SlideShare a Scribd company logo
1 of 21
HIT164 COMPUTING FUNDAMENTALS
Assignment 1: Research Essay
Due Date: Week 7, Friday 11: 59 pm
Length: 1500 words maximum (not including references)
Value: 20% of the total marks for the unit
TASKS
1. Research a few issues in use of IT in a discipline of current
relevance. You may choose issues from any of the disciplines
given in the following pages or a discipline of your choice.
2. Prepare an essay about your topic with no more than 1500
words (excluding reference list).
3. Your topic of choice must be posted to the Discussion Board
titled “Post your essay topic here” by Week 3, Friday 5pm,
4. Note that if you have not posted a topic by this time, you may
be assigned a topic by your lecturer.
REQUIREMENTS
· The assignment should be word-processed.
· It should include a reference list.
· Use Harvard referencing style.
· Do not include sources in the reference list that are not cited
in the document.
· You need to use a minimum of 10 sources and there needs to
be at least 3 diff erent types (i.e., websites, book, journal article,
etc.).
HIT164 Computing Fundamentals
TOPICS (CHOOSE ONE)
Option 1: Social Media
GeoCities is a web hosting service which employs the
concept/metaphors of “cities” and “neighbourhood” in real-
world. For example, computer-related sites are placed in
“SiliconValley” and entertainment sites in “Hollywood”.
GeoCities was the third-most visited website at its peak when it
was acquired by Yahoo! in 1999.
10 years later as social media had taken over and become
mainstream on the Internet, GeoCities was shutdown and
deleted. However, the Internet Archive team made a backup of
the site just before it was shut down to preserve the eff ort put in
by around 35 million people since it started. The resulting
650GB archive was published online as a remembrance of the
glorious days of GeoCities.
Will current social media (i.e., Facebook) eventually face the
same fate? Justify your arguments with robust supporting
evidence.
Option 2: Li-Fi
Wi-Fi is a popular networking technology that allows electronic
devices to connect to the Internet wirelessly using radio
frequency. It can be commonly seen from mobile devices to
government facility. However in recent years, researchers have
found a way to utilise visible light from light-emitting diodes
(LEDs) to transmit data: such technology is called Li-Fi (light
fidelity).
Even though Li-Fi is still at its infancy, many universities and
researchers are actively studying to reach its potential.
Compare Wi-Fi and Li-Fi critically and discuss the advantages
and disadvantages of Li-Fi.
Option 3: Wearable Technology
Google Glass is one of the first and most talked about
augmented reality wearable computers in 2013. Its usage varies
from personal entertainment to surgical practise. Similar to
other emerging technologies, Google Glass has also received
quite a few negative critical receptions, such as privacy
concern.
Critically discuss the pros and cons of ubiquitous wearable
computing like Google Glass. Note how you would use a
ubiquitous device like Google Glass.
Option 4: Science & Technology
Children with Asperger’s syndrome (or high functioning autism)
often exhibit excellent language, memory and technical skills.
However, their lack of good social skills and understanding of
social interaction often hinder their ability to function in
elementary and middle school settings. Research regarding the
use of technology to help children with Asperger’s syndrome or
autism have just started to emerge as technology is maturing at
a rapid pace.
Research what technology options are available to aid children
with Asperger’s syndrome or autism? Support your discussion
with robust supporting evidence.
Option 5: Internet Privacy
We share information on the Internet everyday, through social
media, blog posts, or even apps on your phone. Technology has
become so ubiquitous today that we are not as concern about
privacy as we used to be. A recent attack on Snapchat revealed
almost all (approx. 4.6 millions) usernames and phone numbers
on the Internet for anyone to download. However, the majority
of Snapchat users were not worried about how such information
could be used.
Popular companies such as Apple, Microsoft, Google,
Target (United States) and Sony have been hacked at least once
in the past decade. In the most extreme case hackers obtained
and sold users’ credit card details. This proves that nothing is
safe on the Internet. Who can we trust our information with and
how much information can we share?
Critically discuss the assertion.
Option 6: Artificial Intelligence
The movie “Her” demonstrated the possibility of a complex
Artificial Intelligence (A.I.) interface with human emotion. In
the not too distant future our computer systems will be able to
display all the characteristics of intelligence we recognise in
humans.
Identify existing technologies that can be used to construct
“Samantha” and critically discuss if the benefits of such
computer intelligence would outweigh the disadvantages.
Option 7: Privilege Escalation
Mobile operating systems nowadays are mostly locked-down
platforms with digital rights management (DRM) where users
cannot directly interact with the file system and the device’s
functionalities are provided by the manufacturer in a sand-
boxed environment.
Privilege escalation, or more commonly known as jailbreaking,
is the act of removing limitations imposed by the manufacturer,
thus enabling the device to gain access to resources that are
normally protected from an application or user.
Critically discuss why an operating system should and
should not be locked-down in the above context, considering the
legal context.
Option 8: Big Data
Dr. Eric Horvitz, a computer scientist and co-director of
Microsoft Research, who worked with a large urban hospital in
Washington was able to use a concentration of anonymous
Internet searches in the neighbourhoods in close proximity of
the hospital to calculate the probabilities of cardio cases which
showed up soon after.
Through the use of Internet searches, Twitter feeds, or in
general “Internet as a sensor”, Dr. Horvitz was also able to
identify previously unpublished side eff ect of medicines and
track the onset of postpartum depression among new mothers.
Through the use of online information, can we better understand
our behaviours, or more importantly overcome various
challenges in health and diagnosis?
This is one implementation of the principles of Big Data.
Research how principles of Big Data are currently appl ied in
one of the following fields:
· Medicine
· Education
· Astronomy
GETTING HELP
1. Doing Your Assignment
You may find the following link useful in preparing for your
assignment. See “Doing the Assignments” at
http://learnline.cdu.edu.au/units/itonline/assignments.html.
2. About Essay Writing
CDU Study Guide (http://learnline.cdu.edu.au/studyskills/) has
a comprehensive range of study skills information.
You may find the following resources useful in writing
academic assignments:
· Introduction to Academic Assignments
http://learnline.cdu.edu.au/studyskills/studyskills/introacademic
assignments.html
· Introduction to Academic Writing
http://learnline.cdu.edu.au/studyskills/studyskills/introacademic
writing.html
· What to Avoid in Formal Writing
http://learnline.cdu.edu.au/studyskills/studyskills/aswhattoavoid
.html
· Strunk’s “The Elements of Style” is an old book (1918), but a
good one, to check for suggestions and conventions on writing
style. Some things have changed since 1918, but many of his
suggestions are largely intact today.
· You can find the book at
http://www.crockford.com/wrrrld/style.html. Thanks to Douglas
Crockford for making this available.
3. Researching
The CDU Library’s Summon search
(http://www.cdu.edu.au/library/) is a good way to start
gathering research about your chosen topic. If you have not
used Summon before please watch the video on the Summon
Guide webpage (http://libguides.cdu.edu.au/summon).
Alternatively, visit the CDU Library’s help on Summon:
· Referencing 101 (http://libguides.cdu.edu.au/cdureferencing)
· Referencing Style Guide
(http://libguides.cdu.edu.au/content.php?pid=100403&sid=7537
58). We use CDU Harvard style for HIT164.
· iResearch
(http://www.library.usyd.edu.au/elearning/learn/referencing/acti
vities/index.php). This is an interactive learning tool, courtesy
of University of Sydney.
· CDU’s Information Technology Guide
(http://libguides.cdu.edu.au/IT) is very useful for finding
academic quality sources via the Library.
4. Plagiarism - you will be penalised if you plagiarise your
work
If you have any doubt about what constitutes plagiarism, then
please talk to your lecturer.
You can also find more information about plagiarism at CDU
Library Service
(http://libguides.cdu.edu.au/content.php?pid=100403&sid=2587
885).
PRESENTATION
Essay should be word processed and include page numbers and
student name and number in the footer. It is recommended that
you check for plagiarism in your work before you submit.
SUBMISSION GUIDELINES
All students should submit via Learnline:
· Word processed document only, PDF files are not accepted.
· Include an assignment cover sheet with the plagiarism section
signed.
· Ensure that your file is labelled in the format of
firstnameLastnameAssign1.doc (e.g.,
johnAppleseedAssign1.doc).
- Note that there are no spaces or symbols in the file name.
HIT164 COMPUTING FUNDAMENTALS
Assignment 1: Research Essay
Due Date: Week 7, Friday 11: 59 pm
Length: 1500 words maximum (not including references)
Value: 20% of the total marks for the unit
TASKS
1. Research a few issues in use of IT in a discipline of current
relevance. You may choose issues from any of the disciplines
given in the following pages or a discipline of your choice.
2. Prepare an essay about your topic with no more than 1500
words (excluding reference list).
3. Your topic of choice must be posted to the Discussion Board
titled “Post your essay topic here” by Week 3, Friday 5pm,
4. Note that if you have not posted a topic by this time, you may
be assigned a topic by your lecturer.
REQUIREMENTS
· The assignment should be word-processed.
· It should include a reference list.
· Use Harvard referencing style.
· Do not include sources in the reference list that are not cited
in the document.
· You need to use a minimum of 10 sources and there needs to
be at least 3 diff erent types (i.e., websites, book, journal article,
etc.).
HIT164 Computing Fundamentals
TOPICS (CHOOSE ONE)
Option 1: Social Media
GeoCities is a web hosting service which employs the
concept/metaphors of “cities” and “neighbourhood” in real -
world. For example, computer-related sites are placed in
“SiliconValley” and entertainment sites in “Hollywood”.
GeoCities was the third-most visited website at its peak when it
was acquired by Yahoo! in 1999.
10 years later as social media had taken over and become
mainstream on the Internet, GeoCities was shutdown and
deleted. However, the Internet Archive team made a backup of
the site just before it was shut down to preserve the eff ort put in
by around 35 million people since it started. The resulting
650GB archive was published online as a remembrance of the
glorious days of GeoCities.
Will current social media (i.e., Facebook) eventually face the
same fate? Justify your arguments with robust supporting
evidence.
Option 2: Li-Fi
Wi-Fi is a popular networking technology that allows electronic
devices to connect to the Internet wirelessly using radio
frequency. It can be commonly seen from mobile devices to
government facility. However in recent years, researchers have
found a way to utilise visible light from light-emitting diodes
(LEDs) to transmit data: such technology is called Li-Fi (light
fidelity).
Even though Li-Fi is still at its infancy, many universities and
researchers are actively studying to reach its potential.
Compare Wi-Fi and Li-Fi critically and discuss the advantages
and disadvantages of Li-Fi.
Option 3: Wearable Technology
Google Glass is one of the first and most talked about
augmented reality wearable computers in 2013. Its usage varies
from personal entertainment to surgical practise. Similar to
other emerging technologies, Google Glass has also received
quite a few negative critical receptions, such as privacy
concern.
Critically discuss the pros and cons of ubiquitous wearable
computing like Google Glass. Note how you would use a
ubiquitous device like Google Glass.
Option 4: Science & Technology
Children with Asperger’s syndrome (or high functioning autism)
often exhibit excellent language, memory and technical skills.
However, their lack of good social skills and understanding of
social interaction often hinder their ability to function in
elementary and middle school settings. Research regarding the
use of technology to help children with Asperger’s syndrome or
autism have just started to emerge as technology is maturing at
a rapid pace.
Research what technology options are available to aid children
with Asperger’s syndrome or autism? Support your discussion
with robust supporting evidence.
Option 5: Internet Privacy
We share information on the Internet everyday, through social
media, blog posts, or even apps on your phone. Technology has
become so ubiquitous today that we are not as concern about
privacy as we used to be. A recent attack on Snapchat revealed
almost all (approx. 4.6 millions) usernames and phone numbers
on the Internet for anyone to download. However, the majority
of Snapchat users were not worried about how such information
could be used.
Popular companies such as Apple, Microsoft, Google,
Target (United States) and Sony have been hacked at least once
in the past decade. In the most extreme case hackers obtained
and sold users’ credit card details. This proves that nothing is
safe on the Internet. Who can we trust our information with and
how much information can we share?
Critically discuss the assertion.
Option 6: Artificial Intelligence
The movie “Her” demonstrated the possibility of a complex
Artificial Intelligence (A.I.) interface with human emotion. In
the not too distant future our computer systems will be able to
display all the characteristics of intelligence we recognise in
humans.
Identify existing technologies that can be used to construct
“Samantha” and critically discuss if the benefits of such
computer intelligence would outweigh the disadvantages.
Option 7: Privilege Escalation
Mobile operating systems nowadays are mostly locked-down
platforms with digital rights management (DRM) where users
cannot directly interact with the file system and the device’s
functionalities are provided by the manufacturer in a sand-
boxed environment.
Privilege escalation, or more commonly known as jailbreaking,
is the act of removing limitations imposed by the manufacturer,
thus enabling the device to gain access to resources that are
normally protected from an application or user.
Critically discuss why an operating system should and
should not be locked-down in the above context, considering the
legal context.
Option 8: Big Data
Dr. Eric Horvitz, a computer scientist and co-director of
Microsoft Research, who worked with a large urban hospital in
Washington was able to use a concentration of anonymous
Internet searches in the neighbourhoods in close proximity of
the hospital to calculate the probabilities of cardio cases which
showed up soon after.
Through the use of Internet searches, Twitter feeds, or in
general “Internet as a sensor”, Dr. Horvitz was also able to
identify previously unpublished side eff ect of medicines and
track the onset of postpartum depression among new mothers.
Through the use of online information, can we better understand
our behaviours, or more importantly overcome various
challenges in health and diagnosis?
This is one implementation of the principles of Big Data.
Research how principles of Big Data are currently applied in
one of the following fields:
· Medicine
· Education
· Astronomy
GETTING HELP
1. Doing Your Assignment
You may find the following link useful in preparing for your
assignment. See “Doing the Assignments” at
http://learnline.cdu.edu.au/units/itonline/assignments.html.
2. About Essay Writing
CDU Study Guide (http://learnline.cdu.edu.au/studyskills/) has
a comprehensive range of study skills information.
You may find the following resources useful in writing
academic assignments:
· Introduction to Academic Assignments
http://learnline.cdu.edu.au/studyskills/studyskills/introacademic
assignments.html
· Introduction to Academic Writing
http://learnline.cdu.edu.au/studyskills/studyskills/introacademic
writing.html
· What to Avoid in Formal Writing
http://learnline.cdu.edu.au/studyskills/studyskills/aswhattoavoid
.html
· Strunk’s “The Elements of Style” is an old book (1918), but a
good one, to check for suggestions and conventions on writing
style. Some things have changed since 1918, but many of his
suggestions are largely intact today.
· You can find the book at
http://www.crockford.com/wrrrld/style.html. Thanks to Douglas
Crockford for making this available.
3. Researching
The CDU Library’s Summon search
(http://www.cdu.edu.au/library/) is a good way to start
gathering research about your chosen topic. If you have not
used Summon before please watch the video on the Summon
Guide webpage (http://libguides.cdu.edu.au/summon).
Alternatively, visit the CDU Library’s help on Summon:
· Referencing 101 (http://libguides.cdu.edu.au/cdureferencing)
· Referencing Style Guide
(http://libguides.cdu.edu.au/content.php?pid=100403&sid=7537
58). We use CDU Harvard style for HIT164.
· iResearch
(http://www.library.usyd.edu.au/elearning/learn/referencing/acti
vities/index.php). This is an interactive learning tool, courtesy
of University of Sydney.
· CDU’s Information Technology Guide
(http://libguides.cdu.edu.au/IT) is very useful for finding
academic quality sources via the Library.
4. Plagiarism - you will be penalised if you plagiarise your
work
If you have any doubt about what constitutes plagiarism, then
please talk to your lecturer.
You can also find more information about plagiarism at CDU
Library Service
(http://libguides.cdu.edu.au/content.php?pid=100403&sid=2587
885).
PRESENTATION
Essay should be word processed and include page numbers and
student name and number in the footer. It is recommended that
you check for plagiarism in your work before you submit.
SUBMISSION GUIDELINES
All students should submit via Learnline:
· Word processed document only, PDF files are not accepted.
· Include an assignment cover sheet with the plagiarism section
signed.
· Ensure that your file is labelled in the format of
firstnameLastnameAssign1.doc (e.g.,
johnAppleseedAssign1.doc).
- Note that there are no spaces or symbols in the file name.
HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essay

More Related Content

Similar to HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essay

HKU Data Curation MLIM7350 Class 10
HKU Data Curation MLIM7350 Class 10HKU Data Curation MLIM7350 Class 10
HKU Data Curation MLIM7350 Class 10Scott Edmunds
 
· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docxalinainglis
 
Uses of the internet in teachin’ &
Uses of the internet in teachin’ &Uses of the internet in teachin’ &
Uses of the internet in teachin’ &affuman
 
Information Architecture For Educators
Information Architecture For EducatorsInformation Architecture For Educators
Information Architecture For EducatorsMichael Zarro, Ph.D.
 
The OpenCon Intro to Open Data
The OpenCon Intro to Open DataThe OpenCon Intro to Open Data
The OpenCon Intro to Open DataRoss Mounce
 
Learning through the net.pptx (Group7)
Learning through the net.pptx   (Group7)Learning through the net.pptx   (Group7)
Learning through the net.pptx (Group7)melendezbelle19
 
Why not use ict in sudan
Why not use ict in sudanWhy not use ict in sudan
Why not use ict in sudanHala Nur
 
This assignment has two goals  1) have students increase their unde.docx
This assignment has two goals  1) have students increase their unde.docxThis assignment has two goals  1) have students increase their unde.docx
This assignment has two goals  1) have students increase their unde.docxdunningblair
 
Conole Prie Workshop
Conole Prie WorkshopConole Prie Workshop
Conole Prie Workshopgrainne
 
one of the best reasons of studying Computer Science updated 2023 DOC 14.docx
one of the best reasons of studying Computer Science updated 2023 DOC 14.docxone of the best reasons of studying Computer Science updated 2023 DOC 14.docx
one of the best reasons of studying Computer Science updated 2023 DOC 14.docxintel-writers.com
 
Critical thinking in english. how to evaluate webpages
Critical thinking in english. how to evaluate webpagesCritical thinking in english. how to evaluate webpages
Critical thinking in english. how to evaluate webpagesMariangel Carreño
 
NIU Trends In Educational Technology 2008
NIU Trends In Educational Technology 2008NIU Trends In Educational Technology 2008
NIU Trends In Educational Technology 2008jsotir
 
EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Researcheckchela
 
Week 2 computers, web and the internet
Week 2 computers, web and the internetWeek 2 computers, web and the internet
Week 2 computers, web and the internetcarolyn oldham
 
Whitaker\'s Multi-Media Presentation
Whitaker\'s Multi-Media PresentationWhitaker\'s Multi-Media Presentation
Whitaker\'s Multi-Media Presentationgina.whitaker
 
Empowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdfEmpowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdfMichael Montarde
 

Similar to HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essay (20)

HKU Data Curation MLIM7350 Class 10
HKU Data Curation MLIM7350 Class 10HKU Data Curation MLIM7350 Class 10
HKU Data Curation MLIM7350 Class 10
 
· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx
 
Uhmlg2011
Uhmlg2011Uhmlg2011
Uhmlg2011
 
Uses of the internet in teachin’ &
Uses of the internet in teachin’ &Uses of the internet in teachin’ &
Uses of the internet in teachin’ &
 
Information Architecture For Educators
Information Architecture For EducatorsInformation Architecture For Educators
Information Architecture For Educators
 
Mississippi State University Adams
Mississippi State University AdamsMississippi State University Adams
Mississippi State University Adams
 
The OpenCon Intro to Open Data
The OpenCon Intro to Open DataThe OpenCon Intro to Open Data
The OpenCon Intro to Open Data
 
Learning through the net.pptx (Group7)
Learning through the net.pptx   (Group7)Learning through the net.pptx   (Group7)
Learning through the net.pptx (Group7)
 
SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptx
 
Why not use ict in sudan
Why not use ict in sudanWhy not use ict in sudan
Why not use ict in sudan
 
This assignment has two goals  1) have students increase their unde.docx
This assignment has two goals  1) have students increase their unde.docxThis assignment has two goals  1) have students increase their unde.docx
This assignment has two goals  1) have students increase their unde.docx
 
Conole Prie Workshop
Conole Prie WorkshopConole Prie Workshop
Conole Prie Workshop
 
one of the best reasons of studying Computer Science updated 2023 DOC 14.docx
one of the best reasons of studying Computer Science updated 2023 DOC 14.docxone of the best reasons of studying Computer Science updated 2023 DOC 14.docx
one of the best reasons of studying Computer Science updated 2023 DOC 14.docx
 
Critical thinking in english. how to evaluate webpages
Critical thinking in english. how to evaluate webpagesCritical thinking in english. how to evaluate webpages
Critical thinking in english. how to evaluate webpages
 
NIU Trends In Educational Technology 2008
NIU Trends In Educational Technology 2008NIU Trends In Educational Technology 2008
NIU Trends In Educational Technology 2008
 
EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Research
 
Week 2 computers, web and the internet
Week 2 computers, web and the internetWeek 2 computers, web and the internet
Week 2 computers, web and the internet
 
Whitaker\'s Multi-Media Presentation
Whitaker\'s Multi-Media PresentationWhitaker\'s Multi-Media Presentation
Whitaker\'s Multi-Media Presentation
 
6p model of research
6p model of research6p model of research
6p model of research
 
Empowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdfEmpowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdf
 

More from sorayan5ywschuit

What the mass media offers is not popular art, but entertainment wh.docx
What the mass media offers is not popular art, but entertainment wh.docxWhat the mass media offers is not popular art, but entertainment wh.docx
What the mass media offers is not popular art, but entertainment wh.docxsorayan5ywschuit
 
What role does discrimination play in perpetuating the assessment of.docx
What role does discrimination play in perpetuating the assessment of.docxWhat role does discrimination play in perpetuating the assessment of.docx
What role does discrimination play in perpetuating the assessment of.docxsorayan5ywschuit
 
What sorts of external trends should iRobot pay attention to  Why .docx
What sorts of external trends should iRobot pay attention to  Why .docxWhat sorts of external trends should iRobot pay attention to  Why .docx
What sorts of external trends should iRobot pay attention to  Why .docxsorayan5ywschuit
 
What makes us unique as a speciesWhat hominid characteristic(s) a.docx
What makes us unique as a speciesWhat hominid characteristic(s) a.docxWhat makes us unique as a speciesWhat hominid characteristic(s) a.docx
What makes us unique as a speciesWhat hominid characteristic(s) a.docxsorayan5ywschuit
 
What role, if any, do you think juveniles play in the current negati.docx
What role, if any, do you think juveniles play in the current negati.docxWhat role, if any, do you think juveniles play in the current negati.docx
What role, if any, do you think juveniles play in the current negati.docxsorayan5ywschuit
 
What led to the creation of the Sarbanes-Oxley Act and when was it.docx
What led to the creation of the Sarbanes-Oxley Act and when was it.docxWhat led to the creation of the Sarbanes-Oxley Act and when was it.docx
What led to the creation of the Sarbanes-Oxley Act and when was it.docxsorayan5ywschuit
 
What role do audiences play in creating popular culture Explain how.docx
What role do audiences play in creating popular culture Explain how.docxWhat role do audiences play in creating popular culture Explain how.docx
What role do audiences play in creating popular culture Explain how.docxsorayan5ywschuit
 
What role do the gods play in the Illiad First, use passages from t.docx
What role do the gods play in the Illiad First, use passages from t.docxWhat role do the gods play in the Illiad First, use passages from t.docx
What role do the gods play in the Illiad First, use passages from t.docxsorayan5ywschuit
 
What is your relationship to writing Discuss something about writin.docx
What is your relationship to writing Discuss something about writin.docxWhat is your relationship to writing Discuss something about writin.docx
What is your relationship to writing Discuss something about writin.docxsorayan5ywschuit
 
What reasons are given for the enduring popularity of Edward Hopper.docx
What reasons are given for the enduring popularity of Edward Hopper.docxWhat reasons are given for the enduring popularity of Edward Hopper.docx
What reasons are given for the enduring popularity of Edward Hopper.docxsorayan5ywschuit
 
What methods, specifically, have citizens utilized to influenc.docx
What methods, specifically, have citizens utilized to influenc.docxWhat methods, specifically, have citizens utilized to influenc.docx
What methods, specifically, have citizens utilized to influenc.docxsorayan5ywschuit
 
What is your position on the debate about national ID cards Autho.docx
What is your position on the debate about national ID cards Autho.docxWhat is your position on the debate about national ID cards Autho.docx
What is your position on the debate about national ID cards Autho.docxsorayan5ywschuit
 
What problems arise when a species is introduced from a foreign ecos.docx
What problems arise when a species is introduced from a foreign ecos.docxWhat problems arise when a species is introduced from a foreign ecos.docx
What problems arise when a species is introduced from a foreign ecos.docxsorayan5ywschuit
 
What is your favorite ad that you have ever seen  Please describe.docx
What is your favorite ad that you have ever seen  Please describe.docxWhat is your favorite ad that you have ever seen  Please describe.docx
What is your favorite ad that you have ever seen  Please describe.docxsorayan5ywschuit
 
What methodologies have been used for data breachesDifferent type.docx
What methodologies have been used for data breachesDifferent type.docxWhat methodologies have been used for data breachesDifferent type.docx
What methodologies have been used for data breachesDifferent type.docxsorayan5ywschuit
 
What kinds of cultural changes will hospitals have to make in order .docx
What kinds of cultural changes will hospitals have to make in order .docxWhat kinds of cultural changes will hospitals have to make in order .docx
What kinds of cultural changes will hospitals have to make in order .docxsorayan5ywschuit
 
What kind of research might have helped MySpace continue to compete .docx
What kind of research might have helped MySpace continue to compete .docxWhat kind of research might have helped MySpace continue to compete .docx
What kind of research might have helped MySpace continue to compete .docxsorayan5ywschuit
 
What is validating form data and explain the issue with the isset fu.docx
What is validating form data and explain the issue with the isset fu.docxWhat is validating form data and explain the issue with the isset fu.docx
What is validating form data and explain the issue with the isset fu.docxsorayan5ywschuit
 
What is your definition of Social JusticeAfter reviewing another .docx
What is your definition of Social JusticeAfter reviewing another .docxWhat is your definition of Social JusticeAfter reviewing another .docx
What is your definition of Social JusticeAfter reviewing another .docxsorayan5ywschuit
 
What is the watering hole techniqueThe term watering hole” refer.docx
What is the watering hole techniqueThe term watering hole” refer.docxWhat is the watering hole techniqueThe term watering hole” refer.docx
What is the watering hole techniqueThe term watering hole” refer.docxsorayan5ywschuit
 

More from sorayan5ywschuit (20)

What the mass media offers is not popular art, but entertainment wh.docx
What the mass media offers is not popular art, but entertainment wh.docxWhat the mass media offers is not popular art, but entertainment wh.docx
What the mass media offers is not popular art, but entertainment wh.docx
 
What role does discrimination play in perpetuating the assessment of.docx
What role does discrimination play in perpetuating the assessment of.docxWhat role does discrimination play in perpetuating the assessment of.docx
What role does discrimination play in perpetuating the assessment of.docx
 
What sorts of external trends should iRobot pay attention to  Why .docx
What sorts of external trends should iRobot pay attention to  Why .docxWhat sorts of external trends should iRobot pay attention to  Why .docx
What sorts of external trends should iRobot pay attention to  Why .docx
 
What makes us unique as a speciesWhat hominid characteristic(s) a.docx
What makes us unique as a speciesWhat hominid characteristic(s) a.docxWhat makes us unique as a speciesWhat hominid characteristic(s) a.docx
What makes us unique as a speciesWhat hominid characteristic(s) a.docx
 
What role, if any, do you think juveniles play in the current negati.docx
What role, if any, do you think juveniles play in the current negati.docxWhat role, if any, do you think juveniles play in the current negati.docx
What role, if any, do you think juveniles play in the current negati.docx
 
What led to the creation of the Sarbanes-Oxley Act and when was it.docx
What led to the creation of the Sarbanes-Oxley Act and when was it.docxWhat led to the creation of the Sarbanes-Oxley Act and when was it.docx
What led to the creation of the Sarbanes-Oxley Act and when was it.docx
 
What role do audiences play in creating popular culture Explain how.docx
What role do audiences play in creating popular culture Explain how.docxWhat role do audiences play in creating popular culture Explain how.docx
What role do audiences play in creating popular culture Explain how.docx
 
What role do the gods play in the Illiad First, use passages from t.docx
What role do the gods play in the Illiad First, use passages from t.docxWhat role do the gods play in the Illiad First, use passages from t.docx
What role do the gods play in the Illiad First, use passages from t.docx
 
What is your relationship to writing Discuss something about writin.docx
What is your relationship to writing Discuss something about writin.docxWhat is your relationship to writing Discuss something about writin.docx
What is your relationship to writing Discuss something about writin.docx
 
What reasons are given for the enduring popularity of Edward Hopper.docx
What reasons are given for the enduring popularity of Edward Hopper.docxWhat reasons are given for the enduring popularity of Edward Hopper.docx
What reasons are given for the enduring popularity of Edward Hopper.docx
 
What methods, specifically, have citizens utilized to influenc.docx
What methods, specifically, have citizens utilized to influenc.docxWhat methods, specifically, have citizens utilized to influenc.docx
What methods, specifically, have citizens utilized to influenc.docx
 
What is your position on the debate about national ID cards Autho.docx
What is your position on the debate about national ID cards Autho.docxWhat is your position on the debate about national ID cards Autho.docx
What is your position on the debate about national ID cards Autho.docx
 
What problems arise when a species is introduced from a foreign ecos.docx
What problems arise when a species is introduced from a foreign ecos.docxWhat problems arise when a species is introduced from a foreign ecos.docx
What problems arise when a species is introduced from a foreign ecos.docx
 
What is your favorite ad that you have ever seen  Please describe.docx
What is your favorite ad that you have ever seen  Please describe.docxWhat is your favorite ad that you have ever seen  Please describe.docx
What is your favorite ad that you have ever seen  Please describe.docx
 
What methodologies have been used for data breachesDifferent type.docx
What methodologies have been used for data breachesDifferent type.docxWhat methodologies have been used for data breachesDifferent type.docx
What methodologies have been used for data breachesDifferent type.docx
 
What kinds of cultural changes will hospitals have to make in order .docx
What kinds of cultural changes will hospitals have to make in order .docxWhat kinds of cultural changes will hospitals have to make in order .docx
What kinds of cultural changes will hospitals have to make in order .docx
 
What kind of research might have helped MySpace continue to compete .docx
What kind of research might have helped MySpace continue to compete .docxWhat kind of research might have helped MySpace continue to compete .docx
What kind of research might have helped MySpace continue to compete .docx
 
What is validating form data and explain the issue with the isset fu.docx
What is validating form data and explain the issue with the isset fu.docxWhat is validating form data and explain the issue with the isset fu.docx
What is validating form data and explain the issue with the isset fu.docx
 
What is your definition of Social JusticeAfter reviewing another .docx
What is your definition of Social JusticeAfter reviewing another .docxWhat is your definition of Social JusticeAfter reviewing another .docx
What is your definition of Social JusticeAfter reviewing another .docx
 
What is the watering hole techniqueThe term watering hole” refer.docx
What is the watering hole techniqueThe term watering hole” refer.docxWhat is the watering hole techniqueThe term watering hole” refer.docx
What is the watering hole techniqueThe term watering hole” refer.docx
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 

Recently uploaded (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 

HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essay

  • 1. HIT164 COMPUTING FUNDAMENTALS Assignment 1: Research Essay Due Date: Week 7, Friday 11: 59 pm Length: 1500 words maximum (not including references) Value: 20% of the total marks for the unit TASKS 1. Research a few issues in use of IT in a discipline of current relevance. You may choose issues from any of the disciplines given in the following pages or a discipline of your choice. 2. Prepare an essay about your topic with no more than 1500 words (excluding reference list). 3. Your topic of choice must be posted to the Discussion Board titled “Post your essay topic here” by Week 3, Friday 5pm, 4. Note that if you have not posted a topic by this time, you may be assigned a topic by your lecturer. REQUIREMENTS · The assignment should be word-processed.
  • 2. · It should include a reference list. · Use Harvard referencing style. · Do not include sources in the reference list that are not cited in the document. · You need to use a minimum of 10 sources and there needs to be at least 3 diff erent types (i.e., websites, book, journal article, etc.). HIT164 Computing Fundamentals TOPICS (CHOOSE ONE) Option 1: Social Media GeoCities is a web hosting service which employs the concept/metaphors of “cities” and “neighbourhood” in real- world. For example, computer-related sites are placed in “SiliconValley” and entertainment sites in “Hollywood”. GeoCities was the third-most visited website at its peak when it was acquired by Yahoo! in 1999. 10 years later as social media had taken over and become mainstream on the Internet, GeoCities was shutdown and deleted. However, the Internet Archive team made a backup of the site just before it was shut down to preserve the eff ort put in by around 35 million people since it started. The resulting 650GB archive was published online as a remembrance of the glorious days of GeoCities. Will current social media (i.e., Facebook) eventually face the same fate? Justify your arguments with robust supporting
  • 3. evidence. Option 2: Li-Fi Wi-Fi is a popular networking technology that allows electronic devices to connect to the Internet wirelessly using radio frequency. It can be commonly seen from mobile devices to government facility. However in recent years, researchers have found a way to utilise visible light from light-emitting diodes (LEDs) to transmit data: such technology is called Li-Fi (light fidelity). Even though Li-Fi is still at its infancy, many universities and researchers are actively studying to reach its potential. Compare Wi-Fi and Li-Fi critically and discuss the advantages and disadvantages of Li-Fi. Option 3: Wearable Technology Google Glass is one of the first and most talked about augmented reality wearable computers in 2013. Its usage varies from personal entertainment to surgical practise. Similar to other emerging technologies, Google Glass has also received quite a few negative critical receptions, such as privacy concern. Critically discuss the pros and cons of ubiquitous wearable computing like Google Glass. Note how you would use a ubiquitous device like Google Glass.
  • 4. Option 4: Science & Technology Children with Asperger’s syndrome (or high functioning autism) often exhibit excellent language, memory and technical skills. However, their lack of good social skills and understanding of social interaction often hinder their ability to function in elementary and middle school settings. Research regarding the use of technology to help children with Asperger’s syndrome or autism have just started to emerge as technology is maturing at a rapid pace. Research what technology options are available to aid children with Asperger’s syndrome or autism? Support your discussion with robust supporting evidence. Option 5: Internet Privacy We share information on the Internet everyday, through social media, blog posts, or even apps on your phone. Technology has become so ubiquitous today that we are not as concern about privacy as we used to be. A recent attack on Snapchat revealed almost all (approx. 4.6 millions) usernames and phone numbers on the Internet for anyone to download. However, the majority of Snapchat users were not worried about how such information could be used. Popular companies such as Apple, Microsoft, Google, Target (United States) and Sony have been hacked at least once in the past decade. In the most extreme case hackers obtained and sold users’ credit card details. This proves that nothing is safe on the Internet. Who can we trust our information with and
  • 5. how much information can we share? Critically discuss the assertion. Option 6: Artificial Intelligence The movie “Her” demonstrated the possibility of a complex Artificial Intelligence (A.I.) interface with human emotion. In the not too distant future our computer systems will be able to display all the characteristics of intelligence we recognise in humans. Identify existing technologies that can be used to construct “Samantha” and critically discuss if the benefits of such computer intelligence would outweigh the disadvantages. Option 7: Privilege Escalation Mobile operating systems nowadays are mostly locked-down platforms with digital rights management (DRM) where users cannot directly interact with the file system and the device’s functionalities are provided by the manufacturer in a sand- boxed environment. Privilege escalation, or more commonly known as jailbreaking, is the act of removing limitations imposed by the manufacturer, thus enabling the device to gain access to resources that are normally protected from an application or user.
  • 6. Critically discuss why an operating system should and should not be locked-down in the above context, considering the legal context. Option 8: Big Data Dr. Eric Horvitz, a computer scientist and co-director of Microsoft Research, who worked with a large urban hospital in Washington was able to use a concentration of anonymous Internet searches in the neighbourhoods in close proximity of the hospital to calculate the probabilities of cardio cases which showed up soon after. Through the use of Internet searches, Twitter feeds, or in general “Internet as a sensor”, Dr. Horvitz was also able to identify previously unpublished side eff ect of medicines and track the onset of postpartum depression among new mothers. Through the use of online information, can we better understand our behaviours, or more importantly overcome various challenges in health and diagnosis? This is one implementation of the principles of Big Data. Research how principles of Big Data are currently appl ied in one of the following fields: · Medicine · Education · Astronomy
  • 7. GETTING HELP 1. Doing Your Assignment You may find the following link useful in preparing for your assignment. See “Doing the Assignments” at http://learnline.cdu.edu.au/units/itonline/assignments.html. 2. About Essay Writing CDU Study Guide (http://learnline.cdu.edu.au/studyskills/) has a comprehensive range of study skills information. You may find the following resources useful in writing academic assignments: · Introduction to Academic Assignments
  • 8. http://learnline.cdu.edu.au/studyskills/studyskills/introacademic assignments.html · Introduction to Academic Writing http://learnline.cdu.edu.au/studyskills/studyskills/introacademic writing.html · What to Avoid in Formal Writing http://learnline.cdu.edu.au/studyskills/studyskills/aswhattoavoid .html · Strunk’s “The Elements of Style” is an old book (1918), but a good one, to check for suggestions and conventions on writing style. Some things have changed since 1918, but many of his suggestions are largely intact today. · You can find the book at http://www.crockford.com/wrrrld/style.html. Thanks to Douglas Crockford for making this available. 3. Researching The CDU Library’s Summon search (http://www.cdu.edu.au/library/) is a good way to start gathering research about your chosen topic. If you have not used Summon before please watch the video on the Summon Guide webpage (http://libguides.cdu.edu.au/summon). Alternatively, visit the CDU Library’s help on Summon: · Referencing 101 (http://libguides.cdu.edu.au/cdureferencing) · Referencing Style Guide (http://libguides.cdu.edu.au/content.php?pid=100403&sid=7537
  • 9. 58). We use CDU Harvard style for HIT164. · iResearch (http://www.library.usyd.edu.au/elearning/learn/referencing/acti vities/index.php). This is an interactive learning tool, courtesy of University of Sydney. · CDU’s Information Technology Guide (http://libguides.cdu.edu.au/IT) is very useful for finding academic quality sources via the Library. 4. Plagiarism - you will be penalised if you plagiarise your work If you have any doubt about what constitutes plagiarism, then please talk to your lecturer. You can also find more information about plagiarism at CDU Library Service (http://libguides.cdu.edu.au/content.php?pid=100403&sid=2587 885). PRESENTATION Essay should be word processed and include page numbers and student name and number in the footer. It is recommended that you check for plagiarism in your work before you submit.
  • 10. SUBMISSION GUIDELINES All students should submit via Learnline: · Word processed document only, PDF files are not accepted. · Include an assignment cover sheet with the plagiarism section signed. · Ensure that your file is labelled in the format of firstnameLastnameAssign1.doc (e.g., johnAppleseedAssign1.doc). - Note that there are no spaces or symbols in the file name.
  • 11. HIT164 COMPUTING FUNDAMENTALS Assignment 1: Research Essay Due Date: Week 7, Friday 11: 59 pm Length: 1500 words maximum (not including references) Value: 20% of the total marks for the unit TASKS 1. Research a few issues in use of IT in a discipline of current relevance. You may choose issues from any of the disciplines given in the following pages or a discipline of your choice. 2. Prepare an essay about your topic with no more than 1500
  • 12. words (excluding reference list). 3. Your topic of choice must be posted to the Discussion Board titled “Post your essay topic here” by Week 3, Friday 5pm, 4. Note that if you have not posted a topic by this time, you may be assigned a topic by your lecturer. REQUIREMENTS · The assignment should be word-processed. · It should include a reference list. · Use Harvard referencing style. · Do not include sources in the reference list that are not cited in the document. · You need to use a minimum of 10 sources and there needs to be at least 3 diff erent types (i.e., websites, book, journal article, etc.). HIT164 Computing Fundamentals TOPICS (CHOOSE ONE) Option 1: Social Media GeoCities is a web hosting service which employs the concept/metaphors of “cities” and “neighbourhood” in real - world. For example, computer-related sites are placed in “SiliconValley” and entertainment sites in “Hollywood”. GeoCities was the third-most visited website at its peak when it
  • 13. was acquired by Yahoo! in 1999. 10 years later as social media had taken over and become mainstream on the Internet, GeoCities was shutdown and deleted. However, the Internet Archive team made a backup of the site just before it was shut down to preserve the eff ort put in by around 35 million people since it started. The resulting 650GB archive was published online as a remembrance of the glorious days of GeoCities. Will current social media (i.e., Facebook) eventually face the same fate? Justify your arguments with robust supporting evidence. Option 2: Li-Fi Wi-Fi is a popular networking technology that allows electronic devices to connect to the Internet wirelessly using radio frequency. It can be commonly seen from mobile devices to government facility. However in recent years, researchers have found a way to utilise visible light from light-emitting diodes (LEDs) to transmit data: such technology is called Li-Fi (light fidelity). Even though Li-Fi is still at its infancy, many universities and researchers are actively studying to reach its potential. Compare Wi-Fi and Li-Fi critically and discuss the advantages and disadvantages of Li-Fi. Option 3: Wearable Technology
  • 14. Google Glass is one of the first and most talked about augmented reality wearable computers in 2013. Its usage varies from personal entertainment to surgical practise. Similar to other emerging technologies, Google Glass has also received quite a few negative critical receptions, such as privacy concern. Critically discuss the pros and cons of ubiquitous wearable computing like Google Glass. Note how you would use a ubiquitous device like Google Glass. Option 4: Science & Technology Children with Asperger’s syndrome (or high functioning autism) often exhibit excellent language, memory and technical skills. However, their lack of good social skills and understanding of social interaction often hinder their ability to function in elementary and middle school settings. Research regarding the use of technology to help children with Asperger’s syndrome or autism have just started to emerge as technology is maturing at a rapid pace. Research what technology options are available to aid children with Asperger’s syndrome or autism? Support your discussion with robust supporting evidence. Option 5: Internet Privacy We share information on the Internet everyday, through social media, blog posts, or even apps on your phone. Technology has become so ubiquitous today that we are not as concern about
  • 15. privacy as we used to be. A recent attack on Snapchat revealed almost all (approx. 4.6 millions) usernames and phone numbers on the Internet for anyone to download. However, the majority of Snapchat users were not worried about how such information could be used. Popular companies such as Apple, Microsoft, Google, Target (United States) and Sony have been hacked at least once in the past decade. In the most extreme case hackers obtained and sold users’ credit card details. This proves that nothing is safe on the Internet. Who can we trust our information with and how much information can we share? Critically discuss the assertion. Option 6: Artificial Intelligence The movie “Her” demonstrated the possibility of a complex Artificial Intelligence (A.I.) interface with human emotion. In the not too distant future our computer systems will be able to display all the characteristics of intelligence we recognise in humans. Identify existing technologies that can be used to construct “Samantha” and critically discuss if the benefits of such computer intelligence would outweigh the disadvantages.
  • 16. Option 7: Privilege Escalation Mobile operating systems nowadays are mostly locked-down platforms with digital rights management (DRM) where users cannot directly interact with the file system and the device’s functionalities are provided by the manufacturer in a sand- boxed environment. Privilege escalation, or more commonly known as jailbreaking, is the act of removing limitations imposed by the manufacturer, thus enabling the device to gain access to resources that are normally protected from an application or user. Critically discuss why an operating system should and should not be locked-down in the above context, considering the legal context. Option 8: Big Data Dr. Eric Horvitz, a computer scientist and co-director of Microsoft Research, who worked with a large urban hospital in Washington was able to use a concentration of anonymous Internet searches in the neighbourhoods in close proximity of the hospital to calculate the probabilities of cardio cases which showed up soon after. Through the use of Internet searches, Twitter feeds, or in general “Internet as a sensor”, Dr. Horvitz was also able to identify previously unpublished side eff ect of medicines and track the onset of postpartum depression among new mothers. Through the use of online information, can we better understand our behaviours, or more importantly overcome various
  • 17. challenges in health and diagnosis? This is one implementation of the principles of Big Data. Research how principles of Big Data are currently applied in one of the following fields: · Medicine · Education · Astronomy GETTING HELP 1. Doing Your Assignment You may find the following link useful in preparing for your assignment. See “Doing the Assignments” at http://learnline.cdu.edu.au/units/itonline/assignments.html.
  • 18. 2. About Essay Writing CDU Study Guide (http://learnline.cdu.edu.au/studyskills/) has a comprehensive range of study skills information. You may find the following resources useful in writing academic assignments: · Introduction to Academic Assignments http://learnline.cdu.edu.au/studyskills/studyskills/introacademic assignments.html · Introduction to Academic Writing http://learnline.cdu.edu.au/studyskills/studyskills/introacademic writing.html · What to Avoid in Formal Writing http://learnline.cdu.edu.au/studyskills/studyskills/aswhattoavoid .html · Strunk’s “The Elements of Style” is an old book (1918), but a good one, to check for suggestions and conventions on writing style. Some things have changed since 1918, but many of his suggestions are largely intact today. · You can find the book at http://www.crockford.com/wrrrld/style.html. Thanks to Douglas Crockford for making this available. 3. Researching
  • 19. The CDU Library’s Summon search (http://www.cdu.edu.au/library/) is a good way to start gathering research about your chosen topic. If you have not used Summon before please watch the video on the Summon Guide webpage (http://libguides.cdu.edu.au/summon). Alternatively, visit the CDU Library’s help on Summon: · Referencing 101 (http://libguides.cdu.edu.au/cdureferencing) · Referencing Style Guide (http://libguides.cdu.edu.au/content.php?pid=100403&sid=7537 58). We use CDU Harvard style for HIT164. · iResearch (http://www.library.usyd.edu.au/elearning/learn/referencing/acti vities/index.php). This is an interactive learning tool, courtesy of University of Sydney. · CDU’s Information Technology Guide (http://libguides.cdu.edu.au/IT) is very useful for finding academic quality sources via the Library. 4. Plagiarism - you will be penalised if you plagiarise your work If you have any doubt about what constitutes plagiarism, then please talk to your lecturer. You can also find more information about plagiarism at CDU Library Service (http://libguides.cdu.edu.au/content.php?pid=100403&sid=2587
  • 20. 885). PRESENTATION Essay should be word processed and include page numbers and student name and number in the footer. It is recommended that you check for plagiarism in your work before you submit. SUBMISSION GUIDELINES All students should submit via Learnline: · Word processed document only, PDF files are not accepted. · Include an assignment cover sheet with the plagiarism section signed. · Ensure that your file is labelled in the format of firstnameLastnameAssign1.doc (e.g., johnAppleseedAssign1.doc). - Note that there are no spaces or symbols in the file name.