Task 16 Describe the need for document control (such as ensuring that completed models are approved, labelled and stored on a suitable storage medium).

Slides:



Advertisements
Similar presentations
Information must be: Kept Tidy Kept Safe Stored in an accessible place Able to be found easily and quickly when needed.
Advertisements

STORAGE AND RETRIEVAL OF INFORMATION
GENERAL POLICY GUIDE © Marin Management, Inc. 1 A. The Purpose of This Policy The purposes of this policy are to summarize our procedures for the retention.
WEEK THREE MANAGING, FINDING AND SELECTING INFORMATION- PART 2 Functional ICT.
Windows XP / Microsoft Word Computer Applications.
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
Online Backup. Introduction Company Data is paramount to every business. In relation to data backup, our slogan is as follows; "Backup is cheap but recovery.
Backup Strategy. An Exam question will ask you to describe a backup strategy. Be able to explain: Safe, secure place in different location. Why? – For.
BACKING UP YOUR COMPUTER What, Why, Where and How.
Exploring Microsoft Windows 8 Chapter 1 Getting Started with Windows 8
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
QMS Documentation Click the mouse to advance slides and animations in this slide show…
A Computer is Like a Filing Cabinet
Document Backup I & II Nasouh Keilani Computer Technician.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
SERVER Betül ŞAHİN What is this? Betül ŞAHİN
The Office Procedures and Technology Chapter 9 Records Management Systems Copyright© 2007 Thomson/South-Western.
Overview Print and Document Services Print Management console Printer properties Troubleshooting.
Software Configuration Management (SCM)
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
SECURING DATA FOR ER STAFF Windy L. Newton May 29, 2015.
Uploading, Creating and Modifying Forms in simplifyMD.
OCR National in ICT Unit 1 – ICT in Business AO1 - Safe Working Practices in a Business Environment.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
Storage Hardware Chapter 4 Preserving Data and Information © The McGraw-Hill Companies, Inc., 2000.
Task 18 Describe the need to create backup copies, and to file them in a separate and safe location also filing and storing hard copies for use in production.
Disaster Recovery Advice 6 th November Data What do you need to backup? System States All or Critical Data.
Storage Issues 09/05. ownCloud Open source software ◦ php + javascript Main Features: ◦ Access Data ◦ Sync Data ◦ Share Data.
 FFC backs up all of its data each day. It stores its most recent daily backup once a week at a company owned offsite location. FFC also stores the most.
Hosted File Backup Ensure that your data is kept safe with our cloud based data back-up service.
Staying Organized 9/18/2013. Learning Target To use my iPad to stay organized as a student. Success Criteria: – I can access my files via WebDAV. – I.
Drowning in a Sea of Paper Document Archiving With Technology Presented by Arthur J. Staerk AccuScan
Organising Files and Folders Module 1. Task 1 – Folder Structure Organising folders to store your work is a key factor to success. Organising folders.
Forms Training. Tested Formatted The Template Library.
Systems Software Operating Systems. What is software? Software is the term that we use for all the programs and data that we use with a computer system.
Storing data on your computer & network. Storage devices Hardware Hard drive Flash drive Tape File server (HD) SAN NAS Software System software Windows.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
All About Me Finding and Editing Saved Student Work Part II.
LiveState Recovery Desktop A Laptop Protection and Recovery Solution A screen shot walk through.
Welcome to Year 7 ICT Ysgol Dewi Sant’s ICT Department.
Security and Backup. Introduction A back-up strategy must cover all eventualities: Accidental damage Equipment failure Deliberate damage It must consider:
“Read Only Memory” a class of storage media used in computers and other electronic devices. This tells the computer how to load the operating system.
Communications & Networks National 4 & 5 Computing Science.
 Personal File Storage- Unlimited  Create New MS Office files or upload existing files  Share Files or Folders  Can View  Can Edit One Drive.
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
Managing Data & Information Procedures & Techniques.
Storage Hardware Chapter 4 Preserving Data and Information Computer Components & Networks, 2002.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
Cloud Computing ILAS project DONE BY:. Table of content INTRODUCTION. ◦ Cloud computing in general ◦ What are the things that worked during the implementation.
 Service Learning: Research Paper Rough Draft Steps to Starting a Google Doc.
 Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives,
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
IFolder. What is it? System for MIRRORING local hard disc data to a network drive It is NOT A BACKUP solution! Disaster resilience (hard disc crash, fire,
Slide Template for Module 4 Data Storage, Backup, and Security
What does “getting the most from your money” mean to you?
System Backup IB Computer Science.
Store it safely You’ll be aware of the importance of backing up the files on your computer. But are you aware of some of the key things you need to consider.
Information Security Seminar
The Boss asked him, “So, what makes you suitable for this job”?
WD Christmas gift guide 2016
Managing the IT Function
How can I back up my QuickBooks file on my own computer's hard drive?
LO2: Understand Computer Software
CREATING AND USING FILE FOLDERS
5.2b Introduction to CAD Modeling Skills
Get to Know Your “W” Drive
Creating and Using File Folders
Introducing NTFS Reliability Security Long file names Efficiency
The Office Procedures and Technology
Objectives Explain the role of computers in client-server and peer-to-peer networks Explain the advantages and disadvantages of client- server and peer-to-peer.
Presentation transcript:

Task 16 Describe the need for document control (such as ensuring that completed models are approved, labelled and stored on a suitable storage medium).

Document Control CAD models can be approved in 1 of 2 ways: Approval can be done digitally – this means that a section of the model properties database is completed by the checker. Approval may be completed via a paper based approval form which is signed by the checker and filed safely.

Labelling CAD Models Every company has their own system for naming, labelling and storing CAD files. In each case the models should be named correctly according to the approved system.

Storing CAD Models Models should be filed in folders as specified by company procedures. Models will generally be stored on the company network server, rather than the local hard drive of designers computers. Off-site back-up of files should also be done daily in case of fire, flood or theft.