COIT20246 Assignment: Weekly Summaries of Computing Concepts

Verified

Added on  2023/06/03

|9
|3283
|408
Homework Assignment
AI Summary
This assignment comprises summaries of various computing concepts explored over several weeks. Week 1 contrasts CPUs and GPUs, referencing a paper by Memon et al. (2017) that highlights the GPU's image rendering capabilities and non-graphics applications. Week 2 discusses AI's potential role in operating systems, summarizing a study by Haq and Shetty (2017) on AI's ability to enhance OS performance. Week 3 compares IaaS providers, focusing on Microsoft Azure as an alternative to AWS, based on a paper by Nazir (2012) which details differences in optimization and backup strategies. Week 4 explores IPv6, contrasting it with IPv4 using a comparative review by Sailan et al. (2009), noting IPv6's larger address space. Week 5 summarizes the WannaCry ransomware attack, referencing Mohurle and Patil's (2017) study on its mechanisms and impact. Week 6 describes OpenFlow's role in Software-Defined Networking (SDN), based on a survey by Lara et al. (2014). Week 7 discusses the impacts of legacy systems, summarizing Srinivas et al.'s (2016) analysis of challenges in maintaining such systems. Week 8 explores the Cambridge Analytica scandal. The assignment provides a concise overview of diverse topics in computing and network technologies.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2 PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Week 1
The text discusses how Central Processing Units (CPUs) function but is silent on another
processing component of modern computers, the Graphics Processing Unit (GPU). Find and
summarise ONE resource that describes what a GPU is and how it differs from a CPU. The
resource (and your summary) should discuss at least one non-graphics related use for GPUs.
Title and Reference:
Memon, Z.A., Samad, F., Awan, Z.R., Aziz, A. and Siddiqi, S.S., 2017. CPU-GPU
Processing. International Journal of Computer Science and Network Security, 17(9), pp.188-193.
http://paper.ijcsns.org/07_book/201709/20170924.pdf
Summary:
The title of this paper is CPU-GPU processing and in which the author explains the fundamental
concept to of graphics processing unit and the difference between CPU and GPU. The author first
describes the architecture of CPU and GPU and it is an advanced version of the computer
processing unit. According to this article, CPU is the main primary device of any computer system
which is used to perform arithmetic logic and input-output functions. Moreover, GPU is a special
type of component which is used to display an image on the desktop. The author uses qualitative
data analysis and CPU uses several cores that communicate with caches. The main difference
between CPU and GPU is that CPU can perform numbers of tasks at a time but GPU perform only
image rendering step. CPU is also called as the brain of computer and GPU is very latest
technology which can handle complex stage. It is a very fast cache but GPU is very complex use
lots of math units. Therefore, this article is completely based on CPU and GPU and the main
benefit of this article is that it identified key factors of GPU.
Week 2
One of the potential next advances in Operating Systems (OSes) will be Artificial Intelligence (AI)
capabilities. Find and summarise ONE resource that discusses how AI could change the way OSes
function and/or interact with users.
Title and Reference:
Haq, R., and Shetty, A. (2017) A STUDY ON ARTIFICIAL INTELLIGENCE OPERATING SYSTEM,
International Journal of Latest Trends in Engineering and Technology, vol. 15, no. 4, pp. 059-061.
https://www.ijltet.org/journal/151063991811.pdf
Summary:
The title of this journal paper is A study on artificial intelligence operating system. The main
purpose of this article is to discuss the role of AI in the field of the operating system. The author
used qualitative data research to analysis concept to artificial intelligence and it is a modern
innovation in computer science. This paper reviews how AI helps to improve the performance of
information and technology and many organizations adopted this method because it is a more
efficient process. AI is defined as a process which is used to manage software and hardware and
also provide various computer services to users. According to the writer, AI is divided into two
parts such as strong and weak AI. Strong AI can present human minds in future and weak AI
takes action and test their knowledge. There are many methods used in AI operating system, for
example, intelligent system, fuzzy logic process, artificial neural, expert system, natural language
processing. In the field of the operating system, this technology provides a platform to select the
best application to open any document, image, song, and other function.
Document Page
Week 3
The text discusses how Netflix uses Amazon Web Services (AWS) as a Cloud Service Provider
(CSP) for Infrastructure as a Service (IaaS). Find and summarise ONE resource that describes
ONE other commercial IaaS provider that is NOT Google. The resource and your summary should
describe how the IaaS differs from AWS.
Title and Reference:
Nazir, M., 2012. Cloud computing: overview & current research challenges. IOSR Journal of
computer engineering, 8(1), pp.14-22.
http://www.iosrjournals.org/iosr-jce/papers/Vol8-Issue1/C0811422.pdf
Summary:
The title of this article is cloud computing: overview and current research challenges. This paper
explains the fundamental concept of cloud-based services and how Microsoft, provide IaaS
services to consumers. Cloud is an advanced technology which provides various kinds of services
to many organizations and it has the ability to scale down and up their services requirement.
Generally, this type of process is produced third-party sellers like Google, Amazon, and Microsoft.
IaaS is infrastructure as a service which is a platform to utilize cloud-based facilities and
Microsoft is another IaaS provider after Amazon and Google. In this journal, the writer identified
various organizations which are providing cloud computing facilities and it is more flexible
technology by which consumers can reduce cyber-attacks. Microsoft developed their IaaS which
is called as Azure and it is very different from Amazon web services. AWS uses R3 optimization
process but Azure uses D-series to optimize memory. AWS is an automatic process as compare to
Microsoft Azure which is one common drawback of IaaS. For backup, Amazon uses third-party
tools and Microsoft uses their own cloud services. Therefore, the main disadvantage of this
journal paper is that it does not explain which types of technologies are used by Microsoft.
Week 4
IPv4 is discussed in the text, yet the emerging IPv6 protocol is only mentioned briefly. Find and
summarise ONE resource that describes the IPv6 protocol. The resource and your summary
should describe how IPv6 differs from IPv4.
Title and Reference:
Sailan, M.K., Hassan, R. and Patel, A., 2009, August. A comparative review of IPv4 and IPv6 for
research test bed. In Electrical Engineering and Informatics, 2009. ICEEI'09. International
Conference on (Vol. 2, pp. 427-433). IEEE.
https://ieeexplore.ieee.org/abstract/document/5254698
Summary:
The title of this paper is A Comparative Review of IPv4 and IPv6 for Research Test Bed. This
journal is completely based on internet protocol and the author describes the fundamental
Document Page
working mechanism principle of both IPv6 and IPv4. According to the writer, IPv6 is still very
low because it is not famous as compared to IPv4. The cost of this protocol is very high by which
many users are not able to adopt this advanced technology. The main goal of this paper is the
review on internet protocols and makes a comparison between IPv6 and IPv4. It is identified that
the main difference between in this networks is addressing formats. IPv4 utilize 32-bit address
and IPv6 use 128-bit which is more efficient for a large computer network. The author describes
the concept of both internet protocols and investigated that address depletion is the very
common problem for IPv4 and this problem resolved by the IPv6 network. Therefore, this article
provides a proper explanation about internet protocols and use primary data analysis.
Week 5
WannaCry and NotPetya were two of the most significant malware attacks of 2017. Find and
summarise ONE resource that describes how ONE of these pieces of malware work. Note that
the resource should focus on ONE of these, NOT both.
Title and Reference:
Mohurle, S. and Patil, M., 2017. A brief study of wanna cry threat: Ransomware attack
2017. International Journal of Advanced Research in Computer Science, 8(5), pp. 16-20.
https://search.proquest.com/openview/e14e6aab226f21a65db72f0b58653572/1?pq-
origsite=gscholar&cbl=1606379
Summary:
The title of this paper is A brief study of Wanna cry Threat: Ransomware Attack 2017. According
to this journal, ransomware is one of the most common cyber-attack which is growing very fast.
Wanna cry is a part of this attack in which hackers produce complex botnet process by which
they can easily determine the private detail of any authorized server. The main objective of this
article is to describe the issue of Wanna cry and how hackers attack any server. In this modern
generation information of any organization and community is very important and many users
use the unauthentic website by which they can lose their privacy. In the year 2017 around
thousands of computers are a hacker by the wanncry attack and it shares traffic signals to
organization websites and target employee’s personal accounts. In which many attackers send
spam emails and message due to which users click on fraud links and hackers collect all private
details of their networks. This research paper explained wanncry cyber-attack and the impact of
this problem on human personal life. Consumers can adopt security plans and programmes by
which they can reduce this type of attack.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Week 6
OpenFlow is a protocol that enables Software-Defined Networking (SDN). Find and summarise
ONE resource that describes how OpenFlow works and/or how it enables SDN.
Title and Reference: Network innovation using open flow: A survey.
Lara, A., Kolasani, A., and Ramamurthy, B., 2014. Network innovation using OpenFlow: A
survey. IEEE communications surveys & tutorials, 16(1), pp.493-512.
https://ieeexplore.ieee.org/document/6587999
Summary:
The main purpose of this paper is to describe the role of open flow in software-defined
networking and their working mechanism. In this journal, the author explains the concept of SDN
and how open flow program work in this technology. Open flow is an advanced development in
information technology and it uses various kinds of networks devices to control the flow of data.
The main role of SDN is to manage information of two or many switches at a time. Open flow
provides a platform to control the communication gap between network devices in an
architecture of SDN. It is also used to produce a specification of all arithmetic logic and can be
used to maintain various switches and networks. It has the ability to add security features in
software-defined networking, centralized control, flow abstraction, and traffic analysis. In which
the writer identified various challenges faced by open flow and how it enables software-defined
networking. The main advantage of this program is that it can control security threats of SDN and
maintain network system of an organization. Therefore, this article does not explain methods to
improve the performance of SDN and architecture of open flow process.
Week 7
Historically, organizations have been able to improve business processes by implementing
Information Systems. However, as these systems age, they can negatively impact organizational
agility and can ultimately prove problematic. Such systems are broadly referred to as Legacy
Systems. Find and summarise ONE resource that discusses the impacts of legacy systems on
organizations. The resource and your summary should clearly identify problems with
maintaining legacy systems.
Title and Reference:
Srinivas, M., Ramakrishna, G., Rao, K.R. and Babu, E.S., 2016. Analysis of legacy system in software
application development: a comparative survey. International Journal of Electrical and Computer
Engineering (IJECE), 6(1), pp.292-297.
https://www.iaescore.com/journals/index.php/IJECE/article/view/107/123
Summary:
This journal paper is completely based on the impact of the legacy system on an organization and
in which the author explains various challenges faced by the legacy system. According to the
writer, Software evolution is one of the biggest issues for any business industry and to reduce
security threats and issues this technology was developed by information and communication.
There are many organizations which are using this process to improve their productivity and
efficiency but lack of up-to-date documentation is the very common problem with the legacy
system. According to this journal, legacy is defined as a software-based program which is
Document Page
outdated and it is identified that this process is not stable due to the problem of capability with
traditional operating systems. The main advantage of this process is that it satisfies the
requirement of any user and many organizations are suffering from the potential threats of the
legacy system. The author provides mitigation tools to reduce drawbacks of this technology like
refactor and modification of network systems. There are many kinds of the issue faced in the
legacy system for example, very slow program, more expansive, maintenance cost is very high,
lack of interface and evaluation of the legacy system is very difficult.
Week 8
With the advent of mass data collection and storage has come the use of these datasets for data
mining and analysis. Recently, Cambridge Analytica and Facebook have come under intense
scrutiny for their use of user data, allegedly in order to influence the US 2016 election. Find and
summarise ONE resource that describes what Cambridge Analytica did and why their services
were so controversial.
Title and Reference: Cambridge Analytica and Facebook: The scandal so far
Al Jazeera (2018) Cambridge Analytica and Facebook: The scandal so far, [online] Available from:
https://www.aljazeera.com/news/2018/03/cambridge-analytical-facebook-scandal-
180327172353667.html [Accessed 27/09/18].
Summary:
On March 17, the London Observer and The New York Times detailed that UK-based information
firm Cambridge Analytica procured a huge number of Facebook clients' close to home data to
construct programming that could target potential swing voters in political crusades, including
US President Donald Trump's 2016 decision offer. Around 270,000 clients consented to have
their information gathered and utilized for scholastic research in return for a little installment.
The Times detailed Cambridge Analytica took care of the expenses of the application, more than
$800,000. Kogan gave data from in excess of 50 million Facebook clients to Cambridge Analytica,
which was utilized by the organization to make 30 million "psychographic" profiles that could
then be utilized to configuration focused on political promotions. Cambridge Analytica said on
March 17 it erased all information got from Kogan's organization, Global Science Research (GSR)
when it discovered it had not been gotten in accordance with Facebook's strategies. No
information from GSR was utilized by Cambridge Analytica as a major aspect of the
administrations it gave to the Donald Trump 2016 presidential battle. Kogan, in the meantime,
said he felt scapegoat by Facebook and Cambridge Analytica. Truly we thought we were acting
splendidly suitably
Document Page
Week 9
Load (or performance) testing is a critical step in the information systems development process.
The purpose of this testing is to simulate the peak expected load on a system to ensure both
hardware and software can operate effectively and meet key metrics. To do this, specialized
performance testing tools are used. Find and summarise ONE resource that describes ONE such
tool. The resource (and your summary) should include information on the principal uses and
features of the tool.
Title and Reference: WebLOAD REVIEW
Finances Online (2018) WebLOAD REVIEW Test Management Software, [online] Available from:
https://reviews.financesonline.com/p/webload/ [Accessed 27/09/18].
Summary:
WebLOAD is a venture scale stack testing arrangement broadly utilized and advanced even by
the requesting experts and specialists in the execution and load testing scene. Created by
RadView Software, WebLOAD is fit for supporting many innovations and highlights adaptable
implicit scripting capacities. Besides offering broad highlights for stack testing web frameworks,
WebLOAD is additionally fit for testing an assortment of big business frameworks, including
Oracle, SAP, and others. With the help of this tool, clients can without much of a stretch make and
view their heap content combined with the record and playback alternatives, making test
creation basic and productive. The framework executes a multi-convention bolster, empowering
WebLOAD to recreate stack situations that number from hundreds to thousands of clients and
after that give precise and point by point examination on how the application carries on under
load. WebLOAD is the device of decision for endeavors with overwhelming client load and
complex testing prerequisites. It enables you to perform load and stress testing on any web
application by creating load from the cloud and on-premises machines. WebLOAD's qualities are
its adaptability and convenience – empowering you to rapidly characterize the tests you require
with highlights like DOM-based chronicle/playback, programmed relationship, and JavaScript
scripting dialect.
Week 10
While information systems and technology deliver many benefits to society, there is a high
incidence of failure in attempting to implement them. These IS/IT implementation project
failures frequently result in substantial financial losses. Find and summarise ONE resource that
describes ONE example of an Australian IT/IS project that has failed. Note that the resource
should focus on ONE single example and it and your summary should clearly explain the cause(s)
of the failure.
Title and Reference: Myer – a case study in who shouldn’t invest or lead retailers
Ryan, P.J., (2018) Myer – a case study in who shouldn’t invest or lead retailers [online]. Available
from: https://www.insideretail.com.au/news/myer-a-case-study-in-who-shouldnt-invest-or-
lead-retailers-201802 [Accessed 27/09/18].
Summary:
Australia's greatest retail establishment, Myers, contributed a huge number of dollars on site
advancement as it endeavored to help online deals. However every time the site got occupied, it
slammed. Stock blowout sales have been tormented by framework blackouts, and on Boxing Day
2013, the entire site imploded. Senior administration communicated 'dissatisfaction' and
statements of regret to clients. Investors were informed that such framework accidents would
not influence benefits. Since Myer skimmed in 2009 at a cost of $4.10 per share, the seller has
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
seen its advertise capitalization plunge from $2.2 billion dollars to $429 million or 59 pennies for
every offer. Under two years into the five-year turnaround, speculators, investigators and media
beginning upsetting for change in light of an apparent absence of results and lost trust in the
vision that had been upheld by the board. Australian retail needs Myer fit and sound. People
require Myer 'right-sized' and gainful on the grounds that our retail chains generally drive a lot of
market conduct and item lifecycle either emphatically or adversely relying upon their level of
edginess. The main reason for this failure is the lack of resources by which they could not handle
their business.
Document Page
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]