Week 4 Handling Computer Files II
Week 4 Handling Computer Files II
The teacher uses the instructional resource (a laptop) to carry out the BASIC operations
thus:
- Data loss.
- Overwriting.
- Accidental deletion: User error(file recovery software like FileSalvage can be used to
recover such losses)
- Computer Viruses and Malware:(Virus protection using updated anti-virus can be
used to prevent this)
- Physical damage of hard drive via mishandling or accidents( safe keeping and using
them within the right cooling temperature can prevent this)
- Accidental formatting: user to be careful to select the correct drive in the case of
formatting
- Head crashes :the user should ensure that the read write heads on hard drive should
not drop,hard drive repair is done in a special clean room where no speck of dust is.
- Logical Errors :they are caused by system or file corruption, software problems and
invalid entries all of which should be avoided but can be fixed using disk utilities.
- Continued use after signs of failure:early signs of drive failure e.g clicking or
grinding noises, system hangs, random file deletion etc should not be ignored.(back-
up immediately and replace drive).
- Power failure; leads to loss of unsaved files so always save (use uninterrupted
power supply or UPS).
- Firmware corruption: firmware on a hard drive is a code that controls the way it
operates to read and write data to disk, use data recovery services and always have
back ups.
- Natural disasters: lightning strikes, flood, fire, earthquakes etc(store back-ups off
site of system location)
OVERWRITING AS AN EFFECT OF FILE INSECURITY.
In most cases viruses are responsible for overwriting computer files and at times deleting
them completely. The user therefore must set file system limits instead of allowing
unlimited as the default. Also, world-writable directories are dangerous since they allow a
cracker to add or delete files as he wishes..
i. Use of backup.
ii. Use of anti-virus.
iii. Use of password.
iv. Use of proper label of storage devices.
It is a duplicate used for data protection and restoration of disinfected files. Its main feature
is making it possible to restore processed objects at any time. The files within the backup
storage are stored in internal binary formats so they cannot be a threat.
The teacher uses the instructional resource to show the students how an anti-virus works
after explaining that the anti-virus is a computer program designed to combat the attacks
of viruses. Hence it detects them and have the capacity to delete them or completely nullify
their effects. E.g Norton anti-virus, Avast anti-virus etc.
The teacher demonstrates the use of password using the laptop computer system as an
instructional resource after having explained the password as follows:
A password is a secret word or phrase that must be used to gain admission into something
and in the computer world, it is a string of characters that allows access to a computer ,
interface or system therefore it protects user’s privacy and prevents identity and other
vital confidential information from being stolen.
The ability of a user himself to be able to label storage devices, folders, files, documents etc
with articulate clarity also enhances file security such that every information can be
accounted for and located with ease.
ASSIGNMENT: