Introduction
Over the year, I have completed 5 DT internal assessments. These included AS 1.41, AS 1.43, AS 1.45, AS 1.46, and AS 1.50. In completing these assessments, I have became more familiar with the applications that were used to complete these internal assessments, and has given me a better understanding for file structure.
Assessments Completed
AS 1.43 - First assignment: Website. This required me to create and design a website. I used the application ‘Brackets’. It was important to know common language for Brackets so we could create a better website. I have learnt
AS 1.41 - Second assignment: Database. I had to create a number a documents for an outdoor education group. This assessment taught me how to use …show more content…
Secondary storage can be removable, internal, or external storage. It is used to store long-term information/data so the user can keep their work stored for its next use. RAM is a short-term data storage, and with no power any data in the RAM will be lost. Although RAM allows data to be accessed much faster which speeds up the computer. More RAM allows for more applications running with the same, fast speed.
Managing Threats to Data
Common threats to data consist of Botnets, DDoS (Distributed denial of service), Hacking, etc. You can manage and prevent data threats with antivirus/malware/hacking/etc software. By downloading a legitimate program you can protect your computers data. The software will alert you if there is something out of place in your computer before it’s too late, so you can get it removed.
Use of File Compression
File compression is a process of "compressing" a file/s to use less disk space. Compression works by minimizing redundancy in a file's code. Compression software allows you to take many files and compress them into one file, which is smaller than the combined size of the