1,229 search results

Network security
Digital & Computing

Network security

...simple networks compare and contrast symmetric and asymmetric encryption systems and their vulnerability to attack, and explain the characteristics of hybrid systems...Network security: 1.1 Terminology - Throughout this unit I shall use the terms ‘vulnerability’, ‘threat’ and ‘attack’. It is worthwhile clarifying these terms before proceeding: A vulnerability...
Level 3: Advanced 25 hrs
Learning from major cyber security incidents
Digital & Computing

Learning from major cyber security incidents

...simple it is to perform. So who’s most vulnerable? Any website that’s SQL database driven with poor code. So how does it work? Well, this attack is very commonly done on login screens. So let’s first see what’s happening to your username and password after they’re submitted. In a poorly designed site, the name and password strings are directly inserted into a...
Proud of nursing associates: who they are and why they are important
Health, Sports & Psychology

Proud of nursing associates: who they are and why they are important

...code of conduct (NMC, 2018) to ensure the quality and safety of patient care. The nursing associate role sought to ‘bridge the gap’ between the registered nurse and healthcare assistant in the healthcare team (HEE, 2017; NMC, 2022). Nursing associates contribute to most of the care for patients under the supervision of a registered nurse, but they do not complete all...
What is a metal?
Science, Maths & Technology

What is a metal?

...simple model of an atom is a central atomic nucleus with electrons arranged in shells at different distances from the nucleus. Lithium has the smallest atom of all metals. Figure 3 shows a simple representation of a lithium atom. The smaller dots represent electrons moving around the central nucleus. The large dot at the centre represents the nucleus of the lithium atom...
Level 1: Introductory 3 hrs
What is Blockchain?
Digital & Computing

What is Blockchain?

...code being openly available, a key feature of blockchains is that in principle every user has their own copy of the entire blockchain. In fact, there is no central or master copy, simply the multiple copies held by the volunteers in the user community. Volunteers are rewarded for their effort through a number of algorithmic processes that can result in payment. Small...
Support for dyslexic language students through feedback
Education & Development

Support for dyslexic language students through feedback

...coded highlighting of particular errors and correction of individual errors in brackets, using comment boxes. Students with dyslexia are likely to repeat some mistakes even after being corrected many times. Teachers should continue to correct them, but it is important not to lose patience and provide constructive feedback which will help the student to make progress but...
Clinton / Trump: Two views of the first debate
Society, Politics & Law

Clinton / Trump: Two views of the first debate

...simple and direct expression of regret – and Trump duly set off on another tangent never to return to the email theme again. Clinton followed up swiftly with a hard attack on Trump’s six corporate bankruptcies, and the long line of contractors he has failed to pay for their services over the years. A new dynamic had taken hold: Clinton was sharp and on the attack,...
Languages and the refugee crisis
Languages

Languages and the refugee crisis

...simple but very effective strategies such as speaking slowly or avoiding using idioms or jargon. Other steps can include abstaining from stereotyping, exploring and acknowledging the differences between their own culture and that of their new neighbours’, or even learning their language – only a few useful phrases, to express greetings or say thank you can make a huge...