4. Storing and Retrieving

Students learn about

storing and retrieving – the two-step process by which data or information can be saved and reloaded to allow for:

– other processing to take place

– a temporary halt in the system

– backup and recovery

– the transfer of data or information

hardware for storing and retrieving

– hardware devices

  • hardware in storing and retrieving
    • hardware secondary storage devices, including:
      • magnetic disks
      • optical disks
      • network storages
      • flash memory
      • magnetic tapes

– the characteristics of hardware, including:

- random or sequential access

- volatile or non-volatile

- permanent or non-permanent

• the trend to faster and greater storage capacity over time

• software for storing and retrieving

– hardware interface software

– file management software

– database management systems

– file formats for different data types

– Internet browser

- used to access a machine independent data store

- using search engines to access data

– encryption/password protection

– security of stored data whether stored centrally or distributed

non-computer tools, including:

– paper based storage systems

– microfiche

– libraries

social and ethical issues, including:
– the security of stored data
  • Data security involves a series of safeguards to protect data, such as passwords, personal objects, biometric devices, firewalls, data encryption, securing waste, carefully screening employees and having appropriate backup procedures.

    • Passwords are secret words or numbers that are typed on the keyboard to gain access to a computer system. Good data protection systems require users to change their passwords often, so that only authorised people can have access to certain data.

    • Objects such as a key, plastic card or badge can be required to gain access to the information system. They are often used together with a personal identification number (PIN).

    • Biometric devices are used to verify personal characteristics such as fingerprints, hand size, signature, eye and voice.

    • Data encryption is used to prevent data from being intercepted and read during transmission. The data is ‘scrambled’ so that it is meaningless to anyone other than the recipient, who uses the same encryption software to convert it back.

    • Firewalls are used on computer networks to check all data coming from outside sources (such as the Internet) for the purpose of verification and authentication.

    • Waste is secured, since discarded printouts are potential sources of confidential information. This kind of waste can be secured by shredding.

    • Backup procedures need to be secure and reliable. A regular plan of copying and storing data will guard against data loss. It is good practice to keep at least one backup copy in a fireproof safe or off-site.

    • The weakest link in the security of any information system is the people in it. Employees need to be carefully screened. This can be difficult, as even well respected and otherwise honest employees can commit computer crimes.
– unauthorised retrieval of data
  • Unauthorised retrieval of data refers to people gaining illegal access to information systems. These people are called hackers. Hackers are often involved in information theft or financial theft. Their crimes are often not reported due to adverse publicity and are not regarded in the same light as conventional robbery
– advances in storage and retrieval technologies and new uses such as data matching


Students learn to
  • document the storage and retrieval process in an information system
  • describe the characteristics and operation of hardware devices used for storage and retrieval
  • use a range of hardware devices and associated software to store and retrieve information and data
  • store and retrieve data using a network
  • compare different file formats for storing the same data, explaining the features and benefits of each
  • use software features to secure stored data and information
Stimulus Questions

  1. Describe the information process of storing and retrieving in detail, including a real life example.
  2. Discuss the importance of backup to any system.
  3. Create a table which shows at least 6 storage devices and lists the following in regards to each one:
    1. Storage Capacity
    2. Advantages
    3. Disadvantages
    4. Image of the device
  4. Discuss the importance of encryption and password protection when it comes to the storage of data.
  5. Create a table which shows at least 6 file storage formats and lists the following in regards to each one:
    1. File format extension
    2. Type of File(s) Stored
    3. Advantages
    4. Disadvantages
  6. Describe one type of non-computer storage tool which is still used today. Justify why it is still used today.
  7. Explain some implications that should occur to students who access unauthorised stored data.
  8. Identify and describe one type of new storage and retrieval device.   




Subpages (1): Storing data in DNA
Comments