Preview

Advantages of computerised filling

Satisfactory Essays
Open Document
Open Document
141 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Advantages of computerised filling
Advantages of computerised filling
Files exist in one place and can be viewed by as many people at the same time
Vase amount of floor space can be saved.
Strict control procedures can be implemented using software.
No duplicate files exist, which means that all files are current.
It is easy to transfer non-active files from the hard disk to magnetic tape.
Retention and deletion procedures can be enforced, as a systems administrator will be charged of the file server.

Disadvantages of computerised filing
If the network breaks down, user will not be able to access files.
There may be delays if the system is heavily used.
The files are unavailable to user when the system is being backed up.
If the system is not properly managed, unauthorised users may gain access.
Information may be deleted of procedures are not enforced

You May Also Find These Documents Helpful

  • Powerful Essays

    NT1430 Lab2 Joy Brewer

    • 989 Words
    • 4 Pages

    When you perform the chmod 755 filename command you allow everyone to read and execute the file, and the file owner is allowed to write to the file as well…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    The company that I work is need of a file system, one that can support 5000 users or more. This particular system was designed to allow multiple users to access the same file, in doing so there must be a way to protect the data that is being accessed by all of those users.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    There are some really good programs out there the one I found that is quick and fast is Drop box. With Drop box you just place your file in this program and it is instantly available to anyone who is sharing your drop box account.…

    • 596 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    NT2670 Midtern Questions

    • 842 Words
    • 3 Pages

    What directory enables you to use a web site to publish files located anywhere on the network?…

    • 842 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    If multiple people need access to one file, this is commonly done by placing the users into groups, and assigning the groups and users various levels of permission access. There is a hierarchy where groups are on top and access control lists are underneath. The groups are owner class, group class, and other class. The other privileges are read, write, and execute. When a user creates a file, they are automatically made the owner. They can grant others into the group class and other class. Directory lists have 10 spaces or bits on the left hand side. The first space on the left is either a ‘-‘ for file, or a ‘D’ for directory. Stallings (2012) stated,“ Nine of the protection bits specify read (r), write (w), and execute (x) permission for the owner of the file, other members of the group to which this file belongs, and all other users” (p.558). The first three are for owner, next three are for group and last three are for other.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Good Essays

    e. Computer files, programs, or software that allow files to be shared via the internet (peer-to-peer clients, email programs, or FTP programs).…

    • 808 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Unit 4222-307 Answers

    • 767 Words
    • 4 Pages

    The Retention and Disposal Policy provides a corporate framework and guideline for the data and how it is stored, how long it is stored for and how it is safely and securely disposed of.…

    • 767 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    D) Active Directory Rights Management Services can control what a user is allowed to do with data on a server. You can control printing, copying, transferring and so on.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 3 Quiz

    • 2246 Words
    • 9 Pages

    10) Which of the following is a technology used to place content on a shared file server in a company?…

    • 2246 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Is 305 Week 3 Quiz

    • 577 Words
    • 3 Pages

    The use of USB’s or disk, the files could contain viruses and infect other files or applications on the network. No acceptable user’s policy, AUP, or lack of training employees on the correct usage of the network. The users staying signed into their…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1. You are the network administrator for a new company that has 10 users and plans to add five more users within a year. The files need to be accessed by all 10 users and each user must have different security rights. What kind of network would you install and how would the pieces and components of this network relate to each other? Define each component.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Omega Inc. Bia

    • 2982 Words
    • 12 Pages

    Two weeks ago, Omega experienced a significant loss of proprietary data (estimated value $550,000.00) that was stored electronically in an Oracle database in their main office in Reston. The data was unrecoverable and backups were not being routinely maintained, so no restoration was possible. Although he has no hard evidence, Omega’s CTO believes that the loss resulted from deliberate deletion of files by a systems administrator from the Kansas City office that had been “let go” several weeks prior to the loss. Needless to say, the CTO has been tasked to “get things under control.”…

    • 2982 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Mis Nimit Bhatt

    • 405 Words
    • 2 Pages

    * They will not search for files everywhere, just type it in the search box and one can view it.…

    • 405 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Apart from taking backup copies, many other various security methods are used to secure the data from any kind of damages, viruses, losses…etc.…

    • 369 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    “Data on the computer can be deleted, modified, or destroyed.”(Taylor, Fritsch, Liederbach, Holt, 2012). It is very important for evidence to be collected, preserved, and examined right away. In most cases, 24 hours proves to be too late to recover non-tampered evidence. “Some computers have automatic wiping programs in case a new person touches the wrong key on the keyboard.” (http://www.supremecourt.gov.pk/ijc/Articles/10/2.pdf). Cyber forensics experts requires special tools which will be able to access any data available on the mass storage media including deleted files and data in unallocated disk areas. Although time is of the essence, it is very important that law enforcement agencies follow the search and seizures laws. A warrant must be issued first before any evidence can be gathered, searched, or…

    • 538 Words
    • 3 Pages
    Satisfactory Essays