Here are some suggestions which you can put in the report: • Project’s proposal, the research processsequential example how it helped you completed your research • Reflection on the meri
Trang 1
Higher Nationals in Computing
Unit 13
Computing Research Project
Assignment No.2
Learner’s name: Tran Quoc Phat
Assessor name: Vo Ngoc Mai
Class: GCS0901B
Learner’s ID: GCS190878
Subject’s ID: 1639
Trang 2ASSIGNMENT 2 FRONT SHEET Qualification BTEC Level 5 HND Diploma in Computing
Unit number and title Unit 13:Computing Research Project
Submission date 17/08/2022 Date Received 1st submission
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism I understand th making a false declaration is a form of malpractice
Grading grid
Trang 3Page | 3
Summative Feedback: Resubmission Feedback:
Internal Verifier’s Comments:
Signature & Date:
Trang 4ASSIGNMENT 2 BRIEF Qualification BTEC Level 5 HND Diploma in Computing
Unit number UNIT 13: Computing Research Project
Assignment title Doing reflection on your project
Academic Year 2021 – 2022
Unit Tutor Vo Ngoc Mai
IV name and date
Submission Format:
Format: The submission is in the form of 1 document
You must use font Calibri size 12, set number of the pages and use multiple line spacing at 1.3 Margins must be: left: 1.25 cm; right: 1 cm; top: 1 cm and bottom: 1 cm The reference follows Harvard referencing system
Submission Students are compulsory to submit the assignment in due date and in a way requested by the Tutors The form of submission will be a soft copy posted on
http://cms.greenwich.edu.vn/
Note: The Assignment must be your own work, and not copied by or from another student or from books etc If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you must reference your sources, using the Harvard style Make sure that you know how to reference properly, and that understand the guidelines on plagiarism If you do not, you definitely get failed
Unit Learning Outcomes:
LO4 Reflect on the application of research methodologies and concepts
Assignment Brief and Guidance:
Scenario
Trang 5Page | 5
As you have completed your research project now it is time to look back and learn some lessons from your work
You need to prepare a report to describe your personal development Remember to write your own experience, thoughts and it is specific to YOU NOT explaining the general concepts
Here are some suggestions which you can put in the report:
• Project’s proposal, the research process(sequential example) how it helped you completed your research
• Reflection on the merits, limitations and potential pitfalls of the chosen methods: examples qualitative research, secondary research; the relationship between the two in your research
• The roles of Literature review in your project
• How did you create project plan and how often you did you update it Why you need you need to update the plan
• How often did you meet the tutor and how the tutor helped you to create more effective research
• How did you choose participations(sample types, sizes) and the importance of it?
• How did you present your research result?
• Consider other research approach and improvements in future research
• &
P6: All or most previous questions are answered
I. Reflect on the effectiveness of research methods
1 Project’s proposal
- Mention which process you applied (spiral? Onion? ) to your research
- What did you get in each step of that process? This needs to be detailed
- What difficulties did you encounter in each of those steps? how to solve?
- Conclusion
2 Merits, limitations and potential pitfalls of the chosen methods
- Mention which method you applied to your research
- What difficulties did you encounter? how to solve?
- Conclusion
3 Roles of Literature review in your project
- Mention from your experience in the research
4 Project plan
Answer the questions:
• How did you create project plan and how often you did you update it Why you need you need
to update the plan
5 Tutor support
Answer the questions:
• How often did you meet the tutor and how the tutor helped you to create more effective research
6 Population
Answer the questions:
• How did you choose participations(sample types, sizes) and the importance of it?
7 Summary
Answer the question:
How did you present your research result?
P7: Mistakes, lessons learnt, improvements will have in future researches
II. Consider alternative research methodologies and lessons learnt
- Summary all mistakes you faced
- List out lessons learned/ solutions for them
Trang 6- Intro alternatives methodologies
- Suggest improvements to future researches
M4: Discussed all previous concerns in a logical way, with good evidence
D4: Critically discuss all previous concerns and recommend changes in research process(from creating
research proposal to conclusion after primary research), planning, carry out primary research in as systematic way Suggesting different research process which may work out
Learning Outcomes and Assessment Criteria
LO4 Reflect on the application of research methodologies and concepts
D3 Demonstrate reflection and
engagement in the resource process leading to recommended actions for future improvement
P6 Reflect on the effectiveness of
research methods applied for meeting
objectives of the computing research
project.
P7 Consider alternative research
methodologies and lessons learnt in
view of the outcomes
M4 Provide critical reflection and insight that results in recommended Actions for improvements and future research considerations
Trang 7Page | 7
Table of Contents
I Reflect on the effectiveness of research methods applied for meeting objectives of the
computing research project (P6) 8
1 Introduction 8
2 Main objectives of the project on computer security 8
3 Research methods 9
3.1 Secondary research 9
3.2 Qualitative research 11
3.3 Quantitative research 11
4 Explanation 12
5 Conclusion 14
II Consider alternative research methodologies and lessons learnt in view of the outcomes (P7) 15
1 Mistakes during your research process 15
2 Drawn from the research topic 15
3 Improvement points 17
4 Alternative research methodologies for research topic 18
4.1 Advantages of Primary Research: 18
4.2 Disadvantages of Primary Research 18
5 Conclusion 19
III References 19
Table of Figures: Figure 1 Secondary research 13
Figure 2 Quantitative research 1 13
Figure 3 Quantitative research 2 14
Figure 4 McAfee Antivirus Plus 15
Figure 5 Trend Micro Antivirus+ Security 16
Figure 6 Malwarebytes Premium 16
Figure 7 Sophos Home Premium 17
Trang 8I Reflect on the effectiveness of research methods applied for meeting objectives of the computing research project (P6)
1 Introduction
With the extraordinary headway of Internet innovation over the most recent couple of many years, the refinement of exploits and consequently dangers to PC frameworks has likewise expanded Abuse is performed by noxious programmers who track down weaknesses or shortcomings, which are underlying blunders in the security settings in the
PC framework Normal kinds of weaknesses are mistakes in the plan or setup of organization framework, conventions, media, working frameworks, electronic applications and administrations, information bases, and that's only the tip of the iceberg The endeavor when fruitful prompts security assaults on the PC framework In this way, a danger is a potential peril brought about by a framework weakness, while an assault is an endeavor to play out an unapproved or unsafe activity
Acknowledgment of a danger is regularly inconvenient and is alluded to as an assault Here
we will show the application that our group does to upgrade the infections that attack your
PC
2 Main objectives of the project on computer security
Objective 1: Help keep data safe in the best way
Gatecrashers can't get in where they ought to be - outside of your organization By raising a virtual "divider" against approaching and active traffic, the firewall decides to permit or hinder specific traffic to go through Firewalls and hostile to infection programming are a decent establishment for building your organization's security and making your PC more secure
Objective 2: Do not let others infiltrate your computer
Programmers wrongfully access gadgets or sites to take individuals' very own data, which they use to carry out violations like burglary Many individuals shop, bank and take care of bills on the web Individuals additionally store monetary data, similar to Mastercard numbers or financial balances, on their gadgets A programmer can cause a ton of harm regardless of whether just one record or gadget is compromised To exacerbate the situation, programmers are hard to forestall as they are frequently situated outside of the United States and utilize cutting edge innovation to dodge law implementation and acquire
a lot of information Install Install hostile to infection and against malware programming In case you don't have security programming, introduce firewalls and against infection programming and stay up with the latest There are numerous respectable items that are presented free of charge or have a free time for testing These projects assist with distinguishing the most recent dangers and permit clients to eliminate malware from their gadgets Do your exploration prior to introducing any program and be keeping watch for tricks that stunt you into uncovering your own data or direct you to download programs that might contain malware
Trang 9Page | 9
Objective 3: Protect your computer away from viruses, computer worms that slow down your computer's performance
Today we use web associated gadgets in all parts of our lives We go online to track down data, shop, bank, do schoolwork, mess around, and keep in contact with loved ones through web-based media Therefore, our gadgets contain a ton of individual data about us This might incorporate banking and other monetary records, and clinical data — data that we need to ensure In the event that your gadget isn't ensured, character criminals and other fraudsters can access and take your own data Spammers can utilize your PC as a "zombie drone" to send spam that resembles it's coming from you Infections or pernicious spyware can be shipped off your PC, dialing it back or obliterating records By utilizing wellbeing measures and great practices to ensure your gadgets, you can secure your and your family's security by introducing a firewall, work area assurance application right on your gadget to ensure your own data in the most ideal way
3 Research methods
3.1 Secondary research
❖ Definition:
Secondary research or desk research is a research method that involves using already existing data Existing data is summarized and collated to increase the overall effectiveness
of research Secondary research includes research material published in research reports and similar documents These documents can be made available by public libraries, websites, data obtained from already filled in surveys etc Some government and non-government agencies also store data, that can be used for research purposes and can be retrieved from them Secondary research is much more cost-effective than primary research, as it makes use of already existing data, unlike primary research where data is collected first hand by organizations or businesses or they can employ a third party to collect data on their behalf
Trang 10❖ Examples:
- Data available on the internet
- Government and non-government agencies Public libraries
- Educational Institutions Commercial information sources
❖ Advantages of Secondary research:
Most information in this research is readily available There are many sources from which relevant data can be collected and used, unlike primary research, where data needs to collect from scratch
This is a less expensive and less time-consuming process as data required is easily available and doesn’t cost much if extracted from authentic sources A minimum expenditure is associated to obtain data
The data that is collected through secondary research, gives organizations or businesses an idea about the effectiveness of primary research Hence, organizations or businesses can form a hypothesis and evaluate cost of conducting primary research
Secondary research is quicker to conduct because of availability of data It can be completed within a few weeks depending on the objective of businesses or scale of data needed
❖ Disadvantages of Secondary research:
Although data is readily available, credibility evaluation must be performed to understand the authenticity of the information available
Not all secondary data resources offer the latest reports and statistics Even when the data
is accurate, it may not be updated enough to accommodate recent timelines
Secondary research derives its conclusion from collective primary research data The success
of your research will depend, to a greater extent, on the quality of research already conducted by primary research
Trang 11Page | 11
3.2 Qualitative research
❖ Definition:
Qualitative research is defined as a market research method that focuses on obtaining data through open- ended and conversational communication This method is not only about
<what= people think but also <why= they think so For example, consider a convenience store looking to improve its patronage A systematic observation concludes that the number
of men visiting this store are more One good method to determine why women were not visiting the store is to conduct an in-depth interview of potential customers in the category
❖ Examples:
- One-on-one interview Focus groups
- Ethnographic research Case study research
- Record keeping Process of observation
3.3 Quantitative research
Quantitative research is defined as a systematic investigation of phenomena by gathering quantifiable data and performing statistical, mathematical, or computational techniques Quantitative research collects information from existing and potential customers using sampling methods and sending out online surveys, online polls, questionnaires, etc., the results of which can be depicted in the form of numerical After careful understanding of these numbers to predict the future of a product or service and make changes accordingly
Trang 12❖ Examples:
Some examples of quantitative research are:
If any organization would like to conduct a customer satisfaction (CSAT) survey, a customer satisfaction survey template can be used Through this survey, an organization can collect quantitative data and metrics on the goodwill of the brand or organization in the mind of the customer based on multiple parameters such as product quality, pricing, customer experience, etc This data can be collected by asking a net promoter score (NPS) question, matrix table questions, etc that provide data in the form of numbers that can be analyzed and worked upon
Another example of quantitative research is an organization that conducts an event, collecting feedback from the event attendees about the value that they see from the event
By using an event survey template, the organization can collect actionable feedback about satisfaction levels of customers during various phases of the event such as the sales, pre and post-event, the likelihood of recommending the organization to their friends and colleagues, hotel preferences for the future events and other such questions
❖ Advantages of Quantitative research:
Collect reliable and accurate data: As data is collected, analyzed, and presented in numbers, the results obtained will be extremely reliable Numbers do not lie They offer an honest picture of the conducted research without discrepancies and is also extremely accurate In situations where a researcher predicts conflict, quantitative research is conducted Quick data collection: A quantitative research is carried out with a group of respondents who represent a population A survey or any other quantitative research method applied to these respondents and the involvement of statistics, conducting, and analyzing results is quite straightforward and less time- consuming
Wider scope of data analysis: Due to the statistics, this research method provides a wide scope of data collection
Eliminate bias: This research method offers no scope for personal comments or biasing of results The results achieved are numerical and are thus, fair in most cases
4 Explanation
The methods that our team used are Secondary Research With the use of secondary research methods, we were able to rely on data and user reviews about current computer security software That is also the security solution that we want to bring Thanks to that,
we were able to analyze the information we collected, and at the same time survey customers' opinions about those security software to be able to offer the best security solution for users