General Ans
General Ans
Medical imaging
In 1972, the engineer from British company EMI Hounsfield invented the X-ray
computed tomography device for head diagnosis, which is what is usually called
CT (computer tomography). The CT nucleus method is based on the projection
of the human head section and is processed by computer to reconstruct the
cross-sectional image, which is called image reconstruction. In 1975, EMI
successfully developed a CT device for the whole body, which obtained a clear
tomographic image of various parts of the human body. In 1979, this diagnostic
technique won the Nobel Prize.[4] Digital image processing technology for
medical applications was inducted into the Space Foundation Space Technology
Hall of Fame in 1994.[24]
12) Characterize the tools that should be used for the lawful
management of information flow in the electronic form.
1.INFORMATION GOVERNANCE FRAMEWORK
2.CONFIGURABLE TAXONOMY
3.UNIFIED VISIBILITY FOR ALL RECORDS & ASSETS
• 2. Data security
• 3. Scalability
• 4. Mobility
• 5. Disaster recovery
• 6. Control
• 7. Competitive edge
14) Discuss cloud computing service models: SaaS (Software-
as-a-Service), IaaS (Infrastructure as a Service), PaaS
(Platform as a Service).
Infrastructure as a service (IaaS)
A vendor provides clients pay-as-you-go access to storage, networking, servers and
other computing resources in the cloud.
Public clouds are the most common way of deploying cloud computing. The cloud
resources (like servers and storage) are owned and operated by a third-party cloud
service provider and delivered over the Internet.
• Lower costs—no need to purchase hardware or software and you pay only for the
service you use.
• No maintenance—your service provider provides the maintenance.
• Near-unlimited scalability—on-demand resources are available to meet your business
needs.
• High reliability—a vast network of servers ensures against failure.
Often called “the best of both worlds,” hybrid clouds combine on-
premises infrastructure, or private clouds, with public clouds so
organizations can reap the advantages of both. In a hybrid cloud, data
and applications can move between private and public clouds for
greater flexibility and more deployment options. For instance, you can
use the public cloud for high-volume, lower-security needs such as web-
based email and the private cloud (or other on-premises infrastructure)
for sensitive, business-critical operations like financial reporting.
• More flexibility—your organisation can customise its cloud environment to meet specific
business needs.
• Improved security—resources are not shared with others, so higher levels of control and
security are possible.
• High scalability—private clouds still afford the scalability and efficiency of a public cloud.
GSM / GPRS
For a long time GSM (Global System for Mobile communication) coupled with
GPRS (General Packet Radio Service) for data transfer has been the most
commonly used cellular technology for products that don’t require large amounts
of data transfer. This is mainly due to the wide availability and the relatively low
hardware cost of GSM/GPRS hardware.
As you probably already know, traditional WiFi sets up an access point that
allows many devices to connect to it. But what if you want to transfer data
directly from one device to another without the overhead of an access point?
That is where WiFi Direct comes into play.
Bluetooth Classic
Email Archiving
Encryption
• Android's own screen pinning system. One of Android's most useful security
tools is also one of its most easily overlooked. ...
• A password management app. ...
• A two-factor authentication utility. ...
• Android's Smart Lock feature. ...
• Android's advanced app-scanning feature. ...
• Android Device Manager. ...
• An Android VPN client.
Coordination tools:
These tools help to include project team members in the planning and monitoring
phases of projects and to link them to each other by providing them with information.
Project team members can use the software to create invoices, track budgets and
progress, view their tasks, evaluate deadlines, and analyze past time sheets.
29) Characterize the tools for mobile devices that allow you to
maintain contact and efficient work on the go for employees
from various departments of the company.
Voice calls, text messaging, instant messaging (IM), email and video calls are some of the more
common ways to communicate from a smartphone.
The Most Popular and Efficient Business Communications Tools You Can Start Using Now
• Intranet/Social Intranet.
• Chat rooms, Private and Group Messaging.
• Discussion Forums.
• Ticketing, Issue Tracking and Case Software.
• Internal Blogs, Video and Audio.
According to the SANS Institute, there are six key phases of an incident response plan:
1. Preparation: Preparing users and IT staff to handle potential incidents should they should
arise.
2. Identification: Determining whether an event qualifies as a security incident.
3. Containment: Limiting the damage of the incident and isolating affected systems to prevent
further damage.
4. Eradication: Finding the root cause of the incident and removing affected systems from the
production environment.
5. Recovery: Permitting affected systems back into the production environment and ensuring
no threat remains.
6. Lessons learned: Completing incident documentation, performing analysis to learn from the
incident and potentially improving future response efforts.