1 Creating a Data Backup Oakland University University Relations Updated - June 2006.

Slides:



Advertisements
Similar presentations
11/2/2013 2:02:38 AM 5864_ER_FED 1 Importing Certificates into Lotus Notes R6.
Advertisements

PubMed Limits Here is the Limits page. Searches can be limited by restricting terms to fields or setting specific date or record tagging parameters.
Making A Slide Show 1.CLICK -- Start 2.CLICK -- Programs 3.CLICK -- Microsoft Power Point 4.Blank presentation box highlighted CLICK -- OK 5. CLICK --
0 - 0.
Information Management and Technology
SAG Infotech Private Limited
BIBC Member ID Card System By Lizette Burger. 2 BIBC REQUIREMENTS In the interest of all employers and employees, Council has instituted a system to provide.
1 2 In a computer system, a file is a collection of information with a single name, such as addresses.doc, or filebackup.ppt, or ftwr.exe, or guidebook.xls.
Computers Are Your Future © 2005 Prentice-Hall, Inc.
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Web Programming 1 Darby Chang Web Programming. Cookie 2 Web Programming.
Never lose your data again!
Microsoft Office Illustrated Fundamentals Unit C: Getting Started with Unit C: Getting Started with Microsoft Office 2010 Microsoft Office 2010.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely P J Human Resources Pte Ltd presents:
ONE® Mail Training Presentation North York General Hospital North York General Hospital.
CREATING A PAYMENT REQUEST FOR VENDOR IN SYSTEM
CREATING A PAYMENT REQUEST FOR A NEW VENDOR
PC Encryption installation progress/password screen Includes comments from: Encryption team Sarah Deane Tony Stieber Selected people who took part in the.
FILEMAKER SERVER SOFTWARE & REMOTE ADMINISTRATION
Media-X eWalk Walkthrough Install Training- Part Two Topic: Uploading Completed Walkthroughs Office of Institutional Education Programs 1.
Using CD Writer Software IBM Record Now. Starting the Program If you put a blank CD in the drive, it may open the program automatically. Otherwise, navigate.
Windows XP System Restore July 22 nd, 2006 CAEUG Meeting.
1 Welcome to JCCAA Data base presentation Click box to see the DEMO 1.JCCAA Web Site 2. Member Login 3. My Acount 4. School DBA The end.
Learning the Basics – Lesson 1
Addition 1’s to 20.
IG Pro & CMS.
Transferring your PST to your Home-Drive. NAVCOMTELSTA-GUAM N8 / LNSC.
1 SPSS Tutorial 101: Import, Merge and Save Data Sets Dr. Daisy Dai Department of Medical Research.
Use the buttons on the top to navigate through the presentation 1 PrevNext Menu.
1 of 2 By observing the guidelines below and performing regular maintenance on your computer, you can help keep your computer safe and maintain optimum.
Using CD-R and CD-RW media to backup SIGNZ data. Step One … a bit of preparation.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Optimizing Windows There are several ways to optimize (perform regular maintenance) Windows to keep it performing smoothly and quickly. Most of these discussed.
In this tutorial I will be taking you through how the clients folder works in the online version of Solidata Mortgage Tracker.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Keeping You Connected Through Citrix Access your applications Access your network shares and documents Access your …and do it remotely!
TUTORIAL NO. 24 Create Alerts and files in EBSCO.
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
Introduction to. What is Office 365 Office 365 is the same Office you already know and use every day. Office 365 is powered by “the cloud” which is a.
SLIR Computer Lab: Orientation and Training December 16, 1998.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely presents:
Chapter Fourteen Windows XP Professional Fault Tolerance.
COMPREHENSIVE Windows Tutorial 9 Maintaining Hardware and Software.
Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
There are 3 ways you can use to find your Spectrum Status Report Database file. This tutorial will assume you have either previously made a database that.
STAYING SAFE: Here are some safety tips when using Change your password regularly and keep it in a safe place. Don’t share your password with anyone.
Chapter 2 Securing Network Server and User Workstations.
Choose a folder on the remote machine. For e.g. if there is a machine named comp1 in your network, please choose a folder in that machine which you will.
How To Configure Thunderbird For Your Webspace Account.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Morton Instructional Technology Team Edline Student Activation.
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
Office of Diversity and Inclusion Management Information Systems Network Orientation and Policies
Pictures, Pictures, Pictures!. Load your pictures:  Open your and save each picture to your computer. I suggest saving to the My Documents or My.
So – You want to learn how to put an article onto the state website. (Note: If you have not done so, you will need to review the web training provided.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
These steps will guide you through installing the pcAnywhere Host software so that we can remote control your PC from NZ! Once installed, it will only.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
How to fix Error code 0x80072ee2 in Windows 8.1? Fix%20%20Update%20Error%200x80072EE2%20in%20Windows%20 8.1,%20Windows%2010!%20-%20Fix%20PC%20Errors.htm.
1. Setting up an account- technical
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Task 2f – part a Prove that you can receive an WITH an attachment, open it AND save the attachment to your user area. Open the with the attachment.
Welcome © GTM Software. Welcome © GTM Software.
Unit 4 IT Security.
How to apply your signature
CLEANUP H: HOME DRIVE Please do not store personal files on your home drive (H drive). Please use your C drive to store these files, they will therefore.
Windows Tutorial 9 Maintaining Hardware and Software
Mapping a network drive
Presentation transcript:

1 Creating a Data Backup Oakland University University Relations Updated - June 2006

2 What Is A Backup? A backup will take the data stored on your computer and transfer it to a safe, protected server where it will reside indefinitely. In the event of a power outage, computer malfunction, or user error this data can be recovered to your PC, preventing permanent data loss. Please Note: A backup is stored in a private drive on the server, protecting your data from unauthorized access. Nobody else will be able to view your backup. A backup is not the same as what is stored on the J- drive. J-drive files are for sharing only. Backups will never be shared.

3 Why Create A Backup? A backup will prevent permanent data loss, which could inhibit the achievement of the goals and strategies of the University Relations Department and the entire University. Data Backup is a University policy. Here is a quote from the Policy of Use of University Information and Technology Resources: –“You are responsible for the security and integrity of University information stored on your personal desktop system. This responsibility includes making regular disk backups, controlling physical and network access to the machine, and installing and using virus protection software. Avoid storing passwords or other information that can be used to gain access to other computing, network or information technology resources.”

4 The Backup Process To complete a backup: –Follow the steps outlined on the following pages. –Be aware that the screen shots shown may differ from your PC (depending on your operating system, desktop, etc.).

5 NOTE Please make sure that you are storing ALL documents on your PC in your “My Documents” folder. There should be absolutely NO files on your computer unless they are in “My Documents” except for the Banner Reports database which should not be in your “My Documents” folder as it is too big to be backed up by all users. We have a backup. Don’t worry! Any files not in your “My Documents” folder will NOT be backed up!

6 Opening the “Backup” program 1) Click “Start” – “Programs” – “Accessories” – “System Tools” – “Backup”

7 The Following Screen Should Open 2) Click the tab “Next” at the bottom of the screen

8 3) Choose “Back up files and settings”. The Following Screen Should Open

9 The Following Box Will Pop Up 4) Choose “My documents and settings”. If you have not done a disk cleanup in a while, you will have lots of “cookies” and the backup will take a long time. Either clean up your disk or choose the option “Let me choose what to back up”, then pick your “My Documents” folder. Please note this process does not backup your . Please see Dawn Teolis or Rob Saunders for backup locations.

10 The Following Box Will Pop Up 5) Make sure you see the screen as shown above.

11 The Following Box Will Pop Up 6) Make sure you see the screen as shown above then click “Advanced”.

12 The Following Box Will Pop Up 7) Choose “Normal” type of backup.

13 The Following Box Will Pop Up 8) Choose “Verify data after backup”.

14 The Following Box Will Pop Up 9) Choose “Replace the existing backups”. If you don’t, your backup file will keep getting larger and larger.

15 The Following Box Will Pop Up 10) Choose “Now” for when to start your backup.

16 The Following Box Will Pop Up 11) Choose “Finish”.

17 Completing The Backup After the backup is complete: –Close the backup program. –Perform a backup on a regular basis. It should be completed during times of lower JDH system activity. –Lunch time –Just before you leave –In the event of data loss, please let either Dawn Teolis or Rob Saunders know so that we can recover your data.