Speaking topics: Prepare ppt presentations on the given topics and speakaboutthem


Answer: Anetworkconnectstwoormore


Download 208.95 Kb.
bet8/15
Sana18.06.2023
Hajmi208.95 Kb.
#1591134
1   ...   4   5   6   7   8   9   10   11   ...   15
Bog'liq
Orifjonov D

Answer:


Anetworkconnectstwoormorecomputersjoinedtogethertoallowcommunication.
AnetworkoverasmallgeographicalareaisknownasaLAN,andanetworkovera larger geographical area is known as a WAN. The internet is the largest networkin theworld.


There are different topologies for Local Area Networks that are joined with wiresorcables.Thisincludesbus,star,andmesh.


A server is a computer that manages and stores files, and provides services to othercomputers on the network. They need to be quite powerful machines with a lot ofprocessing power.


Toconnecttoanetwork, youneedaNetworkInterfaceCard(NIC)whichallocatesanIPaddress toyourdevice soitcan belocated onthe network.






  1. ITSUPPORT.REPORTING



Task 1.Based on the information in the pictures and your notes, present your reportafter the inspections. Write down an incident report about health and safety and networksecurityinthe workplace .


The items and equipment in this room are very disorderly. There should be only work-related equipment on the desktop. In this picture, there is water, food and similarthings on the desktop that are superfluous and cannot be used in front of thecomputer. Thecables laidforthecomputerarealsoplacedinaverydangerousand


inappropriate place. Even if we look at the dining table, we can see the arrangement.Infact,asaresultofsucha disorder,manydisappointmentscanbeencountered.







  1. SECURITYANDSAFETY



Task 1. Read the text “Information Technology and Security” and give your ownopinionsabout securityandsafety.

Physical security is a complex of tools and methods that are used to guarantee thesafetyofparticularfacilitiesthatcontainconfidentialinformation(Forte&Power,2007).Technical security is a range of activities that are focused on the safety of moderntechnologies with a use of such methods and encryption, authentication, and others(Azuwa, 2015). Data redundancy is the availability of confidential information at morethan one place at a time (Huang, Chen, Lin, You, & Peng, 2015). It is imperative toconsider the fact that it is quite important in case an emergency happens. However, itshould be minimized most of the time because it dramatically increased the risks, and itshould be addressed. Overall, physical security is the most important and should befocused on because it is not possible for third parties to try and hack data if they are notable to get access to it in the first place, and it is hard to argue with importance of suchmeasures.Currently,somelawsarefocusedontheprivacyofhealthcareinformationandare regulated by The Office for Civil Rights (U.S. Department of Health & HumanServices,2015).


It needs to be said that they are quite reasonable because there is a possibility that it canbe used for a range of criminal activities. It is also paramount to make sure that suchinformation stays confidential because it may cause issues in personal life. However, itneeds to be said that current system is in need of improvement because data is not assecureas itshouldbe,anditisevident thatnumerousissues arepresent.


Identifiable patient information is a kind of data that can be used to locate an individual(U.S. Department of Health & Human Services, 2015). It should be said that health careinstitutions are mostly in compliance with the rules. However, some issues are present.Private practices are especially hard to regulate, and this fact should be considered. It isinterestingthattheremayhavebeennumerousinstancesofinformationdisclosure,and


most patients do not know about it. Also, it is imperative that various scientists payattentiontocurrentissuesandtrytodeveloptoolsandmethodsthatwouldhelptoresolvesuchproblems(Pradaet al.,2011).

It is especially dangerous if criminals are able to access such information because it canbe used in various ways. The government makes sure that such instances are limited.However, it needs to be said that it is still possible,and the information is not asconfidentialasonemayexpect.Newtechnologiesmakeiteasiertoprotectdata,buttherenumerous complications may occur. Also, attorneys may have access to the informationabout the patients if they make a request, and there is a severe responsibility for thedisclosure(Miller &Schlatter,2011).



Download 208.95 Kb.

Do'stlaringiz bilan baham:
1   ...   4   5   6   7   8   9   10   11   ...   15




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling