1. Trang chủ
  2. » Luận Văn - Báo Cáo

higher nationals in computing unit 13 computing research project

20 1 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Computing Research Project
Tác giả Tran Quoc Phat
Người hướng dẫn Vo Ngoc Mai
Trường học Greenwich University
Chuyên ngành Computing
Thể loại assignment
Năm xuất bản 2021 - 2022
Thành phố Hanoi
Định dạng
Số trang 20
Dung lượng 2,15 MB

Nội dung

Here are some suggestions which you can put in the report: • Project’s proposal, the research processsequential example how it helped you completed your research • Reflection on the meri

Trang 1

Higher Nationals in Computing

Unit 13

Computing Research Project

Assignment No.2

Learner’s name: Tran Quoc Phat

Assessor name: Vo Ngoc Mai

Class: GCS0901B

Learner’s ID: GCS190878

Subject’s ID: 1639

Trang 2

ASSIGNMENT 2 FRONT SHEET Qualification BTEC Level 5 HND Diploma in Computing

Unit number and title Unit 13:Computing Research Project

Submission date 17/08/2022 Date Received 1st submission

Student declaration

I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism I understand th making a false declaration is a form of malpractice

Grading grid

Trang 3

Page | 3

Summative Feedback: Resubmission Feedback:

Internal Verifier’s Comments:

Signature & Date:

Trang 4

ASSIGNMENT 2 BRIEF Qualification BTEC Level 5 HND Diploma in Computing

Unit number UNIT 13: Computing Research Project

Assignment title Doing reflection on your project

Academic Year 2021 – 2022

Unit Tutor Vo Ngoc Mai

IV name and date

Submission Format:

Format: The submission is in the form of 1 document

You must use font Calibri size 12, set number of the pages and use multiple line spacing at 1.3 Margins must be: left: 1.25 cm; right: 1 cm; top: 1 cm and bottom: 1 cm The reference follows Harvard referencing system

Submission Students are compulsory to submit the assignment in due date and in a way requested by the Tutors The form of submission will be a soft copy posted on

http://cms.greenwich.edu.vn/

Note: The Assignment must be your own work, and not copied by or from another student or from books etc If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you must reference your sources, using the Harvard style Make sure that you know how to reference properly, and that understand the guidelines on plagiarism If you do not, you definitely get failed

Unit Learning Outcomes:

LO4 Reflect on the application of research methodologies and concepts

Assignment Brief and Guidance:

Scenario

Trang 5

Page | 5

As you have completed your research project now it is time to look back and learn some lessons from your work

You need to prepare a report to describe your personal development Remember to write your own experience, thoughts and it is specific to YOU NOT explaining the general concepts

Here are some suggestions which you can put in the report:

• Project’s proposal, the research process(sequential example) how it helped you completed your research

• Reflection on the merits, limitations and potential pitfalls of the chosen methods: examples qualitative research, secondary research; the relationship between the two in your research

• The roles of Literature review in your project

• How did you create project plan and how often you did you update it Why you need you need to update the plan

• How often did you meet the tutor and how the tutor helped you to create more effective research

• How did you choose participations(sample types, sizes) and the importance of it?

• How did you present your research result?

• Consider other research approach and improvements in future research

• &

P6: All or most previous questions are answered

I. Reflect on the effectiveness of research methods

1 Project’s proposal

- Mention which process you applied (spiral? Onion? ) to your research

- What did you get in each step of that process? This needs to be detailed

- What difficulties did you encounter in each of those steps? how to solve?

- Conclusion

2 Merits, limitations and potential pitfalls of the chosen methods

- Mention which method you applied to your research

- What difficulties did you encounter? how to solve?

- Conclusion

3 Roles of Literature review in your project

- Mention from your experience in the research

4 Project plan

Answer the questions:

• How did you create project plan and how often you did you update it Why you need you need

to update the plan

5 Tutor support

Answer the questions:

• How often did you meet the tutor and how the tutor helped you to create more effective research

6 Population

Answer the questions:

• How did you choose participations(sample types, sizes) and the importance of it?

7 Summary

Answer the question:

How did you present your research result?

P7: Mistakes, lessons learnt, improvements will have in future researches

II. Consider alternative research methodologies and lessons learnt

- Summary all mistakes you faced

- List out lessons learned/ solutions for them

Trang 6

- Intro alternatives methodologies

- Suggest improvements to future researches

M4: Discussed all previous concerns in a logical way, with good evidence

D4: Critically discuss all previous concerns and recommend changes in research process(from creating

research proposal to conclusion after primary research), planning, carry out primary research in as systematic way Suggesting different research process which may work out

Learning Outcomes and Assessment Criteria

LO4 Reflect on the application of research methodologies and concepts

D3 Demonstrate reflection and

engagement in the resource process leading to recommended actions for future improvement

P6 Reflect on the effectiveness of

research methods applied for meeting

objectives of the computing research

project.

P7 Consider alternative research

methodologies and lessons learnt in

view of the outcomes

M4 Provide critical reflection and insight that results in recommended Actions for improvements and future research considerations

Trang 7

Page | 7

Table of Contents

I Reflect on the effectiveness of research methods applied for meeting objectives of the

computing research project (P6) 8

1 Introduction 8

2 Main objectives of the project on computer security 8

3 Research methods 9

3.1 Secondary research 9

3.2 Qualitative research 11

3.3 Quantitative research 11

4 Explanation 12

5 Conclusion 14

II Consider alternative research methodologies and lessons learnt in view of the outcomes (P7) 15

1 Mistakes during your research process 15

2 Drawn from the research topic 15

3 Improvement points 17

4 Alternative research methodologies for research topic 18

4.1 Advantages of Primary Research: 18

4.2 Disadvantages of Primary Research 18

5 Conclusion 19

III References 19

Table of Figures: Figure 1 Secondary research 13

Figure 2 Quantitative research 1 13

Figure 3 Quantitative research 2 14

Figure 4 McAfee Antivirus Plus 15

Figure 5 Trend Micro Antivirus+ Security 16

Figure 6 Malwarebytes Premium 16

Figure 7 Sophos Home Premium 17

Trang 8

I Reflect on the effectiveness of research methods applied for meeting objectives of the computing research project (P6)

1 Introduction

With the extraordinary headway of Internet innovation over the most recent couple of many years, the refinement of exploits and consequently dangers to PC frameworks has likewise expanded Abuse is performed by noxious programmers who track down weaknesses or shortcomings, which are underlying blunders in the security settings in the

PC framework Normal kinds of weaknesses are mistakes in the plan or setup of organization framework, conventions, media, working frameworks, electronic applications and administrations, information bases, and that's only the tip of the iceberg The endeavor when fruitful prompts security assaults on the PC framework In this way, a danger is a potential peril brought about by a framework weakness, while an assault is an endeavor to play out an unapproved or unsafe activity

Acknowledgment of a danger is regularly inconvenient and is alluded to as an assault Here

we will show the application that our group does to upgrade the infections that attack your

PC

2 Main objectives of the project on computer security

Objective 1: Help keep data safe in the best way

Gatecrashers can't get in where they ought to be - outside of your organization By raising a virtual "divider" against approaching and active traffic, the firewall decides to permit or hinder specific traffic to go through Firewalls and hostile to infection programming are a decent establishment for building your organization's security and making your PC more secure

Objective 2: Do not let others infiltrate your computer

Programmers wrongfully access gadgets or sites to take individuals' very own data, which they use to carry out violations like burglary Many individuals shop, bank and take care of bills on the web Individuals additionally store monetary data, similar to Mastercard numbers or financial balances, on their gadgets A programmer can cause a ton of harm regardless of whether just one record or gadget is compromised To exacerbate the situation, programmers are hard to forestall as they are frequently situated outside of the United States and utilize cutting edge innovation to dodge law implementation and acquire

a lot of information Install Install hostile to infection and against malware programming In case you don't have security programming, introduce firewalls and against infection programming and stay up with the latest There are numerous respectable items that are presented free of charge or have a free time for testing These projects assist with distinguishing the most recent dangers and permit clients to eliminate malware from their gadgets Do your exploration prior to introducing any program and be keeping watch for tricks that stunt you into uncovering your own data or direct you to download programs that might contain malware

Trang 9

Page | 9

Objective 3: Protect your computer away from viruses, computer worms that slow down your computer's performance

Today we use web associated gadgets in all parts of our lives We go online to track down data, shop, bank, do schoolwork, mess around, and keep in contact with loved ones through web-based media Therefore, our gadgets contain a ton of individual data about us This might incorporate banking and other monetary records, and clinical data — data that we need to ensure In the event that your gadget isn't ensured, character criminals and other fraudsters can access and take your own data Spammers can utilize your PC as a "zombie drone" to send spam that resembles it's coming from you Infections or pernicious spyware can be shipped off your PC, dialing it back or obliterating records By utilizing wellbeing measures and great practices to ensure your gadgets, you can secure your and your family's security by introducing a firewall, work area assurance application right on your gadget to ensure your own data in the most ideal way

3 Research methods

3.1 Secondary research

❖ Definition:

Secondary research or desk research is a research method that involves using already existing data Existing data is summarized and collated to increase the overall effectiveness

of research Secondary research includes research material published in research reports and similar documents These documents can be made available by public libraries, websites, data obtained from already filled in surveys etc Some government and non-government agencies also store data, that can be used for research purposes and can be retrieved from them Secondary research is much more cost-effective than primary research, as it makes use of already existing data, unlike primary research where data is collected first hand by organizations or businesses or they can employ a third party to collect data on their behalf

Trang 10

❖ Examples:

- Data available on the internet

- Government and non-government agencies Public libraries

- Educational Institutions Commercial information sources

❖ Advantages of Secondary research:

Most information in this research is readily available There are many sources from which relevant data can be collected and used, unlike primary research, where data needs to collect from scratch

This is a less expensive and less time-consuming process as data required is easily available and doesn’t cost much if extracted from authentic sources A minimum expenditure is associated to obtain data

The data that is collected through secondary research, gives organizations or businesses an idea about the effectiveness of primary research Hence, organizations or businesses can form a hypothesis and evaluate cost of conducting primary research

Secondary research is quicker to conduct because of availability of data It can be completed within a few weeks depending on the objective of businesses or scale of data needed

❖ Disadvantages of Secondary research:

Although data is readily available, credibility evaluation must be performed to understand the authenticity of the information available

Not all secondary data resources offer the latest reports and statistics Even when the data

is accurate, it may not be updated enough to accommodate recent timelines

Secondary research derives its conclusion from collective primary research data The success

of your research will depend, to a greater extent, on the quality of research already conducted by primary research

Trang 11

Page | 11

3.2 Qualitative research

❖ Definition:

Qualitative research is defined as a market research method that focuses on obtaining data through open- ended and conversational communication This method is not only about

<what= people think but also <why= they think so For example, consider a convenience store looking to improve its patronage A systematic observation concludes that the number

of men visiting this store are more One good method to determine why women were not visiting the store is to conduct an in-depth interview of potential customers in the category

❖ Examples:

- One-on-one interview Focus groups

- Ethnographic research Case study research

- Record keeping Process of observation

3.3 Quantitative research

Quantitative research is defined as a systematic investigation of phenomena by gathering quantifiable data and performing statistical, mathematical, or computational techniques Quantitative research collects information from existing and potential customers using sampling methods and sending out online surveys, online polls, questionnaires, etc., the results of which can be depicted in the form of numerical After careful understanding of these numbers to predict the future of a product or service and make changes accordingly

Trang 12

❖ Examples:

Some examples of quantitative research are:

If any organization would like to conduct a customer satisfaction (CSAT) survey, a customer satisfaction survey template can be used Through this survey, an organization can collect quantitative data and metrics on the goodwill of the brand or organization in the mind of the customer based on multiple parameters such as product quality, pricing, customer experience, etc This data can be collected by asking a net promoter score (NPS) question, matrix table questions, etc that provide data in the form of numbers that can be analyzed and worked upon

Another example of quantitative research is an organization that conducts an event, collecting feedback from the event attendees about the value that they see from the event

By using an event survey template, the organization can collect actionable feedback about satisfaction levels of customers during various phases of the event such as the sales, pre and post-event, the likelihood of recommending the organization to their friends and colleagues, hotel preferences for the future events and other such questions

❖ Advantages of Quantitative research:

Collect reliable and accurate data: As data is collected, analyzed, and presented in numbers, the results obtained will be extremely reliable Numbers do not lie They offer an honest picture of the conducted research without discrepancies and is also extremely accurate In situations where a researcher predicts conflict, quantitative research is conducted Quick data collection: A quantitative research is carried out with a group of respondents who represent a population A survey or any other quantitative research method applied to these respondents and the involvement of statistics, conducting, and analyzing results is quite straightforward and less time- consuming

Wider scope of data analysis: Due to the statistics, this research method provides a wide scope of data collection

Eliminate bias: This research method offers no scope for personal comments or biasing of results The results achieved are numerical and are thus, fair in most cases

4 Explanation

The methods that our team used are Secondary Research With the use of secondary research methods, we were able to rely on data and user reviews about current computer security software That is also the security solution that we want to bring Thanks to that,

we were able to analyze the information we collected, and at the same time survey customers' opinions about those security software to be able to offer the best security solution for users

Ngày đăng: 06/05/2024, 15:00