Alyssa Marie Gascon - Module 1-2-Assignment
Alyssa Marie Gascon - Module 1-2-Assignment
Alyssa Marie Gascon - Module 1-2-Assignment
Lesson 2 Assignment
Name: Gascon, Alyssa Marie L. BSAIS 3B
Date: SEPTEMBER 20, 2021
People are required for the operation of all information systems. These people resources include
end users and IS specialists.
End users: (also called users or clients) are people who use an information
system or the information it produces. They can be accountants,
salespersons, engineers, clerks, customers, or managers. Most of us are
information system end users.
IS Specialists: people who actually develop and operate information
systems. They include systems analysts, programmers, testers, computer
operators, and other managerial, technical, and clerical IS personnel.
Briefly, systems analysts design information systems based on the
information requirements of end uses, programmers prepare computer
programs based on the specifications of systems analysts, and computer
operators operate large computer systems.
It includes all physical devices and material used in information processing. It includes not only
machines, such as computers but also all data media, i.e. tangible objects on which data is
recorded.
Hardware resources are the assignable, addressable bus paths that allow peripheral devices and
system processors to communicate with each other. Hardware resources typically include I/O port
addresses, interrupt vectors, and blocks of bus-relative memory addresses. Before the system can
communicate with a device instance, the PnP manager must assign hardware resources to the
device instance based on knowledge of which resources are available and which ones the device
instance is capable of using. Resources are assigned to each device node in the device tree
(assuming that the represented device needs resources and those resources are available). The PnP
manager keeps track of hardware resources using lists, which it associates with device nodes.
It includes all sets of information processing instructions. This generic concept includes not only
the sets of operating instructions called programs which direct and control computer hardware but
also the set of information processing instruction called procedure that people need.
Software resources is the set of instructions that tells the hardware what to do. Software is created
by developers through the process of programming. Without software, the hardware would not be
functional.
Data Resource is a component of information technology infrastructure that represents all the data
available to an organization, whether they are automated or non-automated. Different business
organizations may have different needs. Today, it is not uncommon to find a single company
operating in different industries. It is also not uncommon to find companies branching out to
different geographical locations within the country it is operating in or even outside the country
of its origin.
The information asset may be a separate component of this framework. Just like the arrange and
server components, and numerous other components not said, it is critical to carefully arrange the
information asset of the IT infrastructure. The information asset includes all its representation of
each and each single information accessible to an organization. This implies that indeed that non-
automated information such as bulks of paper records in person work areas of each staff, secret
paper information covered up in steel cabinets, deals receipts, solicitations and all other exchange
paper records constitute the Information Asset. It cannot be denied that in spite of the
digitalization of all trade forms, papers still play a huge portion in trade operations.
Network resources refer to forms of data, information and hardware devices that can be accessed
by a group of computers through the use of a shared connection. These types of resources are also
known as shared resources. They are important in work environments where collaboration is
essential to success. A well-known way of sharing network resources through peer-to-peer
exchange through a bit-torrent client. Whereas these programs make it simple to share expansive
records with expansive numbers of individuals, they are most regularly utilized for pilfering
media records, such as music, motion pictures, tv appears, program and video recreations.
6. List and Describe Backup topologies provide screenshots and detailed descriptions.
Three basic topologies are used in a backup environment: direct attached backup, LAN based
backup, and SAN based backup. A mixed topology is also used by combining LAN based and SAN
based topologies.
1. In a direct-attached backup, a backup device is attached directly to the client. Only the metadata
is sent to the backup server through the LAN. This configuration frees the LAN from backup
traffic. The example shown in Figure 12-7 depicts use of a backup device that is not shared. As
the environment grows, however, there will be a need for central management of all backup
devices and to share the resources to optimize costs.
INFORMATION SYSTEM OPERATION AND MAINTENANCE
2. In LAN-based backup, all servers are connected to the LAN and all storage devices are directly
attached to the storage node (see Figure 12-8). The data to be backed up is transferred from the
backup client (source), to the backup device (destination) over the LAN, which may affect
network performance. Streaming across the LAN also affects network performance of all systems
connected to the same segment as the backup server. Network resources are severely constrained
when multiple clients access and share the same tape library unit (TLU).
3. A SAN typically consists of multiple servers, online storage (disk), and offline storage (tape or
optical), all of which are connected to a Fibre Channel switch or hub—usually a switch. You can
see all these SAN elements. Once the three servers are connected to the SAN, each server in the
SAN can be granted full read/write access to any disk or tape drive within the SAN. This allows
for LAN-free, client-free, and server-free backups, each represented by a different-numbered
arrow
INFORMATION SYSTEM OPERATION AND MAINTENANCE
RTOs represent the amount of time an application can be down and not result in significant
damage to a business and the time that it takes for the system to go from loss to recovery. This
recovery process includes the steps that IT must take to return the application and its data to its
pre-disaster state. For high-priority applications, an RTO can be safely expressed in seconds, as
long as the IT department has invested in failover services. RTOs require your IT department to
first sort applications based on their priority and risk of business loss. IT then allots these
applications the appropriate amount of your enterprise’s resources, namely time, money and IT
infrastructure.
In talking about RTOs, critical should be understood to mean “time-sensitive.” There are many
processes that are critical to the organization in the long term, but which are not especially time
sensitive. Accounts payable is an example.
The importance of the disaster recovery point objective is critical because the achievable RPO
accounts for a certain limit of expected data loss during disaster events. Even performing constant
backup doesn’t guarantee data recovery as you might face a sudden system failure, disaster, or a
disruptive event.
No matter which side of the backup strategies you choose, the first thing you should do is set up
the backup task, and in the first place, create a full backup. Any backup task that is later running
on your PC is based on the previous full backup.
In the default Windows backup plans, the configuration options are limited when it comes to
select what items to back up, while the EaseUS free backup software covers almost everything
our users tend to back up.
10. Give different types of backup software, provide screenshots and detailed descriptions.
(minimum 5 software)
a. MutualBackup is an interesting free backup solution because instead of storing the backup on a flash
drive or other device attached to your computer, this one copies the files over a network.
The program lets you store copies of your files on a friend’s computer, no matter where it’s at.
It’s a bit like an online backup service but instead of paying for storage space on a server somewhere, you
and a friend can exchange free space on your own hard drives to store the other person’s backups.
This also works on your own network, so if you want to keep your videos backed up to the
computer downstairs, you can do that too.
All files are encrypted and compressed before transport, so someone on the other computer can’t
see what you’re backing up. Restoring is as easy as choosing which files you want to download back to
your computer, and you can, at any time, delete the remote backup from your own computer.
INFORMATION SYSTEM OPERATION AND MAINTENANCE
If you are connecting with a friend outside your network, they’ll have to set up port forwarding,
and you’ll need to know their public IP address.
This app runs on any java platform, so it works on Windows, Linux, and other operating system.
b. EaseUs Todo Backup can backup individual files and/or whole folders to and from a location on a
local drive or network folder, as well as save backups to a free cloud storage service. In addition to
particular, custom content, the program can also back up an entire disk, partition, or system drive.
While scheduling a backup, or once has completed, you can run an incremental, differential, or
full back up on the same data.
Backups are not readable from Explorer, so you must use EaseUs Todo Backup to view the data.
More specifically, you can double-click the backup file to open it in EaseUs Todo Backup, where it looks
like Windows Explorer and is just easy to use, but you have to have the program installed in order to open
the backup. A timeline of backups is shown so that it’s easy to choose a particular time from which to
restore files.
You can browse through a backup in three ways: by searching through a backup via filename or
extension, in “tree view” with the original folder structure intact, or by filtering the backed up files by file
type like email/picture/video.
You can restore whole folders and/or individual files to their original location or a custom one.
EaseUs Todo Backup also allows changing the file compression of a backup, limiting the backup
speed and priority, wiping a disk, backing up an Android device, preserving security settings during a
INFORMATION SYSTEM OPERATION AND MAINTENANCE
backup, splitting an archive into a smaller section, password protecting a backup, and scheduling a
backup on a one-time, daily, weekly, or monthly basis.
The program is compatible with Windows 11, Windows 10, Windows 8, and Windows 7.
c. DriveImage XML can back up the system drive or any other attached drive, to just two files that can
then be stored on a network folder, local disk, or external drive.
A DAT file is made that contains the actual data that’s on the drive while a small XML file is
built to keep descriptive information regarding the backup.
Before a backup is performed, you can choose to also backup unused space, to compress the files,
and/or to split the backup into smaller sections. If splitting a backup into onto a hard drive (that’s the
same size or larger as the original) or browse through the backup using DriveImage XML. You’re able to
extract out individual files, search through the backup, and even directly launch some files without
restoring everything.
Scheduling a backup is supported, but it’s done only with command line parameters, which is
useful if using Task Scheduler to automate a backup.
DriveImage XML can also backup, or clone, one drive to another without creating an image file.
This method, as well as regular backup and restore as described above, can also launched before
Windows boots, using live CD.
INFORMATION SYSTEM OPERATION AND MAINTENANCE
The program will start a backup during the wizard when you seemingly least expect it, so ensure
you’re ready to start the backup when clicking Next on the screen entitled Backup.
It works with Windows 10, Windows 8, Windows 7, Windows Vista, and Windows XP, as well
as Windows Server 2016, 2012, and 2008.
d. COMODO Backup has a tons of great features for a free backup program. It can backup registry files,
files and folders, email accounts, particular registry entries, IM conversations, browser data, partitions, or
entire disks like the system drive.
Data can be backed up to local or external drive, CD/ DVD, network folder, FTP server, or sent to
someone as an email.
Various backup file types are supported like creating CBU, ZIP, or ISO file as well as running a
two way or one-way sync, using a regular copy function, or creating a self-extracting CBU file.
Depending on the backup file type you use with COMODO Backup, you can specify if it should
be spliced into smaller pieces, compressed, and/or password protected.
The scheduling options are very specific, enabling a backup to run manually, at login, once, daily,
weekly, monthly, when idle, or every so-many minutes. Missed jobs can even be configured to run in
silent mode to suppress all notifications and program windows.
INFORMATION SYSTEM OPERATION AND MAINTENANCE
Restoring files with COMODO Backup is really easy because you can mount the image file as a
disk and browse through the backed up files as you would in. Explorer, copying out anything you wish.
Alternatively, you can just restore the whole backup image to the original location.
This free backup program also supports email notifications, file exclusions by extension type,
using Volume Shadow Copy for copying locked files, disk/ partition mirroring, changing CPU and
network priority, and running a customer program before and/or after a backup job.
It should run without any problems in Windows 10, Windows 8, Windows 7, Windows Vista, and
Windows XP.
e. Cobian Backup can backup files, drives and folders to and from all the following locations: local disk,
FTP server, network share, external drive, or a manual location. Any or all of these destinations can be
used alongside the others for both the source and backup location.
A full, differential, or incremental backup can be used with Cobian Backup. It also supports
automatically removing empty folders from a backup and utilizing Volume Shadow Copy.
You can set up Cobian Backup to encrypt and/or compress a backup into individual archives for
each file, do a simple copy without archiving anything, or archive the entire source location into one file.
If compressing a backup, you also have the option to configure splitting it into smaller sections, which is
useful if using the files on something like a CD.
Scheduling a backup can be very precise. Cobian Backup can run a backup job once, on startup,
daily, weekly, monthly, yearly, or on a timer that runs every so many minutes.
INFORMATION SYSTEM OPERATION AND MAINTENANCE
Several options are available for launching tasks before and/or after a backup job runs, some of
which include starting a program, stopping a service, hibernating the computer, and running a custom
command.
Cobian Backup also supports choosing a backup priority, running a job as a different user,
sending failed/success logs to one or more email address, and defining advanced filtering options to
include/exclude data from a backup.
Unfortunately, there are no restore options with Cobian Backup short of just browsing the backup
folder and pulling out the files
Cobian Backup works with Windows 10, Wimdows 8, Windows 7, Windows Vista , and
Windows XP.
f. FileFort Backup lets you back up files to a BKZ file, self-extracting EXE file, ZIP file, or a regular
mirror backup that simply copies the files to the destination.
A wizard walks you through the backup process to help you specify what files should be backed
up and where they should go. You can back up multiple folders and/or individual files to an external
drive, CD/DVD/Blu-ray, network folders, or another folder on the same drive as the source files.
When choosing data to include in a backup, you're able to filter the files to only include ones that
are under a certain size and/or a particular file type.
You can encrypt a backup, schedule backups daily or weekly, and optionally run missed ones at
startup.
Restoring a backup gives you the option to restore to the original location or a new one.
INFORMATION SYSTEM OPERATION AND MAINTENANCE
macOS (10.5 through 10.14) and Windows 10, Windows 8, Windows 7, Windows Vista, and Windows
XP users can install FileFort Backup.
g. Redo Rescue doesn't support backing up individual files and folders. Instead, this program backs
up an entire hard drive at once by running from a bootable device like a disc or flash drive.
You can use Redo Rescue to back up a drive to an internal hard drive, external USB device, a
shared network folder, or over FTP, SSH, or NFS.
A collection of files backed up with this program can't be read as regular files. To restore the
data, you must use the program again and then select the drive you wish to restore the files to. The
destination drive will be completely overwritten with the backed up data.
Redo Rescue is best used in a situation where you wish to be able to restore an entire hard
drive. While this type of backup does include all the files and programs on the drive, it's not meant for
individual file and folder restoration.
INFORMATION SYSTEM OPERATION AND MAINTENANCE
h. Iperius Backup backs up files from a local folder to a network or local drive.
The program interface looks really nice, is clean, and isn't at all hard to use. The menus are
displayed side by side in separate tabs, so it's simple to move through the settings.
Files can be added to a backup job one at a time or in bulk through a folder, and a backup job
can be saved locally or on a network, using one of three backup types. You can also choose the
number of backups to store.
Aside from ZIP compression, email notifications, and password protection, Iperius Backup has
some other custom options as well. You can include hidden files and system files in the backup, shut
down the computer after completing the backup, favor compression speed over high compression, and
run backups on a schedule.
In addition to the above, Iperius Backup can launch a program, another backup job, or file
before and/or after a backup job.
When building a backup job, you can also exclude files, particular folders, all subfolders, and
particular extensions from the backup. You can even include or exclude files that are less than, equal
to, or greater than a specific file size to ensure you're backup up exactly what you want.
INFORMATION SYSTEM OPERATION AND MAINTENANCE
This program is said to run on Windows 10, Windows 8, Windows 7, Windows XP, and
Windows Server 2016, 2012, and 2008.