0% found this document useful (0 votes)
7 views2 pages

Assignment Two

Uploaded by

bryanphil619
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views2 pages

Assignment Two

Uploaded by

bryanphil619
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

ASSIGNMENTS TWO

DEADLINE FOR SUBMISSION: 11/10/2024


CLASSIFICATION OF COMPUTERS
 Classify computers based on size and power, and explain the characteristics of supercomputers,
mainframes, minicomputers, and microcomputers.
 Discuss the classification of computers based on purpose, including general-purpose and special-
purpose computers.
 Compare and contrast analog, digital, and hybrid computers, explaining the key differences in how
they process data.
 Examine the classification of computers based on processing capabilities, such as single-user and
multi-user systems, as well as multiprocessing and multitasking systems.
 Classify computers based on architecture, including Von Neumann and Harvard architectures, and
explain how their design principles impact computational processes.

With the aid of a well labelled diagram, discuss different parts of the central processing unit
(CPU).
COMPUTER SECURITY
 Discuss the key principles of computer security: confidentiality, integrity, and availability (CIA Triad).
 Analyze the different types of malware, including viruses, worms, Trojans, ransomware, and spyware,
and discuss their impacts on computer systems.
 Evaluate the role of encryption in protecting data in transit and at rest..
 Examine the importance of firewalls, intrusion detection/prevention systems (IDS/IPS), and antivirus
software in maintaining network security.
 Discuss the concept of social engineering attacks, including phishing, baiting, and pretexting, and how
human behavior plays a role in cybersecurity breaches.

Discuss the following basic computer organization elements;

You might also like