Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

General Information

The purpose of this assignment is to select and discuss relevant online resources that exemplify the application of the topic(s) nominated each week (1 - 10). This assignment can (and should!) be completed progressively

Each task requires you to collect and summarise one (1) publicly available online resource. The resource summary should be around 200-300 words.You should collect interesting and relevant resources that address the task. The resources should be easy to read and describe the topic/technology concisely and simply. The resources must be specific to the topic (i.e. just focus on a single technology or topic and not be about multiple topics). These can include (but are not limited to) online magazine/news articles, technical reports or documentation.

Important - Academic resources such as journals, conference papers or books will generally be unsuitable for this assignment as they are generally not publicly available, are not concise, are not necessarily easy to read and often don't focus specifically on the assignment topic(s). The resources should be substantial (producing a 300 word summary from a 400 - 500 word resource is inappropriate) and only contain information directly pertinent to the task. You cannot use the resource more than once in the assignment. The textbook and sites such as, but not limited to, Wikipedia, Techtarget, and HowStuffWorks are not suitable resources.

Your summary should briefly explain:

- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.

For each task, there is a table to complete in the template. Please fill in the information required and submit the document via this page by the due date.


Week Task
1 The text discusses conventional binary computing architecture. However, an emerging field of research focuses on the development of quantum computers. Find and summarise a resource that explains why there is so much interest in this type of computing (for example, the potential applications).

2 The text briefly makes mention of the Linux operating system, an open-source Unix variant developed in the 1990s. There are many popular Linux distributions (look up "Linux Distribution" if you don't know what that means). Find and summarise a resource that describes the features and advantages of ONE of these distributions.

3 The text discusses the concept of virtualisation. There are several "type 2" or hosted virtualisation products (software) on the market (both commercial and open source). Find and summarise a resource that describes the features and advantages of ONE of these products.

4 TCP and UDP are examples of two Layer Four (L4) transport protocols that are discussed in the text. Find and summarise a resource that describes the features and uses of ONE other L4 protocol that is not discussed in the text (i.e. NOT UDP or TCP).

5 Cyber-attacks on governments or government assets are receiving increasing publicity and media attention. Find and summarise a resource that describes ONE recent cyber-attack (within the last 3 years) against a government website or asset.

6 Flood, fires and earthquakes are events beyond our control, yet impact heavily on ICT infrastructure. Find and summarise a resource that describes ONE example of an organisation's ICT infrastructure being impacted by such an event and the resulting effects on the business and/or its operations. For example, you might want to search for "data centre fire" or "network cable earthquake" to find suitable resources.

7 The text briefly mentions crowdsourcing which is a form of social business that organisations employ to engage with the public to achieve a goal. Find and summarise a resource that describes ONE example of an organisation using crowdsourcing and the outcomes of the engagement.

8 With the advent of mass data collection and storage has come a surge of instances of data theft. Find and summarise a resource that describes ONE example where data has been stolen from a private company or corporation and explain the impacts on the customers.

9 The failure to adapt business processes and embrace technology, particularly ICT, has led to the downfall of many previously successful companies. Find and summarise a resource that describes ONE example of an organisation that failed to adapt to changes in technology and explain what the organisation failed to do/respond to.

10 Large, complex ICT projects are more likely to fail than succeed. Find and summarise a resource that describes ONE example of a large ICT project that failed and explain the impacts of the failure.General Information

The purpose of this assignment is to select and discuss relevant online resources that exemplify the application of the topic(s) nominated each week (1 - 10). This assignment can (and should!) be completed progressively

Each task requires you to collect and summarise one (1) publicly available online resource. The resource summary should be around 200-300 words.You should collect interesting and relevant resources that address the task. The resources should be easy to read and describe the topic/technology concisely and simply. The resources must be specific to the topic (i.e. just focus on a single technology or topic and not be about multiple topics). These can include (but are not limited to) online magazine/news articles, technical reports or documentation.

Important - Academic resources such as journals, conference papers or books will generally be unsuitable for this assignment as they are generally not publicly available, are not concise, are not necessarily easy to read and often don't focus specifically on the assignment topic(s). The resources should be substantial (producing a 300 word summary from a 400 - 500 word resource is inappropriate) and only contain information directly pertinent to the task. You cannot use the resource more than once in the assignment. The textbook and sites such as, but not limited to, Wikipedia, Techtarget, and HowStuffWorks are not suitable resources.

Your summary should briefly explain:

- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.

For each task, there is a table to complete in the template. Please fill in the information required and submit the document via this page by the due date.

Week Task
1 The text discusses conventional binary computing architecture. However, an emerging field of research focuses on the development of quantum computers. Find and summarise a resource that explains why there is so much interest in this type of computing (for example, the potential applications).

2 The text briefly makes mention of the Linux operating system, an open-source Unix variant developed in the 1990s. There are many popular Linux distributions (look up "Linux Distribution" if you don't know what that means). Find and summarise a resource that describes the features and advantages of ONE of these distributions.

3 The text discusses the concept of virtualisation. There are several "type 2" or hosted virtualisation products (software) on the market (both commercial and open source). Find and summarise a resource that describes the features and advantages of ONE of these products.

4 TCP and UDP are examples of two Layer Four (L4) transport protocols that are discussed in the text. Find and summarise a resource that describes the features and uses of ONE other L4 protocol that is not discussed in the text (i.e. NOT UDP or TCP).

5 Cyber-attacks on governments or government assets are receiving increasing publicity and media attention. Find and summarise a resource that describes ONE recent cyber-attack (within the last 3 years) against a government website or asset.

6 Flood, fires and earthquakes are events beyond our control, yet impact heavily on ICT infrastructure. Find and summarise a resource that describes ONE example of an organisation's ICT infrastructure being impacted by such an event and the resulting effects on the business and/or its operations. For example, you might want to search for "data centre fire" or "network cable earthquake" to find suitable resources.

7 The text briefly mentions crowdsourcing which is a form of social business that organisations employ to engage with the public to achieve a goal. Find and summarise a resource that describes ONE example of an organisation using crowdsourcing and the outcomes of the engagement.

8 With the advent of mass data collection and storage has come a surge of instances of data theft. Find and summarise a resource that describes ONE example where data has been stolen from a private company or corporation and explain the impacts on the customers.

9 The failure to adapt business processes and embrace technology, particularly ICT, has led to the downfall of many previously successful companies. Find and summarise a resource that describes ONE example of an organisation that failed to adapt to changes in technology and explain what the organisation failed to do/respond to.

10 Large, complex ICT projects are more likely to fail than succeed. Find and summarise a resource that describes ONE example of a large ICT project that failed and explain the impacts of the failure.

Tasks

There are ten (10) tasks, one for each week: the tasks are detailed below. There is a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.

Week 1
The text discusses conventional binary computing architecture. However, an emerging field of research focuses on the development of quantum computers. Find and summarise a resource that explains why there is so much interest in this type of computing (for example, the potential applications).
Title and Reference:


Summary:

Week 2
The text briefly makes mention of the Linux operating system, an open-source Unix variant developed in the 1990s. There are many popular Linux distributions (look up "Linux Distribution" if you don't know what that means). Find and summarise a resource that describes the features and advantages of ONE of these distributions.
Title and Reference:


Summary:

Week 3
The text discusses the concept of virtualisation. There are several "type 2" or hosted virtualisation products (software) on the market (both commercial and open source). Find and summarise a resource that describes the features and advantages of ONE of these products.
Title and Reference:


Summary:

Week 4
TCP and UDP are examples of two Layer Four (L4) transport protocols that are discussed in the text. Find and summarise a resource that describes the features and uses of ONE other L4 protocol that is not discussed in the text (i.e. NOT UDP or TCP).
Title and Reference:


Summary:

Week 5
Cyber-attacks on governments or government assets are receiving increasing publicity and media attention. Find and summarise a resource that describes ONE recent cyber-attack (within the last 3 years) against a government website or asset.
Title and Reference:


Summary:

Week 6
Flood, fires and earthquakes are events beyond our control, yet impact heavily on ICT infrastructure. Find and summarise a resource that describes ONE example of an organisation's ICT infrastructure being impacted by such an event and the resulting effects on the business and/or its operations. For example, you might want to search for "data centre fire" or "network cable earthquake" to find suitable resources.
Title and Reference:


Summary:

Week 7
The text briefly mentions crowdsourcing which is a form of social business that organisations employ to engage with the public to achieve a goal. Find and summarise a resource that describes ONE example of an organisation using crowdsourcing and the outcomes of the engagement.
Title and Reference:


Summary:

Week 8
With the advent of mass data collection and storage has come a surge of instances of data theft. Find and summarise a resource that describes ONE example where data has been stolen from a private company or corporation and explain the impacts on the customers.
Title and Reference:


Summary:

Week 9
The failure to adapt business processes and embrace technology, particularly ICT, has led to the downfall of many previously successful companies. Find and summarise a resource that describes ONE example of an organisation that failed to adapt to changes in technology and explain what the organisation failed to do/respond to.
Title and Reference:


Summary:

Week 10
Large, complex ICT projects are more likely to fail than succeed. Find and summarise a resource that describes ONE example of a large ICT project that failed and explain the impacts of the failure.
Title and Reference:


Summary:

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92298512
  • Price:- $90

Guranteed 48 Hours Delivery, In Price:- $90

Have any Question?


Related Questions in Computer Engineering

Sally goes into a candy store and selects 12 pieces of

Sally goes into a candy store and selects 12 pieces of taffy. The candy store offers 75 varieties of taffy. How many ways are there for Sally to select her 12 pieces of taffy?

An oil company determines it costs 25000 to sink a test

An oil company determines it costs $25,000 to sink a test well, an oil hit yields a net revenue of $475,000($500,000 gross-$25,000costs), and a natural gas hit yields $125,000 net revenue ($150,000 gross-$25,000 costs). ...

Do you need computers or information and communication

Do you need computers or information and communication technologies to store, organize, and manage data in organizations? Explain how the present day organizations in a developed country like the USA store and manage the ...

Question suppose you wanted to delete the trash of all

Question : Suppose you wanted to delete the trash of all users just tonight at 11pm using the just created /root/deleteTrash.bash script. Assuming that the deleteTrash.bsh script which deletes the trash of all users exis ...

A compute the sumnbsps1nbsp 1 2 3 nbsp nbsp 9999 the sum

(a) Compute the sum S1 = 1 + 2 + 3 + . . . + 9999 (the sum of all integers from 1 to 9999). Do not use a program. (b) Compute the sum S2 = 1+3+5+...+9999 (the sum of all odd integers from 1 to 9999). Do not use a program ...

How do you calculate the number of peaks and mass when

How do you calculate the number of peaks and mass when Bromine with two isotopes and phosphate with one isotope are put through a mass spectrometer? The formula is PBr3

Discuss the importance of metadata and some of the various

Discuss the importance of metadata and some of the various ways (Microsoft) SQL Server allows you to expose that information. References welcomed to learn where to find obscure IT information (books, articles, websites)

Specifically you will create an e-commerce application

Specifically, you will create an e-Commerce application using PHP and HTML that allows a user to login to a website, select several products for purchase and then place an order for those items selected. The type of prod ...

Subnetting1 as system administrator you need to create 10

Subnetting 1) As system administrator, you need to create 10 subnets for the Network Address: 192.168.1.0 with a minimum of 10 hosts per subnet. Room for future expansion to more subnets is desirable. Create a table with ...

Submit a 2- to 3-page paper in which youidentify an

Submit a 2- to 3-page paper in which you: Identify an intercultural area Intercultural interaction with a person from a culture different from your own. Explain why you have selected this area. Describe your personal cul ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As