When you use the /M switch with the XCOPY command, the system will perform what type of backup?

A. differential
B. incremental
C. full
D. reverse


Answer: B

Computer Science & Information Technology

You might also like to view...

What is the most common characteristic of a capability model?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following could be used as hard drive controllers? (Choose all that apply.)

ATA PATA SATA SCSI

Computer Science & Information Technology

What are the seven steps involved in printing from a laser printer?

What will be an ideal response?

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. A denial-of-service attack is an attempt to compromise availability by hindering or blocking completely the provision of some service. 2. DoS attacks cause damage or destruction of IT infrastructures. 3. A DoS attack targeting application resources typically aims to overload or crash its network handling software. 4. The SYN spoofing attack targets the table of TCP connections on the server. 5. A cyberslam is an application attack that consumes significant resources, limiting the server’s ability to respond to valid requests from other users.

Computer Science & Information Technology