1. This is an
What is it? 2. This is a way of storing the same data in different places (thus, redundantly) on multiple hard disks. By placing data on multiple disks, I/O operations can overlap in a balanced way, improving performance.
What is it? 3. This is a high-speed special-purpose network (or subnetwork) that interconnects different kinds of data storage devices with associated data servers on behalf of a larger network of users.
What is it?
4. This is hard disk storage that is set up with its own network address rather than being attached to the department computer that is serving applications to a network's workstation users.
What is it?
What is it? 6. This is a unique identifier used on a SCSI bus that enables it to differentiate up to eight separate devices.
What is it? 7. This technology is for transmitting data between computer devices at data rates of up to 4 Gbps. It is especially suited for connecting computer servers to shared storage devices and for interconnecting storage controllers and drives.
What is it? 8. This is the pooling of physical storage from multiple network storage devices into what appears to be a single storage device that is managed from a central console. It is commonly used in a SAN.
What is it? 9. This is a comprehensive approach to managing the flow of an information system's data and associated meta data from creation and initial storage to the time when it becomes obsolete and is deleted.
What is it? 10. This is the assignment of different categories of data to different types of storage media in order to reduce total storage cost. Categories may be based on levels of protection needed, performance requirements, frequency of use and other considerations.
What is it? 11. This technology is a storage system in which all the data in an enterprise is backed up whenever any change is made. In effect, it creates an electronic journal of complete storage snapshots, one snapshot for every instant in time that data modification occurs.
What is it? 12. This is the activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe. Backup is usually a routine part of the operation of large businesses with mainframes as well as the administrators of smaller business computers.
What is it? 13. This method is used in accessing computer peripheral devices that employs a serial (one bit at a time) means of digital data transfer over thin cables.
What is it? 14. This is an approach to computer storage backup and archiving in which data is initially copied to backup storage on a disk storage system and then periodically copied again to a tape storage system or possibly to an optical storage system.
What is it? 15. This Act is legislation enacted in response to the high-profile Enron and WorldCom financial scandals to protect shareholders and the general public from accounting errors and fraudulent practices in the enterprise.
What is it? 16. This is a client/server application that lets a computer user view, and optionally store and update files on a remote computer as though they were on the user's own computer.
What is it? 17. This technology is policy-based management of file backup and archiving in a way that uses storage devices economically and without the user needing to be aware of when files are being retrieved from backup storage media.
What is it? 18. In computer programming languages, this is a group of objects with the same attributes that can be addressed individually, using such techniques as subscripting.
What is it?
19. This standard protocol lets programs make requests for files and services on remote computers on the Internet. It uses the client/server programming model.
What is it?
What is it? 21. The official term for this is "spanning" and is used to refer to a computer's hard disks that haven't been configured according to the RAIDsystem to increase fault tolerance and improve data access performance.
What is it? 22. This is sometimes referred to as a business continuity plan and describes how an organization is to deal with potential disasters. Just as a disaster is an event that makes the continuation of normal functions impossible, this consists of the precautions taken so that the effects of a disaster will be minimized, and the organization will be able to either maintain or quickly resume mission-critical functions.
What is it? 23.This is a content distribution protocol that enables efficient software distribution and peer-to-peer sharing of very large files, such as entire movies and TV shows, by enabling users to serve as network redistribution points. What is it? 24. In computer, this refers to a technique of checking whether data has been lost or written over when it's moved from one place in storage to another, or when transmitted between computers.
What is it? 25. This technology is a form of magnetic tape and drive system used for computer data storage and archiving. A special compression algorithm facilitates storage and retrieval of data at high speeds and in large quantities.
What is it? 26. In a computer system, this is a group of servers and other resources that act like a single system and enable high availability and, in some cases, load balancing and parallel processing.
What is it? 27. This is a variation of disk mirroring in which each multiple storage disk has its own SCSI controller.
What is it? 28. This is a method of protecting against multiple storage drive failures by creating two sets of parity data on an array of hard disks.
What is it? 29. This is a set of reference markers or pointers to data stored on a disk drive, on a tape or in a SAN.
What is it? 30. This is a set of ANSI standard electronic interfaces that allow personal computers to communicate with peripheral hardware such as disk drives, tape drives, CD-ROM drives, printers and scanners faster, and more flexibly than previous interfaces.
What is it?
Storage quiz library
Our storage quiz library has over a dozen quizzes to test your storage smarts. Test your storage technology savvy with SANs, RAID, NAS, IP storage, switches and more.
This was first published in November 2005