Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

Week 1

There are ten tasks, one for each week:  the tasks are detailed below.  There is a table to complete for each task.  Please fill in the information required.

The text discusses the elements of modern computing architecture however is largely silent on the individuals who played a role in its development.  Find and summarise a resource that describes ONE such individual.  The individual should have had a significant influence on the development of computers and/or components of modern computing architecture.

The text discusses the components and activities of operating systems however is largely silent on the individuals who played a role in their development.  Find and summarise a resource that describes ONE such individual.  The individual should have had a significant influence on the writing or development of operating systems.

The Internet didn’t just appear – it was an evolution from earlier networks. Find and summarise a resource that describes ONE of the networks that led to the development of the modern Internet.  

Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the text.  Find and summarise a resource that describes the features and uses of ONE other L2 protocol that is not discussed in the text (i.e. NOT Ethernet).

The text mentions the role of hackers in attacks on networked infrastructure.  Find and summarise a resource that describes ONE famous or well-known hacker.

Society is increasingly reliant on networks and network technologies but they are evolving at a rapid pace.  Find and summarise a resource that describes ONE example of a future networking technology or trend that will impact society.

The text mentions social business and the impact of the use of social networking platforms.  Find and summarise a resource that describes the history of the development of ONE such social media platform.

With the advent of mass data collection and storage has come data mining. Find and summarise a resource that describes ONE example where data mining has been used successfully by a business.  You should not use any examples covered in the textbook.

One of the greatest success stories in application development in recent times has been the popularity of mobile apps.  Find and summarise a resource that describes the story of ONE successful mobile app developer.

While information systems and technology deliver many benefits to society, they can also result in (sometimes inadvertent) negative effects and outcomes.  Find and summarise a resource that describes ONE example of where the use of an information system or technology has led to negative consequences for humans.

Week 1

There are ten tasks, one for each week:  the tasks are detailed below.  There is a table to complete for each task.  Please fill in the information required.

The text discusses the elements of modern computing architecture however is largely silent on the individuals who played a role in its development.  Find and summarise a resource that describes ONE such individual.  The individual should have had a significant influence on the development of computers and/or components of modern computing architecture.

John von Neumann one of the famous mathematician in the field of architecture related to modern computers of the architecture. The article in the context is related to the overview of the architecture related to the modern computer which would be very much incomplete without the authors contribution in the field. It is directly stated in the article that due to the authors contribution in the indicated field the modern computer which was relatively very fast was invented. He suggested that the modern computer main architecture can be fixed which can be very much affective in the same period of time. The sequential flow of control which is controlled by the conditional flow, at any time initialization and interruption in the flow of control can be done. Mainly by utilizing the processing unit of the system, a model was proposed which had the same memory allocation in order to make it more affective. This concept which is related to the system is known as turning machine, which mainly consist of architecture which is sequential which is based on the concept of non veumann concept of architecture.

The text discusses the components and activities of operating systems however is largely silent on the individuals who played a role in their development.  Find and summarise a resource that describes ONE such individual.  The individual should have had a significant influence on the writing or development of operating systems.

The main focus point of the article which is taken above is the influencing factor which is elated to Bill Gates related to the field of modern architecture relating to the operating system. The main aspect due to which the article is chosen is that the author plays a very vital role in the pre-existent field of the concerned area. Bill gates is considered one of the pioneers in the field of modern computer tis is mainly due to the factor that the windows were first introduced by him. With the linking of the windows concept with the modern computer architecture the name Bill Gates became very much famous and very much renounced. Due to the implementation the overall concept with the field became very much famous and it became a pre dominant player in the field of computer. Bill gates was considered one of the wealthiest person in the field due to his innovations and expertise with the knowledge of computers. He started his own organisation which was known as Microsoft. He graduated in the year 1973 and enrolled into Harvard university. The maximum he used to spend was with his team in the research unit rather than putting emphasis on the study syllabus.

Week 2

The Internet didn’t just appear – it was an evolution from earlier networks. Find and summarise a resource that describes ONE of the networks that led to the development of the modern Internet.  

The article directly puts emphasis on the concept of BITNET. The BITNET concept and the modern internet go hand in hand. The reason of choosing the article is that BITMAP is considered as one of the most important factors when relating to the modern computer architecture. It can be stated that the BITMAP is a primary factor when relating to the concept of the internet. The main working aspect of the technology is that it can forward and store network which is quite similar to the technology of UseNet. When relating to the full form of the BITMAP it is because of the internet. It is basically based on the concept of the IBM’s concept of VNET email system and the sub system which is related to the remote spooling communication. Later on the emulation of the technology of the RSCS was done into other operating system’s which are DEC VMS and a portion of UNIX which was an extended portion which is related to the BITMAP. The BITMAP concept introduced many concepts which can be actively used in the participation. The concept can be varied into many fields, and it included more than one service which was attached to it. The overall concept created a backbone to the concept of TCP/IP protocol of the computer system.

Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the text.  Find and summarise a resource that describes the features and uses of ONE other L2 protocol that is not discussed in the text (i.e. NOT Ethernet).

This article which is selected above puts direct emphasis on the concept of the most important and common layer 2 protocol which is termed as the address Resolution Protocol (ARP). The article is mainly chosen because the address Resolution Protocol (ARP) is considered as the most primary and useful protocol. The address Resolution Protocol (ARP) is considered as the integral part in the running of the of the IP network which are mainly used in the Ethernet and also can be related to the concept of Wi-Fi. Taking into account the history of the technology it was developed in the year 1980 mainly with the main point of creating an address resolution protocol. The address Resolution Protocol (ARP) main function is to convert the internet protocol address to the physical network. The technology is mainly implemented in the ATM, which are mainly physical type and the token ring. Considering the advantage related to the implantation is that it manages the overall connection of the system irrespective of the physical device in particular which are connected with each other. The address Resolution Protocol (ARP) performs its main activity in the layer two protocol of the OSI model. When the address Resolution Protocol (ARP) is maintained in every device it helps in mapping of the Internet protocol to the MAC address mapping. Based on the overall concept of the address Resolution Protocol (ARP) an inverse of the address Resolution Protocol (ARP) and a reverse of address Resolution Protocol (ARP)is also developed.

Week 3

The text mentions the role of hackers in attacks on networked infrastructure.  Find and summarise a resource that describes ONE famous or well-known hacker.

The role of the hacker is the main point of focus in the above stated article. When hackers term is taken into consideration the first name which comes to the mind is Kevin Mitnick. The article on the other hand puts direct emphasis on the characteristics of the hackers. Kevin Mitnick was considered as the most renounced name in the world of the hacking. He has been involved in many activities which mainly comprised of bypassing the security of a computer system. The role of the hacker can be subdivided into two parts one being an active hacker and on the other hand it is passive hacker. The active hacker’s role is to get the message and modify the overall message and the passive hacker just gets the message and does not involve any modification into the aspect. Due to this factor the active hackers can be detected very easily and the passive hackers are very much difficult to detect.  Where kevin is concern, he was involved in both type of hacking activity. From the above discussion it can be conducted that kevin is one of the biggest hackers of all times who was involved in various type of hacking activity and because of the activity he was also punished by law.

Society is increasingly reliant on networks and network technologies but they are evolving at a rapid pace.  Find and summarise a resource that describes ONE example of a future networking technology or trend that will impact society.

The article puts direct limelight on the prospective of the quantum network computing phenomenon and its direct implementation of the quantum technology which can be applied to the future which related to network system. It can be stated that the future of the networking system is directly dependent on the implementation of the quantum technology. There are mainly three advantages that can be related to the topic. One of the most important advantage that can be related to the implementation of the technology is directly making te system more secured. In any system the security of the system plays a very vital role in every aspect. The main theory of the quantum lies on the concept of qubits. The quantum physical is mainly used as method in order to detect the eavesdropping. It can make the system more and more advanced with making the system well isochronized with the technology of the quantum. It also helps in creating a distributed data system which can be used in order to make the numerical quantum computation possible which can achieve a much faster response in the networking system. The teleportation method which is involved in the process can create a revolution with regards to the communication system. From the above discussion it can be concluded that the quantum technology can be a successful implementation in the future related to the network system.

Week 4

The text mentions social business and the impact of the use of social networking platforms.  Find and summarise a resource that describes the history of the development of ONE such social media platform.

Summary: In this article the social networking site which has renovated the world, is taken into account. Facebook comes among the biggest name in the field of social media. This article is chosen due to the fact that the Facebook have altered the life of the people in many aspects. Mark Zuckerberg is the founder and the owner of the Facebook, and he initiated the social media site from a dormitory of the Harvard university. There are many expansion technique that are related the Facebook history from its origin in the year 2004.it is one of the fastest growing social networking site that exist in the recent times. Mark first created a social networking site with the help of the website of the Harvard university and created a fashmash of the site and later on the site was named as Facebook. In the recent update Facebook have implemented many new technological aspect into it which includes haring of video, pictures post or text. People with the text and the post can revert with their liking and comment on them if they have any option regarding it. People can also chat and share their current location with the aspect. Zuckerberg refuses to sell his company to google and to other giants in the initial stage of the development of the company and on the other hand he refused to post any advertisement in this regard.

With the advent of mass data collection and storage has come data mining. Find and summarise a resource that describes ONE example where data mining has been used successfully by a business.  You should not use any examples covered in the textbook.

Summary: The article puts direct emphasis on the aspect of the role of the data mining in the field of business related to mining. There are many advantages that can be related to the topic. Data mining can be considered as a method which is related to the information system, by this mean the processor can take action regarding a particular style or type of useful data from a database or large amount of data. Data mining can be implemented in order to detect the requirement of the user from the previously stored data ij the database. It can also act as a mean of detecting the behaviour of the customer, trends that the customer are following and the customer satisfaction level or different ways of improving the standard of the work that is expected from the user. The information which is extracted from the process can be used to strategically implement different processes related to the concept. It is very much important to take into account the different production techniques which is related to the company. The best implementation of the data mining concept is in the CR as CRM deals with the customer relationship management. It can directly help in improving the loyalty which is related to the customer, gaining the very important aspect which is the customer insight, retaining the customer and also in implementing focused strategies which is related to the customer.

Week 5

One of the greatest success stories in application development in recent times has been the popularity of mobile apps.  Find and summarise a resource that describes the story of ONE successful mobile app developer.

The main topic which is emphasized is the development of successful application. This article mainly draws a point on the young and famous developer of application Robert Nay, he has developed the most important free application ITunes.  This article is mainly chosen due to the factor of the person’s brilliant innovative ideas and its direct implementation which would make the application field cross a certain level of boundary. On the other and the developer also developed a famous app named bubble ball which was selected as the most commonly used free application in the iTunes store and this application was invented by him at the age of 14 only. This game was considered to be very much simple yet it was very much attractive for the small kids. In the game there was series of puzzle that the player had to guide the ball through in order to reach the goal of the game. Then most important aspect which is very much needed for a game developer is that the person should have immense knowledge of the programming language which is being used for the game and must have creative thinking ideas in order to make the game look more realistic. On the other hand the market need should be taken into account and the choice of the customers. From the above discussion it can be concluded that the field of the development of a new application is increasing on a day to day basis and knowledge and the creativity are very much required for the development of the application.

While information systems and technology deliver many benefits to society, they can also result in (sometimes inadvertent) negative effects and outcomes.  Find and summarise a resource that describes ONE example of where the use of an information system or technology has led to negative consequences for humans.

The article puts direct emphasis on the concept of data warehousing with iot bringing into account its negative impact. This article is mainly chosen due to the factor that the warehouse technique is considered as the most important aspect in the information system. This conceit is implemented in several information system and businesses. Data warehousing is mainly used in order to find out in particular, the types of useful data from a huge amount of data. Taking into account the practical aspect of the implementation there are many disadvantages that can be taken in regards to the implementation. Data warehouse can be considered as a technique which can be used to extract information which is mainly collected from different department which can be directly be implemented for the betterment of the different services that can improve the productivity of the organisation. The bad effect of the data warehouse is the risk associated with the extra work which need to be done with the aspect. As the data warehouse can be directly be related to the data collection from a wide range of customers in some cases it is seen that the organisations database have the same time of data or content thus as a result of which the data can be copied.  Data warehouse can also affect the flexibility aspect in any organisation. From the above discussion it can be stated that data warehouse has a lot in hand with the advantages with it many disadvantage related to the aspect.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2021). Course On Computing Architecture: Task Details And Summaries For Essay. (70 Characters). Retrieved from https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/discuss-the-elements-of-modern-computing.html.

"Course On Computing Architecture: Task Details And Summaries For Essay. (70 Characters)." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/discuss-the-elements-of-modern-computing.html.

My Assignment Help (2021) Course On Computing Architecture: Task Details And Summaries For Essay. (70 Characters) [Online]. Available from: https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/discuss-the-elements-of-modern-computing.html
[Accessed 24 April 2024].

My Assignment Help. 'Course On Computing Architecture: Task Details And Summaries For Essay. (70 Characters)' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/discuss-the-elements-of-modern-computing.html> accessed 24 April 2024.

My Assignment Help. Course On Computing Architecture: Task Details And Summaries For Essay. (70 Characters) [Internet]. My Assignment Help. 2021 [cited 24 April 2024]. Available from: https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/discuss-the-elements-of-modern-computing.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close