You are on page 1of 4

UNIVERSITY OF CAPE COAST.

DEPARTMENT OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY .

COURSE: FOUNDATION OF COMPUTING

COURSE CODE: CSC 105


INDEX NUMBER: PS/LAB/22/0186

Questions
1.Are there any contemporary areas of research or industry where analog computing principles
are still relevant or experiencing a resurgence, and what factors contribute to their continued
relevance?

2.Design a prototype for a secure data storage architecture that employs encryption, and access
controls, and protects student data stored in a database server Give a brief description of how the
prototype may work.

3.Sketch the following network topologies and give a brief description of them.

A. Bus Topology.

B. Hybrid Topology.
QUESTION 1

Analog computing principles are still relevant and experiencing a resurgence in certain research
and industry areas. Take neural networks and artificial intelligence, for example. Analog
computing can efficiently simulate the intricate computations happening in our brains, making it
useful for tasks like pattern recognition and optimization. The continuous nature of analog
signals allows for parallel processing and can handle large-scale computations more efficiently
than digital systems. This is why analog computing is still highly valued. It offers unique
advantages in signal processing, control systems, and even quantum computing. Its ability to
handle complex computations more efficiently than digital systems, especially with big data, is a
key factor in its continued relevance. So, it’s an exciting time for analog computing to make a
comeback and drive advancements in various fields!

QUESTION 2

The prototype for a secure data storage architecture that employs encryption, access controls, and
protects student data stored in a database server can be designed as follows:

1.Encryption: All student data stored in the database server should be encrypted using strong
encryption algorithms such as AES (Advanced Encryption Standard). This will ensure that even
if unauthorized users gain access to the database, they will not be able to read the data without
the encryption keys.

2..Access Controls: Implement strict access controls to ensure that only authorized users have
access to the student data. This can be achieved by using role-based access control (RBAC)
mechanisms, where different users are assigned specific roles and permissions based on their
responsibilities and level of access required.

3.Secure Data Transmission: Implement secure communication protocols, such as HTTPS, to


ensure that data transmitted between the client and the database server is encrypted and secure.

4.Audit Trails: Implement audit trails to track and monitor all access and changes to the student
data. This will help in identifying any unauthorized access or suspicious activities.

5.Backup and Recovery: Implement regular data backups and recovery mechanisms to ensure
that student data is not lost in case of system failures or data breaches.

The prototype may work by encrypting all student data before storing it in the database server.
Access controls will be implemented to restrict access to the data based on user roles and
permissions. Secure communication protocols will be used to ensure that data transmitted
between the client and the server is encrypted. Audit trails will track and monitor all access and
changes to the data, while regular backups will be taken to prevent data loss. Additionally, the
system will have mechanisms in place to recover data in case of any incidents.
QUESTION 3 a

A bus topology is a type of network topology in which all devices are connected to a single
communication line, called a bus. In a bus topology, data is transmitted from one end of the bus
to the other, and all devices on the bus receive the data simultaneously. Devices can be added or
removed from the bus without affecting the rest of the network. However, if the bus line is
severed or damaged, the entire network will be affected.

QUESTION 3b

A hybrid topology is a combination of two or more different types of network topologies, such as
star, bus, ring, or mesh. This allows for more flexibility and scalability in the network design, as
different parts of the network can be connected in different ways based on the specific needs of
the organization. Hybrid topologies are often used in larger networks where a single type of
topology may not be sufficient to meet all of the requirements.
REFERENCE

1.A.K. Dewdney. “On the Spaghetti Computer and Other Analog Gadgets for Problem Solving”,
Scientific American, 250(6):19–26, June 1984. Reprinted in The Armchair Universe, by A.K.
Dewdney, published by W.H. Freeman & Company (1988), ISBN 0-7167-1939-8..

2.Knott, Geoffrey; Waites, Nick (2002). BTEC Nationals for IT Practitioners. Brancepeth
Computer Publications. P. 395. ISBN 0-9538848-2-1. …all stations have equal priority in using
the network to transmit.
3.Janssen, Cory. “Bus Topology”. Techopedia. Retrieved 2015-08-04

You might also like