• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Explain the difference between backing up and archiving of data, state the process taken for both and give reasons why they are necessary.

Extracts from this document...


Explain the difference between 'backing up' and 'archiving' of data, state the process taken for both and give reasons why they are necessary. It is important to know the basic differences between backup and archiving information, in order to prevent loss of important files on a computer. There is a big difference between the two and it comes down to variables between short term and long term storage. Backing up important data files on a computer should be done often, sometimes once a day or more. Thinking of it like a short term insurance policy, backups can be done using USG keys, disks, even to tape. ...read more.


For example, an accountant for a small business that uses QuickBooks will back up his files regularly in order to prevent a disastrous loss of inform. He will entrust that information to an online backup system that is updated at the end of each business day. This way, if a problem occurs with the individual computer or network, then there is a way to resurrect the book without having to enter a month of work. Archiving, on the other hand, is the equivalent of a long term insurance policy for files that are rarely accessed or never changed. ...read more.


Typically, archives have been stored on magnetic tapes in the past, but with cost of online data archiving solutions becoming more practical and inexpensive, you will see more use of them. Offsite data archiving is highly recommended in the even t of a disaster. Another way of looking at the differences is that backup contains multiple restore points, allowing you to go back in time in case of a virus, accidental deletion or accidentally saving over a file. Archived information will only store a singly version of a file and this is rarely changing, if ever at all. Often archived data will also span decades of files. Archiving may require certain policies or rules that approve who have access, how long the records need to be stored etc. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Different ways of data capture

    Ink jet - reasonable price, colour cheap, medium speed and sound * Laser - more expensive,very good quality, expensive colur, faster and quieter SECURITY AND DATA PRIVACY - the recognition that certain data only for authorized personnel e.g doctors. SECURITY - application of safeguards to protect from accidental or malicious destruction of data.

  2. Smart Card System

    After that, the supervisor has to input the student login name, login password and also confirm the password. The students or staffs could change the login name and login password entered by the supervisor. III. Log File In this feature, the supervisor would be able to view the information regard

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    boookings.txt file If noofrec>0 THEN // Number of records greater than 0 then Begin Rewrite(bookingfile); // Begin editing of the file For count:=1 to noofrec do // With all the records Begin Write(bookingfile, bookinglist[count]); // Write all these records into the bookings file End; Closefile(bookingfile); // End the use of

  2. Definition-nature of the problem solved - Car Mechanic business

    He started the business and has been in full control ever since. Interviewing someone lower down in the business, such as a part time employee or perhaps a customer would most likely only provide me with limited knowledge. Following the interview I will try and question an employee to see

  1. The Data Management Structure: Components and the data structure

    ready for each other, taking into consideration the priorities of both, the priorities of other system user of the same resources, and other resources necessary to make the transaction work. If you need more files than are supplied by IBM you can define, create, use, and delete them through system's DDS language combined with the command language, CL.

  2. Investigate Data Communications.

    This group was founded in 1946 and has issue more than 5000 standards on a wide range of areas. Its purpose is to promote the development of standardisation and related activities to facilitate international exchange of goods and services. Standards have been made to cover items from screw threads to

  1. The Value of Data and the Use of Databases

    Thus, the data used is very valuable to the bank. Another example is of an international company that has run two advertising campaigns in two different countries. The one was much more successful than the other. It is important that the company keeps data about the two campaigns in order

  2. Security and Integrity of Data

    Hackers are the people that attempt to do this. Hackers once gaining entry to a system are presented with unlimited options as to how they could damage the system. They could simply copy files, delete them, or bring down the entire system. Protecting a system against hackers has become an extremely important subject, since there is no end to the damage that can be done.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work