32 Copyright © Acronis, Inc., 2000-2010You can skip the Plan's (Task) credentials step. Every time you start the task, the task will run underthe credentials with which you are currently logged on. Any person that has administrative privilegeson the machine can also start the task. The task will run under this person's credentials.The task will always run under the same credentials, regardless of the user who actually starts thetask, if you specify the task credentials explicitly. To do so, on the plan (task) creation page:1. Select the Advanced view check box.2. Select General -> Plan's (Task) credentials -> Change.3. Enter the credentials under which the plan (task) will run.Scheduled or postponed startThe plan (task) credentials are mandatory. If you skip the credentials step, you will be asked forcredentials after finishing the plan (task) creation.Why does the program compel me to specify credentials?A scheduled or postponed task has to run anyway, regardless if any user is logged on or not (forexample, the system is at the Windows "Welcome" screen) or a user other than the task owner islogged on. It is sufficient that the machine be on (that is, not in standby or hibernate) at thescheduled task start time. That's why the Acronis scheduler needs the explicitly specified credentialsto be able to start the task.2.4 Full, incremental and differential backupsAcronis Backup & Recovery 10 provides the capability to use popular backup schemes, such asGrandfather-Father-Son and Tower of Hanoi, as well as to create custom backup schemes. All backupschemes are based on full, incremental and differential backup methods. The term "scheme" in factdenotes the algorithm of applying these methods plus the algorithm of the archive cleanup.Comparing backup methods with each other does not make much sense because the methods workas a team in a backup scheme. Each method should play its specific role according to its advantages.A competent backup scheme will benefit from the advantages of all backup methods and lessen theinfluence of all the methods’ shortcomings. For example, weekly differential backup facilitatesarchive cleanup because it can be easily deleted along with the weekly set of daily incrementalbackups depending on it.Backing up with the full, incremental or differential backup method results in a backup (p. 361) of thecorresponding type.Full backupA full backup stores all data selected for backup. A full backup underlies any archive and forms thebase for incremental and differential backups. An archive can contain multiple full backups or consistof only full backups. A full backup is self-sufficient - you do not need access to any other backup torecover data from a full backup.It is widely accepted that a full backup is the slowest to do but the fastest to restore. With Acronistechnologies, recovery from an incremental backup may be not slower than recovery from a full one.A full backup is most useful when: you need to roll back the system to its initial state this initial state does not change often, so there is no need for regular backup.