SlideShare una empresa de Scribd logo
1 de 15
By: Esteban Muñeton, Camilo Pacini, David Silva y
               Freddy Cabrera.
               Colegio Britanico
                      11b
Content.
 Introduction.
 Objective.
 Development of the topic.
 Conclusion.
 References.
Introduction
 On this presentation we´re going to talk about the
 data security and data transfer, and why is it important
 to know about it. Then we will talk about the different
 types of data file types, translating between file
 types, standard file types and rapid transfer of data.
Objective.
 To understand better about data security and data
  transfer.
 To know about more about translating between file
  types.
 And to have a clear idea about Standard File Types and
  Rapid Transfer of Data.
Data Security.
 Data Security means protecting a database from
 destructive forces and the unwanted actions of
 unauthorized users.
Data Transfer
 Data transmission, digital transmission, or digital
  communications is the physical transfer of data (a
  digital bit stream) over a point-to-point or point-to-
  multipoint communication channel. Examples of such
  channels are copper wires, optical fibres, wireless
  communication channels, and storage media. The data
  are represented as an electromagnetic signal, such as
  an electrical voltage, radiowave, microwave, or infrared
  signal.
Data File Types
   Quake 3 archive (.pk3) – (See note on Doom³)
   Doom³ archive (.pk4) – (Opens similarly to a zip archive.)
   RAR Rar Archive (.rar) – for multiple file archive (rar to .r01-.r99 to s01 and so on)
   RAG / RAGS game file, a game playable in the RAGS game-engine, a free program which both allows
    people to create games, and play games, games created have the file format "RAG game file"
   SEN Scifer Archive (.sen) – Scifer Internal Archive Type
   sit/sitx – StuffIt (Macintosh)
   SKB – Google Sketchup Backup File
   tar
   .tar.gz, .tgz – gzipped tar file
   TB (.tb) – Tabbery Virtual Desktop Tab file
   TIB (.tib) – Acronis True Image backup
   uha – Ultra High Archive Compression
   VIV – Archive format used to compress data for several video games, including Need For Speed: High
    Stakes.
   VOL – unknown archive
   VSA – Altiris Virtual Software Archive
   WAX – Wavexpress – A ZIP alternative optimized for packages containing video, allowing multiple
    packaged files to be all-or-none delivered with near-instantaneous unpacking via NTFS file system
    manipulation.
   Z – Unix compress file
   zoo
   zip
   .?Q? – files compressed by the SQ program.
   7z – 7-Zip compressed file
   AAC- Advanced Audio Coding
   ace – ACE compressed file
   ALZ – ALZip compressed file
   APK – Applications installable on Android
   AT3 – Sony's UMD Data compression
   .bke – BackupEarth.com Data compression
   ARC
   ARJ – ARJ compressed file
   BA – Scifer Archive (.ba), Scifer External Archive Type
   big – Special file compression format used by Electronic Arts for compressing the data for many of
    EA's games
   BIK (.bik) – Bink Video file. A video compression system developed by RAD Game Tools
   BKF (.bkf) – Microsoft backup created by NTBACKUP.EXE
   bzip2 – (.bz2)
   bmp – (paint)
   c4 – JEDMICS image files, a DOD system
   cab – Microsoft Cabinet
   cals – JEDMICS image files, a DOD system
   cpt/sea – Compact Pro (Macintosh)
   DAA – Closed-format, Windows-only compressed disk image
   deb – Debian Linux install package
   DMG – an Apple compressed/encrypted format
   DDZ-file, a file which can only be used by the "daydreamer engine" created by "fever-dreamer", a
    program similar to RAGS, it's mainly used to make somewhat short games.
   EEA – An encrypted CAB, ostensibly for protecting email attachments
   .egg – Alzip Egg Edition compressed file
   EGT (.egt) – EGT Universal Document also used to create compressed cabinet files replaces .ecab
   ECAB (.ECAB, .ezip) – EGT Compressed Folder used in advanced systems to compress entire system
    folders, replaced by EGT Universal Document
   ESS (.ess) – EGT SmartSense File, detects files compressed using the EGT compression system.
   GHO (.gho, .ghs) – Norton Ghost
   gzip (.gz) – Compressed file
   IPG (.ipg) – Format in which Apple Inc. packages their iPod games. can be extracted through Winrar
   jar – ZIP file with manifest for use with Java applications.
   LBR – Library file
   LQR – LBR Library file compressed by the SQ program.
   LHA (.lzh) – Lempel, Ziv, Huffman
   lzip (.lz) – Compressed file
   lzo
   lzma
   LZX (algorithm)
   MBRWizard archive (.mbw)
   MPQ Archives (.mpq) – Used by Blizzard games
   MacBinary (.bin)
   NTH (.nth) – Nokia Theme Used by Nokia Series 40 Cellphones
   PAK – Enhanced type of .ARC archive
   Parchive (.par, .par2)
Translating between file Types
 Data conversion is the conversion of computer data
 from one format to another. Throughout a computer
 environment, data is encoded in a variety of ways.
Standard File Types
 The need to import and export data files has led to the
  development of several standard file types that
  many applications can understand. Examples
  are jpg andgif files for images, and mp3 files for
  sound; but there are also standard file types for
  text, movies, and spreadsheet data.
 Often an application of a different type can import
  data, for example, a word processor may be able to
  import a spreadsheet file.
Rapid Transfer of Data
 Files can be easily transferred and shared across the
    globe using the Internet. A file could be:
   emailed as an attachment
   sent over instant messenger
   downloaded from a website/web server
   accessed over a private network
   Documents, eg a spreadsheet, can be stored on a web
    server and then accessed via any computer with
    an Internet connection and a web browser.
    Collaborative working is possible too, where multiple
    people contribute to the same document.
Bibliography
 http://en.wikipedia.org/wiki/Data_security
 http://www.bbc.co.uk/schools/gcsebitesize/ict/databases/datatransfer
    rev4.shtml
   http://www.sevenforums.com/tutorials/19449-default-file-type-
    associations-restore.html
   http://www.osvoffertory.com/CUSTOMERRESOURCES/StandardFileF
    ormatsTAQ.aspx
   http://www.spamlaws.com/data-security.html
   http://www.google.com.co/search?hl=es&biw=1511&bih=741&q=data+se
    curity&bav=on.2,or.r_gc.r_pw.r_qf.,cf.osb&um=1&ie=UTF-
    8&tbm=isch&source=og&sa=N&tab=wi&ei=PqhrT-
    XbI4yMsALG2siDBg#um=1&hl=es&tbm=isch&sa=1&q=quick+transfer+
    of+data+&oq=quick+transfer+of+data+&aq=f&aqi=&aql=&gs_l=img.3...
    50467l53431l0l54165l10l10l0l0l0l5l312l1919l0j5j4j1l10l0.frgbld.&pbx=1&ba
    v=on.2,or.r_gc.r_pw.r_qf.,cf.osb&fp=fcf666b4750b1ca6&biw=1511&bih=7
    41

Más contenido relacionado

Destacado

11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganographyAlexander Decker
 
Secure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSecure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSai Sirisha
 
RFID based Automatic Pesticide Dosing & Irrigation
RFID based Automatic Pesticide Dosing & IrrigationRFID based Automatic Pesticide Dosing & Irrigation
RFID based Automatic Pesticide Dosing & IrrigationSindhi Madhuri
 
Secure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor networkSecure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor networkRaja Shekhar
 
Introduction to SSL/TLS
Introduction to SSL/TLSIntroduction to SSL/TLS
Introduction to SSL/TLSkeithrozario
 
Design of Accident Detection and Alert System for Motor Cycles
Design of Accident Detection and Alert System for Motor Cycles Design of Accident Detection and Alert System for Motor Cycles
Design of Accident Detection and Alert System for Motor Cycles Dhanith Krishna
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)amanchaurasia
 
Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)Sandeep Gupta
 
INTELLIGENT HELMET FOR COAL MINERS
INTELLIGENT HELMET FOR COAL MINERSINTELLIGENT HELMET FOR COAL MINERS
INTELLIGENT HELMET FOR COAL MINERSARUN P S
 

Destacado (15)

11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
 
Secure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSecure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wireless
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Database modeling and security
Database modeling and securityDatabase modeling and security
Database modeling and security
 
SSL-image
SSL-imageSSL-image
SSL-image
 
RFID based Automatic Pesticide Dosing & Irrigation
RFID based Automatic Pesticide Dosing & IrrigationRFID based Automatic Pesticide Dosing & Irrigation
RFID based Automatic Pesticide Dosing & Irrigation
 
Internet Key Exchange Protocol
Internet Key Exchange ProtocolInternet Key Exchange Protocol
Internet Key Exchange Protocol
 
Steganography
SteganographySteganography
Steganography
 
Secure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor networkSecure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor network
 
Introduction to SSL/TLS
Introduction to SSL/TLSIntroduction to SSL/TLS
Introduction to SSL/TLS
 
Design of Accident Detection and Alert System for Motor Cycles
Design of Accident Detection and Alert System for Motor Cycles Design of Accident Detection and Alert System for Motor Cycles
Design of Accident Detection and Alert System for Motor Cycles
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
Steganography
SteganographySteganography
Steganography
 
Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)
 
INTELLIGENT HELMET FOR COAL MINERS
INTELLIGENT HELMET FOR COAL MINERSINTELLIGENT HELMET FOR COAL MINERS
INTELLIGENT HELMET FOR COAL MINERS
 

Último

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 

Data security and data transfer

  • 1. By: Esteban Muñeton, Camilo Pacini, David Silva y Freddy Cabrera. Colegio Britanico 11b
  • 2. Content.  Introduction.  Objective.  Development of the topic.  Conclusion.  References.
  • 3. Introduction  On this presentation we´re going to talk about the data security and data transfer, and why is it important to know about it. Then we will talk about the different types of data file types, translating between file types, standard file types and rapid transfer of data.
  • 4. Objective.  To understand better about data security and data transfer.  To know about more about translating between file types.  And to have a clear idea about Standard File Types and Rapid Transfer of Data.
  • 5. Data Security.  Data Security means protecting a database from destructive forces and the unwanted actions of unauthorized users.
  • 6. Data Transfer  Data transmission, digital transmission, or digital communications is the physical transfer of data (a digital bit stream) over a point-to-point or point-to- multipoint communication channel. Examples of such channels are copper wires, optical fibres, wireless communication channels, and storage media. The data are represented as an electromagnetic signal, such as an electrical voltage, radiowave, microwave, or infrared signal.
  • 7.
  • 8. Data File Types  Quake 3 archive (.pk3) – (See note on Doom³)  Doom³ archive (.pk4) – (Opens similarly to a zip archive.)  RAR Rar Archive (.rar) – for multiple file archive (rar to .r01-.r99 to s01 and so on)  RAG / RAGS game file, a game playable in the RAGS game-engine, a free program which both allows people to create games, and play games, games created have the file format "RAG game file"  SEN Scifer Archive (.sen) – Scifer Internal Archive Type  sit/sitx – StuffIt (Macintosh)  SKB – Google Sketchup Backup File  tar  .tar.gz, .tgz – gzipped tar file  TB (.tb) – Tabbery Virtual Desktop Tab file  TIB (.tib) – Acronis True Image backup  uha – Ultra High Archive Compression  VIV – Archive format used to compress data for several video games, including Need For Speed: High Stakes.  VOL – unknown archive  VSA – Altiris Virtual Software Archive  WAX – Wavexpress – A ZIP alternative optimized for packages containing video, allowing multiple packaged files to be all-or-none delivered with near-instantaneous unpacking via NTFS file system manipulation.  Z – Unix compress file  zoo  zip
  • 9. .?Q? – files compressed by the SQ program.  7z – 7-Zip compressed file  AAC- Advanced Audio Coding  ace – ACE compressed file  ALZ – ALZip compressed file  APK – Applications installable on Android  AT3 – Sony's UMD Data compression  .bke – BackupEarth.com Data compression  ARC  ARJ – ARJ compressed file  BA – Scifer Archive (.ba), Scifer External Archive Type  big – Special file compression format used by Electronic Arts for compressing the data for many of EA's games  BIK (.bik) – Bink Video file. A video compression system developed by RAD Game Tools  BKF (.bkf) – Microsoft backup created by NTBACKUP.EXE  bzip2 – (.bz2)  bmp – (paint)  c4 – JEDMICS image files, a DOD system  cab – Microsoft Cabinet  cals – JEDMICS image files, a DOD system  cpt/sea – Compact Pro (Macintosh)  DAA – Closed-format, Windows-only compressed disk image  deb – Debian Linux install package  DMG – an Apple compressed/encrypted format  DDZ-file, a file which can only be used by the "daydreamer engine" created by "fever-dreamer", a program similar to RAGS, it's mainly used to make somewhat short games.
  • 10. EEA – An encrypted CAB, ostensibly for protecting email attachments  .egg – Alzip Egg Edition compressed file  EGT (.egt) – EGT Universal Document also used to create compressed cabinet files replaces .ecab  ECAB (.ECAB, .ezip) – EGT Compressed Folder used in advanced systems to compress entire system folders, replaced by EGT Universal Document  ESS (.ess) – EGT SmartSense File, detects files compressed using the EGT compression system.  GHO (.gho, .ghs) – Norton Ghost  gzip (.gz) – Compressed file  IPG (.ipg) – Format in which Apple Inc. packages their iPod games. can be extracted through Winrar  jar – ZIP file with manifest for use with Java applications.  LBR – Library file  LQR – LBR Library file compressed by the SQ program.  LHA (.lzh) – Lempel, Ziv, Huffman  lzip (.lz) – Compressed file  lzo  lzma  LZX (algorithm)  MBRWizard archive (.mbw)  MPQ Archives (.mpq) – Used by Blizzard games  MacBinary (.bin)  NTH (.nth) – Nokia Theme Used by Nokia Series 40 Cellphones  PAK – Enhanced type of .ARC archive  Parchive (.par, .par2)
  • 11. Translating between file Types  Data conversion is the conversion of computer data from one format to another. Throughout a computer environment, data is encoded in a variety of ways.
  • 12. Standard File Types  The need to import and export data files has led to the development of several standard file types that many applications can understand. Examples are jpg andgif files for images, and mp3 files for sound; but there are also standard file types for text, movies, and spreadsheet data.  Often an application of a different type can import data, for example, a word processor may be able to import a spreadsheet file.
  • 13. Rapid Transfer of Data  Files can be easily transferred and shared across the globe using the Internet. A file could be:  emailed as an attachment  sent over instant messenger  downloaded from a website/web server  accessed over a private network  Documents, eg a spreadsheet, can be stored on a web server and then accessed via any computer with an Internet connection and a web browser. Collaborative working is possible too, where multiple people contribute to the same document.
  • 14.
  • 15. Bibliography  http://en.wikipedia.org/wiki/Data_security  http://www.bbc.co.uk/schools/gcsebitesize/ict/databases/datatransfer rev4.shtml  http://www.sevenforums.com/tutorials/19449-default-file-type- associations-restore.html  http://www.osvoffertory.com/CUSTOMERRESOURCES/StandardFileF ormatsTAQ.aspx  http://www.spamlaws.com/data-security.html  http://www.google.com.co/search?hl=es&biw=1511&bih=741&q=data+se curity&bav=on.2,or.r_gc.r_pw.r_qf.,cf.osb&um=1&ie=UTF- 8&tbm=isch&source=og&sa=N&tab=wi&ei=PqhrT- XbI4yMsALG2siDBg#um=1&hl=es&tbm=isch&sa=1&q=quick+transfer+ of+data+&oq=quick+transfer+of+data+&aq=f&aqi=&aql=&gs_l=img.3... 50467l53431l0l54165l10l10l0l0l0l5l312l1919l0j5j4j1l10l0.frgbld.&pbx=1&ba v=on.2,or.r_gc.r_pw.r_qf.,cf.osb&fp=fcf666b4750b1ca6&biw=1511&bih=7 41