Posts

Interview

 1. Tell me about yourself. First of all, thank you for giving me this opportunity.  My name is Mubeen Hassan. I was born and brought up in Kuwait, a Middle Eastern country along with Persian Gulf. After completing my college from there, I went to Ukraine where I studied my Bachelors degree in Business Management from Kyiv Polytechnic University. I'm also a big fan of foreign languages and I gave a speech on topic 'why you should learn a foreign language (see some speech so you can tell about it bit like what was the speech about)' in Poltava university of economics and trade which was also published on a small Ukrainian newspaper called V-gorode which in English means - In the city. Apart from English, I myself can speak Russian, Ukrainian, Arabic and I'm learning German nowadays.  As far as work experience is concerned, I have worked as an assistant supervisor at my father's restaurant in Alfintas Towers, Kuwait. But it wasn't official employment as I was just

IT security. What can you you do with it?

How do I benefit from IT security? IT security prevents malicious threats and potential security breaches that can have a huge impact on your organization. When you enter your internal company network, IT security helps ensure only authorized users can access and make changes to sensitive information that resides there. IT security works to ensure the confidentiality of your organization’s data. IT  security  is a set of cybersecurity strategies that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information, blocking the access of sophisticated hackers. The  Three Types of Security  Controls Are Preventative, Detective, and Responsive. An IT  Security  Professional is someone responsible for protecting the networks, infrastructure and systems for a business or organisation.  However, for the most part, there are three broad  types of IT security : Network, End-Point, an

Cloud computing advantages and disadvantages.

In this post we'll discuss about cloud computing. Advantages: Easy implementation. Cloud hosting allows business to retain the same applications and business processes without having to deal with the backend technicalities. Readily manageable by the Internet, a cloud infrastructure can be accessed by enterprises easily and quickly.   Accessibility. Access your data anywhere, anytime. An Internet cloud infrastructure maximizes enterprise productivity and efficiency by ensuring your application is always accessible. This allows for easy collaboration and sharing among users in multiple locations.  No hardware required. Since everything will be hosted in the cloud, a physical storage center is no longer needed. However, a backup could be worth looking into in the event of a disaster that could leave your company's productivity stagnant.  Cost per head. Overhead technology costs are kept at a minimum with cloud hosting services, enabling businesses to use the ex

How do you use ICT in communication?

Well, ICT is an essential routine of our life, we use such technology through chatting, email, voice chats, social networking. It is means of communtion. Cts scans, Ultra  Sound, ECG are done by the ICTs.   ICT applications have been valuable resources in the medical field as well with other communications field. They support the efficient exchange of information between health professionals, they enable transfer of patient records and can improve the quality of care provided by health professionals.

Describe examples of the way in which ICT is used.

here the examples of ICT in daily life. ICTs  stand for information and communication technologies 1. THE USES OF ICT IN OUR SOCIETY 2.  ICT EDUCATION AGRICULTURETRANSPORTATION MEDICINE ENGINEERING SECURITY BANKING ENTERTAINMENT 3.  EDUCATION Use of IT to automate activities by keeping records students, results of the exam, making assignments etc. Managing school accounting. 4.  AGRICULTURE  Using computerized agricultural equipment  Using internet and email to dessimenate information  Agricultural Instruction 5.  MEDICINE  Many technology is used for diagnosis and cure of many diseases. Ex.  CT Scan  Ultrasound Devices  Magnetic Resonance Imaging (MRI) 6.  ENGINEERING  To Prepare the drawing using CAD, and CAM engineers used Information Technology  To build the plans for the buildings 7.  SECURITY  To track the Criminals through maintenance of database Information Technolgy  Using anti-virus for devices  CCTV for personal Purposes 8.  ENTERTAINMENT 

Viruses and hacking. How to save your data?

Image
Viruses: A  computer virus  is one  type  of malware that inserts its  virus  code to multiply itself by altering the programs and applications. The  computer  gets infected through the replication of malicious code.  Computer viruses  come in different forms to infect the system in different ways. hacking: Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. How do you save your data by hackers and virus? Use a firewall, it creates a barrier. Use an anti virus software, it deletes in real time and protects the computer. Install anti spyware software,   is a special kind of software that secretly monitors and collects personal. Use complex passwords, harder the password stronger it is. Keep Os,Apps and broswer Up-To date. Use secure network, do not use public networkers.

Network security

Image
What is network security? Network security  is protection of the access to files and directories in a computer  network  against hacking, misuse and unauthorized changes to the system. An example of  network security  is an anti virus system.