1. Element rejestru to
2. Odpytywanie bazy danych to
3. Brama domyślna to po angielsku
4. Słowo switch można przetłumaczyć jako
5. Przetłumacz na polski słowo motherboard
6. Pakiet w warstwie sieciowej to
9. A complete copy of all data, including every file, database, and system configuration. This type of backup takes the longest but is the most comprehensive.
10. A set of rules that determine how long backup data is kept before being deleted or archived.
11.A strategy or set of processes to recover data and restore systems after a catastrophic event, such as natural disasters or cyberattacks.
12.A disaster recovery feature that continuously replicates data to a secondary site, enabling near-instant recovery of critical systems with minimal data loss.
13.The process by which a system automatically switches to a redundant or standby system when the primary system fails. It’s often used in conjunction with backups and replication to ensure continuous availability.
14.The maximum amount of time allowed to restore data or systems after a failure before it impacts business operations.
15. Backs up only the data that has changed since the last backup (either full or incremental). It is faster and consumes less storage than a full backup.
16. In Commvault, it defines how and where data is stored, the retention criteria, and how often auxiliary copies or snapshots are made. They help manage the lifecycle of backup data.
17. A process in Commvault that removes older, redundant data from backups based on the retention policy. It helps free up storage space while ensuring important data is retained.
18. The central management component of the Commvault architecture, responsible for orchestrating backup, restore, and administrative operations. It coordinates communication between various components like MediaAgents and clients.
19. A key component in Commvault that manages data movement between clients and storage resources. It handles the compression, encryption, and deduplication of data before it is stored.
20. The designated time period during which backups are performed. Backups are often scheduled during low-activity periods to minimize disruption.
21.Backing up data to a remote, cloud-based storage system. It offers scalability, off-site protection, and automated services.
22.A data compression technique that eliminates duplicate copies of repeating data. It helps reduce storage needs for backups by storing unique chunks of data only once.
23.A type of backup that focuses on copying the files and directories from a file system, as opposed to the entire system or virtual machine.
24.The ability to recover specific items (such as individual files, emails, or database records) from a backup without restoring the entire system or backup set.
25.A pre-determined timetable for running backups (e.g., daily, weekly, or monthly). A good one is based on balancing data protection needs and system performance.
26.Temporarily pausing or putting a system or application in a consistent state before taking a backup to ensure no data is being written or changed during the backup process.
27.A protocol that enables users to remotely connect to another computer running Windows, allowing them to control it as if they were sitting in front of it.
28.A system administrators use to manage and deploy Microsoft software updates within a corporate environment.
29.A Windows feature for encrypting entire volumes of storage, providing data protection through encryption for physical and virtual drives.
30.The built-in antivirus and anti-malware program for Windows operating systems.
31. Service developed by Microsoft for Windows domain networks. It manages and stores information about network resources and enables administrators to assign policies and control access.
32. A file management application in Windows that provides a graphical interface for accessing and organizing files and directories.
33. A technology in Windows that allows backups or snapshots of files and volumes to be taken, even while they are in use, often used for creating restore points.
34. A command-line interpreter in Windows used to execute commands for file management, network troubleshooting, and other system tasks.
35. A hierarchical database in Windows that stores low-level settings for the operating system and applications.
36. A tool used to create and manage virtual machines in Windows environments.
37. A Windows tool that displays detailed information about important system events, application logs, and security events, used for troubleshooting and auditing.
38. A network drive with assigned a letter, allowing a local machine to access files on a remote server or another computer within the network.
39. A unique hardware identifier assigned to network interfaces for communications at the data link layer of a network.
40. A protocol that automatically assigns IP addresses and other network configuration settings to devices on a network.
41. A networking device that forwards data packets between different networks, such as from a local network to the internet.
42. A technology that creates a secure, encrypted connection over the internet, allowing remote users to access private networks securely.
43. A device that connects multiple devices within a LAN, allowing them to communicate and transfer data efficiently by directing traffic to the correct destination.
44. A system that translates human-readable domain names into IP addresses that computers use to communicate.
45. A unique numerical label assigned to devices connected to a network to identify and communicate with each other.
46. A network utility used to test the reachability of a host on an IP network. It measures round-trip time by sending ICMP echo request messages and awaiting a response.
47. A conceptual framework used to understand and design the different layers of a network, from physical connections to application-level interactions. It has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
48. A unit of data transmitted over a network, containing both the data itself and metadata for routing and error checking.
49. A 32-bit number used to divide an IP address into network and host parts, helping to organize and manage large networks into smaller segments.
50. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules, protecting a network from unauthorized access.
51. A method of allocating storage capacity only as needed rather than pre-allocating the full amount upfront, maximizing the efficiency of storage usage.
52. A process used in storage systems to eliminate duplicate copies of data to optimize storage space and improve efficiency, commonly used in backup systems.
53. An identifier used to represent a logical disk in a SAN, allowing multiple devices to share the same storage.
54. The ability to replace or add storage devices (such as hard drives) without shutting down the system, common in RAID and enterprise storage systems.
55. A performance metric that measures how many input and output operations a storage device can perform per second.
56. A service that stores data remotely on servers accessed via the internet, providing flexibility and scalability. Popular services include Google Drive, Dropbox, and AWS S3.
57. The process of moving a running virtual machine from one physical host to another without shutting it down.
58. A point-in-time copy of a virtual machine's state, allowing quick restoration to that state if needed (e.g., before major updates).
59. A suite of utilities installed in a virtual machine to improve performance and enable seamless integration between the host and guest OS. It enhances features like mouse tracking, network settings, and time synchronization.
60. A technology that delivers desktop environments over a network, allowing users to access them from any device.
61. A centralized management tool for managing and monitoring multiple VMware ESXi hosts and their virtual machines, offering features like vMotion, HA, and DRS.
62. A VMware feature that allows live migration of running virtual machines between different hosts with minimal downtime.
63. A VMware feature that automatically balances virtual machine workloads across hosts in a cluster based on CPU and memory usage, ensuring optimal resource allocation.
64. A feature in VMware DRS that powers down hosts during low resource demand and powers them back up when needed, helping to conserve energy.
65. A group of servers (hosts) that work together to ensure that virtual machines remain available even if a physical server fails, through automatic migration or failover.
66. Assigning more virtual resources (e.g., CPU, memory, storage) to virtual machines than the underlying hardware can physically support, under the assumption that not all VMs will use their full allocation at the same time.
67. A form of lightweight virtualization where applications are isolated in containers, each with its own libraries but sharing the host OS kernel. Popular tools include Docker and Kubernetes.
68. A software emulation of a physical computer that runs its own operating system and applications. Each VM is isolated from others on the same host.
69. A weakness in a system or network that can be exploited by a cyberattack.
70. Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
71. An additional layer of security that requires not only a password but also a secondary verification method.
72. A form of social engineering where attackers trick individuals into revealing sensitive information through deceptive emails or websites.
73. A type of attack that involves inserting malicious SQL queries into a database via a vulnerable web form to gain unauthorized access or manipulate data.
74. The process of converting data into a coded format to prevent unauthorized access.