Tuesday, May 28, 2019

File management and standard ways of working Home: Computer Science : :: Computer Science

File oversight and standard ways of working Home Computer Science File management and standard ways of working File management and standard ways of workingFile management and standard ways of working Keep data secure, e.g. from theft, loss, viruses, fireYou should keep culture secured from theft on expectant magnetic diskfailures you can also keep your information safe from viruses thatcan wipe in all your files off the computer.The way to keep the information safe is to have a BACK-UP file. Aback-up file is a file that has all protected work on it and can be savedunder a different name in a different folder or can be saved onto adisc. A floppy disc can also transfer up to 1.44 megabytes of databetween computers. You can use hard discs for back-ups because thesurface of the disc stores data digitally, CD-ROMs are read onlyoptical discs, DVDs can hold up to 17 gigabytes of data, MagneticTapes are the most usual utilise for back-up devices and Zip or Jaz discthe common remova ble media all these be used as back-up devices.We do back-ups so that any lost information that is important we canhave a mirror copy of the document saved somewhere else so thatnothing will happen to it. The backups should be used with passwords,username.I think backup are helpful because if the computer had a power failureand I havent saved my work wherefore it means I would have to do all theagain, which means it would take longer then what it would have beenif I had saved it in the fist place. comfort confidentiality, e.g. prevent unauthorised door to documentsor recordsTo protect documents from confidentiality you can use the three maintypes of data security and they are* Physical security* retrieve security* Data securityTo protect data using physical security you should follow the 7SAD-FLAB rules to stay safe with confidentiality and they are1. Serial modus operandi2. Alarms3. Doors4. Fire protection5. Lock6. Avoid7. Blinds.You can use these to protect the hardware becaus e if anything happensyou have to spend money on a new hard which is expensive. You canlimit the amount of access to any important data by using usernames,passwords and firewalls to release anyone from hacking into files thatdont have the right to access it.To protect data from access security you should limit a persons useof the network. With this security all authorised users should begiven usernames and passwords. This is to stop people from hackinginto data bases.To protect data using data security files can be password protected to

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.