0% found this document useful (0 votes)
26 views2 pages

Week 4 Handling Computer Files II

The document discusses basic file processing statements for reading and displaying files, emphasizing the importance of opening, reading, and closing files. It outlines the effects of file insecurity, including data loss and overwriting, along with various causes of data loss such as accidental deletion, computer viruses, and physical damage. Additionally, it presents methods for file security, including the use of backups, anti-virus software, passwords, and proper labeling of storage devices.

Uploaded by

ade
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views2 pages

Week 4 Handling Computer Files II

The document discusses basic file processing statements for reading and displaying files, emphasizing the importance of opening, reading, and closing files. It outlines the effects of file insecurity, including data loss and overwriting, along with various causes of data loss such as accidental deletion, computer viruses, and physical damage. Additionally, it presents methods for file security, including the use of backups, anti-virus software, passwords, and proper labeling of storage devices.

Uploaded by

ade
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

WEEK 4

TOPIC: HANDLING COMPUTER FILES II

BASIC FILE PROCESSING STATEMENTS TO READ AND DISPLAY A FILE.

The teacher uses the instructional resource (a laptop) to carry out the BASIC operations
thus:

- OPEN the file in sequential INPUT mode.


- ( This prepares the file for reading)
- Read data in from the file.
- (Use Power BASIC for only INPUT # or LINE INPUT # statements).
- Close the file

EFFECTS OF FILE INSECURITY.

- Data loss.
- Overwriting.

THE CAUSES OF DATA LOSS.

- Accidental deletion: User error(file recovery software like FileSalvage can be used to
recover such losses)
- Computer Viruses and Malware:(Virus protection using updated anti-virus can be
used to prevent this)
- Physical damage of hard drive via mishandling or accidents( safe keeping and using
them within the right cooling temperature can prevent this)
- Accidental formatting: user to be careful to select the correct drive in the case of
formatting
- Head crashes :the user should ensure that the read write heads on hard drive should
not drop,hard drive repair is done in a special clean room where no speck of dust is.
- Logical Errors :they are caused by system or file corruption, software problems and
invalid entries all of which should be avoided but can be fixed using disk utilities.
- Continued use after signs of failure:early signs of drive failure e.g clicking or
grinding noises, system hangs, random file deletion etc should not be ignored.(back-
up immediately and replace drive).
- Power failure; leads to loss of unsaved files so always save (use uninterrupted
power supply or UPS).
- Firmware corruption: firmware on a hard drive is a code that controls the way it
operates to read and write data to disk, use data recovery services and always have
back ups.
- Natural disasters: lightning strikes, flood, fire, earthquakes etc(store back-ups off
site of system location)
OVERWRITING AS AN EFFECT OF FILE INSECURITY.

In most cases viruses are responsible for overwriting computer files and at times deleting
them completely. The user therefore must set file system limits instead of allowing
unlimited as the default. Also, world-writable directories are dangerous since they allow a
cracker to add or delete files as he wishes..

METHODS OF FILE SECURITY.

i. Use of backup.
ii. Use of anti-virus.
iii. Use of password.
iv. Use of proper label of storage devices.

USE OF BACKUP AS A METHOD OF FILE SECURITY.

It is a duplicate used for data protection and restoration of disinfected files. Its main feature
is making it possible to restore processed objects at any time. The files within the backup
storage are stored in internal binary formats so they cannot be a threat.

USE OF ANTI-VIRUS AS A METHOD OF FILE SECURITY.

The teacher uses the instructional resource to show the students how an anti-virus works
after explaining that the anti-virus is a computer program designed to combat the attacks
of viruses. Hence it detects them and have the capacity to delete them or completely nullify
their effects. E.g Norton anti-virus, Avast anti-virus etc.

USE OF PASSWORD AS A METHOD OF FILE SECURITY.

The teacher demonstrates the use of password using the laptop computer system as an
instructional resource after having explained the password as follows:

A password is a secret word or phrase that must be used to gain admission into something
and in the computer world, it is a string of characters that allows access to a computer ,
interface or system therefore it protects user’s privacy and prevents identity and other
vital confidential information from being stolen.

USE OF PROPER LABEL OF STORAGE DEVICES AS A METHOD OF FILE SECURITY.

The ability of a user himself to be able to label storage devices, folders, files, documents etc
with articulate clarity also enhances file security such that every information can be
accounted for and located with ease.

ASSIGNMENT:

1.Outline 5 other possible causes of data loss.

2.Explain use of anti-virus as a method of file security

You might also like