COIT20246 Assignment: Summaries of Online Resources for Weeks 1 to 6
VerifiedAdded on 2022/10/06
|12
|4415
|15
Homework Assignment
AI Summary
This assignment comprises summaries of online resources addressing various computer science topics. Week 1 focuses on parallel processing architectures, contrasting SIMD and MIMD. Week 2 examines deadlock, specifically the Banker's algorithm for avoidance. Week 3 explores IoT applications in smart farming. Week 4 discusses IPv4 and IPv6 protocols and their coexistence. Week 5 covers biometric authentication as a network security measure. Week 6 analyzes a data breach, specifically the Cambridge Analytica-Facebook incident. Each summary includes the resource title, link, reference, and a concise overview of the main points, explaining the rationale behind the resource selection. This assignment provides a comprehensive overview of key computer science concepts, providing valuable insights and knowledge.

Week 1
The text discusses about different architectures for parallel processing used for
Multiprocessor Machines such as multiple-instruction stream - multiple-data stream
(MIMD), single-instruction stream - multiple-data stream (SIMD) etc. Find and summarise
ONE resource that compares between MIMD and SIMD architectures. The resource, and
your summary, must focus only on MIMD and SIMD architectures.
Title, Link and Reference:
Difference between SIMD and MIMD
https://techdifferences.com/difference-between-simd-and-mimd.html
Tech-differences, 2019. Difference between SIMD and MIMD. [Online] Available at:
https://techdifferences.com/difference-between-simd-and-mimd.html[Accessed 14 August 2019].
Summary:
In this article, the author has described the emergence of the SIMD and MIMD architecture
for parallel processing that is used in the multiprocessor machines. I chose this article
because it provides details about parallel processing and other things, which are related to
the SIMD and MIMD architecture. In addition, the complexity of an architecture is simple in
SIMD as compared to the MIMD architecture.
In the article, the author describes how SIMD and MIMD architectures are used in parallel
processing. It can use for the distributed memory and shared memory. There are four
categories of this architecture that is based on Flynn’s taxonomy.
In addition to parallel processing and distributed memory, SIMD architecture is the best
model for every processing element. In this architecture, each processor processes its
own local memory. It has a drawback that is performance time. However, data transfer has
handled by the controlling unit.
The authors have explained the implementation architecture of SIMD, which has two
types, such as true and pipelined. In the case of MIMD, it has two types, which are shared
memory MIMD, and distributed memory MIMD architecture. Besides, scalability in size and
performance is available in SIMD but MIMD has a complex size with good performance.
There is various advantage of parallel processing.
I learned that this article is useful for learning about the SIMD and MIMD as well as it has
described the SIMD and MIMD architectures and their difference based on different
features both positively and negatively in the future as well.
1
The text discusses about different architectures for parallel processing used for
Multiprocessor Machines such as multiple-instruction stream - multiple-data stream
(MIMD), single-instruction stream - multiple-data stream (SIMD) etc. Find and summarise
ONE resource that compares between MIMD and SIMD architectures. The resource, and
your summary, must focus only on MIMD and SIMD architectures.
Title, Link and Reference:
Difference between SIMD and MIMD
https://techdifferences.com/difference-between-simd-and-mimd.html
Tech-differences, 2019. Difference between SIMD and MIMD. [Online] Available at:
https://techdifferences.com/difference-between-simd-and-mimd.html[Accessed 14 August 2019].
Summary:
In this article, the author has described the emergence of the SIMD and MIMD architecture
for parallel processing that is used in the multiprocessor machines. I chose this article
because it provides details about parallel processing and other things, which are related to
the SIMD and MIMD architecture. In addition, the complexity of an architecture is simple in
SIMD as compared to the MIMD architecture.
In the article, the author describes how SIMD and MIMD architectures are used in parallel
processing. It can use for the distributed memory and shared memory. There are four
categories of this architecture that is based on Flynn’s taxonomy.
In addition to parallel processing and distributed memory, SIMD architecture is the best
model for every processing element. In this architecture, each processor processes its
own local memory. It has a drawback that is performance time. However, data transfer has
handled by the controlling unit.
The authors have explained the implementation architecture of SIMD, which has two
types, such as true and pipelined. In the case of MIMD, it has two types, which are shared
memory MIMD, and distributed memory MIMD architecture. Besides, scalability in size and
performance is available in SIMD but MIMD has a complex size with good performance.
There is various advantage of parallel processing.
I learned that this article is useful for learning about the SIMD and MIMD as well as it has
described the SIMD and MIMD architectures and their difference based on different
features both positively and negatively in the future as well.
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Week 2
The text discusses about one of the common problems that can arise during resource
allocation in operating systems, which is known as deadlock. Find and summarise ONE
resource that describes an algorithm of either deadlock avoidance or deadlock
prevention. The resource, and your summary, must focus on a single algorithm of either
deadlock avoidance or deadlock prevention, NOT both.
Title, Link and Reference:
What is Banker's Algorithm?.
https://www.studytonight.com/operating-system/bankers-algorithm
Study-tonight, 2018. What is Banker's Algorithm?. [Online]
Available at: https://www.studytonight.com/operating-system/bankers-algorithm
[Accessed 29 August 2019].
Summary:
This article describes the resource allocation in the operating system and it is necessary
to manage various resources properly. There are many advantages of resource allocation
in the operation system, such as no deadlock, resource management.
There are various types of algorithms for deadlock prevention.
The author describes how the algorithm can be used to avoid deadlock using deadlock
prevention algorithms.
In addition, deadlock avoidance can be managed by banker’s algorithm. It will provide
help in managing the resource for various processes.
Authors have explained about deadlock prevention and its advantages it is the better way
to manage resources and prevent the whole system from deadlock. It is the best way to
manage resources in a proper way. It is beneficial for deadlock avoidance. In addition, it is
also useful for resource management. There are various other types of methods for
deadlock avoidance but banker’s algorithm is the best solution for deadlock avoidance.
This article is beneficial because it has provided knowledge about resource allocation and
deadlock prevention. There is various advantage of banker’s algorithm for the
management of resources, such as no deadlock, proper process management, and many
more. In addition, banker’s algorithm finds four things, which are available, need, max,
and allocation. It is the best way to identify all the things properly. It will provide better
resource allocation.in addition, operating system has been used the deadlock
management for resource allocation. Thus, all the resources have managed by the
banker’s algorithm. It will manage all the resources in a proper manner.
2
The text discusses about one of the common problems that can arise during resource
allocation in operating systems, which is known as deadlock. Find and summarise ONE
resource that describes an algorithm of either deadlock avoidance or deadlock
prevention. The resource, and your summary, must focus on a single algorithm of either
deadlock avoidance or deadlock prevention, NOT both.
Title, Link and Reference:
What is Banker's Algorithm?.
https://www.studytonight.com/operating-system/bankers-algorithm
Study-tonight, 2018. What is Banker's Algorithm?. [Online]
Available at: https://www.studytonight.com/operating-system/bankers-algorithm
[Accessed 29 August 2019].
Summary:
This article describes the resource allocation in the operating system and it is necessary
to manage various resources properly. There are many advantages of resource allocation
in the operation system, such as no deadlock, resource management.
There are various types of algorithms for deadlock prevention.
The author describes how the algorithm can be used to avoid deadlock using deadlock
prevention algorithms.
In addition, deadlock avoidance can be managed by banker’s algorithm. It will provide
help in managing the resource for various processes.
Authors have explained about deadlock prevention and its advantages it is the better way
to manage resources and prevent the whole system from deadlock. It is the best way to
manage resources in a proper way. It is beneficial for deadlock avoidance. In addition, it is
also useful for resource management. There are various other types of methods for
deadlock avoidance but banker’s algorithm is the best solution for deadlock avoidance.
This article is beneficial because it has provided knowledge about resource allocation and
deadlock prevention. There is various advantage of banker’s algorithm for the
management of resources, such as no deadlock, proper process management, and many
more. In addition, banker’s algorithm finds four things, which are available, need, max,
and allocation. It is the best way to identify all the things properly. It will provide better
resource allocation.in addition, operating system has been used the deadlock
management for resource allocation. Thus, all the resources have managed by the
banker’s algorithm. It will manage all the resources in a proper manner.
2

Week 3
Internet of things (IoT) is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Find and summarise
ONE resource that describe applications of the Internet of things in the field of Smart
Farming. The resource, and your summary, must focus on application of IoT ONLY in the
field of smart farming.
Title, Link and Reference:
Smart Farming, or the Future of Agriculture
https://medium.com/sciforce/smart-farming-or-the-future-of-agriculture-
359f0089df69Sciforce, 2019. Smart Farming, or the Future of Agriculture. [Online]
Available at: https://medium.com/sciforce/smart-farming-or-the-future-of-agriculture-
359f0089df69[Accessed 14 August 2019].
Summary:
The authors have explained about the IoT in this article. This article has described the
design and implementation of smart farming using the Internet of Things (IoT). It has
described the role of IoT in the farming field. IoT devices provide help into the
identification of various things, such as water level, the timing of water, and other seniors.
In the article, the author describes can IoT used in the field of farming, which is called
smart farming. In addition, in the upcoming time, that concept will more popular and
beneficial for the farmers.
The authors have explained about smart farming and its advantages. There are many
benefits of smart farming, such as proper knowledge about plants and their various
attributes.
The farmers through drones can input the information on what subject they want to
survey. Choose an altitude or ground decision from which they what information about the
fields. From the statistics gathered through the drone, beneficial insights may be drawn on
various factors inclusive of plant counting and yield prediction, plant health indices, plant
height measurement, cover mapping, nitrogen content in wheat, drainage mapping, and
so on. The drone collects data and images, which are thermal, multispectral and visual
throughout the flight after which lands on the same place it took off to start with.
I use this article because it has described that IoT devices and sensors can be useful in
smart farming. There are many advantages of IoT sensors and devices, such as RFID,
and other things.
3
Internet of things (IoT) is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Find and summarise
ONE resource that describe applications of the Internet of things in the field of Smart
Farming. The resource, and your summary, must focus on application of IoT ONLY in the
field of smart farming.
Title, Link and Reference:
Smart Farming, or the Future of Agriculture
https://medium.com/sciforce/smart-farming-or-the-future-of-agriculture-
359f0089df69Sciforce, 2019. Smart Farming, or the Future of Agriculture. [Online]
Available at: https://medium.com/sciforce/smart-farming-or-the-future-of-agriculture-
359f0089df69[Accessed 14 August 2019].
Summary:
The authors have explained about the IoT in this article. This article has described the
design and implementation of smart farming using the Internet of Things (IoT). It has
described the role of IoT in the farming field. IoT devices provide help into the
identification of various things, such as water level, the timing of water, and other seniors.
In the article, the author describes can IoT used in the field of farming, which is called
smart farming. In addition, in the upcoming time, that concept will more popular and
beneficial for the farmers.
The authors have explained about smart farming and its advantages. There are many
benefits of smart farming, such as proper knowledge about plants and their various
attributes.
The farmers through drones can input the information on what subject they want to
survey. Choose an altitude or ground decision from which they what information about the
fields. From the statistics gathered through the drone, beneficial insights may be drawn on
various factors inclusive of plant counting and yield prediction, plant health indices, plant
height measurement, cover mapping, nitrogen content in wheat, drainage mapping, and
so on. The drone collects data and images, which are thermal, multispectral and visual
throughout the flight after which lands on the same place it took off to start with.
I use this article because it has described that IoT devices and sensors can be useful in
smart farming. There are many advantages of IoT sensors and devices, such as RFID,
and other things.
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Week 4
The text discusses about IPv4, however, IPv6 is the emerging protocol, which is in the
process of superseding IPv4. Find and summarise ONE resource that describes about the
technologies that are used to run both protocols simultaneously over the same internet
infrastructure.
Title, Link and Reference:
IPv4 to IPv6 Protocol Upgrade: How to Answer "Should I Enable IPv6?.
https://biztechmagazine.com/article/2017/07/ipv4-ipv6-protocol-upgrade-are-you-ipv6-
ready
Goldstein, P., 2017. IPv4 to IPv6 Protocol Upgrade: How to Answer "Should I Enable
IPv6?. [Online]
Available at: https://biztechmagazine.com/article/2017/07/ipv4-ipv6-protocol-upgrade-are-
you-ipv6-ready
[Accessed 29 August 2019].
Summary:
This article describes the IPv4 and IPv6 protocol in the same network infrastructure. It has
described the advantages of tunneling between IPv4 and IPv6 protocols.
The author describes the advantages of IPv6 over IPv4. There are many advantages of
the IPv6 protocol, such as addressing, subnetting, and many others. In this article, the
uses of IPv6 protocol for the enterprise has described in detail with its various advantages.
IPv6 is the state-of-the-art version of the net Protocol, which identifies devices throughout
the net so they may be positioned. Each tool that makes use of the internet is identified via
its own IP address in order for the net conversation to other.
In that respect, it is much like the road addresses and zip codes you want to realize that
allows you to mail a letter.
The previous version, IPv4, uses a 32-bit addressing scheme to guide 4.three billion
devices, which turned into a notion to be enough. However, the growth of the internet,
non-public computer systems, smartphones and now net of things devices proves that the
arena wished greater addresses.
There are many other benefits of the Ipv6 protocol architecture for the organization. In
addition, there are different features of this protocol for management of various devices.
Authors have explained about Internet Protocol (IP) uses in the network and it has
explained about the communication between both protocols.
It is useful because it has provided a proper synchronization between both IPv6 and IPv4
protocol for the same architecture. It is also used in the progress of knowledge in a
positive way.
4
The text discusses about IPv4, however, IPv6 is the emerging protocol, which is in the
process of superseding IPv4. Find and summarise ONE resource that describes about the
technologies that are used to run both protocols simultaneously over the same internet
infrastructure.
Title, Link and Reference:
IPv4 to IPv6 Protocol Upgrade: How to Answer "Should I Enable IPv6?.
https://biztechmagazine.com/article/2017/07/ipv4-ipv6-protocol-upgrade-are-you-ipv6-
ready
Goldstein, P., 2017. IPv4 to IPv6 Protocol Upgrade: How to Answer "Should I Enable
IPv6?. [Online]
Available at: https://biztechmagazine.com/article/2017/07/ipv4-ipv6-protocol-upgrade-are-
you-ipv6-ready
[Accessed 29 August 2019].
Summary:
This article describes the IPv4 and IPv6 protocol in the same network infrastructure. It has
described the advantages of tunneling between IPv4 and IPv6 protocols.
The author describes the advantages of IPv6 over IPv4. There are many advantages of
the IPv6 protocol, such as addressing, subnetting, and many others. In this article, the
uses of IPv6 protocol for the enterprise has described in detail with its various advantages.
IPv6 is the state-of-the-art version of the net Protocol, which identifies devices throughout
the net so they may be positioned. Each tool that makes use of the internet is identified via
its own IP address in order for the net conversation to other.
In that respect, it is much like the road addresses and zip codes you want to realize that
allows you to mail a letter.
The previous version, IPv4, uses a 32-bit addressing scheme to guide 4.three billion
devices, which turned into a notion to be enough. However, the growth of the internet,
non-public computer systems, smartphones and now net of things devices proves that the
arena wished greater addresses.
There are many other benefits of the Ipv6 protocol architecture for the organization. In
addition, there are different features of this protocol for management of various devices.
Authors have explained about Internet Protocol (IP) uses in the network and it has
explained about the communication between both protocols.
It is useful because it has provided a proper synchronization between both IPv6 and IPv4
protocol for the same architecture. It is also used in the progress of knowledge in a
positive way.
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Week 5
Network security has become a major concern of ICT world, and user authentication is
one of the popular tools to assure network security. Find and summarise ONE resource
that describes any ONE-authentication mechanism except password. The resource, and
your summary, should focus purely on ONLY ONE type of authentication mechanism.
Title, Link and Reference:
How biometrics will shape the future of mobile authentication
https://www.atmmarketplace.com/blogs/how-biometrics-will-shape-the-future-of-mobile-
authentication/
Gladis, R., 2018. How biometrics will shape the future of mobile authentication. [Online]
Available at: https://www.atmmarketplace.com/blogs/how-biometrics-will-shape-the-future-
of-mobile-authentication/
Summary:
This article describes network security using biometric authentication, which is better for
network security in the present era.
In the article, the author describes network security using various types of authentication.
It provides biometric authentication in a network. In addition, a network has many
services, which need authentication for access. Therefore, security is necessary for those
resources and services.
Authors have explained about biometric authentication and its advantages in securing a
network. There are many advantages of biometric authentication, such as no one can use
a particular identity. Apple Pay, Google Pay, and Samsung Pay are already the use of
fingerprint and face recognition for fee transactions, and this, along with eye and voice
reputation, will always provide higher safety than user names with complicated
passwords. In fact, the ones answer in no way save our biometric characteristics as
databases do passwords. As an alternative, biometric statistics are saved, as an example,
on our cell devices within comfortable modules. Therefore, it is not best the authentication,
which gives better security. While we process a biometric authentication at Compute we
by no means change biometric information however only cryptographic key pairs.
This article is useful because it has described the use of biometric devices in a network.
There are various issues in network security. Therefore, biometric authentication is
required to manage all the things in a proper manner.
This article has provided various methods to provide security to the network configuration
and access to various services. It is the best way for security and privacy.
5
Network security has become a major concern of ICT world, and user authentication is
one of the popular tools to assure network security. Find and summarise ONE resource
that describes any ONE-authentication mechanism except password. The resource, and
your summary, should focus purely on ONLY ONE type of authentication mechanism.
Title, Link and Reference:
How biometrics will shape the future of mobile authentication
https://www.atmmarketplace.com/blogs/how-biometrics-will-shape-the-future-of-mobile-
authentication/
Gladis, R., 2018. How biometrics will shape the future of mobile authentication. [Online]
Available at: https://www.atmmarketplace.com/blogs/how-biometrics-will-shape-the-future-
of-mobile-authentication/
Summary:
This article describes network security using biometric authentication, which is better for
network security in the present era.
In the article, the author describes network security using various types of authentication.
It provides biometric authentication in a network. In addition, a network has many
services, which need authentication for access. Therefore, security is necessary for those
resources and services.
Authors have explained about biometric authentication and its advantages in securing a
network. There are many advantages of biometric authentication, such as no one can use
a particular identity. Apple Pay, Google Pay, and Samsung Pay are already the use of
fingerprint and face recognition for fee transactions, and this, along with eye and voice
reputation, will always provide higher safety than user names with complicated
passwords. In fact, the ones answer in no way save our biometric characteristics as
databases do passwords. As an alternative, biometric statistics are saved, as an example,
on our cell devices within comfortable modules. Therefore, it is not best the authentication,
which gives better security. While we process a biometric authentication at Compute we
by no means change biometric information however only cryptographic key pairs.
This article is useful because it has described the use of biometric devices in a network.
There are various issues in network security. Therefore, biometric authentication is
required to manage all the things in a proper manner.
This article has provided various methods to provide security to the network configuration
and access to various services. It is the best way for security and privacy.
5

Week 6
The text discusses about a massive data breach that happened in Target company, which is
referred as ‘Target Breach’. Find and summarise ONE resource that describes another
recent (within last 5 years) well-publicised attack or security breach on a public company or
government organisation. The resource, and your summary, should describe about A
SINGLE EXAMPLE of security breach.
Title, Link and Reference:
Cambridge Analytica - Facebook.
http://www.bernardsmith.eu/science_and_technology/computer_science/
cambridge_analytica_and_facebook/index.html
Smith, B., 2018. Cambridge Analytica - Facebook. [Online]
Available at: http://www.bernardsmith.eu/science_and_technology/computer_science/
cambridge_analytica_and_facebook/index.html[Accessed 20 May 2019].
Summary:
This article has described the data breach on Facebook. It was a huge loss of data from
Facebook users. In the article, the author describes the role of security and data breach in
Facebook. In addition, Cambridge Analytica is the responsible company for that data breach,
as the company was responsible for the data of users.
Fb has been accused of letting down its users after a great record breach remaining 12
months. In addition, there are many other impacts of data breach on the reputation of the
organization. The social media massive did no longer provide users with enough warning that
their Facebook debts might be compromised and their information is stolen due to protection
flaws in its sign-on system, a brand new lawsuit has said.
Authors have explained about the role of privacy and security of data and information of
users on social media. There are many advantages of social media but it requires high
security of personal data of their users. I found that this article has provided various reasons
behind the data breach and how we can resolve such types of issues using cybersecurity and
other things. Facebook is a huge organization and it should maintain the image in the market
to create more business. However, it is a part of security and privacy. There are many
advantages of cybersecurity and other tools to secure all the information assets of the
company. Moreover, Facebook has implemented high level of security for their databases
and users data. It makes them secure for next data breach.
6
The text discusses about a massive data breach that happened in Target company, which is
referred as ‘Target Breach’. Find and summarise ONE resource that describes another
recent (within last 5 years) well-publicised attack or security breach on a public company or
government organisation. The resource, and your summary, should describe about A
SINGLE EXAMPLE of security breach.
Title, Link and Reference:
Cambridge Analytica - Facebook.
http://www.bernardsmith.eu/science_and_technology/computer_science/
cambridge_analytica_and_facebook/index.html
Smith, B., 2018. Cambridge Analytica - Facebook. [Online]
Available at: http://www.bernardsmith.eu/science_and_technology/computer_science/
cambridge_analytica_and_facebook/index.html[Accessed 20 May 2019].
Summary:
This article has described the data breach on Facebook. It was a huge loss of data from
Facebook users. In the article, the author describes the role of security and data breach in
Facebook. In addition, Cambridge Analytica is the responsible company for that data breach,
as the company was responsible for the data of users.
Fb has been accused of letting down its users after a great record breach remaining 12
months. In addition, there are many other impacts of data breach on the reputation of the
organization. The social media massive did no longer provide users with enough warning that
their Facebook debts might be compromised and their information is stolen due to protection
flaws in its sign-on system, a brand new lawsuit has said.
Authors have explained about the role of privacy and security of data and information of
users on social media. There are many advantages of social media but it requires high
security of personal data of their users. I found that this article has provided various reasons
behind the data breach and how we can resolve such types of issues using cybersecurity and
other things. Facebook is a huge organization and it should maintain the image in the market
to create more business. However, it is a part of security and privacy. There are many
advantages of cybersecurity and other tools to secure all the information assets of the
company. Moreover, Facebook has implemented high level of security for their databases
and users data. It makes them secure for next data breach.
6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Week 7
The text briefly discusses about e-commerce and e-business. Find and summarise ONE
resource that discusses the relationship between e-commerce and e-business. The resource,
and your summary, should describe similarities and difference between e-commerce and e-
business.
Title, Link and Reference:
E-business is short for “electronic business.” As an overarching term, it refers to any method of
utilizing digital information and communication technologies to support or streamline business
processes – from preparation to implementation. However, it ca
https://www.ionos.com/digitalguide/online-marketing/online-sales/what-is-e-business/
IONOS, 2019. E-business is short for “electronic business.” As an overarching term, it refers to
any method of utilizing digital information and communication technologies to support or
streamline business processes – from preparation to implementation. However, it ca. [Online]
Available at: https://www.ionos.com/digitalguide/online-marketing/online-sales/what-is-e-
business/
Summary:
This article describes the e-business and e-commerce. In addition, e-commerce is a part of e-
business. In the article, the author has described the e-business impact on retails and other
businesses. E-commerce is helpful in the growth of the company and it provides many benefits
to the company as per the requirements. E-business can include quite a number functions and
offerings, ranging from the improvement of intranets and extranets to e-services, the availability
of offerings and responsibilities over the internet by using software carrier vendors As e-
commerce has improved, stringent security protocols and gear, consisting of encryption and
digital certificates, were followed to shield against hackers, fraud and robbery. With the safety
built into browsers and with digital certificates now available for individuals and agencies from
businesses, which include VeriSign, a certificates company, some of the early problems
approximately the security of enterprise transaction on the net has abated, and e-business, by
using something name, is accelerating. Authors have explained about e-business and e-
commerce with their differences. It is necessary to manage various all the things properly. There
are many advantages of e-business. In addition, many companies because of its popularity and
advantages first choose e-business. I used this article because it has explained the differences
between e-commerce and e-business. Those e-enterprise procedures include buying and selling
products, materials and services; servicing customers; processing bills; coping with production
manage; participating with enterprise companions; sharing data; strolling automatic worker
offerings; recruiting; and more. It will provide growth to the company as well.
7
The text briefly discusses about e-commerce and e-business. Find and summarise ONE
resource that discusses the relationship between e-commerce and e-business. The resource,
and your summary, should describe similarities and difference between e-commerce and e-
business.
Title, Link and Reference:
E-business is short for “electronic business.” As an overarching term, it refers to any method of
utilizing digital information and communication technologies to support or streamline business
processes – from preparation to implementation. However, it ca
https://www.ionos.com/digitalguide/online-marketing/online-sales/what-is-e-business/
IONOS, 2019. E-business is short for “electronic business.” As an overarching term, it refers to
any method of utilizing digital information and communication technologies to support or
streamline business processes – from preparation to implementation. However, it ca. [Online]
Available at: https://www.ionos.com/digitalguide/online-marketing/online-sales/what-is-e-
business/
Summary:
This article describes the e-business and e-commerce. In addition, e-commerce is a part of e-
business. In the article, the author has described the e-business impact on retails and other
businesses. E-commerce is helpful in the growth of the company and it provides many benefits
to the company as per the requirements. E-business can include quite a number functions and
offerings, ranging from the improvement of intranets and extranets to e-services, the availability
of offerings and responsibilities over the internet by using software carrier vendors As e-
commerce has improved, stringent security protocols and gear, consisting of encryption and
digital certificates, were followed to shield against hackers, fraud and robbery. With the safety
built into browsers and with digital certificates now available for individuals and agencies from
businesses, which include VeriSign, a certificates company, some of the early problems
approximately the security of enterprise transaction on the net has abated, and e-business, by
using something name, is accelerating. Authors have explained about e-business and e-
commerce with their differences. It is necessary to manage various all the things properly. There
are many advantages of e-business. In addition, many companies because of its popularity and
advantages first choose e-business. I used this article because it has explained the differences
between e-commerce and e-business. Those e-enterprise procedures include buying and selling
products, materials and services; servicing customers; processing bills; coping with production
manage; participating with enterprise companions; sharing data; strolling automatic worker
offerings; recruiting; and more. It will provide growth to the company as well.
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Week 8
The textbook discusses about the success story of ARI (Automotive Resources
International) company after implementing SAP Business Objects Explorer and integrating
it with HANA. HANA is SAP’s in-memory computing platform that is deployable as an on-
premise hardware and software appliance or in the cloud. Find and summarise ONE
resource that describes the success story of adapting SAP HANA by another local or
international company. The resource, and your summary, should focus on the story about
ONE single company (which is not ARI company).
Title, Link and Reference:
Why Do Companies Implement SAP Software?
https://www.infopulse.com/blog/why-do-companies-implement-sap-software/
Kotelva, D., 2018. Why Do Companies Implement SAP Software?. [Online]
Available at: https://www.infopulse.com/blog/why-do-companies-implement-sap-software/
[Accessed 10 August 2019].
Summary:
This article describes the success story of Automotive Resources International (ARI) after
using SAP for management of their business functions. There are many advantages of
HANA, which are used by the company. In the article, the author has explained about the
HANA and its advantages to the company. There are many positive and negative impact
of SAP on the processing of the company. The company has been family-owned for over
80 years, with proud records of supporting clients with “complicated fleet” logistics. These
are vocational fleets along with trucking organizations, utilities, and railroads where
custom-designed automobiles are a key a part of the business model. These customers
need incredibly customized services, and ARI handles the complete lifecycle of the fleet
procedure such as ordering, adapting, servicing, and reselling motors.
As the Director of information control at ARI, Powell had a key position in imposing the
enterprise’s 5-12 months strategic plan, which included a new technique to information
evaluation. ARI has constantly been at the leading edge in the use of era as a manner to
provide modern solutions to the multitude of challenges faced with the aid of managers
charged with deploying and retaining complicated fleets.
Authors have explained the role of SAP in the management of business functions of the
company using technology. I include this article because it has described the role of digital
technology and its impact on the growth and success of the company. In addition,
company can grow using advance technologies in the market.
8
The textbook discusses about the success story of ARI (Automotive Resources
International) company after implementing SAP Business Objects Explorer and integrating
it with HANA. HANA is SAP’s in-memory computing platform that is deployable as an on-
premise hardware and software appliance or in the cloud. Find and summarise ONE
resource that describes the success story of adapting SAP HANA by another local or
international company. The resource, and your summary, should focus on the story about
ONE single company (which is not ARI company).
Title, Link and Reference:
Why Do Companies Implement SAP Software?
https://www.infopulse.com/blog/why-do-companies-implement-sap-software/
Kotelva, D., 2018. Why Do Companies Implement SAP Software?. [Online]
Available at: https://www.infopulse.com/blog/why-do-companies-implement-sap-software/
[Accessed 10 August 2019].
Summary:
This article describes the success story of Automotive Resources International (ARI) after
using SAP for management of their business functions. There are many advantages of
HANA, which are used by the company. In the article, the author has explained about the
HANA and its advantages to the company. There are many positive and negative impact
of SAP on the processing of the company. The company has been family-owned for over
80 years, with proud records of supporting clients with “complicated fleet” logistics. These
are vocational fleets along with trucking organizations, utilities, and railroads where
custom-designed automobiles are a key a part of the business model. These customers
need incredibly customized services, and ARI handles the complete lifecycle of the fleet
procedure such as ordering, adapting, servicing, and reselling motors.
As the Director of information control at ARI, Powell had a key position in imposing the
enterprise’s 5-12 months strategic plan, which included a new technique to information
evaluation. ARI has constantly been at the leading edge in the use of era as a manner to
provide modern solutions to the multitude of challenges faced with the aid of managers
charged with deploying and retaining complicated fleets.
Authors have explained the role of SAP in the management of business functions of the
company using technology. I include this article because it has described the role of digital
technology and its impact on the growth and success of the company. In addition,
company can grow using advance technologies in the market.
8

Week 9
Rapid application development (RAD) is a process of creating a workable system in a very
short period. There are few recently developed frameworks available in market to
undertake RAD. Find and summarise ONE recent (within last two years) resource that
describes and recommends about ONE framework for RAD.
Title, Link and Reference:
How to Boost App Development With RAD Framework
https://kissflow.com/rad/rapid-application-development-framework-to-boost-app-
development/
Kissflow, 2018. How to Boost App Development With RAD Framework. [Online]
Available at: https://kissflow.com/rad/rapid-application-development-framework-to-boost-
app-development/[Accessed 11 August 2019].
Summary:
This article describes the Rapid application development (RAD) process, which creates
workable systems. by launching speedy prototypes to the quit consumer to test and
supply feedback on, you may keep the give up person engaged within the improvement
technique, making sure that the give up product is precisely what they need it to be, and
not a series of compromises between the development crew and the patron.
In the article, the author has explained about the deployment of RAD in a workplace to
create a workable system. There are many advantages to the RAD process, such as fast
processing, short time, and many others. RAD frameworks are hard and fast of libraries,
functions, instructions, and reusable gadgets primarily based on rapid software
improvement methods. RAD frameworks help store time, as well as organize and
streamline development. Alternatively, of having to increase libraries and features from
scratch, frameworks accelerate the technique.
Authors have explained about role RAD for evaluation, implementation, and development
of various systems. It provides many details about the RAD and I found that this article is
useful because it has provided advantages of deployment of the RAD system that is a
process to manage work in a short time. There are various advantages of the RAD
prototype in which a company can make their own development and applications.in
addition, RAD support other methods of development of applications. There are many
other advantages of RAD prototypes that make more benefits for the company as well.
9
Rapid application development (RAD) is a process of creating a workable system in a very
short period. There are few recently developed frameworks available in market to
undertake RAD. Find and summarise ONE recent (within last two years) resource that
describes and recommends about ONE framework for RAD.
Title, Link and Reference:
How to Boost App Development With RAD Framework
https://kissflow.com/rad/rapid-application-development-framework-to-boost-app-
development/
Kissflow, 2018. How to Boost App Development With RAD Framework. [Online]
Available at: https://kissflow.com/rad/rapid-application-development-framework-to-boost-
app-development/[Accessed 11 August 2019].
Summary:
This article describes the Rapid application development (RAD) process, which creates
workable systems. by launching speedy prototypes to the quit consumer to test and
supply feedback on, you may keep the give up person engaged within the improvement
technique, making sure that the give up product is precisely what they need it to be, and
not a series of compromises between the development crew and the patron.
In the article, the author has explained about the deployment of RAD in a workplace to
create a workable system. There are many advantages to the RAD process, such as fast
processing, short time, and many others. RAD frameworks are hard and fast of libraries,
functions, instructions, and reusable gadgets primarily based on rapid software
improvement methods. RAD frameworks help store time, as well as organize and
streamline development. Alternatively, of having to increase libraries and features from
scratch, frameworks accelerate the technique.
Authors have explained about role RAD for evaluation, implementation, and development
of various systems. It provides many details about the RAD and I found that this article is
useful because it has provided advantages of deployment of the RAD system that is a
process to manage work in a short time. There are various advantages of the RAD
prototype in which a company can make their own development and applications.in
addition, RAD support other methods of development of applications. There are many
other advantages of RAD prototypes that make more benefits for the company as well.
9
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Week 10
The failure to successfully implement large scale IS has led to the downfall of many
previously successful companies. Find and summarise ONE resource that describes few
reasons of implementation failure for large scale IS. The resource, and your summary,
should analyse at least three reasons of the failure.
Title, Link and Reference:
Common Problems in Management Information Systems
https://smallbusiness.chron.com/common-problems-management-information-systems-
63376.html
Markgraf, B., 2018. Common Problems in Management Information Systems. [Online]
Available at: https://smallbusiness.chron.com/common-problems-management-
information-systems-63376.html[Accessed 11 March 2019].
Summary:
This article has described the reason for the failures of a large scale IS and various
methods to make a project successful. In addition, there are many advantages of project
management and procurement. Besides, it is a huge challenge in front of an enterprise to
implement an information system. In the article, the author has explained the
implementation of an ERP system for an organization and various reasons behind the
success and failure of particular methodology of a project. It is necessary to create a
proper scope of the project to implement it properly. In addition, there are many other
advantages of the project management and success rate of the project. MIS plays an
ever-increasing role in corporations, with professionals relying on generation for every
element of operations. Income, advertising, and marketing rely closely on customer
courting software to track patron interactions, for example, while accounting desires its
very own software program for billing, invoicing and financial monitoring.
With extra than half of all agencies now counting on huge statistics analytics, MIS is
gambling a good greater essential function. Authors have explained about the different
attributes that are necessary to make a project successful. They also described the
minimum possibility of failure. It has if a good team and good communication skills are
required to complete a project without failure. There is a huge impact of strategies on
project failure and success.
I found that this article is useful because it has explained about the implantation process
of a large-scale system in an organization. This article has explained the various key
points that make a huge impact on the project, such as change management, lack of
monitoring, and many others.
10
The failure to successfully implement large scale IS has led to the downfall of many
previously successful companies. Find and summarise ONE resource that describes few
reasons of implementation failure for large scale IS. The resource, and your summary,
should analyse at least three reasons of the failure.
Title, Link and Reference:
Common Problems in Management Information Systems
https://smallbusiness.chron.com/common-problems-management-information-systems-
63376.html
Markgraf, B., 2018. Common Problems in Management Information Systems. [Online]
Available at: https://smallbusiness.chron.com/common-problems-management-
information-systems-63376.html[Accessed 11 March 2019].
Summary:
This article has described the reason for the failures of a large scale IS and various
methods to make a project successful. In addition, there are many advantages of project
management and procurement. Besides, it is a huge challenge in front of an enterprise to
implement an information system. In the article, the author has explained the
implementation of an ERP system for an organization and various reasons behind the
success and failure of particular methodology of a project. It is necessary to create a
proper scope of the project to implement it properly. In addition, there are many other
advantages of the project management and success rate of the project. MIS plays an
ever-increasing role in corporations, with professionals relying on generation for every
element of operations. Income, advertising, and marketing rely closely on customer
courting software to track patron interactions, for example, while accounting desires its
very own software program for billing, invoicing and financial monitoring.
With extra than half of all agencies now counting on huge statistics analytics, MIS is
gambling a good greater essential function. Authors have explained about the different
attributes that are necessary to make a project successful. They also described the
minimum possibility of failure. It has if a good team and good communication skills are
required to complete a project without failure. There is a huge impact of strategies on
project failure and success.
I found that this article is useful because it has explained about the implantation process
of a large-scale system in an organization. This article has explained the various key
points that make a huge impact on the project, such as change management, lack of
monitoring, and many others.
10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

References
Gladis, R., 2018. How biometrics will shape the future of mobile authentication. [Online]
Available at: https://www.atmmarketplace.com/blogs/how-biometrics-will-shape-the-
future-of-mobile-authentication/
Goldstein, P., 2017. IPv4 to IPv6 Protocol Upgrade: How to Answer "Should I Enable IPv6?.
[Online]
Available at: https://biztechmagazine.com/article/2017/07/ipv4-ipv6-protocol-upgrade-are-
you-ipv6-ready
[Accessed 29 August 2019].
Hasa, 2019. What is the Difference Between Deadlock Prevention and Deadlock Avoidance.
[Online]
Available at: https://pediaa.com/what-is-the-difference-between-deadlock-prevention-and-
deadlock-avoidance/
[Accessed 14 August 2019].
Hogg, S., 2017. IPv6 Addressing for Enterprises. [Online]
Available at: https://www.networkworld.com/article/3235384/ipv6-address-enterprises-
how-to-easier-than-ipv4.html
[Accessed 5 August 2019].
IONOS, 2019. E-business is short for “electronic business.” As an overarching term, it refers to
any method of utilizing digital information and communication technologies to support or
streamline business processes – from preparation to implementation. However, it ca. [Online]
Available at: https://www.ionos.com/digitalguide/online-marketing/online-sales/what-is-e-
business/
Kissflow, 2018. How to Boost App Development With RAD Framework. [Online]
Available at: https://kissflow.com/rad/rapid-application-development-framework-to-boost-
app-development/
[Accessed 11 August 2019].
Kotelva, D., 2018. Why Do Companies Implement SAP Software?. [Online]
Available at: https://www.infopulse.com/blog/why-do-companies-implement-sap-software/
[Accessed 10 August 2019].
Markgraf, B., 2018. Common Problems in Management Information Systems. [Online]
Available at: https://smallbusiness.chron.com/common-problems-management-information-
systems-63376.html
[Accessed 11 March 2019].
Sciforce, 2019. Smart Farming, or the Future of Agriculture. [Online]
Available at: https://medium.com/sciforce/smart-farming-or-the-future-of-agriculture-
359f0089df69
[Accessed 14 August 2019].
Smith, B., 2018. Cambridge Analytica - Facebook. [Online]
Available at: http://www.bernardsmith.eu/science_and_technology/computer_science/
cambridge_analytica_and_facebook/index.html
[Accessed 20 May 2019].
Study-tonight, 2018. What is Banker's Algorithm?. [Online]
Available at: https://www.studytonight.com/operating-system/bankers-algorithm
[Accessed 29 August 2019].
11
Gladis, R., 2018. How biometrics will shape the future of mobile authentication. [Online]
Available at: https://www.atmmarketplace.com/blogs/how-biometrics-will-shape-the-
future-of-mobile-authentication/
Goldstein, P., 2017. IPv4 to IPv6 Protocol Upgrade: How to Answer "Should I Enable IPv6?.
[Online]
Available at: https://biztechmagazine.com/article/2017/07/ipv4-ipv6-protocol-upgrade-are-
you-ipv6-ready
[Accessed 29 August 2019].
Hasa, 2019. What is the Difference Between Deadlock Prevention and Deadlock Avoidance.
[Online]
Available at: https://pediaa.com/what-is-the-difference-between-deadlock-prevention-and-
deadlock-avoidance/
[Accessed 14 August 2019].
Hogg, S., 2017. IPv6 Addressing for Enterprises. [Online]
Available at: https://www.networkworld.com/article/3235384/ipv6-address-enterprises-
how-to-easier-than-ipv4.html
[Accessed 5 August 2019].
IONOS, 2019. E-business is short for “electronic business.” As an overarching term, it refers to
any method of utilizing digital information and communication technologies to support or
streamline business processes – from preparation to implementation. However, it ca. [Online]
Available at: https://www.ionos.com/digitalguide/online-marketing/online-sales/what-is-e-
business/
Kissflow, 2018. How to Boost App Development With RAD Framework. [Online]
Available at: https://kissflow.com/rad/rapid-application-development-framework-to-boost-
app-development/
[Accessed 11 August 2019].
Kotelva, D., 2018. Why Do Companies Implement SAP Software?. [Online]
Available at: https://www.infopulse.com/blog/why-do-companies-implement-sap-software/
[Accessed 10 August 2019].
Markgraf, B., 2018. Common Problems in Management Information Systems. [Online]
Available at: https://smallbusiness.chron.com/common-problems-management-information-
systems-63376.html
[Accessed 11 March 2019].
Sciforce, 2019. Smart Farming, or the Future of Agriculture. [Online]
Available at: https://medium.com/sciforce/smart-farming-or-the-future-of-agriculture-
359f0089df69
[Accessed 14 August 2019].
Smith, B., 2018. Cambridge Analytica - Facebook. [Online]
Available at: http://www.bernardsmith.eu/science_and_technology/computer_science/
cambridge_analytica_and_facebook/index.html
[Accessed 20 May 2019].
Study-tonight, 2018. What is Banker's Algorithm?. [Online]
Available at: https://www.studytonight.com/operating-system/bankers-algorithm
[Accessed 29 August 2019].
11

Tech-differences, 2019. Difference between SIMD and MIMD. [Online]
Available at: https://techdifferences.com/difference-between-simd-and-mimd.html
[Accessed 14 August 2019].
12
Available at: https://techdifferences.com/difference-between-simd-and-mimd.html
[Accessed 14 August 2019].
12
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 12
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.




