Posts

Showing posts from December, 2024

Public Sector Accessibility Regulations 2018

Public Sector Accessibility Regulations 2018 Features that a defined for accessibility include, subtitles, which can be used by anyone especially those who have impaired hearing. Enlarged text which is used for people who have impaired eyesight. Some of the situations that are listed in the guidelines include a video not having subtitles, having poor colour contrast making it hard to see things in certain situations, not having clear ways to navigate a website. Some examples of providing accessibility features would be being able to enlarge texts, being able to dub different languages, and being able to have subtitles. Test Yourself (WCAG) Two of the principles of the WCAG include making things perceivable (so providing things like text for images so screen readers can work, and make content able to work on various displays). Another principle is operable (making sure that a website can be use by a keyboard and mouse and making sure that the website doesn’t trigger things like seizures...

The considerations and value of meeting customer and end user needs within a a business context

Value of meeting customer and end user needs Happy and satisfied customers and end users will stay with a business over a long period of time. That should be the goal for any business. Ensuring that customer expectations are not only met, but exceeded, means that they will buy products and services from a business again and again. Increased financial benefit Happy customers are customers who will stay with a business. They will also promote the business by talking to friends, family and posting positive comments on social media. Retaining customers who repeat buy from a business means an increase in revenue. Gaining new customers through positive in revenue. Gaining new customers through positive recommendations will also increase revenue. User Experience As previously mentioned, it is important that customers and end users have a positive experience when interacting with the business, their systems, products and services. If the customers and end users have a good experience, they wil...

VLANS

Image
Vlans in Cisco Packet Tracer We setup a network topology We then added a Vlan into the network called 192.168.20.1

Summary of Digital Resilence and Case study of Copeland

A summary of the methods used to implement digital resilience Installation of software updates/upgrades Replacement and removal of hardware Adding redundancy into systems Decommission and remove legacy hardware and software Device hardening: Removing unneeded applications, ports permissions and access Limiting user account functions Maintaining effective back-up systems: On-premises Off-site/remote Cloud Appropriate and reviewed standard operating procedures (sops) Structured staff training for: New hardware/software Staff inductions New and updated policies and procedures A summary of the methods used to implement digital resilience Risk analysis of digital system's resilience Planning for disruption scenarios Planning for disruption scenarios Planning disaster recovery and conducting recover exercises Documenting lessons learnt and incorporating resilience in the continuous improvement part of the lifecycle (ITIL) A summary of the benefits to the organization of being digitally r...

Feedback on presentation

Feedback from Patrick Consider an introduction of your presentation (Including individual presentation) Less contents on your slides Avoid misconception Check spellings and font size Conclude with asking for questions Feedback from Me
Freedom of Information Act 2000 This act deals with access to information It sought to support the right of access; that is the right to access information on any topic from any public authority The FoI Act applies to all public authorities including schools, health trusts, the police and other government agencies The information commission office remains responsible for overseeing the FoI act The Office of the Information Commissioner oversees the FoI act The type of information that can be requested includes  printed documents, computer files, letters, emails, photographs, and sound or video recordings Information that will be withheld includes anything to do with national security, personal data, commercial interests. National security: information supplied by, or relating to, bodies dealing with security matters. A certificate signed by a Minister of the Crown is conclusive proof that the exemption is justified. Computer Misuse Act 1990 The Focus of the act was to criminalise t...

Digital Environments Key Terms

Electromagnetic interference : This is the disruption of electronic operations and electronic operations and electronic devices from electronic emissions. EMI travels in waves and can cause devices to malfunction (which can result in dangerous outcomes) Radio frequency interference : This unwanted signals in the radio frequency spectrum used by  Wi-Fi networks (most commonly 2.4GHz and 5Ghz). Some other electronic devices use the same radio waves as Wi-Fi networks. This causes the prevention of the transmission of data and can create delays and performance degradation. External bus : Sometimes referred to as the expansion bus. This is a connection between a computer and external devices. Application Specific Integrated Circuit (ASIC) : A microchip designed for a specific application such as a handheld digital device or as a transmission protocol. Field Programmable Gate Array (FPGA) : An integrated circuit consisting of internal hardware blocks. The hardware blocks have user-progra...

The types, services and benefits of cloud computing

Cloud computing refers to the outsourcing of IT services and infrastructure, making them accessible remotely via the internet. Utilizing cloud computing models can boost productivity and provide organisations with a competitive edge. There are four different categories of cloud models These are: Public - These are used by a range of end-users ranging from large organisation to an individual. They can be accessed through a digital device with an internet connection. To be able to access and use a public cloud, users must pay a subscription or on a pay-to-use basis   Private - These are used by a specific organisation and can be hosted on site premises or remotely through virtualisation. Access to a private cloud is restricted by a firewall which is managed by the organisation. A private cloud requires that the organisation installs and maintains infrastructure including hardware, software and networking components. Community - A community cloud is one that is designed for and used b...