0% found this document useful (0 votes)
11 views4 pages

Unit 4 - Assignment 1

The document outlines an assignment for learners in the Pearson BTEC International Level 2 qualifications in Information Technology, focusing on understanding computer networking and security threats. It provides instructions for completing the assignment, including guidelines for originality, presentation, and research sourcing. The unit aims to explore computer networks' purpose, design, implementation, and security, culminating in a presentation evaluating different network types and associated security risks.

Uploaded by

Aiman Maqsood
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views4 pages

Unit 4 - Assignment 1

The document outlines an assignment for learners in the Pearson BTEC International Level 2 qualifications in Information Technology, focusing on understanding computer networking and security threats. It provides instructions for completing the assignment, including guidelines for originality, presentation, and research sourcing. The unit aims to explore computer networks' purpose, design, implementation, and security, culminating in a presentation evaluating different network types and associated security risks.

Uploaded by

Aiman Maqsood
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Pearson BTEC International Level 2 qualifications in

Information Technology

Unit 4:
Introduction to Computer Networking

Assignment 1:
Understanding a computer network environment and
security threats
INSTRUCTIONS FOR LEARNERS

1. Your teacher(s) will tell you how long you have to complete the assignment and the
access you may have to resources.

2. Read the assignment carefully and make sure that you understand the work you should
hand in and what is required of you. If you are uncertain, discuss it with your teacher(s).

3. The assignment requires you to work by yourself and to produce original work. You
should not share your work with any other learners. For example, if you produce an
illustration diagram electronically, you should not give it to another learner. Similarly,
you should not accept and use such information from others. You are required to sign
that the work submitted is your own.

4. If you work in a group at any stage, you must present your own responses to each task
for assessment.

5. Information taken from sources for research, e.g. Internet and textbooks, must be
identified and not presented as your own work. You should list the sources used.

6. Some tasks may require Observation Records/Witness Statements. Your teacher(s) will
organise for these to be completed and you must attach these to your submitted work.

7. In presenting your final work, you should not include draft work or reference materials
such as handouts, notes and leaflets, unless the tasks specifically ask you to do so.

8. Presentation of your work:


- Check that you have completed all tasks.
- Label work with the appropriate task/subtask number.
- Present tasks in the correct order.
- Label each page with your name and page number.
- Submit all electronic materials in paper format
- Clearly label video or audiotapes submitted as part of your assignment. -
All papers should be securely bound.
- The completed ASSIGNMENT should NOT be presented in plastic envelopes, a box
file, or a lever arch file.
Unit in brief
This unit examines the purpose and features of computer networks, and explores how they
are designed, implemented, and tested.

Unit introduction
Computer networking is an important part of our daily business and personal lives that most
people take for granted. Without networks, many of the tools and systems used by
businesses and individuals would not function: we couldn’t surf the web, have video calls, or
use a variety of devices such as a smartphone or laptop to communicate with friends and
family online, or use games consoles. Security plays an important role in computer
networking as organisations need to keep data as secure as possible while protecting their
systems against daily threats.
In this unit, you will investigate the network environment and the different security threats
it can face, and you will examine the techniques that can be used to defend the network
environment and consequently an organisation’s business processes.
You will connect computer systems and mobile devices to develop a network environment
and will thoroughly test the network to ensure it functions correctly.

Learning aims
In this unit you will:
A) Understand a computer network environment and security threats
B) Design a computer network
C) Implement and test a computer network.

Scenario
You are working as a junior network engineer for a small local company that instals and
configures computer networks. A potential client has approached the company about a
network they are considering installing in their shop. The main purpose of the network will
be:
• Improve communication with customers and staff.
• Share resources.
• Support business processes.
• Allow online collaboration.
Your manager would like you to produce some information about how different computer
networks could be used. This information will be used to inform the client about available
networks and potential security concerns.
Tasks
You have been asked to investigate two different kinds of computer networks to discuss the
effectiveness of both in meeting organisation requirements and to prepare a short
presentation on the subject.

Create a presentation that evaluates:


• The features of the two different computer networks and how effective they would be in
meeting the organisation requirements.
You should then consider:
• Potential security threats and the impact these could have on organisations
• How the risks could be reduced.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy