Preview

Advantages of computerised filling

Satisfactory Essays
Open Document
Open Document
141 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Advantages of computerised filling
Advantages of computerised filling
Files exist in one place and can be viewed by as many people at the same time
Vase amount of floor space can be saved.
Strict control procedures can be implemented using software.
No duplicate files exist, which means that all files are current.
It is easy to transfer non-active files from the hard disk to magnetic tape.
Retention and deletion procedures can be enforced, as a systems administrator will be charged of the file server.

Disadvantages of computerised filing
If the network breaks down, user will not be able to access files.
There may be delays if the system is heavily used.
The files are unavailable to user when the system is being backed up.
If the system is not properly managed, unauthorised users may gain access.
Information may be deleted of procedures are not enforced

You May Also Find These Documents Helpful

  • Good Essays

    The company that I work is need of a file system, one that can support 5000 users or more. This particular system was designed to allow multiple users to access the same file, in doing so there must be a way to protect the data that is being accessed by all of those users.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    There are some really good programs out there the one I found that is quick and fast is Drop box. With Drop box you just place your file in this program and it is instantly available to anyone who is sharing your drop box account.…

    • 596 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    NT2670 Midtern Questions

    • 842 Words
    • 3 Pages

    What directory enables you to use a web site to publish files located anywhere on the network?…

    • 842 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    D) Active Directory Rights Management Services can control what a user is allowed to do with data on a server. You can control printing, copying, transferring and so on.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    10 The process of deleting files of patients who are no longer seen by a provider in a practice is called…

    • 484 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Unit 4222-307 Answers

    • 767 Words
    • 4 Pages

    The Retention and Disposal Policy provides a corporate framework and guideline for the data and how it is stored, how long it is stored for and how it is safely and securely disposed of.…

    • 767 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 3 Quiz

    • 2246 Words
    • 9 Pages

    10) Which of the following is a technology used to place content on a shared file server in a company?…

    • 2246 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Is 305 Week 3 Quiz

    • 577 Words
    • 3 Pages

    The use of USB’s or disk, the files could contain viruses and infect other files or applications on the network. No acceptable user’s policy, AUP, or lack of training employees on the correct usage of the network. The users staying signed into their…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1. You are the network administrator for a new company that has 10 users and plans to add five more users within a year. The files need to be accessed by all 10 users and each user must have different security rights. What kind of network would you install and how would the pieces and components of this network relate to each other? Define each component.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Omega Inc. Bia

    • 2982 Words
    • 12 Pages

    Two weeks ago, Omega experienced a significant loss of proprietary data (estimated value $550,000.00) that was stored electronically in an Oracle database in their main office in Reston. The data was unrecoverable and backups were not being routinely maintained, so no restoration was possible. Although he has no hard evidence, Omega’s CTO believes that the loss resulted from deliberate deletion of files by a systems administrator from the Kansas City office that had been “let go” several weeks prior to the loss. Needless to say, the CTO has been tasked to “get things under control.”…

    • 2982 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Unix File

    • 566 Words
    • 3 Pages

    In order to understand how to control access to a file in a system that supports 5,000 users to 4,990 of those users, a basic understanding of the file permissions of a file on a UNIX system is necessary. A user has the ability to perform three basic actions to a file, read, write and execute. These three actions will be represented by r, w, and x respectively. A UNIX system uses a combination of these characters to control the file permissions. The first three characters represent the owner’s permissions, the middle three characters represent the group’s permissions, and the last three characters represent others permission. A sample of file permission would look like the following:…

    • 566 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unix File Protection

    • 716 Words
    • 3 Pages

    UNIX offers a file protection system that is straightforward and simple to use. However, many people are not aware of the value of this powerful mechanism. A secure environment is achieved not only by the operating system, but also through vigilant user and administrative practices. There are many schemes and mechanisms used in the UNIX operating system, as well as some simple tricks that are available to give the kind of file protection administrators want. For the purpose of this paper, a company with 5,000 employees, where 4,990 employees are allowed access to a specific file will be assessed.…

    • 716 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Apart from taking backup copies, many other various security methods are used to secure the data from any kind of damages, viruses, losses…etc.…

    • 369 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    “Data on the computer can be deleted, modified, or destroyed.”(Taylor, Fritsch, Liederbach, Holt, 2012). It is very important for evidence to be collected, preserved, and examined right away. In most cases, 24 hours proves to be too late to recover non-tampered evidence. “Some computers have automatic wiping programs in case a new person touches the wrong key on the keyboard.” (http://www.supremecourt.gov.pk/ijc/Articles/10/2.pdf). Cyber forensics experts requires special tools which will be able to access any data available on the mass storage media including deleted files and data in unallocated disk areas. Although time is of the essence, it is very important that law enforcement agencies follow the search and seizures laws. A warrant must be issued first before any evidence can be gathered, searched, or…

    • 538 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Mis Nimit Bhatt

    • 405 Words
    • 2 Pages

    * They will not search for files everywhere, just type it in the search box and one can view it.…

    • 405 Words
    • 2 Pages
    Satisfactory Essays