Entah mengapa import database informix pakai dbimport lama sekali, bisa jadi database di mesin yang jadi tujuan import belum di tuning, atau spek servernya yang lemot. Saya sedang melakukan percobaan export database yang ada di database mesin HP dengan OS HP-UX 64 bit, dan di import ke mesin IBM x3400 dengan Linux CentOS 5.1 64 bit juga.
Keraguan yang mendalam ini, akhirnya dapat sedikit banyak pencerahan setelah mencurahkan isi hati di milist IIUG (International Informix User Group) yang merupakan milist yang menyatukan pecinta "Ayat Ayat Informix".
Alhamdulillah yang jawab ternyata sang dedengkot Informix, Mas Art Kagel, karena sebelum saya pakai perintah dbimport untuk import database, maka di sarankan sama Mas Kagel untuk menggunakan software buatannya sendiri yaitu myexport/myimport.
Dicari sana kemari search di Abah google belum menemukan langkah-langkah yang valid untuk instalasi myexport/myimport ini. Yang baru diketahui adalah myexport/myimport ini butuh software pendukung seperti: utils2_ak, myonpload, dan sqlcmd. Agar bisa mencari dan mendownload software tsb diharuskan login dulu ke IIUG.
Setelah mengunduh semua software yang dibutuhkan di situs IIUG (www.iiug.org), akhirnya dimulailah instalasi software2 tersebut. Aarrgghhh!!! Error.... menyebalkan!!! ternyata butuh ESQL/C. Artinya harus install clientsdk dahulu agar esql/c bisa ada di server.
Nah, ini langkah2 yang saya lakukan:
Pertamaxxx, install dulu clientsdk informix-nya. Karena saya menggunakan os linux centos5.1 64 bit, maka tentunya di instal clientsdk yang untuk linux yang 64 bit. Tujuan clientsdk diinstal ini agar diperoleh eqsl/c.
Kedua, install sqlcmd, ekstrak sqlcmd-85.00.tgx --> $ tar zxvf sqlcmd-85.00.tgz , masuk ke direktori sqlcmd --> $ cd /sqlcmd-85.00 , karena saya menggunakan linux 64 bit, dijalankan --> $ CC="gcc -m64" ./configure , jalankan --> $ make , kemudian login sebagai root & jalankan --> # make install
Ketiga, install myonpload, ekstrak myonpload_2.1.zip --> $ gunzip myonpload_2.1.zip , lalu kompilasi myonpload.ec --> $ esql -o myonpload myonpload.ec
Keempat, install utils2_ak, ekstrak utils2_ak.gz --> $ gunzip utils2_ak.gz , unpack file utils2_ak --> $ sh utils2_ak , lalu kompilasi dengan menjalankan --> $ make
Kelima, install myexport/myimport, ekstrak myexport.shr.gz --> $ gunzip myexport.shr.gz , unpack file myexport.shr --> $ sh myexport.shr , akan muncul file myexport dan myimport yang belum di beri ijin eksekusi, jadi harus dijalankan --> $ chmod +x myexport dan $ chmod +x myimport
Jangan lupa juga untuk nge-PATH semua file eksekusi myexport/myimport, sqlcmd, utils2_ak dan myonpload- nya.
Dan, Alhamdulillah, berhasil sudah menjalankan myexport dan myimport yang merupakan alternatif export dan import bawaannya informix yaitu dbexport dan dbimport. Katanya sih export dan import lebih cepat dengan myexport/myimport ini karena proses kerjanya paralel.
Saya punya ukuran total database 7 GB telah makan waktu dbimport sekitar 7 jam. Nah skrg sedang dicoba dilakukan myimport dengan ukuran 7 GB juga. Saya mau buktikan apakah pernyataan sang jagoan Informix (Art Kagel) benar atau tidak ?
Kamis, 08 Mei 2008
Kamis, 13 Maret 2008
Windows Server 2003 - Changing group memberships
A group is a collection of users that you can use to simplify the administration of user permissions and rights. In addition, you can use a group to delegate administrative tasks, filter Group Policy settings, and create e-mail distribution lists. Users belonging to a particular group receive all the permissions and rights assigned to that group. By changing group memberships for a user, you can quickly change the resources to which that user has access, as well as the tasks delegated to the user and the Group Policy settings that apply to the user. You can change the membership of Active Directory groups to change users’ permissions and rights within a domain or forest. You can also change the membership of local groups to change users’ permissions and rights on a specific computer.
Some of the most common tasks are adding or removing members from Active Directory groups and adding or removing members from groups on a local computer. You can also use the command line to change group memberships, either in a domain or on a local computer. For more information about other tasks for managing group memberships in a domain, see Manage groups. For more information about other tasks for managing group memberships on a local computer, see Manage local groups.
To add or remove a member from an Active Directory group
1. Open 'Active Directory Users and Computers'.
2. In the console tree, double-click the domain node.
3. Click the folder that contains the group to which you want to add or remove a member.
4. In the details pane, right-click the group, and then click Properties.
5. Click the Members tab, and then do one of the following:
- To add a member to a group, click Add. In Enter the object names to select, type the name of the user, group, or computer that you want to add to the group, and then click OK.
- To remove a member from a group, click the member you want to remove, and then click Remove.
Notes
- To perform this procedure, you must be a member of the Account Operators group, Domain Admins group, or the Enterprise Admins group in Active Directory, or you must have been delegated the appropriate authority. As a security best practice, consider using Run as to perform this procedure.
- To open Active Directory Users and Computers, click Start, point to Settings, click Control Panel, double-click Administrative Tools, and then double-click Active Directory Users and Computers.
- In addition to users and computers, groups can include contacts and other groups.
- To add members to a group, you can click the members you want to add, click on the toolbar, and then type the name of the group to which they will be added. You can also drag a member object to a group, or right-click the object, and then click Add to a group from the shortcut menu.
- When you administer a domain, security principals in the parent domain or other trusted domains are not visible on the Member Of tab of a domain users properties. The only domain accounts that you can add or view are the present domain groups. Only domain groups in the present domain are shown, even if the member belongs to other trusted domain groups.
To add or remove a member from a group on a local computer
1. Open 'Computer Management'
2. In the console tree, click System Tools>Local Users and Groups>Groups.
3. Right-click the group to which you want to add or remove a member and click Properties.
4. Do one of the following:
- To add a member to a group, click Add. In Enter the object names to select, type the name of the user, group, or computer that you want to add to the group, and then click OK.
- To remove a member from a group, click the member you want to remove, and then click Remove.
Notes
- To perform this procedure, you must be a member of the Account Operators group, Domain Admins group, or the Enterprise Admins group in Active Directory, or you must have been delegated the appropriate authority. As a security best practice, consider using Run as to perform this procedure.
- To open Computer Management, click Start, point to Settings, click Control Panel, double-click Administrative Tools, and then double-click Computer Management.
- A user who belongs to a group has all the rights and permissions granted to that group. If a user is a member of more than one group, then the user has all the rights and permissions granted to every group he or she belongs to. For more information, see Understanding local groups.
- You should not add a new user to the Administrators group unless the user will perform only administrative tasks. For more information, see Why you should not run your computer as an administrator.
- If the computer participates in a domain, you can add user accounts and global groups from that domain and from trusted domains to a local group.
From: Help and Support Center - Windows Server 2003, Standard Edition
Some of the most common tasks are adding or removing members from Active Directory groups and adding or removing members from groups on a local computer. You can also use the command line to change group memberships, either in a domain or on a local computer. For more information about other tasks for managing group memberships in a domain, see Manage groups. For more information about other tasks for managing group memberships on a local computer, see Manage local groups.
To add or remove a member from an Active Directory group
1. Open 'Active Directory Users and Computers'.
2. In the console tree, double-click the domain node.
3. Click the folder that contains the group to which you want to add or remove a member.
4. In the details pane, right-click the group, and then click Properties.
5. Click the Members tab, and then do one of the following:
- To add a member to a group, click Add. In Enter the object names to select, type the name of the user, group, or computer that you want to add to the group, and then click OK.
- To remove a member from a group, click the member you want to remove, and then click Remove.
Notes
- To perform this procedure, you must be a member of the Account Operators group, Domain Admins group, or the Enterprise Admins group in Active Directory, or you must have been delegated the appropriate authority. As a security best practice, consider using Run as to perform this procedure.
- To open Active Directory Users and Computers, click Start, point to Settings, click Control Panel, double-click Administrative Tools, and then double-click Active Directory Users and Computers.
- In addition to users and computers, groups can include contacts and other groups.
- To add members to a group, you can click the members you want to add, click on the toolbar, and then type the name of the group to which they will be added. You can also drag a member object to a group, or right-click the object, and then click Add to a group from the shortcut menu.
- When you administer a domain, security principals in the parent domain or other trusted domains are not visible on the Member Of tab of a domain users properties. The only domain accounts that you can add or view are the present domain groups. Only domain groups in the present domain are shown, even if the member belongs to other trusted domain groups.
To add or remove a member from a group on a local computer
1. Open 'Computer Management'
2. In the console tree, click System Tools>Local Users and Groups>Groups.
3. Right-click the group to which you want to add or remove a member and click Properties.
4. Do one of the following:
- To add a member to a group, click Add. In Enter the object names to select, type the name of the user, group, or computer that you want to add to the group, and then click OK.
- To remove a member from a group, click the member you want to remove, and then click Remove.
Notes
- To perform this procedure, you must be a member of the Account Operators group, Domain Admins group, or the Enterprise Admins group in Active Directory, or you must have been delegated the appropriate authority. As a security best practice, consider using Run as to perform this procedure.
- To open Computer Management, click Start, point to Settings, click Control Panel, double-click Administrative Tools, and then double-click Computer Management.
- A user who belongs to a group has all the rights and permissions granted to that group. If a user is a member of more than one group, then the user has all the rights and permissions granted to every group he or she belongs to. For more information, see Understanding local groups.
- You should not add a new user to the Administrators group unless the user will perform only administrative tasks. For more information, see Why you should not run your computer as an administrator.
- If the computer participates in a domain, you can add user accounts and global groups from that domain and from trusted domains to a local group.
From: Help and Support Center - Windows Server 2003, Standard Edition
Windows Server 2003 - Backing up and restoring data
The Backup utility helps you protect data from accidental loss if your system’s hardware or storage media fails. For example, you can use Backup to create a duplicate copy of the data on your hard disk and then archive the data on another storage device. The backup storage medium can be a logical drive such as your hard disk, a separate storage device such as a removable disk, or an entire library of disks or tapes organized and controlled by a robotic changer. If the original data on your hard disk is accidentally erased or overwritten, or becomes inaccessible because of a hard disk malfunction, you can easily restore the data from the archived copy.
Two of the most common tasks are backing up files to a file or tape and restoring files from a file or tape. You can also back up data from the command line. For more information about other tasks for backing up and restoring data.
To back up files to a file or tape
1. Open Backup.
The Backup or Restore wizard starts by default, unless it is disabled. You can use this wizard or go to the next step to work in Advanced Mode.
2. Click the Advanced Mode link on the Backup or Restore wizard.
3. Click the Backup tab, and then on the Job menu, click New.
Select the files and folders you want to back up by clicking the box to the left of a file or folder in Click to select the check box for any drive, folder, or file that you want to back up.
5. In Backup destination, do one of the following:
- Choose File if you want to back up files and folders to a file. This is selected by default.
- Choose a tape device if you want to back up files and folders to a tape.
6. In Backup media or file name, do one of the following:
- If you are backing up files and folders to a file, type a path and file name for the backup (.bkf) file, or click the Browse button to find a file.
- If you are backing up files and folders to a tape, choose the tape you want to use.
7. Select any backup options you want, such as the backup type and the log file type, by clicking the Tools menu, and then clicking Options. When you have finished selecting backup options, click OK.
8. Click Start Backup, and then make any changes to the Backup Job Information dialog box.
9. If you want to set advanced backup options such as data verification or hardware compression, click Advanced. When you have finished setting advanced backup options, click OK.
10.Click Start Backup to start the backup operation.
Caution
- You can use Backup to back up and restore data on FAT16, FAT32, or NTFS volumes. However, if you have backed up data from an NTFS volume, it is recommended that you restore the data to an NTFS volume of the same version to prevent losing data. Some file systems might not support all of the features of other file systems.
Notes
- To perform this procedure, you must be a member of the Administrators or Backup Operators group on the local computer, or you must have been delegated the appropriate authority. If the computer is joined to a domain, members of the Domain Admins group might be able to perform this procedure. As a security best practice, consider using Run as to perform this procedure.
- To start Backup, click Start, point to Programs, point to Accessories, point to System Tools, and then click Backup.
- If the Backup or Restore wizard does not start by default, you can still use it to back up files by clicking Wizard Mode on the Welcome tab.
- To back up and restore Microsoft SQL Server database files, it is recommended that you use the built-in backup and restore utilities that SQL has. For more information, see the Microsoft SQL Server documentation.
- Some tape drives may not support hardware compression.
- System State data contains most elements of a system’s configuration, but it might not include all of the information that you require to recover your system from a failure. Therefore, it is recommended that you back up all boot and system volumes, including the System State, when you back up your system.
- You can only back up the System State data on a local computer. You cannot back up the System State data on a remote computer.
- Backup files usually have the extension .bkf. You can use any extension you like, but it is highly recommended that you use .bkf which has file associations that will ensure that the backup file is recognizable.
- Backup operators and administrators can back up and restore encrypted files and folders without decrypting the files or folders.
- If you have Windows Media Services running on your computer, and you want to back up the files associated with these services, see "Running Backup with Windows Media Services" in the Windows Media Services online documentation. You must follow the procedures outlined in the Windows Media Services online documentation before you can back up or restore files associated with Windows Media Services.
To restore files from a file or tape
1. Open Backup.
The Backup or Restore wizard starts by default, unless it is disabled.
2. Click the Advanced Mode link on the Backup or Restore wizard.
3. Click the Restore and Manage Media tab, in Click to select the check box for any drive, folder, or file that you want to restore, select the files and folders you want to restore by clicking the box to the left of a file or folder.
4. In Restore files to, do one of the following:
- Click Original location if you want the backed up files and folders to be restored to the folder or folders they were in when they were backed up. Skip to step 6.
- Click Alternate location if you want the backed up files and folders to be restored to a folder that you designate. This option will preserve the folder structure of the backed up data; all folders and subfolders will appear in the alternate folder you designate.
- Click Single folder if you want the backed up files and folders to be restored to a folder that you designate. This option will not preserve the folder structure of the backed up data; the files will appear only in the folder that you designate.
5. If you selected Alternate location or Single folder, type a path for the folder under Alternate location, or click the Browse button to find the folder.
6. On the Tools menu, click Options, click the Restore tab, and then do one of the following:
- Click Do not replace the file on my computer if you do not want the restore operation to copy over files that are already on your hard disk.
- Click Replace the file on disk only if the file on disk is older if you want the restore operation to replace older files on your disk with newer files from your backup.
- Click Always replace the file on my computer if you want the restore operation to replace files on your disk regardless of whether the backup files are newer or older.
- Click OK to accept the restore options you have set.
7. Click Start Restore.
8. If you want to change any of the advanced restore options, such as restoring security settings and junction point data, click Advanced. When you are done setting advanced restore options click OK.
9. Click OK to start the restore operation.
Caution
- Choosing Always replace the file on my computer could cause you to lose data if a file you are working on is contained in the backup.
- You can use Backup to back up and restore data on FAT16, FAT32, or NTFS volumes. However, if you have backed up data from an NTFS volume, it is recommended that you restore the data to an NTFS volume of the same version to prevent losing data. Some file systems might not support all of the features of other file systems.
Notesx
- To perform this procedure, you must be a member of the Administrators or Backup Operators group on the local computer, or you must have been delegated the appropriate authority. If the computer is joined to a domain, members of the Domain Admins group might be able to perform this procedure. As a security best practice, consider using Run as to perform this procedure.
- To start Backup, click Start, point to Programs, point to Accessories, point to System Tools, and then click Backup.
- You can also use the Restore wizard to restore files by clicking Restore Wizard on the Tools menu.
- To back up and restore Microsoft SQL Server database files, it is recommended that you use the built-in backup and restore utilities that SQL has. For more information, see the Microsoft SQL Server documentation.
- In order to restore the System State data on a domain controller, you must first start your computer in Directory Services Restore Mode. This will allow you to restore the SYSVOL directory and the Active Directory directory service database.
- You can only restore the System State data on a local computer. You cannot restore the System State data on a remote computer.
- Backup operators and administrators can back up and restore encrypted files and folders without decrypting the files or folders.
From: Help and Support Center - Windows Server 2003, Standard Edition
Two of the most common tasks are backing up files to a file or tape and restoring files from a file or tape. You can also back up data from the command line. For more information about other tasks for backing up and restoring data.
To back up files to a file or tape
1. Open Backup.
The Backup or Restore wizard starts by default, unless it is disabled. You can use this wizard or go to the next step to work in Advanced Mode.
2. Click the Advanced Mode link on the Backup or Restore wizard.
3. Click the Backup tab, and then on the Job menu, click New.
Select the files and folders you want to back up by clicking the box to the left of a file or folder in Click to select the check box for any drive, folder, or file that you want to back up.
5. In Backup destination, do one of the following:
- Choose File if you want to back up files and folders to a file. This is selected by default.
- Choose a tape device if you want to back up files and folders to a tape.
6. In Backup media or file name, do one of the following:
- If you are backing up files and folders to a file, type a path and file name for the backup (.bkf) file, or click the Browse button to find a file.
- If you are backing up files and folders to a tape, choose the tape you want to use.
7. Select any backup options you want, such as the backup type and the log file type, by clicking the Tools menu, and then clicking Options. When you have finished selecting backup options, click OK.
8. Click Start Backup, and then make any changes to the Backup Job Information dialog box.
9. If you want to set advanced backup options such as data verification or hardware compression, click Advanced. When you have finished setting advanced backup options, click OK.
10.Click Start Backup to start the backup operation.
Caution
- You can use Backup to back up and restore data on FAT16, FAT32, or NTFS volumes. However, if you have backed up data from an NTFS volume, it is recommended that you restore the data to an NTFS volume of the same version to prevent losing data. Some file systems might not support all of the features of other file systems.
Notes
- To perform this procedure, you must be a member of the Administrators or Backup Operators group on the local computer, or you must have been delegated the appropriate authority. If the computer is joined to a domain, members of the Domain Admins group might be able to perform this procedure. As a security best practice, consider using Run as to perform this procedure.
- To start Backup, click Start, point to Programs, point to Accessories, point to System Tools, and then click Backup.
- If the Backup or Restore wizard does not start by default, you can still use it to back up files by clicking Wizard Mode on the Welcome tab.
- To back up and restore Microsoft SQL Server database files, it is recommended that you use the built-in backup and restore utilities that SQL has. For more information, see the Microsoft SQL Server documentation.
- Some tape drives may not support hardware compression.
- System State data contains most elements of a system’s configuration, but it might not include all of the information that you require to recover your system from a failure. Therefore, it is recommended that you back up all boot and system volumes, including the System State, when you back up your system.
- You can only back up the System State data on a local computer. You cannot back up the System State data on a remote computer.
- Backup files usually have the extension .bkf. You can use any extension you like, but it is highly recommended that you use .bkf which has file associations that will ensure that the backup file is recognizable.
- Backup operators and administrators can back up and restore encrypted files and folders without decrypting the files or folders.
- If you have Windows Media Services running on your computer, and you want to back up the files associated with these services, see "Running Backup with Windows Media Services" in the Windows Media Services online documentation. You must follow the procedures outlined in the Windows Media Services online documentation before you can back up or restore files associated with Windows Media Services.
To restore files from a file or tape
1. Open Backup.
The Backup or Restore wizard starts by default, unless it is disabled.
2. Click the Advanced Mode link on the Backup or Restore wizard.
3. Click the Restore and Manage Media tab, in Click to select the check box for any drive, folder, or file that you want to restore, select the files and folders you want to restore by clicking the box to the left of a file or folder.
4. In Restore files to, do one of the following:
- Click Original location if you want the backed up files and folders to be restored to the folder or folders they were in when they were backed up. Skip to step 6.
- Click Alternate location if you want the backed up files and folders to be restored to a folder that you designate. This option will preserve the folder structure of the backed up data; all folders and subfolders will appear in the alternate folder you designate.
- Click Single folder if you want the backed up files and folders to be restored to a folder that you designate. This option will not preserve the folder structure of the backed up data; the files will appear only in the folder that you designate.
5. If you selected Alternate location or Single folder, type a path for the folder under Alternate location, or click the Browse button to find the folder.
6. On the Tools menu, click Options, click the Restore tab, and then do one of the following:
- Click Do not replace the file on my computer if you do not want the restore operation to copy over files that are already on your hard disk.
- Click Replace the file on disk only if the file on disk is older if you want the restore operation to replace older files on your disk with newer files from your backup.
- Click Always replace the file on my computer if you want the restore operation to replace files on your disk regardless of whether the backup files are newer or older.
- Click OK to accept the restore options you have set.
7. Click Start Restore.
8. If you want to change any of the advanced restore options, such as restoring security settings and junction point data, click Advanced. When you are done setting advanced restore options click OK.
9. Click OK to start the restore operation.
Caution
- Choosing Always replace the file on my computer could cause you to lose data if a file you are working on is contained in the backup.
- You can use Backup to back up and restore data on FAT16, FAT32, or NTFS volumes. However, if you have backed up data from an NTFS volume, it is recommended that you restore the data to an NTFS volume of the same version to prevent losing data. Some file systems might not support all of the features of other file systems.
Notesx
- To perform this procedure, you must be a member of the Administrators or Backup Operators group on the local computer, or you must have been delegated the appropriate authority. If the computer is joined to a domain, members of the Domain Admins group might be able to perform this procedure. As a security best practice, consider using Run as to perform this procedure.
- To start Backup, click Start, point to Programs, point to Accessories, point to System Tools, and then click Backup.
- You can also use the Restore wizard to restore files by clicking Restore Wizard on the Tools menu.
- To back up and restore Microsoft SQL Server database files, it is recommended that you use the built-in backup and restore utilities that SQL has. For more information, see the Microsoft SQL Server documentation.
- In order to restore the System State data on a domain controller, you must first start your computer in Directory Services Restore Mode. This will allow you to restore the SYSVOL directory and the Active Directory directory service database.
- You can only restore the System State data on a local computer. You cannot restore the System State data on a remote computer.
- Backup operators and administrators can back up and restore encrypted files and folders without decrypting the files or folders.
From: Help and Support Center - Windows Server 2003, Standard Edition
Windows Server 2003 - Step-by-step guides for deployment
The Microsoft Web site provides tutorials that you can use to learn about and deploy the operating system. These technical walkthroughs provide step-by-step instructions and illustrations for installing and configuring key features.
You can access the Step-by-Step Guides at the Microsoft Web site(http://www.microsoft.com/).
The following list includes some of the topics that you can find in these guides:
Infrastructure
- Building a common network infrastructure
Active Directory
- Setting up additional domain controllers
- Delegating control of objects
- Managing Active Directory
- Managing replication topology
- Using LDAP and VBScript to manage Active Directory
- Extending Active Directory using the Schema and display specifiers
Management service
- Understanding Group Policy
- Managing remote installation of the operating system
- Managing application deployments for groups of users and computers
- Managing user data and user settings
Security services
Setting up and configuring certificates
- Setting up a certification authority
- Configuring a domain to trust an external certification authority
- Managing Certificate Services
- Obtaining and managing certificates
- Configuring automatic certificate requests
Using certificates
- Requesting certificates using Web pages
- Mapping certificates to user accounts to be used on a Web site
Additional security features
- Configuring local security policy on individual computers
- Managing security in an enterprise network
- Encrypting files
- Using Kerberos V5
- Encrypting IP network traffic using Internet Protocol security (IPSec)
File and print services
- Creating logical views of directories and files
Clustering
- Installing a typical two-node cluster on Windows Server 2003, Enterprise Edition and Windows Server 2003, Datacenter Edition
From: Help and Support Center - Windows Server 2003, Standard Edition
You can access the Step-by-Step Guides at the Microsoft Web site(http://www.microsoft.com/).
The following list includes some of the topics that you can find in these guides:
Infrastructure
- Building a common network infrastructure
Active Directory
- Setting up additional domain controllers
- Delegating control of objects
- Managing Active Directory
- Managing replication topology
- Using LDAP and VBScript to manage Active Directory
- Extending Active Directory using the Schema and display specifiers
Management service
- Understanding Group Policy
- Managing remote installation of the operating system
- Managing application deployments for groups of users and computers
- Managing user data and user settings
Security services
Setting up and configuring certificates
- Setting up a certification authority
- Configuring a domain to trust an external certification authority
- Managing Certificate Services
- Obtaining and managing certificates
- Configuring automatic certificate requests
Using certificates
- Requesting certificates using Web pages
- Mapping certificates to user accounts to be used on a Web site
Additional security features
- Configuring local security policy on individual computers
- Managing security in an enterprise network
- Encrypting files
- Using Kerberos V5
- Encrypting IP network traffic using Internet Protocol security (IPSec)
File and print services
- Creating logical views of directories and files
Clustering
- Installing a typical two-node cluster on Windows Server 2003, Enterprise Edition and Windows Server 2003, Datacenter Edition
From: Help and Support Center - Windows Server 2003, Standard Edition
Rabu, 12 Maret 2008
Windows XP Symbol (C)
cable modem
A device that enables a broadband connection to the Internet by using cable television infrastructure. Access speeds vary greatly, with a maximum throughput of 10 megabits per second (Mbps).
cache
For DNS and WINS, a local information store of resource records for recently resolved names of remote hosts. Typically, the cache is built dynamically as the computer queries and resolves names. It also helps optimize the time required to resolve queried names.
cache file
A file used by the Domain Name System (DNS) server to preload its names cache when service is started. Also known as the root hints file because DNS uses resource records stored in this file to help locate root servers that provide referral to authoritative servers for remote names. For Windows DNS servers, the cache file is named Cache.dns and is located in the %SystemRoot%\System32\Dns folder.
caching
The process of temporarily storing recently used data values in a special pool in memory for quicker subsequent access. For DNS, typically the ability of the DNS server to store information learned about the DNS namespace during the resolution of DNS queries. (For example, the DNS server can cache DNS records received from other DNS servers.) Caching is also available through the DNS Client service as a way for DNS clients to keep a cache of information learned during recent queries.
caching resolver
A client-side DNS name resolution service that performs caching of recently learned DNS domain name information. The caching resolver service provides system-wide access to DNS-aware programs for resource records obtained from DNS servers during processing of name queries. Cached data is used for a limited period of time and aged according to the active Time-to-Live (TTL) value. You can set the TTL individually for each resource record (RR). Otherwise, it defaults to the minimum TTL set in the SOA RR for the zone.
callback number
The number that a remote access server uses to call back a user. This number can be preset by the administrator or specified by the user at the time of each call, depending on how the administrator configures the user's callback options. The callback number should be the number of the phone line to which the user's modem is connected.
callback security
A form of network security in which a remote access server calls a user back at a preset number after the user has made an initial connection and has been authenticated.
called subscriber ID (CSID) string
A string that specifies the called subscriber ID transmitted by the receiving fax machine when receiving an inbound fax. This string is usually a combination of the fax or telephone number and the name of the business. It is often the same as the transmitter subscriber ID.
canonical (CNAME) resource record
A resource record used to map an alternate alias name to a primary canonical DNS domain name used in the zone.
canonical name
An object's distinguished name presented with the root first and without the LDAP attribute tags (such as: CN=, DC=). The segments of the name are delimited with forward slashes (/). For example,
CN=MyDocuments,OU=MyOU,DC=Microsoft,DC=Com
is presented as
microsoft.com/MyOU/MyDocuments
in canonical form.
cartridge font
A font contained in a plug-in cartridge and used to add fonts to laser, ink-jet, or high-end dot-matrix printers. Cartridge fonts are distinguished both from internal fonts, which are contained in ROM in the printer and are always available, and from downloadable (soft) fonts, which reside on disk and which can be sent to the printer as needed.
cascading hubs
A network configuration in which hubs are connected to other hubs.
catalog
For Indexing Service, a collection of all index information and stored properties for a particular group of file system directories. By default, Indexing Service indexes the System and Web catalogs on your hard drive.
CD-R
Recordable compact disc. Data can be copied to the CD on more than one occasion; however, data cannot be erased from the CD.
CD-RW
Rewritable compact disc. Data can be copied to the CD on more than one occasion and can be erased.
certificate
A digital document that is commonly used for authentication and secure exchange of information on open networks, such as the Internet, extranets, and intranets. A certificate securely binds a public key to the entity that holds the corresponding private key. Certificates are digitally signed by the issuing certification authority and can be issued for a user, a computer, or a service. The most widely accepted format for certificates is defined by the ITU-T X.509 version 3 international standard.
certificate revocation list (CRL)
A document maintained and published by a certification authority that lists certificates that have been revoked.
certificate store
Typically, a permanent storage where certificates, certificate revocation lists, and certificate trust lists are stored.
certificate template
A Windows construct that profiles certificates (that is, it prespecifies the format and content) based on their intended usage. When requesting a certificate from a Windows enterprise certification authority (CA), certificate requestors are, depending on their access rights, able to select from a variety of certificate types that are based on certificate templates, such as User and Code Signing.
certificate trust list (CTL)
A signed list of root certification authority certificates that an administrator considers reputable for designated purposes, such as client authentication or secure e-mail.
certification authority (CA)
An entity responsible for establishing and vouching for the authenticity of public keys belonging to users (end entities) or other certification authorities. Activities of a certification authority can include binding public keys to distinguished names through signed certificates, managing certificate serial numbers, and certificate revocation.
certification hierarchy
A model of trust for certificates in which certification paths are created by means of the establishment of parent-child relationships between certification authorities.
certification path
An unbroken chain of trust, consisting of certificates from trusted certificate authorities, from a specific certificate to the root certification authority in a certification hierarchy.
Challenge Handshake Authentication Protocol (CHAP)
A challenge-response authentication protocol for PPP connections documented in RFC 1994 that uses the industry-standard Message Digest 5 (MD5) one-way encryption scheme to hash the response to a challenge issued by the remote access server.
channel
A path or link through which noncontrol information passes between two devices. A single Basic Rate Interface (BRI) connection, for example, has one physical connection but two channels for exchanging information between devices. This is often called a bearer channel, implying a channel that carries information.
On the Internet, a Web site designed to deliver content from the Internet to your computer, similar to subscribing to a favorite Web site.
CHAP (Challenge Handshake Authentication Protocol)
An authentication protocol used by Microsoft remote access and Network Connections. Using CHAP, a remote access client can send its authentication credentials to a remote access server in a secure form. Microsoft has created a Windows-specific variant of CHAP called MS-CHAP.
character mode
A display mode in which the monitor can display letters, numbers, and other text characters, but no graphical images or character formatting (italics, superscript, and so on).
checkpoints
See definition for: Restore Point
child object
An object that resides in another object. A child object implies relation. For example, a file is a child object that resides in a folder, which is the parent object.
Class A IP address
A unicast IP address that ranges from 1.0.0.1 through 126.255.255.254. The first octet indicates the network, and the last three octets indicate the host on the network.
Class B IP address
A unicast IP address that ranges from 128.0.0.1 through 191.255.255.254. The first two octets indicate the network, and the last two octets indicate the host on the network.
Class C IP address
A unicast IP address that ranges from 192.0.0.1 to 223.255.255.254. The first three octets indicate the network, and the last octet indicates the host on the network. Network Load Balancing provides optional session support for Class C IP addresses (in addition to support for single IP addresses) to accommodate clients that make use of multiple proxy servers at the client site.
classical IP over ATM (CLIP)
A proposed Internet standard, described in RFC 2225, that allows IP communication directly on the ATM layer, bypassing an additional protocol (such as Ethernet or Token Ring) in the protocol stack.
clear
To turn off an option by removing the X or check mark from a check box. You clear a check box by clicking it, or by selecting it and then pressing the SPACEBAR.
client
Any computer or program connecting to, or requesting the services of, another computer or program. Client can also refer to the software that enables the computer or program to establish the connection.
For a local area network (LAN) or the Internet, a computer that uses shared network resources provided by another computer (called a server).
client application
A Windows-based application that can display and store linked or embedded objects. For distributed applications, the application that imitates a request to a server application.
client request
A service request from a client computer to a server computer or, for Network Load Balancing, a cluster of computers. Network Load Balancing forwards each client request to a specific host within the cluster according to the system administrator's load-balancing policy.
ClipBook Server
A system service that supports ClipBook Viewer, which allows pages to be seen by remote ClipBooks.
cluster
In data storage, the smallest amount of disk space that can be allocated to hold a file. All file systems used by Windows organize hard disks based on clusters, which consist of one or more contiguous sectors. The smaller the cluster size, the more efficiently a disk stores information. If no cluster size is specified during formatting, Windows picks defaults based on the size of the volume. These defaults are selected to reduce the amount of space that is lost and the amount of fragmentation on the volume. A cluster is also called an allocation unit.
In computer networking, a group of independent computers that work together to provide a common set of services and present a single-system image to clients. The use of a cluster enhances the availability of the services and the scalability and manageability of the operating system that provides the services.
cluster adapter
The adapter that, when using multiple network adapters in each host of a Network Load Balancing cluster, handles the network traffic for cluster operations (the traffic for all hosts in the cluster). This adapter is programmed with the host's cluster IP address.
Cluster Administrator
An application that is used to configure a cluster and its nodes, groups, and resources. Cluster Administrator can run on any member of the trusted domain regardless of whether the computer is a cluster node.
Cluster Administrator extension
A software component that implements the Cluster Administrator extension application programming interface (API) for allowing Cluster Administrator to configure a new resource type.
Cluster API
A collection of functions that are implemented by the cluster software and used by a cluster-aware client or server application, a cluster management application, or a Resource DLL. The Cluster API is used to manage the cluster, cluster objects, and the cluster database.
cluster disk
A disk on a shared bus connected to the cluster nodes, which all the cluster nodes can access (though not at the same time).
Cluster service
The essential software component that controls all aspects of server cluster operation and manages the cluster database. Each node in a server cluster runs one instance of the Cluster service.
cluster-aware application
An application that can run on a cluster node and that can be managed as a cluster resource. Cluster-aware applications use the Cluster API to receive status and notification information from the server cluster.
cluster-unaware application
An application that can run on a cluster node and be managed as a cluster resource but that does not support the Cluster API.
Cluster.exe
An alternative to using Cluster Administrator to administer clusters from the command prompt. You can also call Cluster.exe from command scripts to automate many cluster administration tasks.
CMYK color space
Multidimensional color space consisting of the cyan, magenta, yellow, and black intensities that make up a given color. Commercial color printing devices generally use this system of four-color process inks.
code page
A means of providing support for character sets and keyboard layouts for different countries or regions. A code page is a table that relates the binary character codes used by a program to keys on the keyboard or to characters on the display.
codec
Hardware that can convert audio or video signals between analog and digital forms (coder/decoder); hardware or software that can compress and uncompress audio or video data (compression/decompression); or the combination of coder/decoder and compression/decompression. Generally, a codec compresses uncompressed digital data so that the data uses less memory.
color depth
The number of colors per pixel your monitor and graphics adapter support.
color gamut
The particular range of colors that a device is able to produce. A device such as a scanner, monitor, or printer can produce a unique range of colors, which is determined by the characteristics of the device itself.
color management
Process of producing accurate, consistent color among a variety of input and output devices. A color management system (CMS) maps colors between devices such as scanners, monitors, and printers; transforms colors from one color space to another (for example, RGB to CMYK); and provides accurate on-screen or print previews.
color profile
A profile that contains the data needed for translating the values of a color gamut. This data includes information about color, hue, saturation, and brightness.
color space
A set of three values that defines how a color can be represented on computer devices such as monitors, scanners, and printers. For example, in the LAB color space, the terms luminance or whiteness (L), redness-greenness (A), and yellowness-blueness (B) are used; in the HVC system, the terms are hue (H), value (V), and chroma (C). Color space refers to the three-dimensional space that is defined by the respective values, such as L, A, and B.
command prompt window
A window displayed on the desktop used to interface with the MS-DOS operating system. MS-DOS commands are typed at an entry point identified by a blinking cursor.
common groups
Groups that appear in the program list on the Start menu for all users who log on to the computer. Only administrators can create or change common groups.
communication port
A port on a computer that allows asynchronous communication of one byte at a time. A communication port is also called a serial port.
communication settings
Operating parameters, such as bits per second (bps) and modem type, that apply to serial ports on a computer.
community name
A name used to group SNMP hosts. This name is placed in SNMP messages sent between SNMP-managed devices such as Windows 2000-based server computers and SNMP management stations. Typically, all hosts belong to Public, which is the standard name for a common community of all SNMP hosts.
compatibility mode
A feature of a computer or operating system that allows it to run programs written for a different system. Programs often run slower in compatibility mode.
Complementary Metal Oxide Semiconductor (CMOS)
A specific type of semiconductor technology that requires very little power. The term has been popularized to mean a small storage area where your system keeps track of certain hardware parameters, such as the size of your hard disk, the number of serial ports your computer has, etc. CMOS is also called Setup RAM.
Compression Control Protocol (CCP)
A protocol used in the negotiation process in a PPP connection. Compression Control Protocol is one type of Network Control Protocol (NCP). NCPs are used to establish and configure different network protocol parameters for IP, IPX, and NetBEUI.
computer account
An account that is created by a domain administrator and uniquely identifies the computer on the domain. The Windows computer account matches the name of the computer joining the domain.
computer administrator
A user who manages a computer. The computer administrator makes system-wide changes to the computer, including installing programs and accessing all files on the computer, and can create, change and delete the accounts of other users.
Computer Browser service
A service that maintains an up-to-date list of computers and provides the list to applications when requested. The Computer Browser service provides the computer lists displayed in the My Network Places, Select Computer, and Select Domain dialog boxes and (for Windows 2000 Server only) in the Server Manager window.
Computer Management
A component you can use to view and control many aspects of the computer configuration. Computer Management combines several administration utilities into a single console tree, providing easy access to a local or remote computers administrative properties and tools.
computer quota
For Message Queuing, the storage size limit for messages on a computer, based on the total size of the messages. When a computer quota is reached, Message Queuing can no longer send messages to that computer until one or more messages are removed from queues. Message Queuing enforces the computer quota before it enforces the queue quota on a computer.
connect
To assign a drive letter, port, or computer name to a shared resource so that you can use it.
connected, authenticating user
A user's status when a telephone connection has been established but authentication has not yet taken place. The user may be trying to prove security clearance, or the system may be idle. If this condition occurs, followed by the Waiting for Call phase, then the user was unable to provide a correct user name or password. If this phase is repeated, followed by the Waiting for Call phase, an unauthorized attempt to access the network may be under way.
connected, user authenticated
A user's status when a telephone connection has been established and the user has entered a correct user name and password. If the user has callback permission and has requested callback, the connection is followed by the calling-back phase. If the calling-back phase is followed by a waiting-for-call phase, then the server was unable to reach the user at the specified number. The user may have supplied an inaccurate callback number (in the case of set-by-caller callback), or an unauthorized attempt to access the network may be under way (in the case of preset-to callback).
connector application
For Message Queuing, an application that enables Message Queuing computers to communicate with computers that use other messaging systems.
connector queue
For Message Queuing, a queue created on servers running a connector application. You can use the connector application to exchange messages with computers that are running other message-queuing products.
console tree
The left pane in a Microsoft Management Console (MMC) that displays the items contained in the console. By default it is the left pane of a console window, but it can be hidden. The items in the console tree and their hierarchical organization determine the capabilities of a console.
constant bit rate (CBR)
An ATM service type that supports constant bandwidth allocation. This service type is used for voice and video transmissions that require little or no cell loss and rigorous timing controls during transmission.
container object
An object that can logically contain other objects. For example, a folder is a container object.
convergence
The process of stabilizing a system after changes occur in the network. For routing, if a route becomes unavailable, routers send update messages throughout the internetwork, reestablishing information about preferred routes.
For Network Load Balancing, a process by which hosts exchange messages to determine a new, consistent state of the cluster and to elect the host with the highest host priority, known as the default host. During convergence, a new load distribution is determined for hosts that share the handling of network traffic for specific TCP or UDP ports.
copy backup
A backup that copies all selected files but does not mark each file as having been backed up (in other words, the archive attribute is not cleared). Copying is useful if you want to back up files between normal and incremental backups because copying does not affect these other backup operations.
count limit
For Process Control, the maximum number of active processes in a process group. You can configure this in the Process Control snap-in.
CPU Time
In Task Manager, the total processor time, in seconds, used by a process since it started.
CPU Usage
In Task Manager, the percentage of time that a process used the CPU since the last update. On the Task Manager Process tab, the column heading is CPU.
crash consistency
A feature of shadow copy backups that ensures all files are backed up, regardless of their state.
CRC errors
Errors caused by the failure of a cyclic redundancy check. A CRC error indicates that one or more characters in the data packet received were found garbled on arrival.
credentials
A set of information that includes identification and proof of identification that is used to gain access to local and network resources. Examples of credentials are user names and passwords, smart cards, and certificates.
CRL distribution point
An optional extension in an X.509v3 certificate that identifies how information is obtained. Also, a directory entry or other distribution source for certificate revocation lists.
cross-reference object
Objects in which Active Directory stores information about directory partitions and external directory services. An example of an external directory service is another LDAP-compliant directory.
CryptoAPI
An application programming interface (API) that is provided as part of Microsoft Windows. CryptoAPI provides a set of functions that allow applications to encrypt or digitally sign data in a flexible manner while providing protection for the user's sensitive private key data. Actual cryptographic operations are performed by independent modules known as cryptographic service providers (CSPs).
(CSP); private key
cryptographic service provider (CSP)
The code that performs authentication, encoding, and encryption services that Windows-based applications access through the CryptoAPI. A CSP is responsible for creating keys, destroying them, and using them to perform a variety of cryptographic operations. Each CSP provides a different implementation of the CryptoAPI. Some provide stronger cryptographic algorithms, while others contain hardware components, such as smart cards.
cryptography
The processes, art, and science of keeping messages and data secure. Cryptography is used to enable and ensure confidentiality, data integrity, authentication (entity and data origin), and nonrepudiation.
custom file type
Typically, files with extensions that have been created for special kinds of files. Custom file types are not tracked by the system registry.
From: Help and Support Center Win XP
A device that enables a broadband connection to the Internet by using cable television infrastructure. Access speeds vary greatly, with a maximum throughput of 10 megabits per second (Mbps).
cache
For DNS and WINS, a local information store of resource records for recently resolved names of remote hosts. Typically, the cache is built dynamically as the computer queries and resolves names. It also helps optimize the time required to resolve queried names.
cache file
A file used by the Domain Name System (DNS) server to preload its names cache when service is started. Also known as the root hints file because DNS uses resource records stored in this file to help locate root servers that provide referral to authoritative servers for remote names. For Windows DNS servers, the cache file is named Cache.dns and is located in the %SystemRoot%\System32\Dns folder.
caching
The process of temporarily storing recently used data values in a special pool in memory for quicker subsequent access. For DNS, typically the ability of the DNS server to store information learned about the DNS namespace during the resolution of DNS queries. (For example, the DNS server can cache DNS records received from other DNS servers.) Caching is also available through the DNS Client service as a way for DNS clients to keep a cache of information learned during recent queries.
caching resolver
A client-side DNS name resolution service that performs caching of recently learned DNS domain name information. The caching resolver service provides system-wide access to DNS-aware programs for resource records obtained from DNS servers during processing of name queries. Cached data is used for a limited period of time and aged according to the active Time-to-Live (TTL) value. You can set the TTL individually for each resource record (RR). Otherwise, it defaults to the minimum TTL set in the SOA RR for the zone.
callback number
The number that a remote access server uses to call back a user. This number can be preset by the administrator or specified by the user at the time of each call, depending on how the administrator configures the user's callback options. The callback number should be the number of the phone line to which the user's modem is connected.
callback security
A form of network security in which a remote access server calls a user back at a preset number after the user has made an initial connection and has been authenticated.
called subscriber ID (CSID) string
A string that specifies the called subscriber ID transmitted by the receiving fax machine when receiving an inbound fax. This string is usually a combination of the fax or telephone number and the name of the business. It is often the same as the transmitter subscriber ID.
canonical (CNAME) resource record
A resource record used to map an alternate alias name to a primary canonical DNS domain name used in the zone.
canonical name
An object's distinguished name presented with the root first and without the LDAP attribute tags (such as: CN=, DC=). The segments of the name are delimited with forward slashes (/). For example,
CN=MyDocuments,OU=MyOU,DC=Microsoft,DC=Com
is presented as
microsoft.com/MyOU/MyDocuments
in canonical form.
cartridge font
A font contained in a plug-in cartridge and used to add fonts to laser, ink-jet, or high-end dot-matrix printers. Cartridge fonts are distinguished both from internal fonts, which are contained in ROM in the printer and are always available, and from downloadable (soft) fonts, which reside on disk and which can be sent to the printer as needed.
cascading hubs
A network configuration in which hubs are connected to other hubs.
catalog
For Indexing Service, a collection of all index information and stored properties for a particular group of file system directories. By default, Indexing Service indexes the System and Web catalogs on your hard drive.
CD-R
Recordable compact disc. Data can be copied to the CD on more than one occasion; however, data cannot be erased from the CD.
CD-RW
Rewritable compact disc. Data can be copied to the CD on more than one occasion and can be erased.
certificate
A digital document that is commonly used for authentication and secure exchange of information on open networks, such as the Internet, extranets, and intranets. A certificate securely binds a public key to the entity that holds the corresponding private key. Certificates are digitally signed by the issuing certification authority and can be issued for a user, a computer, or a service. The most widely accepted format for certificates is defined by the ITU-T X.509 version 3 international standard.
certificate revocation list (CRL)
A document maintained and published by a certification authority that lists certificates that have been revoked.
certificate store
Typically, a permanent storage where certificates, certificate revocation lists, and certificate trust lists are stored.
certificate template
A Windows construct that profiles certificates (that is, it prespecifies the format and content) based on their intended usage. When requesting a certificate from a Windows enterprise certification authority (CA), certificate requestors are, depending on their access rights, able to select from a variety of certificate types that are based on certificate templates, such as User and Code Signing.
certificate trust list (CTL)
A signed list of root certification authority certificates that an administrator considers reputable for designated purposes, such as client authentication or secure e-mail.
certification authority (CA)
An entity responsible for establishing and vouching for the authenticity of public keys belonging to users (end entities) or other certification authorities. Activities of a certification authority can include binding public keys to distinguished names through signed certificates, managing certificate serial numbers, and certificate revocation.
certification hierarchy
A model of trust for certificates in which certification paths are created by means of the establishment of parent-child relationships between certification authorities.
certification path
An unbroken chain of trust, consisting of certificates from trusted certificate authorities, from a specific certificate to the root certification authority in a certification hierarchy.
Challenge Handshake Authentication Protocol (CHAP)
A challenge-response authentication protocol for PPP connections documented in RFC 1994 that uses the industry-standard Message Digest 5 (MD5) one-way encryption scheme to hash the response to a challenge issued by the remote access server.
channel
A path or link through which noncontrol information passes between two devices. A single Basic Rate Interface (BRI) connection, for example, has one physical connection but two channels for exchanging information between devices. This is often called a bearer channel, implying a channel that carries information.
On the Internet, a Web site designed to deliver content from the Internet to your computer, similar to subscribing to a favorite Web site.
CHAP (Challenge Handshake Authentication Protocol)
An authentication protocol used by Microsoft remote access and Network Connections. Using CHAP, a remote access client can send its authentication credentials to a remote access server in a secure form. Microsoft has created a Windows-specific variant of CHAP called MS-CHAP.
character mode
A display mode in which the monitor can display letters, numbers, and other text characters, but no graphical images or character formatting (italics, superscript, and so on).
checkpoints
See definition for: Restore Point
child object
An object that resides in another object. A child object implies relation. For example, a file is a child object that resides in a folder, which is the parent object.
Class A IP address
A unicast IP address that ranges from 1.0.0.1 through 126.255.255.254. The first octet indicates the network, and the last three octets indicate the host on the network.
Class B IP address
A unicast IP address that ranges from 128.0.0.1 through 191.255.255.254. The first two octets indicate the network, and the last two octets indicate the host on the network.
Class C IP address
A unicast IP address that ranges from 192.0.0.1 to 223.255.255.254. The first three octets indicate the network, and the last octet indicates the host on the network. Network Load Balancing provides optional session support for Class C IP addresses (in addition to support for single IP addresses) to accommodate clients that make use of multiple proxy servers at the client site.
classical IP over ATM (CLIP)
A proposed Internet standard, described in RFC 2225, that allows IP communication directly on the ATM layer, bypassing an additional protocol (such as Ethernet or Token Ring) in the protocol stack.
clear
To turn off an option by removing the X or check mark from a check box. You clear a check box by clicking it, or by selecting it and then pressing the SPACEBAR.
client
Any computer or program connecting to, or requesting the services of, another computer or program. Client can also refer to the software that enables the computer or program to establish the connection.
For a local area network (LAN) or the Internet, a computer that uses shared network resources provided by another computer (called a server).
client application
A Windows-based application that can display and store linked or embedded objects. For distributed applications, the application that imitates a request to a server application.
client request
A service request from a client computer to a server computer or, for Network Load Balancing, a cluster of computers. Network Load Balancing forwards each client request to a specific host within the cluster according to the system administrator's load-balancing policy.
ClipBook Server
A system service that supports ClipBook Viewer, which allows pages to be seen by remote ClipBooks.
cluster
In data storage, the smallest amount of disk space that can be allocated to hold a file. All file systems used by Windows organize hard disks based on clusters, which consist of one or more contiguous sectors. The smaller the cluster size, the more efficiently a disk stores information. If no cluster size is specified during formatting, Windows picks defaults based on the size of the volume. These defaults are selected to reduce the amount of space that is lost and the amount of fragmentation on the volume. A cluster is also called an allocation unit.
In computer networking, a group of independent computers that work together to provide a common set of services and present a single-system image to clients. The use of a cluster enhances the availability of the services and the scalability and manageability of the operating system that provides the services.
cluster adapter
The adapter that, when using multiple network adapters in each host of a Network Load Balancing cluster, handles the network traffic for cluster operations (the traffic for all hosts in the cluster). This adapter is programmed with the host's cluster IP address.
Cluster Administrator
An application that is used to configure a cluster and its nodes, groups, and resources. Cluster Administrator can run on any member of the trusted domain regardless of whether the computer is a cluster node.
Cluster Administrator extension
A software component that implements the Cluster Administrator extension application programming interface (API) for allowing Cluster Administrator to configure a new resource type.
Cluster API
A collection of functions that are implemented by the cluster software and used by a cluster-aware client or server application, a cluster management application, or a Resource DLL. The Cluster API is used to manage the cluster, cluster objects, and the cluster database.
cluster disk
A disk on a shared bus connected to the cluster nodes, which all the cluster nodes can access (though not at the same time).
Cluster service
The essential software component that controls all aspects of server cluster operation and manages the cluster database. Each node in a server cluster runs one instance of the Cluster service.
cluster-aware application
An application that can run on a cluster node and that can be managed as a cluster resource. Cluster-aware applications use the Cluster API to receive status and notification information from the server cluster.
cluster-unaware application
An application that can run on a cluster node and be managed as a cluster resource but that does not support the Cluster API.
Cluster.exe
An alternative to using Cluster Administrator to administer clusters from the command prompt. You can also call Cluster.exe from command scripts to automate many cluster administration tasks.
CMYK color space
Multidimensional color space consisting of the cyan, magenta, yellow, and black intensities that make up a given color. Commercial color printing devices generally use this system of four-color process inks.
code page
A means of providing support for character sets and keyboard layouts for different countries or regions. A code page is a table that relates the binary character codes used by a program to keys on the keyboard or to characters on the display.
codec
Hardware that can convert audio or video signals between analog and digital forms (coder/decoder); hardware or software that can compress and uncompress audio or video data (compression/decompression); or the combination of coder/decoder and compression/decompression. Generally, a codec compresses uncompressed digital data so that the data uses less memory.
color depth
The number of colors per pixel your monitor and graphics adapter support.
color gamut
The particular range of colors that a device is able to produce. A device such as a scanner, monitor, or printer can produce a unique range of colors, which is determined by the characteristics of the device itself.
color management
Process of producing accurate, consistent color among a variety of input and output devices. A color management system (CMS) maps colors between devices such as scanners, monitors, and printers; transforms colors from one color space to another (for example, RGB to CMYK); and provides accurate on-screen or print previews.
color profile
A profile that contains the data needed for translating the values of a color gamut. This data includes information about color, hue, saturation, and brightness.
color space
A set of three values that defines how a color can be represented on computer devices such as monitors, scanners, and printers. For example, in the LAB color space, the terms luminance or whiteness (L), redness-greenness (A), and yellowness-blueness (B) are used; in the HVC system, the terms are hue (H), value (V), and chroma (C). Color space refers to the three-dimensional space that is defined by the respective values, such as L, A, and B.
command prompt window
A window displayed on the desktop used to interface with the MS-DOS operating system. MS-DOS commands are typed at an entry point identified by a blinking cursor.
common groups
Groups that appear in the program list on the Start menu for all users who log on to the computer. Only administrators can create or change common groups.
communication port
A port on a computer that allows asynchronous communication of one byte at a time. A communication port is also called a serial port.
communication settings
Operating parameters, such as bits per second (bps) and modem type, that apply to serial ports on a computer.
community name
A name used to group SNMP hosts. This name is placed in SNMP messages sent between SNMP-managed devices such as Windows 2000-based server computers and SNMP management stations. Typically, all hosts belong to Public, which is the standard name for a common community of all SNMP hosts.
compatibility mode
A feature of a computer or operating system that allows it to run programs written for a different system. Programs often run slower in compatibility mode.
Complementary Metal Oxide Semiconductor (CMOS)
A specific type of semiconductor technology that requires very little power. The term has been popularized to mean a small storage area where your system keeps track of certain hardware parameters, such as the size of your hard disk, the number of serial ports your computer has, etc. CMOS is also called Setup RAM.
Compression Control Protocol (CCP)
A protocol used in the negotiation process in a PPP connection. Compression Control Protocol is one type of Network Control Protocol (NCP). NCPs are used to establish and configure different network protocol parameters for IP, IPX, and NetBEUI.
computer account
An account that is created by a domain administrator and uniquely identifies the computer on the domain. The Windows computer account matches the name of the computer joining the domain.
computer administrator
A user who manages a computer. The computer administrator makes system-wide changes to the computer, including installing programs and accessing all files on the computer, and can create, change and delete the accounts of other users.
Computer Browser service
A service that maintains an up-to-date list of computers and provides the list to applications when requested. The Computer Browser service provides the computer lists displayed in the My Network Places, Select Computer, and Select Domain dialog boxes and (for Windows 2000 Server only) in the Server Manager window.
Computer Management
A component you can use to view and control many aspects of the computer configuration. Computer Management combines several administration utilities into a single console tree, providing easy access to a local or remote computers administrative properties and tools.
computer quota
For Message Queuing, the storage size limit for messages on a computer, based on the total size of the messages. When a computer quota is reached, Message Queuing can no longer send messages to that computer until one or more messages are removed from queues. Message Queuing enforces the computer quota before it enforces the queue quota on a computer.
connect
To assign a drive letter, port, or computer name to a shared resource so that you can use it.
connected, authenticating user
A user's status when a telephone connection has been established but authentication has not yet taken place. The user may be trying to prove security clearance, or the system may be idle. If this condition occurs, followed by the Waiting for Call phase, then the user was unable to provide a correct user name or password. If this phase is repeated, followed by the Waiting for Call phase, an unauthorized attempt to access the network may be under way.
connected, user authenticated
A user's status when a telephone connection has been established and the user has entered a correct user name and password. If the user has callback permission and has requested callback, the connection is followed by the calling-back phase. If the calling-back phase is followed by a waiting-for-call phase, then the server was unable to reach the user at the specified number. The user may have supplied an inaccurate callback number (in the case of set-by-caller callback), or an unauthorized attempt to access the network may be under way (in the case of preset-to callback).
connector application
For Message Queuing, an application that enables Message Queuing computers to communicate with computers that use other messaging systems.
connector queue
For Message Queuing, a queue created on servers running a connector application. You can use the connector application to exchange messages with computers that are running other message-queuing products.
console tree
The left pane in a Microsoft Management Console (MMC) that displays the items contained in the console. By default it is the left pane of a console window, but it can be hidden. The items in the console tree and their hierarchical organization determine the capabilities of a console.
constant bit rate (CBR)
An ATM service type that supports constant bandwidth allocation. This service type is used for voice and video transmissions that require little or no cell loss and rigorous timing controls during transmission.
container object
An object that can logically contain other objects. For example, a folder is a container object.
convergence
The process of stabilizing a system after changes occur in the network. For routing, if a route becomes unavailable, routers send update messages throughout the internetwork, reestablishing information about preferred routes.
For Network Load Balancing, a process by which hosts exchange messages to determine a new, consistent state of the cluster and to elect the host with the highest host priority, known as the default host. During convergence, a new load distribution is determined for hosts that share the handling of network traffic for specific TCP or UDP ports.
copy backup
A backup that copies all selected files but does not mark each file as having been backed up (in other words, the archive attribute is not cleared). Copying is useful if you want to back up files between normal and incremental backups because copying does not affect these other backup operations.
count limit
For Process Control, the maximum number of active processes in a process group. You can configure this in the Process Control snap-in.
CPU Time
In Task Manager, the total processor time, in seconds, used by a process since it started.
CPU Usage
In Task Manager, the percentage of time that a process used the CPU since the last update. On the Task Manager Process tab, the column heading is CPU.
crash consistency
A feature of shadow copy backups that ensures all files are backed up, regardless of their state.
CRC errors
Errors caused by the failure of a cyclic redundancy check. A CRC error indicates that one or more characters in the data packet received were found garbled on arrival.
credentials
A set of information that includes identification and proof of identification that is used to gain access to local and network resources. Examples of credentials are user names and passwords, smart cards, and certificates.
CRL distribution point
An optional extension in an X.509v3 certificate that identifies how information is obtained. Also, a directory entry or other distribution source for certificate revocation lists.
cross-reference object
Objects in which Active Directory stores information about directory partitions and external directory services. An example of an external directory service is another LDAP-compliant directory.
CryptoAPI
An application programming interface (API) that is provided as part of Microsoft Windows. CryptoAPI provides a set of functions that allow applications to encrypt or digitally sign data in a flexible manner while providing protection for the user's sensitive private key data. Actual cryptographic operations are performed by independent modules known as cryptographic service providers (CSPs).
(CSP); private key
cryptographic service provider (CSP)
The code that performs authentication, encoding, and encryption services that Windows-based applications access through the CryptoAPI. A CSP is responsible for creating keys, destroying them, and using them to perform a variety of cryptographic operations. Each CSP provides a different implementation of the CryptoAPI. Some provide stronger cryptographic algorithms, while others contain hardware components, such as smart cards.
cryptography
The processes, art, and science of keeping messages and data secure. Cryptography is used to enable and ensure confidentiality, data integrity, authentication (entity and data origin), and nonrepudiation.
custom file type
Typically, files with extensions that have been created for special kinds of files. Custom file types are not tracked by the system registry.
From: Help and Support Center Win XP
Windows XP Symbol (B)
B-channel
A single channel of an ISDN line that is used to carry either voice or data information. ISDN Basic Rate Interface (BRI) has 2 B-channels. ISDN Primary Rate Interface (PRI) in North America has 23 B-channels. ISDN Primary Rate Interface (PRI) in Europe has 30 B-channels. B-channel is also called bearer channel.
background
The screen background image used on a graphical user interface such as Windows. Any pattern or picture that can be stored as a bitmap (.bmp) file can be set as a screen background.
background program
A program that runs while the user is working on another task. The computer's microprocessor assigns fewer resources to background programs than foreground programs.
backup domain controller (BDC)
In Windows NT Server 4.0 or earlier, a computer running Windows NT Server that receives a copy of the domain's directory database (which contains all account and security policy information for the domain).
The copy is synchronized periodically and automatically with the master copy on the primary domain controller (PDC). BDCs also authenticate user logon information and can be promoted to function as PDCs as needed. Multiple BDCs can exist in a domain. Windows NT 3.51 and 4.0 BDCs can participate in a Windows 2000 domain when the domain is configured in mixed mode.
backup media pool
A logical collection of data-storage media that has been reserved for use by Microsoft Windows Backup. Backup uses Removable Storage to control access to specific media within a library.
backup operator
A type of local or global group that contains the user rights you need to back up and restore files and folders. Members of the Backup Operators group can back up and restore files and folders regardless of ownership, permissions, encryption, or auditing settings.
backup set
A collection of files, folders, and other data that has been backed up and stored in a file or on one or more tapes.
backup set catalog
A summary of the files and folders that have been saved in a backup set.
backup types
A type that determines which data is backed up and how it is backed up. There are five backup types: copy, daily, differential, incremental, and normal.
bandwidth
In analog communications, the difference between the highest and lowest frequencies in a given range. For example, an analog telephone line accommodates a bandwidth of 3,000 hertz (Hz), the difference between the lowest (300 Hz) and highest (3,300 Hz) frequencies it can carry. In digital communications, bandwidth is expressed in bits per second (bps).
Bandwidth Allocation Protocol (BAP)
A PPP control protocol that is used on a multiprocessing connection to dynamically add and remove links.
base priority
A precedence ranking that determines the order in which the threads of a process are scheduled for the processor. Use Task Manager to view and change base priorities.
For Message Queuing, a property that specifies the queue's priority in a public queue. You can set the base priority from -32,768 to 32,767; the default priority is 0. Private queues do not support base priority. Message Queuing routes and delivers messages first by base priority, then by message priority.
basic disk
A physical disk that can be accessed by MS-DOS and all Windows-based operating systems. Basic disks can contain up to four primary partitions, or three primary partitions and an extended partition with multiple logical drives. If you want to create partitions that span multiple disks, you must first convert the basic disk to a dynamic disk using Disk Management or the Diskpart.exe command-line utility.
basic input/output system (BIOS)
On x86-based computers, the set of essential software routines that test hardware at startup, start the operating system, and support the transfer of data among hardware devices. The BIOS is stored in read-only memory (ROM) so that it can be executed when you turn on the computer. Although critical to performance, the BIOS is usually invisible to computer users.
basic storage
A storage method in MS-DOS, Windows, Windows NT, and Windows 2000 for primary partitions, extended partitions, and logical drives.
basic volume
A primary partition or logical drive that resides on a basic disk.
batch program
An ASCII (unformatted text) file that contains one or more operating system commands. A batch program's file name has a .cmd or .bat extension. When you type the file name at the command prompt, or when the batch program is run from another program, its commands are processed sequentially. Batch programs are also called batch files.
baud rate
The speed at which a modem communicates. Baud rate refers to the number of times the condition of the line changes. This is equal to bits per second only if each signal corresponds to one bit of transmitted data.
Modems must operate at the same baud rate in order to communicate with each other. If the baud rate of one modem is set higher than that of the other, the faster modem usually alters its baud rate to match that of the slower modem.
Berkeley Internet Name Domain (BIND)
An implementation of DNS written and ported to most available versions of the UNIX operating system. The Internet Software Consortium maintains the BIND software.
binary
A base-2 number system in which values are expressed as combinations of two digits, 0 and 1.
BIND boot file
Configuration file used by Domain Name System (DNS) servers running under versions of the Berkeley Internet Name Domain (BIND) software implementation. The BIND boot file is a text file, Named.boot, where individual lines in the file list boot directives used to start a service when the DNS server is started. By default, Microsoft DNS servers use DNS service parameters stored in the registry, but they allow the use of a BIND boot file as an alternative for reading boot configuration settings.
bindery
A database in Novell NetWare 3.x that contains organizational and security information about users and groups.
bit (binary digit)
The smallest unit of information handled by a computer. One bit expresses a 1 or a 0 in a binary numeral, or a true or false logical condition. A group of 8 bits makes up a byte, which can represent many types of information, such as a letter of the alphabet, a decimal digit, or other character. Bit is also called binary digit.
bits per second (bps)
The number of bits transmitted every second, used as a measure of the speed at which a device, such as a modem, can transfer data.
boot
The process of starting or resetting a computer. When first turned on (cold boot) or reset (warm boot), the computer runs the software that loads and starts the computer's operating system, which prepares it for use.
boot files
The system files needed to start Windows. The boot files include Ntldr and Ntdetect.com.
Boot Logging
A process in which a computer that is starting (booting) creates a log file that records the loading of each device and service. The log file is called Ntbtlog.txt, and it is saved in the system root directory.
boot partition
The partition that contains the Windows operating system and its support files. The boot partition can be, but does not have to be, the same as the system partition.
boot volume
The volume that contains the Windows operating system and its support files. The boot volume can be, but does not have to be, the same as the system volume.
BOOTP extensions
A set of optional information types defined originally in RFC 1497 for use with BOOTP service and later supported by DHCP. In DHCP, these extensions form the legacy core set of client parameters available and supported by most standard DHCP and BOOTP servers.
bootstrap protocol (BOOTP)
A protocol used primarily on TCP/IP networks to configure diskless workstations. RFCs 951 and 1542 define this protocol. DHCP is a later boot configuration protocol that uses this protocol. The Microsoft DHCP service provides limited support for BOOTP service.
broadband
Of or relating to communications systems in which the medium of transmission (such as a wire or fiber-optic cable) carries multiple messages at a time, each message modulated on its own carrier frequency by a modem.
broadband connection
A high-speed connection. Broadband connections are typically 256 kilobytes per second (KBps) or faster. Broadband includes DSL and cable modem service.
broadband integrated services digital network (B-ISDN)
An ITU-T communication standard for high-speed networking that provides new services, including voice, video, and data on the same network.
broadcast
An address that is destined for all hosts on a particular network segment.
browser
Software that interprets the markup of files in HTML, formats them into Web pages, and displays them to the end user. Some browsers also permit end users to send and receive e-mail, read newsgroups, and play sound or video files embedded in Web documents.
buffer
A region of RAM reserved for use with data that is temporarily held while waiting to be transferred between two locations, such as between an application's data area and an input/output device.
built-in groups
The default security groups installed with the operating system. Built-in groups have been granted useful collections of rights and built-in abilities.
In most cases, built-in groups provide all the capabilities needed by a particular user. For example, if a domain user account belongs to the built-in Administrators group, logging on with that account gives a user administrative capabilities over the domain and the domain servers. To provide a needed set of capabilities to a user account, assign it to the appropriate built-in group.
bus
A communication line used for data transfer among the components of a computer system. A bus essentially allows different parts of the system to share data. For example, a bus connects the disk-drive controller, memory, and input/output ports to the microprocessor.
bytes
A unit of data that typically holds a single character, such as a letter, a digit, or a punctuation mark. Some single characters can take up more than one byte.
From: Help and Support Center Win XP
A single channel of an ISDN line that is used to carry either voice or data information. ISDN Basic Rate Interface (BRI) has 2 B-channels. ISDN Primary Rate Interface (PRI) in North America has 23 B-channels. ISDN Primary Rate Interface (PRI) in Europe has 30 B-channels. B-channel is also called bearer channel.
background
The screen background image used on a graphical user interface such as Windows. Any pattern or picture that can be stored as a bitmap (.bmp) file can be set as a screen background.
background program
A program that runs while the user is working on another task. The computer's microprocessor assigns fewer resources to background programs than foreground programs.
backup domain controller (BDC)
In Windows NT Server 4.0 or earlier, a computer running Windows NT Server that receives a copy of the domain's directory database (which contains all account and security policy information for the domain).
The copy is synchronized periodically and automatically with the master copy on the primary domain controller (PDC). BDCs also authenticate user logon information and can be promoted to function as PDCs as needed. Multiple BDCs can exist in a domain. Windows NT 3.51 and 4.0 BDCs can participate in a Windows 2000 domain when the domain is configured in mixed mode.
backup media pool
A logical collection of data-storage media that has been reserved for use by Microsoft Windows Backup. Backup uses Removable Storage to control access to specific media within a library.
backup operator
A type of local or global group that contains the user rights you need to back up and restore files and folders. Members of the Backup Operators group can back up and restore files and folders regardless of ownership, permissions, encryption, or auditing settings.
backup set
A collection of files, folders, and other data that has been backed up and stored in a file or on one or more tapes.
backup set catalog
A summary of the files and folders that have been saved in a backup set.
backup types
A type that determines which data is backed up and how it is backed up. There are five backup types: copy, daily, differential, incremental, and normal.
bandwidth
In analog communications, the difference between the highest and lowest frequencies in a given range. For example, an analog telephone line accommodates a bandwidth of 3,000 hertz (Hz), the difference between the lowest (300 Hz) and highest (3,300 Hz) frequencies it can carry. In digital communications, bandwidth is expressed in bits per second (bps).
Bandwidth Allocation Protocol (BAP)
A PPP control protocol that is used on a multiprocessing connection to dynamically add and remove links.
base priority
A precedence ranking that determines the order in which the threads of a process are scheduled for the processor. Use Task Manager to view and change base priorities.
For Message Queuing, a property that specifies the queue's priority in a public queue. You can set the base priority from -32,768 to 32,767; the default priority is 0. Private queues do not support base priority. Message Queuing routes and delivers messages first by base priority, then by message priority.
basic disk
A physical disk that can be accessed by MS-DOS and all Windows-based operating systems. Basic disks can contain up to four primary partitions, or three primary partitions and an extended partition with multiple logical drives. If you want to create partitions that span multiple disks, you must first convert the basic disk to a dynamic disk using Disk Management or the Diskpart.exe command-line utility.
basic input/output system (BIOS)
On x86-based computers, the set of essential software routines that test hardware at startup, start the operating system, and support the transfer of data among hardware devices. The BIOS is stored in read-only memory (ROM) so that it can be executed when you turn on the computer. Although critical to performance, the BIOS is usually invisible to computer users.
basic storage
A storage method in MS-DOS, Windows, Windows NT, and Windows 2000 for primary partitions, extended partitions, and logical drives.
basic volume
A primary partition or logical drive that resides on a basic disk.
batch program
An ASCII (unformatted text) file that contains one or more operating system commands. A batch program's file name has a .cmd or .bat extension. When you type the file name at the command prompt, or when the batch program is run from another program, its commands are processed sequentially. Batch programs are also called batch files.
baud rate
The speed at which a modem communicates. Baud rate refers to the number of times the condition of the line changes. This is equal to bits per second only if each signal corresponds to one bit of transmitted data.
Modems must operate at the same baud rate in order to communicate with each other. If the baud rate of one modem is set higher than that of the other, the faster modem usually alters its baud rate to match that of the slower modem.
Berkeley Internet Name Domain (BIND)
An implementation of DNS written and ported to most available versions of the UNIX operating system. The Internet Software Consortium maintains the BIND software.
binary
A base-2 number system in which values are expressed as combinations of two digits, 0 and 1.
BIND boot file
Configuration file used by Domain Name System (DNS) servers running under versions of the Berkeley Internet Name Domain (BIND) software implementation. The BIND boot file is a text file, Named.boot, where individual lines in the file list boot directives used to start a service when the DNS server is started. By default, Microsoft DNS servers use DNS service parameters stored in the registry, but they allow the use of a BIND boot file as an alternative for reading boot configuration settings.
bindery
A database in Novell NetWare 3.x that contains organizational and security information about users and groups.
bit (binary digit)
The smallest unit of information handled by a computer. One bit expresses a 1 or a 0 in a binary numeral, or a true or false logical condition. A group of 8 bits makes up a byte, which can represent many types of information, such as a letter of the alphabet, a decimal digit, or other character. Bit is also called binary digit.
bits per second (bps)
The number of bits transmitted every second, used as a measure of the speed at which a device, such as a modem, can transfer data.
boot
The process of starting or resetting a computer. When first turned on (cold boot) or reset (warm boot), the computer runs the software that loads and starts the computer's operating system, which prepares it for use.
boot files
The system files needed to start Windows. The boot files include Ntldr and Ntdetect.com.
Boot Logging
A process in which a computer that is starting (booting) creates a log file that records the loading of each device and service. The log file is called Ntbtlog.txt, and it is saved in the system root directory.
boot partition
The partition that contains the Windows operating system and its support files. The boot partition can be, but does not have to be, the same as the system partition.
boot volume
The volume that contains the Windows operating system and its support files. The boot volume can be, but does not have to be, the same as the system volume.
BOOTP extensions
A set of optional information types defined originally in RFC 1497 for use with BOOTP service and later supported by DHCP. In DHCP, these extensions form the legacy core set of client parameters available and supported by most standard DHCP and BOOTP servers.
bootstrap protocol (BOOTP)
A protocol used primarily on TCP/IP networks to configure diskless workstations. RFCs 951 and 1542 define this protocol. DHCP is a later boot configuration protocol that uses this protocol. The Microsoft DHCP service provides limited support for BOOTP service.
broadband
Of or relating to communications systems in which the medium of transmission (such as a wire or fiber-optic cable) carries multiple messages at a time, each message modulated on its own carrier frequency by a modem.
broadband connection
A high-speed connection. Broadband connections are typically 256 kilobytes per second (KBps) or faster. Broadband includes DSL and cable modem service.
broadband integrated services digital network (B-ISDN)
An ITU-T communication standard for high-speed networking that provides new services, including voice, video, and data on the same network.
broadcast
An address that is destined for all hosts on a particular network segment.
browser
Software that interprets the markup of files in HTML, formats them into Web pages, and displays them to the end user. Some browsers also permit end users to send and receive e-mail, read newsgroups, and play sound or video files embedded in Web documents.
buffer
A region of RAM reserved for use with data that is temporarily held while waiting to be transferred between two locations, such as between an application's data area and an input/output device.
built-in groups
The default security groups installed with the operating system. Built-in groups have been granted useful collections of rights and built-in abilities.
In most cases, built-in groups provide all the capabilities needed by a particular user. For example, if a domain user account belongs to the built-in Administrators group, logging on with that account gives a user administrative capabilities over the domain and the domain servers. To provide a needed set of capabilities to a user account, assign it to the appropriate built-in group.
bus
A communication line used for data transfer among the components of a computer system. A bus essentially allows different parts of the system to share data. For example, a bus connects the disk-drive controller, memory, and input/output ports to the microprocessor.
bytes
A unit of data that typically holds a single character, such as a letter, a digit, or a punctuation mark. Some single characters can take up more than one byte.
From: Help and Support Center Win XP
Selasa, 11 Maret 2008
Windows XP Symbol (A)
AA (address) resource record
A resource record used to map a DNS domain name to a host IP address on the network.
access control
A security mechanism that determines which operations a user, group, service, or computer is authorized to perform on a computer or on a particular object, such as a file, printer, registry key, or directory service object.
access control entry (ACE)
An entry in an object's discretionary access control list (DACL) that grants permissions to a user or group. An ACE is also an entry in an object's system access control list (SACL) that specifies the security events to be audited for a user or group.
account lockout
A Windows security feature that locks a user account if a number of failed logon attempts occur within a specified amount of time, based on security policy lockout settings. Locked accounts cannot log on.
acknowledgment message
For Message Queuing, a message class that indicates that a message arrived or was retrieved by the target application (a positive acknowledgment), or that an error occurred before the original message could be retrieved (a negative acknowledgment). These messages are sent to administration queues on the source computer.
active
Describes the window or icon that you are currently using or that is currently selected. The operating system always applies the next keystroke or command you choose to the active window. Windows or icons on the desktop that are not selected are inactive.
active content
Dynamic content, such as a stock ticker, a weather map, or news, that is usually updated from the World Wide Web or a channel.
Active Directory
The directory service that stores information about objects on a network and makes this information available to users and network administrators. Active Directory gives network users access to permitted resources anywhere on the network using a single logon process. It provides network administrators with an intuitive, hierarchical view of the network and a single point of administration for all network objects.
Active Directory data model
A model derived from the LDAP data model. The directory holds objects that represent entities of various sorts, described by attributes. The objects and classes of objects that can be stored in the directory are defined in the schema. For each class of objects, the schema defines the attributes an instance of the class must have, the additional attributes it can have, and the class that can be its parent.
Active Directory Users and Computers
An administrative tool designed to perform day-to-day Active Directory administration tasks. These tasks include creating, deleting, modifying, moving, and setting permissions on objects stored in the directory. These objects include organizational units, users, contacts, groups, computers, printers, and shared file objects.
active partition
A partition from which an x86-based computer starts up. The active partition must be a primary partition on a basic disk. If you use Windows exclusively, the active partition can be the same as the system volume.
active volume
The volume from which the computer starts up. The active volume must be a simple volume on a dynamic disk. You cannot mark an existing dynamic volume as the active volume, but you can upgrade a basic disk containing the active partition to a dynamic disk. Once the disk is upgraded to dynamic, the partition becomes a simple volume that is active.
ActiveX
A set of technologies that allows software components to interact with one another in a networked environment, regardless of the language in which the components were created.
address (A) resource record
A resource record used to map a DNS domain name to a host IP address on the network.
address classes
Predefined groupings of Internet addresses with each class defining networks of a certain size. The range of numbers that can be assigned for the first octet in the IP address is based on the address class. Class A networks (values 1 to 126) are the largest, with more than 16 million hosts per network. Class B networks (128 to 191) have up to 65,534 hosts per network, and Class C networks (192 to 223) can have up to 254 hosts per network.
Address Resolution Protocol (ARP)
In TCP/IP, a protocol that uses broadcast traffic on the local network to resolve a logically assigned IP address to its physical hardware or media access control layer address.
In ATM, ARP is used two different ways. For classical IP over ATM, ARP is used to resolve addresses to ATM hardware addresses. For ATM LAN emulation, ARP is used to resolve Ethernet/802.3 or Token Ring addresses to ATM hardware addresses.
administration queue
For Message Queuing, a queue that stores acknowledgment messages.
administrative alerts
Alerts that relate to server and resource use. They notify users about problems in areas such as security and access, user sessions, server shutdown due to power loss (when an uninterruptible power supply is available), directory replication, and printing. When a computer generates an administrative alert, a message is sent to a predefined list of users and computers.
administrator
For Windows XP Professional, a person responsible for setting up and managing domain controllers or local computers and their user and group accounts, assigning passwords and permissions, and helping users with networking problems. Administrators are members of the Administrators group and have full control over the domain or computer.
For Windows XP Home Edition, a person who can make system-wide changes to the computer, install software, and who has access to all files on the computer. A person with a computer administrator account has full access to other user accounts on the computer.
Advanced Configuration and Power Interface (ACPI)
An open industry specification that defines power management on a wide range of mobile, desktop, and server computers and peripherals. ACPI is the foundation for the OnNow industry initiative that allows system manufacturers to deliver computers that will start at the touch of a keyboard. ACPI design is essential to take full advantage of power management and Plug and Play.
affinity
For Network Load Balancing, the method used to associate client requests to cluster hosts. When no affinity is specified, all network requests are load balanced across the cluster without respect to their source. Affinity is implemented by directing all client requests from the same IP address to the same cluster host.
agent
An application that runs on a Simple Network Management Protocol (SNMP) managed device. The agent application is the object of management activities. A computer running SNMP agent software is also sometimes referred to as an agent.
Alerter service
A service used by the server and other services to notify selected users and computers of administrative alerts that occur on a computer. The Alerter service requires the Messenger service.
allocation unit
The smallest amount of disk space that can be allocated to hold a file. All file systems used by Windows organize hard disks based on allocation units. The smaller the allocation unit size, the more efficiently a disk stores information. If you do not specify an allocation unit size when formatting the disk, Windows picks default sizes based on the size of the volume. These default sizes are selected to reduce the amount of space that is lost and the amount of fragmentation on the volume. An allocation unit is also called a cluster.
American Standard Code for Information Interchange (ASCII)
A standard single-byte character encoding scheme used for text-based data. ASCII uses designated 7-bit or 8-bit number combinations to represent either 128 or 256 possible characters. Standard ASCII uses 7 bits to represent all uppercase and lowercase letters, the numbers 0 through 9, punctuation marks, and special control characters used in U.S. English. Most current x86-based systems support the use of extended (or "high") ASCII. Extended ASCII allows the eighth bit of each character to identify an additional 128 special symbol characters, foreign-language letters, and graphic symbols.
AppleTalk
The Apple Computer network architecture and network protocols. A network that has Macintosh clients and a computer running Windows 2000 Server or Windows NT Server with Services for Macintosh functions as an AppleTalk network.
AppleTalk Phase 2
The extended AppleTalk Internet model designed by Apple Computer that supports multiple zones within a network and extended addressing capacity.
application programming interface (API)
A set of routines that an application uses to request and carry out lower-level services performed by a computer's operating system. These routines usually carry out maintenance tasks such as managing files and displaying information.
Asymmetric Digital Subscriber Line (ADSL)
A high-bandwidth digital transmission technology that uses existing phone lines and also allows voice transmissions over the same lines. Most of the traffic is transmitted downstream to the user, generally at rates of 512 Kbps to about 6 Mbps.
asynchronous communication
A form of data transmission in which information is sent and received at irregular intervals, one character at a time. Because data is received at irregular intervals, the receiving modem must be signaled to let it know when the data bits of a character begin and end. This is done by means of start and stop bits.
Asynchronous Transfer Mode (ATM)
A high-speed connection-oriented protocol used to transport many different types of network traffic. ATM packages data in a 53-byte, fixed-length cell that can be switched quickly between logical connections on a network.
ATM adaptation layer (AAL)
The layer of the ATM protocol stack that parses data into the payload portion of the ATM cell for transport across an ATM network.
attribute
For files, information that indicates whether a file is read-only, hidden, ready for archiving (backing up), compressed, or encrypted, and whether the file contents should be indexed for fast file searching.
In Active Directory, characteristics of an object and the type of information an object can hold. For each object class, the schema defines what attributes an instance of the class must have and what additional attributes it might have.
audio input device
An audio input device records music and voice input into your computer. Examples of audio input devices are CD-ROM players and microphones.
audit policy
A policy that determines the security events to be reported to the network administrator.
auditing
The process that tracks the activities of users by recording selected types of events in the security log of a server or a workstation.
authentication
The process for verifying that an entity or object is who or what it claims to be. Examples include confirming the source and integrity of information, such as verifying a digital signature or verifying the identity of a user or computer.
authoritative
For DNS, describes a DNS server hosting a zone, or a zone containing a name or record. When a DNS server is configured to host a zone, it is said to be authoritative for names that do exist or could exist within that zone. A DNS server is allowed to respond authoritatively to queries for domain names for which it is authoritative. A zone is said to be authoritative for a name if the name exists or could exist within a zone, and it is said to be authoritiative for a record if the owner name of the record exists or could exist within a zone.
authoritative restore
In Backup, a type of restore operation performed on an Active Directory domain controller in which the objects in the restored directory are treated as authoritative, replacing (through replication) all existing copies of those objects. Authoritative restore is applicable only to replicated system state data such as Active Directory data and File Replication service data. Use the Ntdsutil.exe utility to perform an authoritative restore.
authorization
The process that determines what a user is permitted to do on a computer system or network.
Automatic Private IP Addressing (APIPA)
A feature of Windows XP TCP/IP that automatically configures a unique IP address from the range 169.254.0.1 through 169.254.255.254 and a subnet mask of 255.255.0.0 when the TCP/IP protocol is configured for dynamic addressing and a Dynamic Host Configuration Protocol (DHCP) is not available.
availability
A measure of the fault tolerance of a computer and its programs. A highly available computer runs 24 hours a day, 7 days a week.
From: Help and Support Center Win XP
A resource record used to map a DNS domain name to a host IP address on the network.
access control
A security mechanism that determines which operations a user, group, service, or computer is authorized to perform on a computer or on a particular object, such as a file, printer, registry key, or directory service object.
access control entry (ACE)
An entry in an object's discretionary access control list (DACL) that grants permissions to a user or group. An ACE is also an entry in an object's system access control list (SACL) that specifies the security events to be audited for a user or group.
account lockout
A Windows security feature that locks a user account if a number of failed logon attempts occur within a specified amount of time, based on security policy lockout settings. Locked accounts cannot log on.
acknowledgment message
For Message Queuing, a message class that indicates that a message arrived or was retrieved by the target application (a positive acknowledgment), or that an error occurred before the original message could be retrieved (a negative acknowledgment). These messages are sent to administration queues on the source computer.
active
Describes the window or icon that you are currently using or that is currently selected. The operating system always applies the next keystroke or command you choose to the active window. Windows or icons on the desktop that are not selected are inactive.
active content
Dynamic content, such as a stock ticker, a weather map, or news, that is usually updated from the World Wide Web or a channel.
Active Directory
The directory service that stores information about objects on a network and makes this information available to users and network administrators. Active Directory gives network users access to permitted resources anywhere on the network using a single logon process. It provides network administrators with an intuitive, hierarchical view of the network and a single point of administration for all network objects.
Active Directory data model
A model derived from the LDAP data model. The directory holds objects that represent entities of various sorts, described by attributes. The objects and classes of objects that can be stored in the directory are defined in the schema. For each class of objects, the schema defines the attributes an instance of the class must have, the additional attributes it can have, and the class that can be its parent.
Active Directory Users and Computers
An administrative tool designed to perform day-to-day Active Directory administration tasks. These tasks include creating, deleting, modifying, moving, and setting permissions on objects stored in the directory. These objects include organizational units, users, contacts, groups, computers, printers, and shared file objects.
active partition
A partition from which an x86-based computer starts up. The active partition must be a primary partition on a basic disk. If you use Windows exclusively, the active partition can be the same as the system volume.
active volume
The volume from which the computer starts up. The active volume must be a simple volume on a dynamic disk. You cannot mark an existing dynamic volume as the active volume, but you can upgrade a basic disk containing the active partition to a dynamic disk. Once the disk is upgraded to dynamic, the partition becomes a simple volume that is active.
ActiveX
A set of technologies that allows software components to interact with one another in a networked environment, regardless of the language in which the components were created.
address (A) resource record
A resource record used to map a DNS domain name to a host IP address on the network.
address classes
Predefined groupings of Internet addresses with each class defining networks of a certain size. The range of numbers that can be assigned for the first octet in the IP address is based on the address class. Class A networks (values 1 to 126) are the largest, with more than 16 million hosts per network. Class B networks (128 to 191) have up to 65,534 hosts per network, and Class C networks (192 to 223) can have up to 254 hosts per network.
Address Resolution Protocol (ARP)
In TCP/IP, a protocol that uses broadcast traffic on the local network to resolve a logically assigned IP address to its physical hardware or media access control layer address.
In ATM, ARP is used two different ways. For classical IP over ATM, ARP is used to resolve addresses to ATM hardware addresses. For ATM LAN emulation, ARP is used to resolve Ethernet/802.3 or Token Ring addresses to ATM hardware addresses.
administration queue
For Message Queuing, a queue that stores acknowledgment messages.
administrative alerts
Alerts that relate to server and resource use. They notify users about problems in areas such as security and access, user sessions, server shutdown due to power loss (when an uninterruptible power supply is available), directory replication, and printing. When a computer generates an administrative alert, a message is sent to a predefined list of users and computers.
administrator
For Windows XP Professional, a person responsible for setting up and managing domain controllers or local computers and their user and group accounts, assigning passwords and permissions, and helping users with networking problems. Administrators are members of the Administrators group and have full control over the domain or computer.
For Windows XP Home Edition, a person who can make system-wide changes to the computer, install software, and who has access to all files on the computer. A person with a computer administrator account has full access to other user accounts on the computer.
Advanced Configuration and Power Interface (ACPI)
An open industry specification that defines power management on a wide range of mobile, desktop, and server computers and peripherals. ACPI is the foundation for the OnNow industry initiative that allows system manufacturers to deliver computers that will start at the touch of a keyboard. ACPI design is essential to take full advantage of power management and Plug and Play.
affinity
For Network Load Balancing, the method used to associate client requests to cluster hosts. When no affinity is specified, all network requests are load balanced across the cluster without respect to their source. Affinity is implemented by directing all client requests from the same IP address to the same cluster host.
agent
An application that runs on a Simple Network Management Protocol (SNMP) managed device. The agent application is the object of management activities. A computer running SNMP agent software is also sometimes referred to as an agent.
Alerter service
A service used by the server and other services to notify selected users and computers of administrative alerts that occur on a computer. The Alerter service requires the Messenger service.
allocation unit
The smallest amount of disk space that can be allocated to hold a file. All file systems used by Windows organize hard disks based on allocation units. The smaller the allocation unit size, the more efficiently a disk stores information. If you do not specify an allocation unit size when formatting the disk, Windows picks default sizes based on the size of the volume. These default sizes are selected to reduce the amount of space that is lost and the amount of fragmentation on the volume. An allocation unit is also called a cluster.
American Standard Code for Information Interchange (ASCII)
A standard single-byte character encoding scheme used for text-based data. ASCII uses designated 7-bit or 8-bit number combinations to represent either 128 or 256 possible characters. Standard ASCII uses 7 bits to represent all uppercase and lowercase letters, the numbers 0 through 9, punctuation marks, and special control characters used in U.S. English. Most current x86-based systems support the use of extended (or "high") ASCII. Extended ASCII allows the eighth bit of each character to identify an additional 128 special symbol characters, foreign-language letters, and graphic symbols.
AppleTalk
The Apple Computer network architecture and network protocols. A network that has Macintosh clients and a computer running Windows 2000 Server or Windows NT Server with Services for Macintosh functions as an AppleTalk network.
AppleTalk Phase 2
The extended AppleTalk Internet model designed by Apple Computer that supports multiple zones within a network and extended addressing capacity.
application programming interface (API)
A set of routines that an application uses to request and carry out lower-level services performed by a computer's operating system. These routines usually carry out maintenance tasks such as managing files and displaying information.
Asymmetric Digital Subscriber Line (ADSL)
A high-bandwidth digital transmission technology that uses existing phone lines and also allows voice transmissions over the same lines. Most of the traffic is transmitted downstream to the user, generally at rates of 512 Kbps to about 6 Mbps.
asynchronous communication
A form of data transmission in which information is sent and received at irregular intervals, one character at a time. Because data is received at irregular intervals, the receiving modem must be signaled to let it know when the data bits of a character begin and end. This is done by means of start and stop bits.
Asynchronous Transfer Mode (ATM)
A high-speed connection-oriented protocol used to transport many different types of network traffic. ATM packages data in a 53-byte, fixed-length cell that can be switched quickly between logical connections on a network.
ATM adaptation layer (AAL)
The layer of the ATM protocol stack that parses data into the payload portion of the ATM cell for transport across an ATM network.
attribute
For files, information that indicates whether a file is read-only, hidden, ready for archiving (backing up), compressed, or encrypted, and whether the file contents should be indexed for fast file searching.
In Active Directory, characteristics of an object and the type of information an object can hold. For each object class, the schema defines what attributes an instance of the class must have and what additional attributes it might have.
audio input device
An audio input device records music and voice input into your computer. Examples of audio input devices are CD-ROM players and microphones.
audit policy
A policy that determines the security events to be reported to the network administrator.
auditing
The process that tracks the activities of users by recording selected types of events in the security log of a server or a workstation.
authentication
The process for verifying that an entity or object is who or what it claims to be. Examples include confirming the source and integrity of information, such as verifying a digital signature or verifying the identity of a user or computer.
authoritative
For DNS, describes a DNS server hosting a zone, or a zone containing a name or record. When a DNS server is configured to host a zone, it is said to be authoritative for names that do exist or could exist within that zone. A DNS server is allowed to respond authoritatively to queries for domain names for which it is authoritative. A zone is said to be authoritative for a name if the name exists or could exist within a zone, and it is said to be authoritiative for a record if the owner name of the record exists or could exist within a zone.
authoritative restore
In Backup, a type of restore operation performed on an Active Directory domain controller in which the objects in the restored directory are treated as authoritative, replacing (through replication) all existing copies of those objects. Authoritative restore is applicable only to replicated system state data such as Active Directory data and File Replication service data. Use the Ntdsutil.exe utility to perform an authoritative restore.
authorization
The process that determines what a user is permitted to do on a computer system or network.
Automatic Private IP Addressing (APIPA)
A feature of Windows XP TCP/IP that automatically configures a unique IP address from the range 169.254.0.1 through 169.254.255.254 and a subnet mask of 255.255.0.0 when the TCP/IP protocol is configured for dynamic addressing and a Dynamic Host Configuration Protocol (DHCP) is not available.
availability
A measure of the fault tolerance of a computer and its programs. A highly available computer runs 24 hours a day, 7 days a week.
From: Help and Support Center Win XP
Langganan:
Postingan (Atom)