Assignment Two
Assignment Two
2. Discuss the classification of computers based on purpose, including general-purpose and special-
purpose computers.
Computers are developed to perform different types of tasks. General purpose computers are
made to perform a large range of activities. Special purpose computers are developed to perform
only one specific activity since they are specialized in only one type of task.
3. Compare and contrast analog, digital, and hybrid computers, explaining the key differences in
how they process data.
Analog computers process data which is in continuous form while the digital computers process
data that is in discrete form. Hybrid computers process data that is both in continuous and discrete
form.
4. Examine the classification of computers based on processing capabilities, such as single-user and
multi-user systems, as well as multiprocessing and multitasking systems.
Single-user systems are used to only support one user at a time.
Multi-user systems are able to support multiple users at the same time.
Multiprocessing systems are able to process multiple data at the same time without closing an
application to open another one.
Multi-tasking enables users to open and process different types of data at the same time.
5. Classify computers based on architecture, including Von Neumann and Harvard architectures,
and explain how their design principles impact computational processes.
Von Neumann is a type of architecture that uses a single memory in data processing
leading to reduced processing speed since data and instructions are retrieved from the
same memory.
Harvard is a type of architecture in which data and instructions are retrieved from
separate memories thus leading to increased processing speed.
6. With the aid of a well labelled diagram, discuss different parts of the central processing unit
(CPU).
COMPUTER SECURITY
1. Discuss the key principles of computer security: confidentiality, integrity, and availability (CIA
Triad).
Confidentiality is simply the privacy of information stored in a computer. Confidentiality is
important since it prevents people without authorization from gaining access to the information
and makes it easy for authorized personnel to gain access to the information.
Integrity is the accuracy and completeness of stored information limiting the tendency of
modifying this information.
Availability is put in place to ensure that information is readily available the users who are
authorized only and that’s only when the authorized users need the information
2. Analyze the different types of malwares, including viruses, worms, Trojans, ransomware, and
spyware, and discuss their impacts on computer systems.
Viruses get attached to files and spread out when the computer user opens them.
Worms creates a replicate of itself and spreads to other parts.
Trojans a type of virus that is disguised as a legitimate software but when opened it spreads all
through a network.
Ransomware is a type of software that encrypts data and asks for ransom to decrypt the data.
Spyware is a type of data that illegally collects the user’s data.
5. Discuss the concept of social engineering attacks, including phishing, baiting, and pretexting,
and how human behavior plays a role in cybersecurity breaches.
Phishing is as a result of tricking people into revealing sensitive information using various
websites.
Baiting is giving people small items such as free flash disks which when inserted into the
computer they may corrupt it fully.
Pretexting is simply impersonating a person and texting a computer user making him or her to
reveal some information.