You are on page 1of 21

Learner Ebrahim.

Mohamed alzaabi Code, Subject, CSC400/CSC403 –Computer


Name Grade Science & Coding – Grade 09
614210 NQA Registration #
ATHS ID

Related NQC Unit and Performance Criteria:


Qualification: NQC Certificate Level 3

Unit: Identify the fundamentals of computer systems and networking


GC GC/PC Description Mark (tick as
appropriate)
/PC#

PC1.1 Convert between binary, denary, and hexadecimal numbering 1 2 3 4 5*


systems using base conversion rules
☐ ☐ ☐ ☐ ☐

PC1.2 Describe a computer network as a set of two or more devices 1 2 3 4 5*


connected together for resource sharing and information flow
☐ ☐ ☐ ☐ ☐

PC1.3 Explain what a network topology is and how the arrangement 1 2 3 4 5*


of network elements of a communication network affects the
design and architecture of the network performance and fault ☐ ☐ ☐ ☐ ☐
tolerance
PC1.4 List computer networking media and communication channels 1 2 3 4 5*
used to transfer data from a source to a destination in a
computer network ☐ ☐ ☐ ☐ ☐

PC1.5 Discuss the advantages and disadvantages of computer 1 2 3 4 5*


networks as a mean for data and resources sharing by
highlighting the extra costs and risks networking impose on ☐ ☐ ☐ ☐ ☐
having a secure connection
PC1.6 Explain transmission bandwidth and duplex in network media 1 2 3 4 5*
connections so that it is clear to the learner that every media
type is uniquely categorized according to the speed the ☐ ☐ ☐ ☐ ☐
capacity
PC1.7 Discuss the differences between peer-to- peer and client-server 1 2 3 4 5*
network models as network architectures for data
communication ☐ ☐ ☐ ☐ ☐

PC1.8 Explain the concept of network protocol and its roles to 1 2 3 4 5*


establish the set of rules and connections on the internet or any
other network ☐ ☐ ☐ ☐ ☐

PC1.9 Explain the key elements and mechanism used to send a 1 2 3 4 5*


receive a packet in a communication channel between two
locations in a computer network ☐ ☐ ☐ ☐ ☐
PC1.10 Understand the main components of a computer network 1 2 3 4 5*
hardware required to establish a connection between a sender
and a receiver ☐ ☐ ☐ ☐ ☐

PC1.11 Construct a computer network design using a specific topology 1 2 3 4 5*


architecture using a simulation tool or a diagram tool that
reflect different real-life application of network designs ☐ ☐ ☐ ☐ ☐

Explain of the concept of cyber access by highlighting the gap 1 2 3 4 5*


between people with effective access to digital and information
PC2.1 technology, and those with very limited or no access at all ☐ ☐ ☐ ☐ ☐

Highlight the government digital initiatives in cyber access by 1 2 3 4 5*


highlighting the implemented projects and applications that
PC2.2 supports the digital divide ☐ ☐ ☐ ☐ ☐

Discuss the options available to gain access to the Internet as 1 2 3 4 5*


well as the issues surrounding them in order to choose the way
PC2.3 that best suits the learner personal needs ☐ ☐ ☐ ☐ ☐

Provide information on how people with disabilities can use 1 2 3 4 5*


technology around them with ease and comfortability
PC2.4 ☐ ☐ ☐ ☐ ☐

Provide information about appropriate and inappropriate ways 1 2 3 4 5*


to disclose information or decide on what can be shared or not
PC2.5 through the Internet ☐ ☐ ☐ ☐ ☐

Distinguish between reliable and unreliable resources from the 1 2 3 4 5*


Internet using specific criteria and list of indications that is
PC2.6 used to evaluate the website trustworthy ☐ ☐ ☐ ☐ ☐

Discuss the positive and negative implications of having a digital 1 2 3 4 5*


footprint on user activities in a digital environment
PC2.7 platform ☐ ☐ ☐ ☐ ☐

Explain actions/activities that can be classified as cyber- 1 2 3 4 5*


bullying and its consequences towards the community
PC2.8 ☐ ☐ ☐ ☐ ☐

Discuss information on digital security breaches and attacks 1 2 3 4 5*


and propose protection guides against such attacks
PC2.9 ☐ ☐ ☐ ☐ ☐

Explain the consequences of security breaches and attacks on 1 2 3 4 5*


user personal data and behavior in a digital platform
PC2.10 ☐ ☐ ☐ ☐ ☐

Highlight the main issues relating to cyber safety that may lead 1 2 3 4 5*
to having personal information stolen or becoming a target of
PC2.11 an Internet predator ☐ ☐ ☐ ☐ ☐
Distinguish between using shared and dedicated resources in 1 2 3 4 5*
terms of threats, reliability and policy to be followed
PC2.12 ☐ ☐ ☐ ☐ ☐

Introduce various digital tools for communication and 1 2 3 4 5*


collaboration by highlighting good and bad examples in
PC2.13 utilizing digital tools for communication and collaboration ☐ ☐ ☐ ☐ ☐

Illustrate the ethical practices when exchanging and sharing 1 2 3 4 5*


PC2.14 information over a networked system by stating the
consequences of good and bad online behavior ☐ ☐ ☐ ☐ ☐

 Only for First Submission

Rubric
Performance
Score Description
Criteria
Student’s work is meeting the requirements of evidence quality
5 against the criteria identified in the unit of competency, by no less
than 90%.
Student’s work is meeting the requirements of evidence quality
Achieved 4 against the criteria identified in the unit of competency, by no less
than 80%.
Student’s work is meeting the requirements of evidence quality
3 against the criteria identified in the unit of competency, by no less
than 70%.
Student’s work is approaching towards meeting the minimum
2 requirements of the evidence quality to demonstrate competency.
NOT Work quality must be improved to be acceptable.
Achieved Student submits evidence that lacks quality towards demonstrating
1
competency against the criteria identified in the unit of competency.
0 No evidence of completion submitted.

Assessment writer

Name: Ahmed ElSayary Signature: Date: 12/07/2023

Assessment verifier’s approval

Verifier’s Name: Fatima Yassin Signature:Fatima Date:13/07/2023


Learner’s declaration

I certify that the work submitted for this assignment is my own. I have clearly referenced any
sources used in the work. I understand that false declaration is a form of malpractice.

Learner’s signature: Date: 15/9/2023

Assessor’s Feedback to the learner

Assessor’s feedback should cover the following:


● Link to relevant PCs
● Justify each PC awarded
● Provide appropriate guidance to the learner without giving specific actions for improvement

Learner’s Feedback about assessment decision

1.1-Converted between binary, denary, and hexadecimal numbering systems using base conversion rules
1.2-Described a computer network as a set of two or more devices connected together for resource sharing
and information flow
1.3-Explained what a network topology is and how the arrangement of network elements of a
communication network affects the design and architecture of the network performance and fault tolerance
1.4-Listed computer networking media and communication channels used to transfer data from a source to a
destination in a computer network
1.5-Discussed the advantages and disadvantages of computer networks as a mean for data and resources
sharing by highlighting the extra costs and risks networking impose on having a secure connection
1.6-Explained transmission bandwidth and duplex in network media connections so that it is clear to the
learner that every media type is uniquely categorized according to the speed the capacity
1.7-Discussed the differences between peer-to- peer and client-server network models as network
architectures for data communication
1.8-Explained the concept of network protocol and its roles to establish the set of rules and connections on
the internet or any other network
1.9-Explained the key elements and mechanism used to send a receive a packet in a communication channel
between two locations in a computer network
1.10-Understood the main components of a computer network hardware required to establish a connection
between a sender and a receiver
1.11-Constructed a computer network design using a specific topology architecture using a simulation tool or
a diagram tool that reflect different real-life application of network designs

2.1 Explained of the concept of cyber access.


2.2 Highlighted the government digital initiatives in cyber access.
2.3 Discussed the options available to gain access to the
2.4 Provided information on how people with disabilities can use technology
2.5 Provided information about appropriate and inappropriate ways to disclose information
2.6 Distinguish between reliable and unreliable resources from the Internet
2.7 Discussed the positive and negative implications of having a digital footprint
2.8 Explained actions that can be classified as cyber-bullying
2.9 Discuss information on digital security breaches and attacks
2.10 Explain the consequences of security breaches and attacks on user personal data
2.11 Highlight the main issues relating to cyber safety that led to personal information stolen
2.12 Distinguish between using shared and dedicated resources
2.13 Introduce various digital tools for communication and collaboration
2.14 Illustrated the ethical practices when exchanging and sharing information over a network

Assessor’s approval

Assessor’s (Teacher) Name: Signature: Date: 15/9/23

Notes:

 The instructor has the right to change or modify the assessment questions as long as he/she is
fulfilling the specification of the listed Performance Criteria.
 If the instructor changes the questions, they have to be verified by an assessor.
 When uploading the assessments to your ePortfolio, please follow the evidence naming
convention
Question 1- Homework/Class work:

1. Convert the below Denary numbers to Binary

Denary numbers Binary Equivalent

a) 20 0 0 0 1 0 1 0 0

b) 32 0 0 1 0 0 0 0 0
c) 128 1 0 0 0 0 0 0 0

2. Convert the below Hexadecimal numbers to Binary

Hexadecimal numbers Binary Equivalent

a) FE06 1111 1110 0000 0110


b) 4AB8 0100 1010 1011 1000

3. Convert the below Binary numbers to Hexadecimal

Binary numbers Hexadecimal Equivalent

a) 0010 1001 1010 1011 29AB


b) 0001 1111 1110 0001 1FE1
c) 1010 1010 1010 AAA

Show your conversion work here (Optional)

[This provides evidence for PC 1.1]

Question 2- Group Presentation Task:


Create a group presentation (3 to 4 students) that answers and explains the below questions.

Add a screenshot for each slide after the relevant question:

 Describe what is a computer network including its key characteristics, components. With
proper descriptive image.

[This provides evidence for PC 1.2]

Computer Network

A computer network is a group of linked devices


and machines that communicate and share
resources across a shared channel..

Components of a Computer Network:A Key Characteristics of a Computer Network:


computer network comprises several essential
Connectivity
components:
Data Sharing
Nodes
Communication
Network Cables/Wireless Media
Scalability
Network Devices
Reliability
Network Protocols
Security
1.3-What is network topology is. Give 3 examples with image/ drawing of the most common computer
network topologies used in today’s computer networking.

[This provides evidence for PC 1.3]

Network Topology
Network topology refers to the physical or logical layout or and the connections between
them in a computer network.

Star Topology Bus Topology: Ring Topology:

In a star topology all of the


All devices in a bus topology Each device in a ring topology
device and electronics are
are linked to a single central is linked to exactly two
linked to a certain hub
cable, or "bus." additional devices, creating a
structure that resembles a ring.

1.4- List and explain the computer networking media and communication channels used in today’s
computer networking. [This provides evidence for PC 1.4]

Wired Communication Media:

Twisted Pair Cable: Twisted pair cables consist of pairs of insulated copper wires twisted together.
Coaxial Cable: They offer higher bandwidth than twisted pair cables. It is used in cable TV.
Fiber-Optic Cable: Fiber-optic cables use light pulses to transmit data.

Wi-Fi :
Cellular Networks: It use interconnected base stations to provide mobile communication.
1.5- Discuss the advantages and disadvantages of computer networks by highlighting the extra costs and
risks networking impose on having a secure connection

[This provides evidence for PC 1.5]

Computer networks offer numerous advantages, such as enhanced communication, resource


sharing, and increased productivity.

Advantages of Computer Network Disadvantages of Computer Networks

 Resource Sharing  Extra Costs:


 Enhanced Communication  Complexity and Maintenance:
 Centralized Data Management  Security Risks:
 Remote Access  Downtime and Reliability:
 Scalability  Privacy Concerns:
Security Risks and Extra Costs of Secure Networking:
Failing to secure a network can result in data breaches, legal liabilities, reputational damage, and
financial losses.
Question 3 -Online Quiz:
Complete the online quiz as per your teacher instructions, then capture the marked quiz result (All
Questions) and add it in the space provided below:

Image for the result of online quiz1


[This provides evidence for PC 1.6, PC1.7, PC1.8]

Question 4 -
Answer the following questions:
Explain the mechanism to send and receive a packet in a communication channel between two
locations in a computer network. Provide pictures to support your answer
[This provides evidence for PC 1.9]

1. The file is broken up into units of data called packets. The packets are then put on the network
medium and sent over the network.
2. The data packets contain the image data in the form of 0s and 1s (bits).
3. The number of bits that can go through a cable or over a radio signal (the medium) in one
second is called bandwidth.
4. The packets are put back together at the other end to remake the file.
A. Briefly explain with example and picture the function of the below network hardware required
to establish a connection between a sender and a receiver:

[This provides evidence for PC 1.10]

Hardware Picture Explanation

The network The card or port where the network cable is


interface card connected is known as the network
(NIC) interface card (NIC). It changes the data
from the computer into a signal that can be
sent over the network. It also changes the
signal it receives back into data that a
computer can understand.
End devices You see most of these devices because you
use them to connect to computer networks
and to send or receive data. Examples of end
devices are laptops, PCs/workstations,
tablets, printers, smartphones, games
consoles and smart TVs.

Switch A switch is used to connect end devices to a


LAN. The switch uses the MAC address to
send data frames to the correct device on the
same LAN. The MAC address is included in
the data frame.
Router A router is needed to send packets from one
LAN to another. Routers send packets from a
LAN in the UAE to another LAN in South
Africa over the Internet. They are also used to
divide a big LAN into smaller LANs.

Routers use IP addresses to direct the data


packets to the correct LAN. You will learn
about IP addresses later.

Hardware Picture Explanation

The network  It's like a special chip or card inside


interface card your computer that lets it talk to other
(NIC) devices on a network. It's what allows
your computer to connect to the
internet.

End devices  These are the things like your


computer, phone, or printer that you
use to connect to a network, like the
internet.

Switch  Think of it as a traffic cop for a


network. It helps direct information
(like data packets) between devices in
a network. It's used to create a "local"
network, like in your home or office.

Router  This is like a traffic director on a larger


scale. It connects different networks
together, like your local network at
home to the internet. It helps send
data between different networks. It's
like the bridge between your home
network and the bigger internet world.

Question5
Construct a computer network design for ABC office, taking into your consideration the below
constrains and guidelines:
 You can use any simulation or diagram tool, including the CISCO Packet Tracer, either through
the application itself or by using the online version of Packet Tracer:

https://skillsforall.com/course/getting-started-cisco-packet-tracer?userLang=en-US

 Construct the network based on star logical topology


 Add one central CISCO switch (Main Swich)
 Add 1 server (Main server)
 Add 3 PC and named as (Manager, Accountant, Secretary, Sales)
 Add 1 Laptop named (Rashid Laptop)
 Add one printer
 Use proper cabling to connect all nodes to the main switch
Computer ne

twork design for ABC office

[This provides evidence for PC 1.11]


Question6- Cyber C3 Exam Practice:

Solve the practice Cyber C3 exam and submit a screenshot demonstrating that you have achieved a
passing score of at least 650 in at least three trials.
[This provides evidence for PC 2.1-2.4 & 2.8-2.14]

Question 7- Class Discussion:


In-class discussion and evaluation of the students will include questions about the following cyber
security concerns:
A- List two things that can be shared online without posing a security risk and list two things that
should never be shared online because they pose a security risk.
[This provides evidence for PC 2.5]

B- List any two methods you use to check the security of a website, and then include an image to
further illustrate your point.
[This provides evidence for PC 2.6]

List two website safety checks here:


 .gov


The lock logo is closed that means its secure
Insert an image to support your point:
C- Positive and negative implications of having a digital footprint on user activities in a digital
environment platform
[This provides evidence for PC 2.7]

Give one example of positive digital footprint, support your answer by adding a picture:

Positive digital footprint: It is composed of a user's web-browsing info and activity that is saved as
cookies

Give one example of negative digital footprint, support your answer by adding a picture:

Negative digital footprint: It is usually released deliberately by a user to share info on websites or
social media

You might also like