what is definition of shadow copy
Answers were Sorted based on User's Feedback
Answer / kashif.khirwa
shadow copy is backup of data that is used when unfortunetly
corrupt then u recover the data through shadow copy if u have
taken shadow copy in win2003 server
Is This Answer Correct ? | 69 Yes | 7 No |
Answer / som
Shadow Copy is the at the moment copy (Snapshot)of files
that is stored in Shadow Copy enabled volume. It caches a
file's previous version when the file is changed.
Is This Answer Correct ? | 3 Yes | 0 No |
Answer / rajib mukherjee
Shadow Copy (also called Volume Snapshot Service or VSS), is
a technology included in Microsoft Windows that creates
point-in-time copies ( snapshots) of files as you work on a
specific volume so you can retrieve versions of a document
you may have accidentally deleted.It is implemented as a
Windows service called the Volume Shadow Copy service.Access
this feature by right-clicking a file or folder and
selecting Restore previous versions.
Is This Answer Correct ? | 3 Yes | 0 No |
Answer / ashushah22@yahoo.com
shadow copy is backup of data that is used when unfortunetly
corrupt then u recover the data through shadow copy if u have
taken shadow copy in win2003 server
Is This Answer Correct ? | 0 Yes | 0 No |
Answer / reddappa reddy
In some Windows operating systems, when a system restore
point is requested, a shadow copy of a file or folder is
created. The shadow copy is essentially a previous version
of the file or folder at a specific point.
Is This Answer Correct ? | 2 Yes | 4 No |
What network topology is at the exhibit (Exhibits looks like a star of David) ?
what is topologies?
15 Answers IBM, TCP,
how many types of policys in GP(Group Policy)edit
Scenario: “In a switch two hosts are connected to port number 1 and 2 respectively; both the ports are configured with same VLAN id. When data is sent from one host to another, in switch VLAN tagging will happen or not? Why?”
Which layer does "timing" ? a. Physical b. MAC sublayer c. LLC sublayer d. Network Layer e. transport layer
What does SNMP use to send unsolicited messages to the managing host ?
The cold start file is consulted if :
What are the different port role in STP and RSTP?
It is advisable not to use telnet because of security problems. Which program should you use instead ?
Which layer packages data into frames?
How long is MAC address (bytes) ? How may bytes identifies the vendor? a. 8,2 b. 6,3 c. 8,4 d. 6,2
Solaris will run routed if the default route is not defined in the __ file .