Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CIT226 Final Terms

CIT226 Win Server 2016 Termonology for Final Exam

TermDefinition
.NET Framework An environment that is built into Windows Server 2016 that is used to develop and execute applications.
Active Directory A central database of computers, users, shared printers, shared folders, other network resources, and resource groupings that is used to manage a network and enable users to quickly find a particular resource.
Address Resolution Protocol (ARP) A protocol in the TCP/IP suite that enables a sending station to determine the MAC or physical address of another station on a network.
American National Standards Institute (ANSI) An organization that works to set standards for all types of products, including network equipment.
anycast A packet that goes only to the closest interface and does not attempt to reach other interfaces with the same address.
Automatic Private IP Addressing (APIPA) Windows Server 2016 supports Automatic Private IP Addressing (APIPA) to automatically configure the TCP/IP settings for a computer. The computer assigns itself an IP address in the range of 169.254.0.1–169.254.255.254, if a DHCP server is not available.
broadcast A message sent to all computers on a network (but usually blocked to other networks by a router).
client A computer that accesses resources on another computer via a network or direct cable connection.
clustering Linking two or more discrete computer systems so they appear to function as though they are one, thus increasing the ability to access server resources and provide fail-safe services.
cmdlet A command-line tool available in Windows PowerShell. See Windows PowerShell.
connectionless communication Also called a connectionless service, a communication service that provides no checks (or minimal checks) to make sure that data accurately reaches the destination node.
connection-oriented communication This service provides several ways to ensure that data is successfully received at the destination, such as requiring an acknowledgement of receipt and using a checksum to make sure the packet or frame contents are accurate.
container An operating environment that enables applications to run in an isolated fashion and provides the ability to execute multiple applications on one computer system.
Data Encryption Standard (DES) A network symmetric-key encryption standard developed by the National Institute of Standards and Technology (NIST) and the American National Standards Institute (ANSI).
default gateway The IP address of the router that has a connection to other networks. The default gateway address is used when the host computer you are trying to contact exists on another network.
Desired State Configuration A feature of Windows Server 2016 that enables monitoring of specific server states and roles to ensure that desired server states are not inadvertently altered.
domain A grouping of resource objects—for example, servers, computers, and user accounts— to enable easier centralized management of these objects. On Windows Server 2016 networks, a domain is contained within Active Directory
Domain Name System (DNS) Also called Domain Name Service, a TCP/IP application protocol that enables a DNS server to resolve (translate) domain and computer names to IP addresses or IP addresses to domain and computer names.
dotted decimal notation An addressing technique that uses four octets, such as 10000110.11 011110.01100101.00000101, converted to decimal (e.g., 134.222.101.5) to differentiate individual servers, workstations, and other network devices.
dynamic addressing An IP address that is automatically assigned to a client from a general pool of available addresses and that might be assigned each time the client is started, or it might be assigned for a period of days, weeks, months, or longer.
Dynamic Domain Name System (DDNS) A form of DNS that enables client computers to update DNS registration information so that this does not have to be done manually. DDNS is often used with DHCP servers to automatically register IP addresses on a DNS server.
Dynamic Host Configuration Protocol (DHCP) A network protocol that provides a way for a server to automatically assign an IP address to a workstation on its network.
frame A unit of data that is transmitted on a network that A unit of data that is transmitted on a network that contains control and address information, but not routing information.
Generic Routing Encapsulation (GRE) tunneling A protocol that encapsulates a packet payload for transport through a private tunnel over a network that goes from one point to another.
Hyper-V Virtualization software developed by Microsoft that is included with Windows Server 2016 Standard and Datacenter Editions. See virtualization.
Internet Information Services (IIS) A Microsoft Windows Server component that provides Internet, web, FTP, mail, and other services to make the server into a full-featured web server.
Internet Protocol (IP) The Internet layer protocol responsible for addressing packets so that they are delivered on the local network or across routers to other networks or subnets.
Internet Protocol Version 4 (IPv4) The most commonly used version of IP, which has been in use for many years. IPv4 has a limitation in that it was not designed to anticipate the vast numbers of networks and network users currently in existence.
Internet Protocol Version 6 (IPv6) The newest version of IP that is designed for enhanced security and that can handle the addressing needs of growing networks.
IP address A logical address assigned to each host on an IP network. It is used to identify a specific host on a specific network.
kernel An essential set of programs and computer code that allows a computer operating system to control processor, disk, memory, and other functions central to its basic operation.
latency The time it takes for information to travel from the transmitting device to the receiving device.
Linux Integration Services (LIS) Services for Hyper-V that support Linux virtual machines and Linux clients.
local area network (LAN) A network of computers in relatively close proximity, such as on the same floor or in the same building.
logical processor A core within a multi-core processor that can run its own executable threads.
media access control (MAC) address Also called a physical or device address, the hexadecimal number permanently assigned to a network interface and used by the MAC sublayer (a communications sublayer for controlling how computers share communications on the same network).
multicast A single message is sent from one location and received at several different locations that are subscribed to receive that message.
multitasking The capability of a computer to run two or more programs at the same time.
multithreading Running several program processes or parts (threads) at the same time.
name resolution A process used to translate a computer’s logical or host name into a network address, such as to a dotted decimal address associated with a computer—and vice versa.
National Institute of Standards and Technology (NIST) This agency is a physical science laboratory that works to research and standardize measurements and applied technologies. NIST is part of the U.S. Department of Commerce and was first created to help make U.S. businesses more competitive.
NetBIOS name A name or identifier used in older Windows systems to uniquely identify a computer.
network A communications system that enables computer users to share computer equipment, software, data, voice, and video transmissions.
Network Address Translation (NAT) NAT translates IP addresses on an internal or local network so that the actual IP addresses cannot be determined on the Internet, because the address seen on the Internet is a decoy address used from a pool of decoy addresses.
network interface card (NIC) An adaptor board or device to connect a workstation, server, or other network device to a network medium. The connection can be wired or wireless.
packet A unit of data transmitted on a network that contains control and address information as well as routing information.
parallel rebuild A Windows Server 2016 feature that enables a failed disk in RAID (a set of disks for redundant storage) to be rebuilt significantly faster.
peer-to-peer networking A network on which any computer can communicate with other networked computers on an equal or peer basis without going through an intermediary, such as a server or host.
physical processor A processor chip plugged into a processor socket on a motherboard in a computer.
preemptive multitasking Running two or more programs simultaneously so that each program runs in an area of memory separate from areas used by other programs.
privileged mode A protected memory space allocated for the Windows Server 2016 kernel that cannot be directly accessed by software applications.
process A computer program or portion of a program that is currently running. One large program might start several smaller programs or processes.
processor socket A receptacle on a computer motherboard into which a processor chip is plugged.
protocol A strictly defined set of rules for communication across a network that specifies how networked data is formatted for transmission, how it is transmitted, and how it is interpreted at the receiving end.
Registry A database used to store information about the configuration, program setup, devices drivers, and other data important to the setup of Windows operating systems, such as Windows Server 2016.
router A device that connects networks, is able to read IP addresses, and can route or forward packets of data to designated networks.
script A file of shell commands that are run as a unit within the shell. The shell interprets the commands to the operating system one line at a time. Scripts save time because commands don’t have to be typed individually by the user.
server A single computer that provides extensive multiuser access to network resources.
server-based networking A model in which access to the network and resources, and the management of resources, is accomplished through one or more servers.
Server Manager A comprehensive server management tool offered through Windows Server 2016.
shell Command interpreter, that enables communication with an operating system. Commands that are run within a shell are typically specific to that shell (although different shells sometimes use the same or similar commands, particularly in UNIX and Linux).
SQL Server A relational database system from Microsoft that is used to build enterprise databases.
static addressing An IP address that is assigned to a client and remains in use until it is manually changed.
storage pinning Used with storage tiering to enable you to move specific files to a given storage location and ensure that those files are always kept in that location.
storage tiering A Windows Server 2016 feature that allows selected blocks of data to be moved to specific locations, such as to solid state storage instead of disk storage.
subnet mask Used to distinguish between the network part and the host part of the IP address and to enable networks to be divided into subnets.
symmetric multiprocessor (SMP) computer A computer that uses more than one processor.
total cost of ownership (TCO) The cost of installing and maintaining computers and equipment on a network, which includes hardware, software, maintenance, and support costs.
Transmission Control Protocol (TCP) This transport protocol, which is part of the TCP/IP suite, establishes communication sessions between networked software application processes and provides for reliable end-to-end delivery of data by controlling data flow.
Transmission Control Protocol/Internet Protocol (TCP/IP) The default protocol suite installed with Windows Server 2016 that enables network communication.
unicast A message that goes from one single computer to another single computer.
User Datagram Protocol (UDP) A connectionless protocol that can be used with IP, instead of TCP.
virtual desktop Enables you to run different desktops side-by-side, such as having one desktop working with programming tools and another desktop using server administration tools.
virtual machine An instance of a discrete operating system running within virtual server software on one computer. Multiple virtual machines can run within the virtual server software on one computer.
virtual processor A logical processor in a computer that is used by a virtual machine.
virtual server A computer running virtual server software that enables configuring multiple virtual machines. See virtual machine.
virtualization Software that enables one computer to run two or more operating systems that are live at the same time and in which one application running in one operating system does not interfere with an application running in a different operating system.
Windows Defender Software available from Microsoft to protect against spyware, adware, viruses, and other malware.
Windows Internet Name Service (WINS) Enables the server to convert NetBIOS computer names to IP addresses for network and Internet communications. (NetBIOS is an applications programming interface to provide programs with a consistent command set for using network services.)
Windows Nano Server An installation option in Windows Server 2016 that provides an even smaller footprint than Windows Server Core and is intended for a remotely administered server in a cloud or datacenter.
Windows PowerShell A Windows command-line interface that offers scripting capabilities as well.
Windows Server Core A minimum Windows Server 2016 configuration, designed to function in a fashion similar to traditional UNIX and Linux servers by offering a command-line interface and only the minimum services needed to get the job done.
workgroup As used in Microsoft networks, a number of users who share drive and printer resources in an independent peer-to-peer relationship.
workstation A computer that has its own central processing unit (CPU) and can be used as a stand-alone or network computer for word processing, spreadsheet creation, or other software applications.
Best Practices Analyzer (BPA) Analyzes the installed server roles to report if they are set up to conform to Microsoft’s best practices for roles.
Data Execution Prevention (DEP) A security feature that monitors how programs use memory and stops programs that attempt to use memory allocated for system programs and processes. This is intended to foil viruses, Trojan horses, and worms that attempt to invade system memory.
driver signing A digital signature incorporated into driver and system files as a way to verify the files and to ensure that they are not inappropriately overwritten.
hive A set of related Registry keys and subkeys stored as a file.
Hyper-V Extensible Virtual Switch Protocol Used with the Hyper-V role at server’s (NICs) to bind the virtual network services to the NIC and enable the use of a virtual switch
interrupt request (IRQ) line A hardware line that a computer component, such as a disk drive or serial port, uses to communicate to the processor that it is ready to send or receive information.
I/O address The address in memory through which data is transferred between a computer component and the processor.
paging Moving blocks of information, called pages, from RAM to virtual memory (the paging file) on disk.
paging file Disk space, in the form of a file, for use when memory requirements exceed the available RAM.
Plug and Play (PnP) Ability of added computer hardware, to id itself to the computer OS for installation. PnP also refers to the Intel and Microsoft specifications for automatic device detection and installation.
Registry entry A data parameter in the Registry stored as a value in hexadecimal, binary, or text format.
Registry key A category of information contained in the Windows Registry, such as hardware or software.
Registry subkey A key within a Registry key, similar to a subfolder under a folder.
Reliable Multicast Protocol Used on Windows-based networks to facilitate multicast transmissions for multimedia communications.
resource On a network, this refers to an object, such as a shared printer or shared directory, which can be accessed by users.
root key Also called a subtree, the highest category of data contained in the Registry. There are five root keys.
Sigverif A tool used to verify system and other critical files to determine if they have a signature.
storage pool Storage capacity that can be set up from different physical and virtual disks to store specific information, such as inventory programs under development for a business.
subtree Same as root key.
system environment variables Variables defined by the operating system and that apply to any user logged onto the computer.
Universal PnP (UPnP) A supplementation to PnP that enables automated configuration for devices connected through a network.
user environment variables Environment variables that are defined on a per-user basis.
virtual memory Disk storage allocated to link with physical RAM to temporarily hold data when there is not enough free RAM.
Assessment and Deployment Kit (ADK) Tools and documentation targeted to help you use and customize a specific Windows operating system.
basic input/output system (BIOS) A program on a read-only or flash memory chip that establishes basic communication with components such as the monitor and disk drives. The advantage of a flash chip is that you can update the BIOS.
client access license (CAL) A license to enable a workstation to access a Windows server.
cryptoprocessor A processor that enables hardware to be protected through using cryptographic keys employing the Trusted Platform Module security specification. See Trusted Platform Module (TPM).
digital certificate A set of unique identification information that is typically put at the end of a file or that is associated with a computer communication. Its purpose is to show that the source of the file or communication is legitimate.
Distributed File System (DFS) A system that enables folders shared from multiple computers to appear as though they exist in one centralized hierarchy of folders instead of on many different computers.
file system cache An area designated in physical computer memory that is used in Windows operating systems to help speed up reading and writing to hard disk.
File Transfer Protocol (FTP) A TCP/IP application protocol that transfers files in bulk data streams and that is commonly used on the Internet.
hard link Enables you to create one file and then establish links to that file in other folders, as though the file is in all of the folders.
Hypertext Transfer Protocol (HTTP) A protocol in the TCP/IP suite of protocols that is used to transport Hypertext Markup Language (HTML) documents and other data transmissions over networks and the Internet for access by web-compliant browsers.
journaling The process of keeping chronological records of data or transactions so that if a system crashes without warning, the data or transactions can be reconstructed or backed out to avoid data loss or information that is not properly synchronized.
Microsoft Passport A new authentication technique that replaces the use of passwords with a two-step authentication process that combines verifying a device is enrolled in the domain and that the device has a personal identification number.
New Technology File System (NTFS) File system that is native to Windows Server systems and that supports features such as security, compression, disk quotas, encryption, self-healing from disk damage, and others.
portable operating system interface (POSIX) Standards set by the Institute of Electrical and Electronics Engineers (IEEE) for portability of applications.
Preboot Execution Environment (PXE) An environment in which a client computer has software or hardware to enable its network interface card to connect to the network
redundant array of inexpensive (or independent) disks (RAID) A set of standards designed to extend the life of hard disk drives and to prevent data loss from a hard disk failure.
Resilient File System (ReFS) A Microsoft file system introduced with Windows 8 and Windows Server 2012 with the goal of better performance and faster repair of disk errors than NTFS. See New Technology File System.
service pack (SP) A major update for an operating system that includes fixes for known problems and provides product enhancements.
shared directory A directory on a networked computer that other computers on the network can access.
terminal A device that consists of a monitor and keyboard to communicate with host computers that run the programs. The terminal does not have a processor to use for running programs locally.
Trusted Platform Module (TPM) A security standard used through a microprocessor or cryptoprocessor, such as one built into a server. TPM enables hardware devices to be secured by cryptographic keys.
upstream server A server that has the Windows Server Update Services role installed and that is designated to obtain patches and service packs from Microsoft.
Windows Deployment Services (WDS) Services in Windows Server 2016 that enable Windows Server 2016 and Windows 10 (and certain other Windows operating systems) to be installed on multiple computers using automated techniques.
Windows Server Catalog A list of computer hardware and software tested by Microsoft and determined to be compatible with a specific Windows Server operating system, such as Windows Server 2016.
Windows System Image Manager (Windows SIM) A tool in the Windows Server 2016 Assessment and Deployment Kit used to create and manage answer files for an unattended Windows operating system installation
access control list (ACL) A list of all security descriptors that have been set up for a particular object, such as for a shared folder or a shared printer.
bridgehead server A domain controller at each Active Directory site with access to a site network link, which is designated as the DC to exchange replication information. There is only one bridgehead server per site. See site.
cloud computing Providing a host of scalable web-based applications and services (including cloud storage) over the Internet or a private network that are used by clients through web browsers and downloadable apps.
container An Active Directory object that houses other objects, such as a tree that houses domains or a domain that houses organizational units.
contiguous namespace A namespace in which every child object has a portion of its name from its parent object.
directory service A large container (database) of network data and resources, such as computers, printers, user accounts, and user groups, that enables management and fast access to those resources.
disjointed namespace A namespace in which the child object name does not resemble the parent object name.
distribution group A list of users that enables one e-mail message to be sent to all users on the list. A distribution group is not used for security and thus cannot appear in an access control list (ACL).
domain controller (DC) A Windows Server 2000 or above that contains a full copy of the Active Directory information, is used to add a new object to Active Directory, and replicates all changes made to it so the changes are updated on every DC in the same domain.
domain functional level Refers to the Windows Server operating systems on domain controllers and the domain-specific functions they support.
domain local security group A group that is used to manage resources—shared folders and printers, for example—in its home domain, and that is primarily used to give global groups access to those resources.
fine-grained password policies Used so that different security groups can have different password policies.
Flexible Authentication Secure Tunneling (FAST) Used in Kerberos security to establish a secure channel or communications tunnel between a client seeking authentication for access to a computer service and the server providing access keys for secure communications. Also called Kerberos armoring.
forest A grouping of Active Directory trees that each have contiguous namespaces within their own domain structure, but that have disjointed namespaces between trees. The trees and their domains use the same schema and global catalog.
forest functional level A forest-wide setting that refers to the types of domain controllers in a forest, which can be any combination of Windows Server versions.
global catalog A repository for all objects and the most frequently used attributes for each object in all domains. Each forest has a single global catalog that can be replicated onto multiple servers.
global security group A group that typically contains user accounts from its home domain, and that is a member of domain local groups in the same or other domains, so as to give that global group’s member accounts access to the resources defined to the domain local groups.
globally unique identifier (GUID) A unique number, up to 16 characters long, that is associated with an Active Directory object.
Kerberos transitive trust relationship A set of two-way trusts between two or more domains (or forests in a forest trust) in which Kerberos security is used.
local security group A group of user accounts that is used to manage resources on a standalone computer.
local user profile A desktop setup that is associated with one or more accounts to determine what startup programs are used, additional desktop icons, and other customizations. A user profile is local to the computer in which it is stored.
mandatory user profile A user profile set up by the server administrator that is loaded from the server to the client each time the user logs on; changes that the user makes to the profile are not saved.
member server A server on an Active Directory managed network that is not installed to have Active Directory.
Microsoft Azure Active Directory An Active Directory service that an organization can use for online cloud applications, such as Office 365.
multimaster replication Windows Server 2016 networks can have multiple servers called DCs that store Active Directory information and replicate it to each other. Because each DC acts as a master, replication does not stop when one DC is down,
name resolution A process used to translate a computer’s logical or host name into a network address, such as to a dotted decimal address associated with a computer—and vice versa.
namespace A logical area on a network that contains directory services and named objects, and that has the ability to perform name resolution.
object A network resource, such as a server or a user account, that has distinct attributes or properties, is defined in a domain, and exists in Active Directory.
organizational unit (OU) A grouping of objects within a domain that provides a means to establish specific policies for governing those objects, and that enables object management to be delegated.
protected users global group A global group that is created by default and enforces strict locked-in security that cannot be reconfigured.
Read-Only Domain Controller (RODC) A domain controller that houses Active Directory information, but cannot be updated, such as to create a new account.
roaming profile Desktop settings that are associated with an account so that the same settings are employed no matter which computer is used to access the account (the profile is downloaded to the client from a server).
schema Elements used in the definition of each object contained in Active Directory, including the object class and its attributes.
scope of influence (scope) The reach of a type of group, such as access to resources in a single domain or access to all resources in all domains in a forest .
security group Used to assign a group of users permission to access network resources.
Service Principal Name (SPN) An identification number for a network service that employs Kerberos security.
site An option in Active Directory to interconnect IP subnets so that the server can determine the fastest route to connect clients for authentication
transitive trust A trust relationship between two or more domains in a tree, in which each domain has access to objects in the others.
tree Related domains that use a contiguous namespace, share the same schema, and have two-way transitive trust relationships.
two-way trust A domain relationship in which both domains are trusted and trusting, enabling one to have access to objects in the other.
universal security group A group that is used to provide access to resources in any domain within a forest. A common implementation is to make global groups that contain accounts members of a universal group that has access to resources.
access-based enumeration When enabled, permits the user to view only shared folders and files for which they have permissions.
attribute A characteristic associated with a folder or file used to help manage access.
auditing In Windows Server 2016, a security capability that tracks activity on an object, such as reading, writing, creating, or deleting a file in a folder.
DFS Replication A role service you can install within the File and Storage Services role, so that shared folders offered through DFS are backed up to protect against data loss (DFS).
DFS topology Applies to a domain-based DFS model and encompasses the DFS namespace root, shared folders, and replication folders.
discretionary access control list (DACL) An access control list that manages access to an object, such as a folder, and that is configured by a server administrator or owner of the object.
disk quota Allocating a specific amount of disk space to a user or application with the ability to ensure that the user or application cannot use more disk space than is specified in the allocation.
Distributed File System (DFS) A system that enables folders shared from multiple computers to appear as though they exist in one centralized hierarchy of folders instead of on many different computers.
domain-based DFS model A DFS model that uses Active Directory and is available only to servers and workstations that are members of a particular domain.
Encrypting File System (EFS) Set by an attribute of NTFS, this file system enables a user to encrypt the contents of a folder or a file so that it can only be accessed via private key code by the user who encrypted it.
folder target A path in the Universal Naming Convention (UNC) format, such as to a DFS shared folder or to a different DFS path.
inherited permissions Permissions of a parent object that also apply to child objects of the parent, such as to subfolders within a folder.
load balancing On a single server, distributing resources across multiple server disk drives and paths for better server response; and on multiple network servers, distributing resources across two or more servers for better server and network performance.
namespace root The main container that holds DFS links to shared folders in a domain.
network discovery The ability to view other network computers and devices.
Network File System (NFS) protocol A file transfer protocol common to UNIX and Linux systems that transfers information in record streams instead of in bulk file streams.
ownership Having the privilege to change permissions and to fully manipulate an object. The account that creates an object, such as a folder or printer, initially has ownership.
permissions In Windows Server 2016, privileges to access and manipulate resource objects, such as folders and printers; for example, the privilege to read a file or to create a new file.
publish Making an object, such as a printer or shared folder, available for users to access when they view Active Directory contents and so that the data associated with the object can be replicated.
replication group A grouping of shared folders in a DFS namespace root that are replicated or copied to all servers that participate in DFS replication.
Server Message Block (SMB) protocol Used by default on Microsoft systems, enables an operating system to offer shared files, folders, printers, serial ports, and other shared elements on a network.
share permissions Permissions that apply to a particular object that is shared over a network, such as a shared folder or printer.
stand-alone DFS model A DFS model in which no Active Directory implementation is available to help manage the shared folders. This model provides only a single or flat level share.
sync share A server folder that holds work files for mobile and stationary devices. See work folders.
system control ACL (SACL) An access control list that contains settings to audit the access to an object, such as a folder.
Universal Naming Convention (UNC) A naming convention that designates network servers, computers, and shared resources. The format for a UNC name is, for example, \\servername\namespace\folder\file.
work folders A feature of the File and Storage Services role that enables users to access and synchronize work folders through using all types of devices, mobile and stationary to many places of work.
bidirectional printing Ability of a parallel printer to conduct two-way communication between the printer and the computer supports Plug and Play and enables an operating system to query a printer about its capabilities.
data type Way in which information is formatted in a print file.
enhanced metafile (EMF) A data type for printing used by modern Windows operating
graphics device interface (GDI) An interface on a Windows network print client that works with a local software application, such as Microsoft Word, and a local printer driver to format a file to be sent to a local printer or a network print server.
Internet Printing Protocol (IPP) A protocol that is encapsulated in HTTP and that is used to print files over the Internet.
local print device A printer, such as a laser printer, physically attached to a port on the local computer.
network print device A printing device, such as a laser printer, connected to a print server through a network.
Point and Print Implements the v4 driver model, so that a print server does not have to
PostScript printer A printer that has special firmware or cartridges to print using a page-description language (PDL).
print client Client computer or application that generates a print job.
print job A document or items to be printed.
print queue A stack or lineup of print jobs, with the first job submitted at the top of the stack and the last job submitted at the bottom, and all of the jobs waiting to be sent from the spooler to the printer.
print server Network computer or server device that connects printers to the network for sharing and that receives and processes print requests from print clients.
Printer Control Language (PCL) A printer language used by non-PostScript Hewlett-Packard and compatible laser printers.
printer driver Contains the device-specific information that Windows Server 2016 requires to control a particular print device, implementing customized printer control codes, font, and style information so that documents are converted into a printer-specific language.
printer pooling Linking two or more identical printers with one printer setup or printer share.
RAW A data type often used for printing MS-DOS, Windows 3.x, and UNIX and Linux print files.
spool file A print file written to disk until it can be transmitted to a printer.
spooler In the Windows environment, a group of DLLs, information files, and programs that process print jobs for printing.
spooling A process working in the background to enable several print files to go to a single printer. Each file is placed in temporary storage until its turn comes to be printed.
TEXT A data type used for printing text files formatted using the ANSI standard that employs values between 0 and 255 to represent characters, numbers, and symbols.
Web Services for Devices (WSD) A technology in which devices, such as printers, can use webbased services to inform clients of their capabilities.
XML Paper Specification (XPS) An advanced way of printing documents for multiple purposes, including viewing electronic pages and printing pages in a polished format.
XPS Viewer Enables you to view a file saved in the XPS format.
Account lockout A security measure that prevents access to a user account, such as after a specified number of unsuccessful logon attempts.
Active Directory Rights Management Services (AD RMS) A server role that works with client applications that can take advantage of RMS safeguards. See Rights Management Services (RMS).
Advanced Encryption Standard (AES) A relatively new standard adopted by the U.S. government to replace DES and 3DES, and that employs a private-key block-cipher form of encryption.
assigning applications (or software) Means an application is automatically represented on the user’s desktop, for example as a Start menu option or as an icon on the desktop, and which initially is really a link to a central application distribution server.
BitLocker Drive Encryption A security measure for protecting hard drives in Windows 7, 8/8.1, and 10 as well as Windows Server 2016. It can use a TPM chip on a computer or a flash drive with a PIN to enforce security. See Trusted Platform Module (TPM).
group policy A set of policies that govern security, configuration, and a wide range of other settings for objects within containers in Active Directory.
group policy object (GPO) An object in Active Directory that contains group policy settings for a site, domain, OU, or local computer.
inherited rights User rights that are assigned to a group and that automatically apply to all members of that group.
IP security (IPsec) A set of IP-based secure communications and encryption standards created through the Internet Engineering Task Force (IETF).
Kerberos A security system developed by the Massachusetts Institute of Technology to enable two parties on an open network to communicate without interception from an intruder, by creating a unique encryption key for each communication session.
publishing applications (or software) Involves setting up software through a Group Policy so that the application is available for users to install from a central distribution server, such as through the Programs and Features capability via the user’s desktop.
Resultant Set of Policy (RSoP) A Windows Server 2016 tool that enables you to produce reports about proposed or current Group Policy settings for the purpose of planning and troubleshooting when multiple Group Policies are in use (such as for OUs and domains).
Rights Management Services (RMS) Security rights developed by Microsoft to provide security for documents, spreadsheets, email, and other types of files created by applications.
RSA Developed by Rivest, Shamir, and Adleman, an encryption technique that uses public and private keys along with a computer algorithm that relies on factoring large prime numbers.
service ticket In Kerberos security, a permanent ticket good for the duration of a logon session (or for another period of time specified by the server administrator in the account policies) that enables the computer to access network services
Trusted Platform Module (TPM) A security specification for a hardware device used to secure information on another device, such as on a hard drive. The TPM hardware device is typically a chip.
User Account Control (UAC) Enables software and device installations in standard user mode while still ensuring authorization from the administrator.
Windows Defender Software that scans for and removes viruses, spyware, and malware. Windows Defender is included with Windows Server 2016.
Windows Firewall Window software that manages incoming and outgoing communications through opening or blocking TCP and UDP communication ports and specific applications—to limit the attack surface and thwart attackers and malware.
Windows NT LAN Manager version 2 (NTLMv2) An authentication protocol used in legacy Windows NT Server systems and retained in all Windows systems for backward compatibility for clients that cannot support Kerberos.
Created by: Leisac
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards