what is backuprecovery? what is the use?
Answers were Sorted based on User's Feedback
Answer / venkatesh
when ever system or a server was crashed, then total data
will lost. mainly in the servers mantains very impotent
data, once it is crashed then all data will be lost. to
avoid this type of situations use this backup.
one example: recently in Hyderabd one bank's total
documents are distroy in fire. but there is no loss because
all the information was updated daily to main branch. so
they will recover data from that.
| Is This Answer Correct ? | 13 Yes | 4 No |
Answer / madhu
is any system get failure \ system crash.. then all data's
will be loss.. to avoid this issue..
have to take the backup for all data's.
| Is This Answer Correct ? | 2 Yes | 1 No |
Answer / rajesh
I installed forest starminds.com.
i took ASR BACKUP with out floppy. no problem
in that system sql server also i installed with one test
database.
i deleted with crazy crazy all the c drive what ever i want
then i restarted F8---> ACTIVE DIRECTORY RESTORE MODE-->
i restored from backup
my system is back as previous
try it.
wonder ful experience and miracle.
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / amandeep singh
Backup Recovery.
We can say, it is a technique to secure our database from
any natural or unnatural calamity.
Backup Recovery is used to safeguard our database and to
keep services continue from any failure/lose.
If any server in a network failed to work then we can use
the backup server to get our work done. How this is
possible ?
Whenever we store any data on a server it being
automatically replicated to our backup server assigned to
the subjected primary server so in need we can use the same
to recover our data.
Simply, it is being used to keep you and your work going on
continuously.
| Is This Answer Correct ? | 2 Yes | 2 No |
Answer / g.bhaskaran
Recover the datas from backuped data is known as
backuprecovery.
The Backup the datas are very important for an
organisation. The backup datas has to recovered basis on a
external device or remote computers.
| Is This Answer Correct ? | 1 Yes | 1 No |
Which protocol in Solaris machines makes distributed file systems possible ?
when affected the system from virus , which paths will be it stored in system ?
Please list the types of Firewalls, Routers, Switches, Servers, you manage?
what are the advantages and disadvantages of Vlan?
List 4 layer-3 protocols ? a. ICMP b. SNMP c. IP d. ARP e. SMTP f. RARP
On a connectionless protocol , how does error recovery and flow control get taken care of ? a. A different protocol has to run along side b. error recovery and flow control are not taken care of c. the upper layers take care of them d. lower layers take care of them
Which script will find unsafe permissions (sendmail related) ?
2 examples of DCE devices ? a. modems b. routers c. computers d. interface cards
A subnet mask is used to mask a portion of the IP address so that TCP/IP can distinguish the __ ID from the __ ID.
Difference b/w SCSI AND IDE
Give one disadvantage of a peer to peer network?
What is the metric RIP uses to determine the best route ?