Week 1: The Influence of John McCarthy on Computer Development
The text discusses the elements of modern computing architecture however is largely silent on the individuals who played a role in its development. Find and summarise a resource that describes ONE such individual. The individual should have had a significant influence on the development of computers and/or components of modern computing architecture.
The text discusses the components and activities of operating systems however is largely silent on the individuals who played a role in their development. Find and summarise a resource that describes ONE such individual. The individual should have had a significant influence on the writing or development of operating systems.
The Internet didn’t just appear – it was an evolution from earlier networks. Find and summarise a resource that describes ONE of the networks that led to the development of the modern Internet.
Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the text. Find and summarise a resource that describes the features and uses of ONE other L2 protocol that is not discussed in the text (i.e. NOT Ethernet).
The text mentions the role of hackers in attacks on networked infrastructure. Find and summarise a resource that describes ONE famous or well-known hacker.
Society is increasingly reliant on networks and network technologies but they are evolving at a rapid pace. Find and summarise a resource that describes ONE example of a future networking technology or trend that will impact society.
The text mentions social business and the impact of the use of social networking platforms. Find and summarise a resource that describes the history of the development of ONE such social media platform.
With the advent of mass data collection and storage has come data mining. Find and summarise a resource that describes ONE example where data mining has been used successfully by a business. You should not use any examples covered in the textbook.
One of the greatest success stories in application development in recent times has been the popularity of mobile apps. Find and summarise a resource that describes the story of ONE successful mobile app developer.
While information systems and technology deliver many benefits to society, they can also result in (sometimes inadvertent) negative effects and outcomes. Find and summarise a resource that describes ONE example of where the use of an information system or technology has led to negative consequences for humans.
The text discusses the elements of modern computing architecture however is largely silent on the individuals who played a role in its development. Find and summarise a resource that describes ONE such individual. The individual should have had a significant influence on the development of computers and/or components of modern computing architecture.
This article describes about a scientist in the field of computer science who had a significant influence in the computer development or modern architecture development. I have chosen this article because it describes the life and achievements of John McCarthy. He played a significant role in developing artificial intelligence as well as the first programming language in computer.
In this article the author describes how John McCarthy played a major role transforming the technology in the world. He had invented artificial intelligence and also had developed the first programming language. He is known as the father of artificial intelligence. It also tells about the prizes and awards that he had won in his lifetime.
The most interesting fact about this article is that it gives detailed information about John McCarthy. It talks about the contributions made by him as well as its impacts. Several papers on the on invention of the programming language are given in the article. It also provides the fictional stories written by John McCarthy. It also talks about the time sharing concept that was developed by him.
I found this article interesting because it gave a detailed overview of the developments in the area of computer science. It also explained about artificial intelligence along with its branches and applications.
The text discusses the components and activities of operating systems however is largely silent on the individuals who played a role in their development. Find and summarise a resource that describes ONE such individual. The individual should have had a significant influence on the writing or development of operating systems.
This article describes about the one individual who has played a significant role in developing operating system called UNIX. I have chosen this article because it talks about the life and achievements of Ken Thompson, the developer of the UNIX operating system. It describes about his contribution behind the success of UNIX.
Week 2: Ken Thompson and the Development of Operating Systems
In this article the author describes how Ken Thompson has developed the operating system for network. The early life of Ken Thompson is also described here. This operating system was launched by him in the year 1969. The UNIX kernel was again written by Thompson in the year 1972 in the C language. This was portable. UNIX system could be run on different types of platforms.
The most interesting part of this article is that how Ken Thompson developed this operating system. Ken Thompson was working in the Bell Labs when he invented the UNIX operating system. The MULTICs project was withdrawn by the Bell Labs and the Ken Thompson decided to write a decent operating system like UNIX. He had developed on PDP-7 and ran and executed the operating system. In the year 1973, Thompson first published his presentation regarding UNIX.
I found this article interesting because it gave detailed information regarding Ken Thompson. It described UNIX to be the operating system of the networks and the reason behind its success was serendipity. It showed us how a right person helped develop a right thing.
The Internet didn’t just appear – it was an evolution from earlier networks. Find and summarise a resource that describes ONEof the networks that led to the development of the modern Internet.
This article describes about one such network that led to development of internet. I have chosen this article because it describes about ARPANET which as developed before Internet was invented. Its full form is Advanced Research Projects Agency.
In this article the author describes about the important network called ARPANET from which the internet was developed. ARPANET is the basis for the development of internet. This project was started in the year 1962. It started by interconnecting four computers in the university. The main purpose for its development was to facilitate communication among a group of users.
The most interesting part of this article is that how this idea of ARPANET led to the development of Internet. It also was developed so that the scientific users could share resources among the institutes which were connected. It sent information in packets that could be sent to their destinations through different feasible paths. . Licklider aimed share messages instantly without any type of delay.
Week 3: The Role of ARPANET in the Development of the Internet
I found this article interesting because it gave a clear idea about how Internet was developed. It described about ARPANET which is the basis of the modern internet. . It also discussed about the advantages of using internet as well as talks about the security threats in the internet.
Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the text. Find and summarise a resource that describes the features and uses of ONE other L2 protocol that is not discussed in the text (i.e. NOT Ethernet).
This report describes about the uses as well as the features of one L2 protocol apart from Ethernet. I have chosen this article because it talks about High Level Data Link Control protocol (HDLC) in details. This protocol is used at the data link layer of the computer network.
The author of this article describes about the High Level Data Link Control protocol. There are seven layers in the OSI model. Each layer is associated with certain number of protocols. The most important protocol used in the data link layer is the High Level Link Control Protocol or HDLC Protocol.
The most interesting part of this article is that it tells that this protocol is a connection oriented protocol and it can be used for connecting devices. There are different modes like the asynchronous response mode and the normal response mode. The communication path established by this protocol is reliable in nature. It takes the services of the physical layer.
I found this article interesting because it gave detailed information about HDLC protocol. It also gave us knowledge about frames. It uses frames to transfer information. It uses different types of frames like I-frames, U-frames and S-frames for the transportation of data.
The text mentions the role of hackers in attacks on networked infrastructure. Find and summarise a resource that describes ONE famous or well-known hacker.
This article describes about one well known or famous hacker. I have chosen this article because it describes the adventures of Kevin Mitnick who is a world famous hacker. FBI had stated that he was the one of the most wanted hackers in the year 1995.
Week 4: Exploring Layer Two (L2) Data Link Protocols
The author of this article describes how Kevin Mitnick had compromised databases, computer networks as well as computer systems. . It describes the hacker community and the activities of Mitnick to be a threat to the individuals as well as the states and businesses. He had not stolen any identity or money of the users. Kevin Mitnick had used his social engineering skills to hack computers.
The most interesting fact about this article is that it tells us that once the most wanted hacker is the most trusted security consultant in the present time. He has also published a book called “Ghost in the Wires” where he has written about the exploits. His idol was Eric Weiss and he carried out the hacking activities and was disappointed by the fact that FBI did not know what humour was. His intentions were not wrong.
I have found this article interesting because it describes about the adventures of the world famous hacker named Kevin Mitnick. It gives us idea about why he had hacked.
Society is increasingly reliant on networks and network technologies but they are evolving at a rapid pace. Find and summarise a resource that describes ONE example of a future networking technology or trend that will impact society.
This article describes about one networking technology that will have a great impact on the society in the future. I have chosen this article because it describes about 5G networks and their impact on business that forms a part of society.
The author of this article describes about 5G networking technology. It says that use of mobile and wireless technologies is gaining importance with time. A business will be able to grow at a fast pace if they incorporate wireless technologies in its system. The future generation of business will need huge increase in the capacity, connectivity and speed of mobile devices. 5G network is a technology that will fulfil the dreams of the business by improving the connectivity speed of all the mobile devices. This resource says that the concept of communication over mobile phones has changed over the thirty six years.
Week 5: Famous Hackers and Their Impact
The most interesting fact about this article is that it says that the innovation in the wireless technology is growing at a fast face rather than slowing down. 5G network is expected to provide high throughput and huge connectivity speed. This will improve the business processes. They will be able to provide high customer satisfaction.
I have found this article interesting because it gives an idea about how 5G network will help to improve the productivity of business in the future.
The text mentions social business and the impact of the use of social networking platforms. Find and summarise a resource that describes the history of the development of ONE such social media platform.
This article describes about the history of the development of one social media platform. I have chosen this article because it describes about the history and development of Facebook. . It was developed in the year 2004. It was developed by Mark Zuckerberg along with his fellow roommates of Harvard College.
The author of this article describes how Mark Zuckerberg developed Facebook. Facebook was initially used by the students of Harvard College and later on it was expanded to other institutes. From the year of 2006 it was accessible to anyone who was above 13 years of age. It helps people across the world to communicate with one another over the internet. People can share pictures, posts, add friends, chat and promote any business through Facebook.
The most interesting fact about this article is that Facebook earns its revenue through advertisements that appear on the newsfeed of the people. The revenue is increasing with time at a fast pace. Another part of its revenue is generated from the social media data that is sold to the third party.
I found this article interesting because the study helped in understanding that the number of users at present is about 2 billion. The aim of this social media platform was to build a powerful community and bring the entire world together.
This resource is relevant to the task here because it talks and discusses about the development and history of Facebook, which is one of the most famous social media platforms in the recent time.
Week 6: Future Networking Technologies and Trends
With the advent of mass data collection and storage has come data mining. Find and summarise a resource that describes ONE example where data mining has been used successfully by a business. You should not use any examples covered in the textbook.
This article describes about one example where data mining has been used successfully in business. I have chosen this article because our main focus is the on business of Facebook. It has used the process of data mining very tactfully in handling over 200 million users information. The data mining process has created value for Facebook.
The author of this article describes how Facebook uses data-mining company to track consumers' retail purchases. This resource says that Facebook uses the concept of data mining in order to understand the purchasing behaviour of the customers. The name of this resource is An US based company for data mining is hired by Facebook to carry out this function. The name of the company is Datalogix.
The most interesting fact about this article is that advertisements of businesses are put up on Facebook and data mining has helped Facebook to understand customer choices and preferences by their response to the social media advertisements. Data of 70 million people were collected by Facebook from the Datalogix and allowed several brands to understand their customers and generate business.
I have found this article interesting because this helped in understanding that data mining has indirectly led to the growth of the number of users of Facebook giving it high success. Hence the study of the growth of the business which has used the process of data mining in a successful manner would help in critical evaluation of the benefits of data mining in business.
One of the greatest success stories in application development in recent times has been the popularity of mobile apps. Find and summarise a resource that describes the story of ONE successful mobile app developer.
This article describes about one successful mobile app developer. I have chosen this article because it describes the success story of the developer of Pinterest. The name of the developer is Ben Silbermann.
Week 7: The History of Social Media Platform Development
The author of this article describes how Ben Silbermann became successful. He had a technical background. He was initially working for Google. He used to design ads. Then he got exposure to big and better things. He had left Google and had tried to develop an iPhone application which failed. Then later on he developed an app called Pinterest, where people are able to share their own interests on pin board.
The most interesting fact about this article is that we have got to know how this idea developed. He had a childhood habit of collecting information from others. Sarah Tavel and Jeremy Levine were responsible for financing. He felt that people did not have any place to share their own thoughts and feelings on the internet. This led to the idea of creating such an app called Pinterest.
I have found this article interesting because this helped in understanding that the main aim was to make Pinterest work and he did not think of success. This led to the success of this application. Ben had given a visit to the first five thousand visitors on his own.
While information systems and technology deliver many benefits to society, they can also result in (sometimes inadvertent) negative effects and outcomes. Find and summarise a resource that describes ONE example of where the use of an information system or technology has led to negative consequences for humans.
This article describes one example where the use of information technology or system has given a negative impact on the human beings or society. I have chosen this article because it describes a data breach incident that took place in Verizon Company in the month of July, 2017.
The author of this article described that Verizon data of 6 million users were leaked online. Verizon Company is responsible for providing telecommunication carriers and components to its subscribers. Its third party cloud based vendor was responsible for the data breach that took place. The name of the vendor is NICE System. The cloud was not configured. This misconfiguration led to the leakage of data.
The most interesting fact about this article is that it gave us the idea how sensitive information like phone number, addresses and pin codes were leaked. The reason behind data breach on Verizon Company is due to misconfiguration of cloud. Cloud stores important information. Digital service and cyber risk go side by side.
I found this article interesting because it gave me idea about several negative impacts of information technology. Security threats are increasing daily. Data that is stored in the information system is vulnerable to any type of data threat like hacking, virus, worms, denial of service and cyber attacks.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). Key Figures In Computing History Essay.. Retrieved from https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/influence-on-the-development-of-computers.html.
"Key Figures In Computing History Essay.." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/influence-on-the-development-of-computers.html.
My Assignment Help (2021) Key Figures In Computing History Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/influence-on-the-development-of-computers.html
[Accessed 12 November 2024].
My Assignment Help. 'Key Figures In Computing History Essay.' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/influence-on-the-development-of-computers.html> accessed 12 November 2024.
My Assignment Help. Key Figures In Computing History Essay. [Internet]. My Assignment Help. 2021 [cited 12 November 2024]. Available from: https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/influence-on-the-development-of-computers.html.