File - your own free website

advertisement
Symbols
.inf
The file name extension for files that contain device information or scripts to control hardware
operations.
100baseT
The Ethernet standard for local area networks using twisted-pair cable carrying data at 100
megabits per second (Mbps).
10base2
The Ethernet and IEEE 802.3 standard for baseband local area networks using a thin coaxial
cable up to 200 meters long and carrying data at 10 megabits per second (Mbps). Cables connect
to network adapters by a BNC connector.
10baseT
The Ethernet standard for local area networks using twisted-pair cable carrying data at 10
megabits per second (Mbps).
WINDOWS GLOSSARY
A
A (address) resource record
A resource record used to map a DNS domain name to a host IP address on the network.
See also: domain name; Domain Name System (DNS); resource record (RR)
access control
A security mechanism that determines which operations a user, group, service, or computer is
authorized to perform on a computer or on a particular object, such as a file, printer, registry key,
or directory service object.
See also: permission; group; object; registry; service
access control entry (ACE)
An entry in an object's discretionary access control list (DACL) that grants permissions to a user
or group. An ACE is also an entry in an object's system access control list (SACL) that specifies
the security events to be audited for a user or group.
See also: access control; permission; discretionary access control list (DACL); object; system
access control list (SACL)
account lockout
A Windows security feature that locks a user account if a number of failed logon attempts occur
within a specified amount of time, based on security policy lockout settings. Locked accounts
cannot log on.
acknowledgment message
For Message Queuing, a message class that indicates that a message arrived or was retrieved by
the target application (a positive acknowledgment), or that an error occurred before the original
message could be retrieved (a negative acknowledgment). These messages are sent to
administration queues on the source computer.
See also: administration queue; Message Queuing
active
Describes the window or icon that you are currently using or that is currently selected. The
operating system always applies the next keystroke or command you choose to the active
window. Windows or icons on the desktop that are not selected are inactive.
See also: channel
active content
Dynamic content, such as a stock ticker, a weather map, or news, that is usually updated from the
World Wide Web or a channel.
Active Directory
The directory service that stores information about objects on a network and makes this
information available to users and network administrators. Active Directory gives network users
access to permitted resources anywhere on the network using a single logon process. It provides
network administrators with an intuitive, hierarchical view of the network and a single point of
administration for all network objects.
See also: directory partition; service
Active Directory data model
A model derived from the LDAP data model. The directory holds objects that represent entities
of various sorts, described by attributes. The objects and classes of objects that can be stored in
the directory are defined in the schema. For each class of objects, the schema defines the
attributes an instance of the class must have, the additional attributes it can have, and the class
that can be its parent.
See also: Active Directory; attribute; Lightweight Directory Access Protocol (LDAP); schema
Active Directory Users and Computers
An administrative tool designed to perform day-to-day Active Directory administration tasks.
These tasks include creating, deleting, modifying, moving, and setting permissions on objects
stored in the directory. These objects include organizational units, users, contacts, groups,
computers, printers, and shared file objects.
See also: permission; Active Directory; object
active partition
A partition from which an x86-based computer starts up. The active partition must be a primary
partition on a basic disk. If you use Windows exclusively, the active partition can be the same as
the system volume.
See also: basic disk; primary partition; system partition; system volume; x86
active volume
The volume from which the computer starts up. The active volume must be a simple volume on a
dynamic disk. You cannot mark an existing dynamic volume as the active volume, but you can
upgrade a basic disk containing the active partition to a dynamic disk. Once the disk is upgraded
to dynamic, the partition becomes a simple volume that is active.
See also: active partition; basic disk; dynamic disk; dynamic volume; simple volume
ActiveX
A set of technologies that allows software components to interact with one another in a
networked environment, regardless of the language in which the components were created.
address (A) resource record
A resource record used to map a DNS domain name to a host IP address on the network.
See also: domain name; Domain Name System (DNS); resource record (RR)
address classes
Predefined groupings of Internet addresses with each class defining networks of a certain size.
The range of numbers that can be assigned for the first octet in the IP address is based on the
address class. Class A networks (values 1 to 126) are the largest, with more than 16 million hosts
per network. Class B networks (128 to 191) have up to 65,534 hosts per network, and Class C
networks (192 to 223) can have up to 254 hosts per network.
See also: Class A IP address; Class B IP address; Class C IP address
Address Resolution Protocol (ARP)
In TCP/IP, a protocol that uses broadcast traffic on the local network to resolve a logically
assigned IP address to its physical hardware or media access control layer address.
In ATM, ARP is used two different ways. For classical IP over ATM, ARP is used to resolve
addresses to ATM hardware addresses. For ATM LAN emulation, ARP is used to resolve
Ethernet/802.3 or Token Ring addresses to ATM hardware addresses.
See also: Internet Protocol (IP); Message Authentication Code (MAC); packet; Transmission
Control Protocol/Internet Protocol (TCP/IP)
administration queue
For Message Queuing, a queue that stores acknowledgment messages.
See also: acknowledgment message; Message Queuing
administrative alerts
Alerts that relate to server and resource use. They notify users about problems in areas such as
security and access, user sessions, server shutdown due to power loss (when an uninterruptible
power supply is available), directory replication, and printing. When a computer generates an
administrative alert, a message is sent to a predefined list of users and computers.
See also: Alerter service
administrator
For Windows XP Professional, a person responsible for setting up and managing domain
controllers or local computers and their user and group accounts, assigning passwords and
permissions, and helping users with networking problems. Administrators are members of the
Administrators group and have full control over the domain or computer.
For Windows XP Home Edition, a person who can make system-wide changes to the computer,
install software, and who has access to all files on the computer. A person with a computer
administrator account has full access to other user accounts on the computer.
Advanced Configuration and Power Interface (ACPI)
An open industry specification that defines power management on a wide range of mobile,
desktop, and server computers and peripherals. ACPI is the foundation for the OnNow industry
initiative that allows system manufacturers to deliver computers that will start at the touch of a
keyboard. ACPI design is essential to take full advantage of power management and Plug and
Play.
See also: Plug and Play
affinity
For Network Load Balancing, the method used to associate client requests to cluster hosts. When
no affinity is specified, all network requests are load balanced across the cluster without respect
to their source. Affinity is implemented by directing all client requests from the same IP address
to the same cluster host.
See also: IP address; client request
agent
An application that runs on a Simple Network Management Protocol (SNMP) managed device.
The agent application is the object of management activities. A computer running SNMP agent
software is also sometimes referred to as an agent.
See also: service; Simple Network Management Protocol (SNMP)
Alerter service
A service used by the server and other services to notify selected users and computers of
administrative alerts that occur on a computer. The Alerter service requires the Messenger
service.
See also: administrative alerts; Messenger service; service
allocation unit
The smallest amount of disk space that can be allocated to hold a file. All file systems used by
Windows organize hard disks based on allocation units. The smaller the allocation unit size, the
more efficiently a disk stores information. If you do not specify an allocation unit size when
formatting the disk, Windows picks default sizes based on the size of the volume. These default
sizes are selected to reduce the amount of space that is lost and the amount of fragmentation on
the volume. An allocation unit is also called a cluster.
See also: file system; volume
American Standard Code for Information Interchange (ASCII)
A standard single-byte character encoding scheme used for text-based data. ASCII uses
designated 7-bit or 8-bit number combinations to represent either 128 or 256 possible characters.
Standard ASCII uses 7 bits to represent all uppercase and lowercase letters, the numbers 0
through 9, punctuation marks, and special control characters used in U.S. English. Most current
x86-based systems support the use of extended (or "high") ASCII. Extended ASCII allows the
eighth bit of each character to identify an additional 128 special symbol characters, foreignlanguage letters, and graphic symbols.
See also: Unicode
AppleTalk
The Apple Computer network architecture and network protocols. A network that has Macintosh
clients and a computer running Windows 2000 Server or Windows NT Server with Services for
Macintosh functions as an AppleTalk network.
AppleTalk Phase 2
The extended AppleTalk Internet model designed by Apple Computer that supports multiple
zones within a network and extended addressing capacity.
application programming interface (API)
A set of routines that an application uses to request and carry out lower-level services performed
by a computer's operating system. These routines usually carry out maintenance tasks such as
managing files and displaying information.
ASCII (American Standard Code for Information Interchange)
See definition for: American Standard Code for Information Interchange (ASCII)
Assistive Technology Program
A service that provides recommendations for technology that can help people with disabilities.
Asymmetric Digital Subscriber Line (ADSL)
A high-bandwidth digital transmission technology that uses existing phone lines and also allows
voice transmissions over the same lines. Most of the traffic is transmitted downstream to the
user, generally at rates of 512 Kbps to about 6 Mbps.
asynchronous communication
A form of data transmission in which information is sent and received at irregular intervals, one
character at a time. Because data is received at irregular intervals, the receiving modem must be
signaled to let it know when the data bits of a character begin and end. This is done by means of
start and stop bits.
See also: modem (modulator/demodulator)
Asynchronous Transfer Mode (ATM)
A high-speed connection-oriented protocol used to transport many different types of network
traffic. ATM packages data in a 53-byte, fixed-length cell that can be switched quickly between
logical connections on a network.
See also: protocol
ATM adaptation layer (AAL)
The layer of the ATM protocol stack that parses data into the payload portion of the ATM cell
for transport across an ATM network.
See also: Asynchronous Transfer Mode (ATM)
attribute
For files, information that indicates whether a file is read-only, hidden, ready for archiving
(backing up), compressed, or encrypted, and whether the file contents should be indexed for fast
file searching.
In Active Directory, characteristics of an object and the type of information an object can hold.
For each object class, the schema defines what attributes an instance of the class must have and
what additional attributes it might have.
audio input device
An audio input device records music and voice input into your computer. Examples of audio
input devices are CD-ROM players and microphones.
audit policy
A policy that determines the security events to be reported to the network administrator.
auditing
The process that tracks the activities of users by recording selected types of events in the security
log of a server or a workstation.
authentication
The process for verifying that an entity or object is who or what it claims to be. Examples
include confirming the source and integrity of information, such as verifying a digital signature
or verifying the identity of a user or computer.
See also: smart card; trust relationship
authoritative
For DNS, describes a DNS server hosting a zone, or a zone containing a name or record. When a
DNS server is configured to host a zone, it is said to be authoritative for names that do exist or
could exist within that zone. A DNS server is allowed to respond authoritatively to queries for
domain names for which it is authoritative. A zone is said to be authoritative for a name if the
name exists or could exist within a zone, and it is said to be authoritiative for a record if the
owner name of the record exists or could exist within a zone.
See also: DNS Server; domain name; Domain Name System (DNS); name server (NS) resource
record; start-of-authority (SOA) resource record; zone
authoritative restore
In Backup, a type of restore operation performed on an Active Directory domain controller in
which the objects in the restored directory are treated as authoritative, replacing (through
replication) all existing copies of those objects. Authoritative restore is applicable only to
replicated system state data such as Active Directory data and File Replication service data. Use
the Ntdsutil.exe utility to perform an authoritative restore.
See also: Active Directory; nonauthoritative restore
authorization
The process that determines what a user is permitted to do on a computer system or network.
Automatic Private IP Addressing (APIPA)
A feature of Windows XP TCP/IP that automatically configures a unique IP address from the
range 169.254.0.1 through 169.254.255.254 and a subnet mask of 255.255.0.0 when the TCP/IP
protocol is configured for dynamic addressing and a Dynamic Host Configuration Protocol
(DHCP) is not available.
See also: DHCP server; Transmission Control Protocol/Internet Protocol (TCP/IP); IP address
availability
A measure of the fault tolerance of a computer and its programs. A highly available computer
runs 24 hours a day, 7 days a week.
See also: fault tolerance
B
B-channel
A single channel of an ISDN line that is used to carry either voice or data information. ISDN
Basic Rate Interface (BRI) has 2 B-channels. ISDN Primary Rate Interface (PRI) in North
America has 23 B-channels. ISDN Primary Rate Interface (PRI) in Europe has 30 B-channels. Bchannel is also called bearer channel.
See also: Integrated Services Digital Network (ISDN)
background
The screen background image used on a graphical user interface such as Windows. Any pattern
or picture that can be stored as a bitmap (.bmp) file can be set as a screen background.
background program
A program that runs while the user is working on another task. The computer's microprocessor
assigns fewer resources to background programs than foreground programs.
See also: foreground program
backup domain controller (BDC)
In Windows NT Server 4.0 or earlier, a computer running Windows NT Server that receives a
copy of the domain's directory database (which contains all account and security policy
information for the domain).
The copy is synchronized periodically and automatically with the master copy on the primary
domain controller (PDC). BDCs also authenticate user logon information and can be promoted to
function as PDCs as needed. Multiple BDCs can exist in a domain. Windows NT 3.51 and 4.0
BDCs can participate in a Windows 2000 domain when the domain is configured in mixed mode.
See also: primary domain controller (PDC)
backup media pool
A logical collection of data-storage media that has been reserved for use by Microsoft Windows
Backup. Backup uses Removable Storage to control access to specific media within a library.
See also: library; media pool; Removable Storage
backup operator
A type of local or global group that contains the user rights you need to back up and restore files
and folders. Members of the Backup Operators group can back up and restore files and folders
regardless of ownership, permissions, encryption, or auditing settings.
See also: auditing; global group; local group; user rights
backup set
A collection of files, folders, and other data that has been backed up and stored in a file or on one
or more tapes.
See also: backup set catalog; on-disk catalog; on-media catalog
backup set catalog
A summary of the files and folders that have been saved in a backup set.
See also: backup set
backup types
A type that determines which data is backed up and how it is backed up. There are five backup
types: copy, daily, differential, incremental, and normal.
See also: copy backup; daily backup; differential backup; incremental backup; normal backup
bandwidth
In analog communications, the difference between the highest and lowest frequencies in a given
range. For example, an analog telephone line accommodates a bandwidth of 3,000 hertz (Hz), the
difference between the lowest (300 Hz) and highest (3,300 Hz) frequencies it can carry. In digital
communications, bandwidth is expressed in bits per second (bps).
See also: bits per second (bps)
Bandwidth Allocation Protocol (BAP)
A PPP control protocol that is used on a multiprocessing connection to dynamically add and
remove links.
See also: Point-to-Point Protocol (PPP)
base priority
A precedence ranking that determines the order in which the threads of a process are scheduled
for the processor. Use Task Manager to view and change base priorities.
For Message Queuing, a property that specifies the queue's priority in a public queue. You can
set the base priority from -32,768 to 32,767; the default priority is 0. Private queues do not
support base priority. Message Queuing routes and delivers messages first by base priority, then
by message priority.
See also: Message Queuing; private queue; public queue
basic disk
A physical disk that can be accessed by MS-DOS and all Windows-based operating systems.
Basic disks can contain up to four primary partitions, or three primary partitions and an extended
partition with multiple logical drives. If you want to create partitions that span multiple disks,
you must first convert the basic disk to a dynamic disk using Disk Management or the
Diskpart.exe command-line utility.
See also: dynamic disk; extended partition; logical drive; MS-DOS (Microsoft Disk Operating
System); primary partition
basic input/output system (BIOS)
On x86-based computers, the set of essential software routines that test hardware at startup, start
the operating system, and support the transfer of data among hardware devices. The BIOS is
stored in read-only memory (ROM) so that it can be executed when you turn on the computer.
Although critical to performance, the BIOS is usually invisible to computer users.
See also: Extensible Firmware Interface (EFI); read-only memory (ROM); x86
basic storage
A storage method in MS-DOS, Windows, Windows NT, and Windows 2000 for primary
partitions, extended partitions, and logical drives.
See also: dynamic storage; extended partition; logical drive
basic volume
A primary partition or logical drive that resides on a basic disk.
See also: basic disk; logical drive; primary partition
batch program
An ASCII (unformatted text) file that contains one or more operating system commands. A batch
program's file name has a .cmd or .bat extension. When you type the file name at the command
prompt, or when the batch program is run from another program, its commands are processed
sequentially. Batch programs are also called batch files.
See also: American Standard Code for Information Interchange (ASCII); logon script
baud rate
The speed at which a modem communicates. Baud rate refers to the number of times the
condition of the line changes. This is equal to bits per second only if each signal corresponds to
one bit of transmitted data.
Modems must operate at the same baud rate in order to communicate with each other. If the baud
rate of one modem is set higher than that of the other, the faster modem usually alters its baud
rate to match that of the slower modem.
See also: bits per second (bps); modem (modulator/demodulator)
Berkeley Internet Name Domain (BIND)
An implementation of DNS written and ported to most available versions of the UNIX operating
system. The Internet Software Consortium maintains the BIND software.
See also: DNS; BIND boot file
binary
A base-2 number system in which values are expressed as combinations of two digits, 0 and 1.
BIND boot file
Configuration file used by Domain Name System (DNS) servers running under versions of the
Berkeley Internet Name Domain (BIND) software implementation. The BIND boot file is a text
file, Named.boot, where individual lines in the file list boot directives used to start a service
when the DNS server is started. By default, Microsoft DNS servers use DNS service parameters
stored in the registry, but they allow the use of a BIND boot file as an alternative for reading
boot configuration settings.
See also: Berkeley Internet Name Domain (BIND); registry boot
bindery
A database in Novell NetWare 3.x that contains organizational and security information about
users and groups.
BIOS
See definition for: basic input/output system (BIOS)
bit (binary digit)
The smallest unit of information handled by a computer. One bit expresses a 1 or a 0 in a binary
numeral, or a true or false logical condition. A group of 8 bits makes up a byte, which can
represent many types of information, such as a letter of the alphabet, a decimal digit, or other
character. Bit is also called binary digit.
See also: binary
bits per second (bps)
The number of bits transmitted every second, used as a measure of the speed at which a device,
such as a modem, can transfer data.
See also: modem (modulator/demodulator)
boot
The process of starting or resetting a computer. When first turned on (cold boot) or reset (warm
boot), the computer runs the software that loads and starts the computer's operating system,
which prepares it for use.
boot files
The system files needed to start Windows. The boot files include Ntldr and Ntdetect.com.
See also: partition boot sector
Boot Logging
A process in which a computer that is starting (booting) creates a log file that records the loading
of each device and service. The log file is called Ntbtlog.txt, and it is saved in the system root
directory.
See also: systemroot
boot partition
The partition that contains the Windows operating system and its support files. The boot partition
can be, but does not have to be, the same as the system partition.
See also: partition; Primary disk; system partition
boot volume
The volume that contains the Windows operating system and its support files. The boot volume
can be, but does not have to be, the same as the system volume.
See also: system volume; volume
BOOTP extensions
A set of optional information types defined originally in RFC 1497 for use with BOOTP service
and later supported by DHCP. In DHCP, these extensions form the legacy core set of client
parameters available and supported by most standard DHCP and BOOTP servers.
See also: bootstrap protocol (BOOTP)
bootstrap protocol (BOOTP)
A protocol used primarily on TCP/IP networks to configure diskless workstations. RFCs 951 and
1542 define this protocol. DHCP is a later boot configuration protocol that uses this protocol.
The Microsoft DHCP service provides limited support for BOOTP service.
See also: Transmission Control Protocol/Internet Protocol (TCP/IP); Dynamic Host
Configuration Protocol (DHCP); Request for Comments (RFC)
broadband
Of or relating to communications systems in which the medium of transmission (such as a wire
or fiber-optic cable) carries multiple messages at a time, each message modulated on its own
carrier frequency by a modem.
broadband connection
A high-speed connection. Broadband connections are typically 256 kilobytes per second (KBps)
or faster. Broadband includes DSL and cable modem service.
broadband integrated services digital network (B-ISDN)
An ITU-T communication standard for high-speed networking that provides new services,
including voice, video, and data on the same network.
See also: International Telecommunication Union - Telecommunication [Standardization Sector]
(ITU-T)
broadcast
An address that is destined for all hosts on a particular network segment.
browser
Software that interprets the markup of files in HTML, formats them into Web pages, and
displays them to the end user. Some browsers also permit end users to send and receive e-mail,
read newsgroups, and play sound or video files embedded in Web documents.
See also: World Wide Web
buffer
A region of RAM reserved for use with data that is temporarily held while waiting to be
transferred between two locations, such as between an application's data area and an input/output
device.
See also: random access memory (RAM)
built-in groups
The default security groups installed with the operating system. Built-in groups have been
granted useful collections of rights and built-in abilities.
In most cases, built-in groups provide all the capabilities needed by a particular user. For
example, if a domain user account belongs to the built-in Administrators group, logging on with
that account gives a user administrative capabilities over the domain and the domain servers. To
provide a needed set of capabilities to a user account, assign it to the appropriate built-in group.
See also: group
bus
A communication line used for data transfer among the components of a computer system. A bus
essentially allows different parts of the system to share data. For example, a bus connects the
disk-drive controller, memory, and input/output ports to the microprocessor.
See also: expansion slot; universal serial bus (USB)
bytes
A unit of data that typically holds a single character, such as a letter, a digit, or a punctuation
mark. Some single characters can take up more than one byte.
See also: bit (binary digit)
C
cable modem
A device that enables a broadband connection to the Internet by using cable television
infrastructure. Access speeds vary greatly, with a maximum throughput of 10 megabits per
second (Mbps).
cache
For DNS and WINS, a local information store of resource records for recently resolved names of
remote hosts. Typically, the cache is built dynamically as the computer queries and resolves
names. It also helps optimize the time required to resolve queried names.
See also: cache file; resource record (RR)
cache file
A file used by the Domain Name System (DNS) server to preload its names cache when service
is started. Also known as the root hints file because DNS uses resource records stored in this file
to help locate root servers that provide referral to authoritative servers for remote names. For
Windows DNS servers, the cache file is named Cache.dns and is located in the
%SystemRoot%\System32\Dns folder.
See also: authoritative; cache; systemroot
caching
The process of temporarily storing recently used data values in a special pool in memory for
quicker subsequent access. For DNS, typically the ability of the DNS server to store information
learned about the DNS namespace during the resolution of DNS queries. (For example, the DNS
server can cache DNS records received from other DNS servers.) Caching is also available
through the DNS Client service as a way for DNS clients to keep a cache of information learned
during recent queries.
See also: caching resolver; DNS Server; Domain Name System (DNS)
caching resolver
A client-side DNS name resolution service that performs caching of recently learned DNS
domain name information. The caching resolver service provides system-wide access to DNSaware programs for resource records obtained from DNS servers during processing of name
queries. Cached data is used for a limited period of time and aged according to the active Timeto-Live (TTL) value. You can set the TTL individually for each resource record (RR).
Otherwise, it defaults to the minimum TTL set in the SOA RR for the zone.
See also: caching; expire interval; minimum TTL; resolver; resource record (RR); Time to Live
(TTL)
callback number
The number that a remote access server uses to call back a user. This number can be preset by
the administrator or specified by the user at the time of each call, depending on how the
administrator configures the user's callback options. The callback number should be the number
of the phone line to which the user's modem is connected.
See also: preset-to callback; remote access server; set-by-caller callback
callback security
A form of network security in which a remote access server calls a user back at a preset number
after the user has made an initial connection and has been authenticated.
See also: preset-to callback; remote access server
called subscriber ID (CSID) string
A string that specifies the called subscriber ID transmitted by the receiving fax machine when
receiving an inbound fax. This string is usually a combination of the fax or telephone number
and the name of the business. It is often the same as the transmitter subscriber ID.
See also: string; transmitting station ID (TSID) string
canonical (CNAME) resource record
A resource record used to map an alternate alias name to a primary canonical DNS domain name
used in the zone.
See also: resource record (RR)
canonical name
An object's distinguished name presented with the root first and without the LDAP attribute tags
(such as: CN=, DC=). The segments of the name are delimited with forward slashes (/). For
example,
CN=MyDocuments,OU=MyOU,DC=Microsoft,DC=Com
is presented as
microsoft.com/MyOU/MyDocuments
in canonical form.
See also: distinguished name; Lightweight Directory Access Protocol (LDAP)
cartridge font
A font contained in a plug-in cartridge and used to add fonts to laser, ink-jet, or high-end dotmatrix printers. Cartridge fonts are distinguished both from internal fonts, which are contained in
ROM in the printer and are always available, and from downloadable (soft) fonts, which reside
on disk and which can be sent to the printer as needed.
See also: downloadable fonts; font; font cartridge; read-only memory (ROM)
cascading hubs
A network configuration in which hubs are connected to other hubs.
See also: hub
catalog
For Indexing Service, a collection of all index information and stored properties for a particular
group of file system directories. By default, Indexing Service indexes the System and Web
catalogs on your hard drive.
See also: property
CD-R
Recordable compact disc. Data can be copied to the CD on more than one occasion; however,
data cannot be erased from the CD.
CD-RW
Rewritable compact disc. Data can be copied to the CD on more than one occasion and can be
erased.
certificate
A digital document that is commonly used for authentication and secure exchange of information
on open networks, such as the Internet, extranets, and intranets. A certificate securely binds a
public key to the entity that holds the corresponding private key. Certificates are digitally signed
by the issuing certification authority and can be issued for a user, a computer, or a service. The
most widely accepted format for certificates is defined by the ITU-T X.509 version 3
international standard.
See also: International Telecommunication Union - Telecommunication [Standardization Sector]
(ITU-T); certification authority (CA); private key; public key; service
certificate revocation list (CRL)
A document maintained and published by a certification authority that lists certificates that have
been revoked.
See also: certificate; certification authority (CA)
certificate store
Typically, a permanent storage where certificates, certificate revocation lists, and certificate trust
lists are stored.
See also: certificate; certificate revocation list (CRL); certificate trust list (CTL)
certificate template
A Windows construct that profiles certificates (that is, it prespecifies the format and content)
based on their intended usage. When requesting a certificate from a Windows enterprise
certification authority (CA), certificate requestors are, depending on their access rights, able to
select from a variety of certificate types that are based on certificate templates, such as User and
Code Signing.
See also: certificate; certification authority (CA)
certificate trust list (CTL)
A signed list of root certification authority certificates that an administrator considers reputable
for designated purposes, such as client authentication or secure e-mail.
See also: certificate; certification authority (CA); root certificate
certification authority (CA)
An entity responsible for establishing and vouching for the authenticity of public keys belonging
to users (end entities) or other certification authorities. Activities of a certification authority can
include binding public keys to distinguished names through signed certificates, managing
certificate serial numbers, and certificate revocation.
See also: certificate; public key; root authority
certification hierarchy
A model of trust for certificates in which certification paths are created by means of the
establishment of parent-child relationships between certification authorities.
See also: certification authority (CA); certification path
certification path
An unbroken chain of trust, consisting of certificates from trusted certificate authorities, from a
specific certificate to the root certification authority in a certification hierarchy.
See also: public key
Challenge Handshake Authentication Protocol (CHAP)
A challenge-response authentication protocol for PPP connections documented in RFC 1994 that
uses the industry-standard Message Digest 5 (MD5) one-way encryption scheme to hash the
response to a challenge issued by the remote access server.
channel
A path or link through which noncontrol information passes between two devices. A single Basic
Rate Interface (BRI) connection, for example, has one physical connection but two channels for
exchanging information between devices. This is often called a bearer channel, implying a
channel that carries information.
On the Internet, a Web site designed to deliver content from the Internet to your computer,
similar to subscribing to a favorite Web site.
See also: active content; B-channel; D-channel
CHAP (Challenge Handshake Authentication Protocol)
An authentication protocol used by Microsoft remote access and Network Connections. Using
CHAP, a remote access client can send its authentication credentials to a remote access server in
a secure form. Microsoft has created a Windows-specific variant of CHAP called MS-CHAP.
See also: remote access server; remote access
character mode
A display mode in which the monitor can display letters, numbers, and other text characters, but
no graphical images or character formatting (italics, superscript, and so on).
checkpoints
See definition for: Restore Point
child object
An object that resides in another object. A child object implies relation. For example, a file is a
child object that resides in a folder, which is the parent object.
See also: object; parent object
Class A IP address
A unicast IP address that ranges from 1.0.0.1 through 126.255.255.254. The first octet indicates
the network, and the last three octets indicate the host on the network.
See also: Class B IP address; Class C IP address; IP address
Class B IP address
A unicast IP address that ranges from 128.0.0.1 through 191.255.255.254. The first two octets
indicate the network, and the last two octets indicate the host on the network.
See also: Class A IP address; Class C IP address; IP address
Class C IP address
A unicast IP address that ranges from 192.0.0.1 to 223.255.255.254. The first three octets
indicate the network, and the last octet indicates the host on the network. Network Load
Balancing provides optional session support for Class C IP addresses (in addition to support for
single IP addresses) to accommodate clients that make use of multiple proxy servers at the client
site.
See also: Class A IP address; Class B IP address; IP address
classical IP over ATM (CLIP)
A proposed Internet standard, described in RFC 2225, that allows IP communication directly on
the ATM layer, bypassing an additional protocol (such as Ethernet or Token Ring) in the
protocol stack.
See also: Asynchronous Transfer Mode (ATM); Internet Protocol (IP)
clear
To turn off an option by removing the X or check mark from a check box. You clear a check box
by clicking it, or by selecting it and then pressing the SPACEBAR.
client
Any computer or program connecting to, or requesting the services of, another computer or
program. Client can also refer to the software that enables the computer or program to establish
the connection.
For a local area network (LAN) or the Internet, a computer that uses shared network resources
provided by another computer (called a server).
See also: server
client application
A Windows-based application that can display and store linked or embedded objects. For
distributed applications, the application that imitates a request to a server application.
client request
A service request from a client computer to a server computer or, for Network Load Balancing, a
cluster of computers. Network Load Balancing forwards each client request to a specific host
within the cluster according to the system administrator's load-balancing policy.
See also: client; cluster; host; load balancing; server
ClipBook Server
A system service that supports ClipBook Viewer, which allows pages to be seen by remote
ClipBooks.
cluster
In data storage, the smallest amount of disk space that can be allocated to hold a file. All file
systems used by Windows organize hard disks based on clusters, which consist of one or more
contiguous sectors. The smaller the cluster size, the more efficiently a disk stores information. If
no cluster size is specified during formatting, Windows picks defaults based on the size of the
volume. These defaults are selected to reduce the amount of space that is lost and the amount of
fragmentation on the volume. A cluster is also called an allocation unit.
In computer networking, a group of independent computers that work together to provide a
common set of services and present a single-system image to clients. The use of a cluster
enhances the availability of the services and the scalability and manageability of the operating
system that provides the services.
See also: availability; client; file system; scalability; volume
cluster adapter
The adapter that, when using multiple network adapters in each host of a Network Load
Balancing cluster, handles the network traffic for cluster operations (the traffic for all hosts in the
cluster). This adapter is programmed with the host's cluster IP address.
See also: cluster; dedicated adapter; IP address
Cluster Administrator
An application that is used to configure a cluster and its nodes, groups, and resources. Cluster
Administrator can run on any member of the trusted domain regardless of whether the computer
is a cluster node.
See also: cluster; Cluster.exe; server cluster
Cluster Administrator extension
A software component that implements the Cluster Administrator extension application
programming interface (API) for allowing Cluster Administrator to configure a new resource
type.
See also: application programming interface (API); cluster; Cluster Administrator
Cluster API
A collection of functions that are implemented by the cluster software and used by a clusteraware client or server application, a cluster management application, or a Resource DLL. The
Cluster API is used to manage the cluster, cluster objects, and the cluster database.
See also: cluster; Resource DLL; server cluster
cluster disk
A disk on a shared bus connected to the cluster nodes, which all the cluster nodes can access
(though not at the same time).
Cluster service
The essential software component that controls all aspects of server cluster operation and
manages the cluster database. Each node in a server cluster runs one instance of the Cluster
service.
See also: cluster; server cluster
cluster-aware application
An application that can run on a cluster node and that can be managed as a cluster resource.
Cluster-aware applications use the Cluster API to receive status and notification information
from the server cluster.
See also: server cluster; Cluster API; cluster-unaware application; cluster
cluster-unaware application
An application that can run on a cluster node and be managed as a cluster resource but that does
not support the Cluster API.
See also: cluster-aware application; cluster; Cluster API
Cluster.exe
An alternative to using Cluster Administrator to administer clusters from the command prompt.
You can also call Cluster.exe from command scripts to automate many cluster administration
tasks.
See also: Cluster Administrator; cluster
Cmd Show Override, with
When checked, opens the DDE server application as specified by the integer in value. Possible
values are 1 (normal), 2 (minimized), 3 (maximized), and 10 (application default).
When cleared, the DDE server application opens.
CMYK color space
Multidimensional color space consisting of the cyan, magenta, yellow, and black intensities that
make up a given color. Commercial color printing devices generally use this system of four-color
process inks.
See also: color management; color space
code page
A means of providing support for character sets and keyboard layouts for different countries or
regions. A code page is a table that relates the binary character codes used by a program to keys
on the keyboard or to characters on the display.
codec
Hardware that can convert audio or video signals between analog and digital forms
(coder/decoder); hardware or software that can compress and uncompress audio or video data
(compression/decompression); or the combination of coder/decoder and
compression/decompression. Generally, a codec compresses uncompressed digital data so that
the data uses less memory.
color depth
The number of colors per pixel your monitor and graphics adapter support.
color gamut
The particular range of colors that a device is able to produce. A device such as a scanner,
monitor, or printer can produce a unique range of colors, which is determined by the
characteristics of the device itself.
See also: color profile; rendering intent
color management
Process of producing accurate, consistent color among a variety of input and output devices. A
color management system (CMS) maps colors between devices such as scanners, monitors, and
printers; transforms colors from one color space to another (for example, RGB to CMYK); and
provides accurate on-screen or print previews.
See also: CMYK color space; RGB color space
color profile
A profile that contains the data needed for translating the values of a color gamut. This data
includes information about color, hue, saturation, and brightness.
See also: color gamut; hue; saturation
color space
A set of three values that defines how a color can be represented on computer devices such as
monitors, scanners, and printers. For example, in the LAB color space, the terms luminance or
whiteness (L), redness-greenness (A), and yellowness-blueness (B) are used; in the HVC system,
the terms are hue (H), value (V), and chroma (C). Color space refers to the three-dimensional
space that is defined by the respective values, such as L, A, and B.
See also: CMYK color space; color space; RGB color space
command prompt window
A window displayed on the desktop used to interface with the MS-DOS operating system. MSDOS commands are typed at an entry point identified by a blinking cursor.
See also: MS-DOS (Microsoft Disk Operating System)
common groups
Groups that appear in the program list on the Start menu for all users who log on to the
computer. Only administrators can create or change common groups.
See also: group
communication port
A port on a computer that allows asynchronous communication of one byte at a time. A
communication port is also called a serial port.
See also: asynchronous communication; serial port
communication settings
Operating parameters, such as bits per second (bps) and modem type, that apply to serial ports on
a computer.
See also: bits per second (bps); modem (modulator/demodulator); serial port
community name
A name used to group SNMP hosts. This name is placed in SNMP messages sent between
SNMP-managed devices such as Windows 2000-based server computers and SNMP
management stations. Typically, all hosts belong to Public, which is the standard name for a
common community of all SNMP hosts.
See also: Simple Network Management Protocol (SNMP); trap
compatibility mode
A feature of a computer or operating system that allows it to run programs written for a different
system. Programs often run slower in compatibility mode.
Complementary Metal Oxide Semiconductor (CMOS)
A specific type of semiconductor technology that requires very little power. The term has been
popularized to mean a small storage area where your system keeps track of certain hardware
parameters, such as the size of your hard disk, the number of serial ports your computer has, etc.
CMOS is also called Setup RAM.
Compression Control Protocol (CCP)
A protocol used in the negotiation process in a PPP connection. Compression Control Protocol is
one type of Network Control Protocol (NCP). NCPs are used to establish and configure different
network protocol parameters for IP, IPX, and NetBEUI.
See also: Internet Protocol (IP); Internetwork Packet Exchange (IPX); Point-to-Point Protocol
(PPP)
computer account
An account that is created by a domain administrator and uniquely identifies the computer on the
domain. The Windows computer account matches the name of the computer joining the domain.
See also: domain
computer administrator
A user who manages a computer. The computer administrator makes system-wide changes to the
computer, including installing programs and accessing all files on the computer, and can create,
change and delete the accounts of other users.
Computer Browser service
A service that maintains an up-to-date list of computers and provides the list to applications
when requested. The Computer Browser service provides the computer lists displayed in the My
Network Places, Select Computer, and Select Domain dialog boxes and (for Windows 2000
Server only) in the Server Manager window.
See also: service
Computer Management
A component you can use to view and control many aspects of the computer configuration.
Computer Management combines several administration utilities into a single console tree,
providing easy access to a local or remote computers administrative properties and tools.
computer quota
For Message Queuing, the storage size limit for messages on a computer, based on the total size
of the messages. When a computer quota is reached, Message Queuing can no longer send
messages to that computer until one or more messages are removed from queues. Message
Queuing enforces the computer quota before it enforces the queue quota on a computer.
See also: Message Queuing; queue quota
connect
To assign a drive letter, port, or computer name to a shared resource so that you can use it.
See also: shared resource
connected, authenticating user
A user's status when a telephone connection has been established but authentication has not yet
taken place. The user may be trying to prove security clearance, or the system may be idle. If this
condition occurs, followed by the Waiting for Call phase, then the user was unable to provide a
correct user name or password. If this phase is repeated, followed by the Waiting for Call phase,
an unauthorized attempt to access the network may be under way.
See also: authentication; Waiting for Call
connected, user authenticated
A user's status when a telephone connection has been established and the user has entered a
correct user name and password. If the user has callback permission and has requested callback,
the connection is followed by the calling-back phase. If the calling-back phase is followed by a
waiting-for-call phase, then the server was unable to reach the user at the specified number. The
user may have supplied an inaccurate callback number (in the case of set-by-caller callback), or
an unauthorized attempt to access the network may be under way (in the case of preset-to
callback).
See also: preset-to callback; set-by-caller callback
connector application
For Message Queuing, an application that enables Message Queuing computers to communicate
with computers that use other messaging systems.
See also: connector queue; foreign computer; Message Queuing
connector queue
For Message Queuing, a queue created on servers running a connector application. You can use
the connector application to exchange messages with computers that are running other messagequeuing products.
See also: connector application; foreign computer; Message Queuing
console tree
The left pane in a Microsoft Management Console (MMC) that displays the items contained in
the console. By default it is the left pane of a console window, but it can be hidden. The items in
the console tree and their hierarchical organization determine the capabilities of a console.
See also: Microsoft Management Console (MMC)
constant bit rate (CBR)
An ATM service type that supports constant bandwidth allocation. This service type is used for
voice and video transmissions that require little or no cell loss and rigorous timing controls
during transmission.
See also: Asynchronous Transfer Mode (ATM)
container object
An object that can logically contain other objects. For example, a folder is a container object.
See also: noncontainer object; object
convergence
The process of stabilizing a system after changes occur in the network. For routing, if a route
becomes unavailable, routers send update messages throughout the internetwork, reestablishing
information about preferred routes.
For Network Load Balancing, a process by which hosts exchange messages to determine a new,
consistent state of the cluster and to elect the host with the highest host priority, known as the
default host. During convergence, a new load distribution is determined for hosts that share the
handling of network traffic for specific TCP or UDP ports.
See also: cluster; default host; host; User Datagram Protocol (UDP)
copy backup
A backup that copies all selected files but does not mark each file as having been backed up (in
other words, the archive attribute is not cleared). Copying is useful if you want to back up files
between normal and incremental backups because copying does not affect these other backup
operations.
See also: daily backup; differential backup; incremental backup; normal backup
count limit
For Process Control, the maximum number of active processes in a process group. You can
configure this in the Process Control snap-in.
CPU Time
In Task Manager, the total processor time, in seconds, used by a process since it started.
See also: Task Manager
CPU Usage
In Task Manager, the percentage of time that a process used the CPU since the last update. On
the Task Manager Process tab, the column heading is CPU.
See also: Task Manager
crash consistency
A feature of shadow copy backups that ensures all files are backed up, regardless of their state.
See also: volume shadow copy
CRC errors
Errors caused by the failure of a cyclic redundancy check. A CRC error indicates that one or
more characters in the data packet received were found garbled on arrival.
credentials
A set of information that includes identification and proof of identification that is used to gain
access to local and network resources. Examples of credentials are user names and passwords,
smart cards, and certificates.
CRL distribution point
An optional extension in an X.509v3 certificate that identifies how information is obtained. Also,
a directory entry or other distribution source for certificate revocation lists.
See also: certificate; certificate revocation list (CRL); X.509v3 certificate
cross-reference object
Objects in which Active Directory stores information about directory partitions and external
directory services. An example of an external directory service is another LDAP-compliant
directory.
See also: Active Directory; directory partition; Lightweight Directory Access Protocol (LDAP)
CryptoAPI
An application programming interface (API) that is provided as part of Microsoft Windows.
CryptoAPI provides a set of functions that allow applications to encrypt or digitally sign data in a
flexible manner while providing protection for the user's sensitive private key data. Actual
cryptographic operations are performed by independent modules known as cryptographic service
providers (CSPs).
See also: application programming interface (API); cryptographic service provider (CSP);
private key
cryptographic service provider (CSP)
The code that performs authentication, encoding, and encryption services that Windows-based
applications access through the CryptoAPI. A CSP is responsible for creating keys, destroying
them, and using them to perform a variety of cryptographic operations. Each CSP provides a
different implementation of the CryptoAPI. Some provide stronger cryptographic algorithms,
while others contain hardware components, such as smart cards.
See also: smart card; CryptoAPI; service
cryptography
The processes, art, and science of keeping messages and data secure. Cryptography is used to
enable and ensure confidentiality, data integrity, authentication (entity and data origin), and
nonrepudiation.
custom file type
Typically, files with extensions that have been created for special kinds of files. Custom file
types are not tracked by the system registry.
See also: registry
D
D-channel
A separate channel of an ISDN line that is used for ISDN signaling. For ISDN Basic Rate
Interface (BRI), the D-channel is 16 kilobits per second (Kbps). For ISDN Primary Rate
Interface (PRI), the D-channel is 64 Kbps. D-channel is also called data channel.
See also: Integrated Services Digital Network (ISDN); switch type
daily backup
A backup that copies all selected files that have been modified the day the daily backup is
performed. The backed-up files are not marked as having been backed up (in other words, the
archive attribute is not cleared).
See also: copy backup; differential backup; incremental backup; normal backup
Data Communications Equipment (DCE)
One of two types of hardware connected by an RS-232-C serial connection, the other being a
Data Terminal Equipment (DTE) device. A DCE is an intermediary device that often transforms
input from a DTE before sending it to a recipient. A modem, for example, is a DCE that
modulates data from a microcomputer (DTE) and sends it along a telephone connection.
See also: Data Terminal Equipment (DTE); RS-232-C standard
Data Link Control (DLC)
An address that uniquely identifies a node on a network. Every network adapter has a DLC
address or DLC identifier (DLCI). Some network protocols, such as Ethernet and Token Ring,
use DLC addresses exclusively. Other protocols, such as TCP/IP, use a logical address at the OSI
Network layer to identify nodes.
However, all network addresses must eventually be translated to DLC addresses. In TCP/IP
networks, this translation is performed by the Address Resolution Protocol (ARP).
See also: Address Resolution Protocol (ARP); Open Systems Interconnection (OSI) reference
model
data packet
A unit of information transmitted as a whole from one device to another on a network.
Data Terminal Equipment (DTE)
In the RS-232-C hardware standard, any device, such as a remote access server or client, that has
the ability to transmit information in digital form over a cable or a communications line.
See also: Data Communications Equipment (DCE); remote access server; RS-232-C standard
data-overrun error
A state in which the sending computer is transmitting characters faster than the receiving
computer can accommodate them. If this problem persists, reduce the bits-per-second (bps) rate.
See also: bits per second (bps)
datagram
One packet, or unit, of information that includes relevant delivery information, such as the
destination address, that is sent through a packet-switching network.
See also: packet
dead-letter queue
For Message Queuing, a queue that stores nontransactional messages that are undeliverable or
expired. These queues store failed messages on the computer on which the message expired.
Messages in these queues are written to disk and are therefore recoverable.
See also: transaction dead-letter queue; transactional message
debugger
A program designed to aid in detecting, locating, and correcting errors in another program by
allowing the programmer to step through the program, examine the data, and monitor conditions
such as the values of variables.
dedicated adapter
The network adapter that, when using multiple network adapters in each host of a Network Load
Balancing cluster, handles network traffic not related to cluster operations (the traffic for
individual hosts on the network). This adapter is programmed with the host's dedicated IP
address.
See also: cluster adapter; IP address
default button
In some dialog boxes, the command button that is selected or highlighted when the dialog box is
initially displayed. The default button has a bold border, indicating that it will be chosen
automatically if you press ENTER. You can override a default button by clicking Cancel or
another command button.
default gateway
A configuration item for the TCP/IP protocol that is the IP address of a directly reachable IP
router. Configuring a default gateway creates a default route in the IP routing table.
default host
The host with the highest host priority for which a drainstop command is not in progress. After
convergence, the default host handles all of the network traffic for TCP and UDP ports that are
not otherwise covered by port rules.
See also: convergence; drainstop; host priority; port rule; User Datagram Protocol (UDP)
default network
In the Macintosh environment, the physical network on which the processes of a server reside as
nodes and on which the server appears to users. The default network of the server must be one to
which that server is attached. Only servers on AppleTalk Phase 2 internets have default
networks.
See also: internet
default printer
The printer to which a computer sends documents if you select the Print command without first
specifying which printer you want to use with a program. You can have only one default printer;
it should be the printer you use most often.
See also: printer
default user
The profile that serves as a basis for all user profiles. Every user profile begins as a copy of the
default user profile.
default zone
The zone to which all Macintosh clients on the network are assigned by default.
See also: zone
defragmentation
The process of rewriting parts of a file to contiguous sectors on a hard disk to increase the speed
of access and retrieval. When files are updated, the computer tends to save these updates on the
largest continuous space on the hard disk, which is often on a different sector than the other parts
of the file. When files are thus fragmented, the computer must search the hard disk each time the
file is opened to find all of the file's parts, which slows down response time.
See also: fragmentation
delegation
The ability to assign responsibility for management and administration of a portion of the
namespace to another user, group, or organization.
For DNS, a name service record in the parent zone that lists the name server authoritative for the
delegated zone.
See also: Domain Name System (DNS)
denial-of-service attack
An attack in which an attacker exploits a weakness or a design limitation of a network service to
overload or halt the service, so that the service is not available for use. This type of attack is
typically launched to prevent other users from using a network service such as a Web server or a
file server.
dependency
A relationship of reliance between two resources that makes it necessary for them to run in the
same group on the same node. For example, an application is dependent on the disks that contain
its data resources.
See also: resource
dependency tree
A diagram for visualizing the dependency relationships between resources.
See also: dependency; resource
dependent client
For Message Queuing, a computer that requires synchronous access to a Message Queuing server
to perform all standard message queuing operations, such as sending and receiving messages and
creating queues.
See also: independent client; Message Queuing server
descendent key
All the subkeys that appear when a key in the registry is expanded. A descendent key is the same
as a subkey.
See also: key; subkey
desired zone
The zone in which AppleTalk network integration appears on the network.
See also: default zone; zone
desktop
The on-screen work area on which windows, icons, menus, and dialog boxes appear.
desktop pattern
A design that appears across your desktop. You can create your own pattern or select a pattern
provided by Windows.
See also: desktop
destination document
The document into which a package or a linked or embedded object is being inserted. For an
embedded object, this is sometimes also called the container document.
See also: embedded object
details pane
The pane in the Microsoft Management Console (MMC) that displays the details for the selected
item in the console tree. The details can be a list of items or they can be administrative
properties, services, and events that are acted on by a snap-in.
See also: Microsoft Management Console (MMC); service; snap-in
device
Any piece of equipment that can be attached to a network or computer; for example, a computer,
printer, joystick, adapter, or modem card, or any other peripheral equipment. Devices normally
require a device driver to function with Windows.
See also: device driver; peripheral
device conflict
A conflict that occurs when the same system resources have been allocated to two or more
devices. System resources include interrupt request (IRQ) lines, direct memory access (DMA)
channels, input/output (I/O) ports, and memory addresses.
See also: direct memory access (DMA); input/output (I/O) port; interrupt request (IRQ) lines;
memory address; resource
device driver
A program that allows a specific device, such as a modem, network adapter, or printer, to
communicate with the operating system. Although a device might be installed on your system,
Windows cannot use the device until you have installed and configured the appropriate driver.
If a device is listed in the Hardware Compatibility List (HCL), a driver is usually included with
Windows. Device drivers load automatically (for all enabled devices) when a computer is
started, and thereafter run invisibly.
device fonts
Fonts that reside in your printer. They can be built into the printer itself or provided by a font
cartridge or font card.
See also: font; font cartridge; printer fonts
Device Manager
An administrative tool that you can use to manage the devices on your computer. Using Device
Manager, you can view and change device properties, update device drivers, configure device
settings, and uninstall devices.
See also: device; uninstall
DFS link
An element in the Distributed File System (DFS) namespace that lies below the root and maps to
one or more targets, each of which corresponds to a shared folder or another DFS root.
See also: DFS root; domain DFS
DFS root
The starting point of the Distributed File System (DFS) namespace. The root is often used to
refer to the namespace as a whole. A root maps to one or more root targets, each of which
corresponds to a shared folder on a server.
See also: DFS link
DFS topology
The overall logical hierarchy of the Distributed File System (DFS), including elements such as
roots, links, shared folders, and replica sets, as depicted in the DFS administrative console. This
is not to be confused with the DFS namespace, which is the logical view of shared resources seen
by users.
See also: DFS link; DFS root; domain DFS
DHCP client
Any network-enabled device that supports the ability to communicate with a DHCP server for
the purpose of obtaining dynamic leased IP configuration and related optional parameters
information.
See also: Dynamic Host Configuration Protocol (DHCP); DHCP server; lease
DHCP option
Address configuration parameters that a DHCP service assigns to clients. Most DHCP options
are predefined, based on optional parameters defined in Request for Comments (RFC) 1542,
although extended options can be added by vendors or users.
See also: Dynamic Host Configuration Protocol (DHCP); service
DHCP server
A computer running the Microsoft DHCP service that offers dynamic configuration of IP
addresses and related information to DHCP-enabled clients.
See also: Dynamic Host Configuration Protocol (DHCP); service; IP address
DHCP service resource
A resource type that provides DHCP services from a cluster.
See also: cluster; Dynamic Host Configuration Protocol (DHCP)
DHCP/BOOTP Relay Agent
The agent program or component responsible for relaying DHCP and BOOTP broadcast
messages between a DHCP server and a client across an IP router. A DHCP relay agent supports
DHCP/BOOTP message relay as defined in RFCs 1541 and 2131. The DHCP Relay Agent
service is managed using the Routing and Remote Access service.
See also: DHCP server; bootstrap protocol (BOOTP); Dynamic Host Configuration Protocol
(DHCP)
dial location
The country code, area code, and specific dialing requirements for the place you are dialing
from. Once you have created a dial location, you can select it to apply the dialing requirements to
all your calls. To change dialing locations, select or create a different one.
dial-up connection
The connection to your network if you are using a device that uses the telephone network. This
includes modems with a standard phone line, ISDN cards with high-speed ISDN lines, or X.25
networks.
If you are a typical user, you may have one or two dial-up connections, for example, to the
Internet and to your corporate network. In a more complex server situation, multiple network
modem connections might be used to implement advanced routing.
See also: Integrated Services Digital Network (ISDN); modem (modulator/demodulator)
dialog box
A secondary window that contains buttons and various kinds of options through which you can
carry out a particular command or task.
dictionary attack
A method of guessing a user's password or PIN by trying every word in the dictionary until
successful.
differential backup
A backup that copies files created or changed since the last normal or incremental backup. It
does not mark files as having been backed up (in other words, the archive attribute is not
cleared). If you are performing a combination of normal and differential backups, restoring files
and folders requires that you have the last normal as well as the last differential backup.
See also: copy backup; daily backup; incremental backup; normal backup
differential data
Saved copies of changed data that can be applied to an original volume to generate a volume
shadow copy.
See also: volume; volume shadow copy
digital signature
A means for originators of a message, file, or other digitally encoded information to bind their
identity to the information. The process of digitally signing information entails transforming the
information, as well as some secret information held by the sender, into a tag called a signature.
Digital signatures are used in public key environments, and they provide nonrepudiation and
integrity services.
See also: Digital Signature Standard (DSS); service; time stamp
Digital Signature Standard (DSS)
A standard that uses the Digital Signature Algorithm (DSA) for its signature algorithm and SHA1 as its message hash algorithm. DSA is a public-key cipher that is used only to generate digital
signatures and cannot be used for data encryption.
See also: digital signature; Secure Hash Algorithm (SHA-1)
Digital Subscriber Line (DSL)
A type of high-speed Internet connection using standard telephone wires. This is also referred to
as a broadband connection.
digital video disc (DVD)
A type of optical disc storage technology. A digital video disc (DVD) looks like a CD-ROM
disc, but it can store greater amounts of data. DVDs are often used to store full-length movies
and other multimedia content that requires large amounts of storage space.
See also: DVD decoder; DVD drive
direct cable connection
A link between the I/O ports of two computers created with a single cable rather than a modem
or other interfacing devices. In most cases, a direct cable connection is made with a null modem
cable.
See also: input/output (I/O) port; null modem cable
direct memory access (DMA)
Memory access that does not involve the microprocessor. DMA is frequently used for data
transfer directly between memory and a peripheral device such as a disk drive.
See also: hardware configuration
directory partition
A contiguous subtree of the directory that forms a unit of replication. A given replica is always a
replica of some directory partition. The directory always has at least three directory partitions:
ï‚·
ï‚·
ï‚·
The schema, which defines the object classes and attributes contained in Active
Directory.
The configuration, which identifies the domain controllers, replication topology
and other related information about the domain controllers within a specific
implementation of Active Directory.
One or more domains that contain the actual directory object data.
A domain controller always stores the partitions for the schema, configuration, and its own (and
no other) domain. The schema and configuration are replicated to every domain controller in the
domain tree or forest. The domain is replicated only to domain controllers for that domain. A
subset of the attributes for all domain objects is replicated to the global catalog.
See also: Active Directory; attribute; domain; replica; replication
directory service
Both the directory information source and the service that make the information available and
usable. A directory service enables the user to find an object given any one of its attributes.
DirectX
An extension of the Microsoft Windows operating system. DirectX technology helps games and
other programs use the advanced multimedia capabilites of your hardware.
disable
To make a device nonfunctional. For example, if you disable a device in a hardware
configuration, you cannot use the device when your computer uses that hardware configuration.
Disabling a device frees the resources that were allocated to the device.
See also: enable; hardware configuration
discretionary access control list (DACL)
The part of an object's security descriptor that grants or denies specific users and groups
permission to access the object. Only the owner of an object can change permissions granted or
denied in a DACL; thus, access to the object is at the owner's discretion.
See also: distribution group; object; security descriptor; security group
disk
A storage device that is attached to a computer.
See also: basic disk; dynamic disk
disk configuration information
Information in the Windows registry on assigned drive letters, simple volumes, striped volumes,
mirrored volumes, spanned volumes, and RAID-5 volumes. You can change the disk
configuration by using Disk Management.
See also: mirrored volume; RAID-5 volume; registry; simple volume; spanned volume; volume
dismount
To remove a removable tape or disc from a drive.
See also: library; mount
display adapter
See definition for: video adapter
distinguished name
A name that uniquely identifies an object by using the relative distinguished name for the object,
plus the names of container objects and domains that contain the object. The distinguished name
identifies the object as well as its location in a tree. Every object in Active Directory has a
distinguished name. A typical distinguished name might be
CN=MyName,CN=Users,DC=Microsoft,DC=Com
This identifies the MyName user object in the microsoft.com domain.
See also: Active Directory; domain; object
distribution group
A group that is used solely for e-mail distribution and that is not security-enabled. Distribution
groups cannot be listed in discretionary access control lists (DACLs) used to define permissions
on resources and objects. Distribution groups can be used only with e-mail applications (such as
Microsoft Exchange) to send e-mail to collections of users. If you do not need a group for
security purposes, create a distribution group instead of a security group.
See also: discretionary access control list (DACL); security group
DLL
See definition for: dynamic-link library (DLL)
DNS
See definition for: Domain Name System (DNS)
DNS Server
A service that maintains information about a portion of the Domain Name System (DNS)
database and responds to and resolves DNS queries. A computer running this service is also
known as a DNS server.
See also: Domain Name System (DNS)
DNS suffix
For DNS, a character string that represents a domain name. The DNS suffix shows where a host
is located relative to the DNS root, specifying a host?s location in the DNS hierarchy. Usually,
DNS suffix describes the latter portion of a DNS name, following one or more of the first labels
of a DNS name.
dock
To connect a laptop or notebook computer to a docking station.
See also: docking station; hot docking; undock
docking station
A unit for housing a portable computer that contains a power connection, expansion slots, and
connections to peripherals, such as a monitor, printer, full-sized keyboard, and mouse. The
docking station turns the portable computer into a desktop computer.
See also: dock; hot docking; undock
document
Any self-contained piece of work created with an application program and, if saved on disk,
given a unique file name by which it can be retrieved.
See also: filter; property cache
domain
A group of computers that are part of a network and share a common directory database. A
domain is administered as a unit with common rules and procedures. Each domain has a unique
name.
An Active Directory domain is a collection of computers defined by the administrator of a
Windows network. These computers share a common directory database, security policies, and
security relationships with other domains. An Active Directory domain provides access to the
centralized user accounts and group accounts maintained by the domain administrator. An Active
Directory forest is made up of one or more domains, each of which can span more than one
physical location.
A DNS domain is any tree or subtree within the DNS namespace. Although the names for DNS
domains often correspond to Active Directory domains, DNS domains should not be confused
with Active Directory domains.
See also: Active Directory; Domain Name System (DNS)
domain controller
In a Windows domain environment, a computer running Active Directory that manages user
access to a network, which includes logging on, authentication, and access to the directory and
shared resources.
See also: Active Directory; authentication; shared resource
domain controller locator (Locator)
An algorithm that runs in the context of the Net Logon service and that finds domain controllers
on a Windows 2000 network. Locator can find domain controllers by using DNS names (for
IP/DNS-compatible computers) or by using NetBIOS names (for computers that are running
Windows 3.x, Windows for Workgroups, Windows NT 3.5 or later, Windows 95, or Windows
98, or it can be used on a network where IP transport is not available).
domain DFS
An implementation of DFS in which DFS topological information is stored in Active Directory.
Because this information is made available on multiple domain controllers in the domain,
domain DFS provides fault-tolerance for any distributed file system in the domain.
See also: DFS topology; fault tolerance
domain local group
A security or distribution group that can contain universal groups, global groups, and accounts
from any domain in the domain tree or forest. A domain local group can also contain other
domain local groups from its own domain. Rights and permissions can be assigned only at the
domain containing the group.
See also: distribution group; domain tree; forest; global group; security group; universal group
domain name
The name given by an administrator to a collection of networked computers that share a common
directory. Part of the Domain Name System (DNS) naming structure, domain names consist of a
sequence of name labels separated by periods.
See also: domain; Domain Name System (DNS); label; namespace
Domain Name System (DNS)
A hierarchical, distributed database that contains mappings of DNS domain names to various
types of data, such as IP addresses. DNS enables the location of computers and services by userfriendly names, and it also enables the discovery of other information stored in the database.
See also: domain; service; Transmission Control Protocol/Internet Protocol (TCP/IP); IP address
domain namespace
The database structure used by the Domain Name System (DNS).
See also: Domain Name System (DNS)
domain naming master
The domain controller assigned to control the addition or removal of domains in the forest. At
any time, there can be only one domain naming master in the forest.
See also: domain controller; forest; multimaster replication; operations master; replication
domain of origin
The parent DNS domain name that is used to root either a zone or a resource record within a
zone. This name is joined to the end of unqualified or relative domain names to form a fully
qualified domain name (FQDN) within the zone. In DNS Manager, the domain of origin will
correspond to Zone name as it appears in the Add Zone Wizard or the name that appears in the
Parent domain name field for any resource records created within the zone.
See also: domain; domain name; Domain Name System (DNS); fully qualified domain name
(FQDN); relative name; resource record (RR)
domain tree
In DNS, the inverted hierarchical tree structure that is used to index domain names. Domain trees
are similar in purpose and concept to the directory trees used by computer filing systems for disk
storage.
For example, when numerous files are stored on disk, directories can be used to organize the files
into logical collections. When a domain tree has one or more branches, each branch can organize
domain names used in the namespace into logical collections.
In Active Directory, a hierarchical structure of one or more domains, connected by transitive,
bidirectional trusts, that forms a contiguous namespace. Multiple domain trees may belong to the
same forest.
See also: Active Directory; domain; transitive trust; two-way trust; domain name; Domain Name
System (DNS); forest; namespace
dots per inch (DPI)
The standard used to measure screen and printer resolution, expressed as the number of dots that
a device can display or print per linear inch. The greater the number of dots per inch, the better
the resolution.
double-byte characters
A set of characters in which each character is represented by two bytes. Some languages, such as
Japanese, Chinese, and Korean, require double-byte character sets.
downloadable fonts
A set of characters stored on disk and sent (downloaded) to a printer's memory when needed for
printing a document. Downloadable fonts are most commonly used with laser printers and other
page printers, although many dot-matrix printers can accept some of them. Downloadable fonts
are also called soft fonts.
See also: font; font cartridge; PostScript fonts
drag
To move an item on the screen by selecting the item and then pressing and holding down the
mouse button while moving the mouse. For example, you can move a window to another
location on the screen by dragging its title bar.
drain
For Network Load Balancing, a command that disables new traffic handling for the rule whose
port range contains the specified port. All ports specified by the port rule are affected.
See also: cluster; drainstop; port; port rule
drainstop
For Network Load Balancing, a command that disables all new traffic handling on the specified
hosts. The hosts then enter draining mode to complete existing connections.
While draining, hosts remain in the cluster and stop their cluster operations when there are no
more active connections. To terminate draining mode, explicitly stop cluster mode with the stop
command, or restart new traffic handling with the start command. To drain connections from a
specific port, use the drain command.
See also: drain; host
drive
An area of storage that is formatted with a file system and has a drive letter. The storage can be a
floppy disk, a CD, a hard disk, or another type of disk. You can view the contents of a drive by
clicking its icon in Windows Explorer or My Computer.
See also: drive letter; file system; volume
drive letter
The naming convention for disk drives on IBM and compatible computers. Drives are named by
letter, beginning with A, followed by a colon.
See also: drive
drop folder
In the Macintosh environment, a folder for which you have the Make Changes permission but
not the See Files or See Folders permission. You can copy files into a drop folder, but you cannot
see what files and subfolders the drop folder contains.
See also: Make Changes
dual boot
A computer configuration that can start two different operating systems.
See also: boot; multiple boot; startup environment
duplex
A system capable of transmitting information in both directions over a communications channel.
See also: full-duplex; half-duplex
DVD decoder
A hardware or software component that allows a digital video disc (DVD) drive to display
movies on your computer screen.
See also: digital video disc (DVD); DVD drive; hardware decoder; software decoder
DVD drive
A disk storage device that uses digital video disc (DVD) technology. A DVD drive reads both
CD-ROM and DVDs; however, you must have a DVD decoder to display DVD movies on your
computer screen.
See also: DVD decoder; digital video disc (DVD)
DWORD
A data type composed of hexadecimal data with a maximum allotted space of 4 bytes.
dynamic data exchange (DDE)
A form of interprocess communication (IPC) implemented in the Microsoft Windows family of
operating systems. Two or more programs that support dynamic data exchange (DDE) can
exchange information and commands.
See also: Network DDE service
dynamic disk
A physical disk that can be accessed only by Windows 2000 and Windows XP. Dynamic disks
provide features that basic disks do not, such as support for volumes that span multiple disks.
Dynamic disks use a hidden database to track information about dynamic volumes on the disk
and other dynamic disks in the computer. You convert basic disks to dynamic by using the Disk
Management snap-in or the DiskPart command line utility. When you convert a basic disk to
dynamic, all existing basic volumes become dynamic volumes.
See also: active volume; basic disk; basic volume; dynamic volume; volume
Dynamic Host Configuration Protocol (DHCP)
A TCP/IP service protocol that offers dynamic leased configuration of host IP addresses and
distributes other configuration parameters to eligible network clients. DHCP provides safe,
reliable, and simple TCP/IP network configuration, prevents address conflicts, and helps
conserve the use of client IP addresses on the network.
DHCP uses a client/server model where the DHCP server maintains centralized management of
IP addresses that are used on the network. DHCP-supporting clients can then request and obtain
lease of an IP address from a DHCP server as part of their network boot process.
See also: IP address; service; Transmission Control Protocol/Internet Protocol (TCP/IP); lease
dynamic storage
A storage method in Windows that allows disk and volume management without requiring
operating system restart.
See also: basic storage
dynamic update
An updated specification to the Domain Name System (DNS) standard that permits hosts that
store name information in DNS to dynamically register and update their records in zones
maintained by DNS servers that can accept and process dynamic update messages.
See also: DNS Server; Domain Name System (DNS); host; zone
dynamic volume
A volume that resides on a dynamic disk. Windows supports five types of dynamic volumes:
simple, spanned, striped, mirrored, and RAID-5. A dynamic volume is formatted by using a file
system, such as FAT or NTFS, and it has a drive letter assigned to it.
See also: basic disk; basic volume; dynamic disk; mirrored volume; RAID-5 volume; simple
volume; spanned volume; volume
dynamic-link library (DLL)
An operating system feature that allows executable routines (generally serving a specific
function or set of functions) to be stored separately as files with .dll extensions. These routines
are loaded only when needed by the program that calls them.
See also: Resource DLL
E
EFI
See definition for: Extensible Firmware Interface (EFI)
EFI system partition
On Itanium-based computers, a portion on a GUID partition table (GPT) disk that is formatted
with the FAT file system and contains the files necessary to start the computer. Every Itaniumbased computer must have at least one GPT disk with an EFI system partition. The EFI system
partition serves the same purpose as the system volume found on x86-based computers.
See also: Extensible Firmware Interface (EFI); GUID partition table (GPT); Microsoft Reserved
(MSR) partition; Itanium; x86
embedded object
Information created in another program that has been pasted inside your document. When
information is embedded, you can edit the information in the new document using toolbars and
menus from the original program.
To edit the embedded information, double-click it and the toolbars and menus from the program
used to create the information appear. Embedded information is not linked to the original source.
If you change information in one place, it is not updated in the other.
See also: OLE; package; source document
emulated local area network (ELAN)
A logical ATM network that emulates the services of an Ethernet or Token Ring LAN.
See also: local area network (LAN)
enable
To make a device functional. For example, if a device in your hardware configuration settings is
enabled, the device is available for use when your computer uses that hardware configuration.
See also: disable; hardware configuration
encapsulated PostScript (EPS) file
A file that prints at the highest possible resolution for your printer. An EPS file may print faster
than other graphical representations. Some Windows-based and non-Windows-based graphical
programs can import EPS files.
See also: PostScript
encrypted password
A password that is scrambled. Encrypted passwords are more secure than plaintext passwords,
which are susceptible to network sniffers.
See also: encryption
Encrypting File System (EFS)
A feature in this version of Windows that enables users to encrypt files and folders on an NTFS
volume disk to keep them safe from access by intruders.
See also: NTFS file system; recovery agent
encryption
The process of disguising a message or data in such a way as to hide its substance.
See also: public key encryption; symmetric encryption
enhanced small device interface (ESDI)
A standard that can be used with high-capacity hard disks, floppy disk drives, and tape drives to
allow these devices to communicate with a computer at high speeds.
environment variable
A string consisting of environment information, such as a drive, path, or file name, associated
with a symbolic name that can be used by Windows. You use System in Control Panel or the set
command from the command prompt to define environment variables.
See also: string; variable
error detection
A technique for detecting when data is lost during transmission. This allows the software to
recover lost data by notifying the transmitting computer that it needs to retransmit the data.
Ethernet
An IEEE 802.3 standard for contention networks. Ethernet uses a bus or star topology and relies
on the form of access known as Carrier Sense Multiple Access with Collision Detection
(CSMA/DC) to regulate communication line traffic. Network nodes are linked by coaxial cable,
fiber-optic cable, or by twisted-pair wiring. Data is transmitted in variable-length frames
containing delivery and control information and up to 1,500 bytes of data. The Ethernet standard
provides for baseband transmission at 10 megabits (10 million bits) per second.
event
Any significant occurrence in the system or an application that requires users to be notified or an
entry to be added to a log.
Event Log service
A service that records events in the system, security, and application logs. The Event Log service
is located in Event Viewer.
See also: Event Viewer; event; service
event logging
The process of recording an audit entry in the audit trail whenever certain events occur, such as
services starting and stopping, or users logging on and off and accessing resources. You can use
Event Viewer to review AppleTalk network integration events as well as Windows events.
See also: event; service
Event Viewer
A component you can use to view and manage event logs, gather information about hardware
and software problems, and monitor security events. Event Viewer maintains logs about
program, security, and system events.
See also: event; event logging
everyone category
In the Macintosh environment, one of the user categories to which you assign permissions for a
folder. Permissions granted to everyone apply to all users who use the server, including guests.
See also: permission
expanded memory
Type of memory that can be added to IBM personal computers. The use of expanded memory is
defined by the Expanded Memory Specification (EMS), which supports memory boards
containing RAM that can be enabled or disabled by software.
See also: extended memory
expansion slot
A socket in a computer, designed to hold expansion boards and connect them to the system bus.
See also: bus
expire interval
For DNS, the number of seconds that DNS servers operating as secondary masters for a zone
will use to determine if zone data should be expired when the zone is not refreshed and renewed.
See also: DNS Server; Domain Name System (DNS); secondary master; zone
explicit permissions
Permissions on an object that are automatically assigned when the object is created, or
specifically assigned or changed by the owner of the object.
See also: permission; object
express message
For Message Queuing, a message that uses fewer resources and is faster than a recoverable
message. However, because express messages are mapped to memory, they are lost if the
computer storing them fails.
See also: recoverable message
extended characters
Any of the 128 additional characters in the extended ASCII (8-bit) character set. These
characters include those in several non-English languages, such as accent marks, and special
symbols used for creating pictures.
extended memory
Memory beyond one megabyte in 80286, 80386, 80486, and Pentium computers.
See also: expanded memory
extended partition
A type of partition that you can create only on basic master boot record (MBR) disks. Extended
partitions are useful if you want to create more than four volumes on a basic MBR disk. Unlike
primary partitions, you do not format an extended partition with a file system and then assign a
drive letter to it. Instead, you create one or more logical drives within the extended partition.
After you create a logical drive, you format it and assign it a drive letter. An MBR disk can have
up to four primary partitions, or three primary partitions, one extended partition, and multiple
logical drives.
See also: basic disk; drive letter; logical drive; master boot record (MBR); partition; primary
partition; volume
Extensible Authentication Protocol (EAP)
An extension to the Point-to-Point Protocol (PPP) that allows for arbitrary authentication
mechanisms to be employed for the validation of a PPP connection.
See also: CHAP (Challenge Handshake Authentication Protocol); Point-to-Point Protocol (PPP)
Extensible Firmware Interface (EFI)
In computers with the Intel Itanium processor, the interface between a computer's firmware,
hardware, and the operating system. The Extensible Firmware Interface (EFI) defines a new
partition style called GUID partition table (GPT). EFI serves the same purpose for Itanium-based
computers as the BIOS found in x86-based computers. However, it has expanded capabilities
that provide a consistent way to start any compatible operating system and an easy way to add
EFI drivers for new bootable devices without the need to update the computer's firmware.
See also: basic input/output system (BIOS); GUID partition table (GPT); Itanium; x86
Extensible Markup Language (XML)
A meta-markup language that provides a format for describing structured data. This facilitates
more precise declarations of content and more meaningful search results across multiple
platforms. In addition, XML will enable a new generation of Web-based data viewing and
manipulation applications.
external network number
A 4-byte hexadecimal number used for addressing and routing purposes. The external network
number is associated with physical network adapters and networks. To communicate with each
other, all computers on the same network that use a specific frame type must have the same
external network number. All external network numbers must be unique to the IPX internetwork.
See also: frame type; internal network number; Internetwork Packet Exchange (IPX)
extract
When you extract a file, an uncompressed copy of the file that is created in a folder you specify.
The original file remains in the compressed folder.
F
failback
The process of moving resources, either individually or in a group, back to their preferred node
after the node has failed and come back online.
See also: failback policy; resource
failback policy
Parameters that an administrator can set using Cluster Administrator that affect failback
operations.
See also: Cluster Administrator; failback
failed
A state that applies to a resource or a node in a cluster. A resource or a node is placed in the
failed state after an unsuccessful attempt has been made to bring it online.
See also: cluster; resource
failover
The process of taking resource groups offline on one node and bringing them back online on
another node. When a resource group goes offline, all resources belonging to that group go
offline. The offline and online transitions occur in a predefined order, with resources that are
dependent on other resources taken offline before and brought online after the resources upon
which they depend.
See also: failover policy; failover time; IIS Server Instance resource; offline; possible owners;
resource
failover policy
Parameters that an administrator can set, using Cluster Administrator, that affect failover
operations.
See also: Cluster Administrator; failover
failover time
The amount of time it takes a resource, either individually or in a group, to complete the failover
process.
See also: failover; resource
FAT
See definition for: file allocation table (FAT)
FAT32
A derivative of the file allocation table (FAT) file system. FAT32 supports smaller cluster sizes
and larger volumes than FAT, which results in more efficient space allocation on FAT32
volumes.
See also: file allocation table (FAT); NTFS file system; volume
fault tolerance
The ability of computer hardware or software to ensure data integrity when hardware failures
occur. Fault tolerant features appear in many server operating systems and include mirrored
volumes, RAID-5 volumes, and server clusters.
See also: cluster; mirrored volume; RAID-5 volume
Fax Service
A system service that provides fax services to local and remote network clients. Fax services
include receiving faxes and faxing documents, fax wizard messages, and e-mail messages.
See also: service
Federal Information Processing Standard 140-1 (FIPS 140-1)
A standard entitled Security Requirements for Cryptographic Modules. FIPS 140-1 describes
government requirements that hardware and software cryptomodules should meet for Sensitive
but Unclassified (SBU) use.
file allocation table (FAT)
A file system used by MS-DOS and other Windows-based operating systems to organize and
manage files. The file allocation table (FAT) is a data structure that Windows creates when you
format a volume by using the FAT or FAT32 file systems. Windows stores information about
each file in the FAT so that it can retrieve the file later.
See also: FAT32; file system; NTFS file system
File and Print Servers for Macintosh
A software component that allows Macintosh users access to a computer running any version of
the Windows Server family. The services provided with this component allow personal computer
and Macintosh users to share files and resources, such as printers on the AppleTalk network or
printers attached to the Windows server.
file control block (FCB)
A small block of memory temporarily assigned by a computer's operating system to hold
information about a file that has been opened for use. An FCB typically contains such
information as the file's identification, its location on disk, and a pointer that marks the user's
current (or last) position in the file.
File Server for Macintosh
An AppleTalk network integration service that allows Macintosh clients and personal computer
clients to share files. File Server for Macintosh is also called MacFile.
See also: service
File Share resource
A file share accessible by a network path that is supported as a cluster resource by a Resource
DLL.
See also: Resource DLL
file system
In an operating system, the overall structure in which files are named, stored, and organized.
NTFS, FAT, and FAT32 are types of file systems.
See also: FAT32; NTFS file system; FAT
File Transfer Protocol (FTP)
A member of the TCP/IP suite of protocols, used to copy files between two computers on the
Internet. Both computers must support their respective FTP roles: one must be an FTP client and
the other an FTP server.
See also: Transmission Control Protocol/Internet Protocol (TCP/IP)
file type
In the Windows environment, a designation of the operational or structural characteristics of a
file. The file type identifies the program, such as Microsoft Word, that is used to open the file.
File types are associated with a file name extension. For example, files that have the .txt or .log
extension are of the Text Document type and can be opened using any text editor.
In the Macintosh environment, a four-character sequence that identifies the type of a Macintosh
file. The Macintosh Finder uses the file type and file creator to determine the appropriate desktop
icon for that file.
filter
For Indexing Service, software that extracts content and property values from a document in
order to index them.
For IPSec, a specification of IP traffic that provides the ability to trigger security negotiations for
a communication based on the source, destination, and type of IP traffic.
See also: document; property value
filtering mode
For Network Load Balancing, the method by which network traffic inbound to a cluster is
handled by the hosts within the cluster. Traffic can either be handled by a single server, load
balanced among the hosts within the cluster, or disabled completely.
See also: cluster; host; load balancing
FilterKeys
A keyboard feature that instructs your keyboard to ignore brief or repeated keystrokes. You can
also adjust the keyboard repeat rate, which is the rate at which a key repeats when you hold it
down.
See also: StickyKeys; ToggleKeys; MouseKeys
firewall
A combination of hardware and software that provides a security system, usually to prevent
unauthorized access from outside to an internal network or intranet. A firewall prevents direct
communication between network and external computers by routing communication through a
proxy server outside of the network. The proxy server determines whether it is safe to let a file
pass through to the network. A firewall is also called a security-edge gateway.
folder
A container for programs and files in graphical user interfaces, symbolized on the screen by a
graphical image (icon) of a file folder. A folder is a means of organizing programs and
documents on a disk and can hold both files and additional folders.
font
A graphic design applied to a collection of numbers, symbols, and characters. A font describes a
certain typeface, along with other qualities such as size, spacing, and pitch.
See also: OpenType fonts; PostScript fonts; screen fonts; Type 1 fonts
font cartridge
A plug-in unit available for some printers that contains fonts in several styles and sizes. As with
downloadable fonts, printers using font cartridges can produce characters in sizes and styles
other than those created by the fonts built into it.
See also: downloadable fonts; font
foreground program
The program that runs in the active window (the uppermost window with the highlighted title
bar). The foreground program responds to commands issued by the user.
See also: background program; title bar
foreign computer
A computer that uses another message queuing system but, through a connector application, can
exchange messages with computers that run Message Queuing.
See also: connector application; Message Queuing
forest
A collection of one or more Windows domains that share a common schema, configuration, and
global catalog and are linked with two-way transitive trusts.
See also: domain; domain tree; global catalog; schema; transitive trust; two-way trust
form
The specification of physical characteristics such as paper size (that is, letter or legal) and printer
area margins of paper or other print media. For example, by default, the Letter form has a paper
size of 8.5 inches by 11 inches and does not reserve space for margins.
format
The structure of a file that defines the way it is stored and laid out on the screen or in print. The
format of a file is usually indicated by its extension. For example, .txt after a file name indicates
the file is a text document, and .doc after a file name indicates it is a Word document.
FORTEZZA
A family of security products, including PCMCIA-based cards, compatible serial port devices,
combination cards (such as FORTEZZA/Modem and FORTEZZA/Ethernet), server boards, and
others. FORTEZZA is a registered trademark held by the National Security Agency.
fragmentation
The scattering of parts of the same disk file over different areas of the disk. Fragmentation
occurs as files on a disk are deleted and new files are added. It slows disk access and degrades
the overall performance of disk operations, although usually not severely.
See also: defragmentation
frame type
The way in which a network type, such as Ethernet, formats data to be sent over a network.
When multiple frame types are allowed for a particular network type, the packets are structured
differently and are, therefore, incompatible. All computers on a network must use the same
frame type to communicate. Frame type is also called frame format.
See also: packet
free media pool
A logical collection of unused data-storage media that can be used by applications or other media
pools. When media are no longer needed by an application, they are returned to a free media
pool so that they can be used again.
See also: media pool; Removable Storage
free space
Available space that you use to create logical drives within an extended partition.
See also: extended partition; logical drive; unallocated space
front-end processor (FEP)
In communications, a computer that is located between communications lines and a main (host)
computer and used to relieve the host of tasks related to communications; sometimes considered
synonymous with communications controller. A front-end processor is dedicated entirely to
handling transmitted information, including error detection and control; receipt, transmission,
and possibly encoding of messages; and management of the lines running to and from other
devices.
FTP (File Transfer Protocol)
See definition for: File Transfer Protocol (FTP)
full name
A user's complete name, usually consisting of the last name, first name, and middle initial. The
full name is information that Local Users and Groups or Active Directory Users and Computers
can maintain as part of the information identifying and defining a user account.
See also: user account; Active Directory Users and Computers
full zone transfer (AXFR)
The standard query type supported by all DNS servers to update and synchronize zone data when
the zone has been changed. When a DNS query is made using AXFR as the specified query type,
the entire zone is transferred as the response.
See also: DNS Server; zone
full-duplex
A system capable of simultaneously transmitting information in both directions over a
communications channel.
See also: half-duplex; duplex
fully qualified domain name (FQDN)
A DNS domain name that has been stated unambiguously so as to indicate with absolute
certainty its location in the domain namespace tree. Fully qualified domain names differ from
relative names in that they are typically stated with a trailing period (.) - for example,
host.example.microsoft.com. - to qualify their position to the root of the namespace.
See also: namespace; domain name; Domain Name System (DNS)
G
game port
An input/output connector to which you attach a joy stick or other game device to your
computer. It is typically a 15-pin socket on the back of a PC.
See also: serial port
gateway
A device connected to multiple physical TCP/IP networks capable of routing or delivering IP
packets between them. A gateway translates between different transport protocols or data
formats (for example, IPX and IP) and is generally added to a network primarily for its
translation ability.
In the context of interoperating with Novell NetWare networks, a gateway acts as a bridge
between the server message block (SMB) protocol used by Windows networks and the NetWare
core protocol (NCP) used by NetWare networks. A gateway is also called an IP router.
GDI objects
Objects from the Graphics Device Interface (GDI) library of application programming interfaces
(APIs) for graphics output devices. In Task Manager, the number of GDI objects currently used
by a process.
See also: Task Manager
Generic Service resource
A Windows service that is supported as a cluster resource by a Resource DLL.
See also: Resource DLL
gigabyte (GB)
1,024 megabytes, though often interpreted as approximately one billion bytes.
global account
In an Active Directory network, a normal user account in a user's domain. Most user accounts
are global accounts. If there are multiple domains in the network, it is best if each user in the
network has only one user account in only one domain, and each user's access to other domains
is accomplished through the establishment of domain trust relationships.
See also: Active Directory; domain
global catalog
A domain controller that contains a partial replica of every domain in Active Directory. In other
words, a global catalog holds a replica of every object in Active Directory, but with a limited
number of each object's attributes. The global catalog stores those attributes most frequently used
in search operations (such as a user's first and last names) and those attributes required to locate a
full replica of the object.
The Active Directory replication system builds the global catalog automatically. The attributes
replicated into the global catalog include a base set defined by Microsoft. Administrators can
specify additional properties to meet the needs of their installation.
See also: Active Directory; attribute; domain controller; replication
global group
A security or distribution group that can have users, groups, and computers from its own domain
as members. Global security groups can be granted rights and permissions on resources in any
domain in the forest. Global groups cannot be created or maintained on computers running
Windows XP Professional. However, for Windows XP Professional computers that participate in
a domain, domain global groups can be granted rights and permissions at those workstations and
can become members of local groups at those workstations.
See also: permission; group; local group; user account
glue chasing
The follow-up queries or successive lookups that are made to resolve glue records in a zone to
other remote DNS servers that are authoritative for a derivative zone. When glue chasing is
performed, name server (NS) resource records for delegated DNS servers are chased, or
followed, by using successive queries to resolve the servers named in NS records to their host
address (A) resource records and to obtain server IP addresses.
See also: A (address) resource record; delegation; DNS Server; glue record; name server (NS)
resource record; zone
glue record
A resource record for out-of-zone information used to provide helpful pointer information for
locating DNS servers that have been delegated authority for specific subdomains derived from a
zone's domain of origin. These records are used to glue zones together and provide an effective
delegation and referral path for other DNS servers to follow when performing a recursive lookup
to fully resolve a name.
See also: delegation; DNS Server; domain of origin; glue chasing; resource record (RR); zone
graphics mode
A display mode in which lines and characters on the screen are drawn pixel by pixel. Graphics
mode displays images by grouping individual dots into shapes, such as the arrowhead of a mouse
pointer. It can also preview character formatting, such as boldface and italics, as it will appear in
print.
group
A collection of users, computers, contacts, and other groups. Groups can be used as security or as
e-mail distribution collections. Distribution groups are used only for e-mail. Security groups are
used both to grant access to resources and as e-mail distribution lists.
See also: domain; global group; local group
group account
A collection of user accounts. By making a user account a member of a group, you give the
related user all the rights and permissions granted to the group.
See also: group; user account
group memberships
The groups to which a user account belongs. Permissions and rights granted to a group are also
provided to its members. In most cases, the actions a user can perform in Windows are
determined by the group memberships of the user account to which the user is logged on.
See also: group; user account
group name
A unique name identifying a local group or a global group to Windows. A group's name cannot
be identical to any other group name or user name in its own domain or computer.
See also: global group; local group
Group Policy
The Microsoft Management Console (MMC) snap-in that is used to edit Group Policy objects.
See also: Group Policy object; Microsoft Management Console (MMC); policy; snap-in
Group Policy object
A collection of Group Policy settings. Group Policy objects are essentially the documents created
by the Group Policy snap-in, a Windows utility. Group Policy objects are stored at the domain
level, and they affect users and computers contained in sites, domains, and organizational units.
In addition, each Windows computer has exactly one group of settings stored locally, called the
local Group Policy object.
See also: Group Policy; object; policy
guest account
A built-in account used to log on to a computer running Windows when a user does not have an
account on the computer or domain, or in any of the domains trusted by the computer's domain.
See also: domain
GUID partition table (GPT)
A disk-partitioning scheme that is used by the Extensible Firmware Interface (EFI) in Itaniumbased computers. GPT offers more advantages than master boot record (MBR) partitioning
because it allows up to 128 partitions per disk, provides support for volumes up to 18 exabytes in
size, allows primary and backup partition tables for redundancy, and supports unique disk and
partition IDs (GUIDs).
See also: Itanium; Extensible Firmware Interface (EFI); master boot record (MBR)
H
half-duplex
A system capable of transmitting information in only one direction at a time over a
communications channel.
See also: duplex; full-duplex
handle
In the user interface, an interface added to an object that facilitates moving, sizing, reshaping, or
other functions pertaining to an object. In programming, a pointer to a pointer, that is, a token
that lets a program access an identified resource.
handle count
In Task Manager, the number of object handles in a process's object table.
See also: Task Manager
handshaking
A series of signals acknowledging that communication can take place between computers or
other devices. A hardware handshake is an exchange of signals over specific wires (other than
the data wires), in which each device indicates its readiness to send or receive data. A software
handshake consists of signals transmitted over the same wires used to transfer data, as in modemto-modem communications over telephone lines.
handwriting input device
A tool, such as a digital pen and tablet, used to enter text by writing instead of typing. Along
with writing tablets, you can use 3-D drawing or Computer Aided Drafting (CAD) tablets, or a
tablet-PC. You can also write by moving your mouse on the mouse pad.
handwriting recognition
The ability to interpret handwritten text and convert it into computer-readable text. Handwriting
recognition programs allow you to enter text using a pen stylus or other handwriting input
device, rather than a keyboard.
hard disk
A device, also called hard disk drive, that contains one or more inflexible platters coated with
material in which data can be recorded magnetically with read/write heads. The hard disk exists
in a sealed case that protects it and allows the head to fly 10 millionths to 25 millionths of an
inch above the surface of a platter. Data can both be stored and accessed much more quickly than
on a floppy disk.
hardware
The physical components of a computer system, including any peripheral equipment such as
printers, modems, and mouse devices.
hardware compression
A feature available on some tape devices that automatically compresses the data that is being
stored on the device. This is usually an option that is turned on or off in a backup program.
hardware configuration
Resource settings that have been allocated for a specific device. Each device on your computer
has a hardware configuration, which may consist of IRQ lines, DMA, an I/O port, or memory
address settings.
See also: device; direct memory access (DMA); input/output (I/O) port; interrupt request (IRQ)
lines; memory address
hardware decoder
A type of digital video disc (DVD) decoder that allows a DVD drive to display movies on your
computer screen. A hardware decoder uses both software and hardware to display movies.
See also: DVD decoder; DVD drive; software decoder
hardware profile
Data that describes the configuration and characteristics of specific computer equipment. This
information can be used to configure computers for using peripheral devices.
See also: device
hardware type
A classification for similar devices. For example, Imaging Device is a hardware type for digital
cameras and scanners.
See also: device
hash
A fixed-size result that is obtained by applying a one-way mathematical function (sometimes
called a hash algorithm) to an arbitrary amount of data. If there is a change in the input data, the
hash changes. The hash can be used in many operations, including authentication and digital
signing. A hash is also called a message digest.
See also: authentication; hash algorithm
hash algorithm
An algorithm used to produce a hash value of some piece of data, such as a message or session
key. A good hash algorithm has a quality where changes in the input data can change every bit in
the resulting hash value; for this reason, hashes are useful in detecting any modification in a
large data object, such as a message. Furthermore, a good hash algorithm makes it
computationally infeasible to construct two independent inputs that have the same hash. Typical
hash algorithms include MD2, MD4, MD5, and SHA-1. Hash algorithm is also called a hash
function.
See also: Hash-based Message Authentication Mode (HMAC); MD2; MD4; MD5; message
digest; Secure Hash Algorithm (SHA-1)
Hash-based Message Authentication Mode (HMAC)
A mechanism for message authentication using cryptographic hash functions. HMAC can be
used with any iterative cryptographic hash function (for example, MD5 and SHA-1) in
combination with a secret shared key. The cryptographic strength of HMAC depends on the
properties of the underlying hash function.
See also: hash algorithm; MD5; Secure Hash Algorithm (SHA-1)
hexadecimal
A base-16 number system represented by the digits 0 through 9 and the uppercase or lowercase
letters A (equivalent to decimal 10) through F (equivalent to decimal 15).
hibernation
A state in which your computer shuts down after saving everything in memory on your hard
disk. When you bring your computer out of hibernation, all programs and documents that were
open are restored to your desktop.
See also: standby
High Contrast
A display feature that instructs programs to change the color scheme to a high-contrast scheme
and to increase legibility whenever possible.
histogram
A chart consisting of horizontal or vertical bars, the widths or heights of which represent the
values of certain data.
hive
A section of the registry that appears as a file on your hard disk. The registry subtree is divided
into hives (named for their resemblance to the cellular structure of a beehive). A hive is a
discrete body of keys, subkeys, and values that is rooted at the top of the registry hierarchy. A
hive is backed by a single file and a .log file, which are in the systemroot\System32\Config or the
systemroot\Profiles\username folders.
By default, most hive files (Default, SAM, Security, and System) are stored in the
systemroot\System32\Config folder. The systemroot\Profiles folder contains the user profile for
each user of the computer. Because a hive is a file, it can be moved from one system to another.
However, you must use the Registry Editor to edit the file.
See also: registry; key; systemroot
home folder
A folder (usually on a file server) that administrators can assign to individual users or groups.
Administrators use home folders to consolidate user files onto specific file servers for easy
backup. Home folders are used by some programs as the default folder for the Open and Save
As dialog boxes. Home folders are sometimes referred to as home directories.
See also: administrator; group
host
A Windows computer that runs a server program or service used by network or remote clients.
For Network Load Balancing, a cluster consists of multiple hosts connected over a local area
network (LAN).
See also: client; cluster; local area network (LAN); server; service
host name
The DNS name of a device on a network. These names are used to locate computers on the
network. To find another computer, its host name must either appear in the Hosts file or be
known by a DNS server. For most Windows computers, the host name and the computer name
are the same.
See also: DNS Server; Domain Name System (DNS)
host priority
For Network Load Balancing, a host's precedence for handling default network traffic for TCP
and UDP ports. It is used if a host within the cluster goes offline, and it determines which host
within the cluster will assume responsibility for the traffic previously handled by the offline host.
See also: cluster; host; User Datagram Protocol (UDP)
Hosts file
A local text file in the same format as the 4.3 Berkeley Software Distribution (BSD) UNIX
/etc/hosts file. This file maps host names to IP addresses, and it is stored in the
\%Systemroot%\System32\Drivers\Etc folder.
See also: systemroot
hot docking
The process of attaching a laptop computer to a docking station while the computer is running,
and automatically activating the docking station's video display and other functions.
See also: dock; docking station; undock
HTTP
See definition for: Hypertext Transfer Protocol (HTTP)
hub
A common connection point for devices in a network. Typically used to connect segments of a
local area network (LAN), a hub contains multiple ports. When data arrives at one port, it is
copied to the other ports so that all segments of the LAN can see the data.
See also: local area network (LAN); port; switching hub
hubbed mode
A mode in which the ARP/MARS provides ATM addresses to requesting clients in the form of a
multicast server (MCS) list value. In this mode, the ARP/MARS acts as a multicast server,
providing active forwarding of all multicast and broadcast traffic destined for IP addresses
contained within the ranges specified in the list.
See also: Address Resolution Protocol (ARP); Asynchronous Transfer Mode (ATM); multicast
address resolution service (MARS); multicast server (MCS); nonhubbed mode; IP address
hue
The position of a color along the color spectrum. For example, green is between yellow and blue.
This attribute can be set using Display in Control Panel.
See also: saturation
hyperlink
Colored and underlined text or a graphic that you click to go to a file, a location in a file, an
HTML page on the World Wide Web, or an HTML page on an intranet. Hyperlinks can also go
to newsgroups and to Gopher, Telnet, and FTP sites.
In Windows folders, hyperlinks are text links that appear in the folder's left pane. You can click
these links to perform tasks, such as moving or copying a file, or to go to other places on your
computer, such as the My Documents folder or Control Panel.
Hypertext Markup Language (HTML)
A simple markup language used to create hypertext documents that are portable from one
platform to another. HTML files are simple ASCII text files with codes embedded (indicated by
markup tags) to denote formatting and hypertext links.
See also: American Standard Code for Information Interchange (ASCII)
Hypertext Transfer Protocol (HTTP)
The protocol used to transfer information on the World Wide Web. An HTTP address (one kind
of Uniform Resource Locator [URL]) takes the form: http://www.microsoft.com.
I
icon
A small image displayed on the screen to represent an object that can be manipulated by the user.
Icons serve as visual mnemonics and allow the user to control certain computer actions without
having to remember commands or type them at the keyboard.
IEEE 1394
A standard for high-speed serial devices such as digital video and digital audio editing
equipment.
See also: device
IEEE 1394 connector
A type of connector that enables you to connect and disconnect high-speed serial devices. An
IEEE 1394 connector is usually on the back of your computer near the serial port or the parallel
port.
If a device is IEEE 1394 compatible, you can connect the device to the IEEE 1394 connector
while the computer is running and Windows will detect the device and inform you when it is
ready for use. Similarly, you can unplug the device while the computer is running, but you
should use the Add Hardware Wizard to inform Windows that you are unplugging the device.
Windows will then inform you when the device can be unplugged from the computer.
The IEEE 1394 bus is used primarily to connect high-end digital video and digital audio devices
to your computer; however, some hard disks, printers, scanners, and DVD drives can also be
connected to your computer using the IEEE 1394 connector.
IIS Server Instance resource
A server-instance designation used with Internet Information Services (IIS) that supports the
WWW and FTP services. IIS server instances are supported as cluster resources by a Resource
DLL. IIS Server Instance resources may have dependencies on IP Address resources, Network
Name resources, and Physical Disk resources. Access information for server instances does not
fail over.
See also: dependency; failover; Resource DLL
Image Name
The name of a process as displayed in Task Manager.
See also: Task Manager
import media pool
A logical collection of data-storage media that has not been cataloged by Removable Storage.
Media in an import media pool should be cataloged as soon as possible so that they can be used
by an application.
See also: media pool; Removable Storage
in-addr.arpa domain
A special top-level DNS domain reserved for reverse mapping of IP addresses to DNS host
names.
See also: Domain Name System (DNS); reverse lookup; top-level domains
incremental backup
A backup that copies only those files created or changed since the last normal or incremental
backup. It marks files as having been backed up (in other words, the archive attribute is cleared).
If you use a combination of normal and incremental backups to restore your data, you will need
to have the last normal backup and all incremental backup sets.
See also: copy backup; daily backup; differential backup; normal backup
incremental zone transfer (IXFR)
An alternate query type that can be used by some DNS servers to update and synchronize zone
data when a zone is changed. When incremental zone transfer is supported between DNS servers,
servers can keep track of and transfer only those incremental resource record changes between
each version of the zone.
See also: DNS Server; secondary master; zone; zone transfer
independent client
A computer with Message Queuing installed that can host queues and store messages locally.
Independent clients do not require synchronous access to a Message Queuing server to send and
receive messages, but they can use Message Queuing servers with routing enabled for efficient
message routing.
See also: dependent client; Message Queuing server; routing services
infrared (IR)
Light that is beyond red in the color spectrum. While the light is not visible to the human eye,
infrared transmitters and receivers can send and receive infrared signals.
See also: Infrared Data Association (IrDA); infrared device; infrared port
Infrared Data Association (IrDA)
The industry organization of computer, component, and telecommunications vendors who
establish the standards for infrared communication between computers and peripheral devices,
such as printers.
See also: infrared (IR)
infrared device
A computer, or a computer peripheral such as a printer, that can communicate using infrared
light.
See also: infrared (IR)
infrared file transfer
Wireless file transfer between a computer and another computer or device using infrared light.
See also: infrared (IR)
infrared network connection
A direct or incoming network connection to a remote access server using an infrared port.
See also: infrared port
infrared port
An optical port on a computer that enables communication with other computers or devices by
using infrared light, without cables. Infrared ports can be found on some portable computers,
printers, and cameras.
See also: infrared (IR); infrared device; port
infrastructure master
The domain controller assigned to update group-to-user references whenever group memberships
are changed, and to replicate these changes to any other domain controllers in the domain. At any
time, there can be only one infrastructure master in a particular domain.
See also: domain controller; multimaster replication; operations master
inheritance
A mechanism that allows a given access control entry (ACE) to be copied from the container
where it was applied to all children of the container. Inheritance can be combined with
delegation to grant administrative rights to a whole subtree of the directory in a single update
operation.
See also: access control entry (ACE); delegation
inherited permissions
Permissions on an object that are automatically inherited from its parent object. Inherited
permissions cannot be modified.
See also: permission; object; parent object
Initial master
A shared folder whose existing files and folders are replicated to other shared folders when
replication is initially configured. After replication is complete, there is no initial master, since
any of the replicas can accept changes and propagate them to the other replicas. The initial
master then becomes another replica.
See also: shared folder; replica; replication
initialize
In Disk Management, the process of detecting a disk or volume and assigning it a status (for
example, healthy) and a type (for example, dynamic).
See also: basic disk; basic volume; dynamic disk; dynamic volume
Initiate to Application Enable
When checked, new connections to the DDE share are allowed. When cleared, only current DDE
conversations are allowed.
Ink
An option that allows you to enter text in handwritten form. Instead of converting your
handwritten text to typed text, the text is converted to an object and displayed exactly as you
wrote it. For example:
.
input language
The specification of the language you want to type in. Some programs that are designed for
Windows recognize this setting. When you add a new input language, a keyboard layout for that
language is also added.
Input Method Editor (IME)
Programs used to enter the thousands of different characters in written Asian languages with a
standard 101-key keyboard. An IME consists of both an engine that converts keystrokes into
phonetic and ideographic characters and a dictionary of commonly used ideographic words. As
the user enters keystrokes, the IME engine attempts to identify which character or characters the
keystrokes should be converted into.
input/output (I/O) port
A channel through which data is transferred between a device and the microprocessor. The port
appears to the microprocessor as one or more memory addresses that it can use to send or receive
data.
See also: device; memory address; port
insertion point
The place where text will be inserted when typed. The insertion point usually appears as a
flashing vertical bar in an application's window or in a dialog box.
install
When referring to software, to add program files and folders to your hard disk and related data to
your registry so that the software runs properly. Installing contrasts with upgrading, where
existing program files, folders, and registry entries are updated to a more recent version.
When referring to hardware, to physically connect the device to your computer, to load device
drivers onto your computer, and to configure device properties and settings.
See also: device driver; registry; uninstall
integrated device electronics (IDE)
A type of disk-drive interface in which the controller electronics reside on the drive itself,
eliminating the need for a separate adapter card. IDE offers advantages such as look-ahead
caching to increase overall performance.
Integrated Services Digital Network (ISDN)
A digital phone line used to provide higher bandwidth. ISDN in North America is typically
available in two forms: Basic Rate Interface (BRI) consists of 2 B-channels at 64 kilobits per
second (Kbps) and a D-channel at 16 Kbps; Primary Rate Interface (PRI) consists of 23 Bchannels at 64 Kbps and a D-channel at 64 Kbps. An ISDN line must be installed by the phone
company at both the calling site and the called site.
See also: B-channel; D-channel; multilink dialing; Service Profile Identifier (SPID); switch type
interactive dialog box
A dialog box that requires a response from the user. Intermediary devices such as a security host
require such a dialog box as an added layer of security between the client and the remote access
server. In such dialog boxes, the user types an access code or a user name and password on the
remote access terminal screen.
See also: dialog box; intermediary device; remote access server; static dialog box
interactive logon
A network logon from a computer keyboard, when the user types information in the Logon
Information dialog box displayed by the computer's operating system.
interconnect
A private network that connects nodes in a cluster.
See also: cluster
intermediary device
A device other than a modem or X.25 PAD, located between a network connection and the
remote access server. This device is typically a modem-pool switch or security host and requires
either a static or interactive dialog box between the client and itself.
See also: remote access server; static dialog box; interactive dialog box; PAD (packet
assembler/disassembler)
internal network number
A 4-byte hexadecimal number used for addressing and routing purposes. The internal network
number identifies a virtual network inside a computer. The internal network number must be
unique to the IPX internetwork. Internal network number is also called virtual network number.
See also: external network number; Internetwork Packet Exchange (IPX)
international prefix
Digits dialed before the country code to access the international phone service. The actual digits
depend on the country or region in which you are dialing an international number. For example,
in the United States of America, the prefix for international dialing is 011. To dial from the
United States of America to Honduras, which has the country code 504, you would dial: (011)
(504) (000) 000-0000
International Telecommunication Union - Telecommunication [Standardization
Sector] (ITU-T)
The sector of the International Telecommunication Union (ITU) responsible for
telecommunication standards. ITU-T replaces the Comite Consultatif International
Telegraphique et Telephonique (CCITT). Its responsibilities include standardizing modem
design and operations, and standardizing protocols for networks and facsimile transmission. ITU
is an international organization within which governments and the private sector coordinate
global telecom networks and services.
internet
internet. Two or more network segments connected by routers. Another term for internetwork.
Internet. A worldwide network of computers. If you have access to the Internet, you can retrieve
information from millions of sources, including schools, governments, businesses, and
individuals.
See also: World Wide Web
Internet address
An address for a resource on the Internet that is used by Web browsers to locate Internet
resources. An Internet address typically starts with a protocol name, followed by the name of the
organization that maintains the site; the suffix identifies the kind of organization it is. For
example, the address http://www.yale.edu/ provides the following information:
ï‚·
ï‚·
ï‚·
http: This Web server uses the Hypertext Transfer Protocol.
www: This site is on the World Wide Web.
edu: This is an educational institution.
Internet address is also called Uniform Resource Locator (URL).
See also: Web server; protocol
Internet Control Message Protocol (ICMP)
A required maintenance protocol in the TCP/IP suite that reports errors and allows simple
connectivity. ICMP is used by the Ping tool to perform TCP/IP troubleshooting.
See also: Internet Protocol (IP); protocol; Transmission Control Protocol/Internet Protocol
(TCP/IP)
Internet Engineering Task Force (IETF)
An open community of network designers, operators, vendors, and researchers concerned with
the evolution of Internet architecture and the smooth operation of the Internet. Technical work is
performed by working groups organized by topic areas (such as routing, transport, and security)
and through mailing lists. Internet standards are developed in IETF Requests for Comments
(RFCs), which are a series of notes that discuss many aspects of computing and computer
communication, focusing on networking protocols, programs, and concepts.
See also: subnet bandwidth management (SBM); Session Description Protocol (SDP)
Internet Group Management Protocol (IGMP)
A protocol used by IP hosts to report their multicast group memberships to any immediately
neighboring multicast routers.
See also: Internet Protocol multicasting; protocol
Internet Information Services (IIS)
Software services that support Web site creation, configuration, and management, along with
other Internet functions. Internet Information Services include Network News Transfer Protocol
(NNTP), File Transfer Protocol (FTP), and Simple Mail Transfer Protocol (SMTP).
See also: Simple Mail Transfer Protocol (SMTP); File Transfer Protocol (FTP); Network News
Transfer Protocol (NNTP)
Internet Protocol (IP)
A routable protocol in the TCP/IP protocol suite that is responsible for IP addressing, routing,
and the fragmentation and reassembly of IP packets.
See also: Compression Control Protocol (CCP); packet; Transmission Control Protocol/Internet
Protocol (TCP/IP); voluntary tunnel
Internet Protocol multicasting
The extension of local area network multicasting technology to a TCP/IP network. Hosts send
and receive multicast datagrams, the destination fields of which specify IP host group addresses
rather than individual IP addresses. A host indicates that it is a member of a group by means of
the Internet Group Management Protocol (IGMP).
See also: Internet Group Management Protocol (IGMP); Transmission Control Protocol/Internet
Protocol (TCP/IP)
Internet Protocol security (IPSec)
A set of industry-standard, cryptography-based protection services and protocols. IPSec protects
all protocols in the TCP/IP protocol suite and Internet communications using L2TP.
Internet service provider (ISP)
A company that provides individuals or companies access to the Internet and the World Wide
Web. An ISP provides a telephone number, a user name, a password, and other connection
information so users can connect their computers to the ISP's computers. An ISP typically
charges a monthly or hourly connection fee.
See also: Web server
Internetwork Packet Exchange (IPX)
A network protocol native to NetWare that controls addressing and routing of packets within and
between LANs. IPX does not guarantee that a message will be complete (no lost packets).
See also: Compression Control Protocol (CCP); IPX/SPX; local area network (LAN); Routing
Information Protocol over IPX (RIPX)
interrupt
A request for attention from the processor. When the processor receives an interrupt, it suspends
its current operations, saves the status of its work, and transfers control to a special routine
known as an interrupt handler, which contains the instructions for dealing with the particular
situation that caused the interrupt.
interrupt request (IRQ) lines
Hardware lines over which devices can send signals to get the attention of the processor when
the device is ready to accept or send information. Each device must have a unique IRQ line.
See also: device
intersite messaging service (ISM)
A service that supports transports for asynchronous, site-to-site messaging. Each transport serves
two major roles: send/receive and topology queries (such as, what are the various sites connected
by this transport, and at what cost?). The intersite messaging services shipped in Windows are
RPC and SMTP (mail).
See also: remote procedure call (RPC); service; Simple Mail Transfer Protocol (SMTP)
intranet
A network within an organization that uses Internet technologies and protocols, but is available
only to certain people, such as employees of a company. An intranet is also called a private
network.
IP address
A 32-bit address used to identify a node on an IP internetwork. Each node on the IP internetwork
must be assigned a unique IP address, which is made up of the network ID, plus a unique host
ID. This address is typically represented with the decimal value of each octet separated by a
period (for example, 192.168.7.27). In this version of Windows, you can configure the IP address
statically or dynamically through DHCP.
See also: Dynamic Host Configuration Protocol (DHCP); IP Address resource; scope
IP Address resource
A 32-bit number in dotted decimal format that represents an Internet Protocol (IP) address and is
supported as a cluster resource by a Resource DLL provided with Windows.
See also: IP address; Resource DLL
IPX/SPX
Transport protocols used in Novell NetWare networks, which together correspond to the
combination of TCP and IP in the TCP/IP protocol suite. Windows implements IPX through
NWLink.
See also: NWLink; Transmission Control Protocol/Internet Protocol (TCP/IP); Internetwork
Packet Exchange (IPX)
ISA expansion slot
A connection socket for a peripheral designed to the Industry Standard Architecture (ISA) on a
computer motherboard.
ISDN (Integrated Services Digital Network)
A high-speed digital telephone service that can dramatically increase the speed at which you
connect to the Internet or to your corporate LAN (local area network). ISDN can operate at 128
kilobytes per second (Kbps), which is five or more times faster than many analog modems.
ISP (Internet service provider)
See definition for: Internet service provider (ISP)
Itanium
An Intel microprocessor that uses explicitly parallel instruction set computing and 64-bit
memory addressing.
J
job object
A system-level structure that allows processes to be grouped together and managed as a single
unit.
See also: process
journal queue
For Message Queuing, a queue where journal messages are stored.
See also: journal quota; Message Queuing; source journaling; target journaling
journal quota
For Message Queuing, a property that specifies the cumulative limit for journal messages in a
journal queue. The limit is based on cumulative journal message size. When a journal queue's
quota is reached, messages are no longer stored.
See also: journal queue; Message Queuing
junction point
A physical location on a hard disk that points to data located at another location on your hard
disk or another storage device. Junction points are created when you create a mounted drive. You
can also create a junction point using the linkd command.
See also: mounted drive
K
Kerberos?V5 authentication protocol
An authentication mechanism used to verify user or host identity. The Kerberos V5
authentication protocol is the default authentication service for Windows 2000. Internet Protocol
security (IPSec) and the QoS Admission Control Service use the Kerberos protocol for
authentication.
See also: Key Distribution Center (KDC); realm; service ticket; ticket-granting service (TGS);
ticket-granting ticket (TGT)
kernel
The core of layered architecture that manages the most basic operations of the operating system
and the computer's processor. The kernel schedules different blocks of executing code, called
threads, for the processor to keep it as busy as possible and coordinates multiple processors to
optimize performance. The kernel also synchronizes activities among Executive-level
subcomponents, such as I/O Manager and Process Manager, and handles hardware exceptions
and other hardware-dependent functions. The kernel works closely with the hardware abstraction
layer.
key
In Registry Editor, a folder that appears in the left pane of the Registry Editor window. A key
can contain subkeys and value entries. For example, Environment is a key of
HKEY_CURRENT_USER.
In IP security (IPSec), a value used in combination with an algorithm to encrypt or decrypt data.
Key settings for IP security are configurable to provide greater security.
See also: registry; subkey
Key Distribution Center (KDC)
A network service that supplies session tickets and temporary session keys used in the Kerberos
V5 authentication protocol. In Windows 2000 and Windows XP, the KDC runs as a privileged
process on all domain controllers.
See also: ticket-granting ticket (TGT); Kerberos?V5 authentication protocol; ticket-granting
service (TGS)
keyboard language
The language you want to use when you type. Some programs that are designed for the Windows
platform recognize this setting. When you add a new keyboard language, a keyboard layout for
that language is also added.
keyboard layout
The arrangement that accommodates the special characters and symbols used in different
languages. Keyboard layouts affect which characters appear when you press the keys on your
keyboard. After you change your keyboard layout, the characters that appear on your screen may
no longer correspond to the characters that are printed on your keyboard keys.
L
L2TP (Layer 2 Tunneling Protocol)
An industry-standard Internet tunneling protocol. Unlike Point-to-Point Tunneling Protocol
(PPTP), L2TP does not require IP connectivity between the client workstation and the server.
L2TP requires only that the tunnel medium provide packet-oriented point-to-point connectivity.
The protocol can be used over media such as ATM, Frame Relay, and X.25. L2TP provides the
same functionality as PPTP. Based on Layer 2 Forwarding (L2F) and PPTP specifications, L2TP
allows clients to set up tunnels across intervening networks.
See also: Asynchronous Transfer Mode (ATM); Internet Protocol (IP); Point-to-Point Tunneling
Protocol (PPTP); tunnel
label
Each part of a full DNS domain name that represents a node in the domain namespace tree.
Domain names are made up of a sequence of labels, such as the three labels (example, microsoft,
and com) that make up the DNS domain name example.microsoft.com. Each label used in a DNS
name must be 63 bytes or less in character length.
See also: domain name; Domain Name System (DNS)
LAN emulation (LANE)
A set of protocols that allow existing Ethernet and Token Ring LAN services to overlie an ATM
network. LANE allows connectivity among LAN- and ATM-attached stations.
See also: Asynchronous Transfer Mode (ATM); local area network (LAN); protocol
LAN emulation client (LEC)
The client on an ELAN that performs data forwarding, address resolution, and other control
functions. The LEC resides on end stations in an ELAN.
See also: client; emulated local area network (ELAN); LAN emulation (LANE)
LAN emulation configuration server
The service that assigns individual local area network emulation (LANE) clients to particular
emulated local area networks (ELANs) by directing them to the LAN emulation server (LES).
See also: emulated local area network (ELAN); LAN emulation (LANE); LAN emulation server
(LES); service
LAN emulation server (LES)
The central control point for an emulated local area network (ELAN). Enables LAN emulation
clients to join the ELAN and resolves LAN addresses to ATM addresses.
See also: Asynchronous Transfer Mode (ATM); emulated local area network (ELAN); LAN
emulation (LANE)
latency
In Active Directory replication, the delay between the time an update is applied to a given replica
and the time it is applied to some other replica. Latency is sometimes referred to as propagation
delay.
See also: replication; Active Directory; replica
LCD (Liquid Crystal Display)
See definition for: liquid crystal display (LCD)
LDAP Data Interchange Format (LDIF)
Files that contain LDAP instructions that manipulate directory information. Before the LDAP
commands in an LDIF file are carried out, they can be read or modified, providing an
opportunity for fine-tuning.
See also: Lightweight Directory Access Protocol (LDAP)
lease
The length of time for which a DHCP client can use a dynamically assigned IP address
configuration. Before the lease time expires, the client must either renew or obtain a new lease
with DHCP.
See also: Dynamic Host Configuration Protocol (DHCP); IP address
library
A data-storage system, usually managed by Removable Storage. A library consists of removable
media (such as tapes or discs) and a hardware device that can read from or write to the media.
There are two major types of libraries: robotic libraries (automated multiple-media, multidrive
devices) and stand-alone drive libraries (manually operated, single-drive devices). A robotic
library is also called a jukebox or changer.
See also: Removable Storage
Lightweight Directory Access Protocol (LDAP)
The primary access protocol for Active Directory. Lightweight Directory Access Protocol
(LDAP) version 3 is defined by a set of Proposed Standard documents in Internet Engineering
Task Force (IETF) RFC 2251.
See also: Active Directory; Internet Engineering Task Force (IETF); protocol
Line Printer Daemon (LPD)
A service on the print server that receives documents (print jobs) from Line Printer Remote
(LPR) utilities running on client systems.
See also: Line Printer Remote (LPR); print job; print server; service
Line Printer Remote (LPR)
A connectivity utility that runs on client systems and is used to print files to a computer running
an LPD server.
See also: Line Printer Daemon (LPD)
Link Control Protocol (LCP)
A PPP control protocol that negotiates link and PPP parameters to dynamically configure the
data-link layer of a PPP connection.
linked object
An object that is inserted into a document but still exists in the source file. When information is
linked, the new document is updated automatically if the information in the original document
changes. If you want to edit the linked information, double-click it. The toolbars and menus from
the original program will appear. If the original document is on your computer, changes that you
make to the linked information will also appear in the original document.
See also: embedded object; OLE; package; source document
liquid crystal display (LCD)
A type of display used in digital watches and many portable computers. LCD displays utilize two
sheets of polarizing material with a liquid crystal solution between them. An electric current
passed through the liquid causes the crystals to align so that light cannot pass through them. Each
crystal, therefore, is like a shutter, either allowing light to pass through or blocking the light.
Lmhosts file
A local text file that maps NetBIOS names (commonly used for computer names) to IP addresses
for hosts that are not located on the local subnet. In this version of Windows, the file is stored in
the systemroot\System32\Drivers\Etc folder.
See also: systemroot; IP address
load balancing
A technique used by Windows Clustering to scale the performance of a server-based program
(such as a Web server) by distributing its client requests across multiple servers within the
cluster. Each host can specify the load percentage that it will handle, or the load can be equally
distributed across all the hosts. If a host fails, Windows Clustering dynamically redistributes the
load among the remaining hosts.
See also: cluster; host
local area network (LAN)
A communications network connecting a group of computers, printers, and other devices located
within a relatively limited area (for example, a building). A LAN allows any connected device to
interact with any other on the network.
See also: NetBIOS Extended User Interface (NetBEUI); network basic input/output system
(NetBIOS); virtual local area network (VLAN); workgroup
local computer
The computer that you are currently logged on to as a user. More generally, a local computer is a
computer that you can access directly without using a communications line or a communications
device, such as a network adapter or a modem.
local group
For computers running Windows and member servers, a group that can be granted permissions
and rights from its own computer and (if the computer participates in a domain) user accounts
and global groups both from its own domain and from trusted domains.
See also: global group; user account
local printer
A printer that is directly connected to one of the ports on your computer.
local user
A person who uses a computer that is not connected to a network. A local user is most likely
someone using a computer at home.
local user profile
A computer-based record about an authorized user that is created automatically on the computer
the first time a user logs on to a workstation or server computer.
log file
A file that stores messages generated by an application, service, or operating system. These
messages are used to track the operations performed. For example, Web servers maintain log
files listing every request made to the server. Log files are usually plain text (ASCII) files and
often have a .log extension.
In Backup, a file that contains a record of the date the tapes were created and the names of files
and directories successfully backed up and restored. The Performance Logs and Alerts service
also creates log files.
See also: American Standard Code for Information Interchange (ASCII); service
log on
To begin using a network by providing a user name and password that identifies a user to the
network.
logical drive
A volume that you create within an extended partition on a basic master boot record (MBR) disk.
Logical drives are similar to primary partitions, except that you are limited to four primary
partitions per disk, whereas you can create an unlimited number of logical drives per disk. A
logical drive can be formatted and assigned a drive letter.
See also: basic disk; basic volume; drive letter; extended partition; master boot record (MBR);
primary partition; volume
logical printer
The software interface between the operating system and the printer in Windows. While a printer
is the device that does the actual printing, a logical printer is its software interface on the print
server. This software interface determines how a print job is processed and how it is routed to its
destination (to a local or network port, to a file, or to a remote print share). When you print a
document, it is spooled (or stored) on the logical printer before it is sent to the printer itself.
See also: printer; spooling
logon right
A user right that is assigned to a user and that specifies the ways in which a user can log on to a
system. An example of a logon right is the right to log on to a system remotely.
logon script
Files that can be assigned to user accounts. Typically a batch file, a logon script runs
automatically every time the user logs on. It can be used to configure a user's working
environment at every logon, and it allows an administrator to influence a user's environment
without managing all aspects of it. A logon script can be assigned to one or more user accounts.
See also: logon script path; user account
logon script path
A sequence of directory names that specifies the location of the logon script. When a user logs
on, the authenticating computer locates the specified logon script (if one has been assigned to
that user account) by following that computer's local logon script path (usually
systemroot\System32\Repl\Import\Scripts).
See also: logon script; systemroot; user account
long distance operator
Digits dialed before the area or city code to access a long distance phone service. For example, in
the United States of America, you dial a 1 before the area or city code: (1) (206) 000-0000. The
actual digits depend on the country/region or phone service. Area codes and long distance
operators are not used in all countries/regions.
long name
A folder name or file name longer than the 8.3 file name standard (up to eight characters
followed by a period and an extension of up to three characters) of the FAT file system. This
version of Windows supports long file names up to 255 characters.
In a Macintosh environment, users can assign long names to files and folders on the server and,
using AppleTalk network integration, you can assign long names to Macintosh-accessible
volumes when you create them. This version of Windows automatically translates long names of
files and folders to 8.3 names for MS-DOS and Windows 3.x users.
See also: file allocation table (FAT); MS-DOS (Microsoft Disk Operating System)
loopback address
The address of the local computer used for routing outgoing packets back to the source
computer. This address is used primarily for testing.
loose name checking
A form of domain name checking DNS uses that examines characters in DNS names for valid
ANSI character compliance. However, loose name checking does not check for compliance with
DNS naming requirements and valid character usage for Internet host names, as specified in RFC
1123, Requirements for Internet Hosts - Applications and Support.
For RFC compliance, DNS domain names will use name labels made up only of valid uppercase
and lowercase letters, number characters, and hyphens (A through Z, a through z, 0 through 9,
and -) separated by periods.
See also: domain name; Domain Name System (DNS); label
luminosity
The brightness of a color based on a scale from black to white on your monitor.
M
Make Changes
The Macintosh-style permission that gives users the right to make changes to a folder's contents;
for example, modifying, renaming, moving, creating, and deleting files. When AppleTalk
network integration translates access privileges into permissions, a user who has the Make
Changes privilege is given Write and Delete permissions.
See also: permission
Management and Monitoring Tools
Software components that include utilities for network management and monitoring, along with
services that support client dialing and the updating of client phone books. Also included is the
Simple Network Management Protocol (SNMP).
See also: Simple Network Management Protocol (SNMP)
Management Information Base (MIB)
A set of objects that represent various types of information about a device, used by Simple
Network Management Protocol (SNMP) to manage the device. Because different network
management services are used for different types of devices and protocols, each service has its
own set of objects.
See also: Simple Network Management Protocol (SNMP); service
management system
A network-enabled host running Simple Network Management Protocol (SNMP) management
software. This software requests information from SNMP agents. Management system is also
called a management console.
mandatory user profile
A user profile that is not updated when the user logs off. It is downloaded to the user's desktop
each time the user logs on, and is created by an administrator and assigned to one or more users
to create consistent or job-specific user profiles. Only members of the Administrators group can
change profiles.
See also: roaming user profile; user profile
map
To translate one value into another. In virtual memory systems, a computer might map a virtual
address into a physical address.
master boot record (MBR)
The first sector on a hard disk, which starts the process of booting the computer. The MBR
contains the partition table for the disk and a small amount of executable code called the master
boot code.
See also: Recovery Console; partition boot sector
master domain
A Windows NT 4.0 domain that is used for managing user and group accounts in a multidomain
network.
See also: domain; group account; user account
Master File Table (MFT)
An NTFS system file on NTFS-formatted volumes that contains information about each file and
folder on the volume. The MFT is the first file on an NTFS volume.
See also: file allocation table (FAT); NTFS file system; volume
master server
An authoritative DNS server for a zone. Master servers can vary and are one of two types (either
primary or secondary masters), depending on how the server obtains its zone data.
See also: DNS Server; primary master; secondary master; zone; zone transfer
maximize
To enlarge a window to its largest size by clicking the Maximize button (at the right of the title
bar), or by pressing ALT+SPACEBAR and then pressing X.
See also: minimize; title bar
MD2
A hash algorithm that creates a 128-bit hash value and was developed by RSA Data Security,
Inc.
See also: hash algorithm
MD4
A hash algorithm that creates a 128-bit hash value and was developed by RSA Data Security,
Inc.
See also: hash algorithm
MD5
An industry-standard one-way, 128-bit hashing scheme, developed by RSA Data Security, Inc.,
and used by various Point-to-Point Protocol (PPP) vendors for encrypted authentication. A
hashing scheme is a method for transforming data (for example, a password) in such a way that
the result is unique and cannot be changed back to its original form. The CHAP authentication
protocol uses challenge-response with one-way MD5 hashing on the response. In this way, you
can prove to the server that you know your password without actually sending the password over
the network.
See also: CHAP (Challenge Handshake Authentication Protocol); hash algorithm; message
digest
media
Any fixed or removable objects that store computer data. Examples include hard disks, floppy
disks, tapes, and compact discs.
media pool
A logical collection of removable media that have the same management policies. Media pools
are used by applications to control access to specific tapes or discs within libraries managed by
Removable Storage. There are four media pools: unrecognized, import, free, and applicationspecific. Each media pool can only hold either media or other media pools.
See also: free media pool; import media pool; backup media pool; Removable Storage
media sensing
A feature that, when it detects a network cable connection failure, removes the bound protocols
from the failed network adapter until the cable connection is reestablished. Without these bound
protocols, the network interface connected through the failed network adapter is not available for
cluster communication.
mediator
For Process Control, a process used to preserve information when a service stops or starts.
memory address
A portion of computer memory that can be allocated to a device or used by a program or the
operating system. Devices are usually allocated a range of memory addresses.
See also: device
Memory Usage
In Task Manager, the current working set of a process, in kilobytes. The current working set is
the number of pages currently resident in memory. On the Task Manager Processes tab, the
column heading is Mem Usage.
See also: Task Manager
Memory Usage Delta
In Task Manager, the change in memory, in kilobytes, used since the last update.
See also: Task Manager
message
For Message Queuing, a unit of information sent between computers running Message Queuing.
The message can contain text or binary data as defined by the sending application. All messages,
including status messages, are stored in queues on Message Queuing computers.
See also: Message Queuing
Message Authentication Code (MAC)
An algorithm that ensures the quality of a block of data.
message digest
See definition for: hash
Message Queuing
A message queuing and routing system for Windows that enables distributed applications
running at different times to communicate across heterogeneous networks and with computers
that may be offline. Message Queuing provides guaranteed message delivery, efficient routing,
security, and priority-based messaging. Message Queuing was formerly known as MSMQ.
See also: Microsoft Distributed Transaction Coordinator (MS DTC)
Message Queuing server
For Message Queuing (also known as MSMQ), a computer that can provide message queuing,
routing, and directory services to client computers. Message Queuing servers can be used to:
ï‚·
ï‚·
ï‚·
ï‚·
Provide message routing and session concentration for independent clients.
Provide message routing between sites over routing links.
Create queues and store messages for dependent clients.
Access information in Active Directory (if installed on a Windows domain
controller).
See also: Active Directory; dependent client; independent client; routing link; routing services;
session concentration
Messenger service
A service that sends and receives messages sent by administrators or by the Alerter service.
See also: service; Alerter service; performance alert
metadata
Data about data. For example, the title, subject, author, and size of a file constitute the file's
metadata.
metric
A number used to indicate the cost of a route in the IP routing table that enables the selection of
the best route among possible multiple routes to the same destination.
Microcom Networking Protocol Five (MNP5)
A data-compression standard that allows modems to increase throughput by compressing data
before transmission. Data can be compressed with a ratio of up to 2:1. MNP5 sometimes expands
data that has already been compressed, resulting in poorer performance in those cases. If you
have an MNP5 modem, do not turn on modem compression and software compression at the
same time. To turn on MNP5 compression, you must also turn on MNP4 error control.
See also: Microcom Networking Protocol Four (MNP4)
Microcom Networking Protocol Four (MNP4)
An industry-standard communication protocol that allows modems to automatically retransmit
corrupted data, assuring that only error-free data passes through the modem. MNP2 and MNP3
standards are included in MNP4.
See also: Microcom Networking Protocol Five (MNP5)
Microsoft Distributed Transaction Coordinator (MS DTC)
A transaction manager that coordinates transactions that span multiple resource managers, such
as Message Queuing and Microsoft SQL Server. MS DTC is automatically installed when
Message Queuing is installed.
See also: Message Queuing; transaction
Microsoft Management Console (MMC)
A framework for hosting administrative tools, called consoles. A console may contain tools,
folders or other containers, World Wide Web pages, and other administrative items. These items
are displayed in the left pane of the console, called a console tree. A console has one or more
windows that can provide views of the console tree.
The main MMC window provides commands and tools for authoring consoles. The authoring
features of MMC and the console tree itself may be hidden when a console is in User Mode.
See also: snap-in; console tree
Microsoft Point-to-Point Encryption (MPPE)
A 128-bit key or 40-bit key encryption algorithm using RSA RC4. MPPE provides for packet
confidentiality between the remote access client and the remote access or tunnel server and is
useful where IP security (IPSec) is not available. MPPE 40-bit keys are used to satisfy current
North American export restrictions. MPPE is compatible with Network Address Translation.
See also: remote access server; tunnel server
Microsoft Reserved (MSR) partition
A required partition on every GUID partition table (GPT) disk. System components can allocate
portions of the MSR partition into new partitions for their own use. For example, when you
convert a basic GPT disk to dynamic, the system allocates a portion of the MSR partition to be
used as the Logical Disk Manager (LDM) metadata partition. The MSR partition varies in size
based on the size of the GPT disk. For disks smaller than 16 GB, the MSR partition is 32 MB.
For disks larger than 16 GB, the MSR partition is 128 MB. The MSR partition is not visible in
Disk Management, and you cannot store data on the MSR partition or delete it.
See also: GUID partition table (GPT); partition
MIDI setup
The setup that specifies the type of MIDI device you are using, the channel and patch settings
needed to play MIDI files, and the port your device is using.
See also: Musical Instrument Digital Interface (MIDI)
minimize
To reduce a window to a button on the taskbar by clicking the Minimize button (at the right of
the title bar), or by pressing ALT+SPACEBAR and then pressing N.
See also: maximize; title bar
minimum TTL
A default Time to Live (TTL) value set in seconds for use with all resource records in a zone.
This value is set in the start of authority (SOA) resource record for each zone. By default, the
DNS server includes this value in query answers to inform recipients how long it can store and
use resource records provided in the query answer before they must expire the stored records
data. When TTL values are set for individual resource records, those values will override the
minimum TTL.
See also: DNS Server; start-of-authority (SOA) resource record; Time to Live (TTL); zone
mirror
One of the two volumes that make up a mirrored volume. Each mirror of a mirrored volume
resides on a different disk. If one mirror becomes unavailable (due to a disk failure, for
example), Windows can use the remaining mirror to gain access to the volume's data.
See also: fault tolerance; mirrored volume; volume
mirror set
A fault-tolerant partition created with Windows NT 4.0 or earlier that duplicates data on two
physical disks. You can only repair, resynchronize, break, or delete mirror sets in Windows
2000. To create new volumes that are mirrored, use mirrored volumes on dynamic disks.
See also: basic disk; dynamic disk; fault tolerance; mirrored volume
mirrored volume
A fault-tolerant volume that duplicates data on two physical disks. A mirrored volume provides
data redundancy by using two identical volumes, which are called mirrors, to duplicate the
information contained on the volume. A mirror is always located on a different disk. If one of the
physical disks fails, the data on the failed disk becomes unavailable, but the system continues to
operate in the mirror on the remaining disk. You can create mirrored volumes only on dynamic
disks.
See also: volume; dynamic disk; dynamic volume; fault tolerance; RAID-5 volume
modem (modulator/demodulator)
A device that allows computer information to be transmitted and received over a telephone line.
The transmitting modem translates digital computer data into analog signals that can be carried
over a phone line. The receiving modem translates the analog signals back to digital form.
See also: modem compression; null modem cable; port; Telephony API (TAPI); Waiting for Call
modem compression
A technique used to reduce the number of characters transmitted without losing data content. The
transmitting modem compresses the data and the receiving computer or modem decompresses
the data back to its original state.
See also: modem (modulator/demodulator)
modulation standards
Protocols that determine how modems convert digital data into analog signals that can be
transmitted over telephone lines.
Initially, Bell created modulation standards used in the United States, and the CCITT created
international recommendations. The ITU-T (formerly called the CCITT) now makes
recommendations generally adopted by modem manufacturers both internationally and in the
United States. The ITU-T V series recommendations (such as V.34 and V.90) define data
communication over the telephone network. The suffixes -bis and -ter (for example, V.32bis)
indicate later versions.
See also: International Telecommunication Union - Telecommunication [Standardization Sector]
(ITU-T); V.34; V.90
mount
To place a removable tape or disc into a drive.
See also: dismount; library; mounted drive
mounted drive
A drive attached to an empty folder on an NTFS volume. Mounted drives function the same as
any other drive, but are assigned a label or name instead of a drive letter. The mounted drive's
name is resolved to a full file system path instead of just a drive letter. Members of the
Administrators group can use Disk Management to create mounted drives or reassign drive
letters.
See also: drive; mount; NTFS file system; volume
MouseKeys
A keyboard feature that enables you to use the numeric keypad to move the mouse pointer and to
click, double-click, and drag.
See also: ToggleKeys; FilterKeys; StickyKeys
MS-DOS (Microsoft Disk Operating System)
An operating system used on all personal computers and compatibles. As with other operating
systems, such as OS/2, it translates user keyboard input into operations the computer can
perform. MS-DOS can be easily accessed by using the command prompt, while MS-DOS-based
programs can be accessed through the use of shortcuts on the desktop.
See also: OS/2; command prompt window; MS-DOS-based program
MS-DOS-based program
A program that is designed to run with MS-DOS and therefore may not be able to take full
advantage of all Windows features.
See also: MS-DOS (Microsoft Disk Operating System); program information file (PIF)
multicast
Network traffic destined for a set of hosts that belong to a multicast group.
Multicast Address Dynamic Client Allocation Protocol (MADCAP)
An extension to the DHCP protocol standard used to support dynamic assignment and
configuration of IP multicast addresses on TCP/IP-based networks.
See also: Dynamic Host Configuration Protocol (DHCP); Transmission Control Protocol/Internet
Protocol (TCP/IP)
multicast address resolution service (MARS)
A service for resolving multicast IP addresses to the ATM addresses of the clients that have
joined that multicast group. The MARS can work in conjunction with the MCS and clients to
distribute multicast data through point-to-multipoint connections.
See also: Asynchronous Transfer Mode (ATM); multicast server (MCS); IP address
multicast scope
A range of multicast group IP addresses in the Class D address range that are available to be
leased or assigned to multicast DHCP clients by DHCP.
See also: address classes; Dynamic Host Configuration Protocol (DHCP); lease
multicast server (MCS)
A service that manages zero or more multicast groups and distributes multicast data sent to it by
clients of those multicast groups through point-to-multipoint connections.
See also: nonhubbed mode; service
multicasting
The process of sending a message simultaneously to more than one destination on a network.
multihomed computer
A computer that has multiple network adapters or that has been configured with multiple IP
addresses for a single network adapter.
See also: virtual IP address; IP address; network adapter
multilink dialing
The combination of two or more physical communications links' bandwidth into a single logical
link to increase your remote access bandwidth and throughput by using remote access Multilink.
Based on the Internet Engineering Task Force (IETF) standard RFC 1990, Multilink combines
analog modem paths, ISDN B-channels, and mixed analog and digital communications links on
both your client and server computers. This increases your Internet and intranet access speed and
decreases the amount of time you are connected to a remote computer.
See also: B-channel; bandwidth; Integrated Services Digital Network (ISDN)
multimaster replication
A replication model in which any domain controller accepts and replicates directory changes to
any other domain controller. This differs from other replication models in which one computer
stores the single modifiable copy of the directory and other computers store backup copies.
See also: domain controller; replication
multiple boot
A computer configuration that runs two or more operating systems.
See also: dual boot; startup environment
Musical Instrument Digital Interface (MIDI)
A serial interface standard that allows for the connection of music synthesizers, musical
instruments, and computers. The MIDI standard is based partly on hardware and partly on a
description of the way in which music and sound are encoded and communicated between MIDI
devices. The information transmitted between MIDI devices is in a form called a MIDI message,
which encodes aspects of sound, such as pitch and volume, as 8-bit bytes of digital information.
MIDI devices can be used for creating, recording, and playing back music. Using MIDI,
computers, synthesizers, and sequencers can communicate with each other, either keeping time
or actually controlling the music created by other connected equipment.
See also: MIDI setup
My Documents
A folder that provides you with a convenient place to store documents, graphics, or other files
you want to access quickly. When you save a file in a program such as WordPad or Paint, the file
is automatically saved in My Documents, unless you choose a different folder.
See also: home folder
N
name
The identifier of your computer on the network.
name resolution
The process of having software translate between names that are easy for users to work with and
numerical IP addresses, which are difficult for users but necessary for TCP/IP communications.
Name resolution can be provided by software components such as DNS or WINS.
See also: Domain Name System (DNS); Transmission Control Protocol/Internet Protocol
(TCP/IP); Windows Internet Name Service (WINS)
name server (NS) resource record
A resource record used in a zone to designate the DNS domain names for authoritative DNS
servers for the zone.
See also: DNS Server; Domain Name System (DNS); resource record (RR); zone
named pipe
A portion of memory that can be used by one process to pass information to another process, so
that the output of one is the input of the other. The second process can be local (on the same
computer as the first) or remote (on a networked computer).
namespace
A set of unique names for resources or items used in a shared computing environment.
For Microsoft Management Console (MMC), the namespace is represented by the console tree,
which displays all of the snap-ins and resources that are accessible to a console.
For Domain Name System (DNS), namespace is the vertical or hierarchical structure of the
domain name tree. For example, each domain label, such as host1 or example, used in a fully
qualified domain name, such as host1.example.microsoft.com, indicates a branch in the domain
namespace tree.
See also: console tree; Domain Name System (DNS); label; resource; snap-in
naming context
See definition for: directory partition
native mode
The condition in which all domain controllers in the domain have been upgraded to
Windows 2000 and an administrator has enabled native mode operation (through Active
Directory Users and Computers).
See also: Active Directory Users and Computers
NetBIOS Extended User Interface (NetBEUI)
A network protocol native to Microsoft Networking. It is usually used in small, department-size
local area networks (LANs) of 1 to 200 clients. It can use Token Ring source routing as its only
method of routing. It is the Microsoft implementation of the NetBIOS standard.
See also: Compression Control Protocol (CCP); local area network (LAN); network basic
input/output system (NetBIOS); protocol
NetWare Core Protocol (NCP)
The file-sharing protocol that governs communications about resource (such as disk and printer),
bindery, and NDS operations between server and client computers on a Novell NetWare
network. Requests from client computers are transmitted by the IPX protocol. Servers respond
according to NCP guidelines.
See also: bindery; Internetwork Packet Exchange (IPX); Novell Directory Services (NDS)
network
A group of computers and other devices, such as printers and scanners, connected by a
communications link, enabling all the devices to interact with each other. Networks can be small
or large, permanently connected through wires or cables, or temporarily connected through
phone lines or wireless transmissions. The largest network is the Internet, which is a worldwide
group of networks.
See also: network adapter
network adapter
A device that connects your computer to a network. This device is sometimes called an adapter
card or network interface card.
network administrator
A person responsible for planning, configuring, and managing the day-to-day operation of the
network. Network administrator is also called a system administrator.
network basic input/output system (NetBIOS)
An application programming interface (API) that can be used by programs on a local area
network (LAN). NetBIOS provides programs with a uniform set of commands for requesting the
lower-level services required to manage names, conduct sessions, and send datagrams between
nodes on a network.
See also: application programming interface (API); basic input/output system (BIOS); local area
network (LAN); service
network card driver
A device driver that works directly with the network card, acting as an intermediary between the
card and the protocol driver. With AppleTalk network integration, the AppleTalk Protocol stack
on the server is implemented as a protocol driver and is bound to one or more network card
drivers.
See also: device driver
Network Connections
A component you can use to gain access to network resources and functionality, whether you are
physically at the network location or in a remote location. By using the Network Connections
folder you can create, configure, store, and monitor connections.
Network DDE service
A service that provides network transport and security for DDE conversations.
See also: dynamic data exchange (DDE); service
network media
The type of physical wiring and lower-layer protocols used for transmitting and receiving
packets; for example, Ethernet, FDDI, and Token Ring.
Network Name resource
The name of a device that exists on a network and is supported as a cluster resource by a
Resource DLL provided with Windows.
See also: Resource DLL
Network News Transfer Protocol (NNTP)
A member of the TCP/IP suite of protocols used to distribute network news messages to NNTP
servers and clients (newsreaders) on the Internet. NNTP is designed so that news articles are
stored on a server in a central database, thus enabling a user to select specific items to read.
See also: Transmission Control Protocol/Internet Protocol (TCP/IP)
network number
In the Macintosh environment, the routing address or range of addresses assigned to the physical
network that AppleTalk Phase 2 routers use to direct information to the appropriate network.
Network number is also called network range and cable range.
network partition
A state in which one or more of the nodes in a cluster cannot communicate with the other cluster
nodes.
network place
A folder on a Web server. You can view files and folders on Web servers just as you would view
files and folders on network servers. However, when you save a file to a network place, the file
is saved on a Web server, not on your computer's hard disk. You can create network places by
using the Add Network Place Wizard, which is located in My Network Places. Network places
are available only on Web servers that support Web Extender Client (WEC), FrontPage
extensions, and Distributed Authoring and Versioning (DAV) protocols.
non-Plug and Play
A device, such as a printer, modem, or game controller, that requires manual configuration of
hardware settings before it can be used. Non-Plug and Play devices are becoming increasingly
rare as manufacturers stop producing them in favor of Plug and Play devices. Non-Plug and Play
typically applies to older pieces of equipment.
See also: device; Plug and Play
nonauthoritative restore
A restore of a backup copy of a Windows domain controller in which the objects in the restored
directory are not treated as authoritative. The restored objects are updated with changes held in
other replicas of the restored domain.
See also: authoritative restore
noncontainer object
An object that cannot logically contain other objects. For example, a file is a noncontainer object.
See also: container object; object
nonhubbed mode
A mode in which the ATM ARP/MARS does not forward multicast and broadcast traffic for
multicast group clients. In this mode, the service returns a dynamic listing of ATM hosts
currently registered for the multicast group address to requesting clients. Clients then use this list
to initiate and establish their own point-to-multipoint virtual connections with each of the
members in the multicast list.
See also: hubbed mode; multicast address resolution service (MARS); multicast server (MCS)
nonpaged memory
Memory that cannot be paged to disk. Paging is the moving of infrequently used parts of a
program's working memory from RAM to another storage medium, usually the hard disk.
See also: paging file
nonpaged pool
Operating system memory that is never paged to disk. Paging is the moving of infrequently used
parts of a program's working memory from RAM to another storage medium, usually the hard
disk. In Task Manager, the amount of memory used by a process, in kilobytes.
See also: paging file
normal backup
A backup that copies all selected files and marks each file as having been backed up (in other
words, the archive attribute is cleared). With normal backups, you need only the most recent
copy of the backup file or tape to restore all of the files. You usually perform a normal backup
the first time you create a backup set.
See also: copy backup; daily backup; differential backup; incremental backup
notification area
The area on the taskbar to the right of the taskbar buttons. The notification area displays the time
and can also contain shortcuts that provide quick access to programs, such as Volume Control
and Power Options. Other shortcuts can appear temporarily, providing information about the
status of activities. For example, the printer shortcut icon appears after a document has been sent
to the printer and disappears when printing is complete.
notify list
A list maintained by the primary master for a zone of other DNS servers that should be notified
when zone changes occur. The notify list is made up of IP addresses for DNS servers configured
as secondary masters for the zone. When the listed servers are notified of a change to the zone,
they will initiate a zone transfer with another DNS server and update the zone.
See also: DNS Server; primary master; zone transfer; secondary master; zone
Novell Directory Services (NDS)
On networks running Novell NetWare 4.0, a distributed database that maintains information
about every resource on the network and provides access to these resources.
Nslookup
A command-line tool used to diagnose Domain Name System (DNS) infrastructure.
See also: Domain Name System (DNS)
NTDS-DSA object
An object that represents the configuration of the Active Directory service running on a specific
domain controller. For example, the NTDS-DSA object holds the setting that determines whether
or not the Active Directory service provides global catalog services. NTDS-DSA objects are
created and deleted in the course of running the Active Directory Installation Wizard
(dcpromo.exe).
An NTDS-DSA object is stored in the Configuration directory partition and is always a child of
the Server object representing the domain controller where this particular Active Directory
service is running. For example, if the distinguished name of an NTDS-DSA object is:
CN=NTDS Settings,CN=RESKIT1,CN=Servers,
CN=Washington,CN=Sites,CN=Configuration,DC=reskit,DC=com
then the distinguished name of the corresponding Server object is:
CN=RESKIT1,CN=Servers,CN=Washington,CN=Sites,
CN=Configuration,DC=reskit,DC=com
See also: Active Directory; domain controller; global catalog
NTFS file system
An advanced file system that provides performance, security, reliability, and advanced features
that are not found in any version of FAT. For example, NTFS guarantees volume consistency by
using standard transaction logging and recovery techniques. If a system fails, NTFS uses its log
file and checkpoint information to restore the consistency of the file system. In Windows 2000
and Windows XP, NTFS also provides advanced features such as file and folder permissions,
encryption, disk quotas, and compression.
See also: FAT32; file allocation table (FAT); file system
NTLM
A security package that provides authentication between clients and servers.
NTLM authentication protocol
A challenge/response authentication protocol. The NTLM authentication protocol was the
default for network authentication in Windows NT version 4.0 and earlier. The protocol
continues to be supported in Windows 2000 but no longer is the default.
null modem cable
Special cabling that eliminates the modem's need for asynchronous communications between
two computers over short distances. A null modem cable emulates modem communication.
See also: modem (modulator/demodulator)
NWLink
An implementation of the Internetwork Packet Exchange (IPX), Sequenced Packet Exchange
(SPX), and NetBIOS protocols used in Novell networks. NWLink is a standard network protocol
that supports routing and can support NetWare client-server applications, where NetWare-aware
Sockets-based applications communicate with IPX/SPX Sockets-based applications.
See also: Routing Information Protocol over IPX (RIPX); IPX/SPX; network basic input/output
system (NetBIOS)
O
object
An entity, such as a file, folder, shared folder, printer, or Active Directory object, described by a
distinct, named set of attributes. For example, the attributes of a File object include its name,
location, and size; the attributes of an Active Directory User object might include the user's first
name, last name, and e-mail address.
For OLE and ActiveX, an object can also be any piece of information that can be linked to, or
embedded into, another object.
See also: attribute; child object; OLE; parent object
offline
A state that marks a component in a cluster as unavailable. A node in an offline state is either
inactive or not running. Resources and groups also have an offline state.
See also: group; online; pending; resource
OLE
A way to transfer and share information between applications by pasting information created in
one application into a document created in another application, such as a spreadsheet or word
processing file.
See also: embedded object; linked object; package
on-disk catalog
Information stored on a local disk drive. The on-disk catalog contains a list of files and folders
that have been backed up in a backup set.
See also: backup set; on-media catalog
on-media catalog
Information stored on backup storage media. The on-media catalog contains a list of files and
folders that have been backed up in a backup set.
See also: backup set; on-disk catalog
one-way trust
A type of trust relationship in which only one of the two domains trusts the other domain. For
example, domain A trusts domain B and domain B does not trust domain A. All one-way trusts
are nontransitive.
See also: transitive trust; two-way trust
online
A state that marks a component in a cluster as available. When a node is online, it is an active
member of the cluster and can own and run groups as well as honor cluster database updates,
contribute votes to the quorum algorithm, and maintain heartbeats. Resources and groups also
have an online state.
See also: group; offline; pending; resource
Open Systems Interconnection (OSI) reference model
A networking model introduced by the International Organization for Standardization (ISO) to
promote multi-vendor interoperability. Open Systems Interconnection (OSI) is a seven-layered
conceptual model consisting of the application, presentation, session, transport, network, datalink, and physical layers.
See also: Transmission Control Protocol/Internet Protocol (TCP/IP)
OpenType fonts
Outline fonts that are rendered from line and curve commands, and can be scaled and rotated.
OpenType fonts are clear and readable in all sizes and on all output devices supported by
Windows. OpenType is an extension of TrueType font technology.
See also: font; TrueType fonts
operations master
A domain controller that has been assigned one or more special roles in an Active Directory
domain.
The domain controllers assigned these roles perform operations that are single-master (not
permitted to occur at different places on the network at the same time). Examples of these
operations include resource identifier allocation, schema modification, PDC election, and certain
infrastructure changes.
The domain controller that controls the particular operation owns the operations master role for
that operation. The ownership of these operations master roles can be transferred to other domain
controllers.
See also: Active Directory; domain controller; domain naming master; infrastructure master;
schema master
operator
In mathematics and in programming and computer applications, a symbol or other character
indicating an operation that acts on one or more elements. You can use the following four
operators in standard calculations:
/ divide
* multiply
- subtract
+ add
For Indexing Service, a word or character that specifies a relationship in a query.
organizational unit
An Active Directory container object used within domains. An organizational unit is a logical
container into which users, groups, computers, and other organizational units are placed. It can
contain objects only from its parent domain. An organizational unit is the smallest scope to
which a Group Policy object can be linked, or over which administrative authority can be
delegated.
See also: Active Directory; container object; Group Policy object; parent domain
orphan
A member of a mirrored volume or a RAID-5 volume that has failed due to a severe cause, such
as a loss of power or a complete hard-disk head failure. When this happens, the fault-tolerant
driver determines that it can no longer use the orphaned member and directs all new reads and
writes to the remaining members of the fault-tolerant volume.
See also: fault tolerance; mirrored volume; RAID-5 volume
orphan file
A file that is stored inside My Briefcase and not linked to any file outside My Briefcase. When
you update files, the orphan file is not synchronized with any other file.
OS/2
A protected-mode, virtual memory, multitasking operating system for personal computers based
on the Intel 80286, 80386, i486, and Pentium processors. OS/2 can run most MS-DOS-based
programs and can read all MS-DOS disks.
See also: MS-DOS-based program
owner
In a Windows environment, the person who controls how permissions are set on objects and can
grant permissions to others.
In the Macintosh environment, an owner is the user responsible for setting permissions for a
folder on a server. A Macintosh user who creates a folder on the server automatically becomes
the owner of the folder, and can then transfer ownership to someone else. Each Macintoshaccessible volume on the server also has an owner.
owner category
In the Macintosh environment, the user category to which you assign permissions for the owner
of a folder or a Macintosh volume.
P
package
An icon that represents embedded or linked information. That information may consist of a
complete file, such as a Paint bitmap, or part of a file, such as a spreadsheet cell. When you
choose the package, the application used to create the object either plays the object (for example,
a sound file) or opens and displays the object. If you change the original information, linked
information is automatically updated. However, you must manually update embedded
information.
See also: embedded object; linked object; OLE
packet
An Open Systems Interconnection (OSI) network layer transmission unit that consists of binary
information representing both data and a header containing an identification number, source and
destination addresses, and error-control data.
See also: Internet Protocol (IP); packet header; packet switching; switching hub
packet header
In network protocol communications, a specially reserved field of a defined bit length that is
attached to the front of a packet for carry and transfer of control information. When the packet
arrives at its destination, the field is then detached and discarded as the packet is processed and
disassembled in a corresponding reverse order for each protocol layer.
See also: packet
packet switching
A technology for breaking data into packets and then sending the packets over a network. Each
packet has a header containing its source and destination, a sequence number to reassemble the
information, a block of data content, and an error-checking code. The data packets may take
different routes to their destination, where the original information is reassembled after the
packets arrive. The international standard for packet switching networks is X.25.
See also: packet
PAD (packet assembler/disassembler)
A device that connects a non-X.25 device such as a modem to an X.25 packet switching
network.
page
In virtual memory systems, a unit of data storage that is brought into random access memory
(RAM), typically from a hard drive, when a requested item of data is not already in RAM.
See also: virtual memory
page fault
The interrupt that occurs when software attempts to read from or write to a virtual memory
location that is marked not present.
In Task Manager, page fault is the number of times data has to be retrieved from disk for a
process because it was not found in memory. The page fault value accumulates from the time the
process started.
See also: Page Faults Delta; Task Manager; virtual memory
Page Faults Delta
In Task Manager, the change in the number of page faults since the last update.
See also: Task Manager
page-description language (PDL)
A computer language that describes the arrangement of text and graphics on a printed page.
See also: Printer Control Language (PCL); Printer Job Language (PJL); PostScript; PostScript
fonts
paged pool
The system-allocated virtual memory that has been charged to a process and that can be paged.
Paging is the moving of infrequently-used parts of a program's working memory from RAM to
another storage medium, usually the hard disk.
In Task Manager, the amount of system-allocated virtual memory, in kilobytes, used by a
process.
See also: registry size limit (RSL); virtual memory
paging file
A hidden file on the hard disk that Windows uses to hold parts of programs and data files that do
not fit in memory. The paging file and physical memory, or RAM, comprise virtual memory.
Windows moves data from the paging file to memory as needed and moves data from memory to
the paging file to make room for new data. Paging file is also called a swap file.
See also: Peak Memory Usage; registry size limit (RSL); virtual memory
Panose
A font-classification method that measures values, such as serifs, weight, and stroke variations,
for a TrueType font. These values are represented by a Panose number. The Panose number is
then used to associate the font with other fonts of similar appearance but different names. The
closer the Panose number of two fonts, the more similar they are.
paper source
The location (such as Upper Paper Tray or Envelope Feeder) of the paper at the printer.
parallel port
The input/output connector for a parallel interface device. Printers are generally plugged into a
parallel port.
See also: serial port
parent domain
For DNS and Active Directory, domains that are located in the namespace tree directly above
other derivative domain names (child domains). For example, microsoft.com would be the parent
domain for example.microsoft.com, a child domain.
See also: domain; Domain Name System (DNS)
parent object
The object in which another object resides. A parent object implies relation. For example, a
folder is a parent object in which a file, or child object, resides. An object can be both a parent
and a child object. For example, a subfolder that contains files is both the child of the parent
folder and the parent folder of the files.
See also: child object; object
parity
A calculated value that is used to reconstruct data after a failure. RAID-5 volumes stripe data and
parity intermittently across a set of disks. When a disk fails, some server operating systems use
the parity information together with the data on good disks to recreate the data on the failed disk.
See also: fault tolerance; RAID-5 volume
parity bit
In asynchronous communications, an extra bit used in checking for errors in groups of data bits
transferred within or between computer systems. In modem-to-modem communications, a parity
bit is often used to check the accuracy with which each character is transmitted.
See also: parity
partition
A portion of a physical disk that functions as though it were a physically separate disk. After you
create a partition, you must format it and assign it a drive letter before you can store data on it.
On basic disks, partitions are known as basic volumes, which include primary partitions and
logical drives. On dynamic disks, partitions are known as dynamic volumes, which include
simple, striped, spanned, mirrored, and RAID-5 volumes.
See also: basic disk; basic volume; drive letter; dynamic volume; extended partition; primary
partition; system partition
partition boot sector
A portion of a hard disk partition that contains information about the disk's file system and a
short machine language program that loads the Windows operating system.
See also: partition
password
A security measure used to restrict logon names to user accounts and access to computer systems
and resources. A password is a string of characters that must be provided before a logon name or
an access is authorized. A password can be made up of letters, numbers, and symbols, and it is
case sensitive.
See also: user account
Password Authentication Protocol (PAP)
A simple, plaintext authentication scheme for authenticating PPP connections. The user name
and password are requested by the remote access server and returned by the remote access client
in plaintext.
See also: Point-to-Point Protocol (PPP); remote access; password
paused
A state that applies to a node in a cluster. The node is a fully active member in the cluster but
cannot accept new resource groups (for example, a resource group cannot fail over or fail back to
a paused node). You can administer and maintain a paused node.
See also: cluster; failback; failover; offline
PC Card
A removable device, approximately the size of a credit card, that can be plugged into a Personal
Computer Memory Card International Association (PCMCIA) slot in a portable computer.
PCMCIA devices can include modems, network cards, and hard disk drives.
See also: modem (modulator/demodulator)
PCI expansion slot
A connection socket for a peripheral designed for the Peripheral Component Interconnect (PCI)
local bus on a computer motherboard.
PDC emulator master
The domain controller assigned to act as a Windows NT 4.0 primary domain controller (PDC) to
service network clients that do not have Active Directory client software installed, and to
replicate directory changes to any Windows NT backup domain controllers (BDCs) in the
domain.
The PDC emulator master receives preferential replication of password changes performed by
other domain controllers in the domain and handles any password authentication requests that
fail at the local domain controller. At any time, there can be only one PDC emulator master in a
particular domain.
See also: Active Directory; primary domain controller (PDC); replication; backup domain
controller (BDC); domain controller; multimaster replication; operations master
Peak Memory Usage
In Task Manager, the peak amount of physical memory resident in a process since it started.
See also: Task Manager
pending
A state that refers to a resource in a cluster when the resource is in the process of being brought
online or taken offline.
See also: offline; online; resource
Per Seat Licensing
A licensing mode that requires a separate Client Access License for each client computer,
regardless of whether all the clients access the server at the same time.
See also: client; Per Server Licensing
Per Server Licensing
A licensing mode that requires a separate Client Access License for each concurrent connection
to the server, regardless of whether there are other client computers on the network that do not
happen to connect concurrently.
See also: client; Per Seat Licensing
performance alert
A feature that detects when a predefined counter value rises above or falls below the configured
threshold and notifies a user by means of the Messenger service.
See also: Messenger service
performance counter
In System Monitor, a data item that is associated with a performance object. For each counter
selected, System Monitor presents a value corresponding to a particular aspect of the
performance that is defined for the performance object.
See also: performance object
performance object
In System Monitor, a logical collection of counters that is associated with a resource or service
that can be monitored.
See also: performance counter
performance object instance
In System Monitor, a term used to distinguish between multiple performance objects of the same
type on a computer.
See also: performance object
peripheral
A device, such as a disk drive, printer, modem, or joystick, that is connected to a computer and is
controlled by the computer's microprocessor.
See also: device
peripheral component interconnect (PCI)
A specification introduced by Intel Corporation that defines a local bus system that allows up to
10 PCI-compliant expansion cards to be installed in the computer.
permission
A rule associated with an object to regulate which users can gain access to the object and in what
manner. Permissions are granted or denied by the object's owner.
See also: object; printer permissions; security descriptor; shared folder permissions; special
access permissions
Physical Disk resource
A disk on a cluster storage device. Physical disks are supported as cluster resources by a
Resource DLL.
See also: Resource DLL
ping
A utility that verifies connections to one or more remote hosts. The ping command uses the
ICMP echo request and echo reply packets to determine whether a particular IP system on a
network is functional. Ping is useful for diagnosing IP network or router failures.
See also: Internet Control Message Protocol (ICMP)
pixel
Short for picture element, one spot in a rectilinear grid of thousands of such spots that form an
image produced on the screen by a computer or on paper by a printer. A pixel is the smallest
element that display or print hardware and software can manipulate to create letters, numbers, or
graphics. A pixel is also called a pel.
See also: screen resolution
PKCS #10
The Certification Request Syntax Standard, developed and maintained by RSA Data Security,
Inc. A syntax for certificate requests.
See also: certificate; Public Key Cryptography Standards (PKCS)
PKCS #12
The Personal Information Exchange Syntax Standard, developed and maintained by RSA Data
Security, Inc. This syntax standard specifies a portable format for storing or transporting a user's
private keys, certificates, and miscellaneous secrets.
See also: certificate; Public Key Cryptography Standards (PKCS)
PKCS #7
The Cryptographic Message Syntax Standard. It is a general syntax, developed and maintained
by RSA Data Security, Inc., for data to which cryptography may be applied, such as digital
signatures and encryption. It also provides a syntax for disseminating certificates or certificate
revocation lists.
See also: certificate; certificate revocation list (CRL); encryption; Public Key Cryptography
Standards (PKCS)
plaintext
Data that is not encrypted. Sometimes also called cleartext.
plotter
Any device used to draw charts, diagrams, and other line-based graphics.
plotter font
A font created by a series of dots connected by lines. Plotter fonts can be scaled to any size and
are most often printed on plotters. Some dot-matrix printers also support plotter fonts.
See also: font
Plug and Play
A set of specifications developed by Intel that allows a computer to automatically detect and
configure a device and install the appropriate device drivers.
See also: universal serial bus (USB); non-Plug and Play
point of termination station (POTS)
Basic dial telephone connections to the public switched network, without any added features or
functions. Plain old telephone service and point of termination station is also called POTS.
Point-to-Point Protocol (PPP)
An industry standard suite of protocols for the use of point-to-point links to transport
multiprotocol datagrams. PPP is documented in RFC 1661.
See also: Compression Control Protocol (CCP); remote access; Transmission Control
Protocol/Internet Protocol (TCP/IP); voluntary tunnel
Point-to-Point Protocol over Ethernet (PPPoE)
A specification for connecting users on an Ethernet network to the Internet through a broadband
connection, such as a single DSL line, wireless device, or cable modem. Using PPPoE and a
broadband modem, LAN users can gain individual authenticated access to high-speed data
networks. By combining Ethernet and Point-to-Point Protocol (PPP), PPPoE provides an
efficient way to create a separate connection for each user to a remote server.
Point-to-Point Tunneling Protocol (PPTP)
Networking technology that supports multiprotocol virtual private networks (VPNs), enabling
remote users to access corporate networks securely across the Internet or other networks by
dialing into an Internet service provider (ISP) or by connecting directly to the Internet. The
Point-to-Point Tunneling Protocol (PPTP) tunnels, or encapsulates, IP, IPX, or NetBEUI traffic
inside of IP packets. This means that users can remotely run applications that are dependent upon
particular network protocols.
See also: Internet Protocol (IP); Internetwork Packet Exchange (IPX); NetBIOS Extended User
Interface (NetBEUI); packet; tunnel; virtual private network (VPN)
pointer (PTR) resource record
A resource record used in a reverse lookup zone created within the in-addr.arpa domain to
designate a reverse mapping of a host IP address to a host DNS domain name.
See also: in-addr.arpa domain; reverse lookup; resource record (RR)
policy
The mechanism by which desktop settings are configured automatically, as defined by the
administrator. Depending on context, this can refer to Group Policy, Windows NT 4.0 System
Policy, or a specific setting in a Group Policy object.
See also: Group Policy; Group Policy object; System Policy
polling intervals
The frequency the Resource Monitor checks that the resource is available and operating. There
are two levels of polling: Looks Alive and Is Alive. The server cluster requests a more thorough
check of the resource's state at each Is Alive interval than it does at each Looks Alive interval;
therefore, the Is Alive polling interval is typically longer than the Looks Alive polling interval.
You can specify the two polling intervals and a time-out value for resources.
See also: resource
POP3 (Post Office Protocol 3)
A popular protocol used for receiving e-mail messages. This protocol is often used by ISPs.
POP3 servers allow access to a single Inbox in contrast to IMAP servers, which provide access
to multiple server-side folders.
port
A connection point on your computer where you can connect devices that pass data into and out
of a computer. For example, a printer is typically connected to a parallel port (also called an LPT
port), and a modem is typically connected to a serial port (also called a COM port).
See also: serial port; universal serial bus (USB)
port rule
For Network Load Balancing, a set of configuration parameters that determine the filtering mode
to be applied to a range of ports.
See also: filtering mode; port
Portable Operating System Interface for UNIX (POSIX)
An Institute of Electrical and Electronics Engineers (IEEE) standard that defines a set of
operating-system services. Programs that adhere to the POSIX standard can be easily ported
from one system to another. POSIX was based on UNIX system services, but it was created in a
way that allows it to be implemented by other operating systems.
See also: service
possible owners
A list that specifies which nodes in the cluster are capable of running that resource. By default,
both nodes appear as possible owners, so the resource can run on either node. In most cases, it is
appropriate to use this default setting. If you want the resource to be able to fail over, both nodes
must be designated as possible owners.
See also: failover; resource
PostScript
A page-description language (PDL), developed by Adobe Systems for printing on laser printers.
PostScript offers flexible font capability and high-quality graphics. It is the standard for desktop
publishing because it is supported by imagesetters, the high-resolution printers used by printing
services for commercial typesetting.
See also: Printer Control Language (PCL); page-description language (PDL); Printer Job
Language (PJL); PostScript fonts; PostScript printer; service; Type 1 fonts
PostScript fonts
Fonts that are defined in terms of the PostScript page-description language (PDL) rules and are
intended to be printed on a PostScript-compatible printer. When a document displayed in a
screen font is sent to a PostScript printer, the printer uses the PostScript version if the font exists.
If the font doesn't exist but a version is installed on the computer, that font is downloaded to the
printer. If there is no PostScript font installed in either the printer or the computer, the bitmapped (raster) font is translated into PostScript and the printer produces text using the bitmapped font. PostScript fonts are distinguished from bit-mapped fonts by their smoothness,
detail, and faithfulness to standards of quality established in the typographic industry.
See also: downloadable fonts; font; page-description language (PDL); PostScript; raster fonts
PostScript printer
A printer that uses the PostScript page-description language (PDL) to create text and graphics on
the output medium, such as paper or overhead transparency. Examples of PostScript printers
include the Apple LaserWriter, the NEC LC-890, and the QMS PS-810.
See also: page-description language (PDL); PostScript; virtual printer memory
power conditioning
A feature of an uninterruptible power supply (UPS) that removes spikes, surges, sags, and noise
from the power supply.
See also: uninterruptible power supply (UPS)
power scheme
A group of preset power-management options. For example, you can set elapsed times for
putting your computer on standby and for turning off your monitor and hard disk. You save these
settings as a named power scheme.
PPP (Point-to-Point Protocol)
See definition for: Point-to-Point Protocol (PPP)
predefined key
A key that represents one of the main divisions of the registry. Each predefined key is displayed
in a separate Registry Editor window, with the key's name appearing in the window's title bar.
For example, HKEY_CLASSES_ROOT is a predefined key.
See also: registry; hive; key
preferred owner
The node on which you prefer each group to run. For example, the static load balancing model
performs best when groups are appropriately balanced between two nodes. When a node fails,
the remaining node takes over the groups from the failed node, but performance is diminished.
By setting those groups to fail back to their preferred server (the failed node), you automatically
restore maximum performance when failback occurs. A group does not fail back if a preferred
owner is not selected.
You will not always choose a preferred owner because it may not matter where the group
resides; all that matters is that the group is still running on one of the two nodes. Or, the nodes
may be equally capable of handling the load required to use some or all of the resources.
See also: group; resource; failback
preferred server
The NetWare server that you connect to by default when you log on to your computer. The
preferred server validates your user credentials and is queried when you request information
about resources available on the NetWare network.
preset-to callback
A form of security in which a remote access server verifies users by calling them back at
numbers supplied by the network administrator at the time user privileges are granted. Only a
network administrator can change a preset callback number. This ensures that no one can borrow
a user's password and connect to the server from a location other than the user's normal one.
See also: callback number; remote access server; connected, user authenticated
Primary disk
The hard disk drive that contains the system and boot partitions used to start Windows.
See also: boot partition; system partition
primary domain controller (PDC)
In a Windows NT Server 4.0 or earlier domain, the computer running Windows NT Server that
authenticates domain logons and maintains the directory database for a domain. The PDC tracks
changes made to accounts of all computers on a domain. It is the only computer to receive these
changes directly. A domain has only one PDC. In this version of Windows, one of the domain
controllers in each domain is identified as the PDC for compatibility with Windows NT 4.0 and
earlier versions of Windows NT.
See also: backup domain controller (BDC)
primary master
An authoritative DNS server for a zone that can be used as a point of update for the zone. Only
primary masters have the ability to be updated directly to process zone updates, which include
adding, removing, or modifying resource records that are stored as zone data. Primary masters
are also used as the first sources for replicating the zone to other DNS servers.
See also: DNS Server; replication; resource record (RR); secondary master; zone
primary mouse button
The button you use most often for clicking and double-clicking. The primary mouse button is the
left button on most mice and trackball devices, and the lower button on some trackball devices,
but you can switch the function of the buttons by using the Mouse Properties dialog box in
Control Panel.
primary partition
A type of partition that you can create on basic disks. A primary partition is a portion of a
physical disk that functions as though it were a physically separate disk. On basic master boot
record (MBR) disks, you can create up to four primary partitions on a basic disk, or three
primary partitions and an extended partition with multiple logical drives. On basic GPT disks,
you can create up to 128 primary partitions. Primary partitions are also known as volumes.
See also: basic disk; extended partition; GUID partition table (GPT); logical drive; master boot
record (MBR); partition; volume
print job
The source code that contains both the data to be printed and the commands for print. Print jobs
are classified into data types based on what modifications, if any, the spooler must make to the
job for it to print correctly.
See also: print spooler; Printer window; printing pool
print processor
The component that, working in conjunction with the printer driver, receives and alters print
jobs, as necessary, according to their data type to ensure that the jobs print correctly.
See also: print job; printer driver
print queue
A print queue is a list of documents waiting to be printed on the printer. In the print queue, you
can see information such as the size of the document, who sent the document, and status
information for printing.
print server
A computer that is dedicated to managing the printers on a network. The print server can be any
computer on the network.
print spooler
Software that accepts a document sent to a printer and then stores it on disk or in memory until
the printer is ready for it. This collection of dynamic-link libraries (DLLs) receives, processes,
schedules, and distributes documents for printing. The term spooler is an acronym created from
simultaneous print operations on line.
See also: dynamic-link library (DLL); printer; spooling
Print Spooler resource
Printer queues providing access to a network printer connected to the network by an IP address
rather than by an individual name. Print spoolers are supported as cluster resources by a
Resource DLL.
See also: print spooler; Resource DLL; IP address
printer
A device that puts text or images on paper or other print media. Examples are laser printers or
dot-matrix printers.
See also: logical printer; print spooler; printing pool
Printer Control Language (PCL)
The page-description language (PDL) developed by Hewlett Packard for their laser and inkjet
printers. Because of the widespread use of laser printers, this command language has become a
standard in many printers.
See also: Printer Job Language (PJL); PostScript; page-description language (PDL)
printer driver
A program designed to allow other programs to work with a particular printer without
concerning themselves with the specifics of the printer's hardware and internal language. By
using printer drivers that handle the subtleties of each printer, programs can communicate
properly with a variety of printers.
See also: device driver
printer fonts
Fonts residing in or intended for a printer. A printer font, usually located in the printer's readonly memory (ROM), can be internal, downloaded, or on a font cartridge.
See also: device fonts; downloadable fonts; font; font cartridge
Printer Job Language (PJL)
The printer command language developed by Hewlett Packard that provides printer control at the
print-job level. Using PJL commands, you can change default printer settings such as number of
copies to print. PJL commands also permit switching printer languages between print jobs
without action by the user. If bi-directional communication is supported, a PJL-compatible
printer can send information such as printer model and job status to the print server.
See also: Printer Control Language (PCL); page-description language (PDL); PostScript
printer permissions
Permissions that specify the type of access that a user or group has to a printer. The printer
permissions are Print, Manage Printers, and Manage Documents.
See also: permission
Printer window
Also called the queue view, the Printer window shows information about any pending print jobs
for the printer. For each printer you have installed or to which you are connected, you can such
information as see how many documents are waiting to be printed, who owns them, and how
large they are.
See also: print job
Printers and Faxes
The folder in Control Panel that contains the Add Printer Wizard and icons for all the printers
installed on your computer.
See also: printer
printing pool
Two or more identical printers that are connected to one print server and act as a single printer.
In this case, when you print a document, the print job will be sent to the first available printer in
the pool.
See also: print job; printer
priority
For Process Control, the relative ranking of a process or process group with respect to the use of
CPU and system resources. You can configure this in the Process Control snap-in.
private branch exchange (PBX)
An automatic telephone switching system that enables users within an organization to place calls
to each other without going through the public telephone network. Users can also place calls to
outside numbers.
private key
The secret half of a cryptographic key pair that is used with a public key algorithm. Private keys
are typically used to decrypt a symmetric session key, digitally sign data, or decrypt data that has
been encrypted with the corresponding public key.
See also: public key; public key encryption
private network
A cluster network that supports only node-to-node communication.
See also: cluster
private queue
For Message Queuing, a queue that is not published in Active Directory and can be accessed
only by applications that have access to the full format name of the queue.
See also: Active Directory; Message Queuing; public queue; system queue
privilege
A user's right to perform a specific task, usually one that affects an entire computer system rather
than a particular object. Privileges are assigned by administrators to individual users or groups of
users as part of the security settings for the computer.
Pro
Windows XP Professional
process
The virtual address space and the control information necessary for the execution of a program.
See also: socket
process identifier (PID)
A numerical identifier that uniquely distinguishes a process while it runs. Use Task Manager to
view PIDs.
See also: Task Manager; process
program
A complete, self-contained set of computer instructions that you use to perform a specific task,
such as word processing, accounting, or data management. Program is also called application.
program information file (PIF)
A file that provides information to Windows about how best to run MS-DOS-based programs.
When you start an MS-DOS-based program, Windows looks for a PIF to use with it. PIFs
contain such items as the name of the file, a start-up directory, and multitasking options.
See also: MS-DOS-based program
property
A characteristic or parameter of a class of objects or devices. For example, properties of
Microsoft Word files include Size, Created, and Characters.
See also: property cache; property value; tag
property cache
For Indexing Service, a file that stores values for document properties.
See also: document; property
property value
A specific characteristic or parameter that defines a property. For example, property values of a
specific Microsoft Word document could include Size = 10,000 bytes, Created = Jan 2, 1999,
and Characters = 5,250.
See also: property
Protective MBR
The first sector of a GUID partition table (GPT) disk that is structured like the first sector of a
master boot record (MBR) disk to prevent x86-based disk utilities from destroying GPT
partitions. The Protective MBR contains one partition that reserves the entire space used on the
disk by GPT partitions.
See also: Extensible Firmware Interface (EFI); GUID partition table (GPT); master boot record
(MBR); x86
protocol
A set of rules and conventions for sending information over a network. These rules govern the
content, format, timing, sequencing, and error control of messages exchanged among network
devices.
See also: static routes; Transmission Control Protocol/Internet Protocol (TCP/IP)
public key
The nonsecret half of a cryptographic key pair that is used with a public key algorithm. Public
keys are typically used when encrypting a session key, verifying a digital signature, or
encrypting data that can be decrypted with the corresponding private key.
See also: Public Key Cryptography Standards (PKCS); private key; public key encryption;
recovery agent; key
public key cryptography
A method of cryptography in which two different keys are used: a public key for encrypting data
and a private key for decrypting data. Public key cryptography is also called asymmetric
cryptography.
See also: cryptography; Public Key Cryptography Standards (PKCS); private key; public key
Public Key Cryptography Standards (PKCS)
A family of standards for public key cryptography that includes RSA encryption, Diffie-Hellman
key agreement, password-based encryption, extended-syntax, cryptographic message syntax,
private key information syntax, and certificate request syntax, as well as selected attributes.
Developed, owned, and maintained by RSA Data Security, Inc.
See also: certificate; public key cryptography
public key encryption
A method of encryption that uses two encryption keys that are mathematically related. One key
is called the private key and is kept confidential. The other is called the public key and is freely
given out to all potential correspondents. In a typical scenario, a sender uses the receiver's public
key to encrypt a message. Only the receiver has the related private key to decrypt the message.
The complexity of the relationship between the public key and the private key means that,
provided the keys are long enough, it is computationally infeasible to determine one from the
other. Public key encryption is also called asymmetric encryption.
See also: encryption; private key; public key; symmetric encryption
public key infrastructure (PKI)
The term generally used to describe the laws, policies, standards, and software that regulate or
manipulate certificates and public and private keys. In practice, it is a system of digital
certificates, certification authorities, and other registration authorities that verify and authenticate
the validity of each party involved in an electronic transaction. Standards for PKI are still
evolving, even though they are being widely implemented as a necessary element of electronic
commerce.
See also: certificate; certification authority (CA); public key
public network
A cluster network that supports client-to-cluster communication (either with or without
supporting node-to-node communication).
See also: cluster
public queue
For Message Queuing, a queue that is published in Active Directory and replicated throughout a
Windows enterprise. Public queues can, therefore, be located by any computer running Message
Queuing within the enterprise.
See also: Active Directory; Message Queuing; private queue; queue
Public Switched Telephone Network (PSTN)
Standard analog telephone lines, available worldwide.
puff and sip device
An assistive computer technology for people with mobility impairments. A puff and sip device is
a head-mounted alternative to using the mouse. The device allows a user to move the mouse
pointer without using his or her hands by puffing air into a tube.
pulse dialing
A form of dialing that enters a phone number by means of pulse frequencies. The user typically
hears a series of clicking sounds when dialing. Old-fashioned rotary dial phones use pulse
dialing.
See also: touch-tone dialing
Q
query
For Indexing Service, a structured statement that specifies the documents you want to find. The
simplest query is a single word.
See also: tag; vector; wildcard character
queue
A list of programs or tasks waiting for execution. In Windows printing terminology, a queue
refers to a group of documents waiting to be printed. In NetWare and OS/2 environments, queues
are the primary software interface between the application and print device; users submit
documents to a queue. With Windows, however, the printer is that interface; the document is sent
to a printer, not a queue.
See also: transactional message; printer
queue quota
For Message Queuing, the storage size limit for messages in public queues. When a queue quota
is reached, Message Queuing can no longer send messages to that queue until one or more
messages are removed from the queue. Message Queuing enforces the computer quota before it
enforces the queue quota on a computer.
See also: computer quota; Message Queuing; queue
queue type
For Message Queuing, a globally unique identifier (GUID) specified by the application that
created the queue.
See also: Message Queuing; queue
Quick Launch
A customizable toolbar that lets you display the Windows desktop or start a program (for
example, Internet Explorer) with a single click. You can add buttons to start your favorite
programs from the Quick Launch location on the taskbar.
quiet answer
A telephone-answering protocol in which incoming calls are answered with silence instead of a
tone signal. Some telephone-switching systems use quiet answering. These switching systems
expect the caller to provide another phone number, code, or extension after the quiet answer.
quorum disk
The cluster disk on which configuration data is maintained in the quorum log, cluster database
checkpoint, and resource checkpoints. The quorum disk is managed by the Quorum resource,
which is usually a special kind of Physical Disk resource.
quorum log
The log where the quorum resource stores data. This data is maintained by the clustering
software. Also known as the recovery log or change log.
See also: quorum resource; server cluster
quorum resource
The quorum-capable resource selected to maintain the configuration data necessary for recovery
of the cluster. This data contains details of all of the changes that have been applied to the cluster
database. The quorum resource is generally accessible to other cluster resources so that any
cluster node has access to the most recent database changes. By default there is only one quorum
resource per cluster.
See also: server cluster
quota limit
The amount of disk space available to a user.
See also: warning level
R
RAID-5 volume
A fault-tolerant volume with data and parity striped intermittently across three or more physical
disks. Parity is a calculated value that is used to reconstruct data after a failure. If a portion of a
physical disk fails, Windows recreates the data that was on the failed portion from the remaining
data and parity. You can create RAID-5 volumes only on dynamic disks, and you cannot mirror
or extend RAID-5 volumes.
See also: dynamic disk; dynamic volume; fault tolerance; parity; volume
RAM
See definition for: random access memory (RAM)
random access memory (RAM)
Memory that can be read from or written to by a computer or other devices. Information stored in
RAM is lost when the computer is turned off.
See also: virtual memory
raster fonts
Fonts that are stored as bitmaps. Raster fonts are designed with a specific size and resolution for
a specific printer and cannot be scaled or rotated. If a printer does not support raster fonts, it will
not print them. The five raster fonts are Courier, MS Sans Serif, MS Serif, Small, and Symbol.
Raster fonts are also called bit-mapped fonts.
See also: font; printer
raw socket
A socket that provides direct access to lower-level network protocols.
See also: socket
read-only memory (ROM)
A semiconductor circuit that contains information that cannot be modified.
realm
A set of security principles, in a non-Windows networked environment, that are subject to
Kerberos authentication.
See also: Kerberos?V5 authentication protocol
realm name
An identifying prefix or suffix appended to a user name to enable appropriate routing and
authentication during a remote logon process.
See also: authentication; routing; user name
rebinding state
A state used by DHCP clients to extend and renew their address lease when the current lease is
close to expiring. In this state, the client broadcasts to the network to locate any DHCP server
that can either renew or replace its currently leased configuration. The rebinding state begins
when 87.5 percent of the client's lease time has elapsed.
See also: Dynamic Host Configuration Protocol (DHCP); lease
recoverable message
For Message Queuing, a message that can be recovered no matter which computer fails, but that
uses more resources and is slower than an express message.
See also: express message; Message Queuing
recovery agent
A person who is issued a public key certificate for the purpose of recovering user data that is
encrypted with Encrypting File System (EFS).
See also: certificate; Encrypting File System (EFS); public key
Recovery Console
A command-line interface that provides a limited set of administrative commands that are useful
for repairing a computer.
See also: NTFS file system
recovery policy
A type of public key Group Policy object used by Encrypting File System (EFS) that provides
for one or more user accounts to be designated as recovery agents.
See also: Encrypting File System (EFS); Group Policy object; public key; recovery agent; user
account
Recycle Bin
The place in which Windows stores deleted files. You can retrieve files you deleted in error, or
you can empty the Recycle Bin to create more disk space.
Redundant Array of Independent Disks (RAID)
A method used to standardize and categorize fault-tolerant disk systems. RAID levels provide
various mixes of performance, reliability, and cost. Some servers provide three of the RAID
levels: Level 0 (striping), Level 1 (mirroring), and Level 5 (RAID-5).
See also: RAID-5 volume; fault tolerance; mirrored volume
refresh
To update displayed information with current data.
See also: refresh rate
refresh interval
An interval of time used by secondary masters of a zone to determine how often to check if their
zone data needs to be refreshed. When the refresh interval expires, the secondary master checks
with its source for the zone to see if its zone data is still current or if it needs to be updated using
a zone transfer. This interval is set in the SOA (start-of-authority) resource record for each zone.
See also: secondary master; start-of-authority (SOA) resource record; zone; zone transfer
refresh rate
The frequency with which the video screen is retraced to prevent the image from flickering. The
entire image area of most monitors is refreshed approximately 60 times per second.
See also: refresh
region
Contiguous chunks of storage on a disk.
registered file type
File types that are tracked by the system registry and are recognized by the programs you have
installed on your computer.
See also: file type
registry
A database repository for information about a computer's configuration. The registry contains
information that Windows continually references during operation, such as:
ï‚·
ï‚·
ï‚·
ï‚·
ï‚·
Profiles for each user.
The programs installed on the computer and the types of documents each can
create.
Property settings for folders and program icons.
What hardware exists on the system.
Which ports are being used.
The registry is organized hierarchically as a tree and is made up of keys and their subkeys, hives,
and value entries.
See also: hive; key; registry size limit (RSL); subtree; value entry
registry boot
The default boot option used by most Windows DNS servers. When registry boot is used, DNS is
started and initialized using DNS parameters and their values as they are stored in the Windows
registry. You can use a Berkeley Internet Name Domain (BIND) boot file as an alternative to this
method of boot configuration for DNS.
See also: BIND boot file; DNS Server; Domain Name System (DNS)
registry size limit (RSL)
A universal maximum for registry space that prevents an application from filling the paged pool
with registry data. The total amount of space that can be consumed by registry data (hives) is
restricted by the registry size limit.
See also: paged pool; registry; hive
relative distinguished name
The part of an object's distinguished name that is an attribute of the object itself. For most
objects this is the Common Name attribute. For security principals, the default common name is
the security principal name, also referred to as the SAM account name.
For the distinguished name
CN=MyName,CN=Users,DC=Microsoft,DC=Com
the relative distinguished name of the MyName user object is CN=MyName. The relative
distinguished name of the parent object is CN=Users.
See also: object; distinguished name
relative ID (RID)
The part of a security ID (SID) that uniquely identifies an account or group within a domain.
See also: domain; forest; group; security ID (SID)
relative ID master
The domain controller assigned to allocate sequences of relative IDs to each domain controller in
its domain. Whenever a domain controller creates a security principal (user, group, or computer
object), the domain controller assigns the object a unique security ID. The security ID consists of
a domain security ID that is the same for all security IDs created in a particular domain, and a
relative ID that is unique for each security ID created in the domain. At any time, there can be
only one relative ID master in a particular domain.
See also: domain controller; relative ID (RID); security ID (SID); security principal
relative name
The partial DNS domain name configured in individual resource records to locate and qualify the
record within a zone. The relative name is joined to the front of the parent domain (domain of
origin) for each resource record to form a fully qualified domain name (FQDN) within the zone.
In DNS Manager, the relative name will correspond to fields that use record-specific name
properties, such as the Host computer name field used in an address (A) resource record.
See also: A (address) resource record; Domain Name System (DNS); fully qualified domain
name (FQDN); resource record (RR); zone
remote access
Part of the integrated Routing and Remote Access service that provides remote networking for
telecommuters, mobile workers, and system administrators who monitor and manage servers at
multiple branch offices. Users with a computer running Windows and Network Connections can
dial in to remotely access their networks for services such as file and printer sharing, electronic
mail, scheduling, and SQL database access.
See also: remote access server; response; Serial Line Internet Protocol (SLIP); service
remote access server
A Windows-based computer running the Routing and Remote Access service and configured to
provide remote access.
See also: set-by-caller callback; remote access
remote administration
The management of one computer by an administrator working at another computer connected to
the first computer across a network.
Remote Authentication Dial-In User Service (RADIUS)
A security authentication protocol based on clients and servers and widely used by Internet
service providers (ISPs) on remote servers in non-Windows-brand operating systems. RADIUS
is the most popular means of authenticating and authorizing dial-up and tunneled network users
today.
See also: authentication; tunnel
remote computer
A computer that you can access only by using a communications line or a communications
device, such as a network card or a modem.
Remote Installation Services
Software services that allow an administrator to set up new client computers remotely, without
having to visit each client. The target clients must support remote booting.
See also: Single Instance Store (SIS)
remote procedure call (RPC)
A message-passing facility that allows a distributed application to call services that are available
on various computers on a network. Used during remote administration of computers.
See also: service
Remote Storage
A data management service used to migrate infrequently accessed files from local storage to
remote storage. Migrated files are recalled automatically and transparently upon user request
when the file is opened.
Removable Storage
A service used for managing removable media (such as tapes and discs) and storage devices
(libraries). Removable Storage allows applications to access and share the same media resources.
See also: library; service
rendering intent
In color management, the approach used to map the colors specified in an image file to the color
gamut of your monitor or printer. The color gamut is the range of color that a device can
produce.
See also: color gamut
replica
A folder within a replica set.
See also: replica set; replication topology
replica set
One or more shared folders that participates in replication.
See also: replication
replication
The process of copying data from a data store or file system to multiple computers to
synchronize the data. Active Directory provides multimaster replication of the directory between
domain controllers within a given domain. The replicas of the directory on each domain
controller are writable. This allows updates to be applied to any replica of a given domain. The
replication service automatically copies the changes from a given replica to all other replicas.
See also: Active Directory; replica; replication policy; topology
replication policy
Rules that define how and when replication is performed.
See also: replication
replication topology
A description of the physical connections between replicas and sites. In contrast, DFS topologies
describe the logical connections.
See also: replica
report message
For Message Queuing, a message that contains status information and is sent to report queues on
the source computer. Examples include test messages and route tracking messages.
See also: Message Queuing; report queue
report queue
For Message Queuing, a queue on the source computer that contains report messages. Report
queues can be used when sending test messages and tracking message routes.
See also: Message Queuing; report message
Request for Comments (RFC)
An official document of the Internet Engineering Task Force (IETF) that specifies the details for
protocols included in the TCP/IP family.
See also: Internet Engineering Task Force (IETF); protocol; Transmission Control
Protocol/Internet Protocol (TCP/IP)
reservation
A specific IP address within a scope permanently reserved for leased use to a specific DHCP
client. Client reservations are made in the DHCP database using DHCP Manager and based on a
unique client device identifier for each reserved entry.
In Admission Control Service, an allocation of network resources, contained in a Resource
Reservation Protocol (RSVP) reservation request administered by the Admission Control
Service.
See also: Dynamic Host Configuration Protocol (DHCP); lease; Resource Reservation Protocol
(RSVP); scope; IP address
resolver
DNS client programs used to look up DNS name information. Resolvers can be either a small
stub (a limited set of programming routines that provide basic query functionality) or larger
programs that provide additional lookup DNS client functions, such as caching.
See also: caching; caching resolver; Domain Name System (DNS)
resource
Generally, any part of a computer system or network, such as a disk drive, printer, or memory,
that can be allotted to a running program or a process.
For Device Manager, any of four system components that control how the devices on a computer
work. These four system resources are interrupt request (IRQ) lines, direct memory access
(DMA) channels, input/output (I/O) ports, and memory addresses.
For server clusters, a physical or logical entity that is capable of being managed by a cluster,
brought online and taken offline, and moved between nodes. A resource can be owned only by a
single node at any point in time.
See also: direct memory access (DMA); input/output (I/O) port; interrupt request (IRQ) lines;
memory address; offline; online; resource; server cluster
resource allocation
The process of distributing a computer system's facilities to different components of a job in
order to perform the job.
Resource DLL
A dynamic-link library (DLL) containing an implementation of the Resource application
programming interface (API) for a specific type of resource. The Resource DLL is loaded into
the address space of its Resource Monitor.
See also: application programming interface (API); dynamic-link library (DLL)
resource domain
A Windows NT 4.0 domain that is used for hosting file, print, and other application services.
See also: domain; service
Resource Monitor
A cluster software component that facilitates communication between a node's server cluster and
one or more of its resources.
See also: resource; server cluster
resource record (RR)
Standard DNS database structure containing information used to process DNS queries. For
example, an address (A) type resource record contains IP address corresponding to a host name.
Most of the basic resource record types are defined in RFC 1035, but additional RR types have
been defined in other RFCs and approved for use with DNS.
See also: Domain Name System (DNS); Request for Comments (RFC); retry interval; zone
resource record set (RRset)
A collection of more than one resource record returned in a query response by a DNS server.
Resource record sets (RRsets) are used in responses where more than one record is part of the
answer.
See also: DNS Server; resource record (RR)
Resource Reservation Protocol (RSVP)
A signaling protocol that allows the sender and receiver in a communication to set up a reserved
highway for data transmission with a specified quality of service.
See also: protocol
response
In Windows remote access, strings expected from the device, which can contain macros.
See also: string; remote access
response message
For Message Queuing, a message sent by a receiving application to the response queue specified
by a sending application. Any available queue can be specified as a response queue.
See also: Message Queuing; response queue; queue
response queue
For Message Queuing, a queue that is created by the sending application and used by the
receiving application to reply to messages. For example, an application might send a response
message to a response queue every time the application receives a message.
See also: Message Queuing; response message; queue
Restore Point
A representation of a stored state of your computer. Restore point is created by System Restore
at specific intervals and when System Restore detects the beginning of a change to your
computer. Also, restore point can be created by you manually at any time.
retry interval
The time, in seconds after the refresh interval expires, used by secondary masters of a zone to
determine how often to try and retry contacting its source for zone data to see if its replicated
zone data needs to be refreshed. This interval is set in the SOA (start-of-authority) resource
record for each zone.
See also: refresh interval; replication; secondary master; start-of-authority (SOA) resource
record; zone
reverse lookup
In DNS, a query process by which the IP address of a host computer is searched to find its
friendly DNS domain name. In DNS Manager, reverse lookup zones are based on the inaddr.arpa domain name and typically hold pointer (PTR) resource records.
See also: Domain Name System (DNS); in-addr.arpa domain; pointer (PTR) resource record;
zone
RGB color space
Multidimensional color space consisting of the red, green, and blue intensities that make up a
given color. This system is typically used in scanners, digital cameras, computer monitors, and
computer printers.
See also: color management; color space
right-click
To position the mouse over an object, and then press and release the secondary (right) mouse
button. Right-clicking opens a shortcut menu that contains useful commands, which change
depending on where you click.
roaming user profile
A server-based user profile that is downloaded to the local computer when a user logs on and
that is updated both locally and on the server when the user logs off. A roaming user profile is
available from the server when logging on to a workstation or server computer. When logging
on, the user can use the local user profile if it is more current than the copy on the server.
See also: local user profile; mandatory user profile; user profile
rolling upgrade
In a cluster, the process of upgrading cluster nodes by turns while the other nodes continue to
provide service.
See also: cluster
ROM
An acronym for Read-Only Memory, a semiconductor circuit into which code or data is
permanently installed by the manufacturing process. ROM contains instructions or data that can
be read but not modified.
root
The highest or uppermost level in a hierarchically organized set of information. The root is the
point from which further subsets are branched in a logical sequence that moves from a broad or
general focus to narrower perspectives.
root authority
The certification authority (CA) at the top of a certification hierarchy. The root CA has a selfsigned certificate. Also called the root certification authority.
See also: certification authority (CA); certification hierarchy; root
root certificate
A self-signed certification authority certificate. It is called a root certificate because it is the
certificate for the root authority. The root authority must sign its own certificate because by
definition there is no higher certifying authority in the certification hierarchy.
See also: certificate; certification authority (CA); certification hierarchy; root authority
root domain
The beginning of the Domain Name System (DNS) namespace. In Active Directory, the initial
domain in an Active Directory tree. Also the initial domain of a forest.
root hints
Local information stored on a DNS server that provides helping resource records to direct the
server to its root servers. For DNS, the root hints are stored in the file Cache.dns, located in the
Systemroot\System32\Dns folder. Root hints are also called cache hints.
See also: authoritative; DNS Server; Domain Name System (DNS); namespace; root servers;
systemroot
root servers
DNS servers that are authoritative for the root of the namespace.
See also: authoritative; DNS Server; namespace; root
round robin
A simple mechanism used by DNS servers to share and distribute loads for network resources.
Round robin is used to rotate the order of resource records (RRs) returned in a response to a
query when multiple RRs of the same type exist for a queried DNS domain name.
See also: DNS Server; resource record (RR)
router
In a Windows environment, hardware that helps LANs and WANs achieve interoperability and
connectivity, and can link LANs that have different network topologies (such as Ethernet and
Token Ring). Routers match packet headers to a LAN segment and choose the best path for the
packet, optimizing network performance.
In the Macintosh environment, routers are necessary for computers on different physical
networks to communicate with each other. Routers maintain a map of the physical networks on a
Macintosh internet (network) and forward data received from one physical network to other
physical networks. Computers running the Server version of Windows with AppleTalk network
integration can act as routers, and you can also use other routing hardware on a network with
AppleTalk network integration.
See also: local area network (LAN); packet header; Routing Information Protocol over IPX
(RIPX); routing; static routes; wide area network (WAN)
routing
The process of forwarding a packet through an internetwork from a source host to a destination
host.
See also: host; packet
Routing Information Protocol over IPX (RIPX)
A protocol used by routers to exchange information between routers on an IPX network and by
hosts to determine the best router to use when forwarding IPX traffic to a remote IPX network.
See also: protocol; router; Internetwork Packet Exchange (IPX); NWLink
routing link
For Message Queuing, a communications link established between Windows sites for routing
messages. Specially configured Message Queuing servers with routing services enabled are used
to create a routing link between sites.
See also: Message Queuing; routing-link cost; routing services
routing services
For Message Queuing, a service on a Message Queuing server that provides message routing
services. If so configured, this feature can be used on a Message Queuing server to:
ï‚·
ï‚·
ï‚·
Enable computers that use different network protocols to communicate.
Reduce the number of sessions by acting as a gateway for all incoming or
outgoing messages for independent clients.
Route messages between sites over a routing link.
See also: session concentration; service; independent client; Message Queuing; Message
Queuing server; routing link
routing-link cost
For Message Queuing, a number used to determine the route messages can take between two
sites. This number represents the relative monetary cost of communication over a link. A routing
link has a default routing-link cost of 1 and should not be changed unless you have multiple
routing links between two sites and you want to enforce message routing over a specific routing
link.
See also: Message Queuing; routing link
RS-232-C standard
An accepted industry standard for serial communication connections. Adopted by the Electric
Industries Association, this Recommended Standard (RS) defines the specific lines and signal
characteristics used by serial communications controllers to standardize the transmission of serial
data between devices. The letter C signifies the third in a series.
RSA
A widely used public/private key algorithm. It is the default cryptographic service provider
(CSP) for Microsoft Windows. It was patented by RSA Data Security, Inc. in 1977.
See also: cryptographic service provider (CSP)
S
saturation
In color management, the purity of a color's hue, moving from gray to the pure color.
See also: hue
scalability
A measure of how well a computer, service, or application can grow to meet increasing
performance demands. For server clusters, the ability to incrementally add one or more systems
to an existing cluster when the overall load of the cluster exceeds its capabilities.
See also: server cluster
scan interval
For Process Control, the time between successive checks for new processes started on the server.
You can configure this in the Process Control snap-in.
schema
A description of the object classes and attributes stored in Active Directory. For each object
class, the schema defines the attributes an object class must have, the additional attributes it may
have, and the object class that can be its parent.
The Active Directory schema can be updated dynamically. For example, an application can
extend the schema with new attributes and classes and use the extensions immediately. Schema
updates are accomplished by creating or modifying the schema objects stored in Active
Directory. Like every object in Active Directory, schema objects have an access control list, so
only authorized users may alter the schema.
See also: Active Directory; attribute; object; parent object
schema master
The domain controller assigned to control all updates to the schema within a forest. At any time,
there can be only one schema master in the forest.
See also: domain controller; forest; schema
scope
A range of IP addresses that are available to be leased or assigned to DHCP clients by the DHCP
service.
See also: Dynamic Host Configuration Protocol (DHCP); lease; IP address
scope of influence
In a domain environment, a site, domain, or organizational unit; in a workgroup environment, the
local disk.
See also: domain; organizational unit
scrap
A file that is created when you drag part of a document to the desktop.
screen fonts
A typeface designed for display on a computer monitor screen. Screen fonts often have
accompanying PostScript fonts for printing to PostScript-compatible printers.
See also: font; PostScript
screen resolution
The setting that determines the amount of information that appears on your screen, measured in
pixels. Low resolution, such as 640 x 480, makes items on the screen appear large, although the
screen area is small. High resolution, such as 1024 x 768, makes the overall screen area large,
although individual items appear small.
See also: pixel
screen saver
A moving picture or pattern that appears on your screen when you have not used the mouse or
keyboard for a specified period of time.
script
A type of program consisting of a set of instructions to an application or tool program. A script
usually expresses instructions by using the application's or tool's rules and syntax, combined with
simple control structures such as loops and if/then expressions. "Batch program" is often used
interchangeably with "script" in the Windows environment.
second-level domains
Domain names that are rooted hierarchically at the second tier of the domain namespace directly
beneath the top-level domain names such as .com and .org. When DNS is used on the Internet,
second-level domains are names such as microsoft.com that are registered and delegated to
individual organizations and businesses according to their top-level classification. The
organization then assumes further responsibility for parenting management and growth of its
name into additional subdomains.
See also: domain name; Domain Name System (DNS); namespace; parent domain; top-level
domains
secondary master
An authoritative DNS server for a zone that is used as a source for replication of the zone to
other servers. Secondary masters update their zone data only by transferring zone data from other
DNS servers. They do not have the ability to perform zone updates.
See also: authoritative; DNS Server; master server; primary master; zone; zone transfer
secondary mouse button
The button that you use to display shortcut menus or other program-specific features. The
secondary mouse button is the right button on most mice and trackball devices, and the upper
button on other trackball devices, but you can switch the function of the buttons in the Mouse
Control Panel.
Secure Hash Algorithm (SHA-1)
A message digest hash algorithm that generates a 160-bit hash value. SHA-1 is used with the
Digital Signature Algorithm (DSA) in the Digital Signature Standard (DSS), among other places.
See also: Digital Signature Standard (DSS); hash algorithm; message digest
Secure Sockets Layer (SSL)
A proposed open standard for establishing a secure communications channel to prevent the
interception of critical information, such as credit card numbers. Primarily, it enables secure
electronic financial transactions on the World Wide Web, although it is designed to work on
other Internet services as well.
Secure/Multipurpose Internet Mail Extensions (S/MIME)
A protocol for secure electronic mail over the Internet.
See also: protocol
security
On a network, protection of a computer system and its data from harm or loss, implemented
especially so that only authorized users can gain access to shared files.
security descriptor
A data structure that contains security information associated with a protected object. Security
descriptors include information about who owns the object, who can access it and in what way,
and what types of access will be audited.
See also: permission; discretionary access control list (DACL); group; object; system access
control list (SACL)
security group
A group that can be listed in discretionary access control lists (DACLs) used to define
permissions on resources and objects. A security group can also be used as an e-mail entity.
Sending an e-mail message to the group sends the message to all the members of the group.
See also: discretionary access control list (DACL)
security host
An authentication device, supplemental to standard Windows and remote access server security,
that verifies whether a caller from a remote client is authorized to connect to the remote access
server.
See also: authentication; remote access server; remote access
security ID (SID)
A data structure of variable length that identifies user, group, and computer accounts. Every
account on a network is issued a unique SID when the account is first created. Internal processes
in Windows refer to an account's SID rather than the account's user or group name.
See also: group account; group name; user account; user name
security log
An event log containing information on security events that are specified in the audit policy.
security principal
An account holder that is automatically assigned a security identifier for access to resources. A
security principal can be a user, group, service, or computer.
See also: group; security principal name; service
security principal name
A name that uniquely identifies a user, group, or computer within a single domain. This name is
not guaranteed to be unique across domains.
See also: domain; group; security principal
select
To specify a block of data or text on screen by highlighting it or otherwise marking it, with the
intent of performing some operation on it.
Serial Line Internet Protocol (SLIP)
An older industry standard that is part of Windows remote access client to ensure interoperability
with other remote access software.
See also: remote access
serial port
An interface on the computer that allows asynchronous transmission of data characters one bit at
a time. Also called a communication or COM port.
See also: communication port; port
SerialKey device
Enables you to attach an alternate input device (also called an augmentative communication
device) to your computer's serial port. This feature is designed for people who are unable to use
the computer's standard keyboard and mouse.
server
In general, a computer that provides shared resources to network users.
See also: client; shared resource
server cluster
A group of independent computer systems, known as nodes, working together as a single system
to ensure that mission-critical applications and resources remain available to clients. A server
cluster is the type of cluster that Cluster service implements.
See also: cluster
Server Message Block (SMB)
A file-sharing protocol designed to allow networked computers to transparently access files that
reside on remote systems over a variety of networks. The SMB protocol defines a series of
commands that pass information between computers. SMB uses four message types: session
control, file, printer, and message.
server zone
The AppleTalk zone on which a server appears. On a Phase 2 network, a server appears in the
default zone of the server's default network.
See also: server; zone
service
A program, routine, or process that performs a specific system function to support other
programs, particularly at a low (close to the hardware) level. When services are provided over a
network, they can be published in Active Directory, facilitating service-centric administration
and usage. Some examples of services are the Security Accounts Manager service, File
Replication service, and Routing and Remote Access service.
See also: Active Directory; Dynamic Host Configuration Protocol (DHCP); Service Profile
Identifier (SPID)
service (SRV) resource record
A resource record used in a zone to register and locate well-known TCP/IP services. The SRV
resource record is specified in RFC 2782, and it is used to locate domain controllers for Active
Directory.
See also: Active Directory; resource record (RR); Transmission Control Protocol/Internet
Protocol (TCP/IP)
Service Profile Identifier (SPID)
An 8-digit to 14-digit number that identifies the services that you ordered for each B-channel.
For example, when you order Primary Rate ISDN, you obtain two phone numbers and two
SPIDs from your ISDN provider. Typical ISDN adapters cannot operate without configuring
SPIDs.
See also: Integrated Services Digital Network (ISDN); service; B-channel
Service Provider Interface
Calling conventions that back-end services use to make themselves accessible to front-end
applications.
See also: service
service ticket
A ticket issued by the Kerberos V5 ticket-granting service (TGS) that allows a user to
authenticate to a specific service in the domain.
See also: Kerberos?V5 authentication protocol; ticket; ticket-granting service (TGS)
session
A logical connection created between two hosts to exchange data. Typically, sessions use
sequencing and acknowledgments to send data reliably.
In the context of load balancing TCP/IP traffic, a set of client requests directed to a server. These
requests can be invoked with multiple, possibly concurrent, TCP connections. The server
program sometimes maintains state information between requests. To preserve access to the
server state, Network Load Balancing needs to direct all requests within a session to the same
cluster host when load balancing.
See also: client request; load balancing; server; Transmission Control Protocol/Internet Protocol
(TCP/IP)
session concentration
For Message Queuing, a feature that typically reduces network bandwidth within a site and the
number of sessions between sites. Specially configured Message Queuing servers with routing
services provide session concentration.
See also: bandwidth; Message Queuing; Message Queuing server; routing services; session; site
Session Description Protocol (SDP)
A protocol that TAPI uses to advertise IP multicast conferences. This protocol describes
multimedia sessions for the purposes of session announcement, session invitation, and other
forms of session initiation. SDP descriptors are stored in Active Directory. SDP is described in
RFC 2327 of the IETF.
See also: Telephony API (TAPI); multicast; Active Directory; Internet Engineering Task Force
(IETF); protocol
Set
Applies any changes you have made without closing the dialog box.
set-by-caller callback
In Network Connections, a form of callback in which the user supplies the telephone number that
the remote access server uses for callback. This setting spares the user any long-distance
telephone charges.
See also: remote access server; connected, user authenticated
share
To make resources, such as folders and printers, available to others.
See also: resource
share name
A name that refers to a shared resource on a server. Each shared folder on a server has a share
name used by personal computer users to refer to the folder. Users of Macintosh computers use
the name of the Macintosh-accessible volume that corresponds to a folder, which may be the
same as the share name.
shared folder
A folder on another computer that has been made available for other people to use on the
network.
shared folder permissions
Permissions that restrict a shared resource's availability over the network to only certain users.
See also: permission
shared printer
A printer that receives input from more than one computer. For example, a printer attached to
another computer on the network can be shared so that it is available for you to use. Shared
printer is also called a network printer.
See also: printer
shared resource
Any device, data, or program that is used by more than one other device or program. For
Windows, shared resources refer to any resource that is made available to network users, such as
folders, files, printers, and named pipes. A shared resource can also refer to a resource on a
server that is available to network users.
See also: device; resource; server
shortcut
A link to any item accessible on your computer or on a network, such as a program, file, folder,
disk drive, Web page, printer, or another computer. You can put shortcuts in various areas, such
as on the desktop, on the Start menu, or in specific folders.
See also: desktop
ShowSounds
A feature that instructs programs that usually convey information only by sound to also provide
all information visually, such as by displaying text captions or informative icons.
Simple Mail Transfer Protocol (SMTP)
A member of the TCP/IP suite of protocols that governs the exchange of electronic mail between
message transfer agents.
See also: protocol; Transmission Control Protocol/Internet Protocol (TCP/IP)
Simple Network Management Protocol (SNMP)
A network protocol used to manage TCP/IP networks. In Windows, the SNMP service is used to
provide status information about a host on a TCP/IP network.
See also: agent; protocol; service; Transmission Control Protocol/Internet Protocol (TCP/IP)
Simple Network Time Protocol (SNTP)
A protocol used to synchronize clocks over the Internet. SNTP enables client computers to
synchronize their clocks with a time server over the Internet.
Simple TCP/IP Services
Four TCP/IP services: Character Generator, Daytime Discard, Echo, and Quote of the Day.
See also: service; Transmission Control Protocol/Internet Protocol (TCP/IP)
simple volume
A dynamic volume made up of disk space from a single dynamic disk. A simple volume can
consist of a single region on a disk or multiple regions of the same disk that are linked together.
You can extend a simple volume within the same disk or onto additional disks. If you extend a
simple volume across multiple disks, it becomes a spanned volume. You can create simple
volumes only on dynamic disks. Simple volumes are not fault tolerant, but you can mirror them
to create mirrored volumes.
See also: dynamic disk; dynamic volume; fault tolerance; mirrored volume; spanned volume;
volume
Single Instance Store (SIS)
A component that saves disk space on the server by maintaining a single physical copy of all
identical files found. If SIS finds a duplicate file on the server, it copies the original file into the
SIS store and leaves a link where the original resided. This technology is used only with Remote
Installation Services.
See also: Remote Installation Services
single sign-on
A process that allows a user with a domain account to log on to a network once, using a
password or smart card, and to gain access to any computer in the domain.
See also: domain; smart card
single switch device
An assistive computer technology for people with mobility impairments. A single switch device
allows users to interact with a computer by using slight body movements.
site
One or more well connected (highly reliable and fast) TCP/IP subnets. A site allows
administrators to configure Active Directory access and replication topology quickly and easily
to take advantage of the physical network. When users log on, Active Directory clients locate
Active Directory servers in the same site as the user.
See also: subnet; Active Directory; replication topology; Transmission Control Protocol/Internet
Protocol (TCP/IP)
SLIP (Serial Line Internet Protocol)
See definition for: Serial Line Internet Protocol (SLIP)
small computer system interface (SCSI)
A standard high-speed parallel interface defined by the American National Standards Institute
(ANSI). A SCSI interface is used for connecting microcomputers to peripheral devices such as
hard disks and printers, and to other computers and local area networks (LANs).
See also: device; local area network (LAN)
smart card
A credit card-sized device that is used with an access code to enable certificate-based
authentication and single sign-on to the enterprise. Smart cards securely store certificates, public
and private keys, passwords, and other types of personal information. A smart card reader
attached to the computer reads the smart card.
See also: authentication; single sign-on; smart card reader
smart card reader
A device that is installed in computers to enable the use of smart cards for enhanced security
features.
See also: smart card
snap-in
A type of tool you can add to a console supported by Microsoft Management Console (MMC). A
stand-alone snap-in can be added by itself; an extension snap-in can only be added to extend the
function of another snap-in.
See also: Microsoft Management Console (MMC)
socket
An identifier for a particular service on a particular node on a network. The socket consists of a
node address and a port number, which identifies the service. For example, port 80 on an Internet
node indicates a Web server. There are two kinds of sockets: streams (bidirectional) and
datagrams.
See also: datagram; process; raw socket; port
software decoder
A type of digital video disc (DVD) decoder that allows a DVD drive to display movies on your
computer screen. A software decoder uses only software to display movies.
See also: DVD decoder; DVD drive; hardware decoder
Sound card
Accessory expansion board for personal computers that permits recording and playing back
sound.
sound file
A sound file contains information that Windows uses to play sounds on your computer. Sound
files have the file name extension .wav.
SoundSentry
A Windows feature that produces a visual cue, such as a screen flash or a blinking title bar,
whenever the computer plays a system sound.
source document
The document where a linked or embedded object was originally created.
See also: embedded object; linked object
source journaling
For Message Queuing, the process of storing a copy of an outgoing message. Source journaling
is configured on a message basis and is set by the sending application. When source journaling is
enabled, a copy of the message is put in the source journal queue of the source computer when
the message arrives at the destination (target) queue.
See also: journal queue; Message Queuing; target journaling
spanned volume
A dynamic volume consisting of disk space on more than one physical disk. You can increase
the size of a spanned volume by extending it onto additional dynamic disks. You can create
spanned volumes only on dynamic disks. Spanned volumes are not fault tolerant and cannot be
mirrored.
See also: dynamic disk; dynamic volume; fault tolerance; mirrored volume; simple volume;
volume
special access permissions
On NTFS volumes, a custom set of permissions. You can customize permissions on files and
directories by selecting the individual components of the standard sets of permissions.
See also: volume; permission; NTFS file system
speech recognition
The ability to interpret spoken words and convert them into computer-readable text. Speech
recognition programs allow you to enter text by speaking into a microphone, rather than using a
keyboard.
splitting
A Briefcase command that separates the copy of the file inside Briefcase from the copy outside
Briefcase.
spooling
A process on a server in which print documents are stored on a disk until a printer is ready to
process them. A spooler accepts each document from each client, stores it, then sends it to a
printer when the printer is ready.
See also: print spooler
standby
A state in which your computer consumes less power when it is idle, but remains available for
immediate use. While your computer is on standby, information in computer memory is not
saved on your hard disk. If there is an interruption in power, the information in memory is lost.
Start Application Enable
When checked, the server DDE application automatically starts when a client DDE application
attempts to initiate a DDE conversation. When cleared, attempts to open a DDE conversation
succeed only if the server DDE application is already running.
start-of-authority (SOA) resource record
A record that indicates the starting point or original point of authority for information stored in a
zone. The SOA resource record (RR) is the first RR created when adding a new zone. It also
contains several parameters used by other computers that use DNS to determine how long they
will use information for the zone and how often updates are required.
See also: zone; authoritative; Domain Name System (DNS); resource record (RR)
startup environment
In dual-boot or multiple-boot systems, the configuration settings that specify which system to
start and how each system should be started.
See also: dual boot; multiple boot
static dialog box
A scripted dialog box between the client computer and an intermediary device. This kind of
dialog box requires no response from the user.
See also: client
static routes
Routes in the routing table that are permanent. Static routes are manually configured by a
network administrator. They change only if the network administrator changes them. If the
routing protocol is configured to support auto-static routes (automatically added static routes),
then the router can issue a request to a protocol to get an update of routing information on a
specific interface. The results of such an update are then converted and kept as static routes.
See also: routing; protocol; router
status area
See definition for: notification area
status bar
A line of information related to the current program. The status bar is usually located at the
bottom of a window. Not all windows have a status bar.
StickyKeys
A keyboard feature that enables you to press a modifier key (CTRL, ALT, or SHIFT), or the
Windows logo key, and have it remain active until a non-modifier key is pressed. This is useful
for people who have difficulty pressing two keys simultaneously.
See also: ToggleKeys; FilterKeys; MouseKeys
Stop error
A serious error that affects the operating system and that could place data at risk. The operating
system generates an obvious message, a screen with the Stop error, rather than continuing on and
possibly corrupting data. Stop error is also called a fatal system error.
strict RFC checking
For DNS, a form of domain name checking that examines characters used in DNS names for
compliance with DNS naming requirements and valid character usage as specified in RFC 1123,
Requirements for Internet Hosts - Applications and Support. For strict RFC compliance, DNS
domain names will use name labels made up only of valid uppercase and lowercase letters,
number characters, and hyphens (A through Z, a through z, 0 through 9, -), separated by periods.
See also: domain name; Domain Name System (DNS); label; loose name checking; Request for
Comments (RFC)
string
A group of characters or character bytes handled as a single entity. Computer programs use
strings to store and transmit data and commands. Most programming languages consider strings
(such as 2674:gstmn) as distinct from numeric values (such as 470924).
See also: transmitting station ID (TSID) string
subkey
A key within a key. In the registry structure, subkeys are subordinate to subtrees and keys. Keys
and subkeys are similar to the section header in .ini files; however, subkeys can carry out
functions.
See also: registry; descendent key; key; subkey
subnet
A subdivision of an IP network. Each subnet has its own unique subnetted network ID.
subnet bandwidth management (SBM)
An IETF standard that enables administrative control at the subnet level.
subnet mask
A 32-bit value that enables the recipient of IP packets to distinguish the network ID and host ID
portions of the IP address. Typically, subnet masks use the format 255.x.x.x.
subtree
Any node within a tree, along with any selection of connected descendant nodes. In the registry
structure, subtrees are the primary nodes that contain keys, subkeys, and value entries.
See also: registry; key; subkey; value entry
switch type
The type of interface to which your ISDN device is being attached. Switch type is also called
switch.
See also: B-channel; D-channel; Integrated Services Digital Network (ISDN)
switching hub
A central network device (multiport hub) that forwards packets to specific ports rather than, as in
conventional hubs, broadcasting every packet to every port. In this way, the connections between
ports deliver the full bandwidth available.
See also: hub; packet
symmetric encryption
An encryption algorithm that requires the same secret key to be used for both encryption and
decryption. Because of its speed, symmetric encryption is typically used when a message sender
needs to encrypt large amounts of data. Symmetric encryption is also called secret key
encryption.
See also: public key encryption
synchronize
To reconcile the differences between files stored on one computer and versions of the same files
on another computer. Once the differences are determined, both sets of files are updated.
system access control list (SACL)
The part of an object's security descriptor that specifies which events are to be audited per user or
group. Examples of auditing events are file access, logon attempts, and system shutdowns.
See also: discretionary access control list (DACL); event; object; security descriptor
system area network
A network configuration, usually on a separate Internet Protocol (IP) subnet, that gives data a
direct path to system hardware.
See also: subnet
system disk
A disk that contains the MS-DOS system files necessary to start MS-DOS.
See also: MS-DOS (Microsoft Disk Operating System)
system files
Files used by Windows to load, configure, and run the operating system. Generally, system files
must never be deleted or moved.
System menu
A menu that contains commands you can use to manipulate a window or close a program. You
click the program icon at the left of the title bar to open the System menu.
system partition
The partition that contains the hardware-specific files needed to load Windows (for example,
Ntldr, Osloader, Boot.ini, Ntdetect.com). The system partition can be, but does not have to be,
the same as the boot partition.
See also: boot partition; partition
System Policy
A Windows NT 4.0-style policy based on registry settings made using Poledit.exe, the System
Policy Editor.
See also: policy; registry
system queue
For Message Queuing, a queue that stores various types of administrative messages. Message
Queuing uses up to five system queues, all of which are private queues. System queues cannot be
deleted.
See also: Message Queuing; queue; private queue; system queue
System Restore
A tool that tracks changes to your computer and creates a restore point when it detects the
beginning of a change. You can use the System Restore Wizard to select a restore point to restore
your computer to an earlier state when your computer was functioning the way you like.
system volume
The volume that contains the hardware-specific files that are needed to load Windows on x86based computers with a BIOS. The system volume can be, but does not have to be, the same
volume as the boot volume.
See also: basic input/output system (BIOS); boot volume; volume; x86
systemroot
The path and folder name where the Windows system files are located. Typically, this is
C:\Windows, although you can designate a different drive or folder when you install Windows.
You can use the value %systemroot% to replace the actual location of the folder that contains the
Window system files. To identify your systemroot folder, click Start, click Run, type
%systemroot%, and then click OK.
SYSVOL
A shared directory that stores the server copy of the domain's public files, which are replicated
among all domain controllers in the domain.
See also: domain; domain controller
T
tag
For Indexing Service, one or more terms that identify an element in a query, such as weight,
phrase, property, or regular expression. For example, the tag {prop name=created} specifies the
Created property in a query.
See also: property; query
target
The mapping destination of a DFS root or link, which corresponds to a physical folder that has
been shared on the network.
target journaling
For Message Queuing, the process of storing a copy of incoming messages. Target journaling is
configured on a queue basis. When target journaling is enabled, a copy of each incoming
message is placed in the target journal queue when the message is retrieved (read) from the
destination queue.
See also: journal queue; Message Queuing; source journaling
Task Manager
A utility that provides information about programs and processes running on the computer.
Using Task Manager, you can end or run programs and end processes, and display a dynamic
overview of your computer's performance.
taskbar
The bar that contains the Start button and appears by default at the bottom of the desktop. You
can click the taskbar buttons to switch between programs. You can also hide the taskbar, move it
to the sides or top of the desktop, and customize it in other ways.
See also: desktop; taskbar button; notification area
taskbar button
A button that appears on the taskbar and corresponds to a running application.
See also: taskbar
TCP
Transmission Control Protocol.
TCP/IP
See definition for: Transmission Control Protocol/Internet Protocol (TCP/IP)
Telephony API (TAPI)
An application programming interface (API) used by communications programs to work with
telephony and network services. Communications programs like HyperTerminal and Phone
Dialer use TAPI to dial, answer, and route telephone calls on conventional telephony devices,
including PBXs, modems, and fax machines. TAPI 3.0 also provides Internet Protocol (IP)
telephony support, which Phone Dialer and other programs use to transmit, route, and control
real-time audio and video signals over IP-based networks such as the Internet.
See also: service; Internet Protocol (IP); modem (modulator/demodulator); application
programming interface (API)
Telnet
A terminal-emulation protocol that is widely used on the Internet to log on to network
computers. Telnet also refers to the application that uses the Telnet protocol for users who log on
from remote locations.
See also: protocol
terminal
A device consisting of a display screen and a keyboard that is used to communicate with a
computer.
terminate-and-stay-resident (TSR) program
A program running under MS-DOS that remains loaded in memory even when it is not running,
so that it can be quickly invoked for a specific task performed while any other application is
operating.
See also: MS-DOS (Microsoft Disk Operating System)
test queue
For Message Queuing, a queue that stores sent test messages.
See also: Message Queuing; queue
text box
In a dialog box, a box in which you type information needed to carry out a command. The text
box may be blank or may contain text when the dialog box opens.
text service
A program that enables a user to enter or edit text. Text services include keyboard layouts,
handwriting and speech recognition programs, and Input Method Editors (IMEs). IMEs are used
to enter East Asian language characters with a keyboard.
theme
A set of visual elements that provide a unified look for your computer desktop. A theme
determines the look of the various graphic elements of your desktop, such as the windows, icons,
fonts, colors, and the background and screen saver pictures. It can also define sounds associated
with events such as opening or closing a program.
Thread Count
In Task Manager, the number of threads running in a process.
See also: Task Manager
thumbnail
A miniature version of an image that is often used for quick browsing through multiple images.
ticket
A set of identification data for a security principle, issued by a domain controller for purposes of
user authentication. Two forms of tickets in Windows are ticket-granting tickets (TGTs) and
service tickets.
See also: authentication; domain controller; service ticket; ticket-granting ticket (TGT)
ticket-granting service (TGS)
A Kerberos V5 service provided by the Kerberos V5 Key Distribution Center (KDC) service that
issues service tickets that allow users to authenticate to services in a domain.
See also: Kerberos?V5 authentication protocol; Key Distribution Center (KDC); service ticket;
ticket-granting ticket (TGT)
ticket-granting ticket (TGT)
A credential issued to a user by the Kerberos Key Distribution Center (KDC) when the user logs
on. The user must present the TGT to the KDC when requesting session tickets for services.
Because a TGT is normally valid for the life of the user's logon session, it is sometimes called a
user ticket.
See also: Kerberos?V5 authentication protocol; Key Distribution Center (KDC); ticket-granting
service (TGS)
time server
A computer that periodically synchronizes the time on all computers within a network. This
ensures that the time used by network services and local functions remains accurate.
time slice
A brief period of time during which a particular task is given control of the microprocessor in a
time-sharing multitasking environment. A computer's processor is allocated to an application,
usually measured in milliseconds. Time slice is also called quantum.
time stamp
A certification by a trusted third party specifying that a particular message existed at a specific
time and date. In a digital context, trusted third parties generate a trusted time stamp for a given
message by having a time stamping service append a time value to a message and then digitally
signing the result.
See also: digital signature; service
Time to Live (TTL)
A timer value included in packets sent over TCP/IP-based networks that tells the recipients how
long to hold or use the packet or any of its included data before expiring and discarding the
packet or data. For DNS, TTL values are used in resource records within a zone to determine
how long requesting clients should cache and use this information when it appears in a query
response answered by a DNS server for the zone.
See also: DNS Server; Domain Name System (DNS); packet; resource record (RR);
Transmission Control Protocol/Internet Protocol (TCP/IP); zone
time-out error
A condition where an expected character is not received in time. When this condition occurs, the
software assumes that the data has been lost and requests that it be resent.
time-out interval
For Process Control, the time the server waits, when a command cannot be successfully
completed, before canceling the command. You can configure this in the Process Control snapin.
title bar
The horizontal bar at the top of a window that contains the name of the window. On many
windows, the title bar also contains the program icon, the Maximize, Minimize, and Close
buttons, and the optional ? button for context-sensitive Help. To display a menu with commands
such as Restore and Move, right-click the title bar.
See also: maximize; minimize
ToggleKeys
A feature that sets your keyboard to beep when one of the locking keys (CAPS LOCK, NUM
LOCK, or SCROLL LOCK) is turned on or off.
See also: FilterKeys; MouseKeys; StickyKeys; ToggleKeys
token
Any nonreducible textual element in data that is being parsed. For example, the use in a program
of a variable name, a reserved word, or an operator. Storing tokens as short codes shortens
program files and speeds execution.
For networking, a unique structured data object or message that circulates continuously among
the nodes of a token ring and describes the current state of the network. Before any node can
send a message on the network, it must first wait to control the token. See also token ring.
toolbar
In a program in a graphical user interface, a row, column, or block of on-screen buttons or icons.
When clicked, these buttons or icons activate certain functions, or tasks, of the program. For
example, the toolbar in Microsoft Word contains buttons for, among other actions, changing text
to italic or boldface, and for saving or opening a document. Users can often customize toolbars
and move them around on the screen.
top-level domains
Domain names that are rooted hierarchically at the first tier of the domain namespace directly
beneath the root (.) of the DNS namespace. On the Internet, top-level domain names such as
.com and .org are used to classify and assign second-level domain names (such as microsoft.com)
to individual organizations and businesses according to their organizational purpose.
See also: domain; domain name; domain namespace; Domain Name System (DNS); root;
second-level domains
topology
In Windows, the relationships among a set of network components. In the context of Active
Directory replication, topology refers to the set of connections that domain controllers use to
replicate information among themselves.
See also: Active Directory; domain controller; replication
touch-tone dialing
A form of dialing that uses multiple-tone signaling. The user hears a series of tones (beeps) when
dialing. Push-button telephones usually use touch-tone dialing.
See also: pulse dialing
trace log
A type of log generated when the user selects a trace data provider using Performance. Trace
logs differ sdff from counter-data logs in that they measure data continuously rather than take
periodic samples.
training
The process of teaching the speech recognition engine to recognize your voice and manner of
speaking. The speech engine looks for patterns in the way you speak, enabling it to provide
better accuracy when you dictate text. You train the engine by reading text in the training wizard,
and continue to train the engine as you dictate text while working.
transaction
For Message Queuing, the pairing of two or more actions that are performed together as a single
action; the action succeeds or fails as a whole. Using Microsoft Distributed Transaction
Coordinator (MS DTC) ensures that either both actions succeed or neither is executed.
See also: Message Queuing; Microsoft Distributed Transaction Coordinator (MS DTC);
transaction dead-letter queue; transactional message
transaction dead-letter queue
For Message Queuing, a queue that stores transactional messages that cannot reach their
destination queue. Transaction dead-letter queues store failed messages on the computer on
which the message expired. Messages in these queues are written to disk and are therefore
recoverable.
See also: dead-letter queue; Message Queuing; transaction; queue
transactional message
For Message Queuing, a message that can be sent and received only from within a transaction.
This type of message returns to its prior state when a transaction is terminated abruptly. A
transactional message is removed from a queue only when the transaction is committed;
otherwise, it remains in the queue and can be subsequently read during another transaction.
See also: Message Queuing; transaction; queue
transceiver
A device that can both transmit and receive signals. On local area networks (LANs), a
transceiver is the device that connects a computer to the network and that converts signals to and
from parallel and serial form.
transitive trust
The standard type of trust relationship between Windows domains in a domain tree or forest.
When a domain joins an existing forest or domain tree, a transitive trust is automatically
established. Transitive trusts are always two-way relationships. This series of trusts, between
parent and child domains in a domain tree and between root domains of domain trees in a forest,
allows all domains in a forest to trust each other for the purposes of authentication. For example,
if domain A trusts domain B and domain B trusts domain C, then domain A trusts domain C.
See also: domain tree; forest; one-way trust; two-way trust
Transmission Control Protocol/Internet Protocol (TCP/IP)
A set of networking protocols widely used on the Internet that provides communications across
interconnected networks of computers with diverse hardware architectures and various operating
systems. TCP/IP includes standards for how computers communicate and conventions for
connecting networks and routing traffic.
See also: protocol; Internet Protocol (IP)
transmitting station ID (TSID) string
A string that specifies the transmitter subscriber ID sent by the fax machine when sending a fax
to a receiving machine. This string is usually a combination of the fax or telephone number and
the name of the business. It is often the same as the called subscriber ID.
See also: called subscriber ID (CSID) string; string
Transport Driver Interface (TDI)
A common set of routines for network layer components that communicate with the session layer
of the Open Systems Interconnection (OSI) model. These routines allow software components
above and below the transport layer to be mixed and matched without reprogramming.
See also: Open Systems Interconnection (OSI) reference model
Transport Layer Security (TLS)
A standard protocol that is used to provide secure Web communications on the Internet or
intranets. It enables clients to authenticate servers or, optionally, servers to authenticate clients. It
also provides a secure channel by encrypting communications. TLS is the latest and a more
secure version of the SSL protocol.
See also: Secure Sockets Layer (SSL); authentication; protocol
transport provider
The driver and support files that provide transport services in a networking environment.
trap
In Simple Network Management Protocol (SNMP), a message sent by an agent to a management
system indicating that an event has occurred on the host running the agent.
See also: agent; event; host; Simple Network Management Protocol (SNMP)
tree view
A hierarchical representation of the folders, files, disk drives, and other resources connected to a
computer or network. For example, Windows Explorer uses a tree view to display the resources
that are attached to a computer or a network.
See also: resource
Trivial File Transfer Protocol (TFTP)
A protocol used to download the initial files needed to begin the installation process.
See also: protocol
Trojan horse
A program that masquerades as another common program in an attempt to receive information.
An example of a Trojan horse is a program that behaves like a system logon to retrieve user
names and password information that the writers of the Trojan horse can later use to break into
the system.
TrueType fonts
Fonts that are scalable and sometimes generated as bitmaps or soft fonts, depending on the
capabilities of your printer. TrueType fonts are device-independent fonts that are stored as
outlines. They can be sized to any height, and they can be printed exactly as they appear on the
screen.
See also: font
trust relationship
A logical relationship established between domains to allow pass-through authentication, in
which a trusting domain honors the logon authentications of a trusted domain. User accounts and
global groups defined in a trusted domain can be given rights and permissions in a trusting
domain, even though the user accounts or groups don't exist in the trusting domain's directory.
See also: group; user account; permission; authentication; domain; global group
tunnel
A logical connection over which data is encapsulated. Typically, both encapsulation and
encryption are performed and the tunnel is a private, secure link between a remote user or host
and a private network.
See also: encryption; host; tunnel server; voluntary tunnel
tunnel server
A server or router that terminates tunnels and forwards traffic to the hosts on the target network.
See also: host; router; server; tunnel
two-way trust
A type of trust relationship in which both of the domains in the relationship trust each other. In a
two-way trust relationship, each domain has established a one-way trust with the other domain.
For example, domain A trusts domain B and domain B trusts domain A. Two-way trusts can be
transitive or nontransitive. All two-way trusts between Windows domains in the same domain
tree or forest are transitive.
See also: domain tree; forest; one-way trust; transitive trust
Type 1 fonts
Scalable fonts designed to work with PostScript devices.
See also: font; PostScript
U
UDP socket
A socket that transmits datagrams over the User Datagram Protocol (UDP).
See also: datagram; socket; User Datagram Protocol (UDP)
unallocated space
Available disk space that is not allocated to any volume. The type of volume that you can create
on unallocated space depends on the disk type. On basic disks, you can use unallocated space to
create primary or extended partitions. On dynamic disks, you can use unallocated space to create
dynamic volumes.
See also: basic disk; dynamic disk; extended partition; logical drive; object; partition; primary
partition; volume
UNC (Universal Naming Convention) name
The full name of a resource on a network. It conforms to the \\servername\sharename syntax,
where servername is the name of the server and sharename is the name of the shared resource.
UNC names of directories or files can also include the directory path under the share name, with
the following syntax:
\\servername\sharename\directory\filename
See also: share name; resource
undock
To detach a laptop or other portable computer from a docking station.
See also: dock; docking station; hot docking
unicast
In data communications networks, to transmit data from one terminal to another, such as from
client to server, or from server to server.
Unicode
A character encoding standard developed by the Unicode Consortium that represents almost all
of the written languages of the world. The Unicode character repertoire has multiple
representation forms, including UTF-8, UTF-16, and UTF-32. Most Windows interfaces use the
UTF-16 form.
See also: American Standard Code for Information Interchange (ASCII); Unicode Character
System (UCS); Unicode Transmission Format 8 (UTF-8)
Unicode Character System (UCS)
An international standard character set reference that is part of the Unicode standard. The most
widely held existing version of the UCS standard is UCS-2, which specifies 16-bit character
values currently accepted and recognized for use to encode most of the world's languages.
See also: Unicode Transmission Format 8 (UTF-8); American Standard Code for Information
Interchange (ASCII); Unicode
Unicode Transmission Format 8 (UTF-8)
A character set for protocols evolving beyond the use of ASCII. The UTF-8 protocol provides
for support of extended ASCII characters and translation of UCS-2, an international 16-bit
Unicode character set. UTF-8 enables a far greater range of names than can be achieved using
ASCII or extended ASCII encoding for character data.
See also: American Standard Code for Information Interchange (ASCII); Unicode Character
System (UCS); Unicode
Uniform Resource Locator (URL)
An address that uniquely identifies a location on the Internet. A URL for a World Wide Web site
is preceded with http://, as in the fictitious URL http://www.example.microsoft.com/. A URL can
contain more detail, such as the name of a page of hypertext, usually identified by the file name
extension .html or .htm.
uninstall
When referring to software, the act of removing program files and folders from your hard disk
and removing related data from your registry so the software is no longer available.
When referring to a device, the act of removing the corresponding device drivers from your hard
disk and physically removing the device from your computer.
See also: device driver; install
uninterruptible power supply (UPS)
A device connected between a computer and a power source to ensure that electrical flow is not
interrupted. UPS devices use batteries to keep the computer running for a period of time after a
power failure. UPS devices usually provide protection against power surges and brownouts as
well.
universal group
A security or distribution group that can be used anywhere in the domain tree or forest. A
universal group can have members from any Windows domain in the domain tree or forest. It
can also include other universal groups, global groups, and accounts from any domain in the
domain tree or forest. Rights and permissions must be assigned on a per-domain basis, but can be
assigned at any domain in the domain tree or forest.
Universal groups can be members of domain local groups and other universal groups, but they
cannot be members of global groups. Universal groups appear in the global catalog and should
contain primarily global groups.
See also: distribution group; domain; domain tree; domain local group; forest; global group;
global catalog; security group
Universal Naming Convention (UNC)
A convention for naming files and other resources beginning with two backslashes (\), indicating
that the resource exists on a network computer. UNC names conform to the
\\SERVERNAME\SHARENAME syntax, where SERVERNAME is the server's name and
SHARENAME is the name of the shared resource. The UNC name of a directory or file can also
include the directory path after the share name, with the following syntax:
\\SERVERNAME\SHARENAME\DIRECTORY\FILENAME.
universal serial bus (USB)
An external bus that supports Plug and Play installation. Using USB, you can connect and
disconnect devices without shutting down or restarting your computer. You can use a single USB
port to connect up to 127 peripheral devices, including speakers, telephones, CD-ROM drives,
joysticks, tape drives, keyboards, scanners, and cameras. A USB port is usually located on the
back of your computer near the serial port or parallel port.
See also: port; bus; Plug and Play
UNIX
A powerful, multiuser, multitasking operating system initially developed at AT&T Bell
Laboratories in 1969 for use on minicomputers. UNIX is considered more portable, that is, less
computer-specific, than other operating systems because it is written in C language. Newer
versions of UNIX have been developed at the University of California at Berkeley and by
AT&T.
UPS service
A service that manages an uninterruptible power supply (UPS) connected to a computer.
See also: service
URL
See definition for: Uniform Resource Locator (URL)
USB port
An interface on the computer that enables you to connect a Universal Serial Bus (USB) device.
USB is an external bus standard that enables data transfer rates of 12 Mbps (12 million bits per
second). USB ports support a plug that is approximately 7 mm x 1 mm.
See also: universal serial bus (USB)
user
A person who uses a computer. If the computer is connected to a network, a user can access the
programs and files on the computer, as well as programs and files located on the network
(depending on account restrictions determined by the network administrator).
user account
A record that consists of all the information that defines a user to Windows. This includes the
user name and password required for the user to log on, the groups in which the user account has
membership, and the rights and permissions the user has for using the computer and network,
and accessing their resources. For Windows XP Professional and member servers, user accounts
are managed with Local Users and Groups. For Windows Server domain controllers, user
accounts are managed with Microsoft Active Directory Users and Computers.
See also: permission; Active Directory Users and Computers; group; password; resource; user
name
User Datagram Protocol (UDP)
A TCP complement that offers a connectionless datagram service that guarantees neither
delivery nor correct sequencing of delivered packets (much like IP).
See also: datagram; Internet Protocol (IP); packet; service
user name
A unique name identifying a user account to Windows. An account's user name must be unique
among the other group names and user names within its own domain or workgroup.
See also: domain; group name; user account; workgroup
USER object
An object from Window Manager, which includes windows, menus, cursors, icons, hooks,
accelerators, monitors, keyboard layouts, and other internal objects. In Task Manager, the
number of USER objects currently being used by a process.
See also: Task Manager
user password
The password stored in each user's account. Each user generally has a unique user password and
must type that password when logging on or accessing a server.
See also: password; user account
user principal name
A user account name (sometimes referred to as the user logon name) and a domain name
identifying the domain in which the user account is located. This is the standard usage for
logging on to a Windows domain. The format is: user@domain.com (as for an e-mail address).
See also: domain; domain name; user principal name suffix; user account
user principal name suffix
The UPN suffix is the part of the user principal name to the right of the @ character. The default
UPN suffix for a user account is the DNS domain name of the domain that contains the user
account. Alternative UPN suffixes may be added to simplify administration and user logon
processes by providing a single UPN suffix for all users. The UPN suffix is only used within the
Active Directory forest and is not required to be a valid DNS domain name.
See also: Active Directory; user account; domain; domain name; Domain Name System (DNS);
user principal name
user profile
A file that contains configuration information for a specific user, such as desktop settings,
persistent network connections, and application settings. Each user's preferences are saved to a
user profile that Windows uses to configure the desktop each time a user logs on.
user rights
Tasks that a user is permitted to perform on a computer system or domain. There are two types
of user rights: privileges and logon rights. An example of a privilege is the right to shut down the
system. An example of a logon right is the right to log on to a computer locally. Both types are
assigned by administrators to individual users or groups as part of the security settings for the
computer.
See also: administrator; domain; group; privilege
Users
A special group that contains all users who have user permissions on the server. When a
Macintosh user assigns permissions to everyone, those permissions are given to the group's users
and guests.
See also: permission; group
V
V.34
Data transmission standard that provides for up to 33,600 bits per second (bps) communications
over telephone lines. It defines a full-duplex (two-way) modulation technique and includes errorcorrecting and negotiation.
See also: bits per second (bps); full-duplex; modulation standards; V.90
V.90
Data transmission standard that provides for up to 56,000 bits per second (bps) communications
over telephone lines. The transmission speed from the client-side modem is 33,600 bps, the same
as V.34. The transmission speed from the host-side modem, such as an Internet service provider
(ISP) or corporate network, is up to 56,000 bps, with an average speed of 40,000 to 50,000 bps.
When the host-side modem does not support this standard, the alternative is V.34.
See also: bits per second (bps); client; host; Internet service provider (ISP); modem
(modulator/demodulator); modulation standards; V.34
value entry
The string of data that appears in the right pane of a registry window and that defines the value
of the currently selected key. A value entry has three parts: name, data type, and the value itself.
See also: registry; key
variable
In programming, a named storage location capable of containing a certain type of data that can
be modified during program execution.
System environment variables are defined by Windows 2000 Server and are the same no matter
who is logged on to the computer. Administrator group members can add new variables or
change the values, however.
User environment variables can be different for each user of a particular computer. They include
any environment variables you want to define or variables defined by your applications, such as
the path where application files are located.
See also: environment variable
vector
For Indexing Service, an ordered series of words or numbers used in a query. For example, a
single document can have (Scott Cooper; Don Hall; Amy Egert) as a vector of coauthors.
See also: query
vector font
A font rendered from a mathematical model, in which each character is defined as a set of lines
drawn between points. Vector fonts can be cleanly scaled to any size or aspect ratio.
See also: font; plotter font
video adapter
An expansion board that plugs into a personal computer to give it display capabilities. A
computer's display capabilities depend on both the logical circuitry (provided in the video
adapter) and the monitor. Each adapter offers several different video modes. The two basic
categories of video modes are text and graphics. Within the text and graphics modes, some
monitors also offer a choice of resolutions. At lower resolutions a monitor can display more
colors.
Modern adapters contain memory, so that the computer's RAM is not used for storing displays.
In addition, most adapters have their own graphics coprocessor for performing graphics
calculations. These adapters are often called graphics accelerators.
virtual address
In a virtual memory system, the address the application uses to reference memory. The kernel
and the memory management unit (MMU) translate this address into a physical address before
the memory is actually read or written.
See also: virtual memory
virtual container
A container that allows any LDAP-compliant directory to be accessed through Active Directory.
See also: Active Directory; Lightweight Directory Access Protocol (LDAP)
virtual IP address
An IP address that is shared among the hosts of a Network Load Balancing cluster. A Network
Load Balancing cluster might also use multiple virtual IP addresses, for example, in a cluster of
multihomed Web servers.
See also: host; multihomed computer; IP address
virtual local area network (VLAN)
A logical grouping of hosts on one or more LANs that allows communication to occur between
hosts as if they were on the same physical LAN.
See also: host; local area network (LAN)
virtual memory
Temporary storage used by a computer to run programs that need more memory than it has. For
example, programs could have access to 4 gigabytes of virtual memory on a computer's hard
drive, even if the computer has only 32 megabytes of RAM. The program data that does not
currently fit in the computer's memory is saved into paging files.
See also: virtual printer memory; paging file; Virtual Memory Size
Virtual Memory Size
In Task Manager, the amount of virtual memory, or address space, committed to a process.
See also: Task Manager; virtual memory
virtual printer memory
In a PostScript printer, a part of memory that stores font information. The memory in PostScript
printers is divided into two areas: banded memory and virtual memory. The banded memory
contains graphics and page-layout information needed to print your documents. The virtual
memory contains any font information that is sent to your printer either when you print a
document or when you download fonts.
See also: PostScript printer; virtual memory
virtual private network (VPN)
The extension of a private network that encompasses encapsulated, encrypted, and authenticated
links across shared or public networks. VPN connections can provide remote access and routed
connections to private networks over the Internet.
See also: authentication; encryption; remote access; routing; tunnel
virus
A program that attempts to spread from computer to computer and either cause damage (by
erasing or corrupting data) or annoy users (by printing messages or altering what is displayed on
the screen).
VoIP (Voice over Internet Protocol)
A method for sending voice over a LAN, a WAN, or the Internet using TCP/IP packets.
See also: local area network (LAN); Transmission Control Protocol/Internet Protocol (TCP/IP);
wide area network (WAN)
volume
An area of storage on a hard disk. A volume is formatted by using a file system, such as FAT or
NTFS, and has a drive letter assigned to it. You can view the contents of a volume by clicking its
icon in Windows Explorer or in My Computer. A single hard disk can have multiple volumes,
and volumes can also span multiple disks.
See also: disk; drive letter; file allocation table (FAT); NTFS file system; simple volume;
spanned volume
volume set
A partition consisting of disk space on one or more physical disks that was created with
Windows NT 4.0 or earlier. You can delete volume sets only with Windows&nsbsp;2000 or
Windows XP. To create new volumes that span multiple disks, use spanned volumes on dynamic
disks.
See also: basic disk; dynamic disk; partition; spanned volume; volume
volume shadow copy
A volume that represents a duplicate of the original volume taken at the time the copy began.
See also: crash consistency; differential data; volume
voluntary tunnel
A tunnel that is initiated by the client. It tunnels PPP over IP from the client to the tunnel server,
then the data is forwarded to the target host by the tunnel server.
See also: client; host; Internet Protocol (IP); Point-to-Point Protocol (PPP); tunnel; tunnel server
W
Waiting for Call
A telephony signal that Network Connections has put the modem in Listen mode and is waiting
for incoming calls.
See also: Network Connections; modem (modulator/demodulator)
warning level
The point at which users are nearing their quota limit.
See also: quota limit
Web Distributed Authoring and Versioning (WebDAV)
An application protocol related to HTTP 1.1 that allows clients to transparently publish and
manage resources on the World Wide Web.
Web server
A computer that is maintained by a system administrator or Internet service provider (ISP) and
that responds to requests from a user's browser.
See also: Internet service provider (ISP)
WebDAV
See definition for: Web Distributed Authoring and Versioning (WebDAV)
well-connected
Sufficient connectivity to make your network and Active Directory useful to clients on your
network. The precise meaning of well-connected is determined by your particular needs.
See also: Active Directory
wide area network (WAN)
A communications network connecting geographically separated computers, printers, and other
devices. A WAN allows any connected device to interact with any other on the network.
See also: device; local area network (LAN)
wildcard character
A keyboard character that can be used to represent one or many characters when conducting a
query. The question mark (?) represents a single character, and the asterisk (*) represents one or
more characters.
wildcarding
In DNS, the supported use of wildcard characters such as the asterisk (*) in domain names for
DNS queries that resolve to multiple names. When wildcarding is used, DNS servers must
support resolving name queries that use wildcard characters, and resolvers must be able to parse
multiple records from any resource record sets (RRsets) issued in wildcard query responses.
See also: DNS Server; domain name; Domain Name System (DNS); resource record set (RRset);
wildcard character
window
A portion of the screen where programs and processes can be run. You can open several
windows at the same time. For example, you can open your e-mail in one window, work on a
budget in a spreadsheet in another, download pictures from your digital camera in another
window, and order your weekly groceries on the Web in another window. Windows can be
closed, resized, moved, minimized to a button on the taskbar, or maximized to take up the whole
screen.
Windows Internet Name Service (WINS)
A software service that dynamically maps IP addresses to computer names (NetBIOS names).
This allows users to access resources by name instead of requiring them to use IP addresses that
are difficult to recognize and remember. WINS servers support clients running Windows NT 4.0
and earlier versions of Microsoft operating systems.
See also: Domain Name System (DNS); network basic input/output system (NetBIOS); WINS
proxy; resource; service; WINS resource; IP address
Windows Management Instrumentation (WMI)
A management infrastructure in Windows that supports monitoring and controlling system
resources through a common set of interfaces and provides a logically organized, consistent
model of Windows operation, configuration, and status.
See also: resource
Windows Open Services Architecture (WOSA)
A common set of interfaces that connect front-end applications with back-end services.
See also: service
WINS proxy
A computer that listens to name query broadcasts and responds for those names not on the local
subnet. The proxy communicates with a WINS server to resolve names and then caches them for
a specific time period.
See also: subnet; Windows Internet Name Service (WINS)
WINS resource
A resource type that provides Windows Internet Name Service (WINS) from a cluster.
See also: cluster; resource types; Windows Internet Name Service (WINS)
Winsock
Windows Sockets. An application programming interface (API) standard for software that
provides a TCP/IP interface under Windows.
See also: application programming interface (API); Transmission Control Protocol/Internet
Protocol (TCP/IP)
wireless communication
Communication between a computer and another computer or device without wires. The form of
wireless communication provided as part of the Windows operating system uses infrared light to
transmit files. Radio frequencies, as used by cellular and cordless telephones, are another form of
wireless communication.
See also: infrared (IR); infrared device; infrared port
workgroup
A simple grouping of computers, intended only to help users find such things as printers and
shared folders within that group. Workgroups in Windows do not offer the centralized user
accounts and authentication offered by domains.
See also: authentication; domain; user account
working set
For a process, the amount of physical memory assigned to a process by the operating system.
World Wide Web
A system for exploring the Internet by using hyperlinks. When you use a Web browser, the Web
appears as a collection of text, pictures, sounds, and digital movies.
See also: internet
writable CD
Recordable compact disc (CD-R) or rewritable compact disc (CD-RW). Data can be copied to
the CD on more than one occasion. Rewritable compact discs can also be erased.
X
X.509v3 certificate
Version 3 of the ITU-T recommendation X.509 for certificate syntax and format. This is the
standard certificate format used by Windows XP certificate-based processes.
An X.509 certificate includes the public key and information about the person or entity to whom
the certificate is issued, information about the certificate, plus optional information about the
certification authority (CA) issuing the certificate.
See also: International Telecommunication Union - Telecommunication [Standardization Sector]
(ITU-T); certificate; certification authority (CA); public key
x86
Refers to microprocessors that have or emulate the 32-bit Intel processor architecture.
XML (Extensible Markup Language)
See definition for: Extensible Markup Language (XML)
Y
There are no glossary terms that begin with this letter.
Z
zone
In the Macintosh environment, a logical grouping that simplifies browsing the network for
resources, such as servers and printers.
In a DNS database, a manageable unit of the DNS database that is administered by a DNS server.
A zone stores the domain names and data of the domain with a corresponding name, except for
domain names stored in delegated subdomains.
See also: Domain Name System (DNS); partition; resource; DNS Server; domain
zone list
In the Macintosh environment, a list that includes all of the zones associated with a particular
network. Zone list is not to be confused with Windows DNS zones.
See also: Domain Name System (DNS); zone
zone transfer
The synchronization of authoritative DNS data between DNS servers. A DNS server configured
with a secondary zone periodically queries the master DNS servers to synchronize its zone data.
See also: authoritative; DNS Server; secondary master; zone
Download