For each question, provide a one to two sentences per question. Assignments must be submitted as a Microsoft Word or PDF document. Other file formats may not be accepted. The file name of the assignment should include the student's name, the assignment number, and the course name (e.g., John_Smith_Assignment1_Networking101). All written responses must be typed, double-spaced, and use a standard font (e.g., Times New Roman or Arial) with 12-point font size. Assessment questions for the topics: What is the internet? a) Define the internet in your own words. b) What are some of the key components that make up the internet? Network Edge and Network Core: a) What is the difference between the network edge and the network core? b) What types of devices are typically found at the network edge? What types of devices are typically found in the network core? Delay, Loss, and Throughput in Packet Switched Networks: a) What is packet loss? How can it impact network performance? b) Explain the difference between latency and throughput in the context of packet-switched networks. Protocol Layers: a) What is the OSI model? What are its seven layers? b) Why is it useful to organize protocols into distinct layers? Service Models: a) What is Infrastructure as a Service (IaaS)? How does it differ from Platform as a Service (PaaS) and Software as a Service (SaaS)? b) What are some advantages of using a service model for providing computing resources? Network Security Under Attack: a) What is a denial-of-service (DoS) attack? How can it be prevented? b) Describe the difference between phishing and malware attacks. Is infrastructure network security enough to protect against all cyber threats? a) Explain why or why not. b) What are some common vulnerabilities in network infrastructure that can be exploited by cybercriminals? What is application security? a) How does application security differ from infrastructure security? b) Give an example of an application security vulnerability. How can a security culture be developed within an organization? a) What are some ways to promote security awareness and best practices among employees? b) What are some benefits of having a strong security culture? What is the role of risk management in network security? a) Explain why risk management is important for network security. b) What are some common risk assessment methodologies used in network security?.