Glossary

     
Access Control List ( ACL )

A list Windows XP stores with every file and folder on the NTFS partition or volume. The ACL includes all the users and groups that have access to the file or folder. In addition, it indicates what access or specifically what permissions each user or group is allowed to that file or folder.



Address book

A feature similar to a traditional paper-based address book where you store the names , addresses, and phone numbers of your contacts. Most email programs allow you to configure and maintain an address book.



Administrative installation point

A shared network folder that contains all the Office files required to install Office on a user's computer.



Antivirus software

A program designed specifically to detect and remove viruses.



Auditing

This feature enables you to track security-related events that occur on a computer. It can be useful in detecting when attempts are being made to breach security. Security- related events can be viewed in the Security log within Event Viewer.



AutoArchive

A feature provided by some applications such as Microsoft Outlook that enables you to archive your data to a file called Archive.pst . When you do, your oldest data is placed into that file.



Automatic Update

A Windows feature that detects when you have an Internet connection and uses the connection to automatically connect to the Windows Update site. With Automatic Updates, you no longer need to search for critical updates pertinent to your computer.



Autoplay

The capability to determine how Windows will handle files stored on a removable device such as a CD-ROM.



CDR-ROM

A storage device that contains data you copy using a CD burner . It may contain company documents or applications written within the company. The maximum storage capacity is 700MB. The CDR-ROM disc can be written to only once.



CDRW-ROM

A storage device that allows you to copy data repeatedly using a CD burner. If you deem the information outdated or unnecessary, you can reformat the CD and delete the contents stored on the CD.



Critical update

An update considered critical to the normal operation of your computer. Most vendors , including Microsoft, release updates that can normally be downloaded from their Web sites. These updates are released to fix known issues and security vulnerabilities with an operating system or software program.



Device driver

Software that allows a computer to interact with and control a hardware device.



Device Manager

A feature that enables you to maintain, configure, and troubleshoot the devices physically connected to the computer system.



Digital ID ( certificate )

An electronic attachment used to verify the authenticity of the sender.



Domain Name System ( DNS )

Software used to map hostnames into IP addresses.



Drivers

Small programs, also referred to as device drivers , that allow a computer to communicate with and control hardware devices.



Effective permissions

The permissions that a user has been explicitly assigned or permissions that a user has inheritied because of permissions assigned to a group the user is a member of.



Email

An electronic mail message delivered via a virtual mailman in the form of an Exchange server. The message can be sent over a local area network or the Internet.



Export

A function available in many applications that allows you to export data from an application into a file. For example, you can export email messages from Outlook Express into a file.



Firewall

A barrier between a private network and the Internet. A firewall can be hardware or software based. It blocks any traffic initiated from the Internet unless otherwise permitted.



Hard drive

A drive that contains operating system files, as well as data. Some computers may have multiple hard drives to increase storage space. Hard drives can be internal or external.



Home page

The Web page that is automatically displayed when Internet Explorer is opened. It also determines which Web page is displayed when you click the Home button located on the toolbar within Internet Explorer.



Import

A function available in many applications that allows you to import data from one program into another. For example, you can import email from one program such as Outlook into Outlook Express.



Inbox Repair Tool

A utility you use to repair corrupt PST files in Microsoft Outlook. It works by repairing the PST file's header and then deleting anything in the file that it doesn't understand.



Internet Connection Firewall ( ICF )

A software-based firewall component within Windows XP. It allows you to safely connect your computer or network to the Internet. Once enabled, ICF restricts the flow of packets between the Internet and your private network.



Internet Explorer

The default Web browser installed with Windows XP. With an Internet connection, Internet Explorer enables you to view information on the Web.



Internet

A worldwide network connecting millions of computers for the purpose of exchanging data.



IPCONFIG

A command used to view the IP parameters for a computer, such as the IP address, subnet mask, and default gateway. You can use the command to renew an IP address with a DHCP server, as well as empty the contents of the DNS resolver cache.



Local area network

A group of computers connected together for the purpose of sharing resources.



Macro

A mini-program that automates a procedure.



Microsoft Baseline Security Analyzer ( MBSA )

A tool available from the Microsoft Web site. You can use the MBSA to scan a computer to identify any misconfigurations with the operating system or software such as Office 2000 to identify any misconfigurations.



Modem

A hardware device used to establish a connection with a remote access server or Internet service provider.



Multiboot

A single computer that has multiple operating systems installed. When you multiboot a computer, you are prompted to select which operating system to load during computer startup.



NetBIOS name

A name assigned to a computer on a network. A NetBIOS name is a 16-character name in which the first 15 characters identify a computer and the 16 th character is a hexadecimal value used to identify a specific service on the computer. Prior to the introduction of Windows 2000, Network Basic Input/Output System (NetBIOS) names were used to identify computers, services, and other resources on Windows-based machines.



Network drive

A hard drive located on another computer on the network. Users can save and access data on network drives depending on permissions. In corporate environments, users are encouraged to store all data in their network drive to prevent the loss of data and maintain the ability to share information with multiple users.



Network interface card

The hardware that allows a computer to communicate on a network.



Newsgroup

An electronic means for people to exchange news, share information, and voice opinions . A newsgroup is normally dedicated to a specific topic and used by people with common interests. It serves as a type of message board where someone can post a comment or opinion (depending on the purpose of the newsgroup) that can be read by anyone else who accesses the newsgroup.



NTFS

The NT File System; one of the file systems supported by Windows XP, Windows NT4, Windows 2000, and Windows 2003. NTFS is the recommended file system because it offers many enhancements not available with the FAT and FAT32 file systems.



NTFS permissions

Permissions used to set resource security on files and folders within the NT File System (NTFS).



Outlook

A Microsoft Office application that allows you to send and receive email messages, manage contacts, schedule appointments, generate task lists, and leave personal notes.



Outlook Express

An email and newsgroup client that is installed along with Internet Explorer.



Personal Folder (.pst file)

A file that contains Outlook data, which may include email messages, contact information, and the like.



PING

A command-line utility used to verify connectivity with another TCP/IP host. Connectivity on the network is verified by sending Internet Control Message Protocol (ICMP) echo requests and replies. When the ping command is issued, the source computer sends four echo request messages to another TCP/IP host. The remote host, if reachable , then responds with echo replies.



Preview pane

The Outlook Express viewing pane that allows you to view the contents of an email message without having to open it in a separate window.



Printer

The software interface between the operating system and the print device.



Program Compatibility Wizard

A software feature that can be used to resolve compatibility problems that can arise when running legacy applications on Windows XP.



Proofing Tools

A Microsoft Office add-in that supplies a collection of tools, such as spelling and grammar checkers, thesauri , and AutoCorrect lists, for more than 45 languages. Microsoft Office comes with built-in proofing tools for commonly used languages.



Proxy server

A server that acts as a barrier between an intranet and the Internet. The proxy server receives requests for Internet resources (such as a Web page) from clients on the intranet. The proxy server acts on behalf of the client and retrieves the requested resource from the Internet. A proxy server can block Internet traffic from reaching the private network.



Share permissions

Permissions that determine what type of access a user has to a shared folder on the network. Share permissions include Full Control, Change, and Read.



Start menu

The menu used to access the most useful components installed on a computer. The Start menu consists of pinned items and the most frequently used items.



System Restore

A Windows XP feature that allows you to return the operating system to a prior state. For example, if a newly installed device driver causes computer problems, you can restore the computer to its state before the drive was installed.



Taskbar

A bar usually located along the bottom of the desktop that contains various buttons . The taskbar can be used to easily and quickly switch between open programs. Each program that is currently running has a button on the taskbar, making it easy for you to switch between programs.



TCP/IP

Transport Control Protocol/Internet Protocol; an industry standard suite of protocols that enables network communications between various hosts .



Template file

A framework of specifications for creating new documents. The template file specifies formats and may include some text and graphics.



Toolbar

A bar containing various buttons that can be used to easily perform different tasks . You can customize a window to display specific toolbars such as the Drawing toolbar in Microsoft Word.



TRACERT

A command used to determine the route taken to a specific destination. You may want to use the tracert command if you are not able to successfully ping the IP address of a remote host. The results of the tracert command indicate whether a problem exists with a router or gateway between the local computer and the remote destination.



Transform ( .mst ) file

A file used for automating and customizing the installation of Office XP on a user's computer.



Trojan horse

A virus designed to compromise security, such as stealing passwords. The purpose of a Trojan horse is to trick you into believing you are doing one thing when, in fact, you are doing something else.



Virus

A program or malicious code that secretly replicates itself by attaching to a medium such as another program, the boot sector, a partition sector, or a document that contains macros.



Windows Installer package

A file with an .msi extension used to automate the installation of an application such as Office XP.



Windows Update

A Windows feature that allows you to easily identify the updates available for your computer. Using the Windows Update Web site, you can have your computer scanned to determine the critical updates that are missing.



Worm

A form of malicious software that makes copies of itself. For example, after the worm is received, it can copy itself from one hard drive to another or spread by attaching itself to email. One of the most common ways of acquiring and spreading a worm is through email attachments.





MCDST 70-272 Exam Cram 2. Supporting Users & Troubleshooting Desktop Applications on a Windows XP Operating System (Exam Cram 2)
MCSA/MCSE 70-291 Exam Cram: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (2nd Edition)
ISBN: 0789736187
EAN: 2147483647
Year: 2003
Pages: 119
Authors: Diana Huggins

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net