A list of each user account and group that can access a resource and the permissions for that resource.
The directory service that is included with Windows Server 2003. Active Directory is based on the X.500 standards and those of its predecessor, Lightweight Directory Access Protocol (LDAP). It stores information about objects on a network and makes this information available to applications, users, and network administrators. Active Directory is also used for authentication to network resources, using a single logon process. It provides network administrators a hierarchical view of the network and a single point of administration for all network objects.
A loosely defined set of technologies used by browsers to share information among different applications.
A wireless mode that allows a wireless adapter to connect directly to other computers with wireless adapters without using a wireless access point.
A software module used by browsers to display or play different types of audio or video messages.
Enables you to disable or allow web browser addons and delete unwanted ActiveX controls.
A folder in the Control Panel that contains tools for system administrators and advanced users to manage the computer.
A predefined account that provides complete access to files, directories, services, and other facilities on the computer.
An Extensible Markup Language (XML) file that scripts the answers for a series of graphical user interface (GUI) dialog boxes and other configuration settings, typically to be used to install Windows or other applications.
An address generated by a host when it cannot connect to a DHCP server to get a DHCP address. The Automatic Private IP address will be in the form of 169.254.xxx.xxx and the subnet mask of 255.255.0.0.
A backup/restore application that can be easily configured to periodically back up files on users’ computers.
A tool that enables the user to monitor the state of the battery on mobile computers.
A technology used to encrypt an entire volume on a Windows Vista computer.
Short-range radio technology aimed at simplifying communications among Internet devices and between devices and the Internet. It also aims to simplify data synchronization between Internet devices and other computers.
A connection based on data transmission in which a single medium or wire that can carry several channels simultaneously. Digital Subscriber Line (DSL) and cable modems are often associated with broadband connections.
Software that is part of the Windows Deployment Services that provides end-to-end guidance for planning, building, testing, and deploying Windows Vista.
A binary file (CLG) that contains the state of the settings and packages in a Windows image.
A tool used to check the integrity of disks and correct many types of common errors found on the disk.
Short for compressor/decompressor, software or hardware used to compress and decompress digital media such as a song or video.
The number of bits that determine the number of possible colors on the screen.
Technology used to store or transmit the same amount of data using fewer bits.
A graphical tool used to configure the Windows environment and hardware devices.
A message given to a web browser by a web server, which is typically stored in a text file on the PC’s hard drive. The message is then sent back to the server each time the browser requests a page from the server. The main purpose of cookies is to identify users and possibly prepare customized web pages for them.
Defined elements that can be reused over and over.
The address that points to the newest router so that it communicates with other networks or subnetworks.
The occurrence that slows down hard drive performance because files get stored in separated pieces on the hard drive.
Main screen/graphical space that you see after you turn on your computer and log on to Windows. Like the top of the actual office desk, it serves as a surface for your work.
A program that controls a device by acting like a translator between the device and programs that use the device.
A software component that lists all hardware devices on your computer and allows you to change the properties for any device.
Technology that enables a connection to a network over a public telephone network using an analog or digital modem.
An application programming interface (API) developed by Microsoft for manipulating and displaying three-dimensional objects.
A command-line hard disk configuration utility.
A logical unit of computers that defines a security boundary. A domain uses one database known as Active Directory, which is stored on one or more domain controllers.
A directory service used on TCP/IP networks that translates from host names to IP addresses.
User accounts defined in the Active Directory. Through single sign-on, these accounts can access resources throughout a domain/forest.
Also called a multiboot, an operating system configuration that enables the user to boot the computer system from one of multiple operating systems that are installed on the same hard drive. The operating system that is loaded is given control, typically through a boot management program that will override the original Master Boot Record (MBR) and load instead of an operating system.
Options in Internet Explorer that offer multiple security features to defend your computer against malware and data theft.
A central location that you can use to set up the accessibility settings and programs available in Windows.
A powerful, sophisticated tool that allows users to send text messages and file attachments (documents, pictures, sound, and movies) to anyone with an e-mail address.
A technology used to encrypt folders and files on an NT file system (NTFS) volume.
The process of disguising a message or data in what appears to be meaningless data (cipher text) to hide and protect the sensitive data from unauthorized access.
Type of license used for most software and represents a legal contract between the manufacturer/author and the end user of an application. The EULA details how the software can and cannot be used and any restrictions that the manufacturer imposes.
Permissions that are granted directly to the folder or file. Some of these permissions are granted automatically, such as when a file or folder is created, whereas others have to be assigned manually.
A file system introduced in the second major release of Windows 95 that is an enhancement to the File Allocation Table (FAT) file system. It uses 32-bit FAT entries, which supports hard drives up to 2 TB and supports long filenames.
An older file system used by DOS. FAT is a simple file system that uses minimum memory. Originally, FAT supported filenames of 11 characters, which include the 8 characters for the filename and 3 characters for the file extension, but it has been expanded to support long filenames.
The overall structure in which files are named, stored, and organized. Files systems used in Windows Vista include FAT, FAT32, and NTFS.
Simple pen gestures used to execute commands or actions.
A collection of characters (letters, numerals, symbols, and punctuation marks) that have common characteristics.
Sometimes referred to as just domain names, FQDNs are used to identify computers on a TCP/IP network.
Easy-to-use mini programs (tools) that give you information at a glance for frequently performed tasks such as checking the weather, checking the time (via a digital clock), and checking e-mail (without opening other programs).
A predefined account that is designed for users who need one-time or occasional access.
A method to shut down your computer that saves the contents of the system memory to a file (Hiberfil.sys) on the hard disk. Because it is saved to the hard disk, no power is required to maintain this state. When you boot your computer, you can then continue where you left off within a short time.
A file used to translate the host name to IP address.
A combination of Sleep and Hibernate that saves your work to your hard disk and puts your mobile PC into a powersaving state. If you suffer a power failure on a computer when it is in a Hybrid Sleep state, your data will not be lost.
A command-line tool that captures, modifies, and applies installation images for deployment in a manufacturing or corporate environment.
Adapter connects to a wireless access point.
Permissions that flow down from the folder into the subfolders and files, indirectly giving them permissions to a user or group.
Software found on Windows that enables the user to view web pages.
A set of protocols developed used to support secure exchange of packets at the IP layer.
A company that provides access to the Internet.
A unique address that certain electronic devices used to identify and communicate with each other on a computer network utilizing the Internet Protocol (IP) standard.
A command used on Windows computers that shows the TCP/IP configuration of a host.
The version of the Internet Protocol that supports 32-bit addresses, which allows up to 4,294,967,296 possible unique addresses.
The newest version of the Internet Protocol that supports 128-bit addresses that allows up to 3.403 x 1038 unique host interface addresses.
Unsolicited e-mail or advertisements, flyers, and catalogs that may or may not contain fraudulent schemes and pornography. Junk e-mail often includes viruses and other forms of malware.
A technology that queries each device to determine its capabilities and to determine the topology of the network.
A file used to translate the NetBIOS computer name to an IP address.
User accounts defined on a local computer, which have access to the local computer only.
Software designed specifically to damage or disrupt a system, such as a virus or Trojan horse.
A utility used to test memory for a wide assortment of problems.
An application that provides a common interface to administer Windows-based environments using snap-ins.
Standards developed by the Moving Pictures Experts Group that define video format.
A common format used on most video DVDs.
A tool that helps resolve network-related issues.
A text editor included in Windows.
A software component on the taskbar that includes a clock and small icons that show the status of certain programs and computer settings.
A command that displays information that you can use to diagnose your DNS infrastructure.
The preferred file system used in Windows XP and Windows Vista that supports large hard drives, is more reliable then previous file systems, and offers security through NTFS permissions and encryption. It also offers compression.
Technology that saves a copy of files that are accessed over a network so that it can be accessed when you are not connected to the network. When you do connect to the network, the files will be synchronized.
A filter used in firewalls that protect the computer by using an access control list (ACL), which specifies which packets are allowed through the firewall based on IP address and protocol (specifically the port number).
A file on the disk that is used as memory.
A software component, mostly designed to protect children while they are online, that allows you to restrict websites and programs and to set time limits.
The overall effectiveness of how data moves through the system.
Defines the type of access that is granted to an object or object attribute.
The act of sending an e-mail to a user falsely claiming to be an organization in an attempt to trick the user into giving private information that will be used for identity theft. The e-mail directs users to visit a website where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers.
A command that uses Internet Control Message Protocol (ICMP) packets to test connectivity to a host on a TCP/IP network.
Short for picture element, a single point or dot in a graphic image.
Technology that gives the ability of a computer system to automatically configure expansion boards and other devices.
Technology used in browsers to help block most pop-up windows.
An endpoint to a logical connection that is identified by a port number. For example, port 80 is used for HTTP traffic.
Formerly known as power schemes in earlier versions of Windows, a collection of hardware and system settings that manages how your computer uses and conserves power.
A mode used when displaying presentations that disables screen saves, adjusts the speaker volume, and changes the desktop background image.
Technology that automatically creates daily backup copies of files and folders. If you enable this feature by creating a System Protection Point, you can restore previous versions of the document.
A new control panel that enables users to see previously sent problems and any solutions or additional information that is available.
A mode used in Internet Explorer used to prevent websites from saving or installing programs on a computer.
A shared folder that is designed to enable users to share files and folders from a single location quickly and easily.
Lets you start programs with one click.
Also known as Rich Site Summary, an XML format for syndicating web content.
Technology that boosts system performance by using USB flash devices as additional sources for caching.
Technology that boosts system performance on mobile computers equipped with hybrid drives.
A term that describes the number of times it is refreshed or redrawn per second (hertz).
A code used by optical drives and disks used to prevent CDs and DVDs from being played in countries in which the CD or DVD was not made for.
A measure of how often a system deviates from configured, expected behavior. Reliability problems occur as the result of application crashes, service freezes and restarts, driver initialization failures, and operating system failures.
A server that allows remote users who are not connected to a network using dial-up or virtual private networking (VPN) technology to gain access to files and print services on the LAN from a remote location.
Technology that enables you to piggy-back on a user’s session, usually used to troubleshoot problems.
Technology that enables you to remotely control a PC.
A format used by word processing documents that define fonts, colors, and pictures.
Authorizes a user to perform certain actions on a computer, such as logging on to a system interactively or back up files and directories.
A list found in e-mail programs that specifies those users who are trusted to receive e-mail from.
Starting Windows in a mode with a basic GUI interface that runs only essential system services, typically used to troubleshoot startup problems.
The screen resolution describes the sharpness and clarity of an image by signifying the number of dots (pixels) on the entire screen, usually described as the number of pixels going across and the number of pixels going down.
A software component found with the Start menu that allows you to find things quickly by searching programs, all the folders in your personal folder (which includes Documents, Pictures, Music, Desktop, and other common locations), your e-mail messages, saved instant messages, appointments, contacts, your Internet favorites, and Internet history.
A protocol that defines a series of commands used to pass information between networked computers using NetBIOS.
An update to a software version that fixes an existing problem, such as a bug, or provides enhancements to the product that will appear in the next version of the product. Usually multiple updates and fixes are packaged together into a single service pack.
A 32- character unique identifier attached to the header of packets sent over a wireless LAN (WLAN) that acts as a password when a mobile device tries to connect to an access point.
A folder that is shared or made available to users on the network.
A pane on the side of the Microsoft Windows Vista desktop where you can keep your gadgets organized and always available.
A device driver that includes a digital signature, which is an electronic security mark that can indicate the publisher of the software and information that can show whether a driver has been altered.
A power-saving state that saves work and opens programs to memory. To maintain the contents of memory while the computer is in Sleep mode, the system still consumes a small amount of power. The advantage of Sleep mode is that you can continue where you left off, typically within a few seconds.
Technology that allows the user to activate the computer by voice.
Any software that gathers user information through the user’s Internet connection without his or her knowledge, usually for advertising purposes or to steal private information. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet.
The account to use for everyday computing that lets a person use most of the capabilities of the computer.
A type of shared folder that offers more security than a public shared folder.
A software component that enables you to start programs, access folders, make changes to Windows Vista, access help, log off the computer, switch to a different user account, or turn off the computer.
A tool used to automatically fix many common problems, including incompatible drivers, missing or corrupted startup configuration settings, and corrupted startup files.
A technology used in firewalls that monitors the state of active connections and uses the information gained to determine which network packets are allowed through the firewall. Typically, if the user starts communicating with an outside computer, it will remember the conversation and allow the appropriate packets back in. If an outside computer tries to start communicating with a computer protected by a stateful firewall, those packets will automatically be dropped unless it was granted by the access control list (ACL).
Numbers/bits that resemble an IP address used to define which bits describe the network number and which bits describe the host address.
Software that enables you to keep data synchronized with another computer.
The utility that facilitates image creation for deployment to multiple destination computers. Sysprep prepares an installed system ready to be duplicated as an image by removing the original security identifiers (SIDs) from the image, and cleaning up various user and machine settings and log files.
An advanced tool used to identify problems that might prevent Windows from starting correctly.
A benchmark used by Windows Vista and certain applications such as games to monitor and adjust the system for optimum performance.
Minimum hardware or software to run, install, or use a hardware or software component.
A tool used to restore a computer’s system files to an earlier point in time.
A fully functioning compact PC.
The long, horizontal bar at the bottom of your screen. By default, the taskbar is always on top, making it always visible even after you open several windows or programs. The taskbar contains the Start button, Quick Launch toolbar, and the notification area.
This Internet protocol suite is the set of communications protocols that implements the protocol stack on which the Internet and many commercial networks run. TCP/IP is named after two of the most important protocols in the protocol suite: the Transmission Control Protocol (TCP) and the Internet Protocol (IP).
A basic file that contains only alphanumeric characters and does not include formatting codes such as margins, fonts, colors, or pictures.
A collection of visual elements and sounds for your computer desktop. A theme determines the look of the various visual elements of your desktop, such as windows, icons, fonts, and colors, and it can include sounds.
A command, based on Internet Control Message Protocol (ICMP) packets, that traces the route that a packet takes to a destination and displays the series of IP routers that are used in delivering packets to the destination.
A microchip that is built in to a computer and used to store cryptographic information, such as encryption keys. It is used by BitLocker Drive Encryption.
A computer that has graphics chips built in to the motherboard that use part of the computer’s main memory for video memory.
A common syntax to describe the location of a network resource, such as a shared file, directory, or printer. The UNC syntax for Windows systems is \computernamesharedfolderresource.
Enables a user to log on to a computer or domain with an identity that can be authenticated and authorized for access to the resources of the computer or domain. Because the user account is meant to be assigned to one and only one user, it allows you to assign rights and permissions to a single user and gives the ability to track what users are doing (accountability).
A feature in Windows that can help prevent unauthorized changes to your computer.
Software that migrates the files and settings to a removable media or to a network share and later restores the files and settings to the target computer.
Technology that uses disk space for memory (RAM).
A network connection generated by creating secured, point-to-point connections across a private network or a public network such as the Internet. A virtual private networking client uses special TCP/IP-based protocols, called tunneling protocols, to make a virtual call to a virtual port on a virtual private networking service, and it is secured by using encryption technology to secure the communication channel.
A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes, often causing a wide range of problems. Viruses can also replicate themselves.
A software that detects and removes viruses and other forms of malware.
Used to simplify the process of setting up a new computer, a software component that shows tasks you’ll most likely want to complete when you set up your computer into a single location.
A wireless encryption scheme that provides strong data encryption via Temporal Key Integrity Protocol (TKIP).
A process that authorizes Microsoft Windows to fully function.
An interface used in Windows Vista that features a transparent glass design with subtle window animations, new window colors, Windows Flip 3D, and taskbar previews for your open windows.
A new calendar and task application found in Windows Vista.
Software included with Windows Vista that detects and removes known spyware and other potentially unwanted software.
An updated and redesigned version of Remote Installation Services (RIS) that is installed on Windows Server 2003 to be used to rapidly and remotely deploy Windows operating systems.
A driver technology developed by Microsoft that channels some of the work of the device driver into portions of the code that are integrated into the operating system. These portions of code handle all of the low-level buffer management, including DMA and plug-and-play device enumeration. The WDM device driver becomes more streamlined with less code and works at greater efficiency.
A program that provides the capability to create video DVDs based on a user’s content.
Software that performs a side-by-side migration to migrate the settings to a new computer that is already running Windows Vista using removable media or over a network.
A tool found in Windows Vista that enables you to fax and scan documents.
Software included with Windows Vista to protect a computer connected through a network.
A single compressed file that contains a collection of files and folders that duplicate a Windows installation on a disk volume.
A directory service used on TCP/IP networks that translates computer NetBIOS names into IP addresses.
A replacement for Outlook Express used to send, receive, and organize e-mail. Different from Outlook Express, Windows Mail includes a completely replaced mail store (data base/file that stores all of the individual e-mail messages) that improves stability and enables real-time search. It also includes enhanced security that includes a Phishing Filter and a Junk Mail Filter, both of which are regularly updated through Windows Update.
Provides an application to view TV programs and to record and play back TV programs, DVD, video, and music and photos. As part of the Media Center controls, it includes a large-font interface that can be seen up to 10-feet away.
Software that enables you to play most media files with an easy-to-use, intuitive interface.
A program that replaces Microsoft NetMeeting that allows you share applications (or your entire desktop) with other users on the local network, or over the Internet using peer-to-peer technology.
A new control panel that allows you to view and control the settings for mobile computers, including brightness, sound, battery level, power scheme selection, wireless network, and presentation settings.
A tool used to disable USB connections and Bluetooth connections.
A photo and movie library management application that allows the user to import JPG files from digital cameras, tag and rate individual items, adjust colors and exposure, create and display slideshows (with pan and fade effects), and burn slideshows to DVD.
A bootable tool that replaces MS-DOS as the preinstallation environment used to install, troubleshoot, and recover Windows.
Short for Pre-Boot Execution Environment, this technology allows a computer to boot from a server on a network instead of booting from the operating system on the local hard drive.
A Microsoft Management Console (MMC) snap-in that provides tools for analyzing system performance.
The program that installs the Windows Vista operating system.
New technology in Windows Vista that supports a secondary screen on your mobile PC. With this additional display, you can view important information whether your laptop is on, off, or in Sleep mode. For instance, you can run Windows Media Player or check e-mail.
A tool that enables you to create answer files and network shares or to modify the files contained in a configuration set.
The latest workstation release of Microsoft Windows operating system that is designed for both home and business users.
An inventory, assessment, and reporting tool that finds computers on a network and determines whether they are ready to run the Windows Vista operating system. The Windows Vista Hardware Assessment solution accelerator performs three key functions: hardware inventory, compatibility analysis, and readiness reporting.
A Windows recovery tool that can fix certain problems, such as missing or damaged system files that might prevent Windows from starting correctly.
Software that analyzes a computer to determine whether it will support Windows Vista.
A basic wireless encryption scheme used to encrypt all data sent over a wireless network. It should be noted that it is easy for someone with a little knowledge or experience to break the shared key because it doesn’t change automatically over time. Therefore, it is recommended you use a higher form of wireless encryption then WEP.
A network that communicates with radio or infrared signals rather than electrical or light signals sent over copper wire or fiber.
A basic word processor included in Windows.
A wireless encryption scheme that provides strong data encryption via Advanced Encryption Standard (AES).
18.116.65.130