Glossary

Numbers

802.11 standard

An Institute of Electrical and Electronic Engineers (IEEE) set of wireless LAN standards.

A

Access Control List (ACL)

A list of each user account and group that can access a resource and the permissions for that resource.

active directory

The directory service that is included with Windows Server 2003. Active Directory is based on the X.500 standards and those of its predecessor, Lightweight Directory Access Protocol (LDAP). It stores information about objects on a network and makes this information available to applications, users, and network administrators. Active Directory is also used for authentication to network resources, using a single logon process. It provides network administrators a hierarchical view of the network and a single point of administration for all network objects.

activex controls

A loosely defined set of technologies used by browsers to share information among different applications.

Ad Hoc mode

A wireless mode that allows a wireless adapter to connect directly to other computers with wireless adapters without using a wireless access point.

add-on (Internet Explorer)

A software module used by browsers to display or play different types of audio or video messages.

Add-on Manager

Enables you to disable or allow web browser addons and delete unwanted ActiveX controls.

administrative tools

A folder in the Control Panel that contains tools for system administrators and advanced users to manage the computer.

administrator account

A predefined account that provides complete access to files, directories, services, and other facilities on the computer.

answer file

An Extensible Markup Language (XML) file that scripts the answers for a series of graphical user interface (GUI) dialog boxes and other configuration settings, typically to be used to install Windows or other applications.

Automatic Private IP

An address generated by a host when it cannot connect to a DHCP server to get a DHCP address. The Automatic Private IP address will be in the form of 169.254.xxx.xxx and the subnet mask of 255.255.0.0.

B

backup and restore center

A backup/restore application that can be easily configured to periodically back up files on users’ computers.

battery meter

A tool that enables the user to monitor the state of the battery on mobile computers.

bitlocker drive encryption

A technology used to encrypt an entire volume on a Windows Vista computer.

bluetooth

Short-range radio technology aimed at simplifying communications among Internet devices and between devices and the Internet. It also aims to simplify data synchronization between Internet devices and other computers.

broadband connection

A connection based on data transmission in which a single medium or wire that can carry several channels simultaneously. Digital Subscriber Line (DSL) and cable modems are often associated with broadband connections.

Business Desktop Deployment Solution Accelerator 2007 (BDD 2007)

Software that is part of the Windows Deployment Services that provides end-to-end guidance for planning, building, testing, and deploying Windows Vista.

C

catalog

A binary file (CLG) that contains the state of the settings and packages in a Windows image.

check disk tool (chkdsk)

A tool used to check the integrity of disks and correct many types of common errors found on the disk.

codecs

Short for compressor/decompressor, software or hardware used to compress and decompress digital media such as a song or video.

color depth

The number of bits that determine the number of possible colors on the screen.

compression

Technology used to store or transmit the same amount of data using fewer bits.

control panel

A graphical tool used to configure the Windows environment and hardware devices.

cookie

A message given to a web browser by a web server, which is typically stored in a text file on the PC’s hard drive. The message is then sent back to the server each time the browser requests a page from the server. The main purpose of cookies is to identify users and possibly prepare customized web pages for them.

D

data collector set (DCS)

Defined elements that can be reused over and over.

default gateway

The address that points to the newest router so that it communicates with other networks or subnetworks.

defragmentation

The occurrence that slows down hard drive performance because files get stored in separated pieces on the hard drive.

desktop

Main screen/graphical space that you see after you turn on your computer and log on to Windows. Like the top of the actual office desk, it serves as a surface for your work.

device drivers

A program that controls a device by acting like a translator between the device and programs that use the device.

device manager

A software component that lists all hardware devices on your computer and allows you to change the properties for any device.

dial-up connection

Technology that enables a connection to a network over a public telephone network using an analog or digital modem.

Direct3D

An application programming interface (API) developed by Microsoft for manipulating and displaying three-dimensional objects.

diskpart

A command-line hard disk configuration utility.

domain

A logical unit of computers that defines a security boundary. A domain uses one database known as Active Directory, which is stored on one or more domain controllers.

Domain Name System (DNS)

A directory service used on TCP/IP networks that translates from host names to IP addresses.

domain user accounts

User accounts defined in the Active Directory. Through single sign-on, these accounts can access resources throughout a domain/forest.

dual boot

Also called a multiboot, an operating system configuration that enables the user to boot the computer system from one of multiple operating systems that are installed on the same hard drive. The operating system that is loaded is given control, typically through a boot management program that will override the original Master Boot Record (MBR) and load instead of an operating system.

dynamic security

Options in Internet Explorer that offer multiple security features to defend your computer against malware and data theft.

E

ease of access center

A central location that you can use to set up the accessibility settings and programs available in Windows.

e-mail

A powerful, sophisticated tool that allows users to send text messages and file attachments (documents, pictures, sound, and movies) to anyone with an e-mail address.

Encrypting File System (EFS)

A technology used to encrypt folders and files on an NT file system (NTFS) volume.

encryption

The process of disguising a message or data in what appears to be meaningless data (cipher text) to hide and protect the sensitive data from unauthorized access.

End User License Agreement (EULA)

Type of license used for most software and represents a legal contract between the manufacturer/author and the end user of an application. The EULA details how the software can and cannot be used and any restrictions that the manufacturer imposes.

explicit permissions

Permissions that are granted directly to the folder or file. Some of these permissions are granted automatically, such as when a file or folder is created, whereas others have to be assigned manually.

F

FAT32

A file system introduced in the second major release of Windows 95 that is an enhancement to the File Allocation Table (FAT) file system. It uses 32-bit FAT entries, which supports hard drives up to 2 TB and supports long filenames.

File Allocation Table (FAT)

An older file system used by DOS. FAT is a simple file system that uses minimum memory. Originally, FAT supported filenames of 11 characters, which include the 8 characters for the filename and 3 characters for the file extension, but it has been expanded to support long filenames.

file system

The overall structure in which files are named, stored, and organized. Files systems used in Windows Vista include FAT, FAT32, and NTFS.

flicks

Simple pen gestures used to execute commands or actions.

fonts

A collection of characters (letters, numerals, symbols, and punctuation marks) that have common characteristics.

fully qualified domain name (FQDNs)

Sometimes referred to as just domain names, FQDNs are used to identify computers on a TCP/IP network.

G

gadgets

Easy-to-use mini programs (tools) that give you information at a glance for frequently performed tasks such as checking the weather, checking the time (via a digital clock), and checking e-mail (without opening other programs).

guest account

A predefined account that is designed for users who need one-time or occasional access.

H

hibernate mode

A method to shut down your computer that saves the contents of the system memory to a file (Hiberfil.sys) on the hard disk. Because it is saved to the hard disk, no power is required to maintain this state. When you boot your computer, you can then continue where you left off within a short time.

HOSTS file

A file used to translate the host name to IP address.

hybrid sleep mode

A combination of Sleep and Hibernate that saves your work to your hard disk and puts your mobile PC into a powersaving state. If you suffer a power failure on a computer when it is in a Hybrid Sleep state, your data will not be lost.

I

ImageX

A command-line tool that captures, modifies, and applies installation images for deployment in a manufacturing or corporate environment.

infrastructure mode

Adapter connects to a wireless access point.

inherited permissions

Permissions that flow down from the folder into the subfolders and files, indirectly giving them permissions to a user or group.

Internet Explorer (IE)

Software found on Windows that enables the user to view web pages.

Internet Protocol Security (IPSec)

A set of protocols developed used to support secure exchange of packets at the IP layer.

Internet service provider (ISP)

A company that provides access to the Internet.

IP address

A unique address that certain electronic devices used to identify and communicate with each other on a computer network utilizing the Internet Protocol (IP) standard.

ipconfig command

A command used on Windows computers that shows the TCP/IP configuration of a host.

IPv4

The version of the Internet Protocol that supports 32-bit addresses, which allows up to 4,294,967,296 possible unique addresses.

IPv6

The newest version of the Internet Protocol that supports 128-bit addresses that allows up to 3.403 x 1038 unique host interface addresses.

J–L

junk e-mail

Unsolicited e-mail or advertisements, flyers, and catalogs that may or may not contain fraudulent schemes and pornography. Junk e-mail often includes viruses and other forms of malware.

Link Layer Topology Discovery (LLDT)

A technology that queries each device to determine its capabilities and to determine the topology of the network.

LMHOSTS file

A file used to translate the NetBIOS computer name to an IP address.

local user accounts

User accounts defined on a local computer, which have access to the local computer only.

M

malware

Software designed specifically to damage or disrupt a system, such as a virus or Trojan horse.

memory diagnostic tool

A utility used to test memory for a wide assortment of problems.

Microsoft Management Console (MMC)

An application that provides a common interface to administer Windows-based environments using snap-ins.

MPEG standard

Standards developed by the Moving Pictures Experts Group that define video format.

MPEG-2

A common format used on most video DVDs.

N

network diagnostic tool

A tool that helps resolve network-related issues.

notepad

A text editor included in Windows.

notification area

A software component on the taskbar that includes a clock and small icons that show the status of certain programs and computer settings.

nslookup command

A command that displays information that you can use to diagnose your DNS infrastructure.

NTFS (NT File System)

The preferred file system used in Windows XP and Windows Vista that supports large hard drives, is more reliable then previous file systems, and offers security through NTFS permissions and encryption. It also offers compression.

O–P

offline folder

Technology that saves a copy of files that are accessed over a network so that it can be accessed when you are not connected to the network. When you do connect to the network, the files will be synchronized.

packet filter

A filter used in firewalls that protect the computer by using an access control list (ACL), which specifies which packets are allowed through the firewall based on IP address and protocol (specifically the port number).

paging file (pagefile.sys)

A file on the disk that is used as memory.

parental controls

A software component, mostly designed to protect children while they are online, that allows you to restrict websites and programs and to set time limits.

performance

The overall effectiveness of how data moves through the system.

permissions

Defines the type of access that is granted to an object or object attribute.

phishing

The act of sending an e-mail to a user falsely claiming to be an organization in an attempt to trick the user into giving private information that will be used for identity theft. The e-mail directs users to visit a website where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers.

ping command

A command that uses Internet Control Message Protocol (ICMP) packets to test connectivity to a host on a TCP/IP network.

pixel

Short for picture element, a single point or dot in a graphic image.

plug-and-play

Technology that gives the ability of a computer system to automatically configure expansion boards and other devices.

pop-up blocker

Technology used in browsers to help block most pop-up windows.

port

An endpoint to a logical connection that is identified by a port number. For example, port 80 is used for HTTP traffic.

power plans

Formerly known as power schemes in earlier versions of Windows, a collection of hardware and system settings that manages how your computer uses and conserves power.

presentation mode

A mode used when displaying presentations that disables screen saves, adjusts the speaker volume, and changes the desktop background image.

previous versions

Technology that automatically creates daily backup copies of files and folders. If you enable this feature by creating a System Protection Point, you can restore previous versions of the document.

problem reports and solutions

A new control panel that enables users to see previously sent problems and any solutions or additional information that is available.

protected mode

A mode used in Internet Explorer used to prevent websites from saving or installing programs on a computer.

public folder

A shared folder that is designed to enable users to share files and folders from a single location quickly and easily.

Q–R

quick launch toolbar

Lets you start programs with one click.

RDF Site Summary (RSS)

Also known as Rich Site Summary, an XML format for syndicating web content.

ReadyBoost

Technology that boosts system performance by using USB flash devices as additional sources for caching.

ReadyDrive

Technology that boosts system performance on mobile computers equipped with hybrid drives.

refresh rate

A term that describes the number of times it is refreshed or redrawn per second (hertz).

region

A code used by optical drives and disks used to prevent CDs and DVDs from being played in countries in which the CD or DVD was not made for.

reliability

A measure of how often a system deviates from configured, expected behavior. Reliability problems occur as the result of application crashes, service freezes and restarts, driver initialization failures, and operating system failures.

Remote Access Server (RAS)

A server that allows remote users who are not connected to a network using dial-up or virtual private networking (VPN) technology to gain access to files and print services on the LAN from a remote location.

remote assistance

Technology that enables you to piggy-back on a user’s session, usually used to troubleshoot problems.

remote desktop

Technology that enables you to remotely control a PC.

rich text format

A format used by word processing documents that define fonts, colors, and pictures.

right

Authorizes a user to perform certain actions on a computer, such as logging on to a system interactively or back up files and directories.

S

safe list

A list found in e-mail programs that specifies those users who are trusted to receive e-mail from.

safe mode

Starting Windows in a mode with a basic GUI interface that runs only essential system services, typically used to troubleshoot startup problems.

screen resolution

The screen resolution describes the sharpness and clarity of an image by signifying the number of dots (pixels) on the entire screen, usually described as the number of pixels going across and the number of pixels going down.

search box

A software component found with the Start menu that allows you to find things quickly by searching programs, all the folders in your personal folder (which includes Documents, Pictures, Music, Desktop, and other common locations), your e-mail messages, saved instant messages, appointments, contacts, your Internet favorites, and Internet history.

Server Message Block (SMB)

A protocol that defines a series of commands used to pass information between networked computers using NetBIOS.

service pack

An update to a software version that fixes an existing problem, such as a bug, or provides enhancements to the product that will appear in the next version of the product. Usually multiple updates and fixes are packaged together into a single service pack.

service set identifier (SSID)

A 32- character unique identifier attached to the header of packets sent over a wireless LAN (WLAN) that acts as a password when a mobile device tries to connect to an access point.

shared folder

A folder that is shared or made available to users on the network.

sidebar

A pane on the side of the Microsoft Windows Vista desktop where you can keep your gadgets organized and always available.

signed driver

A device driver that includes a digital signature, which is an electronic security mark that can indicate the publisher of the software and information that can show whether a driver has been altered.

sleep mode

A power-saving state that saves work and opens programs to memory. To maintain the contents of memory while the computer is in Sleep mode, the system still consumes a small amount of power. The advantage of Sleep mode is that you can continue where you left off, typically within a few seconds.

speech recognition

Technology that allows the user to activate the computer by voice.

spyware

Any software that gathers user information through the user’s Internet connection without his or her knowledge, usually for advertising purposes or to steal private information. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet.

standard account

The account to use for everyday computing that lets a person use most of the capabilities of the computer.

standard file sharing

A type of shared folder that offers more security than a public shared folder.

start menu

A software component that enables you to start programs, access folders, make changes to Windows Vista, access help, log off the computer, switch to a different user account, or turn off the computer.

Startup Repair Tool (STR)

A tool used to automatically fix many common problems, including incompatible drivers, missing or corrupted startup configuration settings, and corrupted startup files.

stateful firewall

A technology used in firewalls that monitors the state of active connections and uses the information gained to determine which network packets are allowed through the firewall. Typically, if the user starts communicating with an outside computer, it will remember the conversation and allow the appropriate packets back in. If an outside computer tries to start communicating with a computer protected by a stateful firewall, those packets will automatically be dropped unless it was granted by the access control list (ACL).

subnet mask

Numbers/bits that resemble an IP address used to define which bits describe the network number and which bits describe the host address.

sync center

Software that enables you to keep data synchronized with another computer.

sysprep

The utility that facilitates image creation for deployment to multiple destination computers. Sysprep prepares an installed system ready to be duplicated as an image by removing the original security identifiers (SIDs) from the image, and cleaning up various user and machine settings and log files.

system configuration tool (msconfig)

An advanced tool used to identify problems that might prevent Windows from starting correctly.

system performance assessment

A benchmark used by Windows Vista and certain applications such as games to monitor and adjust the system for optimum performance.

system requirements

Minimum hardware or software to run, install, or use a hardware or software component.

system restore

A tool used to restore a computer’s system files to an earlier point in time.

T

Tablet PC

A fully functioning compact PC.

taskbar

The long, horizontal bar at the bottom of your screen. By default, the taskbar is always on top, making it always visible even after you open several windows or programs. The taskbar contains the Start button, Quick Launch toolbar, and the notification area.

TCP/IP

This Internet protocol suite is the set of communications protocols that implements the protocol stack on which the Internet and many commercial networks run. TCP/IP is named after two of the most important protocols in the protocol suite: the Transmission Control Protocol (TCP) and the Internet Protocol (IP).

text file

A basic file that contains only alphanumeric characters and does not include formatting codes such as margins, fonts, colors, or pictures.

theme

A collection of visual elements and sounds for your computer desktop. A theme determines the look of the various visual elements of your desktop, such as windows, icons, fonts, and colors, and it can include sounds.

tracert command

A command, based on Internet Control Message Protocol (ICMP) packets, that traces the route that a packet takes to a destination and displays the series of IP routers that are used in delivering packets to the destination.

Trusted Platform Module (TPM)

A microchip that is built in to a computer and used to store cryptographic information, such as encryption keys. It is used by BitLocker Drive Encryption.

U

Unified Memory Architecture (UMA)

A computer that has graphics chips built in to the motherboard that use part of the computer’s main memory for video memory.

Universal Naming Convention (UNC)

A common syntax to describe the location of a network resource, such as a shared file, directory, or printer. The UNC syntax for Windows systems is \computernamesharedfolderresource.

user account

Enables a user to log on to a computer or domain with an identity that can be authenticated and authorized for access to the resources of the computer or domain. Because the user account is meant to be assigned to one and only one user, it allows you to assign rights and permissions to a single user and gives the ability to track what users are doing (accountability).

User Account Control (UAC)

A feature in Windows that can help prevent unauthorized changes to your computer.

User State Migration Tool (USMT)

Software that migrates the files and settings to a removable media or to a network share and later restores the files and settings to the target computer.

V

virtual memory

Technology that uses disk space for memory (RAM).

Virtual Private Network (VPN)

A network connection generated by creating secured, point-to-point connections across a private network or a public network such as the Internet. A virtual private networking client uses special TCP/IP-based protocols, called tunneling protocols, to make a virtual call to a virtual port on a virtual private networking service, and it is secured by using encryption technology to secure the communication channel.

virus

A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes, often causing a wide range of problems. Viruses can also replicate themselves.

virus scanner

A software that detects and removes viruses and other forms of malware.

W

welcome center

Used to simplify the process of setting up a new computer, a software component that shows tasks you’ll most likely want to complete when you set up your computer into a single location.

Wi-Fi Protected Access (WPA)

A wireless encryption scheme that provides strong data encryption via Temporal Key Integrity Protocol (TKIP).

windows activation

A process that authorizes Microsoft Windows to fully function.

windows aero

An interface used in Windows Vista that features a transparent glass design with subtle window animations, new window colors, Windows Flip 3D, and taskbar previews for your open windows.

windows calendar

A new calendar and task application found in Windows Vista.

windows defender

Software included with Windows Vista that detects and removes known spyware and other potentially unwanted software.

Windows Deployment Service

An updated and redesigned version of Remote Installation Services (RIS) that is installed on Windows Server 2003 to be used to rapidly and remotely deploy Windows operating systems.

Windows Display Driver Model (WDM)

A driver technology developed by Microsoft that channels some of the work of the device driver into portions of the code that are integrated into the operating system. These portions of code handle all of the low-level buffer management, including DMA and plug-and-play device enumeration. The WDM device driver becomes more streamlined with less code and works at greater efficiency.

Windows DVD Maker

A program that provides the capability to create video DVDs based on a user’s content.

Windows Easy Transfer (WET)

Software that performs a side-by-side migration to migrate the settings to a new computer that is already running Windows Vista using removable media or over a network.

Windows Fax and Scan

A tool found in Windows Vista that enables you to fax and scan documents.

windows firewall

Software included with Windows Vista to protect a computer connected through a network.

windows image

A single compressed file that contains a collection of files and folders that duplicate a Windows installation on a disk volume.

Windows Internet Naming Service (WINS)

A directory service used on TCP/IP networks that translates computer NetBIOS names into IP addresses.

windows mail

A replacement for Outlook Express used to send, receive, and organize e-mail. Different from Outlook Express, Windows Mail includes a completely replaced mail store (data base/file that stores all of the individual e-mail messages) that improves stability and enables real-time search. It also includes enhanced security that includes a Phishing Filter and a Junk Mail Filter, both of which are regularly updated through Windows Update.

windows media center

Provides an application to view TV programs and to record and play back TV programs, DVD, video, and music and photos. As part of the Media Center controls, it includes a large-font interface that can be seen up to 10-feet away.

windows media player

Software that enables you to play most media files with an easy-to-use, intuitive interface.

windows meeting space

A program that replaces Microsoft NetMeeting that allows you share applications (or your entire desktop) with other users on the local network, or over the Internet using peer-to-peer technology.

windows mobility center

A new control panel that allows you to view and control the settings for mobile computers, including brightness, sound, battery level, power scheme selection, wireless network, and presentation settings.

windows mobility device center

A tool used to disable USB connections and Bluetooth connections.

windows photo gallery

A photo and movie library management application that allows the user to import JPG files from digital cameras, tag and rate individual items, adjust colors and exposure, create and display slideshows (with pan and fade effects), and burn slideshows to DVD.

Windows Preinstallation Environment (Windows PE)

A bootable tool that replaces MS-DOS as the preinstallation environment used to install, troubleshoot, and recover Windows.

Windows PXE

Short for Pre-Boot Execution Environment, this technology allows a computer to boot from a server on a network instead of booting from the operating system on the local hard drive.

Windows Reliability and Performance Monitor

A Microsoft Management Console (MMC) snap-in that provides tools for analyzing system performance.

Windows Setup (Setup.exe)

The program that installs the Windows Vista operating system.

windows sideshow

New technology in Windows Vista that supports a secondary screen on your mobile PC. With this additional display, you can view important information whether your laptop is on, off, or in Sleep mode. For instance, you can run Windows Media Player or check e-mail.

Windows System Image Manager (Windows SIM)

A tool that enables you to create answer files and network shares or to modify the files contained in a configuration set.

windows vista

The latest workstation release of Microsoft Windows operating system that is designed for both home and business users.

windows vista hardware assessment tool

An inventory, assessment, and reporting tool that finds computers on a network and determines whether they are ready to run the Windows Vista operating system. The Windows Vista Hardware Assessment solution accelerator performs three key functions: hardware inventory, compatibility analysis, and readiness reporting.

windows vista startup repair

A Windows recovery tool that can fix certain problems, such as missing or damaged system files that might prevent Windows from starting correctly.

windows vista upgrade advisor

Software that analyzes a computer to determine whether it will support Windows Vista.

Wireless Equivalency Protection (WEP)

A basic wireless encryption scheme used to encrypt all data sent over a wireless network. It should be noted that it is easy for someone with a little knowledge or experience to break the shared key because it doesn’t change automatically over time. Therefore, it is recommended you use a higher form of wireless encryption then WEP.

wireless network

A network that communicates with radio or infrared signals rather than electrical or light signals sent over copper wire or fiber.

WordPad

A basic word processor included in Windows.

WPA2

A wireless encryption scheme that provides strong data encryption via Advanced Encryption Standard (AES).

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.149.240.196