6CC552 Research Project Assignment

Assignment Help Computer Network Security
Reference no: EM132666656

6CC552 Research Project - University of Derby

Learning Outcome 1: Define a research or practical project that tackles a given problem.

Learning Outcome 2: Select an appropriate methodology to undertake the project

Learning Outcome 3: Conduct an independent enquiry or practical activity that successfully meets the aims of the project.

Learning Outcome 4: Critically evaluate the findings and impact of the project.

Topic to write is cloud computing - 'benefits and disbenefit'

In this part of the module, you will complete and submit a ‘Project Fundamentals Form'. This will require you to:

• Specify a project title and write a description of your project (up to 300 words)

• Draft a plan for carrying out your project (up to 500 words)

• Respond to questions/activities relating to your study of the module content

• Successfully complete the ‘Ethics Application Form'.

In the case that you wish to undertake a ‘Student Initiated Project' you will also be expected to complete a ‘Proposal Form' and discuss the matter with the Academic Associate (tutor).

The Research Proposal should not be more than 1500 words including references, tables and figures. The proposal should cover the following sections:

• Title

• Aim and Objectives

• Brief review of Literature

• Outline of study design and methods

• Research Ethics

• References (Harvard referencing style)

A brief note on each of the sections is provided below.

Title, aim and objectives

State the succinct title, aim and objectives of the work and provide adequate background of the research area. Avoid providing a detailed literature review. This section should also clearly identify the scope of the study.

Literature Review

Provide a brief note on the existing literature on your area of research. Critically examine the existing studies and avoid providing a descriptive analysis. Drawing from the literature review, you are expected to propose the research gap and the rationale of conducting your study. The research gap should be followed by the research questions that you propose to examine or explore. Research hypothesis and propositions should be clearly stated in this section.

Study Design and Methods

This section has two sub-parts i) Data and ii) Methodology. The former subsection should clearly state the data that will be used in conducting the research. It should also state the sampling techniques, biases and how and from where you plan to collect the data. The latter section should

report the proposed methodology that will be employed in the study. The methodology can either qualitative, quantitative or mixed methods.

This section should include a project plan including/identifying the dates and/or weeks when you wish to complete the research project. This will enable the supervisors to provide valuable and critical feedback on time, which could be implemented in improving the quality of the project.

Research and Project Reporting

Assessment details

Summary of Assessment Method: Online, self-paced and supported, this includes the following:
• Carry out your research project in a professional and timely way

• Proactively liaise with your supervisor so as to discuss progress and report developments

• Plan and write a fully referenced project report using a scholarly style of structured writing (5000 words +Appendices)

• Prepare and upload a brief video in which you summarise the work that you have undertaken, the results that you have obtained and any problems that you have encountered (video duration 3-4 minutes).

You will carry out your project and produce a final report which should consist (at least) of the following elements:

• Abstract

• Table of Contents

• Completed Student Declaration Form

• Introduction of the research project

• Comprehensive literature review

• Research methodology

• Data collected and results obtained (depending on the chosen project)

• For projects involving hardware or software development, details of the design process, implementation phase and testing should be included.

• Analysis of results. (If you have produced a program - then test cases, results and product documentation)

• Critical evaluation of results (including comparison with other relevant projects or studies)

• Conclusions and recommendations

• Bibliography/References

• Other Appendices: Copy of project proposal form, project progress sheets, example questionnaire, designs, test plans and results, tabulated or formatted data, project management plan e.g. Gantt chart. (Code listings should only be submitted in electronic form).

Attachment:- Research Project.rar

Reference no: EM132666656

Questions Cloud

Find total face value of bonds-concordant inc : Concordant Inc. wants to raise $70 million by issuing 10-year zero-coupon bonds with a yield to maturity (EAR) of 6.2%.
PFN201 Principles of Finance Assignment : PFN201 Principles of Finance Assignment Help and Solution, Khawarizmi International College - Assessment Writing Service - What challenges
Data acquisition : Research some tools that would be valuable in collecting both live memory images and images of various forms off media.
Security practitioners suggest that key iot security steps : Some security practitioners suggest that key IoT security steps. Address each of the FOUR IoT security steps listed above in terms of IoT devices.
6CC552 Research Project Assignment : 6CC552 Research Project Assignment Help and Solution, University of Derby - Assessment Writing Service - Select an appropriate methodology
Impacts culture and change management practices : Define the IT organizational structure and how the IT organizational structure impacts culture and change management practices.
Servant-leaders in their disciplines and communities : Allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making.
Introduction to blockchain and crypto-currency : Using the University Digital Library or the Google scholar website locate articles discussing Blockchain Technology or crypto-currencies.
Determine the ending capital balance for each partner : Any remaining profit will be split as follows: LL, 20 percent; CC, 40 percent; Determine the ending capital balance for each partner as of the end of each

Reviews

len2666656

10/16/2020 9:10:24 PM

two class work, the first is due on the 19th and just is 1500 words and need asap. the topic to write is cloud computing [benefits and disbenefit''

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd