0% found this document useful (0 votes)
8 views3 pages

Assignment Two

Uploaded by

mokuajoash433
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views3 pages

Assignment Two

Uploaded by

mokuajoash433
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

ASSIGNMENTS TWO

DEADLINE FOR SUBMISSION: 11/10/2024


CLASSIFICATION OF COMPUTERS
1. Classify computers based on size and power, and explain the characteristics of supercomputers,
mainframes, minicomputers, and microcomputers.
 Supercomputers are the largest computers of all and have the highest processing power.
 Mainframe computers are large but smaller compared to supercomputers and also have a lower
processing power as compared to supercomputers.
 Minicomputers are smaller than the mainframe computers and have a lower processing power.
 Microcomputers are mainly the personal computers such as the smart phones and laptops which
are easily portable. Microcomputers have the least processing power.

2. Discuss the classification of computers based on purpose, including general-purpose and special-
purpose computers.
 Computers are developed to perform different types of tasks. General purpose computers are
made to perform a large range of activities. Special purpose computers are developed to perform
only one specific activity since they are specialized in only one type of task.

3. Compare and contrast analog, digital, and hybrid computers, explaining the key differences in
how they process data.
 Analog computers process data which is in continuous form while the digital computers process
data that is in discrete form. Hybrid computers process data that is both in continuous and discrete
form.

4. Examine the classification of computers based on processing capabilities, such as single-user and
multi-user systems, as well as multiprocessing and multitasking systems.
 Single-user systems are used to only support one user at a time.
 Multi-user systems are able to support multiple users at the same time.
 Multiprocessing systems are able to process multiple data at the same time without closing an
application to open another one.
 Multi-tasking enables users to open and process different types of data at the same time.

5. Classify computers based on architecture, including Von Neumann and Harvard architectures,
and explain how their design principles impact computational processes.
 Von Neumann is a type of architecture that uses a single memory in data processing
leading to reduced processing speed since data and instructions are retrieved from the
same memory.
 Harvard is a type of architecture in which data and instructions are retrieved from
separate memories thus leading to increased processing speed.
6. With the aid of a well labelled diagram, discuss different parts of the central processing unit
(CPU).

 The Central Processing Unit has two main processing components


a) The Arithmetic Logic Unit
b) The Control Unit
 The control unit is responsible for controlling the flow of data and instructions within the CPU.
 The arithmetic logic unit performs arithmetic and logical operations.

COMPUTER SECURITY
1. Discuss the key principles of computer security: confidentiality, integrity, and availability (CIA
Triad).
 Confidentiality is simply the privacy of information stored in a computer. Confidentiality is
important since it prevents people without authorization from gaining access to the information
and makes it easy for authorized personnel to gain access to the information.
 Integrity is the accuracy and completeness of stored information limiting the tendency of
modifying this information.
 Availability is put in place to ensure that information is readily available the users who are
authorized only and that’s only when the authorized users need the information

2. Analyze the different types of malwares, including viruses, worms, Trojans, ransomware, and
spyware, and discuss their impacts on computer systems.
 Viruses get attached to files and spread out when the computer user opens them.
 Worms creates a replicate of itself and spreads to other parts.
 Trojans a type of virus that is disguised as a legitimate software but when opened it spreads all
through a network.
 Ransomware is a type of software that encrypts data and asks for ransom to decrypt the data.
 Spyware is a type of data that illegally collects the user’s data.

3. Evaluate the role of encryption in protecting data in transit and at rest.


 Encryption converts data into a coded format thus making it possible for only the user to access
information.

4. Examine the importance of firewalls, intrusion detection/prevention systems (IDS/IPS), and


antivirus software in maintaining network security.
 Firewalls controls network traffics thus allowing or denying connections based on security
settings.
 Intrusions detection/prevention systems monitor network traffics and prevent any problem that
might arise.
 Antivirus software are softwares that protects the computer against virus softwares that may
damage the computer.

5. Discuss the concept of social engineering attacks, including phishing, baiting, and pretexting,
and how human behavior plays a role in cybersecurity breaches.
 Phishing is as a result of tricking people into revealing sensitive information using various
websites.
 Baiting is giving people small items such as free flash disks which when inserted into the
computer they may corrupt it fully.
 Pretexting is simply impersonating a person and texting a computer user making him or her to
reveal some information.

You might also like