COIT20246 Assignment: Online Resource Summaries for ICT Management

Verified

Added on  2022/09/29

|17
|5121
|16
Homework Assignment
AI Summary
This assignment for COIT20246, an ICT Services Management course, comprises ten tasks, each requiring the summary of an online resource related to a specific topic. Week 1 focuses on comparing MIMD and SIMD architectures, detailing their differences in instruction and data streams. Week 2 explores deadlock prevention algorithms, highlighting methods to avoid resource allocation conflicts. Week 3 delves into the application of IoT in smart farming, outlining how IoT enhances agricultural practices. Week 4 examines technologies enabling the simultaneous operation of IPv4 and IPv6. Week 6 focuses on the business model and impact of Uber. Week 7 differentiates between e-commerce and e-business, clarifying their distinct characteristics. Week 8 presents a success story of a network services company. Week 9 explores rapid application development (RAD) and its frameworks. This assignment provides a detailed exploration of various ICT concepts and technologies, showcasing the evolution and application of these technologies across different domains, and the student has provided the summaries of the resources as requested in the assignment brief.
Document Page
COIT 20246 ASSIGNMENT SUBMISSION
Due date:
Thursday Week 11 (2PM AEST)
Part:
Written Assessment
Weighting:
30% of total assessment.
Submission:
Electronic (see course website for details)
Please fill in the following details:

Student Name

Student Number

Tutor’s Name

Instructions

It will be necessary to use online resources to complete this assignment, please ensure

you cite and reference any such materials using the Harvard format.

DO NOT
copy content directly from either the text or Internet resources: this
assignment is to be in your own words.
You will lose marks if you do not use your
own words!

Please complete your assignment using
this submission template file, inserting your
responses where indicated.

DO NOT delete the marking criteria page
– changes are permitted to the formatting
of other pages including the headers and footers.

Tasks

There are ten (10) tasks, one for each week: the tasks are detailed below. There is a

table to complete for each task. Please fill in the information required.

Note: Each resource summary should be around 200-300 words.

Each summary should briefly explain:

-
What the resource is about
-
Why you selected it
-
What are the main points or key information covered in the resource
-
Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and

information about selecting good resources, please see the assessment page on the

Moodle unit web site:

https://moodle.cqu.edu.au/mod/assign/view.php?id=965540

1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Example
The “Internet of things” is an emerging trend towards smart interconnected embedded

technologies that allow us to monitor and control our environment. Collect and summarise

an online resource that describes ONE example or application of the Internet of things.

Title, Link and Reference:

Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?

https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-

revolution-vice-versa/

Lars, N 2014, ‘Connected Medical Devices, Apps: Are They Leading the IoT Revolution —

or Vice Versa?’, Wired, June 2014, viewed 1 February 2017,

https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-

revolution-vice-versa/

Note: You may use abbreviated URLs (to the website) in the reference, however you must

provide the FULL link above it that, when pasted into the Web Browser, will take the

marker directly to the resource. Using full URLs in the reference (as in this example) is fine

too.

Summary:

Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?

This article describes the emergence of the Internet of Things (IoT) in the context of

medical devices. I chose this article because it not only examines the applications of a very

useful class of IoT devices, but it also highlights the need for ways of collecting and

processing the data they produce.

In the article, the author describes how many medical monitoring devices are now capable

of connecting to the Internet and are becoming a normal part of patient care. These

devices allow remote monitoring of patient health wirelessly and can collect data on a wide

range of vital signs and indicators. Data can be collected from a range of sensors reading

everything from heart rate and blood pressure through to blood sugar levels and

temperature.

In addition to passive monitors, IoT medical devices provide the ability to proactively

prompt patients to do things, for example to warn them of their blood pressure or to alert

them that they need more medication. The article points out that many of these

notifications are the result of apps (software) interacting with both the devices and the

patients.

Perhaps the most interesting aspect of the article is the author’s discussion of what

happens to the data that the IoT medical devices produce. The author explains that many

devices can send data directly to the cloud for storage and analysis and that this data

constitutes a wealth of information that will potentially improve healthcare in the future.

2
Document Page
I found this article useful because it not only highlighted the increasing ubiquity of
Internet-connected medical devices, but also made me think about how the data is

collected, where it is stored and how it could be used – both positively and negatively – in

the future.

3
Document Page
Week 1
The text discusses about different architectures for parallel processing used for

Multiprocessor Machines such as multiple-instruction stream - multiple-data stream

(MIMD), single-instruction stream - multiple-data stream (SIMD) etc. Find and

summarise
ONE resource that compares between MIMD and SIMD architectures. The
resource, and your summary, must focus only on MIMD and SIMD architectures.

Title, Link and Reference:

Comparison between MIMD and SIMD

https://techdifferences.com/difference-between-simd-and-mimd.html

Tech Differences. 2019.
Difference between SIMD and MIMD (with Comparison
Chart) - Tech Differences
. [online] [Accessed 27 Sep. 2019]. Available at:
https://techdifferences.com/difference-between-simd-and-mimd.html.

Summary:

The following resource is all about SIMD and MIMD where MIMD stands for multiple

instruction multiple data stream while SIMD stands for single instruction multiple data

stream. SIMD and MIMD are considered to be two kinds of system organisation that is

classified by Michael Flynn. It is completely based on number of data and instruction

stream. The resources describe about difference in between SIMD and MIMD is that

MIMD comes up with many instructions which operated on various stream of data. In

the case of SIMD design, only one instruction is applied to a bunch of information or

data at required time. SIMD is found to less efficient with respect to performance in

comparison to MIMD.

I have selected this particular resource because it highlights differences between SIMD

and MIMD. SIMD is mainly needed for solving problems as it requires computation

with the processor performing the operation. MIMD used for solving a problem which

breaks down the algorithm into different parts.

Both SIMD and MIMD vary technically with respect to each other. SIMD processor are

considered to be much simple, smaller and faster in comparison to MIMD. SIMD can

perform some of the complex operation in sequential way while MIMD operation can

do in concurrent way.

Yes, the resource was beneficial as it provided us with some detail information about

SIMD and MIMD. These are two different kind of parallel processing system

architecture which makes use of different processor. It makes use of different

computers for data processing.

Week 2

4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The text discusses about one of the common problems that can arise during resource
allocation in operating systems, which is known as
deadlock. Find and summarise
ONE
resource that describes an algorithm of either deadlock avoidance or deadlock
prevention. The resource, and your summary, must focus on a single algorithm of
either
deadlock avoidance
or deadlock prevention, NOT both.
Title, Link and Reference:

An algorithm for deadlock prevention in DBMS

https://medium.com/@jschapir/today-i-learned-deadlock-and-deadlock-prevention-

ff5041316ad0

Schapiro, J. 2019.
Today I Learned: Deadlock and Deadlock Prevention. [online]
Medium [Accessed 3 Oct. 2019]. Available at: https://medium.com/@jschapir/today-i-

learned-deadlock-and-deadlock-p
revention-ff5041316ad0.
Summary:

The source highlights common issues which can come into picture as a result of

resource allocation in operating system. This particular issue is defined as deadlock. A

source focus on resource for deadlock avoidance or prevention. There are various kind

of threat which is defined as deadlock. This particular feature comes into picture when

various threads are waiting for releasing the lock so that can proceed. Two threads are

waiting for each other and essential for stuck.

The source highlights two kind of threads that is A and B for object 1 and 2. For the

thread A request for object 2 and thread B for the lock for object 1. The first is defined is

defined as order locking. The simple and effective method for ensuring that deadlock

has not come into picture. Thread A aims to lock the object 1. The thread B releases the

lock for object 1 and it much wait until and unless lock on object 1 is released.

The thread A for object 1 helps in enabling the thread B for continuing the different

action. Thread A locks the object 2 and repeats the above process. In this way, deadlock

is prevented completely. It merely focuses on various kind of lock which are acting on

system. The second option that would be available is all about keeping data structure for

different kind of threads. The locks are the key which they aim to hold. Now, if the

thread looks for any lock then there is need for checking the data structure. It is mainly

done analysing if data is taking place or not.

The source was useful as it provided the clear idea regarding an algorithm for deadlock

prevention or avoidance.

5
Document Page
Week 3
Internet of things (IoT) is an emerging trend towards smart interconnected embedded

technologies that allow us to monitor and control our environment. Find and summarise

ONE
resource that describe applications of the Internet of things in the field of Smart
Farming. The resource, and your summary, must focus on application of IoT
ONLY in
the field of smart farming.

Title, Link and Reference:

Application of Internet of things in field of smart farming

https://www.iotforall.com/iot-applications-in-agriculture/

Ravindra, S. 2019.
IoT Applications in Agriculture. [online] IoT For All [Accessed 27
Sep. 2019]. Available at: https://www.iotforall.com/iot-applications-in-agriculture/

Summary:

The following resource is about IoT, connected devices and automation, which finds its

use in the agriculture domain. It will merely enhance every face. In the last few years,

farming has encountered large of changes in the last few years. Agriculture is becoming

very much technology-driven and industrialized. By using, some of the smart gadgets,

farmers tend to have much better control over process of livestock raising and growing

crops.

Smart agriculture is generally denoted by use of IoT based solutions in agriculture.

Industrial IoT in agriculture is considered to be much more advanced than being used.

At present, sensors are being connected to some of the cloud networks. IoT is being

applied in agriculture industry that has helped the farmers to monitor the water level in

tanks in minimum time. It merely makes the whole irrigation process much more

efficient.

Farming which is based on IoT aims to make the whole agriculture by analysing the

field in real-time. By the help of sensor and interconnection, IoT in Agriculture will not

only save time for farmers. In addition, it will make use of resource for electricity and

water. This will merely keep the different factors like temperature and soil under proper

check which provides a clear real time observation.

The source was beneficial as it provides a list of benefits for adopting IoT in Agriculture

like climatic condition and precision farming. In addition, there are some benefits like a

smart greenhouse, data analytics and drones for keeping track of ongoing agriculture.

6
Document Page
Week 4
The text discusses about IPv4, however, IPv6 is the emerging protocol which is in the

process of superseding IPv4. Find and summarise
ONE resource that describes about
the technologies that are used to run both protocols simultaneously over the same

internet infrastructure.

Title, Link and Reference:

Technologies used for running IPv4 and IPv6

https://www.cloudwards.net/ipv4-vs-ipv6/

Security, O. and Security, O. 2019.
IPv4 vs IPv6: How Two Protocols Run the Internet
in 2019
? [online] Cloudwards. [Accessed 29 Sep. 2019]. Available at:
https://www.cloudwards.net/ipv4-vs-ipv6/.

Summary:

The source highlights how the technologies used for running both protocol how IPv4

and IPv6 protocols are being used in single technology. IPv4 works like a backbone of

internet right from the inception. It merely carries collection of four different system to

internet of things. The overall exhaustion of IPv4 address is completely predicted in the

last few years. In the year 2012, IPv6 has come into global platform. There are large

number of devices like NAT, router and agents which acts in between private network

and public like internet.

There are mainly two version of IP address that is IPv4 and IPv6. The forth version of

the TCP suite is the IPv4. In the year 1993, IPv4 was deployed on ARPNET which still

powers most of the internet. When IPv4 was deployed, then its design could anticipate

the booming of internet. The overall growth of number of user has coupled on the use of

IoT and resulted in the acceleration of IPv4 addresses.

IPv4 makes use of 32 bit addresses that is equal to 4 bytes value. It will merely limit the

address pool for the IPv4 to more than 4.3 billion unique address. It merely sounds like

a lot of factor which is estimated for 7.5 billion. Internet mainly on the overall network

address translation for IPv4 which has been exhausted. It allows only a single IP address

that is needed for recycling of IP addresses.

The resource was useful has it provided some clear details about devices like ISP and

mobile carrier. These two particular technologies are mainly responsible for taking

most of the IPv6 into picture. Both large enterprises, data centres which will highlight

their own migration. It can be stated that both IPv4 and IPv6 that exist in most of the

parallel networks
.
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Week 5
Network security has become a major concern of ICT world, and user authentication is

one of the popular tools to assure network security. Find and summarise
ONE resource
that describes any
ONE authentication mechanism except password. The resource, and
your summary, should focus purely on
ONLY ONE type of authentication mechanism.
Title, Link and Reference:

Soft Tokens

https://www.securenvoy.com/en-gb/two-factor-authentication/soft-tokens-explained

Ltd, S. 2019.
Soft Tokens - Two Factor Authentication | SecurEnvoy. [online]
Securenvoy.com [Accessed 27 Sep. 2019]. Available at:

https://www.securenvoy.com/en-gb/two-factor-authentication/soft-tokens-explained

Summary:

The following source is all about soft token application which is available for range of

devices like blackberry, Mac, windows phone and Microsoft windows. It merely helps

in moving in between the devices in secure way which does not require any additional

cost. Soft tokens provides rapid deployment for most of the user. It handles most of

changes for international time zones at the time of travelling. In addition, it helps in

improved copy protection.

The updated SecurEnvoy V7 helps the user in providing a better choice for security

which is token less SMS two factor authentication. In addition, it can be used for

providing securing blackberry mails, voice call or even soft token download option.

There are many kind of charge add on for end products of SecurEnvoy suite. User can

easily select a required soft token application for Google or SecurEnvoy. Most of the

soft tokens can be enrolled in the similar application or even multiple one.

In this, user is given the freedom to easily migrate a new mobile model by enrolment of

new mobile phone. User can easily their old phone application or SMS so that they can

provide two factor authentication for the enrolment portal. In this, user can simply scan

the QR code for provision of new mobile phone. Security server aims to automatically

delete the records of old phone.

SecurEnvoy soft tokens are required for both mobile phones or desktop so that one time

password can be generated easily. The password can be used for providing two-factor

authentication which can be analysed by goggle cloud login and SecurEnvoy. Quick

response codes are considered to be excellent for bar code matrix for deployment. In

this, user just need to scan QR code for mobile cameras for ensuring an automatic

enrolment.

8
Document Page
Week 6
The text discusses about a massive data breach that happened in Target company,

which is referred as ‘Target Breach’. Find and summarise
ONE resource that
describes another recent (within last 5 years) well-publicised attack or security

breach on a public company or government organisation. The resource, and your

summary, should describe about
A SINGLE EXAMPLE of security breach.
Title, Link and Reference:

Data Breach at Uber affecting 57 million riders and drivers

https://www.cnbc.com/2018/09/26/uber-to-pay-148-million-for-2016-data-

breach-and-cover-up.html

Salinas, S. 2019.
Uber will pay $148 million in connection with a 2016 data
breach and cover-up
. [online] CNBC [Accessed 27 Sep. 2019]. Available at:
https://www.cnbc.com/2018/09/26/uber-to-pay-148-million-for-2016-data-

breach-and-cover-up.html

Summary:

The source highlights the Uber data breach which provided access to the vital

information of more than 57 million drivers and riders. The organization has

agreed to pay ransom value of around 100,000 million for deleting the collected

data of different. In addition, the organization has focused on keeping the data

breach quite instead of reporting the incident. The decision of the organization to

keep the details of data breach is an incident of violation of public trust.

The following source has been selected as it provides detail information about the

data breach at Uber. For most of the Uber riders, the organization has agreed to pay

around 148 million dollars. The breach resulted the hacker to have an easy access

to most of the personal information for 57 million riders and drivers. The

organization has successfully monitored the affected accounts. In addition, it has

provided addition fraud protection.

Uber has failed to safeguard the user data and notify different authorities for its

exposure. Consistency for the corporate culture in times can swipe the breach

under the rug which is as per the disregard of the law. Hacker stole all the personal

information which is inclusive of names and driver information. The attack result

in breach of details of around 600,000 drivers in united states. It also lead to the

compromising with email address and phone number of different drivers.

The resource was useful as it clearly stated the people who are behind the data

breach at Uber. The organization has claimed that two people who does not work

for organization accessed the data on third party cloud service used by Uber.

Cybercriminal have make an attempt for launching phishing attack that appears to

9
Document Page
Uber. It merely helps in trick any unsuspecting customer from providing personal
information like credential or payment card details.

10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Week 7
The text briefly discusses about e-commerce and e-business. Find and summarise

ONE
resource that discusses the relationship between e-commerce and e-business.
The resource, and your summary, should describe similarities and difference between

e-commerce and e-business.

Title, Link and Reference:

Relationship in between e-commerce and e-business

https://smallbusiness.chron.com/similarities-between-ebusiness-ecommerce-

31030.html

Richards, L. 2019.
The Similarities Between E-business & E-commerce. [online]
Smallbusiness.chron.com
[Accessed 27 Sep. 2019]. Available at:
https://smallbusiness.chron.com/similarities-between-ebusiness-ecommerce-

31030.html

Summary:

The source highlights the relationship in between e-business and e-commerce. The

development of internet has created a path for different business model. Most of the

organization around the globe have used it effectively. Both the terms that are easily

interchangeable but it has some amount of difference in between.

This source has been selected as it provided all the similarities and difference in

between e-business and e-commerce. E-commerce is about online transaction that

requires purchase of certain goods and services. E-business is all about covering various

online transaction for e-commerce. The sale of books on amazon website is an e-

commerce activity. E-business aims to cover different online transaction for e-

commerce.

The resource highlights small business can easily expand their business model in e-

commerce platform. Everything can reach to different customer without the overall cost

for good. E-business activity is merely inclusive of different elements for business

running that has moved to online setting. E-business is merely inclusive of certain

number of customer based activities like processing order and marketing of products.

Most of the business are asking their customer to rate potential new colour products. On

the internet platform, there is a variety of business-business to based activities.

Yes, the resource was useful as it provided us all the detail requirement like similarities

and difference in between e-business and e-commerce. There are many new

opportunities for which the business is developing a much strong online presence. E-

commerce can be defined as the subset of e-business. The activities are merely inclusive

of different elements which are required for running business.

11
Document Page
Week 8
The text book discusses about the success story of ARI (Automotive Resources

International) company after implementing SAP BusinessObjects Explorer and

integrating it with HANA. HANA is SAP’s in-memory computing platform that is

deployable as an on-premise hardware and software appliance or in the cloud. Find and

summarise
ONE resource that describes the success story of adapting SAP HANA by
another local or international company. The resource, and your summary, should focus

on the story about
ONE single company (which is not ARI company).
Title, Link and Reference:

Success story of adapting SAP HANA

https://itelligencegroup.com/in-en/success-stories/successstory-network-services-

company/

Stories, C. and Company, N. 2019.
Success Story: SAP HANA implementation by
itelligence
. [Online] itelligence India. [Accessed 27 Sep. 2019].Available at:
https://itelligencegroup.com/in-en/success-stories/successstory-network-services-

company

Summary:

The following source is all about the successful implementation of SAP HANA in

intelligence group. Network service organization is considered to be flexible,

distribution solution which enhances overall supply chain efficiency. The system of this

organization focuses on some of the single resources of the organization that focus on

local market presence on international platform.

Centralized account management aims to provide much better control while the

network distribution aims to deliver flexibility and category expertise. With the

adaptation of SAP HANA network, the organization has gained huge amount of

production gains. In some cases, it results in huge amount of improvement. It is

generally achieving a hosting platform where the network freed is around 30 TB.

The network SAP HANA does not have any plan for cloud support. Instead of that

executives understand the standard of the organization in case of on premise approach.

This will merely help them in continuing a proper route. However, there are some

changes in opinion where decision makers make an evaluation with respect to certain

number of factors like cost analysis.

The source was useful as it provided complete details about the organization about how

it become success after migrating to SAP HANA. The organization aim to experience

positive result after implementation.

12
chevron_up_icon
1 out of 17
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]