Command Prompt

Superior Essays
Introduction
Organizations handle vast amounts of data. A large organization may have to deal with terabytes or petabytes worth of data. For a company to be successful, there must be a meaningful way in which the data that is used as a part of company operations is managed. This includes an effective file management system, in which the files are appropriately secured, and the information is backed up in order to meet company requirements. The files generated as a part of company operations are company property, and as such the information must be managed effectively.
File Management
Managing files is a fundamental aspect of business. Organizations have become more dependent on computers, therefore there has been less of a need for physical
…show more content…
Two methods include Windows Explorer, as mentioned, and through a command prompt. Windows Explorer is more suited towards the business user. Nearly everyone who has used a Windows computer is familiar with Windows Explorer, although it may not have been used to its full potential. Managing files and folders in the home is not that much different than managing information in a business environment. Most individual will logically organize the information so that based on descriptive names it should be well understood what it contained in the directory (Pacchiano, 2011).
The command prompt is likely to be used by system administrators to manage files, and permissions. That is not to suggest that a business user would not understand how to use the same tool, although it may not be as common. The command line can be used to do all the things that Windows Explorer accomplishes, it simply requires more discrete input, and may not be as intuitive as Windows Explorer. The command prompt offers the ability to set specific attributes on a file, delete files, create directories, and many other similarities with the graphical interface of Windows Explorer ("Wikibooks,"
…show more content…
The operating system offers the ability to keep different versions of system and files. An individual is not limited to the built-in features of Windows backup. Information may be copied to alternate locations as a backup mechanism, such as an external drive.
Redundant storage is an effective means of backing up files. Automation could be employed to move critical files to an alternate location for safe storage. The alternate location could then be backed up to tape or some other type of long term storage media. Effective file management must include a definition of what is critical to be backed up, and what is not (Needleman, 2015).
Conclusion
File management is one of the most important aspects of an information technology function within a business. Files are produced for a reason, and the files must be managed and secured effectively. In addition to the appropriate security, the information must be backed up and recoverable if needed. An organization will produce data, and the need to manage the data is often overlooked; however, it is not any less important than the business itself. Effective file management and the business go

Related Documents

  • Improved Essays

    Nt1310 Unit 4 Test Paper

    • 419 Words
    • 2 Pages

    1. Maintains an exact replica of one disk on another offering 100% fault tolerance. 2. Data redundancy - If one disk fails, data can be recovered from the other. 3.…

    • 419 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Each employee should be held responsible for ensuring that their daily backup has taken place without any errors. If errors should arise, an IT Professional such as myself should be notified…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 3 Paper

    • 985 Words
    • 4 Pages

    It is very important to have a current and accurate data backup plan for emergency situations. Losing all of your data or maybe even just some of it could have dire consequences for the company. These consequences could be in the form of compliance infractions and come with steep fines all the way to laws suits for loosing customer data or classified information. Having the ability to restore this data if it is ever destroyed or compromised could save our company from losing all credibility and going bankrupt. Having a good data backup plan ensures that we will be able to restore our company in a disaster to an acceptable state of operation without losing much if any information necessary to keep our customers happy and business running…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Media information systems should be controlled and physically protected to prevent damage to assets and interruption to business activities. Appropriate procedure should be established to protect documents, computer media, the data input / output and documented system from damage, theft and unauthorized access. 7. Attention should be given to protect the integrity of electronically published information to prevent modifications that may harm the company's reputation. The information provided to the public, such as information on the web that can be accessed via the internet must be in accordance with the laws, rules, and regulations in the jurisdiction 8.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    1.02.01 Warning Banner

    • 567 Words
    • 3 Pages

    Sub section 9.1.02.01 – Warning Banners Current Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers,desktops, VPN connections, network devices). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government regulations and UnitedHealth Group directives. Modify Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers, desktops, VPN connections, network devices, application elevations). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    Data Confidentiality: When you keep important data it is important that the data doesn’t go out to the wrong hands. So if a business data is suddenly leaked online or maybe stolen, then this can result in a huge loss for the business and this can potentially put the business out of business. To overcome this problem, then you would need a good security program which can safeguard against any breach in confidentiality. Data Integrity: This is used to ensure that the most important data is secure and also makes sure that the data isn’t messed around with. If any of the data has been messed around with then this can result in major problems.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    This enables all data to be safe and stable on your computer This is when you are confident that your computer and its components or a person will do what is expected of them This is the number of files and folders you use which can grow quickly over the course of a project. If they’re not well organised, you can waste a lot of time trying to find what you’re looking for.…

    • 156 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Macy’s Inc. relies extensively on technology and on its information systems to process transactions, compile results and operate its business. As an advantage, Macy’s Systems and Technology, Inc. engages in creating, collecting, and directing pieces of data to form management tools. The company implements integrated retail, e-commerce, and data warehouse systems. As a disadvantage, the information systems can be subject to interruption from power outages, damage from viruses, cyber-attack or other security breaches. In these cases, companies like Macy’s may experience the loss of critical data and delays in its processes.…

    • 111 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The aim of this paper is to outline the dynamics of Walters Security. Walters Security’s main objective is to ensure a high level of network and information security for reach client. Customer and client information, payment information, personal files, bank account details- all this information cannot be fully restored once it has been lost or breached by criminals. The goal of this firm is developing an interdisciplinary research platform to develop a framework and provide benefits to eliminate breach-related vulnerability of information.…

    • 762 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Panicked Research Paper

    • 429 Words
    • 2 Pages

    Panicked Paper Against Shrouded Software How has art adapted to the modern technological age? An important factor of art is displaying it so it can be admired, but each style of art has different ways it can be stored for later uses. In contribution, long-term, the environment is by some means affected due to the media used. Generally, art can be beautiful, strange, and many other things, but it's the journey it captures that holds meaning. Preservation of artwork is vital to upkeep the piece’s integrity, but the location of storage may be physical or virtual.…

    • 429 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Business Case for Investment Michael Buckley, Jerimiah Heter, Terry Phillips, Nathanael Tyson, Julia Wynn CMGT / 445 April 18, 2016 John Sallee Business Case for Investment (Terry) Business managers and executives want and need to see a plan along with a business case or model that clearly defines the hardware and software needed for a proposed information system. As such, a key part of this process is to show why an expenditure is necessary and what kind of return on investment the company can expect to gain from it. The business case or model should demonstrate the necessary security that is necessary to protect company assets and systems such as servers and database architecture. The detail necessary to create the business case…

    • 2457 Words
    • 10 Pages
    Superior Essays
  • Improved Essays

    In all organisations, there are policies and procedures that control access to confidential information. Types of information that is sensitive includes personal information e.g. colleagues age, address, medical history and details of personal relationships. Sensitive data that is also available but must be kept confidential is financial information including how much they earn, also information on customers or contacts that would be highly valuable to other organisations. Businesses receive and produce a lot of information all the time and it is vital that this information is stored safely and can be found quickly. To access this, a suitable system needs to be in place to allow everyone to find the documents they need.…

    • 256 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    This is why a backup system is…

    • 435 Words
    • 2 Pages
    Improved Essays
  • Brilliant Essays

    The next best practice is information management. The author believes that technology is not the answer but an enabler for companies to manage their information as an asset. The main purpose of managing information as an asset is to benefit the customer. "There has to be a sustained commitment to change attitudes and behavior if technology is going to help in leveraging information assets for the benefit of the customer." (Unruh, 1997)…

    • 3010 Words
    • 13 Pages
    Brilliant Essays
  • Decent Essays

    Action Response efficiently creates, validates and transmits the custodian instructions and records the confirmation of its receipt. The client's custodian or proprietary data files are entered into Action Response. Then, rules-based logic automates the matching process of the corporate action event with the custodian or proprietary file formats. A notification & response record is created for each voluntary corporate action, including an interface to the client's accounting platform, which displays event position information.…

    • 676 Words
    • 3 Pages
    Decent Essays