Higher Nationals - Internal Verification of Assessment Decisions - BTEC (RQF)
Higher Nationals - Internal Verification of Assessment Decisions - BTEC (RQF)
Higher Nationals - Internal Verification of Assessment Decisions - BTEC (RQF)
• Constructive?
Y/N
• Linked to relevant
Y/N
assessment criteria?
Y/N
• Identifying
opportunities for Y/N
improved
performance?
• Agreeing actions?
Does the assessment decision need Y/N
amending?
Assessor signature Date
II | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
Higher Nationals – Summative Assignment Feedback Form
LO3 Determine solutions of graphical examples using geometry and vector methods.
Pass, Merit & P5 P6 M3 D3
Distinction Descripts
LO4 Evaluate problems concerning differential and integral calculus.
3|P a g e B R I N D H A S H R EE R A V ID A A S M F C R EG N O - N EG / A - 0 1 6 4 6 9
Student Declaration
I hereby, declare that I know what plagiarism entails, namely, to use another’s work
and to present it as my own without attributing the sources in the correct way. I further
understand what it means to copy another’s work.
[email protected]
Student’s Signature: Date:
(Provide E-mail ID) (Provide Submission Date)
4|P a g e B R I N D H A S H R EE R A V ID A A S M F C R EG N O - N EG / A - 0 1 6 4 6 9
Feedback Form
Action Plan
Summative feedback
Assessor’s
Date
Signature
Student’s
Signature [email protected] Date
5|P a g e B R I N D H A S H R EE R A V ID A A S M F C R EG N O - N EG / A - 0 1 6 4 6 9
Assignment Brief
Issue Date
Submission Date
Submission Format:
This assignment should be submitted at the end of your lesson, on the week stated at
the front of this brief. The assignment can either be word-processed or completed in
legible handwriting.
If the tasks are completed over multiple pages, ensure that your name and student
number are present on each sheet of paper.
6|P a g e B R I N D H A S H R EE R A V ID A A S M F C R EG N O - N EG / A - 0 1 6 4 6 9
PEARSON BTEC
HND
COMPUTING
7|P a g e B R I N D H A S H R EE R A V ID A A S M F C R EG N O - N EG / A - 0 1 6 4 6 9
Table of Contents
ACTIVITY O1...................................................................................................................................................................10
LO1: Use applied number theory in practical computing scenarios........................................................................10
ACTIVITY 02....................................................................................................................................................................16
LO2: Analyze events using probability theory and probability distributions. .......................................................16
ACTIVITY 03....................................................................................................................................................................38
LO3: Determine solutions of graphical examples using geometry and vector methods. .......................................38
ACTIVITY 04....................................................................................................................................................................45
Bibliography ......................................................................................................................................................................55
LIST OF TABLES
8|P a g e B R I N D H A S H R EE R A V ID A A S M F C R EG N O - N EG / A - 0 1 6 4 6 9
LIST OF FIGURES
Figure 1: Activity 1, Question 4(Authors Work) ........................................................................................... 12
Figure 2: Activity 01, question 5(author’s work) .......................................................................................... 13
Figure 3: Activity 01, question 5(author’s work) .......................................................................................... 14
Figure 4: Activity 02, question 2a (author’s work) ....................................................................................... 17
Figure 5: Activity 02, question 2b (author’s work) ....................................................................................... 18
Figure 6: Activity 02 question 03 a(author’s work) ...................................................................................... 19
Figure 7: Activity 02 question 03 b, c (author’s work) ................................................................................. 20
Figure 8: Activity 02, Question 4a,b (Author’s work) .................................................................................. 21
Figure 9: Activity 02, Question 4c (Author’s work) ...................................................................................... 22
Figure 10: Probability histogram of X (author’s work) ............................................................................... 23
Figure 11: continuous random variable pdf .................................................................................................. 24
Figure 12: p.d.f graph ...................................................................................................................................... 24
Figure 13: Activity 02, Question 6a (Author’s work) ................................................................................... 25
Figure 14: Activity 02, Question 6b (Author’s work) ................................................................................... 26
Figure 15: Activity 02, Question 6c (Author’s work) .................................................................................... 27
Figure 16: Activity 02, Question 6d (Author’s work) ................................................................................... 28
Figure 17: Activity 02, question 07 (Author's work)..................................................................................... 29
Figure 18: Activity 02, question 10 (Author's work)..................................................................................... 30
Figure 19: Activity 02, Question 11 (Author's work) .................................................................................... 31
Figure 20: Activity 02 Question 12a (Author’s work) .................................................................................. 32
Figure 21: Activity 02 Question 12b,c (Author’s work) ............................................................................... 33
Figure 22: Activity 02 Question 12d (Author’s work) .................................................................................. 34
Figure 23: Hash function ................................................................................................................................. 35
Figure 24: Balls and Bins ................................................................................................................................. 35
Figure 25: Hash Table...................................................................................................................................... 36
Figure 26: Activity 03 Question 1 (Author’s Work) ..................................................................................... 38
Figure 27: Activity 03 Question 2 (Author’s Work) ..................................................................................... 39
Figure 28: Activity 03 Question 3 (Author’s Work) ..................................................................................... 40
Figure 29: Activity 03 Question 4 (Author’s Work) ..................................................................................... 41
Figure 30: Activity 03 Question 4 (Author’s Work) ..................................................................................... 42
Figure 31: Activity 03 Question 5i (Author’s Work) ................................................................................... 43
Figure 32: Activity 03 Question 5ii (Author’s Work) ................................................................................... 43
Figure 33: Activity 03 Question 6 (Author’s Work) ..................................................................................... 44
Figure 34: Activity 04, Question 01 (Author's work) .................................................................................... 45
Figure 35: Activity 04, Question 02 (Author's work) .................................................................................... 45
Figure 36: Activity 04, Question 3 (Author's work) ...................................................................................... 46
Figure 37: Activity 04, Question 3 (Author's work) ...................................................................................... 46
Figure 38: Activity 04, Question 4 (Author's work) ...................................................................................... 47
Figure 39: Activity 04, Question 5 (Author's work) ...................................................................................... 48
Figure 40: Activity 04, Question 5 (Author's work)...................................................................................... 49
Figure 41: Activity 04, Question 5 (Author's work) ...................................................................................... 50
Figure 42: Activity 04, Question 5 (Author's work) ...................................................................................... 51
Figure 43: Activity 04, Question 6 (Author's work) ...................................................................................... 52
Figure 44: Activity 04, Question 6 (Author's work) ...................................................................................... 53
9|P a g e B R I N D H A S H R EE R A V ID A A S M F C R EG N O - N EG / A - 0 1 6 4 6 9
ACTIVITY O1
LO1: Use applied number theory in practical computing scenarios.
PART 01
a) 20 squares
b)
20M
Therefore;
4 is the length of the
• Area of the
A= l x b
=4x4
= 16 m2
• Area of the ream of cloth;
A= l x b
= 16 x 20
= 320 m2
• Squared pieces that can be cut are;
320/16 = 20 pieces.
10 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
2.0
a) 24th
b) Finding on which day the customers will come next using LCM;
2 2 4 6 8
2 1 2 3 4
2 1 1 3 2
2 1 1 3 1
3 1 1 3 1
3 1 1 1 1
Therefore the LCM is = 2x2x2x3 = 24
PART 02
3.0
a) 255 logs
b) Sn = n/2 ( a + l)
= 15/2 (10+24)
= 15/2 (34)
= 255
Sum of arithmetic progression equation is applied to find the total number of logs.
4.0
• 1st year salary = Rs. 50000 and 4% raise for every year.
At the 10th year his salary would be = Rs. 71,165.55
Total amount from the 1st to 10th year = Rs. 6,00,305.212
Working is shown below.
11 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
Figure 1: Activity 1, Question 4(Authors Work)
12 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
PART 03
5.0
13 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
Figure 3: Activity 01, question 5(author’s work)
14 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
6.0
Prime numbers are ordinary counting integers that can be divided by 1 and the prime number itself. Prime
numbers play important role in computing. E.g;
• Cryptography - the RSA system in cryptography uses prime numbers widely to calculate the public and
the private keys. The strength of this system relies on the difficulty of factoring large numbers-
specifically the difficulty associated with the finding of the specific pair of prime numbers selected to
create a large integer called the modulus.
• Diffie-Hellman Key Exchange in cryptography uses prime numbers. It uses a large prime number p as a
common modulus which is based on which two entities, let’s say A and B can communicate securely
using their private, undisclosed keys. It is mainly based on the property that if both A and B choose a
private key, let’s say „a‟ and „b‟ respectively, and agree upon a number, let’s say, „g‟ publicly, where
„g‟ is less than „p‟, then both A and B can send a message to the other one as follows:
A‟s message = M1 = g a modulo p
B‟s message = M2 = g b modulo p
Then,
X = M2 a modulo p = M1 b modulo p = g(a*b) modulo p,
Is the message shared. Its security lies in the difficulty involved in finding the shared message without
knowing either of the private keys.
• Calculating hash codes - A hash code is a number code for every object that is created by a program.
Hash codes are required for quick retrieval or storing of complex objects from or in a hash table. Hash
codes need to be reasonably unique for each object so that correctness is maintained. Prime numbers are
used in computing hash codes for this reason.
(9, September 2015)
Desai, T., 9, September 2015. Application of Prime Numbers in Computer Science. International Journal of
Science and Research (IJSR).
PART 01
1.0
Conditional probability is defined as the likelihood of an event or outcome occurring, based on the
occurrence of a previous event or outcome. Conditional probability is calculated by multiplying the
probability of the preceding event by the updated probability of the succeeding or conditional, event.
Formula;
P (B|A) = P (A ∩ B) ⁄ P (A)
E.g;
01)
Event A – an individual applying for college will be accepted.
80% is the chance that this individual will be accepted.
Event B – this individual will be given dormitory.
Only 60% of all students all accepted students.
P (Accepted and dormitory housing) = P (Dormitory housing/accepted) x P (Accepted)
= (60/100) x (80/100)
= 0.48 = 12/25
02)
The probability that it is Friday and that a student is absent is 0.03. Since there are 5 school days in a week,
the probability that it is Friday is 0.2. What is the probability that a student is absent given that today is
Friday?
P (Absent | Friday) = P (Absent and Friday)⁄P(Friday)
= 0.03/0.2
= 0.15
= 15 %
16 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
2.0
a)
17 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
b)
18 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
3.0
a)
19 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
b,c)
20 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
4.0
a,b)
21 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
c)
22 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
PART 02
5.0
i. Discrete Random Variable
Discrete random variable whose values are obtained by counting.
E.g;
• Number of pink marbles in a jar.
• Number students absent in a classroom.
• Number of tails when flipping a coin.
Discrete random variable X has a countable number of possible values.
For an example let’s say;
Let X represents the sum of two dices. The probability distribution of X will be;
x 2 3 4 5 6 7 8 9 10 11 12
P(X) 1/36 2/36 3/36 4/36 5/36 6/36 5/36 4/36 3/36 2/36 1/36
Table 1: Probability distribution of X (author’s work)
0.18
0.16
0.14
0.12
Probability
0.1
0.08
0.06
0.04
0.02
0
2 3 4 5 6 7 8 9 10 11 12
Outcome
23 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
ii. Continuous Random Variable
Continuous variable is a variable whose value is obtained by measuring, data can take infinitely many values.
E.g;
• Height of students in a classroom.
• Weight of students in classroom.
• Distance travelled between classes.
Probability function of the continuous random variable is called the probability density function, or briefly
p.d.f. It is denoted by f(x)f(x) where f(x)f(x) is the probability that the random variable XX takes the value
between xx and x+Δxx+Δx where ΔxΔx is a very small change in XX. ()
f(x)
f(x)
0 x x+ x
24 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
6.0
a)
25 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
b)
26 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
c)
27 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
d)
28 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
7.0
29 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
PART 03
10.0
30 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
11.0
31 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
12.0
a)
32 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
b)
34 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
13.0
A famous method to store a collection of items to support faster look-up is hashing them into a table; the issue
is when we attempt to store more than one item in the same slot. In hash tables, you store data in forms of key
and value pairs. The key, which is used to identify the data, is given as an input to the hashing function. The
hash code, which is an integer, is then mapped to the fixed size we have. We could store these in pairs in a
linked list but this requires a order of n ‘o(n)’ access time.
35 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
• I have added m items to an n- bucket hash table. What "interesting questions" can I ask about the
table's state?
• How large must m is such that it is likely there exists a bin with at least two balls? (Birthday Paradox)
P (all bins have at most one ball) = [n /n × n – 1/ n] × [n − 2 /n] × . . . × [n − m + 1/ n]
e.g;
For n = 365 and m ≥ 23 there is a greater than 1/2 chance that there exists a bin with two or more balls.
Recall that in this process we distribute k balls in n bins, where each ball is independently placed in a
uniformly random bin. We can ask questions such as:
• How large can we choose k while ensuring that with probability at least 1/2, no two balls land in the same
bin?
• If k = n, what is the maximum number of balls that are likely to land in the same bin?
As we shall see, these two simple questions provide important insights into two important computer science
applications: hashing and load balancing. Our answers to these two questions are based on the application of a
simple technique called the union bound, which states that P[A∪B] ≤ P[A] +P[B].
One of the basic issues in hashing is the trade-off between the size of the hash table and the number of
collisions.
Let’s see how this problem can be put into the balls and bins framework. The balls will be the m keys to be
stored, and the bins will be the n locations in the hash table T. Since the hash function maps each key to a
random location in the table T, we can see each key (ball) as choosing a hash table location (bin) uniformly
and independently from T. Thus the probability space corresponding to this hashing experiment is exactly the
same as the balls and bins space.
36 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
We are interested in the event A that there is no collision, or equivalently, that all m balls land in different
bins. Clearly Pr[A] will decrease as m increases (with n fixed). Our goal is to find the largest value of m such
that Pr[A] remains above 1/2 .
Let it be;
And hence no bin has more than k = 2 log n balls in it with probability at least 1 − 1/n
(Anon., Spring 2015) , (McGregor, n.d.)
37 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
ACTIVITY 03
LO3: Determine solutions of graphical examples using geometry and vector
methods.
PART 01
1.0
38 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
2.0
39 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
3.0
40 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
4.0
41 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
y
(0,2) 2x-4y=3
0
(3/2,0) (10/3,)
x
3x+5y=10
(0,-3/4)
x=2.5 At
intersection
y=0.5
42 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
5.0
I.
z
x y
Equation y=4 shows all the set of pairs in R3 whose y coordinate is 4 ‘units’, it is the vertical line plane which
is parallel to ‘xz’ plane and 4 units right of it.
II.
z
x 0
Equation z=5 shows the set [{x,y,z} Z=5 ] which is the set of all the points in the R3 where z coordinate is 5
‘units’ and this is the horizontal plane that is parallel to ‘xy’ plane and 5 units above it.
43 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
6.0
Then,
h=||c||⋅|cos(θ)|.
V=1/6||a×b||⋅||c||⋅|cos(θ)|
44 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
ACTIVITY 04
LO4: Evaluate problems concerning differential and integral calculus.
PART 01
1.0
2.0
45 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
PART 02
3.0
f(x) = 2x2 + 1
g(x) = 8 – 2x
46 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
4.0
47 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
PART 03
5.0
48 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
Figure 40: Activity 04, Question 5 (Author's work)
49 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
Figure 41: Activity 04, Question 5 (Author's work)
50 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
Figure 42: Activity 04, Question 5 (Author's work)
51 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
6.0
52 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
Figure 44: Activity 04, Question 6 (Author's work)
53 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
REFFERANCE
Works Cited
Attwood, Greg, et al. Edexcel as and a Level Modular Mathematics. Core Mathematics 1, C1. Harlow,
Pearson Schools, 2008.
---. Edexcel as and a Level Modular Mathematics. Core Mathematics 1, C1. Harlow, Pearson Schools, 2008.
---. Edexcel as and a Level Modular Mathematics. Further Pure Mathematics 1, FP1. Harlow, Pearson
Education Limited, 2009.
---. Further Pure Mathematics 2. Harlow, Pearson Education, 2009.
“Birthday Attack Probability | Hash Function Collisions.” Www.johndcook.com, 10 Jan. 2017,
www.johndcook.com/blog/2017/01/10/probability-of-secure-hash-
collisions/#:~:text=As%20a%20rule%20of%20thumb. Accessed 4 Mar. 2022.
CS 70 Discrete Mathematics and Probability Theory Spring 2015 Vazirani Note 15 Two Killer Applications:
Hashing and Load Balancing.
Desmos. “Desmos Graphing Calculator.” Desmos Graphing Calculator, 2021, www.desmos.com/calculator.
“Discrete Mathematics Tutorial - Javatpoint.” Www.javatpoint.com, www.javatpoint.com/discrete-
mathematics-tutorial.
“Example on Hashing + Probability | Techtud.” Www.techtud.com, www.techtud.com/example/example-
hashing-probability. Accessed 4 Mar. 2022.
HND in COMPUTING. Vol. UNIT 11: MATHS FOR COMPUTING, ESOFT METRO CAMPUS, 2019.
“Importance of Hashing.” GeeksforGeeks, 2 June 2020, www.geeksforgeeks.org/importance-of-hashing/.
Langmead, Ben. Hash Tables & Probability.
“Mathematics | Conditional Probability.” GeeksforGeeks, 13 Aug. 2015, www.geeksforgeeks.org/conditional-
probability/#:~:text=Conditional%20probability%20P(A%20%7C%20B. Accessed 4 Mar. 2022.
Mcgregor, Andrew. Balls into Bins CMPSCI 240: Reasoning about Uncertainty Lecture 19: Balls and Bins
and Hashing.
“Statistics - Random Variables and Probability Distributions | Britannica.” Encyclopædia Britannica, 2020,
www.britannica.com/science/statistics/Random-variables-and-probability-distributions.
“Tetrahedron - Definition, Properties, Formulas, Examples.” Cuemath,
www.cuemath.com/geometry/tetrahedron/.
“What Is Hashing? How Hash Codes Work - with Examples.” FreeCodeCamp.org, 26 Jan. 2020,
www.freecodecamp.org/news/what-is-hashing/#:~:text=Hashing%20is%20designed%20to%20solve.
Accessed 4 Mar. 2022.
54 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9
Wieder, Udi. “Hashing, Load Balancing and Multiple Choice.” Foundations and Trends® in Theoretical
Computer Science, vol. 12, no. 3-4, 2017, pp. 275–379, 10.1561/0400000070. Accessed 22 Feb. 2022.
Bibliography
55 | P a g e B R I N D H A S H R E E R A V I D A A S M F C R E G N O - N E G / A - 0 1 6 4 6 9