Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

There are ten (10) tasks, one for each week:  the tasks are detailed below.  There is a table to complete for each task.  Please fill in the information required.

The text discusses the elements of modern computing architecture however is largely silent on the individuals who played a role in its development.  Find and summarise a resource that describes ONE such individual.  The individual should have had a significant influence on the development of computers and/or components of modern computing architecture.

The text discusses the components and activities of operating systems however is largely silent on the individuals who played a role in their development.  Find and summarise a resource that describes ONE such individual.  The individual should have had a significant influence on the writing or development of operating systems.

The Internet didn’t just appear – it was an evolution from earlier networks. Find and summarise a resource that describes ONE of the networks that led to the development of the modern Internet.  

Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the text.  Find and summarise a resource that describes the features and uses of ONE other L2 protocol that is not discussed in the text (i.e. NOT Ethernet).

The text mentions the role of hackers in attacks on networked infrastructure.  Find and summarise a resource that describes ONE famous or well-known hacker.

Society is increasingly reliant on networks and network technologies but they are evolving at a rapid pace.  Find and summarise a resource that describes ONE example of a future networking technology or trend that will impact society.

The text mentions social business and the impact of the use of social networking platforms.  Find and summarise a resource that describes the history of the development of ONE such social media platform.

With the advent of mass data collection and storage has come data mining. Find and summarise a resource that describes ONE example where data mining has been used successfully by a business.  You should not use any examples covered in the textbook.

One of the greatest success stories in application development in recent times has been the popularity of mobile apps.  Find and summarise a resource that describes the story of ONE successful mobile app developer.

While information systems and technology deliver many benefits to society, they can also result in (sometimes inadvertent) negative effects and outcomes.  Find and summarise a resource that describes ONE example of where the use of an information system or technology has led to negative consequences for humans.

Week 1

There are ten (10) tasks, one for each week:  the tasks are detailed below.  There is a table to complete for each task.  Please fill in the information required.

The text discusses the elements of modern computing architecture however is largely silent on the individuals who played a role in its development.  Find and summarise a resource that describes ONE such individual.  The individual should have had a significant influence on the development of computers and/or components of modern computing architecture.

This article is about the influence and works by the famous mathematician John von Neumann in the field of modern computing architecture. The reason for selecting this resource is that modern computer architecture is not completed without the contribution of John von Neumann. The author says that due to the implementation of the John von Neumann’s concept modern fast computers have been created. He suggested that the modern computers can also have a fixed and simple structure which will be more effective at the same time. This concept is actually based upon the conditional control transfer that sequentially controls the flow of the program. The flow may be interrupted or it may be reinitiated at any point. Neumann proposed a model in which a same memory is utilised in case of making it more effective by utilising the processing unit and to use the data and the instructions any time. This type of computers is well known as the universal tuning machine and that has sequential architecture and is based upon von Neumann architecture. The stored program digital computer is based upon the read and writes digital memory called the RAM and these are actually based upon the Colossus and ENIAC. This architecture is created on the basis of the sequentially programmed switching mechanism and is inserted with patch leads to access information and to transfer the data among various functional units of the computer in controlled manner. The main advantage of making the system in a sequential manner is that the process control is managed in a better way and the best possible outcome of the system can be achieved with faster response. The primary utility of the system is that the applications and the software can be manipulated with better response and more flexibility. From the above discussion it can be concluded that the sequential control of the system leads to the modern generation of computers.

The text discusses the components and activities of operating systems however is largely silent on the individuals who played a role in their development.  Find and summarise a resource that describes ONE such individual.  The individual should have had a significant influence on the writing or development of operating systems.

This article discusses about the role of Dannis Ritchie in the advancement of operating system. This article is chosen as the advancement of the modern operating system and the role of Dannis Ritchie behind the advancement of the UNIX system are discussed in the report in details. The advancement of the c language and its application in designing the advanced level operating system is discussed in this operating system. When he was in Harvard then he first encountered a computer during a lecture on the Univac system. The C programming language is also an important programming and the advancement of the newly developed operating system like UNIX is dependent on this. Dannis then utilised the the c language for the advanced of the UNIX operating system. The UNIX operating system was one of the most successfully implemented operating system. Thus the outline and the architecture of the modern operating system were then developed by him. It was mainly based on the application of the C language. The advancement of such operating system created a new direction in the history of computer science. As it is known that the operating system is also an important feature that can create the best possible operating system and the main advantages of using the c language is that it can make the operating system more efficient and accurate. From the above discussion it can be concluded that the role of the scientist Dannis Ritchie has created an impact in the advancement of the operating system and the operating syste is now being utilised as the UNIX sustem.

Week 2

The Internet didn’t just appear – it was an evolution from earlier networks. Find and summarise a resource that describes ONEof the networks that led to the development of the modern Internet.  

This article deals with the influence of BITNET behind the advancement of the modern internet. This article also deals with history and the features of the BITNET network. This article is chosen as BITNET is one of the primary and important networking systems which are important for the advancement of the modern internet system. BITNET was initiated in the early decade of 80s. It is also one of the leading network systems in the history of the internet. The main advantage of making the system more advanced and also it is more influencing in case of research of the basic understanding of the internet system. The main feature of this BITNET is that it is a store and forward network which is similar to the Usenet and The full form of BITNET is that why called the Because It’s There Net and later it is called the Because Its Time Net. The system was originally based on the IBM’s VNET email system and the Remote Spooling Communications Subsystems. Later the RSCS was emulated on other operating system like DEC VMS and UNIX to extend BITNET. In the advancement of the modern internet system the BITNET created and introduced lots of features and the interfaces which can be implemented and are seen in the modern internet. However by 1996 it is clear that the BITNET s applications are huge in making the modern internet. The number of services provided by the system is also huge and it has actually established the backbone of the TCP/IP protocols with RSCS based applications running above TCP. The main advantage of the BITNET system is that it is a multi disciplinary network system which can be used by several users. From the above discussion it can be concluded that the BITNET network system has provided a lot of features which have influenced the modern networking system.

Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the text.  Find and summarise a resource that describes the features and uses of ONE other L2 protocol that is not discussed in the text (i.e. NOT Ethernet).

This article discusses about the features and history of one of the most common layer 2 protocols that is the Address Resolution Protocol (ARP). This article is chosen as ARP is one of the primary and useful layer 2 protocols which are used in the network system. In this section the history and the features of the layer 2 ARP protocols are discussed. ARP is used to convert the Internet Protocol (IP) address to the corresponding physical network address.  Those IP networks which are used in the Ethernet and also in the Wi-Fi also require the ARP in order to run and function properly. In the context of the history of the ARP system it can be observed that ARP was first developed in the decade of 1980s as a general purpose address translation protocol. ARP is mainly implemented in the ATM, Token Ring and other network which are of physical types. The main advantage of using the ARP system is that it can manage the connections irrespective of a particular physical device connected to each one. ARP operates in the layer 2 in the OSI model. The IP to MAC address mapping are derived from an ARP cache maintained on every device. In case any IP address is not appeared in the device cache then the ARP system is used to send a broadcast message on the local subnet. The host replies with the corresponding ARP request in order to reply the broadcast message. Based on ARP the inverse ARP and the reverse ARP Are also developed as an important internet protocol which are used in order to do the opposite function of the ARP. The gratuitous ARP is used the performance of the ARP protocol in the network devices. From the above discussion it can be concluded that ARP is an important and primary internet protocol of layer 2.

Week 3

The text mentions the role of hackers in attacks on networked infrastructure.  Find and summarise a resource that describes ONE famous or well-known hacker.

This article discusses about one of the most famous hackers in the world and in that case Kevin Mitnick is the first name come to our mind. This article mainly put emphasis on the characteristics of a hacker who can hack the network system and the security system easily and swiftly and also tells about the personal life of Kevin Mitnick who is one of the most famous hackers in his time. . This article is chosen as these deals with the hackers’ characteristics and their way of doing the work. Kevin Mitnick is one of the most famous American hacker who has also worked as a security consultant. In nineties he was chosen as the world’s most wanted hacker. He was also a renounced author and mostly wrote on several books. When Kevin was of 13 year age then he bypassed the punch card system which was used in the Los Angeles bus system. The first attempt of him to get the unauthorised access to- a network was in the year of 1976 at the age of only 16. He also used to intercept and steal the password and also changed the network system of a computing system. He used several cloned cell phones for hiding the location of the him in several network and computing system. For his unauthorised and illegal work Keven was arrested on February 15, 1995. He had several allegations like keeping more than 100 cloned cellular phones and the also he was charged for the wire fraud case. After January 21, 2000 he was free and after 2003 he was forbidden for using any communication technology. From the above discussion it can be concluded that Kevin was one of the biggest hackers and was also punished for his hacking of the several network systems.

Society is increasingly reliant on networks and network technologies but they are evolving at a rapid pace.  Find and summarise a resource that describes ONE example of a future networking technology or trend that will impact society.

This article discusses about the quantum computing phenomenon and the implementation of the quantum technology to the future of the networking system. This article is chosen as the future of the networking system is dependent upon the quantum technology and the main there are many advantages of using the quantum technology in making the new system of networks. The main advantage of using the quantum network is that the security is increased to a greater amount and the main Advantage of making the system more secure is that it can be used with much more reliability. The main concept of the quantum computing lies on the concept of qubits. Qubits are kind of quanta which can be explained as a digital equivalent of one and zero. The quantum physical effect is used as the method to detect the eavesdropping. The advantage of making the system more advanced in terms of making the system well synchronised with the quantum technology is that the sensitivity of cer6tain network devices are increased to a greater amount. It also helps to create the distributed data system which can be used to make the numerical quantum computation possible in order to bring much faster response in the networking system. It can also create a revolution in the communication system by introducing the teleportation method. The amount of errors can be manipulated easily as the quantum data is fragile and the quantum functions are probabilistic in the approach. There are also many advantages of using the quantum networking as there is a new market which can be created on the basis of a faster and more secure network. From the above discussion it can be concluded that the quantum technology can be successfully implemented in the field of future network system and there are many bright scope of using this technology.    

Week 4

The text mentions social business and the impact of the use of social networking platforms.  Find and summarise a resource that describes the history of the development of ONE such social media platform.

In this article the history of the biggest social networking platform of this era is discussed and naturally Facebook is the biggest name that comes in the top of the list of the social networking sites in the world. This article is chosen as Facebook is a renounced website as a social media and it has a huge impact on the human being. Mark Zuckerberg is the owner of the Facebook and he initiated this social networking website from a dormitory ob the Harvard university. There is an interesting story behind the expansion of the Facebook from its 2004 state to the state of now. It is one of the fastest growing websites in terms of having the number of the members. It is also one of the most popular websites in the history of internet. Mark first created a social networking platform by using the Harvard official website and created the Facemash later this website became The Facebook and finally it was named as Facebook. The Facemash was used as the platform for the students of the Harvard university in which they could rate one another picture based on how attractive their pictures are. In the modern outline of the Facebook there are lots of features including sharing pictures, videos, posts or texts. People can like, comment and even express their expressions in this social networking site. People can also chat and share their location. Many famous people and celebrities are also using Facebook. Zuckerberg refused to sell his company to Google and the other giants in the initial stage of the company and he also refused to post any advertisements in the main page of the website. These steps taken by him lead to a greater platform. It is concluded that Facebook is one of the biggest social networking site and it has a huge impact on the future generation.

With the advent of mass data collection and storage has come data mining. Find and summarise a resource that describes ONE example where data mining has been used successfully by a business.  You should not use any examples covered in the textbook.                                                                                                                  

This article discusses about the role of data mining in the field of the retailing business and there are many advantages of using the data mining process in the retailing sector. This article is chosen for discussion as the retailing sector is one of the most suitable examples of businesses where the data mining can be implemented successfully. Data mining is a method based on the information technology by which the processor can find out a particular type or style of useful data from a large amount of data or database. The main advantage of using the data mining is that the choices of the customers can be predicted in a large extent by implementing this technique. Data mining can also be implemented for understanding of the requirements of the customers previously from the records of their previous transactions and list of the objects they bought. It is also used to understand the customer’s behaviour, shopping pattern and trends and the ways of improving the customer service by analysing customer satisfaction and their feedback. The information extracted from the data mining technique can be implemented in fin ding interesting information about the increase of revenue, cuts costs or both. It is also important to bring an evolution in the production of the company so that it can cope up with the new requirements of the customers. The best implementation of data mining is in the CR as CRM deals with the Customer Relationship Management. It is used to improve customer loyalty, gaining customer insight, retaining customers and also in implementing customer focused strategies.  From the above discussion it can be concluded that the data mining technique is vastly used in overcoming the major issues in the retailing industry and those are the Employee turnover, auditing, economic challenges and to evolve with new technologies.

Week 5

One of the greatest success stories in application development in recent times has been the popularity of mobile apps.  Find and summarise a resource that describes the story of ONE successful mobile app developer.

In this article the story behind a successful application developer is discussed. This article mainly discusses about the famous young application developer Robert Nay who developed the most famous free app on iTunes. This article is chosen due to the implication of a young person who has shown excellent ability and talent in the field of application developing. The young developer created the famous app bubble ball which was selected as one of the most famous free applications in the iTunes store and this application was invented by him at the age of 14 only. The interesting is that the young boy invented this application at the age when other kids are normally busy with their school education. This Bubble ball game was so famous due to the simple but attractive nature of this application. There was a series of puzzles where players have to guide a ball through courses which they can manipulate. This app was downloaded more than a million times in the very first two weeks. It is seen that in recent apps can be made by any people having even no idea about the advanced programming language. The most important thing that should be present in a programmer is that the person should have immense creative thinking and the design of the application should be in such a way so that the customers are easily attracted to it. The developer should have idea and knowledge about the present market needs and the choices of the customers. Robert Nay being an young person invented such popular application and it also provides the concept of new thinking which can motivate people in application developing. From this above discussion it can be concluded that the field of creating new applications and to develop is increasing day by day and creativity and knowledge both are required for app developing.

While information systems and technology deliver many benefits to society, they can also result in (sometimes inadvertent) negative effects and outcomes.  Find and summarise a resource that describes ONE example of where the use of an information system or technology has led to negative consequences for humans.

In this article the negative consequences of the data warehousing techniques are discussed. This article is chosen as data warehousing is considered as one of the most important information system which is implemented in several information technology system and businesses. Data warehousing is a system which is based on a technique called data mining. Data mining is used in order to find out a particular type of useful data from a huge amount of data. In practical cases it is seen that there are several disadvantages and negative consequences of using the data warehousing. In this article several data warehousing techniques are discussed from the aspect of the negative consequences of this system. Data warehousing is a technique which is used for the extraction of useful information from the different types of information collected from the several departments that can be implemented for the betterment of the service to customers and to increase the productivity of the organisation. The bad consequence of the data warehousing system is that the risk regarding the extra amount of work can be increased. As the data warehousing system is related to the collection of the data from different customers and in this case sometimes it is seen that the organisation database can have same types of content and thus the data can be copied. It also affects the cost benefit ratio of the company which is also a bad consequence of the company. The data ownership concern is considered another aspect of the consequences of the data warehousing method and thus it can damage the data security of the organisation. Data warehouse can also decrease the data flexibility. From the above discussion it can be concluded that data warehousing has lots of bad consequences which should be overcome for better service.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2021). Tasks For Modern Computing Architecture Course Include Essay. (60 Characters). Retrieved from https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/negative-consequences-of-data-warehousing.html.

"Tasks For Modern Computing Architecture Course Include Essay. (60 Characters)." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/negative-consequences-of-data-warehousing.html.

My Assignment Help (2021) Tasks For Modern Computing Architecture Course Include Essay. (60 Characters) [Online]. Available from: https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/negative-consequences-of-data-warehousing.html
[Accessed 27 July 2024].

My Assignment Help. 'Tasks For Modern Computing Architecture Course Include Essay. (60 Characters)' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/negative-consequences-of-data-warehousing.html> accessed 27 July 2024.

My Assignment Help. Tasks For Modern Computing Architecture Course Include Essay. (60 Characters) [Internet]. My Assignment Help. 2021 [cited 27 July 2024]. Available from: https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/negative-consequences-of-data-warehousing.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close