Students learn about
• storing and
retrieving – the two-step process by which
data or information can be saved and
reloaded to allow for: – other processing
to take place – a temporary halt
in the system – the transfer of
data or information
• hardware for
storing and retrieving
- hardware in storing and retrieving
- hardware secondary storage devices, including:
- magnetic disks
- optical disks
- network storages
- flash memory
- magnetic tapes
– the
characteristics of hardware, including: - random or
sequential access
- volatile or
non-volatile
- permanent or
non-permanent
• the trend to
faster and greater storage capacity over time
• software for
storing and retrieving
– hardware
interface software – file management
software – database
management systems – file formats for
different data types
- used to access a
machine independent data store
- using search
engines to access data
–
encryption/password protection – security of
stored data whether stored centrally or distributed
• non-computer
tools, including:
– paper based
storage systems
• social and ethical issues, including: – the security of stored data
- Data security involves a series of safeguards to protect data, such as passwords, personal objects, biometric devices, firewalls, data encryption, securing waste, carefully screening employees and having appropriate backup procedures.
- Passwords are secret words or numbers that are typed on the keyboard to gain access to a computer system. Good data protection systems require users to change their passwords often, so that only authorised people can have access to certain data.
- Objects such as a key, plastic card or badge can be required to gain access to the information system. They are often used together with a personal identification number (PIN).
- Biometric devices are used to verify personal characteristics such as fingerprints, hand size, signature, eye and voice.
- Data encryption is used to prevent data from being intercepted and read during transmission. The data is ‘scrambled’ so that it is meaningless to anyone other than the recipient, who uses the same encryption software to convert it back.
- Firewalls are used on computer networks to check all data coming from outside sources (such as the Internet) for the purpose of verification and authentication.
- Waste is secured, since discarded printouts are potential sources of confidential information. This kind of waste can be secured by shredding.
- Backup procedures need to be secure and reliable. A regular plan of copying and storing data will guard against data loss. It is good practice to keep at least one backup copy in a fireproof safe or off-site.
- The weakest link in the security of any information system is the people in it. Employees need to be carefully screened. This can be difficult, as even well respected and otherwise honest employees can commit computer crimes.
– unauthorised retrieval of data
- Unauthorised retrieval of data refers to people gaining illegal access to information systems. These people are called hackers. Hackers are often involved in information theft or financial theft. Their crimes are often not reported due to adverse publicity and are not regarded in the same light as conventional robbery
– advances in storage and retrieval technologies and new uses such as data matching
Students learn to - document the storage and retrieval process in an information system
- describe the characteristics and operation of hardware devices used for storage and retrieval
- use a range of hardware devices and associated software to store and retrieve information and data
- store and retrieve data using a network
- compare different file formats for storing the same data, explaining the features and benefits of each
- use software features to secure stored data and information
Stimulus Questions
- Describe
the information process of storing and retrieving in detail, including a
real life example.
- Discuss
the importance of backup to any system.
- Create
a table which shows at least 6 storage devices and lists the following in
regards to each one:
- Storage
Capacity
- Advantages
- Disadvantages
- Image
of the device
- Discuss
the importance of encryption and password protection when it comes to the
storage of data.
- Create
a table which shows at least 6 file storage formats and lists the
following in regards to each one:
- File
format extension
- Type
of File(s) Stored
- Advantages
- Disadvantages
- Describe
one type of non-computer storage tool which is still used today. Justify
why it is still used today.
- Explain
some implications that should occur to students who access unauthorised
stored data.
- Identify
and describe one type of new storage and retrieval device.
|
|