COIT 20246 Assignment: Parallel Processing, Deadlock, and IoT
VerifiedAdded on Ā 2025/09/03
|14
|4409
|301
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutorās Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page ā changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=965540
1
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutorās Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page ā changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=965540
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Example
The āInternet of thingsā is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Collect and summarise
an online resource that describes ONE example or application of the Internet of things.
Title, Link and Reference:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution ā or Vice Versa?
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Lars, N 2014, āConnected Medical Devices, Apps: Are They Leading the IoT Revolution ā
or Vice Versa?ā, Wired, June 2014, viewed 1 February 2017,
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Note: You may use abbreviated URLs (to the website) in the reference, however you must
provide the FULL link above it that, when pasted into the Web Browser, will take the
marker directly to the resource. Using full URLs in the reference (as in this example) is fine
too.
Summary:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution ā or Vice Versa?
This article describes the emergence of the Internet of Things (IoT) in the context of
medical devices. I chose this article because it not only examines the applications of a
very useful class of IoT devices, but it also highlights the need for ways of collecting and
processing the data they produce.
In the article, the author describes how many medical monitoring devices are now capable
of connecting to the Internet and are becoming a normal part of patient care. These
devices allow remote monitoring of patient health wirelessly and can collect data on a wide
range of vital signs and indicators. Data can be collected from a range of sensors reading
everything from heart rate and blood pressure through to blood sugar levels and
temperature.
In addition to passive monitors, IoT medical devices provide the ability to proactively
prompt patients to do things, for example to warn them of their blood pressure or to alert
them that they need more medication. The article points out that many of these
notifications are the result of apps (software) interacting with both the devices and the
patients.
Perhaps the most interesting aspect of the article is the authorās discussion of what
happens to the data that the IoT medical devices produce. The author explains that many
devices can send data directly to the cloud for storage and analysis and that this data
constitutes a wealth of information that will potentially improve healthcare in the future.
I found this article useful because it not only highlighted the increasing ubiquity of Internet-
connected medical devices, but also made me think about how the data is collected, where
it is stored and how it could be used ā both positively and negatively ā in the future.
2
The āInternet of thingsā is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Collect and summarise
an online resource that describes ONE example or application of the Internet of things.
Title, Link and Reference:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution ā or Vice Versa?
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Lars, N 2014, āConnected Medical Devices, Apps: Are They Leading the IoT Revolution ā
or Vice Versa?ā, Wired, June 2014, viewed 1 February 2017,
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Note: You may use abbreviated URLs (to the website) in the reference, however you must
provide the FULL link above it that, when pasted into the Web Browser, will take the
marker directly to the resource. Using full URLs in the reference (as in this example) is fine
too.
Summary:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution ā or Vice Versa?
This article describes the emergence of the Internet of Things (IoT) in the context of
medical devices. I chose this article because it not only examines the applications of a
very useful class of IoT devices, but it also highlights the need for ways of collecting and
processing the data they produce.
In the article, the author describes how many medical monitoring devices are now capable
of connecting to the Internet and are becoming a normal part of patient care. These
devices allow remote monitoring of patient health wirelessly and can collect data on a wide
range of vital signs and indicators. Data can be collected from a range of sensors reading
everything from heart rate and blood pressure through to blood sugar levels and
temperature.
In addition to passive monitors, IoT medical devices provide the ability to proactively
prompt patients to do things, for example to warn them of their blood pressure or to alert
them that they need more medication. The article points out that many of these
notifications are the result of apps (software) interacting with both the devices and the
patients.
Perhaps the most interesting aspect of the article is the authorās discussion of what
happens to the data that the IoT medical devices produce. The author explains that many
devices can send data directly to the cloud for storage and analysis and that this data
constitutes a wealth of information that will potentially improve healthcare in the future.
I found this article useful because it not only highlighted the increasing ubiquity of Internet-
connected medical devices, but also made me think about how the data is collected, where
it is stored and how it could be used ā both positively and negatively ā in the future.
2

Week 1
The text discusses about different architectures for parallel processing used for
Multiprocessor Machines such as multiple-instruction stream - multiple-data stream
(MIMD), single-instruction stream - multiple-data stream (SIMD) etc. Find and
summarise ONE resource that compares between MIMD and SIMD architectures.
The resource, and your summary, must focus only on MIMD and SIMD architectures.
Title, Link and Reference:
D i f f e r e n c e s B e t w e e n S I M D a n d M I M D
https://www.techwalla.com/articles/differences-between-simd-and-mimd
White, M 2019, āD i f f e r e n c e s B e t w e e n S I M D a n d M I M D ā, Techwalla, 2019,
viewed 16 september 2019, https://www.techwalla.com/articles/differences-between-
simd-and-mimd
Summary:
This article describes parallel computing which means it works by dividing the big
problem into small problems and find the solution at same time. I choose this article
because itās not talking only about parallel computing but it also describes its
different-different architecture for multiple processors.
In this article, the author describes the definition of parallel computing. The definition
of parallel computing is that itās working by dividing the larger problem into small-
small problems and solve this problem at same time. In parallel computing, MIMD
and SIMD are two different architecture of parallel computing that uses multiple
processors.
The comparison between MIMD and SIMD:
The comparison can be done in two categories, one is technically and second is
practical. Before start the comparison, the author talks firstly about the MIMD and
SIMD. SIMD define as Single Instruction stream Multiple Data stream while MIMD
define as Multiple Instruction stream Multiple Datastream. Practically difference in
this two architecture is that SIMD is used for that problem which requires
computation with processor also doing this at same time while MIMD is used for that
problem which breaks down into separate parts, where each part assigns to a
different process to solve them. The Technically difference of this architecture is that
SIMD is simple, small, low-cost, and faster while MIMD is used for more complex
problems.
I found this article useful because it highlights all the topic which is required for this
assignment and in this article have all the information about SIMD and MIMD and it
categorized the difference in two ways which is technically and practically.
3
The text discusses about different architectures for parallel processing used for
Multiprocessor Machines such as multiple-instruction stream - multiple-data stream
(MIMD), single-instruction stream - multiple-data stream (SIMD) etc. Find and
summarise ONE resource that compares between MIMD and SIMD architectures.
The resource, and your summary, must focus only on MIMD and SIMD architectures.
Title, Link and Reference:
D i f f e r e n c e s B e t w e e n S I M D a n d M I M D
https://www.techwalla.com/articles/differences-between-simd-and-mimd
White, M 2019, āD i f f e r e n c e s B e t w e e n S I M D a n d M I M D ā, Techwalla, 2019,
viewed 16 september 2019, https://www.techwalla.com/articles/differences-between-
simd-and-mimd
Summary:
This article describes parallel computing which means it works by dividing the big
problem into small problems and find the solution at same time. I choose this article
because itās not talking only about parallel computing but it also describes its
different-different architecture for multiple processors.
In this article, the author describes the definition of parallel computing. The definition
of parallel computing is that itās working by dividing the larger problem into small-
small problems and solve this problem at same time. In parallel computing, MIMD
and SIMD are two different architecture of parallel computing that uses multiple
processors.
The comparison between MIMD and SIMD:
The comparison can be done in two categories, one is technically and second is
practical. Before start the comparison, the author talks firstly about the MIMD and
SIMD. SIMD define as Single Instruction stream Multiple Data stream while MIMD
define as Multiple Instruction stream Multiple Datastream. Practically difference in
this two architecture is that SIMD is used for that problem which requires
computation with processor also doing this at same time while MIMD is used for that
problem which breaks down into separate parts, where each part assigns to a
different process to solve them. The Technically difference of this architecture is that
SIMD is simple, small, low-cost, and faster while MIMD is used for more complex
problems.
I found this article useful because it highlights all the topic which is required for this
assignment and in this article have all the information about SIMD and MIMD and it
categorized the difference in two ways which is technically and practically.
3
ā This is a preview!ā
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Week 2
The text discusses about one of the common problems that can arise during
resource allocation in operating systems, which is known as deadlock. Find and
summarise ONE resource that describes an algorithm of either deadlock avoidance
or deadlock prevention. The resource, and your summary, must focus on a single
algorithm of either deadlock avoidance or deadlock prevention, NOT both.
Title, Link and Reference:
Deadlock Prevention, Avoidence, Detection and Recovery in Operating System
https://javajee.com/deadlock-prevention-avoidance-detection-and-recovery-in-
operating-systems
Heartin, 2014, 'Deadlock Prevention, Avoidence, Detection and Recovery in
Operating Systemā, Javajee, 2014, viewed 16 september 2019,
https://javajee.com/deadlock-prevention-avoidance-detection-and-recovery-in-
operating-systems
Summary:
This article gives a description of the Deadlock algorithms. Deadlock is a state in
which every member of a group is waiting for another member for taking action. I
chose this article because it gives all the information about deadlock prevention
algorithm.
In this article, the author describes the deadlock prevention algorithm which is used
to prevent the deadlock. There are four characteristics of deadlock such as Mutual
Exclusion, Circular wait, Hold and wait and No Preemption. To prevent the deadlock
have to eliminate these characteristics.
Eliminate Mutual Exclusion: This is not always possible to prevent the deadlock by
making all the resources available.
Eliminate Hold and wait: Allocate all the requirements before the execution of
process, this can eliminate hold and wait condition but this condition is lead by the
low utilization of the device.
Eliminate No Preemption: To preempt the resources from the process when the
higher priority process has required the resources.
Eliminate Circular wait: To prevent the circular wait, each resource has its unique
number. So it ensures that every process is can request a resource in increasing
order.
I found this article useful because it gives information about all the characteristics of
deadlock and also describes how to eliminate this characteristic to prevent deadlock.
And the content of this article is very simple and easy to understand.
4
The text discusses about one of the common problems that can arise during
resource allocation in operating systems, which is known as deadlock. Find and
summarise ONE resource that describes an algorithm of either deadlock avoidance
or deadlock prevention. The resource, and your summary, must focus on a single
algorithm of either deadlock avoidance or deadlock prevention, NOT both.
Title, Link and Reference:
Deadlock Prevention, Avoidence, Detection and Recovery in Operating System
https://javajee.com/deadlock-prevention-avoidance-detection-and-recovery-in-
operating-systems
Heartin, 2014, 'Deadlock Prevention, Avoidence, Detection and Recovery in
Operating Systemā, Javajee, 2014, viewed 16 september 2019,
https://javajee.com/deadlock-prevention-avoidance-detection-and-recovery-in-
operating-systems
Summary:
This article gives a description of the Deadlock algorithms. Deadlock is a state in
which every member of a group is waiting for another member for taking action. I
chose this article because it gives all the information about deadlock prevention
algorithm.
In this article, the author describes the deadlock prevention algorithm which is used
to prevent the deadlock. There are four characteristics of deadlock such as Mutual
Exclusion, Circular wait, Hold and wait and No Preemption. To prevent the deadlock
have to eliminate these characteristics.
Eliminate Mutual Exclusion: This is not always possible to prevent the deadlock by
making all the resources available.
Eliminate Hold and wait: Allocate all the requirements before the execution of
process, this can eliminate hold and wait condition but this condition is lead by the
low utilization of the device.
Eliminate No Preemption: To preempt the resources from the process when the
higher priority process has required the resources.
Eliminate Circular wait: To prevent the circular wait, each resource has its unique
number. So it ensures that every process is can request a resource in increasing
order.
I found this article useful because it gives information about all the characteristics of
deadlock and also describes how to eliminate this characteristic to prevent deadlock.
And the content of this article is very simple and easy to understand.
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Week 3
Internet of things (IoT) is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Find and
summarise ONE resource that describe applications of the Internet of things in the
field of Smart Farming. The resource, and your summary, must focus on application
of IoT ONLY in the field of smart farming.
Title, Link and Reference:
IoT Applications in Agriculture
https://www.iotforall.com/iot-applications-in-agriculture/
Writer,G, 2019, āIoT Applications in Agricultureā, iotforall, 2019, viewed 16
September 2019, https://www.iotforall.com/iot-applications-in-agriculture/
Summary:
This article is all about IOT and its application. In this article, the author gives
information about IoT applications in smart farming. I choose this article because this
has all the information which is the requirement for the IoT. And also detail the
advantages of the IoT in the farming area.
The IoT stands for internet of things. As per the knowledge IOT is growing day by
day and it brought a good impact on agriculture and in every field. The IoT
technology is used in smart wearable, driverless cars and in many more. If the IoT is
used in agriculture than it can be very helpful for farmers. There are many
application of IoT in smart farming, they are the following:
Climate conditions: climate plays very important role in farming, having the
improper knowledge of the climate can be bad for the quality and quantity of the
crop. But with the help of IoT the farmer can easily get the knowledge of climate and
they can do the farming according to the climate. The sensor is attached inside the
agriculture field, this sensor collects the data from the environment, which is useful
for choosing the right crop that can grow in a particular climate.
Smart greenhouse: To make field greenhouses, IoT has automatically adjusted the
climate conditions according to specified set of instructions.to get the IoT in
Greenhouses has removed the human handwork, this makes the whole process
cost-effective and increasing certainty at the same time. For example, use of the
solar-powered IoT sensors makes modern and effective greenhouse field.
Data Analysis: The simple database system has not sufficient storage for the data
collection which is come from the IoT sensors. To remove this problem, Cloud-based
data storage IoT technology plays an important role in the agriculture system. In the
world IOT technology is growing, IOT sensors are the source of collecting data on a
big scale. The data is transferred and analyzed to give meaningful information using
analytics parts/tools. The data analysis is used in to check the weather condition and
proper estimate of the climate and remain all the information which is taken from the
environment.
This article is useful because it fulfills the requirement of analysis the IoT application
in smart farming. And its describe each application in a proper manner.
5
Internet of things (IoT) is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Find and
summarise ONE resource that describe applications of the Internet of things in the
field of Smart Farming. The resource, and your summary, must focus on application
of IoT ONLY in the field of smart farming.
Title, Link and Reference:
IoT Applications in Agriculture
https://www.iotforall.com/iot-applications-in-agriculture/
Writer,G, 2019, āIoT Applications in Agricultureā, iotforall, 2019, viewed 16
September 2019, https://www.iotforall.com/iot-applications-in-agriculture/
Summary:
This article is all about IOT and its application. In this article, the author gives
information about IoT applications in smart farming. I choose this article because this
has all the information which is the requirement for the IoT. And also detail the
advantages of the IoT in the farming area.
The IoT stands for internet of things. As per the knowledge IOT is growing day by
day and it brought a good impact on agriculture and in every field. The IoT
technology is used in smart wearable, driverless cars and in many more. If the IoT is
used in agriculture than it can be very helpful for farmers. There are many
application of IoT in smart farming, they are the following:
Climate conditions: climate plays very important role in farming, having the
improper knowledge of the climate can be bad for the quality and quantity of the
crop. But with the help of IoT the farmer can easily get the knowledge of climate and
they can do the farming according to the climate. The sensor is attached inside the
agriculture field, this sensor collects the data from the environment, which is useful
for choosing the right crop that can grow in a particular climate.
Smart greenhouse: To make field greenhouses, IoT has automatically adjusted the
climate conditions according to specified set of instructions.to get the IoT in
Greenhouses has removed the human handwork, this makes the whole process
cost-effective and increasing certainty at the same time. For example, use of the
solar-powered IoT sensors makes modern and effective greenhouse field.
Data Analysis: The simple database system has not sufficient storage for the data
collection which is come from the IoT sensors. To remove this problem, Cloud-based
data storage IoT technology plays an important role in the agriculture system. In the
world IOT technology is growing, IOT sensors are the source of collecting data on a
big scale. The data is transferred and analyzed to give meaningful information using
analytics parts/tools. The data analysis is used in to check the weather condition and
proper estimate of the climate and remain all the information which is taken from the
environment.
This article is useful because it fulfills the requirement of analysis the IoT application
in smart farming. And its describe each application in a proper manner.
5

Week 4
The text discusses about IPv4, however, IPv6 is the emerging protocol which is in
the process of superseding IPv4. Find and summarise ONE resource that describes
about the technologies that are used to run both protocols simultaneously over the
same internet infrastructure.
Title, Link and Reference:
NAT64 Technology: Connecting IPv6 and IPv4 Networks
https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/
enterprise-ipv6-solution/white_paper_c11-676278.html
Greek,W, 2019, āNAT64 Technology: Connecting IPv6 and IPv4 Networksā, cisco,
2012, viewed 16 September 2019,
https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/enterprise-ipv6-
solution/white_paper_c11-676278.html
Summary:
The article is all about ipv4 and ipv6 protocols. And the author describes a
technology that is used in both ipv4 and ipv6 protocol over the internet. I choose this
article because the author describes ipv4 and ipv6 by the images and gives the
proper knowledge about technology and both two protocols.
Network Address Translation-Protocol Translation (NAT-PT) technology is used in
both ipv4 and ipv6 protocols. This technology provides the facility to communicate
between ipv6 and ipv4. All the translation scenarios are supported by NAT-PT. and
this technology becomes the most translation technology.
Another technology is Network Address Translation 64 (NAT64) which is the most
useful technology. AFT using NAT64 technology can be achieved by stateful or
stateless.
This article is useful because it gives all information which is required for the
protocols.And in this article, the author covers all the topics regarding the protocols.
6
The text discusses about IPv4, however, IPv6 is the emerging protocol which is in
the process of superseding IPv4. Find and summarise ONE resource that describes
about the technologies that are used to run both protocols simultaneously over the
same internet infrastructure.
Title, Link and Reference:
NAT64 Technology: Connecting IPv6 and IPv4 Networks
https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/
enterprise-ipv6-solution/white_paper_c11-676278.html
Greek,W, 2019, āNAT64 Technology: Connecting IPv6 and IPv4 Networksā, cisco,
2012, viewed 16 September 2019,
https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/enterprise-ipv6-
solution/white_paper_c11-676278.html
Summary:
The article is all about ipv4 and ipv6 protocols. And the author describes a
technology that is used in both ipv4 and ipv6 protocol over the internet. I choose this
article because the author describes ipv4 and ipv6 by the images and gives the
proper knowledge about technology and both two protocols.
Network Address Translation-Protocol Translation (NAT-PT) technology is used in
both ipv4 and ipv6 protocols. This technology provides the facility to communicate
between ipv6 and ipv4. All the translation scenarios are supported by NAT-PT. and
this technology becomes the most translation technology.
Another technology is Network Address Translation 64 (NAT64) which is the most
useful technology. AFT using NAT64 technology can be achieved by stateful or
stateless.
This article is useful because it gives all information which is required for the
protocols.And in this article, the author covers all the topics regarding the protocols.
6
ā This is a preview!ā
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Week 5
Network security has become a major concern of ICT world, and user authentication
is one of the popular tools to assure network security. Find and summarise ONE
resource that describes any ONE authentication mechanism except password. The
resource, and your summary, should focus purely on ONLY ONE type of
authentication mechanism.
Title, Link and Reference:
Biometrics
https://searchsecurity.techtarget.com/definition/biometrics
Rouse,M, 2019, āBiometricsā, Searchsecurity, 2019, viewed 16 September 2019,
https://searchsecurity.techtarget.com/definition/biometrics
Summary:
This article is all about network authentication. Network authentication can be
achieved in many ways, but in this article we discussed biometrics. I choose this
article because this site makes me happy because of its content. Content about
biometric is enough to get proper knowledge about biometrics.
Biometric is the way of authentication without using the password. Biometric is
authentication method used to identify the uniqueness of the people through
fingerprint or DNA. This technology is more secure because in this technology single
person connects with the biometric system using finger or DNA. In this universe all
people have different fingerprints and DNA too. So advantage of this technology is
no one can access the information due to this in todayās world more and more
people using this technology because it has more confidential than the PIN or
password for authentication.
In biometric login person need to present at time of login otherwise login is not
completed. This is the assurance of security and adds a layer of security because
other login types like password, PIN, ID can be forged or lost.
Working is very easy for the user. The user has only need to touch the biometric
panel of scanner or microphone and if the user is registered in the database then
user will successfully login otherwise system denied the login.
The signup process is also very simple. The user only needs to touch the scanner
two or three times and scanner scan the fingerprint and store in the database.
This article is useful because network security has become the main thing, and this
article has all the content which have to be in the biometric. Biometric is best use of
network security.
7
Network security has become a major concern of ICT world, and user authentication
is one of the popular tools to assure network security. Find and summarise ONE
resource that describes any ONE authentication mechanism except password. The
resource, and your summary, should focus purely on ONLY ONE type of
authentication mechanism.
Title, Link and Reference:
Biometrics
https://searchsecurity.techtarget.com/definition/biometrics
Rouse,M, 2019, āBiometricsā, Searchsecurity, 2019, viewed 16 September 2019,
https://searchsecurity.techtarget.com/definition/biometrics
Summary:
This article is all about network authentication. Network authentication can be
achieved in many ways, but in this article we discussed biometrics. I choose this
article because this site makes me happy because of its content. Content about
biometric is enough to get proper knowledge about biometrics.
Biometric is the way of authentication without using the password. Biometric is
authentication method used to identify the uniqueness of the people through
fingerprint or DNA. This technology is more secure because in this technology single
person connects with the biometric system using finger or DNA. In this universe all
people have different fingerprints and DNA too. So advantage of this technology is
no one can access the information due to this in todayās world more and more
people using this technology because it has more confidential than the PIN or
password for authentication.
In biometric login person need to present at time of login otherwise login is not
completed. This is the assurance of security and adds a layer of security because
other login types like password, PIN, ID can be forged or lost.
Working is very easy for the user. The user has only need to touch the biometric
panel of scanner or microphone and if the user is registered in the database then
user will successfully login otherwise system denied the login.
The signup process is also very simple. The user only needs to touch the scanner
two or three times and scanner scan the fingerprint and store in the database.
This article is useful because network security has become the main thing, and this
article has all the content which have to be in the biometric. Biometric is best use of
network security.
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Week 6
The text discusses about a massive data breach that happened in Target company,
which is referred as āTarget Breachā. Find and summarise ONE resource that
describes another recent (within last 5 years) well-publicised attack or security
breach on a public company or government organisation. The resource, and your
summary, should describe about A SINGLE EXAMPLE of security breach.
Title, Link and Reference:
Security Breach
https://www.simeiosolutions.com/dealing-with-a-security-breach-heres-what-you-
should-do/
Jester,T, 2019, āSecurity Breachā, Simeiosolution, 2019, viewed 16 september 2019,
https://www.simeiosolutions.com/dealing-with-a-security-breach-heres-what-you-
should-do/
Summary:
This article describes the topic of security breach, the word security breach means is
any event that results in illegal access of applications, data by superficial their hidden
security mechanisms. I choose this article because it gives all the info about the
companies and organization who is suffered by this security breach.
According to the article and general information, today became a trend of online
fraud and many companies are suffering from these breaches. For example, there is
a company called Saudi Aramco who buys naphtha from ONGC, and company
received an email of deposit a 100 cr. In another bank instead of its usual bank. This
company submits the amount and in same month the company again submitted the
amount in another bank for the deal nut ONGC company never received. But when
the company message them about the transfer, they knew something want wrong. It
has been defrauded by any cybercriminals means any third person sends an email
to the company behalf of that company from where the product is manufactured. And
tell them to deposit the amount of the deal into another bank account. Behind the
reason of this the third person knew the mail id of the buyer as well as he also knew
the password of the mail id of the seller. Hacking is growing rapidly very fast. Another
type of cyberattack is corporate espionage, in which the software is used to access a
computer network and hack all the important information of that particular network.
I found this article useful because it does not only define the security breach but also
highlight the point who was suffered from this cyberattack And in this article they give
the total number of estimated company who is suffered from this from past 5 years.
8
The text discusses about a massive data breach that happened in Target company,
which is referred as āTarget Breachā. Find and summarise ONE resource that
describes another recent (within last 5 years) well-publicised attack or security
breach on a public company or government organisation. The resource, and your
summary, should describe about A SINGLE EXAMPLE of security breach.
Title, Link and Reference:
Security Breach
https://www.simeiosolutions.com/dealing-with-a-security-breach-heres-what-you-
should-do/
Jester,T, 2019, āSecurity Breachā, Simeiosolution, 2019, viewed 16 september 2019,
https://www.simeiosolutions.com/dealing-with-a-security-breach-heres-what-you-
should-do/
Summary:
This article describes the topic of security breach, the word security breach means is
any event that results in illegal access of applications, data by superficial their hidden
security mechanisms. I choose this article because it gives all the info about the
companies and organization who is suffered by this security breach.
According to the article and general information, today became a trend of online
fraud and many companies are suffering from these breaches. For example, there is
a company called Saudi Aramco who buys naphtha from ONGC, and company
received an email of deposit a 100 cr. In another bank instead of its usual bank. This
company submits the amount and in same month the company again submitted the
amount in another bank for the deal nut ONGC company never received. But when
the company message them about the transfer, they knew something want wrong. It
has been defrauded by any cybercriminals means any third person sends an email
to the company behalf of that company from where the product is manufactured. And
tell them to deposit the amount of the deal into another bank account. Behind the
reason of this the third person knew the mail id of the buyer as well as he also knew
the password of the mail id of the seller. Hacking is growing rapidly very fast. Another
type of cyberattack is corporate espionage, in which the software is used to access a
computer network and hack all the important information of that particular network.
I found this article useful because it does not only define the security breach but also
highlight the point who was suffered from this cyberattack And in this article they give
the total number of estimated company who is suffered from this from past 5 years.
8

Week 7
The text briefly discusses about e-commerce and e-business. Find and summarise
ONE resource that discusses the relationship between e-commerce and e-business.
The resource, and your summary, should describe similarities and difference
between e-commerce and e-business.
Title, Link and Reference:
Difference Between e-commerce and e-business
https://keydifferences.com/difference-between-e-commerce-and-e-business.html
John, 2018, āDifference Between e-commerce and e-businessā keydifferences, 2018,
viewed 16 september 2019, https://keydifferences.com/difference-between-e-
commerce-and-e-business.html
Summary:
This article defines the two-term, first one is E-Commerce and another one E-
Business. And I choose this article because it has all types of information regarding
these two terms. And also it gives a brief description of E-Commerce and E-
Business.
E-Commerce defines as to buy and sell anything from the web is called E-
Commerce. While E-business little bit differs from E-commerce because it is not
limited and it also provides another service like online payment, online growth
business by social media and all.
As per the knowledge, there was a time when a customer went to the market to buy
a particular thing but nowadays a customer has to place an order online and he can
get this product after some time at home. Online shopping also become a trend
nowadays just because of its simplicity, and easy maintenance with good policies.
There are many differences between E-Commerce and E-Business is that E-
commerce requires a source is a website while E-Business require source is
website, CRM, ERP and etc. another difference is that E-Commerce is limited to
monetary transaction while E-Business is not limited to monetary transaction. E-
Commerce is subset while E-business is a superset. The main difference is that E-
commerce means trading any merchandise over the internet while E-business
means running a business with the use of internet is called E-Business. There are
many applications where E-Commerce is used such as online shopping, online
booking tickets.
There is much key difference in E-Commerce & E-business: E-commerce is a
component of E-business. E-Commerce only includes transaction of money while E-
business includes all types of activity. E-commerce needs a website to represent the
business while E-business needs relationship management, website and any more
for easy growing e-business over the internet.
9
The text briefly discusses about e-commerce and e-business. Find and summarise
ONE resource that discusses the relationship between e-commerce and e-business.
The resource, and your summary, should describe similarities and difference
between e-commerce and e-business.
Title, Link and Reference:
Difference Between e-commerce and e-business
https://keydifferences.com/difference-between-e-commerce-and-e-business.html
John, 2018, āDifference Between e-commerce and e-businessā keydifferences, 2018,
viewed 16 september 2019, https://keydifferences.com/difference-between-e-
commerce-and-e-business.html
Summary:
This article defines the two-term, first one is E-Commerce and another one E-
Business. And I choose this article because it has all types of information regarding
these two terms. And also it gives a brief description of E-Commerce and E-
Business.
E-Commerce defines as to buy and sell anything from the web is called E-
Commerce. While E-business little bit differs from E-commerce because it is not
limited and it also provides another service like online payment, online growth
business by social media and all.
As per the knowledge, there was a time when a customer went to the market to buy
a particular thing but nowadays a customer has to place an order online and he can
get this product after some time at home. Online shopping also become a trend
nowadays just because of its simplicity, and easy maintenance with good policies.
There are many differences between E-Commerce and E-Business is that E-
commerce requires a source is a website while E-Business require source is
website, CRM, ERP and etc. another difference is that E-Commerce is limited to
monetary transaction while E-Business is not limited to monetary transaction. E-
Commerce is subset while E-business is a superset. The main difference is that E-
commerce means trading any merchandise over the internet while E-business
means running a business with the use of internet is called E-Business. There are
many applications where E-Commerce is used such as online shopping, online
booking tickets.
There is much key difference in E-Commerce & E-business: E-commerce is a
component of E-business. E-Commerce only includes transaction of money while E-
business includes all types of activity. E-commerce needs a website to represent the
business while E-business needs relationship management, website and any more
for easy growing e-business over the internet.
9
ā This is a preview!ā
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Week 8
The text book discusses about the success story of ARI (Automotive Resources
International) company after implementing SAP BusinessObjects Explorer and
integrating it with HANA. HANA is SAPās in-memory computing platform that is
deployable as an on-premise hardware and software appliance or in the cloud. Find
and summarise ONE resource that describes the success story of adapting SAP
HANA by another local or international company. The resource, and your summary,
should focus on the story about ONE single company (which is not ARI company).
Title, Link and Reference:
SAP HANA
https://searchsap.techtarget.com/definition/HANA-SAP-HANA
Rouse,M, 2019, āSAP HANAā, Lenovo, 2019, viewed 16 September 2019,
https://searchsap.techtarget.com/definition/HANA-SAP-HANA
Summary:
This article describes a company which is adapt the SAP HANA. And by this the
growing very fastly in the market. I choose this article because the article tells all the
thing which is required for this task.
The SAP HANA Is a platform that is used in database technology which allows a
large amount of data processing in short time. This architecture of HANA is designed
to handle the transaction rates and complex high query. In this article, there is a
company that is powerful with SAP. Freudenberg company has partnership with SAP
in past 1972. After some year this company is growing very fast with the use of SAP.
After some year this company Launched FIT- it is one of largest components for SAP
application. Nowadays all company wants to adopt the SAP HANA because all want
rapid growth. There are many industries that use the SAP HANA, they are following:
computer software, information technology, staffing and recruiting, management
consulting, retail, hospital and health care, computer hardware, food production. The
FIT company helps all companies to realize the same success as they have with the
help of SAP HANA. After adopting the SAP HANA, the FIT company which is on the
ground floor in terms of marketing to become one of the best and first SAP cloud
certified company in 2009.
I found this article very useful because it describes the success story of any
company which adapts the SAP HANA. The content was very good and this article
tells the story of company with the starting and this article also highlights the point of
company which is required for SAP HANA.
10
The text book discusses about the success story of ARI (Automotive Resources
International) company after implementing SAP BusinessObjects Explorer and
integrating it with HANA. HANA is SAPās in-memory computing platform that is
deployable as an on-premise hardware and software appliance or in the cloud. Find
and summarise ONE resource that describes the success story of adapting SAP
HANA by another local or international company. The resource, and your summary,
should focus on the story about ONE single company (which is not ARI company).
Title, Link and Reference:
SAP HANA
https://searchsap.techtarget.com/definition/HANA-SAP-HANA
Rouse,M, 2019, āSAP HANAā, Lenovo, 2019, viewed 16 September 2019,
https://searchsap.techtarget.com/definition/HANA-SAP-HANA
Summary:
This article describes a company which is adapt the SAP HANA. And by this the
growing very fastly in the market. I choose this article because the article tells all the
thing which is required for this task.
The SAP HANA Is a platform that is used in database technology which allows a
large amount of data processing in short time. This architecture of HANA is designed
to handle the transaction rates and complex high query. In this article, there is a
company that is powerful with SAP. Freudenberg company has partnership with SAP
in past 1972. After some year this company is growing very fast with the use of SAP.
After some year this company Launched FIT- it is one of largest components for SAP
application. Nowadays all company wants to adopt the SAP HANA because all want
rapid growth. There are many industries that use the SAP HANA, they are following:
computer software, information technology, staffing and recruiting, management
consulting, retail, hospital and health care, computer hardware, food production. The
FIT company helps all companies to realize the same success as they have with the
help of SAP HANA. After adopting the SAP HANA, the FIT company which is on the
ground floor in terms of marketing to become one of the best and first SAP cloud
certified company in 2009.
I found this article very useful because it describes the success story of any
company which adapts the SAP HANA. The content was very good and this article
tells the story of company with the starting and this article also highlights the point of
company which is required for SAP HANA.
10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Week 9
Rapid application development (RAD) is a process of creating a workable system in
a very short period of time. There are few recently developed frameworks available in
market to undertake RAD. Find and summarise ONE recent (within last two years)
resource that describes and recommends about ONE framework for RAD.
Title, Link and Reference:
How to Boost App Development With RAD Framework
https://kissflow.com/rad/rapid-application-development-framework-to-boost-app-
development/
Chris, 2018, āHow to Boost App Development With RAD Frameworkā, kissflow, 2018,
viewed 16 september 2019, https://kissflow.com/rad/rapid-application-
development-framework-to-boost-app-development/
Summary:
This article is all about Rapid application development(RAD) framework. The rapid
application development means it is a methodology which is a type of agile software
development methodology. I choose this article because it consists of all types of
information regarding the RAD framework. And in this, the author describes with
easy understanding language.
RAD (Rapid application development) framework is a set of functions, libraries,
classes based on rapid application development methodology. This framework is
used to save time, and also organize the development. There are many steps from
which we can develop the framework and its library and function also. The step is
following: first of all find all the requirements, create a fast prototype, received
feedback from the customer, testing the system, and last is launching the framework.
The launching prototype to the customer to test and take feedback in order to
change is possible or not. And it has to ensure that the product is same or not as
they want it to be. In each prototype, the function developed and test being
processed.
For building the final code for that system or framework the development team has
right to reuse the code from last prototype if possible.
The advantage of RAD is that it breaks the large project into small-small pieces.
Doing the small-small parts of the large project gives the motivation to the
development team because they think that first part of the project is completed and
now only remain second half of the project.
I found this article useful because it gives all the information to boost up the
development by RAD framework. And also they describe the steps to develop the
system. It also highlights the point of how to integrate with other apps.
11
Rapid application development (RAD) is a process of creating a workable system in
a very short period of time. There are few recently developed frameworks available in
market to undertake RAD. Find and summarise ONE recent (within last two years)
resource that describes and recommends about ONE framework for RAD.
Title, Link and Reference:
How to Boost App Development With RAD Framework
https://kissflow.com/rad/rapid-application-development-framework-to-boost-app-
development/
Chris, 2018, āHow to Boost App Development With RAD Frameworkā, kissflow, 2018,
viewed 16 september 2019, https://kissflow.com/rad/rapid-application-
development-framework-to-boost-app-development/
Summary:
This article is all about Rapid application development(RAD) framework. The rapid
application development means it is a methodology which is a type of agile software
development methodology. I choose this article because it consists of all types of
information regarding the RAD framework. And in this, the author describes with
easy understanding language.
RAD (Rapid application development) framework is a set of functions, libraries,
classes based on rapid application development methodology. This framework is
used to save time, and also organize the development. There are many steps from
which we can develop the framework and its library and function also. The step is
following: first of all find all the requirements, create a fast prototype, received
feedback from the customer, testing the system, and last is launching the framework.
The launching prototype to the customer to test and take feedback in order to
change is possible or not. And it has to ensure that the product is same or not as
they want it to be. In each prototype, the function developed and test being
processed.
For building the final code for that system or framework the development team has
right to reuse the code from last prototype if possible.
The advantage of RAD is that it breaks the large project into small-small pieces.
Doing the small-small parts of the large project gives the motivation to the
development team because they think that first part of the project is completed and
now only remain second half of the project.
I found this article useful because it gives all the information to boost up the
development by RAD framework. And also they describe the steps to develop the
system. It also highlights the point of how to integrate with other apps.
11

Week 10
The failure to successfully implement large scale IS has led to the downfall of many
previously successful companies. Find and summarise ONE resource that describes
few reasons of implementation failure for large scale IS. The resource, and your
summary, should analyse at least three reasons of the failure.
Title, Link and Reference:
The Most Common Reasons Why Software Projects Fail
https://www.infoq.com/articles/software-failure-reasons/
Putnam,T, 2015, āThe Most Common Reasons Why Software Projects Failā, infoq,
2015, viewed 16 september 2019, https://www.infoq.com/articles/software-
failure-reasons/
Summary:
This article is all about of reason which is responsible for the failure of project which
is on large scale. I choose this article because it has the reason for project failure.
And the context was also very good.
At the time of launching the software, the development team to ensure that it has
met his expectation or not. If the development team tests the software before
launching then it can be safe from failing. The project failure can be described as
more cost more than the expected estimate, late delivery also a reason for project
failure, poor quality and not much use in the specified field.
To avoid the project failure, the team must have followed some keys which are
following:
Target, target can be set before developing the software. Constraint, the team have
knowledge of internal and external limitation. Estimate, estimate can be calculated
before developing the software so, this can prevent the project failure. Plan, plan is
also a key which is used to check what is the objective of the project.
I found this article is very useful because it tells all the problem which is responsible
for the project failure. And this article also highlights the point of key factor of project
success. It also describes the image of what it is saying in the term of project failure.
Project failure happens because of poor management by team.
12
The failure to successfully implement large scale IS has led to the downfall of many
previously successful companies. Find and summarise ONE resource that describes
few reasons of implementation failure for large scale IS. The resource, and your
summary, should analyse at least three reasons of the failure.
Title, Link and Reference:
The Most Common Reasons Why Software Projects Fail
https://www.infoq.com/articles/software-failure-reasons/
Putnam,T, 2015, āThe Most Common Reasons Why Software Projects Failā, infoq,
2015, viewed 16 september 2019, https://www.infoq.com/articles/software-
failure-reasons/
Summary:
This article is all about of reason which is responsible for the failure of project which
is on large scale. I choose this article because it has the reason for project failure.
And the context was also very good.
At the time of launching the software, the development team to ensure that it has
met his expectation or not. If the development team tests the software before
launching then it can be safe from failing. The project failure can be described as
more cost more than the expected estimate, late delivery also a reason for project
failure, poor quality and not much use in the specified field.
To avoid the project failure, the team must have followed some keys which are
following:
Target, target can be set before developing the software. Constraint, the team have
knowledge of internal and external limitation. Estimate, estimate can be calculated
before developing the software so, this can prevent the project failure. Plan, plan is
also a key which is used to check what is the objective of the project.
I found this article is very useful because it tells all the problem which is responsible
for the project failure. And this article also highlights the point of key factor of project
success. It also describes the image of what it is saying in the term of project failure.
Project failure happens because of poor management by team.
12
ā This is a preview!ā
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 14
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
Ā +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright Ā© 2020ā2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.




