Review

Glossary

A

3- Tier Architecture

In a three-tier application architecture, presentation, application logic, and data are all logically separated. Each element is an independent component that can be changed or replaced without requiring that any other component to be rewritten.

Abstract class

A class that cannot be instantiated but is used as a base from which other classes can be derived.

Active window

The window in which the user is currently working. An active window is typically at the top of the window order and is dis-tinguished by the color of its title bar.

ActiveX

A COM-based technology that provides the fundamental building blocks used in most Windows applications. ActiveX can be used to create controls, documents and components that run on desktops or the Internet. ActiveX components can be developed in many programming languages, including all of the Microsoft application development products.

ActiveX

An umbrella term for Microsoft technologies that enable developers to create interactive content for the World Wide Web.

ActiveX Component

An object that conforms to COM. Clients deal with a component object only through a pointer to an interface.

ActiveX Control

The new name for programmable elements formerly known variously as OLE Controls, OCXs, or OLE Custom Controls. Controls previously built with the MFC Control Developer's Kit meet the ActiveX control specification.

ActiveX Document

A document that contains ActiveX controls, Java applets, or ActiveX document objects. Also called active object or active script.

Address Space

Each application can access up to 4 gigabytes of virtual memory. The range of addresses an application can access is called the application's address space.

Administrator

A person responsible for setting up and managing domain controllers or local computers and their user and group accounts, assigning passwords and permissions, and helping users with networking issues. To use administrative tools such as User Manager or User Manager for Domains, an administrator must be logged on as a member of the Administrators local group for the computer or domain, respectively.

ADO (ActiveX Data Objects)

ADO provides consistent, high-performance access to data, whether you're creating a front-end database client or middle-tier business object using an application, tool, language, or even an Internet browser. ADO is the single data interface you need to know for 1- to n-tier client/server and Web-based, data-driven solution development.

American National Standards Institute (ANSI)

An organization dedicated to the development of trade and communications standards.

ANSI

An organization of American industry and business groups dedicated to the development of trade and communication standards. ANSI sets standards for C and other programming langages to eliminate variations that could cause problems in transporting a program from one type of computer system or environment to another.

ANSI

See American National Standards Institute.

API

See application programming interface.

Application Programming Interface

A set of DLL or EXE files containing reusable functions that can be leveraged in multiple applications.

Applet

Java applets are similar to ActiveX controls. They are software components written in a programming language called Java that provide dynamic features on your Web page. A software vendor might choose to create a product as a Java applet because its interpreted nature lets it run on several different hardware platforms.

Application

A computer program used for a particular kind of work, such as word processing. This term is often used interchangeably with "program."

Application layer

The top (seventh) layer of the OSI model. This layer serves as the window for application processes to access network services. It represents the services that directly support user programs, such as software for file transfers, for database access, and for electronic mail.

Array

A variable that contains a finite number of elements that have a common name and data type. Each element of an array is identified by a unique index number. Changes made to one element of an array do not affect the other elements.

AS/400

A type of IBM minicomputer.

ASCII file

Also called a text file, a text-only file, or an ASCII text file, refers to a file in the universally recognized text format called ASCII (American Standard Code for Information Interchange). An ASCII file contains characters , spaces, punctuation, carriage returns, and sometimes tabs and an end-of-file marker, but it contains no formatting information. This generic format is useful for transferring files between programs that could not otherwise understand each other's documents. See also text file.

ASP (Active Server Pages)

ASP is not a scripting language; rather, ASP provides an environment that processes scripts that you incorporate into your HTML pages. To use ASP successfully, you need to learn the syntax, or rules, by which it operates.

Associate

To identify a file name extension as " belonging " to a certain application so that when you open any file with that extension, the application starts automatically.

Attributes

Information that indicates whether a file is a read-only, hidden, system, or compressed file, and whether the file has been changed since a backup copy of it was made.

Authentication

The process of determining the identity of a user attempting to access a system. Note that the user can be a person, a computer, or a process.

Automation

Through OLE Automation, a Windows Object exposes a set of commands and functions that other applications may use. These commands are typically referred to as programmable objects.

B

Back end

In a client/server program, back end refers to the part of the program executing on the server.

BackOffice

Microsoft BackOffice is a product suite that offers a full range of application services that leverage Windows NT Server directory, security and management. These include services for file and print, applications, database, messaging, groupware, desktop management, Internet access, transaction processing and host connectivity.

Bandwidth

In communications, the difference between the highest and lowest frequencies in a given range; for example, a telephone accommodates a bandwidth of 3000 Hz the difference between the lowest (300 Hz) and highest (3300 Hz) frequencies it can carry. In computer networks, greater bandwidth indicates faster data-transfer capability.

Binary

A base-2 number system, in which values are expressed as combinations of two digits, 0 and 1.

Binary Standard

COM provides a binary standard for OLE components by defining and implementing mechanisms that enable software components, such as applications, data objects, controls, and services, to interact as objects.

Bits per second (bps)

A measure of the speed at which a device, such as a modem, can transfer data.

BPS

See bits per second.

Bridge

A device that allows you to join two local area networks, and allows stations on either network to access resources on the other. The bridge makes connections at the Data-Link layer of the OSI model.

Browse

To look through lists of directories, files, user accounts, groups, domains, or computers.

Buffer

A reserved portion of memory in which data is temporarily held pending an opportunity to complete its transfer to or from a storage device or another location in memory. Some devices, such as printers or the adapters supporting them, commonly have their own buffers. See also memory.

Business Services

Business services are the units of application logic that control the enforcement and sequence of business rules, and the transactional integrity of the operations performed.

Bytecode

Machine-independent code generated by the Java compiler and executed by the Java interpreter or compiled at the last minute by a JIT compiler.

C

Cache

A special memory subsystem that stores the contents of frequently accessed RAM locations and the addresses where these data items are stored. In Windows NT, for example, user profiles have a locally cached copy of part of the registry.

Central file server

A network in which specific computers take on the role of a server with other computers on the network sharing the resources. See also client/server.

CGI

See Common Gateway Interface.

Chaining

SQL Server allocates storage space as a single unit called an extent. The extent is made up of 8 2K pages. As each database table object requires more space, SQL Server allocates additional extents to the object. Non-log extents are chained together and they all belong to the same database table object. This chaining enables SQL Server to rapidly de-allocate or disassociate the entire extent from the database table object rather than on a page by page basis.

Character Code

The characters represented by a range of character codes. Under the ASCII and OEM character sets, the character codes 128 to 255 correspond to the extended ASCII character set, which includes line drawing characters, graphics characters, and special symbols.

Check box

A small, square box in a dialog box that can be selected or cleared, representing an option that you can turn on or off. When a check box is selected, an X appears in the box.

Class

For OLE, the definition of a data structure and functions that manipulate that data. Objects are instances of a class; that is, an object must be a member of a given class. For hardware, the manner in which devices and buses are grouped for purposes of installing and managing device drivers and allocating resources. The hardware tree is organized by device class, and Windows 95 uses class installers to install drivers for all hardware classes.

Client

A computer that accesses shared network resources provided by another computer (called a server). See also workstation.

Client Object

An object issuing a request for a service. A given object may be a client for some requests and a server for other requests . See also server object.

Client/server

A network in which specific computers take on the role of a server, with other computers on the network sharing the resources. See also central file server.

Clipboard

A temporary storage area in memory, used to transfer information. You can cut or copy information onto the Clipboard and then paste it into another document or program.

Close

Remove a window or dialog box, or quit a program. To close a window, you can click Close on the Control menu, or you can click the close button icon in the upper right corner of the dialog box. When you close an application window, you quit the program.

CLSID (Class ID)

A universally unique identifier (UUID) that identifies a type of OLE object. Each type of OLE object (item) has its CLSID in the registry so that it can be loaded and programmed by other applications. For example, a spreadsheet may create worksheet items, chart items, and macrosheet items. Each of these item types has its own CLSID that uniquely identifies it to the system.

Code component

The new name for programmable elements formerly known variously as OLE Servers. Code components do not supply a user interface.

Code signing

Code signing is used to allow users to verify that a component was constructed by a reliable developer.

Collection

In object-oriented programming, a class that can hold and process groups of class objects or groups of standard types. A collection class is characterized by its "shape" (the way the objects are organized and stored) and by the types of its elements.

COM (Component Object Model)

COM specifies an object model and a set of programming requirements that enable COM objects (also called Components or objects) to interact with other objects. These objects can be within a single process, in other processes, even on remote machines. They can have been written in other languages, and may be structurally quite dissimilar. That is why COM is referred to as a binary standard it is a standard that applies after a program has been translated to binary machine code.

Command

A word or phrase, usually found on a menu, that you click to carry out an action. You click a command on a menu or type a command at the Windows NT command prompt. You can also type a command in the Run dialog box, which you open by clicking Run on the Start menu.

Command button

A button in a dialog box that carries out or cancels the selected action. Two common command buttons are OK and Cancel. If you click a command button that contains an ellipsis (for example, Browse...), another dialog box appears.

Common Gateway Interface (CGI)

A standard interface for HTTP server application development. The standard was developed by the National Center for Supercomputing Applications.

Common Messaging Calls (CMC)

The Common Messaging Call API provides a set of ten high-level functions for mail-enabled applications to send and receive electronic messages. It is very easy to add mail capability to an application with CMC, since an important consideration in the design of the API is to minimize the number of function calls needed to send or receive a message. For example a mail-enabled application can send a message with a single function call and receive a specific message with two calls.

Component

An object that conforms to COM. Clients deal with a component object only through a pointer to an interface.

Compound document

A document within a container application that contains data of different formats, such as sound clips, spreadsheets, text, and bitmaps. Each piece of integrated data (or "compound-document object") can exist within the compound document as a linked item or an embedded item.

Computer name

A unique name of up to 15 characters that identifies a computer to the network. The name cannot be the same as any other computer or domain name in the network, and it cannot contain spaces.

Context menu

A menu that is displayed at the location of a selected object (sometimes called a pop-up menu or shortcut menu). The menu contains commands that are contextual to the selection.

Context-sensitive help

Used to display help for a particular topic. In a help file, a number used to identify a Windows Help topic.

Control menu

See context menu.

Conventional memory

Up to the first 640 KB of memory in your computer. MS-DOS uses this memory to run programs.

Cookie

A unique identifier that is opaque (not aliased to anything else). The cookie may be an index, a hash value, or a pointer to some object in memory, but only the subsystem knows this. To the subsystem user, the cookie is just the name of a resource.

Cooperative multitasking

In cooperative (non-preemptive) multitasking, use of the processor is never taken from a task; rather, a task must voluntarily yield control of the processor before any other task can run. Windows 3.1 uses non-preemptive multitasking for Windows applications.

CryptoAPI

The Cryptographic API (CryptoAPI) provides services that enable application developers to add cryptography to their Win32 applications. It provides APIs for both cryptography and certificate functions.

Cursor

Cursors allow individual row operations to be performed on a given results set or on the entire set. In SQL Server 6.0, ANSI SQL cursors are server based. In earlier releases, cursors were provided only through the DB-Library and Open Database Connectivity (ODBC) cursor APIs.

D

DAO (Data Access Objects)

A high-level set of objects that insulates developers from the physical details of reading and writing records. In a database application, for example, these objects include databases, table definitions, query definitions, fields, indexes, etc.

Data Link Layer

The data link layer provides error-free transfer of data frames from one node to another over the physical layer, allowing layers above it to assume virtually error-free transmission over the link.

Data services

Units of application logic and provide the lowest visible level of abstraction for the manipulation of data

Data Source Name (DSN)

The logical name used by ODBC to refer to the drive and other information required to access data. The name is use by Internet Information Server for a connection to an ODBC data source, such as a SQL Server database. To set this name, use ODBC in the Control Panel.

Data type

In programming, a definition of a set of data that specifies the possible range of values of the set, the operations that can be performed on the values, and the way in which the values are stored in memory.

Database

A data management system that stores information in tablesrows and columns of dataand conducts searches by using data in specified columns of one table to find additional data in another table.

Data-Link layer

The second layer in the OSI model. This layer packages raw bits from the Physical layer into data frames.

DBMS (Database Management System)

A layer of software between the physical database and the user. The DBMS manages all requests for database action (for example, queries or updates) from the user. Thus, the user is spared the necessity of keeping track of the physical details of file locations and formats, indexing schemes, and so on. In addition, a DBMS may permit centralized control of security and data-integrity requirements.

DCOM

See Distributed Component Object Model.

DDE

See dynamic data exchange.

Default

An operation or value that the system assumes, unless the user makes an explicit choice.

Default Gateway

Clients on TCP/IP networks can send packets directly to hosts on their immediate network segment. However, to reach other network segments and other networks, they send their packets instead to a default gateway. That default gateway then decides where to send the packets. Thus, clients can send packets to servers anywhere in a very large, complex network without having to know how to reach each server.

Delimiter

A special character that sets off, or separates, individual items in a program or in a set of data. Programming languages typically delimit such variable-length elements as comments, strings, and program blocks. Databases use two forms of delimiters: field delimiters and record delimiters. Characters used as delimiters include commas, semicolons, tabs, carriage returns, and colons.

Desktop

The background of your screen, on which windows, icons, and dialog boxes appear.

Device

A generic term for a computer component, such as a printer, serial port, or disk drive. A device frequently requires its own controlling software called a device driver.

Device driver

A program that enables a specific piece of hardware (device) to communicate with Windows 95. Although a device may be installed on your computer, Windows 95 cannot recognize the device until you have installed and configured the appropriate driver.

DHCP

See Dynamic Host Configuration Protocol.

Dialog box

In Windows, a child window used to retrieve user input. A dialog box usually contains one or more controls, such as buttons, list boxes, combo boxes, and edit boxes, with which the user enters text, chooses options, or directs the action of the command.

Digital Signature

An electronic identifier used for security. It verifies that the document originated from the individual whose signature is attached to it and that it has not been altered since it was signed. Usually accomplished using some form of encryption.

Directory

Part of a structure for organizing your files on a disk, a directory (also called a folder) is represented by the folder icon in Windows NT, Windows 95. A directory can contain files and other directories, called subdirectories or folders within folders.

Distributed Component Object Model (DCOM)

Use the DCOM Configuration tool to integrate client/server applications across multiple computers. DCOM can also be used to integrate robust Web browser applications. See also DCOM Configuration tool.

DLL

See dynamic-link library.

DNS

See Domain Name System.

Domain

For Microsoft networking, a collection of computers that share a common domain database and security policy that is stored on a Windows NT Server domain controller. Each domain has a unique name. See also workgroup.

Domain Name System (DNS)

Sometimes referred to as the BIND service in BSD UNIX; a static, hierarchical name service for TCP/IP hosts. A DNS server maintains a database for resolving host names and IP addresses, allowing users of computers configured to query the DNS to specify remote computers by host names rather than IP addresses. DNS domains should not be confused with Windows NT networking domains.

Driver

See device driver.

DSN

See Data Source Name.

Dynamic Data Exchange (DDE)

A form of interprocess communication (IPC) implemented in the Microsoft Windows family of operating systems. Two or more programs that support dynamic data exchange (DDE) can exchange information and commands. Most DDE functions have been superseded in later versions of OLE.

Dynamic Host Configuration Protocol (DHCP)

A protocol for automatic TCP/IP configuration that provides static and dynamic address allocation and management.

Dynamic-Link Library (DLL)

An application programming interface (API) routine that user-mode applications access through ordinary procedure calls. The code for the API routine is not included in the user's executable image. Instead, the operating system automatically modifies the executable image to point to DLL procedures at run time.

E

Early binding

Early binding means the checking of references to OLE objects in Microsoft Visual Basic for Applications code is performed once, during design time, rather than during runtime (late binding). Early binding is much faster than late binding and is the preferred method. Every OLE automation application supports late binding, while only some applications support early binding.

Embedded object

A type of compound-document item in which all the information needed to manage the item is stored in the container document, but which is created and edited by a server application. Embedded items can be edited or activated in-place. See also linked item.

EMS

See Expanded Memory Specification.

Encapsulation

In object-oriented programming, the process of hiding the internal workings of a class to support or enforce abstraction. A class's interface, which is public, describes what a class can do, while the implementation, which is private or protected, describes how it works.

Encryption

The process of making information indecipherable to protect it from unauthorized viewing or use, especially during transmission or when it is stored on a transportable magnetic medium.

Environment variable

A string consisting of environment information, such as a drive, path , or file name, associated with a symbolic name that can be used by the operating system.

Event

In OLE, a notification message sent from one object to another (e.g. from a control to its container) in response to a state change or a user action. More generally , any action or occurrence, often generated by the user, to which a program might respond. Typical events include keystrokes, mouse movements, and button clicks.

Exception

A synchronous error condition resulting from the execution of a particular computer instruction. Exceptions can be either hardware-detected errors, such as division by zero, or software- detected errors, such as a guard-page violation.

Expanded memory

A type of memory, up to 8 megabytes, that can be added to an 8086 or 8088 computer, or to an 80286, 80386, 80486, or Pentium computer. The use of expanded memory is defined by the Expanded Memory Specification (EMS). Note: Windows NT requires an 80486 or higher computer.

Expanded Memory Specification (EMS)

Describes a technique for adding memory to IBM PC systems. EMS bypasses the limits on the maximum amount of usable memory in a computer system by supporting memory boards containing a number of 16 KB banks of RAM that can be enabled or disabled by software. See also memory.

Extended MAPI

Extended MAPI is an API set intended for use by complex messaging-based applications such as advanced workgroup programs that use the messaging subsystem extensively.

Extended memory

Memory beyond one megabyte in 80286, 80386, 80486, and Pentium computers. Note: Windows NT requires an 80486 or higher computer.

Extension

A file name extension usually indicates the type of file or directory, or the type of program associated with a file. In MS-DOS, this includes a period and up to three characters at the end of a file name. Windows NT supports long file names, up to the file name limit of 255 characters.

F

FAT file system

A file system based on a file allocation table, maintained by the operating system, to keep track of the status of various segments of disk space used for file storage. The 32-bit implementation in Windows 95 is called the Virtual File Allocation Table (VFAT).

File

A collection of information that has been given a name and is stored on a disk. This information can be a document or a program.

File Allocation Table (FAT)

See FAT file system.

File system

In an operating system, the overall structure in which files are named, stored, and organized.

File Transfer Protocol (FTP)

A service that supports file transfers between local and remote computers. FTP supports several commands that allow bidirectional transfer of binary and ASCII files between computers. The FTP client is installed with the TCP/IP connectivity utilities.

File-based database

The Microsoft Jet and FoxPro engines are file-server based. The data and indexes reside either on the user's local machine or on a network file server. In either case, most processing is performed locally on the client machines.

Firewall

A system or combination of systems that enforces a boundary between two or more networks and keeps intruders out of private networks. Firewalls serve as virtual barriers to passing packets from one network to another.

Flat file

See ASCII file.

Flat thunks

Flat thunks allow a Win32-based application to load and call a 16-bit DLL or a 16-bit application to load and call a Win32-based DLL.

Focus

The area of a dialog box which receives input. To find the focus, look for highlighted text (for example, in a list box) or a button enclosed in dotted lines.

Folder

A type of container of objects (typically files).

Font

A set of attributes for characters.

Front end

In a client/server program, front end refers to the part of the program executing on the client.

FTP

See File Transfer Protocol.

Function

A block of code, consisting of a return type, function name, optional parameters, and statements, that performs one or more specific tasks within the source program and returns a value to the caller. The purpose of or the action carried out by a program, routine, or other object.

G

Gateway

A computer connected to multiple physical networks, capable of routing or delivering packets between them. It is used to connect dissimilar networks (networks using dissimilar protocols) so that information can be passed from one to the other. A gateway is at the Network layer of the OSI model.

GDI

An executable program that processes graphical function calls from a Windows-based application and passes those calls to the appropriate device driver, which performs the hardware-specific functions that generate output. By acting as a buffer between applications and output devices, GDI presents a device-independent view of the world for the application while interacting in a device-dependent format with the device.

Generic thunks

Generic thunks allow a 16-bit Windows-based application to load and call a Win32-based DLL on Windows NT and Windows 95.

GIF (Graphic Interchange Format)

GIF and interlaced GIF use LZW compression. This translates common patterns in an image into short codes. LZW is best at preserving all the image data and achieving good compression, but it does not achieve the high compression ratios that JPEG does. LZW is available for monochrome, grayscale, palette, and true color images.

Gopher

A hierarchical system for finding and retrieving information from the Internet or an intranet. Similar to FTP, Gopher uses a menu system and enables links to other servers.

GUI (Graphical User Interface)

Refers to a Windows interface versus a standard text-based interface used in MS-DOS.

GUID

Identifies a particular object class and interface. This identifier is a 128-bit value.

H

HAL

See Hardware Abstraction Layer.

Handle

In the user interface, an interface added to an object that facilitates moving, sizing, reshaping, or other functions pertaining to an object. 2. In programming, a pointer to a pointerthat is, a token that lets a program access a resource identified in another variable. See also object handle.

Handwriting control

The handwriting control is used for text input. The control passes the text to one or more recognizers and is then interpreted as equivalent digital text

Hardware Abstraction Layer (HAL)

A thin layer of software provided by the hardware manufacturer that hides, or abstracts, hardware differences from higher layers of the operating system.

Hexadecimal

A base-16 number system that consists of the digits 0 through 9 and the uppercase and lowercase letters A (equivalent to decimal 10) through F (equivalent to decimal 15).

high memory area (HMA) - The first 64 KB of extended memory (often referred to as HMA).

High-Performance File System (HPFS) - The file system designed for the OS/2 version 1.2 operating system.

HKEY_CLASSES_ROOT

A predefined registry handle that defines OLE and file-class association data. This key is a symbolic link to a subkey of Hkey_Local_Machine\Software.

HKEY_CURRENT_USER

A predefined registry handle that defines the current user's preferences, including environment variables , personal program groups, desktop settings, network connections, printers, and program preferences. This key maps to a subkey of Hkey_Users.

HKEY_LOCAL_MACHINE

A predefined registry handle that defines the hardware and operating system characteristics such as bus type, system memory, installed device drives , and boot control data.

HKEY_USERS

A predefined registry handle that defines the default user configuration for users on the local computer and configuration data from user profiles stored on the local computer.

HMA

See high memory area.

Home page

The initial page of information for a collection of pages. The starting point for a Web site or section of a Web site is often referred to as the home page. Individuals also post pages that are called home pages.

Host

Any device that is attached to the internetwork and uses TCP/IP.

HPFS

See High-Performance File System.

HTML

See Hypertext Markup Language.

HTTP

See Hypertext Transport Protocol.

HTTPS

A Secure HTTP protocol used for browsers to access your site by typing https:// instead of http:// in front of the URL.

Hyperlink

A way of jumping to another place on the Internet. Hyperlinks usually appear in a different format from regular text. You initiate the jump by clicking the link.

Hypertext Markup Language (HTML)

A simple markup language used to create hypertext documents that are portable from one platform to another. HTML files are simple ASCII text files with codes embedded (indicated by markup tags) to indicate formatting and hypertext links. HTML is used for formatting documents on the World Wide Web.

Hypertext Transport Protocol (HTTP)

The underlying protocol by which WWW clients and servers communicate. HTTP is an application-level protocol for distributed, collaborative, hypermedia information systems. It is a generic, stateless, object-oriented protocol. A feature of HTTP is the typing and negotiation of data representation, allowing systems to be built independently of the data being transferred.

I

I/O device

An input/output device, which is a piece of hardware used for providing information to and receiving information from the computerfor example, a disk drive, which transfers information in one of two directions, depending on the situation. Some input devices, such as keyboards, can be used only for input; some output devices (such as a printer or a monitor) can be used only for output. Most of these devices require installation of device drivers.

IDC

See Internet Database Connector.

IDE (Integrated Development Environment)

A visual Development interface to rapidly build applications by integrating the variety of tools required to design, develop, debug, and profile a general application.

IIS

See Internet Information Server.

Inheritance

In object-oriented programming, a method for deriving new classes from existing classes. The derived class inherits the description of its base class(es), but can be extended by adding new member variables and functions and by using virtual functions. A class can inherit from a single base class (single inheritance) or from any number of direct base classes (multiple inheritance). A class derived using multiple inheritance has the attributes of all of its base classes.

INI (initialization) file

In Windows, a file that an application uses to store information that otherwise would be lost when the application closes . Initialization files typically contain information such as user preferences for the configuration of the application. Initialization files usually have a .INI filename extension.

INI files

Initialization files used by Windows-based programs to store per-user information that controls program startup. In Windows 95, such information is stored in the registry, and INI files are supported for backward compatibility.

In-process server

A server implemented as a DLL that runs in the process space of the client.

Input/output activity (I/O)

Read or write actions that your computer performs. Your computer performs a "read" when you type information on your keyboard or you select and choose items by using your mouse. Also, when you open a file, your computer reads the disk on which the file is located to find and open it.

Insertion point

The place where text will be inserted when you type. The insertion point usually appears as a flashing vertical bar in a program's window or in a dialog box.

Instance

An object created from a particular class.

Institute of Electrical and Electronics Engineers (IEEE) Project 802

A networking model developed by the Institute of Electrical and Electronics Engineers (IEEE). This project is called 802, for the year and month it began (February 1980). Project 802 defines LAN standards for the Physical and Data-Link layers of the OSI model. The 802 project divides the Data-Link layer into two sublayers : Media Access Control (MAC) and Logical Link Control (LLC).

Integrated Services Digital Network (ISDN)

A type of phone line used to enhance WAN speeds, ISDN lines can transmit at speeds of 64 or 128 kilobits per second, as opposed to standard phone lines, which typically transmit at only 9600 bits per second (bps). An ISDN line must be installed by the phone company at both the server site and the remote site. See also bits per second (bps).

Intel Protection Model

An 80386 or higher processor has the ability to support multiple levels (rings) of privileges for executable code. The different rings provide different types of protection and levels of privileges. Windows 95 and NT use rings 0 and 3; however, they do not use rings 1 or 2.

Interface

In the Component Object Model, a set of related functions; a description of an abstract class.

International Standards Organization (ISO)

An international association of member countries , each represented by its leading standard-setting organizationfor example, ANSI (American National Standards Institute) for the United States. The ISO works to establish global standards for communications and information exchange.

Internet

The global network of networks. See also World Wide Web (WWW).

Internet Database Connector (IDC)

Provides access to databases for Internet Information Server by using ODBC. The Internet Database Connector is contained in Httpodbc.dll, which is an Internet Server API DLL.

Internet Information Server (IIS)

A network file and application server that supports multiple protocols. Primarily, Internet Information Server transmits information in Hypertext Markup Language (HTML) pages by using the Hypertext Transport Protocol (HTTP).

Internet Protocol (IP)

The messenger protocol of TCP/IP, responsible for addressing and sending TCP packets over the network. IP provides a best-effort, connectionless delivery system that does not guarantee that packets arrive at their destination or that they are received in the sequence in which they were sent. See also packet; Transmission Control Protocol (TCP); Transmission Control Protocol/Internet Protocol (TCP/IP).

Internet Server Application Programming Interface (ISAPI)

An API for developing extensions to the Microsoft Internet Information Server and other HTTP servers that support ISAPI. See also application programming interface (API).

Internet service provider (ISP)

A company or educational institution that enables remote users to access the Internet by providing dial-up connections or installing leased lines.

Inter-object communication

COM is designed to allow clients to communicate transparently with objects, regardless of where those objects are running the same process, the same machine, or a different machine. This provides a single programming model for all types of objects, both object clients and object servers.

Interprocess communication (IPC)

The ability, provided by a multitasking operating system, of one task or process to exchange data with another. Common IPC methods include pipes, semaphores, shared memory, queues, signals, and mailboxes. See also named pipe; queue.

Intranet

A TCP/IP network that uses Internet technology. May be connected to the Internet. See also Internet; Transmission Control Protocol/Internet Protocol (TCP/IP).

IP

See Internet Protocol.

IP address

Used to identify a node on a network and to specify routing information. Each node on the network must be assigned a unique IP address, which is made up of the network ID, plus a unique host ID assigned by the network administrator. This address is typically represented in dotted-decimal notation, with the decimal value of each octet separated by a period (for example, 138.57.7.27). In Windows NT, the IP address can be configured statically on the client or configured dynamically through DHCP. See also Dynamic Host Configuration Protocol (DHCP).

IP router

A computer connected to multiple physical TCP/IP networks that can route or deliver IP packets between the networks. See also gateway.

IPC

See interprocess communication.

IPX/SPX

Transport protocols used in Novell NetWare and other networks. For Windows 95, the NWLINK.VXD module is used to implement the IPX/SPX-compatible protocol.

ISAM (Indexed Sequential Access Method)

A scheme for decreasing the time necessary to locate a data record within a large database, given a unique key for the record. The key is the field in the record used to reference the record.

ISDN

See Integrated Services Digital Network.

ISO

See International Organization for Standardization.

ISP

See Internet service provider.

IUnknown interface

The IUnknown interface lets clients get pointers to other interfaces on a given object through the IUnknown::QueryInterface method, and manage the existence of the object through the IUnknown::AddRef and IUnknown::Release methods. All other Component Object Model (COM) interfaces are inherited, directly or indirectly, from IUnknown. Therefore, the three methods in IUnknown are the first entries in the vtable for every interface.

J

Java

Java is an object-oriented programming language that provides cross-platform capability and gives developers access to end-users across a variety of computer platforms. Its support for interactive, downloadable applets enables increasingly attractive and useful Web pages.

Java Virtual Machine

Java applications rely on a system's Java virtual machine (VM). Java-compatible applets and applications that run on every platform that runs a Java Virtual Machine or in any Java-enabled browser.

JavaScript

The JavaScript language is a non-standard scripting language that is expected to be standardized soon, and will have support from Microsoft and Netscape. JScript is the Microsoft implementation of the JavaScript scripting language. It is a full implementation, plus some enhancements that take advantage of capabilities of Microsoft Internet Explorer.

Jet Engine

The Microsoft Jet Engine ships with Microsoft Access, the Microsoft Visual Basic programming system, Microsoft Excel, and Microsoft Visual C++. It can not be purchased as a stand-alone product.

K

Kernel

The portion of Windows that manages the processor.

Kernel mode

Kernel mode refers to a mode of code execution in which the code is protected by the processor architecture.

L

LAN

See local area network.

Late binding

When a program must determine at run time whether an object will actually have the methods you called using the object variable. Although late binding is the slowest way to invoke the properties and methods of an object, there are times when it is necessary. For example, you may write a function that can act on any of three different objects. The variable that contains the object reference cannot be declared with a specific class type.

Latency

Network latency is the time it takes for a packet of data to travel between two computers.

LDAP (Lightweight Directory Access Protocol)

A protocol for clients to query and manage information in a Directory Service over a TCP connection (port 389). The LDAP protocol was designed by University of Michigan to provide access to the X.500 Directory while not incurring the resource requirements of the Directory Access Protocol (DAP). This makes it very suitable for use on the Internet.

Legacy

Hardware and device cards that don't conform to the Plug and Play standard.

Legacy system

Legacy systems refer to systems such as Unix and IBM Mainframe systems and other existing production systems that can be integrated with new tools for faster response time, lower costs, easier maintainability, and greater end-user productivity.

Linked object

A representation or placeholder for an object that is inserted into a destination document. The object still exists in the source file and, when it is changed, the linked object is updated to reflect these changes.

List box

In a dialog box, a box that lists available choicesfor example, a list of all files in a directory. If all the choices do not fit in the list box, there is a scroll bar.

List view

A specialized list control that displays a set of objects. Users can view objects in iconic form (by displaying their large icons or small icons, as listed in the registry), as a list or as a table.

Local Area Network (LAN)

Computers connected in a geographically close network, such as in the same building or campus.

Localization

The process of translating software, Help, and online or printed documentation into another language appropriate for other locales, customs , or cultures.

Log off

To stop using the network and remove your user name from active use until you log on again.

Log on

To provide a user name and password that identifies you to the network.

Long file name

A folder name or file name longer than the 8.3 file name standard (up to eight characters followed by a period and a three-character extension) of the FAT file system. Windows NT Server automatically translates long names of files and folders to 8.3 names for MS-DOS users.

LSAPI (License Service Application Programming Interface)

An API set used to automate software licensing and reduce the burden of implementing custom licensing systems.

M

MAPI (Messaging Application Programming Interface)

A set of functions that is part of the Win32 API that applications use to create, manipulate, transfer, and store various kinds of communications, such as e-mail messages. It provides application development tools for defining message purpose and content, and allows flexible management of stored messages. MAPI also provides a common development interface for creating communication-enabled and communication-aware applications independent of the underlying messaging system.

MAPI Messaging Subsystem

A part of the Windows operating system that responds to the API calls and performs the requested actions. It is called a subsystem because it is a set of code that is a subset of the entire operating system.

Marshaling

In OLE, the process of packaging and sending interface parameters across process boundaries. See also Remote Procedure Call (RPC).

MDI (Multiple Document Interface)

The standard user-interface architecture for Windows-based applications. A multiple document interface application enables the user to work with more than one document at the same time. Each document is displayed within the client area of the application's main window.

Memory

A temporary storage area for information and programs. See also expanded memory; extended memory.

Menu bar

The horizontal bar containing the names of all the program's menus . It appears below the title bar.

Message Queue

A message queue holds messages for an application based on the receipt of messages sent by system components. Each message is generated based on an action, or event, that occurs on the system.

Messaging

Messaging allows programs to communicate with other application programs.

Messaging Application Program Interface (MAPI)

See MAPI.

Method

In object-oriented programming, a procedure that provides access to an object's data.

MFC (Microsoft Foundation Classes)

MFC is the class library of choice for creating world-class Windows-based applications for Windows 95 and Windows NT. Applications built with the included 120,000 lines of MFC source can be ported to many varieties of Unix, MS-DOS, Win32s, OS/2, and others using third-party tools.

Microsoft Windows Common Controls

A predefined in Windows component that supports various standard Windows controls.

MSF

(The Microsoft Solutions Framework) is a flexible interrelated series of models that guide an organization through the process of assembling the resources, people, and techniques needed to ensure that their technology infrastructure and solutions meet their business objectives

MTS (Microsoft Transaction Server)

Microsoft Transaction Server (MTS) is a component-based model and run-time environment that simplifies the task of developing application components by allowing you to perform work by using transactions. These application components implement business rules and run from the middle tier in a three-tier application.

Multiprocessing

A multiprocessing computer can execute multiple threads simultaneously , one thread for each processor in the computer. A multitasking operating system only appears to execute multiple threads at the same time; a multiprocessing operating system actually does so.

Multitasking

Multitasking is the ability of a computer to run more than one program, or task, at the same time. Multitasking contrasts with single-tasking, where one process must entirely finish before another can begin.

N

Named pipe

An interprocess communication (IPC) mechanism that allows one process to communicate with another local or remote process.

NDIS

See Network Device Interface Specification.

Nested object

An object embedded within another object.

NetBEUI

A network protocol usually used in small, department- size local area networks of 1 through 200 clients. It can use Token Ring source routing as its only method of routing. See also router.

NetBEUI transport

NetBIOS (Network Basic Input/Output System) Extended User Interface.

A local area network transport protocol provided with Windows 95. See also NetBIOS interface.

NetBIOS (network basic input/output system)

See Network Basic Input/Output System.

NetBIOS interface

A programming interface that allows I/O requests to be sent to and received from a remote computer. It hides networking hardware from programs.

Network

Two or more computers that are connected together by cables and that are running software enabling them to communicate with one another.

Network adapter card

An expansion card or other device used to connect a computer to a local area network (LAN).

Network adapter driver

Software that coordinates communication between the network adapter and the computer's hardware and other software, controlling the physical function of the network adapters.

Network Basic Input/Output System (NetBIOS)

An application programming interface (API) that can be used by applications on a local area network. NetBIOS provides applications with a uniform set of commands for requesting the lower-level services required to conduct sessions between nodes on a network and to transmit information back and forth.

Network Layer

The third layer in the OSI model. This layer is responsible for addressing messages and translating logical addresses and names into physical addresses. This layer also determines the route from the source to the destination computer. It determines which path the data should take based on network conditions, priority of service, and other factors. It also manages traffic problems such as switching, routing, and controlling the congestion of data packets on the network.

Network News Transfer Protocol (NNTP)

The protocol used to distribute network news messages to NNTP servers and to NNTP clients (news readers) on the Internet. NNTP provides for the distribution, inquiry, retrieval, and posting of news articles by using a reliable stream-based transmission of news on the Internet. NNTP is designed so that news articles are stored on a server in a central database, thus enabling a user to select specific items to read. Indexing, cross-referencing, and expiration of aged messages are also provided. Defined in RFC 977.

Network protocol

Software that enables computers to communicate over a network. TCP/IP is a network protocol, used on the Internet. See also Transmission Control Protocol/Internet Protocol (TCP/IP).

NNTP

See Network News Transfer Protocol.

NTFS

See Windows NT file system.

NWLink IPX/SPX compatible transport

A standard network protocol that supports routing, and can support NetWare client/server applications, where NetWare-aware Sockets-based applications communicate with IPX/SPX Sockets-based applications. See also IPX/SPX.

O

Object

1. An entity or component, identifiable by the user, that may be distinguished by its properties, operations, and relationships. 2. Any piece of information, created by using a Windows-based program with OLE capabilities that can be linked or embedded into another document.

OCX control

See ActiveX control.

ODBC

See Open Database Connectivity.

OEM (Original Equipment Manufacturer)

An OEM Service Release is an updated version of a product for PC manufacturers (OEMs) to preinstall on new PCs.

OLE

The name that describes the technology and interface for object interaction. A way to transfer and share information between programs.

OLE Container

An application that can incorporate embedded or linked items into its own documents. The documents managed by a container application are able to store and display OLE Visual Editing items as well as data created by the application itself. A container application allows users to insert new items or edit existing items. See also server application.

OLE DB

OLE DB is a specification for a set of data access interfaces designed to enable a multitude of data stores, of all types and sizes, to work seamlessly together. These interfaces comprise an industry standard for data access and manipulation that can ensure consistency and interoperability in a heterogeneous world of data and data types.

OLE Drag and Drop

An event that occurs when an OLE object is dragged from one container to another.

OLE object

A discrete unit of data that has been supplied by an OLE programfor example, a worksheet, module, chart, cell , or range of cells .

OLE Structured Storage

See Structured Storage.

OLE verbs

Verbs are the actions (such as Edit, Open, or Play) that a user can perform on an object.

OOP (Object-Oriented Programming)

In traditional procedural languages (such as C, Fortran, and COBOL) code and data are separate. In the object-oriented approach, code and data that belong together can be combined into objects. Object-oriented design is further characterized by the use of inheritance (derived classes), polymorphism, encapsulation, and virtual functions (C++) in programming.

Open Database Connectivity (ODBC)

ODBC is an application programming interface that enables applications to access data from a variety of existing data sources.

Open Systems Interconnection (OSI) reference model

A seven-layer architecture that standardizes levels of service and types of interaction for computers exchanging information through a communications network. It is used to describe the flow of data between the physical connection to the network and the end-user program. This model is the best known and most widely used model to describe networking environments.

OSI

See Open Systems Interconnection model.

OSR

OEM Service Release.

Out-of-process server

A server, implemented as an .EXE application, which runs outside the process of its client, either on the same machine or a remote machine.

P

Packet

A transmission unit of fixed maximum size that consists of binary information representing both data and a header containing an ID number, source and destination addresses, and error-control data.

Page

In memory, a fixed-size block.

Page fault

In the processor, a page fault occurs when a process refers to a virtual memory page that is not in its working set in main memory. A hard page fault occurs when data that a program needs is not found in its working set (the physical memory visible to the program) or elsewhere in physical memory, and must be retrieved from disk. A page fault will not cause the page to be fetched from disk if that page is on the standby list, and hence already in main memory, or if it is in use by another process with which the page is shared. In this case, a soft page fault occurs.

Paging file

A special file on a PC hard disk. Also called a swap file.

Paging

Memory contention arises when the memory requirements of the active processes exceed the physical memory available on the system; at this point, the system is out of memory. To handle this lack of memory the system uses a process called paging, which is moving portions of active processes to disk in order to reclaim physical memory.

Partition

A portion of a physical disk that functions as though it were a physically separate unit. See also system partition.

Password

A unique string of characters that must be provided before logon or access to a resource or service is authorized. A password is a security measure used to restrict logons to user accounts and access to computer systems and resources.

Path

Specifies the location of a file within the directory tree.

PC

Any personal computer (such as an IBM PC or compatible) using the MS-DOS, OS/2, Windows, Windows for Workgroups, Windows 95, Windows NT Server, or Windows NT Workstation operating systems.

Peer

Any of the devices on a layered communications network that operate on the same protocol level.

Peer Web Services

A collection of services that enable the user of a computer running Windows NT Workstation to publish a personal Web site from the desktop. The services include the WWW service, the FTP service, and the Gopher service.

Peer-to-peer network

A network configuration in which devices operate on the same communications level. In other words, each station can operate as both a client and a server.

Perl

Practical Extraction and Report Language. A scripting (programming) language that is frequently used for CGI scripts.

Physical Layer

The first (bottommost) layer of the OSI model. This layer addresses the transmission of the unstructured raw bitstream over a physical medium (that is, the networking cable). The Physical layer relates the electrical/optical, mechanical, and functional interfaces to the cable. The Physical layer also carries the signals that transmit data generated by all the higher layers.

Ping

A command used to verify connections to one or more remote hosts. The ping utility uses the ICMP echo request and echo reply packets to determine whether a particular IP system on a network is functional. The ping utility is useful for diagnosing IP network or router failures.

Pipe

A portion of memory that can be used by one process to pass information along to another. It connects two processes so that the output of one can be used as the input to the other.

Plug and Play

Plug and Play allows an operating system to make changes to personal computer configuration with no intervention by the user. For Plug and Play-compliant devices, the installation is automaticplug the device in, turn on the system, and it works.

Pointer

A variable that contains a memory address.

Point-to-Point Protocol (PPP)

An industry standard that is part of Windows 95 Dial-Up Networking to ensure interoperability with remote access software from other vendors .

Polymorphism

The concept of a single interface for multiple functions. For example, different classes can each contain a function called print that prints data in a format appropriate for objects of that class. The compiler selects the appropriate print function for each call to print.

POP

See Post Office Protocol.

Pop-up menu

See context menu.

Port

A location used to pass data in and out of a computing device. This term can refer to an adapter card connecting a server to a network, a serial 232 port, a TCP/IP port, or a printer port.

Post Office Protocol (POP)

The Post Office Protocol version 3 (POP3) is a protocol that permits a workstation to dynamically access a mail drop on a server in a useful fashion. Usually, this means that a POP3 server is used to allow a workstation to retrieve mail that an SMTP server is holding for it. POP3 is specified in RFC 1725.

Postoffice

A temporary message store, holding the message until the recipient's workstation retrieves it. The postoffice exists as a directory structure on a server and has no programmatic components.

POTS

Acronym for plain-old telephone service. Also an acronym for point of termination station, which refers to where a telephone call terminates.

PPP

See Point-to-Point Protocol.

Preemptive multitasking

An operating system scheduling technique that allows the operating system to take control of the processor at any instant, regardless of the state of the currently running program. Preemption guarantees better response to the user and higher data throughput

Presentation Layer

The sixth layer of the OSI model. It determines the form used to exchange data between networked computers. It can be viewed as the network's translator. At the sending computer, this layer translates data from a format sent down from the Application layer into a commonly recognized intermediary format. At the receiving end, this layer translates the intermediary format into a format useful to that computer's Application layer. The Presentation layer also manages network security issues by providing services such as data encryption. It also provides rules for data transfer as well as data compression to reduce the number of bits that have to be transmitted.

Priority Class

A priority class defines the basic priority at which the application will run. These can be realtime, high, normal, or low. The priority model within Windows includes 32 priority levels.

Priority Level

Windows supports 32 priority levels which can be assigned to particular threads. Sixteen of these priority levels are variable; that is, the scheduler adjusts your priority up and down as events occur. Sixteen levels are fixed priority or "real-time" where the operating system cannot adjust the priority level. The Win32 API allows access to both the variable and fixed priority classes and to most of the 16 priorities in each level.

Process

An object type which consists of an executable program, a set of virtual memory addresses, and one or more threads.

Program file

A file that starts a program. A program file has an EXE, PIF, COM, or BAT filename extension.

ProgressBar control

Shows the completion percentage of a particular process by filling from left to right

Property

Attribute or characteristic of an object used to define its state, appearance, or value.

Protected-Mode drivers

Protected-mode drivers (also known as virtual device drivers, or VxDs) allow for faster, shared access to devices with better memory utilization than real-mode drivers.

Protocol

A set of rules and conventions by which two computers pass messages across a network. Networking software usually implements multiple levels of protocols layered one on top of another. Windows 95 includes NetBEUI, TCP/IP, and IPX/SPX-compatible protocols.

Proxy

A computer that listens to name query broadcasts and responds for those names not on the local subnet. The proxy communicates with the name server to resolve names and then caches them for a time period. In COM, an interface-specific object that packages parameters for methods in preparation for a remote method call. A proxy runs in the address space of the sender and communicates with a corresponding stub in the receiver's address space. See also stub and marshaling.

R

RAM

An acronym for random-access memory. RAM can be read from or written to by the computer or other devices. Information stored in RAM is lost when you turn off the computer. See also memory.

RAS

See Remote Access Service.

RDO (Remote Data Objects)

RDO objects and collections provide a framework for using code to create and manipulate components of a remote ODBC database system. Objects and collections have properties that describe the characteristics of database components and methods that you use to manipulate them. Using the containment framework, you create relationships among objects and collections, and these relationships represent the logical structure of your database system.

Real-mode driver

Real-mode drivers are created to run under the MS-DOS operating system. Real-mode drivers are not as secure or robust as protected-mode drivers.

Recordset

A set of records selected from a data source. The records can be from a table, a query, or a stored procedure that accesses one or more tables. A recordset can join two or more tables from the same data source, but not from different data sources. See also dynaset, result set, snapshot.

Reduced Instruction Set Computing (RISC)

A type of microprocessor design that focuses on rapid and efficient processing of a relatively small set of instructions. RISC architecture limits the number of instructions that are built into the microprocessor, but optimizes each so that it can be carried out very rapidlyusually within a single clock cycle.

Registry

The database repository for information about a computer's configuration. The registry supersedes use of separate INI files for all system components and programs that know how to store values in the registry.

Registry editor

A program, provided with Windows 95, that is used to view and edit entries in the registry.

Remote Access Service (RAS)

A service that provides remote networking for telecommuters, mobile workers, and system administrators who monitor and manage servers at multiple branch offices. Users with RAS on a Windows NTbased computer can dial in to remotely access their networks for services such as file and printer sharing, electronic mail, scheduling, and SQL database access.

Remote administration

Administration of one computer by an administrator located at another computer and connected to the first computer across the network.

Remote Procedure Call (RPC)

A message-passing facility that allows a distributed program to call services available on various computers in a network. Used during remote administration of computers, RPC provides a procedural view, rather than a transport-centered view, of networked operations.

Resource

Any part of a computer or a network, such as a disk drive, printer, or memory, that can be allotted to a program or a process while it is running. Users on a network can share computer resources, such as hard drives, printers, modems, CD-ROM drives, and even the processor.

Result set

In RDO, the data returned from a query is in the form of result sets, which can contain zero or more data rows composed of one or more columns.

Rich-text box

Similar to a multi-line edit control, but it adds additional functionality and support for individual character and paragraph formatting

RISC

See reduced instruction set computing.

Root directory

See directory tree.

Root storage object

The outermost storage object of a storage hierarchy. A root storage object can contain other nested storage and stream objects. For example, a compound document is saved on disk as a series of storage and stream objects within a root storage object. See also compound document, storage object, stream object.

Router

In network gateways, computers with two or more network adapters that are running some type of routing software, with each adapter connected to a different physical network. Used to connect LANs. Routers allow the two networks to be administered independently, yet to remain accessible to each other when communication is necessary. Routers connect networks at the Network layer of the OSI model.

RPC (Remote Procedure Call)

A widely used standard defined by the Open Software Foundation (OSF) for distributed computing. RPC enables one process to make calls to functions that are part of another process. The other process can be on the same computer or on a different computer on the network.

S

SAPI (Speech Application Programming Interface)

A Windows Open Systems Architecture element which allows essentially any speech engine to run on a Windows client or server PC.

Scheduling

Scheduling is the process of determining which thread has use of the processor.

Scope

In programming, the extent to which a given identifier (constant, variable, data type, routine) can be referenced within a program. See also class scope, file scope, function scope, function-prototype scope, local scope.

Scripting

Code that you write in a Web page. The script runs either on the client computer when a user interacts with a control, or on the Web server before the page is returned to the client.

Scroll

To move through text or graphics (up, down, left, or right) in order to see parts of the file that cannot fit on the screen.

Scroll bar

A bar that appears at the right or bottom edge of a window or list box whose contents are not completely visible. Each scroll bar contains two scroll arrows and a scroll box, which enable you to navigate through the contents of the window or list box.

SDI (Single Document Interface)

A user interface architecture that allows a user to work with just one document at a time. Windows Notepad is an example of an SDI application.

Secure Sockets Layer (SSL)

A protocol that supplies secure data communication through data encryption and decryption. SSL enables communications privacy over networks by using a combination of public key cryptography and bulk data encryption.

Serial Line IP (SLIP)

An industry standard that can be used with Windows 95 Dial-Up Networking to ensure interoperability with remote access software from other vendors.

Server

For a LAN, a computer running administrative software that controls access to all or part of the network and its resources. A computer acting as a server makes resources available to computers acting as workstations on the network. See also client.

Server object

An object that responds to a request for a service. A given object may be a client for some requests and a server for other requests. See also client object.

Server-side cursor

Cursors that reside on the server, as opposed to residing on the client computer. While client-side cursors copy the cursor to the workstation, server-side cursors use the resources of the database server to maintain the cursors

Service

A process that performs a specific system function and often provides an application programming interface (API) for other processes to call. If services are RPC-enabled, their API routines can be called from remote computers.

Service Provider Interface (SPI)

A Service Provider Interface (SPI) allows drivers to be written for a particular service.

Session Layer

The fifth layer of the OSI model. This layer allows two programs on different computers to establish, use, and end a connection called a session. This layer performs name recognition and the functions needed to allow two programs to communicate over the network, such as security functions. The Session layer provides synchronization between user tasks. This layer also implements dialog control between communicating processes, regulating which side transmits, the time and duration of transmission, and so on.

Share

To make resources, such as directories and printers, available to network users.

Share name

The name of a shared resource.

Shared resource

Any device, data, or program that is used by more than one other device or program. For Windows 95, refers to any resource that is made available to network users, such as directories, files, printers, and named pipes.

Simple Mail Transfer Protocol (SMTP)

A member of the TCP/IP suite of protocols that governs the exchange of electronic mail between message transfer agents .

Simple MAPI

Simple MAPI contains the 12 most common API calls and is designed to make it easy for developers to build powerful, custom messaging applications.

Slider control

Used to adjust intensity levels such as volume or brightness

SLIP

See Serial Line IP.

SMS

See Systems Management Server.

SNA

See System Network Architecture.

Socket

A bidirectional pipe for incoming and outgoing data between networked computers. The Windows Sockets API is a networking API used by programmers creating TCP/IP-based sockets programs.

Speech engine

Speech engines are drivers written to provide speech functionality in applications. They are available through third-party vendors, and often come bundled with sound cards or audio-enabled PCs. Microsoft also has its own speech recognition engine.

Speech recognition

Speech recognition enables users to speak to a computer, freeing them from keyboards and mice and helping to streamline the interactive process.

SQL

Acronym for structured query language, a database programming language used for accessing, querying, and otherwise managing information in a relational database system.

SQL-DMO

SQL-DMO enables developers to quickly and easily develop a range of useful, customized SQL Server administration tools and interfaces for a multiserver environment. The unique power and flexibility of SQL-DMO can be applied to the full range of database management and database definition tasks such as production, performance tuning, and graphical representation of databases.

SSL

See Secure Sockets Layer.

Status bar

A line of information related to the program in the window. Usually located at the bottom of a window. Not all windows have a status bar.

Storage objects

An object type used in OLE to implement compound files. Storage objects are analogous to directories in that they can contain other storage objects, or they can contain stream objects, which are analagous to files.

Stored procedure

A precompiled collection of SQL statements and optional control-of-flow statements stored under a name and processed as a unit. Stored procedures are stored within a database; can be executed with one call from an application; and allow user-declared variables, conditional execution, and other powerful programming features.

Stream objects

One of the object types used in OLE to implement compound files. Stream objects store data of any type. See also compound file, storage object.

String

A data structure composed of a sequence of characters, usually representing human-readable text.

Structured Storage

An OLE model that allows objects to control their own data storage, loading directly from and saving directly to disk.

Stub

An interface-specific object that unpackages the parameters for that interface after they are marshaled across the process boundary, and makes the requested method call. The stub runs in the address space of the receiver and communicates with a corresponding proxy in the sender's address space.

Sub procedure

In programming, a procedure written to perform a specific task. A Sub procedure does not return a value, whereas a Function can return a value.

Subkey

A key within a key. Subkeys are analogous to subdirectories in the registry hierarchy. Keys and subkeys are similar to the section heading in .ini files; however subkeys can carry out functions. See also key; registry.

Subnet Mask

A 32-bit value that allows the recipient of IP packets to distinguish the network ID portion of the IP address from the host ID.

Swapfile

A special file on your hard disk. With virtual memory under Windows 95, some of the program code and other information is kept in RAM while other information is temporarily swapped to virtual memory. When that information is required again, Windows 95 pulls it back into RAM and, if necessary, swaps other information to virtual memory. Also called a paging file.

Symmetric multiprocessing

When an operating system can use one or more processors in a computer. All processors are allowed to run a mixture of application and operating system code.

Syntax

The order in which you must type a command and the elements that follow the command.

System Network Architecture (SNA)

System Network Architecture is a communications framework developed by IBM. Microsoft System Network Architecture (SNA) is an optional solution that provides a gateway connection between personal computer LANs or WANs and IBM mainframe and AS/400 hosts. See also AS/400; gateway.

Systems Management Server

Part of the Microsoft BackOffice family of products. Systems Management Server includes desktop management and software distribution that significantly automates the task of upgrading software on client computers.

T

TAPI

See telephony application program interface.

TAPI (Telephony API)

See Telephony Application Programming Interface.

TCO (Total Cost of Ownership)

TCO defines the aggregate cost-impact of technology, including the cost of support personnel, user self-management , maintenance, and upgrade costs.

TCP

See Transmission Control Protocol.

TCP/IP

Transmission Control Protocol/Internet Protocol. The primary wide area network (WAN) transport protocol used in Windows 95 to communicate with computers on TCP/IP networks and to participate in UNIX-based bulletin boards and electronic mail services.

Telephony Application Program Interface (TAPI)

A set of calls that allows applications to control modems and telephones, by routing application function calls to the appropriate "service provider" DLL for a modem.

Telnet service

The service that provides basic terminal emulation to remote computers supporting the Telnet protocol over TCP/IP.

Terminate-and-stay-resident program (TSR)

A program running under MS-DOS that remains loaded in memory even when it is not running so that it can be quickly invoked for a specific task performed while any other program is operating.

Text file

A file containing only letters, numbers , and symbols. A text file contains no formatting information, except possibly linefeeds and carriage returns. A text file is an ASCII file.

Text-to-speech

Text-to-speech synthesizes speech from ANSI or Unicode text, allowing a Windows-based PC to talk to a user.

Thread

An executable entity that belongs to a single process, comprising a program counter, a user-mode stack, a kernel-mode stack, and a set of register values. All threads in a process have equal access to the processor's address space, object handles, and other resources. In Windows 95, threads are implemented as objects.

Throughput

See bandwidth.

Thunking

The transformation between 16-bit and 32-bit formats, which is carried out by a separate layer in the VM.

Time slice

The amount of processor time allocated to an application, usually measured in milliseconds .

Time-out

If a device is not performing a task, the amount of time the computer should wait before detecting it as an error.

Title bar

The horizontal bar (at the top of a window) that contains the title of the window or dialog box. On many windows, the title bar also contains the program icon and the Maximize, Minimize, and Close buttons.

Toolbar

A standard control that provides a frame for a series of shortcut buttons providing quick access to commands. Usually located directly below the menu bar. Not all windows have a toolbar.

Tooltips

A ToolTip is a small label, usually containing a description of the control's function, that is displayed when the mouse pointer is held over a control for a set length of time.

Transaction

A series of changes made to a database's data and schema. Mark the beginning of a transaction with the BeginTrans statement, commit the transaction by using the CommitTrans statement, and undo all your changes since BeginTrans by using the Rollback statement. Transactions are optional and can be nested up to five levels. Transactions increase the speed of operations that change data and enable you to reverse changes easily.

Transmission Control Protocol (TCP)

A connection-based Internet protocol responsible for breaking data into packets, which the IP protocol sends over the network. This protocol provides a reliable, sequenced communication stream for network communication. See also Internet Protocol (IP).

Transmission Control Protocol/Internet Protocol (TCP/IP)

A set of networking protocols that provide communications across interconnected networks made up of computers with diverse hardware architectures and various operating systems. TCP/IP includes standards for how computers communicate and conventions for connecting networks and routing traffic.

Transport Layer

The fourth layer of the OSI model. It ensures that messages are delivered error-free, in sequence, and with no losses or duplications. This layer repackages messages for their efficient transmission over the network. At the receiving end, the Transport layer unpacks the messages, reassembles the original messages, and sends an acknowledgment of receipt.

Tree control

A special list control that displays a set of objects hierarchically using an indented outline format. Plus and minus icons allow the user to expand and collapse the outline.

Trigger

A set of conditions that, when met, initiate an action. For example, before using Network Monitor to capture data from the network, you can set a trigger to stop the capture or to execute a program or command file.

TrueType fonts

Fonts that are scalable and sometimes generated as bitmaps or soft fonts, depending on the capabilities of your printer. TrueType fonts can be sized to any height, and they print exactly as they appear on the screen.

TSPI (Telephony Service Provider Interface)

An interface used to access components provided by manufacturers that translates between the generalized commands created by the TAPI service and the proprietary commands.

TSR

See terminate-and-stay-resident program.

U

UDA (Universal Data Access)

Together ADO and OLE DB form the foundation of the Universal Data Access strategy. OLE DB enables universal access to any data. ADO makes it easy for developers to program. Because ADO is built on top of OLE DB, it benefits from the rich universal data access infrastructure that OLE DB provides.

UDP (User Datagram Protocol)

UDP provides a connectionless, unreliable transport service. It is often used for one-to-many communications, using broadcast or multicast IP datagrams. As delivery of UDP datagrams is not guaranteed , applications using UDP must supply their own mechanisms for reliability if needed. Microsoft networking uses UDP for logon, browsing, and name resolution.

UNC

Universal naming convention. See also UNC names.

UNC names

Filenames or other resource names that begin with the string \\, indicating that they exist on a remote computer.

Unicode

A fixed-width, 16-bit character-encoding standard capable of representing the letters and characters of virtually all of the world's languages. Unicode was developed by a consortium of U.S. computer companies.

Uniform Data Transfer (UDT)

In OLE, a set of interfaces that allow data to be sent and received in a standard fashion, regardless of the actual method chosen to transfer the data.

Uniform Resource Locator (URL)

A naming convention that uniquely identifies the location of a computer, directory, or file on the Internet. The URL also specifies the appropriate Internet protocol, such as HTTP, FTP, IRC, or Gopher.

Uninterruptible Power Supply (UPS)

A battery-operated power supply connected to a computer to keep the system running during a power failure.

Universally Unique Identifier (UUID)

A unique identification string associated with the remote procedure call interface. Also known as a globally unique identifier (GUID).

UPS

See Uninterruptible Power Supply .

URL

See Uniform Resource Locator .

User Mode

Applications that run in user mode are not protected by the processor architecture as they are in Kernel Mode. They have access only to their own address space and must use established interfaces to obtain other system services. This protects the operating system and improves its performance.

UUID

See Universally Unique Identifier .

V

Variables

In programming, a variable is a named storage location capable of containing a certain type of data that can be modified during program execution.

VBA (Visual Basic for Applications)

Microsoft Visual Basic for Applications (VBA) is a powerful visual programming environment that is seamlessly integrated into another program, known as a "host." With VBA, users can easily extend or customize the behavior of the host by writing code using the popular Visual Basic programming language.

VDM

See Virtual DOS Machine .

Virtual DOS Machine (VDM)

Simulates an MS-DOS environment so that MS-DOS-based and Win16-based applications can run on Windows NT. Virtual DOS machines are also created in Windows 95 for MS-DOS applications.

Virtual Machine

A virtual machine is an environment in memory that, from the application's perspective, looks as if it is a separate computer, complete with all of the resources available on the physical computer that an application needs to run.

Virtual Machine (VM)

A complete MS-DOS environment and a console in which to run an MS-DOSbased program or 16-bit Windows-based programs. A VM establishes a complete virtual x86 (that is, 80386 or higher) computer running MS-DOS. Any number of VMs can run simultaneously. Also known as a virtual DOS machine.

Virtual memory

Virtual memory is an illusion that the operating system provides to simplify the application's view of memory. Applications treat virtual memory as though it were physical memory (RAM and disk space). Meanwhile, the operating system can move code and data in physical memory whenever necessary. In a virtual memory system, the addresses applications use to access memory are virtual addresses, not physical memory addresses. Every time an application attempts to accesses memory using a virtual address, the operating system secretly translates the virtual address into the physical address where the associated code or data actually resides in physical memory

Visual editing

The ability to edit an embedded object in place, without opening it into its own window.

VM

See virtual machine.

Volume

A partition or collection of partitions that have been formatted for use by a file system.

Volume set

A combination of partitions on a physical disk that appear as one logical drive.

VTBL

A table of function pointers, such as an implementation of a class in C++. The pointers in the VTBL point to the members of the interfaces that an object supports.

W

WAN

See wide area network.

Web browser

A software program, such as Microsoft Internet Explorer, that retrieves a document from a Web server, interprets the HTML codes, and displays the document to the user with as much graphical content as the software can supply.

Web server

A computer equipped with the server software to respond to HTTP requests, such as requests from a Web browser. A Web server uses the HTTP protocol to communicate with clients on a TCP/IP network.

What's This Help

Provides a link to a pop-up Help topic. It is implemented when the user selects What's This Help and clicks the What's This cursor on a control.

Wide Area Network (WAN)

Computer networks using long-range telecommunications links, allowing the computers to be networked over long distances.

Wildcard

A character that represents one or more characters. The question mark (?) wildcard can be used to represent any single character, and the asterisk (*) wildcard can be used to represent any character or group of characters that might match that position in other filenames.

Win32-based API

A 32-bit application programming interface for both Windows 95 and Windows NT. It updates earlier versions of the Windows API with sophisticated operating system capabilities, security, and API routines for displaying text-based programs in a window.

Windows Internet Name Service (WINS)

A name resolution service that resolves Windows networking computer names to IP addresses in a routed environment. A WINS server, which is a Windows NT Server-based computer, handles name registrations, queries, and releases.

Windows Open Services Architecture (WOSA)

An open set of APIs for integrating Windows-based computers with back-end services on a broad range of vendor's systems. WOSA consists of an extensible set of APIs that enable Windows-based desktop applications to access available information without having to know anything about the type of network in use, the types of computers in the enterprise, or types of back-end services available. As a result, if the network computers or services change, the desktop applications built by using WOSA will not require rewriting.

Windows Sockets

See Socket.

Windows Telephony

Telephone services used in Windows including: Public Service Telephone Network (PSTN), proprietary PBXs, key systems, cellular systems, and Integrated Service Digital Network (ISDN) facilities vary across service networks and switches.

Windows NT

The portable, secure, 32-bit, preemptive-multitasking member of the Microsoft Windows operating system family. Windows NT Server provides centralized management and security, advanced fault tolerance, and additional connectivity. Windows NT Workstation provides operating system and networking functionality for computers without centralized management.

Windows NT file system (NTFS)

An advanced file system designed for use specifically with the Windows NT operating system. NTFS supports file system recovery and extremely large storage media, in addition to other advantages. It also supports object-oriented programs by treating all files as objects with user-defined and system-defined attributes.

WinInet API

The WinInet API is an extension of the Win32 API that provides Win32 applications with easy access to common Internet protocols, including Gopher, FTP, and HTTP. By providing task-focused interfaces for Internet access, WinInet simplifies Internet access for Win32 developers.

WINS

See Windows Internet Name Service.

Wizard

A special form of user assistance that guides the user through a difficult or complex task within an application.

Workgroup

A collection of computers that are grouped for viewing purposes and for sharing resources. Each workgroup is identified by a unique name. See also domain and peer-to-peer network.

Workstation

In general, a powerful computer having considerable calculating and graphics capability. 2. A computer that accesses shared network resources provided by another computer (called a server). See also client.

World Wide Web (WWW)

The software, protocols, conventions, and information that enable hypertext and multimedia publishing of resources on different computers around the world. See also Hypertext Markup Language (HTML); Internet.

WOSA

See Windows Open Services Architecture.

WYSIWYG

An acronym used in Windows terminology: "What you see is what you get."



Microsoft Windows Architecture Training
Microsoft Windows Architecture for Developers Training Kit
ISBN: B00007FY9D
EAN: N/A
Year: 1998
Pages: 324

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net