You are on page 1of 18

BTEC FPT INTERNATIONAL COLLEGE

INFORMATION TECHNOLOGY
ASSIGNMENT 1
UNIT: …..

STUDENT : NGUYEN VAN A


CLASS : SE06101
STUDENT ID : BD00192
SUPERVISOR : NGUYEN HOANG ANH VU
Da Nang, … 20..
ASSIGNMENT 1 FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number and title Unit: ….

Date received (1st


Submission date
submission)

Date received (2nd


Re-submission date
submission)

Student name Nguyen Van A Student ID BD00192

Class SE06101 Assessor name

Student declaration

I certify that the assignment submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of malpractice.

Student’s signature:

Grading grid

P1 P2 P3 P4 M1 M2 D1 D2
❒Summative Feedbacks: ❒Resubmission Feedbacks:

Grade: Assessor Signature: Date:


Internal Verifier’s Comments:

Signature & Date:

1
TABLE OF CONTENT

INSTRUCTOR/ SUPERVISOR/ ASSESSOR..................................................................................i

REVIEWERS..............................................................................................................................iv

ACKNOWLEDGMENTS............................................................................................................vii

ASSURANCE...........................................................................................................................viii

TABLE OF CONTENT.................................................................................................................ix

LIST OF TABLES AND FIGURES.................................................................................................xi

LIST OF ACRONYM..................................................................................................................xii

INTRODUCTION........................................................................................................................1

CHAPTER 1 BASIC KNOWLEDGE.......................................................................................2

1.1 Provide a definition of what an algorithm is and outline the process in building an
application (P1).................................................................................................................................2

1.1.1 Expressing algorithms..........................................................................................3

1.1.2 Criteria to create a good algorithm.....................................................................3

1.1.3 Aaaaa...................................................................................................................3

1.2 Determine the steps taken from writing code to execution. (M1)............................3

1.2.1 Đasa.....................................................................................................................3

1.2.2 Xxxx......................................................................................................................3

1.2.3 Sadsadsadsa.........................................................................................................3

CHAPTER 2 Xxxx...............................................................................................................4

2.1 Give explanations of what procedural, object-oriented and event-driven paradigms


are; their characteristics and the relationship between them. (P2)................................................4

2.2 Analyse the common features that a developer has access to in an IDE. (M2).........4

CHAPTER 3 Sdsad asd sad................................................................................................5

3.1 Write a program that implements an algorithm using an IDE. (P3)...........................5


2
3.2 Use the IDE to manage the development process of the program. (M3)..................5

3.3 Explain the debugging process and explain the debugging facilities available in the
IDE. (P4) 5

3.4 Outline the coding standard you have used in your code. (P5).................................6

CONCLUSION............................................................................................................................7

REFERENCES.............................................................................................................................8

3
LIST OF TABLES AND FIGURES

Table 1-1: gfdgfdgfdgfd 2

Figure 1-1: abx - ssss 2

Figure 2-1: Figure of chapter 2 4

Figure 3-1: Figure of chapter 3 5

4
LIST OF ACRONYM

ACL Access Control List

ADSL Asymmetric Digital Subscriber Line

ARCNET Attached Resource Computer Network

ARP Address Resolution Protocol

Bit Binary Digit

DHCP Dynamic Host Configuration Protocol

DHCS Dynamic Host Configuration Server

DNS Domain Name System

5
INTRODUCTION

The network has importance for human life and at least for modern life. It can be easily
seen everywhere and from all industries, from business and science to technology and
entertainment. Therefore, if we know how to connect to the network, it will be easier to solve
network-related problems such as network firmware updates and use network protection
measures to detect, fix and deal with these problems. Problems in link and network
performance.

Finally, I will outline my lesson, thereby clearly explaining the concept of networks
and guiding us through the different types of networks and their structure, function, and
performance, as well as their interfaces-networks and how they work.

Performed Student: Võ Văn Bình 1


CHAPTER EXAMINE NETWORKING PRINCIPLES AND THEIR

PROTOCOLS. (LO1)

1. Discuss the benefits and constraints of different network types and


standards. (P1)
 Network definition A network in a laptop computer is a collection of two or
more devices or nodes that can communicate. The device or node in question
must be able to connect via hardware or wirelessly. It is essential to have a
minimum of two separate devices where they can connect.
 The scope of a network consists of a pair of individual machines or nodes that
transmit information connected to large databases and the entire world's Internet
or the most extensive network in existence. The commonality of most Internet
networks, including the smallest and the largest, is the network that enables
personal computers and users to exchange data and information. Network can:
 Communication via email, group chat, video chat, etc.
 Commonly used devices include computers and input devices.
 Documents and information can be exchanged by connecting devices in shared
hardware.
 Common-use applications can be easily implemented with the installation of
programs on computers in foreign countries.
The advantages of computer networks:
 Easy access
 Flexibility
 Easy resource sharing
 Connection
The disadvantages of computer networks:
 Undefault
 The spread of computer viruses Figure 1. 
 Developmental issues
 Low rate

Performed Student: Võ Văn Bình 2


1.1.1 Clients and Servers

 Server - A system that provides services to other systems in its network. There are file
servers, boot servers, database servers, license servers, print servers, installation

servers, and even servers for particular applications. This chapter uses the term server

to mean a system that provides file systems and installation software for other systems

on the network.

 Client - A system that uses remote services from a server. Some clients have limited
disk storage capacity, or perhaps none, and must rely on a server's remote file systems to

function.

 Other clients might use remote services (such as installation software) from a server
but don't rely on a server to work. A standalone system with its hard

disk containing the root (/), /usr, and /export/home file systems and swap space is an

excellent example of this type of client.

Advantage:

 Can help to avoid network overload


 Centralized: Centralized backup is possible in client-server networks, i.e., all the data
is stored in a server.

 Security: These networks are more secure as all the shared resources are centrally
administered.

 Performance: Using the dedicated server increases the speed of sharing


resources. This improves the performance of the overall system.

 Scalability: We can increase the number of clients and servers separately, i.e., the new
element can be added, or we can add a new node in a network at any time.

Performed Student: Võ Văn Bình 3


1.1.2 Aaaaa

Dfs sdf fd sd fsd ds d d d sd sd

1.2 Determine the steps taken from writing code to execution. (M1)

1.2.1 Đasa

Ádsadsaasdsadsadsa sad sad sad sa d

1.2.2 yyyyyyyyyyyyyyyyyyyyy

Rewrwer wer wer werwe r

1.2.3 Sadsadsadsa

ưerewrwer

Performed Student: Võ Văn Bình 4


CHAPTER 2 Xxxx

LO2 Explain the characteristics of procedural, object-oriented and event-driven


programming, conduct an analysis of a suitable Integrated Development Environment (IDE)

2.1 Give explanations of what procedural, object-oriented and event-driven


paradigms are; their characteristics and the relationship between them.
(P2)

Fdsfdsfsdf

Fsdfds

Figure 2-1: Figure of chapter 2

Sdfsd

2.2 Analyse the common features that a developer has access to in an IDE. (M2)

Dsadsadsad asd sad sad sa dsa dsa d sad sad sa dsa d sad á dsa dsa d sad sa dsa d sad

Performed Student: Võ Văn Bình 5


CHAPTER 3 Sdsad asd sad

LO3 Implement basic algorithms in code using an IDE

LO4 Determine the debugging process and explain the importance of a coding standard

3.1 Write a program that implements an algorithm using an IDE. (P3)

Sadsadsad

Ádsa

Figure 3-1: Figure of chapter 3

Dsad

3.2 Use the IDE to manage the development process of the program. (M3)

Sadsadsadsa

Đá

Sadsa

Dsa

Performed Student: Võ Văn Bình 6


3.3 Explain the debugging process and explain the debugging facilities
available in the IDE. (P4)

Ádasdsad

Sadsad

3.4 Outline the coding standard you have used in your code. (P5)

fdsfds

Performed Student: Võ Văn Bình 7


CONCLUSION

After completing this report, I have gained…..

Performed Student: Võ Văn Bình 8


CRITICAL EVALUATION

Performed Student: Võ Văn Bình 9


REFERENCES

1. Nguyễn Kim Sơn, Phạm Hùng Vân, Nguyễn Bảo Sơn và cộng sự (2010). Đột biến gen mã hóa
EGFR trong ung thư phổi. Tạp chí nghiên cứu y học, 3, 30-37.

2. Amanda B.R, Donna P.A, Robin J.L et al (2008). Total prostate specific antigen stability confirmed
after long-term storage of serum at -80C. J.Urol, 180(2), 534-538.  

Cách ghi các tài liệu tham khảo tại:

https://journal.hiu.vn/vi/cach-trich-dan-tai-lieu/cach-trich-dan-tai-lieu-tham-khao

Performed Student: Võ Văn Bình 10

You might also like