WINDOWS 1002000 PROFESSIONAL RESOURCE KIT [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

WINDOWS 1002000 PROFESSIONAL RESOURCE KIT [Electronic resources] - نسخه متنی

Chris Aschauer

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید


Glossary


3


3270 A class of IBM Systems Network Architecture terminal and related protocol used to communicate with IBM mainframe host systems.

5


5250 A class of IBM Systems Network Architecture terminal and related protocol used to communicate with AS/400 host systems.

8


802.1p A protocol that supports the mapping of RSVP signals to Layer 2 signals using 802.1p priority markings to enable the prioritization of traffic across Layer 2 devices, such as switches, on a network segment. IEEE 802 refers to the Layer 2 technology used by LANs including the data-link layer and the media access control layer.

8mm cassette A tape cartridge format used for data backups, similar to that used for some video cameras except that the tape is rated for data storage. The capacity is 5 GB or more of (optionally compressed) data.

A


access control list; access mask; security descriptor.

access control entry; NTLM authentication protocol;discretionary access control list; security descriptor; system access control list.

access control entry.

privilege; security ID.

Advanced Configuration and Power Interface.

directory; directory service

system administrator.

Plug and Play.

Advanced Power Management A software interface (designed by Microsoft and Intel) between hardware-specific power management software (such as that located in a system BIOS) and an operating system power management driver.

advertisement In Systems Management Server, a notification sent by the site server to the client access points (CAPs) specifying that a software distribution program is available for clients to use. In Windows 2000, the Software Installation snap-in generates an application advertisement script and stores this script in the appropriate locations in Active Directory and the Group Policy object.

allocation unit In file systems an allocation unit is the smallest amount of disk space that can be allocated to hold a file. All file systems used by Windows 2000 organize hard disks based on allocation units. The smaller the allocation unit size, the more efficiently a disk stores information. If no allocation unit size is specified during formatting, Windows 2000 chooses default sizes based on the size of the volume and the file system used. These defaults are selected to reduce the amount of space lost and the amount of fragmentation on the volume. Also called cluster.

American Standard Code for Information Interchange (ASCII)
A standard single byte character encoding scheme used for text-based data. ASCII uses designated 7-bit or 8-bit number combinations to represent either 128 or 256 possible characters. Standard ASCII uses 7 bits to represent all uppercase and lowercase letters, the numbers 0 through 9, punctuation marks, and special control characters used in U.S. English. Most current x86 systems support the use of extended (or "high") ASCII. Extended ASCII allows the eighth bit of each character to identify an additional 128 special symbol characters, foreign-language letters, and graphic symbols. See also Unicode.

application programming interface.

Advanced Power Management.

Asynchronous Transfer Mode.

attribute (object) In Active Directory, an attribute describes characteristics of an object and the type of information an object can hold. For each object class, the schema defines what attributes an instance of the class must have and what additional attributes it might have.

auditing To track the activities of users by recording selected types of events in the security log of a server or a workstation.

authentication A basic security function of cryptography. Authentication verifies the identity of the entities that communicate over the network. For example, the process that verifies the identity of a user who logs on to a computer either locally, at a computer''''''''''''''''s keyboard, or remotely, through a network connection. See also cryptography; confidentiality; integrity; Kerberos authentication protocol; nonrepudiation; NTLM authentication protocol.

Authentication Header (AH) A header that provides authentication, integrity, and anti-replay for the entire packet (both the IP header and the data payload carried in the packet).

authoritative In the Domain Name System (DNS), the use of zones by DNS servers to register and resolve a DNS domain name. When a DNS server is configured to host a zone, it is authoritative for names within that zone. DNS servers are granted authority based on information stored in the zone. See also zone.

automated installation An unattended setup using one or more of several methods such as Remote Installation Services, bootable CD, and Sysprep.

automatic caching A method of automatically storing network files on a user"s hard disk drive whenever a file is open so the files can be accessed when the user is not connected to the network.

Automatic Private IP Addressing (APIPA) A feature of Windows 2000 TCP/IP that automatically configures a unique IP address from the range 169.254.0.1 to 169.254.255.254 and a subnet mask of 255.255.0.0 when the TCP/IP protocol is configured for dynamic addressing and a Dynamic Host Configuration Protocol (DHCP) is not available.

available state A state in which media can be allocated for use by applications.

averaging counter A type of counter that measures a value over time and displays the average of the last two measurements over some other factor (for example, PhysicalDiskAvg. Disk Bytes/Transfer).

B


B-tree
A tree structure for storing database indexes. Each node in the tree contains a sorted list of key values and links that correspond to ranges of key values between the listed values. To find a specific data record given its key value, the program reads the first node, or root, from the disk and compares the desired key with the keys in the node to select a subrange of key values to search. It repeats the process with the node indicated by the corresponding link. At the lowest level, the links indicate the data records. The database system can thus rapidly search through the levels of the tree structure to find the simple index entries that contain the location of the desired records or rows.

auditing; global group; local group; user rights.

copy backup; daily backup; differential backup; incremental backup; normal backup.

basic input/output system.

automated installation.

Computer Browser service.

encryption; symmetric key encryption.

C


cache file; naming service; resource record.

authoritative; cache; systemroot.

caching resolver.

cache; caching; expire interval; minimum TTL; resolver; resource record; Time To Live (TTL).

certification authority; private key; public key.

certificate; certification authority.

certificate; public key.

Challenge Handshake Authentication Protocol

object; parent object.

decryption; encryption; encryption key; plaintext.

server.

Component Object Model.

cryptography; authentication; integrity; nonrepudiation.

Microsoft Management Console (MMC); namespace.

noncontainer object; object.

daily backup; differential backup; incremental backup; normal backup.

Central Processing Unit.

confidentiality; integrity; authentication; nonrepudiation.

D


copy backup; differential backup; incremental backup; normal backup.

ciphertext; encryption; plaintext.

fragmentation.

independent client; Message Queuing server.

source directory.

Message Queuing; Message Queuing routing; Message Queuing routing server; Message Queuing service.

Hardware Compatibility List (HCL).

copy backup; daily backup; incremental backup; normal backup.

certificate.

public key cryptography.

Active Directory; directory.

access control entry; object; security descriptor; system access control list.

library.

direct memory access.

Domain Name System.

Domain Name System (DNS); namespace.

domain; Ping.

domain name; namespace.

IEEE 1284.4

digital subscriber line.

multiple boot.

DVD disc; DVD drive.

DVD decoder; DVD drive.

DVD decoder; DVD disc.

dynamic volume; partition.

dynamic disk; volume.

dynamic-link library (DLL) A feature of the Microsoft Windows family of operating systems and the OS/2 operating system. DLLs allow executable routines, generally serving a specific function or set of functions, to be stored separately as files with .dll extensions, and to be loaded only when needed by the program that calls them.

E


Extensible Authentication Protocol.

Enhanced Integrated Drive Electronics.

linked object.

public key; private key; symmetric key.

emergency repair disk.

basic disk; logical drive; partition; primary partition; unallocated space.

Extensible Authentication Protocol (EAP) An extension to PPP that allows for arbitrary authentication mechanisms to be employed for the validation of a PPP connection.

Extensible Markup Language (XML) A meta-markup language that provides a format for describing structured data. This facilitates more precise declarations of content and more meaningful search results across multiple platforms. In addition, XML will enable a new generation of Web-based data viewing and manipulation applications.

F


file allocation table.

file allocation table (FAT); NTFS file system.

Fiber Distributed Data Interface.

LocalTalk; Token Ring.

search filter.

BounceKeys; RepeatKeys; SlowKeys.

defragmentation.

media pool; Removable Storage.

G


IP address; IP router.

group; local group.

domain local group; global group; native mode; universal group.

group.

Group Policy An administrator"s tool for defining and controlling how programs, network resources, and the operating system operate for users and computers in an organization. In an Active Directory environment, Group Policy is applied to users or computers on the basis of their membership in sites, domains, or organizational units.

Group Policy object A collection of Group Policy settings. Group Policy objects are the documents created by the Group Policy snap-in. Group Policy objects are stored at the domain level, and they affect users and computers contained in sites, domains, and organizational units. Each Windows 2000-based computer has exactly one group of settings stored locally, called the local Group Policy object.

H


QoS.

Hypertext Markup Language.

Hypertext Transfer Protocol.

Human Interface Device (HID) A firmware specification that is a new standard for input and output devices such as drawing tablets, keyboards, USB speakers, and other specialized devices designed to improve accessibility.

Hypertext Markup Language (HTML) A simple markup language used to create hypertext documents that are portable from one platform to another. HTML files are simple ASCII text files with embedded codes (indicated by markup tags) to indicate formatting and hypertext links. HTML is used for formatting documents on the World Wide Web.

Hypertext Transfer Protocol (HTTP) The protocol used to transfer information on the World Wide Web. An HTTP address (one kind of Uniform Resource Locator [URL]) takes the form: http://www.microsoft.com.

I


Image Color Management.

Integrated device electronics.

Internet Information Services.

Internet locator service.

Message Queuing; Message Queuing routing; Message Queuing routing server; Message Queuing server; session concentration.

copy backup; daily backup; differential backup; normal backup.

dependent client; Message Queuing server; routing services.

Extended Industry Standard Architecture (EISA).

Infrared Data Association; infrared device; infrared port.

infrared; infrared device; infrared port.

infrared.

infrared device.

wide area network (WAN).

cryptography; authentication; confidentiality; nonrepudiation.

intra-site routing; Message Queuing; Message Queuing routing; Message Queuing routing server; Message Queuing server.

File Transfer Protocol (FTP); Network News Transfer Protocol (NNTP); Simple Mail Transfer Protocol (SMTP).

Layer Two Tunneling Protocol (L2TP).

Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX).

inter-site routing; Message Queuing; Message Queuing routing; Message Queuing routing server; Message Queuing server.

Internet Protocol.

Dynamic Host Configuration Protocol (DHCP); node.

packet; router; routing; Transmission Control Protocol/Internet Protocol.

Internet Printing Protocol.

Internet Protocol security.

IPSec security rules.

Internetwork Packet Exchange.

Infrared Data Association.

I/O request packet.

Interrupt Request.

IrTran-p A protocol that transfers images from cameras to Windows 2000 computers using infrared transmissions, making a physical cable connection unnecessary.

isochronous Time dependent. Refers to processes where data must be delivered within certain time constraints. Multimedia streams require an isochronous transport mechanism to ensure that data is delivered as fast as it is displayed, and to ensure that the audio is synchronized with the video.

J


job object A feature in the Win32 API set that makes it possible for groups of processes to be managed with respect to their processor usage and other factors.

K


Internet Protocol security (IPSec); NTLM authentication protocol; QoS Admission Control Service.

kernel The core of layered architecture that manages the most basic operations of the operating system and the computer"s processor for Windows NT and Windows 2000. The kernel schedules different blocks of executing code, called threads, for the processor to keep it as busy as possible and coordinates multiple processors to optimize performance. The kernel also synchronizes activities among Executive-level subcomponents, such as I/O Manager and Process Manager, and handles hardware exceptions and other hardware-dependent functions. The kernel works closely with the hardware abstraction layer.

key A secret code or number required to read, modify, or verify secured data. Keys are used in conjunction with algorithms to secure data. Windows 2000 automatically handles key generation. For the registry, a key is an entry in the registry that can contain both subkeys and entries. In the registry structure, keys are analogous to folders, and entries are analogous to files. In the Registry Editor window, a key appears as a file folder in the left pane. In an answer file, keys are character strings that specify parameters from which Setup obtains the needed data for unattended installation of the operating system.

keyboard filters Special timing and other devices that compensate for erratic motion tremors, slow response time, and other mobility impairments.

Korn shell (ksh) A command shell which provides the following functionality: file input and output redirection; command line editing using vi; command history; integer arithmetic; pattern matching and variable substitution; command name abbreviation (aliasing); built-in commands for writing shell programs.

L


Layer Two Tunneling Protocol.

local area network.

L2TP; tunnel.

Removable Storage.

Lightweight Directory Access Protocol application programming interface (LDAP API).

Line Printer Daemon (LPD).

Line Printer Remote (LPR).

Line Printer.

embedded object.

wide area network (WAN).

global group.

basic disk; basic volume; extended partition.

basic disk; basic volume; extended partition.

batch program.

long file name (LFN) A folder name or file name on the FAT file system that is longer than the 8.3 file name standard (up to eight characters followed by a period and an extension of up to three characters). Windows 2000 supports long file names up to the file-name limit of 255 characters. Macintosh users can assign long names to files and folders on the server and, using Services for Macintosh, long names to Macintosh-accessible volumes can be assigned when created. Windows 2000 automatically translates long names of files and folders to 8.3 names for MS-DOS and Windows 3.x users. See also name mapping.

loopback address The address of the local computer used for routing outgoing packets back to the source computer. This address is used primarily for testing.

M


media access control.

Removable Storage.

In-routing servers (InRSs); Message Queuing; Message Queuing server; out-routing servers (InRSs).

Message Queuing; Message Queuing routing; Message Queuing routing server; Message Queuing server; session concentration.

Active Directory; dependent client; independent client; routing link; routing services; session concentration.

Message Queuing; Message Queuing server.

console tree.

IPSec.

Time To Live (TTL).

dynamic disk; dynamic volume; fault tolerance; redundant array of independent disks (RAID); volume.

native mode.

library.

Microsoft Challenge Handshake Authentication Protocol version 2.

dual boot.

N


mixed mode.

domain local group; forest; global group; trusted forest; universal group.

NetBIOS Extended User Interface.

Transmission Control Protocol/Internet Protocol (TCP/IP).

local area network (LAN).

container object; object.

cryptography; authentication; confidentiality; integrity.

trust relationship; transitive trust relationship.

copy backup; daily backup; differential backup; incremental backup.

NTLM authentication protocol.

authentication.

Internetwork Packet Exchange (IPX); network basic input/output system (NetBIOS).

O


attribute; child object; container object; noncontainer object; parent object.

ActiveX.

Advanced Configuration and Power Interface (ACPI).

TrueType fonts.

Message Queuing; Message Queuing server; session concentration.

overclocking Setting a microprocessor to run at speeds above the rated specification.

P


embedded object; linked object; object linking and embedding (OLE).

packet assembler/disassembler.

printer control language (PCL); PostScript.

virtual memory.

virtual memory.

Password Authentication Protocol.

child object; object.

Peripheral Component Interconnect.

workgroup.

performance object.

performance counter.

access control list; object; privilege; user rights.

Internet Control Message Protocol (ICMP).

ciphertext; encryption; decryption.

power-on self test.

printer control language (PCL); page-description language (PDL).

Point-to-Point Tunneling Protocol.

basic disk; dynamic volume; extended partition; partition.

page-description language (PDL); PostScript.

public key.

access token; permission; user rights.

firewall.

private key.

cryptography; public key; private key.

public switched telephone network (PSTN) Standard analog telephone lines, available worldwide.

Q


Quality of Service.

QoS Admission Control Service A software service that controls bandwidth and network resources on the subnet to which it is assigned. Important applications can be given more bandwidth, less important applications less bandwidth. The QoS Admission Control Service can be installed on any network-enabled computer running Windows 2000.

Quality of Service (QoS) A set of quality assurance standards and mechanisms for data transmission, implemented in Windows 2000.

quantum Also known as a time slice, the maximum amount of time a thread can run before the system checks for another ready thread of the same priority to run.

quarter-inch cartridge (QIC)An older storage technology used with tape backup drives and cartridges. A means of backing up data on computer systems, QIC represents a set of standards devised to enable tapes to be used with drives from different manufacturers. The QIC standards specify the length of tape, the number of recording tracks, and the magnetic strength of the tape coating, all of which determine the amount of information that can be written to the tape. Older QIC-80 drives can hold up to 340 MB of compressed data. Newer versions can hold more than 1 GB of information.

R


fault tolerance; mirrored volume; RAID-5 volume; striped volume.

security ID.

library.

FilterKeys)

caching, caching resolver.

read-only memory.

routing table

Message Queuing; routing services; routing-link cost.

Message Queuing server; routing link; independent client.

intersite routing; routing link.

Remote Procedure Call.

rules An IPSec policy mechanism that governs how and when an IPSec policy protects communication. A rule provides the ability to trigger and control secure communication based on the source, destination, and type of IP traffic. Each rule contains a list of IP filters and a collection of security actions that take place upon a match with that filter list.

S


Small Computer System Interface.

Internet Protocol security (IPSec).

access control list; object.

relative ID; security principal.

access token; security ID; security principal name.

security principal.

Message Queuing server; routing services.

symmetric key encryption.

permission.

FilterKeys.

authentication; certificate; nonrepudiation.

Simple Network Management Protocol.

destination directory.

Shiva Password Authentication Protocol.

Stop message.

Stop error.

dynamic disk, dynamic volume, fault tolerance, volume.

key.

bulk encryption; encryption; decryption; session key.

access control entry (ACE); discretionary access control list (DACL); object; security descriptor.

Microsoft Management Console (MMC); registry.

volume.

systemroot The path and folder name where the Windows 2000 system files are located. Typically, this is C:Winnt, although a different drive or folder can be designated when Windows 2000 is installed. The value %systemroot% can be used to replace the actual location of the folder that contains the Windows 2000 system files. To identify your systemroot folder, click Start, click Run, and then type %systemroot%.

Systems Management Server A part of the Windows BackOffice suite of products. Systems Management Server (SMS) includes inventory collection, deployment, and diagnostic tools. SMS can significantly automate the task of upgrading software, allow remote problem solving, provide asset management information, manage software licenses, and monitor computers and networks.

Systems Network Architecture (SNA) A communications framework developed by IBM to define network functions and establish standards for enabling computers to share and process data.

T


desktop; taskbar button; status area.

taskbar.

Transmission Control Protocol/Internet Protocol.

Internet Protocol.

client.

Fiber Distributed Data Interface (FDDI).

domain tree; forest; nontransitive trust relationship.

authentication; domain; two-way trust relationship.

explicit trust relationship; forest; transitive trust relationship.

Transmitting Station ID string.

trust relationship.

PostScript.

U


Universal Asynchronous Receiver/Transmitter.

unallocated space

Available disk space that is not allocated to any partition, logical drive, or volume. The type of object created on unallocated space depends on the disk type (basic or dynamic). For basic disks, unallocated space outside partitions can be used to create primary or extended partitions. Free space inside an extended partition can be used to create a logical drive. For dynamic disks, unallocated space can be used to create dynamic volumes. Unlike basic disks, the exact disk region used is not selected to create the volume. See also basic disk; dynamic disk; extended partition; logical drive; partition; primary partition; volume.

HTML; HTTP; IP address.

asynchronous communication.

domain local group; forest; Global Catalog.

Universal Naming Convention (UNC)A convention for naming files and other resources beginning with two backslashes (), indicating that the resource exists on a network computer. UNC names conform to the SERVERNAME
SHARENAME syntax, where SERVERNAME is the server"s name and SHARENAME is the name of the shared resource. The UNC name of a directory or file can also include the directory path after the share name, with the following syntax: SERVERNAMESHARENAME
DIRECTORYFILENAME.

Uniform Resource Locator.

Universal Serial Bus.

user account
A record that consists of all the information that defines a user to Windows 2000. This includes the user name and password required for the user to log on, the groups in which the user account has membership, and the rights and permissions the user has for using the computer and network and accessing their resources. For Windows 2000 Professional and member servers, user accounts are managed by using Local Users and Groups. For Windows 2000 Server domain controllers, user accounts are managed by using Microsoft Active Directory Users and Computers. See also domain controller; group; user name.

distinguished name.

permission; privilege.

user rights policy Security settings that manage the assignment of rights to groups and user accounts.

Utility Manager A function of Windows 2000 that allows administrators to review the status of applications and tools and to customize features and add tools more easily.

V


value bar The area of the System Monitor graph or histogram display that shows last, average, minimum and maximum statistics for the selected counter.

Vector fonts Fonts rendered from a mathematical model, in which each character is defined as a set of lines drawn between points. Vector fonts can be cleanly scaled to any size or aspect ratio.

vertical blanking interval (VBI) The part of a TV transmission that is blanked, or left clear of viewable content, to allow time for the TV"s electron gun to move from the bottom to the top of the screen as it scans images. This blank area is now being used to broadcast closed captioned and HTML-formatted information.

Video for Windows (VfW) A format developed by Microsoft for storing video and audio information. Files in this format have an .avi extension. AVI files are limited to 320 x 240 resolution at 30 frames per second, neither of which is adequate for full-screen, full-motion video.

Video Port Extensions (VPE) A DirectDraw extension to support direct hardware connections from a video decoder and autoflipping in the graphics frame buffer. VPE allows the client to negotiate the connection between the MPEG or NTSC decoder and the video port. VPE also allows the client to control effects in the video stream, such as cropping, scaling, and so on.

Virtual Device Driver (VxD) Software for Windows that manages a hardware or software system resource. The middle letter in the abbreviation indicates the type of device; x is used where the type of device is not under discussion.

virtual memory The space on the hard disk that Windows 2000 uses as memory. Because of virtual memory, the amount of memory taken from the perspective of a process can be much greater than the actual physical memory in the computer. The operating system does this in a way that is transparent to the application, by paging data that does not fit in physical memory to and from the disk at any given instant.

virtual private network (VPN) The extension of a private network that encompasses links across shared or public networks, such as the Internet.

virus scanner Software used to scan for and eradicate computer viruses, worms, and Trojan horses. See virus.

volume A portion of a physical disk that functions as though it were a physically separate disk. In My Computer and Windows Explorer, volumes appear as local disks, such as drive C or drive D.

volume mount points New system objects in the version of NTFS included with Windows 2000 that represent storage volumes in a persistent, robust manner. Volume mount points allow the operating system to graft the root of a volume onto a directory.

W


local area network (LAN).

Domain Name System (DNS).

Windows Internet Name Service.

TCP/IP.

work queue item A job request of an existing library, made by an application that supports Removable Storage, which is placed in a queue and processed when the library resource becomes available.

workgroup A simple grouping of computers, intended only to help users find such things as printers and shared folders within that group. Workgroups in Windows 2000 do not offer the centralized user accounts and authentication offered by domains.

working set For a process, the amount of physical memory assigned to a process by the operating system.

/ 335