COIT 20246 ASSIGNMENT SUBMISSION Due date: Thursday Week 11 (2PM AEST) Part: Written Assessment Weighting: 30% of total assessment. Submission: Electronic (see course website for details) Instructions...

1 answer below »
what's your best price for this?


COIT 20246 ASSIGNMENT SUBMISSION Due date: Thursday Week 11 (2PM AEST) Part: Written Assessment Weighting: 30% of total assessment. Submission: Electronic (see course website for details) Instructions It will be necessary to use literature/online resources to complete this assignment, please ensure you cite and reference any such materials using the Harvard format. DO NOT copy content directly from either the text or Internet resources: this assignment is to be in your own words. You will lose marks if you do not use your own words! Please complete your assignment using this submission template file, inserting your responses where indicated. DO NOT delete the marking criteria page – changes are permitted to the formatting of other pages including the headers and footers. Please fill in the following details: Student Name Student Number Tutor’s Name Tasks There are ten (10) tasks, one for each week: the tasks are detailed below. There is a table to complete for each task. Please fill in the information required. Note: Each resource summary should be around 200-300 words. Week 1 The text discusses how modern CPUs function. Recently a critical flaw in microprocessor design has been discovered that allows two extremely serious security exploits: Spectre and Meltdown. Find and summarise ONE resource that describes how either of these exploits work. The resource (and your summary) should focus on what is occurring in the CPU that allows these exploits to occur. Title and Reference: Summary: Week 2 Prior to 1985, there were very few Operating Systems (OSes) that used Graphical User Interfaces (GUIs). Find and summarise ONE resource that describes ONE of these GUI operating systems. The OS must have been release prior to 1985 so cannot be Microsoft Windows. Title and Reference: Summary: Week 3 Low-Powered Wide-Area Networks (LPWANs) are wireless communication networks that are characterised by linking devices over large distances. Devices (including simple sensors) typically can only communicate at very low bit rates, however, the communication and associated electronics consume very little power. As such, LPWAN devices can be battery powered and operate independently for many months or even years. Find and summarise ONE resource that describes ONE platform or technology that implements a LPWAN. Title and Reference: Summary: Week 4 Voice over IP (VoIP) is a group of hardware and software technologies that allow users to communicate via voice and video over the Internet. VoIP uses a number of different software protocols, depending on the application. Find and summarise ONE resource that describes ONE of these VoIP protocols. Title and Reference: Summary: Week 5 One of the many uses of cryptography has been the development of the blockchain. Blockchains are commonly used as the basis for maintaining the data integrity of crypto currencies, though have many, many more applications. Find and summarise ONE resource that describes how blockchains work. Note that the resource should focus on the blockchain mechanism, NOT crypto currencies. Title and Reference: Summary: Week 6 One controversial practical application of network traffic management is in the contravention of the principle of “net neutrality”. Find and summarise ONE resource that describes what net neutrality is and how its contravention could impact on individual and business users of the Internet. Title and Reference: Summary: Week 7 Information Systems have led to greater and greater degrees of automation in the workplace. There is currently extensive speculation on which jobs will cease to be performed by humans in the near future. Find and summarise ONE resource that discusses jobs that are likely to not exist in the future due to ICT based automation. Note that the resource must clearly link the loss of the job(s) to advances in ICT. Title and Reference: Summary: Week 8 With the advent of mass data collection and storage has come the use of these datasets for machine learning. Find and summarise ONE resource that describes what machine learning is and how it is being used. Title and Reference: Summary: Week 9 Critical to application development are the languages used to implement the specifications. Find and summarise ONE resource that describes ONE programming language that has been developed since 2008. The resource (and your summary) should include information on the principle uses and features of the language. Title and Reference: Summary: Week 10 While information systems and technology deliver many benefits to society, they can also result in negative effects and outcomes. One recent controversy, the propagation of fake news and its influence on elections, has been linked to a type of software called a “bot”. Find and summarise ONE resource that describes what bots are and how they can be used for disseminating misinformation and affecting human behaviour. Title and Reference: Summary: MARKING SHEET - DO NOT DELETE Criteria 0 No Response<=1 poor="" resource="" selection;="" resource="" is="" too="" broad="" or="" lacks="" relevance="" to="" the="" task;="" summary="" fails="" to="" explain="" what="" the="" resource="" was="" about;="" the="" relevance="" and/or="" usefulness="" of="" the="" resource="" has="" not="" been="" explained.=""><=2 good="" resource="" selection;="" resource="" is="" relevant="" to="" the="" task;="" summary="" is="" adequate="" but="" may="" require="" either="" more="" detail="" or="" is="" too="" long;="" the="" relevance="" and/or="" usefulness="" of="" the="" resource="" has="" been="" explained="" to="" some="" extent,="" but="" needs="" additional="" information.=""><=3 excellent resource selection; resource is highly relevant to the task (the resource is probably highly specialised); summary is detailed yet concise; the relevance and usefulness of the resource selection has been clearly explained. key deductions -3 -2 -1 reference/url provided does not link to resource (and resource cannot be located or determined from details provided) or reference/url provided does not relate to the summary (i.e. summary is not of resource content / contains content not contained in the resource) resource is generic and/or covers multiple technologies/examples rather than focuses on a single technology/example resource not referenced correctly/not in harvard format week marks awarded 1 2 3 4 5 6 7 8 9 10 total comments: excellent="" resource="" selection;="" resource="" is="" highly="" relevant="" to="" the="" task="" (the="" resource="" is="" probably="" highly="" specialised);="" summary="" is="" detailed="" yet="" concise;="" the="" relevance="" and="" usefulness="" of="" the="" resource="" selection="" has="" been="" clearly="" explained.="" key="" deductions="" -3="" -2="" -1="" reference/url="" provided="" does="" not="" link="" to="" resource="" (and="" resource="" cannot="" be="" located="" or="" determined="" from="" details="" provided)="" or="" reference/url="" provided="" does="" not="" relate="" to="" the="" summary="" (i.e.="" summary="" is="" not="" of="" resource="" content="" contains="" content="" not="" contained="" in="" the="" resource)="" resource="" is="" generic="" and/or="" covers="" multiple="" technologies/examples="" rather="" than="" focuses="" on="" a="" single="" technology/example="" resource="" not="" referenced="" correctly/not="" in="" harvard="" format="" week="" marks="" awarded="" 1="" 2="" 3="" 4="" 5="" 6="" 7="" 8="" 9="" 10="" total="">
Answered Same DayMay 01, 2020COIT20246Central Queensland University

Answer To: COIT 20246 ASSIGNMENT SUBMISSION Due date: Thursday Week 11 (2PM AEST) Part: Written Assessment...

Shikha answered on May 09 2020
152 Votes
COIT 20246 ASSIGNMENT SUBMISSION
    Due date:
    Thursday Week 11 (2PM AEST)
    Part:
    Written Assessment
    Weighting:
    30% of total assessment.
    Submission:
    Electronic (see course website for details)
Instructions
It will be necessary to use literature/online resources to complete this assignment, please ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this assignment is to be in your own words. You will lose marks if you do not use your own words!
Please complete your assignment using this submission template file, inserting your responses where indicated.
DO NOT d
elete the marking criteria page – changes are permitted to the formatting of other pages including the headers and footers.
    Please fill in the following details:
    Student Name
    
    Student Number
    
    Tutor’s Name
    
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
    Week 1
    The text discusses how modern CPUs function. Recently a critical flaw in microprocessor design has been discovered that allows two extremely serious security exploits: Spectre and Meltdown. Find and summarise ONE resource that describes how either of these exploits work. The resource (and your summary) should focus on what is occurring in the CPU that allows these exploits to occur.
    
Threats and Vulnerabilities of Cloud Computing: A Review
Reference: Suryateja, P.S., 2018. Threats and Vulnerabilities of Cloud Computing: A Review.
URL: https://www.researchgate.net/profile/Pericherla_Suryateja/publication/324562008_Threats_and_Vulnerabilities_of_Cloud_Computing_A_Review/links/5ad5bf9d458515c60f54c714/Threats-and-Vulnerabilities-of-Cloud-Computing-A-Review.pdf
    Summary:
In order to protect and safeguard data, many companies and organizations are now moving to cloud computing for data storage, preservation and easily accessibility of data when required.
This resource tells us about the various threats and vulnerabilities which can attack data and in turn harm the organization or put the company at risk. Spectre and Meltdown are also considered one of the threat which can be harmful. Below are the details from the resource –
A weakness in the system working can be termed as vulnerability and when such a or many vulnerabilities are exploited by attackers it may prove to be a threat to the system. One such threat or vulnerability which can be harmful to the working of system is Spectre and Meltdown.
Spectre and Meltdown: These are the latest discovered set of vulnerabilities. Any computer chip manufactured almost two decades ago also can be affected by this threat. Once attacked, these exploits can allow the attacker to access any and every information on the system which seemed to be safe and secured. The attacker can gain access any information from the kernel with unauthorized login granted by this exploit and moreover if you are a root user, who are privileged to read the information on the host kernel also. Although patches are available to deal with this, but still these patches does not guarantee full security, it will only make the attackers task hard. Unfortunately these patches decrease the overall performance of the system.
    Week 2
    Prior to 1985, there were very fewOperating Systems (OSes) that used Graphical User Interfaces (GUIs). Find and summarise ONE resource that describes ONE of these GUI operating systems. The OS must have been release prior to 1985 so cannot be Microsoft Windows.
    List of GUI-Based Operating System and Its History
Reference: Purwaningrum R (2012), List of GUI – Based Operating Systems and its History.
URL: http://e-techinnews.blogspot.in/2012/06/list-of-gui-based-operating-system-and.html
    Summary:
Graphical user Interface allows a user to have a friendly interface with computers. It is more than an operating system which makes the interaction between computer and user more interactive. It is the result of GUI that computers have been so attractive and easier to operate in recent times.
GUI technology has been used since many years to develop various user friendly operating systems. The first eve GUI OS developed was by Apple in the name of Macintosh. Later other developer also started developing software’s and operating systems based on GUI application. Below is the description of one the GUI operated system in the year developed prior to 1985.
Mac OS System 1.0
For the purpose of Macintosh, this GUI operating system was developed. It is believed that this operating system had many features like that of a modern operating system. It had a feature of displaying icons for every window and also did it allowed users to click these icons with the help of mouse. Feature of dragging and pasting files to one or many folders was also available in this software, Thus a user can simply click a file and drag it to any desired location thus making the work easier. This operating system was developed for Apple but now it is released as a new version for OSX Snow Leopard. Mac OS System 1.0 can be considered as one of the reason for making Apple having one of the best Graphical User Interface operating systems in the world.
    Week 3
    Low-Powered Wide-Area Networks (LPWANs) are wireless communication networks that are characterised by linking devices over large distances. Devices (including simple sensors) typically can only communicate at very low bit rates, however, the communication and associated electronics consume very little power. As such, LPWAN devices can be battery powered and operateindependently for many months or even years. Find and summarise ONE resource that describes ONE platform or technology that implements a LPWAN.
    
Evaluation of LoRa LPWAN technology for remote health and wellbeing monitoring
Reference: Petäjäjärvi, J., Mikhaylov, K., Hämäläinen, M. and Iinatti, J., 2016, March. Evaluation of LoRa LPWAN technology for remote health and wellbeing monitoring. In Medical Information and Communication Technology (ISMICT), 2016 10th International Symposium on (pp. 1-5). IEEE.
URL: https://ieeexplore.ieee.org/abstract/document/7498898/
    Summary:
Above mentioned resource contains details of LORA which employs LPWAN Technology. The details are as follows –
1) Main characteristic of LPWAN are –
· Low Power consumption
· Low priced transceiver chip
· Large area of coverage
2) It is expected that LPWAN can be employed in applications which can monitor human health and well being.
3) To test its effectiveness measurements were conducted in University of Oulu, Finland. This university has a huge area of...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here