SEO Expert Suggestions for Desklib - Online Library for Study Material
VerifiedAdded on 2023/06/11
|16
|2976
|299
AI Summary
Get expert suggestions for SEO optimization of Desklib, an online library for study material with solved assignments, essays, dissertations, etc. Learn about ping utility, network switching, physical and logical topology, IPv6, switch table, cloud computing, and more. Find out about the major attacks against access point passwords and how to address them.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Please fill in the following details:
Student Name
Student Number
1
Student Name
Student Number
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Week One
Question One
Solution
Ping utility is one of the famous & very helpful networking commands. When we have
problems with the network the first idea that comes in to our mind is to ping. We use
a ping message when testing reachability of a host. We have a ping command that is
uses the services of ICMP which is latter encapsulated to an IP header. Ping utility is
known for it operates on the layer 3 which is the network layer of the OSI model. Ping
will perform a host lookup that is very simple. We don’t use the transport layer
services because the traffic reliability issues and challenges is not the case here.
ICMP is layer 3 protocol of the ICMP belonging to the group control protocols which
is very similar to the RARP and the ARP.
- We have to launch a ping command which is very simple as one need to open
the command prompt of the window used and type the command. “ping (type
the ip address of the host that need to be reached)” or if we are using a DNS
then we can type the following command “ping (type the URL of the
destination host that need to be reached)”
The following is a sample to how the ping messages is interpreted until the request
reaches to the host.
The following is the result that is supposed to reflect when we ping requesting to
reach a certain host.
2
Question One
Solution
Ping utility is one of the famous & very helpful networking commands. When we have
problems with the network the first idea that comes in to our mind is to ping. We use
a ping message when testing reachability of a host. We have a ping command that is
uses the services of ICMP which is latter encapsulated to an IP header. Ping utility is
known for it operates on the layer 3 which is the network layer of the OSI model. Ping
will perform a host lookup that is very simple. We don’t use the transport layer
services because the traffic reliability issues and challenges is not the case here.
ICMP is layer 3 protocol of the ICMP belonging to the group control protocols which
is very similar to the RARP and the ARP.
- We have to launch a ping command which is very simple as one need to open
the command prompt of the window used and type the command. “ping (type
the ip address of the host that need to be reached)” or if we are using a DNS
then we can type the following command “ping (type the URL of the
destination host that need to be reached)”
The following is a sample to how the ping messages is interpreted until the request
reaches to the host.
The following is the result that is supposed to reflect when we ping requesting to
reach a certain host.
2
Consider a situation where the host will be establishing the reliability of how a link will
send the packets and measure the percentage that they will receive.Explain the
difficulty doing this over a TCP connection. The problem is that there is no way to
determine whether a packet arrived on the first attempt or whether it was lost and
retransmitted. Having the receiver echo back immediately and measuring the
elapsed times would help; many Berkeley-derived implementations measure
timeouts with a 0.5 sec granularity and round-trip times for a single link without loss
would generally be one to two orders of magnitude smaller. But verifying that one
had such an implementation is itself rather difficult.
Question:
What are some of the commands that are network related and can be used when
ping shows no reachability?
Solution.
- Tracert
- Netstat
- Ipconfig
- Nslookup
3
send the packets and measure the percentage that they will receive.Explain the
difficulty doing this over a TCP connection. The problem is that there is no way to
determine whether a packet arrived on the first attempt or whether it was lost and
retransmitted. Having the receiver echo back immediately and measuring the
elapsed times would help; many Berkeley-derived implementations measure
timeouts with a 0.5 sec granularity and round-trip times for a single link without loss
would generally be one to two orders of magnitude smaller. But verifying that one
had such an implementation is itself rather difficult.
Question:
What are some of the commands that are network related and can be used when
ping shows no reachability?
Solution.
- Tracert
- Netstat
- Ipconfig
- Nslookup
3
Week Two
Question two
Solution
Network switching is very complicated as it may vary from one single network to the
other. When we add a switch to the network the implication will be that there will be
increased number of ports but in this case of NQ-Real Estate we are switching the
LAN switch with a transceiver which will be used to broadcast the wireless signals to
the 8 workstations. The idea here that comes in to our mind is how we can be able to
understand all the patterns in the traffic which might be important when we replace a
switch with a Wireless Access Point. If we add many switches to networks that are
not congested like this one of the NQ REAL ESTATE then the entire network will be
impacted negatively. When we replace the switch we expect the wireless access
Point device not to be able to hold the duplex capability and if able then it will have to
be with less through put. A switch is free of collisions while a WAP devices is not free
of collisions in the traffic.
Considering the below calculations the bandwidth speed is expected to be steady in
that it is effective as the sender or anyone from the 8 workstations will use the
network without a problem and we estimate the users to have a constant and
fluctuating network at all in their machines. Let’s assume we have we have a 10mbps
Ethernet WAP which is to send through to the workstations.
question:
What is the difference between a modem, router, switch and wireless access point
(WAP)?
Solution:
An ADSL modem is that device which is used for transmitting and receiving the data
over the plain telephones used traditionally using the analogue lines. A router is a
device that is used for interfacing between the two available networks while a switch
is a network device used for creating a virtual network between any networked
4
Question two
Solution
Network switching is very complicated as it may vary from one single network to the
other. When we add a switch to the network the implication will be that there will be
increased number of ports but in this case of NQ-Real Estate we are switching the
LAN switch with a transceiver which will be used to broadcast the wireless signals to
the 8 workstations. The idea here that comes in to our mind is how we can be able to
understand all the patterns in the traffic which might be important when we replace a
switch with a Wireless Access Point. If we add many switches to networks that are
not congested like this one of the NQ REAL ESTATE then the entire network will be
impacted negatively. When we replace the switch we expect the wireless access
Point device not to be able to hold the duplex capability and if able then it will have to
be with less through put. A switch is free of collisions while a WAP devices is not free
of collisions in the traffic.
Considering the below calculations the bandwidth speed is expected to be steady in
that it is effective as the sender or anyone from the 8 workstations will use the
network without a problem and we estimate the users to have a constant and
fluctuating network at all in their machines. Let’s assume we have we have a 10mbps
Ethernet WAP which is to send through to the workstations.
question:
What is the difference between a modem, router, switch and wireless access point
(WAP)?
Solution:
An ADSL modem is that device which is used for transmitting and receiving the data
over the plain telephones used traditionally using the analogue lines. A router is a
device that is used for interfacing between the two available networks while a switch
is a network device used for creating a virtual network between any networked
4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
devices for a particular duration during the data transfer process. WAP is actually a
transceiver that is used for broadcasting WI-FI signals.
Week Three
Question Three:
Solution:
In explaining the logical topology we can say that this how the devices may appear to
as connected to the end user while the physical topology is the way they are
interconnected with different wires and types of cables. Physical topology is the real
arrangement of the network elements (The layout and the structure of the devices
orderly of the network in reality) which can be through the measurements of the
distances between the devices such as the routers, hub, switch, computer, scanner
etc. In understanding Logical topology just like the work logical means in this concept
is the abstraction of the reality clearly showing how the network devices should be
arranged and is usually provided through use of graphs, charts and even diagrams
(Lorenzo, 2015).
A physical star topology is where we have components of the entire network
connected to a central device referred to as the hub, a router or even a switch in
other cases (fossbytes, 2015).
Advantages of physical star topology
1. Much faster compared to the bus topology as its signals are not transmitted to
all workstations.
2. Very easy when we need to connect to other new devices or even nodes
3. Have a centralized management
4. When one workstation fails it will not affect the entire network.
Disadvantages of physical star topology
1. Too much dependent on the central device because if it goes down all the
other workstations will not transmit.
2. Costly considering the price of the central devices applied such as the cost of
buying the routers, hubs and the switches
3. Performance of all workstation depends entirely on the central device
5
transceiver that is used for broadcasting WI-FI signals.
Week Three
Question Three:
Solution:
In explaining the logical topology we can say that this how the devices may appear to
as connected to the end user while the physical topology is the way they are
interconnected with different wires and types of cables. Physical topology is the real
arrangement of the network elements (The layout and the structure of the devices
orderly of the network in reality) which can be through the measurements of the
distances between the devices such as the routers, hub, switch, computer, scanner
etc. In understanding Logical topology just like the work logical means in this concept
is the abstraction of the reality clearly showing how the network devices should be
arranged and is usually provided through use of graphs, charts and even diagrams
(Lorenzo, 2015).
A physical star topology is where we have components of the entire network
connected to a central device referred to as the hub, a router or even a switch in
other cases (fossbytes, 2015).
Advantages of physical star topology
1. Much faster compared to the bus topology as its signals are not transmitted to
all workstations.
2. Very easy when we need to connect to other new devices or even nodes
3. Have a centralized management
4. When one workstation fails it will not affect the entire network.
Disadvantages of physical star topology
1. Too much dependent on the central device because if it goes down all the
other workstations will not transmit.
2. Costly considering the price of the central devices applied such as the cost of
buying the routers, hubs and the switches
3. Performance of all workstation depends entirely on the central device
5
Question:
List all the other physical topologies besides the already discussed physical star
topology?
Solution:
1. Physical bus topology
2. Physical ring topology
3. Physical mesh topology
4. Physical hybrid topology
5. Physical Tree topology
6
List all the other physical topologies besides the already discussed physical star
topology?
Solution:
1. Physical bus topology
2. Physical ring topology
3. Physical mesh topology
4. Physical hybrid topology
5. Physical Tree topology
6
Week Four
Question Four:
Solution:
UTP cables are very susceptible to RFI an EMI which is mostly caused by the
microwave making them to be more prone to the noise surrounding it when
transmitting and hence causing a lot of interference. Considering the budget this
wires are highly costly than the cat 5e UTP (Dauber, 2017). The signals boost for the
UTP cables is for a shorter distance unlike the coaxial and the fiber–Optic cables.
This will make it to be avoided when we need to carry signals for more than 100
metre hence making it unsuitable for NQ-REAL ESTATE.
The two options to be applied instead will be the use of:
1. Coaxial Cable
Advantages.
- Very high rate of transmission
- Immunity to noise is very high.
Disadvantages
- It is more costly in terms of price
- There are many security problems
2. Fiber Optic cables
Advantages
- Data transmission is very fast
- Has a smaller physical size
- Improved security offered to the signals when being transmitted
- Immunity to noise is very high actually no interference.
- Has the capability to carry more signals than a wire can do.
Question:
What are some of the reasons that may make us to use Fiber-Optic Cables?
Solution:
1. This is because they are faster when compared to other cables.
2. There is less attenuation when transmitting with the fiber optic
7
Question Four:
Solution:
UTP cables are very susceptible to RFI an EMI which is mostly caused by the
microwave making them to be more prone to the noise surrounding it when
transmitting and hence causing a lot of interference. Considering the budget this
wires are highly costly than the cat 5e UTP (Dauber, 2017). The signals boost for the
UTP cables is for a shorter distance unlike the coaxial and the fiber–Optic cables.
This will make it to be avoided when we need to carry signals for more than 100
metre hence making it unsuitable for NQ-REAL ESTATE.
The two options to be applied instead will be the use of:
1. Coaxial Cable
Advantages.
- Very high rate of transmission
- Immunity to noise is very high.
Disadvantages
- It is more costly in terms of price
- There are many security problems
2. Fiber Optic cables
Advantages
- Data transmission is very fast
- Has a smaller physical size
- Improved security offered to the signals when being transmitted
- Immunity to noise is very high actually no interference.
- Has the capability to carry more signals than a wire can do.
Question:
What are some of the reasons that may make us to use Fiber-Optic Cables?
Solution:
1. This is because they are faster when compared to other cables.
2. There is less attenuation when transmitting with the fiber optic
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
3. Fiber optic cables are very much impervious to the EMI that may interfere with
the cabling.
4. They cannot be caught by fire
5. The other reason is because they will not break that easily.
Week Five
Question five:
Solution:
Complete this table:
Task Layer Protocol
Ensure that the information sent by the web
server reaches your browser
Transport IP protocol
Route messages between your PC and the
server over the Internet
Network Layer IP protocol
Allow the web browser software and the web
server software to understand the messages
sent between them
Data link layer Point-to-point
protocol
Encapsulate data in frames Datalink layer Point-to-point
protocol
Question:
What are the functions of the Network layer?
Solution:
1. Translating the address of the logical network in to physical address which is
concerned with the switching of packets, circuits and messaging.
2. The routers and the gateways usually perform their operations in this layer.
3. Can break larger packets in packets which are small.
4. It have connection services that provides services such as the flow of the
network, control of errors and the sequence control of the packets.
8
the cabling.
4. They cannot be caught by fire
5. The other reason is because they will not break that easily.
Week Five
Question five:
Solution:
Complete this table:
Task Layer Protocol
Ensure that the information sent by the web
server reaches your browser
Transport IP protocol
Route messages between your PC and the
server over the Internet
Network Layer IP protocol
Allow the web browser software and the web
server software to understand the messages
sent between them
Data link layer Point-to-point
protocol
Encapsulate data in frames Datalink layer Point-to-point
protocol
Question:
What are the functions of the Network layer?
Solution:
1. Translating the address of the logical network in to physical address which is
concerned with the switching of packets, circuits and messaging.
2. The routers and the gateways usually perform their operations in this layer.
3. Can break larger packets in packets which are small.
4. It have connection services that provides services such as the flow of the
network, control of errors and the sequence control of the packets.
8
Week Six
Question six:
Solution:
In the IPv6 which is an enabled application it will be able to communicate with both
peers in IPv6 and those of IPv4. Using a single socket we can use it in sending and
receiving traffic from either partners of IPv6 and those of IPv4. Note that the
IPv4packets will send packets to IPv4 partners and those of the IPv6 to those of the
IPv6 partners
In making the communication in both to work we can use AF_INET6 sockets which is
used by the IPv6 enabled application for both the IPv6 and the IPv4 partners.
Technologies used in enabling the co-existence of both the ipv4 and ipv6.
1. Tunnelling technique- include a situation where we build the network structure
where we have to tunnel one protocol over the others where encapsulate the
packets of IPv6 within the IPv4 and those of IPv4 to those of the IPv6 packets.
2. Dual stack network- kind of a transition tech where the IPv4 and the IPV6
packets will operate in a cycle on the shared or the links which are
dedicated.in this technology both the IPV6 band the IPV4 are full deployed in
the IT infrastructure.
Question:
What are the major benefits of using IPV6 over IPV4?
Solution:
9
Question six:
Solution:
In the IPv6 which is an enabled application it will be able to communicate with both
peers in IPv6 and those of IPv4. Using a single socket we can use it in sending and
receiving traffic from either partners of IPv6 and those of IPv4. Note that the
IPv4packets will send packets to IPv4 partners and those of the IPv6 to those of the
IPv6 partners
In making the communication in both to work we can use AF_INET6 sockets which is
used by the IPv6 enabled application for both the IPv6 and the IPv4 partners.
Technologies used in enabling the co-existence of both the ipv4 and ipv6.
1. Tunnelling technique- include a situation where we build the network structure
where we have to tunnel one protocol over the others where encapsulate the
packets of IPv6 within the IPv4 and those of IPv4 to those of the IPv6 packets.
2. Dual stack network- kind of a transition tech where the IPv4 and the IPV6
packets will operate in a cycle on the shared or the links which are
dedicated.in this technology both the IPV6 band the IPV4 are full deployed in
the IT infrastructure.
Question:
What are the major benefits of using IPV6 over IPV4?
Solution:
9
1. In IPv6 we have 128 bit addresses unlike in the IPV4 which has 32 bit
addresses clearly showing that the IPV6 has high availability and reliability of
the IP addresses for devices to be added creating an additional
advantage(more scalable than IPV4)
2. It supports connectivity of end-to-end that has helped in eliminating the needs
of using a NAT which has improved the peer to peer connections
3. It promotes interoperability
4. It is more efficient when routing as it reduces the routing table size making it to
be effective and hierarchical.
5. Processing of the packets is more efficient
6. The data flows is direct.
7. The configuration of the network is simple
Week Seven
Question seven:
Solution:
Complete the following table:
MAC Address Port #
00-25-2A-00-11-21 1
00-25-2A-00-10-5D 3
00-25-2A-00-10-6C 2
00-25-2A-00-10-0F 5
00-25-2A-00-10-FC 4
10
addresses clearly showing that the IPV6 has high availability and reliability of
the IP addresses for devices to be added creating an additional
advantage(more scalable than IPV4)
2. It supports connectivity of end-to-end that has helped in eliminating the needs
of using a NAT which has improved the peer to peer connections
3. It promotes interoperability
4. It is more efficient when routing as it reduces the routing table size making it to
be effective and hierarchical.
5. Processing of the packets is more efficient
6. The data flows is direct.
7. The configuration of the network is simple
Week Seven
Question seven:
Solution:
Complete the following table:
MAC Address Port #
00-25-2A-00-11-21 1
00-25-2A-00-10-5D 3
00-25-2A-00-10-6C 2
00-25-2A-00-10-0F 5
00-25-2A-00-10-FC 4
10
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Question:
How does a switch learn a switch table?
Solution:
In layer 2 is where we have switch which usually have a MAC address which
comprises of the MAC address and the port numbers. The switch will follow the
following algorithm.
1. When we receive a frame the switch must compare the source of the Mac
Address to that of the mac address table. If we know the source the switch will
add it to the table with its port number when it was received. In this case the
switch learns the port number and the Mac address of each every emitting
device in the network.
2. It is the mandate of the switch to compare the destination of the MAC address
within the table. If there is any noted entry, the switch will have to do all the
forwarding of the frames out to the associated ports. In cases with no entries
then the switch will have to send all the packets out to all its ports except that
port that port which the frame was received.
Week Eight
Question Eight:
Solution:
1. Man in the middle attack (MIM)
2. Ad Hocs
3. Endpoint attacks
The stated attacks can be addressed by
1. Maintaining an inventory of all the wireless access points that have been
authorized.
2. Detecting the WAPs connected to the network that is wired.
3. We can use a wireless detection system
11
How does a switch learn a switch table?
Solution:
In layer 2 is where we have switch which usually have a MAC address which
comprises of the MAC address and the port numbers. The switch will follow the
following algorithm.
1. When we receive a frame the switch must compare the source of the Mac
Address to that of the mac address table. If we know the source the switch will
add it to the table with its port number when it was received. In this case the
switch learns the port number and the Mac address of each every emitting
device in the network.
2. It is the mandate of the switch to compare the destination of the MAC address
within the table. If there is any noted entry, the switch will have to do all the
forwarding of the frames out to the associated ports. In cases with no entries
then the switch will have to send all the packets out to all its ports except that
port that port which the frame was received.
Week Eight
Question Eight:
Solution:
1. Man in the middle attack (MIM)
2. Ad Hocs
3. Endpoint attacks
The stated attacks can be addressed by
1. Maintaining an inventory of all the wireless access points that have been
authorized.
2. Detecting the WAPs connected to the network that is wired.
3. We can use a wireless detection system
11
4. Disabling all the wireless access on all devices if no need to use it.
Question:
States some of the major attacks that are against the access of the Point password?
Solution:
a. Open hotspots
b. Attacks
c. Defense
d. Attacks based on the WPS
e. WI-FI phishing
12
Question:
States some of the major attacks that are against the access of the Point password?
Solution:
a. Open hotspots
b. Attacks
c. Defense
d. Attacks based on the WPS
e. WI-FI phishing
12
Week Nine
Question:
Solution:
Cloud computing is that model used to enable the ubiquitous, the convenient and the
on-demand network that is shares a pool of computing resources which are
configured such as the networks, the servers, storage services and the application
services. There are three service models namely.
1. Software as a Service (SaaS) which is a service used for providing the
consumers with the applications provided by the vendors in running their
applications over the cloud infrastructure.in this case all applications will be
accessed from the various devices on the client side such as the web browser,
or even programs installed by the consumers that are used to manage and
control the applications. Example is like the AWS EC2
2. Platform as a Service (PaaS) is a service that offering provisions to customers
where they can deploy their resources and applications in to the infrastructure
cloud making it to be consumer related and making them to acquire
application that can help them in creation of programming languages.
Examples is like the Apache Hadoop
3. Infrastructure as a Service (IaaS) is a service that is capable in offering the
provisions of processing, storage and giving all the networking resources for
computing where the clients are helped in deploying and running all the
software’s including the OS and the applications. Example is like the MS
Office 365.
Question:
Lists the four cloud computing deployment models?
Solution:
1. Private cloud model
2. Public cloud model
3. Community cloud model
4. Hybrid cloud model.
13
Question:
Solution:
Cloud computing is that model used to enable the ubiquitous, the convenient and the
on-demand network that is shares a pool of computing resources which are
configured such as the networks, the servers, storage services and the application
services. There are three service models namely.
1. Software as a Service (SaaS) which is a service used for providing the
consumers with the applications provided by the vendors in running their
applications over the cloud infrastructure.in this case all applications will be
accessed from the various devices on the client side such as the web browser,
or even programs installed by the consumers that are used to manage and
control the applications. Example is like the AWS EC2
2. Platform as a Service (PaaS) is a service that offering provisions to customers
where they can deploy their resources and applications in to the infrastructure
cloud making it to be consumer related and making them to acquire
application that can help them in creation of programming languages.
Examples is like the Apache Hadoop
3. Infrastructure as a Service (IaaS) is a service that is capable in offering the
provisions of processing, storage and giving all the networking resources for
computing where the clients are helped in deploying and running all the
software’s including the OS and the applications. Example is like the MS
Office 365.
Question:
Lists the four cloud computing deployment models?
Solution:
1. Private cloud model
2. Public cloud model
3. Community cloud model
4. Hybrid cloud model.
13
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Week Ten
Question Ten:
Solution:
In this case we are tested on the virtualization concept. We have to get the virtual
desktops where we can install hypervisor on the pc that is running the MacOs and
the windows VMs under that specific hypervisor. Since the pc is running the
hypervisor then that what will be displayed on the particular screes. The desktops
that has been replaced with MacOs install will not directly available. Here in this case
we can use the ssh/VNC/RDP on connecting to the VMs.
The product name to be used is the use of the VMware.
Question:
What are some of the benefits of using VMWare for virtualization?
Solution:
1. One is because the data that it to be accessed can be restricted easily.
2. Support in RADIUS is very flexible in the choosing of the factors of
authentications like the two Factor.
3. We can schedule data backups
4. There is little downtime when hosting our virtual desktops.
References
Dauber, R., 2017. The Advantages & Disadvantages of a UTP Cable, NY: techwalla.
fossbytes, 2015. What Is Star Topology? Advantages And Disadvantages Of A Star Topology,
London: fossbytes.
Lorenzo, J., 2015. What is the difference between physical topology and logical topology?,
Alcalingua: University of Alcara.
14
Question Ten:
Solution:
In this case we are tested on the virtualization concept. We have to get the virtual
desktops where we can install hypervisor on the pc that is running the MacOs and
the windows VMs under that specific hypervisor. Since the pc is running the
hypervisor then that what will be displayed on the particular screes. The desktops
that has been replaced with MacOs install will not directly available. Here in this case
we can use the ssh/VNC/RDP on connecting to the VMs.
The product name to be used is the use of the VMware.
Question:
What are some of the benefits of using VMWare for virtualization?
Solution:
1. One is because the data that it to be accessed can be restricted easily.
2. Support in RADIUS is very flexible in the choosing of the factors of
authentications like the two Factor.
3. We can schedule data backups
4. There is little downtime when hosting our virtual desktops.
References
Dauber, R., 2017. The Advantages & Disadvantages of a UTP Cable, NY: techwalla.
fossbytes, 2015. What Is Star Topology? Advantages And Disadvantages Of A Star Topology,
London: fossbytes.
Lorenzo, J., 2015. What is the difference between physical topology and logical topology?,
Alcalingua: University of Alcara.
14
MARKING SHEET - DO NOT DELETE
Question Student Question
Criteria
0 Incorrect/No Response 0 No question provided or minimal attempt
0.5 Limited /Partially incorrect
response OR response is not
in the student’s own words
0.5 Simplistic question/sample answer that
does not demonstrate an understanding of
the topic area OR sample answer is not in
the student’s own words
1 Correct response but could
have more detail
1 Good question that has some challenge,
but could be more challenging and/or the
sample answer needs more
detail/explanation
1.5 Excellent response with good
detail
1.5 Excellent and challenging question with a
detailed sample answer
Week Marks Awarded Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
15
Question Student Question
Criteria
0 Incorrect/No Response 0 No question provided or minimal attempt
0.5 Limited /Partially incorrect
response OR response is not
in the student’s own words
0.5 Simplistic question/sample answer that
does not demonstrate an understanding of
the topic area OR sample answer is not in
the student’s own words
1 Correct response but could
have more detail
1 Good question that has some challenge,
but could be more challenging and/or the
sample answer needs more
detail/explanation
1.5 Excellent response with good
detail
1.5 Excellent and challenging question with a
detailed sample answer
Week Marks Awarded Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
15
Comments:
16
16
1 out of 16
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.