Write comment on the system backup

Assignment Help Computer Engineering
Reference no: EM132239165

Question: The system administrator should generally establish routine backup procedures for the whole system at each site. However, application programmers should be sufficiently aware of these procedures to understand what is backed up and how often. After considering the tradeoffs between saving time on daily backups and losing time on a complicated restore procedure, the administrator should develop a backup strategy that meets the system's needs and file usage patterns. It should be noted that complex backup procedures can sometimes lead to data loss when inexperienced operators use them.

Given the ever - decreasing availability of backup times (known as the backup window) and the increasing time required to actually perform this backup, corporate IT was caught in a binding position. It could not guarantee that the system would run without up - to - date backups, but it could not even partially shut down the system so that it could actually do those backups.

To solve this dilemma, a number of strategies have been developed. Partial backups are the first. These depend on the existence of full backups at regular intervals, and the idea is to save time by saving only those files that have been changed, knowing that the other unchanged files are already backed up. The backup software looks at the modification date and time of each file on the system to determine which files have changed, and if the time stamp of a file is later than the last full backup, the file will be included in the next differential backup.

Reference: Kay, R. (2006, July 03). Backup Strategies.

Reference no: EM132239165

Questions Cloud

Are these programs in line with social justice concepts : How do these policing concepts fit with the era of homeland security? Are these programs in line with social justice concepts?
How are the conditions in womens prisons worse : Were you able to relate to any of the women featured in the video? Who (description is sufficient if you didn't catch the name) - and why?
Discuss the use of cloud backup strategies : Describe and discuss at least two backup strategies. Discuss the use of cloud backup strategies, as well? The response must be typed, single space.
Conduct research on the topic of criminal risk : Post-Conviction sentencing - Is this person a viable candidate for supervision under probation or is they likely to commit another criminal act?
Write comment on the system backup : The system administrator should generally establish routine backup procedures for the whole system at each site. However, application programmers should be.
Identify common signs and indicators of stress : Identify the legislation that relates to the recording, storage and sharing information health and social care - Identify common signs and indicators of stress
How the courts decisions changed the selected policy : Analyze how the U.S. Supreme Court criminal justice decision affects social justice. Explain the role of the U.S. Supreme Court in criminal justice policy.
Discuss problem based on the wireless network : Setting up a wireless network could potentially put a businesses data at risk if not protected sufficiently. The network data should be protected.
Which management style do you think would likely be : Which management style do you think would likely be more effective: democratic or authoritative?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Questionstrayer university provides each student with a

questionstrayer university provides each student with a login id to a university maintained oracle database server for

  Which language would be more appropriate

The vehicle registration department for the State of Florida is becoming decentralized. Each county would now handle its own registration process and will issue its own license plates

  What are the two methods of connecting to a cisco router

What are the two methods of connecting to a Cisco router for administrative purposes, maintenance, configuration, and so on?

  How does social contract theory apply to purchasing

How does social contract theory apply to purchasing requirements for cybersecurity products & services

  Your company is currently investigating the use of linux

your company is currently investigating the use of linux. your manager has asked you to research the feasibility of

  Discuss how frontier analysis can be implemented effectively

Discuss how frontier analysis can be implemented effectively in risk management. Discuss pros and cons of frontier analysis in risk management.

  How many lines are there in the cache

A 16 MB main memory has a 32 KB direct-mapped cache with 8 bytes per line. How many lines are there in the cache? Show how the main memory address is partition.

  How to design the physical implementation

Setup the database using Microsoft Access. how to Design the physical implementation.

  Different internet access systems

Different Internet access systems are asymmetric, with the higher downstream speeds rather than the upstream speeds. Is this better for the client PC access to web servers? Explain. Does it matter for the client access to the e-mail servers? Explain.

  Display the content of array 3 and the corresponding letter

For output the program should display the content of array 3 and the corresponding letter grade value for each average from array 4

  Questionpersonal trainer inc owns and operates fitness

questionpersonal trainer inc. owns and operates fitness centres in a dozen midwestern cities. the centres have done

  What is the multicast

examine and discuss what the UDP does and its relationship to TCP - - - in what ways is it similar and different, and why (what applications) would we use UDP, and why can't a user program access IP directly.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd