……… is not covered under file management. (a) Secure files (b) Easy access to files (c) Schedule processes (d) Keep backup of files -Technology

1 Answer

Answer :

(c) Because schedule processes comes under processor management.

Related questions

Description : Can you backup the files while your computer is running? -Technology

Last Answer : Yes, we can safely backup open files and programs while they are running.

Description : Identify the option, which is not a feature covered under device management? (a) Speed (b) Spooling (c) Sharing (d) Programming -Technology

Last Answer : (d) Among given options, programming is not a feature covered under device management.

Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove

Last Answer : All of theabove

Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above

Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files

Description : The purpose of backup is: a) To restore a computer to an operational state following a disaster b) To restore small numbers of files after they have been accidentally deleted c) To restore one among many version of the same file for multiple backup environment d) All of the mentioned

Last Answer : All of the mentioned

Description : 1. The purpose of backup is: a) To restore a computer to an operational state following a disaster b) To restore small numbers of files after they have been accidentally deleted c) To restore one among many version of the same file for multiple backup environment d) All of the mentioned

Last Answer : All of the mentioned

Description : You cannot keep the backup of your data online. -Technology

Last Answer : False In the online backup, you send the data to a remote server through the Internet.

Description : A computer checks the _____ of user names and passwords for 9 a match before granting access. 1) Website 2) Network 3) Backup file 4) Data base 5) None of these

Last Answer : Answer :4

Description : Does anyone know a way to secure an individual file in Windows so that access is by password only?

Last Answer : answer:What version of Windows. 3.1, 95, 98, ME, Bob, NT, 2000, XP, Vista, Win7, It makes a difference…

Description : Complete the following statement. The method of incorporating change into  project planning and execution processes is called the: Select one: a. project logic diagram. b. change management process. c. milestone schedule d. critical path e. rough order of magnitude

Last Answer : b. change management process.

Description : What is a quick / easy way to backup your data?

Last Answer : answer:External Hard Drives are awesome. I'm a photographer-on-the-side, so I actually have a giant binder full of DVD's with archived shoots. Every couple of months my hard drive fills up, and I dump the whole thing off to DVD's -- if you're a Mac person, check out http://discoapp.com/

Description : It is used to start programs, obtain help, search for files and folders etc. (a) File menu (b) Edit menu (c) Format menu (d) Start button -Technology

Last Answer : (d) Start button is used to start program, obtain helps, search for files and folders etc and also displays the most commonly used programs in a particular context.

Description : It can contain files as well as folders. (a) Windows (b) Folder (c) Dialog (d) File -Technology

Last Answer : (b) Folder is a location in which you can store files/folders and sub-folders.

Description : ………….. is a visual desktop experience which provides an easy way to access desktop. -Technology

Last Answer : Aero is a visual desktop experience which provides an easy way to access desktop.

Description : Is Office 365 Email Secure to Use And I want to know what are method to backup my Office 365 Mailbox?

Last Answer : Microsoft launch MS Office 365 in subscription base model on 2001 in its most popular office suite series. After launching it become most popular subscription base product in all over the world. It ... will get life time subscription and all the application which can expect from any office version l

Description : How to take secure backup?

Last Answer :  To securely back up the appliance configuration from the WebGUI:  Click Administration => Main => System Control.  Locate the Secure Backup section.  From the Crypto certificate list, select the ... of the target directory for the backup files.  Click Secure Backup to back up the appliance.

Description : The Sixth Schedule of the Indian Constitution contains provisions for the administration of Tribal areas. Which of the following States is not covered under this Schedule - (1) Assam (2) Manipur (3) Meghalaya (4) Tripura

Last Answer : (2) Manipur Explanation: Tribal areas generally mean areas having preponderance of tribal population. However, the Constitution of India refers tribal areas within the States of Assam, Meghalaya, Tripura & Mizoram, as ... I, II, IIA & III of the table appended to paragraph 20 of the Sixth Schedule.

Description : The individual’s right to privacy deals mainly with information. What are the other things covered under this right? -Technology

Last Answer : The right to privacy involves the decisions pertaining to questions like what information about one’s self or one’s associations must a person reveal to others , under what conditions and with what safeguards. What things can people keep to them and not be forced to reveal to others?

Description : Which of the following is true of cloud computing? A. It's always going to be less expensive and more secure than local computing. B. You can access your data from any computer in the world, ... connection. C. Only a few small companies are investing in the technology, making it a risky venture.

Last Answer : You can access your data from any computer in the world, as long as you have an Internet connection.

Description : Which of the following storage device can be used for storing large backup data? (a) Floppy disks (b) Hard disk (c) Magnetic tapes (d) None of these -Technology

Last Answer : "B) Hard Disk.

Description : Explain the main role of data backup software. -Technology

Last Answer : Backup software is used to make a copy of all the information stored on a disk and restore it when needed.An ideal data backup software provides functionalities beyond simple copying of data files. This software often supports user needs to specifying what is to be backed up and when.

Description : Utility programs include (a) Virus scanning software (b) Backup software -Technology

Last Answer : (d) Utility programs includes virus scanning, backup, disk defragmenter software.

Description : What is the meaning of backup? -Technology

Last Answer : Backup is a process of making an extra copy of the data on a computer and storing it in a different location on the computer or in an external device.

Description : What are the types of data backup? -Technology

Last Answer : There are two types of data backup:1. Full backup2. Differential backup

Description : Differentiate between full backup and differential backup. -Technology

Last Answer : Differences between the full backup and differential backup are as follows:Full backupDifferential backupA complete backup of everythingthat you want to back up.The backup software looks at which fileshave changed ... since you onlyneed one set of backup data.Faster to create than a full backup.

Description : Write differences between online backup and offline backup. -Technology

Last Answer : Differences between online backup and offline backup are as follows:Online backupOffline backupYou don't have direct control over your data.The data is totally in your control.If you have a fire, flood, ... about it.If you have a fire or flood, your backupmight be damaged along with your computer.

Description : List two advantages of online backup. -Technology

Last Answer : Two advantages of online backup are as follows:1. By having your data stored on a remote hard drive, you run little as there is no risk of losing your data as a result of fire, theft or any other disaster.2. No hardware is needed to maintain or repair the backup.

Description : Why should we frequently take backup of our data? -Technology

Last Answer : We frequently take backup of our data because1. The hard drive of our computer may fail.2. The data on our computer may get corrupted for a variety of reasons.3. Data loss due to fire, natural disasters etc.

Description : Name four data backup devices/medium. -Technology

Last Answer : Four storage media on which data backup may be taken are as follows:1. DVD (Digital Versatile Disk)2. External hard disk3. USB flash drive4. Memory stick

Description : Shreenivasan is working for an IT firm where he needs to backup of his data of around 200 MB -Technology

Last Answer : DVD and Pen drive

Description : ………… backup saves your data from natural disasters. -Technology

Last Answer : Onlinebackup saves your data from natural disasters.

Description : ……. is a type of backup in which only the data that changed, since last backup is saved. -Technology

Last Answer : Differential backup is a type of backup in which only the data that changed since the last backup is saved.

Description : CD is a storage device that is used to take the backup of your data. -Technology

Last Answer : True You can use different types of storage devices like CD, DVD to take the backup of your data.

Description : Backup is duplication of data for restoring purpose at a later time. -Technology

Last Answer : True Backup is a process to copy the data and restore it, whenever required.

Description : What is the meaning of backup and why the data backup is essential? Also name 4 devices to take data backup. -Technology

Last Answer : In information technology, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original ... and natural disasterVirus attackFollowing are some storage devices to take backup:External hard diskCDDVDUSBFlash driveOnline Backup

Description : Copy of data created for safe storage is a) Saved copy b) Backup c) Dcopy d) Stored copy -Technology

Last Answer : Copy of data created for safe storage isBackup

Description : Which of the following is not a function of an operating system? (a) File management (b) Memory management -Technology

Last Answer : (d) Database management is not a function of an operating system.

Description : ……….. allows customers to conduct financial transactions on a secure Website. -Technology

Last Answer : E-banking allows customers to conduct financial transactions on a secure Website.

Description : Which guided media provide secure transmission amongst all of them? -Technology

Last Answer : Optical fibre provides secure transmission as compared to twisted pair and co-axial cable. As, it is more immune to tapping than copper cables.

Description : Which guided media provide secure transmission amongst all of them? -Technology

Last Answer : Optical fibre provides secure transmission as compared to twisted pair and co-axial cable. As, it is more immune to tapping than copper cables.

Description : The programmers who break into secure systems for malicious purpose are -Technology

Last Answer : (a) Crackers are the programmers that break into secure systems for malicious purpose.

Description : Can I recover music files from my actual ipod when I can't find the file on my computer?

Last Answer : answer:Yes. It is possible. There are a couple different methods. The first method, is to go into the iTunes settings & enable the iPod to be used as an external hard drive. So when you plug the iPod in, ... Done. I am on a Mac & have used Senuti to recover songs in the past & it worked very well.

Description : Data Integrity control uses ................ (A) Upper and lower limits on numeric data. (B) Passwords to prohibit unauthorised access to files. (C) Data dictionary to keep the data (D) Data dictionary to find last access of data

Last Answer : (B) Passwords to prohibit unauthorised access to files.

Description : What is the best way to backup large computer files?

Last Answer : answer:It'll take you forever to back up 5 TB to just about anything. For long term backup of less than a GB, CDs are great. For backing up multiple GB, nothing beats thumbdrives. But if you haven't ... let your computer back up to them over a couple of nights. And then store them in a media safe.

Description : How should I backup my files to transfer from my old laptop to my new one?

Last Answer : Buy an external hard drive. You can get one with the space you need probably for under 50 dollars. It can serve as a backup drive, too.

Description : How come files get deleted from the iOmega backup hard drive when I only want them deleted from my Mac Mini?

Last Answer : Have you tried disconnecting the backup drive before deleting your files off the Mac mini? I suspect it has something to do with the way the iOmega drive is linked to the main hard drive while still plugged in. Do a test with a dummy file and see what happens.

Description : Erasing Old Backup Files?

Last Answer : What are you backing up to?

Description : Which files do I want to backup from a Windows PC?

Last Answer : I'd back up any of the personal files, if you plan to re-image it, the rest doesn't matter. Usually My Documents, My Pictures, My videos, and any other file that you've ever downloaded ... up all the personal files, and download any necessary drivers for Video, Lan, etc from the manufacturers site.

Description : How can I find SilverKeeper backup files on an external HD?

Last Answer : answer:I used SilverKeeper briefly all it does is physically copy files there's no proprietary database or construct that is used to store the backup files. So, if the files were actually ... able to visually confirm the files were actually getting copied correctly prior to the surge this morning?