
and clear technique for thinking, the system to perceive reachable assets with
gridlock killing movement can effectively reduce the holding up time acknowledged
by false-positive conditions. Since the made method utilizing end desire is essentially
related from the present position of the endeavored train to the doable assets, the
strength of being hindered by the whole line with quit adjusting movement can be
maintained a strategic distance from.
4
that it is in a general sense direct. Also tolerant controller can be advantageously
gotten, which was never viewed. Models are utilized to display the application and
execution of the proposed procedure. Through applying the Banker's figuring and
reachable assets, the caused strategy to can be considered as a mix of quit killing
action and end avoiding. As an improvement with restricted computational endeavors
and clear technique for thinking, the system to perceive reachable assets with
gridlock killing movement can effectively reduce the holding up time acknowledged
by false-positive conditions. Since the made method utilizing end desire is essentially
related from the present position of the endeavored train to the doable assets, the
strength of being hindered by the whole line with quit adjusting movement can be
maintained a strategic distance from.
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Week 3
Internet of things (IoT) is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Find and
summarise ONE resource that describes applications of the Internet of things in the
field of Smart Farming. The resource, and your summary must focus on application
of IoT ONLY in the field of smart farming.
Title, Link and Reference:
IoT For All. (2019). IoT Applications in Agriculture | IoT For All. [online] Available at:
https://www.iotforall.com/iot-applications-in-agriculture/#targetText=It%20is%20the
%20application%20of,and%20automating%20the%20irrigation%20system.
[Accessed 24 Aug. 2019].
Summary: IoT can influence the world we live in; cutting edge endeavors, related
vehicles, and progressively wonderful urban systems are for the most part areas of
the IoT condition. In any case, applying advancement like IoT to the agribusiness
business could have the best impact. The Smart Farming is the way of developing
subject to IoT advancements will enable cultivators and farmers to diminish squander
and improve productivity going from the measure of fertilizer used to the number of
experiences the property vehicles have made. In IoT-based gifted building up, a
structure is worked for watching the yield field with the assistance of sensors and
mechanizing the water structure framework. The ranchers can screen the field
conditions from any place. IoT-based sharp creating is particularly feasible when
separated and the normal methodology. The businesses of IoT-based wonderful
creating objective standard, huge creating works out, yet could, in addition, be new
changes to lift other making or conventional models in nation like regular growing,
family creating and improve essentially clear creating. The application is precision
farming, agriculture drones, smart greenhouses, and livestock monitoring. The IoT
applications are making it useful for farmers to collect basic information. Gigantic
landowners and little ranchers must understand the limit of IoT advance for
horticulture by familiarizing sharp movements with develops power and supportability
in their indications. With the majority developing quickly, the interest can be enough
met if the farmers, likewise as pitiful ranchers, complete agrarian IoT designs in a
prosperous way.
Week 4
The text discusses about IPv4, however, IPv6 is the emerging protocol which is in
the process of superseding IPv4. Find and summarise ONE resource that describes
about the technologies that are used to run both protocols simultaneously over the
same internet infrastructure.
Title, Link and Reference:
Summary: Twofold stack is a progression improvement where IPv4 and IPv6 work
couple over shared or submitted affiliations. In a twofold stack make, both IPv4 and
IPv6 are totally sent over the establishment, with the objective that approach and
overseeing shows handle both IPv4 and IPv6 tending to and adjacencies. Despite
the way where that twofold stack may transmit an impression of being an ideal
methodology, it presents two fundamental connection burdens to tries and ISPs: It
requires a present structure system that is fit for passing on IPv6. All around, in any
case, the present structure may not be planned and may require hardware and
programming restores. IPv6 ought to be influenced on basically all the structural
5
Internet of things (IoT) is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Find and
summarise ONE resource that describes applications of the Internet of things in the
field of Smart Farming. The resource, and your summary must focus on application
of IoT ONLY in the field of smart farming.
Title, Link and Reference:
IoT For All. (2019). IoT Applications in Agriculture | IoT For All. [online] Available at:
https://www.iotforall.com/iot-applications-in-agriculture/#targetText=It%20is%20the
%20application%20of,and%20automating%20the%20irrigation%20system.
[Accessed 24 Aug. 2019].
Summary: IoT can influence the world we live in; cutting edge endeavors, related
vehicles, and progressively wonderful urban systems are for the most part areas of
the IoT condition. In any case, applying advancement like IoT to the agribusiness
business could have the best impact. The Smart Farming is the way of developing
subject to IoT advancements will enable cultivators and farmers to diminish squander
and improve productivity going from the measure of fertilizer used to the number of
experiences the property vehicles have made. In IoT-based gifted building up, a
structure is worked for watching the yield field with the assistance of sensors and
mechanizing the water structure framework. The ranchers can screen the field
conditions from any place. IoT-based sharp creating is particularly feasible when
separated and the normal methodology. The businesses of IoT-based wonderful
creating objective standard, huge creating works out, yet could, in addition, be new
changes to lift other making or conventional models in nation like regular growing,
family creating and improve essentially clear creating. The application is precision
farming, agriculture drones, smart greenhouses, and livestock monitoring. The IoT
applications are making it useful for farmers to collect basic information. Gigantic
landowners and little ranchers must understand the limit of IoT advance for
horticulture by familiarizing sharp movements with develops power and supportability
in their indications. With the majority developing quickly, the interest can be enough
met if the farmers, likewise as pitiful ranchers, complete agrarian IoT designs in a
prosperous way.
Week 4
The text discusses about IPv4, however, IPv6 is the emerging protocol which is in
the process of superseding IPv4. Find and summarise ONE resource that describes
about the technologies that are used to run both protocols simultaneously over the
same internet infrastructure.
Title, Link and Reference:
Summary: Twofold stack is a progression improvement where IPv4 and IPv6 work
couple over shared or submitted affiliations. In a twofold stack make, both IPv4 and
IPv6 are totally sent over the establishment, with the objective that approach and
overseeing shows handle both IPv4 and IPv6 tending to and adjacencies. Despite
the way where that twofold stack may transmit an impression of being an ideal
methodology, it presents two fundamental connection burdens to tries and ISPs: It
requires a present structure system that is fit for passing on IPv6. All around, in any
case, the present structure may not be planned and may require hardware and
programming restores. IPv6 ought to be influenced on basically all the structural
5

parts. To address this issue, the present framework ought to be restored,
demonstrating business movement challenges. Using the tunneling elective,
affiliations produce an overlay engineer that regions one show over the other by
epitomizing IPv6 packages inside IPv4 get-togethers and IPv4 packages inside IPv6
packs. The upside of this technique is that the new show can work without disturbing
the old show, in like way giving accessibility between customers of the new show up.
Users of the new game-plan can't use the relationship of the checked establishment.
Tunneling does not attract customers of the new show to chat with customers of the
old show without twofold stack has, which invalidates interoperability. Translation
gives a picked development to IPv6 by giving trustworthy Internet experience to
greenfiled IPv6-just customers, getting to IPv4 Internet affiliations.
6
demonstrating business movement challenges. Using the tunneling elective,
affiliations produce an overlay engineer that regions one show over the other by
epitomizing IPv6 packages inside IPv4 get-togethers and IPv4 packages inside IPv6
packs. The upside of this technique is that the new show can work without disturbing
the old show, in like way giving accessibility between customers of the new show up.
Users of the new game-plan can't use the relationship of the checked establishment.
Tunneling does not attract customers of the new show to chat with customers of the
old show without twofold stack has, which invalidates interoperability. Translation
gives a picked development to IPv6 by giving trustworthy Internet experience to
greenfiled IPv6-just customers, getting to IPv4 Internet affiliations.
6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Week 5
Network security has become a major concern of ICT world, and user authentication
is one of the popular tools to assure network security. Find and summarise ONE
resource that describes any ONE authentication mechanism except password. The
resource, and your summary, should focus purely on ONLY ONE type of
authentication mechanism.
Title, Link and Reference:
<Provide the Title of the resource, the Link (full URL) and full Harvard reference
here.>
Summary: Nowadays the security is must, therefore, there should be at least two-
step verification done so that the user will
Methods of authentications are: Something you have: Examples are a swipe card to
get to an ensured zone, a code sent to your cellphone as a critical piece of a login
procedure (to indicate you have your cellphone) or a SecureID token that gives an
always showing signs of change code you have to enter to get entrance – all are
something you have that can be utilized to affirm yourself. Something you are: This is
the spot biometric security comes in. To get to our server farm we need to put our
pointer on a momentous engraving scanner in the wake of swiping a card. However,
in case you take somebody's pointer, you won't apparently get to our server farm,
paying little regard to whether you've stolen a valid swipe card. Other biometric
frameworks meld retinal yields and iris channels.Something you know: Examples of
this are your phenomenal old riddle key, bank card PIN or an ensured word when the
ready affiliation calls your home; these are all things considered events of utilizing
something you know to affirm yourself.
Week 6
The text discusses about a massive data breach that happened in Target company,
which is referred as ‘Target Breach’. Find and summarise ONE resource that
describes another recent (within last 5 years) well-publicised attack or security
breach on a public company or government organisation. The resource, and your
summary, should describe about A SINGLE EXAMPLE of security breach.
Title, Link and Reference:
Harvard Business Review. (2019). Stopping Data Breaches Will Require Help from
Governments. [online] Available at: https://hbr.org/2018/12/stopping-data-breaches-
will-require-help-from-governments [Accessed 24 Aug. 2019].
Summary: Security breach is the blasts are insidious, hard to perceive, and may
incorporate particular data identifying with an enormous number of people.
Unmistakably, the present ways to deal with oversee ensuring insecure information
are insufficient. We have to reorient needs for the action of the private zone in
cybersecurity. As the risk of cyberattacks has wound up being better regarded, we
see a steadily healing spotlight on considering corporate America exclusively
capable. Different, covering laws at the national and state level envision that
affiliations ought to have "sensible" security, an idea that is, everything considered,
dark and unpretentious, particularly given that dangers and open checked estimates
diligently advance. Furthermore, administrative use activities and claims in the wake
of cyberattacks report any mishandled security weakness to be certified "insane,"
without a noteworthy evaluation of the affiliation's general security program or
request that the affiliation has been the difficulty of awful conduct.
7
Network security has become a major concern of ICT world, and user authentication
is one of the popular tools to assure network security. Find and summarise ONE
resource that describes any ONE authentication mechanism except password. The
resource, and your summary, should focus purely on ONLY ONE type of
authentication mechanism.
Title, Link and Reference:
<Provide the Title of the resource, the Link (full URL) and full Harvard reference
here.>
Summary: Nowadays the security is must, therefore, there should be at least two-
step verification done so that the user will
Methods of authentications are: Something you have: Examples are a swipe card to
get to an ensured zone, a code sent to your cellphone as a critical piece of a login
procedure (to indicate you have your cellphone) or a SecureID token that gives an
always showing signs of change code you have to enter to get entrance – all are
something you have that can be utilized to affirm yourself. Something you are: This is
the spot biometric security comes in. To get to our server farm we need to put our
pointer on a momentous engraving scanner in the wake of swiping a card. However,
in case you take somebody's pointer, you won't apparently get to our server farm,
paying little regard to whether you've stolen a valid swipe card. Other biometric
frameworks meld retinal yields and iris channels.Something you know: Examples of
this are your phenomenal old riddle key, bank card PIN or an ensured word when the
ready affiliation calls your home; these are all things considered events of utilizing
something you know to affirm yourself.
Week 6
The text discusses about a massive data breach that happened in Target company,
which is referred as ‘Target Breach’. Find and summarise ONE resource that
describes another recent (within last 5 years) well-publicised attack or security
breach on a public company or government organisation. The resource, and your
summary, should describe about A SINGLE EXAMPLE of security breach.
Title, Link and Reference:
Harvard Business Review. (2019). Stopping Data Breaches Will Require Help from
Governments. [online] Available at: https://hbr.org/2018/12/stopping-data-breaches-
will-require-help-from-governments [Accessed 24 Aug. 2019].
Summary: Security breach is the blasts are insidious, hard to perceive, and may
incorporate particular data identifying with an enormous number of people.
Unmistakably, the present ways to deal with oversee ensuring insecure information
are insufficient. We have to reorient needs for the action of the private zone in
cybersecurity. As the risk of cyberattacks has wound up being better regarded, we
see a steadily healing spotlight on considering corporate America exclusively
capable. Different, covering laws at the national and state level envision that
affiliations ought to have "sensible" security, an idea that is, everything considered,
dark and unpretentious, particularly given that dangers and open checked estimates
diligently advance. Furthermore, administrative use activities and claims in the wake
of cyberattacks report any mishandled security weakness to be certified "insane,"
without a noteworthy evaluation of the affiliation's general security program or
request that the affiliation has been the difficulty of awful conduct.
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

For Example: the government should give more points of interest for party learning
about potential automated negative marks against private segments, especially from
country state entertainers, and a brief span later make sense of how to help kill them
not simply urge affiliations recognized to be in hazard and from that point expel them,
with blemished and isolated data, to review and react. As the Department of
Homeland Security expects progressively basic duties with respect to seeing and
compelling cybersecurity dangers to the Australia economy it should issue genuine,
sober-minded operational course to relationship on the fittest method to shield
against pushing hazards.
8
about potential automated negative marks against private segments, especially from
country state entertainers, and a brief span later make sense of how to help kill them
not simply urge affiliations recognized to be in hazard and from that point expel them,
with blemished and isolated data, to review and react. As the Department of
Homeland Security expects progressively basic duties with respect to seeing and
compelling cybersecurity dangers to the Australia economy it should issue genuine,
sober-minded operational course to relationship on the fittest method to shield
against pushing hazards.
8

Week 7
The text briefly discusses about e-commerce and e-business. Find and summarise
ONE resource that discusses the relationship between e-commerce and e-business.
The resource, and your summary, should describe similarities and difference
between e-commerce and e-business.
Title, Link and Reference:
S, S. (2019). Difference Between e-commerce and e-business (with Example and
Comparison Chart) - Key Differences. [online] Key Differences. Available at:
https://keydifferences.com/difference-between-e-commerce-and-e-
business.html#targetText=Buying%20and%20Selling%20of%20goods,is%20known
%20as%20e%2Dcommerce.&targetText=e%2Dcommerce%20includes
%20transactions%20which,%2C%20suppliers%2C%20distributors%2C%20etc.
[Accessed 24 Aug. 2019].
Summary: Difference:
E-business is simply securing and selling of item around the web. Out of nowhere, e-
business is somewhat uncommon as it isn't constrained to, business exchanges, yet
it in like way gives different associations. These are the two making systems for
coordinating, which are getting tremendousness with the development of time. one is
the days when you need to go to the market to purchase a solitary thing. These days
you essentially need to put in a sales on the web, and that thing will come to you
inside couple of minutes. Web-based shopping is getting eminent, in view of its
straightforwardness and comfort. This is conceivable basically in perspective on two
electronic structures, to be unequivocal, as online business and E-commerce.
E-commerce is worried over the association's dealings with its clients, customers or
providers. On the other hand, E-commerce proposes undertaking industry,
exchange, and trade, with the assistance of data improvement and correspondence.
The article appeared to you clarifies the distinction between E-business E-commerce
Similarities:
The move of the Internet has organized a blend of new courses of action that
different affiliations have utilized in all respects enough. Understanding the subtleties
of the communicating related with these new open doors is a significant starting
development for any self-ruling association intending to build up a more grounded
online closeness. While the terms web business and e-business a significant part of
the time are utilized then again, there really is a huge piece of capability between
them.
Week 8
The text book discusses about the success story of ARI (Automotive Resources
International) company after implementing SAP BusinessObjects Explorer and
integrating it with HANA. HANA is SAP’s in-memory computing platform that is
deployable as an on-premise hardware and software appliance or in the cloud. Find
and summarise ONE resource that describes the success story of adapting SAP
HANA by another local or international company. The resource, and your summary,
should focus on the story about ONE single company (which is not ARI company).
Title, Link and Reference: Lenovo Global Solutions. (2019). Case Study: SAP HANA
| Lenovo Global. [online] Available at: https://www.lenovo.com/ww/en/solutions/large-
enterprise/case-study-sap-hana [Accessed 24 Aug. 2019].
Summary: Freudenberg IT (FIT) is an affiliation rich with SAP history. Its German
parent affiliation, the Freudenberg Group, has an association with SAP that profits to
9
The text briefly discusses about e-commerce and e-business. Find and summarise
ONE resource that discusses the relationship between e-commerce and e-business.
The resource, and your summary, should describe similarities and difference
between e-commerce and e-business.
Title, Link and Reference:
S, S. (2019). Difference Between e-commerce and e-business (with Example and
Comparison Chart) - Key Differences. [online] Key Differences. Available at:
https://keydifferences.com/difference-between-e-commerce-and-e-
business.html#targetText=Buying%20and%20Selling%20of%20goods,is%20known
%20as%20e%2Dcommerce.&targetText=e%2Dcommerce%20includes
%20transactions%20which,%2C%20suppliers%2C%20distributors%2C%20etc.
[Accessed 24 Aug. 2019].
Summary: Difference:
E-business is simply securing and selling of item around the web. Out of nowhere, e-
business is somewhat uncommon as it isn't constrained to, business exchanges, yet
it in like way gives different associations. These are the two making systems for
coordinating, which are getting tremendousness with the development of time. one is
the days when you need to go to the market to purchase a solitary thing. These days
you essentially need to put in a sales on the web, and that thing will come to you
inside couple of minutes. Web-based shopping is getting eminent, in view of its
straightforwardness and comfort. This is conceivable basically in perspective on two
electronic structures, to be unequivocal, as online business and E-commerce.
E-commerce is worried over the association's dealings with its clients, customers or
providers. On the other hand, E-commerce proposes undertaking industry,
exchange, and trade, with the assistance of data improvement and correspondence.
The article appeared to you clarifies the distinction between E-business E-commerce
Similarities:
The move of the Internet has organized a blend of new courses of action that
different affiliations have utilized in all respects enough. Understanding the subtleties
of the communicating related with these new open doors is a significant starting
development for any self-ruling association intending to build up a more grounded
online closeness. While the terms web business and e-business a significant part of
the time are utilized then again, there really is a huge piece of capability between
them.
Week 8
The text book discusses about the success story of ARI (Automotive Resources
International) company after implementing SAP BusinessObjects Explorer and
integrating it with HANA. HANA is SAP’s in-memory computing platform that is
deployable as an on-premise hardware and software appliance or in the cloud. Find
and summarise ONE resource that describes the success story of adapting SAP
HANA by another local or international company. The resource, and your summary,
should focus on the story about ONE single company (which is not ARI company).
Title, Link and Reference: Lenovo Global Solutions. (2019). Case Study: SAP HANA
| Lenovo Global. [online] Available at: https://www.lenovo.com/ww/en/solutions/large-
enterprise/case-study-sap-hana [Accessed 24 Aug. 2019].
Summary: Freudenberg IT (FIT) is an affiliation rich with SAP history. Its German
parent affiliation, the Freudenberg Group, has an association with SAP that profits to
9
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

1972. After in excess of 20 fruitful years as an SAP client, in 1995, the Freudenberg
Group moved FIT — one of the world's most noteworthy IT associations and cloud
suppliers for SAP applications — to enable different relationship to perceive relative
triumphs with a SAP empowering frill. Today, FIT has particular server develops in
Different clients are by and by moving a consistently growing number of information
off-site, all while proceeding to encounter brisk progression. In addition, they are
wanting to SAP HANA to deal with the augmentation in information volume. FIT
recognized is expected to proceed with its inclination to develop close to degrees of
advancement in headway to even more expeditiously help its clients and handle a
touch of the difficulties introduced by the making SAP HANA conditions. FIT skipped
in on the ground floor of virtualization and wound up one of the first SAP cloud-
certified suppliers in 2009, expanding the decisions for affiliations that need to benefit
by the cloud and its cost. Vice President of Sales at FIT. "We routinely host SAP
frameworks comparably as clients' subordinate structures that help them; in any
case, two or three clients have us have their whole IT foundation of SAP and non-
SAP structures.
10
Group moved FIT — one of the world's most noteworthy IT associations and cloud
suppliers for SAP applications — to enable different relationship to perceive relative
triumphs with a SAP empowering frill. Today, FIT has particular server develops in
Different clients are by and by moving a consistently growing number of information
off-site, all while proceeding to encounter brisk progression. In addition, they are
wanting to SAP HANA to deal with the augmentation in information volume. FIT
recognized is expected to proceed with its inclination to develop close to degrees of
advancement in headway to even more expeditiously help its clients and handle a
touch of the difficulties introduced by the making SAP HANA conditions. FIT skipped
in on the ground floor of virtualization and wound up one of the first SAP cloud-
certified suppliers in 2009, expanding the decisions for affiliations that need to benefit
by the cloud and its cost. Vice President of Sales at FIT. "We routinely host SAP
frameworks comparably as clients' subordinate structures that help them; in any
case, two or three clients have us have their whole IT foundation of SAP and non-
SAP structures.
10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Week 9
Rapid application development (RAD) is a process of creating a workable system in
a very short period of time. There are few recently developed frameworks available in
market to undertake RAD. Find and summarise ONE recent (within last two years)
resource that describes and recommends about ONE framework for RAD.
Title, Link and Reference: ToolsHero. (2019). Rapid Application Development (RAD),
a software development method | ToolsHero. [online] Available at:
https://www.toolshero.com/information-technology/rapid-application-development/
[Accessed 24 Aug. 2019].
Summary: Smart Application Development uses models that fill in as a working
model that structure a quick bit of the completed outcome. Snappy Application
Development utilizes a dealt with the pre-building stage, which makes it dynamically
direct to association changes in the development system. A Rapid Application
Development assignment incorporates a dash of social event of designers, experts
and managers from the customer to doubtlessly respond to the requirements and
essentials of the customer that are used in structure up the thing then the system
game plan stage searched for after by explicit and underhanded great structure, the
course of action of the thing, which prompts the testing stage, the exchange off of the
thing and it closes with upkeep and sponsorship. Fast Application Development
(RAD) is a response for non-adaptable strategies, for instance, the Waterfall
structure. Building programming applications in this 'old-fashioned' way, dependably
took a long time, in which once in a while the necessities had started late been
changed before the entire structure was made and passed on. This once in a while
recognized unworkable applications. Fast Application Development isn't about ward
plans yet about synchronous isolated degrees of advancement and introductions that
grant a speedier and better blend of the thing system. The entire improvement
framework has starting late been joined into the designing, and, where significant, it
might be upgraded, balanced or refined.
Week 10
The failure to successfully implement large scale IS has led to the downfall of many
previously successful companies. Find and summarise ONE resource that describes
few reasons of implementation failure for large scale IS. The resource, and your
summary, should analyse at least three reasons of the failure.
Title, Link and Reference: Pdfs.semanticscholar.org. (2019). [online] Available at:
https://pdfs.semanticscholar.org/6e5f/b475b4c9d3003db6df477cd4551205b2b8e3.pd
f [Accessed 24 Aug. 2019].
Summary: implementation of failure for large scale IS gives the experience the
authorities approach or structure, can't make
undertakings disappointment affirmation. To succeed, a convincing task needs
basically more than a cookbook approach exceptionally when finishing enormous
scale undertakings. There are different issues that require the authorities thought and
cognizance of their conceivable effect is considered fundamental to develop the odds
of a profitable try. This appraisal attempted to fabricate the estimation of the
restricted picking up beginning at now accessible to experts and specialists about
coordinating national ID programs. The assessment sees the estimation of formal
undertaking the board and acclimates an endeavored methodology with powerfully
viable association of such works out. Task the heads were discovered squeezing to
exist in such epic scale and complex undertakings where thought was required to
dismantle and carefully react to the ramifications of the scarcest change. The
authorities must grasp that each experience is exceptional, also, that by rehashing
11
Rapid application development (RAD) is a process of creating a workable system in
a very short period of time. There are few recently developed frameworks available in
market to undertake RAD. Find and summarise ONE recent (within last two years)
resource that describes and recommends about ONE framework for RAD.
Title, Link and Reference: ToolsHero. (2019). Rapid Application Development (RAD),
a software development method | ToolsHero. [online] Available at:
https://www.toolshero.com/information-technology/rapid-application-development/
[Accessed 24 Aug. 2019].
Summary: Smart Application Development uses models that fill in as a working
model that structure a quick bit of the completed outcome. Snappy Application
Development utilizes a dealt with the pre-building stage, which makes it dynamically
direct to association changes in the development system. A Rapid Application
Development assignment incorporates a dash of social event of designers, experts
and managers from the customer to doubtlessly respond to the requirements and
essentials of the customer that are used in structure up the thing then the system
game plan stage searched for after by explicit and underhanded great structure, the
course of action of the thing, which prompts the testing stage, the exchange off of the
thing and it closes with upkeep and sponsorship. Fast Application Development
(RAD) is a response for non-adaptable strategies, for instance, the Waterfall
structure. Building programming applications in this 'old-fashioned' way, dependably
took a long time, in which once in a while the necessities had started late been
changed before the entire structure was made and passed on. This once in a while
recognized unworkable applications. Fast Application Development isn't about ward
plans yet about synchronous isolated degrees of advancement and introductions that
grant a speedier and better blend of the thing system. The entire improvement
framework has starting late been joined into the designing, and, where significant, it
might be upgraded, balanced or refined.
Week 10
The failure to successfully implement large scale IS has led to the downfall of many
previously successful companies. Find and summarise ONE resource that describes
few reasons of implementation failure for large scale IS. The resource, and your
summary, should analyse at least three reasons of the failure.
Title, Link and Reference: Pdfs.semanticscholar.org. (2019). [online] Available at:
https://pdfs.semanticscholar.org/6e5f/b475b4c9d3003db6df477cd4551205b2b8e3.pd
f [Accessed 24 Aug. 2019].
Summary: implementation of failure for large scale IS gives the experience the
authorities approach or structure, can't make
undertakings disappointment affirmation. To succeed, a convincing task needs
basically more than a cookbook approach exceptionally when finishing enormous
scale undertakings. There are different issues that require the authorities thought and
cognizance of their conceivable effect is considered fundamental to develop the odds
of a profitable try. This appraisal attempted to fabricate the estimation of the
restricted picking up beginning at now accessible to experts and specialists about
coordinating national ID programs. The assessment sees the estimation of formal
undertaking the board and acclimates an endeavored methodology with powerfully
viable association of such works out. Task the heads were discovered squeezing to
exist in such epic scale and complex undertakings where thought was required to
dismantle and carefully react to the ramifications of the scarcest change. The
authorities must grasp that each experience is exceptional, also, that by rehashing
11

old experience or practices from comparative past endeavors won't suit the routinely
changing scene of the present endeavors. Effective execution requires clear
business process, the capacity to deal with the structure's flexibility, and the capacity
to change in accordance with high intricacy levels
12
changing scene of the present endeavors. Effective execution requires clear
business process, the capacity to deal with the structure's flexibility, and the capacity
to change in accordance with high intricacy levels
12
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 13
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.