Procedures that place a priority on files that would be difficult or impossible to replace or reconstruct if they were lost, such as a company’s financial statements, important projects and works in progress.
Data Theft
Removing data from a computer without authorization.
Driver
A small program that instructs the operating system on how to operate specific hardware.
Encryption
A standard method for encoding data.
Humidity
Moisture in the air that can cause computers to short circuit, resulting in the loss of data and damage to hardware.
Ping
A DOS command that tests connectivity and isolates hardware problems and any mismatched configurations.
Power Spike
A short, fast transfer of electrical voltage, current, or energy.
Surge Suppressor
A device that protects against power spikes.
Uninterruptible Power Supply
(UPS)
A battery power source that provides electric current during a power outage.