[计] 备份
要避免同样的事件发生,定时备份(Backup)是十分重要的,因为意外是无法预知!所谓定时备份是指每隔一段时间将资料复制到另一个安全地方,例如:光碟、磁带等。
后备球员
... backcourt:后卫组(包括控球后卫及得分后卫) backup:后备球员 bench(板凳):(指全体)后备(替换,支援)球员 ...
备份当前系统
... advanced:高级设置(进入高级设置二级菜单,见下方) Backup:备份当前系统 Restore:还原上一个系统 ...
备份方式
Database Backup to Device 备份选择页面 从选择页面中我们可以看到,其提供了备份方式(Backup Mode),备份类型(Backup Type)的选择(关 于备份方式和备份类型我们在这里不进行深入的讨论)。
电 后备电池 ; 备用电池 ; 主板电池 ; 后备电池供电
备份软件 ; 文件备份 ; 备份容灾软件 ; 再进行备份容灾软件
后备浏览器 ; 备份浏览器 ; 后备阅读器 ; 后备涉猎器
In information technology, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. The verb form is to back up in two words, whereas the noun is backup.Backups have two distinct purposes. The primary purpose is to recover data after its loss, be it by data deletion or corruption. Data loss can be a common experience of computer users. A 2008 survey found that 66% of respondents had lost files on their home PC. The secondary purpose of backups is to recover data from an earlier time, according to a user-defined data retention policy, typically configured within a backup application for how long copies of data are required. Though backups popularly represent a simple form of disaster recovery, and should be part of a disaster recovery plan, by themselves, backups should not alone be considered disaster recovery. One reason for this is that not all backup systems or backup applications are able to reconstitute a computer system or other complex configurations such as a computer cluster, active directory servers, or a database server, by restoring only data from a backup.Since a backup system contains at least one copy of all data worth saving, the data storage requirements can be significant. Organizing this storage space and managing the backup process can be a complicated undertaking. A data repository model can be used to provide structure to the storage. Nowadays, there are many different types of data storage devices that are useful for making backups. There are also many different ways in which these devices can be arranged to provide geographic redundancy, data security, and portability.Before data are sent to their storage locations, they are selected, extracted, and manipulated. Many different techniques have been developed to optimize the backup procedure. These include optimizations for dealing with open files and live data sources as well as compression, encryption, and de-duplication, among others. Every backup scheme should include dry runs that validate the reliability of the data being backed up. It is important to recognize the limitations and human factors involved in any backup scheme.