HANDLING COMPUTER FILES 1- 2 - EFFECT OF FILE INSECURITY-DIFFERENCE BETWEEN COMPUTERIZED AND MANUAL FILE- ADVANTAGES OF COMPUTERIZED FILES OVER MANUAL FILES (SS2 NOTES)



HANDLING COMPUTER FILES 2 

EFFECT OF FILE INSECURITY-DIFFERENCE BETWEEN COMPUTERIZED AND MANUAL FILE- ADVANTAGES OF COMPUTERIZED FILES OVER MANUAL FILES




The following are the effects of file insecurity:

1.       Loss of data

2.       Data unreliability

3.       Data/software/program corruption

        4.     Overwriting - a process where new data is written over the existing data in the same physical space, making the original data inaccessible
      5. Unauthorize use of data

Advantages and disadvantages of computer file

Advantages

1.       Faster and efficient in processing of information

2.       More secure

3.       Fast to access

4.       Uses less space

5.       More accurate

6.       Can be updated

7.       Permits long term storage and retrieval

Disadvantages/limitations

1.       Expensive to set up

2.       Require power supply

3.       Data are often duplicated

4.       Can be corrupted

5.       Vulnerable to virus attack

6.       Requires formal training to handle


Differences between Computer Files and Manual Files


Computer files

Manual files

More secured

Less secured

More reliable

Less reliable

Can easily and neatly be

 modified

Cannot be easily and neatly 

modified

Fast to access

Slow to access especially if

 there is large number of file

 to check from

Can be attacked by virus and 

worms








CLASS ACTIVITY

1. List two (2) effects of file insecurity

2. State three (3) advantages of computerized files over manual files

3. State two differences between computer files and manual files

4. a. If a file fails to open, what troubleshooting steps would you take to identify and resolve the issue?

b. How can you deal with file corruption, and what preventative measures can be taken?

5a. Why is it important to regularly back up your important files? Describe a backup strategy.

b. Explain the steps you would take to recover a deleted file from the recycle bin or trash folder.

6a. What are some best practices for naming files to ensure clarity and easy identification?

b. How can using a consistent file naming convention contribute to efficient file management?















Can be attacked by rodents,        

insects, fire etc.


Comments

Popular posts from this blog

COMPUTER STUDIES JS2 _ SECOND TERM - MID TERM PROJECT

COMPUTER STUDIES _ MID TERM PROJECT –JS3 (SECOND TERM)

JS3 CLASS - ONLINE CLASS TASK_COMPUTER VIRUS (COMPUTER STUDIES)