Appendix . Glossary

A

Accelerated Graphics Port (AGP)

A graphics interface specification that provides enhanced 3D video support.

access control

The granting and denial of rights to configure what level of authorization has been allowed.

active directory

A directory service supported by Windows 2000 and newer Windows operating systems that allows any network object to be tracked and located.

active partition

A partition or volume on a hard disk that has been identified as the primary partition from which the operating system is booted.

activity report

A feature of Windows Vista Parental Controls that provides a list of websites visited, programs accessed, games played, or other functions performed by a child or other user for which you have enabled Parental Controls.

add-ons

Optional additional features that can be installed in Internet Explorer and provide enhanced functionality. Websites often download and install add-ons to your browser, sometimes without your knowledge and consent.

administrator

1. A person whose responsibilities include managing computers or networks. Often called a system administrator or network administrator. 2. The name of the Windows user with the most rights.

admin approval mode

The default action mode of Windows Vista, in which all user accounts, even administrative ones, run without administrative privileges until such privileges are required. When this happens, the user is presented with a UAC prompt.

Advanced Configuration and Power Interface (ACPI)

A standard applicable to BIOSs that regulates the power configuration of devices within a computer.

Advanced Encryption Standard (AES)

An encryption algorithm that uses 128-bit to 256-bit keys to encrypt and decrypt data using multiple encryption rounds that create a high level of data security.

aero

The new desktop scheme supported by all editions of Windows Vista.

aero glass

The enhanced version of Aero supported by all editions of Windows Vista except Home Basic. It includes advanced features such as translucent title bars, the Windows Flip 3D feature, and an improved taskbar that displays thumbnail views of tasks running on the computer.

alert

A notification provided by the Data Collector Sets feature of Performance Monitor that informs you when the value of a counter has exceeded a preconfigured level.

answer file

An ASCII text file that contains answers, in script form, to questions asked by the Windows Vista Setup Wizard during unattended installations. This file, often called Autounattend.xml, enables installation of Windows Vista to proceed without requiring users to answer questions during the installation.

anycast IPv6 address

A type of IPv6 address that is only utilized for a destination address assigned to a router.

application compatibility

The process of ensuring that a program or application written for a previous Windows operating system will function properly within Windows Vista.

attended installation

Manual installation that requires a person to answer questions throughout the setup process.

Automatic Private IP Addressing (APIPA)

The dynamic IPv4 addressing system used when DHCP is unavailable.

B

backup

The creation of a copy of programs or data on the computer as a protection against some type of disaster.

backup and restore center

A new application in Windows Vista that provides a centralized location and wizards for performing various types of backup and restore procedures.

Basic Input/Output System (BIOS)

The firmware application encoded in a computer that initializes the computer before the operating system is loaded. The BIOS manages basic hardware configuration.

basic disk

A disk partitioning scheme that uses partition tables supported by DOS and many other operating systems, containing primary partitions, extended partitions, and logical drives.

battery meter

A small application that runs on mobile computers and displays the percentage of battery power remaining, as well as the power plan currently in use.

BitLocker

A new feature of Windows Vista Enterprise and Ultimate that enables you to encrypt the entire contents of your system partition. It is useful for protecting data stored on computers such as laptops that are susceptible to theft.

Blue Screen of Death (BSOD)

An error screen displayed by Windows Vista and older Windows versions when it encounters a Stop error that it cannot recover from.

burn

The act of recording data, music, videos, or other items to a recordable CD or DVD.

C

cache

1. A space on the computer’s hard disk that is set aside for holding offline copies of shared files and folders from a computer on the network. 2. An additional memory chip embedded in a portable computer’s auxiliary display, which stores information that can be displayed by Windows SideShow even when the computer is turned off.

Certification Authority (CA)

A server that provides encoded certificates to valid users and objects.

Classless Inter-Domain Routing (CIDR)

A flexible method of stating IP addresses and masks without needing to classify the addresses. An example of the CIDR format is 192.168.1.0/24.

Client-Side Caching (CSC)

The storing of data within specified shared files and folders so that the client computer can access the data when not connected to the server.

cloning

The act of creating an image of a Windows Vista computer containing a preloaded set of applications and settings so that this image can be deployed onto multiple computers. Vista provides the Sysprep tool to assist you in cloning a computer.

command switch

The optional parameters following a command-line utility that may change or focus its function. For example, the /? command switch often provides help information for a command.

compatibility mode

A feature of Windows Vista that enables it to run programs written for an older version of Windows.

compression

Reducing a file’s size through use of a special algorithm to save space on a hard disk.

computer management console

An application that provides access to several of the most commonly used administrative tools such as Task Scheduler, Event Viewer, Local Users and Groups, Reliability and Performance Monitor, Device Manager, Services, and several others.

content advisor

A component of Internet Explorer that enables you to control what Internet content users can view on a Windows Vista computer.

control panel

A group of applications used to configure a Windows Vista computer.

credentials

The information provided by a user or computer to gain access to another network resource. Credentials include usernames, passwords, certificates, and other personal identification information.

D

data collector sets

A component of the Reliability and Performance Monitor that records computer performance information into log files. This feature was known as Performance Logs and Alerts in Windows 2000/XP/Server 2003.

data recovery agent

Users with file encryption certificates who have been designated the right to decrypt users’ encrypted files in case the user’s file encryption certificate is damaged or lost.

decryption

Unscrambling the data in an encrypted file through use of an algorithm so that the file can be read.

default gateway

The term applied to the router that leads to other networks.

Defrag.exe

Also known as Disk Defragmenter, a command-line utility that rearranges files contiguously, recapturing and reorganizing free space in the volume. Defrag optimizes the performance of a computer.

deployment

The act of installing Windows Vista of another operating system on a large group of computers using automated techniques such as Sysprep or Windows Deployment Services (WDS). Can also refer to the installation of applications such as Microsoft Office on a group of computers.

device driver

The specialized software component of an operating system that interfaces with a particular hardware component.

Device Manager

A tool from which you can manage all the hardware devices on your computer. It enables you to view and change device properties, update or roll back drivers, configure settings, and remove devices.

differential backup

A type of Windows backup that backs up all files and folders that have changed since the last normal backup. It does not remove the archive bit; consequently this backup type accumulates all changes that have occurred since the last normal backup. Should you need to restore data, restore the last normal backup plus the last differential backup.

disk quotas

A system of space limits for users on a volume formatted with NTFS. This is set up to ensure that all users have available space on which to store their files, preventing one user from using all the available space.

domain

A group of networked computers that share a common address. A domain is also the foundation of Active Directory, in which all networking objects are stored.

Domain Name System (DNS)

A hierarchical naming system that is contained in a distributed database. DNS provides name resolution for IP addresses and DNS names.

driver signing

The digital signature that Microsoft adds to a third-party device driver to validate its usage.

dual-boot

The capability to boot two or more operating systems on a single computer, created by installing each operating system on a different disk partition.

Dynamic Host Configuration Protocol (DHCP)

The protocol in the TCP/IP protocol stack that negotiates the lease of an IP address from a DHCP server.

dynamic disk

A disk partitioning scheme supported by Windows 2000/XP/Vista as well as Windows Server 2003/2008 that contains dynamic volumes.

dynamic volume

A volume on a dynamic disk that can be spanned, mirrored, striped, or striped with parity.

E

Encrypting File System (EFS)

An advanced attribute setting of Windows 2000/XP/Vista and Windows Server 2003/2008 for files and folders on an NTFS-formatted volume that provides certificate-based public key security for those files and folders. EFS encrypts and decrypts files in a manner that is transparent to users.

encryption

Scrambling and rearranging data in a file through use of an algorithm so the file cannot be read.

event viewer

A Windows Vista snap-in that enables an administrator to view and/or archive event logs such as the operating system, application, setup, and security logs.

extended partition

One of the primary partitions that can be divided into multiple logical drives.

Extensible Authentication Protocol (EAP)

A general authentication protocol developed for PPP. EAP can be used with IEEE 802 and is capable of heading other authentication protocols, so it improves interoperability between RAS systems, RADIUS servers, and RAS clients. Used with MD5-Challenge, smart cards, and certificate authentication in Windows Vista.

F

File Allocation Table (FAT)

The file system that provides a map of the disk clusters within an allocation table. Files that are written to the disk are not necessarily stored in contiguous clusters, which can vary in size. FAT, the 16-bit version, is the most widely supported file system and the ideal choice for dual-boot machines. The 32-bit version of FAT is available only on Windows 95 OSR2 and later versions.

file systems

The overall structure of an operating system, in which files are named, organized, and stored. FAT and NTFS are types of file systems.

FireWire

Also known as IEEE 1394. FireWire is a fast external bus technology that allows for 800Mpbs data transfer rates and can connect up to 63 devices. FireWire devices, although conforming to standards that Windows Vista uses, usually require software from the manufacturer to utilize the specialized capabilities of the hardware.

forest

A logical grouping of domains that share a common schema, configuration, and global catalog. All domains are connected by means of two-way transitive trust relationships. A forest contains one or more Active Directory trees, which are groups of domains that share a contiguous namespace.

G

gadget

A mini-application that displays information to the Windows Sidebar. Common gadgets include the analog clock, news feeds, weather, and a slide show. Also used with the Windows SideShow application on a portable computer equipped with an auxiliary display.

gateway

A node (or computer) on a network through which a local computer sends all data meant for other networks.

global unicast IPv6 address

An IPv6 address that uses a global routing prefix of 45 bits to identify a specific organization’s network, a 16-bit subnet ID, and a 64-bit interface ID. These addresses are globally routable on the Internet and are equivalent to public IPv4 addresses.

Group Policy Object (GPO)

An object that contains settings and configuration information that is attached to a container such as a site, domain, or OU in Active Directory. Settings in the GPO are applied to all the associated container’s objects.

group policy

A method of applying configuration settings to computer and user objects in a Windows Vista computer or an Active Directory domain.

H

handout

A text or graphics file that is shared among participants in a meeting conducted using Windows Meeting Space.

handwriting recognizer

A Tablet PC-based application that trains your computer to recognize your specific handwriting style, thereby enabling translation of information written with the digital pen onto the Tablet PC screen into typed text.

Hardware Compatibility List (HCL)

A vendor list of all hardware deemed compatible with certain Windows operating systems. The HCL has been replaced with the Windows Catalog for Windows XP and Windows Server 2003 and by the Windows Logo Program for Windows Vista and Windows Server 2008.

hardware profiles

Information that describes a computer’s hardware configuration, including devices that are enabled under different conditions.

hibernation

A condition in which your computer saves everything to the hard disk and then powers down. When you restart your computer from hibernation, all open documents and programs are restored to the desktop.

hidden or administrative shares

A shared folder that does not broadcast its presence and is not browsable in My Network Places. A hidden share is indicated by a dollar sign ($) at the end of the folder name.

host

A computing device that has been assigned an IP address.

hotfix

A package of one or more files for correcting a specific problem (often related to security) with Windows or a component application that has been reported to Microsoft.

HyperText Transfer Protocol (HTTP)

The protocol in the TCP/IP suite that enables the sharing of information across the Web.

HyperText Transfer Protocol Secure (HTTPS)

A protocol that enables secure transactions across the Web. By convention, URLs that require an SSL connection start with https: instead of http:.

I

incremental backup

A type of Windows backup that backs up all files and folders that have changed since the last normal backup and removes the archive bit. This backup type is the fastest one to perform but requires that you restore all incremental backups in sequence since the last normal backup.

Infrared Data Association (IrDA)

A specification that allows a computer or peripheral device to use infrared communication to create a connection.

instance

One of a group of performance objects that represents multiple occurrences of the same object, such as processors in a multiple processor computer or hard disks in a computer with more than one hard disk.

Integrated Drive Electronics (IDE)

An electronic interface for connecting to storage devices.

Internet Connection Sharing (ICS)

The simplified system of routing Internet traffic through a Windows Vista computer so other computers on the network that are not connected to the Internet can access the Internet.

Internet Protocol Security (IPSec)

An encryption and authentication protocol that is used to secure data transmitted across a network. It is used with L2TP to create a VPN tunnel.

internet search providers

Companies such as Microsoft Live Search, Google, Yahoo!, and so on, that compile lists of websites and pages available on the Internet to facilitate the location of all types of information.

IP address

A logical 32-bit address that is used to identify both a host and a network segment. Each network adapter on an IP network requires a unique IP address.

IP version 4 (IPv4)

The version of the Internet Protocol that has been in use for many years and provides a 32-bit address space formatted as four octets separated by periods.

IP version 6 (IPv6)

A newer version of the Internet Protocol that provides a 128-bit address space formatted as eight 16-bit blocks, each of which is portrayed as a 4-digit hexadecimal number and is separated from other blocks by colons.

Ipconfig

The command-line utility that provides detailed information about the IP configuration of a Windows Vista computer’s network adapters.

L

last known good configuration

A Registry configuration that contains the settings utilized for the last successful logon. If reconfigured settings prevent your computer from proper startup, you can press F8 during startup and access Last Known Good Configuration to remove the improper settings.

Layer 2 Tunneling Protocol (L2TP)

A protocol that is used to create VPN tunnels across a public network. This protocol is used in conjunction with IPSec for security purposes.

link local IPv6 address

A type of IPv6 address used for communication between neighboring nodes on the same link. Equivalent to IPv4 addresses configured using APIPA.

local group

A group that is configured on the local computer only. It can contain user accounts from its own computer, as well as user accounts and groups from a domain to which the computer belongs. Local groups are used to define access permissions to resources on the local computer only.

local user profile

The collection of Registry settings and files associated with a user’s desktop interface that is created the first time a user logs on to a computer. This profile is stored on the local hard disk.

local security policy

The security-based Group Policy settings that apply to a local computer and its local users.

logical drive

A segment of the extended partition that can be assigned a separate drive letter.

M

malware

Malicious software that is created to cause harm to a computer.

memory leak

A programming bug that prevents an application from freeing memory that’s no longer needed, eventually causing the program or operating system to run out of memory and terminate.

mirroring

A method of duplicating data between two separate hard disks so that the failure of one disk will not cause the operating system to fail. Mirroring is available only in server operating systems such as Windows 2000 Server and Windows Server 2003/2008.

mobile PC control panel

A Control Panel category that appears only on notebook and laptop computers and contains links to applets that perform many of the configuration activities associated with portable computing.

Msconfig

The command that opens the System Configuration Utility, which you can use to perform actions such as modifying the startup scheme, the default operating system that boots on a dual-boot computer, services that are enabled, and startup programs that run automatically. You can also launch several computer management tools from this utility.

.msi

The file extension for an application that uses Windows Installer.

Msinfo32

The command that opens the System Information program.

.mst

The file extension for a transform file that performs a scripting-like function for a Windows Installer package.

multicast IPv6 address

An IPv6 address that enables the delivery of packets to each of multiple interfaces.

N

network and sharing center

A new feature of Vista that provides a centralized location from which you can manage all networking tasks such as connecting to networks and the Internet and sharing of files and folders with users at other computers.

New Technology File System (NTFS)

The file system originally provided with Windows NT that supports volume mounting, compression, encryption, and security.

normal backup

A type of Windows backup that backs up all selected files and removes the archive bit, thereby indicating that the files have been backed up. Such a backup is the most complete backup and provides the fastest means of restoring data. Also called full backup.

NTFS permissions

The security feature available in NTFS that allows you to grant or deny local access rights.

O

object

In Reliability and Performance Monitor, a hardware or software component for which performance data can be collected.

offline files

A feature built into Windows 2000/XP/Vista that enables you to cache locally stored copies of shared files and folders so that you can work with them while offline and resynchronize your changes when you go back online.

offline folder

The shared folder that has been cached on the client so that it is available when the server computer is not available to the client.

Organizational Unit (OU)

The container in the hierarchy somewhere below the Domain container object in Active Directory that can hold other containers, user objects, computer objects, or other objects representing network resources.

Out-of-Box Experience (OOBE)

The dialog box that starts after Windows is installed to introduce a new user to Windows Vista.

P

Packet InterNet Groper (PING)

A diagnostic tool in the TCP/IP protocol suite that uses an echo command to determine whether another computer with an IP address is reachable.

paging

The act of copying pages from a storage device, such as a hard drive, to main memory. This technique helps to ensure that data is quickly accessible.

paging file

Virtual memory stored on disk that enables Windows Vista to run more applications at one time than would be allowed by the computer’s physical memory (RAM).

parental controls

A new feature of Windows Vista that you can configure to limit the actions that a user such as your child can perform on the computer. You can limit the websites the user can access, the programs or games he can run, and the times he can be logged on to the computer.

partition

A configured section of a basic disk that is capable of being formatted with a file system and identified with a drive letter.

patch

Software designed to update or correct a problem with Windows or a component program. Microsoft generally distributes patches on the second Tuesday of each month.

pen flicks

Actions you can perform with the digital pen on a Tablet PC computer that enable you to rapidly navigate menus and shortcuts. You can also perform editing actions such as cut, copy, paste, and delete, as well as other customized activities.

performance counter

A statistical measurement associated with a performance object such as %disk time, queue length, and so on.

performance monitor

A component of the Reliability and Performance Monitor that enables you to monitor your computer’s performance.

performance object

Hardware or software components that the Performance Monitor can use for tracking performance data.

phishing

The use of a fake website that closely mimics a real website and contains a similar looking URL. This site is intended to scam users into sending confidential personal information such as credit card or bank account numbers, dates or birth, Social Security numbers, and so on.

Plug and Play (PnP)

A standard developed by Microsoft and Intel that allows for automatic hardware installation detection and configuration in Windows operating systems. Available in Windows 95 and more recent versions.

Point-to-Point Protocol (PPP)

A dial-up protocol that supports TCP/IP and IPX/SPX and others with advanced compression and encryption functions. Serial Line Internet Protocol (SLIP) is an older dial-up protocol originally created for Unix and that supports only TCP/IP.

Point-to-Point Tunneling Protocol (PPTP)

A protocol that is used to create VPN tunnels across a public network and includes encryption and authentication.

pop-up windows

Additional windows displayed on your browser by some websites that present advertisements or perform other actions, mostly of an undesirable nature. Internet Explorer 7 in Windows Vista includes a pop-up blocker that blocks the appearance of such windows and provides you with an option to display them if you desire.

port

A location used to pass data to and from a computing device, such as an adapter card connecting a server to a network, a serial 232 port, a TCP/IP port, or a printer port.

power plans

A series of preconfigured power management options that control actions such as shutting off the monitor or hard disks or placing the computer in Sleep mode or hibernation.

Preboot Execution Environment (PXE)

A bootable ROM chip contained on compatible network interface cards (NICs) that enables client computers without an operating system to boot and connect to the network for locating a WDS server.

presentation settings

A feature in Windows Vista that enables you to configure your portable computer so that it does not perform actions such as displaying certain prompts, displaying the screen saver, or entering Sleep mode while you are using your computer for a presentation.

primary partition

A segment of the hard disk. A maximum of four primary partitions may exist on a single disk.

private key

A digital code that is kept confidential and is used along with the public key to secure data.

privilege

See right.

product activation

A process of verifying computer information to Microsoft after installation of Windows Vista, designed to combat software piracy. Required on all Windows operating systems from Windows XP onward, as well as certain other Microsoft software such as Microsoft Office XP/2003/2007.

Public Key Infrastructure (PKI)

A security architecture that provides authentication and encryption services. PKI provides a public key and a private key to users, and the combination authenticates the user.

public key

A digital code available to everyone that is used along with a private key to secure data.

R

RAID-5

A combination of disk striping with parity data interleaved across three or more disks. RAID-5 provides improved disk performance and is fault-tolerant. It is available only in server operating systems such as Windows 2000 Server and Windows Server 2003/2008.

Really Simple Syndication (RSS)

A method used by websites that enables you to receive up-to-date information on the Internet at times that are convenient to you. Internet Explorer 7 informs you when a website is offering RSS feeds by displaying an orange icon in the browser toolbar.

registry

The database used by all 32-bit Windows operating systems that stores configuration information for each computer on which the operating system is installed. The configuration information includes hardware and software settings.

reliability monitor

A component of the Reliability and Performance Monitor that provides a trend analysis of your computer’s system stability with time. It shows how events such as hardware or application failures, software installations or removals, and so on affect your computer’s stability.

reliability and performance monitor

A Microsoft Management Console (MMC) application that contains several tools for monitoring your computer’s performance.

remote assistance

A service available in Windows Vista that enables a user to share control of his or her computer with an administrator or other user to resolve a computer problem.

remote desktop

A service available in Windows Vista Business, Enterprise, or Ultimate that allows a single remote control session of a computer running Windows XP or Vista. Remote Desktop uses the Remote Desktop Protocol (RDP), which is the same protocol used in Terminal Services.

right

The authorization to perform a system task such as changing the system time, adding workstations to a domain, and so on.

rip

The act of copying information from a music CD or movie DVD to your computer’s hard drive.

router

A device, or interface, between two networks that allows for communication between the networks. Routers can find the best route for data communication between networks. Routers also provide load balancing and other network management functions.

S

safe mode

A method of starting Windows Vista with only the basic drivers enabled so that you can troubleshoot problems that prevent Windows from starting normally.

scalability

The capability to increase the number of processors in a computer (or increase other types of resources for other areas).

Secure Sockets Layer (SSL)

A protocol used to secure data transmitted via HTTPS through the use of public key encryption.

security agent

A component of Windows Defender that monitors security-related actions that take place on a Windows Vista computer. These agents provide protection for your computer on a real-time basis.

Security Identifier (SID)

A unique number assigned to an object such as a user account, group account, computer account, folder, or printer in Active Directory. No two objects in the same forest may have the same SID.

service pack

A collection of updates and fixes to a software package, usually available via download from the Internet. Service packs are available for download from Microsoft and when using the Microsoft automated update service.

Service Set Identifier (SSID)

A unique configurable identification that allows clients to communicate to the appropriate base station in a wireless network that uses the 802.11 protocol.

Setup.exe

The application that installs Windows Vista on a new computer or updates an older Windows computer to Windows Vista. Also frequently used as a routine for installing applications.

share permissions

The security feature available when sharing files and folders across a network that allows you to grant or deny access rights to network users.

shared folders

Folders that are made available for access by users who are working at another computer on the network.

sigverif.exe

A program that enables a Vista user to verify the digital signature on a driver file.

site-local IPv6 address

An IPv6 address that is private to the network on which it is located. This type of address cannot be accessed from locations external to its network, such as the Internet.

sleep mode

A condition in which the computer consumes low power but is available for use. Sleep mode saves configuration information to memory and powers down the monitor, disks, and several other hardware components.

slipstreaming

The act of integrating service pack files with operating system installation files so that the operating system can be installed together with the service pack in a single operation.

Small Computer System Interface (SCSI)

An electronic interface for connecting to storage devices and peripherals providing high-speed data transfer.

smart card

A credit card-sized device that stores a user’s PKI keys.

smart card reader

A device that attaches to a computer, usually via the USB port, that can read the information encoded in a smart card.

snipping Tool

A Tablet PC component that enables you to capture items from your computer screen. You can save these items as a graphics file or paste them into documents such as Microsoft Word files. You can also highlight items or add written annotations to your captures.

software explorer

A component of Windows Defender that enables you to view information about software programs and system state on your computer. It includes categories for startup programs, currently running programs, network connected programs, and Winsock service providers.

Software Update Services (SUS)

A Windows Server tool that enables client computers to receive Windows updates. This tool has been replaced with Windows Server Update Services (WSUS).

spam filter

A tool built into Windows Mail that attempts to send unwanted junk email, or spam, to a Junk Mail folder. You can configure this tool to recognize mail from specific sources or countries as junk mail.

start menu

The menu of programs and tools that is opened when a user clicks the Windows logo button in the bottom-left corner of the screen or presses the Windows logo key on the keyboard.

Startup Repair Tool (SRT)

A utility that provides a diagnostics-based, step-by-step troubleshooter that enables end users and tech support personnel to rapidly diagnose and repair problems that are preventing a computer from starting normally.

stop error

An operating system failure that is severe enough to cause the computer to stop functioning. In Windows Vista and previous versions of Windows 2000/XP/Server 2003 and Windows NT, the Stop error is displayed as white text on a blue screen and is nicknamed the “blue screen of death” (BSOD).

striping

A method of segmenting data and interleaving it across multiple disks, which has the effect of improving disk performance but is not fault tolerant.

subnet mask

A set of numbers, 32 bits in length, that begins with 1s and ends with 0s in binary notation. The number of 1s represents the number of bits that are considered the subnet address. The bits that are 0s are the host address. Using a subnet mask, you can create more subnets with a smaller number of computers per subnet. All computers on a given subnet must have the same subnet mask. Using dotted decimal notation, a subnet mask is written as 255.255.0.0 (which is the default mask for a Class B address).

Symmetrical Multi Processor (SMP)

A computer that uses two (or a higher even number) processors and splits the processor usage symmetrically between them.

Sync center

A program on mobile computers that synchronizes data with other network devices including servers, desktop computers, and other portable computers.

synchronization conflicts

Occur when two users have modified a file that is available offline at the same time and Windows detects that conflicting modifications have occurred. Vista’s Sync Center enables you to save either or both of these versions.

synchronizing files

The act of copying files from a shared folder on the network to an offline files cache on a computer or copying the same files back to the shared folder after a user has modified them.

system configuration utility

A tool that enables you to perform actions such as modifying the startup scheme, the default operating system that boots on a dual-boot computer, services that are enabled, and startup programs that run automatically. You can also launch several computer management tools from this utility. Started with the Msconfig.exe command.

System Image Manager (SIM)

A wizard that helps you create unattended installation files, which minimizes the required amount of user interaction during an automated installation of Windows Vista. Known as Setup Manager in previous versions of Windows.

System Preparation Tool (Sysprep)

The utility that can be used to take a snapshot of a computer’s configuration, which you use with a cloning tool to automatically deploy Windows Vista on other computers. It automatically creates a unique SID for each computer.

system restore

A troubleshooting tool that enables you to restore your computer to an earlier time at which it was operating properly.

%systemdrive%

The disk drive that contains the Windows operating system. In most cases, this is C:.

%systemroot%

The folder that contains the Windows operating system. In most cases, this is C:Windows.

T

tabbed browsing

First introduced with Firefox, a new feature of Internet Explorer 7 that enables you to display multiple web pages in a single instance of the browser. You can perform activities such as closing multiple tabs, viewing thumbnails of tabs, saving a set of thumbnails as a favorite to be opened later, and so on.

tablet PC input panel

A Tablet PC utility that enables you to input information to the computer by using the digital pen by handwriting text or characters or by tapping keys on a virtual keyboard.

take ownership (of a file or folder)

The process of an administrative user taking control of a file that was created or owned by another user, and then granting rights to that file or folder as needed.

task manager

A Windows Vista administrative utility that provides data about currently running processes, including their CPU and memory usage, and enables you to modify their priority or shut down misbehaving applications. You can also manage services, including starting, stopping, enabling, and disabling them; obtain information on network utilization; and display users with sessions running on the computer.

task scheduler

A Windows Vista utility that enables you to configure applications to run at a specified time in the future.

taskbar

A bar at the bottom of the Windows desktop that includes buttons for all files and applications open on the computer. Click any of these buttons to rapidly access its file or application.

transform file

A file ending with an .mst extension, used by Windows Installer to customize an application’s installation.

Transmission Control Protocol/Internet Protocol (TCP/IP)

The suite of protocols used on the Internet for communication between computers. TCP/IP is the default protocol for Windows Vista.

U

unattended installation

A method of scripting the installation of Windows Vista on multiple computers so that no one need answer installation questions during the setup process. This method provides great time savings for administrators who need to install Windows Vista on multiple computers.

Universal Serial Bus (USB)

A technology that supports 12Mpbs data transfer rates between a computer and its peripherals (such as keyboards, mice, and modems), connecting up to 127 such peripherals simultaneously.

User Account Control (UAC)

A new feature in Windows Vista that enables you to work with a nonadministrative user account. UAC displays a prompt that requests approval when you want to perform an administrative task. Should malicious software attempt to install itself or perform undesirable actions, you will receive a prompt that you can use to prevent such actions from occurring.

V

Virtual Private Network (VPN)

Using a protocol such as Point-to-Point Tunneling Protocol or L2TP with IPSec to tunnel through a public network to connect to a private network and maintain a secure connection.

volume

A logical drive that has been formatted for use by a file system. Although often considered synonymous with “partition,” a volume is most specifically a portion of a dynamic disk, or multiple sections of dynamic disks, that is capable of being formatted with a file system and being identified with a drive letter.

W-X-Y-Z

welcome center

A program that runs when you first log on to a new Windows Vista installation. The Welcome Center includes links to items that describe the most important new features of Vista.

Wide Area Network (WAN)

A digital network that is dispersed across large geographical distances.

Wi-Fi Protected Access (WPA)

A wireless authentication protocol that uses preshared network key encryption to ensure that only authorized users receive access to the network.

windows anytime upgrade

A program that facilitates the upgrading of one edition of Windows Vista to a higher one. It enables you to compare features of different Vista editions and purchase the upgrade online.

windows calendar

A new calendar application that enables you to keep track of meetings and appointments. It enables you to create tasks and appointments, create alerts to remind you of scheduled items, create task lists, and share calendars with coworkers or family members.

windows defender

An application that monitors the computer against spyware and offers default remedies when it recognizes a spyware infection.

Windows Deployment Services (WDS)

A feature of Windows Server 2003 and 2008 that enables an automated remote installation of the Windows Vista operating system from a specially configured server.

windows DVD maker

An application that enables you to create DVDs containing videos, photos, and/or data.

windows easy transfer

A program that facilitates the migration of user files from an old computer to a new Windows Vista computer. Windows Easy Transfer replaces the Files and Settings Transfer Wizard used with Windows XP.

windows fax and scan

An application that enables you to send and receive faxes, scan images and documents, and share these items with others. It enables you to perform all these tasks and manage these items from a single location.

windows firewall

The personal firewall software incorporated in Windows Vista that filters incoming TCP/IP traffic. Windows Firewall was first introduced in Windows XP SP2.

windows installer

The service for Microsoft’s standard method of packaging and installing Windows applications.

Windows Internet Naming Service (WINS)

A system used to map NetBIOS names to IP addresses.

windows logo program

A list compiled by Microsoft that includes all hardware components that are compatible with Windows Vista and Windows Server 2008. It replaces the older Hardware Compatibility List (HCL) and Windows Catalog used with previous Windows versions.

windows mail

An email program that includes new security capabilities such as the ability to filter junk email (spam) messages, block phishing messages, and protect against viruses. You can configure Windows Mail to digitally sign and encrypt your outgoing messages. Windows Mail replaces Outlook Express that was included in previous Windows versions.

windows media center

A complete multimedia application included with Windows Vista Home Premium and Ultimate that lets you watch and record TV, listen to digital music, play games, listen to FM and Internet radio stations, or access content from online media services.

windows media player

A program that provides a comprehensive feature set for managing most types of digital media such as music, photos, and videos.

windows meeting space

A program that enables you to conduct small meetings between users of networked computers. You can share handouts, applications, and your Windows desktop among meeting attendees, and attendees can edit handouts.

windows mobility center

An application that runs on all Windows Vista mobile computers that provides a quick view of functions pertinent to mobile computers such as battery status, wireless network connections, sync partnerships, presentation settings, and so on. You can configure common mobile computer settings such as display settings, speaker volume, and battery status.

windows movie maker

A new media application included with Windows Vista Home Premium and Ultimate that enables you to create, import, manage, and edit digital videos in regular or high-definition format. You can view these videos on ordinary DVD players so that you can share them with family and others.

windows photo gallery

A new media application included with Windows Vista Home Premium and Ultimate that enables you to import photos and videos from cameras, scanners, removable media, other computers on the network, or the Internet. You can view the images, add or edit metadata, assign ratings, catalog the images to facilitate searching for them later, and burn them to CD or DVD. You can even apply simple fixes to your images.

Windows Preinstallation Environment (Windows PE)

A minimal 32-bit operating system based on the Vista kernel, used in the preinstallation and deployment of Vista.

Windows Product Activation (WPA)

A requirement to activate Windows Vista through contact with Microsoft after installation. Contact can be made via modem, Internet, or over the phone.

windows ReadyBoost

A new feature of Windows Vista that enables you to use a USB flash device or a CompactFlash or Secure Digital memory card to enhance your computer’s performance without adding additional RAM.

windows ReadyDrive

A new feature of Windows Vista that enables mobile computers equipped with a hybrid hard disk to achieve enhanced performance and improved battery life.

windows sidebar

A pane that appears on your desktop and includes gadgets such as a clock, mini-slide show, and news feeds. You can modify the set of gadgets that are displayed and even download additional gadgets from the Internet.

windows SideShow

An application that is new to Windows Vista and enables portable computers equipped with an auxiliary display to perform actions such as alerting you to events such as incoming email, Windows Calendar events, Windows Meeting Space meeting invitations, and so on. It works by means of a cache that can store events even when the computer is turned off.

windows SuperFetch

A technology that optimizes memory performance based on trends of most-used programs and data on the computer, enabling Vista to decide on which content should be loaded into RAM at a particular time.

Windows Server Update Services (WSUS)

A service that can be configured to run on a server, supplying updates, hotfixes, and other patches automatically to computers on a network. WSUS enables you to deploy and manage updates that are downloaded from the Microsoft Windows Update website to WSUS servers running on your own network. Client computers simply connect to the local WSUS server to download and install updates. Formerly known as Software Update Services (SUS).

windows update

An application that enables you to maintain your computer in an up-to-date condition by automatically downloading and installing critical updates as Microsoft publishes them. Also the Microsoft website on which these updates are published.

windows upgrade advisor

A program that you can download from Microsoft that scans your computer and advises you which components and devices you should upgrade or replace before upgrading an older computer to Windows Vista. It also alerts you to any programs that might be incompatible with Vista.

windows vista business

An edition of Windows Vista that is designed for business users who need basic computing capabilities including features such as domain membership, advanced backup capabilities, business networking capabilities, and Remote Desktop.

windows vista enterprise

An edition of Windows Vista that is designed for business users who need advanced computing and security functions. This edition adds features such as BitLocker drive encryption and Multi-Language User Interface (MUI) to the Vista Business feature set.

windows vista home basic

An edition of Windows Vista that is designed for home users who need only basic computing capabilities. It includes fundamental security capabilities such as Internet Explorer 7 and Windows Defender, as well as Windows Mail and Parental Controls.

windows vista home premium

An edition of Windows Vista that is designed for home users who need enhanced computing capabilities that include Windows Media Center and Mobility Center.

windows vista ultimate

An edition of Windows Vista that combines the features of Vista Home Premium and Vista Enterprise to provide the complete experience.

Wired Equivalent Privacy (WEP)

A protocol that is used on 802.11-based wireless networks to encrypt data sent between computers on a wireless network or between a computer and its access point.

workgroup

A group of networked computers that share resources and data files. A workgroup is a much simplified version of a domain. Unlike domains, workgroups are not controlled from a central location and do not require users to authenticate to join.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.15.189.199