Week 1
There are ten (10) tasks, one for each week: the tasks are detailed below. There is a table to complete for each task. Please fill in the information required.
The text discusses conventional binary computing architecture. However, an emerging field of research focuses on the development of quantum computers. Find and summarise a resource that explains why there is so much interest in this type of computing (for example, the potential applications).
The text briefly makes mention of the Linux operating system, an open-source Unix variant developed in the 1990s. There are many popular Linux distributions (look up “Linux Distribution” if you don’t know what that means). Find and summarise a resource that describes the features and advantages of ONE of these distributions.
The text discusses the concept of virtualisation. There are several “type 2” or hosted virtualisation products (software) on the market (both commercial and open source). Find and summarise a resource that describes the features and advantages of ONE of these products.
TCP and UDP are examples of two Layer Four (L4) transport protocols that are discussed in the text. Find and summarise a resource that describes the features and uses of ONE other L4 protocol that is not discussed in the text (i.e. NOT UDP or TCP).
Cyber-attacks on governments or government assets are receiving increasing publicity and media attention. Find and summarise a resource that describes ONE recent cyber-attack (within the last 3 years) against a government website or asset.
Flood, fires and earthquakes are events beyond our control, yet impact heavily on ICT infrastructure. Find and summarise a resource that describes ONE example of an organisation’s ICT infrastructure being impacted by such an event and the resulting effects on the business and/or its operations. For example, you might want to search for “data centre fire” or “network cable earthquake” to find suitable resources.
The text briefly mentions crowdsourcing which is a form of social business that organisations employ to engage with the public to achieve a goal. Find and summarise a resource that describes ONE example of an organisation using crowdsourcing and the outcomes of the engagement.
With the advent of mass data collection and storage has come a surge of instances of data theft. Find and summarise a resource that describes ONE example where data has been stolen from a private company or corporation and explain the impacts on the customers.
The failure to adapt business processes and embrace technology, particularly ICT, has led to the downfall of many previously successful companies. Find and summarise a resource that describes ONE example of an organisation that failed to adapt to changes in technology and explain what the organisation failed to do/respond to.
Large, complex ICT projects are more likely to fail than succeed. Find and summarise a resource that describes ONE example of a large ICT project that failed and explain the impacts of the failure.
There are ten (10) tasks, one for each week: the tasks are detailed below. There is a table to complete for each task. Please fill in the information required.
The text discusses conventional binary computing architecture. However, an emerging field of research focuses on the development of quantum computers. Find and summarise a resource that explains why there is so much interest in this type of computing (for example, the potential applications).
The resource is an educational online content by a computer expert that gives a historical background on computers and computing. It discusses the concept of quantum computing and its pioneers and the future of the concept, while mentioning the present use of the binary system. I selected the article given that it provides useful insights on how quantum computers work, or are postulated to work, and extensively covers present trends in computing. The article explains clearly how the conventional binary computers work (their principle) and then discusses the principle of operation for quantum computers, its pioneers, and future prospects. The article is as enlightening as it is educational, and is also chosen because it is very current, having been updated in 2017. reading, I feel the article provides me with new insights while also attempting to predict the future of quantum computingThe article describes conventional binary computing where silicon chips with millions / billions of minute transistors that can be turned to on or off status representing 1 or 0, respectively, storing and processing data in bits/ binary digits. The article then contrasts binary computing with quantum computers and describes them as working with quantum bits represented as mechanical states in hardware, instead of as transistors that can be turned on/off. Quantum computers can use the direction of spin of an electron or atom, or even a photon’s polarization. Based on unique quantum mechanics laws, each quantum bit can be 1, 0 or both. It also discusses quantum computing pioneers such as D-Wave of Canada working with Google. The paper then predicts a future in which people cannot own quantum computers in the way they do PC’s, but can access quantum computing power via the cloud. There is increased interest in Quantum computing due to its postulated enormous computing capacity and potential for use as the premier cloud computing platform The article is important in its depth of research, discussion of quantum mechanics in an easy non-technical manner, and, importantly, predicting its use from a cloud perspective, showing that it will grow as cloud computing grows
Week 2
The text briefly makes mention of the Linux operating system, an open-source Unix variant developed in the 1990s. There are many popular Linux distributions (look up “Linux Distribution” if you don’t know what that means). Find and summarise a resource that describes the features and advantages of ONE of these distributions.
The article briefly describes Linux as a popular and mature OS that is open source and would be much better for users than those using the Newly released Windows 8 OS. The paper describes the cool features that Ubuntu Linux version 12 has that makes it a much better operating system than Windows 8, apart from being free and open source. It discusses levels of compatibility with hardware, cloud application, security, price, administration, and support for booth and why Ubuntu Linux 12 is much betterThe article was selected because apart from just discussing the features and advantages of Ubuntu Linux and why users should use it, it makes a comparison with the more common and popular Windows platform and justifies its position. A comparative analysis provides a non-biased way of eliciting the benefits and advantages of Ubuntu and why it is a far much better and cheaper alternative to Windows 8. it also discusses the most important features for a desktop/ laptop operating system, in light of modern trends such as cloud computingUbuntu has a better and more familiar interface than Windows 8, even for historical windows users. Ubuntu has more capabilities for real customization, including using third party tools, while customization for Windows 8 is largely cosmetic. Many more free/ open source applications can be used with Ubuntu, unlike Windows that has pre- bundled applications, and adding more will increase costs. Ubuntu is more hardware compatible, even running on older basic hardware, while Windows 8 requires higher spec (modern) hardware. Ubuntu has cloud compatibility for file storage, although Windows 8 does much better across multiple devices. Ubuntu has better native security than windows as well as better administrative capabilities than Windows. Ubuntu offers cheaper user support as well as VPN features, compared to Windows 8. Ubuntu is free, while windows costs at least $ 39 (introductory) that will rise to $ 199 after offer ends. The article gives Windows users food fr thought and offers new insights on why Ubuntu is much better than Windows, including being free
The text discusses the concept of virtualisation. There are several “type 2” or hosted virtualisation products (software) on the market (both commercial and open source). Find and summarise a resource that describes the features and advantages of ONE of these products.
Week 3
It is a review by PC World on the latest iteration of VMWare Fusion (Fusion 8.5) and it discusses its features, pros and cos, and makes comparisons between it and its main rival; Parallels Desktop 12. It discusses how VMWare Fusion is an excellent type 2 hyper-visor to use in MAC environments to run virtual machines, including Windows. It was selected on the basis f being current and its unbiased and objectivity in evaluating and reviewing the pros and cons of VMWare Fusion 8.5 and justifies, using educative points, why its is an excellent corporate virtualisation software for use in the MAC environment. The paper reviews VMWare Fusion v. 8.5 as being a stable, rock solid for use in MAC environments at an enterprise level for virtualization that enables Windows to be run from a MAC environment; the Type 2 Hypervisor is also adjudged by the author as being highly flexible in that it can share virtual machines running on it with Mac or Windows based machines that run other different types of VMWare software. It also enables high levels of integration since peripherals such as MAC printers can be installed automatically into Windows environments and run without hitches. VMWare Fusion 8.5 can run on almost any machine that has Intel based processors. The ability to enable integration allows data and files to be shared easily and seamlessly between a host running MAC OS and Windows guest machines. While VMWare Fusion 8.5 is slightly sluggish compared to Parallels, it more than makes up for extensive integration without sacrificing performance. The resource gives insights, from a practical point of view based on actual use and tests, the features that VMWare Fusion 8.5 has in terms of performance and integration as well as flexibility, even making comparisons to its rival, Parallels.
TCP and UDP are examples of two Layer Four (L4) transport protocols that are discussed in the text. Find and summarise a resource that describes the features and uses of ONE other L4 protocol that is not discussed in the text (i.e. NOT UDP or TCP).
The article defines what the ICMP is, as a layer four transport protocol that is crucial for the proper function of the other more popular UDP and TCP transport layer 4 protocols. It is defined as a supporting protocol within the IP (Internet protocol) suite used by network devices such as routers for sending error messages and operational information. The article was chosen because of the technical knowhow and expertise of the authors and the fact that it explains exactly what ICMP is and what it is used for in the IP suite. The article has also been chosen for giving insights into how the Internet transport protocol works and why ICMP is very critical to the smooth working of the transport layer in IP. IP suite, responsible for sending error and operational messages; these make it useful for network administrators when testing network connectivity and seeking network configuration errors. The functions of the ICMP include;
Week 4
Announcing errors within a network; such as when the entire protion or the host of anetwork cannot be reached. It also helps network administrators in troubleshooting errors within a network, announcing time outs in a network when the time to live (TTL) drops to zero. This it does by having the router that discards a data packet when the TTL drops to zero generates an ICMP packet to announce the time out. The ICMP also helps announcing when there is congestion in the network such as when too many packets are buffered by the router because it is incapable of transmitting data packets as fast as they are arriving; an ICMP source quech message is generated. The resource not only explains what the ICMP is, but also explains how it works and its function within an IP suite. It also justifies why it is at the core of the transport layer in an IP suite.
Cyber-attacks on governments or government assets are receiving increasing publicity and media attention. Find and summarise a resource that describes ONE recent cyber-attack (within the last 3 years) against a government website or asset.
The resource is a report by a security expert and reporter on the chain of events that led to the discovery of a major cyber attack on the US Office of Personnel Management in 2016. the article describes how cyber criminals and hackers have managed to exploit SSL (Secure Sockets Layer), which is meant to ensure secure data transmission over networks as a means of concealing malware inside files that would otherwise appear legit. It describes on of the major and far reaching attacks on a US government Internet asset used to manage all details of the US Government labor force. It was also chosen for being a step by step report for the cyber-attack that used PlugX, commonly used by Chinese speaking hackers. When a security analyst decrypted some SSL data streams in its network, he discovered a strangely addressed packet enclosed inside a McAfee type file, yet they never used McAfee products. The malware, PlugX variant, had been in their system for over a year without detection. They had accessed the OPM master records from where access to all other resources could be accessed, yet their intentions were unknown. The incident was far reaching in that hackers could access all background checks and information on all security clearance employees. The event led to a 30 day sprint to greatly enhance security for US cyber assets. It highlights the challenge of malware, especially sophisticated ones that can bypass even the best security, including SSL, and remain hidden, in some of the most sensitive government cyber assets.
Week 5
Flood, fires and earthquakes are events beyond our control, yet impact heavily on ICT infrastructure. Find and summarise a resource that describes ONE example of an organisation’s ICT infrastructure being impacted by such an event and the resulting effects on the business and/or its operations. For example, you might want to search for “data centre fire” or “network cable earthquake” to find suitable resources.
The article describes how, unlike usual natural calamities such as floods and earthquakes, the ING bank main data center located in Bucharest, Romania, was fully destroyed by a loud noise that destroyed hard drives, keeping it down for a colossal ten hours. The article gives a very different and unexpected natural calamity that can cripple a data center, aside from the expected natural sources that can adversely impact data centers. During a data center fire drill to ostensibly prepare crew on what to do in the event of a fire at the data center; a standard security drill data centers use helium extinguishers that are inert and do not damage electronics. However, a law of physics caused massive damage when the fire extinguishers were opened to release the inert helium gas at high pressure, creating a very loud noise recorded at 130 dB. This created a high vibration that damaged hard disks that are more closely spaced nowadays, resulting in the data center being shut down and affecting local banking operations. While natural calamities such as floods and fires as well as earthquakes are common and have mitigation measures, there are other totally unknown and unexpected natural causes that can cripple a data center, such as loud noises and vibrations that had not been thought about. The article highlights the need for continuous research to anticipate natural risks that have not yet even been thought about on data center security.
The text briefly mentions crowdsourcing which is a form of social business that organisations employ to engage with the public to achieve a goal. Find and summarise a resource that describes ONE example of an organisation using crowdsourcing and the outcomes of the engagement.
The article is published in an advertising magazine, ‘Advertising Age’ in which the use of crowdsourcing was successful in redefining advertising as used by Doritos in the Super Bowl. The article describes the history of crowdsourcing and how it began for Doritos and ten years of success. The article is well researched and written and covers the historical perspective of the Crash crowdsourcing during the Super Bowl. Apart from showing how successful crowdsourcing is, it explains why it has been successful when used over time. It all started in 2006 when Andrew Robinson pitched an idea that was at that time radical to the Doritos marketing team. It was rejected, but later, executives at PepsiCo adopted it and the ‘Crash the Super Bowl’ campaign in which amateurs generated content used by the company to attract younger consumers was launched. It gave Doritos a huge sales boost to $ 2.2 billion from $ 1.54 billion in 2006. The success came from the six moth period they engaged with customers. The idea allowed consumers ‘to shine’ and the brand has adapted it as demographics change using the ‘Legion of the Bold’ initiative where the general public are asked for creative ideas over a year. It shows how a crowdsourcing idea for advertising a brand has been successful over the years through customer engagement, resulting in significant sales growth for the brand.
Week 6
With the advent of mass data collection and storage has come a surge of instances of data theft. Find and summarise a resource that describes ONE example where data has been stolen from a private company or corporation and explain the impacts on the customers.
It discuses a major data breach event in which target, the second largest US discount store, had a cyber security breach, resulting in at least 40 million customers credit/ debit card and financial information being stolen in late 2013. It also discusses how this could have prevented except that target ignored its own security ‘alarms’. The article was selected because of its scale, being the largest retail hack in the history of the USA, and the fact that it targeted customer credit/ debit card information and financial transactions. The article is well researched and found in a reliable and verifiable source.
The theft was common; a hacker installed malware in the payment and security system used by target to collect and store all swiped credit card information on a Target server ‘commandeered’ by the hackers, despite target having installed a new Malware and having all its data constantly monitored from Bangalore and the USA. When the hackers organized an escape route for the data, this was detected and Target security teams at Minneapolis notified; but they DID NOT RESPOND to the warning ‘sirens’. The company and its security team stood by and watched as 70 million personal customer information such as e-mails and 40 million credit/ debut cards data were taken from its mainframes. It spent $ 61 million responding to the breach, while profits fell 46%. the company got the malware warnings early enough and if it had taken action, nothing could have been stolen. The malware used was unsophisticated and the security system detected before anything happened, yet inaction led to massive theft, the perpetrators have not been positively identified. Target has agreed a $ 10 billion settlement with affected customers. It explains in detail how malware attacks can happen, sometimes through such a basic approach. It also shows how cyber security can be enhanced through virtualization and the importance of taking action in the even a security breach is detected or suspected.
The failure to adapt business processes and embrace technology, particularly ICT, has led to the downfall of many previously successful companies. Find and summarise a resource that describes ONE example of an organisation that failed to adapt to changes in technology and explain what the organisation failed to do/respond to.
Week 7
It follows the history of Kodak and its inventions as well as strategic failures in which it failed to adapt to technology, including those it had invented, leading to its filing for bankruptcy in 2012. For over a century, Kodak set standards in photography and digital/ film imaging, raking in billions of dollars. Yet as everything around it changed, it somehow failed to notice, including digital imaging which it invented. Yet it somehow managed to go down when it should have continued being the front runner. Kodak made staggering and incomparable corporate blunders. For decades, Kodak did extensive research on digital photography, but failed to notice that digital photography was disruptive. A survey showed Kodak had 10 years to prepare for the advent of digital photography way back in 1981. Kodak failed to adapt in the 10 year window of opportunity before digital photography had gained a foothold. Instead of preparing for digital photography to replace film, Kodak used digital to improve film technology, even though it developed the first mega pixel digital camera in the mid 80s. It even used digital technology to support film, developing the Advantix preview system; a digital camera with film. Successive company CEO’s never managed the transition to digital, some even sticking to its core film business. And so came Kodak’s demise. It demonstrates how a company can have everything, including money and a brand name, but lack the mindset for change, leading to failure.
Large, complex ICT projects are more likely to fail than succeed. Find and summarise a resource that describes ONE example of a large ICT project that failed and explain the impacts of the failure.
The article describes an ambitious ICT project by the UK National Health Services (NHS), an ambitious project that would have been the largest civilian health care computer system, and its collapse as well as its financial impact, so far standing at £ 10 billion, and likely to rise; the project was abandoned. It demonstrates that even a developed nation with better decision making can always get it wrong with large scale ICT projects; it was also chosen for its impact at £ 10 billion and counting. The abandoned NHS computer system has so far cost taxpayers £ 10 billion, and costs will rise because even regional IT systems to replace it are poorly managed with their own set of contractual wrangles. Launched in 2002, the project was beset by changing specifications, supplier disputes, and technical challenges resulting in the project becoming over budget and years behind schedule. Ultimately, ministers decided to dismantle it in 2011. the Department of Health failed to meet her contractual obligations, weakening any fresh negotiations on the contract. It clearly shows why large scale ICT projects fail; failure to honor contracts, too wide a scope, poor management, and constant changes in specifications, as well as poor implementation methodology.
References
- Barnatt, C., 2017. FROM BITS TO QUBITS. ExplainingComputers.com: Quantum Computing. Available at: https://www.explainingcomputers.com/quantum.html [Accessed May 24, 2017].
- Koerner, B.I., 2016. Inside the Cyberattack That Shocked the US Government. Wired. Available at: https://www.wired.com/2016/10/inside-cyberattack-shocked-us-government/ [Accessed May 24, 2017].
- Mendelson, E., 2016. VMware Fusion (for Mac). PCMAG. Available at: https://www.pcmag.com/review/345023/vmware-fusion-8-for-mac [Accessed May 24, 2017].
- Mui, C., 2016. How Kodak Failed. Forbes. Available at: https://www.forbes.com/sites/chunkamui/2012/01/18/how-kodak-failed/#1b80f41b6f27 [Accessed May 24, 2017].
- Noyes, K. & Schmitz, D., 2012. 10 reasons to choose Ubuntu 12.10 over Windows 8. PCWorld. Available at: https://www.pcworld.com/article/2013431/10-reasons-to-choose-ubuntu-12-10-over-windows-8.html?page=2 [Accessed May 24, 2017].
- Prabhu, V., 2016. Bank's data center shut down for 10 hours after a LOUD sound. TechWorm. Available at: https://www.techworm.net/2016/09/banks-data-center-shut-10-hours-loud-sound.html [Accessed May 24, 2017].
- Riley, M. et al., 2014. Target Missed Warnings in Epic Hack of Credit Card Data. Bloomberg.com. Available at: https://www.bloomberg.com/news/articles/2014-03-13/target-missed-warnings-in-epic-hack-of-credit-card-data [Accessed May 24, 2017].
- Schultz., E.J., 2016. How 'Crash the Super Bowl' Changed Advertising. Ad Age. Available at: https://adage.com/article/special-report-super-bowl/crash-super-bowl-changed-advertising/301966/ [Accessed May 24, 2017].
- Syal, R., 2013. Abandoned NHS IT system has cost £10bn so far. The Guardian. Available at: https://www.theguardian.com/society/2013/sep/18/nhs-records-system-10bn [Accessed May 24, 2017].
- Thomas, G., 1963. Internet Control Message Protocol (ICMP) Explained. SciFiNow. Available at: https://www.gadgetdaily.xyz/internet-control-message-protocol-icmp-explained/ [Accessed May 24, 2017].
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). 10 Weeks ICT Tasks And Answers. Retrieved from https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/internet-control-message-protocol.html.
"10 Weeks ICT Tasks And Answers." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/internet-control-message-protocol.html.
My Assignment Help (2021) 10 Weeks ICT Tasks And Answers [Online]. Available from: https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/internet-control-message-protocol.html
[Accessed 23 November 2024].
My Assignment Help. '10 Weeks ICT Tasks And Answers' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/internet-control-message-protocol.html> accessed 23 November 2024.
My Assignment Help. 10 Weeks ICT Tasks And Answers [Internet]. My Assignment Help. 2021 [cited 23 November 2024]. Available from: https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/internet-control-message-protocol.html.