Essay PreviewMore ↓
File management and standard ways of working : File management and
standard ways of working
File management and standard ways of working
Keep information secure, e.g. from theft, loss, viruses, fire
You should keep information secured from theft on hard disc
failures; you can also keep your information safe from viruses that
can wipe all your files off the computer.
The way to keep the information safe is to have a BACK-UP file. A
back-up file is a file that has all saved work on it and can be saved
under a different name in a different folder or can be saved onto a
disc. A floppy disc can also transfer up to 1.44 megabytes of data
between computers. You can use hard discs for back-ups because the
surface of the disc stores data digitally, CD-ROMs are read only
optical discs, DVD’s can hold up to 17 gigabytes of data, Magnetic
Tapes are the most common used for back-up devices and Zip or Jaz disc
the common removable media all these be used as back-up devices.
We do back-ups so that any lost information that is important we can
have a mirror copy of the document saved somewhere else so that
nothing will happen to it. The backups should be used with passwords,
I think backup are helpful because if the computer had a power failure
and I haven’t saved my work then it means I would have to do all the
again, which means it would take longer then what it would have been
if I had saved it in the fist place.
Protect confidentiality, e.g. prevent unauthorised access to documents
To protect documents from confidentiality you can use the three main
types of data security and they are:
* Physical security
* Access security
* Data security
To protect data using physical security you should follow the 7
SAD-FLAB rules to stay safe with confidentiality and they are:
1. Serial number
4. Fire protection
You can use these to protect the hardware because if anything happens
you have to spend money on a new hard which is expensive. You can
limit the amount of access to any important data by using usernames,
passwords and firewalls to stop anyone from hacking into files that
don’t have the right to access it.
To protect data from access security you should limit a person’s use
of the network. With this security all authorised users should be
given usernames and passwords. This is to stop people from hacking
into data bases.
To protect data using data security files can be password protected to
How to Cite this Page
"File management and standard ways of working Home: Computer Science :." 123HelpMe.com. 18 Sep 2019
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Computer Security Computer security is an important issue and threats to the computer must be countered through various access controls and safety measures. Authorized accesses, avoidance of malicious software, prevention of applications from hackers are the steps that make a system secure. The fundamentals of computer security include an understanding of security policy stating laws, practices and regulations to manage and protect sensitive information. Enforcing a devised security policy and assurance of policy implementation are other important aspects of computer security.... [tags: Computer security, Computer, Authorization]
866 words (2.5 pages)
- Windows XP File Processing Within Windows there are two methods that a user or administrator can obtain access to files stored on the hard drive or media source. In the Windows operating system, files that are operating system specific (files needed in order for the operating system to work) are normally on the primary drive which is usually the C:\ drive. On a Windows based PC during the setup process, a user has the choice of where the operating system files are stored and what file system Windows will be using.... [tags: Technology]
1733 words (5 pages)
- When people think of a product or service being "standard", several adjectives may come to mind. The product or service must be: uniform, consistent, unchanging, and going to remain the same for a very long time, if not indefinitely. The technical definition states, "An acknowledged measure of comparison for quantitative or qualitative value." People have grown to expect things in their daily life to be standard. Amazingly enough, people are accommodated more than they think. There are so many products people take for granted, they rarely think of how much effort had to go into making them all fit into the same, nice little package.... [tags: Technology Standards Hardware Software]
1188 words (3.4 pages)
- Computer Graphics Design has changed in many ways over the years. In the beginning there were 2-Dimensional shapes such as you would see in the game “Pong.” Many years later, graphics improved, changing from 2-Dimensional shapes into 3-Dimensional characters, which are standard in video games, movies, and television today. There are many different image types for graphics: 2D computer graphics, pixel art, vector graphics, 3D computers graphics, and computer animation. Over the years, computer graphic design programs have been created for public use, one example being the program Blender 3D.... [tags: Information Technology ]
1862 words (5.3 pages)
- Input Devices An input device is a device that provide the computer input, for example a keyboard, without the keyboard you would not be able to type words or use the different shortcuts a keyboard provides and without a mouse you would not be able to click on anything to get you anywhere, so a computer without input devices would be mostly useless. There are many input devices to use, there is, microphones, scanners, webcams, etc. all these devices send information to the computer, categorizing them as input devices.... [tags: keyboard, mouse, smartboard]
777 words (2.2 pages)
- The focus of this paper will be installing an operating system over a network to one or many computers by creating an image. There are multiple ways to install an operating system on a computer. The way that is chosen depends on the installer’s situation. One scenario would be if the installer is only dealing with a single computer that needs an operating system installed. The other scenario is if there are many computers that need operating systems installed at one time. An operating system is a set of programs that manage computer hardware resources and provide common services for application software.... [tags: Technology, Computer Operations]
1599 words (4.6 pages)
- The Evolution of Email Long before the Internet actually existed, email or electronic mail, could be traced back to the directories of a new computer system used at the Massachusetts Institute of Technology in 1965. They had built a machine called “Compatible Time-sharing System” and eventually allowed university students and other registered users from around the New England States to share and store files on it. Students and faculty could login and store files on MIT’s IBM 7094 computer (See Figure 1).... [tags: internet, computer systems]
1413 words (4 pages)
- 1) Web 2.0 is a collection of technologies that enable us to create and provide services to end users in innovative ways. It's not only about the technologies which are used but about the new ways that it enables large numbers of people to come together to collaborate, share, and build . The term Web 2.0 was invented by Tim O’Reilly, founder and CEO of O’Reilly Media. According toTim O'Reilly: http://radar.oreilly.com/2006/12/web-20-compact-definition-tryi.html, 2006 “Web 2.0 is the business revolution in the computer industry caused by the move to the Internet as platform, and an attempt to understand the rules for success on that new platform.” Much of the focus of Web 2.0 is on new busi... [tags: Computer Science]
910 words (2.6 pages)
- I decided to write my paper on Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) because professor mentioned these devices several times in class and I am interested in network security therefore it was a good opportunity for me to learn more about these security systems. An intrusion detection system (IDS) generally detects unwanted manipulations to computer systems, mainly through the Internet. The manipulations may take the form of attacks by crackers. An intrusion detection system is used to detect many types of malicious network traffic and computer usage that can't be detected by a conventional firewall.... [tags: Computer Network Security]
1185 words (3.4 pages)
- Data Acquisition Data acquisition is the process of copying data. For computer forensics, it’s the task of collecting digital evidence from electronic media. There are two types of data acquisition: static acquisitions and live acquisitions. Static Acquisitions: if you have preserved the original media, making a second static acquisition should produce the same results. The data on the original disk is not altered, no matter how many times an acquisition is done. Your goal when acquiring data for a static acquisition is to preserve the digital evidence.... [tags: copying data, computer forensics]
1744 words (5 pages)
password to view and amend data.
With computer security comes drawbacks and they are:-
*Environm ental security
* Procedural security
* Human security
* Electronic security
You can get more computer data threats: - lighting, power outages,
bombs etcÂ…all these come happen by environmental threats, also threats
from Procedural security which should have firewalls, Anti-viruses
programs and encryption (CODing) to be put in place to protect data
where ever you keep the data apart from on the computer.
For human threats the limits that should be taken is to limit the
amount of access to any data that should have, usernames, passwords
and firewalls on to stop anyone from hacking into files that they
donÂ’t illegally have access to.
Respect copyright, e.g. not using the work of others without
You should respect copyright because you could find something from the
internet and copy and paste that work someone else has done and use it
as though you have done all the work yourself. The places you [IMAGE]would
find the copyright act are:-
* Web pages
You should have permission to copy work that other people have done if
it is a piece of work you need for a proper reason or you have the
right from the person who wrote it in the first place.
Save work regularly and use different filenames
You should save your work regularly because if anything
happens to your computer and you haven’t saved your work then it means
you have to re-type the work you have been doing before the problem
happened. Lost information can be a nightmare to re-do because if you
have written a long piece of work or something then you have do it all
You should save work under different file names because when you go to
open up your work up, you know what folder it is in and what the name
of the document you need is called. If you know what the name of the
document is and what folder it is in you will soon be able to call
that work up that is need faster, than having to look at though your
folders and every piece of work you have to find out what it is you
Keep dated backup copies of files in another location
You should keep backup copies in other locations to prevent them from
being destroyed, as you would have lost the main and the back up
copies of the document you have been doing. By keeping dated backup
copies of files in other locations, if anything did go wrong you will
have the back up document spare to work from instead.
Manage your work effectively, e.g. use appropriate filenames and
By using appropriate filenames when saving your work, you will have
effectively put it into a different location. Most operating systems
such as Windows XP, divide a backing storage device up into
directories. A directory can also be known as a ROOT DIRECTORY. You
can have as many directories as you like in your Root Directory, and
can also call them what you like, as long as you know what the name of
Work safely, e.g. use the correct position for the monitor and chair,
Avoid trailing cables, and take regular breaks
The point of looking at working safely is to do with the Health and
safety act. This act tells you what you should have like; a
comfortable working position because it’s important to avoid physical
stress, eye strain and safety hazards. These can be achieved through:-
- Comfortable seating.
- Suitable desk and VDU position.
- Brief rest periods (rest from the computer).
- Avoiding long sessions of continuous VDU work.
- Surrounding area that includes near and distant object upon which
eyes may focus.
- Layout of cables and equipment (to avoid tripping).
- Insulation of cables (from electrical supplies).
When you are setting up or using the ICT systems, users must be able
to work safely. To do this they must ensure that:-
- Cables do not cause an obstacle hazard.
. Cables and connectors are safe electrically.
- Consumables are replaces correctly.
Physical working environment and position (ergonomics) is
The following health problems that have been identified as having a
link to prolonged use of computers in traditional office setting are:-
* Repetitive strain injury (RSI).
* Skin rashes.
* Eye strain.
When setting you the position you should observe the following
* Your eyes should be at a 15 angle to the centre of the
* Your feet should rest flat on the floor.
* Your PC desk should be comfortable height for typing so that the
lower parts of your arms are parallel to the floor.
Take account of relevant legislation and codes of practice
You should take in account of relevant legislation and code of
practice by insuring that you have the health and safety act, the data
Protection act, Regulation of Investigatory Power Act 2000, computer
misuse act 1990 and Copyright, Design and patents act in place because
it can cause problems in the long run. For example:-
Computer Misuse Act 1990
This act was passed in order to deal with relatively new crimes of
hacking, computer fraud and computer viruses. These types of crimes
will increase and become more dangerous as we depend computer.
Data Protection Act
There are 8 principles in the data protection act. They are:-
* Data must not be processed unless there is a specific lawful reason
to do so.
* Data must only be obtained and then used for specified purposes.
* Data should be adequate, relevant and not excessive for the
* Data must be accurate and where relevant kept up to data.
* Data should not be kept longer than is necessary for the specified
* Data processing should meet the legal rights of data subjects.
* Data holders should protect the data against loss, theft or
* Data should not be transferred around, except to certain other
Copyright, Design and patents act
This act makes the copying of computer software, or software piracy, a
The act covers the following activities:-
- Stealing software
- Using illegally copied software and manuals
- Running purchased software on two or more machines at the same time,
without an appropriate licence bought from the software supplier.
The Regulation of Investigatory power act 2000
The Regulation of Investigatory power act 2000 is also called RIPA for
short. The RIPA allows the government to access a person’s electronic
communications in a very unrestricted manner. Though infringing in the
privacy of their Correspondence in a manner many would not tolerate
regarding their postal communications.
The act is:-
- Enables the government to demand that an ISP provides access to a
customer’s communications with out them knowing.
- Enables mass surveillance of communications in transit.
Enables the government to demand ISP’s fit the equipment to
Enables to demand that someone hands over keys to protected
- Allows government to monitor people’s internet activities.
- Prevents the existence of interception warrants and any data
collected with them from being revealed in court.
Health and Safety
This act relates to what I have said on page 4 under
Work safely, e.g. use the correct position for the monitor and chair,
Avoid trailing cables, and take regular breaks.