0% found this document useful (0 votes)
14 views4 pages

Name - Nelly Molo-Wps Office

Uploaded by

hannitonkukat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views4 pages

Name - Nelly Molo-Wps Office

Uploaded by

hannitonkukat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

NAME:NELLY MOLO KAMAMA

Reg No: AS10/00208/24

Course code: COMP 101

TASK: CAT 2 COMP 101

DEPARTMENT: SASS

a) Classify computer based on size and power,and explain their characteristics of supercomputers,
mainframes, mini computers and microcomputers

Computer based on size

- microcomputers

-minicomputer

- supercomputers

-mainframe

- personal computer

Characteristics of microcomputers

- They are small in size and designed for individual use

- Low cost ,that is they are inexpensive

-Limited processing power,they have limited processing power and generally not suitable for complex
tasks

Characteristics of supercomputers

- They are capable to solve complicated calculation that other standard computers cannot

- They have a very large storage capacity

- allows multiple user to access supercomputer at the same time

- they can handle application that require real time processing


Characteristics of mainframe computers

- High processing power

- Contain strong security

- Have ability to support several peripheral device simultaneously

Characteristics of minicomputer

- They have small size

-Less expensive than supercomputers and mainframes computer

-Less powerful than supercomputers and mainframes computer

b) Discuss the classification of computers based on purpose

- General purpose computers -designed to perform a wide range of tasks,and application rather than
being limited to specific function Eg phone

- Special purpose computers - They are computers which are designed to perform a specific task, they
perform a singular function,by eliminating excess memory and amount of information

that can be submitted into it

c) compare and contrast analog, digital and hybrid computers , explaining the key differences in how
they process data

-Analog computers work with continuous signals

- Digital computers work discrete signals

- hybrid computers combines the advantages of both

Similarities of analog, digital and hybrid computers

- Both offer data processing from input not output


d) Examine the classification of computers based on processing capability such as architecture,and
explain how their design principles impacts computational process

Architecture - they represent the means of interconnectivity of computer`s hardware components as


well as mode of data transfer and processing exhibited

e) Discuss different parts of CPU with well label diagram

- Arithmetic logic uni, responsible for arithmetic computation,data transfer,logic comparison

- Control unit, determines which programs to execute, interpret the instructions and causes the
instructions to be executed

- processing Registers, register hold instructions during execution and data being processed

COMPUTER SECURITY

a) discuss the key principles of computer confidentiality, integrity and availability

- The computer should limit datà access

- computer should ensure the data is accurate

- the computer should make sure the information is accessible to those who need it

b) Analyze the different types of malware including viruses,worms,Trojansand ransomware and spyware
and discuss their impact on computer system

- The malware is data ex filtration is common objective of malware

- Malware are service disruption,they can disrupt services in several ways

- The malware sometimes identify theft

- they can lead to system damage


c) Evaluate the role of encryption in protecting data in transit and the rest

- Help to protect private information, sensitive data

- Enhance security of communication between client apps and severs

d) Examine the importance of firewalls intrusion detection and antivirus software in maintaining
network security

- provide protection against outside cyber attackers by shielding your computer or network malicious or
unnecessary network traffic

- prevent malicious software from accessing computer or network via internet

e) Discuss the the concepts of social engineering attacks, including, phishing, baiting and pretexting and
how human behavior plays a role in cyber security breaches

Phishing - it is the practice of sending froudulent communication that appear to come from legitimate
and reputable source, usually through email and text

Baiting - a type of social engineering attacks where scammer uses a false promises lure a victim into a
trap which may steal personal and financial information or inflict the system with malware.

Pretexting - A type of social engineering attacks that involves a situation or pretext, created by an
attacker to lure into a vulnerable situation and to trick them into giving private information, specifically
information that the victim would typically not give outside the context of the pretext

Human behavior plays a key role in cyber security breaches by, influencing the vulnerability and
strengths of organizational defenses

You might also like