COIT 20246 Assignment - Week 1-4: Computer Science Concepts
VerifiedAdded on 2022/10/17
|13
|5506
|6
Homework Assignment
AI Summary
This document presents solutions for a COIT 20246 assignment, focusing on key computer science concepts across four weeks. Week 1 explores the differences between MIMD and SIMD architectures, with a summary of a resource comparing the two. Week 2 delves into deadlock avoidance, sp...

COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=965540
1
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=965540
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Example
The “Internet of things” is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Collect and summarise
an online resource that describes ONE example or application of the Internet of things.
Title, Link and Reference:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Lars, N 2014, ‘Connected Medical Devices, Apps: Are They Leading the IoT Revolution —
or Vice Versa?’, Wired, June 2014, viewed 1 February 2017,
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Note: You may use abbreviated URLs (to the website) in the reference, however you must
provide the FULL link above it that, when pasted into the Web Browser, will take the
marker directly to the resource. Using full URLs in the reference (as in this example) is fine
too.
Summary:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
This article describes the emergence of the Internet of Things (IoT) in the context of
medical devices. I chose this article because it not only examines the applications of a
very useful class of IoT devices, but it also highlights the need for ways of collecting and
processing the data they produce.
In the article, the author describes how many medical monitoring devices are now capable
of connecting to the Internet and are becoming a normal part of patient care. These
devices allow remote monitoring of patient health wirelessly and can collect data on a wide
range of vital signs and indicators. Data can be collected from a range of sensors reading
everything from heart rate and blood pressure through to blood sugar levels and
temperature.
In addition to passive monitors, IoT medical devices provide the ability to proactively
prompt patients to do things, for example to warn them of their blood pressure or to alert
them that they need more medication. The article points out that many of these
notifications are the result of apps (software) interacting with both the devices and the
patients.
Perhaps the most interesting aspect of the article is the author’s discussion of what
happens to the data that the IoT medical devices produce. The author explains that many
devices can send data directly to the cloud for storage and analysis and that this data
constitutes a wealth of information that will potentially improve healthcare in the future.
I found this article useful because it not only highlighted the increasing ubiquity of Internet-
connected medical devices, but also made me think about how the data is collected, where
it is stored and how it could be used – both positively and negatively – in the future.
2
The “Internet of things” is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Collect and summarise
an online resource that describes ONE example or application of the Internet of things.
Title, Link and Reference:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Lars, N 2014, ‘Connected Medical Devices, Apps: Are They Leading the IoT Revolution —
or Vice Versa?’, Wired, June 2014, viewed 1 February 2017,
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Note: You may use abbreviated URLs (to the website) in the reference, however you must
provide the FULL link above it that, when pasted into the Web Browser, will take the
marker directly to the resource. Using full URLs in the reference (as in this example) is fine
too.
Summary:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
This article describes the emergence of the Internet of Things (IoT) in the context of
medical devices. I chose this article because it not only examines the applications of a
very useful class of IoT devices, but it also highlights the need for ways of collecting and
processing the data they produce.
In the article, the author describes how many medical monitoring devices are now capable
of connecting to the Internet and are becoming a normal part of patient care. These
devices allow remote monitoring of patient health wirelessly and can collect data on a wide
range of vital signs and indicators. Data can be collected from a range of sensors reading
everything from heart rate and blood pressure through to blood sugar levels and
temperature.
In addition to passive monitors, IoT medical devices provide the ability to proactively
prompt patients to do things, for example to warn them of their blood pressure or to alert
them that they need more medication. The article points out that many of these
notifications are the result of apps (software) interacting with both the devices and the
patients.
Perhaps the most interesting aspect of the article is the author’s discussion of what
happens to the data that the IoT medical devices produce. The author explains that many
devices can send data directly to the cloud for storage and analysis and that this data
constitutes a wealth of information that will potentially improve healthcare in the future.
I found this article useful because it not only highlighted the increasing ubiquity of Internet-
connected medical devices, but also made me think about how the data is collected, where
it is stored and how it could be used – both positively and negatively – in the future.
2

Week 1
The text discusses about different architectures for parallel processing used for
Multiprocessor Machines such as multiple-instruction stream - multiple-data stream
(MIMD), single-instruction stream - multiple-data stream (SIMD) etc. Find and
summarise ONE resource that compares between MIMD and SIMD architectures.
The resource, and your summary, must focus only on MIMD and SIMD architectures.
Title, Link and Reference:
Difference between SIMD and MIMD
https://techdifferences.com/difference-between-simd-and-mimd.html
Tech Differences. (2019). Difference between SIMD and MIMD (with Comparison
Chart) - Tech Differences. [online] Available at:
https://techdifferences.com/difference-between-simd-and-mimd.html [Accessed 24
Sep. 2019].
Summary:
Difference between SIMD and MIMD
This article describes the differences between SIMD and MIMD. I chose this article
as it comprises of a proper chart of comparison, definition, main differences and
lastly the conclusion. It also involves all the advantages of both SIMD as well as
MIMD.
In this article, the author describes all the differences very well. SIMD is known to be
expanding to the multiple data of single instruction whereas MIMD expands to the
multiple data of multiple instruction. In case of SIMD, requirements of memory are
smaller, debugging is synchronous and the expense is also low. On the other hand,
requirements of memory is larger, debugging is multiple and the expense is medium.
The article comprises of all the various advantages of both MIMD and SIMD.
In MIMD, each of the elements of processing will be storing a copy of the particular
program which will be incrementing all the various requirements of the memory. On
the other hand, SIMD needs a much less memory as it will be storing only a single
program copy. MIMD is very much complex as well as efficient as per the
comparison is done with SIMD. The specific performance of both SIMD as well as
MIMD is known to be greatly affected by the implementation of the overlapping of CU
that will be dependent upon the uniformity.
It can be well said that SIMD will be far better performing in a case of the overlap of
the uniform control unit and in case of overlapping of the CU which will be non-
uniform MIMD will be much more effective. This article is very much useful as it
comprises of all the main differences in between SIMD and MIMD.
Week 2
The text discusses about one of the common problems that can arise during
resource allocation in operating systems, which is known as deadlock. Find and
summarise ONE resource that describes an algorithm of either deadlock avoidance
or deadlock prevention. The resource, and your summary, must focus on a single
algorithm of either deadlock avoidance or deadlock prevention, NOT both.
3
The text discusses about different architectures for parallel processing used for
Multiprocessor Machines such as multiple-instruction stream - multiple-data stream
(MIMD), single-instruction stream - multiple-data stream (SIMD) etc. Find and
summarise ONE resource that compares between MIMD and SIMD architectures.
The resource, and your summary, must focus only on MIMD and SIMD architectures.
Title, Link and Reference:
Difference between SIMD and MIMD
https://techdifferences.com/difference-between-simd-and-mimd.html
Tech Differences. (2019). Difference between SIMD and MIMD (with Comparison
Chart) - Tech Differences. [online] Available at:
https://techdifferences.com/difference-between-simd-and-mimd.html [Accessed 24
Sep. 2019].
Summary:
Difference between SIMD and MIMD
This article describes the differences between SIMD and MIMD. I chose this article
as it comprises of a proper chart of comparison, definition, main differences and
lastly the conclusion. It also involves all the advantages of both SIMD as well as
MIMD.
In this article, the author describes all the differences very well. SIMD is known to be
expanding to the multiple data of single instruction whereas MIMD expands to the
multiple data of multiple instruction. In case of SIMD, requirements of memory are
smaller, debugging is synchronous and the expense is also low. On the other hand,
requirements of memory is larger, debugging is multiple and the expense is medium.
The article comprises of all the various advantages of both MIMD and SIMD.
In MIMD, each of the elements of processing will be storing a copy of the particular
program which will be incrementing all the various requirements of the memory. On
the other hand, SIMD needs a much less memory as it will be storing only a single
program copy. MIMD is very much complex as well as efficient as per the
comparison is done with SIMD. The specific performance of both SIMD as well as
MIMD is known to be greatly affected by the implementation of the overlapping of CU
that will be dependent upon the uniformity.
It can be well said that SIMD will be far better performing in a case of the overlap of
the uniform control unit and in case of overlapping of the CU which will be non-
uniform MIMD will be much more effective. This article is very much useful as it
comprises of all the main differences in between SIMD and MIMD.
Week 2
The text discusses about one of the common problems that can arise during
resource allocation in operating systems, which is known as deadlock. Find and
summarise ONE resource that describes an algorithm of either deadlock avoidance
or deadlock prevention. The resource, and your summary, must focus on a single
algorithm of either deadlock avoidance or deadlock prevention, NOT both.
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Title, Link and Reference:
Dijkstra’s Banker’s algorithm detailed explanation
https://www.hackerearth.com/blog/developers/dijkstras-bankers-algorithm-detailed-explaination/
HackerEarth Blog. (2019). Dijkstra's Banker's algorithm detailed explanation |
HackerEarth Blog. [online] Available at:
https://www.hackerearth.com/blog/developers/dijkstras-bankers-algorithm-detailed-
explaination/ [Accessed 24 Sep. 2019].
Summary:
Dijkstra’s Banker’s algorithm detailed explanation
In this article, the resource is all about the Dijkstra’s Banker’s algorithm. It comprises
of a fully detailed explanation of it. This resource has been selected as it provides a
lot of information regarding the banker’s algorithm. There is a detailed explanation of
the algorithm and this resource also comprises of the banker’s algorithm utilising the
programming language C++.
This article describes that Banker’s algorithm is particularly referred to as the
algorithm of avoidance or the algorithm of Deadlock and this has been well
developed by Edsger Dijkstra. It is capable of testing the safety of the specific
allocation of all the possible resources which have been predetermined and it will
also be making a number of states for checking the condition of deadlock. There are
some scenarios which have been well presented depicting the deadlock and there is
also a situation of Unsafe state which has been clearly shown that can be solved
utilising the particular Banker’s Algorithm.
In this article, it has been said that for making the Banker’s algorithm work properly,
three different things must be well known. First is the amount of each resources
which each and every person can highly request [MAX]. Second is the amount of
each resource which each and every person will be recently holding [Allocated] and
lastly the amount of resource which will be available within the system for each
particular person [Available]. Hence, it can be said ultimately that we will be requiring
MAX and the REQUEST. NEED = MAX – ALLOCATED
A particular resource will be properly allocated only for a particular condition which
will be REQUEST < = AVAILABLE or otherwise it will be waiting till all the various
resources will be totally made available.
This article is capable of not only providing a detailed information regarding the
Dijkstra’s Banker’s algorithm but also shows the algorithm utilising the C++
programming language.
4
Dijkstra’s Banker’s algorithm detailed explanation
https://www.hackerearth.com/blog/developers/dijkstras-bankers-algorithm-detailed-explaination/
HackerEarth Blog. (2019). Dijkstra's Banker's algorithm detailed explanation |
HackerEarth Blog. [online] Available at:
https://www.hackerearth.com/blog/developers/dijkstras-bankers-algorithm-detailed-
explaination/ [Accessed 24 Sep. 2019].
Summary:
Dijkstra’s Banker’s algorithm detailed explanation
In this article, the resource is all about the Dijkstra’s Banker’s algorithm. It comprises
of a fully detailed explanation of it. This resource has been selected as it provides a
lot of information regarding the banker’s algorithm. There is a detailed explanation of
the algorithm and this resource also comprises of the banker’s algorithm utilising the
programming language C++.
This article describes that Banker’s algorithm is particularly referred to as the
algorithm of avoidance or the algorithm of Deadlock and this has been well
developed by Edsger Dijkstra. It is capable of testing the safety of the specific
allocation of all the possible resources which have been predetermined and it will
also be making a number of states for checking the condition of deadlock. There are
some scenarios which have been well presented depicting the deadlock and there is
also a situation of Unsafe state which has been clearly shown that can be solved
utilising the particular Banker’s Algorithm.
In this article, it has been said that for making the Banker’s algorithm work properly,
three different things must be well known. First is the amount of each resources
which each and every person can highly request [MAX]. Second is the amount of
each resource which each and every person will be recently holding [Allocated] and
lastly the amount of resource which will be available within the system for each
particular person [Available]. Hence, it can be said ultimately that we will be requiring
MAX and the REQUEST. NEED = MAX – ALLOCATED
A particular resource will be properly allocated only for a particular condition which
will be REQUEST < = AVAILABLE or otherwise it will be waiting till all the various
resources will be totally made available.
This article is capable of not only providing a detailed information regarding the
Dijkstra’s Banker’s algorithm but also shows the algorithm utilising the C++
programming language.
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Week 3
Internet of things (IoT) is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Find and
summarise ONE resource that describe applications of the Internet of things in the
field of Smart Farming. The resource, and your summary, must focus on application
of IoT ONLY in the field of smart farming.
Title, Link and Reference:
IoT applications in agriculture: the potential of smart farming on the current stage
https://medium.com/datadriveninvestor/iot-applications-in-agriculture-the-potential-of-smart-farming-on-
the-current-stage-275066f946d8
Medium. (2019). IoT applications in agriculture: the potential of smart farming on the
current stage. [online] Available at: https://medium.com/datadriveninvestor/iot-
applications-in-agriculture-the-potential-of-smart-farming-on-the-current-stage-
275066f946d8 [Accessed 24 Sep. 2019].
Summary:
IoT applications in agriculture: the potential of smart farming on the current stage
This article is all about the application of IoT in the agriculture. It actually depicts the
great potential of the specific smart farming process on the very recent stage. This
article is capable of showing the way IoT works in agriculture.
This article shows how IoT in agriculture actually works. It comprise of the concept of
IoT farming and all the various applications of IoT in agriculture involving the drone
assistance. The resource says that there are also a number of application of IoT for
that of the greenhouse farming as well. In this resource, there are several solutions
of the IoT agriculture as well for the management if livestock. IoT also possess its
benefits for the total chain of supply in the agriculture.
In the sphere of farming, there has been a great adoption of the smarter technology
which involves all the various sensors, control systems as well as several vehicles
which are totally autonomous. The special assistance of the drones in managing
various processes of the agriculture has been considered to be greatly impressive. It
will be helping a lot in taking care of the crop in a much better way. Both the drones
based ground and the aerial ones are utilised to a great extent. In this resources it
has been clearly depicted, the control of the climate can also be greatly achieved by
properly positioning all the various sensors that will be capable of sending a number
of alerts regarding problems of air or water. As per the controlling of livestock is
considered, IoT will be greatly assisting in the proper tracking of the specific state of
the herd. IoT agriculture also helps a lot in enabling the use of GPS for controlling the
transportation. In such a context, the total chain of supply can be incrementing the
effectiveness if it as well.
This article is really very much useful as it has been able to provide me with a
detailed information regarding all the different applications in the field of agriculture
and it shows all the ways how smart farming has been greatly helping in the recent
stage.
5
Internet of things (IoT) is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Find and
summarise ONE resource that describe applications of the Internet of things in the
field of Smart Farming. The resource, and your summary, must focus on application
of IoT ONLY in the field of smart farming.
Title, Link and Reference:
IoT applications in agriculture: the potential of smart farming on the current stage
https://medium.com/datadriveninvestor/iot-applications-in-agriculture-the-potential-of-smart-farming-on-
the-current-stage-275066f946d8
Medium. (2019). IoT applications in agriculture: the potential of smart farming on the
current stage. [online] Available at: https://medium.com/datadriveninvestor/iot-
applications-in-agriculture-the-potential-of-smart-farming-on-the-current-stage-
275066f946d8 [Accessed 24 Sep. 2019].
Summary:
IoT applications in agriculture: the potential of smart farming on the current stage
This article is all about the application of IoT in the agriculture. It actually depicts the
great potential of the specific smart farming process on the very recent stage. This
article is capable of showing the way IoT works in agriculture.
This article shows how IoT in agriculture actually works. It comprise of the concept of
IoT farming and all the various applications of IoT in agriculture involving the drone
assistance. The resource says that there are also a number of application of IoT for
that of the greenhouse farming as well. In this resource, there are several solutions
of the IoT agriculture as well for the management if livestock. IoT also possess its
benefits for the total chain of supply in the agriculture.
In the sphere of farming, there has been a great adoption of the smarter technology
which involves all the various sensors, control systems as well as several vehicles
which are totally autonomous. The special assistance of the drones in managing
various processes of the agriculture has been considered to be greatly impressive. It
will be helping a lot in taking care of the crop in a much better way. Both the drones
based ground and the aerial ones are utilised to a great extent. In this resources it
has been clearly depicted, the control of the climate can also be greatly achieved by
properly positioning all the various sensors that will be capable of sending a number
of alerts regarding problems of air or water. As per the controlling of livestock is
considered, IoT will be greatly assisting in the proper tracking of the specific state of
the herd. IoT agriculture also helps a lot in enabling the use of GPS for controlling the
transportation. In such a context, the total chain of supply can be incrementing the
effectiveness if it as well.
This article is really very much useful as it has been able to provide me with a
detailed information regarding all the different applications in the field of agriculture
and it shows all the ways how smart farming has been greatly helping in the recent
stage.
5

Week 4
The text discusses about IPv4, however, IPv6 is the emerging protocol which is in
the process of superseding IPv4. Find and summarise ONE resource that describes
about the technologies that are used to run both protocols simultaneously over the
same internet infrastructure.
Title, Link and Reference:
Five ways for IPv6 and IPv4 to peacefully co-exist
https://www.zdnet.com/article/five-ways-for-ipv6-and-ipv4-to-peacefully-co-exist/
Vaughan-Nichols, S. (2019). Five ways for IPv6 and IPv4 to peacefully co-exist |
ZDNet. [online] ZDNet. Available at: https://www.zdnet.com/article/five-ways-for-ipv6-
and-ipv4-to-peacefully-co-exist/ [Accessed 24 Sep. 2019].
Summary:
Five ways for IPv6 and IPv4 to peacefully co-exist
This article shows that the resource is all about describing all the various ways that
can be utilised for both the IPv6 and IPv4 to co-exist in a peaceful manner.
I have selected this article as it is capable of properly describing all the various ways
with the help of which both IPv4 as well IPv6 can be co-existing in a peaceful
manner. This article says that it may have been much easier if all the various
designers of TCP/IP network have made IPv6 backwardly compatible with that of the
IPv4 but they have not done this. This resource has been able to describe the ways
of co-existing both IPv4 as well IPv6 in a peaceful way.
In this article, it has been well said that IPv4 or IPv6 can be co-existing in one the
various three forms. First one is the dual stack where the hardware of the network
will be running both the IPv4 as well as IPv6 in a simultaneous manner. The second
one is when one will be able to be “tunnel” one particular protocol within the other
one. This actually means that IPv6 packets are taken and finally encapsulated in the
packets of IPv4. There is a NAT-PT which is known to be working just like the
concept of translating packets of IPv6 into the packets of IPv4. Later it has been
found that there is a way round ALG if any planning will be done for the deployment
of NAT-PT. With the use of stacks of Dual-IP, all the switches, routers as well as
various other devices can be run upon both the protocols. It must be remembered
that in this case IPv6 will be far better protocol. There can also be the utilisation of
DS-ALG which can be utilised as proxies that can be capable of providing translation
in between both the protocols over the particular internet of IPv4.
The article has been greatly useful as it has been able to provide all the needed
information regarding all the various ways by which both IPv4 as well as IPv6 can be
existing peacefully.
6
The text discusses about IPv4, however, IPv6 is the emerging protocol which is in
the process of superseding IPv4. Find and summarise ONE resource that describes
about the technologies that are used to run both protocols simultaneously over the
same internet infrastructure.
Title, Link and Reference:
Five ways for IPv6 and IPv4 to peacefully co-exist
https://www.zdnet.com/article/five-ways-for-ipv6-and-ipv4-to-peacefully-co-exist/
Vaughan-Nichols, S. (2019). Five ways for IPv6 and IPv4 to peacefully co-exist |
ZDNet. [online] ZDNet. Available at: https://www.zdnet.com/article/five-ways-for-ipv6-
and-ipv4-to-peacefully-co-exist/ [Accessed 24 Sep. 2019].
Summary:
Five ways for IPv6 and IPv4 to peacefully co-exist
This article shows that the resource is all about describing all the various ways that
can be utilised for both the IPv6 and IPv4 to co-exist in a peaceful manner.
I have selected this article as it is capable of properly describing all the various ways
with the help of which both IPv4 as well IPv6 can be co-existing in a peaceful
manner. This article says that it may have been much easier if all the various
designers of TCP/IP network have made IPv6 backwardly compatible with that of the
IPv4 but they have not done this. This resource has been able to describe the ways
of co-existing both IPv4 as well IPv6 in a peaceful way.
In this article, it has been well said that IPv4 or IPv6 can be co-existing in one the
various three forms. First one is the dual stack where the hardware of the network
will be running both the IPv4 as well as IPv6 in a simultaneous manner. The second
one is when one will be able to be “tunnel” one particular protocol within the other
one. This actually means that IPv6 packets are taken and finally encapsulated in the
packets of IPv4. There is a NAT-PT which is known to be working just like the
concept of translating packets of IPv6 into the packets of IPv4. Later it has been
found that there is a way round ALG if any planning will be done for the deployment
of NAT-PT. With the use of stacks of Dual-IP, all the switches, routers as well as
various other devices can be run upon both the protocols. It must be remembered
that in this case IPv6 will be far better protocol. There can also be the utilisation of
DS-ALG which can be utilised as proxies that can be capable of providing translation
in between both the protocols over the particular internet of IPv4.
The article has been greatly useful as it has been able to provide all the needed
information regarding all the various ways by which both IPv4 as well as IPv6 can be
existing peacefully.
6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Week 5
Network security has become a major concern of ICT world, and user authentication
is one of the popular tools to assure network security. Find and summarise ONE
resource that describes any ONE authentication mechanism except password. The
resource, and your summary, should focus purely on ONLY ONE type of
authentication mechanism.
Title, Link and Reference:
Biometrics: authentication & identification (definition, trends, use cases, laws and
latest news) - 2019 review
https://www.gemalto.com/govt/inspired/biometrics
Gemalto.com. (2019). Biometrics: A helpful illustrated overview (2019). [online]
Available at: https://www.gemalto.com/govt/inspired/biometrics [Accessed 24 Sep.
2019].
Summary:
Biometrics: authentication & identification (definition, trends, use cases, laws and
latest news) - 2019 review
This article shows the resource is all about biometrics and showing how it plays an
important role in both authentication as well as identification.
This article has been selected as it comprises of a detailed study regarding the
authentication as well as the identification done by the utilisation of Biometrics. It also
involves the proper definitions, various trends, use cases and also all the several
laws and news related to biometrics.
In this article, it has been well said that the biometric authentication is basically a
procedure with the help of which data can be greatly compared for all the various
characteristics of the person to that of the particular biometric template of the person
for the determination of the resemblance. The identification based upon biometrics
will be basically comprising of the determination of the identity of the person. The
resources depicts that there are a number of various trends which have been
observed in the use of biometrics.
This article has been very much useful as it has provided with a number of areas
where biometrics can be greatly utilised. It has been found that the areas where
biometrics play a great role are the enforcement of law, control of border, centres of
heath care, registration of population and the registration of voter. It has been known
that the worldwide market of biometrics is greatly expected to be about USD 50
billion by the year 2024 as per all the insights of the global market will be considered.
It has been noticed that there are a number of various benefits of utilising benefits
like the collection of several characteristics of human which will be measurable,
recordable, unique as well as permanent.
Week 6
The text discusses about a massive data breach that happened in Target company,
which is referred as ‘Target Breach’. Find and summarise ONE resource that
describes another recent (within last 5 years) well-publicised attack or security
breach on a public company or government organisation. The resource, and your
summary, should describe about A SINGLE EXAMPLE of security breach.
7
Network security has become a major concern of ICT world, and user authentication
is one of the popular tools to assure network security. Find and summarise ONE
resource that describes any ONE authentication mechanism except password. The
resource, and your summary, should focus purely on ONLY ONE type of
authentication mechanism.
Title, Link and Reference:
Biometrics: authentication & identification (definition, trends, use cases, laws and
latest news) - 2019 review
https://www.gemalto.com/govt/inspired/biometrics
Gemalto.com. (2019). Biometrics: A helpful illustrated overview (2019). [online]
Available at: https://www.gemalto.com/govt/inspired/biometrics [Accessed 24 Sep.
2019].
Summary:
Biometrics: authentication & identification (definition, trends, use cases, laws and
latest news) - 2019 review
This article shows the resource is all about biometrics and showing how it plays an
important role in both authentication as well as identification.
This article has been selected as it comprises of a detailed study regarding the
authentication as well as the identification done by the utilisation of Biometrics. It also
involves the proper definitions, various trends, use cases and also all the several
laws and news related to biometrics.
In this article, it has been well said that the biometric authentication is basically a
procedure with the help of which data can be greatly compared for all the various
characteristics of the person to that of the particular biometric template of the person
for the determination of the resemblance. The identification based upon biometrics
will be basically comprising of the determination of the identity of the person. The
resources depicts that there are a number of various trends which have been
observed in the use of biometrics.
This article has been very much useful as it has provided with a number of areas
where biometrics can be greatly utilised. It has been found that the areas where
biometrics play a great role are the enforcement of law, control of border, centres of
heath care, registration of population and the registration of voter. It has been known
that the worldwide market of biometrics is greatly expected to be about USD 50
billion by the year 2024 as per all the insights of the global market will be considered.
It has been noticed that there are a number of various benefits of utilising benefits
like the collection of several characteristics of human which will be measurable,
recordable, unique as well as permanent.
Week 6
The text discusses about a massive data breach that happened in Target company,
which is referred as ‘Target Breach’. Find and summarise ONE resource that
describes another recent (within last 5 years) well-publicised attack or security
breach on a public company or government organisation. The resource, and your
summary, should describe about A SINGLE EXAMPLE of security breach.
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Title, Link and Reference:
Everything you need to know Facebook’s data breach affecting 50M users
https://techcrunch.com/2018/09/28/everything-you-need-to-know-about-facebooks-data-breach-
affecting-50m-users/
TechCrunch. (2019). Everything you need to know about Facebook’s data breach
affecting 50M users – TechCrunch. [online] Available at:
https://techcrunch.com/2018/09/28/everything-you-need-to-know-about-facebooks-
data-breach-affecting-50m-users/ [Accessed 24 Sep. 2019].
Summary:
Everything you need to know Facebook’s data breach affecting 50M users
The article shows that the resource is all about showing that the data breach of
Facebook has been greatly affecting about 50M of the users.
I have selected this one as it has been able to provide with all the needed
information regarding the proper information regarding the data breach of Facebook
which have been greatly affecting about various users. It has been mentioned that
about 50 million users of Facebook have totally confirmed at a huge risk after various
hackers or attackers have been found to have greatly exploited a certain vulnerability
that has allowed all of them to obtain a direct access to all the data which are greatly
personal.
In this resource, it has been said that Facebook has actually obtained the fact that it
has been looking unlikely that all the various personal messages have been surely
accessed. There has been no information regarding the credit cards which have
been taken within the breach. There have been a number of questions which have
been asked like if there is any kind of need for changing the password or when has
this attack been taken place or who may be doing this and how are all the attackers
getting into all the information and if the problem will be fixed or not.
This article has been greatly useful as this one has been able to answer all of the
following asked questions by the users. All the users must be utilising Facebook with
a great care and must be remembered that the data breach of Facebook can be
greatly affecting the accounts of various users.
8
Everything you need to know Facebook’s data breach affecting 50M users
https://techcrunch.com/2018/09/28/everything-you-need-to-know-about-facebooks-data-breach-
affecting-50m-users/
TechCrunch. (2019). Everything you need to know about Facebook’s data breach
affecting 50M users – TechCrunch. [online] Available at:
https://techcrunch.com/2018/09/28/everything-you-need-to-know-about-facebooks-
data-breach-affecting-50m-users/ [Accessed 24 Sep. 2019].
Summary:
Everything you need to know Facebook’s data breach affecting 50M users
The article shows that the resource is all about showing that the data breach of
Facebook has been greatly affecting about 50M of the users.
I have selected this one as it has been able to provide with all the needed
information regarding the proper information regarding the data breach of Facebook
which have been greatly affecting about various users. It has been mentioned that
about 50 million users of Facebook have totally confirmed at a huge risk after various
hackers or attackers have been found to have greatly exploited a certain vulnerability
that has allowed all of them to obtain a direct access to all the data which are greatly
personal.
In this resource, it has been said that Facebook has actually obtained the fact that it
has been looking unlikely that all the various personal messages have been surely
accessed. There has been no information regarding the credit cards which have
been taken within the breach. There have been a number of questions which have
been asked like if there is any kind of need for changing the password or when has
this attack been taken place or who may be doing this and how are all the attackers
getting into all the information and if the problem will be fixed or not.
This article has been greatly useful as this one has been able to answer all of the
following asked questions by the users. All the users must be utilising Facebook with
a great care and must be remembered that the data breach of Facebook can be
greatly affecting the accounts of various users.
8

Week 7
The text briefly discusses about e-commerce and e-business. Find and summarise
ONE resource that discusses the relationship between e-commerce and e-business.
The resource, and your summary, should describe similarities and difference
between e-commerce and e-business.
Title, Link and Reference:
E-Business vs E-Commerce, Know the Differences
https://medium.com/@Magento_expert/e-business-vs-e-commerce-know-the-differences-
151ec9baf0fe
Medium. (2019). E-Business vs E-Commerce, Know The Differences. [online]
Available at: https://medium.com/@Magento_expert/e-business-vs-e-commerce-
know-the-differences-151ec9baf0fe [Accessed 24 Sep. 2019].
Summary:
E-Business vs E-Commerce, Know the Differences
The article is all about the difference the particular concept of E-Commerce and E-
business. I have chosen this article as it provides enough knowledge regarding both
the concepts of E-Commerce and E-Business and the advantages of them. This
resources however do not provides any comparison chart for understanding the
proper differences.
In this article, it has been well depicted that E-Commerce is basically a procedure of
both buying as well as selling which can be properly done online. Unlike all the
various physical stores, there is no need for any buyer as well as seller to directly
meet with each other in E-commerce for doing the whole selling as well as the
procedure of buying. There are a number of types of E-Commerce involving the B2B,
B2C, C2C, C2B, B2A and C2A.
This article says that E-business will be particularly referring to the utilisation of
internet, web as well as the intranet for the conduction of the business. However, it
has been known that E-business is very much same as E-Commerce but it will be
much more than just an act of both selling as well as buying several services upon
the internet. There are basically two kinds of E-business involving the Pure Play and
the Brick and click one.
This resource is really very much useful as it provides a great knowledge regarding
both the E-business and the E-commerce. The article says that both buying as well
as selling things upon the internet is called E-commerce and on the other hand E-
Business is not at all limited to only buying and selling of various activities. All the
various activities of business which are greatly conducted through the internet will be
entirely considered to be E-business. E-Commerce will be involving any kind of
transaction of business which will be directly related to the money but E-business will
be involving all the activities which will be both monetary as well as allied.
Week 8
The text book discusses about the success story of ARI (Automotive Resources
International) company after implementing SAP BusinessObjects Explorer and
9
The text briefly discusses about e-commerce and e-business. Find and summarise
ONE resource that discusses the relationship between e-commerce and e-business.
The resource, and your summary, should describe similarities and difference
between e-commerce and e-business.
Title, Link and Reference:
E-Business vs E-Commerce, Know the Differences
https://medium.com/@Magento_expert/e-business-vs-e-commerce-know-the-differences-
151ec9baf0fe
Medium. (2019). E-Business vs E-Commerce, Know The Differences. [online]
Available at: https://medium.com/@Magento_expert/e-business-vs-e-commerce-
know-the-differences-151ec9baf0fe [Accessed 24 Sep. 2019].
Summary:
E-Business vs E-Commerce, Know the Differences
The article is all about the difference the particular concept of E-Commerce and E-
business. I have chosen this article as it provides enough knowledge regarding both
the concepts of E-Commerce and E-Business and the advantages of them. This
resources however do not provides any comparison chart for understanding the
proper differences.
In this article, it has been well depicted that E-Commerce is basically a procedure of
both buying as well as selling which can be properly done online. Unlike all the
various physical stores, there is no need for any buyer as well as seller to directly
meet with each other in E-commerce for doing the whole selling as well as the
procedure of buying. There are a number of types of E-Commerce involving the B2B,
B2C, C2C, C2B, B2A and C2A.
This article says that E-business will be particularly referring to the utilisation of
internet, web as well as the intranet for the conduction of the business. However, it
has been known that E-business is very much same as E-Commerce but it will be
much more than just an act of both selling as well as buying several services upon
the internet. There are basically two kinds of E-business involving the Pure Play and
the Brick and click one.
This resource is really very much useful as it provides a great knowledge regarding
both the E-business and the E-commerce. The article says that both buying as well
as selling things upon the internet is called E-commerce and on the other hand E-
Business is not at all limited to only buying and selling of various activities. All the
various activities of business which are greatly conducted through the internet will be
entirely considered to be E-business. E-Commerce will be involving any kind of
transaction of business which will be directly related to the money but E-business will
be involving all the activities which will be both monetary as well as allied.
Week 8
The text book discusses about the success story of ARI (Automotive Resources
International) company after implementing SAP BusinessObjects Explorer and
9
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

integrating it with HANA. HANA is SAP’s in-memory computing platform that is
deployable as an on-premise hardware and software appliance or in the cloud. Find
and summarise ONE resource that describes the success story of adapting SAP
HANA by another local or international company. The resource, and your summary,
should focus on the story about ONE single company (which is not ARI company).
Title, Link and Reference:
SAP HANA Migration: Our LB Foster Success Story
https://www.protera.com/sap-blog/sap-hana-migration-lb-foster
Krutikov, A. and Krutikov, A. (2019). SAP HANA Migration Case Study: Our LB
Foster Success Story. [online] Protera Technologies. Available at:
https://www.protera.com/sap-blog/sap-hana-migration-lb-foster [Accessed 24 Sep.
2019].
Summary:
This article is all about SAP HANA migration. The resource comprise of the particular
case study which has been showing the way of the successful migration of SAP
HANA in a time period of less than four months.
The article has been selected as it has been capable of setting up the particular
stage where LB Foster has been a great provider of the solution of infrastructure for
rail as well as construction and also capable of showing all the various challenges
faced during the migration of SAP HANA. Apart from all the different challenges, it
has been capable of showing all the various ways of overcoming all the different
challenges of the migration of Hana with that of the Flex Bridge.
This article has been able to depict a kind of unforseen challenge which has been
observed during the migration which is the problem of licensing. In this resource, it
has been said that the migration of SAP HANA is not at all required to be a source of
headache any further. The technology of SAP and the methodology of the
management of project has totally removed all the various challenges of the
transfers. FlexBridge has been observed to have taken up several things step by
step by involving the technology of SAP and the tools of cutting edge into the total
solution of the migration.
This resource has been very much resourceful it has been able to portray that
whenever anyone will be accomplishing the entire transfer in one project over a
period of few months, Protera can be making the procedure totally painless as well
as effective of cost.
10
deployable as an on-premise hardware and software appliance or in the cloud. Find
and summarise ONE resource that describes the success story of adapting SAP
HANA by another local or international company. The resource, and your summary,
should focus on the story about ONE single company (which is not ARI company).
Title, Link and Reference:
SAP HANA Migration: Our LB Foster Success Story
https://www.protera.com/sap-blog/sap-hana-migration-lb-foster
Krutikov, A. and Krutikov, A. (2019). SAP HANA Migration Case Study: Our LB
Foster Success Story. [online] Protera Technologies. Available at:
https://www.protera.com/sap-blog/sap-hana-migration-lb-foster [Accessed 24 Sep.
2019].
Summary:
This article is all about SAP HANA migration. The resource comprise of the particular
case study which has been showing the way of the successful migration of SAP
HANA in a time period of less than four months.
The article has been selected as it has been capable of setting up the particular
stage where LB Foster has been a great provider of the solution of infrastructure for
rail as well as construction and also capable of showing all the various challenges
faced during the migration of SAP HANA. Apart from all the different challenges, it
has been capable of showing all the various ways of overcoming all the different
challenges of the migration of Hana with that of the Flex Bridge.
This article has been able to depict a kind of unforseen challenge which has been
observed during the migration which is the problem of licensing. In this resource, it
has been said that the migration of SAP HANA is not at all required to be a source of
headache any further. The technology of SAP and the methodology of the
management of project has totally removed all the various challenges of the
transfers. FlexBridge has been observed to have taken up several things step by
step by involving the technology of SAP and the tools of cutting edge into the total
solution of the migration.
This resource has been very much resourceful it has been able to portray that
whenever anyone will be accomplishing the entire transfer in one project over a
period of few months, Protera can be making the procedure totally painless as well
as effective of cost.
10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Week 9
Rapid application development (RAD) is a process of creating a workable system in
a very short period of time. There are few recently developed frameworks available in
market to undertake RAD. Find and summarise ONE recent (within last two years)
resource that describes and recommends about ONE framework for RAD.
Title, Link and Reference:
How Zoho Creator accelerates software delivery
https://www.infoworld.com/article/3407741/how-zoho-creator-accelerates-software-delivery.html
Nizam, H. (2019). How Zoho Creator accelerates software delivery. [online]
InfoWorld. Available at: https://www.infoworld.com/article/3407741/how-zoho-
creator-accelerates-software-delivery.html [Accessed 24 Sep. 2019].
Summary:
How Zoho Creator accelerates software delivery
This article is all about how the Zoho Creator will be accelerating the delivery of
software.
The article has been selected as it is capable of depicting the way Zoho Creator will
be accelerating the delivery of the software. This article says that Zoho creator is
basically an app builder which is based upon cloud that is capable of handling the
total life style of the application starting from the ideation as well as the development
of both management as well as delivery such that no one have to properly juggle
various tools.
This article will be describing how Zoho Creator will be providing a particular abstract
and also a strong environment for all the various developers in driving directly into
the logic of the application by skipping all the various infrastructures as well as
databases and also all other implementations which are tedious. With the help of the
combination of all the various tools which are visual and the traditional environment
of coding, Zoho Creator will be greatly allowing the developer to properly configure
the tedious and the code the fascinating.
Most of the platforms which possess lower code are known to be well offering all the
various builders which are visual for both the front and the back-end development.
Utilising all of such builders, one can be able to directly fast forward the specific kind
of the creation of all the various common elements of UI like the pages, forms as well
as the dashboards and also help a lot in configuring all the various components of
the back-end like all the integrations, flows of work and the portals of the customers
in only a very few clicks.
This resource is really very much helpful as it has been capable of offering all the
ways with the help of which Zoho creator will be able to greatly speed up the
development.
Week 10
The failure to successfully implement large scale IS has led to the downfall of many
previously successful companies. Find and summarise ONE resource that describes
few reasons of implementation failure for large scale IS. The resource, and your
11
Rapid application development (RAD) is a process of creating a workable system in
a very short period of time. There are few recently developed frameworks available in
market to undertake RAD. Find and summarise ONE recent (within last two years)
resource that describes and recommends about ONE framework for RAD.
Title, Link and Reference:
How Zoho Creator accelerates software delivery
https://www.infoworld.com/article/3407741/how-zoho-creator-accelerates-software-delivery.html
Nizam, H. (2019). How Zoho Creator accelerates software delivery. [online]
InfoWorld. Available at: https://www.infoworld.com/article/3407741/how-zoho-
creator-accelerates-software-delivery.html [Accessed 24 Sep. 2019].
Summary:
How Zoho Creator accelerates software delivery
This article is all about how the Zoho Creator will be accelerating the delivery of
software.
The article has been selected as it is capable of depicting the way Zoho Creator will
be accelerating the delivery of the software. This article says that Zoho creator is
basically an app builder which is based upon cloud that is capable of handling the
total life style of the application starting from the ideation as well as the development
of both management as well as delivery such that no one have to properly juggle
various tools.
This article will be describing how Zoho Creator will be providing a particular abstract
and also a strong environment for all the various developers in driving directly into
the logic of the application by skipping all the various infrastructures as well as
databases and also all other implementations which are tedious. With the help of the
combination of all the various tools which are visual and the traditional environment
of coding, Zoho Creator will be greatly allowing the developer to properly configure
the tedious and the code the fascinating.
Most of the platforms which possess lower code are known to be well offering all the
various builders which are visual for both the front and the back-end development.
Utilising all of such builders, one can be able to directly fast forward the specific kind
of the creation of all the various common elements of UI like the pages, forms as well
as the dashboards and also help a lot in configuring all the various components of
the back-end like all the integrations, flows of work and the portals of the customers
in only a very few clicks.
This resource is really very much helpful as it has been capable of offering all the
ways with the help of which Zoho creator will be able to greatly speed up the
development.
Week 10
The failure to successfully implement large scale IS has led to the downfall of many
previously successful companies. Find and summarise ONE resource that describes
few reasons of implementation failure for large scale IS. The resource, and your
11

summary, should analyse at least three reasons of the failure.
Title, Link and Reference:
The Real Reasons why ERP Systems Fail
https://www.reliableplant.com/Read/10733/real-reasons-why-erp-systems-fail
Reliableplant.com. (2019). The Real Reasons Why ERP Systems Fail. [online]
Available at: https://www.reliableplant.com/Read/10733/real-reasons-why-erp-
systems-fail [Accessed 24 Sep. 2019].
Summary:
The Real Reasons why ERP Systems Fail
This article is all about delivering all the various real reasons of the failure of the
systems of ERP.
The article says that software greatly fails to directly achieve the promise because of
the reluctance of alternation by all the various people who have actually vested a lot
of interest in all the different procedures which have been existing. This greatly leads
towards a costly modifications of program for replicating all of those various
procedures.
It has been observed that once the system of ERP will be chosen, it will not at all be
uncommon for managing towards turning the entire project over the particular
subordinate for the management of the implementation. The subordinate is not
provided with the authority of implementing all the various needed alternations of the
business procedures. It also happens that once the manager of project is opted,
several companies greatly tie all of their hands by providing less fund all of their
huge efforts or rather by limiting the particular scope with the help of various
schedules of project which will be impractical. Back-scheduling of the project of ERP
can also be resulting in very short attention to all the various details. The last reason
which may result in the failure of ERP systems is the lack of proper training as well
as education.
This article is really very much resourceful as it has been able to provide with all the
various details regarding the various reason which directly leads towards the failure
of the systems. All of these reasons which have been depicted must be well taken
care of so that all the failures can be prevented earlier.
12
Title, Link and Reference:
The Real Reasons why ERP Systems Fail
https://www.reliableplant.com/Read/10733/real-reasons-why-erp-systems-fail
Reliableplant.com. (2019). The Real Reasons Why ERP Systems Fail. [online]
Available at: https://www.reliableplant.com/Read/10733/real-reasons-why-erp-
systems-fail [Accessed 24 Sep. 2019].
Summary:
The Real Reasons why ERP Systems Fail
This article is all about delivering all the various real reasons of the failure of the
systems of ERP.
The article says that software greatly fails to directly achieve the promise because of
the reluctance of alternation by all the various people who have actually vested a lot
of interest in all the different procedures which have been existing. This greatly leads
towards a costly modifications of program for replicating all of those various
procedures.
It has been observed that once the system of ERP will be chosen, it will not at all be
uncommon for managing towards turning the entire project over the particular
subordinate for the management of the implementation. The subordinate is not
provided with the authority of implementing all the various needed alternations of the
business procedures. It also happens that once the manager of project is opted,
several companies greatly tie all of their hands by providing less fund all of their
huge efforts or rather by limiting the particular scope with the help of various
schedules of project which will be impractical. Back-scheduling of the project of ERP
can also be resulting in very short attention to all the various details. The last reason
which may result in the failure of ERP systems is the lack of proper training as well
as education.
This article is really very much resourceful as it has been able to provide with all the
various details regarding the various reason which directly leads towards the failure
of the systems. All of these reasons which have been depicted must be well taken
care of so that all the failures can be prevented earlier.
12
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

MARKING SHEET - DO NOT DELETE
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content/contains content not contained in the resource) OR
Multiple resources used for a single task
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
13
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content/contains content not contained in the resource) OR
Multiple resources used for a single task
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
13
1 out of 13
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.