Which of the following backup methods should be used nightly to ensure backups capture all necessary data in the LEAST amount of time?
A. Daily
B. Incremental
C. Normal
D. Differential
Answer: B. Incremental
Computer Science & Information Technology
You might also like to view...
A tweet forwarded to other Twitter users is a ________
A) list B) hashtag C) vine D) retweet
Computer Science & Information Technology
________ is a collection of formatting options that can be applied to a picture, to text, or even to an object
A) A theme B) A style C) A transition D) Animation
Computer Science & Information Technology
Click the Insert Tab to add a button to the Quick Access Toolbar
Indicate whether the statement is true or false
Computer Science & Information Technology
The general security rule for assigning permissions to resources is to use the least privileges principle.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology