A process by which a DNS resolver appends one or more domain names to an unqualified domain name, making it a fully qualified domain name, and then submits the fully qualified domain name to a DNS server.
A service, such as that provided by WINS or DNS, that allows friendly names to be resolved to an address, or other specially defined resource data used to locate network resources of various types and purposes. See also Domain Name System (DNS); Windows Internet Name Service (WINS).
A synthesized text-to-speech tool for users who have low vision. Narrator reads aloud most of what the screen displays.
The condition in which all domain controllers in a domain are running Windows 2000 and a domain administrator has switched the domain operation mode from mixed mode to native mode.
A type of minidriver that interfaces network class devices to NDIS.
A Windows 2000 capability available only in native mode that allows the creation of groups within groups. See also group; native mode.
A service that runs in the Windows 2000 security subsystem in user mode, and performs the following functions; Replication of Windows NT 3.x and Windows NT 4.0 backup domain controllers with the Windows 2000 PDC emulator; NTLM pass-through authentication; Periodic password updates for computer accounts and interdomain trust relationships; Domain controller discovery using NetBIOS naming for non-directory-aware domain controllers (domain controllers that run Windows NT 3.5 and Windows NT 4.0); Domain controller discovery in closest site using NetBIOS naming or DNS naming for directory-aware domain controllers (domain controllers that run Windows 2000).
See definition for NetBIOS Extended User Interface (NetBEUI).
A network protocol native to Microsoft Networking. It is usually used in small, department-size local area networks (LANs) of 1 to 200 clients. It can use Token Ring source routing as its only method of routing. It is the Microsoft implementation of the NetBIOS standard. See also local area network (LAN); network basic input/output system (NetBIOS); protocol.
A feature that provides the NetBIOS programming interface over the TCP/IP protocol. It is used for monitoring routed servers that use NetBIOS name resolution.
Novell's network operating system.
A device that connects your computer to a network. This device is sometimes called an adapter card or network interface card.
An application programming interface (API) that can be used by programs on a local area network (LAN). NetBIOS provides programs with a uniform set of commands for requesting the lower-level services required to manage names, conduct sessions, and send datagrams between nodes on a network. See also application programming interface (API); basic input/output system (BIOS); local area network (LAN); node.
A device driver that works directly with the network card, acting as an intermediary between the card and the protocol driver. See also device driver.
A protocol within the PPP protocol suite that negotiates the parameters of an individual LAN protocol such as TCP/IP or IPX. See also Internetwork Packet Exchange (IPX); local area network (LAN); Point-to-Point Protocol (PPP); Transmission Control Protocol/Internet Protocol (TCP/IP).
A Microsoft/3Com specification establishing a common shared interface for Microsoft operating systems to support protocol-independent transport of multiple network transport protocols (such as TCP/IP, NetBEUI, IPX/SPX, and AppleTalk). NDIS allows more than one transport protocol to be bound and to operate simultaneously over a single network adapter. See also Internetwork Packet Exchange (IPX); Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX); NetBIOS Extended User Interface (NetBEUI); Transmission Control Protocol/Internet Protocol (TCP/IP).
A service for distributed computing systems that provides a distributed file system, eliminating the need for keeping multiple copies of files on separate computers.
A users who manages network and information security. A network security administrator should implement a security plan that addresses network security threats.
For tree structures, a location on the tree that can have links to one or more items below it.
For local area networks (LANs), a device that is connected to the network and is capable of communicating with other network devices. See also local area network (LAN).
An object that cannot logically contain other objects. For example, a file is a noncontainer object. See also container object; object.
A basic security function of cryptography that ensures that a party in a communication cannot falsely deny that a part of the communication occurred. Without nonrepudiation, someone can communicate and then later deny the communication or claim that the communication occurred at a different time.
A file attribute whose value is contained in one or more runs, or extents, outside the master file table (MFT) record and separate from the MFT. See also master file table (MFT).
A type of trust relationship that is bounded by the two domains in the relationship. For example, if domain A trusts domain B and domain B trusts domain C, there is no trust relationship between domain A and domain C.
Nontransitive trusts can be one-way or two-way relationships. This is the only type of trust that can exist between a Windows 2000 domain and a Windows NT domain or between Windows 2000 domains in different forests. See also forest.
A backup that copies all selected files and marks each file as having been backed up (in other words, the archive attribute is cleared). With normal backups, you need only the most recent copy of the backup file or tape to restore all of the files. You usually perform a normal backup the first time you create a backup set. See also copy backup; daily backup; differential backup; incremental backup.
The area on the taskbar to the right of the taskbar buttons. The notification area displays the time and can also contain shortcuts that provide quick access to programs, such as Volume Control and Power Options. Other shortcuts can appear temporarily, providing information about the status of activities. For example, the printer shortcut icon appears after a document has been sent to the printer and disappears when printing is complete.
A device that terminates an ISDN line at the connection location, commonly through a connection port.
An advanced file system that provides performance, security, reliability, and advanced features that are not found in any version of FAT. For example, NTFS guarantees volume consistency by using standard transaction logging and recovery techniques. If a system fails, NTFS uses its log file and checkpoint information to restore the consistency of the file system. In Windows 2000 and Windows XP, NTFS also provides advanced features such as file and folder permissions, encryption, disk quotas, and compression. See also FAT32; file allocation table (FAT); file system.
A security package that provides authentication between clients and servers.
A challenge/response authentication protocol. The NTLM authentication protocol was the default for network authentication in Windows NT version 4.0 and earlier and Windows Millennium Edition and earlier. The protocol continues to be supported in Windows 2000 and Windows XP but no longer is the default.
Special cabling that eliminates the modem's need for asynchronous communications between two computers over short distances. A null modem cable emulates modem communication.
An implementation of the Internetwork Packet Exchange (IPX), Sequenced Packet Exchange (SPX), and NetBIOS protocols used in Novell networks. NWLink is a standard network protocol that supports routing and can support NetWare client-server applications, where NetWare-aware Sockets-based applications communicate with IPX/SPX Sockets-based applications. See also Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX); network basic input/output system (NetBIOS); Routing Information Protocol over IPX (RIPX).