1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stealth61 [152]
1 year ago
10

Which file contains full and incremental back-up information for use with the dump/restore utility?

Computers and Technology
1 answer:
Ivahew [28]1 year ago
3 0

The file that contains full and incremental back-up information for use with the dump/restore utility is <u>/etc/dumpdates.</u>

<u></u>

<h3>What is dump/restore utility ?</h3>

Dump examines files in a filesystem, determines which ones need to be backed up, and copies those files to a specified disk, tape or other storage medium. Subsequent incremental backups can then be layered on top of the full backup.

The restore command performs the inverse function of dump; it can restore a full backup of a filesystem. Single files and directory subtrees may also be restored from full or partial backups in interactive mode.

Learn more about incremental backups

brainly.com/question/5849057

#SPJ4

You might be interested in
Standards for all managers ethical responsibilities are covered in a company's
attashe74 [19]
C. Code of ethics is correct.
4 0
4 years ago
Read 2 more answers
Use of the internet to access programs and data on computers that’s are owned and managed by the other using large data centers.
Nimfa-mama [501]

Answer:

I just wanna learn how to code

Explanation:

6 0
3 years ago
Is there such a thing as an ethical reason for unauthorized access into a computer system?
Anastaziya [24]
Of course there is. On a simple level, consider a parent trying to locate their missing child. Someone might break into their social media accounts to see if there are messages that might help determine their whereabouts.

Consider a website hosting inappropriate pictures of children. Breaking into the server hosting the files and removing them is 100% ethical. 

I'm sure you can think of more examples. 
7 0
3 years ago
Allie needs to add a long row of numbers. She should enter a
ikadub [295]
I believer the answere is a formula hope this helped
8 0
3 years ago
Read 2 more answers
Which type of function distill the information contained within a file (small or large) into a single fixed-length number, typic
Luda [366]
As far as I remember, message-digest functions distill the information contained within a file (small or large) into a single fixed-length<span>number, typically between 128 and 256 bits in length. This function is designed to protect the integrity of a piece of data to define changes to any part of a message.</span>
7 0
4 years ago
Other questions:
  • In 2–3 sentences, describe how you would insert a table into a word-processing document.
    9·2 answers
  • Given the function definition below, what is the effect of thecall:
    7·2 answers
  • A popular encryption method used to protect data that travel over a wireless network is ____
    12·1 answer
  • My question is do you learn how to do a voice over in technology?
    14·1 answer
  • Given an int variable k, an int array incompletes that has been declared and initialized, an int variable nIncompletes that cont
    6·1 answer
  • Fill up the blank:- The picture that graphically represents the items you use in Windows is called a/an .......
    5·1 answer
  • How does a Cloud-first strategy approach a client's migration to the Cloud?
    11·1 answer
  • What is the school wifi password trying to do my class work in school on different devices.
    9·1 answer
  • 7. A(n) is the address of a document or other file accessible on the Internet.
    15·1 answer
  • System development life cycle
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!