SlideShare a Scribd company logo
1 of 12
DATA SECURITY

Data security is about keeping data safe. Many
individuals, small businesses and major
companies rely heavily on their computer
systems
KEY THREATS TO DATA
           SECURITY
Data may get:
   -lost or damaged during a system crash - especially one affecting the hard disk

   corrupted as a result of faulty disks, disk drives, or power failures

   -lost by accidentally deleting or overwriting files

   -lost or become corrupted by computer viruses

   -hacked into by unauthorized users and deleted or altered

   -destroyed by natural disasters, acts of terrorism, or war

   -deleted or altered by employees wishing to make money or take revenge on their employer
KEEPING DATA SECURE
Measures that can be taken to keep data
secure include:
 -making regular backups of files (backup copies should be stored in
 fireproof safes or in another building)

 -protecting yourself against viruses by running anti-virus software

 -using a system of passwords so that access to data is restricted

 -safe storage of important files stored on removable disks, eg locked
 away in a fireproof and waterproof safe
-allowing only authorised staff into certain computer
areas, eg by controlling entry to these areas by means of
ID cards or magnetic swipe cards
-always logging off or turning terminals off and if possible
locking them
-avoiding accidental deletion of files by write-protecting
disks
-using data encryption techniques to code data so that
itmakes no apparent sense
Data Transfer
Transfer of data files containing pictures
(graphics), text, sound, or numbers is possible
from one computer to another, one make of
hardware to another, and one application to
another. This is possible because standard file
types and data formats have been developed.
Data does not need to be transfered on physical
media, it can be transmitted at rapid speeds
around the globe.
DATA FILE TYPES
Data files are stored in a number of formats, the formats depend on which
application created the file to begin with.

For example, Microsoft Word stores files as *.doc but Adobe Photoshop stores
files in a different format - *.psd.

The file extension identifies the file's format.

When data is transferred from one computer to another, the computer
receiving the data file may not be able to read the format without the right
application installed.

For example, an image created in Adobe Photoshop and saved as a *.psd file
(Photoshop's format) would not be readable by Microsoft Paint.
TRANSLATING BETWEEN
      FILE TYPES
   Data can be stored temporarily in a computer's RAM as a means of transfer
   from one application to another. In Microsoft operating systems this feature is
   called the clipboard and it can copy data from one application and paste it into
   another. Nearly all other operating systems support this functionality.

   For example you can create a graph using a spreadsheet application and then
   use the clipboard to copy the graph to a desktop publishing application.

Limitations:

   -Certain elements of one document may not be copiable to another
   application, eg video.

   -Some file features (eg text layout and formatting) may be lost in the
   translation to a different format.
RAPID TRANSFER OF
         DATA
Files can be easily transferred and shared across the
globe using the Internet. A file could be:

emailed as an attachment

sent over instant messenger

downloaded from a website/web server

accessed over a private network
IMPORT AND EXPORT
1.Export saves the file in a format that's readable by other applications.

2.Import opens a file created in another application for viewing or
editing.

   The need to import and export data files has led to the development
   of several standard file types that many applications can
   understand.

   Examples are jpg and gif files for images, and mp3 files for sound;
   but there are also standard file types for text, movies, and
   spreadsheet data.

   Often an application of a different type can import data, for
   example, a word processor may be able to import a spreadsheet file.
XML FILES
Recently program developers have started to use the
XML web page file format as the standard way to store
data. Files can be read by any browser on any computer,
making it very easy to transfer data between computers.
Other standard file types, such as zip and pdf (portable
document format), have been developed as ways of
distributing data in the most efficient way possible. They
do this by compressing it using zip technology or making it
possible to read using a freely available downloaded
reader application, as is the case with PDF files.
Bibliography
http://www.bbc.co.uk/schools/gcsebitesize/ict/da
tabases/6datasecurityrev1.shtml

http://www.bbc.co.uk/schools/gcsebitesize/ict/da
tabases/datatransferrev1.shtml

More Related Content

What's hot

Management information systems
Management information systemsManagement information systems
Management information systemsaz00z
 
Introduction to-microcomputers
Introduction to-microcomputersIntroduction to-microcomputers
Introduction to-microcomputersraynaldogisiri
 
L7 operating system
L7   operating systemL7   operating system
L7 operating systemheidirobison
 
Knowledge on IT Infrastructure
Knowledge on IT InfrastructureKnowledge on IT Infrastructure
Knowledge on IT InfrastructureLopamudra Das
 
PC techniques software and Hardware
PC techniques software and HardwarePC techniques software and Hardware
PC techniques software and HardwareMUSAAB HASAN
 
Implementing File Systems-R.D.Sivakumar
Implementing File Systems-R.D.SivakumarImplementing File Systems-R.D.Sivakumar
Implementing File Systems-R.D.SivakumarSivakumar R D .
 
Computers and more
Computers and moreComputers and more
Computers and moreEli Jimenez
 
Database Management System users
Database Management System usersDatabase Management System users
Database Management System usersRaj vardhan
 
could computing back story
could computing back storycould computing back story
could computing back storyansar ahmed
 
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1Raj vardhan
 
Information technology
Information technologyInformation technology
Information technologyBadar Rizwan
 
Teaching systems and fundamentals
Teaching systems and fundamentalsTeaching systems and fundamentals
Teaching systems and fundamentalsHouston ISD
 

What's hot (19)

Management information systems
Management information systemsManagement information systems
Management information systems
 
Files Management
Files ManagementFiles Management
Files Management
 
Introduction to-microcomputers
Introduction to-microcomputersIntroduction to-microcomputers
Introduction to-microcomputers
 
Storage devices
Storage devicesStorage devices
Storage devices
 
B.Sc. II (IV Sem) RDBMS & PL/SQL Unit-1 Fundamentals of DBMS
B.Sc. II (IV Sem) RDBMS & PL/SQL Unit-1 Fundamentals of DBMSB.Sc. II (IV Sem) RDBMS & PL/SQL Unit-1 Fundamentals of DBMS
B.Sc. II (IV Sem) RDBMS & PL/SQL Unit-1 Fundamentals of DBMS
 
L7 operating system
L7   operating systemL7   operating system
L7 operating system
 
Knowledge on IT Infrastructure
Knowledge on IT InfrastructureKnowledge on IT Infrastructure
Knowledge on IT Infrastructure
 
Database History
Database HistoryDatabase History
Database History
 
Microprocressers
Microprocressers Microprocressers
Microprocressers
 
PC techniques software and Hardware
PC techniques software and HardwarePC techniques software and Hardware
PC techniques software and Hardware
 
C) ICT Application
C) ICT ApplicationC) ICT Application
C) ICT Application
 
Implementing File Systems-R.D.Sivakumar
Implementing File Systems-R.D.SivakumarImplementing File Systems-R.D.Sivakumar
Implementing File Systems-R.D.Sivakumar
 
Computers and more
Computers and moreComputers and more
Computers and more
 
Database Management System users
Database Management System usersDatabase Management System users
Database Management System users
 
could computing back story
could computing back storycould computing back story
could computing back story
 
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
 
Information technology
Information technologyInformation technology
Information technology
 
Teaching systems and fundamentals
Teaching systems and fundamentalsTeaching systems and fundamentals
Teaching systems and fundamentals
 
Database & Database Users
Database & Database UsersDatabase & Database Users
Database & Database Users
 

Similar to Data security

Storage Made Easy - M-Stream File Transfer Acceleration
Storage Made Easy - M-Stream File Transfer AccelerationStorage Made Easy - M-Stream File Transfer Acceleration
Storage Made Easy - M-Stream File Transfer AccelerationHybrid Cloud
 
StoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesStoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesRevolucion
 
Input ,Output & Storage Devices
Input ,Output & Storage DevicesInput ,Output & Storage Devices
Input ,Output & Storage DevicesAshirwadPandey1
 
M-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution BriefM-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution BriefHybrid Cloud
 
File extensions
File extensionsFile extensions
File extensionsJLPolking
 
Meyer poster draft
Meyer poster draftMeyer poster draft
Meyer poster draftScott
 
Computer and its application
Computer and its applicationComputer and its application
Computer and its applicationABUL HASAN
 
Android File Management Presentation.pptx
Android File Management Presentation.pptxAndroid File Management Presentation.pptx
Android File Management Presentation.pptxvuqaxuly
 
Android File Management Presentation.pptx
Android File Management Presentation.pptxAndroid File Management Presentation.pptx
Android File Management Presentation.pptxvuqaxuly
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementBlackBerry
 
MIS Management Information Systems
MIS Management Information SystemsMIS Management Information Systems
MIS Management Information SystemsThomas Mon
 
System software 1
System software 1System software 1
System software 1fatinsmile
 

Similar to Data security (20)

DLP and MDM Datasheet
DLP and MDM DatasheetDLP and MDM Datasheet
DLP and MDM Datasheet
 
Storage Made Easy - M-Stream File Transfer Acceleration
Storage Made Easy - M-Stream File Transfer AccelerationStorage Made Easy - M-Stream File Transfer Acceleration
Storage Made Easy - M-Stream File Transfer Acceleration
 
StoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesStoreGrid : Introduction & Features
StoreGrid : Introduction & Features
 
MSCIT Unit 1
MSCIT Unit 1MSCIT Unit 1
MSCIT Unit 1
 
Downloading Steps
Downloading StepsDownloading Steps
Downloading Steps
 
Input ,Output & Storage Devices
Input ,Output & Storage DevicesInput ,Output & Storage Devices
Input ,Output & Storage Devices
 
M-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution BriefM-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution Brief
 
File management.pptx
File management.pptxFile management.pptx
File management.pptx
 
File extensions
File extensionsFile extensions
File extensions
 
Meyer poster draft
Meyer poster draftMeyer poster draft
Meyer poster draft
 
RAM_Application.pdf
RAM_Application.pdfRAM_Application.pdf
RAM_Application.pdf
 
Computer and its application
Computer and its applicationComputer and its application
Computer and its application
 
Android File Management Presentation.pptx
Android File Management Presentation.pptxAndroid File Management Presentation.pptx
Android File Management Presentation.pptx
 
Android File Management Presentation.pptx
Android File Management Presentation.pptxAndroid File Management Presentation.pptx
Android File Management Presentation.pptx
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content Management
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
Computer application
Computer applicationComputer application
Computer application
 
MIS Management Information Systems
MIS Management Information SystemsMIS Management Information Systems
MIS Management Information Systems
 
Cloud docu ppt
Cloud docu pptCloud docu ppt
Cloud docu ppt
 
System software 1
System software 1System software 1
System software 1
 

Recently uploaded

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Recently uploaded (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Data security

  • 1.
  • 2. DATA SECURITY Data security is about keeping data safe. Many individuals, small businesses and major companies rely heavily on their computer systems
  • 3. KEY THREATS TO DATA SECURITY Data may get: -lost or damaged during a system crash - especially one affecting the hard disk corrupted as a result of faulty disks, disk drives, or power failures -lost by accidentally deleting or overwriting files -lost or become corrupted by computer viruses -hacked into by unauthorized users and deleted or altered -destroyed by natural disasters, acts of terrorism, or war -deleted or altered by employees wishing to make money or take revenge on their employer
  • 4. KEEPING DATA SECURE Measures that can be taken to keep data secure include: -making regular backups of files (backup copies should be stored in fireproof safes or in another building) -protecting yourself against viruses by running anti-virus software -using a system of passwords so that access to data is restricted -safe storage of important files stored on removable disks, eg locked away in a fireproof and waterproof safe
  • 5. -allowing only authorised staff into certain computer areas, eg by controlling entry to these areas by means of ID cards or magnetic swipe cards -always logging off or turning terminals off and if possible locking them -avoiding accidental deletion of files by write-protecting disks -using data encryption techniques to code data so that itmakes no apparent sense
  • 6. Data Transfer Transfer of data files containing pictures (graphics), text, sound, or numbers is possible from one computer to another, one make of hardware to another, and one application to another. This is possible because standard file types and data formats have been developed. Data does not need to be transfered on physical media, it can be transmitted at rapid speeds around the globe.
  • 7. DATA FILE TYPES Data files are stored in a number of formats, the formats depend on which application created the file to begin with. For example, Microsoft Word stores files as *.doc but Adobe Photoshop stores files in a different format - *.psd. The file extension identifies the file's format. When data is transferred from one computer to another, the computer receiving the data file may not be able to read the format without the right application installed. For example, an image created in Adobe Photoshop and saved as a *.psd file (Photoshop's format) would not be readable by Microsoft Paint.
  • 8. TRANSLATING BETWEEN FILE TYPES Data can be stored temporarily in a computer's RAM as a means of transfer from one application to another. In Microsoft operating systems this feature is called the clipboard and it can copy data from one application and paste it into another. Nearly all other operating systems support this functionality. For example you can create a graph using a spreadsheet application and then use the clipboard to copy the graph to a desktop publishing application. Limitations: -Certain elements of one document may not be copiable to another application, eg video. -Some file features (eg text layout and formatting) may be lost in the translation to a different format.
  • 9. RAPID TRANSFER OF DATA Files can be easily transferred and shared across the globe using the Internet. A file could be: emailed as an attachment sent over instant messenger downloaded from a website/web server accessed over a private network
  • 10. IMPORT AND EXPORT 1.Export saves the file in a format that's readable by other applications. 2.Import opens a file created in another application for viewing or editing. The need to import and export data files has led to the development of several standard file types that many applications can understand. Examples are jpg and gif files for images, and mp3 files for sound; but there are also standard file types for text, movies, and spreadsheet data. Often an application of a different type can import data, for example, a word processor may be able to import a spreadsheet file.
  • 11. XML FILES Recently program developers have started to use the XML web page file format as the standard way to store data. Files can be read by any browser on any computer, making it very easy to transfer data between computers. Other standard file types, such as zip and pdf (portable document format), have been developed as ways of distributing data in the most efficient way possible. They do this by compressing it using zip technology or making it possible to read using a freely available downloaded reader application, as is the case with PDF files.