SlideShare a Scribd company logo
1 of 12
Information Communication Technology
Guide to Data Storage and Protection




                            Stonemasonry Department 2012
What is data?
 Data is a collection of unanalysed facts, number or statistics stored
 on your computing device. This data is organised by the processors
          in your computing device to become information.

               Data                             Information



                                 Processor
       100%            2012
                95%                           The average assessment
 89%                                          result for 2012 was 85%.
         54%
                     100%
   62%
               92%

        assessment result


 Data becomes information when it is organised into ways in which it can
                             be used.
Do you input data?
   As a computer user you input information which the computer
    processes and stores as data. Can you think of examples of
                   information you may input?



To keep things simple
your computer stores all                         Video
                                    Movies
information in the same
                                              Documents
way; by breaking it down         Pictures
into small packages of                           Music
data and storing it on the         Photographs
computers memory
How is Data Stored on a PC?
 On a personal computer, data is stored by the computers memory. It
 is broken down into very small packages of data known as bytes. As
 bytes are so small we talk about 1000’s of bytes (kilobytes), millions
      of bytes (megabytes) and even billions of bytes (gigabytes).

       Size of Memory             Prefix                                 Number of bytes
             bit                                                            8 bits = 1 byte
            byte                                                                   1 byte
          Kilobyte                 KB                                          1000 bytes
         Megabyte                  MB                                       1 million bytes
          Gigabyte                 GB                                       1 billion bytes
          Terabyte                 TB                                       1 trillion bytes

 The table above shows the standard data measurement system used
                    by most computer systems.*
                                      *Based on standard SI decimal system – binary system operates on factors of 1024
Back-up Your Data
 When a computer is functioning properly your data is held safely on
  the internal hard drive, packaged in small bytes and ready to be
   accessed. However there are a number of ways your data can
    become corrupted e.g virus, power surge, mechanical failure
                   accidental/malicious deletion.
                                         Backup data stored
                                          in central storage
                                               location
           Data held on
             personal
           computer in
              office
                                         Second backup data
                                           stored offsite in
                                           secure location

   It is considered best practice to back-up your data in at least two
 different physical locations. This means that you copy the data from
 your machine to removable storage device and store that device in a
                different building/room than the original.
Forms of Physical Storage
 There are three main forms of physical storage currently available to
       consumers in the UK; magnetic, optical and solid state.

 Magnetic



  Optical




 Solid State


    The table above shows examples of physical storage devices in
                           common use.
                                           Images sourced from wikipedia and made available under cc license
Web Based File Hosting
In addition to using physical storage devices it is possible to make use
of web based file hosting services where an external company stores
  your files on large remote servers. Most of these companies allow
 you to store a small amount of data for free and offer subscriptions
                        based on capacity usage.




 The disadvantages of this method of data storage are that you need
 an active internet connection to upload and/or access your data and
  you no longer have complete control of the security of your data.
                               Images property of dropbox, google, microsoft and apple and used only for educational purposes
Protecting Data
Now that your data is safely stored and backed-up you should look at
   ways of protecting it. Data theft generates billions of pounds
 worldwide each year as computer hackers gain access to sensitive
    information such as banking and credit card details, payroll
               information and internet passwords.




 You should password protect any electronic data and keep physical
 storage devices in lockable storage at all times. Sensitive data may
                         also be encrypted.
Generating an Effective Password
    There are a number of tips to generating an effective password:
 Avoid using your name, date of birth or family members names
 Avoid using the name of the sports club you support
 Use a combination of lower case, upper case, numbers and symbols
 Never under any circumstances share your password

                 dougie2012                Weak password


               dm2012dm!!                                  Good password


               Dx3&t58rby5                                                 Strong password

 Never write your password down where it can be seen or accessed
 Avoid entering your password on un-trusted machines
 Change your password on a regular basis (every 30-90 days)
 Change your password immediately if you suspect it has been compromised
 Avoid using the same password for a number of different applications
Using Security Software
    Another vital aspect of keeping data secure is running security
    software on all computers you use to store or access data. This
  software protects against malware such as viruses, trojans, general
  spyware and keylogger’s and ensures that your computer does not
                       become compromised.




   You can download a number of free security software applications
  from the internet (make sure they are genuine) or pay for premium
  subscription based software. It is good practice to use this software
               to regularly scan your machine for viruses.
                                Images property of symatec, kaspersky and avg and are used only for educational purposes
References
             The image on the title slide of this presentation was sourced from
             and remains the property of:
             http://paolatubaro.files.wordpress.com/2011/07/dataprocessing.j
             pg


             The image on the title slide of this presentation was sourced from :
             http://farm4.static.flickr.com/3050/2919245129_276a62a19d.jpg
             And was made available under creative commons license
Developed by The Stonemasonry Department
          City of Glasgow College
                    2012

More Related Content

What's hot

Basic Computer Training In Ambala Cantt ! Batra Computer Centre
Basic Computer Training In Ambala Cantt !  Batra Computer CentreBasic Computer Training In Ambala Cantt !  Batra Computer Centre
Basic Computer Training In Ambala Cantt ! Batra Computer Centrejatin batra
 
Umesh kumar gangwar 1
Umesh kumar gangwar 1Umesh kumar gangwar 1
Umesh kumar gangwar 1umesh1996
 
The effects of using ict
The effects of using ictThe effects of using ict
The effects of using ictodalyfer
 
Computers Hardware and Software ( Modern Technology)
Computers Hardware and Software ( Modern Technology)Computers Hardware and Software ( Modern Technology)
Computers Hardware and Software ( Modern Technology)Shahzaib Mahesar
 
CSCI-200 Introduction to Computers
CSCI-200 Introduction to ComputersCSCI-200 Introduction to Computers
CSCI-200 Introduction to Computersmalik1972
 
System unit & its components
System unit & its componentsSystem unit & its components
System unit & its componentsadpafit
 
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAMINTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAMSaraswathiRamalingam
 
Internet and Information Technology (IT)
Internet and Information Technology (IT)Internet and Information Technology (IT)
Internet and Information Technology (IT)Amber Bhaumik
 
Packages Computer Application in Business
Packages Computer Application in BusinessPackages Computer Application in Business
Packages Computer Application in BusinessNethan P
 
Lab 1 Introduction to Computer
Lab 1   Introduction to ComputerLab 1   Introduction to Computer
Lab 1 Introduction to ComputerHalimaton Sa'adiah
 
Basic overview of information technology and uses
Basic overview of information technology and usesBasic overview of information technology and uses
Basic overview of information technology and usesEbtissam Al-Madi
 

What's hot (18)

Basic Computer Training In Ambala Cantt ! Batra Computer Centre
Basic Computer Training In Ambala Cantt !  Batra Computer CentreBasic Computer Training In Ambala Cantt !  Batra Computer Centre
Basic Computer Training In Ambala Cantt ! Batra Computer Centre
 
Umesh kumar gangwar 1
Umesh kumar gangwar 1Umesh kumar gangwar 1
Umesh kumar gangwar 1
 
Storage
StorageStorage
Storage
 
The effects of using ict
The effects of using ictThe effects of using ict
The effects of using ict
 
Input
InputInput
Input
 
Pesonal systems
Pesonal systemsPesonal systems
Pesonal systems
 
Knowing Computer
Knowing ComputerKnowing Computer
Knowing Computer
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
 
Computers Hardware and Software ( Modern Technology)
Computers Hardware and Software ( Modern Technology)Computers Hardware and Software ( Modern Technology)
Computers Hardware and Software ( Modern Technology)
 
IGCSE ICT Theory
IGCSE ICT Theory IGCSE ICT Theory
IGCSE ICT Theory
 
CSCI-200 Introduction to Computers
CSCI-200 Introduction to ComputersCSCI-200 Introduction to Computers
CSCI-200 Introduction to Computers
 
System unit & its components
System unit & its componentsSystem unit & its components
System unit & its components
 
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAMINTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
INTRODUCTION TO INFORMATION TECHNOLOGY SARASWATHI RAMALINGAM
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
Internet and Information Technology (IT)
Internet and Information Technology (IT)Internet and Information Technology (IT)
Internet and Information Technology (IT)
 
Packages Computer Application in Business
Packages Computer Application in BusinessPackages Computer Application in Business
Packages Computer Application in Business
 
Lab 1 Introduction to Computer
Lab 1   Introduction to ComputerLab 1   Introduction to Computer
Lab 1 Introduction to Computer
 
Basic overview of information technology and uses
Basic overview of information technology and usesBasic overview of information technology and uses
Basic overview of information technology and uses
 

Viewers also liked

Chapter 1 Introducing Hardware
Chapter 1 Introducing HardwareChapter 1 Introducing Hardware
Chapter 1 Introducing HardwareApril Lorraine
 
Computer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Computer Architecture - Hardware - Lesson 5 - Memory - Eric VanderburgComputer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Computer Architecture - Hardware - Lesson 5 - Memory - Eric VanderburgEric Vanderburg
 
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...AltheimPrivacy
 
5 quyen truy-xuat
5 quyen truy-xuat5 quyen truy-xuat
5 quyen truy-xuatvantinhkhuc
 
Pre kowakaehonbun
Pre kowakaehonbunPre kowakaehonbun
Pre kowakaehonbuntaka_tako
 
Photoshop pp
Photoshop ppPhotoshop pp
Photoshop ppJaeyeon
 
How to-ruin-your-happiness
How to-ruin-your-happinessHow to-ruin-your-happiness
How to-ruin-your-happinessSarwan Singh
 
1 7-1-ki-kd-teknik-kendaraan-ringan (2)
1 7-1-ki-kd-teknik-kendaraan-ringan (2)1 7-1-ki-kd-teknik-kendaraan-ringan (2)
1 7-1-ki-kd-teknik-kendaraan-ringan (2)Roni Irawan
 
Paper Champs
Paper ChampsPaper Champs
Paper ChampsLuke_33
 
2014 Gold Monitor Award Winners: Annuities
2014 Gold Monitor Award Winners: Annuities 2014 Gold Monitor Award Winners: Annuities
2014 Gold Monitor Award Winners: Annuities Corporate Insight
 

Viewers also liked (20)

Chapter 1 Introducing Hardware
Chapter 1 Introducing HardwareChapter 1 Introducing Hardware
Chapter 1 Introducing Hardware
 
Types of computer
Types of computer Types of computer
Types of computer
 
Computer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Computer Architecture - Hardware - Lesson 5 - Memory - Eric VanderburgComputer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Computer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
 
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...
Threats to Privacy in the Management of Data Stored in Computer Systems by Gu...
 
Conclusion
ConclusionConclusion
Conclusion
 
5 quyen truy-xuat
5 quyen truy-xuat5 quyen truy-xuat
5 quyen truy-xuat
 
happiness index theory
happiness index theoryhappiness index theory
happiness index theory
 
Pre kowakaehonbun
Pre kowakaehonbunPre kowakaehonbun
Pre kowakaehonbun
 
Photoshop pp
Photoshop ppPhotoshop pp
Photoshop pp
 
How to-ruin-your-happiness
How to-ruin-your-happinessHow to-ruin-your-happiness
How to-ruin-your-happiness
 
Pop up marketing.
Pop up marketing.Pop up marketing.
Pop up marketing.
 
23 7242
23 724223 7242
23 7242
 
Pompa
PompaPompa
Pompa
 
Oriflame Catalog
Oriflame CatalogOriflame Catalog
Oriflame Catalog
 
Overflow
OverflowOverflow
Overflow
 
1 7-1-ki-kd-teknik-kendaraan-ringan (2)
1 7-1-ki-kd-teknik-kendaraan-ringan (2)1 7-1-ki-kd-teknik-kendaraan-ringan (2)
1 7-1-ki-kd-teknik-kendaraan-ringan (2)
 
Paper Champs
Paper ChampsPaper Champs
Paper Champs
 
Rmi
RmiRmi
Rmi
 
Lecture11 b
Lecture11 bLecture11 b
Lecture11 b
 
2014 Gold Monitor Award Winners: Annuities
2014 Gold Monitor Award Winners: Annuities 2014 Gold Monitor Award Winners: Annuities
2014 Gold Monitor Award Winners: Annuities
 

Similar to IT guide to data storage and protection

Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingDigital Shende
 
Cubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionCubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionIan Ray
 
CubeiTz Brochure
CubeiTz BrochureCubeiTz Brochure
CubeiTz BrochureIan Ray
 
IDT Replaces On-Premises Appliances with Primary Backup on AWS
 IDT Replaces On-Premises Appliances with Primary Backup on AWS IDT Replaces On-Premises Appliances with Primary Backup on AWS
IDT Replaces On-Premises Appliances with Primary Backup on AWSAmazon Web Services
 
4.1 Introduction to cloud storage.pptx
4.1 Introduction to cloud storage.pptx4.1 Introduction to cloud storage.pptx
4.1 Introduction to cloud storage.pptxyasothamohankumar
 
26-170918023441.pptx
26-170918023441.pptx26-170918023441.pptx
26-170918023441.pptxaravind Guru
 
26-170918023441 (1).pptx
26-170918023441 (1).pptx26-170918023441 (1).pptx
26-170918023441 (1).pptxAnSHiKa187943
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET Journal
 
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...IBM India Smarter Computing
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET Journal
 
4.1 Introduction to cloud storage.pdf
4.1 Introduction to cloud storage.pdf4.1 Introduction to cloud storage.pdf
4.1 Introduction to cloud storage.pdfyasothamohankumar
 
cloud storage ppt
cloud storage pptcloud storage ppt
cloud storage pptNaga Dinesh
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataProcore Technologies
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10Irsandi Hasan
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Onlinepcsafe
 

Similar to IT guide to data storage and protection (20)

Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
somee.pptx
somee.pptxsomee.pptx
somee.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionCubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit Encryption
 
CubeiTz Brochure
CubeiTz BrochureCubeiTz Brochure
CubeiTz Brochure
 
IDT Replaces On-Premises Appliances with Primary Backup on AWS
 IDT Replaces On-Premises Appliances with Primary Backup on AWS IDT Replaces On-Premises Appliances with Primary Backup on AWS
IDT Replaces On-Premises Appliances with Primary Backup on AWS
 
4.1 Introduction to cloud storage.pptx
4.1 Introduction to cloud storage.pptx4.1 Introduction to cloud storage.pptx
4.1 Introduction to cloud storage.pptx
 
ChodonKumar.pptx
ChodonKumar.pptxChodonKumar.pptx
ChodonKumar.pptx
 
26-170918023441.pptx
26-170918023441.pptx26-170918023441.pptx
26-170918023441.pptx
 
26-170918023441 (1).pptx
26-170918023441 (1).pptx26-170918023441 (1).pptx
26-170918023441 (1).pptx
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
 
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
4.1 Introduction to cloud storage.pdf
4.1 Introduction to cloud storage.pdf4.1 Introduction to cloud storage.pdf
4.1 Introduction to cloud storage.pdf
 
cloud storage ppt
cloud storage pptcloud storage ppt
cloud storage ppt
 
4.2.cloud storage
4.2.cloud storage4.2.cloud storage
4.2.cloud storage
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 

More from doogstone

Concrete Block Walling
Concrete Block WallingConcrete Block Walling
Concrete Block Wallingdoogstone
 
Cutting a Return head
Cutting a Return headCutting a Return head
Cutting a Return headdoogstone
 
Risk assessment
Risk assessmentRisk assessment
Risk assessmentdoogstone
 
Health and safety signage
Health and safety signageHealth and safety signage
Health and safety signagedoogstone
 
Construction electrical safety
Construction electrical safetyConstruction electrical safety
Construction electrical safetydoogstone
 
Checks and splays
Checks and splaysChecks and splays
Checks and splaysdoogstone
 
Student induction 2013-14
Student induction 2013-14Student induction 2013-14
Student induction 2013-14doogstone
 
Presentation types of template
Presentation   types of templatePresentation   types of template
Presentation types of templatedoogstone
 
Presentation template making equipment
Presentation   template making equipmentPresentation   template making equipment
Presentation template making equipmentdoogstone
 
Presentation constructing a pentagon
Presentation   constructing a pentagonPresentation   constructing a pentagon
Presentation constructing a pentagondoogstone
 
Presentation constructing a heptagon
Presentation   constructing a heptagonPresentation   constructing a heptagon
Presentation constructing a heptagondoogstone
 
Presentation constructing an information panel
Presentation   constructing an information panelPresentation   constructing an information panel
Presentation constructing an information paneldoogstone
 
Introduction to masonry walling
Introduction to masonry wallingIntroduction to masonry walling
Introduction to masonry wallingdoogstone
 
Surfacefinishes12
Surfacefinishes12Surfacefinishes12
Surfacefinishes12doogstone
 
Snecked rubble step by step angled
Snecked rubble step by step angledSnecked rubble step by step angled
Snecked rubble step by step angleddoogstone
 
Snecked rubble step by step
Snecked rubble step by stepSnecked rubble step by step
Snecked rubble step by stepdoogstone
 
Half brick walling calculations
Half brick walling calculationsHalf brick walling calculations
Half brick walling calculationsdoogstone
 
Cutting a cavetto mould
Cutting a cavetto mouldCutting a cavetto mould
Cutting a cavetto moulddoogstone
 
Cutting an ovolo mould
Cutting an ovolo mouldCutting an ovolo mould
Cutting an ovolo moulddoogstone
 

More from doogstone (20)

Concrete Block Walling
Concrete Block WallingConcrete Block Walling
Concrete Block Walling
 
Cutting a Return head
Cutting a Return headCutting a Return head
Cutting a Return head
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
Health and safety signage
Health and safety signageHealth and safety signage
Health and safety signage
 
Construction electrical safety
Construction electrical safetyConstruction electrical safety
Construction electrical safety
 
Riddor
RiddorRiddor
Riddor
 
Checks and splays
Checks and splaysChecks and splays
Checks and splays
 
Student induction 2013-14
Student induction 2013-14Student induction 2013-14
Student induction 2013-14
 
Presentation types of template
Presentation   types of templatePresentation   types of template
Presentation types of template
 
Presentation template making equipment
Presentation   template making equipmentPresentation   template making equipment
Presentation template making equipment
 
Presentation constructing a pentagon
Presentation   constructing a pentagonPresentation   constructing a pentagon
Presentation constructing a pentagon
 
Presentation constructing a heptagon
Presentation   constructing a heptagonPresentation   constructing a heptagon
Presentation constructing a heptagon
 
Presentation constructing an information panel
Presentation   constructing an information panelPresentation   constructing an information panel
Presentation constructing an information panel
 
Introduction to masonry walling
Introduction to masonry wallingIntroduction to masonry walling
Introduction to masonry walling
 
Surfacefinishes12
Surfacefinishes12Surfacefinishes12
Surfacefinishes12
 
Snecked rubble step by step angled
Snecked rubble step by step angledSnecked rubble step by step angled
Snecked rubble step by step angled
 
Snecked rubble step by step
Snecked rubble step by stepSnecked rubble step by step
Snecked rubble step by step
 
Half brick walling calculations
Half brick walling calculationsHalf brick walling calculations
Half brick walling calculations
 
Cutting a cavetto mould
Cutting a cavetto mouldCutting a cavetto mould
Cutting a cavetto mould
 
Cutting an ovolo mould
Cutting an ovolo mouldCutting an ovolo mould
Cutting an ovolo mould
 

Recently uploaded

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Recently uploaded (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

IT guide to data storage and protection

  • 1. Information Communication Technology Guide to Data Storage and Protection Stonemasonry Department 2012
  • 2. What is data? Data is a collection of unanalysed facts, number or statistics stored on your computing device. This data is organised by the processors in your computing device to become information. Data Information Processor 100% 2012 95% The average assessment 89% result for 2012 was 85%. 54% 100% 62% 92% assessment result Data becomes information when it is organised into ways in which it can be used.
  • 3. Do you input data? As a computer user you input information which the computer processes and stores as data. Can you think of examples of information you may input? To keep things simple your computer stores all Video Movies information in the same Documents way; by breaking it down Pictures into small packages of Music data and storing it on the Photographs computers memory
  • 4. How is Data Stored on a PC? On a personal computer, data is stored by the computers memory. It is broken down into very small packages of data known as bytes. As bytes are so small we talk about 1000’s of bytes (kilobytes), millions of bytes (megabytes) and even billions of bytes (gigabytes). Size of Memory Prefix Number of bytes bit 8 bits = 1 byte byte 1 byte Kilobyte KB 1000 bytes Megabyte MB 1 million bytes Gigabyte GB 1 billion bytes Terabyte TB 1 trillion bytes The table above shows the standard data measurement system used by most computer systems.* *Based on standard SI decimal system – binary system operates on factors of 1024
  • 5. Back-up Your Data When a computer is functioning properly your data is held safely on the internal hard drive, packaged in small bytes and ready to be accessed. However there are a number of ways your data can become corrupted e.g virus, power surge, mechanical failure accidental/malicious deletion. Backup data stored in central storage location Data held on personal computer in office Second backup data stored offsite in secure location It is considered best practice to back-up your data in at least two different physical locations. This means that you copy the data from your machine to removable storage device and store that device in a different building/room than the original.
  • 6. Forms of Physical Storage There are three main forms of physical storage currently available to consumers in the UK; magnetic, optical and solid state. Magnetic Optical Solid State The table above shows examples of physical storage devices in common use. Images sourced from wikipedia and made available under cc license
  • 7. Web Based File Hosting In addition to using physical storage devices it is possible to make use of web based file hosting services where an external company stores your files on large remote servers. Most of these companies allow you to store a small amount of data for free and offer subscriptions based on capacity usage. The disadvantages of this method of data storage are that you need an active internet connection to upload and/or access your data and you no longer have complete control of the security of your data. Images property of dropbox, google, microsoft and apple and used only for educational purposes
  • 8. Protecting Data Now that your data is safely stored and backed-up you should look at ways of protecting it. Data theft generates billions of pounds worldwide each year as computer hackers gain access to sensitive information such as banking and credit card details, payroll information and internet passwords. You should password protect any electronic data and keep physical storage devices in lockable storage at all times. Sensitive data may also be encrypted.
  • 9. Generating an Effective Password There are a number of tips to generating an effective password: Avoid using your name, date of birth or family members names Avoid using the name of the sports club you support Use a combination of lower case, upper case, numbers and symbols Never under any circumstances share your password dougie2012 Weak password dm2012dm!! Good password Dx3&t58rby5 Strong password Never write your password down where it can be seen or accessed Avoid entering your password on un-trusted machines Change your password on a regular basis (every 30-90 days) Change your password immediately if you suspect it has been compromised Avoid using the same password for a number of different applications
  • 10. Using Security Software Another vital aspect of keeping data secure is running security software on all computers you use to store or access data. This software protects against malware such as viruses, trojans, general spyware and keylogger’s and ensures that your computer does not become compromised. You can download a number of free security software applications from the internet (make sure they are genuine) or pay for premium subscription based software. It is good practice to use this software to regularly scan your machine for viruses. Images property of symatec, kaspersky and avg and are used only for educational purposes
  • 11. References The image on the title slide of this presentation was sourced from and remains the property of: http://paolatubaro.files.wordpress.com/2011/07/dataprocessing.j pg The image on the title slide of this presentation was sourced from : http://farm4.static.flickr.com/3050/2919245129_276a62a19d.jpg And was made available under creative commons license
  • 12. Developed by The Stonemasonry Department City of Glasgow College 2012