.

Friday 1 February 2019

File management and standard ways of working Home: Computer Science : :: Computer Science

File attention and standard ways of working property Computer Science File management and standard ways of working File management and standard ways of workingFile management and standard ways of working Keep information secure, e.g. from theft, loss, vir habituates, fireYou should documentation information secured from theft on aphonic magnetic disc misfortunes you send away similarly keep your information safe from viruses thatcan wipe all your files pip the computer.The way to keep the information safe is to energize a BACK-UP file. Aback-up file is a file that has all saved work on it and can be savedunder a different mark in a different folder or can be saved onto adisc. A floppy disc can likewise transfer up to 1.44 megabytes of informationbetween computers. You can use hard discs for back-ups because thesurface of the disc stores data digitally, CD-ROMs are read only visual discs, DVDs can hold up to 17 gigabytes of data, magnetizedTapes are the most common us ed for back-up devices and Zip or Jaz discthe common removable media all these be used as back-up devices.We do back-ups so that any lost information that is important we canhave a mirror copy of the document saved somewhere else so thatnothing will happen to it. The backups should be used with passwords,username.I weigh backup are helpful because if the computer had a power failureand I havent saved my work then it promoter I would have to do all theagain, which means it would take long then what it would have beenif I had saved it in the fist place. cling to confidentiality, e.g. prevent unauthorised entranceway to documentsor recordsTo protect documents from confidentiality you can use the three maintypes of data credentials and they are* Physical security* Access security* Data securityTo protect data employ physical security you should follow the 7SAD-FLAB rules to stay safe with confidentiality and they are1. Serial number2. Alarms3. Doors4. Fire protection5. Lock6. Avo id7. Blinds.You can use these to protect the hardware because if anything happensyou have to spend money on a new hard which is expensive. You canlimit the amount of entrance money to any important data by using usernames,passwords and firewalls to stop anyone from hacking into files that enduret have the right to access it.To protect data from access security you should limit a persons useof the network. With this security all authorised users should begiven usernames and passwords. This is to stop people from hackinginto data bases.To protect data using data security files can be password protected to

No comments:

Post a Comment