Cos101 Assignment Becky
Cos101 Assignment Becky
(b) Main Memory (Primary Memory): Main memory is directly accessible by the CPU and
temporarily stores data and instructions currently in use. It includes:
• Random Access Memory (RAM): Volatile memory used for active tasks.
• Read-Only Memory (ROM): Non-volatile memory containing essential instructions (e.g., BIOS).
DIAGRAM OF A MEMORY UNIT
(c) Secondary Memory: Secondary memory is used for long-term data storage. Examples
include:
• Hard Disk Drives (HDDs): Magnetic storage devices for large data volumes.
• Solid State Drives (SSDs): Faster, more reliable storage using flash memory.
• Optical Discs and USB drives.
DIAGRAM OF A SECONDARY MEMORY UNIT BELOW
(d) Input Devices: Input devices are used to enter data into the computer. Common examples
include:
• Keyboard: For text input.
• Mouse: For navigation and selection.
• Scanners, Microphones, and Cameras.
DIAGRAM OF INPUT DEVICES BELOW
(e) Output Devices: Output devices present processed data to the user. Examples include:
• Monitor: Displays visual information.
• Printer: Produces hard copies.
• Speakers: Deliver audio output.
DIAGRAM OF OUTPUT DEVICES BELOW
C) i) They are non-volatile
ii) Permanent storage
iii) High storage capacity
iv) Low cost per unit
Question 2
a. What are the differences between primary and secondary storage. 2.5marks
b. Distinguish between the following:
(i) Desktop publishing Packages and Multimedia Packages.
(ii) input and output
(iii) Utility Software and Device Driver
(iv) Computer hardware and Peripherals. 2.5marks each
c. Is a Graph plotter an Input device or an Output device? Describe how they work? (2.5
mrks)
ANSWER
2a)
Primary Storage Secondary Storage
Memory used for immediate processing Storage used for long-term data
by the CPU. storage.
RAM (Random Access Memory), Cache Hard Disk Drive (HDD), Solid State Drive
memory. (SSD), Optical disks, USB flash drives.
Fast, as it is directly accessed by the Slower, as data is accessed from
CPU. external storage devices.
Volatile (data is lost when power is Non-volatile (data is retained even after
turned off). power loss).
Smaller in size, typically ranging from a Larger in size, ranging from a few GB to
few GB to a few TB. several TBs.
Very low (nano to microseconds). Higher access time (milliseconds).
Expensive per GB. Less expensive per GB.
Temporarily stores data that is actively Stores data permanently or for extended
being processed. periods.
2b) i) Desktop publishing packages: this is a Software used to create visually appealing
documents combining text, images, and graphics. WHILE Multimedia packages are Software
designed to create, edit, and manage multimedia content such as audio, video, and animation
ii) Input: this Refers to data or signals that are sent to a computer for processing. WHILE Output
are refered to data or signals that are produced by the computer after processing.
iii) Utility software: A program designed to help manage, maintain, and control computer
resources and hardware WHILE Device driver is aprogram designed to help manage, maintain,
and control computer resources and hardware
iv) Computer hardware: This are the physical components that make up a computer system,
such as the CPU, motherboard, memory, and storage devices. WHILE Peripherals are External
devices connected to the computer to expand its capabilities or enable user interaction.
2c) Graph plotters are output devices because they are used to present the results (graphs,
charts, etc.) that were generated from input data. They do not take in data from the user in the
same way input devices like keyboards or scanners do; instead, they provide a physical, visual
representation of data that was processed in the computer.
Question 3
a. Computers are classified according to:
a) Sizes 4marks
b) Types 3marks
c) Purposes, Discuss. 2marks
Re-enforce your answers with appropriate illustrations. 1mark
b. Differentiate between the following terms:
(a) Data and Information.
(b) System software and application software.
(c) RAM and ROM
(d) Hardware and software
(e) Generic software and Custom software
ANSWER
3a) i) Classification of computers by sizes:
1. Supercomputers: Extremely large and powerful, used for complex computations
like climate modeling and scientific simulations.
2. Mainframe Computers: Large systems designed for bulk data processing and critical
applications in large organizations.
3. Minicomputers (Midrange Computers): Medium-sized, used in businesses for specific tasks
like database management.
4. Microcomputers (Personal Computers): Small, used by individuals; includes
desktops, laptops, and tablets.
5. Embedded Computers: Very small, integrated into other devices (e.g.,
appliances, cars, phones).
ii) Classification of computers by types:
1. Analog Computers: Use continuous data for processing, often in scientific and
engineering applications.
2. Digital Computers: Use discrete data and binary systems; includes most
modern computers.
3. Hybrid Computers: Combine analog and digital features, used in specialized
fields like medical equipment.
iii) Classification of computers by their purposes:
1. General-Purpose Computers: Designed to perform a wide range of tasks. These include
personal computers, laptops, and servers, which can run various software for business,
education, gaming, and more.
2. Special-Purpose Computers: Built for specific tasks or applications. Examples include
ATMs, washing machine controllers, and scientific calculators, which are optimized for dedicated
functionalities.
3b) i) DATA: Raw, unprocessed facts or figures without context, such as numbers, text, or
symbols (e.g., “25,” “blue,” “John”).WHILE INFORMATION:Processed, organized, and meaningful
data that provides context and value (e.g., “John is 25 years old and likes the color blue”).
ii) SYSTEM SOFTWARE: Software that manages and controls computer hardware, providing a
platform for other software. Examples include operating systems (e.g., Windows, Linux) and
utility programs. WHILE APPLICATION SOFTWARE: Software designed for specific user tasks or
purposes. Examples include word processors, web browsers, and games.
iii) RAM (RANDOM ACCESS MEMORY): Volatile memory that temporarily stores data and
programs the computer is currently using. It loses data when the power is turned off. WHILE
ROM (READ-ONLY MEMORY): Non-volatile memory that permanently stores essential data and
instructions, such as firmware, and retains data even when the power is off.
iv) HARDWARE: The physical components of a computer system that you can see and touch,
such as the CPU, keyboard, and monitor. WHILE SOFTWARE:The set of instructions or programs
that tell the hardware what to do, such as operating systems, applications, and games.
v) GENERIC SOFTWARE: Pre-designed software created for a wide audience and general use,
such as Microsoft Word or Excel. WHILE CUSTOM SOFTWARE: Tailored software developed
specifically for the unique needs of an individual or organization, such as a custom billing system
for a company.
Question 4
a. Write a short note on each of the following application software
(i) Word Processor (ii). Spreadsheet (iii) Graphic Packages (iv). Database (v) Packages
2marks each
b. Itemize 2 components of a Central Processing Unit and describe each of them in details.
5marks
ANSWER:
4a) i) Word Processor: Software used to create, edit, format, and print textual documents.
Examples include Microsoft Word and Google Docs. They allow features like spell checking, text
formatting, and inserting images.
ii) Spreadsheet: Software designed for numerical data organization, analysis, and
manipulation using rows and columns. Examples include Microsoft Excel and Google Sheets.
They support calculations, graph creation, and data modeling.
iii) Graphic Packages: Software used for creating and editing visual content, such as
drawings, images, and designs. Examples include Adobe Photoshop and CorelDRAW. They offer
tools for image manipulation and illustration.
iv) Database: Software used to store, manage, and retrieve structured data efficiently. Examples
include MySQL and Microsoft Access. They allow for data organization, querying, and analysis.
v) Packages: Comprehensive software suites designed for specific tasks or industries. Examples
include Microsoft Office (which includes Word, Excel, and PowerPoint) and Adobe Creative Suite.
These packages integrate multiple applications for convenience.
4b) 1. Arithmetic Logic Unit (ALU): The ALU is responsible for performing all arithmetic
operations (like addition, subtraction, multiplication, and division) and logical operations (such as
comparisons, AND, OR, NOT).It acts as the mathematical brain of the CPU, processing numerical
data and making logical decisions based on the instructions it receives.
2. Control Unit (CU): The Control Unit directs the flow of data within the CPU and between
the CPU and other components of the computer.It interprets instructions from programs and
coordinates the operations of the ALU, memory, and input/output devices, ensuring tasks are
executed in the correct sequence.
Question 5
a. Write a short note on the following;
i) First generation of computer
ii) Second generation of computer
iii) Third Generation of computer
iv) Fourth Generation
v) Modern computer
ANSWER:
i) First Generation of Computer (1940-1956): The first generation of computers used vacuum
tubes for circuitry and magnetic drums for memory. These machines were large, expensive, and
consumed a lot of power. They were programmed in machine language and could perform only
basic calculations. Examples include the ENIAC and UNIVAC.
ii) Second Generation of Computer (1956-1963): In the second generation, computers shifted
from vacuum tubes to transistors, which were smaller, faster, and more reliable. These machines
used punch cards for input and output, and were programmed in assembly or high-level
languages like COBOL and FORTRAN. Examples include the IBM 7090 and CDC 1604.
iii) Third Generation of Computer (1964-1971): The third generation saw the development of
integrated circuits (ICs), which allowed computers to become smaller, faster, and more powerful.
Operating systems and high-level programming languages, such as BASIC and C, were
introduced, making computers more user-friendly. Notable examples include the IBM 360 and
PDP-8.
iv) Fourth Generation of Computer (1971-Present): The fourth generation brought the
microprocessor, a single chip that integrated thousands of transistors, making computers more
affordable, compact, and powerful. Personal computers (PCs) became widely available, and
graphical user interfaces (GUIs) emerged. Famous examples are the Apple Macintosh and IBM
PCs.
v) Modern Computer (21st Century-Present): Modern computers, often based on multi-core
processors, utilize cloud computing, artificial intelligence (AI), and the internet of things (IoT) for
advanced applications. They are highly connected, portable, and come with powerful software
and hardware, supporting tasks from gaming to scientific research. Examples include
smartphones, laptops, and supercomputers.
Question 6
a. Discuss the application of computer system in any 3 areas of your choice. 2marks each
b. With the aid of specific examples, discuss the role of computer to modern day era, 3marks
c. Distinguish between (1) RAM and ROM (2) input and output unit (3) primary and auxiliary
memory. 2marks each.
ANSWER:
1. Healthcare: Computer systems play a crucial role in healthcare, enhancing both patient care
and administrative efficiency. Applications include:
•Electronic Health Records (EHR): Digital storage of patient records, making it easier for
healthcare providers to access and update patient information in real-time.
•Medical Imaging: Computers are used to process and analyze images from technologies like
MRI, CT scans, and X-rays, improving diagnostic accuracy.
•Telemedicine: Computer systems enable remote consultations between patients and healthcare
professionals, particularly in underserved or rural areas.
•Surgical Assistance: Robotic systems controlled by computers are used in complex surgeries,
providing greater precision and minimizing human error.
2. Education: In education, computers are revolutionizing the way learning and teaching occur.
Key applications include:
•E-learning Platforms: Online courses and virtual classrooms allow students to access
educational content from anywhere, at any time.
•Simulations and Virtual Labs: Computers create simulated environments for students in fields
like science and engineering, allowing them to experiment safely and cost-effectively.
•Administration: Computers streamline administrative tasks such as grading, scheduling, and
record-keeping, improving the overall efficiency of educational institutions.
•Interactive Learning Tools: Computer-based applications, such as educational games and apps,
engage students and cater to different learning styles.
3. Business and Finance: Computers are essential in managing business operations and driving
financial processes. Applications include:
•Enterprise Resource Planning (ERP) Systems: These software solutions integrate various
business functions, such as accounting, inventory management, and human resources, into one
system.
•E-commerce: Online platforms for buying and selling goods and services rely on computer
systems for transactions, inventory management, and customer service.
•Data Analysis and Decision-Making: Advanced data analytics and machine learning algorithms
help businesses process large amounts of data to make informed decisions.
•Stock Trading: Computer systems power stock exchanges and trading platforms, enabling fast
transactions, algorithmic trading, and real-time market analysis.
6b) i) Communication and Social Connectivity: example: Platforms like Zoom and Microsoft
Teams have become essential for virtual meetings and remote work, especially during the
COVID-19 pandemic, ensuring business continuity and social interaction.
ii) Healthcare Advancements: example: MRI and CT scan machines rely on advanced computer
algorithms to generate accurate imaging.
iii) Education and E-Learning: example: During the pandemic, schools transitioned to platforms
like Google Classroom, ensuring continuity in education. E.T.C
6c) i) RAM (RANDOM ACCESS MEMORY): Volatile memory that temporarily stores data and
programs the computer is currently using. It loses data when the power is turned off. WHILE
ROM (READ-ONLY MEMORY): Non-volatile memory that permanently stores essential data and
instructions, such as firmware, and retains data even when the power is off.
ii) Input: this Refers to data or signals that are sent to a computer for processing. WHILE
Output : are refered to data or signals that are produced by the computer after processing.
iii) PRIMARY MEMORY: Memory directly accessible by the CPU for temporary storage of data.
WHILE AUXILIARY MEMORY : Secondary storage devices used for long-term data storage.
Question 7
a. There are several ways that signed numbers can be represented in binary, but the most
common representation used today is called two’s complement. (i) Briefly explain two
different ways in which it can be used, and (ii) why it is used. 3marks
b. Highlight 3 reasons why hexadecimal numbers are used. 3marks
c. Obtain the 1’s and 2’s complements of the following 8-bit numbers: i) 10101110 ii)
10000000 iii) 10000001
ANSSWER:
7a) i) a) Representing Signed Numbers: Two’s complement is the standard method for encoding
both positive and negative integers in binary form.
HOW IT WORKS:
•Positive numbers are represented in standard binary format.
•Negative numbers are represented by taking the binary of their absolute value, inverting the
bits, and adding 1.
•The most significant bit (MSB) acts as the sign bit: 0 for positive and 1 for negative.
Example:
•+5 in 4-bit two’s complement: 0101.
•-5 in 4-bit two’s complement: 1011.
b) Performing Arithmetic Operations: Two’s complement simplifies arithmetic operations, such as
addition and subtraction, by allowing the same circuitry to handle both positive and negative
values.
•Addition: Simply add two numbers, and the two’s complement format automatically accounts for
their signs.
ii) a) Representing Signed Numbers:
Why it’s used:
Simplifies the representation of signed numbers, eliminating issues like having two
representations of zero (as in sign-and-magnitude representation). Ensures consistency in
binary operations.
•+128:
Convert 128 to binary: 10000000 (8-bit representation).
•-64:
Convert 64 to binary: 01000000 (8-bit representation).
Take the 2’s complement to represent -64:
•1’s complement of 01000000 = 10111111.
•Add 1 to get the 2’s complement: 11000000.
Step 2: Perform binary addition
Add 10000000 (128) and 11000000 (-64):
10000000 (+128)
+ 11000000 (-64)
-----------
01000000 (+64)
Result:
The result of (128) - (64) in binary is 01000000, which equals +64 in decimal.
Final Results:
1. (+42) + (-13) = 00011101 (binary) = +29 (decimal).
2. (128) - (64) = 01000000 (binary) = +64 (decimal).
8b) 1. Binary Number System (Base-2)
•Definition: A number system that uses only two digits, 0 and 1.
•Usage: Widely used in digital systems, computers, and electronics because they operate using
binary logic (on/off or true/false states).
•Example: 1010 (binary) = 10 (decimal).
2. Decimal Number System (Base-10)
•Definition: The standard number system used in everyday life, consisting of ten digits: 0-9.
•Usage: Commonly used in arithmetic and real-world calculations due to its intuitive nature.
•Example: 1234 in decimal represents one thousand two hundred thirty-four.
3. Octal Number System (Base-8)
•Definition: A number system that uses eight digits: 0-7.
•Usage: Often used in computing as a compact representation of binary numbers (since each
octal digit represents three binary digits).
•Example: 75 (octal) = 111101 (binary) = 61 (decimal).
4. Hexadecimal Number System (Base-16)
•Definition: A number system that uses sixteen symbols: 0-9 and A-F (where A=10, B=11, …,
F=15).
•Usage: Common in computer science and digital systems as a concise representation of binary
data (each hexadecimal digit represents four binary digits).
• Example: 2F (hex) = 00101111 (binary) = 47 (decimal).
8c) i) 11010 – 10000
Step 1: Find 2’s complement of 10000
•1’s complement of 10000: 01111.
•Add 1 to get 2’s complement: 10000.
Step 2: Add 11010 and 10000
11010
+ 10000
--------
01010 (ignore the carry bit)
Result:
01010 = 10 (decimal).
iv) Assembler: An assembler is a tool that converts assembly language programs into machine
code (binary code) that the computer’s processor can execute. Assembly language is a low-level
programming language that uses mnemonic codes (e.g., MOV, ADD) to represent machine
instructions.
Example:
•NASM (Netwide Assembler): Used for x86 assembly language programs.
v) Compiler: A compiler is a program that translates an entire high-level programming code into
machine code or intermediate code before execution. Unlike interpreters, compilers translate the
entire program at once, resulting in a standalone executable file.
Examples:
•GCC (GNU Compiler Collection): Compiles C, C++, and other languages.
•Java Compiler: Converts Java source code into bytecode.
Question 10
Write short notes on each of the following with appropriate examples
(i)Word Processor (ii) Spreadsheet (iii) Presentation software (iv) Graphics software
(v) PHP ( 3 marks each = 15 marks)
ANSWER:
i) Word Processor: A word processor is software used to create, edit, format, and print
documents. It provides features like spell check, text formatting, and insertion of images.
Examples include Microsoft Word, Google Docs, and LibreOffice Writer. These programs are
commonly used for writing letters, reports, and other text-based documents.
ii) Spreadsheet: A spreadsheet is software designed for organizing, analyzing, and storing data
in a tabular form. It allows users to perform calculations, create charts, and manage data
efficiently. Examples include Microsoft Excel, Google Sheets, and LibreOffice Calc. They are
widely used for tasks such as budgeting, accounting, and data analysis.
iii) Presentation Software: Presentation software helps users create slideshows, typically for
business or educational purposes. It allows the integration of text, images, videos, and
animations to create engaging presentations. Examples include Microsoft PowerPoint, Google
Slides, and Apple Keynote. It is commonly used for presenting information during meetings,
lectures, or conferences.
iv) Graphics Software: Graphics software is used to create, edit, and manipulate visual images.
This software can be used for both raster (pixel-based) and vector (line-based) graphics.
Examples include Adobe Photoshop (for raster graphics) and Adobe Illustrator (for vector
graphics). These tools are essential for tasks like photo editing, graphic design, and digital art
creation.
v) PHP: PHP (Hypertext Preprocessor) is a server-side scripting language used to create
dynamic web pages and applications. It is commonly used for web development to interact with
databases and handle forms, sessions, and cookies. Examples of websites built with PHP include
Facebook and WordPress. PHP scripts run on the server, generating HTML that is sent to the
client’s browser.
Question 11
a. Describe the strengths and limitations of artificial intelligence. 7marks
b. Discuss the social impact of artificial intelligence to the society. 8marks
ANSWER:
11a) Strengths of Artificial Intelligence:
1. Efficiency and Automation:
AI can automate repetitive tasks, saving time and reducing human error. For instance, AI-
powered chatbots provide 24/7 customer service.
2. Data Processing and Analysis:
AI can process and analyze vast amounts of data quickly and accurately, providing valuable
insights for decision-making in fields like finance, healthcare, and marketing.
3. Personalization:
AI enhances user experiences by tailoring recommendations, as seen in platforms like Netflix,
Amazon, or Spotify.
4. Error Reduction:
AI systems, when programmed correctly, perform tasks with high precision, reducing human
errors in critical applications like medical diagnosis or engineering design.
Limitations of Artificial Intelligence:
1. High Development Costs:
Developing and implementing AI systems is expensive, requiring significant resources and
expertise.
2. Data Dependence:
AI performance relies on the quality and quantity of data. Poor or biased data can lead to
inaccurate or unethical outcomes.
3. Lack of Creativity:
AI can analyze patterns and generate results but lacks true creativity or emotional intelligence,
which are essential in fields like art, counseling, or leadership.
4. Job Displacement:
Automation through AI can lead to job losses in repetitive and manual sectors, raising ethical and
economic concerns.
11b) Positive Impacts
a) Healthcare Advancements: AI has revolutionized healthcare by improving diagnostics,
drug discovery, and personalized treatment plans. For example, AI tools like IBM Watson assist
doctors in diagnosing diseases and proposing treatments.
b) Education Access: AI-powered platforms like Duolingo and Khan Academy provide
personalized learning experiences, making education accessible to people worldwide, including
underserved communities.
c) Improved Quality of Life: AI-powered applications simplify daily tasks, such as voice
assistants (e.g., Siri, Alexa), smart home systems, and personalized recommendations,
enhancing convenience and productivity.
d) Enhanced Public Safety: AI is used in surveillance, disaster prediction, and crime
detection. For instance, predictive policing uses AI to identify high-risk areas, potentially
preventing crimes.
Negative Impacts
a) Job Displacement: Automation of tasks leads to job losses in sectors like
manufacturing, retail, and logistics. While it creates new roles, many require advanced skills,
leading to workforce inequality.
b) Social Inequality: The benefits of AI are often concentrated in developed regions, creating a
digital divide. Unequal access to AI technology exacerbates existing social and economic
disparities.
c) Privacy and Surveillance Concerns: AI-powered systems, such as facial recognition and data
analytics, raise concerns about privacy and misuse. Mass surveillance by governments or
corporations can infringe on individual freedoms.
d) Bias and Discrimination: AI systems can perpetuate and amplify biases present in training
data, leading to discriminatory outcomes in hiring, lending, or criminal justice.
Question 12
a. The computer software could be divided into two major groups namely System Software
and Application Software. Briefly explain each with examples. 9marks
b. Define the terms:
i. Programming (program Design) ii. Algorithm iii. Pseudocode.6marks
ANSWER:
12a) i) System Software: System software provides the foundational layer that enables a
computer to operate and manage its resources. It acts as an interface between the hardware and
application software, ensuring that the computer’s components function correctly.
Examples:
• Operating Systems: Microsoft Windows, macOS, Linux, Android.
• Utility Programs: Antivirus software, file management tools, disk cleanup tools.
• Device Drivers: Software that allows the operating system to communicate with hardware
devices like printers, keyboards, and graphic cards.
ii) Application Software: Application software is designed to perform specific tasks or solve user-
oriented problems. It runs on top of the system software and directly interacts with the user to
carry out tasks.
Examples:
• Productivity Tools: Microsoft Office (Word, Excel, PowerPoint), Google Workspace (Docs,
Sheets).
• Media Software: VLC Media Player, Adobe Photoshop, iTunes.
• Web Browsers: Google Chrome, Mozilla Firefox, Safari.
• Games and Entertainment: PUBG, Minecraft, Candy Crush.
12b) i) Programming (Program Design): Programming, or program design, is the process of
creating and organizing a set of instructions (code) that a computer can execute to solve a
specific problem or perform a task. It involves planning, writing, testing, debugging, and
maintaining the code.
ii)Algorithm: An algorithm is a step-by-step, finite set of instructions designed to solve a
specific problem or perform a task. It provides a logical sequence of operations that must be
followed to achieve the desired outcome.
iii)Pseudocode: Pseudocode is a simplified, informal language that uses plain English to
describe the logic of an algorithm. It is not written in a specific programming language and is
used to plan and design a program before actual coding.
Question 13
a. Discuss the following in relation to Cyber ethics:
(i) Privacy (ii) Security and crime (iii) Free expression and content control 9marks
b. Explain the meaning of the term “Cyber ethics” and its two approaches 6marks
ANSWER:
13a) i) Privacy: Privacy in cyber ethics refers to the right of individuals to control their personal
information and protect it from unauthorized access or misuse. Ethical issues arise when
organizations collect, store, and use personal data without proper consent.
•Concerns: Data breaches, unauthorized surveillance, and tracking of online activities.
ii) Security and Crime: Cybersecurity involves protecting systems, networks, and data from
cyber threats such as hacking, phishing, and malware attacks. Cyber ethics addresses the moral
responsibilities of individuals and organizations to use technology safely and responsibly.
•Concerns: Cybercrimes like identity theft, financial fraud, and ransomware attacks harm
individuals and organizations.
iii) Free Expression and Content Control: The internet provides a platform for free
expression, but ethical dilemmas arise concerning content that is harmful, illegal, or offensive.
Striking a balance between freedom of speech and content regulation is a key cyber ethics issue.
•Concerns: Spread of hate speech, fake news, cyberbullying, and censorship by governments or
platforms.
13b) Meaning of Cyber Ethics: Cyber ethics refers to the principles and moral guidelines that
govern the behavior of individuals, organizations, and governments in the digital world. It focuses
on responsible use of technology, addressing issues such as privacy, security, intellectual
property, and online behavior. Cyber ethics ensures that technology is used in a way that
respects the rights of others, promotes fairness, and avoids harm.
Two Aspects of Cyber Ethics
1. Respect for Privacy:
Privacy is a fundamental aspect of cyber ethics, emphasizing the right of individuals to control
their personal information and how it is used or shared online.
• Examples: Protecting personal data from being stolen or misused, respecting confidentiality in
communications, and obtaining consent before sharing user data.
• Importance: Maintaining privacy fosters trust between users and organizations and ensures
compliance with laws like GDPR or HIPAA.
2. Prevention of Cybercrime:
Cyber ethics addresses the ethical responsibilities of users and organizations to avoid harmful
activities like hacking, identity theft, and spreading malware. It encourages adherence to laws
and promotes the ethical use of technology for legitimate purposes.
• Examples: Reporting vulnerabilities responsibly (ethical hacking), avoiding software piracy, and
refraining from online harassment.
• Importance: Preventing cybercrime ensures a safer online environment and protects individuals
and organizations from financial and reputational damage.
Question 14
a. Explain the following terms:
(i). Machine language (ii).High level language (iii). Assembly and symbolic language.
(9marks)
b. Simplify the following i. 1100 x 101 ii. 10101 x 111 iii. 1111 + 111 + 1111 iv. 101011 – 10010
(6marks)
ANSWER:
14a) i) Machine Language: Machine language is the lowest-level programming language directly
understood by a computer’s central processing unit (CPU). It consists of binary code (0s and 1s)
that the hardware executes directly.
ii) High-Level Language: High-level languages are programming languages that are user-
friendly and closer to human language. They abstract the complexities of machine-level
operations and provide a simple syntax for writing programs.
iii) Assembly and Symbolic Language: Assembly language is a low-level programming
language that uses symbolic instructions and mnemonics to represent machine-level code. It
provides a human-readable way to write programs that are closely tied to hardware.
14b) i) 1100 × 101
To multiply binary numbers:
1100
× 101
--------
1100 (1100 × 1)
+ 0000 (1100 × 0, shifted one place to the left)
+ 1100 (1100 × 1, shifted two places to the left)
--------
1001100
Result: 1001100 (Decimal equivalent: 76)
Question 15
a. Convert the following Hexadecimal numbers to binary.
i) 3B2916 ii) 9C3216 iii) 0A2B16 (6marks)
b. State 3 advantages of hexadecimal number system over binary number system. (6marks)
c. Simplify: i. 1111 x 10 ii. 10110 x 110 iii. 10101 x 101 (3marks)
ANSWER:
15a) i. 3B2916
Hexadecimal digits: 3, B, 2, 9
Convert each digit to binary:
• 316 = 00112
• B16 = 10112
• 216 = 00102
• 916 = 10012
Binary equivalent: 3B2916 = 00111011001010012
ii. 9C3216
Hexadecimal digits: 9, C, 3, 2
Convert each digit to binary:
• 916 = 10012
• C16 = 11002
• 316 = 00112
• 216 = 00102
Binary equivalent: 9C3216 = 10011100001100102
iii. 0A2B16
Hexadecimal digits: 0, A, 2, B
Convert each digit to binary:
• 016 = 00002
• A16 = 10102
• 216 = 00102
• B16 = 10112
Binary equivalent: 0A2B16 = 00001010001010112
Final Answers
i) 3B2916 = 00111011001010012
ii) 9C3216 = 10011100001100102
iii) 0A2B16 = 00001010001010112
15b) i) Easier to Interpret and Debug: Hexadecimal numbers are more user-friendly and reduce
the chances of errors when interpreting or debugging code, as they are easier to distinguish
compared to long strings of binary digits.
Ii) Compact Representation: Hexadecimal numbers are shorter and more concise than
binary numbers because one hexadecimal dig it represents four binary digits (bits). This makes
hexadecimal easier to read, write, and understand.
iii) Direct Relationship to Binary: Hexadecimal numbers have a straightforward conversion
process to and from binary since each hex digit corresponds to exactly four binary digits. This
makes hexadecimal a convenient shorthand for binary.
15c) i. 1111 x 10
To multiply binary numbers, use the same rules as decimal multiplication:
1111
× 10
-----------
00000 (1111 × 0)
+ 11110 (1111 × 1, shifted one place left)
-----------
11110
Result: 111102