Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Which of following is used for back-up files?
(a) compress (b) Tar (c) make (d) all the above



Which of following is used for back-up files? (a) compress (b) Tar (c) make (d) all the above ..

Answer / guest

Tar

Is This Answer Correct ?    8 Yes 1 No

Post New Answer

More Operating Systems AllOther Interview Questions

In the process table entry for the kernel process, the process id value is a) 0 b) 1 c) 2 d) 255 e) it does not have a process table entry

4 Answers   Aspire, IBM, Saigun Technologies,


Can you turn on a computer with the keyboard?

0 Answers  


What operating systems provide threads?

5 Answers  


Directories can be implemented either as "special files" that can only be accessed in limited ways, or as ordinary data files. What are the advantages and disadvantages of each approach?

0 Answers  


Why is my computer so slow?

0 Answers  


Can you just explain about memory management in iOS?

0 Answers   B-Ways TecnoSoft,


describe the situation in which priority inversion can occur

0 Answers  


i want information about real time operating systems because i have an interview tomoorow in valeo company.

1 Answers  


How do I upgrade my operating system?

0 Answers  


How do you reset your computer?

0 Answers  


Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

0 Answers  


If semaphore variable is 8 after 6 wait operations and 3 signal operations.what is semaphore

3 Answers  


Categories