A system administrator has just performed a backup. Which of the following should the administrator perform to easily identify the backup tape?

A. Label the tape
B. Mount the tape in the drive
C. Place the tape in the rack
D. Update the site log


Answer: A. Label the tape

Computer Science & Information Technology

You might also like to view...

Macros in Access are created by recording keystrokes.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The default name placed in the content control name box by Word is the:

A) name registered as the Microsoft Windows owner's name for your computer. B) username of the current Microsoft Windows user. C) username of the current Microsoft Office user. D) name registered as the Microsoft Office user name for your computer.

Computer Science & Information Technology

Program ____ use graphical symbols and relational operators (such as < for "less than" and = for "equal to") to portray the sequence of steps needed to fulfill the logic in that program, module, or method.

A. structure charts B. flowcharts C. pseudocode D. models

Computer Science & Information Technology

Which of the following could Sara, an administrator, use in a workplace to remove sensitive data at rest from the premises?

A. Network sniffer B. Personally owned devices C. Vulnerability scanner D. Hardware locks

Computer Science & Information Technology