الكويت البحرين عمان الأردن لبنان مصر البحرين حائل الرياض الدمام جدة المدينة المنورة الاحساء
(.turnitin./ ) فحص التشابه وفقا لنظام الجامعة عن طريق موقع كشف التشابه
حل واجب 0.5.4.4.3.2.1.4.5.5 الجامعة العربية المفتوحة
حل واجبات الجامعة العربية المفتوحة O54.4.3.2.1.4.5.5 - OO96654.4.3.2.1.4.5.5
ايميل : a_al_shora @ h.o.t.m.ail.c.o.m
سكايبي: a_al_shora
واتس اب: OO96654.4.0.5.0.8.9.7
Faculty of Computer Studies
T215B
Communication and Information Technologies – Part B
Tutor Marked Assignment
Cut-Off Date: July 27, 2015 Total Marks: 80
Contents
Part A: Hill cipher
Part B: Hill cipher Encryption and Decryption
Plagiarism Warning:
As per AOU rules and regulations, all students are required to submit their own TMA work and avoid plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must provide all references in case you use and quote another person's work in your TMA. You will be penalized for any act of plagiarism as per the AOU's rules and regulations.
Declaration of No Plagiarism by Student (to be signed and submitted by student with TMA work):
I hereby declare that this submitted TMA work is a result of my own efforts and I have not plagiarized any other person's work. I have provided all references of information that I have used and quoted in my TMA work.
Name of Student:
Signature:
Date:
Part A: Hill cipher (40 marks)
You have studied several algorithms of encryption during your study of T215B course. This part focuses on Hill cipher cryptography algorithm; this task aims to assist you in learning more about the Hill cipher. Your answer for this task should be as report which starting with introduction and ending with conclusion, the report should be within 800 – 1000 words (long report, you should adhere to word count), the report must have proper citations and references. The body of your report should answer the following questions:
1. Define Hill Cipher? (3 marks)
2. Mention briefly the history of Hill cipher? (2 marks)
3. The advantages of Hill cipher?(4 marks)
4. The disadvantages of Hill cipher? (3 marks)
5. Describe the Hill cipher Encryption step? (6 marks)
6. Describe the Hill cipher Decryption step? (5 marks)
7. Discuss the Cryptanalysis of the Hill System? (5 marks)
8. Discuss how Cracking a Hill Cipher? (5 marks)
Your answer should be within the range of (800 – 1000) words count. (2 marks) Any extra words mean deduction of marks.
Note: You should provide proper references and use citation (2 marks)
Part C: Hill Cipher Encryption and Encryption (40 marks)
This part is a practical one. Based on the previous study of Hill cipher in Part A, you have to test the algorithm of Encryption, and Decryption by using the following table.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
1. If the matrix size is [2x2], use your first name as an input message (Plaintext), and use the key (GLEP) to encrypt your first name. Your answer should be detailed, you should show each output of each step of the algorithm besides the final answers. (16 marks)
Note: Any empty places can be padded with redundant letters (the ‘x’ in the chosen)
2. If the matrix size used in Encryption is [3x3] and the key was (JQDSMFIBL), answer the following question
a- What will be the Inverse Matrix? Your answer should be detailed (8 marks)
b- What is the Plaintext if the Chiphertext is (ECKGYKOFRLNR) (16 marks)
Your answer should be detailed, you should show each output of each step of the algorithm besides the final answers.
NOTES
• Make sure to write your name and ID clearly.
• Answer all questions and do not exceed the word count.
• Always make citations and referencing (provide proper references using any format).
• Use your own words (copy and paste cause deduction of marks even if you provide proper references).
--------------------------------
End of TMA
Good Luck
Faculty of Business Studies
Tutor Marked Assignment
B301 A: Making Sense of Strategy I
SUMMER- Semester 2014 – 2015
Please Note that this particular TMA is meant to respond to recommendations given by EE to encourage and develop greater critical analytical skills especially at level 6, by encouraging the students to read more widely; the greater use of comparative case studies; and encouraging part-time students to reflect on the application of the theories discussed to their own workplace.
Question
For the purpose of this TMA you should use the Porter’s Five Forces of Competition Framework.
You are required to:
Critically analyze and discuss (using each of the five competitive forces) the structure and performance of aviation/airline industry in your country (Bahrain, Jordan, Oman, Kuwait, Saudi Arabia, Lebanon, Egypt or Sudan).
(1500 Words)
حل واجبات الجامعة العربية المفتوحة
حل واجبات الجامعه العربية المفتوحه مع الشرح
لجميع فروع الجامعة ولجميع التخصصات ولجميع المواد
الكويت البحرين عمان الأردن لبنان مصر البحرين حائل الرياض الدمام جدة المدينة المنورة الاحساء
(.turnitin./ ) فحص التشابه وفقا لنظام الجامعة عن طريق موقع كشف التشابه
الكويت البحرين عمان الأردن لبنان مصر البحرين حائل الرياض الدمام جدة المدينة المنورة الاحساء
(.turnitin./ ) فحص التشابه وفقا لنظام الجامعة عن طريق موقع كشف التشابه
Plagiarism Warning:
As per AOU rules and regulations, all students are required to submit their own TMA work and avoid plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must provide all references in case you use and quote another person's work in your TMA. You will be penalized for any act of plagiarism as per the AOU's rules and regulations.
Declaration of No Plagiarism by Student (to be signed and submitted by student with TMA work):
I hereby declare that this submitted TMA work is a result of my own efforts and I have not plagiarized any other person's work. I have provided all references of information that I have used and quoted in my TMA work.
Name of Student:………………………………..
Signature:…………………………………………...
Date:……………………………………………………
Question 1
This question carries 20% of the marks for this assignment
Using the AOU e-library and/or any internet reliable resource (you are encouraged to use Google Scholar for scientific research), select a recent scientific publication that presents an Asymmetric Key systems algorithm/technique. You should refer to your course tutor to validate your selection. The selected paper after reading the paper, you are asked to answer the following questions.
1. List the following information about the paper (6 marks)
a. Paper title
b. Paper Author(s)
c. Type of publication (conference, journal, master thesis, PhD thesis, technical report, etc.)
d. Information on the publication type (conference name/place , journal name, etc.)
e. Publication date
2. Based on your thorough reading of the selected recent scientific publication, you are asked to answer the following questions using your own words:
a. Explain the encryption process of the selected Asymmetric Key systems algorithm/technique? (7 Marks)
b. Explain the decryption process of the selected Asymmetric Key systems algorithm/technique? (7 Marks)
Mark deduction: The following mark deduction will be applied:
- Two mark for exceeding the word count limit (700 words)
Question 2
This question carries 17% of the marks for this assignment
Suppose a battery has the following parameters:
• Voltage: 1.5 V
• Capacity: 500 mAh
• Weight: 45 g
• Volume: 15 cm3
• Current delivered: 2 A
a) Calculate the internal resistance? (2 Marks)
b) Calculate the energy of the battery in both Watthours and Joules? (3 Marks)
c) Calculate the volumetric energy density in SI units? (2 Marks)
d) Calculate the gravimetric energy density in SI units? (2 Marks)
e) The battery is connected to an external load. The current drawn from the battery is 90mA.
• Calculate the external load? (2 Marks)
• Calculate the power dissipated by the battery? (2 Marks)
• Calculate the volumetric power density in SI units? (2 Marks)
• Calculate the gravimetric power density in SI units? (2 Marks)
Question 3
This question carries 16% of the marks for this assignment
The layout of memory cells in NAND flash allows memory cells to be packed more closely together than in NOR flash. Consider the technology node is F, then the space required by a NOR cell is 15×F2 and the space required by a NAND cell is 7×F2 .
If the technology node F is 90 nm, use these formulae to calculate:
1. The cell size of flash NOR and NAND memory for binary cells (1 bit per cell).
(4 Marks)
2. The number of bits that can be stored on a chip that is 8mmx8mm. (4 Marks)
3. Consider the following information is found in a memory chip data sheet indicating the memory organization: 131072 bits x 256 pages x 8192 blocks x 4 planes. taking into account that the organization is presented from the smallest unit size (bit) to the largest unit size (plane). Calculate the following: (8 Marks)
Question 4
This question carries 21% of the marks for this assignment
If the following codes are received:
• 1101101
• 0010111
• 1010101
State whether there have been any errors, then if they have errors, correct them and then give the decoded output (the original messages) from every correct code. (Assume that the probability of there being more than one error in a received codeword is negligible.) You can use the below parity check scheme for a Hamming code.
Question 5
This question carries 26% of the marks for this assignment
• The MPEG coding consists of a number of stages. In part 5 of Block 1, you have explored three consecutive stages: Quantization, zigzag scanning and run-length coding performed after the Discrete Cosine Transform (DCT). In this exercise you are asked to explain how these stages perform on a (8x8) DCT output block illustrated in the following matrix:
الكويت البحرين عمان الأردن لبنان مصر البحرين حائل الرياض الدمام جدة المدينة المنورة الاحساء
(.turnitin./ ) فحص التشابه وفقا لنظام الجامعة عن طريق موقع كشف التشابه
الكويت البحرين عمان الأردن لبنان مصر البحرين حائل الرياض الدمام جدة المدينة المنورة الاحساء
(.turnitin./ ) فحص التشابه وفقا لنظام الجامعة عن طريق موقع كشف التشابه
حل واجب 0.5.4.4.3.2.1.4.5.5 الجامعة العربية المفتوحة
حل واجبات الجامعة العربية المفتوحة O54.4.3.2.1.4.5.5 - OO96654.4.3.2.1.4.5.5
ايميل : a_al_shora @ h.o.t.m.ail.c.o.m
سكايبي: a_al_shora
واتس اب: OO96654.4.0.5.0.8.9.7
في ظل التطور التكنولوجي وتزايد المحتوى الرقمي على الانترنت ، اصبح القارىء اكثر اعتمادا على القراءة الاكترونية / المواد الالكترونية من اجل الحصول على المعرفة او الثقافة .
ما هي برأيك بعض المشكلات ( أقله 3) التي قد تواجهك كطالب على الصعيد الشخصي اثناء تصفحك وقراءتك. اذكرها وحدّد سُبل لتخطيها.
المطلوب الإجابة على شكل موضوع ،( مقدمة – صلب موضوع وخاتمة).
ملاحظة : ضرورة توثيق المراجع التي تم استخدامها :
بالإمكان مراجعة كتاب المقرر ص 323-325 للمزيد من التفاصيل حول سبل التوثيق السليم).
السؤال الثاني : (5 درجات)
" إن أسلوب شجرة المفاهيم من أفضل الأساليب التي يمكن استخدامها في تدوين الملاحظات أو مراجعة الدروس أو عند جمع المعلومات "
ارسم شجرة مفاهيم تلخص ما تم تناوله في الوحدة الاولى من كتاب المقرر عن التعلم الذاتي.
(على ان تتضمن 4 افكار رئيسية و8 افكار فرعية)
حل واجبات الجامعة العربية المفتوحة
حل واجبات الجامعه العربية المفتوحه مع الشرح
لجميع فروع الجامعة ولجميع التخصصات ولجميع المواد
الكويت البحرين عمان الأردن لبنان مصر البحرين حائل الرياض الدمام جدة المدينة المنورة الاحساء
(.turnitin./ ) فحص التشابه وفقا لنظام الجامعة عن طريق موقع كشف التشابه
الكويت البحرين عمان الأردن لبنان مصر البحرين حائل الرياض الدمام جدة المدينة المنورة الاحساء
(.turnitin./ ) فحص التشابه وفقا لنظام الجامعة عن طريق موقع كشف التشابه
Part (II): TUTOR'S REMARKS (to be completed by tutor)
Tutor's Name: Signature:
Date TMA held: Date returned:
TUTOR'S REMARKS:
Mark Allocated
to MTA STUDENT MARK
20% For Content: 13 marks For Referencing: 2 marks For Class presentation: 5 marks Marks deducted for overall language & communication errors: a maximum of 4 marks Earned Mark
Notes on plagiarism:
A. According to the Arab Open University By-laws, “the following acts represent cases of cheating and plagiarism:
Verbatim copying of printed material and submitting them as part of TMAs without proper academic acknowledgement and documentation.
Verbatim copying of material from the Internet, including tables and graphics.
Copying other students’ notes or reports.
Using paid or unpaid material prepared for the student by individuals or firms.
B. Penalties for plagiarism ranges from failure in the TMA to expulsion from the university.
Declaration: I hereby declare that the submitted TMA is my own work and I have not copied any other person’s work or plagiarized in any other form as specified above.
Student Signature:
EL118 READING
TMA
Summer Semester 2014-2015
Cut-off Date: 24-07-2015
Inside Reading: The Academic Word List in Context
This assignment is adapted from the Writing and Discussion Topics section on p. 16, Unit 1 “The Strength to Survive”.
Format and Word Count:
The student’s work should be:
• written in a form of an ESSAY of around 800 words (13 marks).
• presented in class in any form the student finds suitable such as PowerPoint presentation, pictorial presentation, talks and open discussion, role-play and dramatization, etc. (5 marks)
Referencing:
The essay should include a list of references (print and electronic) at the end in addition to in-text referencing as per the requirements of the MLA Referencing System. Proper referencing is a serious academic requirement and skill and will be rewarded accordingly (2 marks).
Writing and Discussion Topic:
Performing-enhancing drugs, some quite dangerous, are now a part of modern sports, and many sports heroes have been accused of using these substances.
You are required to:
1) choose a specific athlete who was accused of using performing-enhancing drugs.
2) research well what made him/her use these substances.
3) discuss the effects of these substances on his/her career and personality.
4) comment/reflect on what should happen to any athlete caught using performing-enhancing drugs.
5) provide some suggestions and recommendation to minimize the occurrence of this phenomenon.
6) present your work in-class.
Guidance on Addressing the Topic:
Before you embark on writing the essay, you need to read carefully Unit 1 “The Strength to Survive” in order to familiarize yourself with the topic at large and make use of the specialized vocabulary items in your essay.
You are strongly advised to consult sources on the topic and widen your knowledge of the topic under consideration, but it is of the utmost importance to document any words or ideas that are not your own.
Once you have the material ready, it is advisable that you follow the steps (1-6) indicated in the section above to avoid omitting sub-questions. Although the topic is from Unit 1, you should demonstrate your knowledge of the reading strategies covered in other units, as well as the words covered in those units.
Suggested references:
• J Savulescu, B Foddy2 and M Clayton2. “Performance enhancing drugs Leader: Why we should allow performance enhancing drugs in sport”. Britch Journal of Sports Medicine, Vol. 38, Issue 6 (2004). Web, Online ISSN 14730480. Retrieved 20, June, 2015.
• Philip Veliz, Carol Boyd and Sean Esteban McCabe. “Adolescent Athletic Participation and Nonmedical Adderall Use: An Exploratory Analysis of a Performance-Enhancing Drug”. Journal of Studies on Alcohol and Drugs, Vol. 74, No. 5, PP. 714–719 (2013), updates January 21 (2015)Web. ‹http://dx.doi.org/10.15288/jsad.2013.74.714› Retrieved 20, June, 2015.
• The National Center for Drug Free Sport. "Performance-Enhancing Drug Resources". Drug Free Sport (2013). Web. ‹http://www.drugfreesport.com/drug-re...s-steroids.asp ›. Retrieved 20, June, 2015.
• Tricia Mangan (2013). “Effects of Performance Enhancing Drugs”. Demand Media, March, 2011. Web, ‹http://www.livestrong.com/article/88...ancing-drugs/›. Retrieved 20, June, 2015.
Marking Grid
GRADE CONTENT LANGUAGE & ORGANIZATION
A
Excellent answers showing confident and wide-ranging knowledge of core material, good understanding of any relevant theory, and a capacity to address the question in a structural, direct and effective way, thoughtfully and with insight. Originality of thought or ideas from outside the course is an added asset. Examples are to the point. - Has an introduction defining plan of essay.
- Body divided into several paragraphs
- Conclusion which directly relates arguments to topic.
- Evidence that essay has been edited.
- Error-free grammar & register.
- Wide range of specialized terminology.
B to B+
Very good answers showing secure knowledge of course materials. Adopting an analytical approach and providing relevant discussion covering most of the key issues. Distinguished from A answers by being less insightful or by showing less comprehensive knowledge of the course. - First four criteria above maintained
- Demonstrates extensive grammar control.
- Terminology specialized but less varied.
C to C+
Competent answers reflecting adequate knowledge of the more directly relevant course material and concepts, with reasonable structure and adequate coherence related to the question set. - Introduction and/or conclusion short but still satisfactory.
- Evidence of editing.
- Less grammar control than above.
- Good range of specialized terminology.
D
Answers which omit some concepts /evidence and/or lack coherence /structure, and/or make minor errors while still demonstrating basic understanding. Or Bare pass answers which show awareness of some relevant material and attempt to relate it to the question. - Introduction and/or conclusion short but acceptable.
- No evidence of editing.
- Few grammatical errors that impede communication.
- Above average range of specialized terminology.
- Slightly confused introduction and/or conclusion, but body still fair.
- Some error types that impede communication.
- Fair range of specialized terminology.
F
Answers which attempt to draw upon relevant material but do not reflect sufficient knowledge of the course and/or neglect the focus required by the question, and/or are incomplete in some important aspects whilst being acceptable in others. - No introduction and /or no conclusion.
- Body badly organized or irrelevant.
- Poor grammar control (extremely limited range of grammar & register).
- Limited or not specialized range of terminology.
حل واجبات الجامعة العربية المفتوحة
حل واجبات الجامعه العربية المفتوحه مع الشرح
لجميع فروع الجامعة ولجميع التخصصات ولجميع المواد
الكويت البحرين عمان الأردن لبنان مصر البحرين حائل الرياض الدمام جدة المدينة المنورة الاحساء
(.turnitin./ ) فحص التشابه وفقا لنظام الجامعة عن طريق موقع كشف التشابه
الكويت البحرين عمان الأردن لبنان مصر البحرين حائل الرياض الدمام جدة المدينة المنورة الاحساء
(.turnitin./ ) فحص التشابه وفقا لنظام الجامعة عن طريق موقع كشف التشابه
حل واجب 0.5.4.4.3.2.1.4.5.5 الجامعة العربية المفتوحة
حل واجبات الجامعة العربية المفتوحة O54.4.3.2.1.4.5.5 - OO96654.4.3.2.1.4.5.5
ايميل : a_al_shora @ h.o.t.m.ail.c.o.m
سكايبي: a_al_shora
واتس اب: OO96654.4.0.5.0.8.9.7
t103 2015/2016
Perform the following base conversion with a maximum of six places to the right of the concerned point. Show your
complete work: [5 Marks]
I. (88.4)10 = ( )16
II. (C4.03)16 = ( )10
III. (712.2)8 = ( )10
IV. (10101011.001111)2 = ( )8
V. (EF.A1)16 = ( )8
Q2- Represent the following decimal numbers in binary using 8-bit signed magnitude, one’s complement, and two’s complement: [6 Marks]
I. 68
8-bit signed magnitude
one’s complement
two’s complement
II. -34
8-bit signed magnitude
one’s complement
two’s complement
Q3- What decimal value does the 8-bits binary number 10111100 have if: [4 Marks]
i- it is interpreted as unsigned number?
ii- it is on a computer using signed-magnitude representation?
iii- it is on a computer using one’s complement representation?
iv- it is on a computer using two’s complement representation?
Q4- Assume a simple model for floating-point representation is used, the representation uses a 14-bit format, 5 bits for the exponent, with a bias of 16, a normalized significant of 8-bits, and a single sign bit for the number: [10 Marks]
I. Show how the computer would represent the numbers [16.25] and [34.5] using this floating-point format. [4 marks]
II. Show how the computer would add the two floating-point numbers in part-I by changing one of the numbers so they are both expressed using the same power. [2 marks]
III. Show how the computer would represent the sum in part-II (above). [2 marks]
IV. What decimal value for the sum is the computer actually storing? [2 marks]
Q6- Consider the MARIE program below. [9 Marks]
Hex Address Label Instruction
200 Load X
201 ADD Y
202 STORE W
203 SUBT Z
204 OUTPUT
205 ADD W
206 STORE Y
207 HALT
208 X, HEX 00FC
209 Y, HEX 14
20A Z, HEX 0108
20B W, HEX 0000
i. List the hexadecimal code information for each instruction based on the following table. [5 marks]
Instruction AC IR MAR MBR PC
Load X
ADD Y
STORE W
SUBT Z
OUTPUT
ADD W
STORE Y
HALT
ii. Draw the symbol table along with their memory addresses. [2 marks]
iii. What is the output displayed when the program terminates? [1 mark]
iv. What is the value stored in the AC when the program terminates? [1 mar
الكويت البحرين عمان الأردن لبنان مصر البحرين حائل الرياض الدمام جدة المدينة المنورة الاحساء
(.turnitin./ ) فحص التشابه وفقا لنظام الجامعة عن طريق موقع كشف التشابه
حل واجب 0.5.4.4.3.2.1.4.5.5 الجامعة العربية المفتوحة
حل واجبات الجامعة العربية المفتوحة O54.4.3.2.1.4.5.5 - OO96654.4.3.2.1.4.5.5
ايميل : a_al_shora @ h.o.t.m.ail.c.o.m
سكايبي: a_al_shora
واتس اب: OO96654.4.0.5.0.8.9.7
t103 fall2015/2016
Perform the following base conversion with a maximum of six places to the right of the concerned point. Show your complete work: [5 Marks]
I. (88.4)10 = ( )16
II. (C4.03)16 = ( )10
III. (712.2)8 = ( )10
IV. (10101011.001111)2 = ( )8
V. (EF.A1)16 = ( )8
Q2- Represent the following decimal numbers in binary using 8-bit signed magnitude, one’s complement, and two’s complement: [6 Marks]
I. 68
8-bit signed magnitude
one’s complement
two’s complement
II. -34
8-bit signed magnitude
one’s complement
two’s complement
Q3- What decimal value does the 8-bits binary number 10111100 have if: [4 Marks]
i- it is interpreted as unsigned number?
ii- it is on a computer using signed-magnitude representation?
iii- it is on a computer using one’s complement representation?
iv- it is on a computer using two’s complement representation?
Q4- Assume a simple model for floating-point representation is used, the representation uses a 14-bit format, 5 bits for the exponent, with a bias of 16, a normalized significant of 8-bits, and a single sign bit for the number: [10 Marks]
I. Show how the computer would represent the numbers [16.25] and [34.5] using this floating-point format. [4 marks]
II. Show how the computer would add the two floating-point numbers in part-I by changing one of the numbers so they are both expressed using the same power. [2 marks]
III. Show how the computer would represent the sum in part-II (above). [2 marks]
IV. What decimal value for the sum is the computer actually storing? [2 marks]
Q6- Consider the MARIE program below. [9 Marks]
Hex Address Label Instruction
200 Load X
201 ADD Y
202 STORE W
203 SUBT Z
204 OUTPUT
205 ADD W
206 STORE Y
207 HALT
208 X, HEX 00FC
209 Y, HEX 14
20A Z, HEX 0108
20B W, HEX 0000
i. List the hexadecimal code information for each instruction based on the following table. [5 marks]
Instruction AC IR MAR MBR PC
Load X
ADD Y
STORE W
SUBT Z
OUTPUT
ADD W
STORE Y
HALT
ii. Draw the symbol table along with their memory addresses. [2 marks]
iii. What is the output displayed when the program terminates? [1 mark]
iv. What is the value stored in the AC when the program terminates? [1 mar
الكويت البحرين عمان الأردن لبنان مصر البحرين حائل الرياض الدمام جدة المدينة المنورة الاحساء
(.turnitin./ ) فحص التشابه وفقا لنظام الجامعة عن طريق موقع كشف التشابه
حل واجب 0.5.4.4.3.2.1.4.5.5 الجامعة العربية المفتوحة
حل واجبات الجامعة العربية المفتوحة O54.4.3.2.1.4.5.5 - OO96654.4.3.2.1.4.5.5
ايميل : a_al_shora @ h.o.t.m.ail.c.o.m
سكايبي: a_al_shora
واتس اب: OO96654.4.3.2.1.4.5.5
متوفر الان حلول TU170
Tutor-marked Assignment – Fall 2015-2016
Cut-off date: Dec 6, 2015
Total marks: 20
Submitting your work
This TMA should be submitted to your tutor electronically through the LMS system before the
cut-off date indicated above. Please note that it is your responsibility to ensure that your work is
submitted in the correct format. Anything submitted after the midnight deadline will not count
for assessment purposes.
The TMA is marked out of 20, for the continuous assessment grade.
It consists of 4 questions. The total marks for each question are shown at the beginning of each
question. The marks allocated to each part of a question are indicated in the margin.
Plagiarism Warning:
As per AOU rules and regulations, all students are required to submit their own TMA work and
avoid plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection.
You must provide all references in case you use and quote another person's work in your TMA.
You will be penalized for any act of plagiarism as per the AOU's rules and regulations.
Important note: Before you start working with this assignment, you need to refer to the
plagiarism tutorial posted in LMS.
By submitting the TMA through the LMS system, you are declaring that this submitted TMA work
is a result of your own efforts and you have not plagiarized any other person's work.
Arab Open University
Faculty of Computer Studies
TU170 Computing Essentials
Page 2 / 4
Part 1 [5 marks]
Use the common forum in LMS, in TU170 page, to initiate a discussion and to share your ideas with your classmates about one of the following topics:
Two or three principals (guidelines) you may follow when sending an email
Difference between Web and Internet
Uses of supercomputers
E- commerce
You should provide screenshots (NOT copy and paste) of all the thread messages in your solution for this part. The thread must contain at least ten messages; five of them should be yours.
Part 2 [4 marks]
1. Why we need plug-ins when surfing the Web? [2 marks]
2. Provide brief information about GUI history. [2 marks]
For each question you must use your own words, within the range of 80-120 word count.
Part 3 [3 marks]
In your LMS, search the e-library using one of the keywords Blended Learning or Plagiarism.
For this part you are required to:
Copy at least two paragraph from any source selected. [0.5 mark]
Provide the reference of your source. It must be a link directing the user to the source. [0.5 mark]
Provide two screenshots of:
List of hits (the result that contains the keyword). [1 mark]
The source you have selected. [1 mark]
Page 3 / 4
Part 4 [4 marks]
1. Use MS Excel and the values in figure 1 to create two charts:
- A column chart representing the number of internet users against each year.
- A line graph representing the percentage of users’ growth against each year.
For this part, you need to provide ONLY screenshots of the two charts. You may refer to Lab2 tutorials to solve this part. [2 marks]
Year
Internet Users
Users Growth
World Population
Population Growth
Penetration (% of Pop. with Internet)
2014
2,925,249,355
7.90%
7,243,784,121
1.14%
40.40%
2013
2,712,239,573
8.00%
7,162,119,430
1.16%
37.90%
2012
2,511,615,523
10.50%
7,080,072,420
1.17%
35.50%
2011
2,272,463,038
11.70%
6,997,998,760
1.18%
32.50%
****
2,034,259,368
16.10%
6,916,183,480
1.19%
29.40%
****
1,752,333,178
12.20%
6,834,721,930
1.20%
25.60%
****
1,562,067,594
13.80%
6,753,649,230
1.21%
23.10%
****
1,373,040,542
18.60%
6,673,105,940
1.21%
20.60%
****
1,157,500,065
12.40%
6,593,227,980
1.21%
17.60%
2005
1,029,717,906
13.10%
6,514,094,610
1.22%
15.80%
2004
910,060,180
16.90%
6,435,705,600
1.22%
14.10%
2003
778,555,680
17.50%
6,357,991,750
1.23%
12.20%
2002
662,663,600
32.40%
6,280,853,820
1.24%
10.60%
2001
500,609,240
21.10%
6,204,147,030
1.25%
8.10%
2000
413,425,190
47.20%
6,127,700,430
1.26%
6.70%
Figure 1: Internet Users in the World.
Source: Internet Live Stats (elaboration of data by International Telecommunication Union (ITU) and United Nations Population Division)
2. Open your email (if you don’t have an email account, you can create a new one using one of the webmail providers such as Hotmail, Yahoo or Gmail). Send an email to your tutor’s email address describing what are the computer essentials, knowledge, skills that you gained from studying the course TU170. You should use your own words.
For this question, you should provide one screenshot of the email sent to your tutor. [2 marks]
Notes:
Sending an email to your tutor without providing a screenshot will not be counted when marking this question.
You should use your email account to send the email.
Minimum word count required for this part is 80.
Page 4 / 4
TMA presentation [4 marks]
The TMA word document must satisfy the following:
Header contains student’s name and id
Page numbering
Page borders
No grammar and spelling mistakes
How to submit the TMA
Submit ONLY one word file contains your full solution for this TM
الكويت البحرين عمان الأردن لبنان مصر البحرين حائل الرياض الدمام جدة المدينة المنورة الاحساء
(.turnitin./ ) فحص التشابه وفقا لنظام الجامعة عن طريق موقع كشف التشابه
حل واجب 0.5.4.4.3.2.1.4.5.5 الجامعة العربية المفتوحة
حل واجبات الجامعة العربية المفتوحة O54.4.3.2.1.4.5.5 - OO96654.4.3.2.1.4.5.5
ايميل : a_al_shora @ h.o.t.m.ail.c.o.m
سكايبي: a_al_shora
واتس اب: OO96654.4.3.2.1.4.5.5
[SIZE="5"][COLOR="Black"]متوفر الان حلول TU170
Tutor-marked Assignment – Fall 2015-2016
Cut-off date: Dec 6, 2015
Total marks: 20
Submitting your work
This TMA should be submitted to your tutor electronically through the LMS system before the
cut-off date indicated above. Please note that it is your responsibility to ensure that your work is
submitted in the correct format. Anything submitted after the midnight deadline will not count
for assessment purposes.
The TMA is marked out of 20, for the continuous assessment grade.
It consists of 4 questions. The total marks for each question are shown at the beginning of each
question. The marks allocated to each part of a question are indicated in the margin.
Plagiarism Warning:
As per AOU rules and regulations, all students are required to submit their own TMA work and
avoid plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection.
You must provide all references in case you use and quote another person's work in your TMA.
You will be penalized for any act of plagiarism as per the AOU's rules and regulations.
Important note: Before you start working with this assignment, you need to refer to the
plagiarism tutorial posted in LMS.
By submitting the TMA through the LMS system, you are declaring that this submitted TMA work
is a result of your own efforts and you have not plagiarized any other person's work.
Arab Open University
Faculty of Computer Studies
TU170 Computing Essentials
Page 2 / 4
Part 1 [5 marks]
Use the common forum in LMS, in TU170 page, to initiate a discussion and to share your ideas with your classmates about one of the following topics:
Two or three principals (guidelines) you may follow when sending an email
Difference between Web and Internet
Uses of supercomputers
E- commerce
You should provide screenshots (NOT copy and paste) of all the thread messages in your solution for this part. The thread must contain at least ten messages; five of them should be yours.
Part 2 [4 marks]
1. Why we need plug-ins when surfing the Web? [2 marks]
2. Provide brief information about GUI history. [2 marks]
For each question you must use your own words, within the range of 80-120 word count.
Part 3 [3 marks]
In your LMS, search the e-library using one of the keywords Blended Learning or Plagiarism.
For this part you are required to:
Copy at least two paragraph from any source selected. [0.5 mark]
Provide the reference of your source. It must be a link directing the user to the source. [0.5 mark]
Provide two screenshots of:
List of hits (the result that contains the keyword). [1 mark]
The source you have selected. [1 mark]
Page 3 / 4
Part 4 [4 marks]
1. Use MS Excel and the values in figure 1 to create two charts:
- A column chart representing the number of internet users against each year.
- A line graph representing the percentage of users’ growth against each year.
For this part, you need to provide ONLY screenshots of the two charts. You may refer to Lab2 tutorials to solve this part. [2 marks]
Year
Internet Users
Users Growth
World Population
Population Growth
Penetration (% of Pop. with Internet)
2014
2,925,249,355
7.90%
7,243,784,121
1.14%
40.40%
2013
2,712,239,573
8.00%
7,162,119,430
1.16%
37.90%
2012
2,511,615,523
10.50%
7,080,072,420
1.17%
35.50%
2011
2,272,463,038
11.70%
6,997,998,760
1.18%
32.50%
****
2,034,259,368
16.10%
6,916,183,480
1.19%
29.40%
****
1,752,333,178
12.20%
6,834,721,930
1.20%
25.60%
****
1,562,067,594
13.80%
6,753,649,230
1.21%
23.10%
****
1,373,040,542
18.60%
6,673,105,940
1.21%
20.60%
****
1,157,500,065
12.40%
6,593,227,980
1.21%
17.60%
2005
1,029,717,906
13.10%
6,514,094,610
1.22%
15.80%
2004
910,060,180
16.90%
6,435,705,600
1.22%
14.10%
2003
778,555,680
17.50%
6,357,991,750
1.23%
12.20%
2002
662,663,600
32.40%
6,280,853,820
1.24%
10.60%
2001
500,609,240
21.10%
6,204,147,030
1.25%
8.10%
2000
413,425,190
47.20%
6,127,700,430
1.26%
6.70%
Figure 1: Internet Users in the World.
Source: Internet Live Stats (elaboration of data by International Telecommunication Union (ITU) and United Nations Population Division)
2. Open your email (if you don’t have an email account, you can create a new one using one of the webmail providers such as Hotmail, Yahoo or Gmail). Send an email to your tutor’s email address describing what are the computer essentials, knowledge, skills that you gained from studying the course TU170. You should use your own words.
For this question, you should provide one screenshot of the email sent to your tutor. [2 marks]
Notes:
Sending an email to your tutor without providing a screenshot will not be counted when marking this question.
You should use your email account to send the email.
Minimum word count required for this part is 80.
Page 4 / 4
TMA presentation [4 marks]
The TMA word document must satisfy the following:
Header contains student’s name and id
Page numbering
Page borders
No grammar and spelling mistakes
How to submit the TMA
Submit ONLY one word file contains your full solution for this TM
Question 1 (18 marks)
The marks of this question are based on the scores you obtain in the Cisco Introduction to Networks chapters’ exam; these exams are found in the Cisco Academy website.
There are 11 chapter exams for this question; all the exams have the same weight and are over 100. The tutor will download the grade of the exams from the Cisco website after the cut-off date.
Note 1: The average score is over 18.
Note 2: This table is for your own information; you can use the following formula to calculate your own average score for this question: [∑tests/1100]*18
∑tests = test1+ test2+…+test11
Test 1 Test 2 Test 3 Test 4 Test 5 Test 6 Test 7 Test 8 Test 9 Test 10 Test 11 Average score
over 18
Question 2 (12 marks)
The mark for this question is based on the score you obtain in the Cisco Introduction to Networks final exam. You should submit the score show in your gradebook and calculate the average score as the answer to this question.
Note: The average score is over 12
Note2: Use the following formula to calculate your average score:[test/100]*12
Question 3 (19 marks)
This question allows you to demonstrate your understanding of the different number bases associated with CCNA1. In order to obtain the full mark you must provide the details. You might use a calculator to check that your answers are correct, however it will be very useful for you to be able to manipulate these numbers without the use of a calculator as the calculator Is not allowed in the Cisco final exam nor in the MTA or Final exam.
a. Convert each of the following binary numbers (in dotted binary form) to dotted decimal as shown in IP addressing chapter 8. You must show the details of the conversion of each number. (3.75 marks)
• 11000000.10101010.11101001.00010001
Note: marks will be allocated for the steps and details of the conversion for all the bytes; if you just provide the final result without the steps and details you will only be awarded 1 mark for the this question.
b. Convert the following dotted decimal numbers to dotted binary form as shown in IP addressing chapter 8. You must show the details of the conversion of each number.
(3.75 marks)
• 207.101.19.33
Note: marks will be allocated for the steps and details of the conversion for all the bytes; if you just provide the final result without the steps and details you will only be awarded 1 mark for the this question.
Note2: the byte should always be presented in 8 bits even if it starts with one or more "0"
(zero).
c. Find the decimal result of ANDing the two decimal numbers as shown in IP addressing chapter 8. The decimal/binary conversion need to be shown; remember to show your working for the ANDing function.(2.5 marks)
• 177 AND 232
Note: most of the marks will be allocated for the steps and details of calculation; if you just provide the final result without the steps and details you will only be awarded 0.75 marks for the this question.
Note2: the final result should be expressed in decimal.
d. Convert following hexadecimal number to decimal number as shown in IP addressing chapter 8. Remember that you should convert from hexadecimal to binary then from binary to decimal. You must show the details. (2.5 marks)
• 9C
Note: most of the marks will be allocated for the steps and details of calculation; if you just provide the final result without the steps and details you will only be awarded 0.75 marks for the this question.
Note2: the final result should be expressed in decimal.
e. Convert following decimal number to hexadecimal number as shown in IP addressing chapter 8. Remember that you should convert from decimal to binary then from binary to hexadecimal. You must show the details. (2.5 marks)
• 210
Note: most of the marks will be allocated for the steps and details of calculation; if you just provide the final result without the steps and details you will only be awarded 0.75 marks for the this question.
Note2: the final result should be expressed in hexadecimal
f. This question is related to IPv6 (4 marks)
i. Re-write the IPv6 address in a way to reduce the size (compressed) as mentioned in section 8.2.2 of IP addressing chapter 8. (refer to the activity of section 8.2.2.5) (2 marks)
I. 216A:0AOU:7000:0000:0000:0001:0000:10CD
II. FE80:5000:0000:0000:0037:0000:0000:A001
ii. Subnetting an IPv6 network (this question is based on the chapter 9.3.1.3 of CCNA1 "Introduction to networks") (2 marks)
Subnet the following IPv6 network (2001:AOU:216A:FFFF:/64) in order to have at least 9 networks; remember that you should submit on nibble boundaries ( a nibble is 4 bits)
Note: List the new subnets with their new prefix
Question 4 (16 marks)
This question covers subnetting networks covered in chapters8 “IP addressing” & 9 “Subnetting IP network”
a. Figure A shows the design of a network that is going to be implemented.(14 marks)
The details of the topology of the network are as follows:
• Net 1 LAN “Employee LAN”: has 30 PCs and 30 VoIP phones connected to 3 Switches*.
• Net 2 LAN “Server Farm LAN”: has 10 Servers connected to 1 Switch*.
• Net 3 LAN:“Admin LAN”: has 25 PCs and 3 Network printers connected to 1 Switch*.
• Net 4 LAN “Freelance LAN”: can accommodate at the same time up to 12 Laptops and 12 wireless devices connected to 1 access point*.
• Net 5 LAN “Wireless network”: can accommodate at the same time up to 20 Smart devices connected to 1 access point*
• Net 6 WAN: router 1 “R1” is directly connected to router 4 “R4”.
• Net 7 WAN: router 1 “R1” is directly connected to router 2 “R2”.
• Net 8 WAN: router 1 “R1” is directly connected to router 3 “R3”.
* the switches and access points should be accessed remotely.
Subnet the address block 180.18.0.0/23 as appropriate to provide an efficient use of the addresses but at the same time providing sufficient addresses for all groups and links. Before you start determining the number of hosts for each network, please read the “Important Notes” section here after.
Design an addressing scheme for the company by completing a copy of Table 1.
You should complete one row for each different LAN/WAN links and use 180.18.0.0/23 as your starting address. You should use subnet 0.
Important Notes:
• An IP address should be assigned to each switch in order to be able to configure/access it remotely.
• An IP address should be assigned to the access point in order to be able to configure/access it remotely.
• Your choices should make the most economical use of the address range
• You are not expected to send in a packet tracer file or to simulate the network in any way. You just need to copy and complete Table 1
• You can change the order to the Name of the LAN/WAN in table 1
Name of LAN/WAN Network (subnet) address Address range Broadcast address Subnet mask
Net 1
Net 2
Net 3
Net 4
Net 5
Net 6
Net 7
Net 8
Table 1 to be completed
b. From the address block 180.18.0.0/23 used in part a list all the unused subnets. (2 marks)
Question 5 (17 marks)
This question allows you to demonstrate your ability to program a network of Cisco switches using packet tracer. The Packet tracer file for this question is T216AFA15TMA01Q5.pkt will be found on the AOULMS (Moodle).
Configuration
Configure your network as shown in figure B using (Command Line Interface) instructions. Your configuration should be complete as possible.
Note1: the Packet Tracer file should be returned to a special forum which will be specified by your tutor.
Note2: the packet tracer “configuration function” has been disabled so you will have to configure the routers through the CLI as if you were accessing them via the console interface or via telnet.
Note3: do not forget to save the running configuration to the start-up configuration
Objectives
Put in practice what you have learned in Chapter 2 of CCNA-1: Introduction to Networks
• Perform basic device configuration task on switches S1 and S2
• Configure IP addressing setting on all network devices.
• Verify Layer 3 connectivity.
A. Perform basic device configuration on the switches (8 marks)
Configure switches S1 and S2 according to the following guidelines:
• Configure the hostname* (as mentioned in table 2)
• Configure a secure the privileged EXEC access using the following password “AOU_xxxxxx”
• Configure a valid* message-of-the-day banner for examples: “Only authorized personnel are allowed to access the device” or “This is a secure system. Authorized Access only” or “Legal action will be pursued for any unauthorized use”.
• Configure a password for console connections. “T216A”
• Configure a password for vty connections; the password should be your first name
• Encrypt password display
Note: The switch should include your ID, example S1_123456
Note2: the privileged password should include your ID, example AOU_123456
Note3: do not forget to save the running configuration to the startup configuration using the following command: "copy running-config startup-config"
* The banner message should never welcome someone to the device. It should detail that only authorized personnel are allowed to access the device.
List in the beneath tables the commands you used for each switch
The commands should include the command prompt as seen on the switch for example:
• S1_123456(config-if)#ip address 192.168.0.2 255.255.255.0 (this is correct)
• ip address 192.168.0.2 255.255.255.0 (this is incorrect)
Switch S1
Tasks Command(s)
Configure the hostname* (as mentioned in table 3)
Configure a secure the privileged EXEC access using the following password “AOU_xxxxxx”
Configure a valid* message-of-the-day banner
Configure a password for console connections. “T216A”
Configure a password for vty connections.
“the password should be your first name”
Encrypt password display
Note: Save the running configuration to the startup configuration using the following command: “copy running-config startup-config”
Note2: include the print screen of the configuration of S1
Switch S2
Tasks Command(s)
Configure the hostname* (as mentioned in table 3)
Configure a secure the privileged EXEC access using the following password “AOU_xxxxxx”
Configure a valid* message-of-the-day banner
Configure a password for console connections. “T216A”
Configure a password for vty connections.
“the password should be your first name”
Encrypt password display
Note: Save the running configuration to the startup configuration using the following command: “copy running-config startup-config”
B. Configure the Switch Virtual interface on the two switches (S1 and S2)
(Refer to table 2) (4 marks)
List, in the beneath table, the commands you used for each switch; the commands should include the command prompt.
Tasks Command(s)
Configure the management interface on S1
Configure the management interface on S2
Note: Save the running configuration to the startup configuration using the following command: “copy running-config startup-config”
Note2: include the print screen of the configuration of S2
C. Configure the PC1 and PC2 Ethernet interfaces. (Refer to table 2) (1.5 marks)
You should use the following command in the command prompt section to configure the Ethernet interfaces of the PCs and laptops:
ipconfig ip_address subnet_mask
example: ipconfig 199.17.99.10 255.255.255.128
A print screen of the configuration done for each Ethernet interface should be included.
D. Test the connectivity between all the devices (all devices should be able to ping all the other devices) (1.5 marks)
Include a print screen of the result for each step (0.5 marks for each step)
Step 1: from PC1 ping S1
Step 2: from PC1 ping S2
Step 3: from PC1 ping PC1
Note: the ping should be successful for all the steps
E. Document the Configuration of switch S1 and Switch S2 (2 marks)
On each device, issue the show run command and capture the configurations.
Note: the result should be included in the assignment (for the two switches)
Question 6 (13 marks)
This question allows you to demonstrate your ability to program a network of Cisco routers using packet tracer. The Packet tracer file for this question is T216AFA15TMA01Q6.pkt will be found on the AOULMS (Moodle).
Configuration
Configure your network as shown in figure C using (Command Line Interface) instructions. Your configuration should be complete as possible.
Note1: the Packet Tracer file should be returned to a special forum which will be specified by your tutor.
Note2: the packet tracer “configuration function” has been disabled so you will have to configure the routers through the CLI as if you were accessing them via the console interface or via telnet.
Note3: do not forget to save the running configuration to the start-up configuration
Topology Diagram
Addressing Table
Device Interface IP Address Subnet Mask Default Gateway
R1_XXXXXX Fa0/0 10.0.0.1 255.255.255.0 N/A
Fa0/1 172.16.0.1 255.255.255.0 N/A
Fa1/0 192.168.10.1 255.255.255.128 N/A
PC1 NIC 10.0.0.10 255.255.255.0 10.0.0.1
PC2 NIC 172.16.0.10 255.255.255.0 172.16.0.1
PC2 NIC 192.168.10.10 255.255.255.128 192.168.10.1
Table 3
Note: XXXXXX is your ID (6 digits)
Objectives
Put in practice what you have learned in Chapter 6 of CCNA-1: Introduction to Networks
• Perform basic device configuration task on a router.
• Configure IP addressing setting on all router interfaces.
• Verify Layer 3 connectivity.
A. Perform basic device configuration on the router and switches (4.5 marks)
Configure router R1 according to the following guidelines:
• Configure the hostname* (as mentioned in table 3)
• Configure a secure the privileged EXEC access using the following password “SECTA_xxxxxx”
• Configure a valid* message-of-the-day banner for examples: “Only authorized personnel are allowed to access the device” or “This is a secure system. Authorized Access only” or “Legal action will be pursued for any unauthorized use”.
• Configure a password for console connections. “possible”
• Configure a password for auxiliary connections. “twist”
• Configure a password for vty connections; the password should be your first name
• Encrypt password display
Note: The router should include your ID, example routerR1_123456
Note2: the privileged password should include your ID, example SECTA_123456
Note3: do not forget to save the running configuration to the startup configuration using the following command: "copy running-config startup-config"
* The banner message should never welcome someone to the device. It should detail that only authorized personnel are allowed to access the device.
List in the beneath tables the commands you used for the router device.
The commands should include the command prompt as seen on the router for example:
• R1_123456(config-if)#ip address 192.168.0.2 255.255.255.0 (this is correct)
• ip address 192.168.0.2 255.255.255.0 (this is incorrect)
Router R1
Tasks Command(s)
Configure the hostname* (as mentioned in table 3)
Configure a secure the privileged EXEC access using the following password “SECTA_xxxxxx”
Configure a valid* message-of-the-day banner
Configure a password for console connections. “possible”
Configure a password for auxiliary connections. “twist”
Configure a password for vty connections.
“the password should be your first name”
Encrypt password display
Note: Save the running configuration to the startup configuration using the following command: “copy running-config startup-config”
B. Configure the router interfaces (Refer to table 3) (4.5 marks)
List, in the beneath table, the commands you used for router R1; the commands should include the command prompt.
Task Specification Command(s)
Configure interface Fa0/0 • Set the Layer 3 IPv4 address. (Refer to the Addressing Table 3 for IPv4 address information.)
• Set the description
• Activate interface
Configure interface Fa0/1 • Set the Layer 3 IPv4 address. (Refer to the Addressing Table 3 for IPv4 address information.
• Set the description
• Activate interface
Configure interface Fa1/0 • Set the Layer 3 IPv4 address. (Refer to the Addressing Table 3 for IPv4 address information.
• Set the description
• Activate interface
Note: Save the running configuration to the startup configuration using the following command: “copy running-config startup-config”
Note2: include the print screen of the configuration of interface Fa1/0
C. Configure the PC1, PC2 and PC3 Ethernet interfaces. (Refer to table 3) (1.5 marks)
You should use the following command in the command prompt section to configure the Ethernet interfaces of the PCs and laptops:
A print screen of the configuration done for each Ethernet interface should be included.
D. Test the connectivity between all the devices (all devices should be able to ping all the other devices) (1.5 marks)
Include a print screen of the result for each step (0.5 marks for each step)
Step 1: from PC1 ping Interface Fa0/0
Step 2: from PC1 ping PC2
Step 3: from PC1 ping PC3
Note: the ping should be successful for all the steps
E. Document the Configuration of router R1 (1 mark)
On each device, issue the show run command and capture the configurations.
Note: the result should be included in the assignment
Question 7 (5 marks)
The marks of this question are based on the scores you obtain in the Cisco Routing and switching essentials chapters 1 to 3; these exams are found in the Cisco Academy website.
There are 3 chapter exams for this question; all the exams have the same weight and are over 100. The tutor will download the grade of the exams from the Cisco website after the cut-off date.
Note 1: The average score is over 5
Note 2: This table is for your own information; you can use the following formula to calculate your own average score for this question: [∑tests/300]*5
∑tests = test1+ test2+test3
Test 1 Test 2 Test 3 Average score over 5
Question 1 (18 marks)
The marks of this question are based on the scores you obtain in the Cisco Introduction to Networks chapters’ exam; these exams are found in the Cisco Academy website.
There are 11 chapter exams for this question; all the exams have the same weight and are over 100. The tutor will download the grade of the exams from the Cisco website after the cut-off date.
Note 1: The average score is over 18.
Note 2: This table is for your own information; you can use the following formula to calculate your own average score for this question: [∑tests/1100]*18
∑tests = test1+ test2+…+test11
Test 1 Test 2 Test 3 Test 4 Test 5 Test 6 Test 7 Test 8 Test 9 Test 10 Test 11 Average score
over 18
Question 2 (12 marks)
The mark for this question is based on the score you obtain in the Cisco Introduction to Networks final exam. You should submit the score show in your gradebook and calculate the average score as the answer to this question.
Note: The average score is over 12
Note2: Use the following formula to calculate your average score:[test/100]*12
Question 3 (19 marks)
This question allows you to demonstrate your understanding of the different number bases associated with CCNA1. In order to obtain the full mark you must provide the details. You might use a calculator to check that your answers are correct, however it will be very useful for you to be able to manipulate these numbers without the use of a calculator as the calculator Is not allowed in the Cisco final exam nor in the MTA or Final exam.
a. Convert each of the following binary numbers (in dotted binary form) to dotted decimal as shown in IP addressing chapter 8. You must show the details of the conversion of each number. (3.75 marks)
• 11000000.10101010.11101001.00010001
Note: marks will be allocated for the steps and details of the conversion for all the bytes; if you just provide the final result without the steps and details you will only be awarded 1 mark for the this question.
b. Convert the following dotted decimal numbers to dotted binary form as shown in IP addressing chapter 8. You must show the details of the conversion of each number.
(3.75 marks)
• 207.101.19.33
Note: marks will be allocated for the steps and details of the conversion for all the bytes; if you just provide the final result without the steps and details you will only be awarded 1 mark for the this question.
Note2: the byte should always be presented in 8 bits even if it starts with one or more "0"
(zero).
c. Find the decimal result of ANDing the two decimal numbers as shown in IP addressing chapter 8. The decimal/binary conversion need to be shown; remember to show your working for the ANDing function.(2.5 marks)
• 177 AND 232
Note: most of the marks will be allocated for the steps and details of calculation; if you just provide the final result without the steps and details you will only be awarded 0.75 marks for the this question.
Note2: the final result should be expressed in decimal.
d. Convert following hexadecimal number to decimal number as shown in IP addressing chapter 8. Remember that you should convert from hexadecimal to binary then from binary to decimal. You must show the details. (2.5 marks)
• 9C
Note: most of the marks will be allocated for the steps and details of calculation; if you just provide the final result without the steps and details you will only be awarded 0.75 marks for the this question.
Note2: the final result should be expressed in decimal.
e. Convert following decimal number to hexadecimal number as shown in IP addressing chapter 8. Remember that you should convert from decimal to binary then from binary to hexadecimal. You must show the details. (2.5 marks)
• 210
Note: most of the marks will be allocated for the steps and details of calculation; if you just provide the final result without the steps and details you will only be awarded 0.75 marks for the this question.
Note2: the final result should be expressed in hexadecimal
f. This question is related to IPv6 (4 marks)
i. Re-write the IPv6 address in a way to reduce the size (compressed) as mentioned in section 8.2.2 of IP addressing chapter 8. (refer to the activity of section 8.2.2.5) (2 marks)
I. 216A:0AOU:7000:0000:0000:0001:0000:10CD
II. FE80:5000:0000:0000:0037:0000:0000:A001
ii. Subnetting an IPv6 network (this question is based on the chapter 9.3.1.3 of CCNA1 "Introduction to networks") (2 marks)
Subnet the following IPv6 network (2001:AOU:216A:FFFF:/64) in order to have at least 9 networks; remember that you should submit on nibble boundaries ( a nibble is 4 bits)
Note: List the new subnets with their new prefix
Question 4 (16 marks)
This question covers subnetting networks covered in chapters8 “IP addressing” & 9 “Subnetting IP network”
a. Figure A shows the design of a network that is going to be implemented.(14 marks)
The details of the topology of the network are as follows:
• Net 1 LAN “Employee LAN”: has 30 PCs and 30 VoIP phones connected to 3 Switches*.
• Net 2 LAN “Server Farm LAN”: has 10 Servers connected to 1 Switch*.
• Net 3 LAN:“Admin LAN”: has 25 PCs and 3 Network printers connected to 1 Switch*.
• Net 4 LAN “Freelance LAN”: can accommodate at the same time up to 12 Laptops and 12 wireless devices connected to 1 access point*.
• Net 5 LAN “Wireless network”: can accommodate at the same time up to 20 Smart devices connected to 1 access point*
• Net 6 WAN: router 1 “R1” is directly connected to router 4 “R4”.
• Net 7 WAN: router 1 “R1” is directly connected to router 2 “R2”.
• Net 8 WAN: router 1 “R1” is directly connected to router 3 “R3”.
* the switches and access points should be accessed remotely.
Subnet the address block 180.18.0.0/23 as appropriate to provide an efficient use of the addresses but at the same time providing sufficient addresses for all groups and links. Before you start determining the number of hosts for each network, please read the “Important Notes” section here after.
Design an addressing scheme for the company by completing a copy of Table 1.
You should complete one row for each different LAN/WAN links and use 180.18.0.0/23 as your starting address. You should use subnet 0.
Important Notes:
• An IP address should be assigned to each switch in order to be able to configure/access it remotely.
• An IP address should be assigned to the access point in order to be able to configure/access it remotely.
• Your choices should make the most economical use of the address range
• You are not expected to send in a packet tracer file or to simulate the network in any way. You just need to copy and complete Table 1
• You can change the order to the Name of the LAN/WAN in table 1
Name of LAN/WAN Network (subnet) address Address range Broadcast address Subnet mask
Net 1
Net 2
Net 3
Net 4
Net 5
Net 6
Net 7
Net 8
Table 1 to be completed
b. From the address block 180.18.0.0/23 used in part a list all the unused subnets. (2 marks)
Question 5 (17 marks)
This question allows you to demonstrate your ability to program a network of Cisco switches using packet tracer. The Packet tracer file for this question is T216AFA15TMA01Q5.pkt will be found on the AOULMS (Moodle).
Configuration
Configure your network as shown in figure B using (Command Line Interface) instructions. Your configuration should be complete as possible.
Note1: the Packet Tracer file should be returned to a special forum which will be specified by your tutor.
Note2: the packet tracer “configuration function” has been disabled so you will have to configure the routers through the CLI as if you were accessing them via the console interface or via telnet.
Note3: do not forget to save the running configuration to the start-up configuration
Objectives
Put in practice what you have learned in Chapter 2 of CCNA-1: Introduction to Networks
• Perform basic device configuration task on switches S1 and S2
• Configure IP addressing setting on all network devices.
• Verify Layer 3 connectivity.
A. Perform basic device configuration on the switches (8 marks)
Configure switches S1 and S2 according to the following guidelines:
• Configure the hostname* (as mentioned in table 2)
• Configure a secure the privileged EXEC access using the following password “AOU_xxxxxx”
• Configure a valid* message-of-the-day banner for examples: “Only authorized personnel are allowed to access the device” or “This is a secure system. Authorized Access only” or “Legal action will be pursued for any unauthorized use”.
• Configure a password for console connections. “T216A”
• Configure a password for vty connections; the password should be your first name
• Encrypt password display
Note: The switch should include your ID, example S1_123456
Note2: the privileged password should include your ID, example AOU_123456
Note3: do not forget to save the running configuration to the startup configuration using the following command: "copy running-config startup-config"
* The banner message should never welcome someone to the device. It should detail that only authorized personnel are allowed to access the device.
List in the beneath tables the commands you used for each switch
The commands should include the command prompt as seen on the switch for example:
• S1_123456(config-if)#ip address 192.168.0.2 255.255.255.0 (this is correct)
• ip address 192.168.0.2 255.255.255.0 (this is incorrect)
Switch S1
Tasks Command(s)
Configure the hostname* (as mentioned in table 3)
Configure a secure the privileged EXEC access using the following password “AOU_xxxxxx”
Configure a valid* message-of-the-day banner
Configure a password for console connections. “T216A”
Configure a password for vty connections.
“the password should be your first name”
Encrypt password display
Note: Save the running configuration to the startup configuration using the following command: “copy running-config startup-config”
Note2: include the print screen of the configuration of S1
Switch S2
Tasks Command(s)
Configure the hostname* (as mentioned in table 3)
Configure a secure the privileged EXEC access using the following password “AOU_xxxxxx”
Configure a valid* message-of-the-day banner
Configure a password for console connections. “T216A”
Configure a password for vty connections.
“the password should be your first name”
Encrypt password display
Note: Save the running configuration to the startup configuration using the following command: “copy running-config startup-config”
B. Configure the Switch Virtual interface on the two switches (S1 and S2)
(Refer to table 2) (4 marks)
List, in the beneath table, the commands you used for each switch; the commands should include the command prompt.
Tasks Command(s)
Configure the management interface on S1
Configure the management interface on S2
Note: Save the running configuration to the startup configuration using the following command: “copy running-config startup-config”
Note2: include the print screen of the configuration of S2
C. Configure the PC1 and PC2 Ethernet interfaces. (Refer to table 2) (1.5 marks)
You should use the following command in the command prompt section to configure the Ethernet interfaces of the PCs and laptops:
ipconfig ip_address subnet_mask
example: ipconfig 199.17.99.10 255.255.255.128
A print screen of the configuration done for each Ethernet interface should be included.
D. Test the connectivity between all the devices (all devices should be able to ping all the other devices) (1.5 marks)
Include a print screen of the result for each step (0.5 marks for each step)
Step 1: from PC1 ping S1
Step 2: from PC1 ping S2
Step 3: from PC1 ping PC1
Note: the ping should be successful for all the steps
E. Document the Configuration of switch S1 and Switch S2 (2 marks)
On each device, issue the show run command and capture the configurations.
Note: the result should be included in the assignment (for the two switches)
Question 6 (13 marks)
This question allows you to demonstrate your ability to program a network of Cisco routers using packet tracer. The Packet tracer file for this question is T216AFA15TMA01Q6.pkt will be found on the AOULMS (Moodle).
Configuration
Configure your network as shown in figure C using (Command Line Interface) instructions. Your configuration should be complete as possible.
Note1: the Packet Tracer file should be returned to a special forum which will be specified by your tutor.
Note2: the packet tracer “configuration function” has been disabled so you will have to configure the routers through the CLI as if you were accessing them via the console interface or via telnet.
Note3: do not forget to save the running configuration to the start-up configuration
Topology Diagram
Addressing Table
Device Interface IP Address Subnet Mask Default Gateway
R1_XXXXXX Fa0/0 10.0.0.1 255.255.255.0 N/A
Fa0/1 172.16.0.1 255.255.255.0 N/A
Fa1/0 192.168.10.1 255.255.255.128 N/A
PC1 NIC 10.0.0.10 255.255.255.0 10.0.0.1
PC2 NIC 172.16.0.10 255.255.255.0 172.16.0.1
PC2 NIC 192.168.10.10 255.255.255.128 192.168.10.1
Table 3
Note: XXXXXX is your ID (6 digits)
Objectives
Put in practice what you have learned in Chapter 6 of CCNA-1: Introduction to Networks
• Perform basic device configuration task on a router.
• Configure IP addressing setting on all router interfaces.
• Verify Layer 3 connectivity.
A. Perform basic device configuration on the router and switches (4.5 marks)
Configure router R1 according to the following guidelines:
• Configure the hostname* (as mentioned in table 3)
• Configure a secure the privileged EXEC access using the following password “SECTA_xxxxxx”
• Configure a valid* message-of-the-day banner for examples: “Only authorized personnel are allowed to access the device” or “This is a secure system. Authorized Access only” or “Legal action will be pursued for any unauthorized use”.
• Configure a password for console connections. “possible”
• Configure a password for auxiliary connections. “twist”
• Configure a password for vty connections; the password should be your first name
• Encrypt password display
Note: The router should include your ID, example routerR1_123456
Note2: the privileged password should include your ID, example SECTA_123456
Note3: do not forget to save the running configuration to the startup configuration using the following command: "copy running-config startup-config"
* The banner message should never welcome someone to the device. It should detail that only authorized personnel are allowed to access the device.
List in the beneath tables the commands you used for the router device.
The commands should include the command prompt as seen on the router for example:
• R1_123456(config-if)#ip address 192.168.0.2 255.255.255.0 (this is correct)
• ip address 192.168.0.2 255.255.255.0 (this is incorrect)
Router R1
Tasks Command(s)
Configure the hostname* (as mentioned in table 3)
Configure a secure the privileged EXEC access using the following password “SECTA_xxxxxx”
Configure a valid* message-of-the-day banner
Configure a password for console connections. “possible”
Configure a password for auxiliary connections. “twist”
Configure a password for vty connections.
“the password should be your first name”
Encrypt password display
Note: Save the running configuration to the startup configuration using the following command: “copy running-config startup-config”
B. Configure the router interfaces (Refer to table 3) (4.5 marks)
List, in the beneath table, the commands you used for router R1; the commands should include the command prompt.
Task Specification Command(s)
Configure interface Fa0/0 • Set the Layer 3 IPv4 address. (Refer to the Addressing Table 3 for IPv4 address information.)
• Set the description
• Activate interface
Configure interface Fa0/1 • Set the Layer 3 IPv4 address. (Refer to the Addressing Table 3 for IPv4 address information.
• Set the description
• Activate interface
Configure interface Fa1/0 • Set the Layer 3 IPv4 address. (Refer to the Addressing Table 3 for IPv4 address information.
• Set the description
• Activate interface
Note: Save the running configuration to the startup configuration using the following command: “copy running-config startup-config”
Note2: include the print screen of the configuration of interface Fa1/0
C. Configure the PC1, PC2 and PC3 Ethernet interfaces. (Refer to table 3) (1.5 marks)
You should use the following command in the command prompt section to configure the Ethernet interfaces of the PCs and laptops:
A print screen of the configuration done for each Ethernet interface should be included.
D. Test the connectivity between all the devices (all devices should be able to ping all the other devices) (1.5 marks)
Include a print screen of the result for each step (0.5 marks for each step)
Step 1: from PC1 ping Interface Fa0/0
Step 2: from PC1 ping PC2
Step 3: from PC1 ping PC3
Note: the ping should be successful for all the steps
E. Document the Configuration of router R1 (1 mark)
On each device, issue the show run command and capture the configurations.
Note: the result should be included in the assignment
Question 7 (5 marks)
The marks of this question are based on the scores you obtain in the Cisco Routing and switching essentials chapters 1 to 3; these exams are found in the Cisco Academy website.
There are 3 chapter exams for this question; all the exams have the same weight and are over 100. The tutor will download the grade of the exams from the Cisco website after the cut-off date.
Note 1: The average score is over 5
Note 2: This table is for your own information; you can use the following formula to calculate your own average score for this question: [∑tests/300]*5
∑tests = test1+ test2+test3
Test 1 Test 2 Test 3 Average score over 5