Ask your system administrator (or someone knowledgeable) to demonstrate the use of tar to produce a backup tape of your files.

What will be an ideal response?


If you have a kind system administrator who isn’t buried in things to do (which is rare) they
should be able to put a tape into a drive and type a single tar command to create an archive of a
home directory. They will need to become the super-user in order to do this.

Computer Science & Information Technology

You might also like to view...

The cryptographic hash function requirement that guarantees that it is impossible to find an alternative message with the same hash value as a given message and prevents forgery when an encrypted hash code is used is the ___________ .

A. collision resistant B. pseudorandomness C. preimage resistant D. second preimage resistant

Computer Science & Information Technology

If Web software can access parts of the underlying operating system's file system through normal URL mappings, a(n) ____ may occur.

A. DNS resolution error B. integer overflow error C. active network tap D. directory traversal attack

Computer Science & Information Technology

The ________ value is entered automatically when a new record is created

Fill in the blank(s) with correct word

Computer Science & Information Technology

Answer the following statement(s) true (T) or false (F)

In the United States, there’s no state or national licensing body for digital forensics examiners.

Computer Science & Information Technology