Vous êtes sur la page 1sur 38

Complete Glossary of Terms for Windows XP Operating System

Symbols
.inf -> The file name extension for files that contain device information or scripts to control hardware operations.
100baseT -> The Ethernet standard for local area networks using twisted-pair cable carrying data at 100 megabits per second (Mbps).
10base2 -> The Ethernet and IEEE 802.3 standard for baseband local area networks using a thin coaxial cable up to 200 meters long and carrying data
at 10 megabits per second (Mbps). Cables connect to network adapters by a BNC connector.
10baseT -> The Ethernet standard for local area networks using twisted-pair cable carrying data at 10 megabits per second (Mbps).

ABCDEFGHIJKLMNOPQRSTUVWXYZ
A active volume -> The volume from which the computer starts up. The
A (address) resource record -> A resource record used to map a DNS active volume must be a simple volume on a dynamic disk. You cannot
domain name to a host IP address on the network. See also: domain mark an existing dynamic volume as the active volume, but you can
name; Domain Name System (DNS); resource record (RR) upgrade a basic disk containing the active partition to a dynamic disk.
Once the disk is upgraded to dynamic, the partition becomes a simple
access control -> A security mechanism that determines which operations
volume that is active. See also: active partition; basic disk; dynamic
a user, group, service, or computer is authorized to perform on a computer
disk; dynamic volume; simple volume
or on a particular object, such as a file, printer, registry key, or directory
service object. See also: permission; group; object; registry; service ActiveX -> A set of technologies that allows software components to
interact with one another in a networked environment, regardless of the
access control entry (ACE) -> An entry in an object's discretionary
language in which the components were created.
access control list (DACL) that grants permissions to a user or group. An
ACE is also an entry in an object's system access control list (SACL) that address (A) resource record -> A resource record used to map a DNS
specifies the security events to be audited for a user or group. See also: domain name to a host IP address on the network. See also: domain
access control; permission; discretionary access control list (DACL); name; Domain Name System (DNS); resource record (RR)
object; system access control list (SACL)
address classes -> Predefined groupings of Internet addresses with each
account lockout -> A Windows security feature that locks a user account class defining networks of a certain size. The range of numbers that can
if a number of failed logon attempts occur within a specified amount of be assigned for the first octet in the IP address is based on the address
time, based on security policy lockout settings. Locked accounts cannot class. Class A networks (values 1 to 126) are the largest, with more than
log on. 16 million hosts per network. Class B networks (128 to 191) have up to
65,534 hosts per network, and Class C networks (192 to 223) can have up
acknowledgment message -> For Message Queuing, a message class
to 254 hosts per network. See also: Class A IP address; Class B IP
that indicates that a message arrived or was retrieved by the target
address; Class C IP address
application (a positive acknowledgment), or that an error occurred before
the original message could be retrieved (a negative acknowledgment). Address Resolution Protocol (ARP) -> In TCP/IP, a protocol that uses
These messages are sent to administration queues on the source broadcast traffic on the local network to resolve a logically assigned IP
computer. See also: administration queue; Message Queuing address to its physical hardware or media access control layer address.
In ATM, ARP is used two different ways. For classical IP over
active -> Describes the window or icon that you are currently using or that
ATM, ARP is used to resolve addresses to ATM hardware addresses. For
is currently selected. The operating system always applies the next
ATM LAN emulation, ARP is used to resolve Ethernet/802.3 or Token Ring
keystroke or command you choose to the active window. Windows or icons
addresses to ATM hardware addresses. See also: Internet Protocol (IP);
on the desktop that are not selected are inactive. See also: channel
Message Authentication Code (MAC); packet; Transmission Control
active content -> Dynamic content, such as a stock ticker, a weather map, Protocol/Internet Protocol (TCP/IP)
or news, that is usually updated from the World Wide Web or a channel.
administration queue -> For Message Queuing, a queue that stores
Active Directory -> The directory service that stores information about acknowledgment messages. See also: acknowledgment message;
objects on a network and makes this information available to users and Message Queuing
network administrators. Active Directory gives network users access to
administrative alerts -> Alerts that relate to server and resource use.
permitted resources anywhere on the network using a single logon
They notify users about problems in areas such as security and access,
process. It provides network administrators with an intuitive, hierarchical
user sessions, server shutdown due to power loss (when an uninterruptible
view of the network and a single point of administration for all network
power supply is available), directory replication, and printing. When a
objects. See also: directory partition; service
computer generates an administrative alert, a message is sent to a
Active Directory data model -> A model derived from the LDAP data predefined list of users and computers. See also: Alerter service
model. The directory holds objects that represent entities of various sorts,
administrator -> For Windows XP Professional, a person responsible for
described by attributes. The objects and classes of objects that can be
setting up and managing domain controllers or local computers and their
stored in the directory are defined in the schema. For each class of
user and group accounts, assigning passwords and permissions, and
objects, the schema defines the attributes an instance of the class must
helping users with networking problems. Administrators are members of
have, the additional attributes it can have, and the class that can be its
the Administrators group and have full control over the domain or
parent. See also: Active Directory; attribute; Lightweight Directory
computer.
Access Protocol (LDAP); schema
For Windows XP Home Edition, a person who can make system-
Active Directory Users and Computers -> An administrative tool wide changes to the computer, install software, and who has access to all
designed to perform day-to-day Active Directory administration tasks. files on the computer. A person with a computer administrator account has
These tasks include creating, deleting, modifying, moving, and setting full access to other user accounts on the computer.
permissions on objects stored in the directory. These objects include
Advanced Configuration and Power Interface (ACPI) -> An open
organizational units, users, contacts, groups, computers, printers, and
industry specification that defines power management on a wide range of
shared file objects. See also: permission; Active Directory; object
mobile, desktop, and server computers and peripherals. ACPI is the
active partition -> A partition from which an x86-based computer starts foundation for the OnNow industry initiative that allows system
up. The active partition must be a primary partition on a basic disk. If you manufacturers to deliver computers that will start at the touch of a
use Windows exclusively, the active partition can be the same as the keyboard. ACPI design is essential to take full advantage of power
system volume. See also: basic disk; primary partition; system management and Plug and Play. See also: Plug and Play
partition; system volume; x86

Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
affinity -> For Network Load Balancing, the method used to associate In Active Directory, characteristics of an object and the type of
client requests to cluster hosts. When no affinity is specified, all network information an object can hold. For each object class, the schema defines
requests are load balanced across the cluster without respect to their what attributes an instance of the class must have and what additional
source. Affinity is implemented by directing all client requests from the attributes it might have.
same IP address to the same cluster host. See also: IP address; client
audio input device -> An audio input device records music and voice
request
input into your computer. Examples of audio input devices are CD-ROM
agent -> An application that runs on a Simple Network Management players and microphones.
Protocol (SNMP) managed device. The agent application is the object of
audit policy -> A policy that determines the security events to be reported
management activities. A computer running SNMP agent software is also
to the network administrator.
sometimes referred to as an agent. See also: service; Simple Network
Management Protocol (SNMP) auditing -> The process that tracks the activities of users by recording
selected types of events in the security log of a server or a workstation.
Alerter service -> A service used by the server and other services to
notify selected users and computers of administrative alerts that occur on authentication -> The process for verifying that an entity or object is who
a computer. The Alerter service requires the Messenger service. See also: or what it claims to be. Examples include confirming the source and
administrative alerts; Messenger service; service integrity of information, such as verifying a digital signature or verifying the
identity of a user or computer. See also: smart card; trust relationship
allocation unit -> The smallest amount of disk space that can be allocated
to hold a file. All file systems used by Windows organize hard disks based authoritative -> For DNS, describes a DNS server hosting a zone, or a
on allocation units. The smaller the allocation unit size, the more efficiently zone containing a name or record. When a DNS server is configured to
a disk stores information. If you do not specify an allocation unit size when host a zone, it is said to be authoritative for names that do exist or could
formatting the disk, Windows picks default sizes based on the size of the exist within that zone. A DNS server is allowed to respond authoritatively to
volume. These default sizes are selected to reduce the amount of space queries for domain names for which it is authoritative. A zone is said to be
that is lost and the amount of fragmentation on the volume. An allocation authoritative for a name if the name exists or could exist within a zone, and
unit is also called a cluster. See also: file system; volume it is said to be authoritiative for a record if the owner name of the record
exists or could exist within a zone. See also: DNS Server; domain name;
American Standard Code for Information Interchange (ASCII) -> A
Domain Name System (DNS); name server (NS) resource record;
standard single-byte character encoding scheme used for text-based data.
start-of-authority (SOA) resource record; zone
ASCII uses designated 7-bit or 8-bit number combinations to represent
either 128 or 256 possible characters. Standard ASCII uses 7 bits to authoritative restore -> In Backup, a type of restore operation performed
represent all uppercase and lowercase letters, the numbers 0 through 9, on an Active Directory domain controller in which the objects in the
punctuation marks, and special control characters used in U.S. English. restored directory are treated as authoritative, replacing (through
Most current x86-based systems support the use of extended (or "high") replication) all existing copies of those objects. Authoritative restore is
ASCII. Extended ASCII allows the eighth bit of each character to identify applicable only to replicated system state data such as Active Directory
an additional 128 special symbol characters, foreign-language letters, and data and File Replication service data. Use the Ntdsutil.exe utility to
graphic symbols. See also: Unicode perform an authoritative restore. See also: Active Directory;
nonauthoritative restore
AppleTalk -> The Apple Computer network architecture and network
protocols. A network that has Macintosh clients and a computer running authorization -> The process that determines what a user is permitted to
Windows 2000 Server or Windows NT Server with Services for Macintosh do on a computer system or network.
functions as an AppleTalk network.
Automatic Private IP Addressing (APIPA) -> A feature of Windows XP
AppleTalk Phase 2 -> The extended AppleTalk Internet model designed TCP/IP that automatically configures a unique IP address from the range
by Apple Computer that supports multiple zones within a network and 169.254.0.1 through 169.254.255.254 and a subnet mask of 255.255.0.0
extended addressing capacity. when the TCP/IP protocol is configured for dynamic addressing and a
Dynamic Host Configuration Protocol (DHCP) is not available. See also:
application programming interface (API) -> A set of routines that an
DHCP server; Transmission Control Protocol/Internet Protocol
application uses to request and carry out lower-level services performed
(TCP/IP); IP address
by a computer's operating system. These routines usually carry out
maintenance tasks such as managing files and displaying information. availability -> A measure of the fault tolerance of a computer and its
programs. A highly available computer runs 24 hours a day, 7 days a
ASCII (American Standard Code for Information Interchange) See
week. See also: fault tolerance
definition for: American Standard Code for Information Interchange
(ASCII) B
B-channel -> A single channel of an ISDN line that is used to carry either
Assistive Technology Program -> A service that provides
voice or data information. ISDN Basic Rate Interface (BRI) has 2 B-
recommendations for technology that can help people with disabilities.
channels. ISDN Primary Rate Interface (PRI) in North America has 23 B-
Asymmetric Digital Subscriber Line (ADSL) -> A high-bandwidth digital channels. ISDN Primary Rate Interface (PRI) in Europe has 30 B-
transmission technology that uses existing phone lines and also allows channels. B-channel is also called bearer channel. See also: Integrated
voice transmissions over the same lines. Most of the traffic is transmitted Services Digital Network (ISDN)
downstream to the user, generally at rates of 512 Kbps to about 6 Mbps.
background -> The screen background image used on a graphical user
asynchronous communication -> A form of data transmission in which interface such as Windows. Any pattern or picture that can be stored as a
information is sent and received at irregular intervals, one character at a bitmap (.bmp) file can be set as a screen background.
time. Because data is received at irregular intervals, the receiving modem
background program -> A program that runs while the user is working on
must be signaled to let it know when the data bits of a character begin and
another task. The computer's microprocessor assigns fewer resources to
end. This is done by means of start and stop bits. See also: modem
background programs than foreground programs. See also: foreground
(modulator/demodulator)
program
Asynchronous Transfer Mode (ATM) -> A high-speed connection-
backup domain controller (BDC) -> In Windows NT Server 4.0 or earlier,
oriented protocol used to transport many different types of network traffic.
a computer running Windows NT Server that receives a copy of the
ATM packages data in a 53-byte, fixed-length cell that can be switched
domain's directory database (which contains all account and security
quickly between logical connections on a network. See also: protocol
policy information for the domain).
ATM adaptation layer (AAL) -> The layer of the ATM protocol stack that The copy is synchronized periodically and automatically with the
parses data into the payload portion of the ATM cell for transport across an master copy on the primary domain controller (PDC). BDCs also
ATM network. See also: Asynchronous Transfer Mode (ATM) authenticate user logon information and can be promoted to function as
PDCs as needed. Multiple BDCs can exist in a domain. Windows NT 3.51
Attribute -> For files, information that indicates whether a file is read-only,
and 4.0 BDCs can participate in a Windows 2000 domain when the
hidden, ready for archiving (backing up), compressed, or encrypted, and
domain is configured in mixed mode. See also: primary domain
whether the file contents should be indexed for fast file searching.
controller (PDC)

Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
backup media pool -> A logical collection of data-storage media that has match that of the slower modem. See also: bits per second (bps);
been reserved for use by Microsoft Windows Backup. Backup uses modem (modulator/demodulator)
Removable Storage to control access to specific media within a library.
Berkeley Internet Name Domain (BIND) -> An implementation of DNS
See also: library; media pool; Removable Storage
written and ported to most available versions of the UNIX operating
backup operator -> A type of local or global group that contains the user system. The Internet Software Consortium maintains the BIND software.
rights you need to back up and restore files and folders. Members of the See also: DNS; BIND boot file
Backup Operators group can back up and restore files and folders
binary -> A base-2 number system in which values are expressed as
regardless of ownership, permissions, encryption, or auditing settings. See
combinations of two digits, 0 and 1.
also: auditing; global group; local group; user rights
BIND boot file -> Configuration file used by Domain Name System (DNS)
backup set -> A collection of files, folders, and other data that has been
servers running under versions of the Berkeley Internet Name Domain
backed up and stored in a file or on one or more tapes. See also: backup
(BIND) software implementation. The BIND boot file is a text file,
set catalog; on-disk catalog; on-media catalog
Named.boot, where individual lines in the file list boot directives used to
backup set catalog -> A summary of the files and folders that have been start a service when the DNS server is started. By default, Microsoft DNS
saved in a backup set. See also: backup set servers use DNS service parameters stored in the registry, but they allow
the use of a BIND boot file as an alternative for reading boot configuration
backup types -> A type that determines which data is backed up and how
settings. See also: Berkeley Internet Name Domain (BIND); registry
it is backed up. There are five backup types: copy, daily, differential,
boot
incremental, and normal. See also: copy backup; daily backup;
differential backup; incremental backup; normal backup bindery -> A database in Novell NetWare 3.x that contains organizational
and security information about users and groups.
bandwidth -> In analog communications, the difference between the
highest and lowest frequencies in a given range. For example, an analog BIOS See definition for: basic input/output system (BIOS)
telephone line accommodates a bandwidth of 3,000 hertz (Hz), the
bit (binary digit) -> The smallest unit of information handled by a
difference between the lowest (300 Hz) and highest (3,300 Hz)
computer. One bit expresses a 1 or a 0 in a binary numeral, or a true or
frequencies it can carry. In digital communications, bandwidth is expressed
false logical condition. A group of 8 bits makes up a byte, which can
in bits per second (bps). See also: bits per second (bps)
represent many types of information, such as a letter of the alphabet, a
Bandwidth Allocation Protocol (BAP) -> A PPP control protocol that is decimal digit, or other character. Bit is also called binary digit. See also:
used on a multiprocessing connection to dynamically add and remove binary
links. See also: Point-to-Point Protocol (PPP)
bits per second (bps) -> The number of bits transmitted every second,
base priority -> A precedence ranking that determines the order in which used as a measure of the speed at which a device, such as a modem, can
the threads of a process are scheduled for the processor. Use Task transfer data. See also: modem (modulator/demodulator)
Manager to view and change base priorities.
boot -> The process of starting or resetting a computer. When first turned
For Message Queuing, a property that specifies the queue's
on (cold boot) or reset (warm boot), the computer runs the software that
priority in a public queue. You can set the base priority from -32,768 to
loads and starts the computer's operating system, which prepares it for
32,767; the default priority is 0. Private queues do not support base
use.
priority. Message Queuing routes and delivers messages first by base
priority, then by message priority. See also: Message Queuing; private boot files -> The system files needed to start Windows. The boot files
queue; public queue include Ntldr and Ntdetect.com. See also: partition boot sector
basic disk -> A physical disk that can be accessed by MS-DOS and all Boot Logging -> A process in which a computer that is starting (booting)
Windows-based operating systems. Basic disks can contain up to four creates a log file that records the loading of each device and service. The
primary partitions, or three primary partitions and an extended partition log file is called Ntbtlog.txt, and it is saved in the system root directory. See
with multiple logical drives. If you want to create partitions that span also: systemroot
multiple disks, you must first convert the basic disk to a dynamic disk using
boot partition -> The partition that contains the Windows operating
Disk Management or the Diskpart.exe command-line utility. See also:
system and its support files. The boot partition can be, but does not have
dynamic disk; extended partition; logical drive; MS-DOS (Microsoft
to be, the same as the system partition. See also: partition; Primary
Disk Operating System); primary partition
disk; system partition
basic input/output system (BIOS) -> On x86-based computers, the set of
boot volume -> The volume that contains the Windows operating system
essential software routines that test hardware at startup, start the
and its support files. The boot volume can be, but does not have to be, the
operating system, and support the transfer of data among hardware
same as the system volume. See also: system volume; volume
devices. The BIOS is stored in read-only memory (ROM) so that it can be
executed when you turn on the computer. Although critical to performance, BOOTP extensions -> A set of optional information types defined
the BIOS is usually invisible to computer users. See also: Extensible originally in RFC 1497 for use with BOOTP service and later supported by
Firmware Interface (EFI); read-only memory (ROM); x86 DHCP. In DHCP, these extensions form the legacy core set of client
parameters available and supported by most standard DHCP and BOOTP
basic storage -> A storage method in MS-DOS, Windows, Windows NT,
servers. See also: bootstrap protocol (BOOTP)
and Windows 2000 for primary partitions, extended partitions, and logical
drives. See also: dynamic storage; extended partition; logical drive bootstrap protocol (BOOTP) -> A protocol used primarily on TCP/IP
networks to configure diskless workstations. RFCs 951 and 1542 define
basic volume -> A primary partition or logical drive that resides on a basic
this protocol. DHCP is a later boot configuration protocol that uses this
disk. See also: basic disk; logical drive; primary partition
protocol. The Microsoft DHCP service provides limited support for BOOTP
batch program-> An ASCII (unformatted text) file that contains one or service. See also: Transmission Control Protocol/Internet Protocol
more operating system commands. A batch program's file name has a (TCP/IP); Dynamic Host Configuration Protocol (DHCP); Request for
.cmd or .bat extension. When you type the file name at the command Comments (RFC)
prompt, or when the batch program is run from another program, its
broadband -> Of or relating to communications systems in which the
commands are processed sequentially. Batch programs are also called
medium of transmission (such as a wire or fiber-optic cable) carries
batch files. See also: American Standard Code for Information
multiple messages at a time, each message modulated on its own carrier
Interchange (ASCII); logon script
frequency by a modem.
baud rate -> The speed at which a modem communicates. Baud rate
broadband connection -> A high-speed connection. Broadband
refers to the number of times the condition of the line changes. This is
connections are typically 256 kilobytes per second (KBps) or faster.
equal to bits per second only if each signal corresponds to one bit of
Broadband includes DSL and cable modem service.
transmitted data.
Modems must operate at the same baud rate in order to broadband integrated services digital network (B-ISDN) -> An ITU-T
communicate with each other. If the baud rate of one modem is set higher communication standard for high-speed networking that provides new
than that of the other, the faster modem usually alters its baud rate to services, including voice, video, and data on the same network. See also:
Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
International Telecommunication Union - Telecommunication callback security -> A form of network security in which a remote access
[Standardization Sector] (ITU-T) server calls a user back at a preset number after the user has made an
initial connection and has been authenticated. See also: preset-to
broadcast -> An address that is destined for all hosts on a particular
callback; remote access server
network segment.
called subscriber ID (CSID) string -> A string that specifies the called
browser -> Software that interprets the markup of files in HTML, formats
subscriber ID transmitted by the receiving fax machine when receiving an
them into Web pages, and displays them to the end user. Some browsers
inbound fax. This string is usually a combination of the fax or telephone
also permit end users to send and receive e-mail, read newsgroups, and
number and the name of the business. It is often the same as the
play sound or video files embedded in Web documents. See also: World
transmitter subscriber ID. See also: string; transmitting station ID
Wide Web
(TSID) string
buffer -> A region of RAM reserved for use with data that is temporarily
canonical (CNAME) resource record -> A resource record used to map
held while waiting to be transferred between two locations, such as
an alternate alias name to a primary canonical DNS domain name used in
between an application's data area and an input/output device. See also:
the zone. See also: resource record (RR)
random access memory (RAM)
canonical name -> An object's distinguished name presented with the
built-in groups -> The default security groups installed with the operating
root first and without the LDAP attribute tags (such as: CN=, DC=). The
system. Built-in groups have been granted useful collections of rights and
segments of the name are delimited with forward slashes (/). For example,
built-in abilities.
In most cases, built-in groups provide all the capabilities needed CN=MyDocuments,OU=MyOU,DC=Microsoft,DC=Com
by a particular user. For example, if a domain user account belongs to the
is presented as
built-in Administrators group, logging on with that account gives a user
administrative capabilities over the domain and the domain servers. To microsoft.com/MyOU/MyDocuments
provide a needed set of capabilities to a user account, assign it to the
in canonical form. See also: distinguished name; Lightweight Directory
appropriate built-in group. See also: group
Access Protocol (LDAP)
bus -> A communication line used for data transfer among the
cartridge font -> A font contained in a plug-in cartridge and used to add
components of a computer system. A bus essentially allows different parts
fonts to laser, ink-jet, or high-end dot-matrix printers. Cartridge fonts are
of the system to share data. For example, a bus connects the disk-drive
distinguished both from internal fonts, which are contained in ROM in the
controller, memory, and input/output ports to the microprocessor. See
printer and are always available, and from downloadable (soft) fonts, which
also: expansion slot; universal serial bus (USB)
reside on disk and which can be sent to the printer as needed. See also:
bytes -> A unit of data that typically holds a single character, such as a downloadable fonts; font; font cartridge; read-only memory (ROM)
letter, a digit, or a punctuation mark. Some single characters can take up
cascading hubs -> A network configuration in which hubs are connected
more than one byte. See also: bit (binary digit)
to other hubs. See also: hub
C
catalog -> For Indexing Service, a collection of all index information and
cable modem -> A device that enables a broadband connection to the
stored properties for a particular group of file system directories. By
Internet by using cable television infrastructure. Access speeds vary
default, Indexing Service indexes the System and Web catalogs on your
greatly, with a maximum throughput of 10 megabits per second (Mbps).
hard drive. See also: property
cache -> For DNS and WINS, a local information store of resource records
CD-R -> Recordable compact disc. Data can be copied to the CD on more
for recently resolved names of remote hosts. Typically, the cache is built
than one occasion; however, data cannot be erased from the CD.
dynamically as the computer queries and resolves names. It also helps
optimize the time required to resolve queried names. See also: cache file; CD-RW -> Rewritable compact disc. Data can be copied to the CD on
resource record (RR) more than one occasion and can be erased.
cache file -> A file used by the Domain Name System (DNS) server to certificate -> A digital document that is commonly used for authentication
preload its names cache when service is started. Also known as the root and secure exchange of information on open networks, such as the
hints file because DNS uses resource records stored in this file to help Internet, extranets, and intranets. A certificate securely binds a public key
locate root servers that provide referral to authoritative servers for remote to the entity that holds the corresponding private key. Certificates are
names. For Windows DNS servers, the cache file is named Cache.dns and digitally signed by the issuing certification authority and can be issued for a
is located in the %SystemRoot%\System32\Dns folder. See also: user, a computer, or a service. The most widely accepted format for
authoritative; cache; systemroot certificates is defined by the ITU-T X.509 version 3 international standard.
See also: International Telecommunication Union -
caching -> The process of temporarily storing recently used data values in
Telecommunication [Standardization Sector] (ITU-T); certification
a special pool in memory for quicker subsequent access. For DNS,
authority (CA); private key; public key; service
typically the ability of the DNS server to store information learned about
the DNS namespace during the resolution of DNS queries. (For example, certificate revocation list (CRL) -> A document maintained and
the DNS server can cache DNS records received from other DNS servers.) published by a certification authority that lists certificates that have been
Caching is also available through the DNS Client service as a way for DNS revoked. See also: certificate; certification authority (CA)
clients to keep a cache of information learned during recent queries. See
certificate store -> Typically, a permanent storage where certificates,
also: caching resolver; DNS Server; Domain Name System (DNS)
certificate revocation lists, and certificate trust lists are stored. See also:
caching resolver -> A client-side DNS name resolution service that certificate; certificate revocation list (CRL); certificate trust list (CTL)
performs caching of recently learned DNS domain name information. The
certificate template -> A Windows construct that profiles certificates (that
caching resolver service provides system-wide access to DNS-aware
is, it prespecifies the format and content) based on their intended usage.
programs for resource records obtained from DNS servers during
When requesting a certificate from a Windows enterprise certification
processing of name queries. Cached data is used for a limited period of
authority (CA), certificate requestors are, depending on their access rights,
time and aged according to the active Time-to-Live (TTL) value. You can
able to select from a variety of certificate types that are based on
set the TTL individually for each resource record (RR). Otherwise, it
certificate templates, such as User and Code Signing. See also:
defaults to the minimum TTL set in the SOA RR for the zone. See also:
certificate; certification authority (CA)
caching; expire interval; minimum TTL; resolver; resource record
(RR); Time to Live (TTL) certificate trust list (CTL) -> A signed list of root certification authority
certificates that an administrator considers reputable for designated
callback number -> The number that a remote access server uses to call
purposes, such as client authentication or secure e-mail. See also:
back a user. This number can be preset by the administrator or specified
certificate; certification authority (CA); root certificate
by the user at the time of each call, depending on how the administrator
configures the user's callback options. The callback number should be the certification authority (CA) -> An entity responsible for establishing and
number of the phone line to which the user's modem is connected. See vouching for the authenticity of public keys belonging to users (end
also: preset-to callback; remote access server; set-by-caller callback entities) or other certification authorities. Activities of a certification
authority can include binding public keys to distinguished names through
Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
signed certificates, managing certificate serial numbers, and certificate client request -> A service request from a client computer to a server
revocation. See also: certificate; public key; root authority computer or, for Network Load Balancing, a cluster of computers. Network
Load Balancing forwards each client request to a specific host within the
certification hierarchy -> A model of trust for certificates in which
cluster according to the system administrator's load-balancing policy. See
certification paths are created by means of the establishment of parent-
also: client; cluster; host; load balancing; server
child relationships between certification authorities. See also: certification
authority (CA); certification path ClipBook Server -> A system service that supports ClipBook Viewer,
which allows pages to be seen by remote ClipBooks.
certification path -> An unbroken chain of trust, consisting of certificates
from trusted certificate authorities, from a specific certificate to the root cluster -> In data storage, the smallest amount of disk space that can be
certification authority in a certification hierarchy. See also: public key allocated to hold a file. All file systems used by Windows organize hard
disks based on clusters, which consist of one or more contiguous sectors.
Challenge Handshake Authentication Protocol (CHAP) -> A challenge-
The smaller the cluster size, the more efficiently a disk stores information.
response authentication protocol for PPP connections documented in RFC
If no cluster size is specified during formatting, Windows picks defaults
1994 that uses the industry-standard Message Digest 5 (MD5) one-way
based on the size of the volume. These defaults are selected to reduce the
encryption scheme to hash the response to a challenge issued by the
amount of space that is lost and the amount of fragmentation on the
remote access server.
volume. A cluster is also called an allocation unit.
channel -> A path or link through which noncontrol information passes In computer networking, a group of independent computers that
between two devices. A single Basic Rate Interface (BRI) connection, for work together to provide a common set of services and present a single-
example, has one physical connection but two channels for exchanging system image to clients. The use of a cluster enhances the availability of
information between devices. This is often called a bearer channel, the services and the scalability and manageability of the operating system
implying a channel that carries information. that provides the services. See also: availability; client; file system;
On the Internet, a Web site designed to deliver content from the scalability; volume
Internet to your computer, similar to subscribing to a favorite Web site. See
cluster adapter -> The adapter that, when using multiple network
also: active content; B-channel; D-channel
adapters in each host of a Network Load Balancing cluster, handles the
CHAP (Challenge Handshake Authentication Protocol) -> An network traffic for cluster operations (the traffic for all hosts in the cluster).
authentication protocol used by Microsoft remote access and Network This adapter is programmed with the host's cluster IP address. See also:
Connections. Using CHAP, a remote access client can send its cluster; dedicated adapter; IP address
authentication credentials to a remote access server in a secure form.
Cluster Administrator -> An application that is used to configure a cluster
Microsoft has created a Windows-specific variant of CHAP called MS-
and its nodes, groups, and resources. Cluster Administrator can run on
CHAP. See also: remote access server; remote access
any member of the trusted domain regardless of whether the computer is a
character mode -> A display mode in which the monitor can display cluster node. See also: cluster; Cluster.exe; server cluster
letters, numbers, and other text characters, but no graphical images or
Cluster Administrator extension -> A software component that
character formatting (italics, superscript, and so on).
implements the Cluster Administrator extension application programming
checkpoints See definition for: Restore Point interface (API) for allowing Cluster Administrator to configure a new
resource type. See also: application programming interface (API);
child object -> An object that resides in another object. A child object
cluster; Cluster Administrator
implies relation. For example, a file is a child object that resides in a folder,
which is the parent object. See also: object; parent object Cluster API -> A collection of functions that are implemented by the
cluster software and used by a cluster-aware client or server application, a
Class A IP address -> A unicast IP address that ranges from 1.0.0.1
cluster management application, or a Resource DLL. The Cluster API is
through 126.255.255.254. The first octet indicates the network, and the
used to manage the cluster, cluster objects, and the cluster database. See
last three octets indicate the host on the network. See also: Class B IP
also: cluster; Resource DLL; server cluster
address; Class C IP address; IP address
cluster disk -> A disk on a shared bus connected to the cluster nodes,
Class B IP address -> A unicast IP address that ranges from 128.0.0.1
which all the cluster nodes can access (though not at the same time).
through 191.255.255.254. The first two octets indicate the network, and
the last two octets indicate the host on the network. See also: Class A IP Cluster service -> The essential software component that controls all
address; Class C IP address; IP address aspects of server cluster operation and manages the cluster database.
Each node in a server cluster runs one instance of the Cluster service. See
Class C IP address -> A unicast IP address that ranges from 192.0.0.1 to
also: cluster; server cluster
223.255.255.254. The first three octets indicate the network, and the last
octet indicates the host on the network. Network Load Balancing provides cluster-aware application -> An application that can run on a cluster
optional session support for Class C IP addresses (in addition to support node and that can be managed as a cluster resource. Cluster-aware
for single IP addresses) to accommodate clients that make use of multiple applications use the Cluster API to receive status and notification
proxy servers at the client site. See also: Class A IP address; Class B IP information from the server cluster. See also: server cluster; Cluster
address; IP address API; cluster-unaware application; cluster
classical IP over ATM (CLIP) -> A proposed Internet standard, described cluster-unaware application -> An application that can run on a cluster
in RFC 2225, that allows IP communication directly on the ATM layer, node and be managed as a cluster resource but that does not support the
bypassing an additional protocol (such as Ethernet or Token Ring) in the Cluster API. See also: cluster-aware application; cluster; Cluster API
protocol stack. See also: Asynchronous Transfer Mode (ATM); Internet
Cluster.exe -> An alternative to using Cluster Administrator to administer
Protocol (IP)
clusters from the command prompt. You can also call Cluster.exe from
clear -> To turn off an option by removing the X or check mark from a command scripts to automate many cluster administration tasks. See also:
check box. You clear a check box by clicking it, or by selecting it and then Cluster Administrator; cluster
pressing the SPACEBAR.
Cmd Show Override, with -> When checked, opens the DDE server
client -> Any computer or program connecting to, or requesting the application as specified by the integer in value. Possible values are 1
services of, another computer or program. Client can also refer to the (normal), 2 (minimized), 3 (maximized), and 10 (application default).
software that enables the computer or program to establish the When cleared, the DDE server application opens.
connection.
CMYK color space -> Multidimensional color space consisting of the
For a local area network (LAN) or the Internet, a computer that
cyan, magenta, yellow, and black intensities that make up a given color.
uses shared network resources provided by another computer (called a
Commercial color printing devices generally use this system of four-color
server). See also: server
process inks. See also: color management; color space
client application -> A Windows-based application that can display and
code page -> A means of providing support for character sets and
store linked or embedded objects. For distributed applications, the
keyboard layouts for different countries or regions. A code page is a table
application that imitates a request to a server application.
that relates the binary character codes used by a program to keys on the
keyboard or to characters on the display.
Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
computer administrator -> A user who manages a computer. The
codec -> Hardware that can convert audio or video signals between
computer administrator makes system-wide changes to the computer,
analog and digital forms (coder/decoder); hardware or software that can
including installing programs and accessing all files on the computer, and
compress and uncompress audio or video data
can create, change and delete the accounts of other users.
(compression/decompression); or the combination of coder/decoder and
compression/decompression. Generally, a codec compresses Computer Browser service -> A service that maintains an up-to-date list
uncompressed digital data so that the data uses less memory. of computers and provides the list to applications when requested. The
Computer Browser service provides the computer lists displayed in the My
color depth -> The number of colors per pixel your monitor and graphics
Network Places, Select Computer, and Select Domain dialog boxes and
adapter support.
(for Windows 2000 Server only) in the Server Manager window. See also:
color gamut -> The particular range of colors that a device is able to service
produce. A device such as a scanner, monitor, or printer can produce a
Computer Management -> A component you can use to view and control
unique range of colors, which is determined by the characteristics of the
many aspects of the computer configuration. Computer Management
device itself. See also: color profile; rendering intent
combines several administration utilities into a single console tree,
color management -> Process of producing accurate, consistent color providing easy access to a local or remote computers administrative
among a variety of input and output devices. A color management system properties and tools.
(CMS) maps colors between devices such as scanners, monitors, and
computer quota -> For Message Queuing, the storage size limit for
printers; transforms colors from one color space to another (for example,
messages on a computer, based on the total size of the messages. When
RGB to CMYK); and provides accurate on-screen or print previews. See
a computer quota is reached, Message Queuing can no longer send
also: CMYK color space; RGB color space
messages to that computer until one or more messages are removed from
color profile -> A profile that contains the data needed for translating the queues. Message Queuing enforces the computer quota before it enforces
values of a color gamut. This data includes information about color, hue, the queue quota on a computer. See also: Message Queuing; queue
saturation, and brightness. See also: color gamut; hue; saturation quota
color space -> A set of three values that defines how a color can be connect -> To assign a drive letter, port, or computer name to a shared
represented on computer devices such as monitors, scanners, and resource so that you can use it. See also: shared resource
printers. For example, in the LAB color space, the terms luminance or
connected, authenticating user -> A user's status when a telephone
whiteness (L), redness-greenness (A), and yellowness-blueness (B) are
connection has been established but authentication has not yet taken
used; in the HVC system, the terms are hue (H), value (V), and chroma
place. The user may be trying to prove security clearance, or the system
(C). Color space refers to the three-dimensional space that is defined by
may be idle. If this condition occurs, followed by the Waiting for Call phase,
the respective values, such as L, A, and B. See also: CMYK color space;
then the user was unable to provide a correct user name or password. If
color space; RGB color space
this phase is repeated, followed by the Waiting for Call phase, an
command prompt window -> A window displayed on the desktop used to unauthorized attempt to access the network may be under way. See also:
interface with the MS-DOS operating system. MS-DOS commands are authentication; Waiting for Call
typed at an entry point identified by a blinking cursor. See also: MS-DOS
connected, user authenticated -> A user's status when a telephone
(Microsoft Disk Operating System)
connection has been established and the user has entered a correct user
common groups -> Groups that appear in the program list on the Start name and password. If the user has callback permission and has
menu for all users who log on to the computer. Only administrators can requested callback, the connection is followed by the calling-back phase. If
create or change common groups. See also: group the calling-back phase is followed by a waiting-for-call phase, then the
server was unable to reach the user at the specified number. The user
communication port -> A port on a computer that allows asynchronous
may have supplied an inaccurate callback number (in the case of set-by-
communication of one byte at a time. A communication port is also called a
caller callback), or an unauthorized attempt to access the network may be
serial port. See also: asynchronous communication; serial port
under way (in the case of preset-to callback). See also: preset-to
communication settings -> Operating parameters, such as bits per callback; set-by-caller callback
second (bps) and modem type, that apply to serial ports on a computer.
connector application -> For Message Queuing, an application that
See also: bits per second (bps); modem (modulator/demodulator);
enables Message Queuing computers to communicate with computers that
serial port
use other messaging systems. See also: connector queue; foreign
community name -> A name used to group SNMP hosts. This name is computer; Message Queuing
placed in SNMP messages sent between SNMP-managed devices such
connector queue -> For Message Queuing, a queue created on servers
as Windows 2000-based server computers and SNMP management
running a connector application. You can use the connector application to
stations. Typically, all hosts belong to Public, which is the standard name
exchange messages with computers that are running other message-
for a common community of all SNMP hosts. See also: Simple Network
queuing products. See also: connector application; foreign computer;
Management Protocol (SNMP); trap
Message Queuing
compatibility mode -> A feature of a computer or operating system that
console tree -> The left pane in a Microsoft Management Console (MMC)
allows it to run programs written for a different system. Programs often run
that displays the items contained in the console. By default it is the left
slower in compatibility mode.
pane of a console window, but it can be hidden. The items in the console
Complementary Metal Oxide Semiconductor (CMOS) -> A specific type tree and their hierarchical organization determine the capabilities of a
of semiconductor technology that requires very little power. The term has console. See also: Microsoft Management Console (MMC)
been popularized to mean a small storage area where your system keeps
constant bit rate (CBR) -> An ATM service type that supports constant
track of certain hardware parameters, such as the size of your hard disk,
bandwidth allocation. This service type is used for voice and video
the number of serial ports your computer has, etc. CMOS is also called
transmissions that require little or no cell loss and rigorous timing controls
Setup RAM.
during transmission. See also: Asynchronous Transfer Mode (ATM)
Compression Control Protocol (CCP) -> A protocol used in the
container object -> An object that can logically contain other objects. For
negotiation process in a PPP connection. Compression Control Protocol is
example, a folder is a container object. See also: noncontainer object;
one type of Network Control Protocol (NCP). NCPs are used to establish
object
and configure different network protocol parameters for IP, IPX, and
NetBEUI. See also: Internet Protocol (IP); Internetwork Packet convergence -> The process of stabilizing a system after changes occur
Exchange (IPX); Point-to-Point Protocol (PPP) in the network. For routing, if a route becomes unavailable, routers send
update messages throughout the internetwork, reestablishing information
computer account -> An account that is created by a domain
about preferred routes.
administrator and uniquely identifies the computer on the domain. The
For Network Load Balancing, a process by which hosts
Windows computer account matches the name of the computer joining the
exchange messages to determine a new, consistent state of the cluster
domain. See also: domain
and to elect the host with the highest host priority, known as the default
host. During convergence, a new load distribution is determined for hosts
Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
that share the handling of network traffic for specific TCP or UDP ports. Data Communications Equipment (DCE) -> One of two types of
See also: cluster; default host; host; User Datagram Protocol (UDP) hardware connected by an RS-232-C serial connection, the other being a
Data Terminal Equipment (DTE) device. A DCE is an intermediary device
copy backup -> A backup that copies all selected files but does not mark
that often transforms input from a DTE before sending it to a recipient. A
each file as having been backed up (in other words, the archive attribute is
modem, for example, is a DCE that modulates data from a microcomputer
not cleared). Copying is useful if you want to back up files between normal
(DTE) and sends it along a telephone connection. See also: Data
and incremental backups because copying does not affect these other
Terminal Equipment (DTE); RS-232-C standard
backup operations. See also: daily backup; differential backup;
incremental backup; normal backup Data Link Control (DLC) -> An address that uniquely identifies a node on
a network. Every network adapter has a DLC address or DLC identifier
count limit -> For Process Control, the maximum number of active
(DLCI). Some network protocols, such as Ethernet and Token Ring, use
processes in a process group. You can configure this in the Process
DLC addresses exclusively. Other protocols, such as TCP/IP, use a logical
Control snap-in.
address at the OSI Network layer to identify nodes.
CPU Time -> In Task Manager, the total processor time, in seconds, used However, all network addresses must eventually be translated to
by a process since it started. See also: Task Manager DLC addresses. In TCP/IP networks, this translation is performed by the
Address Resolution Protocol (ARP). See also: Address Resolution
CPU Usage -> In Task Manager, the percentage of time that a process
Protocol (ARP); Open Systems Interconnection (OSI) reference model
used the CPU since the last update. On the Task Manager Process tab,
the column heading is CPU. See also: Task Manager data packet -> A unit of information transmitted as a whole from one
device to another on a network.
crash consistency -> A feature of shadow copy backups that ensures all
files are backed up, regardless of their state. See also: volume shadow Data Terminal Equipment (DTE) -> In the RS-232-C hardware standard,
copy any device, such as a remote access server or client, that has the ability to
transmit information in digital form over a cable or a communications line.
CRC errors -> Errors caused by the failure of a cyclic redundancy check.
See also: Data Communications Equipment (DCE); remote access
A CRC error indicates that one or more characters in the data packet
server; RS-232-C standard
received were found garbled on arrival.
data-overrun error -> A state in which the sending computer is
credentials -> A set of information that includes identification and proof of
transmitting characters faster than the receiving computer can
identification that is used to gain access to local and network resources.
accommodate them. If this problem persists, reduce the bits-per-second
Examples of credentials are user names and passwords, smart cards, and
(bps) rate. See also: bits per second (bps)
certificates.
datagram -> One packet, or unit, of information that includes relevant
CRL distribution point -> An optional extension in an X.509v3 certificate
delivery information, such as the destination address, that is sent through
that identifies how information is obtained. Also, a directory entry or other
a packet-switching network. See also: packet
distribution source for certificate revocation lists. See also: certificate;
certificate revocation list (CRL); X.509v3 certificate dead-letter queue -> For Message Queuing, a queue that stores
nontransactional messages that are undeliverable or expired. These
cross-reference object -> Objects in which Active Directory stores
queues store failed messages on the computer on which the message
information about directory partitions and external directory services. An
expired. Messages in these queues are written to disk and are therefore
example of an external directory service is another LDAP-compliant
recoverable. See also: transaction dead-letter queue; transactional
directory. See also: Active Directory; directory partition; Lightweight
message
Directory Access Protocol (LDAP)
debugger -> A program designed to aid in detecting, locating, and
CryptoAPI -> An application programming interface (API) that is provided
correcting errors in another program by allowing the programmer to step
as part of Microsoft Windows. CryptoAPI provides a set of functions that
through the program, examine the data, and monitor conditions such as
allow applications to encrypt or digitally sign data in a flexible manner while
the values of variables.
providing protection for the user's sensitive private key data. Actual
cryptographic operations are performed by independent modules known dedicated adapter -> The network adapter that, when using multiple
as cryptographic service providers (CSPs). See also: application network adapters in each host of a Network Load Balancing cluster,
programming interface (API); cryptographic service provider (CSP); handles network traffic not related to cluster operations (the traffic for
private key individual hosts on the network). This adapter is programmed with the
host's dedicated IP address. See also: cluster adapter; IP address
cryptographic service provider (CSP) -> The code that performs
authentication, encoding, and encryption services that Windows-based default button -> In some dialog boxes, the command button that is
applications access through the CryptoAPI. A CSP is responsible for selected or highlighted when the dialog box is initially displayed. The
creating keys, destroying them, and using them to perform a variety of default button has a bold border, indicating that it will be chosen
cryptographic operations. Each CSP provides a different implementation of automatically if you press ENTER. You can override a default button by
the CryptoAPI. Some provide stronger cryptographic algorithms, while clicking Cancel or another command button.
others contain hardware components, such as smart cards. See also:
default gateway -> A configuration item for the TCP/IP protocol that is the
smart card; CryptoAPI; service
IP address of a directly reachable IP router. Configuring a default gateway
cryptography -> The processes, art, and science of keeping messages creates a default route in the IP routing table.
and data secure. Cryptography is used to enable and ensure
default host -> The host with the highest host priority for which a
confidentiality, data integrity, authentication (entity and data origin), and
drainstop command is not in progress. After convergence, the default host
nonrepudiation.
handles all of the network traffic for TCP and UDP ports that are not
custom file type -> Typically, files with extensions that have been created otherwise covered by port rules. See also: convergence; drainstop;
for special kinds of files. Custom file types are not tracked by the system host priority; port rule; User Datagram Protocol (UDP)
registry. See also: registry
default network -> In the Macintosh environment, the physical network on
D which the processes of a server reside as nodes and on which the server
D-channel -> A separate channel of an ISDN line that is used for ISDN appears to users. The default network of the server must be one to which
signaling. For ISDN Basic Rate Interface (BRI), the D-channel is 16 kilobits that server is attached. Only servers on AppleTalk Phase 2 internets have
per second (Kbps). For ISDN Primary Rate Interface (PRI), the D-channel default networks. See also: internet
is 64 Kbps. D-channel is also called data channel. See also: Integrated
default printer -> The printer to which a computer sends documents if you
Services Digital Network (ISDN); switch type
select the Print command without first specifying which printer you want to
daily backup -> A backup that copies all selected files that have been use with a program. You can have only one default printer; it should be the
modified the day the daily backup is performed. The backed-up files are printer you use most often. See also: printer
not marked as having been backed up (in other words, the archive
default user -> The profile that serves as a basis for all user profiles.
attribute is not cleared). See also: copy backup; differential backup;
Every user profile begins as a copy of the default user profile.
incremental backup; normal backup
Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
default zone -> The zone to which all Macintosh clients on the network device fonts -> Fonts that reside in your printer. They can be built into the
are assigned by default. See also: zone printer itself or provided by a font cartridge or font card. See also: font;
font cartridge; printer fonts
defragmentation -> The process of rewriting parts of a file to contiguous
sectors on a hard disk to increase the speed of access and retrieval. When Device Manager -> An administrative tool that you can use to manage the
files are updated, the computer tends to save these updates on the largest devices on your computer. Using Device Manager, you can view and
continuous space on the hard disk, which is often on a different sector than change device properties, update device drivers, configure device settings,
the other parts of the file. When files are thus fragmented, the computer and uninstall devices. See also: device; uninstall
must search the hard disk each time the file is opened to find all of the
DFS link -> An element in the Distributed File System (DFS) namespace
file's parts, which slows down response time. See also: fragmentation
that lies below the root and maps to one or more targets, each of which
delegation -> The ability to assign responsibility for management and corresponds to a shared folder or another DFS root. See also: DFS root;
administration of a portion of the namespace to another user, group, or domain DFS
organization.
DFS root -> The starting point of the Distributed File System (DFS)
For DNS, a name service record in the parent zone that lists the
namespace. The root is often used to refer to the namespace as a whole.
name server authoritative for the delegated zone. See also: Domain
A root maps to one or more root targets, each of which corresponds to a
Name System (DNS)
shared folder on a server. See also: DFS link
denial-of-service attack -> An attack in which an attacker exploits a
DFS topology -> The overall logical hierarchy of the Distributed File
weakness or a design limitation of a network service to overload or halt the
System (DFS), including elements such as roots, links, shared folders, and
service, so that the service is not available for use. This type of attack is
replica sets, as depicted in the DFS administrative console. This is not to
typically launched to prevent other users from using a network service
be confused with the DFS namespace, which is the logical view of shared
such as a Web server or a file server.
resources seen by users. See also: DFS link; DFS root; domain DFS
dependency -> A relationship of reliance between two resources that
DHCP client -> Any network-enabled device that supports the ability to
makes it necessary for them to run in the same group on the same node.
communicate with a DHCP server for the purpose of obtaining dynamic
For example, an application is dependent on the disks that contain its data
leased IP configuration and related optional parameters information. See
resources. See also: resource
also: Dynamic Host Configuration Protocol (DHCP); DHCP server;
dependency tree -> A diagram for visualizing the dependency lease
relationships between resources. See also: dependency; resource
DHCP option -> Address configuration parameters that a DHCP service
dependent client -> For Message Queuing, a computer that requires assigns to clients. Most DHCP options are predefined, based on optional
synchronous access to a Message Queuing server to perform all standard parameters defined in Request for Comments (RFC) 1542, although
message queuing operations, such as sending and receiving messages extended options can be added by vendors or users. See also: Dynamic
and creating queues. See also: independent client; Message Queuing Host Configuration Protocol (DHCP); service
server
DHCP server -> A computer running the Microsoft DHCP service that
descendent key -> All the subkeys that appear when a key in the registry offers dynamic configuration of IP addresses and related information to
is expanded. A descendent key is the same as a subkey. See also: key; DHCP-enabled clients. See also: Dynamic Host Configuration Protocol
subkey (DHCP); service; IP address
desired zone -> The zone in which AppleTalk network integration appears DHCP service resource -> A resource type that provides DHCP services
on the network. See also: default zone; zone from a cluster. See also: cluster; Dynamic Host Configuration Protocol
(DHCP)
desktop -> The on-screen work area on which windows, icons, menus,
and dialog boxes appear. DHCP/BOOTP Relay Agent -> The agent program or component
responsible for relaying DHCP and BOOTP broadcast messages between
desktop pattern -> A design that appears across your desktop. You can
a DHCP server and a client across an IP router. A DHCP relay agent
create your own pattern or select a pattern provided by Windows. See
supports DHCP/BOOTP message relay as defined in RFCs 1541 and
also: desktop
2131. The DHCP Relay Agent service is managed using the Routing and
destination document -> The document into which a package or a linked Remote Access service. See also: DHCP server; bootstrap protocol
or embedded object is being inserted. For an embedded object, this is (BOOTP); Dynamic Host Configuration Protocol (DHCP)
sometimes also called the container document. See also: embedded
dial location -> The country code, area code, and specific dialing
object
requirements for the place you are dialing from. Once you have created a
details pane -> The pane in the Microsoft Management Console (MMC) dial location, you can select it to apply the dialing requirements to all your
that displays the details for the selected item in the console tree. The calls. To change dialing locations, select or create a different one.
details can be a list of items or they can be administrative properties,
dial-up connection -> The connection to your network if you are using a
services, and events that are acted on by a snap-in. See also: Microsoft
device that uses the telephone network. This includes modems with a
Management Console (MMC); service; snap-in
standard phone line, ISDN cards with high-speed ISDN lines, or X.25
device -> Any piece of equipment that can be attached to a network or networks.
computer; for example, a computer, printer, joystick, adapter, or modem If you are a typical user, you may have one or two dial-up
card, or any other peripheral equipment. Devices normally require a device connections, for example, to the Internet and to your corporate network. In
driver to function with Windows. See also: device driver; peripheral a more complex server situation, multiple network modem connections
might be used to implement advanced routing. See also: Integrated
device conflict -> A conflict that occurs when the same system resources
Services Digital Network (ISDN); modem (modulator/demodulator)
have been allocated to two or more devices. System resources include
interrupt request (IRQ) lines, direct memory access (DMA) channels, dialog box -> A secondary window that contains buttons and various kinds
input/output (I/O) ports, and memory addresses. See also: direct memory of options through which you can carry out a particular command or task.
access (DMA); input/output (I/O) port; interrupt request (IRQ) lines;
dictionary attack -> A method of guessing a user's password or PIN by
memory address; resource
trying every word in the dictionary until successful.
device driver -> A program that allows a specific device, such as a
differential backup -> A backup that copies files created or changed since
modem, network adapter, or printer, to communicate with the operating
the last normal or incremental backup. It does not mark files as having
system. Although a device might be installed on your system, Windows
been backed up (in other words, the archive attribute is not cleared). If you
cannot use the device until you have installed and configured the
are performing a combination of normal and differential backups, restoring
appropriate driver.
files and folders requires that you have the last normal as well as the last
If a device is listed in the Hardware Compatibility List (HCL), a
differential backup. See also: copy backup; daily backup; incremental
driver is usually included with Windows. Device drivers load automatically
backup; normal backup
(for all enabled devices) when a computer is started, and thereafter run
invisibly.
Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
differential data -> Saved copies of changed data that can be applied to configuration by using Disk Management. See also: mirrored volume;
an original volume to generate a volume shadow copy. See also: volume; RAID-5 volume; registry; simple volume; spanned volume; volume
volume shadow copy
dismount -> To remove a removable tape or disc from a drive. See also:
digital signature -> A means for originators of a message, file, or other library; mount
digitally encoded information to bind their identity to the information. The
display adapter See definition for: video adapter
process of digitally signing information entails transforming the information,
as well as some secret information held by the sender, into a tag called a distinguished name -> A name that uniquely identifies an object by using
signature. Digital signatures are used in public key environments, and they the relative distinguished name for the object, plus the names of container
provide nonrepudiation and integrity services. See also: Digital Signature objects and domains that contain the object. The distinguished name
Standard (DSS); service; time stamp identifies the object as well as its location in a tree. Every object in Active
Directory has a distinguished name. A typical distinguished name might be
Digital Signature Standard (DSS) -> A standard that uses the Digital
Signature Algorithm (DSA) for its signature algorithm and SHA-1 as its CN=MyName,CN=Users,DC=Microsoft,DC=Co
message hash algorithm. DSA is a public-key cipher that is used only to
This identifies the MyName user object in the microsoft.com domain. See
generate digital signatures and cannot be used for data encryption. See
also: Active Directory; domain; object
also: digital signature; Secure Hash Algorithm (SHA-1)
distribution group -> A group that is used solely for e-mail distribution
Digital Subscriber Line (DSL) -> A type of high-speed Internet
and that is not security-enabled. Distribution groups cannot be listed in
connection using standard telephone wires. This is also referred to as a
discretionary access control lists (DACLs) used to define permissions on
broadband connection.
resources and objects. Distribution groups can be used only with e-mail
digital video disc (DVD) -> A type of optical disc storage technology. A applications (such as Microsoft Exchange) to send e-mail to collections of
digital video disc (DVD) looks like a CD-ROM disc, but it can store greater users. If you do not need a group for security purposes, create a
amounts of data. DVDs are often used to store full-length movies and distribution group instead of a security group. See also: discretionary
other multimedia content that requires large amounts of storage space. access control list (DACL); security group
See also: DVD decoder; DVD drive
DLL See definition for: dynamic-link library (DLL)
direct cable connection -> A link between the I/O ports of two computers
DNS See definition for: Domain Name System (DNS)
created with a single cable rather than a modem or other interfacing
devices. In most cases, a direct cable connection is made with a null DNS Server -> A service that maintains information about a portion of the
modem cable. See also: input/output (I/O) port; null modem cable Domain Name System (DNS) database and responds to and resolves
DNS queries. A computer running this service is also known as a DNS
direct memory access (DMA) -> Memory access that does not involve
server. See also: Domain Name System (DNS)
the microprocessor. DMA is frequently used for data transfer directly
between memory and a peripheral device such as a disk drive. See also: DNS suffix -> For DNS, a character string that represents a domain name.
hardware configuration The DNS suffix shows where a host is located relative to the DNS root,
specifying a host’s location in the DNS hierarchy. Usually, DNS suffice
directory partition -> A contiguous subtree of the directory that forms a
describes the latter portion of a DNS name, following one or more of the
unit of replication. A given replica is always a replica of some directory
first labels of a DNS name.
partition. The directory always has at least three directory partitions:
 The schema, which defines the object classes and attributes dock -> To connect a laptop or notebook computer to a docking station.
contained in Active Directory. See also: docking station; hot docking; undock
 The configuration, which identifies the domain controllers, replication docking station -> A unit for housing a portable computer that contains a
topology and other related information about the domain controllers power connection, expansion slots, and connections to peripherals, such
within a specific implementation of Active Directory. as a monitor, printer, full-sized keyboard, and mouse. The docking station
 One or more domains that contain the actual directory object data. turns the portable computer into a desktop computer. See also: dock; hot
A domain controller always stores the partitions for the schema, docking; undock
configuration, and its own (and no other) domain. The schema and
configuration are replicated to every domain controller in the domain tree document -> Any self-contained piece of work created with an application
or forest. The domain is replicated only to domain controllers for that program and, if saved on disk, given a unique file name by which it can be
domain. A subset of the attributes for all domain objects is replicated to the retrieved. See also: filter; property cache
global catalog. See also: Active Directory; attribute; domain; replica; domain -> A group of computers that are part of a network and share a
replication common directory database. A domain is administered as a unit with
directory service -> Both the directory information source and the service common rules and procedures. Each domain has a unique name.
that make the information available and usable. A directory service enables An Active Directory domain is a collection of computers defined
the user to find an object given any one of its attributes. by the administrator of a Windows network. These computers share a
common directory database, security policies, and security relationships
DirectX -> An extension of the Microsoft Windows operating system. with other domains. An Active Directory domain provides access to the
DirectX technology helps games and other programs use the advanced centralized user accounts and group accounts maintained by the domain
multimedia capabilites of your hardware. administrator. An Active Directory forest is made up of one or more
disable -> To make a device nonfunctional. For example, if you disable a domains, each of which can span more than one physical location.
device in a hardware configuration, you cannot use the device when your A DNS domain is any tree or subtree within the DNS
computer uses that hardware configuration. Disabling a device frees the namespace. Although the names for DNS domains often correspond to
resources that were allocated to the device. See also: enable; hardware Active Directory domains, DNS domains should not be confused with
configuration Active Directory domains. See also: Active Directory; Domain Name
System (DNS)
discretionary access control list (DACL) -> The part of an object's
security descriptor that grants or denies specific users and groups domain controller -> In a Windows domain environment, a computer
permission to access the object. Only the owner of an object can change running Active Directory that manages user access to a network, which
permissions granted or denied in a DACL; thus, access to the object is at includes logging on, authentication, and access to the directory and shared
the owner's discretion. See also: distribution group; object; security resources. See also: Active Directory; authentication; shared resource
descriptor; security group domain controller locator (Locator) -> An algorithm that runs in the
disk -> A storage device that is attached to a computer. See also: basic context of the Net Logon service and that finds domain controllers on a
disk; dynamic disk Windows 2000 network. Locator can find domain controllers by using DNS
names (for IP/DNS-compatible computers) or by using NetBIOS names
disk configuration information -> Information in the Windows registry on (for computers that are running Windows 3.x, Windows for Workgroups,
assigned drive letters, simple volumes, striped volumes, mirrored volumes, Windows NT 3.5 or later, Windows 95, or Windows 98, or it can be used
spanned volumes, and RAID-5 volumes. You can change the disk on a network where IP transport is not available).

Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
domain DFS -> An implementation of DFS in which DFS topological drainstop -> For Network Load Balancing, a command that disables all
information is stored in Active Directory. Because this information is made new traffic handling on the specified hosts. The hosts then enter draining
available on multiple domain controllers in the domain, domain DFS mode to complete existing connections.
provides fault-tolerance for any distributed file system in the domain. See While draining, hosts remain in the cluster and stop their cluster
also: DFS topology; fault tolerance operations when there are no more active connections. To terminate
draining mode, explicitly stop cluster mode with the stop command, or
domain local group -> A security or distribution group that can contain
restart new traffic handling with the start command. To drain connections
universal groups, global groups, and accounts from any domain in the
from a specific port, use the drain command. See also: drain; host
domain tree or forest. A domain local group can also contain other domain
local groups from its own domain. Rights and permissions can be assigned drive -> An area of storage that is formatted with a file system and has a
only at the domain containing the group. See also: distribution group; drive letter. The storage can be a floppy disk, a CD, a hard disk, or another
domain tree; forest; global group; security group; universal group type of disk. You can view the contents of a drive by clicking its icon in
Windows Explorer or My Computer. See also: drive letter; file system;
domain name -> The name given by an administrator to a collection of
volume
networked computers that share a common directory. Part of the Domain
Name System (DNS) naming structure, domain names consist of a drive letter -> The naming convention for disk drives on IBM and
sequence of name labels separated by periods. See also: domain; compatible computers. Drives are named by letter, beginning with A,
Domain Name System (DNS); label; namespace followed by a colon. See also: drive
Domain Name System (DNS) -> A hierarchical, distributed database that drop folder -> In the Macintosh environment, a folder for which you have
contains mappings of DNS domain names to various types of data, such the Make Changes permission but not the See Files or See Folders
as IP addresses. DNS enables the location of computers and services by permission. You can copy files into a drop folder, but you cannot see what
user-friendly names, and it also enables the discovery of other information files and subfolders the drop folder contains. See also: Make Changes
stored in the database. See also: domain; service; Transmission
dual boot -> A computer configuration that can start two different
Control Protocol/Internet Protocol (TCP/IP); IP address
operating systems. See also: boot; multiple boot; startup environment
domain namespace -> The database structure used by the Domain Name
duplex -> A system capable of transmitting information in both directions
System (DNS). See also: Domain Name System (DNS)
over a communications channel. See also: full-duplex; half-duplex
domain naming master -> The domain controller assigned to control the
DVD decoder -> A hardware or software component that allows a digital
addition or removal of domains in the forest. At any time, there can be only
video disc (DVD) drive to display movies on your computer screen. See
one domain naming master in the forest. See also: domain controller;
also: digital video disc (DVD); DVD drive; hardware decoder; software
forest; multimaster replication; operations master; replication
decoder
domain of origin -> The parent DNS domain name that is used to root
DVD drive -> A disk storage device that uses digital video disc (DVD)
either a zone or a resource record within a zone. This name is joined to the
technology. A DVD drive reads both CD-ROM and DVDs; however, you
end of unqualified or relative domain names to form a fully qualified
must have a DVD decoder to display DVD movies on your computer
domain name (FQDN) within the zone. In DNS Manager, the domain of
screen. See also: DVD decoder; digital video disc (DVD)
origin will correspond to Zone name as it appears in the Add Zone Wizard
or the name that appears in the Parent domain name field for any resource DWORD -> A data type composed of hexadecimal data with a maximum
records created within the zone. See also: domain; domain name; allotted space of 4 bytes.
Domain Name System (DNS); fully qualified domain name (FQDN);
dynamic data exchange (DDE) -> A form of interprocess communication
relative name; resource record (RR)
(IPC) implemented in the Microsoft Windows family of operating systems.
domain tree -> In DNS, the inverted hierarchical tree structure that is used Two or more programs that support dynamic data exchange (DDE) can
to index domain names. Domain trees are similar in purpose and concept exchange information and commands. See also: Network DDE service
to the directory trees used by computer filing systems for disk storage.
dynamic disk -> A physical disk that can be accessed only by Windows
For example, when numerous files are stored on disk,
2000 and Windows XP. Dynamic disks provide features that basic disks do
directories can be used to organize the files into logical collections. When
not, such as support for volumes that span multiple disks. Dynamic disks
a domain tree has one or more branches, each branch can organize
use a hidden database to track information about dynamic volumes on the
domain names used in the namespace into logical collections.
disk and other dynamic disks in the computer. You convert basic disks to
In Active Directory, a hierarchical structure of one or more
dynamic by using the Disk Management snap-in or the DiskPart command
domains, connected by transitive, bidirectional trusts, that forms a
line utility. When you convert a basic disk to dynamic, all existing basic
contiguous namespace. Multiple domain trees may belong to the same
volumes become dynamic volumes. See also: active volume; basic
forest. See also: Active Directory; domain; transitive trust; two-way
disk; basic volume; dynamic volume; volume
trust; domain name; Domain Name System (DNS); forest; namespace
Dynamic Host Configuration Protocol (DHCP) -> A TCP/IP service
dots per inch (DPI) -> The standard used to measure screen and printer
protocol that offers dynamic leased configuration of host IP addresses and
resolution, expressed as the number of dots that a device can display or
distributes other configuration parameters to eligible network clients.
print per linear inch. The greater the number of dots per inch, the better the
DHCP provides safe, reliable, and simple TCP/IP network configuration,
resolution.
prevents address conflicts, and helps conserve the use of client IP
double-byte characters -> A set of characters in which each character is addresses on the network.
represented by two bytes. Some languages, such as Japanese, Chinese, DHCP uses a client/server model where the DHCP server
and Korean, require double-byte character sets. maintains centralized management of IP addresses that are used on the
network. DHCP-supporting clients can then request and obtain lease of an
downloadable fonts -> A set of characters stored on disk and sent
IP address from a DHCP server as part of their network boot process. See
(downloaded) to a printer's memory when needed for printing a document.
also: IP address; service; Transmission Control Protocol/Internet
Downloadable fonts are most commonly used with laser printers and other
Protocol (TCP/IP); lease
page printers, although many dot-matrix printers can accept some of them.
Downloadable fonts are also called soft fonts. See also: font; font dynamic storage -> A storage method in Windows that allows disk and
cartridge; PostScript fonts volume management without requiring operating system restart. See also:
basic storage
drag -> To move an item on the screen by selecting the item and then
pressing and holding down the mouse button while moving the mouse. For dynamic update -> An updated specification to the Domain Name System
example, you can move a window to another location on the screen by (DNS) standard that permits hosts that store name information in DNS to
dragging its title bar. dynamically register and update their records in zones maintained by DNS
servers that can accept and process dynamic update messages. See
drain -> For Network Load Balancing, a command that disables new traffic
also: DNS Server; Domain Name System (DNS); host; zone
handling for the rule whose port range contains the specified port. All ports
specified by the port rule are affected. See also: cluster; drainstop; port; dynamic volume -> A volume that resides on a dynamic disk. Windows
port rule supports five types of dynamic volumes: simple, spanned, striped,
mirrored, and RAID-5. A dynamic volume is formatted by using a file
Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
system, such as FAT or NTFS, and it has a drive letter assigned to it. See Event Log service -> A service that records events in the system,
also: basic disk; basic volume; dynamic disk; mirrored volume; security, and application logs. The Event Log service is located in Event
RAID-5 volume; simple volume; spanned volume; volume Viewer. See also: Event Viewer; event; service
dynamic-link library (DLL) -> An operating system feature that allows event logging -> The process of recording an audit entry in the audit trail
executable routines (generally serving a specific function or set of whenever certain events occur, such as services starting and stopping, or
functions) to be stored separately as files with .dll extensions. These users logging on and off and accessing resources. You can use Event
routines are loaded only when needed by the program that calls them. See Viewer to review AppleTalk network integration events as well as Windows
also: Resource DLL events. See also: event; service
E Event Viewer -> A component you can use to view and manage event
EFI See definition for: Extensible Firmware Interface (EFI) logs, gather information about hardware and software problems, and
monitor security events. Event Viewer maintains logs about program,
EFI system partition -> On Itanium-based computers, a portion on a
security, and system events. See also: event; event logging
GUID partition table (GPT) disk that is formatted with the FAT file system
and contains the files necessary to start the computer. Every Itanium- everyone category -> In the Macintosh environment, one of the user
based computer must have at least one GPT disk with an EFI system categories to which you assign permissions for a folder. Permissions
partition. The EFI system partition serves the same purpose as the system granted to everyone apply to all users who use the server, including
volume found on x86-based computers. See also: Extensible Firmware guests. See also: permission
Interface (EFI); GUID partition table (GPT); Microsoft Reserved (MSR)
expanded memory -> Type of memory that can be added to IBM personal
partition; Itanium; x86
computers. The use of expanded memory is defined by the Expanded
embedded object -> Information created in another program that has Memory Specification (EMS), which supports memory boards containing
been pasted inside your document. When information is embedded, you RAM that can be enabled or disabled by software. See also: extended
can edit the information in the new document using toolbars and menus memory
from the original program.
expansion slot -> A socket in a computer, designed to hold expansion
To edit the embedded information, double-click it and the
boards and connect them to the system bus. See also: bus
toolbars and menus from the program used to create the information
appear. Embedded information is not linked to the original source. If you expire interval -> For DNS, the number of seconds that DNS servers
change information in one place, it is not updated in the other. See also: operating as secondary masters for a zone will use to determine if zone
OLE; package; source document data should be expired when the zone is not refreshed and renewed. See
also: DNS Server; Domain Name System (DNS); secondary master;
emulated local area network (ELAN) -> A logical ATM network that
zone
emulates the services of an Ethernet or Token Ring LAN. See also: local
area network (LAN) explicit permissions -> Permissions on an object that are automatically
assigned when the object is created, or specifically assigned or changed
enable -> To make a device functional. For example, if a device in your
by the owner of the object. See also: permission; object
hardware configuration settings is enabled, the device is available for use
when your computer uses that hardware configuration. See also: disable; express message -> For Message Queuing, a message that uses fewer
hardware configuration resources and is faster than a recoverable message. However, because
express messages are mapped to memory, they are lost if the computer
encapsulated PostScript (EPS) file -> A file that prints at the highest
storing them fails. See also: recoverable message
possible resolution for your printer. An EPS file may print faster than other
graphical representations. Some Windows-based and non-Windows-based extended characters -> Any of the 128 additional characters in the
graphical programs can import EPS files. See also: PostScript extended ASCII (8-bit) character set. These characters include those in
several non-English languages, such as accent marks, and special
encrypted password -> A password that is scrambled. Encrypted
symbols used for creating pictures.
passwords are more secure than plaintext passwords, which are
susceptible to network sniffers. See also: encryption extended memory -> Memory beyond one megabyte in 80286, 80386,
80486, and Pentium computers. See also: expanded memory
Encrypting File System (EFS) -> A feature in this version of Windows
that enables users to encrypt files and folders on an NTFS volume disk to extended partition -> A type of partition that you can create only on basic
keep them safe from access by intruders. See also: NTFS file system; master boot record (MBR) disks. Extended partitions are useful if you want
recovery agent to create more than four volumes on a basic MBR disk. Unlike primary
partitions, you do not format an extended partition with a file system and
encryption -> The process of disguising a message or data in such a way
then assign a drive letter to it. Instead, you create one or more logical
as to hide its substance. See also: public key encryption; symmetric
drives within the extended partition. After you create a logical drive, you
encryption
format it and assign it a drive letter. An MBR disk can have up to four
enhanced small device interface (ESDI) -> A standard that can be used primary partitions, or three primary partitions, one extended partition, and
with high-capacity hard disks, floppy disk drives, and tape drives to allow multiple logical drives. See also: basic disk; drive letter; logical drive;
these devices to communicate with a computer at high speeds. master boot record (MBR); partition; primary partition; volume
environment variable -> A string consisting of environment information, Extensible Authentication Protocol (EAP) -> An extension to the Point-
such as a drive, path, or file name, associated with a symbolic name that to-Point Protocol (PPP) that allows for arbitrary authentication mechanisms
can be used by Windows. You use System in Control Panel or the set to be employed for the validation of a PPP connection. See also: CHAP
command from the command prompt to define environment variables. See (Challenge Handshake Authentication Protocol); Point-to-Point
also: string; variable Protocol (PPP)
error detection -> A technique for detecting when data is lost during Extensible Firmware Interface (EFI) -> In computers with the Intel
transmission. This allows the software to recover lost data by notifying the Itanium processor, the interface between a computer's firmware, hardware,
transmitting computer that it needs to retransmit the data. and the operating system. The Extensible Firmware Interface (EFI) defines
a new partition style called GUID partition table (GPT). EFI serves the
Ethernet -> An IEEE 802.3 standard for contention networks. Ethernet
same purpose for Itanium-based computers as the BIOS found in x86-
uses a bus or star topology and relies on the form of access known as
based computers. However, it has expanded capabilities that provide a
Carrier Sense Multiple Access with Collision Detection (CSMA/DC) to
consistent way to start any compatible operating system and an easy way
regulate communication line traffic. Network nodes are linked by coaxial
to add EFI drivers for new bootable devices without the need to update the
cable, fiber-optic cable, or by twisted-pair wiring. Data is transmitted in
computer's firmware. See also: basic input/output system (BIOS); GUID
variable-length frames containing delivery and control information and up
partition table (GPT); Itanium; x86
to 1,500 bytes of data. The Ethernet standard provides for baseband
transmission at 10 megabits (10 million bits) per second. Extensible Markup Language (XML) -> A meta-markup language that
provides a format for describing structured data. This facilitates more
event -> Any significant occurrence in the system or an application that
precise declarations of content and more meaningful search results across
requires users to be notified or an entry to be added to a log.
Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
multiple platforms. In addition, XML will enable a new generation of Web- file's identification, its location on disk, and a pointer that marks the user's
based data viewing and manipulation applications. current (or last) position in the file.
external network number -> A 4-byte hexadecimal number used for File Server for Macintosh -> An AppleTalk network integration service
addressing and routing purposes. The external network number is that allows Macintosh clients and personal computer clients to share files.
associated with physical network adapters and networks. To communicate File Server for Macintosh is also called MacFile. See also: service
with each other, all computers on the same network that use a specific
File Share resource -> A file share accessible by a network path that is
frame type must have the same external network number. All external
supported as a cluster resource by a Resource DLL. See also: Resource
network numbers must be unique to the IPX internetwork. See also: frame
DLL
type; internal network number; Internetwork Packet Exchange (IPX)
file system -> In an operating system, the overall structure in which files
extract -> When you extract a file, an uncompressed copy of the file that is
are named, stored, and organized. NTFS, FAT, and FAT32 are types of file
created in a folder you specify. The original file remains in the compressed
systems. See also: FAT32; NTFS file system; FAT
folder.
File Transfer Protocol (FTP) -> A member of the TCP/IP suite of
F
protocols, used to copy files between two computers on the Internet. Both
failback -> The process of moving resources, either individually or in a
computers must support their respective FTP roles: one must be an FTP
group, back to their preferred node after the node has failed and come
client and the other an FTP server. See also: Transmission Control
back online. See also: failback policy; resource
Protocol/Internet Protocol (TCP/IP)
failback policy -> Parameters that an administrator can set using Cluster
file type -> In the Windows environment, a designation of the operational
Administrator that affect failback operations. See also: Cluster
or structural characteristics of a file. The file type identifies the program,
Administrator; failback
such as Microsoft Word, that is used to open the file. File types are
failed -> A state that applies to a resource or a node in a cluster. A associated with a file name extension. For example, files that have the .txt
resource or a node is placed in the failed state after an unsuccessful or .log extension are of the Text Document type and can be opened using
attempt has been made to bring it online. See also: cluster; resource any text editor.
In the Macintosh environment, a four-character sequence that
failover -> The process of taking resource groups offline on one node and
identifies the type of a Macintosh file. The Macintosh Finder uses the file
bringing them back online on another node. When a resource group goes
type and file creator to determine the appropriate desktop icon for that file.
offline, all resources belonging to that group go offline. The offline and
online transitions occur in a predefined order, with resources that are filter -> For Indexing Service, software that extracts content and property
dependent on other resources taken offline before and brought online after values from a document in order to index them.
the resources upon which they depend. See also: failover policy; For IPSec, a specification of IP traffic that provides the ability to
failover time; IIS Server Instance resource; offline; possible owners; trigger security negotiations for a communication based on the source,
resource destination, and type of IP traffic. See also: document; property value
failover policy -> Parameters that an administrator can set, using Cluster filtering mode -> For Network Load Balancing, the method by which
Administrator, that affect failover operations. See also: Cluster network traffic inbound to a cluster is handled by the hosts within the
Administrator; failover cluster. Traffic can either be handled by a single server, load balanced
among the hosts within the cluster, or disabled completely. See also:
failover time -> The amount of time it takes a resource, either individually
cluster; host; load balancing
or in a group, to complete the failover process. See also: failover;
resource FilterKeys -> A keyboard feature that instructs your keyboard to ignore
brief or repeated keystrokes. You can also adjust the keyboard repeat rate,
FAT See definition for: file allocation table (FAT)
which is the rate at which a key repeats when you hold it down. See also:
FAT32 -> A derivative of the file allocation table (FAT) file system. FAT32 StickyKeys; ToggleKeys; MouseKeys
supports smaller cluster sizes and larger volumes than FAT, which results
firewall -> A combination of hardware and software that provides a
in more efficient space allocation on FAT32 volumes. See also: file
security system, usually to prevent unauthorized access from outside to an
allocation table (FAT); NTFS file system; volume
internal network or intranet. A firewall prevents direct communication
fault tolerance -> The ability of computer hardware or software to ensure between network and external computers by routing communication
data integrity when hardware failures occur. Fault tolerant features appear through a proxy server outside of the network. The proxy server
in many server operating systems and include mirrored volumes, RAID-5 determines whether it is safe to let a file pass through to the network. A
volumes, and server clusters. See also: cluster; mirrored volume; RAID- firewall is also called a security-edge gateway.
5 volume
folder -> A container for programs and files in graphical user interfaces,
Fax Service -> A system service that provides fax services to local and symbolized on the screen by a graphical image (icon) of a file folder. A
remote network clients. Fax services include receiving faxes and faxing folder is a means of organizing programs and documents on a disk and
documents, fax wizard messages, and e-mail messages. See also: can hold both files and additional folders.
service
font -> A graphic design applied to a collection of numbers, symbols, and
Federal Information Processing Standard 140-1 (FIPS 140-1) -> A characters. A font describes a certain typeface, along with other qualities
standard entitled Security Requirements for Cryptographic Modules. FIPS such as size, spacing, and pitch. See also: OpenType fonts; PostScript
140-1 describes government requirements that hardware and software fonts; screen fonts; Type 1 fonts
cryptomodules should meet for Sensitive but Unclassified (SBU) use.
font cartridge -> A plug-in unit available for some printers that contains
file allocation table (FAT) -> A file system used by MS-DOS and other fonts in several styles and sizes. As with downloadable fonts, printers
Windows-based operating systems to organize and manage files. The file using font cartridges can produce characters in sizes and styles other than
allocation table (FAT) is a data structure that Windows creates when you those created by the fonts built into it. See also: downloadable fonts;
format a volume by using the FAT or FAT32 file systems. Windows stores font
information about each file in the FAT so that it can retrieve the file later.
foreground program -> The program that runs in the active window (the
See also: FAT32; file system; NTFS file system
uppermost window with the highlighted title bar). The foreground program
File and Print Servers for Macintosh -> A software component that responds to commands issued by the user. See also: background
allows Macintosh users access to a computer running any version of the program; title bar
Windows Server family. The services provided with this component allow
foreign computer -> A computer that uses another message queuing
personal computer and Macintosh users to share files and resources, such
system but, through a connector application, can exchange messages with
as printers on the AppleTalk network or printers attached to the Windows
computers that run Message Queuing. See also: connector application;
server.
Message Queuing
file control block (FCB) -> A small block of memory temporarily assigned
forest -> A collection of one or more Windows domains that share a
by a computer's operating system to hold information about a file that has
common schema, configuration, and global catalog and are linked with
been opened for use. An FCB typically contains such information as the
Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
two-way transitive trusts. See also: domain; domain tree; global translates between different transport protocols or data formats (for
catalog; schema; transitive trust; two-way trust example, IPX and IP) and is generally added to a network primarily for its
translation ability.
form -> The specification of physical characteristics such as paper size
In the context of interoperating with Novell NetWare networks, a
(that is, letter or legal) and printer area margins of paper or other print
gateway acts as a bridge between the server message block (SMB)
media. For example, by default, the Letter form has a paper size of 8.5
protocol used by Windows networks and the NetWare core protocol (NCP)
inches by 11 inches and does not reserve space for margins.
used by NetWare networks. A gateway is also called an IP router.
format -> The structure of a file that defines the way it is stored and laid
GDI objects -> Objects from the Graphics Device Interface (GDI) library of
out on the screen or in print. The format of a file is usually indicated by its
application programming interfaces (APIs) for graphics output devices. In
extension. For example, .txt after a file name indicates the file is a text
Task Manager, the number of GDI objects currently used by a process.
document, and .doc after a file name indicates it is a Word document.
See also: Task Manager
FORTEZZA -> A family of security products, including PCMCIA-based
Generic Service resource -> A Windows service that is supported as a
cards, compatible serial port devices, combination cards (such as
cluster resource by a Resource DLL. See also: Resource DLL
FORTEZZA/Modem and FORTEZZA/Ethernet), server boards, and others.
FORTEZZA is a registered trademark held by the National Security gigabyte (GB) -> 1,024 megabytes, though often interpreted as
Agency. approximately one billion bytes.
fragmentation -> The scattering of parts of the same disk file over global account -> In an Active Directory network, a normal user account
different areas of the disk. Fragmentation occurs as files on a disk are in a user's domain. Most user accounts are global accounts. If there are
deleted and new files are added. It slows disk access and degrades the multiple domains in the network, it is best if each user in the network has
overall performance of disk operations, although usually not severely. See only one user account in only one domain, and each user's access to other
also: defragmentation domains is accomplished through the establishment of domain trust
relationships. See also: Active Directory; domain
frame type -> The way in which a network type, such as Ethernet, formats
data to be sent over a network. When multiple frame types are allowed for global catalog -> A domain controller that contains a partial replica of
a particular network type, the packets are structured differently and are, every domain in Active Directory. In other words, a global catalog holds a
therefore, incompatible. All computers on a network must use the same replica of every object in Active Directory, but with a limited number of
frame type to communicate. Frame type is also called frame format. See each object's attributes. The global catalog stores those attributes most
also: packet frequently used in search operations (such as a user's first and last
names) and those attributes required to locate a full replica of the object.
free media pool -> A logical collection of unused data-storage media that
The Active Directory replication system builds the global catalog
can be used by applications or other media pools. When media are no
automatically. The attributes replicated into the global catalog include a
longer needed by an application, they are returned to a free media pool so
base set defined by Microsoft. Administrators can specify additional
that they can be used again. See also: media pool; Removable Storage
properties to meet the needs of their installation. See also: Active
free space -> Available space that you use to create logical drives within Directory; attribute; domain controller; replication
an extended partition. See also: extended partition; logical drive;
global group -> A security or distribution group that can have users,
unallocated space
groups, and computers from its own domain as members. Global security
front-end processor (FEP) -> In communications, a computer that is groups can be granted rights and permissions on resources in any domain
located between communications lines and a main (host) computer and in the forest. Global groups cannot be created or maintained on computers
used to relieve the host of tasks related to communications; sometimes running Windows XP Professional. However, for Windows XP Professional
considered synonymous with communications controller. A front-end computers that participate in a domain, domain global groups can be
processor is dedicated entirely to handling transmitted information, granted rights and permissions at those workstations and can become
including error detection and control; receipt, transmission, and possibly members of local groups at those workstations. See also: permission;
encoding of messages; and management of the lines running to and from group; local group; user account
other devices.
glue chasing -> The follow-up queries or successive lookups that are
FTP (File Transfer Protocol) See definition for: File Transfer Protocol made to resolve glue records in a zone to other remote DNS servers that
(FTP) are authoritative for a derivative zone. When glue chasing is performed,
name server (NS) resource records for delegated DNS servers are
full name -> A user's complete name, usually consisting of the last name,
chased, or followed, by using successive queries to resolve the servers
first name, and middle initial. The full name is information that Local Users
named in NS records to their host address (A) resource records and to
and Groups or Active Directory Users and Computers can maintain as part
obtain server IP addresses. See also: A (address) resource record;
of the information identifying and defining a user account. See also: user
delegation; DNS Server; glue record; name server (NS) resource
account; Active Directory Users and Computers
record; zone
full zone transfer (AXFR) -> The standard query type supported by all
glue record -> A resource record for out-of-zone information used to
DNS servers to update and synchronize zone data when the zone has
provide helpful pointer information for locating DNS servers that have been
been changed. When a DNS query is made using AXFR as the specified
delegated authority for specific subdomains derived from a zone's domain
query type, the entire zone is transferred as the response. See also: DNS
of origin. These records are used to glue zones together and provide an
Server; zone
effective delegation and referral path for other DNS servers to follow when
full-duplex -> A system capable of simultaneously transmitting information performing a recursive lookup to fully resolve a name. See also:
in both directions over a communications channel. See also: half-duplex; delegation; DNS Server; domain of origin; glue chasing; resource
duplex record (RR); zone
fully qualified domain name (FQDN) -> A DNS domain name that has graphics mode -> A display mode in which lines and characters on the
been stated unambiguously so as to indicate with absolute certainty its screen are drawn pixel by pixel. Graphics mode displays images by
location in the domain namespace tree. Fully qualified domain names grouping individual dots into shapes, such as the arrowhead of a mouse
differ from relative names in that they are typically stated with a trailing pointer. It can also preview character formatting, such as boldface and
period (.) - for example, host.example.microsoft.com. - to qualify their italics, as it will appear in print.
position to the root of the namespace. See also: namespace; domain
group -> A collection of users, computers, contacts, and other groups.
name; Domain Name System (DNS)
Groups can be used as security or as e-mail distribution collections.
G Distribution groups are used only for e-mail. Security groups are used both
game port -> An input/output connector to which you attach a joy stick or to grant access to resources and as e-mail distribution lists. See also:
other game device to your computer. It is typically a 15-pin socket on the domain; global group; local group
back of a PC. See also: serial port
group account -> A collection of user accounts. By making a user account
gateway -> A device connected to multiple physical TCP/IP networks a member of a group, you give the related user all the rights and
capable of routing or delivering IP packets between them. A gateway permissions granted to the group. See also: group; user account

Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
group memberships -> The groups to which a user account belongs. configuration, which may consist of IRQ lines, DMA, an I/O port, or
Permissions and rights granted to a group are also provided to its memory address settings. See also: device; direct memory access
members. In most cases, the actions a user can perform in Windows are (DMA); input/output (I/O) port; interrupt request (IRQ) lines; memory
determined by the group memberships of the user account to which the address
user is logged on. See also: group; user account
hardware decoder -> A type of digital video disc (DVD) decoder that
group name -> A unique name identifying a local group or a global group allows a DVD drive to display movies on your computer screen. A
to Windows. A group's name cannot be identical to any other group name hardware decoder uses both software and hardware to display movies.
or user name in its own domain or computer. See also: global group; See also: DVD decoder; DVD drive; software decoder
local group
hardware profile -> Data that describes the configuration and
Group Policy -> The Microsoft Management Console (MMC) snap-in that characteristics of specific computer equipment. This information can be
is used to edit Group Policy objects. See also: Group Policy object; used to configure computers for using peripheral devices. See also:
Microsoft Management Console (MMC); policy; snap-in device
Group Policy object -> A collection of Group Policy settings. Group Policy hardware type -> A classification for similar devices. For example,
objects are essentially the documents created by the Group Policy snap-in, Imaging Device is a hardware type for digital cameras and scanners. See
a Windows utility. Group Policy objects are stored at the domain level, and also: device
they affect users and computers contained in sites, domains, and
hash -> A fixed-size result that is obtained by applying a one-way
organizational units. In addition, each Windows computer has exactly one
mathematical function (sometimes called a hash algorithm) to an arbitrary
group of settings stored locally, called the local Group Policy object. See
amount of data. If there is a change in the input data, the hash changes.
also: Group Policy; object; policy
The hash can be used in many operations, including authentication and
guest account -> A built-in account used to log on to a computer running digital signing. A hash is also called a message digest. See also:
Windows when a user does not have an account on the computer or authentication; hash algorithm
domain, or in any of the domains trusted by the computer's domain. See
hash algorithm -> An algorithm used to produce a hash value of some
also: domain
piece of data, such as a message or session key. A good hash algorithm
GUID partition table (GPT) -> A disk-partitioning scheme that is used by has a quality where changes in the input data can change every bit in the
the Extensible Firmware Interface (EFI) in Itanium-based computers. GPT resulting hash value; for this reason, hashes are useful in detecting any
offers more advantages than master boot record (MBR) partitioning modification in a large data object, such as a message. Furthermore, a
because it allows up to 128 partitions per disk, provides support for good hash algorithm makes it computationally infeasible to construct two
volumes up to 18 exabytes in size, allows primary and backup partition independent inputs that have the same hash. Typical hash algorithms
tables for redundancy, and supports unique disk and partition IDs (GUIDs). include MD2, MD4, MD5, and SHA-1. Hash algorithm is also called a hash
See also: Itanium; Extensible Firmware Interface (EFI); master boot function. See also: Hash-based Message Authentication Mode
record (MBR) (HMAC); MD2; MD4; MD5; message digest; Secure Hash Algorithm
(SHA-1)
H
half-duplex -> A system capable of transmitting information in only one Hash-based Message Authentication Mode (HMAC) -> A mechanism for
direction at a time over a communications channel. See also: duplex; full- message authentication using cryptographic hash functions. HMAC can be
duplex used with any iterative cryptographic hash function (for example, MD5 and
SHA-1) in combination with a secret shared key. The cryptographic
handle -> In the user interface, an interface added to an object that
strength of HMAC depends on the properties of the underlying hash
facilitates moving, sizing, reshaping, or other functions pertaining to an
function. See also: hash algorithm; MD5; Secure Hash Algorithm
object. In programming, a pointer to a pointer, that is, a token that lets a
(SHA-1)
program access an identified resource.
hexadecimal -> A base-16 number system represented by the digits 0
handle count -> In Task Manager, the number of object handles in a
through 9 and the uppercase or lowercase letters A (equivalent to decimal
process's object table. See also: Task Manager
10) through F (equivalent to decimal 15).
handshaking -> A series of signals acknowledging that communication
hibernation -> A state in which your computer shuts down after saving
can take place between computers or other devices. A hardware
everything in memory on your hard disk. When you bring your computer
handshake is an exchange of signals over specific wires (other than the
out of hibernation, all programs and documents that were open are
data wires), in which each device indicates its readiness to send or receive
restored to your desktop. See also: standby
data. A software handshake consists of signals transmitted over the same
wires used to transfer data, as in modem-to-modem communications over High Contrast -> A display feature that instructs programs to change the
telephone lines. color scheme to a high-contrast scheme and to increase legibility
whenever possible.
handwriting input device -> A tool, such as a digital pen and tablet, used
to enter text by writing instead of typing. Along with writing tablets, you can histogram -> A chart consisting of horizontal or vertical bars, the widths or
use 3-D drawing or Computer Aided Drafting (CAD) tablets, or a tablet-PC. heights of which represent the values of certain data.
You can also write by moving your mouse on the mouse pad.
hive -> A section of the registry that appears as a file on your hard disk.
handwriting recognition -> The ability to interpret handwritten text and The registry subtree is divided into hives (named for their resemblance to
convert it into computer-readable text. Handwriting recognition programs the cellular structure of a beehive). A hive is a discrete body of keys,
allow you to enter text using a pen stylus or other handwriting input device, subkeys, and values that is rooted at the top of the registry hierarchy. A
rather than a keyboard. hive is backed by a single file and a .log file, which are in the
systemroot\System32\Config or the systemroot\Profiles\username folders.
hard disk -> A device, also called hard disk drive, that contains one or
By default, most hive files (Default, SAM, Security, and System)
more inflexible platters coated with material in which data can be recorded
are stored in the systemroot\System32\Config folder. The
magnetically with read/write heads. The hard disk exists in a sealed case
systemroot\Profiles folder contains the user profile for each user of the
that protects it and allows the head to fly 10 millionths to 25 millionths of an
computer. Because a hive is a file, it can be moved from one system to
inch above the surface of a platter. Data can both be stored and accessed
another. However, you must use the Registry Editor to edit the file. See
much more quickly than on a floppy disk.
also: registry; key; systemroot
hardware -> The physical components of a computer system, including
home folder -> A folder (usually on a file server) that administrators can
any peripheral equipment such as printers, modems, and mouse devices.
assign to individual users or groups. Administrators use home folders to
hardware compression -> A feature available on some tape devices that consolidate user files onto specific file servers for easy backup. Home
automatically compresses the data that is being stored on the device. This folders are used by some programs as the default folder for the Open and
is usually an option that is turned on or off in a backup program. Save As dialog boxes. Home folders are sometimes referred to as home
directories. See also: administrator; group
hardware configuration -> Resource settings that have been allocated
for a specific device. Each device on your computer has a hardware
Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
host -> A Windows computer that runs a server program or service used If a device is IEEE 1394 compatible, you can connect the device
by network or remote clients. For Network Load Balancing, a cluster to the IEEE 1394 connector while the computer is running and Windows
consists of multiple hosts connected over a local area network (LAN). See will detect the device and inform you when it is ready for use. Similarly, you
also: client; cluster; local area network (LAN); server; service can unplug the device while the computer is running, but you should use
the Add Hardware Wizard to inform Windows that you are unplugging the
host name -> The DNS name of a device on a network. These names are
device. Windows will then inform you when the device can be unplugged
used to locate computers on the network. To find another computer, its
from the computer.
host name must either appear in the Hosts file or be known by a DNS
The IEEE 1394 bus is used primarily to connect high-end digital
server. For most Windows computers, the host name and the computer
video and digital audio devices to your computer; however, some hard
name are the same. See also: DNS Server; Domain Name System
disks, printers, scanners, and DVD drives can also be connected to your
(DNS)
computer using the IEEE 1394 connector.
host priority -> For Network Load Balancing, a host's precedence for
IIS Server Instance resource -> A server-instance designation used with
handling default network traffic for TCP and UDP ports. It is used if a host
Internet Information Services (IIS) that supports the WWW and FTP
within the cluster goes offline, and it determines which host within the
services. IIS server instances are supported as cluster resources by a
cluster will assume responsibility for the traffic previously handled by the
Resource DLL. IIS Server Instance resources may have dependencies on
offline host. See also: cluster; host; User Datagram Protocol (UDP)
IP Address resources, Network Name resources, and Physical Disk
Hosts file -> A local text file in the same format as the 4.3 Berkeley resources. Access information for server instances does not fail over. See
Software Distribution (BSD) UNIX /etc/hosts file. This file maps host names also: dependency; failover; Resource DLL
to IP addresses, and it is stored in the \%Systemroot
Image Name -> The name of a process as displayed in Task Manager.
%\System32\Drivers\Etc folder. See also: systemroot
See also: Task Manager
hot docking -> The process of attaching a laptop computer to a docking
import media pool -> A logical collection of data-storage media that has
station while the computer is running, and automatically activating the
not been cataloged by Removable Storage. Media in an import media pool
docking station's video display and other functions. See also: dock;
should be cataloged as soon as possible so that they can be used by an
docking station; undock
application. See also: media pool; Removable Storage
HTTP -> See definition for: Hypertext Transfer Protocol (HTTP)
in-addr.arpa domain -> A special top-level DNS domain reserved for
hub -> A common connection point for devices in a network. Typically reverse mapping of IP addresses to DNS host names. See also: Domain
used to connect segments of a local area network (LAN), a hub contains Name System (DNS); reverse lookup; top-level domains
multiple ports. When data arrives at one port, it is copied to the other ports
incremental backup -> A backup that copies only those files created or
so that all segments of the LAN can see the data. See also: local area
changed since the last normal or incremental backup. It marks files as
network (LAN); port; switching hub
having been backed up (in other words, the archive attribute is cleared). If
hubbed mode -> A mode in which the ARP/MARS provides ATM you use a combination of normal and incremental backups to restore your
addresses to requesting clients in the form of a multicast server (MCS) list data, you will need to have the last normal backup and all incremental
value. In this mode, the ARP/MARS acts as a multicast server, providing backup sets. See also: copy backup; daily backup; differential
active forwarding of all multicast and broadcast traffic destined for IP backup; normal backup
addresses contained within the ranges specified in the list. See also:
incremental zone transfer (IXFR) -> An alternate query type that can be
Address Resolution Protocol (ARP); Asynchronous Transfer Mode
used by some DNS servers to update and synchronize zone data when a
(ATM); multicast address resolution service (MARS); multicast server
zone is changed. When incremental zone transfer is supported between
(MCS); nonhubbed mode;
DNS servers, servers can keep track of and transfer only those
IP address
incremental resource record changes between each version of the zone.
hue -> The position of a color along the color spectrum. For example, See also: DNS Server; secondary master; zone; zone transfer
green is between yellow and blue. This attribute can be set using Display
independent client -> A computer with Message Queuing installed that
in Control Panel. See also: saturation
can host queues and store messages locally. Independent clients do not
hyperlink -> Colored and underlined text or a graphic that you click to go require synchronous access to a Message Queuing server to send and
to a file, a location in a file, an HTML page on the World Wide Web, or an receive messages, but they can use Message Queuing servers with
HTML page on an intranet. Hyperlinks can also go to newsgroups and to routing enabled for efficient message routing. See also: dependent
Gopher, Telnet, and FTP sites. client; Message Queuing server; routing services
In Windows folders, hyperlinks are text links that appear in the
infrared (IR) -> Light that is beyond red in the color spectrum. While the
folder's left pane. You can click these links to perform tasks, such as
light is not visible to the human eye, infrared transmitters and receivers
moving or copying a file, or to go to other places on your computer, such
can send and receive infrared signals. See also: Infrared Data
as the My Documents folder or Control Panel.
Association (IrDA); infrared device; infrared port
Hypertext Markup Language (HTML) -> A simple markup language used
Infrared Data Association (IrDA) -> The industry organization of
to create hypertext documents that are portable from one platform to
computer, component, and telecommunications vendors who establish the
another. HTML files are simple ASCII text files with codes embedded
standards for infrared communication between computers and peripheral
(indicated by markup tags) to denote formatting and hypertext links. See
devices, such as printers. See also: infrared (IR)
also: American Standard Code for Information Interchange (ASCII)
infrared device -> A computer, or a computer peripheral such as a printer,
Hypertext Transfer Protocol (HTTP) -> The protocol used to transfer
that can communicate using infrared light. See also: infrared (IR)
information on the World Wide Web. An HTTP address (one kind of
Uniform Resource Locator [URL]) takes the form: infrared file transfer -> Wireless file transfer between a computer and
http://www.microsoft.com. another computer or device using infrared light. See also: infrared (IR)
I infrared network connection -> A direct or incoming network connection
icon -> A small image displayed on the screen to represent an object that to a remote access server using an infrared port. See also: infrared port
can be manipulated by the user. Icons serve as visual mnemonics and
infrared port -> An optical port on a computer that enables
allow the user to control certain computer actions without having to
communication with other computers or devices by using infrared light,
remember commands or type them at the keyboard.
without cables. Infrared ports can be found on some portable computers,
IEEE 1394 -> A standard for high-speed serial devices such as digital printers, and cameras. See also: infrared (IR); infrared device; port
video and digital audio editing equipment. See also: device
infrastructure master -> The domain controller assigned to update group-
IEEE 1394 connector -> A type of connector that enables you to connect to-user references whenever group memberships are changed, and to
and disconnect high-speed serial devices. An IEEE 1394 connector is replicate these changes to any other domain controllers in the domain. At
usually on the back of your computer near the serial port or the parallel any time, there can be only one infrastructure master in a particular
port. domain. See also: domain controller; multimaster replication;
operations master
Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
interactive logon -> A network logon from a computer keyboard, when the
inheritance -> A mechanism that allows a given access control entry
user types information in the Logon Information dialog box displayed by
(ACE) to be copied from the container where it was applied to all children
the computer's operating system.
of the container. Inheritance can be combined with delegation to grant
administrative rights to a whole subtree of the directory in a single update interconnect -> A private network that connects nodes in a cluster. See
operation. See also: access control entry (ACE); delegation also: cluster
inherited permissions -> Permissions on an object that are automatically intermediary device -> A device other than a modem or X.25 PAD,
inherited from its parent object. Inherited permissions cannot be modified. located between a network connection and the remote access server. This
See also: permission; object; parent object device is typically a modem-pool switch or security host and requires either
a static or interactive dialog box between the client and itself. See also:
Initial master -> A shared folder whose existing files and folders are
remote access server; static dialog box; interactive dialog box; PAD
replicated to other shared folders when replication is initially configured.
(packet assembler/disassembler)
After replication is complete, there is no initial master, since any of the
replicas can accept changes and propagate them to the other replicas. internal network number -> A 4-byte hexadecimal number used for
The initial master then becomes another replica. See also: shared folder; addressing and routing purposes. The internal network number identifies a
replica; replication virtual network inside a computer. The internal network number must be
unique to the IPX internetwork. Internal network number is also called
initialize -> In Disk Management, the process of detecting a disk or
virtual network number. See also: external network number;
volume and assigning it a status (for example, healthy) and a type (for
Internetwork Packet Exchange (IPX)
example, dynamic). See also: basic disk; basic volume; dynamic disk;
dynamic volume international prefix -> Digits dialed before the country code to access the
international phone service. The actual digits depend on the country or
Initiate to Application Enable -> When checked, new connections to the
region in which you are dialing an international number. For example, in
DDE share are allowed. When cleared, only current DDE conversations
the United States of America, the prefix for international dialing is 011. To
are allowed.
dial from the United States of America to Honduras, which has the country
Ink -> An option that allows you to enter text in handwritten form. Instead code 504, you would dial: (011) (504) (000) 000-0000
of converting your handwritten text to typed text, the text is converted to an
International Telecommunication Union - Telecommunication
object and displayed exactly as you wrote it. For example:
[Standardization Sector] (ITU-T) -> The sector of the International
input language -> The specification of the language you want to type in. Telecommunication Union (ITU) responsible for telecommunication
Some programs that are designed for Windows recognize this setting. standards. ITU-T replaces the Comite Consultatif International
When you add a new input language, a keyboard layout for that language Telegraphique et Telephonique (CCITT). Its responsibilities include
is also added. standardizing modem design and operations, and standardizing protocols
for networks and facsimile transmission. ITU is an international
Input Method Editor (IME) -> Programs used to enter the thousands of
organization within which governments and the private sector coordinate
different characters in written Asian languages with a standard 101-key
global telecom networks and services.
keyboard. An IME consists of both an engine that converts keystrokes into
phonetic and ideographic characters and a dictionary of commonly used internet -> internet. Two or more network segments connected by routers.
ideographic words. As the user enters keystrokes, the IME engine Another term for internetwork.
attempts to identify which character or characters the keystrokes should be Internet. A worldwide network of computers. If you have access
converted into. to the Internet, you can retrieve information from millions of sources,
including schools, governments, businesses, and individuals. See also:
input/output (I/O) port -> A channel through which data is transferred
World Wide Web
between a device and the microprocessor. The port appears to the
microprocessor as one or more memory addresses that it can use to send Internet address -> An address for a resource on the Internet that is used
or receive data. See also: device; memory address; port by Web browsers to locate Internet resources. An Internet address
typically starts with a protocol name, followed by the name of the
insertion point -> The place where text will be inserted when typed. The
organization that maintains the site; the suffix identifies the kind of
insertion point usually appears as a flashing vertical bar in an application's
organization it is. For example, the address http://www.yale.edu/ provides
window or in a dialog box.
the following information:
install -> When referring to software, to add program files and folders to  http: This Web server uses the Hypertext Transfer Protocol.
your hard disk and related data to your registry so that the software runs  www: This site is on the World Wide Web.
properly. Installing contrasts with upgrading, where existing program files,  edu: This is an educational institution.
folders, and registry entries are updated to a more recent version. Internet address is also called Uniform Resource Locator (URL).
When referring to hardware, to physically connect the device to See also: Web server; protocol
your computer, to load device drivers onto your computer, and to configure
device properties and settings. See also: device driver; registry; Internet Control Message Protocol (ICMP) -> A required maintenance
uninstall protocol in the TCP/IP suite that reports errors and allows simple
connectivity. ICMP is used by the Ping tool to perform TCP/IP
integrated device electronics (IDE) -> A type of disk-drive interface in troubleshooting. See also: Internet Protocol (IP); protocol;
which the controller electronics reside on the drive itself, eliminating the Transmission Control Protocol/Internet Protocol (TCP/IP)
need for a separate adapter card. IDE offers advantages such as look-
ahead caching to increase overall performance. Internet Engineering Task Force (IETF) -> An open community of
network designers, operators, vendors, and researchers concerned with
Integrated Services Digital Network (ISDN) -> A digital phone line used the evolution of Internet architecture and the smooth operation of the
to provide higher bandwidth. ISDN in North America is typically available in Internet. Technical work is performed by working groups organized by topic
two forms: Basic Rate Interface (BRI) consists of 2 B-channels at 64 areas (such as routing, transport, and security) and through mailing lists.
kilobits per second (Kbps) and a D-channel at 16 Kbps; Primary Rate Internet standards are developed in IETF Requests for Comments (RFCs),
Interface (PRI) consists of 23 B-channels at 64 Kbps and a D-channel at which are a series of notes that discuss many aspects of computing and
64 Kbps. An ISDN line must be installed by the phone company at both the computer communication, focusing on networking protocols, programs,
calling site and the called site. See also: B-channel; D-channel; and concepts. See also: subnet bandwidth management (SBM);
multilink dialing; Service Profile Identifier (SPID); switch type Session Description Protocol (SDP)
interactive dialog box -> A dialog box that requires a response from the Internet Group Management Protocol (IGMP) -> A protocol used by IP
user. Intermediary devices such as a security host require such a dialog hosts to report their multicast group memberships to any immediately
box as an added layer of security between the client and the remote neighboring multicast routers. See also: Internet Protocol multicasting;
access server. In such dialog boxes, the user types an access code or a protocol
user name and password on the remote access terminal screen. See also:
dialog box; intermediary device; remote access server; static dialog Internet Information Services (IIS) -> Software services that support
box Web site creation, configuration, and management, along with other
Internet functions. Internet Information Services include Network News
Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
Transfer Protocol (NNTP), File Transfer Protocol (FTP), and Simple Mail ISDN (Integrated Services Digital Network) -> A high-speed digital
Transfer Protocol (SMTP). See also: Simple Mail Transfer Protocol telephone service that can dramatically increase the speed at which you
(SMTP); File Transfer Protocol (FTP); Network News Transfer connect to the Internet or to your corporate LAN (local area network).
Protocol (NNTP) ISDN can operate at 128 kilobytes per second (Kbps), which is five or
more times faster than many analog modems.
Internet Protocol (IP) -> A routable protocol in the TCP/IP protocol suite
that is responsible for IP addressing, routing, and the fragmentation and ISP (Internet service provider) See definition for: Internet service
reassembly of IP packets. See also: Compression Control Protocol provider (ISP)
(CCP); packet; Transmission Control Protocol/Internet Protocol
Itanium -> An Intel microprocessor that uses explicitly parallel instruction
(TCP/IP); voluntary tunnel
set computing and 64-bit memory addressing.
Internet Protocol multicasting -> The extension of local area network
J
multicasting technology to a TCP/IP network. Hosts send and receive
job object -> A system-level structure that allows processes to be grouped
multicast datagrams, the destination fields of which specify IP host group
together and managed as a single unit. See also: process
addresses rather than individual IP addresses. A host indicates that it is a
member of a group by means of the Internet Group Management Protocol journal queue -> For Message Queuing, a queue where journal
(IGMP). See also: Internet Group Management Protocol (IGMP); messages are stored. See also: journal quota; Message Queuing;
Transmission Control Protocol/Internet Protocol (TCP/IP) source journaling; target journaling
Internet Protocol security (IPSec) -> A set of industry-standard, journal quota -> For Message Queuing, a property that specifies the
cryptography-based protection services and protocols. IPSec protects all cumulative limit for journal messages in a journal queue. The limit is based
protocols in the TCP/IP protocol suite and Internet communications using on cumulative journal message size. When a journal queue's quota is
L2TP. reached, messages are no longer stored. See also: journal queue;
Message Queuing
Internet service provider (ISP) -> A company that provides individuals or
companies access to the Internet and the World Wide Web. An ISP junction point -> A physical location on a hard disk that points to data
provides a telephone number, a user name, a password, and other located at another location on your hard disk or another storage device.
connection information so users can connect their computers to the ISP's Junction points are created when you create a mounted drive. You can
computers. An ISP typically charges a monthly or hourly connection fee. also create a junction point using the linkd command. See also: mounted
See also: Web server drive
Internetwork Packet Exchange (IPX) -> A network protocol native to K
NetWare that controls addressing and routing of packets within and Kerberos�V5 authentication protocol -> An authentication mechanism
between LANs. IPX does not guarantee that a message will be complete used to verify user or host identity. The Kerberos�V5 authentication
(no lost packets). See also: Compression Control Protocol (CCP); protocol is the default authentication service for Windows 2000. Internet
IPX/SPX; local area network (LAN); Routing Information Protocol over Protocol security (IPSec) and the QoS Admission Control Service use the
IPX (RIPX) Kerberos protocol for authentication. See also: Key Distribution Center
(KDC); realm; service ticket; ticket-granting service (TGS); ticket-
interrupt -> A request for attention from the processor. When the
granting ticket (TGT)
processor receives an interrupt, it suspends its current operations, saves
the status of its work, and transfers control to a special routine known as kernel -> The core of layered architecture that manages the most basic
an interrupt handler, which contains the instructions for dealing with the operations of the operating system and the computer's processor. The
particular situation that caused the interrupt. kernel schedules different blocks of executing code, called threads, for the
processor to keep it as busy as possible and coordinates multiple
interrupt request (IRQ) lines -> Hardware lines over which devices can
processors to optimize performance. The kernel also synchronizes
send signals to get the attention of the processor when the device is ready
activities among Executive-level subcomponents, such as I/O Manager
to accept or send information. Each device must have a unique IRQ line.
and Process Manager, and handles hardware exceptions and other
See also: device
hardware-dependent functions. The kernel works closely with the
intersite messaging service (ISM) -> A service that supports transports hardware abstraction layer.
for asynchronous, site-to-site messaging. Each transport serves two major
key -> In Registry Editor, a folder that appears in the left pane of the
roles: send/receive and topology queries (such as, what are the various
Registry Editor window. A key can contain subkeys and value entries. For
sites connected by this transport, and at what cost?). The intersite
example, Environment is a key of HKEY_CURRENT_USER.
messaging services shipped in Windows are RPC and SMTP (mail). See
In IP security (IPSec), a value used in combination with an
also: remote procedure call (RPC); service; Simple Mail Transfer
algorithm to encrypt or decrypt data. Key settings for IP security are
Protocol (SMTP)
configurable to provide greater security. See also: registry; subkey
intranet -> A network within an organization that uses Internet
Key Distribution Center (KDC) -> A network service that supplies session
technologies and protocols, but is available only to certain people, such as
employees of a company. An intranet is also called a private network. tickets and temporary session keys used in the Kerberos�V5
authentication protocol. In Windows 2000 and Windows XP, the KDC runs
IP address -> A 32-bit address used to identify a node on an IP as a privileged process on all domain controllers. See also: ticket-
internetwork. Each node on the IP internetwork must be assigned a unique granting ticket (TGT); Kerberos�V5 authentication protocol; ticket-
IP address, which is made up of the network ID, plus a unique host ID. granting service (TGS)
This address is typically represented with the decimal value of each octet
separated by a period (for example, 192.168.7.27). In this version of keyboard language -> The language you want to use when you type.
Windows, you can configure the IP address statically or dynamically Some programs that are designed for the Windows platform recognize this
through DHCP. See also: Dynamic Host Configuration Protocol setting. When you add a new keyboard language, a keyboard layout for
(DHCP); IP Address resource; scope that language is also added.

IP Address resource -> A 32-bit number in dotted decimal format that keyboard layout -> The arrangement that accommodates the special
represents an Internet Protocol (IP) address and is supported as a cluster characters and symbols used in different languages. Keyboard layouts
resource by a Resource DLL provided with Windows. See also: IP affect which characters appear when you press the keys on your
address; Resource DLL keyboard. After you change your keyboard layout, the characters that
appear on your screen may no longer correspond to the characters that
IPX/SPX -> Transport protocols used in Novell NetWare networks, which are printed on your keyboard keys.
together correspond to the combination of TCP and IP in the TCP/IP
protocol suite. Windows implements IPX through NWLink. See also: L
NWLink; Transmission Control Protocol/Internet Protocol (TCP/IP); L2TP (Layer 2 Tunneling Protocol) -> An industry-standard Internet
Internetwork Packet Exchange (IPX) tunneling protocol. Unlike Point-to-Point Tunneling Protocol (PPTP), L2TP
does not require IP connectivity between the client workstation and the
ISA expansion slot -> A connection socket for a peripheral designed to server. L2TP requires only that the tunnel medium provide packet-oriented
the Industry Standard Architecture (ISA) on a computer motherboard. point-to-point connectivity. The protocol can be used over media such as
Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
ATM, Frame Relay, and X.25. L2TP provides the same functionality as updated automatically if the information in the original document changes.
PPTP. Based on Layer 2 Forwarding (L2F) and PPTP specifications, L2TP If you want to edit the linked information, double-click it. The toolbars and
allows clients to set up tunnels across intervening networks. See also: menus from the original program will appear. If the original document is on
Asynchronous Transfer Mode (ATM); Internet Protocol (IP); Point-to- your computer, changes that you make to the linked information will also
Point Tunneling Protocol (PPTP); tunnel appear in the original document. See also: embedded object; OLE;
package; source document
label -> Each part of a full DNS domain name that represents a node in
the domain namespace tree. Domain names are made up of a sequence liquid crystal display (LCD) -> A type of display used in digital watches
of labels, such as the three labels (example, microsoft, and com) that and many portable computers. LCD displays utilize two sheets of
make up the DNS domain name example.microsoft.com. Each label used polarizing material with a liquid crystal solution between them. An electric
in a DNS name must be 63 bytes or less in character length. See also: current passed through the liquid causes the crystals to align so that light
domain name; Domain Name System (DNS) cannot pass through them. Each crystal, therefore, is like a shutter, either
allowing light to pass through or blocking the light.
LAN emulation (LANE) -> A set of protocols that allow existing Ethernet
and Token Ring LAN services to overlie an ATM network. LANE allows Lmhosts file -> A local text file that maps NetBIOS names (commonly
connectivity among LAN- and ATM-attached stations. See also: used for computer names) to IP addresses for hosts that are not located
Asynchronous Transfer Mode (ATM); local area network (LAN); on the local subnet. In this version of Windows, the file is stored in the
protocol systemroot\System32\Drivers\Etc folder. See also: systemroot; IP
address
LAN emulation client (LEC) -> The client on an ELAN that performs data
forwarding, address resolution, and other control functions. The LEC load balancing -> A technique used by Windows Clustering to scale the
resides on end stations in an ELAN. See also: client; emulated local performance of a server-based program (such as a Web server) by
area network (ELAN); LAN emulation (LANE) distributing its client requests across multiple servers within the cluster.
Each host can specify the load percentage that it will handle, or the load
LAN emulation configuration server -> The service that assigns
can be equally distributed across all the hosts. If a host fails, Windows
individual local area network emulation (LANE) clients to particular
Clustering dynamically redistributes the load among the remaining hosts.
emulated local area networks (ELANs) by directing them to the LAN
See also: cluster; host
emulation server (LES). See also: emulated local area network (ELAN);
LAN emulation (LANE); LAN emulation server (LES); service local area network (LAN) -> A communications network connecting a
group of computers, printers, and other devices located within a relatively
LAN emulation server (LES) -> The central control point for an emulated
limited area (for example, a building). A LAN allows any connected device
local area network (ELAN). Enables LAN emulation clients to join the
to interact with any other on the network. See also: NetBIOS Extended
ELAN and resolves LAN addresses to ATM addresses. See also:
User Interface (NetBEUI); network basic input/output system
Asynchronous Transfer Mode (ATM); emulated local area network
(NetBIOS); virtual local area network (VLAN); workgroup
(ELAN); LAN emulation (LANE)
local computer -> The computer that you are currently logged on to as a
latency -> In Active Directory replication, the delay between the time an
user. More generally, a local computer is a computer that you can access
update is applied to a given replica and the time it is applied to some other
directly without using a communications line or a communications device,
replica. Latency is sometimes referred to as propagation delay. See also:
such as a network adapter or a modem.
replication; Active Directory; replica
local group -> For computers running Windows and member servers, a
LCD (Liquid Crystal Display) See definition for: liquid crystal display
group that can be granted permissions and rights from its own computer
(LCD)
and (if the computer participates in a domain) user accounts and global
LDAP Data Interchange Format (LDIF) -> Files that contain LDAP groups both from its own domain and from trusted domains. See also:
instructions that manipulate directory information. Before the LDAP global group; user account
commands in an LDIF file are carried out, they can be read or modified,
local printer -> A printer that is directly connected to one of the ports on
providing an opportunity for fine-tuning. See also: Lightweight Directory
your computer.
Access Protocol (LDAP)
local user -> A person who uses a computer that is not connected to a
lease -> The length of time for which a DHCP client can use a dynamically
network. A local user is most likely someone using a computer at home.
assigned IP address configuration. Before the lease time expires, the client
must either renew or obtain a new lease with DHCP. See also: Dynamic local user profile -> A computer-based record about an authorized user
Host Configuration Protocol (DHCP); IP address that is created automatically on the computer the first time a user logs on
to a workstation or server computer.
library -> A data-storage system, usually managed by Removable
Storage. A library consists of removable media (such as tapes or discs) log file -> A file that stores messages generated by an application,
and a hardware device that can read from or write to the media. There are service, or operating system. These messages are used to track the
two major types of libraries: robotic libraries (automated multiple-media, operations performed. For example, Web servers maintain log files listing
multidrive devices) and stand-alone drive libraries (manually operated, every request made to the server. Log files are usually plain text (ASCII)
single-drive devices). A robotic library is also called a jukebox or changer. files and often have a .log extension.
See also: Removable Storage In Backup, a file that contains a record of the date the tapes
were created and the names of files and directories successfully backed
Lightweight Directory Access Protocol (LDAP) -> The primary access
up and restored. The Performance Logs and Alerts service also creates
protocol for Active Directory. Lightweight Directory Access Protocol (LDAP)
log files. See also: American Standard Code for Information
version 3 is defined by a set of Proposed Standard documents in Internet
Interchange (ASCII); service
Engineering Task Force (IETF) RFC 2251. See also: Active Directory;
Internet Engineering Task Force (IETF); protocol log on -> To begin using a network by providing a user name and
password that identifies a user to the network.
Line Printer Daemon (LPD) -> A service on the print server that receives
documents (print jobs) from Line Printer Remote (LPR) utilities running on logical drive -> A volume that you create within an extended partition on a
client systems. See also: Line Printer Remote (LPR); print job; print basic master boot record (MBR) disk. Logical drives are similar to primary
server; service partitions, except that you are limited to four primary partitions per disk,
whereas you can create an unlimited number of logical drives per disk. A
Line Printer Remote (LPR) -> A connectivity utility that runs on client
logical drive can be formatted and assigned a drive letter. See also: basic
systems and is used to print files to a computer running an LPD server.
disk; basic volume; drive letter; extended partition; master boot
See also: Line Printer Daemon (LPD)
record (MBR); primary partition; volume
Link Control Protocol (LCP) -> A PPP control protocol that negotiates
logical printer -> The software interface between the operating system
link and PPP parameters to dynamically configure the data-link layer of a
and the printer in Windows. While a printer is the device that does the
PPP connection.
actual printing, a logical printer is its software interface on the print server.
linked object -> An object that is inserted into a document but still exists This software interface determines how a print job is processed and how it
in the source file. When information is linked, the new document is is routed to its destination (to a local or network port, to a file, or to a

Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
remote print share). When you print a document, it is spooled (or stored) requests information from SNMP agents. Management system is also
on the logical printer before it is sent to the printer itself. See also: printer; called a management console.
spooling
mandatory user profile -> A user profile that is not updated when the
logon right -> A user right that is assigned to a user and that specifies the user logs off. It is downloaded to the user's desktop each time the user
ways in which a user can log on to a system. An example of a logon right logs on, and is created by an administrator and assigned to one or more
is the right to log on to a system remotely. users to create consistent or job-specific user profiles. Only members of
the Administrators group can change profiles. See also: roaming user
logon script -> Files that can be assigned to user accounts. Typically a
profile; user profile
batch file, a logon script runs automatically every time the user logs on. It
can be used to configure a user's working environment at every logon, and map -> To translate one value into another. In virtual memory systems, a
it allows an administrator to influence a user's environment without computer might map a virtual address into a physical address.
managing all aspects of it. A logon script can be assigned to one or more
master boot record (MBR) -> The first sector on a hard disk, which starts
user accounts. See also: logon script path; user account
the process of booting the computer. The MBR contains the partition table
logon script path -> A sequence of directory names that specifies the for the disk and a small amount of executable code called the master boot
location of the logon script. When a user logs on, the authenticating code. See also: Recovery Console; partition boot sector
computer locates the specified logon script (if one has been assigned to
master domain -> A Windows NT 4.0 domain that is used for managing
that user account) by following that computer's local logon script path
user and group accounts in a multidomain network. See also: domain;
(usually systemroot\System32\Repl\Import\Scripts). See also: logon
group account; user account
script; systemroot; user account
Master File Table (MFT) -> An NTFS system file on NTFS-formatted
long distance operator -> Digits dialed before the area or city code to
volumes that contains information about each file and folder on the
access a long distance phone service. For example, in the United States of
volume. The MFT is the first file on an NTFS volume. See also: file
America, you dial a 1 before the area or city code: (1) (206) 000-0000. The
allocation table (FAT); NTFS file system; volume
actual digits depend on the country/region or phone service. Area codes
and long distance operators are not used in all countries/regions. master server -> An authoritative DNS server for a zone. Master servers
can vary and are one of two types (either primary or secondary masters),
long name -> A folder name or file name longer than the 8.3 file name
depending on how the server obtains its zone data. See also: DNS
standard (up to eight characters followed by a period and an extension of
Server; primary master; secondary master; zone; zone transfer
up to three characters) of the FAT file system. This version of Windows
supports long file names up to 255 characters. maximize -> To enlarge a window to its largest size by clicking the
In a Macintosh environment, users can assign long names to Maximize button (at the right of the title bar), or by pressing
files and folders on the server and, using AppleTalk network integration, ALT+SPACEBAR and then pressing X. See also: minimize; title bar
you can assign long names to Macintosh-accessible volumes when you
MD2 -> A hash algorithm that creates a 128-bit hash value and was
create them. This version of Windows automatically translates long names
developed by RSA Data Security, Inc. See also: hash algorithm
of files and folders to 8.3 names for MS-DOS and Windows 3.x users. See
also: file allocation table (FAT); MS-DOS (Microsoft Disk Operating MD4 -> A hash algorithm that creates a 128-bit hash value and was
System) developed by RSA Data Security, Inc. See also: hash algorithm
loopback address -> The address of the local computer used for routing MD5 -> An industry-standard one-way, 128-bit hashing scheme, developed
outgoing packets back to the source computer. This address is used by RSA Data Security, Inc., and used by various Point-to-Point Protocol
primarily for testing. (PPP) vendors for encrypted authentication. A hashing scheme is a
method for transforming data (for example, a password) in such a way that
loose name checking -> A form of domain name checking DNS uses that
the result is unique and cannot be changed back to its original form. The
examines characters in DNS names for valid ANSI character compliance.
CHAP authentication protocol uses challenge-response with one-way MD5
However, loose name checking does not check for compliance with DNS
hashing on the response. In this way, you can prove to the server that you
naming requirements and valid character usage for Internet host names,
know your password without actually sending the password over the
as specified in RFC 1123, Requirements for Internet Hosts - Applications
network. See also: CHAP (Challenge Handshake Authentication
and Support.
Protocol); hash algorithm; message digest
For RFC compliance, DNS domain names will use name labels
made up only of valid uppercase and lowercase letters, number media -> Any fixed or removable objects that store computer data.
characters, and hyphens (A through Z, a through z, 0 through 9, and -) Examples include hard disks, floppy disks, tapes, and compact discs.
separated by periods. See also: domain name; Domain Name System
media pool -> A logical collection of removable media that have the same
(DNS); label
management policies. Media pools are used by applications to control
luminosity -> The brightness of a color based on a scale from black to access to specific tapes or discs within libraries managed by Removable
white on your monitor. Storage. There are four media pools: unrecognized, import, free, and
application-specific. Each media pool can only hold either media or other
M
media pools. See also: free media pool; import media pool; backup
Make Changes -> The Macintosh-style permission that gives users the
media pool; Removable Storage
right to make changes to a folder's contents; for example, modifying,
renaming, moving, creating, and deleting files. When AppleTalk network media sensing -> A feature that, when it detects a network cable
integration translates access privileges into permissions, a user who has connection failure, removes the bound protocols from the failed network
the Make Changes privilege is given Write and Delete permissions. See adapter until the cable connection is reestablished. Without these bound
also: permission protocols, the network interface connected through the failed network
adapter is not available for cluster communication.
Management and Monitoring Tools -> Software components that include
utilities for network management and monitoring, along with services that mediator -> For Process Control, a process used to preserve information
support client dialing and the updating of client phone books. Also included when a service stops or starts.
is the Simple Network Management Protocol (SNMP). See also: Simple
memory address -> A portion of computer memory that can be allocated
Network Management Protocol (SNMP)
to a device or used by a program or the operating system. Devices are
Management Information Base (MIB) -> A set of objects that represent usually allocated a range of memory addresses. See also: device
various types of information about a device, used by Simple Network
Memory Usage -> In Task Manager, the current working set of a process,
Management Protocol (SNMP) to manage the device. Because different
in kilobytes. The current working set is the number of pages currently
network management services are used for different types of devices and
resident in memory. On the Task Manager Processes tab, the column
protocols, each service has its own set of objects. See also: Simple
heading is Mem Usage. See also: Task Manager
Network Management Protocol (SNMP); service
Memory Usage Delta -> In Task Manager, the change in memory, in
management system -> A network-enabled host running Simple Network
kilobytes, used since the last update. See also: Task Manager
Management Protocol (SNMP) management software. This software

Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
message -> For Message Queuing, a unit of information sent between restrictions. MPPE is compatible with Network Address Translation. See
computers running Message Queuing. The message can contain text or also: remote access server; tunnel server
binary data as defined by the sending application. All messages, including
Microsoft Reserved (MSR) partition -> A required partition on every
status messages, are stored in queues on Message Queuing computers.
GUID partition table (GPT) disk. System components can allocate portions
See also: Message Queuing
of the MSR partition into new partitions for their own use. For example,
Message Authentication Code (MAC) -> An algorithm that ensures the when you convert a basic GPT disk to dynamic, the system allocates a
quality of a block of data. portion of the MSR partition to be used as the Logical Disk Manager (LDM)
metadata partition. The MSR partition varies in size based on the size of
message digest See definition for: hash
the GPT disk. For disks smaller than 16 GB, the MSR partition is 32 MB.
Message Queuing -> A message queuing and routing system for For disks larger than 16 GB, the MSR partition is 128 MB. The MSR
Windows that enables distributed applications running at different times to partition is not visible in Disk Management, and you cannot store data on
communicate across heterogeneous networks and with computers that the MSR partition or delete it. See also: GUID partition table (GPT);
may be offline. Message Queuing provides guaranteed message delivery, partition
efficient routing, security, and priority-based messaging. Message Queuing
MIDI setup -> The setup that specifies the type of MIDI device you are
was formerly known as MSMQ. See also: Microsoft Distributed
using, the channel and patch settings needed to play MIDI files, and the
Transaction Coordinator (MS DTC)
port your device is using. See also: Musical Instrument Digital Interface
Message Queuing server -> For Message Queuing (also known as (MIDI)
MSMQ), a computer that can provide message queuing, routing, and
minimize -> To reduce a window to a button on the taskbar by clicking the
directory services to client computers. Message Queuing servers can be
Minimize button (at the right of the title bar), or by pressing
used to:
ALT+SPACEBAR and then pressing N. See also: maximize; title bar
 Provide message routing and session concentration for independent
clients. minimum TTL -> A default Time to Live (TTL) value set in seconds for use
 Provide message routing between sites over routing links. with all resource records in a zone. This value is set in the start of authority
 Create queues and store messages for dependent clients. (SOA) resource record for each zone. By default, the DNS server includes
this value in query answers to inform recipients how long it can store and
 Access information in Active Directory (if installed on a Windows use resource records provided in the query answer before they must
domain controller). expire the stored records data. When TTL values are set for individual
See also: Active Directory; dependent client; independent client; resource records, those values will override the minimum TTL. See also:
routing link; routing services; session concentration DNS Server; start-of-authority (SOA) resource record; Time to Live
Messenger service -> A service that sends and receives messages sent (TTL); zone
by administrators or by the Alerter service. See also: service; Alerter mirror -> One of the two volumes that make up a mirrored volume. Each
service; performance alert mirror of a mirrored volume resides on a different disk. If one mirror
metadata -> Data about data. For example, the title, subject, author, and becomes unavailable (due to a disk failure, for example), Windows can
size of a file constitute the file's metadata. use the remaining mirror to gain access to the volume's data. See also:
fault tolerance; mirrored volume; volume
metric -> A number used to indicate the cost of a route in the IP routing
table that enables the selection of the best route among possible multiple mirror set -> A fault-tolerant partition created with Windows NT 4.0 or
routes to the same destination. earlier that duplicates data on two physical disks. You can only repair,
resynchronize, break, or delete mirror sets in Windows 2000. To create
Microcom Networking Protocol Five (MNP5) -> A data-compression new volumes that are mirrored, use mirrored volumes on dynamic disks.
standard that allows modems to increase throughput by compressing data See also: basic disk; dynamic disk; fault tolerance; mirrored volume
before transmission. Data can be compressed with a ratio of up to 2:1.
MNP5 sometimes expands data that has already been compressed, mirrored volume -> A fault-tolerant volume that duplicates data on two
resulting in poorer performance in those cases. If you have an MNP5 physical disks. A mirrored volume provides data redundancy by using two
modem, do not turn on modem compression and software compression at identical volumes, which are called mirrors, to duplicate the information
the same time. To turn on MNP5 compression, you must also turn on contained on the volume. A mirror is always located on a different disk. If
MNP4 error control. See also: Microcom Networking Protocol Four one of the physical disks fails, the data on the failed disk becomes
(MNP4) unavailable, but the system continues to operate in the mirror on the
remaining disk. You can create mirrored volumes only on dynamic disks.
Microcom Networking Protocol Four (MNP4) -> An industry-standard See also: volume; dynamic disk; dynamic volume; fault tolerance;
communication protocol that allows modems to automatically retransmit RAID-5 volume
corrupted data, assuring that only error-free data passes through the
modem. MNP2 and MNP3 standards are included in MNP4. See also: modem (modulator/demodulator) -> A device that allows computer
Microcom Networking Protocol Five (MNP5) information to be transmitted and received over a telephone line. The
transmitting modem translates digital computer data into analog signals
Microsoft Distributed Transaction Coordinator (MS DTC) -> A that can be carried over a phone line. The receiving modem translates the
transaction manager that coordinates transactions that span multiple analog signals back to digital form. See also: modem compression; null
resource managers, such as Message Queuing and Microsoft SQL Server. modem cable; port; Telephony API (TAPI); Waiting for Call
MS DTC is automatically installed when Message Queuing is installed.
See also: Message Queuing; transaction modem compression -> A technique used to reduce the number of
characters transmitted without losing data content. The transmitting
Microsoft Management Console (MMC) -> A framework for hosting modem compresses the data and the receiving computer or modem
administrative tools, called consoles. A console may contain tools, folders decompresses the data back to its original state. See also: modem
or other containers, World Wide Web pages, and other administrative (modulator/demodulator)
items. These items are displayed in the left pane of the console, called a
console tree. A console has one or more windows that can provide views modulation standards -> Protocols that determine how modems convert
of the console tree. digital data into analog signals that can be transmitted over telephone
The main MMC window provides commands and tools for lines.
authoring consoles. The authoring features of MMC and the console tree Initially, Bell created modulation standards used in the United
itself may be hidden when a console is in User Mode. See also: snap-in; States, and the CCITT created international recommendations. The ITU-T
console tree (formerly called the CCITT) now makes recommendations generally
adopted by modem manufacturers both internationally and in the United
Microsoft Point-to-Point Encryption (MPPE) -> A 128-bit key or 40-bit States. The ITU-T V series recommendations (such as V.34 and V.90)
key encryption algorithm using RSA RC4. MPPE provides for packet define data communication over the telephone network. The suffixes -bis
confidentiality between the remote access client and the remote access or and -ter (for example, V.32bis) indicate later versions. See also:
tunnel server and is useful where IP security (IPSec) is not available. International Telecommunication Union - Telecommunication
MPPE 40-bit keys are used to satisfy current North American export [Standardization Sector] (ITU-T); V.34; V.90

Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
mount -> To place a removable tape or disc into a drive. See also: on a description of the way in which music and sound are encoded and
dismount; library; mounted drive communicated between MIDI devices. The information transmitted
between MIDI devices is in a form called a MIDI message, which encodes
mounted drive -> A drive attached to an empty folder on an NTFS
aspects of sound, such as pitch and volume, as 8-bit bytes of digital
volume. Mounted drives function the same as any other drive, but are
information.
assigned a label or name instead of a drive letter. The mounted drive's
MIDI devices can be used for creating, recording, and playing
name is resolved to a full file system path instead of just a drive letter.
back music. Using MIDI, computers, synthesizers, and sequencers can
Members of the Administrators group can use Disk Management to create
communicate with each other, either keeping time or actually controlling
mounted drives or reassign drive letters. See also: drive; mount; NTFS
the music created by other connected equipment. See also: MIDI setup
file system; volume
My Documents -> A folder that provides you with a convenient place to
MouseKeys -> A keyboard feature that enables you to use the numeric
store documents, graphics, or other files you want to access quickly. When
keypad to move the mouse pointer and to click, double-click, and drag.
you save a file in a program such as WordPad or Paint, the file is
See also: ToggleKeys; FilterKeys; StickyKeys
automatically saved in My Documents, unless you choose a different
MS-DOS (Microsoft Disk Operating System) -> An operating system folder. See also: home folder
used on all personal computers and compatibles. As with other operating
N
systems, such as OS/2, it translates user keyboard input into operations
name -> The identifier of your computer on the network.
the computer can perform. MS-DOS can be easily accessed by using the
command prompt, while MS-DOS-based programs can be accessed name resolution -> The process of having software translate between
through the use of shortcuts on the desktop. See also: OS/2; command names that are easy for users to work with and numerical IP addresses,
prompt window; MS-DOS-based program which are difficult for users but necessary for TCP/IP communications.
Name resolution can be provided by software components such as DNS or
MS-DOS-based program -> A program that is designed to run with MS-
WINS. See also: Domain Name System (DNS); Transmission Control
DOS and therefore may not be able to take full advantage of all Windows
Protocol/Internet Protocol (TCP/IP); Windows Internet Name Service
features. See also: MS-DOS (Microsoft Disk Operating System);
(WINS)
program information file (PIF)
name server (NS) resource record -> A resource record used in a zone
multicast -> Network traffic destined for a set of hosts that belong to a
to designate the DNS domain names for authoritative DNS servers for the
multicast group.
zone. See also: DNS Server; Domain Name System (DNS); resource
Multicast Address Dynamic Client Allocation Protocol (MADCAP) -> record (RR); zone
An extension to the DHCP protocol standard used to support dynamic
named pipe -> A portion of memory that can be used by one process to
assignment and configuration of IP multicast addresses on TCP/IP-based
pass information to another process, so that the output of one is the input
networks. See also: Dynamic Host Configuration Protocol (DHCP);
of the other. The second process can be local (on the same computer as
Transmission Control Protocol/Internet Protocol (TCP/IP)
the first) or remote (on a networked computer).
multicast address resolution service (MARS) -> A service for resolving
namespace -> A set of unique names for resources or items used in a
multicast IP addresses to the ATM addresses of the clients that have
shared computing environment.
joined that multicast group. The MARS can work in conjunction with the
For Microsoft Management Console (MMC), the namespace is
MCS and clients to distribute multicast data through point-to-multipoint
represented by the console tree, which displays all of the snap-ins and
connections. See also: Asynchronous Transfer Mode (ATM); multicast
resources that are accessible to a console.
server (MCS); IP address
For Domain Name System (DNS), namespace is the vertical or
multicast scope -> A range of multicast group IP addresses in the Class hierarchical structure of the domain name tree. For example, each domain
D address range that are available to be leased or assigned to multicast label, such as host1 or example, used in a fully qualified domain name,
DHCP clients by DHCP. See also: address classes; Dynamic Host such as host1.example.microsoft.com, indicates a branch in the domain
Configuration Protocol (DHCP); lease namespace tree. See also: console tree; Domain Name System (DNS);
label; resource; snap-in
multicast server (MCS) -> A service that manages zero or more multicast
groups and distributes multicast data sent to it by clients of those multicast naming context See definition for: directory partition
groups through point-to-multipoint connections. See also: nonhubbed
native mode -> The condition in which all domain controllers in the
mode; service
domain have been upgraded to Windows 2000 and an administrator has
multicasting -> The process of sending a message simultaneously to enabled native mode operation (through Active Directory Users and
more than one destination on a network. Computers). See also: Active Directory Users and Computers
multihomed computer -> A computer that has multiple network adapters NetBIOS Extended User Interface (NetBEUI) -> A network protocol
or that has been configured with multiple IP addresses for a single network native to Microsoft Networking. It is usually used in small, department-size
adapter. See also: virtual IP address; IP address; network adapter local area networks (LANs) of 1 to 200 clients. It can use Token Ring
source routing as its only method of routing. It is the Microsoft
multilink dialing -> The combination of two or more physical
implementation of the NetBIOS standard. See also: Compression
communications links' bandwidth into a single logical link to increase your
Control Protocol (CCP); local area network (LAN); network basic
remote access bandwidth and throughput by using remote access
input/output system (NetBIOS); protocol
Multilink. Based on the Internet Engineering Task Force (IETF) standard
RFC 1990, Multilink combines analog modem paths, ISDN B-channels, NetWare Core Protocol (NCP) -> The file-sharing protocol that governs
and mixed analog and digital communications links on both your client and communications about resource (such as disk and printer), bindery, and
server computers. This increases your Internet and intranet access speed NDS operations between server and client computers on a Novell NetWare
and decreases the amount of time you are connected to a remote network. Requests from client computers are transmitted by the IPX
computer. See also: B-channel; bandwidth; Integrated Services Digital protocol. Servers respond according to NCP guidelines. See also:
Network (ISDN) bindery; Internetwork Packet Exchange (IPX); Novell Directory
Services (NDS)
multimaster replication -> A replication model in which any domain
controller accepts and replicates directory changes to any other domain network -> A group of computers and other devices, such as printers and
controller. This differs from other replication models in which one computer scanners, connected by a communications link, enabling all the devices to
stores the single modifiable copy of the directory and other computers interact with each other. Networks can be small or large, permanently
store backup copies. See also: domain controller; replication connected through wires or cables, or temporarily connected through
phone lines or wireless transmissions. The largest network is the Internet,
multiple boot -> A computer configuration that runs two or more operating
which is a worldwide group of networks. See also: network adapter
systems. See also: dual boot; startup environment
network adapter -> A device that connects your computer to a network.
Musical Instrument Digital Interface (MIDI) -> A serial interface standard
This device is sometimes called an adapter card or network interface card.
that allows for the connection of music synthesizers, musical instruments,
and computers. The MIDI standard is based partly on hardware and partly
Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
network administrator -> A person responsible for planning, configuring, hubbed mode; multicast address resolution service (MARS);
and managing the day-to-day operation of the network. Network multicast server (MCS)
administrator is also called a system administrator.
nonpaged memory -> Memory that cannot be paged to disk. Paging is
network basic input/output system (NetBIOS) -> An application the moving of infrequently used parts of a program's working memory from
programming interface (API) that can be used by programs on a local area RAM to another storage medium, usually the hard disk. See also: paging
network (LAN). NetBIOS provides programs with a uniform set of file
commands for requesting the lower-level services required to manage
nonpaged pool -> Operating system memory that is never paged to disk.
names, conduct sessions, and send datagrams between nodes on a
Paging is the moving of infrequently used parts of a program's working
network. See also: application programming interface (API); basic
memory from RAM to another storage medium, usually the hard disk. In
input/output system (BIOS); local area network (LAN); service
Task Manager, the amount of memory used by a process, in kilobytes. See
network card driver -> A device driver that works directly with the network also: paging file
card, acting as an intermediary between the card and the protocol driver.
normal backup -> A backup that copies all selected files and marks each
With AppleTalk network integration, the AppleTalk Protocol stack on the
file as having been backed up (in other words, the archive attribute is
server is implemented as a protocol driver and is bound to one or more
cleared). With normal backups, you need only the most recent copy of the
network card drivers. See also: device driver
backup file or tape to restore all of the files. You usually perform a normal
Network Connections -> A component you can use to gain access to backup the first time you create a backup set. See also: copy backup;
network resources and functionality, whether you are physically at the daily backup; differential backup; incremental backup
network location or in a remote location. By using the Network
notification area -> The area on the taskbar to the right of the taskbar
Connections folder you can create, configure, store, and monitor
buttons. The notification area displays the time and can also contain
connections.
shortcuts that provide quick access to programs, such as Volume Control
Network DDE service -> A service that provides network transport and and Power Options. Other shortcuts can appear temporarily, providing
security for DDE conversations. See also: dynamic data exchange information about the status of activities. For example, the printer shortcut
(DDE); service icon appears after a document has been sent to the printer and disappears
when printing is complete.
network media -> The type of physical wiring and lower-layer protocols
used for transmitting and receiving packets; for example, Ethernet, FDDI, notify list -> A list maintained by the primary master for a zone of other
and Token Ring. DNS servers that should be notified when zone changes occur. The notify
list is made up of IP addresses for DNS servers configured as secondary
Network Name resource -> The name of a device that exists on a
masters for the zone. When the listed servers are notified of a change to
network and is supported as a cluster resource by a Resource DLL
the zone, they will initiate a zone transfer with another DNS server and
provided with Windows. See also: Resource DLL
update the zone. See also: DNS Server; primary master; zone transfer;
Network News Transfer Protocol (NNTP) -> A member of the TCP/IP secondary master; zone
suite of protocols used to distribute network news messages to NNTP
Novell Directory Services (NDS) -> On networks running Novell NetWare
servers and clients (newsreaders) on the Internet. NNTP is designed so
4.0, a distributed database that maintains information about every
that news articles are stored on a server in a central database, thus
resource on the network and provides access to these resources.
enabling a user to select specific items to read. See also: Transmission
Control Protocol/Internet Protocol (TCP/IP) Nslookup -> A command-line tool used to diagnose Domain Name
System (DNS) infrastructure. See also: Domain Name System (DNS)
network number -> In the Macintosh environment, the routing address or
range of addresses assigned to the physical network that AppleTalk Phase NTDS-DSA object -> An object that represents the configuration of the
2 routers use to direct information to the appropriate network. Network Active Directory service running on a specific domain controller. For
number is also called network range and cable range. example, the NTDS-DSA object holds the setting that determines whether
or not the Active Directory service provides global catalog services. NTDS-
network partition -> A state in which one or more of the nodes in a cluster
DSA objects are created and deleted in the course of running the Active
cannot communicate with the other cluster nodes.
Directory Installation Wizard (dcpromo.exe).
network place -> A folder on a Web server. You can view files and folders An NTDS-DSA object is stored in the Configuration directory
on Web servers just as you would view files and folders on network partition and is always a child of the Server object representing the domain
servers. However, when you save a file to a network place, the file is controller where this particular Active Directory service is running. For
saved on a Web server, not on your computer's hard disk. You can create example, if the distinguished name of an NTDS-DSA object is:
network places by using the Add Network Place Wizard, which is located in
CN=NTDS Settings,CN=RESKIT1,CN=Servers,
My Network Places. Network places are available only on Web servers
CN=Washington,CN=Sites,CN=Configuration,DC=reskit,DC=com
that support Web Extender Client (WEC), FrontPage extensions, and
Distributed Authoring and Versioning (DAV) protocols. then the distinguished name of the corresponding Server object is:
non-Plug and Play -> A device, such as a printer, modem, or game CN=RESKIT1,CN=Servers,CN=Washington,CN=Sites,
controller, that requires manual configuration of hardware settings before it CN=Configuration,DC=reskit,DC=com
can be used. Non-Plug and Play devices are becoming increasingly rare See also: Active Directory; domain controller; global catalog
as manufacturers stop producing them in favor of Plug and Play devices.
NTFS file system -> An advanced file system that provides performance,
Non-Plug and Play typically applies to older pieces of equipment. See
security, reliability, and advanced features that are not found in any version
also: device; Plug and Play
of FAT. For example, NTFS guarantees volume consistency by using
nonauthoritative restore -> A restore of a backup copy of a Windows standard transaction logging and recovery techniques. If a system fails,
domain controller in which the objects in the restored directory are not NTFS uses its log file and checkpoint information to restore the
treated as authoritative. The restored objects are updated with changes consistency of the file system. In Windows 2000 and Windows XP, NTFS
held in other replicas of the restored domain. See also: authoritative also provides advanced features such as file and folder permissions,
restore encryption, disk quotas, and compression. See also: FAT32; file
allocation table (FAT); file system
noncontainer object -> An object that cannot logically contain other
objects. For example, a file is a noncontainer object. See also: container NTLM -> A security package that provides authentication between clients
object; object and servers.
nonhubbed mode -> A mode in which the ATM ARP/MARS does not NTLM authentication protocol -> A challenge/response authentication
forward multicast and broadcast traffic for multicast group clients. In this protocol. The NTLM authentication protocol was the default for network
mode, the service returns a dynamic listing of ATM hosts currently authentication in Windows NT version 4.0 and earlier. The protocol
registered for the multicast group address to requesting clients. Clients continues to be supported in Windows 2000 but no longer is the default.
then use this list to initiate and establish their own point-to-multipoint virtual
null modem cable -> Special cabling that eliminates the modem's need
connections with each of the members in the multicast list. See also:
for asynchronous communications between two computers over short
Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
distances. A null modem cable emulates modem communication. See For Indexing Service, a word or character that specifies a
also: modem (modulator/demodulator) relationship in a query.
NWLink -> An implementation of the Internetwork Packet Exchange (IPX), organizational unit -> An Active Directory container object used within
Sequenced Packet Exchange (SPX), and NetBIOS protocols used in domains. An organizational unit is a logical container into which users,
Novell networks. NWLink is a standard network protocol that supports groups, computers, and other organizational units are placed. It can
routing and can support NetWare client-server applications, where contain objects only from its parent domain. An organizational unit is the
NetWare-aware Sockets-based applications communicate with IPX/SPX smallest scope to which a Group Policy object can be linked, or over which
Sockets-based applications. See also: Routing Information Protocol administrative authority can be delegated. See also: Active Directory;
over IPX (RIPX); IPX/SPX; network basic input/output system container object; Group Policy object; parent domain
(NetBIOS)
orphan -> A member of a mirrored volume or a RAID-5 volume that has
O failed due to a severe cause, such as a loss of power or a complete hard-
object -> An entity, such as a file, folder, shared folder, printer, or Active disk head failure. When this happens, the fault-tolerant driver determines
Directory object, described by a distinct, named set of attributes. For that it can no longer use the orphaned member and directs all new reads
example, the attributes of a File object include its name, location, and size; and writes to the remaining members of the fault-tolerant volume. See
the attributes of an Active Directory User object might include the user's also: fault tolerance; mirrored volume; RAID-5 volume
first name, last name, and e-mail address.
orphan file -> A file that is stored inside My Briefcase and not linked to
For OLE and ActiveX, an object can also be any piece of
any file outside My Briefcase. When you update files, the orphan file is not
information that can be linked to, or embedded into, another object. See
synchronized with any other file.
also: attribute; child object; OLE; parent object
OS/2 -> A protected-mode, virtual memory, multitasking operating system
offline -> A state that marks a component in a cluster as unavailable. A
for personal computers based on the Intel 80286, 80386, i486, and
node in an offline state is either inactive or not running. Resources and
Pentium processors. OS/2 can run most MS-DOS-based programs and
groups also have an offline state. See also: group; online; pending;
can read all MS-DOS disks. See also: MS-DOS-based program
resource
owner -> In a Windows environment, the person who controls how
OLE -> A way to transfer and share information between applications by
permissions are set on objects and can grant permissions to others.
pasting information created in one application into a document created in
In the Macintosh environment, an owner is the user responsible
another application, such as a spreadsheet or word processing file. See
for setting permissions for a folder on a server. A Macintosh user who
also: embedded object; linked object; package
creates a folder on the server automatically becomes the owner of the
on-disk catalog -> Information stored on a local disk drive. The on-disk folder, and can then transfer ownership to someone else. Each Macintosh-
catalog contains a list of files and folders that have been backed up in a accessible volume on the server also has an owner.
backup set. See also: backup set; on-media catalog
owner category -> In the Macintosh environment, the user category to
on-media catalog ->Information stored on backup storage media. The on- which you assign permissions for the owner of a folder or a Macintosh
media catalog contains a list of files and folders that have been backed up volume.
in a backup set. See also: backup set; on-disk catalog
P
one-way trust -> A type of trust relationship in which only one of the two package -> An icon that represents embedded or linked information. That
domains trusts the other domain. For example, domain A trusts domain B information may consist of a complete file, such as a Paint bitmap, or part
and domain B does not trust domain A. All one-way trusts are of a file, such as a spreadsheet cell. When you choose the package, the
nontransitive. See also: transitive trust; two-way trust application used to create the object either plays the object (for example, a
sound file) or opens and displays the object. If you change the original
online -> A state that marks a component in a cluster as available. When a
information, linked information is automatically updated. However, you
node is online, it is an active member of the cluster and can own and run
must manually update embedded information. See also: embedded
groups as well as honor cluster database updates, contribute votes to the
object; linked object; OLE
quorum algorithm, and maintain heartbeats. Resources and groups also
have an online state. See also: group; offline; pending; resource packet -> An Open Systems Interconnection (OSI) network layer
transmission unit that consists of binary information representing both data
Open Systems Interconnection (OSI) reference model -> A networking
and a header containing an identification number, source and destination
model introduced by the International Organization for Standardization
addresses, and error-control data. See also: Internet Protocol (IP);
(ISO) to promote multi-vendor interoperability. Open Systems
packet header; packet switching; switching hub
Interconnection (OSI) is a seven-layered conceptual model consisting of
the application, presentation, session, transport, network, data-link, and packet header -> In network protocol communications, a specially
physical layers. See also: Transmission Control Protocol/Internet reserved field of a defined bit length that is attached to the front of a packet
Protocol (TCP/IP) for carry and transfer of control information. When the packet arrives at its
destination, the field is then detached and discarded as the packet is
OpenType fonts -> Outline fonts that are rendered from line and curve
processed and disassembled in a corresponding reverse order for each
commands, and can be scaled and rotated. OpenType fonts are clear and
protocol layer. See also: packet
readable in all sizes and on all output devices supported by Windows.
OpenType is an extension of TrueType font technology. See also: font; packet switching -> A technology for breaking data into packets and then
TrueType fonts sending the packets over a network. Each packet has a header containing
its source and destination, a sequence number to reassemble the
operations master -> A domain controller that has been assigned one or
information, a block of data content, and an error-checking code. The data
more special roles in an Active Directory domain.
packets may take different routes to their destination, where the original
The domain controllers assigned these roles perform operations
information is reassembled after the packets arrive. The international
that are single-master (not permitted to occur at different places on the
standard for packet switching networks is X.25. See also: packet
network at the same time). Examples of these operations include resource
identifier allocation, schema modification, PDC election, and certain PAD (packet assembler/disassembler) -> A device that connects a non-
infrastructure changes. X.25 device such as a modem to an X.25 packet switching network.
The domain controller that controls the particular operation owns
page -> In virtual memory systems, a unit of data storage that is brought
the operations master role for that operation. The ownership of these
into random access memory (RAM), typically from a hard drive, when a
operations master roles can be transferred to other domain controllers.
requested item of data is not already in RAM. See also: virtual memory
See also: Active Directory; domain controller; domain naming
master; infrastructure master; schema master page fault -> The interrupt that occurs when software attempts to read
from or write to a virtual memory location that is marked not present.
operator -> In mathematics and in programming and computer
In Task Manager, page fault is the number of times data has to
applications, a symbol or other character indicating an operation that acts
be retrieved from disk for a process because it was not found in memory.
on one or more elements. You can use the following four operators in
The page fault value accumulates from the time the process started. See
standard calculations:
also: Page Faults Delta; Task Manager; virtual memory
/ divide * multiply - subtract + add
Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
Page Faults Delta -> In Task Manager, the change in the number of page Password Authentication Protocol (PAP) -> A simple, plaintext
faults since the last update. See also: Task Manager authentication scheme for authenticating PPP connections. The user name
and password are requested by the remote access server and returned by
page-description language (PDL) -> A computer language that describes
the remote access client in plaintext. See also: Point-to-Point Protocol
the arrangement of text and graphics on a printed page. See also: Printer
(PPP); remote access; password
Control Language (PCL); Printer Job Language (PJL); PostScript;
PostScript fonts paused -> A state that applies to a node in a cluster. The node is a fully
active member in the cluster but cannot accept new resource groups (for
paged pool -> The system-allocated virtual memory that has been
example, a resource group cannot fail over or fail back to a paused node).
charged to a process and that can be paged. Paging is the moving of
You can administer and maintain a paused node. See also: cluster;
infrequently-used parts of a program's working memory from RAM to
failback; failover; offline
another storage medium, usually the hard disk.
In Task Manager, the amount of system-allocated virtual PC Card -> A removable device, approximately the size of a credit card,
memory, in kilobytes, used by a process. See also: registry size limit that can be plugged into a Personal Computer Memory Card International
(RSL); virtual memory Association (PCMCIA) slot in a portable computer. PCMCIA devices can
include modems, network cards, and hard disk drives. See also: modem
paging file -> A hidden file on the hard disk that Windows uses to hold
(modulator/demodulator)
parts of programs and data files that do not fit in memory. The paging file
and physical memory, or RAM, comprise virtual memory. Windows moves PCI expansion slot -> A connection socket for a peripheral designed for
data from the paging file to memory as needed and moves data from the Peripheral Component Interconnect (PCI) local bus on a computer
memory to the paging file to make room for new data. motherboard.
Paging file is also called a swap file. See also: Peak Memory Usage; PDC emulator master -> The domain controller assigned to act as a
registry size limit (RSL); virtual memory Windows NT 4.0 primary domain controller (PDC) to service network
clients that do not have Active Directory client software installed, and to
Panose -> A font-classification method that measures values, such as
replicate directory changes to any Windows NT backup domain controllers
serifs, weight, and stroke variations, for a TrueType font. These values are
(BDCs) in the domain.
represented by a Panose number. The Panose number is then used to
The PDC emulator master receives preferential replication of
associate the font with other fonts of similar appearance but different
password changes performed by other domain controllers in the domain
names. The closer the Panose number of two fonts, the more similar they
and handles any password authentication requests that fail at the local
are.
domain controller. At any time, there can be only one PDC emulator
paper source -> The location (such as Upper Paper Tray or Envelope master in a particular domain. See also: Active Directory; primary
Feeder) of the paper at the printer. domain controller (PDC); replication; backup domain controller
(BDC); domain controller; multimaster replication; operations master
parallel port -> The input/output connector for a parallel interface device.
Printers are generally plugged into a parallel port. See also: serial port Peak Memory Usage -> In Task Manager, the peak amount of physical
memory resident in a process since it started. See also: Task Manager
parent domain -> For DNS and Active Directory, domains that are located
in the namespace tree directly above other derivative domain names (child pending -> A state that refers to a resource in a cluster when the resource
domains). For example, microsoft.com would be the parent domain for is in the process of being brought online or taken offline. See also: offline;
example.microsoft.com, a child domain. See also: domain; Domain online; resource
Name System (DNS)
Per Seat Licensing -> A licensing mode that requires a separate Client
parent object -> The object in which another object resides. A parent Access License for each client computer, regardless of whether all the
object implies relation. For example, a folder is a parent object in which a clients access the server at the same time. See also: client; Per Server
file, or child object, resides. An object can be both a parent and a child Licensing
object. For example, a subfolder that contains files is both the child of the
Per Server Licensing -> A licensing mode that requires a separate Client
parent folder and the parent folder of the files. See also: child object;
Access License for each concurrent connection to the server, regardless of
object
whether there are other client computers on the network that do not
parity -> A calculated value that is used to reconstruct data after a failure. happen to connect concurrently. See also: client; Per Seat Licensing
RAID-5 volumes stripe data and parity intermittently across a set of disks.
performance alert -> A feature that detects when a predefined counter
When a disk fails, some server operating systems use the parity
value rises above or falls below the configured threshold and notifies a
information together with the data on good disks to recreate the data on
user by means of the Messenger service. See also: Messenger service
the failed disk. See also: fault tolerance; RAID-5 volume
performance counter -> In System Monitor, a data item that is associated
parity bit -> In asynchronous communications, an extra bit used in
with a performance object. For each counter selected, System Monitor
checking for errors in groups of data bits transferred within or between
presents a value corresponding to a particular aspect of the performance
computer systems. In modem-to-modem communications, a parity bit is
that is defined for the performance object. See also: performance object
often used to check the accuracy with which each character is transmitted.
See also: parity performance object -> In System Monitor, a logical collection of counters
that is associated with a resource or service that can be monitored. See
partition -> A portion of a physical disk that functions as though it were a
also: performance counter
physically separate disk. After you create a partition, you must format it
and assign it a drive letter before you can store data on it. performance object instance -> In System Monitor, a term used to
On basic disks, partitions are known as basic volumes, which distinguish between multiple performance objects of the same type on a
include primary partitions and logical drives. On dynamic disks, partitions computer. See also: performance object
are known as dynamic volumes, which include simple, striped, spanned,
peripheral -> A device, such as a disk drive, printer, modem, or joystick,
mirrored, and RAID-5 volumes. See also: basic disk; basic volume;
that is connected to a computer and is controlled by the computer's
drive letter; dynamic volume; extended partition; primary partition;
microprocessor. See also: device
system partition
peripheral component interconnect (PCI) -> A specification introduced
partition boot sector -> A portion of a hard disk partition that contains
by Intel Corporation that defines a local bus system that allows up to 10
information about the disk's file system and a short machine language
PCI-compliant expansion cards to be installed in the computer.
program that loads the Windows operating system. See also: partition
permission -> A rule associated with an object to regulate which users
password -> A security measure used to restrict logon names to user
can gain access to the object and in what manner. Permissions are
accounts and access to computer systems and resources. A password is a
granted or denied by the object's owner. See also: object; printer
string of characters that must be provided before a logon name or an
permissions; security descriptor; shared folder permissions; special
access is authorized. A password can be made up of letters, numbers, and
access permissions
symbols, and it is case sensitive. See also: user account

Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
Physical Disk resource -> A disk on a cluster storage device. Physical policy -> The mechanism by which desktop settings are configured
disks are supported as cluster resources by a Resource DLL. See also: automatically, as defined by the administrator. Depending on context, this
Resource DLL can refer to Group Policy, Windows NT 4.0 System Policy, or a specific
setting in a Group Policy object. See also: Group Policy; Group Policy
ping -> A utility that verifies connections to one or more remote hosts. The
object; System Policy
ping command uses the ICMP echo request and echo reply packets to
determine whether a particular IP system on a network is functional. Ping polling intervals -> The frequency the Resource Monitor checks that the
is useful for diagnosing IP network or router failures. See also: Internet resource is available and operating. There are two levels of polling: Looks
Control Message Protocol (ICMP) Alive and Is Alive. The server cluster requests a more thorough check of
the resource's state at each Is Alive interval than it does at each Looks
pixel -> Short for picture element, one spot in a rectilinear grid of
Alive interval; therefore, the Is Alive polling interval is typically longer than
thousands of such spots that form an image produced on the screen by a
the Looks Alive polling interval. You can specify the two polling intervals
computer or on paper by a printer. A pixel is the smallest element that
and a time-out value for resources. See also: resource
display or print hardware and software can manipulate to create letters,
numbers, or graphics. A pixel is also called a pel. See also: screen POP3 (Post Office Protocol 3) -> A popular protocol used for receiving e-
resolution mail messages. This protocol is often used by ISPs. POP3 servers allow
access to a single Inbox in contrast to IMAP servers, which provide access
PKCS #10 -> The Certification Request Syntax Standard, developed and
to multiple server-side folders.
maintained by RSA Data Security, Inc. A syntax for certificate requests.
See also: certificate; Public Key Cryptography Standards (PKCS) port -> A connection point on your computer where you can connect
devices that pass data into and out of a computer. For example, a printer is
PKCS #12 -> The Personal Information Exchange Syntax Standard,
typically connected to a parallel port (also called an LPT port), and a
developed and maintained by RSA Data Security, Inc. This syntax
modem is typically connected to a serial port (also called a COM port). See
standard specifies a portable format for storing or transporting a user's
also: serial port; universal serial bus (USB)
private keys, certificates, and miscellaneous secrets. See also:
certificate; Public Key Cryptography Standards (PKCS) port rule -> For Network Load Balancing, a set of configuration
parameters that determine the filtering mode to be applied to a range of
PKCS #7 -> The Cryptographic Message Syntax Standard. It is a general
ports. See also: filtering mode; port
syntax, developed and maintained by RSA Data Security, Inc., for data to
which cryptography may be applied, such as digital signatures and Portable Operating System Interface for UNIX (POSIX) -> An Institute of
encryption. It also provides a syntax for disseminating certificates or Electrical and Electronics Engineers (IEEE) standard that defines a set of
certificate revocation lists. See also: certificate; certificate revocation operating-system services. Programs that adhere to the POSIX standard
list (CRL); encryption; Public Key Cryptography Standards (PKCS) can be easily ported from one system to another. POSIX was based on
UNIX system services, but it was created in a way that allows it to be
plaintext -> Data that is not encrypted. Sometimes also called cleartext.
implemented by other operating systems. See also: service
plotter -> Any device used to draw charts, diagrams, and other line-based
possible owners -> A list that specifies which nodes in the cluster are
graphics.
capable of running that resource. By default, both nodes appear as
plotter font -> A font created by a series of dots connected by lines. possible owners, so the resource can run on either node. In most cases, it
Plotter fonts can be scaled to any size and are most often printed on is appropriate to use this default setting. If you want the resource to be
plotters. Some dot-matrix printers also support plotter fonts. See also: font able to fail over, both nodes must be designated as possible owners. See
also: failover; resource
Plug and Play -> A set of specifications developed by Intel that allows a
computer to automatically detect and configure a device and install the PostScript -> A page-description language (PDL), developed by Adobe
appropriate device drivers. See also: universal serial bus (USB); non- Systems for printing on laser printers. PostScript offers flexible font
Plug and Play capability and high-quality graphics. It is the standard for desktop
publishing because it is supported by imagesetters, the high-resolution
point of termination station (POTS) -> Basic dial telephone connections
printers used by printing services for commercial typesetting. See also:
to the public switched network, without any added features or functions.
Printer Control Language (PCL); page-description language (PDL);
Plain old telephone service and point of termination station is also called
Printer Job Language (PJL); PostScript fonts; PostScript printer;
POTS.
service; Type 1 fonts
Point-to-Point Protocol (PPP) -> An industry standard suite of protocols
PostScript fonts -> Fonts that are defined in terms of the PostScript
for the use of point-to-point links to transport multiprotocol datagrams. PPP
page-description language (PDL) rules and are intended to be printed on a
is documented in RFC 1661. See also: Compression Control Protocol
PostScript-compatible printer. When a document displayed in a screen font
(CCP); remote access; Transmission Control Protocol/Internet
is sent to a PostScript printer, the printer uses the PostScript version if the
Protocol (TCP/IP); voluntary tunnel
font exists. If the font doesn't exist but a version is installed on the
Point-to-Point Protocol over Ethernet (PPPoE) -> A specification for computer, that font is downloaded to the printer. If there is no PostScript
connecting users on an Ethernet network to the Internet through a font installed in either the printer or the computer, the bit-mapped (raster)
broadband connection, such as a single DSL line, wireless device, or cable font is translated into PostScript and the printer produces text using the bit-
modem. Using PPPoE and a broadband modem, LAN users can gain mapped font. PostScript fonts are distinguished from bit-mapped fonts by
individual authenticated access to high-speed data networks. By their smoothness, detail, and faithfulness to standards of quality
combining Ethernet and Point-to-Point Protocol (PPP), PPPoE provides an established in the typographic industry.
efficient way to create a separate connection for each user to a remote See also: downloadable fonts; font; page-description language (PDL);
server. PostScript; raster fonts
Point-to-Point Tunneling Protocol (PPTP) -> Networking technology that PostScript printer -> A printer that uses the PostScript page-description
supports multiprotocol virtual private networks (VPNs), enabling remote language (PDL) to create text and graphics on the output medium, such as
users to access corporate networks securely across the Internet or other paper or overhead transparency. Examples of PostScript printers include
networks by dialing into an Internet service provider (ISP) or by connecting the Apple LaserWriter, the NEC LC-890, and the QMS PS-810. See also:
directly to the Internet. The Point-to-Point Tunneling Protocol (PPTP) page-description language (PDL); PostScript; virtual printer memory
tunnels, or encapsulates, IP, IPX, or NetBEUI traffic inside of IP packets.
power conditioning -> A feature of an uninterruptible power supply (UPS)
This means that users can remotely run applications that are dependent
that removes spikes, surges, sags, and noise from the power supply. See
upon particular network protocols. See also: Internet Protocol (IP);
also: uninterruptible power supply (UPS)
Internetwork Packet Exchange (IPX); NetBIOS Extended User
Interface (NetBEUI); packet; tunnel; virtual private network (VPN) power scheme -> A group of preset power-management options. For
example, you can set elapsed times for putting your computer on standby
pointer (PTR) resource record -> A resource record used in a reverse
and for turning off your monitor and hard disk. You save these settings as
lookup zone created within the in-addr.arpa domain to designate a reverse
a named power scheme.
mapping of a host IP address to a host DNS domain name. See also: in-
addr.arpa domain; reverse lookup; resource record (RR) PPP (Point-to-Point Protocol) See definition for: Point-to-Point
Protocol (PPP)
Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
print queue -> A print queue is a list of documents waiting to be printed on
predefined key -> A key that represents one of the main divisions of the
the printer. In the print queue, you can see information such as the size of
registry. Each predefined key is displayed in a separate Registry Editor
the document, who sent the document, and status information for printing.
window, with the key's name appearing in the window's title bar. For
example, HKEY_CLASSES_ROOT is a predefined key. See also: print server -> A computer that is dedicated to managing the printers on a
registry; hive; key network. The print server can be any computer on the network.
preferred owner -> The node on which you prefer each group to run. For print spooler -> Software that accepts a document sent to a printer and
example, the static load balancing model performs best when groups are then stores it on disk or in memory until the printer is ready for it. This
appropriately balanced between two nodes. When a node fails, the collection of dynamic-link libraries (DLLs) receives, processes, schedules,
remaining node takes over the groups from the failed node, but and distributes documents for printing. The term spooler is an acronym
performance is diminished. By setting those groups to fail back to their created from simultaneous print operations on line. See also: dynamic-
preferred server (the failed node), you automatically restore maximum link library (DLL); printer; spooling
performance when failback occurs. A group does not fail back if a preferred
Print Spooler resource -> Printer queues providing access to a network
owner is not selected.
printer connected to the network by an IP address rather than by an
You will not always choose a preferred owner because it may
individual name. Print spoolers are supported as cluster resources by a
not matter where the group resides; all that matters is that the group is still
Resource DLL. See also: print spooler; Resource DLL; IP address
running on one of the two nodes. Or, the nodes may be equally capable of
handling the load required to use some or all of the resources. See also: printer -> A device that puts text or images on paper or other print media.
group; resource; failback Examples are laser printers or dot-matrix printers.
See also: logical printer; print spooler; printing pool
preferred server -> The NetWare server that you connect to by default
when you log on to your computer. The preferred server validates your Printer Control Language (PCL) -> The page-description language (PDL)
user credentials and is queried when you request information about developed by Hewlett Packard for their laser and inkjet printers. Because
resources available on the NetWare network. of the widespread use of laser printers, this command language has
become a standard in many printers. See also: Printer Job Language
preset-to callback -> A form of security in which a remote access server
(PJL); PostScript; page-description language (PDL)
verifies users by calling them back at numbers supplied by the network
administrator at the time user privileges are granted. Only a network printer driver -> A program designed to allow other programs to work with
administrator can change a preset callback number. This ensures that no a particular printer without concerning themselves with the specifics of the
one can borrow a user's password and connect to the server from a printer's hardware and internal language. By using printer drivers that
location other than the user's normal one. See also: callback number; handle the subtleties of each printer, programs can communicate properly
remote access server; connected, user authenticated with a variety of printers. See also: device driver
Primary disk -> The hard disk drive that contains the system and boot printer fonts -> Fonts residing in or intended for a printer. A printer font,
partitions used to start Windows. See also: boot partition; system usually located in the printer's read-only memory (ROM), can be internal,
partition downloaded, or on a font cartridge. See also: device fonts;
downloadable fonts; font; font cartridge
primary domain controller (PDC) -> In a Windows NT Server 4.0 or
earlier domain, the computer running Windows NT Server that Printer Job Language (PJL) -> The printer command language
authenticates domain logons and maintains the directory database for a developed by Hewlett Packard that provides printer control at the print-job
domain. The PDC tracks changes made to accounts of all computers on a level. Using PJL commands, you can change default printer settings such
domain. It is the only computer to receive these changes directly. A domain as number of copies to print. PJL commands also permit switching printer
has only one PDC. In this version of Windows, one of the domain languages between print jobs without action by the user. If bi-directional
controllers in each domain is identified as the PDC for compatibility with communication is supported, a PJL-compatible printer can send
Windows NT 4.0 and earlier versions of Windows NT. See also: backup information such as printer model and job status to the print server. See
domain controller (BDC) also: Printer Control Language (PCL); page-description language
(PDL); PostScript
primary master -> An authoritative DNS server for a zone that can be
used as a point of update for the zone. Only primary masters have the printer permissions -> Permissions that specify the type of access that a
ability to be updated directly to process zone updates, which include user or group has to a printer. The printer permissions are Print, Manage
adding, removing, or modifying resource records that are stored as zone Printers, and Manage Documents. See also: permission
data. Primary masters are also used as the first sources for replicating the
Printer window -> Also called the queue view, the Printer window shows
zone to other DNS servers. See also: DNS Server; replication; resource
information about any pending print jobs for the printer. For each printer
record (RR); secondary master; zone
you have installed or to which you are connected, you can such
primary mouse button -> The button you use most often for clicking and information as see how many documents are waiting to be printed, who
double-clicking. The primary mouse button is the left button on most mice owns them, and how large they are. See also: print job
and trackball devices, and the lower button on some trackball devices, but
Printers and Faxes -> The folder in Control Panel that contains the Add
you can switch the function of the buttons by using the Mouse Properties
Printer Wizard and icons for all the printers installed on your computer.
dialog box in Control Panel.
See also: printer
primary partition -> A type of partition that you can create on basic disks.
printing pool -> Two or more identical printers that are connected to one
A primary partition is a portion of a physical disk that functions as though it
print server and act as a single printer. In this case, when you print a
were a physically separate disk. On basic master boot record (MBR) disks,
document, the print job will be sent to the first available printer in the pool.
you can create up to four primary partitions on a basic disk, or three
See also: print job; printer
primary partitions and an extended partition with multiple logical drives. On
basic GPT disks, you can create up to 128 primary partitions. Primary priority -> For Process Control, the relative ranking of a process or
partitions are also known as volumes. See also: basic disk; extended process group with respect to the use of CPU and system resources. You
partition; GUID partition table (GPT); logical drive; master boot can configure this in the Process Control snap-in.
record (MBR); partition; volume
private branch exchange (PBX) -> An automatic telephone switching
print job -> The source code that contains both the data to be printed and system that enables users within an organization to place calls to each
the commands for print. Print jobs are classified into data types based on other without going through the public telephone network. Users can also
what modifications, if any, the spooler must make to the job for it to print place calls to outside numbers.
correctly. See also: print spooler; Printer window; printing pool
private key -> The secret half of a cryptographic key pair that is used with
print processor -> The component that, working in conjunction with the a public key algorithm. Private keys are typically used to decrypt a
printer driver, receives and alters print jobs, as necessary, according to symmetric session key, digitally sign data, or decrypt data that has been
their data type to ensure that the jobs print correctly. See also: print job; encrypted with the corresponding public key. See also: public key; public
printer driver key encryption

Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
private network -> A cluster network that supports only node-to-node provided the keys are long enough, it is computationally infeasible to
communication. See also: cluster determine one from the other. Public key encryption is also called
asymmetric encryption. See also: encryption; private key; public key;
private queue -> For Message Queuing, a queue that is not published in
symmetric encryption
Active Directory and can be accessed only by applications that have
access to the full format name of the queue. See also: Active Directory; public key infrastructure (PKI) -> The term generally used to describe
Message Queuing; public queue; system queue the laws, policies, standards, and software that regulate or manipulate
certificates and public and private keys. In practice, it is a system of digital
privilege -> A user's right to perform a specific task, usually one that
certificates, certification authorities, and other registration authorities that
affects an entire computer system rather than a particular object.
verify and authenticate the validity of each party involved in an electronic
Privileges are assigned by administrators to individual users or groups of
transaction. Standards for PKI are still evolving, even though they are
users as part of the security settings for the computer.
being widely implemented as a necessary element of electronic
Pro -> Windows XP Professional commerce. See also: certificate; certification authority (CA); public
key
process -> The virtual address space and the control information
necessary for the execution of a program. See also: socket public network -> A cluster network that supports client-to-cluster
communication (either with or without supporting node-to-node
process identifier (PID) -> A numerical identifier that uniquely
communication). See also: cluster
distinguishes a process while it runs. Use Task Manager to view PIDs. See
also: Task Manager; process public queue -> For Message Queuing, a queue that is published in
Active Directory and replicated throughout a Windows enterprise. Public
program -> A complete, self-contained set of computer instructions that
queues can, therefore, be located by any computer running Message
you use to perform a specific task, such as word processing, accounting,
Queuing within the enterprise. See also: Active Directory; Message
or data management. Program is also called application.
Queuing; private queue; queue
program information file (PIF) -> A file that provides information to
Public Switched Telephone Network (PSTN) -> Standard analog
Windows about how best to run MS-DOS-based programs. When you start
telephone lines, available worldwide.
an MS-DOS-based program, Windows looks for a PIF to use with it. PIFs
contain such items as the name of the file, a start-up directory, and puff and sip device -> An assistive computer technology for people with
multitasking options. See also: MS-DOS-based program mobility impairments. A puff and sip device is a head-mounted alternative
to using the mouse. The device allows a user to move the mouse pointer
property -> A characteristic or parameter of a class of objects or devices.
without using his or her hands by puffing air into a tube.
For example, properties of Microsoft Word files include Size, Created, and
Characters. See also: property cache; property value; tag pulse dialing -> A form of dialing that enters a phone number by means of
pulse frequencies. The user typically hears a series of clicking sounds
property cache -> For Indexing Service, a file that stores values for
when dialing. Old-fashioned rotary dial phones use pulse dialing. See
document properties. See also: document; property
also: touch-tone dialing
property value -> A specific characteristic or parameter that defines a
Q
property. For example, property values of a specific Microsoft Word
query -> For Indexing Service, a structured statement that specifies the
document could include Size = 10,000 bytes, Created = Jan 2, 1999, and
documents you want to find. The simplest query is a single word. See
Characters = 5,250. See also: property
also: tag; vector; wildcard character
Protective MBR -> The first sector of a GUID partition table (GPT) disk
queue -> A list of programs or tasks waiting for execution. In Windows
that is structured like the first sector of a master boot record (MBR) disk to
printing terminology, a queue refers to a group of documents waiting to be
prevent x86-based disk utilities from destroying GPT partitions. The
printed. In NetWare and OS/2 environments, queues are the primary
Protective MBR contains one partition that reserves the entire space used
software interface between the application and print device; users submit
on the disk by GPT partitions. See also: Extensible Firmware Interface
documents to a queue. With Windows, however, the printer is that
(EFI); GUID partition table (GPT); master boot record (MBR); x86
interface; the document is sent to a printer, not a queue. See also:
protocol -> A set of rules and conventions for sending information over a transactional message; printer
network. These rules govern the content, format, timing, sequencing, and
queue quota -> For Message Queuing, the storage size limit for
error control of messages exchanged among network devices. See also:
messages in public queues. When a queue quota is reached, Message
static routes; Transmission Control Protocol/Internet Protocol
Queuing can no longer send messages to that queue until one or more
(TCP/IP)
messages are removed from the queue. Message Queuing enforces the
public key -> The nonsecret half of a cryptographic key pair that is used computer quota before it enforces the queue quota on a computer. See
with a public key algorithm. Public keys are typically used when encrypting also: computer quota; Message Queuing; queue
a session key, verifying a digital signature, or encrypting data that can be
queue type -> For Message Queuing, a globally unique identifier (GUID)
decrypted with the corresponding private key. See also: Public Key
specified by the application that created the queue. See also: Message
Cryptography Standards (PKCS); private key; public key encryption;
Queuing; queue
recovery agent; key
Quick Launch -> A customizable toolbar that lets you display the
public key cryptography -> A method of cryptography in which two
Windows desktop or start a program (for example, Internet Explorer) with a
different keys are used: a public key for encrypting data and a private key
single click. You can add buttons to start your favorite programs from the
for decrypting data. Public key cryptography is also called asymmetric
Quick Launch location on the taskbar.
cryptography. See also: cryptography; Public Key Cryptography
Standards (PKCS); private key; public key quiet answer -> A telephone-answering protocol in which incoming calls
are answered with silence instead of a tone signal. Some telephone-
Public Key Cryptography Standards (PKCS) -> A family of standards for
switching systems use quiet answering. These switching systems expect
public key cryptography that includes RSA encryption, Diffie-Hellman key
the caller to provide another phone number, code, or extension after the
agreement, password-based encryption, extended-syntax, cryptographic
quiet answer.
message syntax, private key information syntax, and certificate request
syntax, as well as selected attributes. Developed, owned, and maintained quorum disk -> The cluster disk on which configuration data is maintained
by RSA Data Security, Inc. See also: certificate; public key in the quorum log, cluster database checkpoint, and resource checkpoints.
cryptography The quorum disk is managed by the Quorum resource, which is usually a
special kind of Physical Disk resource.
public key encryption -> A method of encryption that uses two encryption
keys that are mathematically related. One key is called the private key and quorum log -> The log where the quorum resource stores data. This data
is kept confidential. The other is called the public key and is freely given is maintained by the clustering software. Also known as the recovery log or
out to all potential correspondents. In a typical scenario, a sender uses the change log. See also: quorum resource; server cluster
receiver's public key to encrypt a message. Only the receiver has the
quorum resource -> The quorum-capable resource selected to maintain
related private key to decrypt the message. The complexity of the
the configuration data necessary for recovery of the cluster. This data
relationship between the public key and the private key means that,
Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
contains details of all of the changes that have been applied to the cluster refresh -> To update displayed information with current data. See also:
database. The quorum resource is generally accessible to other cluster refresh rate
resources so that any cluster node has access to the most recent
refresh interval -> An interval of time used by secondary masters of a
database changes. By default there is only one quorum resource per
zone to determine how often to check if their zone data needs to be
cluster. See also: server cluster
refreshed. When the refresh interval expires, the secondary master checks
quota limit -> The amount of disk space available to a user. See also: with its source for the zone to see if its zone data is still current or if it
warning level needs to be updated using a zone transfer. This interval is set in the SOA
(start-of-authority) resource record for each zone. See also: secondary
R
master; start-of-authority (SOA) resource record; zone; zone transfer
RAID-5 volume
A fault-tolerant volume with data and parity striped intermittently across refresh rate -> The frequency with which the video screen is retraced to
three or more physical disks. Parity is a calculated value that is used to prevent the image from flickering. The entire image area of most monitors
reconstruct data after a failure. If a portion of a physical disk fails, Windows is refreshed approximately 60 times per second. See also: refresh
recreates the data that was on the failed portion from the remaining data
region -> Contiguous chunks of storage on a disk.
and parity. You can create RAID-5 volumes only on dynamic disks, and
you cannot mirror or extend RAID-5 volumes. See also: dynamic disk; registered file type -> File types that are tracked by the system registry
dynamic volume; fault tolerance; parity; volume and are recognized by the programs you have installed on your computer.
See also: file type
RAM See definition for: random access memory (RAM)
registry -> A database repository for information about a computer's
random access memory (RAM) -> Memory that can be read from or
configuration. The registry contains information that Windows continually
written to by a computer or other devices. Information stored in RAM is lost
references during operation, such as:
when the computer is turned off. See also: virtual memory
 Profiles for each user.
raster fonts -> Fonts that are stored as bitmaps. Raster fonts are  The programs installed on the computer and the types of documents
designed with a specific size and resolution for a specific printer and each can create.
cannot be scaled or rotated. If a printer does not support raster fonts, it will  Property settings for folders and program icons.
not print them. The five raster fonts are Courier, MS Sans Serif, MS Serif,  What hardware exists on the system.
Small, and Symbol. Raster fonts are also called bit-mapped fonts. See  Which ports are being used.
also: font; printer The registry is organized hierarchically as a tree and is made up
raw socket -> A socket that provides direct access to lower-level network of keys and their subkeys, hives, and value entries See also: hive; key;
protocols. See also: socket registry size limit (RSL); subtree; value entry
read-only memory (ROM) -> A semiconductor circuit that contains registry boot -> The default boot option used by most Windows DNS
information that cannot be modified. servers. When registry boot is used, DNS is started and initialized using
DNS parameters and their values as they are stored in the Windows
realm -> A set of security principles, in a non-Windows networked registry. You can use a Berkeley Internet Name Domain (BIND) boot file as
environment, that are subject to Kerberos authentication. See also: an alternative to this method of boot configuration for DNS. See also:
Kerberos�V5 authentication protocol BIND boot file; DNS Server; Domain Name System (DNS)
realm name -> An identifying prefix or suffix appended to a user name to registry size limit (RSL) -> A universal maximum for registry space that
enable appropriate routing and authentication during a remote logon prevents an application from filling the paged pool with registry data. The
process. See also: authentication; routing; user name total amount of space that can be consumed by registry data (hives) is
rebinding state -> A state used by DHCP clients to extend and renew restricted by the registry size limit. See also: paged pool; registry; hive
their address lease when the current lease is close to expiring. In this relative distinguished name -> The part of an object's distinguished
state, the client broadcasts to the network to locate any DHCP server that name that is an attribute of the object itself. For most objects this is the
can either renew or replace its currently leased configuration. The Common Name attribute. For security principals, the default common
rebinding state begins when 87.5 percent of the client's lease time has name is the security principal name, also referred to as the SAM account
elapsed. See also: Dynamic Host Configuration Protocol (DHCP); name.
lease For the distinguished name
recoverable message -> For Message Queuing, a message that can be CN=MyName,CN=Users,DC=Microsoft,DC=Com
recovered no matter which computer fails, but that uses more resources the relative distinguished name of the MyName user object is
and is slower than an express message. See also: express message; CN=MyName. The relative distinguished name of the parent object is
Message Queuing CN=Users. See also: object; distinguished name

recovery agent -> A person who is issued a public key certificate for the relative ID (RID) -> The part of a security ID (SID) that uniquely identifies
purpose of recovering user data that is encrypted with Encrypting File an account or group within a domain. See also: domain; forest; group;
System (EFS). See also: certificate; Encrypting File System (EFS); security ID (SID)
public key relative ID master -> The domain controller assigned to allocate
Recovery Console -> A command-line interface that provides a limited set sequences of relative IDs to each domain controller in its domain.
of administrative commands that are useful for repairing a computer. See Whenever a domain controller creates a security principal (user, group, or
also: NTFS file system computer object), the domain controller assigns the object a unique
security ID. The security ID consists of a domain security ID that is the
recovery policy -> A type of public key Group Policy object used by same for all security IDs created in a particular domain, and a relative ID
Encrypting File System (EFS) that provides for one or more user accounts that is unique for each security ID created in the domain. At any time, there
to be designated as recovery agents. See also: Encrypting File System can be only one relative ID master in a particular domain. See also:
(EFS); Group Policy object; public key; recovery agent; user account domain controller; relative ID (RID); security ID (SID); security
Recycle Bin -> The place in which Windows stores deleted files. You can principal
retrieve files you deleted in error, or you can empty the Recycle Bin to relative name -> The partial DNS domain name configured in individual
create more disk space. resource records to locate and qualify the record within a zone. The
Redundant Array of Independent Disks (RAID) -> A method used to relative name is joined to the front of the parent domain (domain of origin)
standardize and categorize fault-tolerant disk systems. RAID levels for each resource record to form a fully qualified domain name (FQDN)
provide various mixes of performance, reliability, and cost. Some servers within the zone. In DNS Manager, the relative name will correspond to
provide three of the RAID levels: Level 0 (striping), Level 1 (mirroring), and fields that use record-specific name properties, such as the Host computer
Level 5 (RAID-5). See also: RAID-5 volume; fault tolerance; mirrored name field used in an address (A) resource record. See also: A (address)
volume resource record; Domain Name System (DNS); fully qualified domain
name (FQDN); resource record (RR); zone

Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
remote access -> Part of the integrated Routing and Remote Access Request for Comments (RFC) -> An official document of the Internet
service that provides remote networking for telecommuters, mobile Engineering Task Force (IETF) that specifies the details for protocols
workers, and system administrators who monitor and manage servers at included in the TCP/IP family. See also: Internet Engineering Task Force
multiple branch offices. Users with a computer running Windows and (IETF); protocol; Transmission Control Protocol/Internet Protocol
Network Connections can dial in to remotely access their networks for (TCP/IP)
services such as file and printer sharing, electronic mail, scheduling, and
Reservation -> A specific IP address within a scope permanently reserved
SQL database access. See also: remote access server; response;
for leased use to a specific DHCP client. Client reservations are made in
Serial Line Internet Protocol (SLIP); service
the DHCP database using DHCP Manager and based on a unique client
remote access server -> A Windows-based computer running the Routing device identifier for each reserved entry.
and Remote Access service and configured to provide remote access. See In Admission Control Service, an allocation of network
also: set-by-caller callback; remote access resources, contained in a Resource Reservation Protocol (RSVP)
reservation request administered by the Admission Control Service. See
remote administration -> The management of one computer by an
also: Dynamic Host Configuration Protocol (DHCP); lease; Resource
administrator working at another computer connected to the first computer
Reservation Protocol (RSVP); scope; IP address
across a network.
resolver -> DNS client programs used to look up DNS name information.
Remote Authentication Dial-In User Service (RADIUS) -> A security
Resolvers can be either a small stub (a limited set of programming
authentication protocol based on clients and servers and widely used by
routines that provide basic query functionality) or larger programs that
Internet service providers (ISPs) on remote servers in non-Windows-brand
provide additional lookup DNS client functions, such as caching. See also:
operating systems. RADIUS is the most popular means of authenticating
caching; caching resolver; Domain Name System (DNS)
and authorizing dial-up and tunneled network users today. See also:
authentication; tunnel resource -> Generally, any part of a computer system or network, such as
a disk drive, printer, or memory, that can be allotted to a running program
remote computer -> A computer that you can access only by using a
or a process.
communications line or a communications device, such as a network card
For Device Manager, any of four system components that
or a modem.
control how the devices on a computer work. These four system resources
Remote Installation Services -> Software services that allow an are interrupt request (IRQ) lines, direct memory access (DMA) channels,
administrator to set up new client computers remotely, without having to input/output (I/O) ports, and memory addresses.
visit each client. The target clients must support remote booting. See also: For server clusters, a physical or logical entity that is capable of
Single Instance Store (SIS) being managed by a cluster, brought online and taken offline, and moved
between nodes. A resource can be owned only by a single node at any
remote procedure call (RPC) -> A message-passing facility that allows a
point in time. See also: direct memory access (DMA); input/output (I/O)
distributed application to call services that are available on various
port; interrupt request (IRQ) lines; memory address; offline; online;
computers on a network. Used during remote administration of computers.
resource; server cluster
See also: service
resource allocation -> The process of distributing a computer system's
Remote Storage -> A data management service used to migrate
facilities to different components of a job in order to perform the job.
infrequently accessed files from local storage to remote storage. Migrated
files are recalled automatically and transparently upon user request when Resource DLL -> A dynamic-link library (DLL) containing an
the file is opened. implementation of the Resource application programming interface (API)
for a specific type of resource. The Resource DLL is loaded into the
Removable Storage -> A service used for managing removable media
address space of its Resource Monitor. See also: application
(such as tapes and discs) and storage devices (libraries). Removable
programming interface (API); dynamic-link library (DLL)
Storage allows applications to access and share the same media
resources. See also: library; service resource domain -> A Windows NT 4.0 domain that is used for hosting
file, print, and other application services. See also: domain; service
rendering intent -> In color management, the approach used to map the
colors specified in an image file to the color gamut of your monitor or Resource Monitor -> A cluster software component that facilitates
printer. The color gamut is the range of color that a device can produce. communication between a node's server cluster and one or more of its
See also: color gamut resources. See also: resource; server cluster
replica -> A folder within a replica set. See also: replica set; replication resource record (RR) -> Standard DNS database structure containing
topology information used to process DNS queries. For example, an address (A)
type resource record contains IP address corresponding to a host name.
replica set -> One or more shared folders that participates in replication.
Most of the basic resource record types are defined in RFC 1035, but
See also: replication
additional RR types have been defined in other RFCs and approved for
replication -> The process of copying data from a data store or file system use with DNS. See also: Domain Name System (DNS); Request for
to multiple computers to synchronize the data. Active Directory provides Comments (RFC); retry interval; zone
multimaster replication of the directory between domain controllers within a
resource record set (RRset) -> A collection of more than one resource
given domain. The replicas of the directory on each domain controller are
record returned in a query response by a DNS server. Resource record
writable. This allows updates to be applied to any replica of a given
sets (RRsets) are used in responses where more than one record is part of
domain. The replication service automatically copies the changes from a
the answer. See also: DNS Server; resource record (RR)
given replica to all other replicas. See also: Active Directory; replica;
replication policy; topology Resource Reservation Protocol (RSVP) -> A signaling protocol that
allows the sender and receiver in a communication to set up a reserved
replication policy -> Rules that define how and when replication is
highway for data transmission with a specified quality of service. See also:
performed. See also: replication
protocol
replication topology -> A description of the physical connections between
response -> In Windows remote access, strings expected from the device,
replicas and sites. In contrast, DFS topologies describe the logical
which can contain macros. See also: string; remote access
connections. See also: replica
response message -> For Message Queuing, a message sent by a
report message -> For Message Queuing, a message that contains status
receiving application to the response queue specified by a sending
information and is sent to report queues on the source computer.
application. Any available queue can be specified as a response queue.
Examples include test messages and route tracking messages. See also:
See also: Message Queuing; response queue; queue
Message Queuing; report queue
response queue -> For Message Queuing, a queue that is created by the
report queue -> For Message Queuing, a queue on the source computer
sending application and used by the receiving application to reply to
that contains report messages. Report queues can be used when sending
messages. For example, an application might send a response message
test messages and tracking message routes. See also: Message
to a response queue every time the application receives a message. See
Queuing; report message
also: Message Queuing; response message; queue

Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
Restore Point -> A representation of a stored state of your computer. Routers match packet headers to a LAN segment and choose the best
Restore point is created by System Restore at specific intervals and when path for the packet, optimizing network performance.
System Restore detects the beginning of a change to your computer. Also, In the Macintosh environment, routers are necessary for
restore point can be created by you manually at any time. computers on different physical networks to communicate with each other.
Routers maintain a map of the physical networks on a Macintosh internet
retry interval -> The time, in seconds after the refresh interval expires,
(network) and forward data received from one physical network to other
used by secondary masters of a zone to determine how often to try and
physical networks. Computers running the Server version of Windows with
retry contacting its source for zone data to see if its replicated zone data
AppleTalk network integration can act as routers, and you can also use
needs to be refreshed. This interval is set in the SOA (start-of-authority)
other routing hardware on a network with AppleTalk network integration.
resource record for each zone. See also: refresh interval; replication;
See also: local area network (LAN); packet header; Routing
secondary master; start-of-authority (SOA) resource record; zone
Information Protocol over IPX (RIPX); routing; static routes; wide
reverse lookup -> In DNS, a query process by which the IP address of a area network (WAN)
host computer is searched to find its friendly DNS domain name. In DNS
routing -> The process of forwarding a packet through an internetwork
Manager, reverse lookup zones are based on the in-addr.arpa domain
from a source host to a destination host. See also: host; packet
name and typically hold pointer (PTR) resource records. See also:
Domain Name System (DNS); in-addr.arpa domain; pointer (PTR) Routing Information Protocol over IPX (RIPX) -> A protocol used by
resource record; zone routers to exchange information between routers on an IPX network and
by hosts to determine the best router to use when forwarding IPX traffic to
RGB color space -> Multidimensional color space consisting of the red,
a remote IPX network. See also: protocol; router; Internetwork Packet
green, and blue intensities that make up a given color. This system is
Exchange (IPX); NWLink
typically used in scanners, digital cameras, computer monitors, and
computer printers. See also: color management; color space routing link -> For Message Queuing, a communications link established
between Windows sites for routing messages. Specially configured
right-click -> To position the mouse over an object, and then press and
Message Queuing servers with routing services enabled are used to
release the secondary (right) mouse button. Right-clicking opens a
create a routing link between sites. See also: Message Queuing;
shortcut menu that contains useful commands, which change depending
routing-link cost; routing services
on where you click.
routing services -> For Message Queuing, a service on a Message
roaming user profile -> A server-based user profile that is downloaded to
Queuing server that provides message routing services. If so configured,
the local computer when a user logs on and that is updated both locally
this feature can be used on a Message Queuing server to:
and on the server when the user logs off. A roaming user profile is
available from the server when logging on to a workstation or server  Enable computers that use different network protocols to
computer. When logging on, the user can use the local user profile if it is communicate.
more current than the copy on the server. See also: local user profile;
mandatory user profile; user profile  Reduce the number of sessions by acting as a gateway for all
incoming or outgoing messages for independent clients.
rolling upgrade -> In a cluster, the process of upgrading cluster nodes by  Route messages between sites over a routing link.
turns while the other nodes continue to provide service. See also: cluster See also: session concentration; service; independent client;
ROM -> An acronym for Read-Only Memory, a semiconductor circuit into Message Queuing; Message Queuing server; routing link
which code or data is permanently installed by the manufacturing process. routing-link cost -> For Message Queuing, a number used to determine
ROM contains instructions or data that can be read but not modified. the route messages can take between two sites. This number represents
root -> The highest or uppermost level in a hierarchically organized set of the relative monetary cost of communication over a link. A routing link has
information. The root is the point from which further subsets are branched a default routing-link cost of 1 and should not be changed unless you have
in a logical sequence that moves from a broad or general focus to multiple routing links between two sites and you want to enforce message
narrower perspectives. routing over a specific routing link. See also: Message Queuing; routing
link
root authority -> The certification authority (CA) at the top of a
certification hierarchy. The root CA has a self-signed certificate. Also called RS-232-C standard -> An accepted industry standard for serial
the root certification authority. See also: certification authority (CA); communication connections. Adopted by the Electric Industries
certification hierarchy; root Association, this Recommended Standard (RS) defines the specific lines
and signal characteristics used by serial communications controllers to
root certificate -> A self-signed certification authority certificate. It is called standardize the transmission of serial data between devices. The letter C
a root certificate because it is the certificate for the root authority. The root signifies the third in a series.
authority must sign its own certificate because by definition there is no
higher certifying authority in the certification hierarchy. See also: RSA -> A widely used public/private key algorithm. It is the default
certificate; certification authority (CA); certification hierarchy; root cryptographic service provider (CSP) for Microsoft Windows. It was
authority patented by RSA Data Security, Inc. in 1977. See also: cryptographic
service provider (CSP)
root domain -> The beginning of the Domain Name System (DNS)
namespace. In Active Directory, the initial domain in an Active Directory S
tree. Also the initial domain of a forest. saturation -> In color management, the purity of a color's hue, moving
from gray to the pure color. See also: hue
root hints -> Local information stored on a DNS server that provides
helping resource records to direct the server to its root servers. For DNS, scalability -> A measure of how well a computer, service, or application
the root hints are stored in the file Cache.dns, located in the can grow to meet increasing performance demands. For server clusters,
Systemroot\System32\Dns folder. Root hints are also called cache hints. the ability to incrementally add one or more systems to an existing cluster
See also: authoritative; DNS Server; Domain Name System (DNS); when the overall load of the cluster exceeds its capabilities. See also:
namespace; root servers; systemroot server cluster

root servers -> DNS servers that are authoritative for the root of the scan interval -> For Process Control, the time between successive
namespace. See also: authoritative; DNS Server; namespace; root checks for new processes started on the server. You can configure this in
the Process Control snap-in.
round robin -> A simple mechanism used by DNS servers to share and
distribute loads for network resources. Round robin is used to rotate the schema -> A description of the object classes and attributes stored in
order of resource records (RRs) returned in a response to a query when Active Directory. For each object class, the schema defines the attributes
multiple RRs of the same type exist for a queried DNS domain name. See an object class must have, the additional attributes it may have, and the
also: DNS Server; resource record (RR) object class that can be its parent.
The Active Directory schema can be updated dynamically. For
router -> In a Windows environment, hardware that helps LANs and example, an application can extend the schema with new attributes and
WANs achieve interoperability and connectivity, and can link LANs that classes and use the extensions immediately. Schema updates are
have different network topologies (such as Ethernet and Token Ring). accomplished by creating or modifying the schema objects stored in Active
Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
Directory. Like every object in Active Directory, schema objects have an types of access will be audited. See also: permission; discretionary
access control list, so only authorized users may alter the schema. See access control list (DACL); group; object; system access control list
also: Active Directory; attribute; object; parent object (SACL)
schema master -> The domain controller assigned to control all updates security group -> A group that can be listed in discretionary access
to the schema within a forest. At any time, there can be only one schema control lists (DACLs) used to define permissions on resources and objects.
master in the forest. See also: domain controller; forest; schema A security group can also be used as an e-mail entity. Sending an e-mail
message to the group sends the message to all the members of the group.
scope -> A range of IP addresses that are available to be leased or
See also: discretionary access control list (DACL)
assigned to DHCP clients by the DHCP service. See also: Dynamic Host
Configuration Protocol (DHCP); lease; IP address security host -> An authentication device, supplemental to standard
Windows and remote access server security, that verifies whether a caller
scope of influence -> In a domain environment, a site, domain, or
from a remote client is authorized to connect to the remote access server.
organizational unit; in a workgroup environment, the local disk. See also:
See also: authentication; remote access server; remote access
domain; organizational unit
security ID (SID) -> A data structure of variable length that identifies user,
scrap -> A file that is created when you drag part of a document to the
group, and computer accounts. Every account on a network is issued a
desktop.
unique SID when the account is first created. Internal processes in
screen fonts -> A typeface designed for display on a computer monitor Windows refer to an account's SID rather than the account's user or group
screen. Screen fonts often have accompanying PostScript fonts for printing name. See also: group account; group name; user account; user
to PostScript-compatible printers. See also: font; PostScript name
screen resolution -> The setting that determines the amount of security log -> An event log containing information on security events that
information that appears on your screen, measured in pixels. Low are specified in the audit policy.
resolution, such as 640 x 480, makes items on the screen appear large,
security principal -> An account holder that is automatically assigned a
although the screen area is small. High resolution, such as 1024 x 768,
security identifier for access to resources. A security principal can be a
makes the overall screen area large, although individual items appear
user, group, service, or computer. See also: group; security principal
small. See also: pixel
name; service
screen saver -> A moving picture or pattern that appears on your screen
security principal name -> A name that uniquely identifies a user, group,
when you have not used the mouse or keyboard for a specified period of
or computer within a single domain. This name is not guaranteed to be
time.
unique across domains. See also: domain; group; security principal
script -> A type of program consisting of a set of instructions to an
select -> To specify a block of data or text on screen by highlighting it or
application or tool program. A script usually expresses instructions by
otherwise marking it, with the intent of performing some operation on it.
using the application's or tool's rules and syntax, combined with simple
control structures such as loops and if/then expressions. "Batch program" Serial Line Internet Protocol (SLIP) -> An older industry standard that is
is often used interchangeably with "script" in the Windows environment. part of Windows remote access client to ensure interoperability with other
remote access software. See also: remote access
second-level domains -> Domain names that are rooted hierarchically at
the second tier of the domain namespace directly beneath the top-level serial port -> An interface on the computer that allows asynchronous
domain names such as .com and .org. When DNS is used on the Internet, transmission of data characters one bit at a time. Also called a
second-level domains are names such as microsoft.com that are communication or COM port. See also: communication port; port
registered and delegated to individual organizations and businesses
SerialKey device -> Enables you to attach an alternate input device (also
according to their top-level classification. The organization then assumes
called an augmentative communication device) to your computer's serial
further responsibility for parenting management and growth of its name
port. This feature is designed for people who are unable to use the
into additional subdomains. See also: domain name; Domain Name
computer's standard keyboard and mouse.
System (DNS); namespace; parent domain; top-level domains
server -> In general, a computer that provides shared resources to
secondary master -> An authoritative DNS server for a zone that is used
network users. See also: client; shared resource
as a source for replication of the zone to other servers. Secondary masters
update their zone data only by transferring zone data from other DNS server cluster -> A group of independent computer systems, known as
servers. They do not have the ability to perform zone updates. See also: nodes, working together as a single system to ensure that mission-critical
authoritative; DNS Server; master server; primary master; zone; zone applications and resources remain available to clients. A server cluster is
transfer the type of cluster that Cluster service implements. See also: cluster
secondary mouse button -> The button that you use to display shortcut Server Message Block (SMB) -> A file-sharing protocol designed to allow
menus or other program-specific features. The secondary mouse button is networked computers to transparently access files that reside on remote
the right button on most mice and trackball devices, and the upper button systems over a variety of networks. The SMB protocol defines a series of
on other trackball devices, but you can switch the function of the buttons in commands that pass information between computers. SMB uses four
the Mouse Control Panel. message types: session control, file, printer, and message.
Secure Hash Algorithm (SHA-1) -> A message digest hash algorithm that server zone -> The AppleTalk zone on which a server appears. On a
generates a 160-bit hash value. SHA-1 is used with the Digital Signature Phase 2 network, a server appears in the default zone of the server's
Algorithm (DSA) in the Digital Signature Standard (DSS), among other default network. See also: server; zone
places. See also: Digital Signature Standard (DSS); hash algorithm;
service -> A program, routine, or process that performs a specific system
message digest
function to support other programs, particularly at a low (close to the
Secure Sockets Layer (SSL) -> A proposed open standard for hardware) level. When services are provided over a network, they can be
establishing a secure communications channel to prevent the interception published in Active Directory, facilitating service-centric administration and
of critical information, such as credit card numbers. Primarily, it enables usage. Some examples of services are the Security Accounts Manager
secure electronic financial transactions on the World Wide Web, although it service, File Replication service, and Routing and Remote Access service.
is designed to work on other Internet services as well. See also: Active Directory; Dynamic Host Configuration Protocol
(DHCP); Service Profile Identifier (SPID)
Secure/Multipurpose Internet Mail Extensions (S/MIME) -> A protocol
for secure electronic mail over the Internet. See also: protocol service (SRV) resource record -> A resource record used in a zone to
register and locate well-known TCP/IP services. The SRV resource record
security -> On a network, protection of a computer system and its data
is specified in RFC 2782, and it is used to locate domain controllers for
from harm or loss, implemented especially so that only authorized users
Active Directory. See also: Active Directory; resource record (RR);
can gain access to shared files.
Transmission Control Protocol/Internet Protocol (TCP/IP)
security descriptor -> A data structure that contains security information
Service Profile Identifier (SPID) -> An 8-digit to 14-digit number that
associated with a protected object. Security descriptors include information
identifies the services that you ordered for each B-channel. For example,
about who owns the object, who can access it and in what way, and what
Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
when you order Primary Rate ISDN, you obtain two phone numbers and
Simple Mail Transfer Protocol (SMTP) -> A member of the TCP/IP suite
two SPIDs from your ISDN provider. Typical ISDN adapters cannot operate
of protocols that governs the exchange of electronic mail between
without configuring SPIDs. See also: Integrated Services Digital
message transfer agents. See also: protocol; Transmission Control
Network (ISDN); service; B-channel
Protocol/Internet Protocol (TCP/IP)
Service Provider Interface -> Calling conventions that back-end services
Simple Network Management Protocol (SNMP) -> A network protocol
use to make themselves accessible to front-end applications. See also:
used to manage TCP/IP networks. In Windows, the SNMP service is used
service
to provide status information about a host on a TCP/IP network. See also:
service ticket -> A ticket issued by the Kerberos V5 ticket-granting service agent; protocol; service; Transmission Control Protocol/Internet
(TGS) that allows a user to authenticate to a specific service in the Protocol (TCP/IP)
domain. See also: Kerberos�V5 authentication protocol; ticket;
Simple Network Time Protocol (SNTP) -> A protocol used to synchronize
ticket-granting service (TGS)
clocks over the Internet. SNTP enables client computers to synchronize
session -> A logical connection created between two hosts to exchange their clocks with a time server over the Internet.
data. Typically, sessions use sequencing and acknowledgments to send
Simple TCP/IP Services -> Four TCP/IP services: Character Generator,
data reliably.
Daytime Discard, Echo, and Quote of the Day. See also: service;
In the context of load balancing TCP/IP traffic, a set of client
Transmission Control Protocol/Internet Protocol (TCP/IP)
requests directed to a server. These requests can be invoked with multiple,
possibly concurrent, TCP connections. The server program sometimes simple volume -> A dynamic volume made up of disk space from a single
maintains state information between requests. To preserve access to the dynamic disk. A simple volume can consist of a single region on a disk or
server state, Network Load Balancing needs to direct all requests within a multiple regions of the same disk that are linked together. You can extend
session to the same cluster host when load balancing. See also: client a simple volume within the same disk or onto additional disks. If you
request; load balancing; server; Transmission Control extend a simple volume across multiple disks, it becomes a spanned
Protocol/Internet Protocol (TCP/IP) volume. You can create simple volumes only on dynamic disks. Simple
volumes are not fault tolerant, but you can mirror them to create mirrored
session concentration -> For Message Queuing, a feature that typically
volumes. See also: dynamic disk; dynamic volume; fault tolerance;
reduces network bandwidth within a site and the number of sessions
mirrored volume; spanned volume; volume
between sites. Specially configured Message Queuing servers with routing
services provide session concentration. See also: bandwidth; Message Single Instance Store (SIS) -> A component that saves disk space on the
Queuing; Message Queuing server; routing services; session; site server by maintaining a single physical copy of all identical files found. If
SIS finds a duplicate file on the server, it copies the original file into the SIS
Session Description Protocol (SDP) -> A protocol that TAPI uses to
store and leaves a link where the original resided. This technology is used
advertise IP multicast conferences. This protocol describes multimedia
only with Remote Installation Services. See also: Remote Installation
sessions for the purposes of session announcement, session invitation,
Services
and other forms of session initiation.
single sign-on -> A process that allows a user with a domain account to
SDP descriptorsare stored in Active Directory. SDP is described in
log on to a network once, using a password or smart card, and to gain
RFC 2327 of the IETF. See also: Telephony API (TAPI); multicast;
access to any computer in the domain. See also: domain; smart card
Active Directory; Internet Engineering Task Force (IETF); protocol
single switch device -> An assistive computer technology for people with
Set -> Applies any changes you have made without closing the dialog box.
mobility impairments. A single switch device allows users to interact with a
set-by-caller callback -> In Network Connections, a form of callback in computer by using slight body movements.
which the user supplies the telephone number that the remote access
site -> One or more well connected (highly reliable and fast) TCP/IP
server uses for callback. This setting spares the user any long-distance
subnets. A site allows administrators to configure Active Directory access
telephone charges. See also: remote access server; connected, user
and replication topology quickly and easily to take advantage of the
authenticated
physical network. When users log on, Active Directory clients locate Active
share -> To make resources, such as folders and printers, available to Directory servers in the same site as the user. See also: subnet; Active
others. See also: resource Directory; replication topology; Transmission Control
Protocol/Internet Protocol (TCP/IP)
share name -> A name that refers to a shared resource on a server. Each
shared folder on a server has a share name used by personal computer SLIP (Serial Line Internet Protocol) See definition for: Serial Line
users to refer to the folder. Users of Macintosh computers use the name of Internet Protocol (SLIP)
the Macintosh-accessible volume that corresponds to a folder, which may
small computer system interface (SCSI) -> A standard high-speed
be the same as the share name.
parallel interface defined by the American National Standards Institute
shared folder -> A folder on another computer that has been made (ANSI). A SCSI interface is used for connecting microcomputers to
available for other people to use on the network. peripheral devices such as hard disks and printers, and to other computers
and local area networks (LANs). See also: device; local area network
shared folder permissions -> Permissions that restrict a shared
(LAN)
resource's availability over the network to only certain users. See also:
permission smart card -> A credit card-sized device that is used with an access code
to enable certificate-based authentication and single sign-on to the
shared printer -> A printer that receives input from more than one enterprise. Smart cards securely store certificates, public and private keys,
computer. For example, a printer attached to another computer on the passwords, and other types of personal information. A smart card reader
network can be shared so that it is available for you to use. Shared printer attached to the computer reads the smart card. See also: authentication;
is also called a network printer. See also: printer single sign-on; smart card reader
shared resource -> Any device, data, or program that is used by more
smart card reader -> A device that is installed in computers to enable the
than one other device or program. For Windows, shared resources refer to
use of smart cards for enhanced security features. See also: smart card
any resource that is made available to network users, such as folders,
files, printers, and named pipes. A shared resource can also refer to a snap-in -> A type of tool you can add to a console supported by Microsoft
resource on a server that is available to network users. See also: device; Management Console (MMC). A stand-alone snap-in can be added by
resource; server itself; an extension snap-in can only be added to extend the function of
another snap-in. See also: Microsoft Management Console (MMC)
shortcut -> A link to any item accessible on your computer or on a
network, such as a program, file, folder, disk drive, Web page, printer, or socket -> An identifier for a particular service on a particular node on a
another computer. You can put shortcuts in various areas, such as on the network. The socket consists of a node address and a port number, which
desktop, on the Start menu, or in specific folders. See also: desktop identifies the service. For example, port 80 on an Internet node indicates a
Web server. There are two kinds of sockets: streams (bidirectional) and
ShowSounds -> A feature that instructs programs that usually convey
datagrams. See also: datagram; process; raw socket; port
information only by sound to also provide all information visually, such as
by displaying text captions or informative icons.
Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
software decoder -> A type of digital video disc (DVD) decoder that status bar -> A line of information related to the current program. The
allows a DVD drive to display movies on your computer screen. A software status bar is usually located at the bottom of a window. Not all windows
decoder uses only software to display movies. See also: DVD decoder; have a status bar.
DVD drive; hardware decoder
StickyKeys -> A keyboard feature that enables you to press a modifier key
Sound card -> Accessory expansion board for personal computers that (CTRL, ALT, or SHIFT), or the Windows logo key, and have it remain active
permits recording and playing back sound. until a non-modifier key is pressed. This is useful for people who have
difficulty pressing two keys simultaneously. See also: ToggleKeys;
sound file -> A sound file contains information that Windows uses to play
FilterKeys; MouseKeys
sounds on your computer. Sound files have the file name extension .wav.
Stop error -> A serious error that affects the operating system and that
SoundSentry -> A Windows feature that produces a visual cue, such as a
could place data at risk. The operating system generates an obvious
screen flash or a blinking title bar, whenever the computer plays a system
message, a screen with the Stop error, rather than continuing on and
sound.
possibly corrupting data. Stop error is also called a fatal system error.
source document -> The document where a linked or embedded object
strict RFC checking -> For DNS, a form of domain name checking that
was originally created. See also: embedded object; linked object
examines characters used in DNS names for compliance with DNS
source journaling -> For Message Queuing, the process of storing a copy naming requirements and valid character usage as specified in RFC 1123,
of an outgoing message. Source journaling is configured on a message Requirements for Internet Hosts - Applications and Support. For strict RFC
basis and is set by the sending application. When source journaling is compliance, DNS domain names will use name labels made up only of
enabled, a copy of the message is put in the source journal queue of the valid uppercase and lowercase letters, number characters, and hyphens (A
source computer when the message arrives at the destination (target) through Z, a through z, 0 through 9, -), separated by periods. See also:
queue. See also: journal queue; Message Queuing; target journaling domain name; Domain Name System (DNS); label; loose name
checking; Request for Comments (RFC)
spanned volume -> A dynamic volume consisting of disk space on more
than one physical disk. You can increase the size of a spanned volume by string -> A group of characters or character bytes handled as a single
extending it onto additional dynamic disks. You can create spanned entity. Computer programs use strings to store and transmit data and
volumes only on dynamic disks. Spanned volumes are not fault tolerant commands. Most programming languages consider strings (such as
and cannot be mirrored. See also: dynamic disk; dynamic volume; fault 2674:gstmn) as distinct from numeric values (such as 470924). See also:
tolerance; mirrored volume; simple volume; volume transmitting station ID (TSID) string
special access permissions -> On NTFS volumes, a custom set of subkey -> A key within a key. In the registry structure, subkeys are
permissions. You can customize permissions on files and directories by subordinate to subtrees and keys. Keys and subkeys are similar to the
selecting the individual components of the standard sets of permissions. section header in .ini files; however, subkeys can carry out functions. See
See also: volume; permission; NTFS file system also: registry; descendent key; key; subkey
speech recognition -> The ability to interpret spoken words and convert subnet -> A subdivision of an IP network. Each subnet has its own unique
them into computer-readable text. Speech recognition programs allow you subnetted network ID.
to enter text by speaking into a microphone, rather than using a keyboard.
subnet bandwidth management (SBM) -> An IETF standard that
splitting -> A Briefcase command that separates the copy of the file inside enables administrative control at the subnet level.
Briefcase from the copy outside Briefcase.
subnet mask -> A 32-bit value that enables the recipient of IP packets to
spooling -> A process on a server in which print documents are stored on distinguish the network ID and host ID portions of the IP address. Typically,
a disk until a printer is ready to process them. A spooler accepts each subnet masks use the format 255.x.x.x.
document from each client, stores it, then sends it to a printer when the
subtree -> Any node within a tree, along with any selection of connected
printer is ready. See also: print spooler
descendant nodes. In the registry structure, subtrees are the primary
standby -> A state in which your computer consumes less power when it nodes that contain keys, subkeys, and value entries. See also: registry;
is idle, but remains available for immediate use. While your computer is on key; subkey; value entry
standby, information in computer memory is not saved on your hard disk. If
switch type -> The type of interface to which your ISDN device is being
there is an interruption in power, the information in memory is lost.
attached. Switch type is also called switch. See also: B-channel; D-
Start Application Enable -> When checked, the server DDE application channel; Integrated Services Digital Network (ISDN)
automatically starts when a client DDE application attempts to initiate a
switching hub -> A central network device (multiport hub) that forwards
DDE conversation. When cleared, attempts to open a DDE conversation
packets to specific ports rather than, as in conventional hubs, broadcasting
succeed only if the server DDE application is already running.
every packet to every port. In this way, the connections between ports
start-of-authority (SOA) resource record -> A record that indicates the deliver the full bandwidth available. See also: hub; packet
starting point or original point of authority for information stored in a zone.
symmetric encryption -> An encryption algorithm that requires the same
The SOA resource record (RR) is the first RR created when adding a new
secret key to be used for both encryption and decryption. Because of its
zone. It also contains several parameters used by other computers that
speed, symmetric encryption is typically used when a message sender
use DNS to determine how long they will use information for the zone and
needs to encrypt large amounts of data. Symmetric encryption is also
how often updates are required. See also: zone; authoritative; Domain
called secret key encryption. See also: public key encryption
Name System (DNS); resource record (RR)
synchronize -> To reconcile the differences between files stored on one
startup environment -> In dual-boot or multiple-boot systems, the
computer and versions of the same files on another computer. Once the
configuration settings that specify which system to start and how each
differences are determined, both sets of files are updated.
system should be started. See also: dual boot; multiple boot
system access control list (SACL) -> The part of an object's security
static dialog box -> A scripted dialog box between the client computer
descriptor that specifies which events are to be audited per user or group.
and an intermediary device. This kind of dialog box requires no response
Examples of auditing events are file access, logon attempts, and system
from the user. See also: client
shutdowns. See also: discretionary access control list (DACL); event;
static routes -> Routes in the routing table that are permanent. Static object; security descriptor
routes are manually configured by a network administrator. They change
system area network -> A network configuration, usually on a separate
only if the network administrator changes them. If the routing protocol is
Internet Protocol (IP) subnet, that gives data a direct path to system
configured to support auto-static routes (automatically added static routes),
hardware. See also: subnet
then the router can issue a request to a protocol to get an update of
routing information on a specific interface. The results of such an update system disk -> A disk that contains the MS-DOS system files necessary
are then converted and kept as static routes. See also: routing; protocol; to start MS-DOS. See also: MS-DOS (Microsoft Disk Operating
router System)
status area See definition for: notification area
Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
system files -> Files used by Windows to load, configure, and run the also provides Internet Protocol (IP) telephony support, which Phone Dialer
operating system. Generally, system files must never be deleted or moved. and other programs use to transmit, route, and control real-time audio and
video signals over IP-based networks such as the Internet. See also:
System menu -> A menu that contains commands you can use to
service; Internet Protocol (IP); modem (modulator/demodulator);
manipulate a window or close a program. You click the program icon at the
application programming interface (API)
left of the title bar to open the System menu.
Telnet -> A terminal-emulation protocol that is widely used on the Internet
system partition -> The partition that contains the hardware-specific files
to log on to network computers. Telnet also refers to the application that
needed to load Windows (for example, Ntldr, Osloader, Boot.ini,
uses the Telnet protocol for users who log on from remote locations. See
Ntdetect.com). The system partition can be, but does not have to be, the
also: protocol
same as the boot partition. See also: boot partition; partition
terminal -> A device consisting of a display screen and a keyboard that is
System Policy -> A Windows NT 4.0-style policy based on registry
used to communicate with a computer.
settings made using Poledit.exe, the System Policy Editor. See also:
policy; registry terminate-and-stay-resident (TSR) program -> A program running under
MS-DOS that remains loaded in memory even when it is not running, so
system queue -> For Message Queuing, a queue that stores various
that it can be quickly invoked for a specific task performed while any other
types of administrative messages. Message Queuing uses up to five
application is operating. See also: MS-DOS (Microsoft Disk Operating
system queues, all of which are private queues. System queues cannot be
System)
deleted. See also: Message Queuing; queue; private queue; system
queue test queue -> For Message Queuing, a queue that stores sent test
messages. See also: Message Queuing; queue
System Restore -> A tool that tracks changes to your computer and
creates a restore point when it detects the beginning of a change. You can text box -> In a dialog box, a box in which you type information needed to
use the System Restore Wizard to select a restore point to restore your carry out a command. The text box may be blank or may contain text when
computer to an earlier state when your computer was functioning the way the dialog box opens.
you like.
text service -> A program that enables a user to enter or edit text. Text
system volume -> The volume that contains the hardware-specific files services include keyboard layouts, handwriting and speech recognition
that are needed to load Windows on x86-based computers with a BIOS. programs, and Input Method Editors (IMEs). IMEs are used to enter East
The system volume can be, but does not have to be, the same volume as Asian language characters with a keyboard.
the boot volume. See also: basic input/output system (BIOS); boot
theme -> A set of visual elements that provide a unified look for your
volume; volume; x86
computer desktop. A theme determines the look of the various graphic
systemroot -> The path and folder name where the Windows system files elements of your desktop, such as the windows, icons, fonts, colors, and
are located. Typically, this is C:\Windows, although you can designate a the background and screen saver pictures. It can also define sounds
different drive or folder when you install Windows. You can use the value associated with events such as opening or closing a program.
%systemroot% to replace the actual location of the folder that contains the
Thread Count -> In Task Manager, the number of threads running in a
Window system files. To identify your systemroot folder, click Start, click
process. See also: Task Manager
Run, type %systemroot%, and then click OK.
thumbnail -> A miniature version of an image that is often used for quick
SYSVOL -> A shared directory that stores the server copy of the domain's
browsing through multiple images.
public files, which are replicated among all domain controllers in the
domain. See also: domain; domain controller ticket -> A set of identification data for a security principle, issued by a
domain controller for purposes of user authentication. Two forms of tickets
T
in Windows are ticket-granting tickets (TGTs) and service tickets. See
tag -> For Indexing Service, one or more terms that identify an element in
also: authentication; domain controller; service ticket; ticket-granting
a query, such as weight, phrase, property, or regular expression. For
ticket (TGT)
example, the tag {prop name=created} specifies the Created property in a
query. See also: property; query ticket-granting service (TGS) -> A Kerberos V5 service provided by the
Kerberos V5 Key Distribution Center (KDC) service that issues service
target -> The mapping destination of a DFS root or link, which
tickets that allow users to authenticate to services in a domain. See also:
corresponds to a physical folder that has been shared on the network.
Kerberos�V5 authentication protocol; Key Distribution Center
target journaling -> For Message Queuing, the process of storing a copy (KDC); service ticket; ticket-granting ticket (TGT)
of incoming messages. Target journaling is configured on a queue basis.
ticket-granting ticket (TGT) -> A credential issued to a user by the
When target journaling is enabled, a copy of each incoming message is
Kerberos Key Distribution Center (KDC) when the user logs on. The user
placed in the target journal queue when the message is retrieved (read)
must present the TGT to the KDC when requesting session tickets for
from the destination queue. See also: journal queue; Message Queuing;
services. Because a TGT is normally valid for the life of the user's logon
source journaling
session, it is sometimes called a user ticket. See also: Kerberos�V5
Task Manager -> A utility that provides information about programs and authentication protocol; Key Distribution Center (KDC); ticket-
processes running on the computer. Using Task Manager, you can end or granting service (TGS)
run programs and end processes, and display a dynamic overview of your
computer's performance. time server -> A computer that periodically synchronizes the time on all
computers within a network. This ensures that the time used by network
taskbar -> The bar that contains the Start button and appears by default at services and local functions remains accurate.
the bottom of the desktop. You can click the taskbar buttons to switch
between programs. You can also hide the taskbar, move it to the sides or time slice -> A brief period of time during which a particular task is given
top of the desktop, and customize it in other ways. See also: desktop; control of the microprocessor in a time-sharing multitasking environment. A
taskbar button; notification area computer's processor is allocated to an application, usually measured in
milliseconds. Time slice is also called quantum.
taskbar button -> A button that appears on the taskbar and corresponds
to a running application. See also: taskbar time stamp -> A certification by a trusted third party specifying that a
particular message existed at a specific time and date. In a digital context,
TCP -> Transmission Control Protocol. trusted third parties generate a trusted time stamp for a given message by
TCP/IP See definition for: Transmission Control Protocol/Internet having a time stamping service append a time value to a message and
Protocol (TCP/IP) then digitally signing the result. See also: digital signature; service

Telephony API (TAPI) -> An application programming interface (API) used Time to Live (TTL) -> A timer value included in packets sent over TCP/IP-
by communications programs to work with telephony and network based networks that tells the recipients how long to hold or use the packet
services. Communications programs like HyperTerminal and Phone Dialer or any of its included data before expiring and discarding the packet or
use TAPI to dial, answer, and route telephone calls on conventional data. For DNS, TTL values are used in resource records within a zone to
telephony devices, including PBXs, modems, and fax machines. TAPI 3.0 determine how long requesting clients should cache and use this
information when it appears in a query response answered by a DNS
Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
server for the zone. See also: DNS Server; Domain Name System returns to its prior state when a transaction is terminated abruptly. A
(DNS); packet; resource record (RR); Transmission Control transactional message is removed from a queue only when the transaction
Protocol/Internet Protocol (TCP/IP); zone is committed; otherwise, it remains in the queue and can be subsequently
read during another transaction. See also: Message Queuing;
time-out error -> A condition where an expected character is not received
transaction; queue
in time. When this condition occurs, the software assumes that the data
has been lost and requests that it be resent. transceiver -> A device that can both transmit and receive signals. On
local area networks (LANs), a transceiver is the device that connects a
time-out interval -> For Process Control, the time the server waits, when
computer to the network and that converts signals to and from parallel and
a command cannot be successfully completed, before canceling the
serial form.
command. You can configure this in the Process Control snap-in.
transitive trust -> The standard type of trust relationship between
title bar -> The horizontal bar at the top of a window that contains the
Windows domains in a domain tree or forest. When a domain joins an
name of the window. On many windows, the title bar also contains the
existing forest or domain tree, a transitive trust is automatically
program icon, the Maximize, Minimize, and Close buttons, and the optional
established. Transitive trusts are always two-way relationships. This series
? button for context-sensitive Help. To display a menu with commands
of trusts, between parent and child domains in a domain tree and between
such as Restore and Move, right-click the title bar. See also: maximize;
root domains of domain trees in a forest, allows all domains in a forest to
minimize
trust each other for the purposes of authentication. For example, if domain
ToggleKeys -> A feature that sets your keyboard to beep when one of the A trusts domain B and domain B trusts domain C, then domain A trusts
locking keys (CAPS LOCK, NUM LOCK, or SCROLL LOCK) is turned on domain C. See also: domain tree; forest; one-way trust; two-way trust
or off. See also: FilterKeys; MouseKeys; StickyKeys; ToggleKeys
Transmission Control Protocol/Internet Protocol (TCP/IP) -> A set of
token -> Any nonreducible textual element in data that is being parsed. networking protocols widely used on the Internet that provides
For example, the use in a program of a variable name, a reserved word, or communications across interconnected networks of computers with
an operator. Storing tokens as short codes shortens program files and diverse hardware architectures and various operating systems. TCP/IP
speeds execution. includes standards for how computers communicate and conventions for
For networking, a unique structured data object or message that connecting networks and routing traffic. See also: protocol; Internet
circulates continuously among the nodes of a token ring and describes the Protocol (IP)
current state of the network. Before any node can send a message on the
transmitting station ID (TSID) string -> A string that specifies the
network, it must first wait to control the token. See also token ring.
transmitter subscriber ID sent by the fax machine when sending a fax to a
toolbar -> In a program in a graphical user interface, a row, column, or receiving machine. This string is usually a combination of the fax or
block of on-screen buttons or icons. When clicked, these buttons or icons telephone number and the name of the business. It is often the same as
activate certain functions, or tasks, of the program. For example, the the called subscriber ID. See also: called subscriber ID (CSID) string;
toolbar in Microsoft Word contains buttons for, among other actions, string
changing text to italic or boldface, and for saving or opening a document.
Transport Driver Interface (TDI) -> A common set of routines for network
Users can often customize toolbars and move them around on the screen.
layer components that communicate with the session layer of the Open
top-level domains -> Domain names that are rooted hierarchically at the Systems Interconnection (OSI) model. These routines allow software
first tier of the domain namespace directly beneath the root (.) of the DNS components above and below the transport layer to be mixed and matched
namespace. On the Internet, top-level domain names such as .com and without reprogramming. See also: Open Systems Interconnection (OSI)
.org are used to classify and assign second-level domain names (such as reference model
microsoft.com) to individual organizations and businesses according to
Transport Layer Security (TLS) -> A standard protocol that is used to
their organizational purpose. See also: domain; domain name; domain
provide secure Web communications on the Internet or intranets. It
namespace; Domain Name System (DNS); root; second-level
enables clients to authenticate servers or, optionally, servers to
domains
authenticate clients. It also provides a secure channel by encrypting
topology -> In Windows, the relationships among a set of network communications. TLS is the latest and a more secure version of the SSL
components. In the context of Active Directory replication, topology refers protocol. See also: Secure Sockets Layer (SSL); authentication;
to the set of connections that domain controllers use to replicate protocol
information among themselves. See also: Active Directory; domain
transport provider -> The driver and support files that provide transport
controller; replication
services in a networking environment.
touch-tone dialing -> A form of dialing that uses multiple-tone signaling.
trap -> In Simple Network Management Protocol (SNMP), a message sent
The user hears a series of tones (beeps) when dialing. Push-button
by an agent to a management system indicating that an event has
telephones usually use touch-tone dialing. See also: pulse dialing
occurred on the host running the agent. See also: agent; event; host;
trace log -> A type of log generated when the user selects a trace data Simple Network Management Protocol (SNMP)
provider using Performance. Trace logs differ sdff from counter-data logs in
tree view -> A hierarchical representation of the folders, files, disk drives,
that they measure data continuously rather than take periodic samples.
and other resources connected to a computer or network. For example,
training -> The process of teaching the speech recognition engine to Windows Explorer uses a tree view to display the resources that are
recognize your voice and manner of speaking. The speech engine looks attached to a computer or a network. See also: resource
for patterns in the way you speak, enabling it to provide better accuracy
Trivial File Transfer Protocol (TFTP) -> A protocol used to download the
when you dictate text. You train the engine by reading text in the training
initial files needed to begin the installation process. See also: protocol
wizard, and continue to train the engine as you dictate text while working.
Trojan horse-> A program that masquerades as another common
transaction -> For Message Queuing, the pairing of two or more actions
program in an attempt to receive information. An example of a Trojan
that are performed together as a single action; the action succeeds or fails
horse is a program that behaves like a system logon to retrieve user
as a whole. Using Microsoft Distributed Transaction Coordinator (MS DTC)
names and password information that the writers of the Trojan horse can
ensures that either both actions succeed or neither is executed. See also:
later use to break into the system.
Message Queuing; Microsoft Distributed Transaction Coordinator
(MS DTC); transaction dead-letter queue; transactional message TrueType fonts -> Fonts that are scalable and sometimes generated as
bitmaps or soft fonts, depending on the capabilities of your printer.
transaction dead-letter queue -> For Message Queuing, a queue that
TrueType fonts are device-independent fonts that are stored as outlines.
stores transactional messages that cannot reach their destination queue.
They can be sized to any height, and they can be printed exactly as they
Transaction dead-letter queues store failed messages on the computer on
appear on the screen. See also: font
which the message expired. Messages in these queues are written to disk
and are therefore recoverable. trust relationship -> A logical relationship established between domains
See also: dead-letter queue; Message Queuing; transaction; queue to allow pass-through authentication, in which a trusting domain honors the
logon authentications of a trusted domain. User accounts and global
transactional message -> For Message Queuing, a message that can be
groups defined in a trusted domain can be given rights and permissions in
sent and received only from within a transaction. This type of message
Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
a trusting domain, even though the user accounts or groups don't exist in When referring to a device, the act of removing the
the trusting domain's directory. See also: group; user account; corresponding device drivers from your hard disk and physically removing
permission; authentication; domain; global group the device from your computer. See also: device driver; install
tunnel -> A logical connection over which data is encapsulated. Typically, uninterruptible power supply (UPS) -> A device connected between a
both encapsulation and encryption are performed and the tunnel is a computer and a power source to ensure that electrical flow is not
private, secure link between a remote user or host and a private network. interrupted. UPS devices use batteries to keep the computer running for a
See also: encryption; host; tunnel server; voluntary tunnel period of time after a power failure. UPS devices usually provide protection
against power surges and brownouts as well.
tunnel server -> A server or router that terminates tunnels and forwards
traffic to the hosts on the target network. See also: host; router; server; universal group -> A security or distribution group that can be used
tunnel anywhere in the domain tree or forest. A universal group can have
members from any Windows domain in the domain tree or forest. It can
two-way trust -> A type of trust relationship in which both of the domains
also include other universal groups, global groups, and accounts from any
in the relationship trust each other. In a two-way trust relationship, each
domain in the domain tree or forest. Rights and permissions must be
domain has established a one-way trust with the other domain. For
assigned on a per-domain basis, but can be assigned at any domain in the
example, domain A trusts domain B and domain B trusts domain A. Two-
domain tree or forest.
way trusts can be transitive or nontransitive. All two-way trusts between
Universal groups can be members of domain local groups and
Windows domains in the same domain tree or forest are transitive. See
other universal groups, but they cannot be members of global groups.
also: domain tree; forest; one-way trust; transitive trust
Universal groups appear in the global catalog and should contain primarily
Type 1 fonts -> Scalable fonts designed to work with PostScript devices. global groups. See also: distribution group; domain; domain tree;
See also: font; PostScript domain local group; forest; global group; global catalog; security
group
U
UDP socket -> A socket that transmits datagrams over the User Datagram Universal Naming Convention (UNC) -> A convention for naming files
Protocol (UDP). See also: datagram; socket; User Datagram Protocol and other resources beginning with two backslashes (\), indicating that the
(UDP) resource exists on a network computer. UNC names conform to the
\\SERVERNAME\SHARENAME syntax, where SERVERNAME is the
unallocated space -> Available disk space that is not allocated to any
server's name and SHARENAME is the name of the shared resource. The
volume. The type of volume that you can create on unallocated space
UNC name of a directory or file can also include the directory path after the
depends on the disk type. On basic disks, you can use unallocated space
share name, with the following syntax:
to create primary or extended partitions. On dynamic disks, you can use
\\SERVERNAME\SHARENAME\DIRECTORY\FILENAME.
unallocated space to create dynamic volumes. See also: basic disk;
dynamic disk; extended partition; logical drive; object; partition; universal serial bus (USB) -> An external bus that supports Plug and
primary partition; volume Play installation. Using USB, you can connect and disconnect devices
without shutting down or restarting your computer. You can use a single
UNC (Universal Naming Convention) name -> The full name of a
USB port to connect up to 127 peripheral devices, including speakers,
resource on a network. It conforms to the \\servername\sharename syntax,
telephones, CD-ROM drives, joysticks, tape drives, keyboards, scanners,
where servername is the name of the server and sharename is the name
and cameras. A USB port is usually located on the back of your computer
of the shared resource. UNC names of directories or files can also include
near the serial port or parallel port. See also: port; bus; Plug and Play
the directory path under the share name, with the following syntax:
\\servername\sharename\directory\filename See also: share name; UNIX -> A powerful, multiuser, multitasking operating system initially
resource developed at AT&T Bell Laboratories in 1969 for use on minicomputers.
UNIX is considered more portable, that is, less computer-specific, than
undock -> To detach a laptop or other portable computer from a docking
other operating systems because it is written in C language. Newer
station. See also: dock; docking station; hot docking
versions of UNIX have been developed at the University of California at
Unicast -> In data communications networks, to transmit data from one Berkeley and by AT&T.
terminal to another, such as from client to server, or from server to server.
UPS service -> A service that manages an uninterruptible power supply
Unicode -> A character encoding standard developed by the Unicode (UPS) connected to a computer. See also: service
Consortium that represents almost all of the written languages of the
URL See definition for: Uniform Resource Locator (URL)
world. The Unicode character repertoire has multiple representation forms,
including UTF-8, UTF-16, and UTF-32. Most Windows interfaces use the USB port -> An interface on the computer that enables you to connect a
UTF-16 form. See also: American Standard Code for Information Universal Serial Bus (USB) device. USB is an external bus standard that
Interchange (ASCII); Unicode Character System (UCS); Unicode enables data transfer rates of 12 Mbps (12 million bits per second). USB
Transmission Format 8 (UTF-8) ports support a plug that is approximately 7 mm x 1 mm. See also:
universal serial bus (USB)
Unicode Character System (UCS) -> An international standard character
set reference that is part of the Unicode standard. The most widely held user -> A person who uses a computer. If the computer is connected to a
existing version of the UCS standard is UCS-2, which specifies 16-bit network, a user can access the programs and files on the computer, as
character values currently accepted and recognized for use to encode well as programs and files located on the network (depending on account
most of the world's languages. See also: Unicode Transmission Format restrictions determined by the network administrator).
8 (UTF-8); American Standard Code for Information Interchange
user account -> A record that consists of all the information that defines a
(ASCII); Unicode
user to Windows. This includes the user name and password required for
Unicode Transmission Format 8 (UTF-8) -> A character set for protocols the user to log on, the groups in which the user account has membership,
evolving beyond the use of ASCII. The UTF-8 protocol provides for support and the rights and permissions the user has for using the computer and
of extended ASCII characters and translation of UCS-2, an international network, and accessing their resources. For Windows XP Professional and
16-bit Unicode character set. UTF-8 enables a far greater range of names member servers, user accounts are managed with Local Users and
than can be achieved using ASCII or extended ASCII encoding for Groups. For Windows Server domain controllers, user accounts are
character data. See also: American Standard Code for Information managed with Microsoft Active Directory Users and Computers. See also:
Interchange (ASCII); Unicode Character System (UCS); Unicode permission; Active Directory Users and Computers; group;
password; resource; user name
Uniform Resource Locator (URL) -> An address that uniquely identifies a
location on the Internet. A URL for a World Wide Web site is preceded with User Datagram Protocol (UDP) -> A TCP complement that offers a
http://, as in the fictitious URL http://www.example.microsoft.com/. A URL connectionless datagram service that guarantees neither delivery nor
can contain more detail, such as the name of a page of hypertext, usually correct sequencing of delivered packets (much like IP). See also:
identified by the file name extension .html or .htm. datagram; Internet Protocol (IP); packet; service
uninstall -> When referring to software, the act of removing program files user name -> A unique name identifying a user account to Windows. An
and folders from your hard disk and removing related data from your account's user name must be unique among the other group names and
registry so the software is no longer available.
Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
user names within its own domain or workgroup. See also: domain; vector -> For Indexing Service, an ordered series of words or numbers
group name; user account; workgroup used in a query. For example, a single document can have (Scott Cooper;
Don Hall; Amy Egert) as a vector of coauthors. See also: query
USER object -> An object from Window Manager, which includes
windows, menus, cursors, icons, hooks, accelerators, monitors, keyboard vector font -> A font rendered from a mathematical model, in which each
layouts, and other internal objects. In Task Manager, the number of USER character is defined as a set of lines drawn between points. Vector fonts
objects currently being used by a process. See also: Task Manager can be cleanly scaled to any size or aspect ratio. See also: font; plotter
font
user password -> The password stored in each user's account. Each user
generally has a unique user password and must type that password when video adapter -> An expansion board that plugs into a personal computer
logging on or accessing a server. See also: password; user account to give it display capabilities. A computer's display capabilities depend on
both the logical circuitry (provided in the video adapter) and the monitor.
user principal name-> A user account name (sometimes referred to as
Each adapter offers several different video modes. The two basic
the user logon name) and a domain name identifying the domain in which
categories of video modes are text and graphics. Within the text and
the user account is located. This is the standard usage for logging on to a
graphics modes, some monitors also offer a choice of resolutions. At lower
Windows domain. The format is: user@domain.com (as for an e-mail
resolutions a monitor can display more colors.
address). See also: domain; domain name; user principal name suffix;
Modern adapters contain memory, so that the computer's RAM
user account
is not used for storing displays. In addition, most adapters have their own
user principal name suffix -> The UPN suffix is the part of the user graphics coprocessor for performing graphics calculations. These adapters
principal name to the right of the @ character. The default UPN suffix for a are often called graphics accelerators.
user account is the DNS domain name of the domain that contains the
virtual address -> In a virtual memory system, the address the application
user account. Alternative UPN suffixes may be added to simplify
uses to reference memory. The kernel and the memory management unit
administration and user logon processes by providing a single UPN suffix
(MMU) translate this address into a physical address before the memory is
for all users. The UPN suffix is only used within the Active Directory forest
actually read or written. See also: virtual memory
and is not required to be a valid DNS domain name. See also: Active
Directory; user account; domain; domain name; Domain Name virtual container -> A container that allows any LDAP-compliant directory
System (DNS); user principal name to be accessed through Active Directory. See also: Active Directory;
Lightweight Directory Access Protocol (LDAP)
user profile -> A file that contains configuration information for a specific
user, such as desktop settings, persistent network connections, and virtual IP address -> An IP address that is shared among the hosts of a
application settings. Each user's preferences are saved to a user profile Network Load Balancing cluster. A Network Load Balancing cluster might
that Windows uses to configure the desktop each time a user logs on. also use multiple virtual IP addresses, for example, in a cluster of
multihomed Web servers. See also: host; multihomed computer; IP
user rights -> Tasks that a user is permitted to perform on a computer
address
system or domain. There are two types of user rights: privileges and logon
rights. An example of a privilege is the right to shut down the system. An virtual local area network (VLAN) -> A logical grouping of hosts on one
example of a logon right is the right to log on to a computer locally. Both or more LANs that allows communication to occur between hosts as if they
types are assigned by administrators to individual users or groups as part were on the same physical LAN. See also: host; local area network
of the security settings for the computer. See also: administrator; (LAN)
domain; group; privilege
virtual memory -> Temporary storage used by a computer to run
users -> A special group that contains all users who have user programs that need more memory than it has. For example, programs
permissions on the server. When a Macintosh user assigns permissions to could have access to 4 gigabytes of virtual memory on a computer's hard
everyone, those permissions are given to the group's users and guests. drive, even if the computer has only 32 megabytes of RAM. The program
See also: permission; group data that does not currently fit in the computer's memory is saved into
paging files. See also: virtual printer memory; paging file; Virtual
V
Memory Size
V.34 -> Data transmission standard that provides for up to 33,600 bits per
second (bps) communications over telephone lines. It defines a full-duplex Virtual Memory Size -> In Task Manager, the amount of virtual memory, or
(two-way) modulation technique and includes error-correcting and address space, committed to a process. See also: Task Manager; virtual
negotiation. See also: bits per second (bps); full-duplex; modulation memory
standards; V.90
virtual printer memory -> In a PostScript printer, a part of memory that
V.90 -> Data transmission standard that provides for up to 56,000 bits per stores font information. The memory in PostScript printers is divided into
second (bps) communications over telephone lines. The transmission two areas: banded memory and virtual memory. The banded memory
speed from the client-side modem is 33,600 bps, the same as V.34. The contains graphics and page-layout information needed to print your
transmission speed from the host-side modem, such as an Internet service documents. The virtual memory contains any font information that is sent
provider (ISP) or corporate network, is up to 56,000 bps, with an average to your printer either when you print a document or when you download
speed of 40,000 to 50,000 bps. When the host-side modem does not fonts. See also: PostScript printer; virtual memory
support this standard, the alternative is V.34. See also: bits per second
virtual private network (VPN) -> The extension of a private network that
(bps); client; host; Internet service provider (ISP); modem
encompasses encapsulated, encrypted, and authenticated links across
(modulator/demodulator); modulation standards; V.34
shared or public networks. VPN connections can provide remote access
value entry -> The string of data that appears in the right pane of a and routed connections to private networks over the Internet. See also:
registry window and that defines the value of the currently selected key. A authentication; encryption; remote access; routing; tunnel
value entry has three parts: name, data type, and the value itself. See
virus -> A program that attempts to spread from computer to computer
also: registry; key
and either cause damage (by erasing or corrupting data) or annoy users
variable -> In programming, a named storage location capable of (by printing messages or altering what is displayed on the screen).
containing a certain type of data that can be modified during program
VoIP (Voice over Internet Protocol) -> A method for sending voice over a
execution.
LAN, a WAN, or the Internet using TCP/IP packets. See also: local area
System environment variables are defined by Windows 2000
network (LAN); Transmission Control Protocol/Internet Protocol
Server and are the same no matter who is logged on to the computer.
(TCP/IP); wide area network (WAN)
Administrator group members can add new variables or change the
values, however. volume -> An area of storage on a hard disk. A volume is formatted by
User environment variables can be different for each user of a using a file system, such as FAT or NTFS, and has a drive letter assigned
particular computer. They include any environment variables you want to to it. You can view the contents of a volume by clicking its icon in Windows
define or variables defined by your applications, such as the path where Explorer or in My Computer. A single hard disk can have multiple volumes,
application files are located. See also: environment variable and volumes can also span multiple disks. See also: disk; drive letter;
file allocation table (FAT); NTFS file system; simple volume; spanned
volume

Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011
volume set -> A partition consisting of disk space on one or more physical
Windows Open Services Architecture (WOSA) -> A common set of
disks that was created with Windows NT 4.0 or earlier. You can delete
interfaces that connect front-end applications with back-end services. See
volume sets only with Windows 2000 or Windows XP. To create new
also: service
volumes that span multiple disks, use spanned volumes on dynamic disks.
See also: basic disk; dynamic disk; partition; spanned volume; WINS proxy -> A computer that listens to name query broadcasts and
volume responds for those names not on the local subnet. The proxy
communicates with a WINS server to resolve names and then caches
volume shadow copy -> A volume that represents a duplicate of the
them for a specific time period. See also: subnet; Windows Internet
original volume taken at the time the copy began. See also: crash
Name Service (WINS)
consistency; differential data; volume
WINS resource -> A resource type that provides Windows Internet Name
voluntary tunnel -> A tunnel that is initiated by the client. It tunnels PPP
Service (WINS) from a cluster. See also: cluster; resource types;
over IP from the client to the tunnel server, then the data is forwarded to
Windows Internet Name Service (WINS)
the target host by the tunnel server. See also: client; host; Internet
Protocol (IP); Point-to-Point Protocol (PPP); tunnel; tunnel server Winsock -> Windows Sockets. An application programming interface (API)
standard for software that provides a TCP/IP interface under Windows.
W
See also: application programming interface (API); Transmission
Waiting for Call -> A telephony signal that Network Connections has put
Control Protocol/Internet Protocol (TCP/IP)
the modem in Listen mode and is waiting for incoming calls. See also:
Network Connections; modem (modulator/demodulator) wireless communication -> Communication between a computer and
another computer or device without wires. The form of wireless
warning level -> The point at which users are nearing their quota limit.
communication provided as part of the Windows operating system uses
See also: quota limit
infrared light to transmit files. Radio frequencies, as used by cellular and
Web Distributed Authoring and Versioning (WebDAV) -> An application cordless telephones, are another form of wireless communication. See
protocol related to HTTP 1.1 that allows clients to transparently publish also: infrared (IR); infrared device; infrared port
and manage resources on the World Wide Web.
workgroup -> A simple grouping of computers, intended only to help users
Web server -> A computer that is maintained by a system administrator or find such things as printers and shared folders within that group.
Internet service provider (ISP) and that responds to requests from a user's Workgroups in Windows do not offer the centralized user accounts and
browser. See also: Internet service provider (ISP) authentication offered by domains. See also: authentication; domain;
user account
WebDAV See definition for: Web Distributed Authoring and
Versioning (WebDAV) working set -> For a process, the amount of physical memory assigned to
a process by the operating system.
well-connected -> Sufficient connectivity to make your network and Active
Directory useful to clients on your network. The precise meaning of well- World Wide Web -> A system for exploring the Internet by using
connected is determined by your particular needs. See also: Active hyperlinks. When you use a Web browser, the Web appears as a collection
Directory of text, pictures, sounds, and digital movies. See also: internet
wide area network (WAN) -> A communications network connecting writable CD -> Recordable compact disc (CD-R) or rewritable compact
geographically separated computers, printers, and other devices. A WAN disc (CD-RW). Data can be copied to the CD on more than one occasion.
allows any connected device to interact with any other on the network. See Rewritable compact discs can also be erased.
also: device; local area network (LAN)
X
wildcard character -> A keyboard character that can be used to represent X.509v3 certificate -> Version 3 of the ITU-T recommendation X.509 for
one or many characters when conducting a query. The question mark (?) certificate syntax and format. This is the standard certificate format used
represents a single character, and the asterisk (*) represents one or more by Windows XP certificate-based processes.
characters. An X.509 certificate includes the public key and information
about the person or entity to whom the certificate is issued, information
wildcarding -> In DNS, the supported use of wildcard characters such as
about the certificate, plus optional information about the certification
the asterisk (*) in domain names for DNS queries that resolve to multiple
authority (CA) issuing the certificate. See also: International
names. When wildcarding is used, DNS servers must support resolving
Telecommunication Union - Telecommunication [Standardization
name queries that use wildcard characters, and resolvers must be able to
Sector] (ITU-T); certificate; certification authority (CA); public key
parse multiple records from any resource record sets (RRsets) issued in
wildcard query responses. See also: DNS Server; domain name; x86 -> Refers to microprocessors that have or emulate the 32-bit Intel
Domain Name System (DNS); resource record set (RRset); wildcard processor architecture.
character
XML (Extensible Markup Language) See definition for: Extensible
window -> A portion of the screen where programs and processes can be Markup Language (XML)
run. You can open several windows at the same time. For example, you
Y
can open your e-mail in one window, work on a budget in a spreadsheet in
There are no glossary terms that begin with this letter.
another, download pictures from your digital camera in another window,
and order your weekly groceries on the Web in another window. Windows Z
can be closed, resized, moved, minimized to a button on the taskbar, or zone -> In the Macintosh environment, a logical grouping that simplifies
maximized to take up the whole screen. browsing the network for resources, such as servers and printers.
In a DNS database, a manageable unit of the DNS database
Windows Internet Name Service (WINS) -> A software service that
that is administered by a DNS server. A zone stores the domain names
dynamically maps IP addresses to computer names (NetBIOS names).
and data of the domain with a corresponding name, except for domain
This allows users to access resources by name instead of requiring them
names stored in delegated subdomains. See also: Domain Name
to use IP addresses that are difficult to recognize and remember. WINS
System (DNS); partition; resource; DNS Server; domain
servers support clients running Windows NT 4.0 and earlier versions of
Microsoft operating systems. See also: Domain Name System (DNS); zone list -> In the Macintosh environment, a list that includes all of the
network basic input/output system (NetBIOS); WINS proxy; resource; zones associated with a particular network. Zone list is not to be confused
service; WINS resource; IP address with Windows DNS zones. See also: Domain Name System (DNS); zone
Windows Management Instrumentation (WMI) -> A management zone transfer -> The synchronization of authoritative DNS data between
infrastructure in Windows that supports monitoring and controlling system DNS servers. A DNS server configured with a secondary zone periodically
resources through a common set of interfaces and provides a logically queries the master DNS servers to synchronize its zone data. See also:
organized, consistent model of Windows operation, configuration, and authoritative; DNS Server; secondary master; zone
status. See also: resource

Prepared by: Mr. Jeffrey A. Diaz Windows XP Professional Service Pack 3 – Help and Support Center 11 January 2011

Vous aimerez peut-être aussi