6CC552 Research Project Assignment

Assignment Help Computer Network Security
Reference no: EM132666656

6CC552 Research Project - University of Derby

Learning Outcome 1: Define a research or practical project that tackles a given problem.

Learning Outcome 2: Select an appropriate methodology to undertake the project

Learning Outcome 3: Conduct an independent enquiry or practical activity that successfully meets the aims of the project.

Learning Outcome 4: Critically evaluate the findings and impact of the project.

Topic to write is cloud computing - 'benefits and disbenefit'

In this part of the module, you will complete and submit a ‘Project Fundamentals Form'. This will require you to:

• Specify a project title and write a description of your project (up to 300 words)

• Draft a plan for carrying out your project (up to 500 words)

• Respond to questions/activities relating to your study of the module content

• Successfully complete the ‘Ethics Application Form'.

In the case that you wish to undertake a ‘Student Initiated Project' you will also be expected to complete a ‘Proposal Form' and discuss the matter with the Academic Associate (tutor).

The Research Proposal should not be more than 1500 words including references, tables and figures. The proposal should cover the following sections:

• Title

• Aim and Objectives

• Brief review of Literature

• Outline of study design and methods

• Research Ethics

• References (Harvard referencing style)

A brief note on each of the sections is provided below.

Title, aim and objectives

State the succinct title, aim and objectives of the work and provide adequate background of the research area. Avoid providing a detailed literature review. This section should also clearly identify the scope of the study.

Literature Review

Provide a brief note on the existing literature on your area of research. Critically examine the existing studies and avoid providing a descriptive analysis. Drawing from the literature review, you are expected to propose the research gap and the rationale of conducting your study. The research gap should be followed by the research questions that you propose to examine or explore. Research hypothesis and propositions should be clearly stated in this section.

Study Design and Methods

This section has two sub-parts i) Data and ii) Methodology. The former subsection should clearly state the data that will be used in conducting the research. It should also state the sampling techniques, biases and how and from where you plan to collect the data. The latter section should

report the proposed methodology that will be employed in the study. The methodology can either qualitative, quantitative or mixed methods.

This section should include a project plan including/identifying the dates and/or weeks when you wish to complete the research project. This will enable the supervisors to provide valuable and critical feedback on time, which could be implemented in improving the quality of the project.

Research and Project Reporting

Assessment details

Summary of Assessment Method: Online, self-paced and supported, this includes the following:
• Carry out your research project in a professional and timely way

• Proactively liaise with your supervisor so as to discuss progress and report developments

• Plan and write a fully referenced project report using a scholarly style of structured writing (5000 words +Appendices)

• Prepare and upload a brief video in which you summarise the work that you have undertaken, the results that you have obtained and any problems that you have encountered (video duration 3-4 minutes).

You will carry out your project and produce a final report which should consist (at least) of the following elements:

• Abstract

• Table of Contents

• Completed Student Declaration Form

• Introduction of the research project

• Comprehensive literature review

• Research methodology

• Data collected and results obtained (depending on the chosen project)

• For projects involving hardware or software development, details of the design process, implementation phase and testing should be included.

• Analysis of results. (If you have produced a program - then test cases, results and product documentation)

• Critical evaluation of results (including comparison with other relevant projects or studies)

• Conclusions and recommendations

• Bibliography/References

• Other Appendices: Copy of project proposal form, project progress sheets, example questionnaire, designs, test plans and results, tabulated or formatted data, project management plan e.g. Gantt chart. (Code listings should only be submitted in electronic form).

Attachment:- Research Project.rar

Reference no: EM132666656

Questions Cloud

Find total face value of bonds-concordant inc : Concordant Inc. wants to raise $70 million by issuing 10-year zero-coupon bonds with a yield to maturity (EAR) of 6.2%.
PFN201 Principles of Finance Assignment : PFN201 Principles of Finance Assignment Help and Solution, Khawarizmi International College - Assessment Writing Service - What challenges
Data acquisition : Research some tools that would be valuable in collecting both live memory images and images of various forms off media.
Security practitioners suggest that key iot security steps : Some security practitioners suggest that key IoT security steps. Address each of the FOUR IoT security steps listed above in terms of IoT devices.
6CC552 Research Project Assignment : 6CC552 Research Project Assignment Help and Solution, University of Derby - Assessment Writing Service - Select an appropriate methodology
Impacts culture and change management practices : Define the IT organizational structure and how the IT organizational structure impacts culture and change management practices.
Servant-leaders in their disciplines and communities : Allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making.
Introduction to blockchain and crypto-currency : Using the University Digital Library or the Google scholar website locate articles discussing Blockchain Technology or crypto-currencies.
Determine the ending capital balance for each partner : Any remaining profit will be split as follows: LL, 20 percent; CC, 40 percent; Determine the ending capital balance for each partner as of the end of each

Reviews

len2666656

10/16/2020 9:10:24 PM

two class work, the first is due on the 19th and just is 1500 words and need asap. the topic to write is cloud computing [benefits and disbenefit''

Write a Review

Computer Network Security Questions & Answers

  Design security policies for a small to medium enterprise

KIT711 - Data Network Security - design and write the security policies for a small to medium enterprise - invent a company based in the IoT

  KF7031 - Wireless Networks and Security Assignment

KF7031 - Wireless Networks and Security Assignment Help and Solution - Northumbria University, UK. Title: 802.11 WLAN data throughput and security overheads

  Show histogram of lookup delay for successfully resolved ips

CPS 470/570- Show the histogram of lookup delays for all successfully resolved IPs. Histograms are plotted by partitioning a dataset into fixed bins and counting the fraction of data in each bin.

  Discuss the current it cybersecurity policy

Current policy: Discuss the current (as per the case study) IT cybersecurity policy of DaimlerChrysler

  Turtle shell architecture

Turtle Shell Architecture, zero-byte representation, Access Control List, DNS Cache Poisoning attack, 16-pass iterative and 9-pass recursive PHP function

  Describe data link control

Describe data link control

  Analyze three enhancements that have been added to wireless

wireless networking and unified communication networks please respond to the following1.analyze three enhancements that

  How you would implement controls to secure guest-to-host

Describe how you would implement controls to secure guest-to-host interaction between the virtualized operating systems and their hypervisors.

  The relation between passwords and key size

the relation between passwords and key size. For this purpose we consider a cryptosystem where the user enters a key in the form of a password

  Dubbing was coined as a term of copying

Dubbing was coined as a term of copying media in the 1980's for all mediums. What term was a major issue during the process of continously dubbing media? Digitization cured this issue.

  Biometric authentication methods for on-line transactions

What is the weakness for Biometric authentication methods for online transactions

  Explain the cyberethics and cyberlaw

Describe DoD Dir 8570.1, the type of certifications involved and how it may/may not evolve in the future as a result of US compliance law.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd