M-S


macro

A series of program instructions in a Microsoft Office application that are grouped together as a single command to accomplish a task automatically.

Microsoft .NET Framework

Microsoft .NET Framework is a platform for building, deploying, and running Web services and applications.

.NET Programmability Support

Support for developers of .NET Framework applications. Microsoft .NET Framework is a platform for building, deploying, and running Web services and applications.

NetBIOS name

A friendly name used by computers on a network to distinguish them from other resources. WINS servers resolve NetBIOS names to their associated IP addresses. NetBIOS names allow computers with older operating systems such as Windows NT, Windows Me, and Windows 98 to participate in a network and to access resources.

NetMeeting

A real-time collaboration and conferencing application that combines application sharing, video and voice, and complete Internet conferencing.

NTF

SA type of file system used by newer computers that is much more advanced than the FAT file system. NTFS provides advanced file and folder permissions, encryption, disk quotas, and compression. NTFS is supported by Windows NT, Windows 2000, and Windows XP.

packets

Data sent over a network. Large messages and data are broken up into small pieces of data called packets. Although the individual packets might take different routes to the destination computer, once there, they are reassembled to form the original data.

page fault

An error that occurs when information cannot be found that the operating system needs to perform a task. This can occur due to lack of RAM or virtual memory, corrupt temporary files, a conflict between programs, missing or corrupt cookies, Favorites, History, or other Internet Explorer data.

partition

A smaller part of a larger hard disk. When a disk is partitioned, it is split into two or more smaller virtual drives. Partitions can be created to hold data, hold applications, or create a multiboot computer.

post

A message sent to or read in a newsgroup.

protocol

A set of agreed-on rules for communicating among computers. Protocols are industry standards, and both the sending and receiving computer must agree on the protocols used for communication to take place.

retention policy

A company policy set by a network administrator. Retention policies are set to encourage users to keep e-mail and documents for a standard period of time and then delete or archive them. Retention policies override AutoArchive settings.

reversible encryption

A process used to camouflage a message or data. Encrypting data keeps data safe from access by intruders.

router

A device that forwards data packets between networks.

scope of addresses

The range of addresses a DHCP server can allocate to network clients.

ScreenTips

Reviewers’ remarks. ScreenTips display comments in yellow pop-up boxes, and the comments appear when the user holds the mouse over the comment.

search engine

An application that can search through every page on every Web site on the Internet for the purpose of offering those pages when a user searches for information. Major search engines include Google and Yahoo!.

seated

A hardware card’s connection to the motherboard. A modem, network interface card, or sound card is considered seated if it is properly connected to the motherboard.

security ID

A unique identification number called a security identifier that identifies each user in a network.

security policy

Policies configured by domain, workgroup, or system administrators. The policies keep the computer and the computing environment secure by limiting what users can and cannot do while logged on to the computer or network.

service level agreement (SLA)

SLAs are agreements between parties (such as a call center and the company that hires it) that define how long a call should take, how much should be spent on each incident, and which reports and documents must be maintained. The SLA also defines penalties for not meeting those requirements.

shortcut key

A key combination associated with a macro for the purpose of running the macro. Common shortcut keys include CTRL+A, SHIFT+Z, and CTRL+V.

SLA

See service level agreement.

spyware

Software that monitors a user’s Web surfing activities. Spyware is often installed unwittingly on a computer when free software is downloaded from the Internet.

static IP address

An address configured for a computer that is not allocated by a DHCP server. The address never changes and must be manually input by a network administrator.

subnet

A separate and distinct part of a network, generally represented by one geographic location, such as an office or building. Subnets use gateways to access the Internet, thus enabling all users to access the Internet through one shared network address.

subnet mask

Subnet masks enable computers to determine when to send packets to the gateway to communicate with computers on remote subnets.

system partition

The physical area of the hard disk that holds the operating system files. The system partition is generally the C drive.




McDst Self-Paced Training Kit (Exam 70-272(c) Supporting Users and Troubleshooting Desktop Applications on a[... ]ystem)
McDst Self-Paced Training Kit (Exam 70-272(c) Supporting Users and Troubleshooting Desktop Applications on a[... ]ystem)
ISBN: N/A
EAN: N/A
Year: 2006
Pages: 237

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net