TCQ

Short for tagged command queuing, a method of processing requests from a host device to a hard drive that is storing the data requested. TCQ was first introduced with the SCSI-2 standard as a way to allow hard drives to accept multiple concurrent commands from a host PC. When commands arrive at the drive’s buffer, they are tagged with an identifier and then reordered by the drive s microprocessor to minimize the distance the drive’s read head needs to move laterally along the platter looking for data. For example, if a command is looking for data in one section of the drive and a following queued command is looking for data in a neighboring area, the SCSI host adapter can reorder the commands to make the two occur sequentially. This is a different system than SCSI-1 or IDE/ATA, which will allow only a single command to be outstanding at a time to any device and processes requests serially.

Tagged command queuing also is called command queuing and reordering.

Also see What’s Inside a Hard Drive? in the Did You Know . . . ? section of Webopedia.

Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.

Top Articles

List of Windows Operating System Versions & History [In Order]

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

What are the Five Generations of Computers? (1st to 5th)

Reviewed by Web Webster Learn about each of the 5 generations of computers and major technology developments that have led to the computing devices that...

Hotmail [Outlook] Email Accounts

Launched in 1996, Hotmail was one of the first public webmail services that could be accessed from any web browser. At its peak in...

Indicators of Compromise

When a system administrator finds anomalous or malicious behavior within network...

Disk Drive

A disk drive is a device that allows a computer to read from...

Firewall as a Service...

For the cloud-first organization, Firewall as a Service (FWaaS) brings all...