Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Which of following is used for back-up files?
(a) compress (b) Tar (c) make (d) all the above



Which of following is used for back-up files? (a) compress (b) Tar (c) make (d) all the above ..

Answer / guest

Tar

Is This Answer Correct ?    8 Yes 1 No

Post New Answer

More Operating Systems AllOther Interview Questions

Does a disk cleanup delete everything?

0 Answers  


How do you fix a computer that won't start up?

0 Answers  


Will disk cleanup delete my files?

0 Answers  


Which of following is used for back-up files? (a) compress (b) Tar (c) make (d) all the above

1 Answers   Cadence,


What are Odm Commands.

0 Answers   IBM,


How can I reformat my laptop?

0 Answers  


Is 6 cores enough for streaming?

0 Answers  


Give some examples of use of thread in a single user multiprocessing system

0 Answers  


What is a Safe State and what is its use in deadlock avoidance?

0 Answers   BirlaSoft,


Assume that passwords are selected from four-character combinations of 26 alphabetic characters. Assume that an adversary is able to attempt passwords at a rate of one per second. a) Assuming no feedback to the adversary until each attempt has been completed, what is the expected time to discover the correct password?

4 Answers   FCI,


What causes a corrupt operating system?

0 Answers  


Which is better curl or wget?

0 Answers  


Categories