what is definition of shadow copy

Answers were Sorted based on User's Feedback



what is definition of shadow copy..

Answer / kashif.khirwa

shadow copy is backup of data that is used when unfortunetly
corrupt then u recover the data through shadow copy if u have
taken shadow copy in win2003 server

Is This Answer Correct ?    69 Yes 7 No

what is definition of shadow copy..

Answer / som

Shadow Copy is the at the moment copy (Snapshot)of files
that is stored in Shadow Copy enabled volume. It caches a
file's previous version when the file is changed.

Is This Answer Correct ?    3 Yes 0 No

what is definition of shadow copy..

Answer / rajib mukherjee

Shadow Copy (also called Volume Snapshot Service or VSS), is
a technology included in Microsoft Windows that creates
point-in-time copies ( snapshots) of files as you work on a
specific volume so you can retrieve versions of a document
you may have accidentally deleted.It is implemented as a
Windows service called the Volume Shadow Copy service.Access
this feature by right-clicking a file or folder and
selecting Restore previous versions.

Is This Answer Correct ?    3 Yes 0 No

what is definition of shadow copy..

Answer / ashushah22@yahoo.com

shadow copy is backup of data that is used when unfortunetly
corrupt then u recover the data through shadow copy if u have
taken shadow copy in win2003 server

Is This Answer Correct ?    0 Yes 0 No

what is definition of shadow copy..

Answer / reddappa reddy

In some Windows operating systems, when a system restore
point is requested, a shadow copy of a file or folder is
created. The shadow copy is essentially a previous version
of the file or folder at a specific point.

Is This Answer Correct ?    2 Yes 4 No

Post New Answer

More Networking Administration Interview Questions

What is a metric?

5 Answers  


IEEE subdivided the datalink layer to provide for environments that need connectionless or connection- oriented services. What are the two layers called?

2 Answers   TATA,


Which command 9and options) will show the routing table, but will bypass hostname lookup ?

1 Answers  


Describe End to End network services: (Choose all that apply) * Best Route selection * Accomplished Segment by Segment, each segment is autonomous * Flow Control & Data Integrity * Best efforts packet delivery

8 Answers   Cisco,


What are your key strengths as a System/network Administrator?

0 Answers  






Describe how SNMP works?

4 Answers  


Which file serves as the configuration file for sendmail ?

1 Answers  


What provide communication between the computer and the main LAN cables and are located in the vampire taps attached to the cable.

1 Answers  


Which freeware program will let you have fine-grain control over which machines can or can not telnet/rlogin into your machine ?

1 Answers  


Which three types of gateways can be defined in the /etc/gateways file ?

1 Answers  


Using 10BaseT what is needed to get 300 meters :

1 Answers  


Which of the following is FQDN ? a. www.mydomain.com b. mydomain.com c. www.mydomain.com.

1 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)