There are ten (10) tasks, one for each week: the tasks are detailed below. There is a table to complete for each task. Please fill in the information required.
The text discusses the elements of modern computing architecture however is largely silent on the individuals who played a role in its development. Find and summarise a resource that describes ONE such individual. The individual should have had a significant influence on the development of computers and/or components of modern computing architecture.
Unm.edu. (2017). Computer Terminology – Input and Output. [online] Available at: https://www.unm.edu/~tbeach/terms/inputoutput.html [Accessed 25 Sep. 2017].
One of the most important electronic device elements of the computer architecture is the inputoutput devices. The input device is the utilized for entering the data in the computers. The output device delivers the processed result to the user. For the first generation computers the input devices were the paper tape and the paper punch. The output was been printed on the paper. For the last generation the input devices were the mouse, microphone, scanner, digital camera, finger reader and the touchpad. On the other hand, the output devices were the data projector, speaker, printer and the monitor. The keyboard and mouse have been the most popular input devices in the current age. The mouse is utilized as the interface between the human and computer and keyboard is helpful to enter texts into the machines, The most significant output devices has been the projectors and computers. Again some of the output and the input devices have been attractive. For example the electronic nose is useful in detecting the odours and used in the food industries for detecting the pungent smell in the prepared foods. Some special devices of this type are known as the assistive technology and are utilized for the disabled people. Thus people could live and work independently. For instance two bracelets, poor of shoes, glove work set of rings could be working as the input and output devices.
The text discusses the components and activities of operating systems however is largely silent on the individuals who played a role in their development. Find and summarise a resource that describes ONEsuch individual. The individual should have had a significant influence on the writing or development of operating systems.
1.3 Operating system components. (2017). Cis2.oc.ctc.edu. Retrieved 18 September 2017, from https://cis2.oc.ctc.edu/oc_apps/Westlund/xbook/111_u04e/Web/13.htm
Process Management, an important component of the Operating system is chosen here. The CPU has been executing huge quantity of programs. The primary concern has been the execution of the user programs. However the CPU is required for other system activities. The activities are known as the processes. The batch job and the time-shared user program is the process. Moreover the spooling or the system task is noted as the process. The process is considered as the task or the program of time sharing.
The process required particular resources like the I/O devices, memory, files and CPU time for accomplishing its tasks. The resources are provided to the process as it gets generated. Moreover the physical and the logical resources obtained by the process as it gets created, few data inputs or initializations are passed along. The program is not a process. It is the passive entity and the process is the active entity. Two processes could be associated with the similar program, but they are never considered to the separate sequences of the execution.
The process has been working unit in the system. Thus kind of system comprises of the collection of process. Few of them are processes of operating system comprising of those who have been executing the system code. The others are the user processes executing the user codes. These processes could execute concurrently potentially. The operating system has been engaged in some of the activities associated with the managed processes. This includes the generation and deletion of both the system and user processes, the suspension have been the process resumption, the mechanism provisions for the process synchronization, the mechanism provision for the process synchronization.
The Internet didn’t just appear – it was an evolution from earlier networks. Find and summarise a resource that describes ONEof the networks that led to the development of the modern Internet.
What is TCP/IP? – Definition from Techopedia. (2017). Techopedia.com. Retrieved 18 September 2017, from https://www.techopedia.com/definition/2460/transmission-control-protocolinternet-protocol-tcpip
The TCP/IP or the “Transmission Control Protocol/Internet Protocol” is taken here as one of the networks that helped in developing the modern Internet. This has been the language used by the computers to access Internet. This has comprised of the protocol suites which are designed for establishing the network of networks. This is done deliver the host to have access to the Internet. It has been responsible for the connectivity of the full-fledged data and transferring information from one end to end through providing various functions like acknowledgement, mapping and addressing. It has comprised of four layers differing a little from the OSI model. All of the present day computers have been supporting the TCPIP. It is not the protocol of single networking. This has been protocol suites named on the basis of two layers or protocols under it, the TCP and the IP. Two things have been required here like any type of communication. They are the message to transmit and the means to transmit the message reliably. The TCP layer has been handling the message section. The message is discriminated into smaller units known as packets. They are then transmitted through the network. The packets have been received by the associated layer of TCP layer in the receiver and then reassembled within the original message. The IP layer on the other side has been basically regarding the transmission part. It is performed through the unique IP address that has been assigned to every recipient active over the network.
Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the text. Find and summarise a resource that describes the features and uses of ONE other L2 protocol that is not discussed in the text (i.e. NOT Ethernet).
What is a Virtual Local Area Network (VLAN)? – Definition from Techopedia. (2017). Techopedia.com. Retrieved 18 September 2017, from https://www.techopedia.com/definition/4804/virtual-local-area-network-vlan
The VLAN or Virtual Local Area Network is an example of the L2 or the Layer Two protocol of data link. This has comprised the logical group workstations, network devices and servers appearing over the same LAN regardless the geographical distribution. It has been allowing the computer networks and the users to communicate in the simulated surroundings such that they have been present in one LAN and sharing the single broadcast and the multicast domain. They have been imposed for achieving the ease of network management, security and scalability. They could adapt to the changes very quickly in the network requirements, server nodes and the workstation relocations.
The high end switches has been allowing the implementation and functionality of the VLANs. The reason to implement the VLAN has been to develop the network performance and apply the proper security measures. The networks of the computers could be segmented into the LANs and WANs. The VLAN has been permitting various networks working virtually as a single LAN. A popular advantage of VLAN is that it could eradicate the latency in any network. This saves the resources of network and the rise in network efficiency. The main benefits to incorporate the VLAN are that it has been allowing the network administrators in applying extra security to the network communication. It has been creating the extension and relocation of the network or the network device simpler. However some limitations of it are the more effective to control the latency but less efficient while compared to LAN.
The text mentions the role of hackers in attacks on networked infrastructure. Find and summarise a resource that describes ONE famous or well-known hacker.
Recode. (2017). Why Kevin Mitnick, the World’s Most Notorious Hacker, Is Still Breaking Into Computers. [online] Available at: https://www.recode.net/2015/3/26/11560712/why-kevin-mitnick-the-worlds-most-notorious-hacker-is-still-breaking [Accessed 18 Sep. 2017].
At the year, 1999, Kevin Mitnick was pled guilty because of wire fraud, computer fraud and intercepting the communications illegally. He spent five years at the federal jail. This also included about eight months the solitary refinement. He has turned about fifty now. He confessed that he achieved illegal access to the machines of the big organizations like the Sun Microsystems, Nokia and Motorola. All these were done by him in the search of adventure and knowledge. According to him, his activities were not meant for personal gain or to cause meaningful harm. At the present era, the hackers have been representing the criminal gangs with full payment from the crime world. Moreover the third world countries have been pilfering information on daily basis from the multinational organizations across the globe to sale on the black market. In this scenario the idea of hacking regarding sheer hearkens has been backing to a more naïve time.
Mitnick has been paid highly at the present day. He has been appointed as the efficient security consultant for some of the biggest organizations in the world. These companies include the Lockheed Martin, IBM, CBS, Toshiba and FedEx. Thus he got the opportunity to show his talent in the positive way in the field he could do well. The main business of Mitnick is to perform the penetration testing. He has been testing the physical, technical securities and the people. Apart from this, he has been also testing the wireless networks and the VOIP phones. They have been testing all the things around the board for searching for the vulnerabilities such that the clients could fix them.
Society is increasingly reliant on networks and network technologies but they are evolving at a rapid pace. Find and summarise a resource that describes ONE example of a future networking technology or trend that will impact society.
Hogg, S. (2017). 6 network and security trends you can expect in 2017. [online] Network World. Available at: https://www.networkworld.com/article/3148871/internet-of-things/scott-hogg-s-2017-technology-predictions.html [Accessed 18 Sep. 2017].
In order to reach the targets world-wide, the Malware is the most effective option for the attackers. Its propagation is the method of definite attack, since the last few years. Currently, their affectivity of the most antivirus products is a subject of debate. More and more vendors of security have been offering malware defenses. However, all the solutions of the vendors have not been effective completely. This is because it has been continuing to be metamorphized. One of the trends that have been emerging is the development of the malware which is memory-resident. Those ephemeral infections could not survive the reboot. They have been especially hard to be detected forensically. However most of the people have been leaving their computers at running continuously. This has been a successful technique of attack.
Since the malware has been defending the organization, and the computers have been turning more prolific, these attackers could again change their process. This has not been hard to forecast that more number of attackers would go for the mobile malware. As the organizations have been allowing the mobile devices for joining the internal Wi-Fi networks of the corporate, the mobile devices has been just the lethal and allowing the attackers to achieve access to the easy vulnerable of those corporate enterprise. Moreover, the 5G and the 4G services have been delivering the internet bandwidth substantially. These mobile devices could be leveraged for the highly prone DDos attacks. Thus the evolution of the malware is a future trend that must be definitely anticipated by the enterprises.
The text mentions social business and the impact of the use of social networking platforms. Find and summarise a resource that describes the history of the development of ONE such social media platform.
Phillips, S. (2017). A brief history of Facebook. [online] the Guardian. Available at: https://www.theguardian.com/technology/2007/jul/25/media.newmedia [Accessed 18 Sep. 2017].
Here, the history of Facebook is discussed. Mark Zuckerberg, a twenty-three years old person founded Facebook. He was studying psychology as the Harvard University. As a keen programmer, he already developed various social networking sites for the fellow students. This included the Coursematch allowing the users to see the people taking the degree. Another one was the Facemash where the attractiveness of the people could be rated. He launched “The facebook”, as its initial name, on February 2004. This name was taken from the paper sheets that were distributed to the staff, profiling students and the freshmen. About twelve hundred students from Harvard signed up within twenty four hours. After a month, about half of the undergraduate people possessed the profile. It came to be known as the Facebook.com during August 2005 as the address got purchased for about 200,000 dollars. It was signed up by the U.S. high schools from September 2005. Then it reached the universities at U.K. the next month. The network got extended to the people with registered email address beyond the educational institutes. Then the site could be freely joined and created profit by the advertising revenue. Organizations like Google and Yahoo expressed high interest to buy Facebook with an amount of about 2 billion dollars as per as a rumor spread. However, Zuckerberg refused to sell his invention. The features of the site developed to continue at 2007. The users could give various gifts to their friends and post classified advertisements freely. They could also develop their individual applications. For instance the Scrabble and graffiti are some its examples.
With the advent of mass data collection and storage has come data mining. Find and summarise a resource that describes ONE example where data mining has been used successfully by a business. You should not use any examples covered in the textbook.
eduCBA. (2017). 8 Important Data Mining Techniques for Successful Business. [online] Available at: https://www.educba.com/8-data-mining-techniques-for-best-results/ [Accessed 18 Sep. 2017].
Here, the anomaly or outlier detection is chosen as the technique for data mining for successful business. It has been searching for the data items under the data sets same to the projected pattern or the expected behavior. Moreover, the anomalies have been providing the actionable and the critical data for the organizations and the brands. The outlier has been object that has been deviating importantly from the common average under the database set or the combination of data. This has been distinct from the other data. That is why the outlier data has been requiring extra attentions and the assessment since it has been delivering the various outlooks for a specific case. This kind of techniques of data mining could be utilized for detecting the risks and fraud under the critical systems. They have been ideal in every situation where this distinct property of the data could be used in a particular manner and help the analysts to identify the limitations in that system. Thus the fraudulent activities could be identified, the flawed processes or the areas where particular theory has been invalid. In this manner the proper system could be installed at the proper place with safety and effectively. This has been vital to remind that the outliers have been much common in various huge data sets. As the outliers have not been negative always, they could help the brand seek unique things happening at the data sets. Thus whatever the case scenario has been, the outcomes of the outlier detection has been requiring more analysis for reaching the conclusive results.
One of the greatest success stories in application development in recent times has been the popularity of mobile apps. Find and summarise a resource that describes the story of ONE successful mobile app developer.
Simplilearn.com. (2017). 4 Young App Developers Who Became Millionaires. [online] Available at: https://www.simplilearn.com/young-app-developers-who-become-millionaires-article [Accessed 18 Sep. 2017].
Nick D’Aloisio was born in 1995. He was as computer programmer besides an internet entrepreneur. He is famous for his inventing application Summly. This is the summarization and the artificial technology that was developed with the SRI International. On 2011, he developed an iOS app known as Trimmit. This was used as the analytical tool for condensing the text content to the characters of 100, 500 and 140 summary texts. The app snatched the attention of the Apple. They featured that as the latest noteworthy app on the App store. The large potential of the Trimmit attracted the attention of one billionaire. He provided Nick with huge capital funding for his project. Through using the feedback received from Nick from the Trimmit, he revamped the app entirely and then re-launched that as the Summly. Nick, being one of the young and self-made millionaire ever, was also one of the youngest venture entrepreneur backed on capital. At first he raised about 200,000 dollars in the seed funding from Sir Li Ka-shing, the billionaire from Hongkong at 2011. However, after that he we started rising a good amount of money from various celebrity investors such as Stephen Fry, Ashton Kutcher and Rupert Murdoch. At 2013, on the March session, his app got sold to Yahoo. This took place at thirty million dollars. Then we got awarded with the title of “Innovator of the Year” by the Wall Street Journal. Till October 2015, Nick D’Aloisio has been effectively leading the Yahoo. He also won the201 Apple Design Award at the WWDC for his skills and excellence.
While information systems and technology deliver many benefits to society, they can also result in (sometimes inadvertent) negative effects and outcomes. Find and summarise a resource that describes ONE example of where the use of an information system or technology has led to negative consequences for humans.
Rotman, D. (2017). How Technology Is Destroying Jobs. [online] MIT Technology Review. Available at: https://www.technologyreview.com/s/515926/how-technology-is-destroying-jobs/ [Accessed 18 Sep. 2017].
Here, the negative impacts of the physical activities are highlighted with the information technology. One of the biggest negative impacts of ICT id the loss of job. Hence the losses of income, status, self-esteem are taking place. They could be occurring for various reasons. This has been including the manual operations getting replaced by the automation like robots replacing individuals on the assembly line. Many employees are getting replaced trough smaller numbers those could do the same task. For example unlike the worker on the supermarket checkout, the barcode scanner connected to the computer could detect the goods more efficiently. The digital and automation techniques have been partially responsible for the lack of jobs of the current era. The fast acceleration of the technical progress has broadened the space between the financial winners and losers. Again for example as any one generates any computer program for automating the tax preparation could earn huge dollars through eradicating the necessities for the countless accountants. The latest technologies are encroaching the human skills such that that has been entirely unprecedented. The middle class has been seeming to be going away and the bottom and the top has been getting further apart clearly. The software, automation and robots could replace the people for the people who have been working in the automotive agencies or the travel agencies. Thus it is seen that the techniques utilizing large quantity of the computational power are going a huge way in helping the robots to know their environments.
References:
eduCBA. (2017). 8 Important Data Mining Techniques for Successful Business. [online] Available at: https://www.educba.com/8-data-mining-techniques-for-best-results/ [Accessed 18 Sep. 2017].
Hogg, S. (2017). 6 network and security trends you can expect in 2017. [online] Network World. Available at: https://www.networkworld.com/article/3148871/internet-of-things/scott-hogg-s-2017-technology-predictions.html [Accessed 18 Sep. 2017].
Operating system components. (2017). Cis2.oc.ctc.edu. Retrieved 18 September 2017, from https://cis2.oc.ctc.edu/oc_apps/Westlund/xbook/111_u04e/Web/13.htm
Phillips, S. (2017). A brief history of Facebook. [online] the Guardian. Available at: https://www.theguardian.com/technology/2007/jul/25/media.newmedia [Accessed 18 Sep. 2017].
Recode. (2017). Why Kevin Mitnick, the World’s Most Notorious Hacker, Is Still Breaking Into Computers. [online] Available at: https://www.recode.net/2015/3/26/11560712/why-kevin-mitnick-the-worlds-most-notorious-hacker-is-still-breaking [Accessed 18 Sep. 2017].
Rotman, D. (2017). How Technology Is Destroying Jobs. [online] MIT Technology Review. Available at: https://www.technologyreview.com/s/515926/how-technology-is-destroying-jobs/ [Accessed 18 Sep. 2017].
Simplilearn.com. (2017). 4 Young App Developers Who Became Millionaires. [online] Available at: https://www.simplilearn.com/young-app-developers-who-become-millionaires-article [Accessed 18 Sep. 2017].
Unm.edu. (2017). Computer Terminology – Input and Output. [online] Available at: https://www.unm.edu/~tbeach/terms/inputoutput.html [Accessed 25 Sep. 2017].
What is a Virtual Local Area Network (VLAN)? – Definition from Techopedia. (2017). Techopedia.com. Retrieved 18 September 2017, from https://www.techopedia.com/definition/4804/virtual-local-area-network-vlan
What is TCP/IP? – Definition from Techopedia. (2017). Techopedia.com. Retrieved 18 September 2017, from https://www.techopedia.com/definition/2460/transmission-control-protocolinternet-protocol-tcpip
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download