Browse Definitions :
Quiz

Quiz: Virtual virtuosity

The world of IT can be confusing -- and that's especially true for the area of virtualization. It's hard to know what's real and what's merely ... virtual. Test your virtuosity with this quiz. Are you a virtual geek?

1. Traditionally, you take a bow after this. The word also refers to the speed at which your PC operates. What is it?
Answer

2. This term sounds like something that could start a fire. In computing, however, it refers to a 32- and 64-bit microprocessor architecture from Sun Microsystems based on reduced instruction set computing. What is it?
Answer

3. Mountain or molehill? This term describes the ability of a computer application or product to continue to function well when it is changed in size or volume in order to meet a user need. What is it?
Answer

4. This generic name describes the series of Intel microprocessors that began with the 80286. What is it?
Answer

5. Apple, IBM, and Motorola collaborated on an open standard for this microprocessor architecture. What is it?
Answer

6. The Search for Extraterrestrial Intelligence project is only one example of this computing model, which applies the resources of many networked computers to a single problem. What is it?
Answer

7. This program emulates Windows 95, Windows 98, Windows NT, as well as IBM OS/2, or Linux on a Macintosh personal computer. What is it?
Answer

8. This practice can help an administrator perform the tasks of backup, archiving, and recovery more easily, and in less time, by disguising the actual complexity of the SAN. What is it?
Answer

9. This virtualization program allows multiple operating systems, which can include different operating systems or multiple instances of the same operating system, to share a single hardware processor. What is it?
Answer

10. This practice relieves data center pressure by masking the details of server resources from users while optimizing resource sharing. What is it?
Answer

How many could you guess correctly? Let us know!

Want to further test your virtuousity? See the rest of our quizzes

This was last updated in July 2008
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • password

    A password is a string of characters used to verify the identity of a user during the authentication process.

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close