Managing Data. When records in a file need to be accessed there are three ways of doing it;

Size: px
Start display at page:

Download "Managing Data. When records in a file need to be accessed there are three ways of doing it;"

Transcription

1 File Access Managing Data When records in a file need to be accessed there are three ways of doing it; a) Serial Access This means...start at the beginning of the file and access each record in turn until the one needed is found. If files are stored on magnetic tape then serial access is the only method of access. b) Direct Access The computer can calculate (from the key field) where the record is stored in the file, and can then access the record directly from that position. Direct access of records will generally be much faster than serial access. Direct access can only be used if files are stored on media such as disk, CD, DVD... Direct access is also known as random access c) Sequential Access Sequential file is a file where records are physically stored in a specified order one after the other (according to the key) and they have to be read in that order (in the order in which they are stored on the medium). To read record 10, for example, you would first need to read records 1 through 9. This differs from random access, in which you can read and write records in any order. Tip: Access means Exercise 1: File Access read or write a) of records involves accessing each record in turn. b) is used if the computer can calculate where a record is stored and directly accesses only that record. c) Applications which need fast access to data will need to use File Types Master File A collection of records related to one of the main subjects of an information system, such as customers, employees, products and vendors. Master files contain descriptive data, such as name and address, as well as summary information, such as amount due and year-to-date sales. Transaction File Transaction processing systems are the backbone of an organization because they update constantly. At any given moment, someone may need an inventory balance, an account balance or the total current value of a financial portfolio. Page 1

2 The data in transaction files is used to update the master files, which contain the data about the subjects of the organization (customers, employees, vendors, etc.). Backup File Duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed Archive File A file that has been saved in a different location than the original for backup purposes. An archive is a collection of files packaged together as a sort of final backup into one compressed file. Do not confuse archiving with regular backups. File Generations When a transaction file is used to update a master file, the process creates a new master file. Sometimes the old master file is referred to as the father file and the new master file as the son file. When the update is next run... the son file becomes the father file, the father file becomes the grandfather file..etc... This is a method for storing previous generations of master file data that are continuously updated. The son is the current file, the father is a copy of the file from the previous cycle, and the grandfather is a copy of the file from the cycle before that one. In practice companies will keep several generations of files. This is because there may be a problem (eg disk crash, fire or theft) and the update runs may have to be done again to re-create the current master file. Old files should therefore be stored away from the computer installation, preferably in a fireproof strong room. The diagram below illustrates how a master file is updated using a transaction file, which has been previously sorted. Page 2

3 Exercise 2: When a master file is updated, the new master file created is known as the file and the old master file is archived as the file. At each update...the son becomes the father, the father becomes the grandfather etc... Several of master files may be kept for disaster recovery purposes. File Update The data on a transaction file is used to update some of the fields on a master file. The transaction file must be sorted in the same order as the master file. This is generally done in a batch processing system where the transactions are recorded on the transaction file and later used to update the master file. How it works (in words) : 1. A new master file is created. 2. For each transaction record, the records of the master file are read and written onto the new master file until a matching record is found. 3. The data is updated and the record written onto the new master file. 4. When the last transaction record has been processed, the remaining records on the master file are read and written onto the new master file. How it works (System flowchart) : Here, the transaction and master files are stored on magnetic tape and used as input for the update process. All updated (and unaltered) records are stored on the new master file. Example : A master file of stock is kept for a clothes shop. Some of Page 3

4 the records are shown in this table : ID Garment Price No Sold this year 305 Sweater (Red) Sweater (Blue) Shorts (Size 12) Shorts (Size 14) Socks(Grey) Socks(Black) Todays transactions are shown in the transaction file below... ID No Sold today The key field is the ID field. The master file in practice would have many more fields than this...and many more records! The transaction file must be sorted in the same order as the master file (using the key field) The resulting new master file is shown in the next table : ID Garment Price No Sold this year 305 Sweater (Red) Sweater (Blue) Shorts (Size 12) Shorts (Size 14) Socks(Grey) Socks(Black) The updated data is shown in this table. Note that some records will have remained unchanged. Exercise 3: The contains all the main data for a system. A contains recent data which is used to update the master file. A is created onto which the updated or unchanged records are written. The old master file can then be archived. The transaction file must be before the update process takes place. Page 4

5 Common File Operations Sorting Files may be sorted into order of a field. The records are arranged in ascending or descending order (numerically or alphabetically). If records are sorted it is much easier and quicker to find a record. Searching Queries are used to find records which match certain conditions. Simple query - Using one field. Eg (NAME = 'Smith') Complex query - using two or more fields with OR, AND or NOT. Egs (NAME='Smith') AND (BALANCE > 100) (PET='Dog') OR (PET = 'Cat') (PET = 'Dog') AND NOT (Type='Spaniel') Wildcard query - In alphabetical fields * may stand for anything. Eg (NAME = 'Sm*') will include all names starting with Sm - Smith, Smithers, Smedling and so on... Adding new data A new record may be added to a file. Eg A business may start to sell a new brand of item. Deleting data A record may be removed from a file. Eg A business discontinues the selling of an item. Editing data A record in a file may be changed. Eg If the price of an item changes. Page 5

Chapter 2 Introduction to Transaction Processing

Chapter 2 Introduction to Transaction Processing Chapter 2 Introduction to Transaction Processing TRUE/FALSE 1. Processing more transactions at a lower unit cost makes batch processing more efficient than real-time systems. T 2. The process of acquiring

More information

File Organization. Serial: Records are accessed in the order in which they were stored.

File Organization. Serial: Records are accessed in the order in which they were stored. File Organization Types of Access Serial: Records are accessed in the order in which they were stored. Sequential: Records are accessed in descending or ascending key sequence. Storage Medium: Magnetic

More information

Chapter 2 Introduction to Transaction Processing

Chapter 2 Introduction to Transaction Processing Chapter 2 Introduction to Transaction Processing TRUE/FALSE 1. Processing more transactions at a lower unit cost makes batch processing more efficient than real-time systems. T 2. The process of acquiring

More information

4. The portion of the monthly bill from a credit card company is an example of a turn-around document.

4. The portion of the monthly bill from a credit card company is an example of a turn-around document. Chapter 2 Introduction to Transaction Processing Introduction to Accounting Information Systems, 8e Test Bank, Chapter 2 TRUE/FALSE 1. Processing more transactions at a lower unit cost makes batch processing

More information

Unit 3 Part B. Computer Storage. Computer Technology

Unit 3 Part B. Computer Storage. Computer Technology Unit 3 Part B Computer Storage Computer Technology Storage The place in the computer where data is held while it is not needed for processing A storage device is device used to record (store) data The

More information

Introduction to Transaction Processing

Introduction to Transaction Processing Modul ke: Introduction to Transaction Processing Fakultas Fakultas Ekonomi & Bisnis Iwan Setiadi, SE., M.Si Program Studi Akuntansi www.mercubuana.ac.id A Financial Transaction is... an economic event

More information

Back up and Restoration Policy. of VIJETA BROKING INDIA PRIVATE LIMITED

Back up and Restoration Policy. of VIJETA BROKING INDIA PRIVATE LIMITED Back up and Restoration Policy of VIJETA BROKING INDIA PRIVATE LIMITED Table of Content 1 Overview... 3 2 Purpose... 3 3 Scope... 3 4 Definitions... 3 5 Timing... 4 6 Policy... 4 7 Backup of Older Versions...

More information

Collector and Dealer Software - CAD 3.1

Collector and Dealer Software - CAD 3.1 Collector and Dealer Software - CAD 3.1 Your Registration Number Thank you for purchasing CAD! To ensure that you can receive proper support, we have already registered your copy with the serial number

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity Security+ Guide to Network Security Fundamentals, Third Edition Chapter 13 Business Continuity Objectives Define business continuity Describe the components of redundancy planning List disaster recovery

More information

XP: Backup Your Important Files for Safety

XP: Backup Your Important Files for Safety XP: Backup Your Important Files for Safety X 380 / 1 Protect Your Personal Files Against Accidental Loss with XP s Backup Wizard Your computer contains a great many important files, but when it comes to

More information

End-of-Year and Rollover Preparation Guide

End-of-Year and Rollover Preparation Guide End-of-Year and Rollover Preparation Guide School Year 2014-2015 The information in this document is subject to change without notice and does not represent a commitment on the part of Horizon. The software

More information

abc Mark Scheme Computing 6510 General Certificate of Education Principles of Hardware, Software and Applications 2007 examination - June series

abc Mark Scheme Computing 6510 General Certificate of Education Principles of Hardware, Software and Applications 2007 examination - June series Version 1.0: 0707 abc General Certificate of Education Computing 6510 CPT2 Principles of Hardware, Software and Applications Mark Scheme 2007 examination - June series Mark schemes are prepared by the

More information

File Organisation and Data Access 3.1.2

File Organisation and Data Access 3.1.2 File Organisation and Data Access 3.1.2 Computers can store large volumes of data. The difficulty is to be able to get it back. In order to be able to retrieve data, it must be stored in some sort of order.

More information

IT Auditing, Hall, 3e

IT Auditing, Hall, 3e IT Auditing, an economic event that affects the assets and equities of the firm, is reflected in its accounts, and is measured in monetary terms. similar types of transactions are grouped together into

More information

Chapter 3 `How a Storage Policy Works

Chapter 3 `How a Storage Policy Works Chapter 3 `How a Storage Policy Works 32 - How a Storage Policy Works A Storage Policy defines the lifecycle management rules for all protected data. In its most basic form, a storage policy can be thought

More information

11-3 Managing Electronic Records

11-3 Managing Electronic Records 11-3 Managing Electronic Records Outcomes 11-3a Create and access electronic records. 11-3b Apply procedures for managing electronic records. 11-3c Manage records in a database. Electronic Records An electronic

More information

Disk-to-Disk-to-Tape (D2D2T)

Disk-to-Disk-to-Tape (D2D2T) Disk-to-Disk-to-Tape (D2D2T) Where Disk Fits Into Backup Tape originated in the 1950 s as the primary storage device for computers. It was one of the fi rst ways to store data beyond the memory of a computer,

More information

Full file at https://fratstock.eu INTRODUCTION TO TRANSACTION PROCESSING

Full file at https://fratstock.eu INTRODUCTION TO TRANSACTION PROCESSING CHAPTER 2 2-1 OUTLINE OF CHAPTER 2 Learning Objectives An Overview of Transaction Processing Transaction Cycles The Expenditure Cycle The Conversion Cycle The Revenue Cycle Accounting Records Manual Systems

More information

Test bank for accounting information systems 1st edition by richardson chang and smith

Test bank for accounting information systems 1st edition by richardson chang and smith Test bank for accounting information systems 1st edition by richardson chang and smith Chapter 04 Relational Databases and Enterprise Systems True / False Questions 1. Three types of data models used today

More information

BACKUP, CLONE OR IMAGE? WHY YOU SHOULD BE INTERESTED

BACKUP, CLONE OR IMAGE? WHY YOU SHOULD BE INTERESTED BACKUP, CLONE OR IMAGE? WHY YOU SHOULD BE INTERESTED BACKUP For most people, this means making copies of important files. If the originals are lost, damaged or inaccessible, the copies can be used. Usually,

More information

An Introduction to Business Disaster Recovery

An Introduction to Business Disaster Recovery An Introduction to Business Disaster Recovery Martin Hynes - Commercial Director Sounds scary right? When the words disaster and recovery are mentioned our primal survival instincts kick in. Business Disaster

More information

Abort: To stop a program execution immediately, usually in the event of an error that will prevent further execution.

Abort: To stop a program execution immediately, usually in the event of an error that will prevent further execution. Commonly Used Terms Abort: To stop a program execution immediately, usually in the event of an error that will prevent further execution. Alphanumeric Code: A set of characters containing both letters

More information

Lesson 1. Why Use It? Terms to Know

Lesson 1. Why Use It? Terms to Know describe how a table is designed and filled. describe a form and its use. know the appropriate time to use a sort or a query. see the value of key fields, common fields, and multiple-field sorts. describe

More information

What is Data Storage?

What is Data Storage? What is Data Storage? When we talk about storing data, we mean putting the data in a known place. We can later come back to that place and get our data back again. Writing data or saving data are other

More information

Guide. A small business guide to data storage and backup

Guide. A small business guide to data storage and backup Guide A small business guide to data storage and backup 0345 600 3936 www.sfbcornwall.co.uk Contents Introduction... 3 Why is data storage and backup important?... 4 Benefits of cloud storage technology...

More information

StoreVault and NetApp Snapshot Technology

StoreVault and NetApp Snapshot Technology StoreVault and NetApp Snapshot Technology Instant backup and instant restore The backup window eliminated Added data protection and ease of recovery Introduction 2 How NetApp Snapshot Technology Can Help

More information

BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide

BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide Last Updated 8 March 2016 Contents Introduction... 2 1 Key point of contact... 2 2 Third Part IT Specialists... 2 3 Acceptable use of Information...

More information

Introduction. Read on and learn some facts about backup and recovery that could protect your small business.

Introduction. Read on and learn some facts about backup and recovery that could protect your small business. Introduction No business can afford to lose vital company information. Small-business owners in particular must take steps to ensure that client and vendor files, company financial data and employee records

More information

TODAY AND TOMORROW. Storage CHAPTER

TODAY AND TOMORROW. Storage CHAPTER 1 TODAY AND TOMORROW 3 Storage CHAPTER Storage Systems Characteristics All storage systems have specific characteristics Storage medium (what data is stored on) Can be removable or nonremovable from the

More information

Chapter 8: General Controls and Application Controls

Chapter 8: General Controls and Application Controls Accounting Information Systems: Essential Concepts and Applications Fourth Edition by Wilkinson, Cerullo, Raval, and Wong-On-Wing Chapter 8: General Controls and Application Controls Slides Authored by

More information

Administration and Data Retention. Best Practices for Systems Management

Administration and Data Retention. Best Practices for Systems Management Administration and Data Retention Best Practices for Systems Management Agenda Understanding the Context for IT Management Concepts for Managing Key IT Objectives Aptify and IT Management Best Practices

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

HP Designing and Implementing HP Enterprise Backup Solutions. Download Full Version :

HP Designing and Implementing HP Enterprise Backup Solutions. Download Full Version : HP HP0-771 Designing and Implementing HP Enterprise Backup Solutions Download Full Version : http://killexams.com/pass4sure/exam-detail/hp0-771 A. copy backup B. normal backup C. differential backup D.

More information

Logical File Organisation A file is logically organised as follows:

Logical File Organisation A file is logically organised as follows: File Handling The logical and physical organisation of files. Serial and sequential file handling methods. Direct and index sequential files. Creating, reading, writing and deleting records from a variety

More information

Front Desk Dashboard Quick Reference Guide

Front Desk Dashboard Quick Reference Guide Front Desk Dashboard Quick Reference Guide Published Date: November 15 Introduction The Front Desk Dashboard allows users to access the most common menus and screens in Maestro from a single access point.

More information

Norcom. e-fileplan Electronic Cabinet System

Norcom. e-fileplan Electronic Cabinet System Norcom e-fileplan Electronic Cabinet System Revision 2.0 \ Phone: (866) 726-6328 Email:sales@norcom-inc.com e-fileplan Overview e-fileplan is an electronic filing cabinet and document imaging system. e-fileplan

More information

Memory Study Material

Memory Study Material Computer memory refers to the devices that are used to store data or programs on a temporary or permanent basis for use in a computer. Any data or instruction entered into the memory of a computer is considered

More information

Contents. Table of Contents Introduction. The Main Menu...1 The Fleet Manager...2. Viewing the Maintenance...16 Generating Reports...

Contents. Table of Contents Introduction. The Main Menu...1 The Fleet Manager...2. Viewing the Maintenance...16 Generating Reports... Contents I Table of Contents 1 2 3 4 5 6 7 8 9 10 Introduction...1 The Main Menu...1 The Fleet Manager...2 Step #1 - Establishing...6 Locations/Departments Step #2 - Defining...8 your PM Schedules Step

More information

Clearing Out Legacy Electronic Records

Clearing Out Legacy Electronic Records For whom is this guidance intended? Clearing Out Legacy Electronic Records This guidance is intended for any member of University staff who has a sizeable collection of old electronic records, such as

More information

Chapter 4: Data Management

Chapter 4: Data Management Accounting Information Systems: Essential Concepts and Applications Fourth Edition by Wilkinson, Cerullo, Raval, and Wong-On-Wing Chapter 4: Data Management Slides Authored by Somnath Bhattacharya, Ph.D.

More information

DATA BACKUP AND RECOVERY POLICY

DATA BACKUP AND RECOVERY POLICY DATA BACKUP AND RECOVERY POLICY 4ITP04 Revision 01 TABLE OF CONTENTS 1. REVISION RECORD... 3 2. PURPOSE... 4 3. SCOPE AND APPLICABILITY... 4 4. DEFINITIONS AND ABBREVIATIONS... 4 5. POLICY STATEMENTS...

More information

Training for E C D L. Syllabus 5. A Practical Course in Windows XP and Office Blackrock Education Centre

Training for E C D L. Syllabus 5. A Practical Course in Windows XP and Office Blackrock Education Centre Training for E C D L Syllabus 5 A Practical Course in Windows XP and Office 2007 Blackrock Education Centre 2010 Blackrock Education Centre 2010 ISBN 978-0-9564074-5-0 Published by Blackrock Education

More information

Business Continuity and Disaster Recovery. Ed Crowley Ch 12

Business Continuity and Disaster Recovery. Ed Crowley Ch 12 Business Continuity and Disaster Recovery Ed Crowley Ch 12 Topics Disaster Recovery Business Impact Analysis MTBF and MTTR RTO and RPO Redundancy Failover Backup Sites Load Balancing Mirror Sites Disaster

More information

GCSE ICT. Theory Pack 2. Steve McWeeney. Illustrations by Matthew Foster-Smith ISBN X

GCSE ICT. Theory Pack 2. Steve McWeeney. Illustrations by Matthew Foster-Smith ISBN X GCSE ICT Theory Pack 2 Steve McWeeney ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz-&!?,.()[]/\*@;:1234567890 Illustrations by Matthew Foster-Smith ISBN 1 84070 182 X Text Steve McWeeney Design

More information

All About Catalog. Contents. West Virginia University Information Technology Services. ecommerce End User Advanced Guide

All About Catalog. Contents. West Virginia University Information Technology Services. ecommerce End User Advanced Guide Contents All About Catalog Browse...2 Add a Product...5 Basic Info...5 Display Options...6 Taxes & Shipping...6 Inventory Control...7 Descriptions...8 Left Side Menu...9 Product Details...9 Images and

More information

1. Select a cell in the column you want to sort by. In this example, we will sort by Last Name.

1. Select a cell in the column you want to sort by. In this example, we will sort by Last Name. Excel 2010 Sorting Data Introduction Page 1 With over 17 billion cells in a single worksheet, Excel 2010 gives you the ability to work with an enormous amount of data. Arranging your data alphabetically,

More information

Access Objects. Tables Queries Forms Reports Relationships

Access Objects. Tables Queries Forms Reports Relationships Access Review Access Objects Tables Queries Forms Reports Relationships How Access Saves a Database The Save button in Access differs from the Save button in other Windows programs such as Word and Excel.

More information

Lecturer 4: File Handling

Lecturer 4: File Handling Lecturer 4: File Handling File Handling The logical and physical organisation of files. Serial and sequential file handling methods. Direct and index sequential files. Creating, reading, writing and deleting

More information

Chapter 10 Managing a Database. Discovering Computers Your Interactive Guide to the Digital World

Chapter 10 Managing a Database. Discovering Computers Your Interactive Guide to the Digital World Chapter 10 Managing a Database Discovering Computers 2012 Your Interactive Guide to the Digital World Databases, Data, and Information Database Collection of data organized in a manner that allows access,

More information

RISK ASSESSMENTS AND INTERNAL CONTROL CIS CHARACTERISTICS AND CONSIDERATIONS CONTENTS

RISK ASSESSMENTS AND INTERNAL CONTROL CIS CHARACTERISTICS AND CONSIDERATIONS CONTENTS CONTENTS Paragraphs Introduction... 1 Organizational Structure... 2 Nature of Processing... 3 Design and Procedural Aspects... 4 Internal Controls in a CIS Environment... 5 General CIS Controls... 6-7

More information

When you pass Exam : Access 2010, you complete the requirements for the Microsoft Office Specialist (MOS) - Access 2010 certification.

When you pass Exam : Access 2010, you complete the requirements for the Microsoft Office Specialist (MOS) - Access 2010 certification. Appendix 1 Microsoft Office Specialist: Access Certification Introduction The candidates for Microsoft Office Specialist certification should have core-level knowledge of Microsoft Office Access 2010.

More information

DataMaster for Windows

DataMaster for Windows DataMaster for Windows Version 3.0 April 2004 Mid America Computer Corp. 111 Admiral Drive Blair, NE 68008-0700 (402) 426-6222 Copyright 2003-2004 Mid America Computer Corp. All rights reserved. Table

More information

SMP User Manual Sales, Marketing and Information Services

SMP User Manual Sales, Marketing and Information Services SMP User Manual Sales, Marketing and Information Services Product Information www.gosmp.com Tutorial Videos & Training www.gosmp.com Customer Support 949-258-0410 or support@gosmp.com Page 1 of 14 Advanced

More information

Data. Entities. Accounting Information Systems. Chapter 4: Data Management

Data. Entities. Accounting Information Systems. Chapter 4: Data Management Accounting Information Systems Chapter 4: Data Management Data Data may be defined broadly to include two interrelated components: Data Models that provide structure to data File Orientation Data-base

More information

Genesis Advantage. Version 7

Genesis Advantage. Version 7 Welcome to Genesis Advantage version 7! We have packed many new features and enhancements into this release. Most of these features were suggested by our clients and we appreciate your input. We have included

More information

ABCs of Direct Mail. Tips for More Effective Marketing Publications

ABCs of Direct Mail. Tips for More Effective Marketing Publications ABCs of Direct Mail Tips for More Effective Marketing Publications ABCs of Direct Mail 2 Introduction Direct mail is a growing business and everyone is eager and excited to jump on board. The problem is

More information

The Office Procedures and Technology

The Office Procedures and Technology The Office Procedures and Technology Chapter 9 Records Management Systems Copyright 2003 by South-Western, a division of Thomson Learning Overview Records management system Storage Set of media procedures

More information

8.1 OVERVIEW OF THE INVENTORY MODULE ADDING NEW ITEMS...

8.1 OVERVIEW OF THE INVENTORY MODULE ADDING NEW ITEMS... Chapter Module The module is used to record and track inventory and storeroom information. This Chapter describes how to use the Web Work module. Table of Contents 8.1 OVERVIEW OF THE INVENTORY MODULE...

More information

Rekayasa Perangkat Lunak 2 (IN043): Pertemuan 8. Data Management Layer Design

Rekayasa Perangkat Lunak 2 (IN043): Pertemuan 8. Data Management Layer Design Rekayasa Perangkat Lunak 2 (IN043): Pertemuan 8 Data Management Layer Design Data Management Layer Focus on how to manage data are stored that can be handled by the programs that run the system, including:

More information

Quite Hot 3. Installation... 2 About the demonstration edition... 2 Windows... 2 Macintosh... 3

Quite Hot 3. Installation... 2 About the demonstration edition... 2 Windows... 2 Macintosh... 3 Quite Hot 3 Contents Installation.................................................................. 2 About the demonstration edition.............................................. 2 Windows................................................................

More information

Sage Pastel Accounting. Year End Procedures Sage Pastel Partner V

Sage Pastel Accounting. Year End Procedures Sage Pastel Partner V Sage Pastel Accounting Year End Procedures Sage Pastel Partner V14 2015 Contents Welcome to your Pastel Partner Year End Guide 3 Website and online support 3 Support operating hours 3 Contacting Chips

More information

Modern RAID Technology. RAID Primer A Configuration Guide

Modern RAID Technology. RAID Primer A Configuration Guide Modern RAID Technology RAID Primer A Configuration Guide E x c e l l e n c e i n C o n t r o l l e r s Modern RAID Technology RAID Primer A Configuration Guide 6th Edition Copyright 1997-2003 ICP vortex

More information

IBM Fundamentals of Applying Tivoli Storage Solutions V2. Download Full Version :

IBM Fundamentals of Applying Tivoli Storage Solutions V2. Download Full Version : IBM 000-026 Fundamentals of Applying Tivoli Storage Solutions V2 Download Full Version : https://killexams.com/pass4sure/exam-detail/000-026 QUESTION: 92 What is required to identify valid participants

More information

QChart 5 User s Guide. QChart5.0. User s Guide

QChart 5 User s Guide. QChart5.0. User s Guide QChart5.0 User s Guide Qpuncture, Inc. 5824 E. Camino Pinzon Anaheim, CA 92807 USA Email info@qpuncture.com WEB http://www.qpuncture.com Phone 1-714-685-0900 or 1-800-650-8222 Fax 1-714-685-0909 2001-2007

More information

Instructions & Manual

Instructions & Manual This is the for the Wessex Pricing Program (Advanced) - released February 2005. Contents Page Features 2 Installation 3 Start Screen 3 How the Program Works 4 Other Costs 4 Customise values 4 Printing

More information

Recovery ROI: Doing More with Less. How to Save Time and Money when Recovering

Recovery ROI: Doing More with Less. How to Save Time and Money when Recovering Email Recovery ROI: Doing More with Less How to Save Time and Money when Recovering Email 2 2 3 4 4 6 The Cost of Recovering Email Storage Costs Infrastructure Costs Time Costs Human Resource Costs How

More information

Operating system. Hardware

Operating system. Hardware Chapter 1.2 System Software 1.2.(a) Operating Systems An operating system is a set of programs designed to run in the background on a computer system, giving an environment in which application software

More information

Furniture Work in Progress

Furniture Work in Progress Updated July 2016 Contents...3 Planning to Use the Application...4 Setting Parameters...4 Viewing Furniture Works in Progress...6 Manually Adjusting a WIP Order to Bring it into Balance...9 Changing After

More information

Storage. How does volatility compare? What is a storage device and a storage medium? Today s standard disk is 3.5 wide

Storage. How does volatility compare? What is a storage device and a storage medium? Today s standard disk is 3.5 wide 1 Chapter 7 Storage 2 Chapter 7 Objectives 3 Memory Versus Storage 1 What is storage? 2 Media and devices used to store and retrieve data, instructions,and information 4 Memory Versus Storage 1 How does

More information

Best Practices for Using Symantec Online Storage for Backup Exec

Best Practices for Using Symantec Online Storage for Backup Exec WHITE PAPER: xxxxxx Data Protection [00-Cover_Bar] Best Practices for Using Symantec Online Storage for Backup Exec Confidence in a connected world. White Paper: Data Protection Best Practices for Using

More information

IT CONTINUITY, BACKUP AND RECOVERY POLICY

IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY Effective Date May 20, 2016 Cross- Reference 1. Emergency Response and Policy Holder Director, Information Business Resumption

More information

Formatting, Organising and Storing Data

Formatting, Organising and Storing Data Formatting, Organising and Storing Data Scott Summers UK Data Service University of Essex Cancer Research UK Data Sharing and Management 24 th May 2017 Overview Looking after research data for the longer-term

More information

Warm standby done right. Heikki Linnakangas / Pivotal

Warm standby done right. Heikki Linnakangas / Pivotal Warm standby done right Heikki Linnakangas / Pivotal This presentation About built-in tools Not about repmgr, WAL-e etc. You probably should use those tools though! Not about monitoring, heartbeats etc.

More information

UNIT 3 INTRODUCTORY MICROSOFT EXCEL LESSON 6 MAKING THE WORKSHEET USEFUL

UNIT 3 INTRODUCTORY MICROSOFT EXCEL LESSON 6 MAKING THE WORKSHEET USEFUL UNIT 3 INTRODUCTORY MICROSOFT EXCEL LESSON 6 MAKING THE WORKSHEET USEFUL Objectives Sort data in a worksheet. Use the AutoFilter to extract specified data from the worksheet. Hide worksheet columns or

More information

3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007

3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007 3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007 Fault tolerance refers to the capability of a computer or network to continue to function when some component fails. Disk fault tolerance refers

More information

Auxiliary Storage and File Organisation

Auxiliary Storage and File Organisation Lesson 6 Auxiliary Storage and File Organisation Auxiliary storage refers to storage other than the main storage (e.g. magnetic tape or direct access devices). Other names given to auxilliary storage are

More information

Database Management Systems, 2nd edition, Raghu Ramakrishnan, Johannes Gehrke, McGraw-Hill

Database Management Systems, 2nd edition, Raghu Ramakrishnan, Johannes Gehrke, McGraw-Hill Lecture Handout Database Management System Lecture No. 34 Reading Material Database Management Systems, 2nd edition, Raghu Ramakrishnan, Johannes Gehrke, McGraw-Hill Modern Database Management, Fred McFadden,

More information

Physical Storage Media

Physical Storage Media Physical Storage Media These slides are a modified version of the slides of the book Database System Concepts, 5th Ed., McGraw-Hill, by Silberschatz, Korth and Sudarshan. Original slides are available

More information

Solution Recipe: Increase Data Protection Using Intel vpro Technology

Solution Recipe: Increase Data Protection Using Intel vpro Technology Solution Recipe: Increase Data Protection Using Intel vpro Technology Preface Intel has developed a series of unique Solution Recipes designed for channel members interested in providing complete solutions

More information

BackUp Strategies. ApplePickers April 12, 2017

BackUp Strategies. ApplePickers April 12, 2017 BackUp Strategies ApplePickers April 12, 2017 Why Backup? HDDs fail. It s not a matter of if; it is a matter of when Disk errors Possibility of theft, vandalism, or fire Stupid mistakes in deleting files

More information

Sorting and Filtering Data

Sorting and Filtering Data chapter 20 Sorting and Filtering Data IN THIS CHAPTER Sorting...................................................... page 332 Filtering..................................................... page 337 331

More information

As your databases continue to evolve, you will need to incorporate advanced queries and reports. This chapter addresses how to create and use action

As your databases continue to evolve, you will need to incorporate advanced queries and reports. This chapter addresses how to create and use action As your databases continue to evolve, you will need to incorporate advanced queries and reports. This chapter addresses how to create and use action queries and how to create queries that perform more

More information

Using Microsoft Access

Using Microsoft Access Using Microsoft Access USING MICROSOFT ACCESS 1 Interfaces 2 Basic Macros 2 Exercise 1. Creating a Test Macro 2 Exercise 2. Creating a Macro with Multiple Steps 3 Exercise 3. Using Sub Macros 5 Expressions

More information

Avid Media Composer Training Essentials for Uzbek Television

Avid Media Composer Training Essentials for Uzbek Television 2007-12 for Uzbek Television Inhaltsverzeichnis 1 Backup... 3 1.1 Calculation...3 1.2 Strategy: bin backup...4 1.3 Strategy: project backup...5 1.4 Strategy: consolidation...6 1.5 Attic Folder...7 1.6

More information

Chapter 10 Managing a Database. Discovering Computers Your Interactive Guide to the Digital World

Chapter 10 Managing a Database. Discovering Computers Your Interactive Guide to the Digital World Chapter 10 Managing a Database Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, database, and explain how a database interacts with data and information

More information

*M29890A0120* M29890A W850/U4385/ /3/3/ Turn over

*M29890A0120* M29890A W850/U4385/ /3/3/ Turn over Centre No. Candidate No. Surname Signature Paper Reference(s) 4385/1F London Examinations IGCSE Information and Communication Technology Paper 1F Foundation Tier Friday 16 November 2007 Morning Time: 1

More information

CTAS e-li. Published on e-li (http://eli.ctas.tennessee.edu) April 28, 2018 Electronic Records

CTAS e-li. Published on e-li (http://eli.ctas.tennessee.edu) April 28, 2018 Electronic Records Published on e-li (http://eli.ctas.tennessee.edu) April 28, 2018 Dear Reader: The following document was created from the CTAS electronic library known as e-li. This online library is maintained daily

More information

Tuskegee Backup and Offsite Policy and Procedures

Tuskegee Backup and Offsite Policy and Procedures TUSKEGEE UNVERSTY OCE O NORMATON TECHNOLOGY Tuskegee Backup and Offsite Policy and Procedures Purpose This policy defines how to safeguard the information assets of the University and how copies of stored

More information

Access the Electronic SM and MC Forms

Access the Electronic SM and MC Forms 2 Access the Electronic SM and MC Forms Topics: Pages Launching the Browser 2-2 Access the Electronic SM and MC Forms System Buttons Form Terms 2-4 2-8 2-9 User Preferences 2-12 Symbol Key Helpful hints

More information

COMPUTER SYSTEMS. Section 1

COMPUTER SYSTEMS. Section 1 COMPUTER SYSTEMS Section 1 BITS AND BYTES In order for information to flow through a computer system and be in a form suitable for processing, all symbols, pictures, or words must be reduced to a string

More information

Associate Professor Dr. Raed Ibraheem Hamed

Associate Professor Dr. Raed Ibraheem Hamed Associate Professor Dr. Raed Ibraheem Hamed University of Human Development, College of Science and Technology Computer Science Department 2015 2016 1 Points to Cover Storing Data in a DBMS Primary Storage

More information

GUIDELINES FOR CREATION AND PRESERVATION OF DIGITAL FILES

GUIDELINES FOR CREATION AND PRESERVATION OF DIGITAL FILES GUIDELINES FOR CREATION AND PRESERVATION OF DIGITAL FILES October 2018 INTRODUCTION This document provides guidelines for the creation and preservation of digital files. They pertain to both born-digital

More information

Real4Test. Real IT Certification Exam Study materials/braindumps

Real4Test.   Real IT Certification Exam Study materials/braindumps Real4Test http://www.real4test.com Real IT Certification Exam Study materials/braindumps Exam : 250-312 Title : Administration of Symantec Backup Exec 12 for Windows Server Vendors : Symantec Version :

More information

Storage Optimization with Oracle Database 11g

Storage Optimization with Oracle Database 11g Storage Optimization with Oracle Database 11g Terabytes of Data Reduce Storage Costs by Factor of 10x Data Growth Continues to Outpace Budget Growth Rate of Database Growth 1000 800 600 400 200 1998 2000

More information

06 May 2011 CS 200. System Management. Backups. Backups. CS 200 Fall 2016

06 May 2011 CS 200. System Management. Backups. Backups. CS 200 Fall 2016 06 May 2011 CS 200 System Management 1 Let s discuss the facts of life... You will die. Your disk will die. Your disk will die first. 2 The user, manually at day s end, make copies on... Who does them?

More information

After the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning

After the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning After the Attack Business Continuity Week 6 Part 2 Staying in Business Disaster Recovery Planning and Testing Steps Business continuity is a organization s ability to maintain operations after a disruptive

More information

How to Add Product In Your Store

How to Add Product In Your Store How to Add Product In Your Store Adding a simple product Adding a Simple product is similar to writing a post in WordPress. 1. Go to WooCommerce > Products > Add Product. You then have a familiar interface

More information

SAP R/3: DART Data Retention Tool. Author Girish Awade

SAP R/3: DART Data Retention Tool. Author Girish Awade SAP R/3: DART Data Retention Tool Author Girish Awade Agenda Introduction Configuring DART Data Extraction Archive Retrieval Example 2 Agenda Introduction 3 Introduction I ve archived my data and now the

More information

24 Sub-Queries. Sub-Queries

24 Sub-Queries. Sub-Queries 24 Sub-Queries Sub-Queries are another method of restricting data, but they use the results of one query to restrict a second query. Web Intelligence generates SQL that is processed by the database in

More information

Chapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/

Chapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/ Chapter 1 Storage Concepts 4 - Storage Concepts In order to understand CommVault concepts regarding storage management we need to understand how and why we protect data, traditional backup methods, and

More information