AS 91367 Demonstrate understanding of advanced concepts

advertisement
AS 91367
Demonstrate understanding of advanced concepts relating to
managing shared information within the information systems
Level2
3 Credits
Shared information Systems
Shared information systems relate to be being able to effectively communicate and share
important information and ideas to not only the school yet globally using the computer
system and its software. Students within
High School are able to
access their own individual accounts via a student log on, this re uires a username - given
to the student by the school, and a password for security and access. Staff and the schools
administrator can access students within their log on if the student needs a document to be
printed. Students can save work on their H. drive into main folders and sub folders.
Documents are usually created using softwa programs such as Microsoft Word 2010 that
staff and the administrator can bypass student passwords on their own computer systems.
Other methods of saving students work are usin external drive like USB sticks. Students
can also access W: drive for material to be edited or used in class, this material used on
.~t91l!l
W: drive is created by staff within the school;
. l'i r;;;;•c;;;;;;······-·-- · -·i2
students are unable to save their own work to
- .
'!-0 •
this drive. TheY: drive is used for students to
access graphics and clipart's, the material
,. ......,
within theY: drive is also created by staff, and
· -=- ~
students must not save their work to this
, ....
drive. Other drives include T: Q: and F: these
are accessed by staff only (students logon) Q: "~:::... ... ~•.
MUSAC accounting and students information,
;=~::=
.,._
T: allows staff to share information about
requirements within the school, e.g. NZQA,
curriculum and exams. Students are unable to
- -a..r............ .,..; ,_..:.. -.~::::J ,~..;.,....
r
Hctwott.N.t
S,.Uft~.HI6t
•
~~NfJ'S
save work on these drives.
High School has a website
school.nz) and links are provided on the
High School website to social networking
sights such as Facebook, Twitter and Moodie. This allows
students to share and view information such as upcoming
events, cancellations made by the school etc. Moodie is like a
website designed for staff to put student work and revision
papers on. Only staff within the school can access and place
information for students on Moodie, otherwise a student
(www.
1
---~
- -..
..........
~
........
i
~
.....:::-~-::... ~-· ---.· .. ... 1••• _..
~ 1';11..-­
_.,.;;;wy,.~
-
-ao=:::-.:;;:.
... .......
,._
m::'·.:.:.:::.-::.:..::.... .
& r::-.:-r:7:.:o~~
:·;··-
--..: !!--:?~7.'::'"::"::-"""'"'- ...
-u :~?c:::-:--
•?;~T --~·..:
t.=.-:;·~:r..::_
iii:::::=-= - ·-
.• 1:11
I
password and student username is given to students by the school to access the information
website.
staff have placed on the website for revision. To the right is an image of the
Image source:
http://www.facebook.com/
students whom have their own individual Facebook accounts are also able to ask questions
such as "Is the fun runs still on?" in which will be answered by the individual running the
schools Facebook Page, the area marked by the arrow demonstrates this.
Hardware
Computers hardware is the most important component in the running of a computer system.
Computer hardware itself incorporates all the visible and physical components of a computer
system. Hardware within a school computer system means students can access software on their
computers due to the reliance of the computer's hardware to operate the software within the
computer system. Hardware available for students to use include the printer the option of black or
white printing, the keyboard, the mouse, the CPU (computer processing unit) scanner, speakers,
laptops (available from the library), and the monitor. Staff hardware includes projectors and smart
boards - used to display content to the class, only staffs have an obligation to use these. Below is
an example of some computer hardware components that can be found in the school
environment. Image Source: warepin.com
Software
Applications and programmes within the computer
which convert all data/ information put into the
computer by the user into responses by the
hardware. It is the applications that make the
computer work like Windows operating \system.
There are also other Software that are available on
the computer are \Software including Microsoft
Office, Microsoft Word and more. The following
image to the right demonstrates some familiar
software applications available to students on the
school computer system. Image source:
blogsolute.com
Data
Data is the main information a student uses via a software program such as Microsoft Word
to produce information suited to the individual. Data covers a broad spectrum of different
information by using words, numbers, measurements, observations, descriptions, statistical
data, instructions, lists, graphics anCJ animations, in which a student can use to produce
information. Students put in work and manipulate it using a different format by printing it out,
analysing it and creating a new document, examples include spread sheets, word
documents and movies. The schools limits access to data e.g. internet by blocking sites
such as Facebook and limiting internet time access by giving each student the same
amount of internet data per week, once this is used up by the student they may have to wait
the next week until their data is reset again.
Components:
Hardware:
Features:
Hardware is the
range of physical
features and
elements that
combine to form
the computer
system.
Software:
Software is the
computers
instructions or
main data.
Anything within the
computer system
that can be stored
electronically is
software.
Data:
Data is a collection
of facts, figures
and statistics
related to a
particular topic.
Data can be used
to form useful
information and is
a valuable asset
for an organisation
such as the school.
Data is used to
perform effective
and successful ·
operations within
the school.
Compu.t er
procedures within
the school are
guidelines as to
Procedures:
Example:
The physical
components of a
computer include:
monitor, keyboard, hard
disk, mouse, etc.
Objects you can
physically touch include:
Disks, disk drives,
display screens,
keyboards, printers etc.
Microsoft Word,
Microsoft PowerPoint,
Microsoft Access,
Microsoft Excel, Firefox,
Safari, Windows Media
Player, etc.
Students signing the
role when they get to
school stating they are
present are stored
electronically to keep
track of each student's
attendance at school.
Each student has a
personal fact sheet
written about them e.g.
stating the students
name, parents name,
address, phone number
etc.
Interacts:
Hardware interacts with
application software to
allow students to access
information, produce their
own information, and
print out final results.
Students can also save
their work so it is able to
be retrieved at a later
date.
When a student uses
application software this
works as a middleman
converting the users input
into instructions for the
operating system to
understand. The
operating system then
converts the instructions
to the computer's
hardware allowing the
computer accomplishes
the task we set before it.
The Data that's available
within a school is there
under the conditions of
the privacy act and
cannot be exposed to
outside parties. Data
interacts with software
through the recording of
personal information etc.
For example if a student
is sick, that data goes
through the software to
send an email or text
message.
Anti-virus software is usee
to authorise only suitable
sites and software on
systems. The school
Guidelines must be
followed for the use of
software that is available
and the data that can be
People:
how things are
done. Instruction
manuals are an
example of how
procedures are
explained for users
to operate
hardware or
software and data.
People include
those whom use
the computer
system. Computer
skills classes allow
individuals to learn
how to operate
computing
systems.
Administrator is the only used e.g. student photos
person authorised to add can only be used on the
school website.
computer software
programs.
The principal- final
decider on what will be
available to students,
the finance managerdeals with the costs of
computing, the
technician- puts
software programs onto
computers, ICT
Staff/committee- looking
at what's available and
what's suitable, general
staff/office- looking at
what's available and
what's suitable,
librarian- issuer of
laptops and does
research and studentshave very minimal say.
Procedures
Procedures are rules or instructions for organisations such as the school to follow in order to
show how things work. These may be covered via instructions or user manuals. The school
uses different procedures to allow students and staff safe access to equipment. Students must
sign a contract to use the computers in the correct way. Anti-virus software is used to authorise
only suitable sites and software on systems. The school Administrator is the only person
authorised to add computer software programs.
Personnel "Hierarchy"
People involved in creating and using the school system. These include the student themselves
using the computer system, the principal- final decider on what will be available to students, the
finance manager- deals with the costs of computing, the technician- puts software programs
onto computers, ICT Staff/committee- looking at what's available.
People involved in creating and using the school system. These include, the student
themselves using the computer system, the principal- final decider on what will be available to
students, the finance manager- deals with the costs of computing, the technician- puts software
programs onto computers, ICT Staff/committee- looking at what's available and what's suitable,
general staff/office- looking at what's available and what's suitable, librarian- issuer of laptops
and does research and students- have very minimal say. The following above image
demonstrates the common features and their order of the operating system.
4
Advantages and disadvantages of shared information Systems:
Advantages:
Globalisation: Information technology has allowed organisations such as
to share and
gain information efficiently from all around the world in a matter of seconds. We have access to
information without having to physically travel to that place to get that information or to try
understanding difficult language barriers or geographic barriers that may prevent our access to
information. The school itself partakes in globalisation when it organises annual young leader's
trips to overseas destinations such as Japan or the USA. Communicating via email and being
able to share the details and underlined instructions of how to be a part of the trips is shared to
our school from overseas, which is then passed on to staff and students, allowing us to interact
with overseas organisers and share information to one another via email or online internet
websites such as http://www.cylc.org/gylc/ (website for the global young leaders conference.
Impact: Information is accessed from all sorts of information via the internet and a wide variety
of countries e.g. not from English or American text books.
Communication: Communication via information technology means we can quickly and
effectively communicate to almost anyone around the world with the click of a button. These
include text messaging to overseas personals, communicating via email, Facebook, even video
calling others from Skype, or Windows Live Messenger. The school uses mainly email to
communicate with other individuals from overseas, however it is mainly staff that are able to do
this as students ( other than using their own email accounts to send emails) are unable to
ac~ess staffs emails. Staff may use email to contact NZQA personals with questions about
particular papers and their marking requirements.
Impacts: Students in the school are able to use Moodie to communicate to one another within
the school environment only; conversations however are monitored by the schools computer
administrator to watch for any inappropriate conversations, this has allowed quick and easy
communication between students.
Cost effectiveness: Information technology has helped businesses become more
"computerized" helping them to become cheaper and more efficient. Information can be placed
on a business's website without having to pay for costly advertisements which take up both
time and money. This in effect helps to raise business profits, and have a more relaxed and
organised business environment. Businesses can now also manage thousands of customers
online with efficient technology in the workplace. An example of this includes the
High School Website (www.
school.nz) where those individuals from overseas can
access information about the school via photos, enrolment information, costs, school activities,
hostel information etc. This way the school is gaining larger profits by inviting a greater number
of students to the school due to easily accessible online information.
Impacts: The school charges a voluntary contribution of approximately $40.00 to cover the cost
of using technology equipment within the school environment. This includes the cost of printing,
the ink for printers and paper that's used for printing out material. Students are allowed a $3.00
print charge per term which is automatically added further printing means students put their
own
~ridging the cultural gap: Information technology has allowed us to understand a wide range
of diverse cultures to communicate and share ideas, this means we can increase our
understanding and awareness of other cultures and reduce preconceptions. Our school does
this by introducing a school cultural week. International leaders at the school are able to share
their cultures to students within the school environment to show their traditions, whether it be
arts, food cultural activities etc., and ideas are also gained via the internet for example looking
at how other cultures live by interacting with individuals of another culture.
s
Impacts:
High School has their own international website www.
com
in which is specifically designed for international students and parents looking at sending their
daughters to the school. The website is offered in 7 different languages including English,
Korean, Japanese, German, Chinese and Thai. This has helped increase the number of
international students to the school dramatically over the past years offering student roles within
the school such as international leader.
More time: Information technology means that businesses can now operate 24 x 7 all around
the world and be open anytime during the week and at any location, allowing purchases to be
made from different countries by simply using a credit card. This is more time efficient and
convenient for businesses who want to make large profits. Staff at the school may use online
stationary websites to order stationary in bulk for students ordering their stationary via the
school e.g. from (www.officemax.co.nz)
Impacts: The school website is an example of a business that can now operate 24 x7 for
students and parents to visit and view information, this has allowed the school to become more
recognised not only within New Zealand yet around the world as the school showcases itself
online.
C'reation of new jobs: Information technology has allowed new jobs to be created within the
l)chool environment. These jobs are surrounding the computer systems e.g. ICT manager,
computer administrator, system analysts etc.
Impacts: Creation of new jobs include having student roles such as year 13 ICT leader which
helps to make informed decisions with the main computer administrator about loading new
software onto the computer etc.
Disadvantages:
Staff having to learn new skillsPrivacy: Information technology has allowed the world to communicate and share ideas,
however it is becoming easier to gain unauthorized access to others personal information
without them knowing via hacking through email and other personal files in which may become
public knowledge for others to view without you knowing. In the school by limiting the amount of
access students have via email memory this helps to prevent hackers from gaining access to
staff and student emails, the school also has traffic watch where inappropriate websites that
may be of target to online hackers are blocked and the school computer administrator keeps an
eye on students internet activity and firewalls are also used to block websites such as
Facebook.
Impact: The main impact of privacy issues within the school has mean the school has had to
set up firewalls to block students from entering sites considered inappropriate, as well as virus
protection programmes.
Lack of job security: Jobs security has become an issue due to the changes in technology
each day. Updating skills on how to continue to keep jobs secure and learning methods of how
to do this are essential if the business wishes to remain stable.
Impact: There is a need for continued retraining and people may find themselves on short term
contracts rather than permanent employment, financially they will have to structure there use of
money. There are opportunities to work independently as well, and work for you.
Advantages of my own:
Working remotely: Information technology systems allow remote access to an individual's
company electronic network, this allows business employees to work from anywhere they want
whether it is home or away. This allows increased productivity as work is still being done to
6
'•
satisfy the workplace even when you aren't physically at work. This applies for Girls High
Students as well whom are able to access online internet sites such as Moodie for teacher
answers and workbook exercises (these are placed on the website by the teacher) or NZQA
offer information and access to past papers in which can be found on their website helping the
student toward study for end of year exams or midyear school tests. Students also have access
to teachers email to ask for catch-up work to be emailed due to explained absences.
Impact: People can put in more work without being in an office which means they can work 24
x 7 if they want to, students have a lack for supervision as to what they are accessing. More
reliance on technology, handwriting becomes affected.
Storing and Protecting Information:
Information technology allows us to store valuable work electronically. Storing students
work, exam results, records of students reports or even students own personal work can be
saved electronically to keep information safe only allowing certain users to access the
information by changing, withdraws or adding to the documents. Students and teachers at
use personal log on usernames and passwords to protect their information at the
school, this way only students can get into their personal work and information, however
teachers can gain access to students work to correct or look at work as well as the school
administrator whom keeps track of student internet activity.
Impact: Students have their own log on's and passwords so it is up to them to store their
own work in which an H:/drive is offered as students own storing drive.
Disadvantages of my own:
Implementation Expenses:
Implementation of expenses refers to the start-up costs of placing any software programmes
etc. onto the computer system. These costs of hardware, software user licenses for each
student using the operating system will cost the school money. If faults occur within the
computers the costs of having to fix the faults by a specialised IT personal or trained technician
the costs to upgrade all student
costs the school a lot of money, therefore at
computers is becoming too expensive therefore students are being encouraged to bring their
own laptops or I pads to save costs.
Impact: The school now pays $3.00 per term of printing money into each student's computers;
students who use this money before the next term are obliged to pay their own money as a way
of helping the school cut extra costs for students printing.
Viruses:
Viruses are a programme usually picked up from the internet that can disrupt the normal
functioning of the computer system. Viruses can corrupt the hard drive causing save items to
suddenly disappear or stop opening in their normal programmes. At school there are measures
taken in place to help avoid students from receiving viruses due to online activity, these include
firewalls being placed to prevent students from accessing inappropriate websites that may be a
target for viruses and spyware to protect the computers from any viruses that may incur from
online activity.
Impact: The school has had to set up firewalls to prevent viruses from coming into the school
computer systems, these can also be found on external hard drives from other students.
Final Management Considerations Related To Shared Information
Files and Folders
The school does not have a set system for students to create files and folders. Teachers
generally instruct students where to save.
7
Conventions
The file name convention is the name a student calls their document they are going to save.
Files can be named only with alphabet and number; there can be no added symbols. Within
the school, these files can only be saved on the students H: drive or your USB. Files can be
shared with others by using email, social networking, and Moodie. The storage on files is
only limited space for students. On a student's H: drive they can choose what folders they
can cre"ate. Old fo!~ ~r~ on student's H: drives are cleared at the end of the year.
,I. I.SIIli1l0· 1$••<•ll)po-
MJ!llllll:ll- fitloldw
~ AIIlliH••'I•11<4 \IflSIIol
-lt31LIJI-
""'-
,.,la..u
rl -
.",."""'....
8'*«
). lNiwl•
Mi!llll~,_. fitloldw
l2,«;11Ull:!l- filf•lltlr
). USllli· .... lhoo!
IIM,13llltlll<L flo-
~ USlliH"illw
Jl"lillllli<lh.. fikloilor
USZ!Il! · W-
- W l - likloilor
/
The highlighted folder shows
the correct use of using strictly
alphabetical letters, numbers.
!}&....., ....... ftnnl012f«:l\ll ll.ll/llnl'"'o- -Wv.ID-
The input, storage, retrieval and manipulation of data within an information system.
Manipulation of Data:
1. Input- Input relates to ways in which information is brought into an organisation. How
information is brought into the school can be from emails, forms, phone, textbooks,
teachers and staff, other students and also notices are different way information can be
informed to students. Also Government and NZQA provided schools with the information
that they provide the students.
2. Storage- Storage refers to how saved information is kept. Ways for schools to store the
information given to them can be hard copy (something that has been printed out),
software (office, music and others), library, school storage space and shelving like filing
cabinets. Out of these, students can only access from the hard copies, some software,
and library and storage space. Although the staff can access all of these storage spaces.
3. Retrieved- Retrieved refers to regaining possession of information. Information can be
accessed by students but cannot be altered, information is put on W:/Drive by staff for
student use e.g. Moodie, class tasks, e.g. information for school Facebook site.
Ethical and Legal Issues related to shared information within an organisation
Copyright and what it protects
Copyright, often presented with a© symbol is the information an individual displays for
others to access via the internet. It gives individuals the right to create personal work that
may include films, artworks and personal document write-ups of their own and to permit
others to do the same. In New Zealand the 1994 Copyright Law protects original literary,
dramatic, musical and artistic works, sound recordings, films, communication works and the
typographical arrangement of published editions. Copyright can be applied to text, or
graphics particularly that supplied through the internet and textbooks. At
High school
Examples of Copyright
Someone writing about a particular author or play and publishing their own work on the
internet/another person can't come along ana use it as their own work.
-· Those wanting to copy information should acknowledge the source and the original
author.
Example of copyrighted materials
8
-
When you acknowledge the author and the source of the information e.g. book name of
author or title of page, internet website and date accessed (bibliography)
- You can break copyright open anything that has been created by another person if you
claim it as your own or use it in any way that it is being on sold e.g. Games provided on
the internet
Related procedures and conventions for privacy and permissions at the school
Organisation Policy-The school may be able to set up a password barrier on the
wireless internet, a school based password so students can access information.
Students must be able to pass a cyber-safety course to decide what is appropriate
and what isn't on a school system.
Watching "Traffic"-, As a technician the school administrator can watch the amount of
traffic that is going to certain or popular sights, e.g. News sights for breaking news
within the community e.g. the 3 missing boys in New Plymouth. The traffic slows down
as we get further away from the event, socially as it becomes a lower priority than what
it was. Traffic flows are important way of gaging what it going on within the school and
what students are interested in. It visibly presents the peak (or websites that are of most
interest, used frequently). It is like doing a survey e.g. which websites are the most
popular to students at
this will be answered by the amount of girls that go onto
a website.
Installing Firewalls- for example the school has set up a firewall to block all social
websites from students such as YouTube, Facebook and bebo etc., particularly
websites that have high graphic content. Firewalls were created to block pornographic
websites and inappropriate materials that some students may be exposed to. Firewall
protects users against inappropriate websites. The school policy means students are
warned if the firewall is broken they will be warned with a "access denied" page, if the
firewall is broken on several occasions the administrator can physically shut down the
students account.
Sharing files- in the school by limiting the amount of access by way of email memory
that can be used by students and staff.
Ethical Issues
Privacy Act 1993- the New Zealand Privacy Act 1993 is an agency in which controls
how storage, disclosure, uses and collection of your personal information is access.
The Privacy Act 1993 gives guidelines as to what you are allowed to access toward
others personal information and prevents others from giving out information that's not
their own personal details.
How to control Privacy on your computer
It's important that students choose a website that they trust and that they are familiar
with a website that is secured. Students must control what information is placed on
the internet with their personal details including photos, blogs and passwords etc.
and make sure you place appropriate items when using the internet as many
personal items can be hacked and used by others e.g. on social sites such as
Facebook and Twitter.
If students have placed personal information of the internet and it has been written
incorrectly, ask for it to be corrected.
Use Nicknames instead of first names and surnames to disguise your name.
Students must refrain from using credit cards for online purchases at school, for
example using security checks online to make sure the website is secure.
Students must remember to log out of their account or delete information they have
placed on the computer before they leave the class.
9
The school has limitations on how much material can be photocopied from text books,
copyrighted materials must be acknowledged by the user.
Producing material for assessments that is from other copy righted material particularly
internet material e.g. internet, music etc.
Backup procedures and conventions for information systems within an
organisation.
Data can be lost in many ways and usually occurs when the media that the data is
backed on fails. Students at the school have many personal and important school
related files and documents which are stored into the students H:/Drive or external hard
drives such as a USB stick. These hard drives do not last forever and can unexpectedly
shut down and database can become corrupt when viruses etc. attack the computer
system causing permanent data loss which cannot be recovered. Faults
It is essential to have backup/recovery procedures and conventions put in place to
ensure personal documents and files are backed up, as once these are permanently
demolished due to any of the above occurrences they may never be able to be
retrieved again. This is why backing up data is so important and should be
regular basis. Two backups during the week in the school will
amount of information is stored away from the school. Par
videos should be a number one priority as once these are
Important business presentations and information should r
important priority, or in school terms slide shows or work f
back-up data should be your music, videos, bookmarks an
Back-up conventions:
Back-up conventions relate to having data backed up for each day of the week, e.g. in
the school the administrator has data backed-up for each day of the week so that work
can be constantly saved if any occurrences may happen that cause data to be lost,
weekly backups help to ensure that work is fully backed-up and can be recovered after
a fault or natural disaster occurs. The school has a setup of tapes that 1.6TB to back-up
the schools whole computer systems; this is managed by the schools administrator.
The following disk storage procedures are used as a means of back-up for
students and staffs database at school.
USB- A USB stick is a popular external hard drive used by many students within the
school, otherwise known as a memory stick, it is a small object in which plugs in the
provided USB slot in the side, front or back of a student's/staffs computer. The USB
101
allows you to store as much files, documents, music, videos and pictures as you want
simply by copying and pasting the files to the USB.
CD/CD-RICD-RW- A CD, is also a popular method used by students to 'bum' and copy
music files onto. Otherwise known as a compact disc, its main use for disk storage is
the storing of music files on to a CD. Information is burnt to the CD from the computer
to copy tracks, software programmes like Window Media Player is available on the
schools computers and is used for activity such as this, the CDS must be blank
however and contain no previous music to in order for them to bum new songs.
DVD/DVD-RIDVD-RW- DVD burning methods may be used by staff or the schools
administrator to place computer programming on or DVDs in which can be used by the
Year 13 JCT leader to place movies on during Tuesday mornings for the school late
start. A DVD is one of the newest storage media available. Similar to a CD, a DVD is
bigger and faster. A DVD is used to store mainly Movies, Audio, Computer Data and
photos.
External Hard Drive- This is a very important method and is mainly used by staff in the
school saving bulks of computer information onto one external hard drive. External hard
drives are plugged into the side of the computer just like your normal memory stick;
however the drive itself is much bigger and can hold a greater quantity of information.
The computer will immediately recognise the drive as it is plugged into computer and by
clicking onto the pop-up on the bottom right hand side, you can set your hard drive to
back-up as many times as you wish whether it be daily, monthly, or yearly (Daily is
recommended), the hard drive is then left attached to the computer to automatically
back-up computer files. External Hard Drives come in large capacities of storage. With
an External Drive to copy items is simple, with a drop and drag from the main hard drive
to the back-up.
Back-up plans placed within the school consider the following points:
• How important a student/staff members data is on their system, for example a
students work toward an internal, exam practise questions, photos for a school
assignment or media for a school assignment is considered as important and
should be backed up in a file called 'school work' with sub folders to help
breakdown and easily identify each different topic and the data within that file.
Most students will use a USB stick as a back-up for important data such as
students school work.
• Most students at school will have work containing data for different subjects and
assignment information including, text, graphics and media. E.g. NZQA exam
practise papers or NZQA school internals a student may be working on.
• Students back-up can vary, work considered important is more likely to be
backed-up upon each saving time on a daily basis, however
windows.microsoft.com say it is dependent on the files individuals create, new
files should be backed up on a daily or weekly basis. Students whom save a Jot
of digital photos should back them up straight away. Scheduled back-ups should
also be put in place from external hard drives e.g. for staff at the school, this way
the computer can automatically back-up important data on a daily, weekly or
yearly basis. Students can also manually back-up work if they only want specific
files backed up.
•
•
•
•
How quickly data should be recovered should also be taken into mind, students
whom have assignments due on a specific date may simply save their work as
having to find it through the back-up system may be time consuming.
The storage used for the back-ups is also important; most school students tend
to use USB sticks.
The students and staff themselves are mainly responsible for their own back-up
procedures and how often they want their work to be backed-up.
Students and staff should also take into mind the best times for their data to be
backed-up; if students or staffs have lots of files to back-up they may choose a
time in which they are not under pressure or busy as backing-up does take time.
Back-up procedures:
Back-up procedures identify methods or back-up plans implemented, good back-up
procedures should identify the following points at a minimum:
Back-up intervals:
Backup intervals underline the frequency in which data at school is backed-up, a chart
form may be used to record how often the data as a whole or specific data should be
backed-up for example staff may require a full data back-up 5 nights per week, some
things may be backed-up 7 days a week, and others of a lesser importance done
weekly or monthly. Thus is dependent on how often the data changes e.g. an
assignment done on the computer which is often changed and worked on may require
data back-up frequently tQ constantly save the changes made to that document, work
that is rarely changed can be backed-up on a less frequent basis.
The location of the backup files and alternative computer facilities- For use in the
event of a major disaster renders their usual equipment unusable, for example disks
etc. stored which contain the schools main data information and software programmes.
Who is responsible? The schools administrator is responsible for the backing up the
schools main data information and software programmes; however students can also
be responsible by backing their work on external devices like a USB.
Students must also remember to save their work in different folders when making
changes for example fi a student is working a piece of work on Microsoft Word and they
make changes, saving both the original copy of that work and the piece of work with the
changes made on it is a way of backing-up work.
Implications of not having a robust backup plan:
There is a chance that any material saved on a computer based system which for both
a business and the school is large, this may include all software applications, all
material that is saved on the computer, including personal information, historical
information, current files, accounts, photos, videos etc.
As a result of this the school would be able to get all of the relevant information up to 1
month out of date (monthly basis) this would mean only trying to track down any entries
or information created within the last month a lot easier than 10 years' worth of stuff.
Download