Browse Definitions :
Quiz

Quiz: Virtual virtuosity

The world of IT can be confusing -- and that's especially true for the area of virtualization. It's hard to know what's real and what's merely ... virtual. Test your virtuosity with this quiz. Are you a virtual geek?

1. Traditionally, you take a bow after this. The word also refers to the speed at which your PC operates. What is it?
Answer

2. This term sounds like something that could start a fire. In computing, however, it refers to a 32- and 64-bit microprocessor architecture from Sun Microsystems based on reduced instruction set computing. What is it?
Answer

3. Mountain or molehill? This term describes the ability of a computer application or product to continue to function well when it is changed in size or volume in order to meet a user need. What is it?
Answer

4. This generic name describes the series of Intel microprocessors that began with the 80286. What is it?
Answer

5. Apple, IBM, and Motorola collaborated on an open standard for this microprocessor architecture. What is it?
Answer

6. The Search for Extraterrestrial Intelligence project is only one example of this computing model, which applies the resources of many networked computers to a single problem. What is it?
Answer

7. This program emulates Windows 95, Windows 98, Windows NT, as well as IBM OS/2, or Linux on a Macintosh personal computer. What is it?
Answer

8. This practice can help an administrator perform the tasks of backup, archiving, and recovery more easily, and in less time, by disguising the actual complexity of the SAN. What is it?
Answer

9. This virtualization program allows multiple operating systems, which can include different operating systems or multiple instances of the same operating system, to share a single hardware processor. What is it?
Answer

10. This practice relieves data center pressure by masking the details of server resources from users while optimizing resource sharing. What is it?
Answer

How many could you guess correctly? Let us know!

Want to further test your virtuousity? See the rest of our quizzes

This was last updated in July 2008
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.

SearchSecurity
  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

  • What is risk analysis?

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

  • storage volume

    A storage volume is an identifiable unit of data storage. It can be a removable hard disk, but it does not have to be a unit that...

Close