COIT 20246: Weekly Resource Summaries
VerifiedAdded on 2019/11/20
|14
|5074
|190
Practical Assignment
AI Summary
This assignment requires students to find and summarize ten online resources, one for each week of the course. Each summary should be approximately 200-300 words and explain the resource's content, selection rationale, key information, and usefulness. Students must use their own words and cite sources using the Harvard format. The assignment is worth 30% of the final grade and has a strict late submission penalty. Specific guidelines are provided regarding suitable resource types (excluding academic papers and certain websites) and the importance of concise summaries focusing on a single topic. A template is provided for submission, and a detailed marking rubric is included to guide students.

Written Assessment (30%)
General Information
The purpose of this assignment is to select and discuss relevant online resources that
exemplify the application of the topic(s) nominated each week (1 - 10). This
assignment can (and should!) be completed progressively (i.e. each week). There
are ten (10) tasks, one for each week: these are detailed below and in the template.
The assignment is marked out of 30 and forms 30% of your total course marks.
Note that late penalties apply (5% of the total available marks per calendar day late
or part thereof). Assignments received 14 days or more after the due date will not
be marked and will receive zero. Students may apply for extensions but must provide
documentary evidence to support their request (for example, a medical certificate).
Short extensions of one to two days may be considered if students include their
nearly completed assignment (i.e. one or two tasks to yet be completed) in their
extension request.
It will be necessary for students to use online resources to complete this assignment,
so please ensure you cite and reference any such materials using the Harvard
format. Plagiarism detection will be used in this assessment.
It is VERY important that you do not copy content directly from either the text or
Internet resources: this assignment is to be in your own words. You will lose marks
if you do not use your own words! Suspected plagiarism will result in the instigation
of the student misconduct process.
What do I need to do?
Download the template [TO BE PROVIDED]. There are ten (10) tasks, one for each
week: the tasks are detailed below (and in the template file).
Each task requires you to collect and summarise one (1) publicly available online
resource. The resource summary should be around 200-300 words. You should
collect interesting and relevant resources that address the task. The resources
should be easy to read and describe the topic/technology concisely and simply. The
resources must be specific to the topic (i.e. just focus on a single technology or topic
and not be about multiple topics). These can include (but are not limited to) online
magazine/news articles, technical reports or documentation.
Important - Academic resources such as journals, conference papers or books will
generally be unsuitable for this assignment as they are generally not publicly
General Information
The purpose of this assignment is to select and discuss relevant online resources that
exemplify the application of the topic(s) nominated each week (1 - 10). This
assignment can (and should!) be completed progressively (i.e. each week). There
are ten (10) tasks, one for each week: these are detailed below and in the template.
The assignment is marked out of 30 and forms 30% of your total course marks.
Note that late penalties apply (5% of the total available marks per calendar day late
or part thereof). Assignments received 14 days or more after the due date will not
be marked and will receive zero. Students may apply for extensions but must provide
documentary evidence to support their request (for example, a medical certificate).
Short extensions of one to two days may be considered if students include their
nearly completed assignment (i.e. one or two tasks to yet be completed) in their
extension request.
It will be necessary for students to use online resources to complete this assignment,
so please ensure you cite and reference any such materials using the Harvard
format. Plagiarism detection will be used in this assessment.
It is VERY important that you do not copy content directly from either the text or
Internet resources: this assignment is to be in your own words. You will lose marks
if you do not use your own words! Suspected plagiarism will result in the instigation
of the student misconduct process.
What do I need to do?
Download the template [TO BE PROVIDED]. There are ten (10) tasks, one for each
week: the tasks are detailed below (and in the template file).
Each task requires you to collect and summarise one (1) publicly available online
resource. The resource summary should be around 200-300 words. You should
collect interesting and relevant resources that address the task. The resources
should be easy to read and describe the topic/technology concisely and simply. The
resources must be specific to the topic (i.e. just focus on a single technology or topic
and not be about multiple topics). These can include (but are not limited to) online
magazine/news articles, technical reports or documentation.
Important - Academic resources such as journals, conference papers or books will
generally be unsuitable for this assignment as they are generally not publicly
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

available, are not concise, are not necessarily easy to read and often don’t focus
specifically on the assignment topic(s). The resources should be substantial
(producing a 300 word summary from a 400 - 500 word resource is inappropriate)
and only contain information directly pertinent to the task. You cannot use the
resource more than once in the assignment. The textbook and sites such as, but not
limited to, Wikipedia, Techtarget, and HowStuffWorks are not suitable resources.
Your summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.
For each task, there is a table to complete in the template. Please fill
in the information required and submit the document via this page
by the due date.
Hints
Hint 1: Do a bit every week
This assignment is not onerous, especially if you complete each weekly section as
you complete each week of the course – that means writing around 300 words per
week. However, it will be much harder if you try to complete all ten sections in week
eleven!
Hint 2: Choose interesting and relevant resources
You will be assessed on the relevance of resources. Choose specialised, specific
resources that helped you gain a deeper understanding of the topic area. Do not use
generic web pages from sites like (but not limited to) Wikipedia, Techtarget and
“How-Stuff-Works”. Web sites like these list and define topics and technologies and
they are not appropriate. Slide-shows or PowerPoint presentations are also
unsuitable. Make sure the resource can be linked to/accessed directly – i.e. it is a
public resource on the web. Links/permalinks to CQU Library online resources such
as journal papers, conference papers and textbooks are not suitable as they are not
publicly accessible resources.
Hint 3: Look at [LINK] these examples. Note the reasons why the excellent response
gets the marks. Pay special attention to why the second example would result in an
academic misconduct case and the potential for you for fail the assignment or the
unit!!!
specifically on the assignment topic(s). The resources should be substantial
(producing a 300 word summary from a 400 - 500 word resource is inappropriate)
and only contain information directly pertinent to the task. You cannot use the
resource more than once in the assignment. The textbook and sites such as, but not
limited to, Wikipedia, Techtarget, and HowStuffWorks are not suitable resources.
Your summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.
For each task, there is a table to complete in the template. Please fill
in the information required and submit the document via this page
by the due date.
Hints
Hint 1: Do a bit every week
This assignment is not onerous, especially if you complete each weekly section as
you complete each week of the course – that means writing around 300 words per
week. However, it will be much harder if you try to complete all ten sections in week
eleven!
Hint 2: Choose interesting and relevant resources
You will be assessed on the relevance of resources. Choose specialised, specific
resources that helped you gain a deeper understanding of the topic area. Do not use
generic web pages from sites like (but not limited to) Wikipedia, Techtarget and
“How-Stuff-Works”. Web sites like these list and define topics and technologies and
they are not appropriate. Slide-shows or PowerPoint presentations are also
unsuitable. Make sure the resource can be linked to/accessed directly – i.e. it is a
public resource on the web. Links/permalinks to CQU Library online resources such
as journal papers, conference papers and textbooks are not suitable as they are not
publicly accessible resources.
Hint 3: Look at [LINK] these examples. Note the reasons why the excellent response
gets the marks. Pay special attention to why the second example would result in an
academic misconduct case and the potential for you for fail the assignment or the
unit!!!

Hint 4: Ask!
If something in this assignment description is unclear, or you are just not 100% sure
about something, please ask for help. Your teaching team really do not mind if you
ask us to clarify something. We do mind when we have to fail you because you
haven't submitted what was asked or met the assignment requirements sad
What do I need to submit?
You are required to submit a single document in Microsoft Word format (.doc
or .docx). Use the template [TO BE PROVIDED]as the basis for your submission.
Apart from providing your response to the weekly tasks, do not modify the
document - especially do not delete the marking sheet.
Marking Criteria
A detailed tabular marking criteria is provided as part of your submission template -
please ensure you read it before attempting the assignment. You will be assessed on
the relevance of the resources you select as well as the clarity and detail of your
discussions.
If something in this assignment description is unclear, or you are just not 100% sure
about something, please ask for help. Your teaching team really do not mind if you
ask us to clarify something. We do mind when we have to fail you because you
haven't submitted what was asked or met the assignment requirements sad
What do I need to submit?
You are required to submit a single document in Microsoft Word format (.doc
or .docx). Use the template [TO BE PROVIDED]as the basis for your submission.
Apart from providing your response to the weekly tasks, do not modify the
document - especially do not delete the marking sheet.
Marking Criteria
A detailed tabular marking criteria is provided as part of your submission template -
please ensure you read it before attempting the assignment. You will be assessed on
the relevance of the resources you select as well as the clarity and detail of your
discussions.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
It will be necessary to use literature/online resources to complete this
assignment, please ensure you cite and reference any such materials using
the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not
use your own words!
Please complete your assignment using this submission template file,
inserting your responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
It will be necessary to use literature/online resources to complete this
assignment, please ensure you cite and reference any such materials using
the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not
use your own words!
Please complete your assignment using this submission template file,
inserting your responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is a
table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Week 1
The text discusses the elements of modern computing architecture however is largely silent
on the individuals who played a role in its development. Find and summarise a resource that
describes ONE such individual. The individual should have had a significant influence on the
development of computers and/or components of modern computing architecture.
Title and Reference
How Steve Jobs Started – Infographic
Vital, A. 2017. How Steve Jobs Started - Infographic. [online] Adioma. Available at:
https://blog.adioma.com/how-steve-jobs-started-infographic/ [Accessed 27 Sep. 2017].
[online]: https://blog.adioma.com/how-steve-jobs-started-infographic/
Summary:
This resource elaborates the role play of a great computer architects named as
Steve Jobs the founder of Apple Inc. The success story of Apple computer and its
operational and functional excellence are illustrated in this resources I have selected
this paper because I felt that the author have done vast investigation on the inventor
and his knowledge on the managerial skill as well. The different theoretical and
complimentary conceptual skill this great entrepreneur has is also illustrated in this
research paper. I also realized that, besides this person also many well known
personalities are there such as the inventor of Facebook, PayPal etc. A descriptive
finding has been done by the researchers to complete the survey to get effective
resultant from it. It is determined that different industries where, the entrepreneurial
skills are required to be managed. In the modern field of computing architecture,
Steve Jobs put huge and great contribution. This particular resource missed many of
the practices and technical skills that Steve jobs used while designing the system
architecture and also his contribution as a leader in Apple Inc s also not
demonstrated in tis research paper. The outline of the designs and the details of the
software and hardware are not elaborated in this paper. However, the way through
which the failure rates of the entrepreneurs could be measured are illustrated in this
research paper.
Week 2
The text discusses the components and activities of operating systems however are largely
silent on the individuals who played a role in their development. Find and summarise a
resource that describes ONE such individual. The individual should have had a significant
influence on the writing or development of operating systems.
Title and Reference:
Learn How to Contribute to the Linux Kernel, Take the Eudyptula Challenge
There are ten (10) tasks, one for each week: the tasks are detailed below. There is a
table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Week 1
The text discusses the elements of modern computing architecture however is largely silent
on the individuals who played a role in its development. Find and summarise a resource that
describes ONE such individual. The individual should have had a significant influence on the
development of computers and/or components of modern computing architecture.
Title and Reference
How Steve Jobs Started – Infographic
Vital, A. 2017. How Steve Jobs Started - Infographic. [online] Adioma. Available at:
https://blog.adioma.com/how-steve-jobs-started-infographic/ [Accessed 27 Sep. 2017].
[online]: https://blog.adioma.com/how-steve-jobs-started-infographic/
Summary:
This resource elaborates the role play of a great computer architects named as
Steve Jobs the founder of Apple Inc. The success story of Apple computer and its
operational and functional excellence are illustrated in this resources I have selected
this paper because I felt that the author have done vast investigation on the inventor
and his knowledge on the managerial skill as well. The different theoretical and
complimentary conceptual skill this great entrepreneur has is also illustrated in this
research paper. I also realized that, besides this person also many well known
personalities are there such as the inventor of Facebook, PayPal etc. A descriptive
finding has been done by the researchers to complete the survey to get effective
resultant from it. It is determined that different industries where, the entrepreneurial
skills are required to be managed. In the modern field of computing architecture,
Steve Jobs put huge and great contribution. This particular resource missed many of
the practices and technical skills that Steve jobs used while designing the system
architecture and also his contribution as a leader in Apple Inc s also not
demonstrated in tis research paper. The outline of the designs and the details of the
software and hardware are not elaborated in this paper. However, the way through
which the failure rates of the entrepreneurs could be measured are illustrated in this
research paper.
Week 2
The text discusses the components and activities of operating systems however are largely
silent on the individuals who played a role in their development. Find and summarise a
resource that describes ONE such individual. The individual should have had a significant
influence on the writing or development of operating systems.
Title and Reference:
Learn How to Contribute to the Linux Kernel, Take the Eudyptula Challenge

Linux Foundation 2017. Learn How to Contribute to the Linux Kernel, Take the
Eudyptula Challenge - The Linux Foundation.
[online] The Linux Foundation. Available at:
https://www.linuxfoundation.org/blog/learn-how-to-contribute-to-the-linux-kernel-take-
the-eudyptula-challenge/ [Accessed 27 Sep. 2017].
Summary:
In the current trends of system and development the components of Operating
system plays active role. It is crucial or purposeful to develop new model of
knowledge creation. I have selected this particular paper because it elaborated the
firm that is based on community based model of knowledge creation a case study
regarding the Linux Kernel development. In the year of 1991, a 2nd year computer
science student of University of Helsinki invented the Linux operating system. This
unique computer operating system assembles all the components under the open
source software development and distribution. Though in the initial phase of
development it was a X-86 based PC. Comparing different models and configuration
it is determined that, for the further expansion of knowledge possible usage of
knowledge within the society and insightful posses are needed to be included in the
system. Though the system expands many different aspects but unfortunately the
key opportunities that might generate from this system are not elaborated in this
report. It has been defined that the boundary of an organization could be extended,
from the comparison of modern Linux model and traditional software development
model. The group of distributed individuals and the disappeared cross space
associated to the Linux Kernel development model is illustrated in this research
paper. Not only this but also how the relationship between the suppliers and the
consumers could keep secured is elaborated in this research paper.
Eudyptula Challenge - The Linux Foundation.
[online] The Linux Foundation. Available at:
https://www.linuxfoundation.org/blog/learn-how-to-contribute-to-the-linux-kernel-take-
the-eudyptula-challenge/ [Accessed 27 Sep. 2017].
Summary:
In the current trends of system and development the components of Operating
system plays active role. It is crucial or purposeful to develop new model of
knowledge creation. I have selected this particular paper because it elaborated the
firm that is based on community based model of knowledge creation a case study
regarding the Linux Kernel development. In the year of 1991, a 2nd year computer
science student of University of Helsinki invented the Linux operating system. This
unique computer operating system assembles all the components under the open
source software development and distribution. Though in the initial phase of
development it was a X-86 based PC. Comparing different models and configuration
it is determined that, for the further expansion of knowledge possible usage of
knowledge within the society and insightful posses are needed to be included in the
system. Though the system expands many different aspects but unfortunately the
key opportunities that might generate from this system are not elaborated in this
report. It has been defined that the boundary of an organization could be extended,
from the comparison of modern Linux model and traditional software development
model. The group of distributed individuals and the disappeared cross space
associated to the Linux Kernel development model is illustrated in this research
paper. Not only this but also how the relationship between the suppliers and the
consumers could keep secured is elaborated in this research paper.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Week 3
The Internet didn’t just appear – it was an evolution from earlier networks. Find and
summarise a resource that describes ONE of the networks that led to the development of the
modern Internet.
Title and Reference:
Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D. and Jamalipour, A., 2014.
Wireless body area networks: A survey. IEEE Communications Surveys &
Tutorials, 16(3), pp.1658-1686.
5 Advantages of Wireless Networks - ABcom.
Wireless Networks 2017. 5 Advantages of Wireless Networks - ABcom.
[online] Abcomllc.com. Available at: http://www.abcomllc.com/blog/5-advantages-of-
wireless-networks/ [Accessed 27 Sep. 2017].
Summary:
This paper reflects the importance of wireless network system and its effects on current
technology. From the recent development and technological advancement in wireless
communication it has been found that, medium access control and physical layers and the
two most important layers those help to make the necessary application of the wireless
network system. Wireless devices have currently become one of the most widely used
technologies all over the world. The overview of the research work is well conducted far in the
different sectors of wireless body area network Considering different perspectives an
investigation on the WBAN constraints are also elaborated in this paper.
Not only this but also the classification of different WBAN application both in the medical and
non medical sector are illustrated in this report. I have found that, a detail review and the
routing protocol classification are addressed on this paper. I have selected this research
paper because in this paper the authors have gone through vast investigation on wireless
body area network. Different applications of the WBAN are illustrated in this research paper
but this paper is mainly focused on the medical and non medical field of application. The
features of all the in body and on body application details are formally managed with the help
of the wireless application The way through which both the doctors and the patients will be
able to store and access data from the server are elaborated in this research paper.
Week 4
Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the text.
Find and summarise a resource that describes the features and uses of ONE other L2
protocol that is not discussed in the text (i.e. NOT Ethernet).
Title and Reference:
Encapsulation Methods for Transport of
PPP/High-Level Data Link Control (HDLC) over MPLS Networks
Martini, L., Rosen, E. and Heron, G. (2017). RFC 4618 - Encapsulation Methods for Transport
of PPP/High-Level Data Link Control (HDLC) over MPLS Networks.
[online] Tools.ietf.org. Available at: https://tools.ietf.org/html/rfc4618 [Accessed 27 Sep. 2017].
The Internet didn’t just appear – it was an evolution from earlier networks. Find and
summarise a resource that describes ONE of the networks that led to the development of the
modern Internet.
Title and Reference:
Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D. and Jamalipour, A., 2014.
Wireless body area networks: A survey. IEEE Communications Surveys &
Tutorials, 16(3), pp.1658-1686.
5 Advantages of Wireless Networks - ABcom.
Wireless Networks 2017. 5 Advantages of Wireless Networks - ABcom.
[online] Abcomllc.com. Available at: http://www.abcomllc.com/blog/5-advantages-of-
wireless-networks/ [Accessed 27 Sep. 2017].
Summary:
This paper reflects the importance of wireless network system and its effects on current
technology. From the recent development and technological advancement in wireless
communication it has been found that, medium access control and physical layers and the
two most important layers those help to make the necessary application of the wireless
network system. Wireless devices have currently become one of the most widely used
technologies all over the world. The overview of the research work is well conducted far in the
different sectors of wireless body area network Considering different perspectives an
investigation on the WBAN constraints are also elaborated in this paper.
Not only this but also the classification of different WBAN application both in the medical and
non medical sector are illustrated in this report. I have found that, a detail review and the
routing protocol classification are addressed on this paper. I have selected this research
paper because in this paper the authors have gone through vast investigation on wireless
body area network. Different applications of the WBAN are illustrated in this research paper
but this paper is mainly focused on the medical and non medical field of application. The
features of all the in body and on body application details are formally managed with the help
of the wireless application The way through which both the doctors and the patients will be
able to store and access data from the server are elaborated in this research paper.
Week 4
Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the text.
Find and summarise a resource that describes the features and uses of ONE other L2
protocol that is not discussed in the text (i.e. NOT Ethernet).
Title and Reference:
Encapsulation Methods for Transport of
PPP/High-Level Data Link Control (HDLC) over MPLS Networks
Martini, L., Rosen, E. and Heron, G. (2017). RFC 4618 - Encapsulation Methods for Transport
of PPP/High-Level Data Link Control (HDLC) over MPLS Networks.
[online] Tools.ietf.org. Available at: https://tools.ietf.org/html/rfc4618 [Accessed 27 Sep. 2017].
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Summary:
I have selected this particular resource because it elaborates the encapsulation method of
transport of PP or High level data link layers over the MPLS network. Ethernet is a network
protocol that works in the data link layer and similarly High level data link control (HDLC) is
another control protocol. This is a bit oriented code transparent synchronous data link layer
protocol that is developed by the ISO. ISO 13239 is the current standard of HDLC that
replaced each and every standard. The connectionless and connection oriented services are
served by the HDLC. In order to establish connection between points and multipoint HDLC
network protocol is used. However, currently it is generally used to create connection
between different devices. This particular document emulates the PW encapsulation for the
PPP and HDLC. This particular document elaborates the details of the HDLC service in the
data link layer. The role of data link layer is to create secured connection between the service
provider and consumers. With the help of optional sequence field and control management
the packet ordering can be preserved. Though the required support features are not
illustrated in this research paper. Not only this but also, quality of the service model and the
advantages of the HDLC model over the traditional model is elaborated in this research
paper. The way through which HDLC Flags are processed locally in the PE is connected to
the attachment circuit are also illustrated in this paper.
Week 5
The text mentions the role of hackers in attacks on networked infrastructure. Find and
summarise a resource that describes ONE famous or well-known hacker.
Title and Reference:
Kevin Mitnick Web site hacked
EVERS, J. 2017. Kevin Mitnick Web site hacked.
[online] CNET. Available at: https://www.cnet.com/news/kevin-mitnick-web-site-hacked/
[Accessed 27 Sep. 2017].
Summary:
After going through the criminal history of USA I have found that, the department of
Justice known this person as the most wanted computer criminal. The name of the
professional Hacker is Kevin Mitnick. He has spent 1 year in prison due to the
unethical hacking. I have selected this resource because it elaborates that social
engineering is referred is one of the most devastating threats for the company or
business organization. In order to break upon the computer network, different social
engineers technical flaws are elaborated in this research paper. In addition to this,
not only a single attacker but also, many other hackers name and their activities are
elaborated in this paper. In order to compromise with the company’s computer
network it is very much necessary to provide the frequent conversation. The different
security tools and technologies are elaborated in this research paper. I have selected
this paper because it illustrates the role of handling a human hacking and the
difference between ethical hacking and unethical hacking. After spending a complete
year in the prison he as under the supervision of the corporation network. He
interrupted the national defence warning system for stealing the corporate secrets.
This paper elaborates the role of ethical hackers but of the hackers make any kind of
unethical job, then how the system developers will get affected for that are also
elaborated in this paper. Though, now Mitnick was eventually caught and convicted
with a five year of prison sentence but this is not yet mentioned in this research
paper.
I have selected this particular resource because it elaborates the encapsulation method of
transport of PP or High level data link layers over the MPLS network. Ethernet is a network
protocol that works in the data link layer and similarly High level data link control (HDLC) is
another control protocol. This is a bit oriented code transparent synchronous data link layer
protocol that is developed by the ISO. ISO 13239 is the current standard of HDLC that
replaced each and every standard. The connectionless and connection oriented services are
served by the HDLC. In order to establish connection between points and multipoint HDLC
network protocol is used. However, currently it is generally used to create connection
between different devices. This particular document emulates the PW encapsulation for the
PPP and HDLC. This particular document elaborates the details of the HDLC service in the
data link layer. The role of data link layer is to create secured connection between the service
provider and consumers. With the help of optional sequence field and control management
the packet ordering can be preserved. Though the required support features are not
illustrated in this research paper. Not only this but also, quality of the service model and the
advantages of the HDLC model over the traditional model is elaborated in this research
paper. The way through which HDLC Flags are processed locally in the PE is connected to
the attachment circuit are also illustrated in this paper.
Week 5
The text mentions the role of hackers in attacks on networked infrastructure. Find and
summarise a resource that describes ONE famous or well-known hacker.
Title and Reference:
Kevin Mitnick Web site hacked
EVERS, J. 2017. Kevin Mitnick Web site hacked.
[online] CNET. Available at: https://www.cnet.com/news/kevin-mitnick-web-site-hacked/
[Accessed 27 Sep. 2017].
Summary:
After going through the criminal history of USA I have found that, the department of
Justice known this person as the most wanted computer criminal. The name of the
professional Hacker is Kevin Mitnick. He has spent 1 year in prison due to the
unethical hacking. I have selected this resource because it elaborates that social
engineering is referred is one of the most devastating threats for the company or
business organization. In order to break upon the computer network, different social
engineers technical flaws are elaborated in this research paper. In addition to this,
not only a single attacker but also, many other hackers name and their activities are
elaborated in this paper. In order to compromise with the company’s computer
network it is very much necessary to provide the frequent conversation. The different
security tools and technologies are elaborated in this research paper. I have selected
this paper because it illustrates the role of handling a human hacking and the
difference between ethical hacking and unethical hacking. After spending a complete
year in the prison he as under the supervision of the corporation network. He
interrupted the national defence warning system for stealing the corporate secrets.
This paper elaborates the role of ethical hackers but of the hackers make any kind of
unethical job, then how the system developers will get affected for that are also
elaborated in this paper. Though, now Mitnick was eventually caught and convicted
with a five year of prison sentence but this is not yet mentioned in this research
paper.

⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Week 6
Society is increasingly reliant on networks and network technologies but they are evolving at
a rapid pace. Find and summarise a resource that describes ONE example of a future
networking technology or trend that will impact society.
Title and Reference:
Why Java APIs and Industry-Standard CLIs are Different
Duda, K. (2017). Arista EOS Central - World's Most Advanced Network O/S – Blog.
[online] Eos.arista.com. Available at: https://eos.arista.com/blog/ [Accessed 27 Sep.
2017].
Summary:
I have selected this particular resource because it elaborates the modern G Lab
application to network interface. The future yield is increasing number of framework
for new protocol stacks. In order to develop proper communication between the
server side and the receiver side it is very much necessary for the system developers
to install proper communication medium and communication channel as well. In
order to get to know about whether the information is moving towards the correct
direction or not is elaborated in this research paper. In addition to this the two goals
those are elaborated in this paper include (1) separate application and networking
concerns, and (2) being suitable for any current and future networking technology. I
have realized that these two application level interface will provide an overview of the
G-Lab interface IT setup. The relationship between the service providers, applicants
and network stacks are elaborated in this paper. In order to make interaction
between the network stack registration and subscription are the two different
functions those are required to be done by the network developers. I have learned
that, the G-Lab project detail is elaborated
Title and Reference
Successful Social Media Marketing : How Company X, SUPER, promoted an event on
Facebook
Salonen, T. (2017). Successful Social Media Marketing : How Company X,
SUPER, promoted an event on Facebook.
[online] Theseus.fi. Available at: https://www.theseus.fi/handle/10024/112834
[Accessed 27 Sep. 2017].
Summary:
I have selected this resource because I think that the author of this paper has
elaborated the role of social media platform in marketing and product promoting. This
paper is focused on the promotion of the services of company X and SUPER. Due to
the rapid growth of internet technology it has been found that, for marketing and
promoting the products and services of companies most of the companies are
currently taking help from social media for promoting the products and services. The
name of the company changed because they are willing to remain anonymous. This
paper elaborates the role of social media for promoting the products through the help
of social media such as Facebook, twitter, Instagram etc. The owners have
developed a Facebook page and the consumers who are willing to know more about
the company. They are focused on their service and product details. I have found
that the key success factors of marketing campaigns through social media are
currently founded as the most effective one. Facebook and twitter are the social
Society is increasingly reliant on networks and network technologies but they are evolving at
a rapid pace. Find and summarise a resource that describes ONE example of a future
networking technology or trend that will impact society.
Title and Reference:
Why Java APIs and Industry-Standard CLIs are Different
Duda, K. (2017). Arista EOS Central - World's Most Advanced Network O/S – Blog.
[online] Eos.arista.com. Available at: https://eos.arista.com/blog/ [Accessed 27 Sep.
2017].
Summary:
I have selected this particular resource because it elaborates the modern G Lab
application to network interface. The future yield is increasing number of framework
for new protocol stacks. In order to develop proper communication between the
server side and the receiver side it is very much necessary for the system developers
to install proper communication medium and communication channel as well. In
order to get to know about whether the information is moving towards the correct
direction or not is elaborated in this research paper. In addition to this the two goals
those are elaborated in this paper include (1) separate application and networking
concerns, and (2) being suitable for any current and future networking technology. I
have realized that these two application level interface will provide an overview of the
G-Lab interface IT setup. The relationship between the service providers, applicants
and network stacks are elaborated in this paper. In order to make interaction
between the network stack registration and subscription are the two different
functions those are required to be done by the network developers. I have learned
that, the G-Lab project detail is elaborated
Title and Reference
Successful Social Media Marketing : How Company X, SUPER, promoted an event on
Salonen, T. (2017). Successful Social Media Marketing : How Company X,
SUPER, promoted an event on Facebook.
[online] Theseus.fi. Available at: https://www.theseus.fi/handle/10024/112834
[Accessed 27 Sep. 2017].
Summary:
I have selected this resource because I think that the author of this paper has
elaborated the role of social media platform in marketing and product promoting. This
paper is focused on the promotion of the services of company X and SUPER. Due to
the rapid growth of internet technology it has been found that, for marketing and
promoting the products and services of companies most of the companies are
currently taking help from social media for promoting the products and services. The
name of the company changed because they are willing to remain anonymous. This
paper elaborates the role of social media for promoting the products through the help
of social media such as Facebook, twitter, Instagram etc. The owners have
developed a Facebook page and the consumers who are willing to know more about
the company. They are focused on their service and product details. I have found
that the key success factors of marketing campaigns through social media are
currently founded as the most effective one. Facebook and twitter are the social
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

media platforms those are widely used by different companies for promoting their
brand products and services. In order to gain measurable success from the
competitive market all the success key factors are required to be considered
Week 8
With the advent of mass data collection and storage has come data mining. Find and
summarise a resource that describes ONE example where data mining has been used
successfully by a business. You should not use any examples covered in the textbook.
Title and Reference:
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion
Detection
Data Mining and Machine (2017). A Survey of Data Mining and Machine Learning
Methods for Cyber Security Intrusion Detection - IEEE Journals & Magazine.
[online] Ieeexplore.ieee.org. Available at:
http://ieeexplore.ieee.org/document/7307098/all-figures?reload=true [Accessed 27 Sep.
2017].
in this paper. However, security is another important aspect that is strictly required to
be considered by the author of the research paper. The limitation of the research
paper states that the author failed to promote all the necessary project applications.
Week 7
The text mentions social business and the impact of the use of social networking platforms.
Find and summarise a resource that describes the history of the development of ONE such
social media platform.
Summary:
Data mining is referred to as one of the most effective and secures process of data
security that provides enough range of security to their consumers and employees as
well. I have selected this resource because it elaborated the machine learning and
data mining for the cyber security intrusion detection. A very short tutorial on data
mining and machine learning are provided in this resource. The ML/DM data
complexities with the algorithm are elaborated in this report. Due to high level
security none of the internal and external unwanted users will be able to access data
from the server. This resource also elaborated the details of knowledge discovery
and data mining how act as an interdisciplinary area that is strictly focused upon
extraction of data from useful knowledge. With the explosive growth of online data
and IBM’s expansion of offering in services and consulting, the data based solution
are enhancing very much rapidly. I have selected this particular resource, because it
elaborates the role of data mining in business security. This particular resource,
focuses on the data mining function and operation of played by IBM. Cyber security
is one of the vital things that are considered by IBM. I learned that they have
developed different machine learning methods for cyber security and security
detection. Proper security protocol and computer network security are the other
things that that are used by IBM to keep the information secured from the external
attackers and cyber criminals.
brand products and services. In order to gain measurable success from the
competitive market all the success key factors are required to be considered
Week 8
With the advent of mass data collection and storage has come data mining. Find and
summarise a resource that describes ONE example where data mining has been used
successfully by a business. You should not use any examples covered in the textbook.
Title and Reference:
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion
Detection
Data Mining and Machine (2017). A Survey of Data Mining and Machine Learning
Methods for Cyber Security Intrusion Detection - IEEE Journals & Magazine.
[online] Ieeexplore.ieee.org. Available at:
http://ieeexplore.ieee.org/document/7307098/all-figures?reload=true [Accessed 27 Sep.
2017].
in this paper. However, security is another important aspect that is strictly required to
be considered by the author of the research paper. The limitation of the research
paper states that the author failed to promote all the necessary project applications.
Week 7
The text mentions social business and the impact of the use of social networking platforms.
Find and summarise a resource that describes the history of the development of ONE such
social media platform.
Summary:
Data mining is referred to as one of the most effective and secures process of data
security that provides enough range of security to their consumers and employees as
well. I have selected this resource because it elaborated the machine learning and
data mining for the cyber security intrusion detection. A very short tutorial on data
mining and machine learning are provided in this resource. The ML/DM data
complexities with the algorithm are elaborated in this report. Due to high level
security none of the internal and external unwanted users will be able to access data
from the server. This resource also elaborated the details of knowledge discovery
and data mining how act as an interdisciplinary area that is strictly focused upon
extraction of data from useful knowledge. With the explosive growth of online data
and IBM’s expansion of offering in services and consulting, the data based solution
are enhancing very much rapidly. I have selected this particular resource, because it
elaborates the role of data mining in business security. This particular resource,
focuses on the data mining function and operation of played by IBM. Cyber security
is one of the vital things that are considered by IBM. I learned that they have
developed different machine learning methods for cyber security and security
detection. Proper security protocol and computer network security are the other
things that that are used by IBM to keep the information secured from the external
attackers and cyber criminals.

Week 9
One of the greatest success stories in application development in recent times has been the
popularity of mobile apps. Find and summarise a resource that describes the story of ONE
successful mobile app developer.
Title and Reference:
Player Communities: Designing.
Player Communities (2017). Player Communities: Designing.
[online] Onlinelibrary.wiley.com. Available at:
http://onlinelibrary.wiley.com/doi/10.1111/drev.12033/epdf?
r3_referer=wol&tracking_action=preview_click&show_checkout=1&purchase_referrer=www.googl
e.co.in&purchase_site_license=LICENSE_DENIED [Accessed 27 Sep. 2017].
Summary:
I have selected this resource because this elaborates one of the recent successful
mobile application developers. It has become a popular mobile application to the
teenagers and young generation also for developing different community games.
This particular resource is based upon the mobile game developing app named as
supercell. This kind of games could be played even in mobile and tablets as well.
The developers are able to gain huge profit from the games. Most of the games
developed by the app developing community are played with the help of internet
service thus the developing companies are getting money from the internet services
and for the in game purchasing also they are getting profit. I have realized from the
design studies and design management research that apart from the popularity of
design games the design game approach was being largely ignored. Clash of clans
is the most recent game developed by the game developing app. The developer
looks into the branding and creativity as well.
Supercell, the mobile game developer belongs to Finland and the released games
are clash of clans, hay day, beech booms and clash royal. This is the highest
grossing application in the world. However, the game is keep n developing itself
every with different additional and attractive features. I have selected this resource
because supercell is one of the most popular games developing application in
current days. It provides enough security to the consumers. The code for the clients
is written in C and C++ and the server code in Java.
Week 10
While information systems and technology deliver many benefits to society, they can also
result in (sometimes inadvertent) negative effects and outcomes. Find and summarise a
resource that describes ONE example of where the use of an information system or
technology has led to negative consequences for humans.
Title and Reference
Are you addicted to Candy Crush Saga? An exploratory study linking psychological
factors to mobile social game addiction
Chen, C. and Leung, L. (2017). Are you addicted to Candy Crush Saga? An exploratory
study linking psychological factors to mobile social game addiction.
Online: https://www.deepdyve.com/lp/elsevier/are-you-addicted-to-candy-crush-saga-
an-exploratory-study-linking-dI8JjB8uIX
One of the greatest success stories in application development in recent times has been the
popularity of mobile apps. Find and summarise a resource that describes the story of ONE
successful mobile app developer.
Title and Reference:
Player Communities: Designing.
Player Communities (2017). Player Communities: Designing.
[online] Onlinelibrary.wiley.com. Available at:
http://onlinelibrary.wiley.com/doi/10.1111/drev.12033/epdf?
r3_referer=wol&tracking_action=preview_click&show_checkout=1&purchase_referrer=www.googl
e.co.in&purchase_site_license=LICENSE_DENIED [Accessed 27 Sep. 2017].
Summary:
I have selected this resource because this elaborates one of the recent successful
mobile application developers. It has become a popular mobile application to the
teenagers and young generation also for developing different community games.
This particular resource is based upon the mobile game developing app named as
supercell. This kind of games could be played even in mobile and tablets as well.
The developers are able to gain huge profit from the games. Most of the games
developed by the app developing community are played with the help of internet
service thus the developing companies are getting money from the internet services
and for the in game purchasing also they are getting profit. I have realized from the
design studies and design management research that apart from the popularity of
design games the design game approach was being largely ignored. Clash of clans
is the most recent game developed by the game developing app. The developer
looks into the branding and creativity as well.
Supercell, the mobile game developer belongs to Finland and the released games
are clash of clans, hay day, beech booms and clash royal. This is the highest
grossing application in the world. However, the game is keep n developing itself
every with different additional and attractive features. I have selected this resource
because supercell is one of the most popular games developing application in
current days. It provides enough security to the consumers. The code for the clients
is written in C and C++ and the server code in Java.
Week 10
While information systems and technology deliver many benefits to society, they can also
result in (sometimes inadvertent) negative effects and outcomes. Find and summarise a
resource that describes ONE example of where the use of an information system or
technology has led to negative consequences for humans.
Title and Reference
Are you addicted to Candy Crush Saga? An exploratory study linking psychological
factors to mobile social game addiction
Chen, C. and Leung, L. (2017). Are you addicted to Candy Crush Saga? An exploratory
study linking psychological factors to mobile social game addiction.
Online: https://www.deepdyve.com/lp/elsevier/are-you-addicted-to-candy-crush-saga-
an-exploratory-study-linking-dI8JjB8uIX
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 14
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.


