COIT20246 Assignment - Computer Architecture, Networks, and Security
VerifiedAdded on 2019/10/30
|17
|4159
|43
Homework Assignment
AI Summary
This assignment, submitted for the COIT20246 course, covers a range of topics in computer architecture and networking. It begins with an exploration of the individuals who significantly influenced the development of computers and their components, followed by an examination of input/output devices. The assignment then delves into operating systems, focusing on process management, and the networks that led to the modern Internet, specifically TCP/IP. Further tasks include an analysis of Ethernet and a discussion of VLANs as Layer 2 protocols. The role of hackers in network infrastructure attacks is also examined, with a focus on Kevin Mitnick. Finally, the assignment explores future networking technologies, specifically malware trends and their impact on society. Each task involves summarizing a resource related to the week's topic, demonstrating a comprehensive understanding of the subject matter.

COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
It will be necessary to use literature/online resources to complete this
assignment, please ensure you cite and reference any such materials using
the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not
use your own words!
Please complete your assignment using this submission template file,
inserting your responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
It will be necessary to use literature/online resources to complete this
assignment, please ensure you cite and reference any such materials using
the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not
use your own words!
Please complete your assignment using this submission template file,
inserting your responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is a
table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Week 1
The text discusses the elements of modern computing architecture however is largely silent
on the individuals who played a role in its development. Find and summarise a resource that
describes ONE such individual. The individual should have had a significant influence on the
development of computers and/or components of modern computing architecture.
Computer Concepts and Terminology (Input and Output Devices)
Unm.edu. (2017). Computer Terminology - Input and Output. [online] Available at:
https://www.unm.edu/~tbeach/terms/inputoutput.html [Accessed 25 Sep. 2017].
One of the most important electronic device elements of the computer architecture is
the input\output devices. The input device is the utilized for entering the data in the
computers. The output device delivers the processed result to the user. For the first
generation computers the input devices were the paper tape and the paper punch. The
output was been printed on the paper. For the last generation the input devices were
the mouse, microphone, scanner, digital camera, finger reader and the touchpad. On
the other hand, the output devices were the data projector, speaker, printer and the
monitor. The keyboard and mouse have been the most popular input devices in the
current age. The mouse is utilized as the interface between the human and computer
and keyboard is helpful to enter texts into the machines, The most significant output
devices has been the projectors and computers. Again some of the output and the
input devices have been attractive. For example the electronic nose is useful in
detecting the odours and used in the food industries for detecting the pungent smell in
There are ten (10) tasks, one for each week: the tasks are detailed below. There is a
table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Week 1
The text discusses the elements of modern computing architecture however is largely silent
on the individuals who played a role in its development. Find and summarise a resource that
describes ONE such individual. The individual should have had a significant influence on the
development of computers and/or components of modern computing architecture.
Computer Concepts and Terminology (Input and Output Devices)
Unm.edu. (2017). Computer Terminology - Input and Output. [online] Available at:
https://www.unm.edu/~tbeach/terms/inputoutput.html [Accessed 25 Sep. 2017].
One of the most important electronic device elements of the computer architecture is
the input\output devices. The input device is the utilized for entering the data in the
computers. The output device delivers the processed result to the user. For the first
generation computers the input devices were the paper tape and the paper punch. The
output was been printed on the paper. For the last generation the input devices were
the mouse, microphone, scanner, digital camera, finger reader and the touchpad. On
the other hand, the output devices were the data projector, speaker, printer and the
monitor. The keyboard and mouse have been the most popular input devices in the
current age. The mouse is utilized as the interface between the human and computer
and keyboard is helpful to enter texts into the machines, The most significant output
devices has been the projectors and computers. Again some of the output and the
input devices have been attractive. For example the electronic nose is useful in
detecting the odours and used in the food industries for detecting the pungent smell in

the prepared foods. Some special devices of this type are known as the assistive
technology and are utilized for the disabled people. Thus people could live and work
independently. For instance two bracelets, poor of shoes, glove work set of rings
could be working as the input and output devices.
Week 2
The text discusses the components and activities of operating systems however is largely
silent on the individuals who played a role in their development. Find and summarise a
resource that describes ONEsuch individual. The individual should have had a significant
influence on the writing or development of operating systems.
Operating system components
1.3 Operating system components. (2017). Cis2.oc.ctc.edu. Retrieved 18 September 2017, from
http://cis2.oc.ctc.edu/oc_apps/Westlund/xbook/111_u04e/Web/13.htm
Process Management, an important component of the Operating system is chosen
here. The CPU has been executing huge quantity of programs. The primary concern
has been the execution of the user programs. However the CPU is required for other
system activities. The activities are known as the processes. The batch job and the
time-shared user program is the process. Moreover the spooling or the system task is
noted as the process. The process is considered as the task or the program of time
sharing.
The process required particular resources like the I/O devices, memory, files and CPU
time for accomplishing its tasks. The resources are provided to the process as it gets
generated. Moreover the physical and the logical resources obtained by the process as
it gets created, few data inputs or initializations are passed along. The program is not
a process. It is the passive entity and the process is the active entity. Two processes
technology and are utilized for the disabled people. Thus people could live and work
independently. For instance two bracelets, poor of shoes, glove work set of rings
could be working as the input and output devices.
Week 2
The text discusses the components and activities of operating systems however is largely
silent on the individuals who played a role in their development. Find and summarise a
resource that describes ONEsuch individual. The individual should have had a significant
influence on the writing or development of operating systems.
Operating system components
1.3 Operating system components. (2017). Cis2.oc.ctc.edu. Retrieved 18 September 2017, from
http://cis2.oc.ctc.edu/oc_apps/Westlund/xbook/111_u04e/Web/13.htm
Process Management, an important component of the Operating system is chosen
here. The CPU has been executing huge quantity of programs. The primary concern
has been the execution of the user programs. However the CPU is required for other
system activities. The activities are known as the processes. The batch job and the
time-shared user program is the process. Moreover the spooling or the system task is
noted as the process. The process is considered as the task or the program of time
sharing.
The process required particular resources like the I/O devices, memory, files and CPU
time for accomplishing its tasks. The resources are provided to the process as it gets
generated. Moreover the physical and the logical resources obtained by the process as
it gets created, few data inputs or initializations are passed along. The program is not
a process. It is the passive entity and the process is the active entity. Two processes
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

could be associated with the similar program, but they are never considered to the
separate sequences of the execution.
The process has been working unit in the system. Thus kind of system comprises of
the collection of process. Few of them are processes of operating system comprising
of those who have been executing the system code. The others are the user processes
executing the user codes. These processes could execute concurrently potentially. The
operating system has been engaged in some of the activities associated with the
managed processes. This includes the generation and deletion of both the system and
user processes, the suspension have been the process resumption, the mechanism
provisions for the process synchronization, the mechanism provision for the process
synchronization.
separate sequences of the execution.
The process has been working unit in the system. Thus kind of system comprises of
the collection of process. Few of them are processes of operating system comprising
of those who have been executing the system code. The others are the user processes
executing the user codes. These processes could execute concurrently potentially. The
operating system has been engaged in some of the activities associated with the
managed processes. This includes the generation and deletion of both the system and
user processes, the suspension have been the process resumption, the mechanism
provisions for the process synchronization, the mechanism provision for the process
synchronization.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Week 3
The Internet didn’t just appear – it was an evolution from earlier networks. Find and
summarise a resource that describes ONEof the networks that led to the development of the
modern Internet.
TCP/IP or the “Transmission Control Protocol/Internet Protocol
What is TCP/IP? - Definition from Techopedia. (2017). Techopedia.com. Retrieved 18 September
2017, from https://www.techopedia.com/definition/2460/transmission-control-protocolinternet-
protocol-tcpip
The TCP/IP or the “Transmission Control Protocol/Internet Protocol” is taken here as
one of the networks that helped in developing the modern Internet. This has been the
language used by the computers to access Internet. This has comprised of the protocol
suites which are designed for establishing the network of networks. This is done
deliver the host to have access to the Internet. It has been responsible for the
connectivity of the full-fledged data and transferring information from one end to end
through providing various functions like acknowledgement, mapping and addressing.
It has comprised of four layers differing a little from the OSI model. All of the present
day computers have been supporting the TCP\IP. It is not the protocol of single
networking. This has been protocol suites named on the basis of two layers or
protocols under it, the TCP and the IP. Two things have been required here like any
type of communication. They are the message to transmit and the means to transmit
the message reliably. The TCP layer has been handling the message section. The
message is discriminated into smaller units known as packets. They are then
transmitted through the network. The packets have been received by the associated
layer of TCP layer in the receiver and then reassembled within the original message.
The Internet didn’t just appear – it was an evolution from earlier networks. Find and
summarise a resource that describes ONEof the networks that led to the development of the
modern Internet.
TCP/IP or the “Transmission Control Protocol/Internet Protocol
What is TCP/IP? - Definition from Techopedia. (2017). Techopedia.com. Retrieved 18 September
2017, from https://www.techopedia.com/definition/2460/transmission-control-protocolinternet-
protocol-tcpip
The TCP/IP or the “Transmission Control Protocol/Internet Protocol” is taken here as
one of the networks that helped in developing the modern Internet. This has been the
language used by the computers to access Internet. This has comprised of the protocol
suites which are designed for establishing the network of networks. This is done
deliver the host to have access to the Internet. It has been responsible for the
connectivity of the full-fledged data and transferring information from one end to end
through providing various functions like acknowledgement, mapping and addressing.
It has comprised of four layers differing a little from the OSI model. All of the present
day computers have been supporting the TCP\IP. It is not the protocol of single
networking. This has been protocol suites named on the basis of two layers or
protocols under it, the TCP and the IP. Two things have been required here like any
type of communication. They are the message to transmit and the means to transmit
the message reliably. The TCP layer has been handling the message section. The
message is discriminated into smaller units known as packets. They are then
transmitted through the network. The packets have been received by the associated
layer of TCP layer in the receiver and then reassembled within the original message.

The IP layer on the other side has been basically regarding the transmission part. It is
performed through the unique IP address that has been assigned to every recipient
active over the network.
Week 4
Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the text.
Find and summarise a resource that describes the features and uses of ONE other L2
protocol that is not discussed in the text (i.e. NOT Ethernet).
Virtual Local Area Network (VLAN)
What is a Virtual Local Area Network (VLAN)? - Definition from Techopedia.
(2017). Techopedia.com. Retrieved 18 September 2017, from
https://www.techopedia.com/definition/4804/virtual-local-area-network-vlan
The VLAN or Virtual Local Area Network is an example of the L2 or the Layer Two
protocol of data link. This has comprised the logical group workstations, network
devices and servers appearing over the same LAN regardless the geographical
distribution. It has been allowing the computer networks and the users to
communicate in the simulated surroundings such that they have been present in one
LAN and sharing the single broadcast and the multicast domain. They have been
imposed for achieving the ease of network management, security and scalability.
They could adapt to the changes very quickly in the network requirements, server
nodes and the workstation relocations.
The high end switches has been allowing the implementation and functionality of the
VLANs. The reason to implement the VLAN has been to develop the network
performance and apply the proper security measures. The networks of the computers
could be segmented into the LANs and WANs. The VLAN has been permitting
performed through the unique IP address that has been assigned to every recipient
active over the network.
Week 4
Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the text.
Find and summarise a resource that describes the features and uses of ONE other L2
protocol that is not discussed in the text (i.e. NOT Ethernet).
Virtual Local Area Network (VLAN)
What is a Virtual Local Area Network (VLAN)? - Definition from Techopedia.
(2017). Techopedia.com. Retrieved 18 September 2017, from
https://www.techopedia.com/definition/4804/virtual-local-area-network-vlan
The VLAN or Virtual Local Area Network is an example of the L2 or the Layer Two
protocol of data link. This has comprised the logical group workstations, network
devices and servers appearing over the same LAN regardless the geographical
distribution. It has been allowing the computer networks and the users to
communicate in the simulated surroundings such that they have been present in one
LAN and sharing the single broadcast and the multicast domain. They have been
imposed for achieving the ease of network management, security and scalability.
They could adapt to the changes very quickly in the network requirements, server
nodes and the workstation relocations.
The high end switches has been allowing the implementation and functionality of the
VLANs. The reason to implement the VLAN has been to develop the network
performance and apply the proper security measures. The networks of the computers
could be segmented into the LANs and WANs. The VLAN has been permitting
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

various networks working virtually as a single LAN. A popular advantage of VLAN
is that it could eradicate the latency in any network. This saves the resources of
network and the rise in network efficiency. The main benefits to incorporate the
VLAN are that it has been allowing the network administrators in applying extra
security to the network communication. It has been creating the extension and
relocation of the network or the network device simpler. However some limitations of
it are the more effective to control the latency but less efficient while compared to
LAN.
Week 5
The text mentions the role of hackers in attacks on networked infrastructure. Find and
summarise a resource that describes ONE famous or well-known hacker.
Kevin Mitnick, the World's Most Notorious Hacker, Still Breaking
Into Computers
Recode. (2017). Why Kevin Mitnick, the World's Most Notorious Hacker, Is Still
Breaking Into Computers. [online] Available at:
https://www.recode.net/2015/3/26/11560712/why-kevin-mitnick-the-worlds-most-
notorious-hacker-is-still-breaking [Accessed 18 Sep. 2017].
At the year, 1999, Kevin Mitnick was pled guilty because of wire fraud, computer
fraud and intercepting the communications illegally. He spent five years at the federal
jail. This also included about eight months the solitary refinement. He has turned
about fifty now. He confessed that he achieved illegal access to the machines of the
big organizations like the Sun Microsystems, Nokia and Motorola. All these were
done by him in the search of adventure and knowledge. According to him, his
is that it could eradicate the latency in any network. This saves the resources of
network and the rise in network efficiency. The main benefits to incorporate the
VLAN are that it has been allowing the network administrators in applying extra
security to the network communication. It has been creating the extension and
relocation of the network or the network device simpler. However some limitations of
it are the more effective to control the latency but less efficient while compared to
LAN.
Week 5
The text mentions the role of hackers in attacks on networked infrastructure. Find and
summarise a resource that describes ONE famous or well-known hacker.
Kevin Mitnick, the World's Most Notorious Hacker, Still Breaking
Into Computers
Recode. (2017). Why Kevin Mitnick, the World's Most Notorious Hacker, Is Still
Breaking Into Computers. [online] Available at:
https://www.recode.net/2015/3/26/11560712/why-kevin-mitnick-the-worlds-most-
notorious-hacker-is-still-breaking [Accessed 18 Sep. 2017].
At the year, 1999, Kevin Mitnick was pled guilty because of wire fraud, computer
fraud and intercepting the communications illegally. He spent five years at the federal
jail. This also included about eight months the solitary refinement. He has turned
about fifty now. He confessed that he achieved illegal access to the machines of the
big organizations like the Sun Microsystems, Nokia and Motorola. All these were
done by him in the search of adventure and knowledge. According to him, his
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

activities were not meant for personal gain or to cause meaningful harm. At the
present era, the hackers have been representing the criminal gangs with full payment
from the crime world. Moreover the third world countries have been pilfering
information on daily basis from the multinational organizations across the globe to
sale on the black market. In this scenario the idea of hacking regarding sheer hearkens
has been backing to a more naïve time.
Mitnick has been paid highly at the present day. He has been appointed as the
efficient security consultant for some of the biggest organizations in the world. These
companies include the Lockheed Martin, IBM, CBS, Toshiba and FedEx. Thus he got
the opportunity to show his talent in the positive way in the field he could do well.
The main business of Mitnick is to perform the penetration testing. He has been
testing the physical, technical securities and the people. Apart from this, he has been
also testing the wireless networks and the VOIP phones. They have been testing all
the things around the board for searching for the vulnerabilities such that the clients
could fix them.
present era, the hackers have been representing the criminal gangs with full payment
from the crime world. Moreover the third world countries have been pilfering
information on daily basis from the multinational organizations across the globe to
sale on the black market. In this scenario the idea of hacking regarding sheer hearkens
has been backing to a more naïve time.
Mitnick has been paid highly at the present day. He has been appointed as the
efficient security consultant for some of the biggest organizations in the world. These
companies include the Lockheed Martin, IBM, CBS, Toshiba and FedEx. Thus he got
the opportunity to show his talent in the positive way in the field he could do well.
The main business of Mitnick is to perform the penetration testing. He has been
testing the physical, technical securities and the people. Apart from this, he has been
also testing the wireless networks and the VOIP phones. They have been testing all
the things around the board for searching for the vulnerabilities such that the clients
could fix them.

Week 6
Society is increasingly reliant on networks and network technologies but they are evolving at
a rapid pace. Find and summarise a resource that describes ONE example of a future
networking technology or trend that will impact society.
Malware will continue to evolve
Hogg, S. (2017). 6 network and security trends you can expect in 2017. [online]
Network World. Available at:
https://www.networkworld.com/article/3148871/internet-of-things/scott-hogg-s-2017-
technology-predictions.html [Accessed 18 Sep. 2017].
In order to reach the targets world-wide, the Malware is the most effective option for
the attackers. Its propagation is the method of definite attack, since the last few years.
Currently, their affectivity of the most antivirus products is a subject of debate. More
and more vendors of security have been offering malware defenses. However, all the
solutions of the vendors have not been effective completely. This is because it has
been continuing to be metamorphized. One of the trends that have been emerging is
the development of the malware which is memory-resident. Those ephemeral
infections could not survive the reboot. They have been especially hard to be detected
forensically. However most of the people have been leaving their computers at
running continuously. This has been a successful technique of attack.
Since the malware has been defending the organization, and the computers have been
turning more prolific, these attackers could again change their process. This has not
been hard to forecast that more number of attackers would go for the mobile malware.
As the organizations have been allowing the mobile devices for joining the internal
Wi-Fi networks of the corporate, the mobile devices has been just the lethal and
Society is increasingly reliant on networks and network technologies but they are evolving at
a rapid pace. Find and summarise a resource that describes ONE example of a future
networking technology or trend that will impact society.
Malware will continue to evolve
Hogg, S. (2017). 6 network and security trends you can expect in 2017. [online]
Network World. Available at:
https://www.networkworld.com/article/3148871/internet-of-things/scott-hogg-s-2017-
technology-predictions.html [Accessed 18 Sep. 2017].
In order to reach the targets world-wide, the Malware is the most effective option for
the attackers. Its propagation is the method of definite attack, since the last few years.
Currently, their affectivity of the most antivirus products is a subject of debate. More
and more vendors of security have been offering malware defenses. However, all the
solutions of the vendors have not been effective completely. This is because it has
been continuing to be metamorphized. One of the trends that have been emerging is
the development of the malware which is memory-resident. Those ephemeral
infections could not survive the reboot. They have been especially hard to be detected
forensically. However most of the people have been leaving their computers at
running continuously. This has been a successful technique of attack.
Since the malware has been defending the organization, and the computers have been
turning more prolific, these attackers could again change their process. This has not
been hard to forecast that more number of attackers would go for the mobile malware.
As the organizations have been allowing the mobile devices for joining the internal
Wi-Fi networks of the corporate, the mobile devices has been just the lethal and
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

allowing the attackers to achieve access to the easy vulnerable of those corporate
enterprise. Moreover, the 5G and the 4G services have been delivering the internet
bandwidth substantially. These mobile devices could be leveraged for the highly
prone DDos attacks. Thus the evolution of the malware is a future trend that must be
definitely anticipated by the enterprises.
Week 7
The text mentions social business and the impact of the use of social networking platforms.
Find and summarise a resource that describes the history of the development of ONE such
social media platform.
A brief history of Facebook
Phillips, S. (2017). A brief history of Facebook. [online] the Guardian. Available at:
https://www.theguardian.com/technology/2007/jul/25/media.newmedia [Accessed 18
Sep. 2017].
Here, the history of Facebook is discussed. Mark Zuckerberg, a twenty-three years old
person founded Facebook. He was studying psychology as the Harvard University. As
a keen programmer, he already developed various social networking sites for the
fellow students. This included the Coursematch allowing the users to see the people
taking the degree. Another one was the Facemash where the attractiveness of the
people could be rated. He launched “The facebook”, as its initial name, on February
2004. This name was taken from the paper sheets that were distributed to the staff,
profiling students and the freshmen. About twelve hundred students from Harvard
signed up within twenty four hours. After a month, about half of the undergraduate
people possessed the profile. It came to be known as the Facebook.com during August
2005 as the address got purchased for about 200,000 dollars. It was signed up by the
U.S. high schools from September 2005. Then it reached the universities at U.K. the
enterprise. Moreover, the 5G and the 4G services have been delivering the internet
bandwidth substantially. These mobile devices could be leveraged for the highly
prone DDos attacks. Thus the evolution of the malware is a future trend that must be
definitely anticipated by the enterprises.
Week 7
The text mentions social business and the impact of the use of social networking platforms.
Find and summarise a resource that describes the history of the development of ONE such
social media platform.
A brief history of Facebook
Phillips, S. (2017). A brief history of Facebook. [online] the Guardian. Available at:
https://www.theguardian.com/technology/2007/jul/25/media.newmedia [Accessed 18
Sep. 2017].
Here, the history of Facebook is discussed. Mark Zuckerberg, a twenty-three years old
person founded Facebook. He was studying psychology as the Harvard University. As
a keen programmer, he already developed various social networking sites for the
fellow students. This included the Coursematch allowing the users to see the people
taking the degree. Another one was the Facemash where the attractiveness of the
people could be rated. He launched “The facebook”, as its initial name, on February
2004. This name was taken from the paper sheets that were distributed to the staff,
profiling students and the freshmen. About twelve hundred students from Harvard
signed up within twenty four hours. After a month, about half of the undergraduate
people possessed the profile. It came to be known as the Facebook.com during August
2005 as the address got purchased for about 200,000 dollars. It was signed up by the
U.S. high schools from September 2005. Then it reached the universities at U.K. the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

next month. The network got extended to the people with registered email address
beyond the educational institutes. Then the site could be freely joined and created
profit by the advertising revenue. Organizations like Google and Yahoo expressed
high interest to buy Facebook with an amount of about 2 billion dollars as per as a
rumor spread. However, Zuckerberg refused to sell his invention. The features of the
site developed to continue at 2007. The users could give various gifts to their friends
and post classified advertisements freely. They could also develop their individual
applications. For instance the Scrabble and graffiti are some its examples.
Week 8
With the advent of mass data collection and storage has come data mining. Find and
summarise a resource that describes ONE example where data mining has been used
successfully by a business. You should not use any examples covered in the textbook.
Anomaly or Outlier Detection
eduCBA. (2017). 8 Important Data Mining Techniques for Successful Business.
[online] Available at: https://www.educba.com/8-data-mining-techniques-for-best-
results/ [Accessed 18 Sep. 2017].
Here, the anomaly or outlier detection is chosen as the technique for data mining for
successful business. It has been searching for the data items under the data sets same
to the projected pattern or the expected behavior. Moreover, the anomalies have been
providing the actionable and the critical data for the organizations and the brands. The
outlier has been object that has been deviating importantly from the common average
under the database set or the combination of data. This has been distinct from the
other data. That is why the outlier data has been requiring extra attentions and the
assessment since it has been delivering the various outlooks for a specific case. This
beyond the educational institutes. Then the site could be freely joined and created
profit by the advertising revenue. Organizations like Google and Yahoo expressed
high interest to buy Facebook with an amount of about 2 billion dollars as per as a
rumor spread. However, Zuckerberg refused to sell his invention. The features of the
site developed to continue at 2007. The users could give various gifts to their friends
and post classified advertisements freely. They could also develop their individual
applications. For instance the Scrabble and graffiti are some its examples.
Week 8
With the advent of mass data collection and storage has come data mining. Find and
summarise a resource that describes ONE example where data mining has been used
successfully by a business. You should not use any examples covered in the textbook.
Anomaly or Outlier Detection
eduCBA. (2017). 8 Important Data Mining Techniques for Successful Business.
[online] Available at: https://www.educba.com/8-data-mining-techniques-for-best-
results/ [Accessed 18 Sep. 2017].
Here, the anomaly or outlier detection is chosen as the technique for data mining for
successful business. It has been searching for the data items under the data sets same
to the projected pattern or the expected behavior. Moreover, the anomalies have been
providing the actionable and the critical data for the organizations and the brands. The
outlier has been object that has been deviating importantly from the common average
under the database set or the combination of data. This has been distinct from the
other data. That is why the outlier data has been requiring extra attentions and the
assessment since it has been delivering the various outlooks for a specific case. This

kind of techniques of data mining could be utilized for detecting the risks and fraud
under the critical systems. They have been ideal in every situation where this distinct
property of the data could be used in a particular manner and help the analysts to
identify the limitations in that system. Thus the fraudulent activities could be
identified, the flawed processes or the areas where particular theory has been invalid.
In this manner the proper system could be installed at the proper place with safety and
effectively. This has been vital to remind that the outliers have been much common in
various huge data sets. As the outliers have not been negative always, they could help
the brand seek unique things happening at the data sets. Thus whatever the case
scenario has been, the outcomes of the outlier detection has been requiring more
analysis for reaching the conclusive results.
under the critical systems. They have been ideal in every situation where this distinct
property of the data could be used in a particular manner and help the analysts to
identify the limitations in that system. Thus the fraudulent activities could be
identified, the flawed processes or the areas where particular theory has been invalid.
In this manner the proper system could be installed at the proper place with safety and
effectively. This has been vital to remind that the outliers have been much common in
various huge data sets. As the outliers have not been negative always, they could help
the brand seek unique things happening at the data sets. Thus whatever the case
scenario has been, the outcomes of the outlier detection has been requiring more
analysis for reaching the conclusive results.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 17
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.