what is definition of shadow copy
Answers were Sorted based on User's Feedback
Answer / kashif.khirwa
shadow copy is backup of data that is used when unfortunetly
corrupt then u recover the data through shadow copy if u have
taken shadow copy in win2003 server
Is This Answer Correct ? | 69 Yes | 7 No |
Answer / som
Shadow Copy is the at the moment copy (Snapshot)of files
that is stored in Shadow Copy enabled volume. It caches a
file's previous version when the file is changed.
Is This Answer Correct ? | 3 Yes | 0 No |
Answer / rajib mukherjee
Shadow Copy (also called Volume Snapshot Service or VSS), is
a technology included in Microsoft Windows that creates
point-in-time copies ( snapshots) of files as you work on a
specific volume so you can retrieve versions of a document
you may have accidentally deleted.It is implemented as a
Windows service called the Volume Shadow Copy service.Access
this feature by right-clicking a file or folder and
selecting Restore previous versions.
Is This Answer Correct ? | 3 Yes | 0 No |
Answer / ashushah22@yahoo.com
shadow copy is backup of data that is used when unfortunetly
corrupt then u recover the data through shadow copy if u have
taken shadow copy in win2003 server
Is This Answer Correct ? | 0 Yes | 0 No |
Answer / reddappa reddy
In some Windows operating systems, when a system restore
point is requested, a shadow copy of a file or folder is
created. The shadow copy is essentially a previous version
of the file or folder at a specific point.
Is This Answer Correct ? | 2 Yes | 4 No |
Describe a case where you have used these tools to troubleshoot?
What is the last major networking problem you troubleshot and solved on your own in the last year?
How do you check the listening ports on a windows box? Command line.
What is meaning and work of network administrator in a company? please answer me asap.
What LAN analyzer tools are you familiar with and describe how you use them to troubleshoot and on what media and network types.
2 Answers College School Exams Tests, WeSolv,
Have you worked in an assignment based environment, e.g. work request or trouble ticket system, and if so, describe that environment?
True/False: DNS gives you the ability to prevent unauthorized transfers.
Port numbers for the following 2 standard services: FINGER, POP3 a. 23, 100 b. 25, 109 c. 27, 111 d. 79, 100 e. 23, 109
When would you use a default route ?
What is tunnel mode?
Explain the difference between straight-through and crossover cable?
Which is the startup script for rpc ?