Methods of output & Backup\archiving g. describe possible forms of output such as graphs, reports, interactive presentations, sound, video, images, animations,

Slides:



Advertisements
Similar presentations
P1-P2-M1-D1-D2.
Advertisements

P1 - Explain how multimedia is used to meet business objectives
R005 Creating an interactive product Type of product and Software Choice.
 This is a very large presentation which contains lots of information.  However, you could sum up the contents simply like this: › What makes up a.
Backing Up a Hard Disk CGS2564. Why Backup Programs? Faster Optimized to copy files Can specify only files that have changed Safer Can verify backed up.
Backup Strategy. An Exam question will ask you to describe a backup strategy. Be able to explain: Safe, secure place in different location. Why? – For.
11 BACKING UP AND RESTORING DATA Chapter 4. Chapter 4: BACKING UP AND RESTORING DATA2 CHAPTER OVERVIEW Describe the various types of hardware used to.
Understand Database Backups and Restore Database Administration Fundamentals LESSON 5.2.
File Management Systems
Disaster Protection and Recovery By: Michael Morrell Ross Ashenfelter Teresa Furnish Karla Maddox.
SCIENTIFIC POSTER DESIGN AND ORGANIZATION By Lauren and Jessica.
Database Backup and Recovery
OCR Nationals ICT – Unit 2 Task 1 Task Overview You need to produce a design for a multimedia website of at least five pages. The design will act as the.
Security and Backup Avoid disasters – have a good backup policy Avoid disasters – have a tight security scheme in place UK law dictates the board of directors.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Types and contents of On-screen user documentation.
Security+ All-In-One Edition Chapter 16 – Disaster Recovery and Business Continuity Brian E. Brzezicki.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
PowerPoint Presentations – What to do and what not to do!
USE OF ICT IN ADVERTISING
IS 380.  Provides detailed procedures to keep the business running and minimize loss of life and money  Identifies emergency response procedures  Identifies.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Task 18 Describe the need to create backup copies, and to file them in a separate and safe location also filing and storing hard copies for use in production.
Computer Networks S3 Prepared by May Lau
Linux Operations and Administration
The Internet The advantages and disadvantages. What are the advantages of the Internet as a source of information?  It can be accessed from anywhere.
Unit 1 – Improving Productivity Instructions ~ 100 words per box.
Unit 20: AO2: Designing the Animation. Lesson Objectives (WALT) Discuss storyboard plans and analyse the structure of a storyboard for our animation.
Task 16 Describe the need for document control (such as ensuring that completed models are approved, labelled and stored on a suitable storage medium).
- Ahmad Al-Ghoul Data design. 2 learning Objectives Explain data design concepts and data structures Explain data design concepts and data structures.
Disaster Recovery and Business Continuity Planning.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 18 – Backing Up Your Data.
BACKUP & RECOVERY Option 1: Transaction Processing Systems.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Verification & Validation F451 AS Computing. Why check data? It’s useless if inaccurate. Also, wrong data: Can be annoying Can cost a fortune Can be dangerous.
Cosc 4750 Backups Why Backup? In case of failure In case of loss of files –User and system files Because you will regret it, if you don’t. –DUMB = Disasters.
General Purpose Packages DATA TYPES. Data Types Computer store information in the form of data. Information has meaning. Eg 23 May 2005 Data has no meaning.
Define and describe operating systems which contain a Command Line Interface (CLI) Define and describe operating systems which contain a Graphical User.
HalFILE 2.1 Network Protection & Disaster Recovery.
Communication in Administration (Security)
20/12/20151 Data Structures Backing up and Archiving Data.
HUMAN RESOURCE Management BM Unit 2 - LO21 Success Criteria: To introduce training within business Learning Intentions: You should be able to: Identify.
Chapter 6 Protecting Your Files. Protecting Your Files FAQs: – What should I know about losing data? – How can I protect my files from viruses? – How.
Communications & Networks National 4 & 5 Computing Science.
The aim of producing a backup strategy is to make sure that a computer system can be returned to its original state if data has been lost or corrupted.
 List as many websites as you can think of  E-commerce is short for ‘electronic commerce’  It means buying and selling goods using the Internet.
Managing Data & Information Procedures & Techniques.
Verification & Validation
Consider the value of using online marketing to target a youth audience. You should refer to other media products to support your answer. POINT 1: The.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
DATA SECURITY (i) Backing up dataBacking up data (ii) Archiving dataArchiving data 4 th JUNE 2005 Saturday Lower Sixth Form Computer Studies.
ECO 205 Week 7 DQ 1 And DQ 2 Check this A+ tutorial guideline at Week-7-DQ-1-And-DQ-2 Week 7 DQ 1 What.
Integrating Disk into Backup for Faster Restores
CompTIA Security+ Study Guide (SY0-401)
AS ICT Module 2 Objectives: Security of Data
System Backup IB Computer Science.
Systems Software Keywords Utilities and Backups
Backing up a Hard Disk Windows XP Tutorial 6.
3 - STORAGE: TYPES AND CHARACTERTISTICS
DE ACTIVITY 1.1A
LO2: Understand Computer Software
CompTIA Security+ Study Guide (SY0-501)
Visit for more Learning Resources
Bookmarking. Bookmarking Learning Outcomes Know how to create book marks Know how to produce a well structured, logical system to store electronic.
Backing Up 01/12/2018.
Chapter 12: Archiving Rationale to tidy up project items
Backup and restoration of data, redundancy
What is Information Security?
Revision on Photosynthesis
Video Production Company. Essence Studios Animated Video Company.
Presentation transcript:

Methods of output & Backup\archiving g. describe possible forms of output such as graphs, reports, interactive presentations, sound, video, images, animations, stating the advantages and disadvantages of each with reference to the target audience; h. explain the procedures involved in backing up data and archiving, including the difference between data that is backed up and data that is archived.

Describe possible forms of output 1.Graphs 2.Reports 3.Interactive presentations 4.Sound 5.Video 6.Images 7.Animations State the advantages and disadvantages of each with reference to the target audience;

Backup Data stored in files is often valuable so companies are keen to prevent it’s loss. The easiest way to do this is to make a copy of the data and keep it in a secure location (off site to protect from fires).

Backup, how often? No right answers! Backups could be expensive and take time so a compromise needs to be struck. A file this altered a lot will need backing up more regularly than one that never changes.

Types of backup Normal – Copies all selected files to the selected medium. Incremental – Only changes files that have changed since the last backup.

Archiving If data is no longer being used (ie your data when you leave sixth form) you may not need it to be readily accessible. BUT You don’t want to get rid of it (ie in case a student wants a reference) so you create an ARCHIVE of the data you can access if you want it.