0% found this document useful (0 votes)
24 views1 page

Organisation of Data 2

Uploaded by

jude
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views1 page

Organisation of Data 2

Uploaded by

jude
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

AS Computer Science

Organisation of data (2)

Key terms
Terminology File security Data validation

Term Definition Aims to secure data against unauthorised Presence check:


if dataEntered = “” then
access, hardware failure, accidental deletion, ensures a required output error message
File security The control over which and natural disasters such as fires and floods. field cannot be left end if
users can access which Clients, customers, and employees trust blank.
files, and the limitations on organisations with their sensitive information.
Format or pattern check: ensures data matches
what users can do to the A security breach might put people at risk and
a specific pattern, such as the format of a
files in a computer. affect the future of the organisation. Backups
postcode.
are essential to restore data if lost.
Backup A copy of computer data 1 if postcode <> format(LL00 0LL) then
taken and stored elsewhere Backup methods 2 output error message
3 end if
so that it may be used to Full backup: allows the computer system to
restore the original after a be restored as it was at a given point in time,
data loss event. Length check: used to ensure an input string
including the operating system, all applications is a sensible length,
and all data. Frequent full backups result in e.g. the number of
if len(telNo) <> 11 then
Data validation A systematic check that easier recovery but can be slow and require lots output error message
rejects or accepts data digits in a phone end if
of storage. number.
based on a set of rules;
Incremental backup: captures only the changes
a basic software coding Type checks: used to ensure input data is a
made since the last incremental backup. Saves
practice that is performed particular data type, e.g. quantity ordered to be
both time and storage space and ensures that
before processing user integer or cost to be real.
your backup is up to date.
input.
Differential backup: captures only the changes Range checks: used to ensure input is within
Verification A process carried out made since the last full backup. a specified
if hours < 0 OR hours > 15 then
to ensure that the data range, e.g.
Backup destination hours to be
output error message
entered exactly matches end if

the original source. External hard drive: portable and > 0 and < 15.
comparatively inexpensive and widely used
Lookup value: looks up acceptable values in an
storage media.
array or table.
File update Cloud backup: secure offsite storage. Files
remain safe and accessible at any time. The vital
purpose of cloud storage is to supplement your
Sequential: event records in hard drive; the vital purpose of cloud backup is
Data verification
a transaction file are sorted MASTER FILE to replicate it.
TRANSACTION
and then merged with the Double entry: comparing two versions of input
Network Attached Storage (NAS): uses NAS
FILE

master file records. The data to inform the user if the entries are not
device. Accessible from anywhere on your
sequential update algorithm UPDATE
identical, e.g. ‘re-enter email address’.
PROGRAM network.
produces a new copy of
the master file. The existing Grandfather-father-son: method for storing Visual checks: proof reading of input data on
master file is retained as a
AUDIT
REPORT NEW MASTER generations of a master file that is continuously screen to check for errors.
FILE

back-up. updated. The son is the current file, the father is


a copy of the file from the previous backup, and Check digit: calculations
Direct access: events are processed in the the grandfather is a copy of the file from the applied to input data to produce
order in which they originally occurred. Each backup before the father version. check digits and repeating the
event procedure reads and updates master calculations to ensure results
Transaction log: a record of all write operations
records. A copy of the original master file match.
in a database, used for incremental backups
should be made before the update, as this will and data recovery.
be over written.

You might also like