A report that lists the usage of volume resources for shadow copies. Use this report to identify inconsistencies in diff area configuration that may allow reclaiming large portions of disk space.
— Computer ScienceIn programming, to hide, or disable access to, a programming element that has the same name. In such a situation, the shadowed element is not available for reference; instead, when code uses the shared name, the shadowed element is resolved to the shadowing element.
— Computer Science