...DCU OPEN EDUCATION LITERATURE ASSIGNMENT REPORT FORM STUDENT NAME: OVERALL GRADE FOR THIS ASSIGNMENT: SUMMARY OF PERFORMANCE TABLE Performance Components Bands (marks range as a percentage) Excellent (H1) 70-100 Very Good (H2.1) 60-69 Good (H2.2) 50-59 Fair (H3) 40-49 Weak 35-39 Poor below 35 Not applicable Attention to Task Analysis Structure Use of Sources MHRA Referencing Introduction Conclusion Standard of English Presentation This table facilitates the assessment of your performance in selected components of your assignment and is designed to alert you to general areas in your work that are strong or that need improvement. Please note that the components...
Words: 1667 - Pages: 7
...Unit 7 Portfolio Assignment Try to envision in the future what new uses for digital assistants could be developed and select an area in your life that would be affected by this development. Discuss the implications of this new technology and/or its use. While digital assistants have already found broad use, across several IoT applications, from weather to security in the home. Voice assistants have been used to integrate many IoT applications and even appliances, making operations more convenient for the user. For example, using voice commands to connect and integrate with smart TVs and even home audio systems (Ecosystem Impianti, n.d.). Digital assistants with IoT technology are significant as they facilitate devices equipped with sensors,...
Words: 567 - Pages: 3
...On comparison of the features of each handset, I found S6 Edge to be more superior overall. S6 Edge has features like Fast Charging, Ultra Power Saving mode and Wireless charging which are not in built in the case of iPhone. Customers has to pay extra for these features like they have to buy a case for wireless charging. RAM for S6 edge is 3 GB and for iPhone 6 plus it is just 1 GB. Rear camera and front camera of S6 edge is 16 MP and 5 MP respectively whereas for iPhone 6 Plus it is only 8MP and 1.2 MP. The rear cameras in the S6 Edge have wider apertures. With such superior features and given fact that S6 Edge was released in March, 2015 and iPhone 6 plus in Sep, 2014, Samsung Galaxy S6 Edge should commend more price than iPhone 6 Plus. But the respective prices on Amazon.com are $798.98 and $895 (for 64 GB, unlocked GSM smartphone). The percentage difference is 12%. This clearly highlights the strong role of Apple as a...
Words: 993 - Pages: 4
...Unit 5 Assignment Carlo L. Shaw Capella University Assessment of Addiction and Co-occurring Disorders Marifel is a 19-year-old woman of Filipino decent who was in a boating accident last summer while participating in graduation celebration activities. While celebrating with boating, Marifiel’s boat hit a rock and she lost control, seriously injuring herself and killing one of her friends. As a result, Marifel had to be treated for her injuries and she was given opiates to help control her pain. The opiates worked beyond Marifel’s prescribed treatment and helped to ease the psychological pain of her friend’s death. The orients helped her to act the way she did beyond her accident, psychologically. However,...
Words: 2705 - Pages: 11
... I’m primarily interested in developing software: it’s a broad field and is constantly increasing in importance as hardware gets faster and it becomes possible to do more. My interest developed over time, but really took off freshman year, when I got an excuse to start a real project and develop a game from scratch in Intermediate Programming. Even though the game was both boring and buggy, it taught me tons of valuable things about creating software. Over the next couple of years, I worked on both my and other’s open source projects. One of my favorite projects was nre, where I worked closely with Oleh Prypin to create a string matching library. At first, I thought it’d be a fast and easy project. How hard could it be to implement “find”, “match”, and “replace”? Even though we’d been using PCRE to do the actual difficult part of matching, the project still took around 100 hours to complete. This project provided quite a bit of insight into project management: I learned to spot complexity and to constantly reevalute parts of the program to determine how to best reduce it, either by deciding that the given functionality was unnecessary and removing it completely or by finding underlying patterns that could be exploited to delete code. I learned to create extensive tests covering every corner case in order to have a quantitative measure for project correctness and completeness. I reviewed Oleh’s code for potential improvements while he reviewed mine in for the same reason...
Words: 592 - Pages: 3
...For each assessment, I provided written feedback by marking correct answers with a star, circling incorrect responses, and writing messages that address their strengths and needs. On each assessment by the student’s name, I wrote the student’s score (number of problems students answered correctly over the total possible) and the assessment evaluation score (E, S, P, or N). For feedback for student 1’s assessment, I starred each correct answer as I evaluated their work. I wrote a smiling face and “Super Circles!” next to their accurately drawn and easy to read circles. I also wrote a smiling face and “Keep up the hard work!” below their thumbs-up self-assessment. At the top of their assessment, I wrote their score of 12/12, assessment evaluation score of E, and “Great Job!” Student 1 answered all of their questions correctly, so there were no comments addressing needs or areas for improvement. The written comments and scores acknowledge the student successfully meeting the objectives. For the feedback of student 2’s assessment, I starred each correct answer as I evaluated their work. I circled the incorrect big total at the top of the Math Mountain and in the math sentence. I also wrote, “Count and check circles,” with an arrow pointing to the six drawn circles. This comment is to prompt the student into recounting the circles, change it to seven circles, and then add three circles to equal ten. On the back side, I wrote, “Nice circles!” next to the fine-drawn circles that were...
Words: 1013 - Pages: 5
...Reading The material was well presented and painless to read. This reading was done prior to the start of the course, unfortunately, there was a surprising the volume of rereading necessary as a prerequisite to doing the programming assignment, and responding to the discussion forum. Increase hands on application of the concepts should help improve my retention. To supplement my understanding I have also started reviewing the java tutorial available through Khan Academy. There also appears to be an endless source of material available on the internet. The problem will be separating the grain from the chaff. Discussion Forum It is amazing how much complexity there was associated with the operators associated with this week's discussion. Until they become second nature, it will be necessary to be particularly meticulous in their usage. The Incremental operator ++ will take time to get use to. Having been traveling internationally over the last couple of weeks, my Internet access was limited and expensive. This lead to my response being posted on Tuesday. This was rather embarrassing since the professor strongly suggested that we post early in order to benefit from any resulting discussions. In the future, discussion responses will be posted no later than Sunday. Although I reviewed many of the discussions with an eye to those with no feedback, it appears...
Words: 514 - Pages: 3
...Three factors that need to be considered in a cable installation are fire protection, possibility of water damage and protecting from EMI. Fire protection is very important so that if the building were to catch on fire the coating on the cables would not melt or at least not melt as fast. It is also smart to know where fire extinguishers are in order to possibly prevent the fire from spreading if it is not too large. It is important to consider the possibility of water damage because you do not want your servers and equipment ruined by some water that never should have touched it. In this case it is a good idea to know where water pipes run in the building so that you do not risk placing a network closet underneath a bathroom. Or right night to a bathroom for that matter. The possibility of flooding and ruining server equipment, firewall equipment, and cables by a bursting pipe or overflowing flood is just not worth it. You also want to make sure there are sprinklers but maybe not directly over your servers so that there is a possibility of saving them should they be set off for any reason. Protecting from EMI is very important so that you do not have any breaks in signal or weakened signal experiences. Making sure that your cables run perpendicular to power cables is one way to prevent EMI interference. Another way to prevent EMI is to make sure that you have shielded twisted pair cables instead of unshielded twisted pair cables. There are many things to take into consideration...
Words: 287 - Pages: 2
...with manipulatives and asked “How Many?” She is able to state the correct amount for 1, 100% of occurrences, 2, 100% of occurrences, 3, 80% of occurrences. For 4, 63% and for 5, 25%. There are times her attention gets pulled elsewhere causing her to lose the place she was counting. As the numbers get bigger, Erica has a little harder time keeping track of what number she previously hit and what number comes next. There are times when she will hit the button, but it will not work, so she will skip that number or she will touch it again. But she has already moved her finger to the next manipulative, which throws her off. When Erica is asked to identify her numbers in order without any number cards from 1-10, she...
Words: 431 - Pages: 2
...In the beginning of the lab I started by exploring both the tcpClient.c and tcpServer.c code. When I had a rough understanding of how it worked, I tried running it. This caused an error to occur. The problem was I was using Winsock sockets instead of BSD sockets. One, Winsock, is a socket creator for windows, the other BSD socket is an application programming interface for Unix. So, in order to get the application running, I simply had to change WIN to BSD sockets. Next I ran both files again and this time I got back a message from the server saying that it had received a message. Then I opened Wireshark to view what was going on between the client and server. In the top frame, I could see the handshake occurring between the client and server, the client was sending a SYN(Synchronize) and the Server was replying with a SYN-ACK, which means Synchronize acknowledgment. I also noted there was a push function occurring, and when I clicked on the psh function and viewed its output in the bottom frame of Wireshark, I could see the message that has been sent. Next I learnt about how to run the server I had created infinitely, to do this I put the entire code, starting at the #endif underneath “WSAStartup”, in a while loop. This would cause an issue later on in the lab, which I’ll discuss shortly. After putting in the code, I had to compile it again, and then when I ran it, I was able to continuously create a connection via the client. After that I wanted to have one of my classmates...
Words: 774 - Pages: 4
...Finally, we get to nuts and bolts of the attack; with the aid of the diagram below I will explain how Stuxnet achieved its goal. As already mentioned earlier in the document the Natanz nuclear facility operated an “air-gap” security perimeter making it safe from external internet based attacks. However, in the case of Stuxnet it is generally understood that the worm entered the system via the use of a USB stick. Once on the system the next step was getting the trust of the LAN within the facility, this was achieved through the use of a digital certificate contained in the worm (believed to be stolen from a company called “JMicron” based in Taiwan). Engineered into the worm and proving again how complex and complete the design was when this digital certificate was discovered it instantly replaced it with another digital certificate from another company called “Realtek”. Further investigation found that Realtek was also based in Taiwan, in fact the two companies where in the same industrial park. Figure 1 - How Stuxnet Works [6] An amazing fact with respect to Stuxnet was that it contained four “Zero Day” exploits, a Zero Day is defined in Wikipedia as follows: “A zero-day (or zero-hour or day zero) attack or threat is an attack that exploits a previously unknown vulnerability in a computer application or operating system, one that developers have not had time to address and patch. It is called a "zero-day" because the programmer has had zero days to fix the flaw (in other...
Words: 654 - Pages: 3
...I continued transferring the data I gathered last Friday. I had scheduled my self that I need to finish the reports by 10:00 am to start the tasks given by Sir TJ and Ma’am Loi. Sir TJ asked me to determine the time it takes to finish the four tests in the PCM Wire bond Area 4 and Area 5. The tests included were Ball Shear Test, Wire Pull Test, Ball Access Ratio, and Loop Height. For Area 4 I had already data regarding the Ball Shear Test and the Wire Pull Test, so I just need to time the remaining two test. However, I need it would be my first time for the four tests in Area 5. Moreover, I need to identify what type of die (quad or dual) was being processed. On the other hand, ma’am Loi urgently needs the data about the length of time it takes to finish the Vacuum Dry Pack Operation in Packing Area EOL Area 5....
Words: 784 - Pages: 4
...common clock. In the proposed approach although it is considered that cluster head ( a group leader ) is non-malicious but it may be malicious. A malicious cluster head will not report exact time as which it sends reference packets to all intended receivers, i.e. it will send a false time to all receivers. This false time will be used by group members for synchronisation. Hence all group nodes will synchronise to false time. This can be overcome by fixing the initial sender node as non-malicious. The proposed approach is able to overcome from external as well as internal attacker problems is group synchronisation. The external attacks are resolved with the help of MAC message authentication codes and the use of private keys and the internal attacks is finding out on the basis of send and receive time. Fei et al [8] address water monitoring. It has to be monitored as high chemical levels can cause health problems. The authors propose a scalable, low energy, delay tolerant water quality monitoring sensor network model. It is highly variable, has a long propagation delay and mobile. The time synchronisation mechanism can achieve satisfactory timestamp accuracy. The designed a correlation based security model to detect outlier timestamp data and identify nodes generating insider attacks. The scheme can also counter measure insider attacks. It uses low cost water sensors and uses multi hop wireless transmissions to relay data until finally reaching surface stations. The tree like routing...
Words: 1335 - Pages: 6
...routing before the message is actually delivered to the application on the internet. The TTN backend implements such methods when it is placed between the gateways and the applications.\\ \begin{wrapfigure}{R}{0.5\textwidth} \centering \includegraphics[scale=0.15]{Routing-Services.png}\\ \caption{Routing-Services} \cite{LoRawan - the things network wiki_2017}. \label{fig:Routing-Services} \end{wrapfigure} The TTN backend performs the routing and processing in such a way that any interested party can set up their own network and their own part of the backend yet still utilize the core architecuter offered by the TTN backend. In order to help with the decentralization the components of the TTN backedn were split in a manner shown in the figure above. \\ End devices broadcast LoRaWAN messages over the LoRa radio protocol. These messages are then received by a number of Gateways (G) which is connected to a Router (R). The Router is responsible for managing the gateway's status and for scheduling transmissions. Each Router is connected to one or more Brokers (B). Brokers are the central part of The Things Network. Their responsibility is to map a device to an application, to forward uplink messages to the correct application and to forward downlink messages to the correct Router (which forwards them to a Gateway). The Network Server (NS) is responsible for functionality that is specific for LoRaWAN. A Handler (H) is responsible for handling the data of one...
Words: 410 - Pages: 2
...Standard 5.Rl.2 Determine a theme of a story, drama, or poem from details in text, including how characters in a story or drama respond to challenges or how the speaker in a poem reflects upon a topic; summarize the texts. ELA Compare and contrast two or more characters, setting, or events in a story or drama, drawing on specific details in the text (e.g. How characters interact). Content Objective(s) Students will be able to determine the theme, characters, events, and be able to respond to challenge in a fairy tale. Students will be able to compare and contrast the elements of a fairy tale in detail. Language Objective(s) Students will be able to verbally and write the theme of the fairy tale. Also be able to challenge the viewpoints of...
Words: 1456 - Pages: 6