Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
30 views

Computer Application Assignment Two

note computer

Uploaded by

Peter Oyugi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views

Computer Application Assignment Two

note computer

Uploaded by

Peter Oyugi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

CLASSIFICATION OF COMPUTERS

1. Classification Based on Size and Power

Supercomputers:

Characteristics: Extremely fast, capable of processing vast amounts of data simultaneously; used
for complex calculations (e.g., weather modeling, scientific simulations).

Mainframes:

Characteristics: Large, powerful machines used in organizations for bulk data processing and
critical applications (e.g., banking transactions).

Minicomputers:

Characteristics: Mid-sized, capable of supporting multiple users; often used for specific
applications (e.g., industrial control systems).

Microcomputers:

Characteristics: Small, personal computers like desktops, laptops, and tablets; designed for
individual use.

2. Classification Based on Purpose

General-purpose computers:

Characteristics: Versatile and capable of performing a wide range of tasks (e.g., personal
computers).

Special-purpose computers:

Characteristics: Designed for a specific task (e.g., embedded systems in cars, ATMs).
3. Comparison of Analog, Digital, and Hybrid

ComputersAnalog Computers:

Characteristics: Process continuous data (e.g., voltage levels) and are often used in simulations.

Digital Computers:

Characteristics: Process discrete data using binary; most common type for general computing
tasks (e.g., desktops, servers).

Hybrid Computers:

Characteristics: Combine features of both analog and digital; used in specialized applications
like medical imaging.

4. Classification Based on Processing Capabilities

Single-user systems:

Characteristics: Designed for use by one person at a time (e.g., personal computers).

Multi-user systems:

Characteristics: Support multiple users simultaneously (e.g., mainframes).

Multiprocessing systems:

Characteristics: Use multiple CPUs for parallel processing (e.g., supercomputers).


Multitasking systems:

Characteristics: Allow multiple processes to run concurrently on a single CPU (e.g., modern
operating systems).

5. Classification Based on Architecture

Von Neumann Architecture:

Characteristics: Uses a single memory space for both data and instructions, leading to potential
bottlenecks.

Harvard Architecture:

Characteristics: Has separate memory for data and instructions, allowing for more efficient
processing.

6. Central Processing Unit (CPU) Components Control Unit (CU): Directs operations within the

CPU.

Arithmetic Logic Unit (ALU): Performs mathematical and logical operations.

Registers: Small, fast storage locations for immediate data access.


COMPUTER SECURITY

1. Key Principles of Computer Security (CIA Triad)

Confidentiality: Protecting sensitive information from unauthorized access.

Integrity: Ensuring data is accurate and unaltered.

Availability: Ensuring systems and data are accessible when needed.

2. Types of Malware

Viruses: Attach to programs and spread when executed.

Worms: Self-replicate across networks.

Trojans: Disguised as legitimate software but perform harmful actions.

Ransomware: Locks files and demands payment for access.

Spyware: Monitors and collects user information without consent.

3. Role of Encryption

Encryption: Secures data by converting it into a coded format, protecting it during transmission
and when stored.

4. Importance of Security Measures

Firewalls: Filter traffic to prevent unauthorized access.

IDS/IPS: Monitor and respond to suspicious activities.

Antivirus Software: Detects and removes malicious software.

5. Social Engineering Attacks

Phishing: Deceptive attempts to acquire sensitive information.


Baiting: Tempting users to download malware.

Pretexting: Creating false scenarios to extract information.

Human Factor: Lack of awareness can lead to security breaches.

6. Basic Computer Organization Elements

CPU: The brain of the computer, processing instructions.

Memory: Includes RAM (temporary storage) and ROM (permanent storage).

Input/Output Devices: Interfaces for user interaction and data communication.

You might also like