大象传媒

Secondary storage and embedded systems - EduqasCloud storage

Computers need to be able to store programs and data indefinitely when the power is switched off. Magnetic, optical and solid state devices are different types of secondary storage used to store the data and programs. Each type has different functions in terms of suitability, durability, portability and speed.

Part of Computer ScienceUnderstanding Computer Science

Cloud storage

Storing at a remote location online is known as . When files and data are sent to the cloud, they are actually being sent to a that is connected to the internet. Files can be uploaded to a folder system and downloaded as required.

In recent years, the cloud has also become a term for internet-based facilities.

Cloud storage has many advantages:

  • data can easily be accessed from anywhere with an internet connection.
  • the business running the cloud storage service manages and security.
  • additional storage can be added easily without having to invest in additional .

However, cloud storage also has a number of disadvantages associated with it:

  • if you can access your data from anywhere with an internet connection, then a hacker can potentially do the same.
  • if your internet connection fails, then you won鈥檛 be able to access your files.
  • you are relying on other people to correctly secure your data and keep backups.
  • you don鈥檛 know if employees of the cloud service will have access to your data.

A business that is considering using a cloud computing service will have to think about whether the advantages outweigh the risks. This is a complex decision and will depend on many factors, including the type of data to be stored in the cloud system.

Technology is always changing and it is important to think about the risks involved when using any new technology. This is especially important when that technology is used to store information that could be private and confidential. Do the risks outweigh the disadvantages? Is the technology likely to suffer from some kind of cyberattack?