SlideShare a Scribd company logo
HIT164 COMPUTING FUNDAMENTALS
Assignment 1: Research Essay
Due Date: Week 7, Friday 11: 59 pm
Length: 1500 words maximum (not including references)
Value: 20% of the total marks for the unit
TASKS
1. Research a few issues in use of IT in a discipline of current
relevance. You may choose issues from any of the disciplines
given in the following pages or a discipline of your choice.
2. Prepare an essay about your topic with no more than 1500
words (excluding reference list).
3. Your topic of choice must be posted to the Discussion Board
titled “Post your essay topic here” by Week 3, Friday 5pm,
4. Note that if you have not posted a topic by this time, you may
be assigned a topic by your lecturer.
REQUIREMENTS
· The assignment should be word-processed.
· It should include a reference list.
· Use Harvard referencing style.
· Do not include sources in the reference list that are not cited
in the document.
· You need to use a minimum of 10 sources and there needs to
be at least 3 diff erent types (i.e., websites, book, journal article,
etc.).
HIT164 Computing Fundamentals
TOPICS (CHOOSE ONE)
Option 1: Social Media
GeoCities is a web hosting service which employs the
concept/metaphors of “cities” and “neighbourhood” in real-
world. For example, computer-related sites are placed in
“SiliconValley” and entertainment sites in “Hollywood”.
GeoCities was the third-most visited website at its peak when it
was acquired by Yahoo! in 1999.
10 years later as social media had taken over and become
mainstream on the Internet, GeoCities was shutdown and
deleted. However, the Internet Archive team made a backup of
the site just before it was shut down to preserve the eff ort put in
by around 35 million people since it started. The resulting
650GB archive was published online as a remembrance of the
glorious days of GeoCities.
Will current social media (i.e., Facebook) eventually face the
same fate? Justify your arguments with robust supporting
evidence.
Option 2: Li-Fi
Wi-Fi is a popular networking technology that allows electronic
devices to connect to the Internet wirelessly using radio
frequency. It can be commonly seen from mobile devices to
government facility. However in recent years, researchers have
found a way to utilise visible light from light-emitting diodes
(LEDs) to transmit data: such technology is called Li-Fi (light
fidelity).
Even though Li-Fi is still at its infancy, many universities and
researchers are actively studying to reach its potential.
Compare Wi-Fi and Li-Fi critically and discuss the advantages
and disadvantages of Li-Fi.
Option 3: Wearable Technology
Google Glass is one of the first and most talked about
augmented reality wearable computers in 2013. Its usage varies
from personal entertainment to surgical practise. Similar to
other emerging technologies, Google Glass has also received
quite a few negative critical receptions, such as privacy
concern.
Critically discuss the pros and cons of ubiquitous wearable
computing like Google Glass. Note how you would use a
ubiquitous device like Google Glass.
Option 4: Science & Technology
Children with Asperger’s syndrome (or high functioning autism)
often exhibit excellent language, memory and technical skills.
However, their lack of good social skills and understanding of
social interaction often hinder their ability to function in
elementary and middle school settings. Research regarding the
use of technology to help children with Asperger’s syndrome or
autism have just started to emerge as technology is maturing at
a rapid pace.
Research what technology options are available to aid children
with Asperger’s syndrome or autism? Support your discussion
with robust supporting evidence.
Option 5: Internet Privacy
We share information on the Internet everyday, through social
media, blog posts, or even apps on your phone. Technology has
become so ubiquitous today that we are not as concern about
privacy as we used to be. A recent attack on Snapchat revealed
almost all (approx. 4.6 millions) usernames and phone numbers
on the Internet for anyone to download. However, the majority
of Snapchat users were not worried about how such information
could be used.
Popular companies such as Apple, Microsoft, Google,
Target (United States) and Sony have been hacked at least once
in the past decade. In the most extreme case hackers obtained
and sold users’ credit card details. This proves that nothing is
safe on the Internet. Who can we trust our information with and
how much information can we share?
Critically discuss the assertion.
Option 6: Artificial Intelligence
The movie “Her” demonstrated the possibility of a complex
Artificial Intelligence (A.I.) interface with human emotion. In
the not too distant future our computer systems will be able to
display all the characteristics of intelligence we recognise in
humans.
Identify existing technologies that can be used to construct
“Samantha” and critically discuss if the benefits of such
computer intelligence would outweigh the disadvantages.
Option 7: Privilege Escalation
Mobile operating systems nowadays are mostly locked-down
platforms with digital rights management (DRM) where users
cannot directly interact with the file system and the device’s
functionalities are provided by the manufacturer in a sand-
boxed environment.
Privilege escalation, or more commonly known as jailbreaking,
is the act of removing limitations imposed by the manufacturer,
thus enabling the device to gain access to resources that are
normally protected from an application or user.
Critically discuss why an operating system should and
should not be locked-down in the above context, considering the
legal context.
Option 8: Big Data
Dr. Eric Horvitz, a computer scientist and co-director of
Microsoft Research, who worked with a large urban hospital in
Washington was able to use a concentration of anonymous
Internet searches in the neighbourhoods in close proximity of
the hospital to calculate the probabilities of cardio cases which
showed up soon after.
Through the use of Internet searches, Twitter feeds, or in
general “Internet as a sensor”, Dr. Horvitz was also able to
identify previously unpublished side eff ect of medicines and
track the onset of postpartum depression among new mothers.
Through the use of online information, can we better understand
our behaviours, or more importantly overcome various
challenges in health and diagnosis?
This is one implementation of the principles of Big Data.
Research how principles of Big Data are currently appl ied in
one of the following fields:
· Medicine
· Education
· Astronomy
GETTING HELP
1. Doing Your Assignment
You may find the following link useful in preparing for your
assignment. See “Doing the Assignments” at
http://learnline.cdu.edu.au/units/itonline/assignments.html.
2. About Essay Writing
CDU Study Guide (http://learnline.cdu.edu.au/studyskills/) has
a comprehensive range of study skills information.
You may find the following resources useful in writing
academic assignments:
· Introduction to Academic Assignments
http://learnline.cdu.edu.au/studyskills/studyskills/introacademic
assignments.html
· Introduction to Academic Writing
http://learnline.cdu.edu.au/studyskills/studyskills/introacademic
writing.html
· What to Avoid in Formal Writing
http://learnline.cdu.edu.au/studyskills/studyskills/aswhattoavoid
.html
· Strunk’s “The Elements of Style” is an old book (1918), but a
good one, to check for suggestions and conventions on writing
style. Some things have changed since 1918, but many of his
suggestions are largely intact today.
· You can find the book at
http://www.crockford.com/wrrrld/style.html. Thanks to Douglas
Crockford for making this available.
3. Researching
The CDU Library’s Summon search
(http://www.cdu.edu.au/library/) is a good way to start
gathering research about your chosen topic. If you have not
used Summon before please watch the video on the Summon
Guide webpage (http://libguides.cdu.edu.au/summon).
Alternatively, visit the CDU Library’s help on Summon:
· Referencing 101 (http://libguides.cdu.edu.au/cdureferencing)
· Referencing Style Guide
(http://libguides.cdu.edu.au/content.php?pid=100403&sid=7537
58). We use CDU Harvard style for HIT164.
· iResearch
(http://www.library.usyd.edu.au/elearning/learn/referencing/acti
vities/index.php). This is an interactive learning tool, courtesy
of University of Sydney.
· CDU’s Information Technology Guide
(http://libguides.cdu.edu.au/IT) is very useful for finding
academic quality sources via the Library.
4. Plagiarism - you will be penalised if you plagiarise your
work
If you have any doubt about what constitutes plagiarism, then
please talk to your lecturer.
You can also find more information about plagiarism at CDU
Library Service
(http://libguides.cdu.edu.au/content.php?pid=100403&sid=2587
885).
PRESENTATION
Essay should be word processed and include page numbers and
student name and number in the footer. It is recommended that
you check for plagiarism in your work before you submit.
SUBMISSION GUIDELINES
All students should submit via Learnline:
· Word processed document only, PDF files are not accepted.
· Include an assignment cover sheet with the plagiarism section
signed.
· Ensure that your file is labelled in the format of
firstnameLastnameAssign1.doc (e.g.,
johnAppleseedAssign1.doc).
- Note that there are no spaces or symbols in the file name.
HIT164 COMPUTING FUNDAMENTALS
Assignment 1: Research Essay
Due Date: Week 7, Friday 11: 59 pm
Length: 1500 words maximum (not including references)
Value: 20% of the total marks for the unit
TASKS
1. Research a few issues in use of IT in a discipline of current
relevance. You may choose issues from any of the disciplines
given in the following pages or a discipline of your choice.
2. Prepare an essay about your topic with no more than 1500
words (excluding reference list).
3. Your topic of choice must be posted to the Discussion Board
titled “Post your essay topic here” by Week 3, Friday 5pm,
4. Note that if you have not posted a topic by this time, you may
be assigned a topic by your lecturer.
REQUIREMENTS
· The assignment should be word-processed.
· It should include a reference list.
· Use Harvard referencing style.
· Do not include sources in the reference list that are not cited
in the document.
· You need to use a minimum of 10 sources and there needs to
be at least 3 diff erent types (i.e., websites, book, journal article,
etc.).
HIT164 Computing Fundamentals
TOPICS (CHOOSE ONE)
Option 1: Social Media
GeoCities is a web hosting service which employs the
concept/metaphors of “cities” and “neighbourhood” in real -
world. For example, computer-related sites are placed in
“SiliconValley” and entertainment sites in “Hollywood”.
GeoCities was the third-most visited website at its peak when it
was acquired by Yahoo! in 1999.
10 years later as social media had taken over and become
mainstream on the Internet, GeoCities was shutdown and
deleted. However, the Internet Archive team made a backup of
the site just before it was shut down to preserve the eff ort put in
by around 35 million people since it started. The resulting
650GB archive was published online as a remembrance of the
glorious days of GeoCities.
Will current social media (i.e., Facebook) eventually face the
same fate? Justify your arguments with robust supporting
evidence.
Option 2: Li-Fi
Wi-Fi is a popular networking technology that allows electronic
devices to connect to the Internet wirelessly using radio
frequency. It can be commonly seen from mobile devices to
government facility. However in recent years, researchers have
found a way to utilise visible light from light-emitting diodes
(LEDs) to transmit data: such technology is called Li-Fi (light
fidelity).
Even though Li-Fi is still at its infancy, many universities and
researchers are actively studying to reach its potential.
Compare Wi-Fi and Li-Fi critically and discuss the advantages
and disadvantages of Li-Fi.
Option 3: Wearable Technology
Google Glass is one of the first and most talked about
augmented reality wearable computers in 2013. Its usage varies
from personal entertainment to surgical practise. Similar to
other emerging technologies, Google Glass has also received
quite a few negative critical receptions, such as privacy
concern.
Critically discuss the pros and cons of ubiquitous wearable
computing like Google Glass. Note how you would use a
ubiquitous device like Google Glass.
Option 4: Science & Technology
Children with Asperger’s syndrome (or high functioning autism)
often exhibit excellent language, memory and technical skills.
However, their lack of good social skills and understanding of
social interaction often hinder their ability to function in
elementary and middle school settings. Research regarding the
use of technology to help children with Asperger’s syndrome or
autism have just started to emerge as technology is maturing at
a rapid pace.
Research what technology options are available to aid children
with Asperger’s syndrome or autism? Support your discussion
with robust supporting evidence.
Option 5: Internet Privacy
We share information on the Internet everyday, through social
media, blog posts, or even apps on your phone. Technology has
become so ubiquitous today that we are not as concern about
privacy as we used to be. A recent attack on Snapchat revealed
almost all (approx. 4.6 millions) usernames and phone numbers
on the Internet for anyone to download. However, the majority
of Snapchat users were not worried about how such information
could be used.
Popular companies such as Apple, Microsoft, Google,
Target (United States) and Sony have been hacked at least once
in the past decade. In the most extreme case hackers obtained
and sold users’ credit card details. This proves that nothing is
safe on the Internet. Who can we trust our information with and
how much information can we share?
Critically discuss the assertion.
Option 6: Artificial Intelligence
The movie “Her” demonstrated the possibility of a complex
Artificial Intelligence (A.I.) interface with human emotion. In
the not too distant future our computer systems will be able to
display all the characteristics of intelligence we recognise in
humans.
Identify existing technologies that can be used to construct
“Samantha” and critically discuss if the benefits of such
computer intelligence would outweigh the disadvantages.
Option 7: Privilege Escalation
Mobile operating systems nowadays are mostly locked-down
platforms with digital rights management (DRM) where users
cannot directly interact with the file system and the device’s
functionalities are provided by the manufacturer in a sand-
boxed environment.
Privilege escalation, or more commonly known as jailbreaking,
is the act of removing limitations imposed by the manufacturer,
thus enabling the device to gain access to resources that are
normally protected from an application or user.
Critically discuss why an operating system should and
should not be locked-down in the above context, considering the
legal context.
Option 8: Big Data
Dr. Eric Horvitz, a computer scientist and co-director of
Microsoft Research, who worked with a large urban hospital in
Washington was able to use a concentration of anonymous
Internet searches in the neighbourhoods in close proximity of
the hospital to calculate the probabilities of cardio cases which
showed up soon after.
Through the use of Internet searches, Twitter feeds, or in
general “Internet as a sensor”, Dr. Horvitz was also able to
identify previously unpublished side eff ect of medicines and
track the onset of postpartum depression among new mothers.
Through the use of online information, can we better understand
our behaviours, or more importantly overcome various
challenges in health and diagnosis?
This is one implementation of the principles of Big Data.
Research how principles of Big Data are currently applied in
one of the following fields:
· Medicine
· Education
· Astronomy
GETTING HELP
1. Doing Your Assignment
You may find the following link useful in preparing for your
assignment. See “Doing the Assignments” at
http://learnline.cdu.edu.au/units/itonline/assignments.html.
2. About Essay Writing
CDU Study Guide (http://learnline.cdu.edu.au/studyskills/) has
a comprehensive range of study skills information.
You may find the following resources useful in writing
academic assignments:
· Introduction to Academic Assignments
http://learnline.cdu.edu.au/studyskills/studyskills/introacademic
assignments.html
· Introduction to Academic Writing
http://learnline.cdu.edu.au/studyskills/studyskills/introacademic
writing.html
· What to Avoid in Formal Writing
http://learnline.cdu.edu.au/studyskills/studyskills/aswhattoavoid
.html
· Strunk’s “The Elements of Style” is an old book (1918), but a
good one, to check for suggestions and conventions on writing
style. Some things have changed since 1918, but many of his
suggestions are largely intact today.
· You can find the book at
http://www.crockford.com/wrrrld/style.html. Thanks to Douglas
Crockford for making this available.
3. Researching
The CDU Library’s Summon search
(http://www.cdu.edu.au/library/) is a good way to start
gathering research about your chosen topic. If you have not
used Summon before please watch the video on the Summon
Guide webpage (http://libguides.cdu.edu.au/summon).
Alternatively, visit the CDU Library’s help on Summon:
· Referencing 101 (http://libguides.cdu.edu.au/cdureferencing)
· Referencing Style Guide
(http://libguides.cdu.edu.au/content.php?pid=100403&sid=7537
58). We use CDU Harvard style for HIT164.
· iResearch
(http://www.library.usyd.edu.au/elearning/learn/referencing/acti
vities/index.php). This is an interactive learning tool, courtesy
of University of Sydney.
· CDU’s Information Technology Guide
(http://libguides.cdu.edu.au/IT) is very useful for finding
academic quality sources via the Library.
4. Plagiarism - you will be penalised if you plagiarise your
work
If you have any doubt about what constitutes plagiarism, then
please talk to your lecturer.
You can also find more information about plagiarism at CDU
Library Service
(http://libguides.cdu.edu.au/content.php?pid=100403&sid=2587
885).
PRESENTATION
Essay should be word processed and include page numbers and
student name and number in the footer. It is recommended that
you check for plagiarism in your work before you submit.
SUBMISSION GUIDELINES
All students should submit via Learnline:
· Word processed document only, PDF files are not accepted.
· Include an assignment cover sheet with the plagiarism section
signed.
· Ensure that your file is labelled in the format of
firstnameLastnameAssign1.doc (e.g.,
johnAppleseedAssign1.doc).
- Note that there are no spaces or symbols in the file name.
HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essay

More Related Content

Similar to HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essay

HKU Data Curation MLIM7350 Class 10
HKU Data Curation MLIM7350 Class 10HKU Data Curation MLIM7350 Class 10
HKU Data Curation MLIM7350 Class 10
Scott Edmunds
 
· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx
alinainglis
 
Uhmlg2011
Uhmlg2011Uhmlg2011
Uhmlg2011
SuzanneHardy
 
Uses of the internet in teachin’ &
Uses of the internet in teachin’ &Uses of the internet in teachin’ &
Uses of the internet in teachin’ &
affuman
 
Information Architecture For Educators
Information Architecture For EducatorsInformation Architecture For Educators
Information Architecture For Educators
Michael Zarro, Ph.D.
 
The OpenCon Intro to Open Data
The OpenCon Intro to Open DataThe OpenCon Intro to Open Data
The OpenCon Intro to Open Data
Ross Mounce
 
Learning through the net.pptx (Group7)
Learning through the net.pptx   (Group7)Learning through the net.pptx   (Group7)
Learning through the net.pptx (Group7)
melendezbelle19
 
SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptx
HanelynDZAmudio
 
Why not use ict in sudan
Why not use ict in sudanWhy not use ict in sudan
Why not use ict in sudan
Hala Nur
 
This assignment has two goals  1) have students increase their unde.docx
This assignment has two goals  1) have students increase their unde.docxThis assignment has two goals  1) have students increase their unde.docx
This assignment has two goals  1) have students increase their unde.docx
dunningblair
 
Conole Prie Workshop
Conole Prie WorkshopConole Prie Workshop
Conole Prie Workshopgrainne
 
one of the best reasons of studying Computer Science updated 2023 DOC 14.docx
one of the best reasons of studying Computer Science updated 2023 DOC 14.docxone of the best reasons of studying Computer Science updated 2023 DOC 14.docx
one of the best reasons of studying Computer Science updated 2023 DOC 14.docx
intel-writers.com
 
Critical thinking in english. how to evaluate webpages
Critical thinking in english. how to evaluate webpagesCritical thinking in english. how to evaluate webpages
Critical thinking in english. how to evaluate webpages
Mariangel Carreño
 
NIU Trends In Educational Technology 2008
NIU Trends In Educational Technology 2008NIU Trends In Educational Technology 2008
NIU Trends In Educational Technology 2008
jsotir
 
EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Research
eckchela
 
Week 2 computers, web and the internet
Week 2 computers, web and the internetWeek 2 computers, web and the internet
Week 2 computers, web and the internet
carolyn oldham
 
Whitaker\'s Multi-Media Presentation
Whitaker\'s Multi-Media PresentationWhitaker\'s Multi-Media Presentation
Whitaker\'s Multi-Media Presentation
gina.whitaker
 
6p model of research
6p model of research6p model of research
6p model of research
bharati vidhyapeeth uni.-pune
 
Empowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdfEmpowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdf
Michael Montarde
 

Similar to HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essay (20)

HKU Data Curation MLIM7350 Class 10
HKU Data Curation MLIM7350 Class 10HKU Data Curation MLIM7350 Class 10
HKU Data Curation MLIM7350 Class 10
 
· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx
 
Uhmlg2011
Uhmlg2011Uhmlg2011
Uhmlg2011
 
Uses of the internet in teachin’ &
Uses of the internet in teachin’ &Uses of the internet in teachin’ &
Uses of the internet in teachin’ &
 
Information Architecture For Educators
Information Architecture For EducatorsInformation Architecture For Educators
Information Architecture For Educators
 
Mississippi State University Adams
Mississippi State University AdamsMississippi State University Adams
Mississippi State University Adams
 
The OpenCon Intro to Open Data
The OpenCon Intro to Open DataThe OpenCon Intro to Open Data
The OpenCon Intro to Open Data
 
Learning through the net.pptx (Group7)
Learning through the net.pptx   (Group7)Learning through the net.pptx   (Group7)
Learning through the net.pptx (Group7)
 
SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptx
 
Why not use ict in sudan
Why not use ict in sudanWhy not use ict in sudan
Why not use ict in sudan
 
This assignment has two goals  1) have students increase their unde.docx
This assignment has two goals  1) have students increase their unde.docxThis assignment has two goals  1) have students increase their unde.docx
This assignment has two goals  1) have students increase their unde.docx
 
Conole Prie Workshop
Conole Prie WorkshopConole Prie Workshop
Conole Prie Workshop
 
one of the best reasons of studying Computer Science updated 2023 DOC 14.docx
one of the best reasons of studying Computer Science updated 2023 DOC 14.docxone of the best reasons of studying Computer Science updated 2023 DOC 14.docx
one of the best reasons of studying Computer Science updated 2023 DOC 14.docx
 
Critical thinking in english. how to evaluate webpages
Critical thinking in english. how to evaluate webpagesCritical thinking in english. how to evaluate webpages
Critical thinking in english. how to evaluate webpages
 
NIU Trends In Educational Technology 2008
NIU Trends In Educational Technology 2008NIU Trends In Educational Technology 2008
NIU Trends In Educational Technology 2008
 
EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Research
 
Week 2 computers, web and the internet
Week 2 computers, web and the internetWeek 2 computers, web and the internet
Week 2 computers, web and the internet
 
Whitaker\'s Multi-Media Presentation
Whitaker\'s Multi-Media PresentationWhitaker\'s Multi-Media Presentation
Whitaker\'s Multi-Media Presentation
 
6p model of research
6p model of research6p model of research
6p model of research
 
Empowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdfEmpowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdf
 

More from sorayan5ywschuit

What the mass media offers is not popular art, but entertainment wh.docx
What the mass media offers is not popular art, but entertainment wh.docxWhat the mass media offers is not popular art, but entertainment wh.docx
What the mass media offers is not popular art, but entertainment wh.docx
sorayan5ywschuit
 
What role does discrimination play in perpetuating the assessment of.docx
What role does discrimination play in perpetuating the assessment of.docxWhat role does discrimination play in perpetuating the assessment of.docx
What role does discrimination play in perpetuating the assessment of.docx
sorayan5ywschuit
 
What sorts of external trends should iRobot pay attention to  Why .docx
What sorts of external trends should iRobot pay attention to  Why .docxWhat sorts of external trends should iRobot pay attention to  Why .docx
What sorts of external trends should iRobot pay attention to  Why .docx
sorayan5ywschuit
 
What makes us unique as a speciesWhat hominid characteristic(s) a.docx
What makes us unique as a speciesWhat hominid characteristic(s) a.docxWhat makes us unique as a speciesWhat hominid characteristic(s) a.docx
What makes us unique as a speciesWhat hominid characteristic(s) a.docx
sorayan5ywschuit
 
What role, if any, do you think juveniles play in the current negati.docx
What role, if any, do you think juveniles play in the current negati.docxWhat role, if any, do you think juveniles play in the current negati.docx
What role, if any, do you think juveniles play in the current negati.docx
sorayan5ywschuit
 
What led to the creation of the Sarbanes-Oxley Act and when was it.docx
What led to the creation of the Sarbanes-Oxley Act and when was it.docxWhat led to the creation of the Sarbanes-Oxley Act and when was it.docx
What led to the creation of the Sarbanes-Oxley Act and when was it.docx
sorayan5ywschuit
 
What role do audiences play in creating popular culture Explain how.docx
What role do audiences play in creating popular culture Explain how.docxWhat role do audiences play in creating popular culture Explain how.docx
What role do audiences play in creating popular culture Explain how.docx
sorayan5ywschuit
 
What role do the gods play in the Illiad First, use passages from t.docx
What role do the gods play in the Illiad First, use passages from t.docxWhat role do the gods play in the Illiad First, use passages from t.docx
What role do the gods play in the Illiad First, use passages from t.docx
sorayan5ywschuit
 
What is your relationship to writing Discuss something about writin.docx
What is your relationship to writing Discuss something about writin.docxWhat is your relationship to writing Discuss something about writin.docx
What is your relationship to writing Discuss something about writin.docx
sorayan5ywschuit
 
What reasons are given for the enduring popularity of Edward Hopper.docx
What reasons are given for the enduring popularity of Edward Hopper.docxWhat reasons are given for the enduring popularity of Edward Hopper.docx
What reasons are given for the enduring popularity of Edward Hopper.docx
sorayan5ywschuit
 
What methods, specifically, have citizens utilized to influenc.docx
What methods, specifically, have citizens utilized to influenc.docxWhat methods, specifically, have citizens utilized to influenc.docx
What methods, specifically, have citizens utilized to influenc.docx
sorayan5ywschuit
 
What is your position on the debate about national ID cards Autho.docx
What is your position on the debate about national ID cards Autho.docxWhat is your position on the debate about national ID cards Autho.docx
What is your position on the debate about national ID cards Autho.docx
sorayan5ywschuit
 
What problems arise when a species is introduced from a foreign ecos.docx
What problems arise when a species is introduced from a foreign ecos.docxWhat problems arise when a species is introduced from a foreign ecos.docx
What problems arise when a species is introduced from a foreign ecos.docx
sorayan5ywschuit
 
What is your favorite ad that you have ever seen  Please describe.docx
What is your favorite ad that you have ever seen  Please describe.docxWhat is your favorite ad that you have ever seen  Please describe.docx
What is your favorite ad that you have ever seen  Please describe.docx
sorayan5ywschuit
 
What methodologies have been used for data breachesDifferent type.docx
What methodologies have been used for data breachesDifferent type.docxWhat methodologies have been used for data breachesDifferent type.docx
What methodologies have been used for data breachesDifferent type.docx
sorayan5ywschuit
 
What kinds of cultural changes will hospitals have to make in order .docx
What kinds of cultural changes will hospitals have to make in order .docxWhat kinds of cultural changes will hospitals have to make in order .docx
What kinds of cultural changes will hospitals have to make in order .docx
sorayan5ywschuit
 
What kind of research might have helped MySpace continue to compete .docx
What kind of research might have helped MySpace continue to compete .docxWhat kind of research might have helped MySpace continue to compete .docx
What kind of research might have helped MySpace continue to compete .docx
sorayan5ywschuit
 
What is validating form data and explain the issue with the isset fu.docx
What is validating form data and explain the issue with the isset fu.docxWhat is validating form data and explain the issue with the isset fu.docx
What is validating form data and explain the issue with the isset fu.docx
sorayan5ywschuit
 
What is your definition of Social JusticeAfter reviewing another .docx
What is your definition of Social JusticeAfter reviewing another .docxWhat is your definition of Social JusticeAfter reviewing another .docx
What is your definition of Social JusticeAfter reviewing another .docx
sorayan5ywschuit
 
What is the watering hole techniqueThe term watering hole” refer.docx
What is the watering hole techniqueThe term watering hole” refer.docxWhat is the watering hole techniqueThe term watering hole” refer.docx
What is the watering hole techniqueThe term watering hole” refer.docx
sorayan5ywschuit
 

More from sorayan5ywschuit (20)

What the mass media offers is not popular art, but entertainment wh.docx
What the mass media offers is not popular art, but entertainment wh.docxWhat the mass media offers is not popular art, but entertainment wh.docx
What the mass media offers is not popular art, but entertainment wh.docx
 
What role does discrimination play in perpetuating the assessment of.docx
What role does discrimination play in perpetuating the assessment of.docxWhat role does discrimination play in perpetuating the assessment of.docx
What role does discrimination play in perpetuating the assessment of.docx
 
What sorts of external trends should iRobot pay attention to  Why .docx
What sorts of external trends should iRobot pay attention to  Why .docxWhat sorts of external trends should iRobot pay attention to  Why .docx
What sorts of external trends should iRobot pay attention to  Why .docx
 
What makes us unique as a speciesWhat hominid characteristic(s) a.docx
What makes us unique as a speciesWhat hominid characteristic(s) a.docxWhat makes us unique as a speciesWhat hominid characteristic(s) a.docx
What makes us unique as a speciesWhat hominid characteristic(s) a.docx
 
What role, if any, do you think juveniles play in the current negati.docx
What role, if any, do you think juveniles play in the current negati.docxWhat role, if any, do you think juveniles play in the current negati.docx
What role, if any, do you think juveniles play in the current negati.docx
 
What led to the creation of the Sarbanes-Oxley Act and when was it.docx
What led to the creation of the Sarbanes-Oxley Act and when was it.docxWhat led to the creation of the Sarbanes-Oxley Act and when was it.docx
What led to the creation of the Sarbanes-Oxley Act and when was it.docx
 
What role do audiences play in creating popular culture Explain how.docx
What role do audiences play in creating popular culture Explain how.docxWhat role do audiences play in creating popular culture Explain how.docx
What role do audiences play in creating popular culture Explain how.docx
 
What role do the gods play in the Illiad First, use passages from t.docx
What role do the gods play in the Illiad First, use passages from t.docxWhat role do the gods play in the Illiad First, use passages from t.docx
What role do the gods play in the Illiad First, use passages from t.docx
 
What is your relationship to writing Discuss something about writin.docx
What is your relationship to writing Discuss something about writin.docxWhat is your relationship to writing Discuss something about writin.docx
What is your relationship to writing Discuss something about writin.docx
 
What reasons are given for the enduring popularity of Edward Hopper.docx
What reasons are given for the enduring popularity of Edward Hopper.docxWhat reasons are given for the enduring popularity of Edward Hopper.docx
What reasons are given for the enduring popularity of Edward Hopper.docx
 
What methods, specifically, have citizens utilized to influenc.docx
What methods, specifically, have citizens utilized to influenc.docxWhat methods, specifically, have citizens utilized to influenc.docx
What methods, specifically, have citizens utilized to influenc.docx
 
What is your position on the debate about national ID cards Autho.docx
What is your position on the debate about national ID cards Autho.docxWhat is your position on the debate about national ID cards Autho.docx
What is your position on the debate about national ID cards Autho.docx
 
What problems arise when a species is introduced from a foreign ecos.docx
What problems arise when a species is introduced from a foreign ecos.docxWhat problems arise when a species is introduced from a foreign ecos.docx
What problems arise when a species is introduced from a foreign ecos.docx
 
What is your favorite ad that you have ever seen  Please describe.docx
What is your favorite ad that you have ever seen  Please describe.docxWhat is your favorite ad that you have ever seen  Please describe.docx
What is your favorite ad that you have ever seen  Please describe.docx
 
What methodologies have been used for data breachesDifferent type.docx
What methodologies have been used for data breachesDifferent type.docxWhat methodologies have been used for data breachesDifferent type.docx
What methodologies have been used for data breachesDifferent type.docx
 
What kinds of cultural changes will hospitals have to make in order .docx
What kinds of cultural changes will hospitals have to make in order .docxWhat kinds of cultural changes will hospitals have to make in order .docx
What kinds of cultural changes will hospitals have to make in order .docx
 
What kind of research might have helped MySpace continue to compete .docx
What kind of research might have helped MySpace continue to compete .docxWhat kind of research might have helped MySpace continue to compete .docx
What kind of research might have helped MySpace continue to compete .docx
 
What is validating form data and explain the issue with the isset fu.docx
What is validating form data and explain the issue with the isset fu.docxWhat is validating form data and explain the issue with the isset fu.docx
What is validating form data and explain the issue with the isset fu.docx
 
What is your definition of Social JusticeAfter reviewing another .docx
What is your definition of Social JusticeAfter reviewing another .docxWhat is your definition of Social JusticeAfter reviewing another .docx
What is your definition of Social JusticeAfter reviewing another .docx
 
What is the watering hole techniqueThe term watering hole” refer.docx
What is the watering hole techniqueThe term watering hole” refer.docxWhat is the watering hole techniqueThe term watering hole” refer.docx
What is the watering hole techniqueThe term watering hole” refer.docx
 

Recently uploaded

S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 

Recently uploaded (20)

S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 

HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essay

  • 1. HIT164 COMPUTING FUNDAMENTALS Assignment 1: Research Essay Due Date: Week 7, Friday 11: 59 pm Length: 1500 words maximum (not including references) Value: 20% of the total marks for the unit TASKS 1. Research a few issues in use of IT in a discipline of current relevance. You may choose issues from any of the disciplines given in the following pages or a discipline of your choice. 2. Prepare an essay about your topic with no more than 1500 words (excluding reference list). 3. Your topic of choice must be posted to the Discussion Board titled “Post your essay topic here” by Week 3, Friday 5pm, 4. Note that if you have not posted a topic by this time, you may be assigned a topic by your lecturer. REQUIREMENTS · The assignment should be word-processed.
  • 2. · It should include a reference list. · Use Harvard referencing style. · Do not include sources in the reference list that are not cited in the document. · You need to use a minimum of 10 sources and there needs to be at least 3 diff erent types (i.e., websites, book, journal article, etc.). HIT164 Computing Fundamentals TOPICS (CHOOSE ONE) Option 1: Social Media GeoCities is a web hosting service which employs the concept/metaphors of “cities” and “neighbourhood” in real- world. For example, computer-related sites are placed in “SiliconValley” and entertainment sites in “Hollywood”. GeoCities was the third-most visited website at its peak when it was acquired by Yahoo! in 1999. 10 years later as social media had taken over and become mainstream on the Internet, GeoCities was shutdown and deleted. However, the Internet Archive team made a backup of the site just before it was shut down to preserve the eff ort put in by around 35 million people since it started. The resulting 650GB archive was published online as a remembrance of the glorious days of GeoCities. Will current social media (i.e., Facebook) eventually face the same fate? Justify your arguments with robust supporting
  • 3. evidence. Option 2: Li-Fi Wi-Fi is a popular networking technology that allows electronic devices to connect to the Internet wirelessly using radio frequency. It can be commonly seen from mobile devices to government facility. However in recent years, researchers have found a way to utilise visible light from light-emitting diodes (LEDs) to transmit data: such technology is called Li-Fi (light fidelity). Even though Li-Fi is still at its infancy, many universities and researchers are actively studying to reach its potential. Compare Wi-Fi and Li-Fi critically and discuss the advantages and disadvantages of Li-Fi. Option 3: Wearable Technology Google Glass is one of the first and most talked about augmented reality wearable computers in 2013. Its usage varies from personal entertainment to surgical practise. Similar to other emerging technologies, Google Glass has also received quite a few negative critical receptions, such as privacy concern. Critically discuss the pros and cons of ubiquitous wearable computing like Google Glass. Note how you would use a ubiquitous device like Google Glass.
  • 4. Option 4: Science & Technology Children with Asperger’s syndrome (or high functioning autism) often exhibit excellent language, memory and technical skills. However, their lack of good social skills and understanding of social interaction often hinder their ability to function in elementary and middle school settings. Research regarding the use of technology to help children with Asperger’s syndrome or autism have just started to emerge as technology is maturing at a rapid pace. Research what technology options are available to aid children with Asperger’s syndrome or autism? Support your discussion with robust supporting evidence. Option 5: Internet Privacy We share information on the Internet everyday, through social media, blog posts, or even apps on your phone. Technology has become so ubiquitous today that we are not as concern about privacy as we used to be. A recent attack on Snapchat revealed almost all (approx. 4.6 millions) usernames and phone numbers on the Internet for anyone to download. However, the majority of Snapchat users were not worried about how such information could be used. Popular companies such as Apple, Microsoft, Google, Target (United States) and Sony have been hacked at least once in the past decade. In the most extreme case hackers obtained and sold users’ credit card details. This proves that nothing is safe on the Internet. Who can we trust our information with and
  • 5. how much information can we share? Critically discuss the assertion. Option 6: Artificial Intelligence The movie “Her” demonstrated the possibility of a complex Artificial Intelligence (A.I.) interface with human emotion. In the not too distant future our computer systems will be able to display all the characteristics of intelligence we recognise in humans. Identify existing technologies that can be used to construct “Samantha” and critically discuss if the benefits of such computer intelligence would outweigh the disadvantages. Option 7: Privilege Escalation Mobile operating systems nowadays are mostly locked-down platforms with digital rights management (DRM) where users cannot directly interact with the file system and the device’s functionalities are provided by the manufacturer in a sand- boxed environment. Privilege escalation, or more commonly known as jailbreaking, is the act of removing limitations imposed by the manufacturer, thus enabling the device to gain access to resources that are normally protected from an application or user.
  • 6. Critically discuss why an operating system should and should not be locked-down in the above context, considering the legal context. Option 8: Big Data Dr. Eric Horvitz, a computer scientist and co-director of Microsoft Research, who worked with a large urban hospital in Washington was able to use a concentration of anonymous Internet searches in the neighbourhoods in close proximity of the hospital to calculate the probabilities of cardio cases which showed up soon after. Through the use of Internet searches, Twitter feeds, or in general “Internet as a sensor”, Dr. Horvitz was also able to identify previously unpublished side eff ect of medicines and track the onset of postpartum depression among new mothers. Through the use of online information, can we better understand our behaviours, or more importantly overcome various challenges in health and diagnosis? This is one implementation of the principles of Big Data. Research how principles of Big Data are currently appl ied in one of the following fields: · Medicine · Education · Astronomy
  • 7. GETTING HELP 1. Doing Your Assignment You may find the following link useful in preparing for your assignment. See “Doing the Assignments” at http://learnline.cdu.edu.au/units/itonline/assignments.html. 2. About Essay Writing CDU Study Guide (http://learnline.cdu.edu.au/studyskills/) has a comprehensive range of study skills information. You may find the following resources useful in writing academic assignments: · Introduction to Academic Assignments
  • 8. http://learnline.cdu.edu.au/studyskills/studyskills/introacademic assignments.html · Introduction to Academic Writing http://learnline.cdu.edu.au/studyskills/studyskills/introacademic writing.html · What to Avoid in Formal Writing http://learnline.cdu.edu.au/studyskills/studyskills/aswhattoavoid .html · Strunk’s “The Elements of Style” is an old book (1918), but a good one, to check for suggestions and conventions on writing style. Some things have changed since 1918, but many of his suggestions are largely intact today. · You can find the book at http://www.crockford.com/wrrrld/style.html. Thanks to Douglas Crockford for making this available. 3. Researching The CDU Library’s Summon search (http://www.cdu.edu.au/library/) is a good way to start gathering research about your chosen topic. If you have not used Summon before please watch the video on the Summon Guide webpage (http://libguides.cdu.edu.au/summon). Alternatively, visit the CDU Library’s help on Summon: · Referencing 101 (http://libguides.cdu.edu.au/cdureferencing) · Referencing Style Guide (http://libguides.cdu.edu.au/content.php?pid=100403&sid=7537
  • 9. 58). We use CDU Harvard style for HIT164. · iResearch (http://www.library.usyd.edu.au/elearning/learn/referencing/acti vities/index.php). This is an interactive learning tool, courtesy of University of Sydney. · CDU’s Information Technology Guide (http://libguides.cdu.edu.au/IT) is very useful for finding academic quality sources via the Library. 4. Plagiarism - you will be penalised if you plagiarise your work If you have any doubt about what constitutes plagiarism, then please talk to your lecturer. You can also find more information about plagiarism at CDU Library Service (http://libguides.cdu.edu.au/content.php?pid=100403&sid=2587 885). PRESENTATION Essay should be word processed and include page numbers and student name and number in the footer. It is recommended that you check for plagiarism in your work before you submit.
  • 10. SUBMISSION GUIDELINES All students should submit via Learnline: · Word processed document only, PDF files are not accepted. · Include an assignment cover sheet with the plagiarism section signed. · Ensure that your file is labelled in the format of firstnameLastnameAssign1.doc (e.g., johnAppleseedAssign1.doc). - Note that there are no spaces or symbols in the file name.
  • 11. HIT164 COMPUTING FUNDAMENTALS Assignment 1: Research Essay Due Date: Week 7, Friday 11: 59 pm Length: 1500 words maximum (not including references) Value: 20% of the total marks for the unit TASKS 1. Research a few issues in use of IT in a discipline of current relevance. You may choose issues from any of the disciplines given in the following pages or a discipline of your choice. 2. Prepare an essay about your topic with no more than 1500
  • 12. words (excluding reference list). 3. Your topic of choice must be posted to the Discussion Board titled “Post your essay topic here” by Week 3, Friday 5pm, 4. Note that if you have not posted a topic by this time, you may be assigned a topic by your lecturer. REQUIREMENTS · The assignment should be word-processed. · It should include a reference list. · Use Harvard referencing style. · Do not include sources in the reference list that are not cited in the document. · You need to use a minimum of 10 sources and there needs to be at least 3 diff erent types (i.e., websites, book, journal article, etc.). HIT164 Computing Fundamentals TOPICS (CHOOSE ONE) Option 1: Social Media GeoCities is a web hosting service which employs the concept/metaphors of “cities” and “neighbourhood” in real - world. For example, computer-related sites are placed in “SiliconValley” and entertainment sites in “Hollywood”. GeoCities was the third-most visited website at its peak when it
  • 13. was acquired by Yahoo! in 1999. 10 years later as social media had taken over and become mainstream on the Internet, GeoCities was shutdown and deleted. However, the Internet Archive team made a backup of the site just before it was shut down to preserve the eff ort put in by around 35 million people since it started. The resulting 650GB archive was published online as a remembrance of the glorious days of GeoCities. Will current social media (i.e., Facebook) eventually face the same fate? Justify your arguments with robust supporting evidence. Option 2: Li-Fi Wi-Fi is a popular networking technology that allows electronic devices to connect to the Internet wirelessly using radio frequency. It can be commonly seen from mobile devices to government facility. However in recent years, researchers have found a way to utilise visible light from light-emitting diodes (LEDs) to transmit data: such technology is called Li-Fi (light fidelity). Even though Li-Fi is still at its infancy, many universities and researchers are actively studying to reach its potential. Compare Wi-Fi and Li-Fi critically and discuss the advantages and disadvantages of Li-Fi. Option 3: Wearable Technology
  • 14. Google Glass is one of the first and most talked about augmented reality wearable computers in 2013. Its usage varies from personal entertainment to surgical practise. Similar to other emerging technologies, Google Glass has also received quite a few negative critical receptions, such as privacy concern. Critically discuss the pros and cons of ubiquitous wearable computing like Google Glass. Note how you would use a ubiquitous device like Google Glass. Option 4: Science & Technology Children with Asperger’s syndrome (or high functioning autism) often exhibit excellent language, memory and technical skills. However, their lack of good social skills and understanding of social interaction often hinder their ability to function in elementary and middle school settings. Research regarding the use of technology to help children with Asperger’s syndrome or autism have just started to emerge as technology is maturing at a rapid pace. Research what technology options are available to aid children with Asperger’s syndrome or autism? Support your discussion with robust supporting evidence. Option 5: Internet Privacy We share information on the Internet everyday, through social media, blog posts, or even apps on your phone. Technology has become so ubiquitous today that we are not as concern about
  • 15. privacy as we used to be. A recent attack on Snapchat revealed almost all (approx. 4.6 millions) usernames and phone numbers on the Internet for anyone to download. However, the majority of Snapchat users were not worried about how such information could be used. Popular companies such as Apple, Microsoft, Google, Target (United States) and Sony have been hacked at least once in the past decade. In the most extreme case hackers obtained and sold users’ credit card details. This proves that nothing is safe on the Internet. Who can we trust our information with and how much information can we share? Critically discuss the assertion. Option 6: Artificial Intelligence The movie “Her” demonstrated the possibility of a complex Artificial Intelligence (A.I.) interface with human emotion. In the not too distant future our computer systems will be able to display all the characteristics of intelligence we recognise in humans. Identify existing technologies that can be used to construct “Samantha” and critically discuss if the benefits of such computer intelligence would outweigh the disadvantages.
  • 16. Option 7: Privilege Escalation Mobile operating systems nowadays are mostly locked-down platforms with digital rights management (DRM) where users cannot directly interact with the file system and the device’s functionalities are provided by the manufacturer in a sand- boxed environment. Privilege escalation, or more commonly known as jailbreaking, is the act of removing limitations imposed by the manufacturer, thus enabling the device to gain access to resources that are normally protected from an application or user. Critically discuss why an operating system should and should not be locked-down in the above context, considering the legal context. Option 8: Big Data Dr. Eric Horvitz, a computer scientist and co-director of Microsoft Research, who worked with a large urban hospital in Washington was able to use a concentration of anonymous Internet searches in the neighbourhoods in close proximity of the hospital to calculate the probabilities of cardio cases which showed up soon after. Through the use of Internet searches, Twitter feeds, or in general “Internet as a sensor”, Dr. Horvitz was also able to identify previously unpublished side eff ect of medicines and track the onset of postpartum depression among new mothers. Through the use of online information, can we better understand our behaviours, or more importantly overcome various
  • 17. challenges in health and diagnosis? This is one implementation of the principles of Big Data. Research how principles of Big Data are currently applied in one of the following fields: · Medicine · Education · Astronomy GETTING HELP 1. Doing Your Assignment You may find the following link useful in preparing for your assignment. See “Doing the Assignments” at http://learnline.cdu.edu.au/units/itonline/assignments.html.
  • 18. 2. About Essay Writing CDU Study Guide (http://learnline.cdu.edu.au/studyskills/) has a comprehensive range of study skills information. You may find the following resources useful in writing academic assignments: · Introduction to Academic Assignments http://learnline.cdu.edu.au/studyskills/studyskills/introacademic assignments.html · Introduction to Academic Writing http://learnline.cdu.edu.au/studyskills/studyskills/introacademic writing.html · What to Avoid in Formal Writing http://learnline.cdu.edu.au/studyskills/studyskills/aswhattoavoid .html · Strunk’s “The Elements of Style” is an old book (1918), but a good one, to check for suggestions and conventions on writing style. Some things have changed since 1918, but many of his suggestions are largely intact today. · You can find the book at http://www.crockford.com/wrrrld/style.html. Thanks to Douglas Crockford for making this available. 3. Researching
  • 19. The CDU Library’s Summon search (http://www.cdu.edu.au/library/) is a good way to start gathering research about your chosen topic. If you have not used Summon before please watch the video on the Summon Guide webpage (http://libguides.cdu.edu.au/summon). Alternatively, visit the CDU Library’s help on Summon: · Referencing 101 (http://libguides.cdu.edu.au/cdureferencing) · Referencing Style Guide (http://libguides.cdu.edu.au/content.php?pid=100403&sid=7537 58). We use CDU Harvard style for HIT164. · iResearch (http://www.library.usyd.edu.au/elearning/learn/referencing/acti vities/index.php). This is an interactive learning tool, courtesy of University of Sydney. · CDU’s Information Technology Guide (http://libguides.cdu.edu.au/IT) is very useful for finding academic quality sources via the Library. 4. Plagiarism - you will be penalised if you plagiarise your work If you have any doubt about what constitutes plagiarism, then please talk to your lecturer. You can also find more information about plagiarism at CDU Library Service (http://libguides.cdu.edu.au/content.php?pid=100403&sid=2587
  • 20. 885). PRESENTATION Essay should be word processed and include page numbers and student name and number in the footer. It is recommended that you check for plagiarism in your work before you submit. SUBMISSION GUIDELINES All students should submit via Learnline: · Word processed document only, PDF files are not accepted. · Include an assignment cover sheet with the plagiarism section signed. · Ensure that your file is labelled in the format of firstnameLastnameAssign1.doc (e.g., johnAppleseedAssign1.doc). - Note that there are no spaces or symbols in the file name.