Question Set

1. Programs which protect a disk from an infection are called as:





Ask Your Doubts Here

Type in
(Press Ctrl+g to toggle between English and the chosen language)

Comments

Show Similar Question And Answers
QA->A program that has capability to infect other programs and make copies of itself and spread into other programs is called:....
QA->A program that has capability to infect other programs and make copies of itself and spread into other programs is called:....
QA->A program that has capability to infect other programs and make copies of itself and spread into other programs is called:....
QA->A program that has capability to infect other programs and make copies of itself and spread into other programs is called:....
QA->A program that has capability to infect other programs and make copies of itself and spread into other programs is called:....
MCQ->Programs which protect a disk from an infection are called as:....
MCQ->You are the administrator of Windows 2000 Server computer. Your computer has a span volume that consists of areas on three physical hard disks on the server. The three disks support hot swapping. You regularly backup the span volume by using windows backup. One of the disk fail, you replace the disk with a new un-partitioned disk. You want to recover the span volume and disk data as soon as possible. What should you do?....
MCQ->You install your boot volume on volume C on your Windows 2000 Server computer. You mirror volume C on dynamic Disk 1. Two years later, during routine server maintenance, you open Disk Management and find that the status of volume C is Failed Redundancy. The status of Disk 1 is Missing. You attempt to reactivate Disk 1, but the status of volume C does not return to Healthy. What should you do next?....
MCQ->Your Windows 2000 Server computer contains a stripe set with parity on a four-disk array. You convert the stripe set with parity to a dynamic RAID-5 volume. Six months later, users report that disk access on the server is slower than it had been on the previous day, You use Disk Management and discover that the status of the third disk in the array is Missing. You want to recover the failed RAID-5 volume. What should you do first?....
MCQ->While working with MS-DOS, which command is used to compare the disk in drive A with the disk in drive B, specifying to compare only first side of each disk, and only the first 8 sectors of each track?....
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use | Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions
Question ANSWER With Solution