In a server cluster node`s registry, a snapshot of the Cluster subkey or of an application subkey. The checkpoint is written to the quorum disk when certain events take place, such as a node failure.
— Computer ScienceA common point of entry for spyware guarded by an agent. Examples of checkpoints include Startup Folder, dial up connections, Wi-Fi connections, Internet Safe Sites, Winsock Layered Service Providers, Windows Messenger Service, and SPAM Zombie prevention.
— Computer ScienceA point-in-time snapshot of a virtual machine that enables an administrator to roll the virtual machine back to its state at the moment when the checkpoint was created.
— Computer Science