COS101 Assignment Wuraola
COS101 Assignment Wuraola
MATRIC NUMBER:
LEVEL-100
Question 1
1a). A computer is a programmable device that can accept, store, retrieve, process data and
displays the processed information as output, under the influence of a set of instructions called
programs.
1b). a) PROCESSOR: A central processing unit also called a central processor, main processor
or just processor, is the electronic circuitry within a computer that makes up a computer.
A processor ( intel core i-7)
b). MAIN MEMORY: the main storage region of a computer, to which the central processor has
immediate or direct access.
MAIN MEMORY (A COMPUTER RAM)
c). SECONDARY MEMORY: refers to storage devices, such as hard drives and solid state drives,
it also refer to removable storage media, such as USB FLASH DRIVES, CDs, and DVDs.
Secondary memory is not accessed directly by the CPU.
A FLASH DRIVE (Secondary memory)
d). INPUT DEVICES: these are devices that are used to send messages or input data into the
computer system.
EXAMPLES: keyboard, mouse, light pen, joystick, microphone and so on.
e). OUTPUT DEVICES: these are devices that displays result of a processed data (information). It
is responsible for producing those data that are already operated upon.
EXAMPLES: printer, visual display unit (monitor), plotters and so on.
A PRINTER ( output device)
C). i). Secondary storage media have long term storage
ii). they have big size and capacity
iii). they are cheaper than primary storage.
Question 2
ii).
INPUT DEVICES OUTPUT DEVICES
They send data to the processing unit They display the processed data or
information
They are peripheral device that They are peripheral device that
converts the symbols that people converts machine-readable
understand into machine-readable information into people-readable
information that the computer can information
process
Examples are keyboard, mouse, Examples are printer, plotter, speaker,
webcam, microphone, scanner and so monitor, projector and so on.
on
iii).
UTILITY SOFTWARE DEVICE DRIVERS
Utility software is system software They are devices that are used to add
that helps to maintain, optimize, to computers to expand or increase its
configure, the computer system. feature and functionality and are
connected directly to computer or
other digital devices.
Examples are expansion cards,
graphics card, image scanners etc.
iv).
COMPUTER HARDWARE PERIPHERAL DEVICES
Computer hardware includes the It is any external device that provides
physical part of a computer, such as input and output for the computer.
the case, Central Processing Unit,
Mouse, Key board.
They cannot be impacted by viral These are programs and applications
attacks directly that can be impacted by viral attacks
with use
2C). Graph plotter is an output device; it is a computer software that assists in drawing of
graphs.
HOW IT WORKS
A plotter is a graphics printer that uses a pen or pencil to draw images. A plotter differs from
printer in that plotter uses line to create images while printer uses a collection of dots. Like
printer, plotters are connected to computers and are used to produce complex image s and texts.
Question 3
a). i). SIZES: classification by size of computer is the classification by how big or small they are
and how big or small the problems they can solve.
There are four different types, which are:
i). Super computer
ii). Mainframe computer
iii). Mini computer
iv). Micro computer.
b). TYPES: classification of computer by type is classified into three
i). Analogue computer
ii). Digital computer
iii). Hybrid computers
ANALOGUE COMPUTERS are either electronic or hydraulic devices that are designed to exploit
mathematical between physical inter-relationships in certain problems instead of numeric, to
process their data. E.g. speedometer
DIGITAL COMPUTER: They solve problem by performing calculation and dealing with each
number digit by digit, examples are digital watches.
HYBRID COMPUTERS are the combination of both digital and analogue computer.
c). PURPOSE: Computers classified by a purpose are computers made for general purpose or a
specific purpose.
3b)
DATA INFORMATION
Data are representation pertaining to Information is identified and define by
people, things and idea and event. its users
Data are represented by symbols such can be defined as data that has been
as letters of the alphabets numerator transformed into a meaningful and
or other special symbol useful form for specific purposes
b).
System software Application software
These are list of instructions that They are collections of program that
keeps the computer functioning carries out a given task for the users
It is used for operating computer It is used by user to perform specific
hardware task
Examples are complier, assembler, Examples are word processor, web
debugger, driver, etc. processor, media player etc
c).
RAM ROM
RAM stands for random access ROM stands for read only memory
memory
RAM speed is quite high ROM speed is slower than RAM
It is costly It is cheap
CPU can access data stored on RAM Data has to be copied from ROM to
RAM so that CPU can access its data
d).
HARDWARE SOFTWARE
They are the physical components of They are the collection of several
a computer independence programs working
together to perform specific task.
They cannot be impacted by viral These are programs and applications
attacks directly that can be impacted by viral attacks
with use
Examples are scanners, label maker, Examples are Adobe acrobat, Google
router, and so on chrome, Apple maps etc
e)
GENERIC SOFTWARE CUSTOM SOFTWARE
It is a class of software that can be It is a software that is specially
used for a number of different developed for some specific
purposes without requiring organization or other user.
modification
Examples are word processor, Examples are bug tracking software.
spreadsheet and so on.
Question 4
A). Write short note on each of the following application software
i). WORD PROCESSOR: This is software that allows users to create, edit, and print documents. It
enables you to write text, store it electronically display it on a screen, modify it by entering
commands and characters from the keyboard, and print it.
Examples include: Microsoft word, Google docs
ii). SPREADSHEET: It is an interactive computer application for organization, analysis and
storage of data in tabular form.
Spreadsheet developed as computerized analogs of paper accounting worksheets
Examples are Microsoft excel etc
iii). GRAPHICS PACKAGES: It refers to any computer device or program that makes a computer
capable of displaying and manipulating pictures. The term also refers to the images themselves.
Examples are CorelDraw, Microsoft PowerPoint.
iv). DATABASE: It is the phrase used to describe any software that is designed for creating
databases and managing the information stored in them.
A database is a collection of information that is organized so that it can be easily accessed,
managed and updated.
Examples are Microsoft access, IBM DB2, etc.
4b) CONTROL UNIT: The control unit of the central processing unit regulates and integrates the
operations of the computer.
ARITHMETHIC AND LOGIC UNIT: It is a combinational digital circuit that performs arithmetic
and bitwise operations on integer binary numbers.
Question 5
a). i). FIRST GENERATION OF COMPUTER
The period the first generation was from 1946-1959. The computers of first generation used
vacuum tubes as the basic components for memory and circuitry for CPU (central processing
unit).
In this generation, mainly batch processing operating system was used. Punch cards, paper tape,
and magnetic tape was used as input and output devices. The computers in this generation used
machine code as the programming language.
The main features are vacuum tube
ii). SECOND GENEERATION OF COMPUTER
A transistor now often called a second generation computer is a computer which uses discrete
transistors instead of vacuum tubes. The first generation of electronic computers used vacuum
tubes, which generated large amounts of heat, were bulky and unreliable. A second generation of
computers, through the late 1950s and 1960s featured circuit boards filled with individual
transistors and magnetic core memory.
iii). THIRD GENERATION OF COMPUTER
The period of third generation was from 1965-1971. The computers of third generation used
integrated circuits (ICs) in place of transistors. A single IC has many transistors, resistors, and
capacitors along with the associated circuitry. This development made computers smaller in size,
reliable and efficient.
iv). MODERN COMPUTER
Modern computer is a machine that can be instructed to carry out sequences of arithmetic or
logical operations automatically via computer programming.
Modern computer have the ability to follow generalized sets of operations, called programs.
1514510= 111011001010012
ii). 9C3216
C=12
9123216
=9x163+12x162+3x162+2x160
= 9x4096+12x256+3x16+2x1
= 36864+3072+48+2
= 3998610
2 3998610
2 19993 r 0
2 9996 r 1
2 4998 r 0
2 2499 r 0
2 1249 r 1
2 624 r 1
2 312 r 0
2 156 r 0
2 78 r 0
2 39 r 0
2 19 r 1
2 9 r 1
2 4 r 1
2 2 r 0
2 1 r 0
2 0 r 1
=10011100001100102
iii). 0A2B16
A=10
B=11
=0x163+10x162+2x162+11x160
= 0x4096+10x256+2x16+11x1
= 0+2560+32+11
=260310
2 261010
2 1301 r 1
2 650 r 1
2 325 r 0
2 162 r 1
2 81 r 0
2 40 r 1
2 20 r 0
2 10 r 0
2 5 r 0
2 2 r 1
2 1 r 0
2 0 r 1
=1010001010112
C). Advantages of hexadecimal number system over binary number system
ANSWER
The main advantage of hexadecimal number is that it is very compact and by using a base of 16
means that the number of digits used to represent a given number is usually less than in binary
or decimal. It is also easy to convert between hexadecimal numbers and binary.
Question 6
a). Application of computer system
i). EDUCATION: computer is a very effective tool which can be used for teaching and learning,
result processing, student data and so on.
ii). ENTERTAINMENTS: Different types of entertainment fields such as multimedia, film making
with animation, graphics, audio and visual design are done with the help of computer.
iii). HOTEL MANAGEMENT: Computers are used for front desk management, preparing trial
balance sheet, documentation etc. in hotel management.
b). Computers make people’s lives easier and more comfortable: they provide opportunities for
staying in touch to billions of people who may very well be in different parts of the world. Today
people can drive computerized cars and work for employers from other countries without even
seeing them.
And also in education, instead of students trying to deal with the assignment using their
knowledge or information from textbooks, they prefer to use the solutions found online.
c). Distinguish between
RAM ROM
RAM is volatile, requiring power to ROM is non-volatile not requiring
store data. power to store data.
RAM chips often range in storage ROM chips often have a storage
capacity from 1 to 256 capacity of 4 to 8
RAM is used in computers to It is often used to store the BIOS
temporarily store files in use on the program on a computer motherboard.
computer
ii).
INPUT DEVICES OUTPUT DEVICES
It is any hardware device which It is any hardware component that use
enables the user to enter data and received data from a computer to
instructions into a computer. perform a task.
Input devices are controlled by the Output devices are controlled by the
user computer
Examples are keyboard, mouse, Examples are printer, monitor,
microphone, webcam and so on speakers, projection panels etc.
iii).
PRIMARY MEMORY AUXILIARY MEMORY
It is a computer memory that is They are among computer peripheral
accessed directly by the CPU equipment. They hold data for future
use
It is used to store data that the CPU It is used to store inactive programs
needs imminently so that it does not
have to wait for it to be delivered.
It is used to store inactive programs
needs imminently so that it does not and to archive data.
have to wait for it to be delivered.
Question 7
a).i). Two complements is used in computing as a method signed number representation. The
two’s complement of an N-bit number i.e. defined as its complement with respect to 2N, the sum
of a number and the two’s complement is 2N.
It is also very useful in computer number representation.
ii). Two complements allows negative and positive numbers to be added together without any
special logic. This means that subtraction and addition of both positive and negative numbers
can all be done by the same circuit in the CPU.
b). i). To define locations in memory
ii). to display error messages
iii). To represented media access control (MAC) addresses
C). Obtain the 1’s and 2’s complements of the following 8-bits numbers
i). 101011102
ans:
101011102
01010001 – to 1’s complement
+ 1
01010010 – to 2’s complement
ii). 100000002
01111111 – to 1’s complement
+ 1
iii). 100000012
01111110 – to 1’s complement
+ 1
01111111 – to 2’s complement
x101
1100
0000
+++++
+1100
= 111100
ii). 101012 x 1112
10101
x 111
10101
10101
+++++
+ 10101
10010011
iii). 11112+1112+11112
iv). 101011-10010
10010=010010
010010
101101 – to 1’s complement
+ 1
Question 8
a). (+42)+(-12) using 2’s complement
+42=00101010
-13=11110011
+++++
+29=00011101
OCTAL SYSTEM: It can be used as shorthand for binary numbers. This is because three binary
digits can be represented by the numbers 0 to 7 i.e. the octal range, while four binary digits can
be represented by the number 0 to 9 and A to F.
c).i). 110102-100002
ii). 110102-11012
1101=01101
10010- 1’s complements
d+ 1
10011 – 2’s complements
+ 11010
101101
iii). 1002 + 1100002
iv). 10101002 -10101002
1010100=0101011
0101011- 1’s complement
+ 1
Question 9
a). i). UTILITY SOFTWARE: It is a system software designed to help to analyze, configure,
optimize or maintain a computer.
For example a batch job may run user-written code to update a database and may then include a
step that runs a utility to back up the database, or a job may run a utility to compress a disk
before copying files.
ii). INTERPRETER: It is a computer program, which converts each high level program statement
into the machine code. This includes source code, pre-compiled code, and scripts.
iii). EDITOR: They are software programs that enable the user to create and edit text files.
TYPES OF EDITORS
i). Line editors
ii). Stream editors
iii). Screen editors
iv). Structure editors
iv). ASSEMBLER: It is a type of computer program that interprets software programs written in
assembly language into machine language, code and instructions that can executed by a
computer.
Examples include: FASM, SASM, Zeus Assembler, open watcom Assembler (WASM) and so on.
Question 10
a). i). WORD PROCESSOR: Word processing is the phrase used to describe using a computer to
create, edit, and print documents.
To perform word processing, you need computer, a special program called a word processor, and
a printer.
A word processor enables you to create a document, store it electronically on a disk, display it on
a screen, modify it by entering commands and characters from the keyboard, and print it on a
printer.
Examples include: Microsoft word, Google docs.
ii). SPREADSHEET: It is an interactive computer application for organization, analysis and storage
of data in tabular form spreadsheets developed as computerized analogs of paper accounting
worksheets.
Examples are Microsoft excel etc.
iii). PRESENTATION SOFTWARE: It is defined as computer programs designed to allow the user
to present information in an engaging way such as with text, pictures, sound and video.
PowerPoint is an example of presentation software.
iv). GRAPHICS SOFTWARE: They are computer program that makes a computer capable of
displaying and manipulating pictures.
Examples include CorelDraw.
Question 11
a). Limitations of artificial intelligence
i). HIGH COST: Creation of artificial intelligence requires huge costs as they are very complex
machines.
ii). Unemployment
iii). No original creativity
iv). No improvement with experience
STENGTHS OF ARTIFICIAL INTELLIGENCE
i). 24/7 availability
ii). Day to day application
iii). Digital assistance
iv). Handling repetitive jobs
ii). CRIMINAL JUSTICE: advancements in facial recognition are making the fingerprint obsolete.
Tech startups are using A1 to automate legal work.
iii). TRANSPORTATION: The transportation looks like it will be the first to be completely
disrupted by artificial intelligence. UBER and LYFT are both working on self-driving technology.
c). CYBER ETHICS: it is the philosophic study of ethics pertaining to computers, encompassing
user behavior and what computers are programmed to do or it refers to the code of responsible
behavior on the internet or study of ethics pertaining to computers.
d). i). PRIVACY: privacy, trust and security are closely intertwined, as are law and ethics. Data
privacy (or information privacy or data protection) is about access, use and collection of data,
and the data subject’s legal right to the data.
ii). SECURITY AND CRIME: security is the practice of defending computers, servers, mobile
devices, electronic systems, network and data from malicious attacks.
CRIME: cybercrime is a crime that involves the uses of computer devices and internet.
iii). FREE EXPRESSION AND CONTENT CONTROL: The internet has clearly stated the potential
for the individual to exercise their first amendment right to freedom expression as a result the
issue of free speech and content control in cyber space has emerged as arguably the most
contentious moral problem of the nascent information age.
Question 12
a). APPLICATION SOFTWARE: they are programs that are written for or by users to apply the
computer to perform a specific task.
Examples are: Microsoft word processing, Microsoft excel- electronic spreadsheet and so on.
SYSTEM SOFTWARE: this is a set of generalized programs that manage the resources of the
computer, such as the processor, communication links, and peripheral devices.
Examples are: MSDOS- Microsoft disk operating system, PCDOS- personal computer disk
operating system.
b). i). PROGRAMMING: computer programming is the process of designing and building an
executable computer program to accomplish a specific computing result or to perform a specific
task.
ii). ALGORITHM: it is a sequence of instructions where the main goal is to solve a specific
problem, perform a certain action or computation.
c). i). MACHINE LANGUAGE: It is the only language a computer is capable of understanding.
iii). ASSEMBLY AND SYMBOLIC LANGUAGE: Assembly language may also be called symbolic
machine code.
Assembly language usually has one statement per machine instruction but comments and
statements that are assembler directives, macros, and symbolic labels of program and memory
locations are often also supported.
i. Privacy (3 Marks)
Privacy refers to an individual's right to control how their personal information is collected, used,
and shared in cyberspace. In the context of cyber ethics, privacy is essential to ensure that
users' sensitive data, such as identity details, financial information, and communication records,
remain protected.
Cyber ethics emphasizes that organizations and individuals must respect user privacy by
implementing secure data practices. For example, websites should not collect unnecessary
personal information, and users should be informed about how their data is used.
However, the digital age presents challenges to privacy due to data breaches, surveillance, and
social media platforms that track user behavior. Ethical concerns arise when companies sell user
data to third parties without consent, leading to issues such as identity theft, stalking, and
unauthorized profiling.
Cyber ethics advocates for policies like GDPR (General Data Protection Regulation) to protect
user privacy rights and ensure ethical handling of data.
ii. Security and Crime (3 Marks)
Security in cyberspace involves safeguarding computer systems, networks, and data from cyber
threats. In cyber ethics, security is about creating safe digital environments for users by
preventing unauthorized access, cyberattacks, and data breaches.
Ethical concerns arise when hackers exploit vulnerabilities for malicious purposes, including
stealing sensitive information, spreading malware, and conducting ransomware attacks. Cyber
ethics stresses the importance of ethical hacking to identify and fix vulnerabilities instead of
exploiting them.
Cybercrime encompasses activities such as hacking, phishing, identity theft, cyberbullying, and
online fraud. Cyber ethics promotes legal and ethical practices to combat cybercrime, urging
individuals and organizations to respect the law and follow security protocols. It also highlights
the ethical responsibility of companies to secure user data and educate users on safe online
practices.
iii. Free Expression and Content Control (3 Marks)
The internet provides a platform for free expression, allowing users to share their opinions, ideas,
and beliefs. However, with this freedom comes ethical concerns regarding content control.
Cyber ethics addresses the balance between free speech and the need to regulate harmful
content, such as hate speech, misinformation, and violent material. While users have the right to
express themselves, cyber ethics advocates for responsible expression that does not harm
others or spread false information.
Content control involves moderating online platforms to prevent the spread of harmful content.
Ethical concerns arise when content control turns into censorship, potentially suppressing
legitimate free speech.
Cyber ethics calls for transparent content moderation policies, where users are aware of what is
allowed and why certain content is removed. It also emphasizes the importance of educating
users about responsible online behavior to ensure that freedom of expression does not infringe
on the rights and safety of others.
Cyber ethics refers to the moral principles and guidelines that govern how individuals,
organizations, and governments should behave in cyberspace. It addresses ethical issues related
to the use of technology, the internet, and digital communication, ensuring that users act
responsibly and respect others' rights in the online world.
Cyber ethics covers various topics, including privacy, security, intellectual property rights, digital
rights, and online behavior. It aims to create a fair and respectful digital environment by
promoting ethical practices in areas such as data handling, cybersecurity, and online
interactions.
1. Deontological Approach
The deontological approach to cyber ethics focuses on following established rules, laws, and
ethical principles, regardless of the consequences. This approach emphasizes doing what is
right according to ethical standards.
For example, a company following a deontological approach would not engage in unethical
practices such as spying on users or selling their data, even if it could be profitable. Instead, the
company prioritizes user rights and ethical conduct over financial gains.
2. Consequentialist Approach
The consequentialist approach evaluates the ethicality of actions based on their outcomes or
consequences. In cyber ethics, this approach considers whether an action in cyberspace results
in positive or negative outcomes for individuals and society.
For instance, a government may justify surveillance programs as ethical under the
consequentialist approach if they believe it leads to national security and public safety. However,
critics may argue that the violation of privacy rights is too significant a consequence.
This approach highlights the importance
Machine language is the most basic level of programming language that a computer can
understand directly. It consists of binary code (1s and 0s) that the CPU can process without any
translation. Each instruction in machine language is specific to the architecture of the
computer’s processor.
Example:
A machine language instruction to add two numbers might look like:
11001001 00000001 00000010
High-level language is a programming language that is closer to human language and abstracted
from the hardware. These languages are designed to be easy for programmers to write, read,
and understand. High-level languages need to be translated into machine language using
compilers or interpreters.
Example:
A high-level language instruction to add two numbers might look like:
sum = a + b
Assembly language is a low-level programming language that uses symbolic instructions instead
of binary code. It provides a more human-readable form of machine instructions by using
mnemonics (symbolic names) to represent operations and operands.
It allows the programmer to use symbolic names for memory addresses and instructions.
Example:
Assembly language instruction to add two numbers might look like:
MOV AX, 5
ADD AX, 3
1100
× 0101
________
1100 (1100 × 1)
0000 (Shifted by 1 bit)
1100 (Shifted by 2 bits)
+ 0000 (Shifted by 3 bits)
________
111100
10101
× 111
__________
10101 (10101 × 1)
10101 (Shifted by 1 bit)
+ 10101 (Shifted by 2 bits)
__________
1101101
1111
+ 0111
+ 1111
________
10101
101011
- 010010
________
011001
15)
a. Convert the following Hexadecimal numbers to Binary: (6 Marks)
To convert hexadecimal to binary, each hex digit is converted to its 4-bit binary equivalent.
i) 3B29₁₆
3 → 0011
B → 1011
2 → 0010
9 → 1001
Binary Equivalent: 0011 1011 0010 1001₂
ii) 9C32₁₆
9 → 1001
C → 1100
3 → 0011
2 → 0010
Binary Equivalent: 1001 1100 0011 0010₂
iii) 0A2B₁₆
0 → 0000
A → 1010
2 → 0010
B → 1011
Binary Equivalent: 0000 1010 0010 1011₂
2. Easy Conversion:
Hexadecimal numbers can be easily converted to and from binary by grouping binary digits into
sets of four.
3. Error Detection:
Hexadecimal numbers make error detection and debugging easier due to their concise format,
especially in computer memory addressing.
i) 1111 x 10
Binary multiplication:
1111
x 10
---------
0000 (1111 x 0)
+ 11110 (1111 x 1 shifted left)
---------
11110₂
Answer: 11110₂
ii) 10110 x 110
Binary multiplication:
10110
x 110
---------
00000 (10110 x 0)
101100 (10110 x 1 shifted left)
+ 1011000 (10110 x 1 shifted left twice)
---------
1101100₂
Answer: 1101100₂
Binary multiplication:
10101
x 101
---------
10101 (10101 x 1)
000000 (10101 x 0 shifted left)
+ 1010100 (10101 x 1 shifted left twice)
---------
1101101₂
Answer: 1101101₂