- Home
- Resources
- Work samples
- Samples
- Investigation: Secure networks - ABOVE
Digital Technologies
Years 9 and 10
Above satisfactory
Investigation: Secure networks
![](/media/2590/digital-9-10-ws5-ab-a1_page_01.jpg)
![](/media/2593/digital-9-10-ws5-ab-a1_page_02.jpg)
Identifies key differences and similarities between the home local area network (LAN) and the school system wide area network (WAN)
-
Annotations
-
1
Annotation 1
Identifies key differences and similarities between the home local area network (LAN) and the school system wide area network (WAN)
![](/media/2592/digital-9-10-ws5-ab-a1_page_03.jpg)
Provides images to illustrate the difference between a LAN and WAN including the interactions between different hardware components
-
Annotations
-
1
Annotation 1
Provides images to illustrate the difference between a LAN and WAN including the interactions between different hardware components
![](/media/2595/digital-9-10-ws5-ab-a1_page_04.jpg)
Explains the need for internal management and control hardware, that is, private addressing, and how it allocates addresses
-
Annotations
-
1
Annotation 1
Explains the need for internal management and control hardware, that is, private addressing, and how it allocates addresses
![](/media/2594/digital-9-10-ws5-ab-a1_page_05.jpg)
Identifies a range of security mechanisms and the risks they mitigate
-
Annotations
-
1
Annotation 1
Identifies a range of security mechanisms and the risks they mitigate
![](/media/2591/digital-9-10-ws5-ab-a1_page_06.jpg)
Identifies how data are kept secure on the school network
-
Annotations
-
1
Annotation 1
Identifies how data are kept secure on the school network
![](/media/2596/digital-9-10-ws5-ab-a1_page_07.jpg)
Demonstrates understanding of the concept of the appropriateness of security for a situation, by suggesting how to improve security and identifying the implications of each suggestion
-
Annotations
-
1
Annotation 1
Demonstrates understanding of the concept of the appropriateness of security for a situation, by suggesting how to improve security and identifying the implications of each suggestion
![](/media/2599/digital-9-10-ws5-ab-a1_page_08.jpg)
Explains a range of implications of not taking appropriate security precautions
-
Annotations
-
1
Annotation 1
Explains a range of implications of not taking appropriate security precautions
![](/media/2598/digital-9-10-ws5-ab-a1_page_09.jpg)
![](/media/2597/digital-9-10-ws5-ab-a1_page_10.jpg)
![](/media/2600/digital-9-10-ws5-a2-2016-608-ab_page_1.jpg)
Demonstrates knowledge of correct terminology related to data transmission
-
Annotations
-
1
Annotation 1
Demonstrates knowledge of correct terminology related to data transmission
![](/media/2602/digital-9-10-ws5-a2-2016-608-ab_page_2.jpg)
Demonstrates sound understanding of the interactions between hardware, software and users
-
Annotations
-
1
Annotation 1
Demonstrates sound understanding of the interactions between hardware, software and users
![](/media/2603/digital-9-10-ws5-a2-2016-608-ab_page_3.jpg)
Identifies correctly how hardware is linked together on a network 2 Annotation 2
Summarises succinctly the main features of a star topology and identifies pertinent advantages and disadvantages
-
Annotations
-
1
Annotation 1
Identifies correctly how hardware is linked together on a network -
2
Annotation 2
Summarises succinctly the main features of a star topology and identifies pertinent advantages and disadvantages
![](/media/2604/digital-9-10-ws5-a2-2016-608-ab_page_4.jpg)
Summarises succinctly the main features of a bus topology and identifies pertinent advantages and disadvantages 2 Annotation 2
Selects and explains appropriate topology including the mix of technologies required that balance both purpose and performance, and allow for growth
-
Annotations
-
1
Annotation 1
Summarises succinctly the main features of a bus topology and identifies pertinent advantages and disadvantages -
2
Annotation 2
Selects and explains appropriate topology including the mix of technologies required that balance both purpose and performance, and allow for growth
![](/media/2601/digital-9-10-ws5-a2-2016-608-ab_page_5.jpg)
Draws a diagram of an extended star network including a range of connections and using appropriate conventions
-
Annotations
-
1
Annotation 1
Draws a diagram of an extended star network including a range of connections and using appropriate conventions
Below satisfactory
Investigation: Secure networks
![](/media/2793/digital-9-10-ws5-b-a1_page_1.jpg)
![](/media/2796/digital-9-10-ws5-b-a1_page_3.jpg)
Identifies general purpose of a home network and lists hardware components
-
Annotations
-
1
Annotation 1
Identifies general purpose of a home network and lists hardware components
![](/media/2798/digital-9-10-ws5-b-a1_page_2.jpg)
Identifies general purpose of the school network and lists hardware components
-
Annotations
-
1
Annotation 1
Identifies general purpose of the school network and lists hardware components
![](/media/2797/digital-9-10-ws5-b-a1_page_4.jpg)
Creates a diagram that suggests multiple devices are connected in some way
-
Annotations
-
1
Annotation 1
Creates a diagram that suggests multiple devices are connected in some way
![](/media/2794/digital-9-10-ws5-b-a1_page_5.jpg)
Lists a range of network security features
-
Annotations
-
1
Annotation 1
Lists a range of network security features
![](/media/2795/digital-9-10-ws5-b-a1_page_6.jpg)
![](/media/2799/digital-9-10-ws5-b-a1_page_7.jpg)
![](/media/2801/digital-ws5-a2-2016-610-b_page_1.jpg)
Demonstrates limited knowledge of terminology related to data transmission
-
Annotations
-
1
Annotation 1
Demonstrates limited knowledge of terminology related to data transmission
![](/media/2800/digital-ws5-a2-2016-610-b_page_2.jpg)
![](/media/2804/digital-ws5-a2-2016-610-b_page_3.jpg)
Identifies correctly how hardware is linked together on a network
-
Annotations
-
1
Annotation 1
Identifies correctly how hardware is linked together on a network
![](/media/2803/digital-ws5-a2-2016-610-b_page_4.jpg)
Describes the visual representation only of a bus topology 2 Annotation 2
States the topology selected and two possible benefits
-
Annotations
-
1
Annotation 1
Describes the visual representation only of a bus topology -
2
Annotation 2
States the topology selected and two possible benefits
![](/media/2802/digital-ws5-a2-2016-610-b_page_5.jpg)
Draws a simple line drawing of the relationship between components
-
Annotations
-
1
Annotation 1
Draws a simple line drawing of the relationship between components
Satisfactory
Investigation: Secure networks
![](/media/2648/digital-9-10-ws5-at-a1_page_01.jpg)
![](/media/2647/digital-9-10-ws5-at-a1_page_02.jpg)
![](/media/2649/digital-9-10-ws5-at-a1_page_03.jpg)
Describes the purpose and main components of a home broadband network
-
Annotations
-
1
Annotation 1
Describes the purpose and main components of a home broadband network
![](/media/2650/digital-9-10-ws5-at-a1_page_04.jpg)
Identifies the purpose of the school network and its main components
-
Annotations
-
1
Annotation 1
Identifies the purpose of the school network and its main components
![](/media/2651/digital-9-10-ws5-at-a1_page_05.jpg)
Creates a diagram to illustrate the topology of the school network showing the interactions between different hardware components
-
Annotations
-
1
Annotation 1
Creates a diagram to illustrate the topology of the school network showing the interactions between different hardware components
![](/media/2658/digital-9-10-ws5-at-a1_page_06.jpg)
Explains the purpose of internet protocol (IP) addresses
-
Annotations
-
1
Annotation 1
Explains the purpose of internet protocol (IP) addresses
![](/media/2652/digital-9-10-ws5-at-a1_page_07.jpg)
![](/media/2657/digital-9-10-ws5-at-a1_page_08.jpg)
Identifies a security feature of the school internet service
-
Annotations
-
1
Annotation 1
Identifies a security feature of the school internet service
![](/media/2656/digital-9-10-ws5-at-a1_page_09.jpg)
Explains how the security protocol used protects data of different types being transferred
-
Annotations
-
1
Annotation 1
Explains how the security protocol used protects data of different types being transferred
![](/media/2653/digital-9-10-ws5-at-a1_page_10.jpg)
Explains some possible improvements to security protocols
-
Annotations
-
1
Annotation 1
Explains some possible improvements to security protocols
![](/media/2655/digital-9-10-ws5-at-a1_page_11.jpg)
Explains clearly the implications to devices and data of poor security protocols
-
Annotations
-
1
Annotation 1
Explains clearly the implications to devices and data of poor security protocols
![](/media/2654/digital-9-10-ws5-at-a1_page_12.jpg)
![](/media/2659/digital-9-10-ws5-a2-2016-609-at_page_1.jpg)
Demonstrates some knowledge of correct terminology related to data transmission
-
Annotations
-
1
Annotation 1
Demonstrates some knowledge of correct terminology related to data transmission
![](/media/2660/digital-9-10-ws5-a2-2016-609-at_page_2.jpg)
Responds appropriately to most types of interactions (hardware, software and user)
-
Annotations
-
1
Annotation 1
Responds appropriately to most types of interactions (hardware, software and user)
![](/media/2661/digital-9-10-ws5-a2-2016-609-at_page_3.jpg)
Identifies correctly how hardware is linked together on a network 2 Annotation 2
Describes the main features of a star topology and identifies some advantages and disadvantages
-
Annotations
-
1
Annotation 1
Identifies correctly how hardware is linked together on a network -
2
Annotation 2
Describes the main features of a star topology and identifies some advantages and disadvantages
![](/media/2662/digital-9-10-ws5-a2-2016-609-at_page_4.jpg)
Describes the main features of a bus topology and identifies some advantages and disadvantages 2 Annotation 2
Explains the appropriate choice of topology based on network purpose, future need and hardware specifications
-
Annotations
-
1
Annotation 1
Describes the main features of a bus topology and identifies some advantages and disadvantages -
2
Annotation 2
Explains the appropriate choice of topology based on network purpose, future need and hardware specifications
![](/media/2663/digital-9-10-ws5-a2-2016-609-at_page_5.jpg)
Draws a diagram of a hybrid network featuring elements of star and bus topology
-
Annotations
-
1
Annotation 1
Draws a diagram of a hybrid network featuring elements of star and bus topology
Above satisfactory
Investigation: Secure networks
![](/media/2590/digital-9-10-ws5-ab-a1_page_01.jpg)
![](/media/2593/digital-9-10-ws5-ab-a1_page_02.jpg)
Identifies key differences and similarities between the home local area network (LAN) and the school system wide area network (WAN)
-
Annotations
-
1
Annotation 1
Identifies key differences and similarities between the home local area network (LAN) and the school system wide area network (WAN)
![](/media/2592/digital-9-10-ws5-ab-a1_page_03.jpg)
Provides images to illustrate the difference between a LAN and WAN including the interactions between different hardware components
-
Annotations
-
1
Annotation 1
Provides images to illustrate the difference between a LAN and WAN including the interactions between different hardware components
![](/media/2595/digital-9-10-ws5-ab-a1_page_04.jpg)
Explains the need for internal management and control hardware, that is, private addressing, and how it allocates addresses
-
Annotations
-
1
Annotation 1
Explains the need for internal management and control hardware, that is, private addressing, and how it allocates addresses
![](/media/2594/digital-9-10-ws5-ab-a1_page_05.jpg)
Identifies a range of security mechanisms and the risks they mitigate
-
Annotations
-
1
Annotation 1
Identifies a range of security mechanisms and the risks they mitigate
![](/media/2591/digital-9-10-ws5-ab-a1_page_06.jpg)
Identifies how data are kept secure on the school network
-
Annotations
-
1
Annotation 1
Identifies how data are kept secure on the school network
![](/media/2596/digital-9-10-ws5-ab-a1_page_07.jpg)
Demonstrates understanding of the concept of the appropriateness of security for a situation, by suggesting how to improve security and identifying the implications of each suggestion
-
Annotations
-
1
Annotation 1
Demonstrates understanding of the concept of the appropriateness of security for a situation, by suggesting how to improve security and identifying the implications of each suggestion
![](/media/2599/digital-9-10-ws5-ab-a1_page_08.jpg)
Explains a range of implications of not taking appropriate security precautions
-
Annotations
-
1
Annotation 1
Explains a range of implications of not taking appropriate security precautions
![](/media/2598/digital-9-10-ws5-ab-a1_page_09.jpg)
![](/media/2597/digital-9-10-ws5-ab-a1_page_10.jpg)
![](/media/2600/digital-9-10-ws5-a2-2016-608-ab_page_1.jpg)
Demonstrates knowledge of correct terminology related to data transmission
-
Annotations
-
1
Annotation 1
Demonstrates knowledge of correct terminology related to data transmission
![](/media/2602/digital-9-10-ws5-a2-2016-608-ab_page_2.jpg)
Demonstrates sound understanding of the interactions between hardware, software and users
-
Annotations
-
1
Annotation 1
Demonstrates sound understanding of the interactions between hardware, software and users
![](/media/2603/digital-9-10-ws5-a2-2016-608-ab_page_3.jpg)
Identifies correctly how hardware is linked together on a network 2 Annotation 2
Summarises succinctly the main features of a star topology and identifies pertinent advantages and disadvantages
-
Annotations
-
1
Annotation 1
Identifies correctly how hardware is linked together on a network -
2
Annotation 2
Summarises succinctly the main features of a star topology and identifies pertinent advantages and disadvantages
![](/media/2604/digital-9-10-ws5-a2-2016-608-ab_page_4.jpg)
Summarises succinctly the main features of a bus topology and identifies pertinent advantages and disadvantages 2 Annotation 2
Selects and explains appropriate topology including the mix of technologies required that balance both purpose and performance, and allow for growth
-
Annotations
-
1
Annotation 1
Summarises succinctly the main features of a bus topology and identifies pertinent advantages and disadvantages -
2
Annotation 2
Selects and explains appropriate topology including the mix of technologies required that balance both purpose and performance, and allow for growth
![](/media/2601/digital-9-10-ws5-a2-2016-608-ab_page_5.jpg)
Draws a diagram of an extended star network including a range of connections and using appropriate conventions
-
Annotations
-
1
Annotation 1
Draws a diagram of an extended star network including a range of connections and using appropriate conventions