It will be necessary to use literature/online resources to complete this assignment, please ensure you cite and reference any such materials using the Harvard format.
Do not copy content directly from either the text or Internet resources: this assignment is to be in your own words. You will lose marks if you do not use your own words!
Please complete your assignment using this submission template file, inserting your responses where indicated.
Do not delete the marking criteria page – changes are permitted to the formatting of other pages including the headers and footers.
There are ten (10) tasks, one for each week: the tasks are detailed below. There is a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
The text discusses how modern CPUs function. Recently a critical flaw in microprocessor design has been discovered that allows two extremely serious security exploits: Spectre and Meltdown. Find and summarise ONE resource that describes how either of these exploits work. The resource (and your summary) should focus on what is occurring in the CPU that allows these exploits to occur.
Prior to 1985, there were very fewOperating Systems (OSes) that used Graphical User Interfaces (GUIs). Find and summarise ONE resource that describes ONE of these GUI operating systems. The OS must have been release prior to 1985 so cannot be Microsoft Windows.
Meltdown and Spectre: How chip hacks work’
Chris, B., Mark, W., 2018, Meltdown and Spectre: How chip hacks work, viewed 10 May 2018, https://www.bbc.com/news/technology-42564461
The article has discussed about the vulnerabilities named spectra and meltdown. The main reason for choosing this paper is that the paper gives a broad description about the security threats and the workings of these security threats. Apart from that it also discusses about the impacts of these threats on the system and the prevention methods.
The shuffling of the data in the computer CPU is done between the various parts of the memory chip, and this operation is controlled by the kernel of the computer. The main objective of the CPU is to present the data to the users when it is needed. The cache memory performs the operation. The mentioned vulnerability works on the data when the data is in cache and is controlled by the processor. The min working of the Spectra vulnerability is to make the programs to execute the unnecessary functions which can leak the important information regarding the system. The manipulation of the kernel is used by the meltdown vulnerabilities to get the necessary information regarding the system, both the vulnerabilities are of “speculative execution: in nature. This feature of the threats allows the generation of the result for an instruction before the execution of that instruction. This feature can allow the hackers to take the control over the system.
The companies those are giving services to other companies can be affected from these types of vulnerabilities. The release of the patches is made available to mitigate the impact of these vulnerabilities. However, it has been seen that the use of the patches is slowing down the working speed of the CPU.
The information I got from this discussion helps me to get an overview about these two security vulnerabilities. However, it has been found out that many chips were affected with these vulnerabilities. The mitigation plan and its effectiveness are also discussed in this paper which is helpful for indicating the future development of the mitigation plan of these vulnerabilities.
History of Computers and Computing, Birth of the modern computer, Personal computer, Xerox Alto
History of Computers 2018, History of Computers and Computing: Birth of the modern computer: Personal computer: Xerox Alto, 2018, viewed 10 May 2018,
https://history-computer.com/ModernComputer/Personal/Alto.html
This paper gives the details about the Xerox Alto the first operating system that was operated the graphical user interface. The reason for choosing this paper is that, the article contributes in understanding the working principal of the Xerox Alto along with that it also provides the necessary information regarding g the hardware and the software configuration of the system which helps the readers to understand the system clearly.
The development of the Xerox Alto was done by the Xerox PARC I 1972. The speciality about this operating system is that the operating system used the graphical user interface. The system was the first noticed operating system which used the GUI. However, the use of this operating system was not commercial. This operating system was used in the universities and the libraries for the research purpose.
The design of the operating system was influenced by the on-line system (NLS). Some of the features of the Xerox Alto are:
· Memory- 128 KB
· Hard drive- Cartridge hard drive of 2.5 MB which was removable.
· Three button Mouse
· 5.8 MHz CPU.
· The display used in the operating system was black and white in nature.
The connect between the various operating system can be made through using the local area network(LAN). The use of the BCPL code was done to write the code for the user interface in this operating system. Texas Instruments made the hardware and infrastructure needed to implement the system.
From this article I have found out about the working and the configuration of the Xerox Alto which is considered as the first operating system using the GUI. Moreover, this article has provided the information about the software and hardware configuration of the system and the working principal of the system.
LPWA network technologies and standards: LPWAN wireless IoT guide’
I-SCOOP 2018, LPWA network technologies and standards: LPWAN wireless IoT guide, 2018, viewed 15 May 2018, https://www.i-scoop.eu/internet-of-things-guide/lpwan/
The article discusses about the application of the Low power wide area network which is widely used in the field of the IoT. The main reason for choosing this paper is that it describes the application and other issues regarding the use of the LPWAN in the field of IoT.
There is a difference between the LPWA and LPWAN. The LPWAN is a network standard which provides the network connectivity and consumes the low power.
The main disadvantage of LPWAN is that there is no standardization of using it.
However, there are various non-cellular band which provides the service using the LPWAN.
I have found out some useful information regarding the use of LPWAN from this article which helps me to understand its significance.
The Session Initiation Protocol - The Internet Protocol Journal
William, S, 2018, The Session Initiation Protocol - The Internet Protocol Journal - Volume 6: Number 1, viewed 16 May 2018, https://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-23/sip.html
The article provides information about the session initiation protocol which is one of the VoIP protocol. The main reason for choosing this article is that the article tells about the working method and the significance of the session initiation protocol.
Session initiation protocol is the signalling protocol which helps to initiate the communication between the two communicating device. The communicating device can be the two systems.
With the use of the session initiation protocol the voice over calls through the internet can be made. The protocol is defined in RFC 3261. This session initiating protocol helps to determine the status of the communication between the two-connecting device. It helps to determine, modify and terminate the connection between the two systems. The standard of the SIP is defined by the engineering task force. The user location denotes the attribute of the connection which allows the users to use the device from anywhere.
There are five basic components of the session initiation protocol they are-user location, user availability, user capabilities and setup sessions. The user availability determines the willingness of the communication system to participate in the communication. The setup of the connection determines the creation of the communication between two devices based on some agreed parameter.
The main information I have found from this article is the working principal of the session initiation protocol. However, this article does not focus on the comparative study between the different network standards with LPWAN.
What is blockchain technology and how does it work?
Sebastian, K 2018, What is blockchain technology and how does it work, viewed 22 May 2018, https://www.express.co.uk/finance/city/917059/what-is-blockchain-technology-how-does-it-work
The article focusses on the information about the block chain technology. The paper discusses about the block chain technology and its working principals.
The block chain technology is an emerging technology which was initially used in maintain the transaction records in the crypto currency.
The working principal of the block chain technology depends on the utilization of the data blocks of the chained data. It is a way of maintaining the records. The block chain technology was primarily used for keeping the transaction record in the cryptocurrency.
The use of hash value in the block chain technology increases the security process. This technology helps to provide a more secured way for storage of the records and the data. The use of the hash value in the block chai technology prevents the outside stamping. This mechanism of the block chain technology helps to enhance the security. The block chain uses peer-to-peer decentralized way of communication.
The paper contributes in understanding the block chain technology and its working principal. It has been found from the paper that the block chain technology can be used in maintain the data records apart from being used in the crypto currency. However, the paper does not contribute regarding the discussion about the working principals off the block chain technology in details.
Net Neutrality Was Repealed and How It Affects You
Keith, C 2018, Why Net Neutrality Was Repealed and How It Affects You, viewed 22 May 2018, https://www.nytimes.com/2017/12/14/technology/net-neutrality-rules.htmlThe discussion of the paper focuses on the topic of net neutrality in general sense. The findings of the paper indicate the impact of the net neutrality on the individuals and the organizations. The reason for choosing this paper is that the paper provides the impact of the net neutrality from the different aspects.
Net neutrality denotes the way, where the internet provider has to give the service of the internet in a equal way to all the users. This will not allow the internet service providers to charge the higher value of money for some facilities. According to the net neutrality, all the users will enjoy the internet service and the same benefits regarding the cost and the time and place.
There are some reasons behind the proposing of the idea of the net neutrality. It has been observed that the behaviour of the consumers has been changed over years. Some of the internet providers are differencing in the service providing of the network. To prevent these malpractices, the idea of net neutrality has been proposed. The use of the net neutrality will not allow the service providers to charge extra for accessing any websites.
The implementation of the net neutrality will not allow the internet service providers to slow down the speed of the internet. This make sthe concept of the net neutrality positive. However, according to some experts, the imposing of the net neutrality may have various disadvantages. One of the main disadvantages of the net neutrality is that the use of the accessing the free websites may become expensive as the net neutrality will make a way for the service provider to present the internet service under the cover of different packages. This will become a constraint for the small business farms and the individuals for accessing the internet.
I have found from this paper that the net neutrality has certain good and bad impact in the society. However, the objective of the net neutrality has been invented to providing the better purpose, but the impact of the net neutrality on the various organizations and on the individuals will not be positive.
The Effects of Technology on Employment and Implications for Public Employment Services
G20 Argentina 2015, The Effects of Technology on Employment and Implications for Public Employment Services, 2015, viewed 22 May 2018, https://g20.org.tr/wp-content/uploads/2015/11/The-Effects-of-Technology-on-Employment-and-Implications-for-Public-Employment-Services.pdf
The article focuses on the negative impact of the advancement of the ICT. The reason for choosing this article is that the paper as discussed both the positive and negative side of the advancement of the ICT. So, in this case it can be said the discussion is not biased to one side and the conclusion drawn from the discussion has considered all the impacts of the digitization.
The advancement of the ICT has certain positive and negative impacts. Some of the positive impacts of the advancement of the ICT is that, it enables the use of various technologies in the different application field.
The major concern about the advancement of the ICT is that, its impact on the social and economic life of the people. Smart machines are replacing the human. The organizations are interested to cut down the human resource and implement the advanced ICT as the machines and the system can deliver accurate service within the small-time span. This reason raises the issue regarding the unemployment. The machines are replacing the humans, causing the increase of the unemployment, which is not desirable.
The positive effect of the digitization and the ICT is that the jobs regarding the technical field is increasing. The experts in the digital technology will get the jobs and the professionals in the technological field will help to upgrade their knowledge in order to increase their efficiency.
The information I have found from this paper reflects the positive and negative side of the using of ICT. The advancement of the ICT has helped for most of the business organizations to expand their business and apart from that it also helps to get the more profit benefits for the organization. However, the extensive use of the ICT has increased the unemployment.
Machine Learning: What it is and why it matters.
SAS 2018, Machine Learninqg: What it is and why it matters, 2018, viewed 22 May 2018, https://www.sas.com/en_in/insights/analytics/machine-learning.html
The article released by the SAP has discussed the significance of the machine learning and its advantages in the technological field. The reason for choosing this article is that the paper gives a description about the basic of the machine learning along with its advantages and the issues.
Machine learning is derived from the pattern reorganization. The concept of the machine learning defines a computational way of getting the output, where the users put the information as the input to the machines and the machine processes the output based on its own decision-making system. The system can use the information from the previous computational data for the processing of the information provided by the users.
The importance of the machine learning lies on the fast processing of the data. The self computation of the system can reduce the execution cost and can advance the accuracy of the computational result. The use of machine learning in the system can increase the functionality of the system along with that it also provides the organizations competitive advantages.
There are certain issues regarding the implementation of the machine learning. The implementation of the machine learning needs the complex algorithm and the expert handling of the system.
From this paper I have gained the knowledge about the basic concept of the machine learning. Moreover, the impact of using the machine learning on the organization and technological field has been discussed in this paper. However, the detailed description and the working methodology of the machine learning has not been discussed in this paper.
A Programming Language That Combines Best Of Python, Go, And Rust.
Adarsh, V 2017, Nim: A Programming Language That Combines Best Of Python, Go, And Rust, viewed 22 May 2018, https://fossbytes.com/nim-programming-language-nimrod/The Nim programming language was initially known as the Nimrod. The Nim can be considered as the extension form of the python programming language. In this programming language the run time efficiency is not compromised. The syntax used in the Nim is like the python. The main feature of this programming language is that it merges the effectiveness of the Lisp, Go, and the Rust. The nature of this programming language is object oriented.
The message passing is done between the heap and the threads in the Nim. The benchmark followed by the Nim is the C. The compiler of this programming language generated the scripts in the C by default. The software is licensed by the MIT.
The main objective the Nim is to merge the effectiveness of the various programming languages. however, the use of this programming language is not so popular is by only the few people in the software development area.
The information I have found from this article has helped me to gain basic knowledge about the Nim programming language. However, the detailed description of this programming language is not given in the paper, only the over view of the article has been discussed.
Thanks to bots, fake news spreads faster on Twitter
The Economic Times 2018, Thanks to bots, fake news spreads faster on Twitter, 2018, viewed 22 May 2018, https://economictimes.indiatimes.com/magazines/panache/thanks-to-bots-fake-news-spreads-faster-on-twitter/articleshow/63244520.cmsThe paper tells about the significance of the bots is spreading the fake news over internet. The reason for choosing this article is that the paper discusses about the current situations and the different fields in the socio economical area affected by the fake news spread by the bot.
The spreading of the fake news is done much faster by the bots through the social media. The main objective of the social media is to make the communication between the people of the different parts. However, the social media has become the main medium of spreading the fake news which is not desirable.
According to this article the main source of spreading the fake news is done through the twitter and the unknown twitter chians.
The psychology of the people also plays an important role in spreading and accepting the fake news. The people get interested about the novel nature of the fake news presented in the social media. This interest of the people helps to spread the fake news.
The paper has given the knowledge about the spreading of the fake news and the role of the bots in spreading the fake news. However, the paper does not discuss about the detailed description about the impacts of the bots and the fake news on the different aspects of the social life. It can be said from the paper that most of the fake news are related to the political issues.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2020). ICT Services Management. Retrieved from https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/hard-drive.html.
"ICT Services Management." My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/hard-drive.html.
My Assignment Help (2020) ICT Services Management [Online]. Available from: https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/hard-drive.html
[Accessed 22 January 2021].
My Assignment Help. 'ICT Services Management' (My Assignment Help, 2020) <https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/hard-drive.html> accessed 22 January 2021.
My Assignment Help. ICT Services Management [Internet]. My Assignment Help. 2020 [cited 22 January 2021]. Available from: https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/hard-drive.html.
If you need help with referencing on an academic task, MyAssignmenthelp.com can be your APA referencing guide for the time being. As we all know, referencing is very important to avoid paraphrasing and other kinds of plagiarism while preparing a document. You can easily use APA style referencing by getting access to the free APA citation machine available at our website. Just submit the details regarding the source of information and generate the necessary referencing in an instant. Furthermore, if you have any confusion regarding using referencing style while writing title page or bibliography page, you are free to ask our experts at any time of the day.
Answer: Task 1 Fiction Oasis is a small second-hand book shop, run by a team of three staff members: Archie, Bhavesh, and Celestine. All these three employees are working on three different time shift. For operating and managing their cost for the business they are using a excel sheet. This excel sheet will help them to manage their business cost. This speed sheet calculates the operating hours of every employee. Moreover, the total wags of e...
Read MoreAnswer: Structure of the database:- We have only one collection in our database "movie". This collection of the movie has various movie documents. Each movie document contains information about a movie. To contain this information, each movie document has various attributes like MovieID, MovieName, ReleaseDate etc. Apart from these attributes, each movie is related to Rating. One movie can have zero or more ratings but one rating can be...
Read MoreAnswer: Introduction In the world, Hewlett-Packard (HP) leads in providing enterprise and consumer services, products, solutions, and technology. In the United States, HP Company is one of the five hundred fortune companies every year as it is among the largest corporations. Hp Company provides services such as printing, personal computing, imaging, access devices, spanning IT framework and international services [1]. The report will describe t...
Read MoreAnswer Epidemiology Introduction Different companies have different policies that govern their employees. Such policies include regular screening of employees for drug as well as alcohol use (Bertholet et al., 2014). Some of the state laws as well as company policies recommend this to be done prior to employment while other recommend this to be done after employment so that there is monitoring of the employees (Edvardsen, Moan, C...
Read MoreAnswer Reflection on Experience Reflection refers to serious thought that can help an individual in analysing an event. Reflection helps an individual in describing an event and the impression that it creates on the mind of the person who has undergone that experience (Cohen 2017). This essay reflects on the manner of approaching the problem and states the reason of approaching the problem in that manner. It reflects on the feelings that I fe...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
Saved my life and offered me great quality work. Happy to find them. Now i guess i will get hooked with them. :p
Australia
I modified it with one feedback. The quick response and feedback were good. My request has been modified well.
Australia
the expert solution is very god unlike the solution of the financial risk management
Australia
Thanks for your support. This was perfectly done. ........................................
Australia