With a selective backup, users decide which folders and files to include in a backup

Select version:

Modifying this control will update this page automatically

With a selective backup, users decide which folders and files to include in a backup

If you use Time Machine to back up the files on your Mac, you can easily get back lost items or recover older versions of files. You can use Time Machine within many apps.

  1. On your Mac, open a window for the item you want to restore.

    For example, to recover a file you accidentally deleted from your Documents folder, open the Documents folder.

    If you’re missing an item from the desktop, you don’t need to open a window.

  2. Use Launchpad to view and open apps on Mac and open Time Machine (in the Other folder). A message may appear while your Mac connects to the backup disk.

    Open Time Machine settings for me

  3. Use the arrows and timeline to browse the local snapshots and backups.

    With a selective backup, users decide which folders and files to include in a backup

    If you see a pulsing light to semi-dark gray tick mark, it represents a backup that’s still loading or validating on the backup disk.

  4. Select one or more items you want to restore (these can include folders or your entire disk), then click Restore.

    Restored items return to their original location. For example, if an item was in the Documents folder, it’s returned to the Documents folder.

With many apps, you can use Time Machine within individual documents, so you can examine and read past versions to find the version you want. See View and restore past versions of documents.

You can use iCloud Drive and iCloud Photos to safely store your documents, photos, and videos in iCloud. See Ways to back up or protect your files.

Please don’t include any personal information in your comment.

Maximum character limit is 250.

Thanks for your feedback.

  1. Websites use which of the following to keep track of items in a user’s shopping cart?

    a.zombie
    b.shopping bot
    c.session cookie
    d.adware

    c. session cookie

  2. Which of the following involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as email messages, keyboarding activity, and websites visited?

    a.manager filtering
    b.employee indexing
    c.employee monitoring
    d.job spamming

    c. employee monitoring

  3. How long can digital certificates be valid?

    a.six months
    b.two years
    c.four years
    d.five years

    b. two years

  4. With which of the following do users choose which folders and files to include in a backup?

    a.selective backup
    b.incremental backup
    c.differential backup
    d.full backup

    a. selective backup

  5. Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?

    a.malware
    b.threats
    c.cybermalls
    d.untrusted sources

    a. malware

  6. In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?

    a.They restore the files.
    b.The index the files.
    c.They resource the files.
    d.They reset the files.

    a. They restore the files.

  7. Which of the following is an authorized person or company that issues and verifies digital certificates?

    a.certificate authority
    b.certificate office
    c.certificate agency
    d.certificate bureau

    a. certificate authority

  8. Internet advertising firms often use which of the following to collect information about users web browsing habits?

    a.billware
    b.spyware
    c.comware
    d.postware

    b. spyware

  9. Which of the following provides the mobile user with a secure connection to the company network server?

    a.VPN
    b.TPN
    c.XPN
    d.SPN

    a. VPN

  10. Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

    a.rebuking
    b.spoofing 
    c.victimizing
    d.transmitting

    b. spoofing

  11. Which of the following copies all of the files in a computer?

    a.incremental backup
    b.differential backup
    c.full backup
    d.selective backup

    c. full backup

  12. Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?

    a.network
    b.site
    c.multipurpose
    d.distributed

    b. site

  13. Which of the following provides the mobile user with a secure connection to the company network server?

    a.SPN
    b.TPN
    c.XPN
    d.VPN

    d. VPN

  14. Which encryption algorithm inserts characters between existing characters?

    a.compaction
    b.substitution
    c.transposition
    d.expansion

    d. expansion

  15. To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?

    a.decryption
    b.digitization
    c.re-securing
    d.assessment

    a. decryption

  16. What is another name for public key encryption?

    a.asymmetric key encryption
    b.controlled key encryption
    c.virtual key encryption
    d.secure key encryption

    a. asymmetric key emcryption

  17. Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?

    a.DoS
    b.PGP
    c.TCP
    d.IP

    d. IP

  18. Into which of the following kinds of ports do external fingerprint readers plug?

    a.serial
    b.MIDI
    c.parallel
    d.USB

    d. USB

  19. Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?

    a.hacker
    b.cyberterrorist
    c.cyberextortionist
    d.script kiddie

    d. script kiddie

  20. Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?

    a.Computer Matching and Privacy Protection Act
    b.Fair Credit Reporting Act
    c.Computer Fraud and Abuse Act
    d.Electronic Communications Privacy Act (ECPA)

    d. Electronic Communications Privacy Act (ECPA)

  21. With a three-generation backup policy, the grandparent is which of the following?

    a.oldest copy of the file
    b.original file
    c.most recent copy of the file
    d.second oldest copy of the file

    a. oldest copy of the file

  22. Which of the following terms refers to making a copy of a file?

    a.deciphering
    b.restoring
    c.encrypting
    d.backing up

    d. backing up

  23. Which of the following is not a possessed object?

    a.key
    b.badge
    c.PIN
    d.smart card

    c. PIN

  24. In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?

    a.limited
    b.staggered
    c.distributed
    d.delayed

    c. distributed

  25. What is the term for a program that performs a repetitive task on a network?

    a.zombie
    b.bot
    c.Trojan horse
    d.rootkit

    b. bot

  26. Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?

    a.indices
    b.macros
    c.keygens
    d.backdoors

    b. macros

  27. Which of the following categories are the rights to which creators are entitled for their work?

    a.intellectual property
    b.community property
    c.ethical
    d.creative

    a. intellectual property

  28. Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?

    a.assigned
    b.digital
    c.protected
    d.secure

    b. digital

  29. Which of the following is not a security product developer?

    a.Symantec
    b.McAfee
    c.AVG
    d.Adobe

    d. Adobe

  30. What is the term for a website that uses encryption techniques to protect its data?

    a.virtual site
    b.secure site
    c.vault
    d.locked site

    b. secure site

  31. How long can digital certificates be valid?

    a.six months
    b.two years
    c.four years
    d.five years

    b. two years

  32. How much do fingerprint readers typically cost?

    a.less than $10
    b.less than $100
    c.between $250 and $500
    d.more than $1000

    b. less than $100

  33. Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?

    a.multipurpose
    b.site
    c.distributed
    d.network

    b. site


  34. Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?

    a.password
    b.passterm
    c.secure key
    d.PIN

    a. password

  35. Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?

    a.data rights
    b.information privacy
    c.acceptable use
    d.social restrictions

    b . information privacy

  36. Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?

    a.intellectual property deed
    b.copyright
    c.access right
    d.content license

    b. copyright

  37. Personal computers, display devices, and printers should comply with guidelines of which of the following programs?

    a.GREEN COMPUTING
    b.ENERGY STAR
    c.SECURE ELECTRONICS
    d.ACCEPTABLE USE

    b. ENERGY STAR

Which is the best solution for backing up user data quizlet?

Cloud services are the ideal backup option for user files.

Which of the following categories are the rights to which creators are entitled to their work?

Copyright (or author's right) is a legal term used to describe the rights that creators have over their literary and artistic works.

What is the process of restricting access to certain material Many businesses use this?

Content filtering works by applying specific parameters to content retrieved via the internet, restricting access to certain material on websites or in emails. It can be a hardware or software solution and can often be part of a firewall.

What is a numeric password either assigned by a company or selected by a user?

A personal identification number (PIN) is a numeric password. These are either assigned by a company or selected by a user. Pins provide an additional level of security.