Thursday, November 21, 2019
Compose a report listing the possible ways in which your electronic Essay
Compose a report listing the possible ways in which your electronic files could be lost, stolen, or corrupted, and explain the steps you would take to minimise these threats - Essay Example The most common is intentional action where we purposely delete or remove electronic files from storage or system. The others ways that data may be lost unintentionally could be caused by neglect, failure, force of nature, and theft. a. Neglect ââ¬â electronic files are often lost because the hardwares that stores them are often neglected. Either the disk or memory stick has been misplaced or the hardware itself was not taken cared of resulting to the corruption of data that was stored in it. b. Hardware, software or systems failure ââ¬â this often happen when there is an power outage where the work in progress was not saved and thus lost. Files that has been corrupted either by a defective disk or deleted by scan disk are deemed to be hardware and system failure resulting in data loss. c. Force of nature ââ¬â electronic files can be destroyed by nature too. This can happen when the hardware where the file was stored was destroyed either by a flood, earthquake or other forces of nature. d. Theft ââ¬â the loss of data by theft is deliberate and often contains sensitive information which has economic value. Loss of data to theft is no different to losing other tangible things to thieves only that the object that was stolen was information. The possibility of losing electronic data cannot be totally eliminated but there are precautionary steps that can be undertaken to prevent such loss. The different type of losing data requires different precautionary measures. In the above category of losing data, the following precautionary measures can be undertaken to minimize the loss of electronic files. a. Neglect ââ¬â to prevent the loss of data due to neglect, the hardware and the software that contains and enables the electronic file should be taken cared of. A simple maintenance will do such as regular cleaning of the disk that contains the file, scanning system for virus and avoiding usage abuse of
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.