When should you run backups?
What will be an ideal response?
Often you need to have backups run at night or on weekends. Scheduling system backups during off hours is best because fewer people are logged in to the system and there's less disruption in service.
You might also like to view...
Case-Based Critical Thinking QuestionsCase 4-1Leon works at his company's Help Desk. He is getting many questions regarding new software installation and access problems. Here are some of them. I got a message "Access to online application denied." Which of the following is the most frequent reason for that?
A. The Web site is down. B. Your user ID and password do not match the one stored in your account information. C. You do not have an Internet connection. D. The file is corrupted.
Which of the following statements is false?
a. If an operation requires the executing thread to hold a lock while the operation is performed, a thread must relase the lock before proceeding with the operation. Other threads attempting to perform an operation that requires the same lock will be blocked until the first thread releases the lock, at which point the blocked threads may attempt to acquire the lock and proceed with the operation. b. To specify that a thread must hold a monitor lock to execute a block of code, the code should be placed in a synchronized statement. c. Code in a synchronized statement is said to be guarded by the monitor lock; a thread must acquire the lock to execute the guarded statements. d. The monitor allows only one thread at a time to execute statements within synchronized statements that lock on the same object, as only one thread at a time can hold the monitor lock. The synchronized statements are declared using the synchronized keyword.
Which of the following is not true about the VLOOKUP function?
What will be an ideal response?
A distributed denial of service attack can BEST be described as:
A. Invalid characters being entered into a field in a database application. B. Users attempting to input random or invalid data into fields within a web browser application. C. Multiple computers attacking a single target in an organized attempt to deplete its resources. D. Multiple attackers attempting to gain elevated privileges on a target system.