• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Back up Systems.

Extracts from this document...

Introduction

Back up Systems Backing up is the activity of copying files to a second medium (a disk or tape) as a safety measure in case the first medium fails. Even the most reliable computers are able to break down. The reasons for data loss would be because of fire, theft, virus attacks, sabotage, power failure and explosion. Section 1 At the moment, the school is using tape drives which can be set to back up automatically, at any day and at any time. The school has three drives, which are the S: drive, the T: drive and the U: drive. The S: drive and the U: drive are all being backed up by the tape drives, however the T: drive isn't. Up to this point, they have been using a grandfather-father-son backup system. However, the data on the network is not being backed up every day. The strengths of there current back up system is, they are using the latest backup software called Veritas which uses tape drives and which can be set to back up automatically, at any day and at any time. ...read more.

Middle

The tapes store between 20Gb and 200Gb, which can be brought for �10-�60. 4. By using the grandfather-father-son system, it is possible to recreate a masterfile if it is lost. This scheme uses three sets of tapes for daily, weekly and monthly backup sets. The actual number of tapes required in each media set will vary depending on how much data you need to backup. The first set, "Son," represents your daily backups. A second set, called "Father," is used to perform full backups on the day in which you do not perform a daily backup and the final set of three tapes, called "Grandfather," is used to perform full backups on the last business day of each month and can be reused quarterly. This rotation scheme will back up data on a daily, weekly, monthly, and quarterly basis. Out of all the types of back-up mediums, I personally feel that the tape drive is the best one to back up a school network. ...read more.

Conclusion

Backup medium: The most appropriate medium for backing up a school network is using DAT, and by using the grandfather-father-son backup system. The capacity of the tape, depends on, the volume of data to be backed up, the expense and the convenience of the medium. Dos and Don'ts After backing up the data, do not leave the backup tapes lying around, as they can be stolen very easily. Secondly, do not leave the backup disks near the computer, because if the computer is stolen, then there is a very big chance they will take the backup disks with them. Thirdly, do not leave the disks, lying around or by keeping it in drawers. You should at least have more than one backing up tape, and at least one of them should be left far away from the main system, and preferably in another site. Also, if the back up data is expensive then the school should buy a fireproof and a waterproof safe, where the backups tapes can be safely placed incase of an emergency such as a fire and they wouldn't need to be transported to another site. ?? ?? ?? ?? ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    An introduction to Identity Theft

    4 star(s)

    benefactor, inheritance or an unknown investment by a predecessor and the victims banking information is required in order that the he/she can receive it or the website and or caller may require the completion of some sort of so called "survey", completing this survey would usually require the victim to divulge his/her personal and or financial information.

  2. Peer reviewed

    information systems assignment 2

    4 star(s)

    It starts off with one field and this field separates in to other fields, which separate into others. This structure allows information to be repeated. The only access to this database is at the top and it then moves downwards.

  1. Computer systems assignment 1

    I will undertake few activities using the utilities. First one and one of the main ones are installing an antivirus to prevent infections: To do that I put in the CD provided with antivirus. And go to my computer to see the if the disc is read by the CD-drive.

  2. You need to discuss the advantages and disadvantages of someone in your

    * Windows Media Player for Windows XP - Windows Media Player for Windows XP gives you a single, easy-to-use place to play DVDs, organize music, burn CDs, and more. * Windows Messenger - Windows Messenger is the easy way to communicate with your friends and family in real time.

  1. To specify different types of software for 3 different systems

    This was a difficult o/s to use because not every one knows the commands and the language. Windows is a GUI operating system. The biggest software company in the world, Microsoft, makes windows. There are many types of operating system that are used for different tasks.

  2. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    Device A signals "Hello Device B, are you there?" to which device B repliers, "Yes, I am here A." Finally, device A responds," I see that you are there B." The handshake should also define when each device has finished sending or receiving a message.

  1. File transfer protocols

    splitting up a program into components each of which can be handled separately. This uses a facility called a subprogram. The process of developing a solution as a collection of interconnected subprograms is called Modular Design. Each module has a single complete function and is implemented using the particular subprogram facilities of suitable high level languages.

  2. Machine Shack Management System.

    1.8 Data source(s) and destinations(s) The data I will need is basically the Items Mr. Robertson has in stock, these can easily be taken from the register he keeps and double checked manually in the shop, Once the necessary data has been collected it will be placed in a Stock Table.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work