• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/38

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

38 Cards in this Set

  • Front
  • Back

What places are you likely to get a virus infection?




Topic 6- INFO 2

-Emails


-Downloads
-Banner adverts on websites


-Optical media

How does a virus cause damage?




Topic 6- INFO 2

A virus is a program that replicate itself automatically and carries some payload to cause damage. Then the computer has a virus copied onto it which causes infection to further cause damage.

What can viruses do to cause damage?




Topic 6- INFO 2

-display annoying messages


-delete programs or data


-use up resources, making your own computer run more slowly.

What are the problems with getting rid of a virus and what should computers have to identify and get rid of them?




Topic 6- INFO 2

The main problem is that viruses can be created all of the time therefore when you get a virus it is not always clear. It is time consuming to sort out the problems. All computers should have a virus checker to detect a virus so it needs to be updated regularly as viruses develop continuously.

What is a Trojan and how does it come about?




Topic 6- INFO 2

A Trojan is a program that performs a legitimate task but carries out an unwanted function. You can gain them by installation from a file off the internet and it secretly delete a file from your hard disk.

What is a worm and how does it form to cause damage?




Topic 6- INFO 2

A worm is a program that keeps replicating itself automatically and as it does it takes more and more disk space and uses a large amount of the systems resources. It slows down systems and affects the performance of a network.

What are the ways in which viruses can spread?




Topic 6- INFO 2

-external email


-internal email


-organisations intranet


-clicking on banner advertisements


-downloads from sites such as game sites

How can you prevent viruses entering an ICT system?




Topic 6- INFO 2

-Use a virus checking software that's up to date


-Don't open unknown emails


-Have an acceptable use policy


-Train staff to be aware of the problems


-Don't allow programs such as games


-Avoid users from using their own removable media.

What does backup mean?




Topic 6- INFO 2

Backup means keeping copies of software and data so that the data can be recovered if it was lost as it is valuable.

What are backup procedures?




Topic 6- INFO 2

Backup procedures are those actions a person can take to ensure regular backup copies are created regularly

Where is best to keep backup copies and why?




Topic 6- INFO 2

Offsite and away from the computer holding the original data. The data could be lost or damaged on site by a fire for example so the data is still in a different building away from a threat so it an be recovered. A way to do this is using removable media.

Why would you want to keep backup copies in a fireproof safe?




Topic 6- INFO 2

In case of a fire they can be kept fireproof for a certain amount of time but also locked away from theft.

What is a backup online service?




Topic 6- INFO 2

A way of backing up essential files online using the internet.

What are the advantages of online backup services?




Topic 6- INFO 2

-Once you tell the system about the data you want backing up you can forget it while it backs up in the background.


-It is encrypted for security
-If data is lost it is stored online so you can access it from anywhere



What are the disadvantages of online backup services?




Topic 6- INFO 2

-Trusting your data to another online organisation

What procedures are there for backup?




Topic 6- INFO 2

-Use a different tape or disk each day on rotation to backup


-Make one person responsible for backup


-Keep backups safe


-Rehearse backup recovery procedures

What is a scheduled backup and when is best to schedule one?


How can they be taken?




Topic 6- INFO 2





A scheduled backup is when you organize a time and date to have data automatically backed up. The system slows down when doing this so it is best to do them at night when not many ICT systems are being used so it is scheduled at the least busy time of the day.


Backups can be taken manually and automatically.

Explain the grandfather, father and son system...




Topic 6- INFO 2

This is used to recreate the master file if it gets lost.


A master file is the most complete version of a file and if it were lost or damaged the whole system becomes useless.




3 generations of files are kept.
The oldest master file is the grandfather which is kept with the transaction file.
These are used to produced a new master file called the father file with its transaction file is used to create the most up to date son file.

What is a backup strategy? What does the backup strategy depend on?




Topic 6- INFO 2

A backup strategy is a plan for taking backups and also covers the recovery of data should the worst happen. It depends on what, when, how and storage.

Explain 'What' backup...




Topic 6- INFO 2

-What needs to be backup up


such as data or some programs



What is full backup?




Topic 6- INFO 2

Full backup is when you make a copy of all the files on a system.

What is Incremental backup?




Topic 6- INFO 2

Incremental backup is when files have changed since the last full backup. It can have an audit trail of the file changes. It backs up sets of data so you can restore the files if necessary.

What is differential backup?




Topic 6- INFO 2

Differential backup is when a backup is made each time further data is added to the set of data that has already been fully backed up. This happens until the next full back up occurs.

Explain 'When' backup...




Topic 6- INFO 2

When it happens depends on how much data changes and how often it changes.

Compare individuals and organisations in the process of backup...




Topic 6- INFO 2

Individuals:


-Taken regularly not just when you remember


-Many do backups at the end of work


-Not many people take back ups of media as it takes a long time to back up


Organisations:


-Realize the importance of their data so they employ computer professionals.


-More systematic


-Taken at the end of the day or more frequently


-Take backups of an evening


-Continuity of service increases the expensive of the backup option they choose.

Explain 'How' backup....




Topic 6- INFO 2

Depends on storage capacity needed.

What does the choice of backup device and media depend on?




Topic 6- INFO 2

-Storage capacity needed


-Portability of device


-Speed of transfer


-Speed of access


-Ability to be connected to different computers or other devices.

What is magnetic tape?




Topic 6- INFO 2

It is an ideal backup medium which is cheap and has a high storage capacity.
Can be exchanged with any compatible drive.
- Large organisations use them

What is a magnetic disk?




Topic 6- INFO 2

This takes the contents of one magnetic disk and copies it onto a different magnetic disk

What is optical media?




Topic 6- INFO 2

E.g. CD-R
CD-RW




The transfer rate is low so backups take longer

What are pen/flash drives?




Topic 6- INFO 2

Popular as they are small and portable and ideal for backing up small amounts of data but can be easily lost or stolen.

Why do organisations have a single person to take backups?




Topic 6- INFO 2





This is because backing up is taken seriously and not left to chance. It allows the person to have a strategy and check the data can be recovered quickly. It is easier for one person to have responsibility so there is less confusion.

What is a recovery procedure?




Topic 6- INFO 2

It is put in place to get ICT systems working again should there be any loss of ICT syste.

What are some things that need to be considered in a recovery procedure?




Topic 6- INFO 2

-Alternative accommodation should the building e destroyed


-Availability of staff at short notice to help recover backups


-Availability of hardware to run the backups on


-Training staff to instruct people to get things back to normal


-Availability of alternative communication line to get facilities back to normal.

What is the need for continuity of service?




Topic 6- INFO 2

Some applications demand that systems are critical because of how critical to the business facilities are. The ICT system needs to keep running so a user wont notice anything has happened. E.g. online booking systems so if the system is down they could loose money and business.

What are RAID systems and what do they do?




Topic 6- INFO 2

It is a system used for backup. It uses magnetic disks on which to store the data. There are different RAID systems and in one type the system will automatically take over if the original data is damaged.

What is clustering for?




Topic 6- INFO 2

This is used to improve network security. File servers and storage devices are networked together so that the dependence on one file server and one storage device is eliminated.

Explain the single server with storage devices and two servers with two storage devices...




Topic 6- INFO 2

Single server- Single storage device


Data would be lost if either failed.




Single server and two storage devices


Data is copied twice on each server. If the server fails all could be lost but if the storage device is lost the data is safe.




Two servers and two storage devices


If either a server or a storage device fails the other server or storage device takes over.