An automatic installation that makes use of answer files and uniqueness database files to choose options and enter information previously programmed by an administrator.
Follows a standard of character mapping that is universal in nature and applies to all Localizations.
A user-friendly web address that includes the DNS address of a computer and the complete path to the resource located on the computer.
A battery backup device that provides power to a computer in the event that the power from the power company fails.
Files that contain information specific to a computer. These files can be used to override the settings of an answer file during an unattended installation.
One of the newest methods of transferring data from a computer to a peripheral device. Devices can be daisy chained and can be attached and unattached without shutting down the computer or the peripheral device.
One of the first operating systems to be used to provide access to resources on a network. Unix servers are still used today to provide mostly command line-based line-of-business applications for organizations.
Software built into Windows XP that checks the hardware and software of a computer for compatibility with Windows XP and creates a report prior to installing the software.
A software installation of an operating system or an application that is performed on a computer that already has a previous version of the same software.
Security principles that identify a user and allow an administrator to assign permissions and audit the user activity within a computer or a network. An individual must have a user account to log on to a computer or a network.
A connectionless protocol that is part of the TCP/IP protocol suite. UDP works at the Network layer (layer 3) of the OSI model, delivering packets without requiring an acknowledgment. UDP has a much lower overhead in regard to bandwidth used as well as processing time of packets, but it does not provide guaranteed delivery of packets.
Software included on the Windows XP CD that can be used to capture the configuration settings of a computer and load those settings into other computers. It consists of two components: scanstate and loadstate.
3.15.221.133