The data transfer capacity of a transmission medium.
In digital communications, the transfer capacity expressed in bits per second (bps) or megabits per second (Mbps). For example, Ethernet accommodates a bandwidth of 10,000,000 bps or 10 Mbps.
In analog communications, the difference between the highest and lowest frequencies in a specific range. For example, an analog telephone line accommodates a bandwidth of 3,000 hertz (Hz), the difference between the lowest (300 Hz) and highest (3,300 Hz) frequencies that it can carry.
See also bits per second (bps).
Setting the maximum portion of total network capacity that a service is allowed to use. An administrator can deliberately limit a server's Internet workload by not allowing it to receive requests at full capacity, thus saving resources for other programs, such as e-mail.
A range of measurements derived from performance monitoring that represents acceptable performance under typical operating conditions.
An authentication mechanism that is supported by most browsers, including Internet Explorer. Basic authentication encodes user name and password data before transmitting it over the network. Note that encoding is not the same as encryption. Also known as plaintext authentication.
See also Anonymous authentication.
See also authentication.
See also Digest authentication.
See also encryption.
The speed at which a modem communicates. Baud rate refers to the number of times the condition of the line changes. This is equal to bits per second only if each signal corresponds to one bit of transmitted data.
Modems must operate at the same baud rate in order to communicate with each other. If the baud rate of one modem is set higher than that of the other, the faster modem usually alters its baud rate to match that of the slower modem.
See also modem(modulator/demodulator).
Berkeley Internet Name Domain (BIND)
An implementation of Domain Name System (DNS) written and ported to most available versions of the UNIX operating system. The Internet Software Consortium maintains the BIND software.
See also Domain Name System (DNS).
A base-2 number system in which values are expressed as combinations of two digits, 0 and 1.
See Berkeley Internet Name Domain (BIND).
A process by which software components and layers are linked together. When a network component is installed, the binding relationships and dependencies for the components are established. Binding allows components to communicate with each other.
A value that is used with bit-wise operators (And, Eqv, Imp, Not, Or, Xor) to test the state of individual bits in a particular bit-field value.
See also bitmask identifier.
For the metabase, a name assigned to a bitmask to help identify its purpose. For example, In IIS 6.0, bitmask 512 is assigned the identifier MD_ACCESS_SCRIPT.
See also bitmask.
The number of bits transmitted every second, used as a measure of the speed at which a device, such as a modem, can transfer data.
See also modem(modulator/demodulator).
A data type with only two passable values, True (-1) or False (0). Boolean variables are stored as 16-bit (2-byte) numbers.
A threading model in which the object has the characteristics of an apartment-threaded object as well as a free-threaded object.
See also apartment-threaded.
Software that interprets the markup of files in HTML, formats them into Web pages, and displays them to the end user. Some browsers also permit end users to send and receive e-mail, read newsgroups, and play sound or video files embedded in Web documents.
The default security groups installed with the operating system. Built-in groups have been granted useful collections of rights and built-in abilities.
In most cases, built-in groups provide all the capabilities needed by a particular user. For example, members of the built-in Backup Operators group can back up and restore files and folders. To provide a needed set of capabilities to a user account, assign it to the appropriate built-in group.
See also group.
A process in which large amounts of data, such as files, e-mail messages, or online communications sessions, are encrypted for confidentiality. It is usually done with a symmetric key algorithm.
See also encryption.