Posts

Showing posts from February, 2020

IT security. What can you you do with it?

How do I benefit from IT security? IT security prevents malicious threats and potential security breaches that can have a huge impact on your organization. When you enter your internal company network, IT security helps ensure only authorized users can access and make changes to sensitive information that resides there. IT security works to ensure the confidentiality of your organization’s data. IT  security  is a set of cybersecurity strategies that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information, blocking the access of sophisticated hackers. The  Three Types of Security  Controls Are Preventative, Detective, and Responsive. An IT  Security  Professional is someone responsible for protecting the networks, infrastructure and systems for a business or organisation.  However, for the most part, there are three broad  types of IT security : Network, End-Point, an

Cloud computing advantages and disadvantages.

In this post we'll discuss about cloud computing. Advantages: Easy implementation. Cloud hosting allows business to retain the same applications and business processes without having to deal with the backend technicalities. Readily manageable by the Internet, a cloud infrastructure can be accessed by enterprises easily and quickly.   Accessibility. Access your data anywhere, anytime. An Internet cloud infrastructure maximizes enterprise productivity and efficiency by ensuring your application is always accessible. This allows for easy collaboration and sharing among users in multiple locations.  No hardware required. Since everything will be hosted in the cloud, a physical storage center is no longer needed. However, a backup could be worth looking into in the event of a disaster that could leave your company's productivity stagnant.  Cost per head. Overhead technology costs are kept at a minimum with cloud hosting services, enabling businesses to use the ex

How do you use ICT in communication?

Well, ICT is an essential routine of our life, we use such technology through chatting, email, voice chats, social networking. It is means of communtion. Cts scans, Ultra  Sound, ECG are done by the ICTs.   ICT applications have been valuable resources in the medical field as well with other communications field. They support the efficient exchange of information between health professionals, they enable transfer of patient records and can improve the quality of care provided by health professionals.

Describe examples of the way in which ICT is used.

here the examples of ICT in daily life. ICTs  stand for information and communication technologies 1. THE USES OF ICT IN OUR SOCIETY 2.  ICT EDUCATION AGRICULTURETRANSPORTATION MEDICINE ENGINEERING SECURITY BANKING ENTERTAINMENT 3.  EDUCATION Use of IT to automate activities by keeping records students, results of the exam, making assignments etc. Managing school accounting. 4.  AGRICULTURE  Using computerized agricultural equipment  Using internet and email to dessimenate information  Agricultural Instruction 5.  MEDICINE  Many technology is used for diagnosis and cure of many diseases. Ex.  CT Scan  Ultrasound Devices  Magnetic Resonance Imaging (MRI) 6.  ENGINEERING  To Prepare the drawing using CAD, and CAM engineers used Information Technology  To build the plans for the buildings 7.  SECURITY  To track the Criminals through maintenance of database Information Technolgy  Using anti-virus for devices  CCTV for personal Purposes 8.  ENTERTAINMENT 

Viruses and hacking. How to save your data?

Image
Viruses: A  computer virus  is one  type  of malware that inserts its  virus  code to multiply itself by altering the programs and applications. The  computer  gets infected through the replication of malicious code.  Computer viruses  come in different forms to infect the system in different ways. hacking: Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. How do you save your data by hackers and virus? Use a firewall, it creates a barrier. Use an anti virus software, it deletes in real time and protects the computer. Install anti spyware software,   is a special kind of software that secretly monitors and collects personal. Use complex passwords, harder the password stronger it is. Keep Os,Apps and broswer Up-To date. Use secure network, do not use public networkers.

Network security

Image
What is network security? Network security  is protection of the access to files and directories in a computer  network  against hacking, misuse and unauthorized changes to the system. An example of  network security  is an anti virus system.

To compare common types of network.

LAN : Local Area Network WAN : Wide Area Network WLAN :  Wireless Local Area Network MAN : Metropolitan Area Network SAN :  Storage Area Network , System Area Network, Server Area Network, or sometimes Small Area Network CAN : Campus Area Network, Controller Area Network, or sometimes Cluster Area Network PAN :  Personal Area Network here is the chart of types of network with comparison Sr.No Parameter LAN WAN MAN 1 Ownership of Network Private Private or Public Private or Public 2 Area covered Small Very large(states or countries) Moderate (City) 3 Design and Maintenance Easy Not Easy Not Easy 4 Communication medium Coaxial Cable PSTN or Satellite links Coaxial cables, PSTN, Optical Fiber Cables, Wireless 5 Data rates High Low Moderate 6. Mode of communication Each station can transmit and receive Each station cannot transmit Each station can transmit or receive 7 Principle Operates on the principle of broadcasting Switching Both 8 Propagation Delay Short Long Moder

Modern input and output devices.

Image
Input devices: Keyboard Mouse Game pad Trackball Touchscreen Output devices: Monitor Printer Speaker Plotter Dot matrix printer EAMPLES OF INPUT DEVICE AS IN IMAGE: An image of keyboard. EXAMPLE OF OUTPUT DEVICE AS IN IMAGE: an image o speaker.

Describe types and components of computer systems.

Image
Types of computer system. The hardware. The operating sytem. The utilities. The application programs. End users Utilities  are the small programs that provide an addition to the capabilities provided by an operating system. Generally utilities perform a specific task related to managing the system resources. Operating systems contain a number of utilities for managing disk drives, printers, and other devices. Utilities are installed as memory resident programs that assist in system management. These utilities are essential and critical to modern computer environments. They perform the important tasks such as disk optimization and anti-virus protection. Most system utilities are installed, configured and periodically updated for a specific computer configuration. Application programs  are the computer programs which are used for the purpose of performing specific tasks using a computer. Application programs define the ways in which the system resources are used to solve th

How do i use ICT in my life?

Image
It can improve the quality of human  life  because it can be  used  as a learning and education media, the mass communication media in promoting and campaigning practical and important issues, such as the health and social area. It provides wider knowledge and can help in gaining and accessing information.