You are on page 1of 21

ASSIGNMENT 2 FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number and title Computing Fundamental

Submission date 4/14/2023 Date Received 1st submission

Re-submission Date Date Received 2nd submission

Student Name Bui Thai Duong Student ID Btbh00626

Class CF-02 Assessor name Nguyen Thanh Trieu

Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.

Student’s signature Duong


❒ Summative Feedback: ❒ Resubmission Feedback:

Grade: Assessor Signature: Date:


Lecturer Signature:
Table of Figure

Ⅰ. Introduction: ...................................................................................................................................................... 2
Ⅱ. Content: ............................................................................................................................................................ 4
1. Describes the Internet’s addressing system. Why divide Internet address into classes? ......................... 4
a. What is a Internet’s addressing system: .................................................................................................. 4
b. Describes the Internet’s addressing system: ........................................................................................... 6
C. Why divide Internet address into classes? .................................................................................................. 8
2. Convert the following 8-bit binary values into their denary (base 10) equivalent. You must show your
working out? .................................................................................................................................................... 10
a. (00110111)2 ........................................................................................................................................... 10
b. (10101111)2 ........................................................................................................................................... 10
c. (11010110)2 ........................................................................................................................................... 10
3. Convert the following denary (base 10) values into their 8-bit binary equivalent. You must show your
working out. ..................................................................................................................................................... 10
a. 31 .......................................................................................................................................................... 11
b. 104......................................................................................................................................................... 12
c. 210 ........................................................................................................................................................ 13
4. Write an Essay "Are Computers Good or Bad for Today's Youth" ...................................................... 14
Ⅲ. Conclusion ..................................................................................................................................................... 16
Ⅳ. Reference list ................................................................................................................................................. 18

Figure 1: Internet .................................................................................................................................................... 2


Figure 2: Internet’s addressing system .................................................................................................................. 4
Figure 3: Address system of the internet ................................................................................................................ 6
Figure 4: Classes of Internet addresses ................................................................................................................... 8
Figure 5: harms and benefits of the internet ........................................................................................................ 14

1
Ⅰ. Introduction:

Figure 1: Internet

The history of the internet dates back to the 1960s, when the U.S. Department of Defense
initiated a research project called the ARPANET (Advanced Research Projects Agency
Network) to develop a reliable communication system that could withstand a nuclear attack.
The ARPANET was the first operational packet switching network and laid the foundation
for the development of the internet.

In the 1970s, the Transmission Control Protocol/Internet Protocol (TCP/IP) was developed,
which allowed for communication between different networks and laid the groundwork for
the internet as we know it today.

In the 1980s, the National Science Foundation (NSF) funded the development of the
NSFNET, a network that connected supercomputers at universities and research institutions
across the United States. This led to the development of the first backbone networks, which
provided the infrastructure for the internet to expand beyond its original research and
academic communities.

In the 1990s, the World Wide Web (WWW) was created by Tim Berners-Lee, a computer
scientist working at CERN (the European Organization for Nuclear Research). The WWW

2
was a system of interlinked hypertext documents that could be accessed over the internet,
making it easy for people to access and share information online.

During the 2000s, the internet experienced a period of rapid growth and expansion. Social
networking sites like Facebook and Twitter, as well as video-sharing sites like YouTube,
became increasingly popular, leading to a surge in internet traffic and the development of
new technologies to support this growth.

Today, the internet is an essential tool for communication, commerce, and information
sharing. It has revolutionized the way we live and work and has connected people all over
the world in ways that were previously unimaginable.

In conclusion, the history of the internet spans several decades, from the development of the
ARPANET in the 1960s to the explosive growth of the internet in the 2000s and beyond. Its
development has been driven by a combination of technological innovation, government
funding, and the ingenuity of researchers, scientists, and entrepreneurs. Today, the internet
continues to evolve and expand, playing an increasingly important role in our lives and in
the global economy.

3
Ⅱ. Content:

1. Describes the Internet’s addressing system. Why divide Internet address


into classes?

Figure 2: Internet’s addressing system

a. What is a Internet’s addressing system:

 The Internet's addressing system is a critical component of how the internet functions. It
allows for the identification and location of devices on the internet, enabling them to
communicate with each other and share data. The primary method for addressing devices
on the internet is through the use of IP addresses.

 An IP address is a unique numerical identifier assigned to every device that connects to the
internet. It is a set of four numbers separated by periods, with each number ranging from
0 to 255. For example, the IP address of a router or computer could be 192.168.0.1. This
address is essential for devices to communicate with each other over the internet, as it
allows data to be routed between them.

4
 While IP addresses are necessary for internet communication, they can be difficult for
people to remember or use. As a result, domain names were created as an alternative
addressing system. Domain names provide a more human-readable and user-friendly form
of addressing, allowing people to access websites and other internet services more easily.

 A domain name consists of one or more parts, separated by periods, and typically includes
a top-level domain (TLD) such as .com, .org, or edu . For example, www.google.com is a
domain name that points to the IP address of Google's servers. When a user enters a
domain name into their web browser, the browser uses the Domain Name System (DNS) to
translate the domain name into the corresponding IP address, allowing the user to connect
to the desired website or service.

 In addition to IP addresses and domain names, other addressing systems are also used on
the internet, such as MAC addresses and port numbers. These systems help ensure that
data is delivered to the correct device and application and are essential for the proper
functioning of the internet. Overall, the internet's addressing system is a critical component
of how the internet works, enabling devices and services to communicate with each other
seamlessly and efficiently.

5
b. Describes the Internet’s addressing system:

Figure 3: Address system of the internet

 The Internet's addressing system is a crucial part of how the internet works. It provides a
way to identify and locate devices and services on the internet so that they can
communicate with each other and share data. The primary method used for addressing
devices on the internet is through IP addresses.

 An IP address is a unique numerical identifier assigned to every device that connects to the
internet. It consists of four numbers separated by periods, with each number ranging from
0 to 255. For example, an IP address could be 192.168.0.1. IP addresses can be dynamic,

6
meaning they change over time, or static, meaning they are fixed and do not change.
Dynamic IP addresses are commonly used by home users, while static IP addresses are
typically used by businesses and other organizations.

 In addition to IP addresses, domain names are also used as an addressing system on the
internet. A domain name is a human-readable and user-friendly name that is associated
with an IP address. Domain names consist of one or more parts, separated by periods, and
typically include a top-level domain (TLD), such as .com, .org, or edu.For example,
www.google.com is a domain name that points to the IP address of Google's servers.

 To translate a domain name into an IP address, the Domain Name System (DNS) is used.
DNS is a distributed database that maps domain names to IP addresses. When a user enters
a domain name into their web browser, the browser sends a request to a DNS server to
resolve the domain name into the corresponding IP address. The DNS server then returns
the IP address to the browser, which uses it to connect to the desired website or service.

 Other addressing systems are also used on the internet, such as MAC addresses and port
numbers. MAC addresses are unique identifiers assigned to network interface cards (NICs)
and are used to ensure that data is delivered to the correct device on a local network. Port
numbers are used to identify specific applications or services running on a device, allowing
data to be routed to the correct application.

 Overall, the internet's addressing system is a complex and essential part of how the internet
functions. It enables devices and services to communicate with each other seamlessly and
efficiently, making the internet a powerful tool for communication, collaboration, and
innovation.

 The Internet's addressing system is constantly evolving to meet the changing needs of users
and technologies. One recent development is the adoption of IPv6 (Internet Protocol
version 6), which expands the number of available IP addresses to support the increasing
number of devices and services on the internet. IPv6 uses a 128-bit address space, allowing

7
for approximately 340 undecillion unique addresses, compared to IPv4's 32-bit address
space, which allows for only about 4.3 billion unique addresses.

 Another important aspect of the internet's addressing system is security. The Domain Name
System Security Extensions (DNSSEC) is a security protocol that provides authentication and
integrity for DNS data, helping to prevent DNS spoofing and other attacks. Transport Layer
Security (TLS) is another security protocol that provides secure communication over the
internet, encrypting data as it is transmitted between devices and services.

 As the internet continues to grow and evolve, the addressing system will remain a critical
component of its infrastructure. By providing a reliable and efficient way to identify and
locate devices and services, the addressing system enables the internet to continue to be a
powerful tool for communication, collaboration, and innovation.

C. Why divide Internet address into classes?

Figure 4: Classes of Internet addresses

8
 The division of internet addresses into classes was done to manage the allocation of IP
addresses and to facilitate the routing of data packets across the internet.

 Originally, internet addresses were divided into three classes: Class A, Class B, and Class C.
Each class had a different range of available IP addresses, which were allocated to
organizations based on their size and the number of devices they needed to connect to the
internet.

 Class A addresses were assigned to large organizations that required a large number of IP
addresses, while Class B addresses were assigned to medium-sized organizations, and Class
C addresses were assigned to smaller organizations.

 The division into classes also helped to simplify the routing of data packets across the
internet. Data packets are transmitted across the internet using routing protocols, and the
class of the IP address can be used to determine the network and the subnetwork of the
destination address. This information is used by routers to determine the best path for the
data packet to reach its destination.

 However, this class-based addressing system was not very efficient and resulted in the
wastage of IP addresses. To address this issue, a new system called Classless Inter-Domain
Routing (CIDR) was introduced, which allowed for more flexible and efficient allocation of
IP addresses.

 In the CIDR system, IP addresses are not divided into fixed classes but instead are allocated
based on the number of bits used to identify the network and the host. This allows for more
efficient use of IP addresses and enables more precise allocation of addresses to
organizations based on their needs.

9
 In summary, the division of internet addresses into classes was done to manage the
allocation of IP addresses and to simplify the routing of data packets across the internet.
However, this system was not very efficient, and a more flexible system called CIDR was
introduced to address this issue.

2. Convert the following 8-bit binary values into their denary (base 10)
equivalent. You must show your working out?

a. (00110111)2
= (27 x 0) + (26 x 0) + (25 x 1) + (24 x 1) + (23 x 0) + (22 x 1) + (21 x 1) + (20 x1)
= 0 + 0 + 32 + 16 + 0 + 4 + 2 + 1
= (55)10
Therefore, the denary equivalent of (00110111)2 = (55)10

b. (10101111)2
= (27 x 1) + (26 x 0) + (25 x 1) + (24 x 0) + (23 x 1) + (22 x 1) + (21 x 1) + (20 x1)
= 128 + 0 + 32 + 0 + 4 + 2 + 1
= (175)10
Therefore, the denary equivalent of (10101111)2 = (175)10

c. (11010110)2
= (27 x 1) + (26 x 1) + (25 x 0) + (24 x 1) + (23 x 0) + (22 x 1) + (21 x 1) + (20 x0)
= 128 + 64 + 0 + 16 + 0 + 4 + 2 + 0
= (214)10
Therefore, the denary equivalent of (11010110)2 = (214)10

3. Convert the following denary (base 10) values into their 8-bit binary
equivalent. You must show your working out.

10
a. 31

 When 31 is divided by 2, the quotient is 15 and the remainder is 1.


 When 15 is divided by 2, the quotient is 7 and the remainder is 1.
 When 7 is divided by 2, the quotient is 3 and the remainder is 1.
 When 3 is divided by 2, the quotient is 1 and the remainder is 1.
 When 1 is divided by 2, the quotient is 0 and the remainder is 1.

Write the remainders from bottom to top.


(31)10 = (11111)2

11
b. 104

 When 104 is divided by 2, the quotient is 52 and the remainder is 0.


 When 52 is divided by 2, the quotient is 26 and the remainder is 0.
 When 26 is divided by 2, the quotient is 13 and the remainder is 0.
 When 13 is divided by 2, the quotient is 6 and the remainder is 1.
 When 6 is divided by 2, the quotient is 3 and the remainder is 0.
 When 3 is divided by 2, the quotient is 1 and the remainder is 1.
 When 1 is divided by 2, the quotient is 0 and the remainder is 1.

Write the remainders from bottom to top.


(104)10 = (1101000)2

12
c. 210

 When 210 is divided by 2, the quotient is 105 and the remainder is 0.


 When 105 is divided by 2, the quotient is 52 and the remainder is 1.
 When 52 is divided by 2, the quotient is 26 and the remainder is 0.
 When 26 is divided by 2, the quotient is 13 and the remainder is 0.
 When 13 is divided by 2, the quotient is 6 and the remainder is 1.
 When 6 is divided by 2, the quotient is 3 and the remainder is 0.
 When 3 is divided by 2, the quotient is 1 and the remainder is 1.
 When 1 is divided by 2, the quotient is 0 and the remainder is 1.

Write the remainders from bottom to top.


(210)10 = (11010010)2

13
4. Write an Essay "Are Computers Good or Bad for Today's Youth"

Figure 5: harms and benefits of the internet

The use of computers by youth has become increasingly common in today's society, with
technology playing a significant role in the lives of many young people. While there are
certainly advantages to computer use by youth, such as increased productivity and access
to educational resources, there are also potential disadvantages that must be taken into
consideration. In this essay, we will examine the pros and cons of computer use by youth
and explore whether computers are ultimately good or bad for today's youth.

Advantages of computer use by youth:

One of the most significant advantages of computer use by youth is the educational benefit
that computers can provide. With access to the internet and educational software, young
people can learn about a wide range of subjects and develop valuable skills. For example,

14
online courses and tutorials can help young people to learn new languages, acquire
programming skills, or study advanced mathematics. Educational software can also help
young people to develop their creativity by allowing them to create digital art, music, and
videos.

In addition, computers can help young people to stay connected with friends and family,
especially those who live far away. Social media platforms and video conferencing software
enable young people to communicate with others from different parts of the world,
fostering a sense of global interconnectedness and opening up new opportunities for
collaboration and networking.

Computers can also be used to increase productivity among young people. With the ability
to multitask and access vast amounts of information quickly, young people can get more
done in less time. This can be especially beneficial for students who need to research and
write papers, as well as for young people who are involved in extracurricular activities or
part-time jobs.

Disadvantages of computer use by youth:

Despite the advantages of computer use by youth, there are also several potential
disadvantages that must be considered. One of the most significant is the potential for
addiction. Young people can become so immersed in technology that they neglect other
aspects of their lives, such as physical activity, socializing with peers, and engaging in
creative activities that do not involve screens. This can have negative effects on their
physical and mental health, leading to problems such as obesity, depression, and anxiety.

Another potential disadvantage of computer use by youth is the risk of exposure to


inappropriate content, such as violence, pornography, and hate speech. While there are
parental controls and filters available, these are not foolproof and can be circumvented by
determined young people. Exposure to such content can have negative effects on young
people's mental health, leading to issues such as trauma, desensitization, and aggression.

Finally, there is concern that excessive computer use by youth may contribute to a decline
in cognitive and social skills. Research has shown that spending too much time in front of

15
screens can lead to problems with attention, memory, and decision-making, as well as a
lack of empathy and social skills. This can have negative effects on young people's academic
performance, as well as their ability to form meaningful relationships and navigate social
situations.

Conclusion:

In conclusion, while there are certainly advantages to computer use by youth, there are
also potential drawbacks that must be considered. It is clear that computers can be a
valuable tool for learning, creativity, and productivity. However, there is also a risk of
addiction, exposure to inappropriate content, and a decline in cognitive and social skills.

To address these potential disadvantages, parents and educators can take several steps.
Firstly, it is important to establish clear guidelines for computer use, such as setting limits
on screen time and ensuring that young people engage in physical activity and socializing
with peers. Secondly, parents and educators can take steps to ensure that young people
are exposed to appropriate content online. Finally, to mitigate the potential cognitive and
social risks associated with excessive computer use, parents and educators can encourage
young people to engage in activities that promote cognitive and social development, such
as.

Ⅲ. Conclusion
In conclusion, the internet has become an integral part of our daily lives, revolutionizing the
way we communicate, work, and access information. From its humble beginnings as a
research project aimed at creating a reliable communication system, the internet has evolved
into a vast network of networks that spans the globe, connecting people and devices in ways
that were once unimaginable.

The internet has brought about a host of benefits, including greater access to information,
improved communication, and new opportunities for commerce and innovation. It has
enabled people to connect with others across the world, fostering collaboration and
cooperation on a global scale.

16
However, the internet also poses new challenges, including issues related to privacy,
security, and the spread of misinformation. As the internet continues to evolve, it is important
that we work together to address these challenges and ensure that the internet remains a safe
and reliable tool for everyone.

Overall, the internet has had a profound impact on our world, transforming the way we live
and work in countless ways. It is an exciting time to be a part of this digital revolution, and
we can only imagine what new possibilities and opportunities the future holds.

The internet has also had a significant impact on the economy, driving growth and innovation
in a wide range of industries. It has facilitated the rise of e-commerce, enabling businesses
to reach customers around the world and creating new opportunities for entrepreneurs and
startups.

Moreover, the internet has revolutionized the way we access and consume media, providing
a platform for content creators to share their work with a global audience. Online platforms
like YouTube, Netflix, and Spotify have disrupted traditional media industries and
transformed the way we consume entertainment.

In recent years, the internet has also become a powerful tool for political activism and social
change. It has enabled people to organize and mobilize around causes and issues that they
care about, has played a key role in movements like the Arab Spring and Black Lives Matter.

In short, the internet has transformed virtually every aspect of our lives, from the way we
communicate and work to the way we access information and consume media. While it has
brought about new challenges and risks, it has also created new opportunities for growth and
innovation, has the potential to continue driving progress and positive change for years to
come.

Looking to the future, the internet is likely to continue evolving and expanding, with new
technologies and applications transforming the way we live and work. For example, the
development of 5G wireless technology is expected to bring faster speeds and greater
connectivity to mobile devices, while the Internet of Things (IoT) is expected to connect a
growing number of everyday devices to the internet, enabling new forms of automation and
data analysis.

17
The continued growth of artificial intelligence (AI) and machine learning is also likely to
have a major impact on the internet and its applications, enabling new forms of automation,
data analysis, and decision-making.

However, as the internet continues to evolve, it is important that we address the challenges
and risks that come with it. This includes issues related to privacy, security, and the spread
of misinformation and harmful content online. It will require collaboration and cooperation
across governments, businesses, and individuals to ensure that the internet remains a safe,
reliable, and accessible tool for all.

In conclusion, the internet has come a long way since its inception, has had a profound impact
on virtually every aspect of our lives. It has brought about new opportunities and challenges,
will continue to do so in the years to come. It is up to us to work together to ensure that the
internet remains a force for progress and positive change, while addressing the risks and
challenges that come with it.

Ⅳ. Reference list
Introduction:

- https://dntech.vn/lich-su-cua-internet-110-26.html
- http://onthi.net.vn/lich-su-internet-hinh-thanh-va-ra-doi-tu-nam-nao/
- https://www.linkedin.com/pulse/ai-la-nguoi-phat-minh-ra-internet-lich-su-huy-duong

Describes the Internet’s addressing system. Why divide Internet address into classes?

- https://wiki.matbao.net/ip-la-gi-tong-hop-moi-kien-thuc-can-biet-ve-dia-chi-ip/
- https://www.mozilla.org/vi/products/vpn/more/what-is-an-ip-address/
- https://wiki.matbao.net/ip-la-gi-tong-hop-moi-kien-thuc-can-biet-ve-dia-chi-ip/
- https://bizflycloud.vn/tin-tuc/ipv4-la-gi-20210607115922143.htm
- https://blog.lehuutrung.dev/2020/11/ip-address-and-subnetting.html

Write an Essay "Are Computers Good or Bad for Today's Youth"

- https://dienmaycholon.vn/kinh-nghiem-mua-sam/loi-ich-va-tac-hai-cua-internet-ma-
khong-phai-ai-cung-biet

18
- https://fptbacninh.vn/tin-tuc-moi/interner-la-gi-loi-ich-cua-internet-va-tac-hai-cua-
internet/
- https://luatvietnam.vn/linh-vuc-khac/internet-la-gi-883-91064-article.html
- https://giaidapviet.com/content/internet-la-gi-nhung-loi-ich-va-tac-hai-cua-internet-
mang-lai/

19

You might also like