what is definition of shadow copy
Answers were Sorted based on User's Feedback
Answer / kashif.khirwa
shadow copy is backup of data that is used when unfortunetly
corrupt then u recover the data through shadow copy if u have
taken shadow copy in win2003 server
Is This Answer Correct ? | 69 Yes | 7 No |
Answer / som
Shadow Copy is the at the moment copy (Snapshot)of files
that is stored in Shadow Copy enabled volume. It caches a
file's previous version when the file is changed.
Is This Answer Correct ? | 3 Yes | 0 No |
Answer / rajib mukherjee
Shadow Copy (also called Volume Snapshot Service or VSS), is
a technology included in Microsoft Windows that creates
point-in-time copies ( snapshots) of files as you work on a
specific volume so you can retrieve versions of a document
you may have accidentally deleted.It is implemented as a
Windows service called the Volume Shadow Copy service.Access
this feature by right-clicking a file or folder and
selecting Restore previous versions.
Is This Answer Correct ? | 3 Yes | 0 No |
Answer / ashushah22@yahoo.com
shadow copy is backup of data that is used when unfortunetly
corrupt then u recover the data through shadow copy if u have
taken shadow copy in win2003 server
Is This Answer Correct ? | 0 Yes | 0 No |
Answer / reddappa reddy
In some Windows operating systems, when a system restore
point is requested, a shadow copy of a file or folder is
created. The shadow copy is essentially a previous version
of the file or folder at a specific point.
Is This Answer Correct ? | 2 Yes | 4 No |
Which layer packages data into frames?
what is the RAID
1 Answers Infosys, Pursuit Technologies,
What does the /var/named/loopback-domain.info file specify ?
What will the command "showmount -e" do?
You have a class B subnet. You would like to divide it up into 12 more subnets by "subnetting". However you also have to have at least 4000 hosts per subnet. Can you do it?
how to check veritas install or not
How to configure RAS in PIX 515E
details on VMware
Difference between layer 2 and layer 3 devices ?
How to identify the ip class of a given ip address?
Which communication is not synchronized and uses a start and stop bit to separate character strings.
How does the MAC sublayer assure that nothing was damaged in transit? a. CRC b. it can't c. ackwoledgement