A common point of entry for spyware guarded by an agent. Examples of checkpoints include Startup Folder, dial up connections, Wi-Fi connections, Internet Safe Sites, Winsock Layered Service Providers, Windows Messenger Service, and SPAM Zombie prevention.
— Computer ScienceA point-in-time snapshot of a virtual machine that enables an administrator to roll the virtual machine back to its state at the moment when the checkpoint was created.
— Computer ScienceAn event in which the Database Engine writes dirty buffer pages to disk. Each checkpoint writes to disk all the pages that were dirty at the last checkpoint and still have not been written to disk.
— Computer Science