• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Back up Systems.

Extracts from this document...

Introduction

Back up Systems Backing up is the activity of copying files to a second medium (a disk or tape) as a safety measure in case the first medium fails. Even the most reliable computers are able to break down. The reasons for data loss would be because of fire, theft, virus attacks, sabotage, power failure and explosion. Section 1 At the moment, the school is using tape drives which can be set to back up automatically, at any day and at any time. The school has three drives, which are the S: drive, the T: drive and the U: drive. The S: drive and the U: drive are all being backed up by the tape drives, however the T: drive isn't. Up to this point, they have been using a grandfather-father-son backup system. However, the data on the network is not being backed up every day. The strengths of there current back up system is, they are using the latest backup software called Veritas which uses tape drives and which can be set to back up automatically, at any day and at any time. ...read more.

Middle

The tapes store between 20Gb and 200Gb, which can be brought for �10-�60. 4. By using the grandfather-father-son system, it is possible to recreate a masterfile if it is lost. This scheme uses three sets of tapes for daily, weekly and monthly backup sets. The actual number of tapes required in each media set will vary depending on how much data you need to backup. The first set, "Son," represents your daily backups. A second set, called "Father," is used to perform full backups on the day in which you do not perform a daily backup and the final set of three tapes, called "Grandfather," is used to perform full backups on the last business day of each month and can be reused quarterly. This rotation scheme will back up data on a daily, weekly, monthly, and quarterly basis. Out of all the types of back-up mediums, I personally feel that the tape drive is the best one to back up a school network. ...read more.

Conclusion

Backup medium: The most appropriate medium for backing up a school network is using DAT, and by using the grandfather-father-son backup system. The capacity of the tape, depends on, the volume of data to be backed up, the expense and the convenience of the medium. Dos and Don'ts After backing up the data, do not leave the backup tapes lying around, as they can be stolen very easily. Secondly, do not leave the backup disks near the computer, because if the computer is stolen, then there is a very big chance they will take the backup disks with them. Thirdly, do not leave the disks, lying around or by keeping it in drawers. You should at least have more than one backing up tape, and at least one of them should be left far away from the main system, and preferably in another site. Also, if the back up data is expensive then the school should buy a fireproof and a waterproof safe, where the backups tapes can be safely placed incase of an emergency such as a fire and they wouldn't need to be transported to another site. ?? ?? ?? ?? ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    An introduction to Identity Theft

    4 star(s)

    Its pattern is said to be predictable. It will usually entice the victim into parting with their banking/private information with large sums of money allegedly due to them. It may name high ranking officials and forged official and or legal documentation to endorse legitimacy. It may involve a high profile investment portfolio, easily researchable by the victim

  2. Peer reviewed

    information systems assignment 2

    4 star(s)

    both program and create a database as well as use one Storing information Databases store information in a very structured way based on the information and the data which has or is being entered into the system. Databases can store information based on the actual field it is being used in (e.g.

  1. Computer systems assignment 1

    I will undertake few activities using the utilities. First one and one of the main ones are installing an antivirus to prevent infections: To do that I put in the CD provided with antivirus. And go to my computer to see the if the disc is read by the CD-drive.

  2. Definition-nature of the problem solved - Car Mechanic business

    By pressing the mail merge button a word document will automatically open and the outline of the letter be filled with the necessary information. The information will be entered through the use of a code on the word document. You can find an attached plan of the mail merge layout in the appendix.

  1. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    high security and also has the following: > Fiber optic cables have a much greater bandwidth than metal cables. This means that they can carry more data. > Fiber optic cables are less susceptible than metal cables to interference. > Fiber optic cables are much thinner and lighter than metal wires.

  2. Free essay

    Setting up and E-Commerce Site

    If so then we need to consider a creation of a P.O Box address. This can be setup by going to the local post office and paying a small fee, from here we have a postal address that avoids conflicting to neighbours.

  1. Smart Card System

    Packets are forwarded to a default router in the belief that the default router has more network information in its routing table and will therefore be able to route the packet correctly on to its final destination. Chapter 2: Data Encryption and Cryptography Technology 2.1 Introduction To Encryption And Cryptography

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    If the user of the system makes a mistake then it is likely they do not know about it. This could affect the usability of the system. * Confusing - There are so many parts to the system it can becoming confusing to use.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work