What is the most important thing you learnt

Assignment Help Computer Networking
Reference no: EM133015944

SIT202 Secure Networking

Task 1.1P: Lesson Reviews

At the completion of Introduction Module, you are required to fill a lesson review to tell us what you have learnt and how you have learnt it by providing evidence of your learning. Your tutor will then review your submission and will give you feedback. If your submission is incomplete, then your tutor will ask you to include missing parts. You tutor may ask follow-up questions, either to clarify something, or to double check your understanding of certain concepts.

The lesson review must contain three parts (Submit as three pdf files):

1. Module Summary
Please provide an overview of what you have learnt in Introduction Module. Throughout the activities and resources on the unit site, you will find prompts that help you fill this part.
More specifically, you need to answer the following questions:
- Summarising the content
To make it easier to summarise the content of the module, you can break down these questions by learning objective, or by activity, as is suggested on the unit site and in the weekly activity sheets associated with this module.
- Summarise the main points in this module. Make sure that you include references to the learning objectives.
- How is this useful?

- Reflecting on the content
Provide a reflection by answering the following questions:
- What is the most important thing you learnt in this module?
- How does this relate to what you already know?
- Why do you think your course team wants you to learn the content of this module?

2. Evidence of Learning
Provide evidence of your work on this module. This can contain notes that you took, activities and analyses you have done in the active classes rated to this module, and any other work that you produced. You can take screenshots of your analyses and simulations and include in here. If you have developed an application/ program (for example using Python), then please also provide the code along with the submission labelling the code. If you used external resources in your learning, please include links to them. Please also make sure to include short comments together with your evidence. You can,
• Provide references to activities that you have done to highlight your learning on the key learning objectives of this module and active class. Make sure that you provide evidence for the all the activities you have done in the relevant Active Classes.
• Provide references to any specific content that you found difficult, how you overcame these difficulties, and what you learnt from them.
• Include questions where you made mistakes and comment what you learnt from those mistakes, or how you overcame them.

3. Evidence of self-assessment, with a sufficient score.
Please include evidence that you reached the minimum required score at the self- assessment. On the results page of the automatic self-assessment, please click on the option "print this results summary" and save the results into a pdf file. You can then upload this file as your evidence.

Attachment:- Secure Networking.rar

Reference no: EM133015944

Questions Cloud

Discuss whether the communication strategies used : 1) What types of communication strategies Wells Fargo does use to address customer concerns.
Why were foxconn and apple so embarrassed : 1.Why were Foxconn and Apple so embarrassed by worker suicides?
Calculate the detailed product cost and period cost : Calculate the detailed product cost and period cost. Use the following outlay and allocate all the cost according to their type
Calculate the total trip cost for destination : You are considering taking a trip in the near future. You have three places you are considering--Galveston, San Antonio, and Padre Island. You are to make a bud
What is the most important thing you learnt : Povide an overview of what you have learnt in Introduction Module. Throughout the activities and resources on the unit site
Review a selection of business information management : Review a selection of Business Information Management Tools (usually, but not limited to, software programs), identified through a simple web-search
Spreadsheet functions and data visualization strategies : When learning about simple spreadsheet functions and data visualization strategies.
Explain saudi arabia international trade : Discuss two trade theories that can explain Saudi Arabia's international trade.
Types of structural placement of the it function : Think about IT culture and its two main aspects - (1) the structural placement of the IT function within an organization and (2) the philosophical approach to t

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain introduction to the contents of the recommendation

the chief technical officer (CTO) would like you and your team to come up with a network analysis. Explain Introduction to the contents of the recommendation.

  Create three virtual machines

Create 3 virtual machines connected to the WSS3-Proj-YOURFIRSTNAME-SW switch with 2048 MB RAM on each, and labelled as follows, replacing "YOURFIRSTNAME"

  Determine what kind of lan your team will design for company

Every department must have very fast access to the LAN. Determine what kind of LAN your team will design for this company.

  How do you quantify risk

How do you quantify risk? and (2) if the risk is less than the cost to minimize it should you spend time and money on it?

  Define and describe the model including the seven layers

question 1 define and explain the model including the seven layers for the isoosi network reference model.question 2

  Determine percentage of ip datagram will be overhead

Determine percentage of each IP datagram will be overhead and percentage will be application data? Illustrate all computations required.

  Overall parameters of a networking related project

Analyse project issues, conduct post-project review (i.e., lessons learned) and make recommendations for improvements for future projects

  Security issues in emerging technology

MN502- Security issues in emerging technology Major impact on aspects of everyday-lives and behaviour of users. Security of Internet of Things is prime concern

  What is function of distribution layer in a campus network

What is the name for the part of the campus network that carries the bulk of the routed data traffic?

  How do datagram services differ from virtual circuit service

What does a packet contain? What do you think the future of ISDN holds? Why? - How do datagram services differ from virtual circuit services? How does an SVC differ from a PVC?

  How will you use your network administrator skills

How will you use your network administrator skills and knowledge in assigning IPs to each user? Discuss a minimum of five event types found in a DHCP log and describe what they refer to

  What is the subnet masks

Which of the following are suitable subnet masks for use in configuring static routes for the network shown in Figure?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd