COIT 20246 Assignment: Modern Computing and Networking Trends
VerifiedAdded on 2019/11/20
|12
|4128
|172
Homework Assignment
AI Summary
This assignment, submitted for COIT 20246, explores various aspects of computing and networking. It begins with summaries of resources on key figures like Sanjay Ghemawat (MapReduce) and Bill Gates (operating systems). The assignment then delves into the history of the internet, focusing on the networks that led to its development. It also examines Layer 2 protocols, including Cisco Discovery Protocol (CDP), and discusses famous hackers like Kevin Mitnick. Finally, the assignment concludes with an exploration of future networking technologies and trends, such as no-touch interfaces. Each task involves summarizing a resource, providing insights into the evolution and future of computer science and networking.

COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
It will be necessary to use literature/online resources to complete this assignment,
please ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from. either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use your
own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the formatting
of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
It will be necessary to use literature/online resources to complete this assignment,
please ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from. either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use your
own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the formatting
of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is a
table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Week 1
The text discusses the elements of modern computing architecture however is largely
silent on the individuals who played a role in its development. Find and summarise a
resource that describes ONE such individual. The individual should have had a
significant influence on the development of computers and/or components of modern
computing architecture.
MapReduce Approach
Reference: Wheeler, D. 2017. [online] Available at:
https://www.dwheeler.com/innovation/innovation.html [Accessed 16 Sep. 2017].
Link: https://www.dwheeler.com/innovation/innovation.html
Summary:
Sanjay Ghemawat and Jeffrey Dean revealed the massively-parallel MapReduce
In 2004, which is a programming model that can be helpful in enabling processing
and generates a large amount of data sets with a large collection of parallel machines,
even though in an easy programming way. This approach explains that developers
“specify a map function that processes a key/value pair to generate a set of
intermediate key/value pairs, and a reduce function that merges all intermediate
values associated with the same intermediate key.” An input reader, a compare
function, a partition function, an output writer, and a compare function are being
specified by the developers. The output gained is then fed into the presented
framework of the MapReduce that enables the execution of those definitions on the
conceivably large distributed collection in order to handle the complications like the
failures in the computers or in the networks. It was noted that “many real world tasks
are expressible in this model”. The programmers, who are inexperienced with the
distributed or parallel systems, can also use the large distributed system using
presented model in order to handle the large sets of data. These basics MapReduce
approach has been seems to be implemented into different tools like Qt Concurrent
and Handoop. Many articles have been proposed after this invention on the strategies
to implement MapReduce approaches, one of the examples is Eugene Ciurana
proposed article on how to implement MapReduce approach using Mule. This
invention was made for the goggle maps however it is being re-engineered even that it
is applicable in many projects.
Week 2
The text discusses the components and activities of operating systems however are
largely silent on the individuals who played a role in their development. Find and
summarise a resource that describes ONEsuch individual. The individual should
There are ten (10) tasks, one for each week: the tasks are detailed below. There is a
table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Week 1
The text discusses the elements of modern computing architecture however is largely
silent on the individuals who played a role in its development. Find and summarise a
resource that describes ONE such individual. The individual should have had a
significant influence on the development of computers and/or components of modern
computing architecture.
MapReduce Approach
Reference: Wheeler, D. 2017. [online] Available at:
https://www.dwheeler.com/innovation/innovation.html [Accessed 16 Sep. 2017].
Link: https://www.dwheeler.com/innovation/innovation.html
Summary:
Sanjay Ghemawat and Jeffrey Dean revealed the massively-parallel MapReduce
In 2004, which is a programming model that can be helpful in enabling processing
and generates a large amount of data sets with a large collection of parallel machines,
even though in an easy programming way. This approach explains that developers
“specify a map function that processes a key/value pair to generate a set of
intermediate key/value pairs, and a reduce function that merges all intermediate
values associated with the same intermediate key.” An input reader, a compare
function, a partition function, an output writer, and a compare function are being
specified by the developers. The output gained is then fed into the presented
framework of the MapReduce that enables the execution of those definitions on the
conceivably large distributed collection in order to handle the complications like the
failures in the computers or in the networks. It was noted that “many real world tasks
are expressible in this model”. The programmers, who are inexperienced with the
distributed or parallel systems, can also use the large distributed system using
presented model in order to handle the large sets of data. These basics MapReduce
approach has been seems to be implemented into different tools like Qt Concurrent
and Handoop. Many articles have been proposed after this invention on the strategies
to implement MapReduce approaches, one of the examples is Eugene Ciurana
proposed article on how to implement MapReduce approach using Mule. This
invention was made for the goggle maps however it is being re-engineered even that it
is applicable in many projects.
Week 2
The text discusses the components and activities of operating systems however are
largely silent on the individuals who played a role in their development. Find and
summarise a resource that describes ONEsuch individual. The individual should

have had a significant influence on the writing or development of operating systems.
Title: Bill Gates becomes knight but who invented the PC operating
system?
Reference: Hennigan, M. 2017. Bill Gates becomes knight but who invented the PC
operating system?. [online] Finfacts.ie. Available at:
http://www.finfacts.ie/irelandbusinessnews/publish/article_1000654.shtml [Accessed
16 Sep. 2017].
Link: http://www.finfacts.ie/irelandbusinessnews/publish/article_1000654.shtml
Summary:
The first personal operating system was discovered by Kindall who had a PhD on
computer namely CP/M. His thought was that by the development of an operating
system applications introduced or created by different manufacturers would be able to
run on the same computers. This operating system (CP/M) had been sold very well in
the market, which gathered the attention of the IBM. At the same moment the biggest
computer company in the world, IBM was looking for an operating system for its
personal planned personal computer. 24 years old Bill Gates was visited by the
IBMers but he was not able to supply the required system and he directed the IBMers
to Kindall in August 1980. Kindall then met the oral agreement with the IBM as he
was reluctant to agree to the onerous conditions of that agreement related to non-
disclosure and confidentiality. After that on August 28, 1980, the Microsoft made an
agreement with the IBM that it will develop the required software for the Personal
Computers. Fellow of Gates Bill, Tim Paterson a Seattle resident had been developed
QDOS operating system, which was well aware to Gates. QDOS was bought for
$50,000. QDOS by the Microsoft, which had the same features as that of the CP/M
and later on it was improved by Microsoft and named as DOS. Parts of the QDOS had
been copied from the CP/M and were known to Kindall after some time that Bill
Gates was cheating on him but even that Kindall just signed license to the IBM rather
than taking him to the court as the Software Copyright was in its infancy.
Title: Bill Gates becomes knight but who invented the PC operating
system?
Reference: Hennigan, M. 2017. Bill Gates becomes knight but who invented the PC
operating system?. [online] Finfacts.ie. Available at:
http://www.finfacts.ie/irelandbusinessnews/publish/article_1000654.shtml [Accessed
16 Sep. 2017].
Link: http://www.finfacts.ie/irelandbusinessnews/publish/article_1000654.shtml
Summary:
The first personal operating system was discovered by Kindall who had a PhD on
computer namely CP/M. His thought was that by the development of an operating
system applications introduced or created by different manufacturers would be able to
run on the same computers. This operating system (CP/M) had been sold very well in
the market, which gathered the attention of the IBM. At the same moment the biggest
computer company in the world, IBM was looking for an operating system for its
personal planned personal computer. 24 years old Bill Gates was visited by the
IBMers but he was not able to supply the required system and he directed the IBMers
to Kindall in August 1980. Kindall then met the oral agreement with the IBM as he
was reluctant to agree to the onerous conditions of that agreement related to non-
disclosure and confidentiality. After that on August 28, 1980, the Microsoft made an
agreement with the IBM that it will develop the required software for the Personal
Computers. Fellow of Gates Bill, Tim Paterson a Seattle resident had been developed
QDOS operating system, which was well aware to Gates. QDOS was bought for
$50,000. QDOS by the Microsoft, which had the same features as that of the CP/M
and later on it was improved by Microsoft and named as DOS. Parts of the QDOS had
been copied from the CP/M and were known to Kindall after some time that Bill
Gates was cheating on him but even that Kindall just signed license to the IBM rather
than taking him to the court as the Software Copyright was in its infancy.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Week 3
The Internet didn’t just appear – it was an evolution from earlier networks. Find and
summarise a resource that describes ONEof the networks that led to the development
of the modern Internet.
Title: A Brief History of the Internet & Related Networks
Reference: Cerf, V. 2017. A Brief History of the Internet & Related Networks |
Internet Society. [online] Internet Society. Available at:
https://www.internetsociety.org/internet/history-internet/brief-history-internet-related-
networks [Accessed 16 Sep. 2017].
Link: https://www.internetsociety.org/internet/history-internet/brief-history-internet-related-networks
Summary:
Variety of researches had been going-on on the technologies that would be related to
the computer networking from since 1960s. The earliest research was consist and
concentrated around the packet switching, which is a technique of dividing
conversation into small groups or isolated units that is responsible for carrying the
address of the respected destination and follows through the network without
depending on others. At branching points, computers that are specialized for the task
in the network can have the variable path taken by the packets based on the moment-
to-moment response to the link failure or network congestion. Paul Baran of the
RAND Corporation was the very first pioneer of the packet switching that was
emphasized on the methods of network organizing in manner to withstand the nuclear
attack. “Paul Baran’s research interest is the likely source of a widespread myth
concerning the ARPANET's original purpose”. Without any centralized control
system a richly interconnected set of networks had been proposed by, which are the
same properties of the today’s internet. Roger Scantlebury and Donald Davies of NPL
(National Physical Laboratory) were working on the same research in the UK and
coined the term “packet”. Symposium on the OPERATING System Principles was
going on for the very first time in ACM (Association for Computing Machinery) in
1967. Then an IPTO program manager, Lawrence Roberts had proposed an initial
design for the first phase of ARPANET, which was a design for the packet-switched
network
Week 4
Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the
text. Find and summarise a resource that describes the features and uses of ONE
other L2 protocol that is not discussed in the text (i.e. NOT Ethernet).
Title: Configuring Cisco Discovery Protocol
Reference: Support, P., Products, E., Mainline, C. and Guides, C. 2017. [online]
Cisco. Available at:
https://www.cisco.com/c/en/us/td/docs/ios/12_2/configfun/configuration/guide/
The Internet didn’t just appear – it was an evolution from earlier networks. Find and
summarise a resource that describes ONEof the networks that led to the development
of the modern Internet.
Title: A Brief History of the Internet & Related Networks
Reference: Cerf, V. 2017. A Brief History of the Internet & Related Networks |
Internet Society. [online] Internet Society. Available at:
https://www.internetsociety.org/internet/history-internet/brief-history-internet-related-
networks [Accessed 16 Sep. 2017].
Link: https://www.internetsociety.org/internet/history-internet/brief-history-internet-related-networks
Summary:
Variety of researches had been going-on on the technologies that would be related to
the computer networking from since 1960s. The earliest research was consist and
concentrated around the packet switching, which is a technique of dividing
conversation into small groups or isolated units that is responsible for carrying the
address of the respected destination and follows through the network without
depending on others. At branching points, computers that are specialized for the task
in the network can have the variable path taken by the packets based on the moment-
to-moment response to the link failure or network congestion. Paul Baran of the
RAND Corporation was the very first pioneer of the packet switching that was
emphasized on the methods of network organizing in manner to withstand the nuclear
attack. “Paul Baran’s research interest is the likely source of a widespread myth
concerning the ARPANET's original purpose”. Without any centralized control
system a richly interconnected set of networks had been proposed by, which are the
same properties of the today’s internet. Roger Scantlebury and Donald Davies of NPL
(National Physical Laboratory) were working on the same research in the UK and
coined the term “packet”. Symposium on the OPERATING System Principles was
going on for the very first time in ACM (Association for Computing Machinery) in
1967. Then an IPTO program manager, Lawrence Roberts had proposed an initial
design for the first phase of ARPANET, which was a design for the packet-switched
network
Week 4
Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the
text. Find and summarise a resource that describes the features and uses of ONE
other L2 protocol that is not discussed in the text (i.e. NOT Ethernet).
Title: Configuring Cisco Discovery Protocol
Reference: Support, P., Products, E., Mainline, C. and Guides, C. 2017. [online]
Cisco. Available at:
https://www.cisco.com/c/en/us/td/docs/ios/12_2/configfun/configuration/guide/
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

ffun_c/fcf015.html [Accessed 16 Sep. 2017].
Link: www.cisco.com/c/en/us/td/docs/ios/12_2/configfun/configuration/guide/ffun_c/fcf015.html
Summary:
CDPv2 is another example of Layer two data link protocol which can also be
represented as DP Version-2. This is the very recent release of the protocol that can
be helpful in tracking features using more and advanced intelligent devices. The
feature of this protocol can be stated as it can enable a reporting mechanism that can
be helpful in tracking errors at the early stages and hence can reduce costly downtime.
Technically it can be said that the gathered error messages can be forwarded to the
logging or the console server and cover the instances that does not match with the
native VLANDs on un-matching port and on connecting port duplex states between
then devices that are connecting. Referring to the Cisco IOS Software System Error
Messages it can be said that document for detailed examples of the error messages
sent by CDP.
Another feature of CDPv2 show commands is that it can provide a detailed output on
the VTP (VLAN Trunking Protocol) duplex mode and management domain duplex
modes of devices that are near to each other, VLANIDs of connecting ports and CDP-
related counters.
With respect to the usage of CDP it can be used to discover the platform of the
devices and obtain protocol addresses of those neighbor devices. Another use of CDP
can be stated as to display the information related to the interfaces of the router uses.
It is a protocol and media independent that can run all the Cisco-manufactured
equipment that includes bridges, routers, servers, switches, and accessed servers.
Week 5
The text mentions the role of hackers in attacks on networked infrastructure. Find and
summarise a resource that describes ONE famous or well-known hacker.
Title: Top 10 most famous hackers
Reference: Telegraph.co.uk. (2017). Top 10 most famous hackers. [online] Available
at: http://www.telegraph.co.uk/technology/6670127/Top-10-most-famous-
hackers.html [Accessed 16 Sep. 2017].
Link: http://www.telegraph.co.uk/technology/6670127/Top-10-most-famous-
hackers.html
Summary:
Kevin Mitnick
Kevin Mitnic from United States can be represented as the most famous and mentor
for the hackers of this generation. United States Department of Justice had declared
Kevin Mitnick as the most wanted computer criminal in the history of the United
Link: www.cisco.com/c/en/us/td/docs/ios/12_2/configfun/configuration/guide/ffun_c/fcf015.html
Summary:
CDPv2 is another example of Layer two data link protocol which can also be
represented as DP Version-2. This is the very recent release of the protocol that can
be helpful in tracking features using more and advanced intelligent devices. The
feature of this protocol can be stated as it can enable a reporting mechanism that can
be helpful in tracking errors at the early stages and hence can reduce costly downtime.
Technically it can be said that the gathered error messages can be forwarded to the
logging or the console server and cover the instances that does not match with the
native VLANDs on un-matching port and on connecting port duplex states between
then devices that are connecting. Referring to the Cisco IOS Software System Error
Messages it can be said that document for detailed examples of the error messages
sent by CDP.
Another feature of CDPv2 show commands is that it can provide a detailed output on
the VTP (VLAN Trunking Protocol) duplex mode and management domain duplex
modes of devices that are near to each other, VLANIDs of connecting ports and CDP-
related counters.
With respect to the usage of CDP it can be used to discover the platform of the
devices and obtain protocol addresses of those neighbor devices. Another use of CDP
can be stated as to display the information related to the interfaces of the router uses.
It is a protocol and media independent that can run all the Cisco-manufactured
equipment that includes bridges, routers, servers, switches, and accessed servers.
Week 5
The text mentions the role of hackers in attacks on networked infrastructure. Find and
summarise a resource that describes ONE famous or well-known hacker.
Title: Top 10 most famous hackers
Reference: Telegraph.co.uk. (2017). Top 10 most famous hackers. [online] Available
at: http://www.telegraph.co.uk/technology/6670127/Top-10-most-famous-
hackers.html [Accessed 16 Sep. 2017].
Link: http://www.telegraph.co.uk/technology/6670127/Top-10-most-famous-
hackers.html
Summary:
Kevin Mitnick
Kevin Mitnic from United States can be represented as the most famous and mentor
for the hackers of this generation. United States Department of Justice had declared
Kevin Mitnick as the most wanted computer criminal in the history of the United

states and putted a large amount of bounty on his head. He had breached into the
databases of the top technology and telecommunication companies of the world as per
his self-styled ‘hacker poster boy’ attitude and damaged many of the intellectual
properties of the organization. The affected companies by the breaches done by him
include Fujitsu, Motorola, and Nokia who faced serious loss after the breaches. In
1995 after various attempts and lots of investment, FBI was able to track him down
and finally he was caught. He confesses all the condemned charges and accepted the
jail for five years, as the court sentenced him jail for five years. After spending five
years in the jail he got released in 2000 from the jail and started an information
security consultancy and leading a normal life by sharing the knowledge that he
gained from his activities. He is now getting paid to detect breaches and give
guidance over how to protect data. He had never called himself a hacker rather he
preferred to be called engineer and in his unique way he used to call the hacking as
“social engineering”.
Week 6
Society is increasingly reliant on networks and network technologies but they are
evolving at a rapid pace. Find and summarise a resource that describes ONE example
of a future networking technology or trend that will impact society.
Title: 5 Trends That Will Drive the Future of Technology
Reference: Satell, G. (2017). Forbes Welcome. [online] Forbes.com. Available at:
https://www.forbes.com/sites/gregsatell/2013/03/12/5-trends-that-will-drive-the-
future-of-technology/#534f4f1b51ee [Accessed 16 Sep. 2017].
Link: www.forbes.com/sites/gregsatell/2013/03/12/5-trends-that-will-drive-the-
future-of-technology/#534f4f1b51ee
Summary:
As the technology is being developed the face of the technology will keep continue
changing with the arrival of new and innovative technologies. Regarding the
researches that are being experimented it can be said that No-Touch Interfaces can
be the most trending and dominating technology in the future. This will eliminate the
usual behavior of individuals thinking that computer is a machine that can be operated
with hands. Similar to the early generation that get used to with the muses and
keyboards, present generation has adopted to learn it and texting at blazing speed. It
can be said that as the generation changes, new technologies are being invented and
iteration of new technologies will be requiring new skills and technique in order to
use it proficiently. It will be completely different technology than the Apple’s Siri or
OK Google or Microsoft’s Kinect and can be expected that computer adapt the
humans rather than the other way around. In little more than decade to be in the
market which will eliminate various steps during interfacing with the technology and
will save much time and also provide automation for the actions. New technologies
databases of the top technology and telecommunication companies of the world as per
his self-styled ‘hacker poster boy’ attitude and damaged many of the intellectual
properties of the organization. The affected companies by the breaches done by him
include Fujitsu, Motorola, and Nokia who faced serious loss after the breaches. In
1995 after various attempts and lots of investment, FBI was able to track him down
and finally he was caught. He confesses all the condemned charges and accepted the
jail for five years, as the court sentenced him jail for five years. After spending five
years in the jail he got released in 2000 from the jail and started an information
security consultancy and leading a normal life by sharing the knowledge that he
gained from his activities. He is now getting paid to detect breaches and give
guidance over how to protect data. He had never called himself a hacker rather he
preferred to be called engineer and in his unique way he used to call the hacking as
“social engineering”.
Week 6
Society is increasingly reliant on networks and network technologies but they are
evolving at a rapid pace. Find and summarise a resource that describes ONE example
of a future networking technology or trend that will impact society.
Title: 5 Trends That Will Drive the Future of Technology
Reference: Satell, G. (2017). Forbes Welcome. [online] Forbes.com. Available at:
https://www.forbes.com/sites/gregsatell/2013/03/12/5-trends-that-will-drive-the-
future-of-technology/#534f4f1b51ee [Accessed 16 Sep. 2017].
Link: www.forbes.com/sites/gregsatell/2013/03/12/5-trends-that-will-drive-the-
future-of-technology/#534f4f1b51ee
Summary:
As the technology is being developed the face of the technology will keep continue
changing with the arrival of new and innovative technologies. Regarding the
researches that are being experimented it can be said that No-Touch Interfaces can
be the most trending and dominating technology in the future. This will eliminate the
usual behavior of individuals thinking that computer is a machine that can be operated
with hands. Similar to the early generation that get used to with the muses and
keyboards, present generation has adopted to learn it and texting at blazing speed. It
can be said that as the generation changes, new technologies are being invented and
iteration of new technologies will be requiring new skills and technique in order to
use it proficiently. It will be completely different technology than the Apple’s Siri or
OK Google or Microsoft’s Kinect and can be expected that computer adapt the
humans rather than the other way around. In little more than decade to be in the
market which will eliminate various steps during interfacing with the technology and
will save much time and also provide automation for the actions. New technologies
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

with the basic recognition of the patterns has been more advancing and getting
evolved as the generation is passing, accelerating returns can be a thanks giving that is
helping the new generation to expect computer interface to become completely
distinguishable from humans and upgrading all the activities in automated manner. In
simple language it can be said that every work will be automated by using sensors and
other Internet of Things technologies in practical world.
Week 7
The text mentions social business and the impact of the use of social networking
platforms. Find and summarise a resource that describes the history of the
development of ONE such social media platform.
Title: 5 Social Media Monitoring Tools to Simplify Your Marketing
Reference: Peyton, L. (2017). 5 Social Media Monitoring Tools to Simplify Your
Marketing. [online] Socialmediaexaminer.com. Available at:
http://www.socialmediaexaminer.com/5-social-media-monitoring-tools-to-simplify-
your-marketing/ [Accessed 16 Sep. 2017].
Link: http://www.socialmediaexaminer.com/5-social-media-monitoring-tools-to-
simplify-your-marketing/
Summary:
There is no doubt on the statement that “Social media is changing the way of business
in positive manner”. Social media helps in collecting all the information related to the
customers’ needs and demand including the responses about the product and services
that are being offered by the organization. Viralheat Social Media Simplified is
application software that is a platform from where a businessperson can monitor the
voice of the customers or the clients. It is a very efficient fair tool that helps in
monitoring and managing the business using social media as the medium to interact
with the customers. Platforms that are supported in this software includes almost all
the social media websites that are; Google+, Twitter, Facebook, YouTube, Pinterest,
LinkedIn and several other forums and blogs. The features that are being implemented
in it allow a user to make comparison with the search profiles and relevant terms
across the all over web including social media in manner to track the individual
products and compare it with others. For small businesses Facebook is the most
dominant social media website to interact with the customers regarding, complaints
and reviews on the products or services being offered by the organization through
interacting with them individually. It can be used to visualize the data related to the
information about the individuals in the form of a graph or a pie chart. Because the
maximum number of population connected to the Facebook it gives an opportunity to
attract more customers and increase awareness about the products or services to them
using advertisement in the form of text, audio, video or images.
Week 8
With the advent of mass data collection and storage has come data mining. Find and
summarise a resource that describes ONE example where data mining has been used
successfully by a business. You should not use any examples covered in the
evolved as the generation is passing, accelerating returns can be a thanks giving that is
helping the new generation to expect computer interface to become completely
distinguishable from humans and upgrading all the activities in automated manner. In
simple language it can be said that every work will be automated by using sensors and
other Internet of Things technologies in practical world.
Week 7
The text mentions social business and the impact of the use of social networking
platforms. Find and summarise a resource that describes the history of the
development of ONE such social media platform.
Title: 5 Social Media Monitoring Tools to Simplify Your Marketing
Reference: Peyton, L. (2017). 5 Social Media Monitoring Tools to Simplify Your
Marketing. [online] Socialmediaexaminer.com. Available at:
http://www.socialmediaexaminer.com/5-social-media-monitoring-tools-to-simplify-
your-marketing/ [Accessed 16 Sep. 2017].
Link: http://www.socialmediaexaminer.com/5-social-media-monitoring-tools-to-
simplify-your-marketing/
Summary:
There is no doubt on the statement that “Social media is changing the way of business
in positive manner”. Social media helps in collecting all the information related to the
customers’ needs and demand including the responses about the product and services
that are being offered by the organization. Viralheat Social Media Simplified is
application software that is a platform from where a businessperson can monitor the
voice of the customers or the clients. It is a very efficient fair tool that helps in
monitoring and managing the business using social media as the medium to interact
with the customers. Platforms that are supported in this software includes almost all
the social media websites that are; Google+, Twitter, Facebook, YouTube, Pinterest,
LinkedIn and several other forums and blogs. The features that are being implemented
in it allow a user to make comparison with the search profiles and relevant terms
across the all over web including social media in manner to track the individual
products and compare it with others. For small businesses Facebook is the most
dominant social media website to interact with the customers regarding, complaints
and reviews on the products or services being offered by the organization through
interacting with them individually. It can be used to visualize the data related to the
information about the individuals in the form of a graph or a pie chart. Because the
maximum number of population connected to the Facebook it gives an opportunity to
attract more customers and increase awareness about the products or services to them
using advertisement in the form of text, audio, video or images.
Week 8
With the advent of mass data collection and storage has come data mining. Find and
summarise a resource that describes ONE example where data mining has been used
successfully by a business. You should not use any examples covered in the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

textbook.
Title: 13 Retail Companies Using Data to Revolutionize Online &
Offline Shopping Experiences
Reference: SmartData Collective. (2017). 13 Retail Companies Using Data to
Revolutionize Shopping Experiences. [online] Available at:
https://www.smartdatacollective.com/13-retail-companies-using-data-revolutionize-
online-offline-shopping-experienc/ [Accessed 16 Sep. 2017].
Link : https://www.smartdatacollective.com/13-retail-companies-using-data-
revolutionize-online-offline-shopping-experienc/
Summary:
Data mining has changed the face of the organization and customer interaction and
allowing organizations to improve their business and make good profits. Data mining
is a process of collecting data and information related to the patterns of the option
selection of the customers, who went to the online shopping websites and use that
information to predict about the choices that the customer will make comparing with
the customer with same patterns in the past. There are so many real-world examples
among which Bonobos is one of the example that have improved its business using
data mining. Bonobos do online business and sells and attracts customers using data
mining. Data mining digs all the information if the customers’ online activities and
predict about the behaviour of the customer and offers the products that most of the
customers with same behaviour had bought the product. This prediction is helping the
Bonobos to offer the customers with the products that the individual will like to buy
and increasing its sales. Data mining is itself new in the field of technology and is
being evolved, recent upgrade in this is that it can also show the customers about the
similar product combination that recent user with same behaviour had bought from
there, which can be seen in any online shopping websites. Technically, data mining
track the cookies off the customer who is online and predict about the choices he
would make or the options he would like. After the application of data mining into the
Bonobos, the market value of the organization has been increased by 30%, which is a
very big improvement for any organization.
Title: 13 Retail Companies Using Data to Revolutionize Online &
Offline Shopping Experiences
Reference: SmartData Collective. (2017). 13 Retail Companies Using Data to
Revolutionize Shopping Experiences. [online] Available at:
https://www.smartdatacollective.com/13-retail-companies-using-data-revolutionize-
online-offline-shopping-experienc/ [Accessed 16 Sep. 2017].
Link : https://www.smartdatacollective.com/13-retail-companies-using-data-
revolutionize-online-offline-shopping-experienc/
Summary:
Data mining has changed the face of the organization and customer interaction and
allowing organizations to improve their business and make good profits. Data mining
is a process of collecting data and information related to the patterns of the option
selection of the customers, who went to the online shopping websites and use that
information to predict about the choices that the customer will make comparing with
the customer with same patterns in the past. There are so many real-world examples
among which Bonobos is one of the example that have improved its business using
data mining. Bonobos do online business and sells and attracts customers using data
mining. Data mining digs all the information if the customers’ online activities and
predict about the behaviour of the customer and offers the products that most of the
customers with same behaviour had bought the product. This prediction is helping the
Bonobos to offer the customers with the products that the individual will like to buy
and increasing its sales. Data mining is itself new in the field of technology and is
being evolved, recent upgrade in this is that it can also show the customers about the
similar product combination that recent user with same behaviour had bought from
there, which can be seen in any online shopping websites. Technically, data mining
track the cookies off the customer who is online and predict about the choices he
would make or the options he would like. After the application of data mining into the
Bonobos, the market value of the organization has been increased by 30%, which is a
very big improvement for any organization.

Week 9
One of the greatest success stories in application development in recent times has
been the popularity of mobile apps. Find and summarise a resource that describes the
story of ONE successful mobile app developer.
Title: and 4 Young App Developers Who Became Millionaires
Reference: Monnapa, A. (2017). 4 Young App Developers Who Became
Millionaires. [online] Simplilearn.com. Available at:
https://www.simplilearn.com/young-app-developers-who-become-millionaires-article
[Accessed 16 Sep. 2017].
Link: www.simplilearn.com/young-app-developers-who-become-millionaires-article
Summary:
Nick D’Aloisio invented Summly
He is an internet entrepreneur and an English computer programmer who is known for
the application named ‘Summly’ at the age of 16 in 2011.this application can be
described as the combination of artificial intelligence technology that has been
developed with SRI International organization. Nick created an iOS application and
named it Trimmit in march 2011, which was an analytical tool that has the feature to
condense the large texts into 140, 500, or 1000 character n summarized manner. This
development was encountered by the Apple Inc., who then offered $30 million to nick
in exchange with that application and made it a noteworthy application on the Apple’s
App store and named it ‘Summly’ after redesigning according to the feedbacks gained
on Trimmit application. This re-launch was made in December 2011, which was later
become a trending application and Nick listed his name with the top application
developers. He became one of the youngest venture capital-backed entrepreneur and
self-made millionaire ever. After two years in march 2013, the application was sold to
the Yahoo! For about $30 million and he was awarded with the “Innovator of the
Year” title. After some time he realized the importance of the study and left his job to
complete his studies at Hertford College, Oxford University, where he is still studying
philosophy and computer science as his main subjects. He had also won the reward on
201Apple ceremony and honoured for his invention of providing news in short form
by collecting information from several pages.
Week 10
While information systems and technology deliver many benefits to society, they can
also result in (sometimes inadvertent) negative effects and outcomes. Find and
summarise a resource that describes ONE example of where the use of an information
system or technology has led to negative consequences for humans.
Title: Four Real World Examples of Information Systems Security
Failure
Reference: Iticollege.edu. (2017). Four Real World Examples of Information Systems
Security Failure. [online] Available at: https://www.iticollege.edu/four-real-world-
examples-information-systems-security-failure/ [Accessed 16 Sep. 2017].
One of the greatest success stories in application development in recent times has
been the popularity of mobile apps. Find and summarise a resource that describes the
story of ONE successful mobile app developer.
Title: and 4 Young App Developers Who Became Millionaires
Reference: Monnapa, A. (2017). 4 Young App Developers Who Became
Millionaires. [online] Simplilearn.com. Available at:
https://www.simplilearn.com/young-app-developers-who-become-millionaires-article
[Accessed 16 Sep. 2017].
Link: www.simplilearn.com/young-app-developers-who-become-millionaires-article
Summary:
Nick D’Aloisio invented Summly
He is an internet entrepreneur and an English computer programmer who is known for
the application named ‘Summly’ at the age of 16 in 2011.this application can be
described as the combination of artificial intelligence technology that has been
developed with SRI International organization. Nick created an iOS application and
named it Trimmit in march 2011, which was an analytical tool that has the feature to
condense the large texts into 140, 500, or 1000 character n summarized manner. This
development was encountered by the Apple Inc., who then offered $30 million to nick
in exchange with that application and made it a noteworthy application on the Apple’s
App store and named it ‘Summly’ after redesigning according to the feedbacks gained
on Trimmit application. This re-launch was made in December 2011, which was later
become a trending application and Nick listed his name with the top application
developers. He became one of the youngest venture capital-backed entrepreneur and
self-made millionaire ever. After two years in march 2013, the application was sold to
the Yahoo! For about $30 million and he was awarded with the “Innovator of the
Year” title. After some time he realized the importance of the study and left his job to
complete his studies at Hertford College, Oxford University, where he is still studying
philosophy and computer science as his main subjects. He had also won the reward on
201Apple ceremony and honoured for his invention of providing news in short form
by collecting information from several pages.
Week 10
While information systems and technology deliver many benefits to society, they can
also result in (sometimes inadvertent) negative effects and outcomes. Find and
summarise a resource that describes ONE example of where the use of an information
system or technology has led to negative consequences for humans.
Title: Four Real World Examples of Information Systems Security
Failure
Reference: Iticollege.edu. (2017). Four Real World Examples of Information Systems
Security Failure. [online] Available at: https://www.iticollege.edu/four-real-world-
examples-information-systems-security-failure/ [Accessed 16 Sep. 2017].
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Link: www.iticollege.edu/four-real-world-examples-information-systems-security-failure
Summary:
Information system and technologies are no-doubt expanding the world for the
humans with extra comfort, ease and accuracy but there are certain issues related to it,
which can cause serious damage to the information related to the individuals. A real-
world example to explain this statement is the “An Alarming Trend In The U.S.
Government”. Many people of United states do not realize that the United States has
an alarming information systems security problem. There is the possibility that the
U.S. government will never notice that there is any issue with the systems and the
information that were saved into the system because of the high rate of breaches that
are happening into the government organization nowadays. More than 6 times
government organizations were hacked in the year 2012 and personal and sensitive
information related to the individual were stolen or exposed including the security
numbers fingerprints and many more. In 2015 the biggest breach was happened,
which was undetected. In this breach 21.5 million people’s personal information were
stolen because of the failure in the part of the system technicians and underestimating
that the breach could happened. This series of attacks were estimated to be originated
in China and was declared the largest cyber-attack in the systems of the government
of United States and public and private sectors both were guided to be safe by
increasing protective measures related to the data breach.
Summary:
Information system and technologies are no-doubt expanding the world for the
humans with extra comfort, ease and accuracy but there are certain issues related to it,
which can cause serious damage to the information related to the individuals. A real-
world example to explain this statement is the “An Alarming Trend In The U.S.
Government”. Many people of United states do not realize that the United States has
an alarming information systems security problem. There is the possibility that the
U.S. government will never notice that there is any issue with the systems and the
information that were saved into the system because of the high rate of breaches that
are happening into the government organization nowadays. More than 6 times
government organizations were hacked in the year 2012 and personal and sensitive
information related to the individual were stolen or exposed including the security
numbers fingerprints and many more. In 2015 the biggest breach was happened,
which was undetected. In this breach 21.5 million people’s personal information were
stolen because of the failure in the part of the system technicians and underestimating
that the breach could happened. This series of attacks were estimated to be originated
in China and was declared the largest cyber-attack in the systems of the government
of United States and public and private sectors both were guided to be safe by
increasing protective measures related to the data breach.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

MARKING SHEET - DO NOT DELETE
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the task;
summary fails to explain what the resource was about; the relevance and/or
usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot be
located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content / contains content not contained in the resource)
Resource is generic AND/OR covers multiple technologies/examples rather
than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the task;
summary fails to explain what the resource was about; the relevance and/or
usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot be
located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content / contains content not contained in the resource)
Resource is generic AND/OR covers multiple technologies/examples rather
than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:

⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 12
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





