ITS B1.5 By Josh Clarke

Storing Hardware To stop physical damage from happening to my hard drive I would have to store it in a secure location that is safe from a flood getting into the room or a fire getting into the room. Furthermore, If I had a server I would have an uninterruptable power supply so the power wouldn’t trip and shut off also If I had a server I would put a passcode on the door to the room so that I a random person won’t just be able to stroll in.

GPS tracking To stop my phone being hacked into or my data being deleted I always make sure I have ‘Find my iPhone’ on at all times. By doing this if my phone does get stolen I would trace my phone and get it back because it could have some valuable data on.

Surge Protector I would use a surge protector to protect my electronic equipment from a power surge. Power surges generally occur when there is a thunder storm and the lightning strikes the national grid then there is a chance that the power line can absorb the power and send the power down the cables to your house over flow your sockets with power and cause anything that is plugged into them to explode or not work.

Anti–static materials and tools When handling with electronic equipment I will use anti static equipment like an anti static mat or a wristband. Doing this will allow me to not damage the equipment in the computer or server which is good because if I did damage something then that could severely effect what is on the computer / server. Furthermore, when editing my computer / server I will need to use the correct tools to do the task efficiently also if I use the wrong tool then that could damage the equipment and doing so may severely affect my data.

RAID storage RAID stands for Redundant Array Independent Disks. It provides a way of storing data in different places, on multiple hard disks. By placing data on multiple disks, input/output operations can overlap in a balanced way, improving performance. Since multiple disks increase the mean time between failures, storing data redundantly also increases fault tolerance.

Scheduled Backups I would create a calendar with events on like a scheduled backup because always keeping up to date with backing up your data is very helpful because it means that if there is data loss then you will have a back up to replace the missing documents.

Setting up passwords Setting up passwords on user accounts to block any unauthorised access from other users or random people. I can also set up passwords on different files so that when I leave my work station no one can access my files and delete them or steal them and I can create network shared folders and files and only give access to certain people just in case of data theft.

Using anti-virus When setting up my computer I will use anti virus and anti malware software to prevent against data corruption or loss. This is crucial because when setting up my computer I preferably want to keep my files and not lose them. It may cost for me to get the anti virus and malware software but it will help greatly.

Using a firewall When setting up my computer I will set up or change the firewall so it will protect me against any unauthorised network access. For example, someone comes on to my network and tries to access my account but the firewall will block them and deny their access. This is effective because if you want to secure your data this is something you can do so they don’t get stolen.

Adjusting internet security settings On my computer I like to browse the internet so I may have to adjust the security settings so that when I go onto a website I don’t get malware on my computer and trying to steal or corrupt my data from scripts.

Enabling macro security Stops macros from running when opening a document. On my computer when setting up Office on it I can enable the macros security settings so when I run a Word Document it will open and usually run the macros. Although, if I change the macros settings so that a pop up appears when the document loads asking me if I want to run the macros. I can click yes or no if I want to but I must be wary of what the macros is because it could copy or delete my files but the macros could be something good like you may use it for work.

ITS B1.5.pdf

damage the equipment and doing so may severely affect my data. Page 5 of 12. ITS B1.5.pdf. ITS B1.5.pdf. Open. Extract. Open with. Sign In. Main menu.

106KB Sizes 1 Downloads 169 Views

Recommend Documents

Japan: Finding Its Way
In spite of more than a century of prayer and the efforts of dedicated missionaries and national Christians, the soil for the. Gospel in Japan remains difficult.

Japan: Finding Its Way
Page 1 ... church even if we waited for 10 years. The. Network encouraged us to step fan/vard and succeed. " ... victims who create jewelry from broken pottery.

ITS/2009/11/1225
Nov 30, 2009 - Note : The design, schematic and physical layout is similar to the above except the difference of plug sockets 18 more than the classroom ...

Neural Network Toolbox - Share ITS
are used, in this supervised learning, to train a network. Batch training of a network proceeds by making weight and bias changes based on an entire set (batch) of input vectors. Incremental training changes the weights and biases of a network as nee

Latchup & Its Prevention.pdf
These BJTs for a silicon- controlled rectifier with positive feedback and. virtually short circuit the power and the ground rail. • This causes excessive current flows ...

13 its 19 111
Jun. 23, 2009. (54) COMPLEX NUMBER MULTIPLIER. OTHER PUBLICATIONS. -. Shin Kiw et al: “A Com lex Multi ler Architecture Based. 75 I t : L M t l. D 1. FR '.

The watch; its construction, its merits and defects, how to choose it ...
Page 2 of 73. £. THE WATCH;. ITS CONSTRUCTION, ITS MERITS AND DEFECTS,. HOW TO CHOOSE IT,. -AND- HOW TO USE IT. ILLUSTRATED WITH ENGRAVINGS. BY H. F. PIAGET,. A Watchmaker of forty years practical experience. TO WHICH IS ADDED,. A SHORT ESSAY ON CLO

patience is like its noun, bitter to the taste. But its ... -
To subscribe please send an email to: [email protected]. Please reply to the confirmation email. It is advised not to use the join button as this needs further parameters set. ِميِحهرلا ِن. َٰ مْحهرلا ِ

PDF Download The City in History: Its Origins, Its ...
... Mumford Lewis The city s development from ancient times to the modern age ... Its Prospects ,ebook design The City in History: Its Origins, Its Transformations, ... Its Origins, Its Transformations, and Its Prospects ,ebook reader software The ..

6. Philosophy and Its Teaching
relegated to the appreciative mention in passing of important empirical discove- ries or theoretical innovations. And professional training in the sciences, both.