You are on page 1of 53

Basic Computer Programming

By Tadesse Merga (MSc).


What is Data Loss?
What are data and information?
what is Data
Data can be described as unprocessed facts and figures.
Data is a row documents
Data is the base of all operations in Statics.
 Data can representation of facts, concepts, or
instructions in a formalized manner, which should be
suitable for communication, interpretation, or processing,
by human or electronic machines.
It is represented with the help of characters such as
alphabets (A-Z, a-z), digits (0-9) or special characters (+,
-, /, *, <,>, =, etc.).
Information
 Information is the processed data on which
decisions and actions are based.
 It is data that has been processed into a form that is
meaningful to the recipient and is of real or perceived
value in the current or the prospective action or
decision of recipient.
 Information is a processed document.
 Is called the out put of the processed document.
 from information we get knowledge.

Data Information Knowled


process ge
Metadata
Is data about the data that the system collects,
stores, and provides. Process flows:
descriptions of the business processes that
the system supports.
What is Data Loss?
Data loss is distinguished from data unavailability, such as may

arise from a network outage. Although the two have substantially


similar effects, data unavailability is temporary, while data loss may
be permanent.
It my be the corrupted data, deleted data, missing data, etc

Data loss can occur on any device that stores data. Although any

loss of data, even a simple misplacement, is by definition


technically a loss, what we are primarily concerned with is the
permanent loss of data that is important to your business' ongoing
success.
Causes of Data Loss
Human error - accidental or unknowing data

deletion, modification, overwrite


File corruption - software error, virus infection

Hardware - drive failure, controller failure, cpu

failure
Site-related - theft, fire, flood, earthquake,

lightning, etc.
According to a report on data loss in Europe, over
6% of PCs will suffer data loss in any year - a total of
1.7 million incidents. The report identifies six main
causes of loss of data:
Hardware failure, including damage by power
surge and drive failure (42%)
Human error, including accidental deletion (31%)
Software file corruption (13%)
Virus-infection (7%)
Theft, especially laptop theft, (5%)
Hardware loss, including floods, fires, lightning,
power failure (3%)
Types of data loss

Intentional Action
– Intentional deletion of a file or program

Unintentional Action
– Accidental deletion of a file or program

– Misplacement of CDs or Memory sticks

– Administration errors

– Inability to read unknown file format


Failure
Power failure, resulting in data in volatile memory not

being saved to permanent memory.


 Hardware failure, such as a head crash in a hard disk.

A software Failure/crash or freeze, resulting in data not

being saved.
Software bugs or poor Usability, such as not

confirming a file delete command.


Data corruption, such as file system corruption or

database corruption.
Disaster
– Natural disaster, earthquake, flood, tornado, etc.

– Fire

Crime
– Theft, hacking, sabotage, etc.

– A malicious act, such as a worm, virus, hacker


or theft of physical media.
4 Ways to Prevent Data Loss
There is nothing more frustrating than losing the
important documents that you've spent so much time
creating -- especially if you're like most users who
create documents directly on the computer and don't
have the benefit of a handwritten copy.
I regularly receive questions from users who need to
recover lost files, and, unfortunately, at that point it is
too late to help, as the damage is already done. The
only sure-fire way to recover lost files is to restore
them from a backup, and that is why it is so
important to have a system to prevent data loss.
1. Never store your documents on the same drive as
your operating system
While most word processors will save your files in the
My Documents folder, this is the worst place for them.
Whether it is a virus or software failure, the majority of
computer problems affect the operating system, and
oftentimes the only solution is to reformat the drive and
reinstall the operating system. In such an instance,
everything on the drive will be lost.
Installing a second hard-drive in your computer is a
relatively low cost way to take care of this problem. A
second internal hard-drive will not be affected if the
operating system is corrupted, and it can even be installed
in another computer if you need to buy a new one;
further, you'll be surprised at how easy they are to set up.
2. Back up your files regularly, no matter where
they're stored
Just storing your files in a different location than
your operating system isn't enough; you need to
create regular backups of your files, and let's face it,
even your back up is subject to failure: cds get
scratched, hard drives break, and floppies get erased.

It makes sense to increase your odds of being able to


retrieve a file by having a second back up of it; if the
data is truly important, you might even want to think
about storing a backup in a fireproof vault.
3. Beware of user error
we don't like to admit it, but we often engineer our
own problems. Take advantage of safeguards
included in your word processor, such as versioning
features and tracked changes. A common way users
lose data is when they're editing a document and
accidentally delete portions -- after the document is
saved, the portions that are changed or deleted are
lost unless you've enabled features that will store
changes for you.
4. Keep hardcopies of your documents
While it won't prevent you from having to type and
format your document again, a having a hardcopy
will at least ensure you have the contents of the file --
and that is better than having not
Power Issues
With society’s increasing demand for power comes a
price. The power utility companies have been hard-
pressed to keep up with the present demand, leading to
problems in dealing with future increases. As a result,
brownouts, which are the momentary lapses in power
supply, have become more common than they used to.
When there is a power spike, there is a sudden, huge
increase in power that lasts for a split second. Power
spikes can literally fry computer components. A power
surge is similar to a spike, except that a power surge may
not have the intensity that a spike can have.
Types of Power Problems

Brownout
Also known as sags.

 Sags are short-term decreases in voltage levels.

This is the most common power problem.

Sags are typically caused by the start-up power demands

of many electrical devices (including motors, compressors,


elevators, shop tools, etc.).
Sags also reduce the efficiency and life span of electrical

equipment, particularly motors.


Blackout
Blackouts are total loss of utility power

Blackouts are caused by excessive demand on the power

grid, lightening storms, ice on power lines, car accidents,


backhoes, earthquakes, power rationing, etc.
The effects of a blackout is loss of current work in RAM

or cache, possible loss of hard drive File Allocation Table


(FAT) resulting in total loss of data stored on drive.
Spike
Spikes are instantaneous, dramatic increases in voltage.
Akin to the force of a tidal wave, a spike can enter
electronic equipment and damage or completely destroy
components.
Spikes are typically caused by a nearby lightening
strike.
Spikes can also occur when utility power comes back
on line after having been knocked out in a storm or as the
result of a car accident.
The effects of a spike are catastrophic damage to
hardware and loss of data.
1, UPS (Uninterruptible Power Supply)
Today’s UPS units are populating homes and businesses
at an increasing rate as the cost has decreased
substantially from the early days of computer history. The
UPS is designed to protect your computer from sudden
lapses in power, power spikes or surges, and "dirty"
current. This is accomplished by several components in
the UPS, such as suppressors, noise filters, and surge
protectors. Each of these items are discussed in the
following paragraphs.
2, Generator
3,
Types of Backups
1, Fully Backup
This types of backup makes a copy of all data
to a storage devices.
The advantages of fully backup is that a
complete copy of all data is available with in
a single set of media.
This results in a minimal time to restore data,
a metric known as recovery time objective.
However, the disadvantages of fully backup
is it requires more storage space.
2, Differential/Incremental Backup
Copy only the data that has changed since
the last backup operation of any type.
The Advantages of incremental backup is that
it copies a smaller amount of data than a full.
The operations will have a faster backup
speed, and requires less storage.
Types of backup storage
1, onsite backup storage
 It refers to storing data on a local storage
devices, such as HDD, CD, Magnetic tapes.
Advantages od OB
Quick access to data
With onsite backup, you can store your data
with in the premises. This allows for quicker
access to the stored data without requiring you
to have a storage internet connection.
Low cost

Hard drivers are inexpensive storage units, so


they can purchased in large quantity to make
enough room for storing additional data.

Simple to manage

Onsite backup is simple to control than offsite


one
Dis Advantages
Security:
HDD, CD, Magnetic tapes and other onsite
storage devices are almost vulnerable to data
theft.
Any sensitive business information stored
within the device may fall into wrong hands
leading to serious consequences.
Damage:

As onsite backup remains in the same location


as your office, it may get affected if any
accident or disaster hits the site. This means,
you may be left with no data to resume your
business operations post-disaster.
2, Remote Backup
Call for storing data on an offsite server which can
be access via the internet.
Advantages
Multiple Copies of data:
Remote backup system like cloud backup is
typically stored on multiple server at different
locations. If one is not work you can Access from
the other.
Security
Data is encrypted by the backup service program on
your system before it is sent to be stored at a remote
server
Capacity:
Cloud based backup systems offers unlimited
storage capacity either for a flat or usage-
based fee. However, if your business create
large volume of data regularly , remote backup
service can easily make for your data
management needs
Disavantages
Cost
It is relatively expensive in comparison ton
onsite backup. While it may cost a little higher,
it is worth the investment give the security and
accessibility of the solution.
Speed:
in the case of offsite backup, your data
retrieval capacity depends upon the speed and
efficiency of your network connection. If your
internet connection is slow, it may take even
hours to retrieve the required data.
What is Database Security?
Encoding systems
Corrective maintenance
 Corrective maintenance can be synonymous

with  Reactive maintenance.
Corrective maintenance is the category of

maintenance tasks that are performed to rectify and


repair faulty systems and equipment.
The purpose of corrective maintenance is to restore

systems that have broken down.


Corrective Maintenance Workflow
Examples of Corrective Maintenance
Emergency Repair.
Urgent repairs such as a broken elevator filled with people.
Service Outages
Restoring services that are down. For example, restoring a stock
trading platform that is down.
Repair
Repairing things that are broken such as fixing a solar system by
replacing a broken module.
Performance
Maintenance designed to restore something to optimal performance.
For example, maintenance on a software services that is running
slowly.
Quality
Correcting poor quality. For example, maintenance on a bullet train
to correct vibrations that are causing noise and passenger discomfort.
Benefits of Corrective Maintenance
i, Reduce emergency maintenance orders
 If corrective orders can be executed in a timely manner
once they are initiated, it’s likely that a company can
reduce the number of emergency maintenance orders it
generates.
 In general, corrective maintenance is less expensive
than  emergency maintenance.
ii, Increase employee safety
In some cases, the issues identified and tagged as
corrective maintenance may have significant safety
repercussions for employees working nearby the asset in
question.
iii, Reduce service interruptions. 
Since corrective maintenance work orders are scheduled and
prioritized in a computerized maintenance management
system (CMMS).
iv, Extend asset lifetime.
 Corrective maintenance, coupled with good preventive
maintenance, helps a business extend the lifetime of its
assets. By noting corrective maintenance needs before they
affect other components of the machine, companies can
preserve the lifespan of critical assets.
v, Optimize resource planning
 Since corrective maintenance requests are sent back to a
centralized system, they can be reviewed, prioritized, and
scheduled appropriately.
vi, Decreases downtime 
 In some cases, corrective maintenance may help

companies decrease downtime. For example, if a


maintenance technician is performing routine
maintenance on a piece of equipment and sees that a
part is worn down, a corrective maintenance order can
be placed immediately.
 Ideally, that task gets scheduled and completed

before breakage or downtime occurs.


Disadvantages of corrective maintenance
i, Unpredictability
If you only fix equipment when it breaks, running that
asset will be very unpredictable in the long-run.
ii, Interruption to production
If a critical piece of equipment breaks, it can stop
your entire production line, leading to downtime and
unproductive employees.
iii, Shortened asset lifespan
 By not taking care of equipment and only performing
maintenance when components break, you are
shortening the overall lifespan of your assets.
How to Reduce Corrective Maintenance
Since corrective maintenance is often synonymous
with reactive maintenance, it makes sense that
organizations would be looking for ways to reduce
the number of corrective maintenance orders.
Although there are certain situations where it makes
sense to simply correct a problem when it occurs, in
many other cases, it’s better to prevent the problem in
the first place.
Invest in the right technology
 By implementing a CMMS solution, you can give your
maintenance staff the ability to track and access critical data.
These solutions can often generate analytics and reports that
can help you make better decisions and prioritize the most
critical work orders to maximize production and efficiency.
Invest in your team
 Refine your hiring process as well as your professional
development program.
Train your staff to use tools
 There’s no point in investing in great technology if no one
understands how to use it well. In addition, you’ll want to
ensure that your team is technically trained to recognize
signs of potential problems and understand failure reporting
while conducting other maintenance tasks.
SYSTEM ADMINISTRATE
AND COMPUTER
NETWORK
An Introduction to System
Administration
What Is a Sysadmin?
• In a “small company” the Sysadmin may be
the entire information technology staff.
– The Sysadmin may do everything from
telephone, to fax, to computer management.
– Sysadmin may have to order supplies, deal
with users, develop software, repair
hardware!
What Is a Sysadmin?
In a large company the Sysadmin may be
one member of a large group.
May be responsible for one aspect of the data
center operation.
• Programmers
• Database Administrators
• Network Administrators
• Operators
Common Sysadmin Traits
• The Sysadmin must be able to communicate
with technical and non-technical users.
• • The Sysadmin must be able to solve difficult
technical problems.
• The Sysadmin must be able to work in a group
setting.
• A Sysadmin is a customer service agent!
• The Sysadmin must document activities in order
to reproduce the results.
• The Sysadmin should be patient, and have a
sense of humor.
What Does a Sysadmin Do?
• Plan and manage the machine room
environment
design machine room; specify cooling, cabling,
power connections, and environmental controls
(firealarm, security)
•Train users on software and security.
• Install and maintain operating system software,
application software, and patches, maintain
user accounts, user policy
• Determine hardware and software pre install.
• Schedule downtime to perform
upgrades/patches, and test devices and
schedule downtime to manage devices.
What Does a Sysadmin Do…?
• Configure network services:
printing, file sharing, name service.
• manage security for shared resources.
• Install/configure/manage web servers, configure
web access agents
• Configure and maintain system backups,
determine backup strategy and policies, and
perform restores
• Troubleshoot and repair system problems; and
determine, locate, and repair/replace problem
components
Skills Required
• Delegation and Time Management
• Ethics
• Ability to create/follow Policies and
Procedures
• Desire to learn
• Customer Service Attitude
• Knowledge of technical aspects
Hardware
Software
Problem Solving technic
What is a Network?
A computer network is simply two or more
computers connected together so they can
exchange information.
A small network can be as simple as two
computers linked together by a single cable.
A combination of computer hardware, cabling,
network devices, and computer software used
together to allow computers to communicate
with each other.
N/B The goal of any computer network is to
allow multiple computers to communicate.
A Small Network: Two PCs and One Cable
You can create a simple network with two
computers and a cable, as well as being useful
for discussing networking and learning some
basic skills in classroom labs. 
A Very Large Network:
The Internet Consider a network that is the
opposite of the simple network shown in.
From one perspective, the Internet is a very
large, global network that allows almost every
computer on the planet to communicate with
the other computers on the planet.
Why are networks useful?
Business applications
Resource sharing
e.g. shared printer, shared scanner, etc.
Information sharing
e.g. clients database, Medline, etc.
Communication medium among people
e.g. e-mail, videoconferencing, etc.
E-business
e.g. B2C, B2B, C2C etc. 
Home applications
Internet access
Access to remote information
e.g. online journals, newspapers, etc.
Why are networks useful,….?
Person-to-person communication
e.g. e-mail, chat, etc.
Interactive entertainment
e.g. video on demand, game playing, etc.
E-commerce
e.g. e-shopping, e-banking, etc.
Mobile users
Mobile phones with WAP (Wireless
Application Protocol) system.
M-commerce (mobile commerce).
Types of Network Model
1,Client-server model
A server is a powerful computer containing data. It is
housed and maintained by a system administrator.
A client is a common computer used to access remote
data.
Clients and servers are connected by a network.
The client sends a request over the network to the
server.
The server gets the request, does the job and sends
back a reply.
Server : remote Web server
Client : Web browser   
2,Peer-to-peer model
Every person can communicate with one or more other
people.
Chapter Two

You might also like