Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 4: File Management, Virus Protection, and Backup

Similar presentations


Presentation on theme: "Chapter 4: File Management, Virus Protection, and Backup"— Presentation transcript:

1 Chapter 4: File Management, Virus Protection, and Backup
Chapter 1: Computer, Internet, Web, and Basics Chapter 4: File Management, Virus Protection, and Backup 1 1 1 1

2 Chapter 4 Preview After this chapter, you should be able to:
Create valid names for files and folders Use file management features Describe how a computer physically stores files Explain viruses, boot sector viruses, macro viruses, Trojan horses, worms, and Denial of Service attacks Describe how antivirus software is used Understand backup and restore plans Compare backup devices Chapter 4: File Management, Virus Protection, and Backup

3 Chapter 4 Outline Section A Section B Section C Section D File Basics
File Management Section C Computer Viruses Section D Data Backup Chapter 4: File Management, Virus Protection, and Backup

4 Chapter 4 File Management, Virus Protection, and Backup
Section A: File Basics Computer Concepts 8th Edition Parsons/Oja

5 File names, Extensions, and Formats: What are the rules for naming files?
Every file has a name, and might also have a file extension You must provide a valid file name that adheres to rules or file-naming conventions Chapter 4: File Management, Virus Protection, and Backup Page 176

6 What are the rules for naming a file?
Chapter 4: File Management, Virus Protection, and Backup Page 176

7 Why are certain characters and words not allowed in a filename?
Certain characters have significance to an operating system DOS and Windows use the “:” C: (representing hard drive), A: (representing floppy drive) Reserved words are words that are used as commands or special identifiers and cannot be used as file names Chapter 4: File Management, Virus Protection, and Backup Page 177

8 Are file extensions important?
File extension further describes the file contents Separated by the file name with a dot Readme.txt, Newsletter.doc Related to the file format Most software programs have a native file format that is used to store files Chapter 4: File Management, Virus Protection, and Backup Page 177

9 Are file extensions important?
Chapter 4: File Management, Virus Protection, and Backup Page 177

10 File Locations, Folders, and Paths: How do I designate a file’s location?
You first specify where the file will be stored A: for floppy disk drive C: for hard drive D through Z for additional storage CD, Zip and DVD drive letters are not standardized Chapter 4: File Management, Virus Protection, and Backup Page 178

11 What’s the purpose of folders?
An operating system maintains a list of files called a directory for each disk, CD-ROM or DVD Root directory Main directory of a disk Provides a useful list of files Folders - smaller lists within directories A folder is separated from a drive letter and a filename by a backslash (\) Chapter 4: File Management, Virus Protection, and Backup Page 178

12 File Sizes and Dates Chapter 4: File Management, Virus Protection, and Backup Page 179

13 What’s the significance of a file’s size?
A file contains data, stored as a group of bits The more bits, the larger the file File size is usually measured in bytes, kilobytes, or megabytes Chapter 4: File Management, Virus Protection, and Backup Page 179

14 Is the file date important?
Your computer keeps track of the date that a file was created or last modified The file date is useful if you have created several versions of a file and want to make sure that you know which version is the most recent Chapter 4: File Management, Virus Protection, and Backup Page 179

15 Chapter 4 File Management, Virus Protection, and Backup
Section B: File Management Computer Concepts 8th Edition Parsons/Oja

16 Application-Based File Management: How does a software application help me manage files?
Applications provide a way for opening and saving files from/to specific folders on a designated storage device An application may also provide additional file management capabilities Deleting and renaming files Chapter 4: File Management, Virus Protection, and Backup Page 180

17 What’s the difference between the Save option and the Save As option?
Chapter 4: File Management, Virus Protection, and Backup Page 181

18 What other options are available in the Save As dialog box?
You can use it to rename a file, delete a file, or create a folder Chapter 4: File Management, Virus Protection, and Backup Page 181

19 File Management Utilities: How does the operating system help me manage files?
Provided by your computer operating system Helps you locate, rename, move, copy, delete files and discover file properties Chapter 4: File Management, Virus Protection, and Backup Page 182

20 These metaphors are also called logical storage models
File Management Metaphors: How can a file management utility help me visualize my computer’s file storage? A storage metaphor helps you visualize and mentally organize the files on your disks and other storage devices These metaphors are also called logical storage models Chapter 4: File Management, Virus Protection, and Backup Page 183

21 What storage metaphors are typically used for personal computers?
Storage metaphor is like a filing cabinet Another is the tree storage metaphor Chapter 4: File Management, Virus Protection, and Backup Page 183

22 Windows Explorer: How do I use a file management utility?
Windows Explorer is an example of a file management utility Chapter 4: File Management, Virus Protection, and Backup Page 184

23 Can I work with more than one file or folder at a time?
Select the files or folders Hold down Ctrl key, and click each item Click first, then hold Shift key and click on last item Select the operation to be carried out (rename, copy, delete, or move) Chapter 4: File Management, Virus Protection, and Backup Page 184

24 What can I do with the folders and files that are listed in Windows Explorer?
Rename – change the name of a file or folder Copy – copy a file from your hard disk to a floppy disk Move – move a file from one folder to another Delete – delete a file when you no longer need it Chapter 4: File Management, Virus Protection, and Backup Page 184

25 File Management Tips Use descriptive names Maintain file extensions
Group similar files Organize your folders from top down Consider using the My Document default directory Do not mix data files and program files Chapter 4: File Management, Virus Protection, and Backup Page 185

26 File Management Tips No files in the root directory
Access files from the hard disk Follow copyright rules Delete files you no longer need Be aware of storage locations Back up Chapter 4: File Management, Virus Protection, and Backup Page 186

27 Physical File Storage: Is data stored in specific places on a disk?
The physical storage model describes what actually happens on the disks and in the circuits A storage medium must be formatted Formatting creates the equivalent of electronic storage bins by dividing a disk into tracks, and then further dividing each track into sectors Chapter 4: File Management, Virus Protection, and Backup Page 186

28 Is data stored in specific places on a disk?
Chapter 4: File Management, Virus Protection, and Backup Page 186

29 How does a disk get formatted?
Formatting utilities are supplied by operating system or by companies that manufacture the drives Chapter 4: File Management, Virus Protection, and Backup Page 187

30 How does the operating system keep track of a file’s location?
The OS uses a file system to keep track of the names and locations of files that reside on a storage medium Mac OS – Hierarchical File System (HFS) Linux – Ext2fs Windows NT, 2000, XP – NTFS Master File Table Windows 95, 98, ME - FAT32 Windows FAT16 Chapter 4: File Management, Virus Protection, and Backup Page 187

31 How does the operating system keep track of a file’s location?
To speed up the process, sectors are grouped into clusters File allocation table (FAT) - an operating system file that maintains a list of files and their physical location on the disk Like a table of contents A damaged FAT results in losing data Chapter 4: File Management, Virus Protection, and Backup Page 187

32 How does the operating system keep track of a file’s location?
Chapter 4: File Management, Virus Protection, and Backup Page 188

33 What happens when a file is deleted?
The OS simply changes the status of the file’s clusters to “empty” and removes the filename from the index file It doesn’t remove the data, just the references to it Special file shredder software can be used to overwrite “empty” sectors with random 1s and 0s Chapter 4: File Management, Virus Protection, and Backup Page 188

34 Can deleted files be undeleted?
Deleted files are moved to the Recycle Bin Helps to protect against accidental erasures Files that appear in the directory listing for the Recycle Bin folder can be undeleted Chapter 4: File Management, Virus Protection, and Backup Page 189

35 How does a disk become fragmented?
As computer files are added/deleted, parts of files tend to become scattered all over the disk These fragmented files are stored in noncontiguous clusters Slows drive performance Defragmentation utility – rearranges the files on a disk so that they are stored in contiguous clusters Chapter 4: File Management, Virus Protection, and Backup Page 189

36 How does a disk become fragmented?
Chapter 4: File Management, Virus Protection, and Backup Page 189

37 Chapter 4 File Management, Virus Protection, and Backup
Section C: Computer Viruses Computer Concepts 8th Edition Parsons/Oja

38 Viruses, Trojan Horses, and Worms: What is a computer virus?
A program that attaches itself to a file, reproduces itself, and spreads to other files A virus can perform a trigger event: Corrupt and/or destroy data Display an irritating message Key characteristic is their ability to “lurk” in a computer for days or months quietly replicating themselves Chapter 4: File Management, Virus Protection, and Backup Page 191

39 What is a computer virus?
File virus - a virus that attaches itself to an application program Boot sector virus - infects the system files that your computer uses every time you turn it on Macro virus - infects a set of instructions called a “macro” Macro - a miniature program that usually contains legitimate instructions to automate document and worksheet production Chapter 4: File Management, Virus Protection, and Backup Page 192

40 How is a Trojan horse different from a virus?
Appears to perform one function while actually doing something else Not a virus, but may carry a virus Does not replicate itself Another type of Trojan horse looks like a log-in screen PictureNote Trojan – arrives as named picture.exe and then tries to steal login and passwords Chapter 4: File Management, Virus Protection, and Backup Page 192

41 What’s a worm? A program designed to enter a computer system through security holes Usually through a network from computer to computer Does not need to be attached to a document to reproduce Mass-mailing worms Klez, Netsky, MyDoom, and Bagle Spoofed addresses Chapter 4: File Management, Virus Protection, and Backup Page 193

42 What are the symptoms of a malicious code attack?
Network traffic jam Denial of Service Browser reconfiguration Delete and modify files Access confidential information Performance degradation Disable antivirus and firewall software Chapter 4: File Management, Virus Protection, and Backup Page 195

43 Antivirus Software: How can I avoid viruses and worms?
Antivirus software is a set of utility programs that looks for and eradicates viruses, Trojan horses, and worms Chapter 4: File Management, Virus Protection, and Backup Page 196

44 How does antivirus software work?
Hackers have created viruses that can insert themselves into unused portions of a program To counterattack the work of hackers, antivirus software designers created software with a checksum - a number calculated by combining binary values of all bytes in a file Compares checksum each time you run a program Chapter 4: File Management, Virus Protection, and Backup Page 196

45 How does antivirus software work?
Checks for a virus signature A unique series of bytes used to identify a known virus Chapter 4: File Management, Virus Protection, and Backup Page 197

46 When should I use antivirus software?
“All the time” Most antivirus software allows you to specify what to check and when to check it Chapter 4: File Management, Virus Protection, and Backup Page 197

47 How often should I get an update?
New viruses and variations of old viruses are unleashed just about everyday Check Web site of antivirus software publisher for periodic updates Some software periodically reminds you to check for updates Chapter 4: File Management, Virus Protection, and Backup Page 197

48 How reliable is antivirus software?
Antivirus software is pretty reliable, but viruses try to get around detection Multi-partite viruses Polymorphic viruses Stealth viruses Antivirus software is not 100% reliable, but protection is worth the risk Chapter 4: File Management, Virus Protection, and Backup Page 197

49 Virus Hoaxes: What’s a virus hoax?
Some viruses don’t really exists A virus hoax arrives as an message containing dire warnings about a supposedly new virus that is on the loose Recommends a strategy Recommends forwarding the Says no one has a fix for it yet Many cases it is a fake Chapter 4: File Management, Virus Protection, and Backup Page 197

50 What’s a virus hoax? Chapter 4: File Management, Virus Protection, and Backup Page 198

51 What should I do about virus hoaxes?
Don’t panic You can ignore a virus hoax You can validate the hoax by going to a reliable Web site that lists hoaxes and viruses Chapter 4: File Management, Virus Protection, and Backup Page 198

52 Chapter 4 File Management, Virus Protection, and Backup
Section D: Data Backup Computer Concepts 8th Edition Parsons/Oja

53 Backup and Restore Procedures: How do I make a backup?
Data backup - a copy of a file or the contents of a disk drive Provides the best all-round security for your data A backup is usually stored on a different storage medium from the original files The exact steps that you follow depend on your backup equipment, the software you use to make backups, and your personal backup plan Chapter 4: File Management, Virus Protection, and Backup Page 199

54 How do I make a backup? Chapter 4: File Management, Virus Protection, and Backup Page 199 53

55 How do I restore data? You restore data by copying files from a backup to the original storage medium or its replacement Chapter 4: File Management, Virus Protection, and Backup Page 200

56 What’s the best backup plan?
Chapter 4: File Management, Virus Protection, and Backup Page 200

57 What about backing up the Windows Registry?
It is always open, so some backup software won’t back it up If possible, make a backup Update backup every time you install new software or hardware Chapter 4: File Management, Virus Protection, and Backup Page 201

58 How do I avoid backing up files that contain viruses?
Use and update frequently antivirus software Scan and remove viruses before making backup Chapter 4: File Management, Virus Protection, and Backup Page 202

59 How often should I back up my data?
Backup your data depending upon how much data you can afford to lose Under normal use, once-a-week should be good enough Chapter 4: File Management, Virus Protection, and Backup Page 202

60 Where should I store my backups?
Store backups in a safe place Store backups in a different location Chapter 4: File Management, Virus Protection, and Backup Page 202

61 How do I choose a backup device?
Chapter 4: File Management, Virus Protection, and Backup Page 202

62 What are the limitations of CDs and DVDs?
Writing process is slow Restoring a crashed computer is cumbersome Writable optical technologies provide good storage capacity and blank disks are fairly inexpensive Chapter 4: File Management, Virus Protection, and Backup Page 203

63 Can I use floppy disks and Zip disks to back up my data?
Floppy disks are inexpensive, contain 1.44 MB space, and are good for several documents Zip disks with 100 MB and 250 MB capacity is sufficient for documents and digital graphics Several 750 MB Zip disks might be sufficient for backing up all of your data files Chapter 4: File Management, Virus Protection, and Backup Page 203

64 Can I store backup files on a network server?
If connected, you can store your files onto the network Get permission first Store your data in a password-protected, non-shared folder (remember networks are shared) Make sure the server is backed up on a regular basis Chapter 4: File Management, Virus Protection, and Backup Page 204

65 Can I back up to a second hard disk?
Good backup option Disadvantage: susceptible to same dangers of first drive Chapter 4: File Management, Virus Protection, and Backup Page 204

66 What about using a tape drive for backups?
Tape backup Used in business Data is copied to magnetic tape Tape drive can be internal or external Stored digital format Chapter 4: File Management, Virus Protection, and Backup Page 204

67 Where can I get backup software?
Backup software is provided with many backup devices, particularly tape drives Microsoft Backup Useful features include Ability to restore all of your programs and data files without manually reinstalling Windows or any other applications An option to schedule unattended backups Support for a variety of backup devices Chapter 4: File Management, Virus Protection, and Backup Page 204

68 How do I use backup software?
Full backup - copy of all files on a disk; safe but can take a long time Computer cannot be used during backup Backup device requires equal capacity Differential backup - copy of all files that have changed since the last full backup Takes less time but more complex Requires one full backup and then you will make differential backups at regular intervals Chapter 4: File Management, Virus Protection, and Backup Page 205

69 How do I use backup software?
Incremental backup - copy of all files that have changed since the last backup Not necessary since the last full backup, but since any previous backup Takes the least time but is most complex to restore Requires good record keeping Label correctly Chapter 4: File Management, Virus Protection, and Backup Page 205

70 How do I use backup software?
Chapter 4: File Management, Virus Protection, and Backup Page 205

71 What is a boot disk? A floppy disk or CD that contains the OS files needed to boot your computer without using hard drive Most manufacturers include a recovery CD for restoring your system to original setup The Windows XP Backup utility creates a set of Automated System Recovery disks Chapter 4: File Management, Virus Protection, and Backup Page 206

72 What is a boot disk? Chapter 4: File Management, Virus Protection, and Backup Page 206

73 Conclusion You should now be able to:
Create valid names for files and folders Use file management features Describe how a computer physically stores files Explain viruses, boot sector viruses, macro viruses, Trojan horses, worms, and Denial of Service attacks Describe how antivirus software is used Understand backup and restore plans Compare backup devices Chapter 4: File Management, Virus Protection, and Backup


Download ppt "Chapter 4: File Management, Virus Protection, and Backup"

Similar presentations


Ads by Google