answersLogoWhite

0

One of two methods are commonly used to protect the integrity of a file on a computer system, redundancy and checksums.

Checksums involve computing a number that is a function of the file's content, such that different file content results in a different number. Corrupt data would lead to a number that does not match the one on record (a 'checksum mismatch'), thus allowing to detect the breach of data integrity.

Traditionally, such checksum algorithms used CRC-16 and sometimes even much weaker schemes, such as a simple XOR. Those simple algorithms do not always result in a different checksum when the input data changes; modern applications and new design will probably prefer stronger algorithms such as SHA-2.

Redundancy involves maintaining one or more copies of the same file. A breach of data integrity can be detected by comparing those copies, on the assumption that not all will suffer from an error at the same time.

In practical solutions, systems typically use a combination of both. For example, if the comparison detects an integrity breach in a redundant system, the checksums can help decide which one of the copies is good and which is bad, thus fix the error rather than just detect it.

User Avatar

Wiki User

15y ago

What else can I help you with?

Continue Learning about Computer Science

The comparison Between RDBMS and conventional File System?

file system is based on ISAM. It takes time to search a data in a file (table). It is very difficult to maintain physical refrential integrity. It's not an easy talk to patition or scale out a database. RDBMS is quite wide concept. Everything is under one logical box. We can maitain data integrity, reduce the redundancy and increase the consistency of the data. It is very easy to maintain the data and scale out it.


Disadvantages of file system?

Traditional file processing system lacks from DBMS in many ways . Major Disadvantage of FPS are it do not maintains data security and integrity efficiently.


If a server stores data files for users to access it is commonly called a?

If a server stores data files for users to access, it is commonly called a file server. File servers are used to centralize and manage files and data for a group of users within an organization or network. Users can access the files stored on the file server using a variety of methods, such as a shared folder, FTP, or a web-based interface. File servers can be configured with different levels of security and access control, depending on the needs of the organization. Additionally, file servers may also provide features such as file versioning and backup to help ensure the integrity and availability of the stored data.


What are the disadvantages of file organisztion method?

File organization methods can have several disadvantages, including inefficiency in data retrieval, especially when dealing with large datasets. They may also lead to data redundancy and inconsistency if not managed properly, as multiple copies of the same information can exist in different files. Additionally, updating or modifying data can be cumbersome, requiring manual changes across multiple files, which increases the likelihood of errors. Lastly, file organization methods often lack robust security measures, making sensitive data more vulnerable to unauthorized access.


What is the effect of file insecurity in a computer file?

File insecurity in a computer can lead to unauthorized access, data breaches, and potential loss or corruption of important information. It's like leaving your front door wide open for anyone to come in and snoop around. So, if you want to avoid a digital disaster, make sure to lock down those files tighter than Fort Knox.

Related Questions

What Two ways of protecting the integrity of files?

check file fixity if it has been provided with the contents


How do you fix file integrity error?

How to Fix file integrity violated Error


How do you check integrity of a file you have downloaded?

You are not free to chose the method of integrity check, because file integrity checks are two-step processes: First, the original owner of a file computes an integrity fingerprint. An MD5 signature is a popular choice, but many other suitable methods are available an in use. The resulting signature is the communicated with you, often not as part of the file itself (embedding the signature requires additional steps to prevent someone from modifying the file and re-signing). Second, you receive file and integrity checksum. At this point, you have no choice regarding the integrity method; you must use whichever method the originator chose. The originator will typically be able to advise on freely available tools, or supply such a tool, to perform the integrity checks with the chosen algorithms and attributes.


How do you check the integrity of a file you have downloaded?

You are not free to chose the method of integrity check, because file integrity checks are two-step processes: First, the original owner of a file computes an integrity fingerprint. An MD5 signature is a popular choice, but many other suitable methods are available an in use. The resulting signature is the communicated with you, often not as part of the file itself (embedding the signature requires additional steps to prevent someone from modifying the file and re-signing). Second, you receive file and integrity checksum. At this point, you have no choice regarding the integrity method; you must use whichever method the originator chose. The originator will typically be able to advise on freely available tools, or supply such a tool, to perform the integrity checks with the chosen algorithms and attributes.


How do you check the integrity of an ISO file?

To check the integrity of the an ISO file you will need to open command prompt. Once in command prompt type in: c:\> fciv , and the iso file name.


How do you check that some time before which file open in my computer?

Ahave swich my file open my computer becorse i protecting file.


In the File Integrity Monitor of Policy Auditor you can retain up to how many versions including the baseline version of the file?

Six


What is expansion for asmx file?

ASMX file is a webservice file. It stands for 'Active Server Methods Extension'.


What are the methods of file security?

Encryption is the best.


What is the functions of file class?

file class contain methods or functions that handle various file stream operations.


Can you change the action of an acoustic guitar?

Yes, but it involves adjusting what I call the "bridge nut" on some of these you have to file them down, and on others you can adjust through a variety of methods from the inside. I suggest having a professional look at it.


What are dis advantage of file systems?

FPS is File processing system that was used earlier. There are certain limitation in FPS like no security, no integrity.