Storing & Retrieving
Storing and retrieving is a two-part process; storing saves data or information whilst retrieving reloads data or information. All other information processes rely on storing and retrieving as it gives them a mechanism for maintaining data and information. |
Hardware
- Universal Serial Bus (USB) - a standardised way of creating cables. It was developed to define cables, connectors and protocols for connection, communication and also a power supply in between personal computers and their peripheral devices.
- Hard drives - These come in many forms, some of which include:
- Solid State Drive (SSD) - A storage device which is able to save data digitally through circuits. They are generally faster than traditional HDDs
- Hard Disk Drive (HDD)
- Floppy disk - is a removable magnetic storage medium. They are used for moving information between computers
- Magnetic Tape
- Optical Disk e.g. CDs and DVDs
Software
- File Management Software - An interface allowing users to track and locate files they have saved. E.g. Windows File Explorer
- Cloud Based Storage - Software which allows users to upload and save data on an online database. E.g. Google Drive, DropBox.
Ways we can use it (functions):
- The ability to maintain data and information without it being erased.
- Efficiency and compatibility when compared to manual storage systems.
- Numerous copies can be accessed simultaneously.
Non-based computer tools
- Paper based storage is an extremely common and practical method of storing data.
- Microfiche is used to store larger quantities of data in a smaller space than paper making it more space efficient
- Libraries are a method of storing data so it is easily accessible.
Social and Ethical Issues
The widespread use of information technology has raised a number of ethical issues for people. Security of data and information and unauthorised retrieval of data is just some of the issues that relate specifically to storing and retrieving data.
Security of Data and Information
This is a major issue in relation to the issues people have. The cost of replacing stored data that is deliberately or accidentally damaged is enormous. Data security involves a series of safeguards to protect data. For example; passwords, personal objects, biometric devices, data encryption, securing waste.
Unauthorised Retrieval of Data
The unauthorised retrieval of data refers to people gaining illegal access to information systems. These people are called HACKERS. Hackers are often involved in information theft or financial theft. Their crimes are frequently not reported due to an unfavourable publicity and are not regarded in the same light as a standard robbery.