Internal and External Hard Drives
All around the world, on laptops, computers, phones, and mp3 players, electronic devices are being used to perform everyday functions. We can pull up saved passwords, applications, and saved files in a matter of seconds. But how exactly are these files saved onto these devices? What units are used to represent the amount of data being saved? How exactly do computers save documents and applications that can be sent from one computer to another?
What units are used to represent the amount of data being saved? The data used in a saved document are all measured units. “The storage capacity is expressed in terms of Bytes.” (Simply Easy Learning) After a bit, comes a nibble, which is two bits. After a nibble, is a byte, which is eight bits. These small units are not used very often in everyday life because most documents use millions of these. The bigger units are as follows;
UNITS BYTES
Kilobyte (KB) 1,024
Megabyte (MB) 1,024 KB 1,000,000*
Gigabyte (GB) 1,024 MB 1,000,000,000*
Terabyte (TB) 1,024 GB 1,000,000,000,000*
Petabyte (PB) 1,024 TB 1,000,000,000,000,000*
”A computer word like a byte is a group of fixed number of bits processed as a unit which varies from computer to computer but is fixed for each computer. The length of a computer word is called word-size or word length and it may be as small as 8 bits or may be as long as 96 bits. A computer stores the information in the form of the computer words.” (Simply Easy Learning)
How exactly are these files saved onto these devices? Every computer has an internal hard drive and a processor. What the processor is basically the eyes of the computer. It reads and processes a code of billions of 1’s and 0’s known as binary. This is also what is...
... middle of paper ...
...ferent perspective, other people are able to hack into our personal devices and steal information from is. Is it a good thing to have all of our information saved onto on to our personal devices?
Works Cited
SanDisk Cruzer Fit CZ33 32GB USB Flash Drive . n.d. 20 11 2013. .
Simply Easy Learning. n.d. 20 11 2013. .
Team, Bestofmedia. Hard Drives 101: Magnetic Storage. 30 August 2011. 20 11 2013. .
Vermaat, Shelly. Microsoft Office 2010. Boston: Course Technology, 2010. Paper.
WikiPedia. 19 11 2013. Web. 20 11 2013. .
According to Davis (2012), “Nine out of 10 technology pros think smartphones and tablets will become more important to business productivity in the next couple of years. Seventy-two percent expect to offer more bring-your-own-device options so that employees can access company data with their personal gadgets.” The use of personal electronic device usage is on the rise in the corporate workplace. Although there are opportunities associated with this; there are also risks involved. Companies and government IT divisions need to evaluate these risks, and put specific mitigation plans in place to establish policies to assure that business information is secure.
Nowadays, people are living in the data world. It’s not easy to measure the total volume of data stored electronically, but an IDC estimate put the size of the “digital universe” at 0.18 zettabytes in 2006, and is forecasting a tenfold growth by 2011 to 1.8 zettabytes. A zettabyte is 〖10〗^21 bytes, or equivalently one thousand exabytes, one million petabytes, or one billion terabytes. That’s roughly the same order of magnitude as one disk drive for every person in the world [1].
I'm sure, by now you have used a computer be it to play games or write a
...drive and in hard copy. This way, if my computer fails, I can recover the information thanks to my hard drive. In addition, if the power fails for some reason or if the computer and the hard drive break down, I would have the information in hard copy. Moreover, I am considering storing my documents in some sort of electronic “cloud.” I currently have a virtual storage I can access through my email which acts the same way as a hard drive. I have also read that we can store our artifacts in Canvas. I would like to explore more about that.
In order to store something, data should be collected first. Conducting interviews and distributing questionnaires are the most common and simplest techniques in collecting data. These techniques are useful in investigating a specific subject especially if there are no original data available. This is generally known as the collection of primary data. Before data can be used, data needs to be transformed to fit the present needs (TimeWeb, 2010). Checking for errors, making critical summary and accurate analysis is necessary in gathering and reporting data because a simple mistake in the process could lead to the distortion of the meaning and value of its original form. It is imperative to process the data carefully since this data becomes information needed to be stored. The main purpose of information storage system is to preserve the information gathered used for making plans and decisions at present and in the future.
A hard drive or otherwise known as a hard disk is a storage device that contains one or more inflexible, circular platters that use magnetic particles to store data, instructions, and information. The system unit on most personal computers contains a least one hard disk, sometimes called an internal hard disk because it is not portable (Shelly and Vermaat). In other words a hard drive is the location in a computer where all the computer programs and files are stored. The hard drives are classified as random access, digital, magnetic, and data storage devices.
“ In 2010 the amount of digital information created and replicated worldwide was nearly 1,203 exabytes, (an exabyte is billion gigabytes or 1018 bytes)” IDC [1]
Today, people use cyber technology as a part of life. There are many of good purposes which made for us to use technology today. We use it for things such as share pictures of family or friends, exchange personal information to make new friends, to entertain by foreign channels during staying at home or cultivate and study new knowledge. Beside that , there are also many harmful thoughts that can affect to our life through the internet even we are using or are not using the network technology . One of those evil purposes is spy private information of others. I had read “ Nothing But Net ” by Scott Bekker who wrote an essay to defend for the privacy in cyber technology today and I agree with him.There are many reasons why we shouldn’t spy on others and i summarized it with three points which spying can destroy your relationships between your loved ones, spying is illegal and spying will lose the qualities of human.
some amount of data. In a disk drive, a read/write head (usually a coil of
One important reason that advancements in technology are bad is Personal identifying information can be found by anyone who has a computer. People’s personal information, like address and medical history can be found, because almost everything is online. ID theft is a growing problem in the United States. “The scope of ID theft has grown so quickly that it now takes up a substantial and growing portion of law enforcement resources.” This means that ID theft is becoming a big problem. Once your ID is stolen it can be very difficult to get back what you lost.“Though the costs of getting your money back have declined, victims aren't getting back all of what was taken”. This means that when people’s things get stolen over the internet, they may not get everything back that was taken.Technology is so advances people’s personal information can be accessed by anyone with a laptop, and that is something that needs to be changed.
...nd more data is being saved onto it. Technology has made information accessible, but it has also increased its vulnerability. Without appropriate security measures, information is susceptible to attack and severe misuse.
Digital information in China defined as information or records that are created in digital device and environment, also in digital format used device such as computer for access and process it (Liu, 2013). According to Voutssas (2012), digital preservation is the process of maintaining digital information using technology according to established policies and procedures as told by InterPARES (2006). National Archive of China and Latin America faced several problems in order to establish long-term preservation of digital information. Preservation of digital information is one of the activities that face with many problems than to print or other material format. The main problems are technological and economic that will influence the process of preserving digital information. For the technology obstacle, it’s related with the software, hardware, and also operating system that information may become unreachable and unfeasible and the cost use become high than others. Long-term preservation means that preservation that establishes for long period of times and need extra costs and personnel.
It can be connected by cable or memory card into your computer and downloaded for electronic storage.
We put all of the data onto the platters. They are inside of the hard
A storage device is the system where your computer stores and retrieves your data. Storage devices can be a hard disk drive, DVD, CD drives, Blu-Ray drives or flash drives. A computer can retrieve the data by being “commanded” to retrieve it from the storage area and retrieve it to your RAM. The RAM of the computer is your temporary memory where your data is inputted, and then processed and stored onto a storage device for permanent placement.