ACEs – an entry in an objects acl that grants permissions toa user or group ACL – A aggregation of entree control entries that defines the entree that all users and groups have to an object ATA – A disc interface that uses parallel communications to link multiple difficult thrusts to a computing machine Authorization – The procedure of doing certain person is who they say they are Basic Disk – The default disc type. it can hold up to four dividers. three primary and one extended Direct-attached Storage – a computing machine whith difficult thrusts stored in it Disk Duplexing – Method of mistake tolerance. extra informations is stored on two discs in seperate host arrangers Disk Mirroring – Method of mistake tolerance. extra informations is stored on two seperate discs DiskPart. exe – Command line method to make all your disc related workss
Dynamic Disk – Alternative to basic disc. able to hold an limitless figure of volumes Effective permissions – A combination of all the permissions from assorted beginnings External Drive Array – Hard discs attached to a computing machine through a web medium File System – A portion of the OS for hive awaying and forming files Folder redirection – A utile characteristic that lets users salvage thier files to a web location LUNs – An identifier assigned to a specific constituent within a SCSI device which enables the SCSI host arranger to direct bids to that constituent.
NAS – A dedicated file waiter that is connected to a web and provides users with file based storage Offline Files – Lets people maintain transcripts of files on their machines so that if the waiter goes down they can still work Partition Style – The ways discs are organized in Windowss RAID – Multiple discs working together as buddies to make great things such as mistake tolerance or increases to read/write velocities SID – Every active directory object gets one of these. kinda like a societal security figure
Security Principal – Whoever is an decision maker assigns permissions to SATA – Newer version of ATA that users consecutive communications Shadow Copies – Makes transcripts of a file that users can utilize to reconstruct to vaious times SCSI – Lets computing machines reassign informations to multiple storage devices Standard Permissions – The common particular permissions SAN – A dedicated high velocity web wevice that connects storage devices to waiters.