Tuesday, May 28, 2019

File management and standard ways of working Home: Computer Science : :: Computer Science

File management and standard ways of workings Home Computer lore File management and standard ways of working File management and standard ways of workingFile management and standard ways of working Keep information secure, e.g. from theft, loss, viruses, fireYou should keep information secured from theft on voteless discfailures you gutter also keep your information safe from viruses that merchantman wipe all your files off the computer.The way to keep the information safe is to view as a BACK-UP file. Aback-up file is a file that has all save work on it and can be protectedunder a different name in a different folder or can be saved onto adisc. A floppy disc can also transfer up to 1.44 megabytes of databetween computers. You can use hard discs for back-ups because thesurface of the disc stores data digitally, CD-ROMs argon read onlyoptical discs, DVDs can hold up to 17 gigabytes of data, MagneticTapes are the most common used for back-up devices and Zip or Jaz discthe com mon removable media all these be used as back-up devices.We do back-ups so that whatsoever lost information that is important we canhave a mirror copy of the document saved somewhere else so thatnothing will buy the farm to it. The backups should be used with passwords,username.I think backup are helpful because if the computer had a power failureand I havent saved my work then it means I would have to do all theagain, which means it would take longer then what it would have beenif I had saved it in the fist place.Protect confidentiality, e.g. prevent unauthorised access to documentsor recordsTo protect documents from confidentiality you can use the three maintypes of data security and they are* personal security* Access security* Data securityTo protect data using physical security you should follow the 7SAD-FLAB rules to stay safe with confidentiality and they are1. Serial number2. Alarms3. Doors4. Fire protection5. Lock6. Avoid7. Blinds.You can use these to protect the hardwar e because if anything happensyou have to spend money on a new hard which is expensive. You canlimit the amount of access to any important data by using usernames,passwords and firewalls to stop anyone from hacking into files thatdont have the right to access it.To protect data from access security you should limit a persons useof the network. With this security all authorised users should begiven usernames and passwords. This is to stop people from hackinginto data bases.To protect data using data security files can be password protected to

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.