Managing Data. When records in a file need to be accessed there are three ways of doing it;
|
|
- Jared Richards
- 5 years ago
- Views:
Transcription
1 File Access Managing Data When records in a file need to be accessed there are three ways of doing it; a) Serial Access This means...start at the beginning of the file and access each record in turn until the one needed is found. If files are stored on magnetic tape then serial access is the only method of access. b) Direct Access The computer can calculate (from the key field) where the record is stored in the file, and can then access the record directly from that position. Direct access of records will generally be much faster than serial access. Direct access can only be used if files are stored on media such as disk, CD, DVD... Direct access is also known as random access c) Sequential Access Sequential file is a file where records are physically stored in a specified order one after the other (according to the key) and they have to be read in that order (in the order in which they are stored on the medium). To read record 10, for example, you would first need to read records 1 through 9. This differs from random access, in which you can read and write records in any order. Tip: Access means Exercise 1: File Access read or write a) of records involves accessing each record in turn. b) is used if the computer can calculate where a record is stored and directly accesses only that record. c) Applications which need fast access to data will need to use File Types Master File A collection of records related to one of the main subjects of an information system, such as customers, employees, products and vendors. Master files contain descriptive data, such as name and address, as well as summary information, such as amount due and year-to-date sales. Transaction File Transaction processing systems are the backbone of an organization because they update constantly. At any given moment, someone may need an inventory balance, an account balance or the total current value of a financial portfolio. Page 1
2 The data in transaction files is used to update the master files, which contain the data about the subjects of the organization (customers, employees, vendors, etc.). Backup File Duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed Archive File A file that has been saved in a different location than the original for backup purposes. An archive is a collection of files packaged together as a sort of final backup into one compressed file. Do not confuse archiving with regular backups. File Generations When a transaction file is used to update a master file, the process creates a new master file. Sometimes the old master file is referred to as the father file and the new master file as the son file. When the update is next run... the son file becomes the father file, the father file becomes the grandfather file..etc... This is a method for storing previous generations of master file data that are continuously updated. The son is the current file, the father is a copy of the file from the previous cycle, and the grandfather is a copy of the file from the cycle before that one. In practice companies will keep several generations of files. This is because there may be a problem (eg disk crash, fire or theft) and the update runs may have to be done again to re-create the current master file. Old files should therefore be stored away from the computer installation, preferably in a fireproof strong room. The diagram below illustrates how a master file is updated using a transaction file, which has been previously sorted. Page 2
3 Exercise 2: When a master file is updated, the new master file created is known as the file and the old master file is archived as the file. At each update...the son becomes the father, the father becomes the grandfather etc... Several of master files may be kept for disaster recovery purposes. File Update The data on a transaction file is used to update some of the fields on a master file. The transaction file must be sorted in the same order as the master file. This is generally done in a batch processing system where the transactions are recorded on the transaction file and later used to update the master file. How it works (in words) : 1. A new master file is created. 2. For each transaction record, the records of the master file are read and written onto the new master file until a matching record is found. 3. The data is updated and the record written onto the new master file. 4. When the last transaction record has been processed, the remaining records on the master file are read and written onto the new master file. How it works (System flowchart) : Here, the transaction and master files are stored on magnetic tape and used as input for the update process. All updated (and unaltered) records are stored on the new master file. Example : A master file of stock is kept for a clothes shop. Some of Page 3
4 the records are shown in this table : ID Garment Price No Sold this year 305 Sweater (Red) Sweater (Blue) Shorts (Size 12) Shorts (Size 14) Socks(Grey) Socks(Black) Todays transactions are shown in the transaction file below... ID No Sold today The key field is the ID field. The master file in practice would have many more fields than this...and many more records! The transaction file must be sorted in the same order as the master file (using the key field) The resulting new master file is shown in the next table : ID Garment Price No Sold this year 305 Sweater (Red) Sweater (Blue) Shorts (Size 12) Shorts (Size 14) Socks(Grey) Socks(Black) The updated data is shown in this table. Note that some records will have remained unchanged. Exercise 3: The contains all the main data for a system. A contains recent data which is used to update the master file. A is created onto which the updated or unchanged records are written. The old master file can then be archived. The transaction file must be before the update process takes place. Page 4
5 Common File Operations Sorting Files may be sorted into order of a field. The records are arranged in ascending or descending order (numerically or alphabetically). If records are sorted it is much easier and quicker to find a record. Searching Queries are used to find records which match certain conditions. Simple query - Using one field. Eg (NAME = 'Smith') Complex query - using two or more fields with OR, AND or NOT. Egs (NAME='Smith') AND (BALANCE > 100) (PET='Dog') OR (PET = 'Cat') (PET = 'Dog') AND NOT (Type='Spaniel') Wildcard query - In alphabetical fields * may stand for anything. Eg (NAME = 'Sm*') will include all names starting with Sm - Smith, Smithers, Smedling and so on... Adding new data A new record may be added to a file. Eg A business may start to sell a new brand of item. Deleting data A record may be removed from a file. Eg A business discontinues the selling of an item. Editing data A record in a file may be changed. Eg If the price of an item changes. Page 5
Chapter 2 Introduction to Transaction Processing
Chapter 2 Introduction to Transaction Processing TRUE/FALSE 1. Processing more transactions at a lower unit cost makes batch processing more efficient than real-time systems. T 2. The process of acquiring
More informationFile Organization. Serial: Records are accessed in the order in which they were stored.
File Organization Types of Access Serial: Records are accessed in the order in which they were stored. Sequential: Records are accessed in descending or ascending key sequence. Storage Medium: Magnetic
More informationChapter 2 Introduction to Transaction Processing
Chapter 2 Introduction to Transaction Processing TRUE/FALSE 1. Processing more transactions at a lower unit cost makes batch processing more efficient than real-time systems. T 2. The process of acquiring
More information4. The portion of the monthly bill from a credit card company is an example of a turn-around document.
Chapter 2 Introduction to Transaction Processing Introduction to Accounting Information Systems, 8e Test Bank, Chapter 2 TRUE/FALSE 1. Processing more transactions at a lower unit cost makes batch processing
More informationUnit 3 Part B. Computer Storage. Computer Technology
Unit 3 Part B Computer Storage Computer Technology Storage The place in the computer where data is held while it is not needed for processing A storage device is device used to record (store) data The
More informationIntroduction to Transaction Processing
Modul ke: Introduction to Transaction Processing Fakultas Fakultas Ekonomi & Bisnis Iwan Setiadi, SE., M.Si Program Studi Akuntansi www.mercubuana.ac.id A Financial Transaction is... an economic event
More informationBack up and Restoration Policy. of VIJETA BROKING INDIA PRIVATE LIMITED
Back up and Restoration Policy of VIJETA BROKING INDIA PRIVATE LIMITED Table of Content 1 Overview... 3 2 Purpose... 3 3 Scope... 3 4 Definitions... 3 5 Timing... 4 6 Policy... 4 7 Backup of Older Versions...
More informationCollector and Dealer Software - CAD 3.1
Collector and Dealer Software - CAD 3.1 Your Registration Number Thank you for purchasing CAD! To ensure that you can receive proper support, we have already registered your copy with the serial number
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 13 Business Continuity Objectives Define business continuity Describe the components of redundancy planning List disaster recovery
More informationXP: Backup Your Important Files for Safety
XP: Backup Your Important Files for Safety X 380 / 1 Protect Your Personal Files Against Accidental Loss with XP s Backup Wizard Your computer contains a great many important files, but when it comes to
More informationEnd-of-Year and Rollover Preparation Guide
End-of-Year and Rollover Preparation Guide School Year 2014-2015 The information in this document is subject to change without notice and does not represent a commitment on the part of Horizon. The software
More informationabc Mark Scheme Computing 6510 General Certificate of Education Principles of Hardware, Software and Applications 2007 examination - June series
Version 1.0: 0707 abc General Certificate of Education Computing 6510 CPT2 Principles of Hardware, Software and Applications Mark Scheme 2007 examination - June series Mark schemes are prepared by the
More informationFile Organisation and Data Access 3.1.2
File Organisation and Data Access 3.1.2 Computers can store large volumes of data. The difficulty is to be able to get it back. In order to be able to retrieve data, it must be stored in some sort of order.
More informationIT Auditing, Hall, 3e
IT Auditing, an economic event that affects the assets and equities of the firm, is reflected in its accounts, and is measured in monetary terms. similar types of transactions are grouped together into
More informationChapter 3 `How a Storage Policy Works
Chapter 3 `How a Storage Policy Works 32 - How a Storage Policy Works A Storage Policy defines the lifecycle management rules for all protected data. In its most basic form, a storage policy can be thought
More information11-3 Managing Electronic Records
11-3 Managing Electronic Records Outcomes 11-3a Create and access electronic records. 11-3b Apply procedures for managing electronic records. 11-3c Manage records in a database. Electronic Records An electronic
More informationDisk-to-Disk-to-Tape (D2D2T)
Disk-to-Disk-to-Tape (D2D2T) Where Disk Fits Into Backup Tape originated in the 1950 s as the primary storage device for computers. It was one of the fi rst ways to store data beyond the memory of a computer,
More informationFull file at https://fratstock.eu INTRODUCTION TO TRANSACTION PROCESSING
CHAPTER 2 2-1 OUTLINE OF CHAPTER 2 Learning Objectives An Overview of Transaction Processing Transaction Cycles The Expenditure Cycle The Conversion Cycle The Revenue Cycle Accounting Records Manual Systems
More informationTest bank for accounting information systems 1st edition by richardson chang and smith
Test bank for accounting information systems 1st edition by richardson chang and smith Chapter 04 Relational Databases and Enterprise Systems True / False Questions 1. Three types of data models used today
More informationBACKUP, CLONE OR IMAGE? WHY YOU SHOULD BE INTERESTED
BACKUP, CLONE OR IMAGE? WHY YOU SHOULD BE INTERESTED BACKUP For most people, this means making copies of important files. If the originals are lost, damaged or inaccessible, the copies can be used. Usually,
More informationAn Introduction to Business Disaster Recovery
An Introduction to Business Disaster Recovery Martin Hynes - Commercial Director Sounds scary right? When the words disaster and recovery are mentioned our primal survival instincts kick in. Business Disaster
More informationAbort: To stop a program execution immediately, usually in the event of an error that will prevent further execution.
Commonly Used Terms Abort: To stop a program execution immediately, usually in the event of an error that will prevent further execution. Alphanumeric Code: A set of characters containing both letters
More informationLesson 1. Why Use It? Terms to Know
describe how a table is designed and filled. describe a form and its use. know the appropriate time to use a sort or a query. see the value of key fields, common fields, and multiple-field sorts. describe
More informationWhat is Data Storage?
What is Data Storage? When we talk about storing data, we mean putting the data in a known place. We can later come back to that place and get our data back again. Writing data or saving data are other
More informationGuide. A small business guide to data storage and backup
Guide A small business guide to data storage and backup 0345 600 3936 www.sfbcornwall.co.uk Contents Introduction... 3 Why is data storage and backup important?... 4 Benefits of cloud storage technology...
More informationStoreVault and NetApp Snapshot Technology
StoreVault and NetApp Snapshot Technology Instant backup and instant restore The backup window eliminated Added data protection and ease of recovery Introduction 2 How NetApp Snapshot Technology Can Help
More informationBASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide
BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide Last Updated 8 March 2016 Contents Introduction... 2 1 Key point of contact... 2 2 Third Part IT Specialists... 2 3 Acceptable use of Information...
More informationIntroduction. Read on and learn some facts about backup and recovery that could protect your small business.
Introduction No business can afford to lose vital company information. Small-business owners in particular must take steps to ensure that client and vendor files, company financial data and employee records
More informationTODAY AND TOMORROW. Storage CHAPTER
1 TODAY AND TOMORROW 3 Storage CHAPTER Storage Systems Characteristics All storage systems have specific characteristics Storage medium (what data is stored on) Can be removable or nonremovable from the
More informationChapter 8: General Controls and Application Controls
Accounting Information Systems: Essential Concepts and Applications Fourth Edition by Wilkinson, Cerullo, Raval, and Wong-On-Wing Chapter 8: General Controls and Application Controls Slides Authored by
More informationAdministration and Data Retention. Best Practices for Systems Management
Administration and Data Retention Best Practices for Systems Management Agenda Understanding the Context for IT Management Concepts for Managing Key IT Objectives Aptify and IT Management Best Practices
More informationIdentity Theft Prevention Policy
Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening
More informationHP Designing and Implementing HP Enterprise Backup Solutions. Download Full Version :
HP HP0-771 Designing and Implementing HP Enterprise Backup Solutions Download Full Version : http://killexams.com/pass4sure/exam-detail/hp0-771 A. copy backup B. normal backup C. differential backup D.
More informationLogical File Organisation A file is logically organised as follows:
File Handling The logical and physical organisation of files. Serial and sequential file handling methods. Direct and index sequential files. Creating, reading, writing and deleting records from a variety
More informationFront Desk Dashboard Quick Reference Guide
Front Desk Dashboard Quick Reference Guide Published Date: November 15 Introduction The Front Desk Dashboard allows users to access the most common menus and screens in Maestro from a single access point.
More informationNorcom. e-fileplan Electronic Cabinet System
Norcom e-fileplan Electronic Cabinet System Revision 2.0 \ Phone: (866) 726-6328 Email:sales@norcom-inc.com e-fileplan Overview e-fileplan is an electronic filing cabinet and document imaging system. e-fileplan
More informationMemory Study Material
Computer memory refers to the devices that are used to store data or programs on a temporary or permanent basis for use in a computer. Any data or instruction entered into the memory of a computer is considered
More informationContents. Table of Contents Introduction. The Main Menu...1 The Fleet Manager...2. Viewing the Maintenance...16 Generating Reports...
Contents I Table of Contents 1 2 3 4 5 6 7 8 9 10 Introduction...1 The Main Menu...1 The Fleet Manager...2 Step #1 - Establishing...6 Locations/Departments Step #2 - Defining...8 your PM Schedules Step
More informationClearing Out Legacy Electronic Records
For whom is this guidance intended? Clearing Out Legacy Electronic Records This guidance is intended for any member of University staff who has a sizeable collection of old electronic records, such as
More informationChapter 4: Data Management
Accounting Information Systems: Essential Concepts and Applications Fourth Edition by Wilkinson, Cerullo, Raval, and Wong-On-Wing Chapter 4: Data Management Slides Authored by Somnath Bhattacharya, Ph.D.
More informationDATA BACKUP AND RECOVERY POLICY
DATA BACKUP AND RECOVERY POLICY 4ITP04 Revision 01 TABLE OF CONTENTS 1. REVISION RECORD... 3 2. PURPOSE... 4 3. SCOPE AND APPLICABILITY... 4 4. DEFINITIONS AND ABBREVIATIONS... 4 5. POLICY STATEMENTS...
More informationTraining for E C D L. Syllabus 5. A Practical Course in Windows XP and Office Blackrock Education Centre
Training for E C D L Syllabus 5 A Practical Course in Windows XP and Office 2007 Blackrock Education Centre 2010 Blackrock Education Centre 2010 ISBN 978-0-9564074-5-0 Published by Blackrock Education
More informationBusiness Continuity and Disaster Recovery. Ed Crowley Ch 12
Business Continuity and Disaster Recovery Ed Crowley Ch 12 Topics Disaster Recovery Business Impact Analysis MTBF and MTTR RTO and RPO Redundancy Failover Backup Sites Load Balancing Mirror Sites Disaster
More informationGCSE ICT. Theory Pack 2. Steve McWeeney. Illustrations by Matthew Foster-Smith ISBN X
GCSE ICT Theory Pack 2 Steve McWeeney ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz-&!?,.()[]/\*@;:1234567890 Illustrations by Matthew Foster-Smith ISBN 1 84070 182 X Text Steve McWeeney Design
More informationAll About Catalog. Contents. West Virginia University Information Technology Services. ecommerce End User Advanced Guide
Contents All About Catalog Browse...2 Add a Product...5 Basic Info...5 Display Options...6 Taxes & Shipping...6 Inventory Control...7 Descriptions...8 Left Side Menu...9 Product Details...9 Images and
More information1. Select a cell in the column you want to sort by. In this example, we will sort by Last Name.
Excel 2010 Sorting Data Introduction Page 1 With over 17 billion cells in a single worksheet, Excel 2010 gives you the ability to work with an enormous amount of data. Arranging your data alphabetically,
More informationAccess Objects. Tables Queries Forms Reports Relationships
Access Review Access Objects Tables Queries Forms Reports Relationships How Access Saves a Database The Save button in Access differs from the Save button in other Windows programs such as Word and Excel.
More informationLecturer 4: File Handling
Lecturer 4: File Handling File Handling The logical and physical organisation of files. Serial and sequential file handling methods. Direct and index sequential files. Creating, reading, writing and deleting
More informationChapter 10 Managing a Database. Discovering Computers Your Interactive Guide to the Digital World
Chapter 10 Managing a Database Discovering Computers 2012 Your Interactive Guide to the Digital World Databases, Data, and Information Database Collection of data organized in a manner that allows access,
More informationRISK ASSESSMENTS AND INTERNAL CONTROL CIS CHARACTERISTICS AND CONSIDERATIONS CONTENTS
CONTENTS Paragraphs Introduction... 1 Organizational Structure... 2 Nature of Processing... 3 Design and Procedural Aspects... 4 Internal Controls in a CIS Environment... 5 General CIS Controls... 6-7
More informationWhen you pass Exam : Access 2010, you complete the requirements for the Microsoft Office Specialist (MOS) - Access 2010 certification.
Appendix 1 Microsoft Office Specialist: Access Certification Introduction The candidates for Microsoft Office Specialist certification should have core-level knowledge of Microsoft Office Access 2010.
More informationDataMaster for Windows
DataMaster for Windows Version 3.0 April 2004 Mid America Computer Corp. 111 Admiral Drive Blair, NE 68008-0700 (402) 426-6222 Copyright 2003-2004 Mid America Computer Corp. All rights reserved. Table
More informationSMP User Manual Sales, Marketing and Information Services
SMP User Manual Sales, Marketing and Information Services Product Information www.gosmp.com Tutorial Videos & Training www.gosmp.com Customer Support 949-258-0410 or support@gosmp.com Page 1 of 14 Advanced
More informationData. Entities. Accounting Information Systems. Chapter 4: Data Management
Accounting Information Systems Chapter 4: Data Management Data Data may be defined broadly to include two interrelated components: Data Models that provide structure to data File Orientation Data-base
More informationGenesis Advantage. Version 7
Welcome to Genesis Advantage version 7! We have packed many new features and enhancements into this release. Most of these features were suggested by our clients and we appreciate your input. We have included
More informationABCs of Direct Mail. Tips for More Effective Marketing Publications
ABCs of Direct Mail Tips for More Effective Marketing Publications ABCs of Direct Mail 2 Introduction Direct mail is a growing business and everyone is eager and excited to jump on board. The problem is
More informationThe Office Procedures and Technology
The Office Procedures and Technology Chapter 9 Records Management Systems Copyright 2003 by South-Western, a division of Thomson Learning Overview Records management system Storage Set of media procedures
More information8.1 OVERVIEW OF THE INVENTORY MODULE ADDING NEW ITEMS...
Chapter Module The module is used to record and track inventory and storeroom information. This Chapter describes how to use the Web Work module. Table of Contents 8.1 OVERVIEW OF THE INVENTORY MODULE...
More informationRekayasa Perangkat Lunak 2 (IN043): Pertemuan 8. Data Management Layer Design
Rekayasa Perangkat Lunak 2 (IN043): Pertemuan 8 Data Management Layer Design Data Management Layer Focus on how to manage data are stored that can be handled by the programs that run the system, including:
More informationQuite Hot 3. Installation... 2 About the demonstration edition... 2 Windows... 2 Macintosh... 3
Quite Hot 3 Contents Installation.................................................................. 2 About the demonstration edition.............................................. 2 Windows................................................................
More informationSage Pastel Accounting. Year End Procedures Sage Pastel Partner V
Sage Pastel Accounting Year End Procedures Sage Pastel Partner V14 2015 Contents Welcome to your Pastel Partner Year End Guide 3 Website and online support 3 Support operating hours 3 Contacting Chips
More informationModern RAID Technology. RAID Primer A Configuration Guide
Modern RAID Technology RAID Primer A Configuration Guide E x c e l l e n c e i n C o n t r o l l e r s Modern RAID Technology RAID Primer A Configuration Guide 6th Edition Copyright 1997-2003 ICP vortex
More informationIBM Fundamentals of Applying Tivoli Storage Solutions V2. Download Full Version :
IBM 000-026 Fundamentals of Applying Tivoli Storage Solutions V2 Download Full Version : https://killexams.com/pass4sure/exam-detail/000-026 QUESTION: 92 What is required to identify valid participants
More informationQChart 5 User s Guide. QChart5.0. User s Guide
QChart5.0 User s Guide Qpuncture, Inc. 5824 E. Camino Pinzon Anaheim, CA 92807 USA Email info@qpuncture.com WEB http://www.qpuncture.com Phone 1-714-685-0900 or 1-800-650-8222 Fax 1-714-685-0909 2001-2007
More informationInstructions & Manual
This is the for the Wessex Pricing Program (Advanced) - released February 2005. Contents Page Features 2 Installation 3 Start Screen 3 How the Program Works 4 Other Costs 4 Customise values 4 Printing
More informationRecovery ROI: Doing More with Less. How to Save Time and Money when Recovering
Email Recovery ROI: Doing More with Less How to Save Time and Money when Recovering Email 2 2 3 4 4 6 The Cost of Recovering Email Storage Costs Infrastructure Costs Time Costs Human Resource Costs How
More informationOperating system. Hardware
Chapter 1.2 System Software 1.2.(a) Operating Systems An operating system is a set of programs designed to run in the background on a computer system, giving an environment in which application software
More informationFurniture Work in Progress
Updated July 2016 Contents...3 Planning to Use the Application...4 Setting Parameters...4 Viewing Furniture Works in Progress...6 Manually Adjusting a WIP Order to Bring it into Balance...9 Changing After
More informationStorage. How does volatility compare? What is a storage device and a storage medium? Today s standard disk is 3.5 wide
1 Chapter 7 Storage 2 Chapter 7 Objectives 3 Memory Versus Storage 1 What is storage? 2 Media and devices used to store and retrieve data, instructions,and information 4 Memory Versus Storage 1 How does
More informationBest Practices for Using Symantec Online Storage for Backup Exec
WHITE PAPER: xxxxxx Data Protection [00-Cover_Bar] Best Practices for Using Symantec Online Storage for Backup Exec Confidence in a connected world. White Paper: Data Protection Best Practices for Using
More informationIT CONTINUITY, BACKUP AND RECOVERY POLICY
IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY Effective Date May 20, 2016 Cross- Reference 1. Emergency Response and Policy Holder Director, Information Business Resumption
More informationFormatting, Organising and Storing Data
Formatting, Organising and Storing Data Scott Summers UK Data Service University of Essex Cancer Research UK Data Sharing and Management 24 th May 2017 Overview Looking after research data for the longer-term
More informationWarm standby done right. Heikki Linnakangas / Pivotal
Warm standby done right Heikki Linnakangas / Pivotal This presentation About built-in tools Not about repmgr, WAL-e etc. You probably should use those tools though! Not about monitoring, heartbeats etc.
More informationUNIT 3 INTRODUCTORY MICROSOFT EXCEL LESSON 6 MAKING THE WORKSHEET USEFUL
UNIT 3 INTRODUCTORY MICROSOFT EXCEL LESSON 6 MAKING THE WORKSHEET USEFUL Objectives Sort data in a worksheet. Use the AutoFilter to extract specified data from the worksheet. Hide worksheet columns or
More information3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007
3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007 Fault tolerance refers to the capability of a computer or network to continue to function when some component fails. Disk fault tolerance refers
More informationAuxiliary Storage and File Organisation
Lesson 6 Auxiliary Storage and File Organisation Auxiliary storage refers to storage other than the main storage (e.g. magnetic tape or direct access devices). Other names given to auxilliary storage are
More informationDatabase Management Systems, 2nd edition, Raghu Ramakrishnan, Johannes Gehrke, McGraw-Hill
Lecture Handout Database Management System Lecture No. 34 Reading Material Database Management Systems, 2nd edition, Raghu Ramakrishnan, Johannes Gehrke, McGraw-Hill Modern Database Management, Fred McFadden,
More informationPhysical Storage Media
Physical Storage Media These slides are a modified version of the slides of the book Database System Concepts, 5th Ed., McGraw-Hill, by Silberschatz, Korth and Sudarshan. Original slides are available
More informationSolution Recipe: Increase Data Protection Using Intel vpro Technology
Solution Recipe: Increase Data Protection Using Intel vpro Technology Preface Intel has developed a series of unique Solution Recipes designed for channel members interested in providing complete solutions
More informationBackUp Strategies. ApplePickers April 12, 2017
BackUp Strategies ApplePickers April 12, 2017 Why Backup? HDDs fail. It s not a matter of if; it is a matter of when Disk errors Possibility of theft, vandalism, or fire Stupid mistakes in deleting files
More informationSorting and Filtering Data
chapter 20 Sorting and Filtering Data IN THIS CHAPTER Sorting...................................................... page 332 Filtering..................................................... page 337 331
More informationAs your databases continue to evolve, you will need to incorporate advanced queries and reports. This chapter addresses how to create and use action
As your databases continue to evolve, you will need to incorporate advanced queries and reports. This chapter addresses how to create and use action queries and how to create queries that perform more
More informationUsing Microsoft Access
Using Microsoft Access USING MICROSOFT ACCESS 1 Interfaces 2 Basic Macros 2 Exercise 1. Creating a Test Macro 2 Exercise 2. Creating a Macro with Multiple Steps 3 Exercise 3. Using Sub Macros 5 Expressions
More informationAvid Media Composer Training Essentials for Uzbek Television
2007-12 for Uzbek Television Inhaltsverzeichnis 1 Backup... 3 1.1 Calculation...3 1.2 Strategy: bin backup...4 1.3 Strategy: project backup...5 1.4 Strategy: consolidation...6 1.5 Attic Folder...7 1.6
More informationChapter 10 Managing a Database. Discovering Computers Your Interactive Guide to the Digital World
Chapter 10 Managing a Database Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, database, and explain how a database interacts with data and information
More information*M29890A0120* M29890A W850/U4385/ /3/3/ Turn over
Centre No. Candidate No. Surname Signature Paper Reference(s) 4385/1F London Examinations IGCSE Information and Communication Technology Paper 1F Foundation Tier Friday 16 November 2007 Morning Time: 1
More informationCTAS e-li. Published on e-li (http://eli.ctas.tennessee.edu) April 28, 2018 Electronic Records
Published on e-li (http://eli.ctas.tennessee.edu) April 28, 2018 Dear Reader: The following document was created from the CTAS electronic library known as e-li. This online library is maintained daily
More informationTuskegee Backup and Offsite Policy and Procedures
TUSKEGEE UNVERSTY OCE O NORMATON TECHNOLOGY Tuskegee Backup and Offsite Policy and Procedures Purpose This policy defines how to safeguard the information assets of the University and how copies of stored
More informationAccess the Electronic SM and MC Forms
2 Access the Electronic SM and MC Forms Topics: Pages Launching the Browser 2-2 Access the Electronic SM and MC Forms System Buttons Form Terms 2-4 2-8 2-9 User Preferences 2-12 Symbol Key Helpful hints
More informationCOMPUTER SYSTEMS. Section 1
COMPUTER SYSTEMS Section 1 BITS AND BYTES In order for information to flow through a computer system and be in a form suitable for processing, all symbols, pictures, or words must be reduced to a string
More informationAssociate Professor Dr. Raed Ibraheem Hamed
Associate Professor Dr. Raed Ibraheem Hamed University of Human Development, College of Science and Technology Computer Science Department 2015 2016 1 Points to Cover Storing Data in a DBMS Primary Storage
More informationGUIDELINES FOR CREATION AND PRESERVATION OF DIGITAL FILES
GUIDELINES FOR CREATION AND PRESERVATION OF DIGITAL FILES October 2018 INTRODUCTION This document provides guidelines for the creation and preservation of digital files. They pertain to both born-digital
More informationReal4Test. Real IT Certification Exam Study materials/braindumps
Real4Test http://www.real4test.com Real IT Certification Exam Study materials/braindumps Exam : 250-312 Title : Administration of Symantec Backup Exec 12 for Windows Server Vendors : Symantec Version :
More informationStorage Optimization with Oracle Database 11g
Storage Optimization with Oracle Database 11g Terabytes of Data Reduce Storage Costs by Factor of 10x Data Growth Continues to Outpace Budget Growth Rate of Database Growth 1000 800 600 400 200 1998 2000
More information06 May 2011 CS 200. System Management. Backups. Backups. CS 200 Fall 2016
06 May 2011 CS 200 System Management 1 Let s discuss the facts of life... You will die. Your disk will die. Your disk will die first. 2 The user, manually at day s end, make copies on... Who does them?
More informationAfter the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning
After the Attack Business Continuity Week 6 Part 2 Staying in Business Disaster Recovery Planning and Testing Steps Business continuity is a organization s ability to maintain operations after a disruptive
More informationHow to Add Product In Your Store
How to Add Product In Your Store Adding a simple product Adding a Simple product is similar to writing a post in WordPress. 1. Go to WooCommerce > Products > Add Product. You then have a familiar interface
More informationSAP R/3: DART Data Retention Tool. Author Girish Awade
SAP R/3: DART Data Retention Tool Author Girish Awade Agenda Introduction Configuring DART Data Extraction Archive Retrieval Example 2 Agenda Introduction 3 Introduction I ve archived my data and now the
More information24 Sub-Queries. Sub-Queries
24 Sub-Queries Sub-Queries are another method of restricting data, but they use the results of one query to restrict a second query. Web Intelligence generates SQL that is processed by the database in
More informationChapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/
Chapter 1 Storage Concepts 4 - Storage Concepts In order to understand CommVault concepts regarding storage management we need to understand how and why we protect data, traditional backup methods, and
More information