Professional Documents
Culture Documents
Finally. Mov
Finally. Mov
Highlight the main issues relating to cyber safety that may lead 1 2 3 4 5*
to having personal information stolen or becoming a target of
PC2.11 an Internet predator ☐ ☐ ☐ ☐ ☐
Distinguish between using shared and dedicated resources in 1 2 3 4 5*
terms of threats, reliability and policy to be followed
PC2.12 ☐ ☐ ☐ ☐ ☐
Rubric
Performance
Score Description
Criteria
Student’s work is meeting the requirements of evidence quality
5 against the criteria identified in the unit of competency, by no less
than 90%.
Student’s work is meeting the requirements of evidence quality
Achieved 4 against the criteria identified in the unit of competency, by no less
than 80%.
Student’s work is meeting the requirements of evidence quality
3 against the criteria identified in the unit of competency, by no less
than 70%.
Student’s work is approaching towards meeting the minimum
2 requirements of the evidence quality to demonstrate competency.
NOT Work quality must be improved to be acceptable.
Achieved Student submits evidence that lacks quality towards demonstrating
1
competency against the criteria identified in the unit of competency.
0 No evidence of completion submitted.
Assessment writer
I certify that the work submitted for this assignment is my own. I have clearly referenced any
sources used in the work. I understand that false declaration is a form of malpractice.
1.1-Converted between binary, denary, and hexadecimal numbering systems using base conversion rules
1.2-Described a computer network as a set of two or more devices connected together for resource sharing
and information flow
1.3-Explained what a network topology is and how the arrangement of network elements of a
communication network affects the design and architecture of the network performance and fault tolerance
1.4-Listed computer networking media and communication channels used to transfer data from a source to a
destination in a computer network
1.5-Discussed the advantages and disadvantages of computer networks as a mean for data and resources
sharing by highlighting the extra costs and risks networking impose on having a secure connection
1.6-Explained transmission bandwidth and duplex in network media connections so that it is clear to the
learner that every media type is uniquely categorized according to the speed the capacity
1.7-Discussed the differences between peer-to- peer and client-server network models as network
architectures for data communication
1.8-Explained the concept of network protocol and its roles to establish the set of rules and connections on
the internet or any other network
1.9-Explained the key elements and mechanism used to send a receive a packet in a communication channel
between two locations in a computer network
1.10-Understood the main components of a computer network hardware required to establish a connection
between a sender and a receiver
1.11-Constructed a computer network design using a specific topology architecture using a simulation tool or
a diagram tool that reflect different real-life application of network designs
Assessor’s approval
Notes:
The instructor has the right to change or modify the assessment questions as long as he/she is
fulfilling the specification of the listed Performance Criteria.
If the instructor changes the questions, they have to be verified by an assessor.
When uploading the assessments to your ePortfolio, please follow the evidence naming
convention
Question 1- Homework/Class work:
a) 20 0 0 0 1 0 1 0 0
b) 32 0 0 1 0 0 0 0 0
c) 128 1 0 0 0 0 0 0 0
Describe what is a computer network including its key characteristics, components. With
proper descriptive image.
Computer Network
Network Topology
Network topology refers to the physical or logical layout or and the connections between
them in a computer network.
1.4- List and explain the computer networking media and communication channels used in today’s
computer networking. [This provides evidence for PC 1.4]
Twisted Pair Cable: Twisted pair cables consist of pairs of insulated copper wires twisted together.
Coaxial Cable: They offer higher bandwidth than twisted pair cables. It is used in cable TV.
Fiber-Optic Cable: Fiber-optic cables use light pulses to transmit data.
Wi-Fi :
Cellular Networks: It use interconnected base stations to provide mobile communication.
1.5- Discuss the advantages and disadvantages of computer networks by highlighting the extra costs and
risks networking impose on having a secure connection
Question 4 -
Answer the following questions:
Explain the mechanism to send and receive a packet in a communication channel between two
locations in a computer network. Provide pictures to support your answer
[This provides evidence for PC 1.9]
1. The file is broken up into units of data called packets. The packets are then put on the network
medium and sent over the network.
2. The data packets contain the image data in the form of 0s and 1s (bits).
3. The number of bits that can go through a cable or over a radio signal (the medium) in one
second is called bandwidth.
4. The packets are put back together at the other end to remake the file.
A. Briefly explain with example and picture the function of the below network hardware required
to establish a connection between a sender and a receiver:
Question5
Construct a computer network design for ABC office, taking into your consideration the below
constrains and guidelines:
You can use any simulation or diagram tool, including the CISCO Packet Tracer, either through
the application itself or by using the online version of Packet Tracer:
https://skillsforall.com/course/getting-started-cisco-packet-tracer?userLang=en-US
Solve the practice Cyber C3 exam and submit a screenshot demonstrating that you have achieved a
passing score of at least 650 in at least three trials.
[This provides evidence for PC 2.1-2.4 & 2.8-2.14]
B- List any two methods you use to check the security of a website, and then include an image to
further illustrate your point.
[This provides evidence for PC 2.6]
The lock logo is closed that means its secure
Insert an image to support your point:
C- Positive and negative implications of having a digital footprint on user activities in a digital
environment platform
[This provides evidence for PC 2.7]
Give one example of positive digital footprint, support your answer by adding a picture:
Positive digital footprint: It is composed of a user's web-browsing info and activity that is saved as
cookies
Give one example of negative digital footprint, support your answer by adding a picture:
Negative digital footprint: It is usually released deliberately by a user to share info on websites or
social media