Create an account
A(n) ____________________ is a copy of data or program files created for archiving or safekeeping.
____________________________________________________________ refers to a collection of disks that provide fault tolerance for shared data and applications.
RAID (Redundant Array of Independent [or Inexpensive] Disks)
____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.
A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.
An archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived.
____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.
A program that disguises itself as something useful but actually harms your system is called a ____.
____ scanning techniques attempt to identify malware by discovering "malware-like" behavior.
____ scanning detects malware by comparing a file's content with known malware signatures in a signature database.
Mesh topologies and ____ topologies are good choices for highly available enterprise networks.
____ is an automatic distribution of traffic over multiple links or processors to optimize response.
A(n) ___________________________________ is a battery-operated power source directly attached to one or more devices and to a power supply (such as a wall outlet) that prevents undesired features of the wall outlet's A/C power from harming the device or interrupting its services.
UPS (uninterruptible power supply)
A(n) ____ virus changes its characteristics every time it is transferred to a new system.
____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.
A(n) ____ is a deviation from a specified level of system performance for a given period of time.
____ are distinct networks of storage devices that communicate directly with each other and with other networks.
Many bots spread through the _________________________, a protocol that enables users running IRC client software to communicate instantly with other participants in a chat room on the Internet.
IRC (Internet Relay Chat)
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together