Storage Hardware Chapter 4 Preserving Data and Information Computer Components & Networks, 2002.

Slides:



Advertisements
Similar presentations
Tasks in Setting Up a Hard Disk
Advertisements

Chapter 4 Storing Information in a Computer Peter Nortons Introduction to Computers.
Backing Up Your Computer Hard Drive Lou Koch June 27, 2006.
11 BACKING UP AND RESTORING DATA Chapter 4. Chapter 4: BACKING UP AND RESTORING DATA2 CHAPTER OVERVIEW Describe the various types of hardware used to.
5-9/12/2005 CPE How to format your computer and re-install Windows XP.
Chapter 5 Chapter 5: Server Installation. Chapter 5 Learning Objectives n Make installation, hardware, and site- specific preparations to install Windows.
Storage Hardware Chapter 4 Preserving Data and Information © The McGraw-Hill Companies, Inc., 2000.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
Chapter 3: Where are programs and data stored?. What kinds of memory are there? The main memory The main memory –ROM: Read-only memory Store permanently.
Introduction to Computers Section 5A. home Storage Involves Two Processes Writing data Reading data.
Moving to Win 7 Considerations Dean Steichen A2CAT 2010.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Digital Certificate Installation & User Guide For Class - 2 Certificates.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
I T Essentials I Chapter 3 JEOPARDY.
1 Chapter Overview CD-ROM and DVD Drives Advanced Hard Disk Drives SCSI Drives.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 8 Understanding and Installing Hard Drives.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
PC COMPONENTS DISK DRIVES AND CONNECTORS. HARD DISK DRIVES Common Hard Drive Types: –ESDI - Enhanced Small Device Interface  Old Technology – IDE - Integrated.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
Submitted by Ravi Prakash PGT(Computer Sc.) KV39 GTC Varanasi
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
Configuration Overview The BIOS (basic input/output system) is an important motherboard component. The BIOS has the following functions: Holds and executes.
Computer Maintenance Unit Subtitle: Basic Input/Output System (BIOS) Excerpted from 1 Copyright © Texas Education Agency, All.
BASIC COMPUTER CONCEPTS What is a computer? An electronic device, operating under the control of instructions stored in its own memory unit, that can.
CHAPTER NT Installation Screens. Chapter Objectives Explain the installation in detail Focus on the three stages of installation Use screen images to.
Storage Hardware Chapter 4 Preserving Data and Information © The McGraw-Hill Companies, Inc., 2000.
Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. Computers: Information Technology in Perspective.
The Basic Input/Output System Unit objectives: Access the BIOS setup utility, change hardware configuration values, and research BIOS updates Explain the.
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
PC Maintenance: Preparing for A+ Certification Chapter 9: Working with the BIOS Setup Program.
Understanding and Troubleshooting Your PC. Chapter 5: Understanding, Installing, and Troubleshooting Disk Drives2 Chapter Objectives  In this chapter,
Ways to organize electronic files Witness fitness By: Simran and Navneet.
2.00 Understand Computer Fundamentals Unit Objective: 2.01 Software.
Software Writer:-Rashedul Hasan Editor:- Jasim Uddin.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
Lecture No 11 Storage Devices
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
Copyright Prentice-Hall, Inc Storing & Retrieving Information Chapter 7.
Types of Electronic Infection
Transferring Data and Applications from XP to Vista Robert Petrilak April 2008.
Task 16 Describe the need for document control (such as ensuring that completed models are approved, labelled and stored on a suitable storage medium).
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Excel Electronic Membership Directions, Examples and Operational Hints. Created by: Jim Armbruster.
Chapter 3 Partitioning Drives using NTFS and FAT32 Prepared by: Khurram N. Shamsi.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
Chapter 3 Installing and Learning Software. 2Practical PC 5 th Edition Chapter 3 Getting Started In this Chapter, you will learn: − What is in an application.
Basic Input/Output System
Chapter 7 Storage. What is storage? Holds data, instructions, and information for future use Storage medium is physical material used for storage Also.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Living in a Digital World Discovering Computers 2010.
NetTech Solutions Protecting the Computer Lesson 10.
Week1: Introduction to Computer Networks. Copyright © 2012 Cengage Learning. All rights reserved.2 Objectives 2 Describe basic computer components and.
Computer Maintenance I
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Disk storage systems Question#1 (True/False) A track is divided into multiple units called sectors.
2: Operating Systems Networking for Home & Small Business.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Computer Security Sample security policy Dr Alexei Vernitski.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
4-1 Copyright Prentice-Hall, Inc Disks & Tape Backup Units CHAPTER4.
Copyright Prentice Hall, Inc. 1 Computers: Information Technology in Perspective, 11e Larry Long and Nancy Long Chapter 5 Storing and Retrieving Information.
Chapter 3 Installing and Learning Software
Backing Up Your Computer
CHAPTER 4 Memory System Organization and Architecture
Network Models, Hardware, Protocols and number systems
Online software and backups
Presentation transcript:

Storage Hardware Chapter 4 Preserving Data and Information Computer Components & Networks, 2002

Ch 4 FAQ Computer Components & Networks, CCI Storage Fundamentals How much storage capacity do I need? In two years, you will probably three times the storage space that you need now The use of multimedia greatly increases your need for storage capacity

Ch 4 FAQ Computer Components & Networks, CCI Back Up Your Files Save –your “working”documents, spreadsheets, and database files –use a backup program to save your messages if you are in business or if you need to refer to them in the future –your downloaded updates and releases/versions

Ch 4 FAQ Computer Components & Networks, CCI Save Your Files Save –your favorites (“bookmarks”) in your browser –your address book –any customizations that you have performed

Ch 4 FAQ Computer Components & Networks, CCI Save How Often? For businesses - daily on servers For individuals –often (every few minutes) during file generation –biweekly or weekly total backup using a backup program

Ch 4 FAQ Computer Components & Networks, CCI Diskette Storage Organize, organize, organize –If it is important enough to store, it is probably important enough to duplicate in another medium for future use. –Use labels, and mark them for identification: filename, program used, creator, date Student Presentation - July 11 Mr. Smith Office: FS 105

Ch 4 FAQ Computer Components & Networks, CCI Diskette Functionality Use a diskette container Mae sure diskettes are formatted (initialized) Write-protect –helps prevent spend of viruses

Ch 4 FAQ Computer Components & Networks, CCI Hard Disks What do I need to know for emergencies?

Ch 4 FAQ Computer Components & Networks, CCI Hard Drive Emergencies When installing a hard disk or a new system –write down the current configuration and save along with other important documents such as sales slips, installation instructions –the configuration information should include cylinders, tracks, sectors, and whether an additional software disk manager has been used

Ch 4 FAQ Computer Components & Networks, CCI SCSI SCSI (pronounced “scuzzy”) –there are many different standards –recommend going to the manufacturer’s site and obtaining the hard drive and adapter’s standard –note the type of SCSI –note the SCSI cable required, including number of pins used

Ch 4 FAQ Computer Components & Networks, CCI EIDE Only one master and one slave hard drive per IDE port Ensure the correct jumper setting is enabled before booting the system with the new hard drive Depending on the BIOS, adjustments within the CMOS may be necessary –on startup, use the appropriate key for access. It could be the delete, ESC, F1 key, or others

Ch 4 FAQ Computer Components & Networks, CCI Additional Types of Backup ZIP or other large-capacity recordable media CD-R or CD-RW A second hard drive, internal or external –file backup is accomplish by drag-and- dropping to the second disk

Ch 4 FAQ Computer Components & Networks, CCI Backup Internet backup –many people are using free or fee- based Internet services for backing up systems and files –allows access to files even when you are not at your computer –security and privacy need to be ensured