You are on page 1of 4

Name: Huan, Regine Glydel A.

Crs/Yr/Sec: MT-2F IT-Lec#8: Digital Storage 1


ANSWER THE FOLLOWING QUESTIONS. USE NON_BLACK FONT 5. Make a diagram differentiating storage and memory and
COLOR FOR YOUR ANSWER. Worksheet should not exceed 5 pages. describe how they interact.
TRUE OR FALSE storage
medium is
FALSE 1. Storage devices can be categorized as input or output similar to a
filing
devices. (336) cabinet that When you want to work
FALSE 2. A storage medium is volatile; that is, items stored on it holds file with a file, you remove it
folders from the filing cabinet
remain intact even when you turn off a computer or (storage medium) and
place it on your desk
mobile device. (338) (memory). When you are
TRUE 3. Compared with the access time of memory, the access finished with the file, you
remove it from your desk
time of storage devices is slow. (339) (memory) and return it to
FALSE 4. Because of current standards, head crashes no longer memory is
the filingcabinet (storage
medium).
similar to
occur. (343) the top of
TRUE 5. While encrypted files offer greater security than your desk

unencrypted files, an operating system may require more time to


open and access encrypted files. (344) 6. Explain what access time measures and how transfer rates
TRUE 6. The transfer rate of external hard drives usually is slower are stated. Access time measures (1) the amount of time it
than that of internal hard drives. (344) takes a storage device to locate an item on a storage medium
FALSE 7. Solid-state media is more durable and shock resistant or (2) the time required to deliver an item from memory to
than other types of media, such as magnetic hard disks or optical the processor. Transfer rate is the speed with which data,
discs, because it contains no moving parts. (345) instructions, and information transfer to and from a device.
FALSE 8. Like a hard disk, you regularly should defragment an Transfer rates for storage are stated in KBps (kilobytes per
SSD to increase access times. (346)
FALSE 9. When you are finished using a USB flash drive, simply
second), MBps (megabytes per second), and GBps (gigabytes
remove it from the USB port. (350) per second).
FALSE 10. Mini discs require a separate mini disc drive; that is, 7. Insert an image/picture of a hard disk and list characteristics
they do not work in standard-sized optical disc drives. (353) of a hard disk.
TRUE 11. With serial transfers, data is sent one bit at a time. (356) The storage capacity of hard
FALSE 12. An active RFID tag contains a battery than runs the disks varies and is determined
chip’s circuitry and broadcasts a signal to the RFID reader; by the number of platters the
because they are so small, they can be embedded in skin. (363) hard disk contains, the
MATCHING TYPE composition of the magnetic
a. storage method in which the magnetic particles are aligned
coating on the platters,
horizontally around a disk’s surface
b. the number of bits in an area on a storage medium whether it uses longitudinal or
c. the number of bytes a storage medium can hold perpendicular recording, and
d. special-purpose chip and electronic circuits that control the its density.
transfer of data, instructions, and information from a drive to and 8. Using a flow chart describe the steps for installing an
from the system bus and other components in the computer internal hard drive.
e. flash memory chip type that consists entirely of electronic
components, such as integrated circuits, and contains no moving
parts
f. the simplest RAID storage design, which writes data on two Connect the cables and, if
Replace the computer
Place the new internal necessary, tighten the
disks at the same time to duplicate the data hard drive in the correct screws to secure the
cover, reconnect the
Turn on the computer
power, and, if necessary,
g. process of transferring data, instructions, and information from location. internal hard drive in
replace the battery.
place.
memory to a storage medium
h. storage method in which the magnetic particles are aligned
vertically to a disk’s surface, making much greater storage
capacities possible
i. storage technique in which a device is able to locate a particular 9. Make a diagram explaining how to transfer files from one
data item or file immediately, without having to move internal hard drive to another.
consecutively through items stored in front of the desired item or
file Connect the new internal hard drive as a second internal hard drive in your
j. process of transferring data, instructions, and information from computer
a storage medium into memory
G 1. writing (336)
J 2. reading (336)
Use a docking station or an external enclosure to connect the second internal
C 3. capacity (336) hard drive to the computer that contains the original internal hard drive.
B 4. density (341)
H 5. Perpendicular recording (341)
A 6. longitudinal recording Move or copy the files you want to
E 7. solid-state media (345) transfer from the original internal hard drive to a separate storage device,
such as a USB flash drive, or to a cloud storage provider.
D 8. controller (356)
F 9. mirroring (358)
I 10. random access (361)
Install and run a program designed to transfer files from an old internal hard
drive to a new one.
SHORT ANSWER
1. Define the term, secondary storage.
A storage medium, also called secondary storage, is the 10. Define the term, read/write head.
physical material on which a computer keeps data, Read/write head is the mechanism that reads items and
information, programs, and applications. writes items in the drive as it barely touches the disk’s
2. List types of storage media. recording surface.
Examples of storage media include internal hard disks, 11. Describe how disk cache improves hard disk access time.
external hard disks, solid-state drives (SSDs), memory cards, When a processor requests data, instructions, or information
USB flash drives, optical discs, network attached storage from the hard disk, the hard disk first checks its disk cache
devices, magnetic stripe cards, smart cards, RFID tags, and — before moving any mechanical parts to access the
microfilm. platters. If the requested item is in disk cache, the hard disk
3. Use a table to differentiate between writing and reading data sends it to the processor. If the hard disk does not find the
to storage media. requested item in the disk cache, then the processor must
Writing Reading
wait for the hard disk to locate and transfer the item from
the disk to the processor.
• the process of transferring data, • the process of transferring these 12. RAID is an acronym for redundant array of independent disk.
instructions, and information items from a storage medium
from memory to a storage
13. Make a table, summarizing the sizes and storage capacities
into memory
medium of different external hard disks.

4. Capacity refers to the number of bytes a storage medium


can hold.
Name: Huan, Regine Glydel A. Crs/Yr/Sec: MT-2F IT-Lec#8: Digital Storage 2
 Faster access affordable.
Smaller external Hard disks Entire external Hard disks times (can be
more than 80
•Portable •Enclosed in an airtight, sealed times faster)
•Enable mobile users to case  Faster transfer
transport photos and other rates
files from one computer to  Quieter
another easily operation
 More durable
14. Make a concept map about how to encrypt files.  Lighter weight
 Less power
Run the program or access the feature you will use to encrypt the file, files, or entire hard
consumption
disk or SSD. (leads to longer
battery life)
 Less heat
generation
Select the file, files, or drive you want to encrypt. Longer life (more
than 10 times
longer)
If necessary, specify a password you will use to decrypt the file or files when you
Disadvantage Data recovery in  Lower storage
want to access them. the event of capacities
failure can be  Slower access
more difficult than times
Before you begin the encryption process, review the program or operating
for traditional  Slower transfer
system’s documentation to identify what you will need to do if you lose hard disks, and rates
your password. If this process seems too cumbersome or you anticipate
great risk if you lose access to your encrypted files, you might reconsider
encrypting your files.
their cost is  Louder
higher per operation
gigabyte.  Less durable
 Less light
Start the encryption process. Depending on the number of files you are
encrypting, this process may take several minutes or more to weight
complete.
 More power
consumption
(leads to
smaller battery
life)
15. Insert a list of icons on how you can restore deleted files and  More heat
erased media. generation

20. List types of memory cards using a table and insert a picture
of each.
Type of Memory Card Picture
CF (CompactFlash)

Recycle Bin Freeware Commercial data


recovery
16. Using a flow chart, describe the steps how to protect storage SDHC (Secure Digital High
media from security screening equipment. Capacity)

SDEC (Secure Digital


Repeated studies Expanded Capacity)
If you are
find that airport
transporting
security scanners do
audiotapes, miniSD
not damage memory
videotapes, or
cards, optical discs,
medical X-rays,
and other magnetic
experts recommend
media. In all cases,
placing them in microSD
however, it is wise to
carry-on luggage and
back up the files on
asking security
these devices
personnel to inspect
beforearriving at the
items by hand.
airport. microSDHC

17. Insert a picture of SSD and define the term, SSD.


SSD (solid-state drive) is a flash memory microSDXC
storage device that contains its own
processor to manage its storage.
18. Insert a picture of a magnetic hard disk.
xD Picture Card

Memory Stick PRO Duo

M2 (Memory Stick Micro)

19. Compare and contrast SSDs versus magnetic hard disks


using a table
SSD Magnetic Hard 21. Explain the ethical issues surrounding posting photos of
Disk others on Facebook. Describe Facebook’s privacy settings.
Advantage  Higher storage Keeps the price of Your friends or followers on social media sites instantly can
capacities a laptop
Name: Huan, Regine Glydel A. Crs/Yr/Sec: MT-2F IT-Lec#8: Digital Storage 3
view photos you post. If others are included in the photo and Between full backups, you can perform differential or
you post it without their permission, they might feel you incremental backups. A differential backup copies only the
have violated their privacy. Tagging people in a photo may files that have changed since the last full backup. An
create a link to their social media profiles, exposing their incremental backup copies only the files that have changed
identity. Depending on your privacy settings, your friends’ since the last full or last incremental backup. A selective
contacts can view a photo you post and/or share the photo backup, sometimes called a partial backup, allows the user
without your permission. You can use Facebook’s privacy to choose specific files to back up, regardless of whether or
settings to approve all photos in which you are tagged. The not the files have changed since the last incremental backup.
person posting the photo still can upload the photo, but your 27. Explain how to back up smartphones and other mobile
tag will not appear on the photo until you approve it. devices. Many smartphones and other mobile
Facebook also allows you to report a photo as abusive if you devices include services that sync data to a computer or to a
feel it portrays you negatively or if the person who posted it cloud service. To sync data to a computer, the mobile device
refuses to remove it upon request. either requires cables to connect via a USB port or uses
22. Explain how to eject removable storage media safely. wireless methods such as Bluetooth. Many mobile apps sync
1. If necessary, close any files or exit any programs that data to web apps automatically, which means you may not
are opened or running on the media. 2. Open the window need to schedule a procedure to back up items on a mobile
displaying all the drives and media connected to your device, such as contacts, calendars, email messages, notes,
computer or mobile device. 3. Tap or click to select the and apps. For additional protection, however, some users
drive or media you want to remove safely. 4. Tap or click still back up certain mobile data for easy retrieval if the
the command to safely remove or eject the removable device is lost or corrupted.
storage media. If you are unable to locate this command, you 28. Explain the implications of the permanence of digital content.
may need to press and hold or right-click the icon While people may think their email messages, photos,
representing the device or media to display a shortcut menu videos, and text messages are private, everything online has
and then tap or click the command to remove or eject the the potential to be archived, forwarded, and captured as a
device or media safely. 5. When the notification appears screen shot. This digital footprint never truly can be deleted
stating that the device or media is safe to remove or eject, because everything you do on the Internet, including
disconnect or remove it from your computer. If a notification conducting searches and viewing photos, is saved in
does not appear, you can disconnect or remove the device or databases and backed up on servers in multiple locations
media once it no longer appears in your operating system as worldwide.
connected to your computer. 29. Use a Venn Diagram to differentiate magnetic stripe card and
23. Insert an image file describing the advantages of cloud smart card.
storage.
Magnetic Stripe
Card
A credit card, Smart Card
entertainment An alternative to
card, bank card, a magnetic stripe
or other similar card, stores data
card with a stripe on an integrated
that contains circuit embedded
information in the card.
identifying you
and the card.

30. Insert an image file of tips for using credit cards safely.

24. Explain the ethical issues surrounding ownership of cloud


data. Businesses often contract with cloud storage providers
to host their data storage needs. In many cases, these
businesses use cloud storage providers to store their
sensitive customer data. This data could include contact
information, credit card numbers, and ordering history.
Ownership of cloud data becomes an issue when a cloud
storage provider or the business using the cloud services
31. Differentiate between active and passive RFID tags.
ceases its operations, if the business fails to pay its storage
RFID is a technology that uses radio signals to communicate
fees to the cloud storage provider, or when a contract
with a tag placed in or attached to an object, an animal, or a
between the cloud storage provider and the business
person. The RFID tag consists of an antenna and a memory
terminates.
25. Explain the role of a controller for transferring data from a chip that contains the information to be transmitted via
drive to the computer components. radio waves. An RFID reader reads the radio signals and
A controller, previously called a disk controller, consists of a transfers the information to a computer or computing
special-purpose chip and electronic circuits that control the device. RFID tags are either passive or active. An active RFID
transfer of data, instructions, and information from a drive tag contains a battery that runs the chip’s circuitry and
to and from the system bus and other components in the broadcasts a signal to the RFID reader. A passive RFID tag
computer. The controller may be part of a drive, may be on does not contain a battery and, thus, cannot send a signal
the motherboard, or may be a separate adapter card inside until the reader activates the tag’s antenna by sending out
the computer. electromagnetic waves. Because passive RFID tags contain
26. Describe the four types of backup used by business and no battery, these can be small enough to be embedded in
home users. A backup plan specifies a regular skin.
schedule for copying and storing important data, 32. Explain how microfilm and microfiche are used and the
information, apps, and programs. Business and home users advantages of using these technologies.
can perform four types of backup: full, differential, Microfilm and microfiche store microscopic images of
incremental, or selective. A full backup, sometimes called an documents on roll or sheet film. Microfilm is a 100- to 215-
archival backup, provides the best protection against data foot roll of film. Microfiche is a small sheet of film, usually
loss because it copies all program and data files. Generally, about 4 3 6 inches. A computer output microfilm recorder is
users should perform a full backup at regular intervals, such the device that records the images on the film. The stored
as at the end of each week and at the end of the month. images are so small that you can read them only with a
Name: Huan, Regine Glydel A. Crs/Yr/Sec: MT-2F IT-Lec#8: Digital Storage 4
microfilm or microfiche reader. The use of microfilm and
microfiche provides a number of advantages. They greatly
reduce the amount of paper that firms must handle. They are
inexpensive and have the longest life of any storage media.
To save on physical storage space and to make access easier,
however, some organizations have invested in special
scanners that convert existing microfilm and microfiche to
digital files.

You might also like