05.03.2013 Views

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Glossary G-15<br />

Fiber Distributed Data Interface (FDDI) A standard developed by the ANSI for<br />

high-speed, fiber-optic local area networks. FDDI provides specifications for transmission<br />

rates of 100 Mbps on networks based on the Token Ring standard.<br />

file allocation table (FAT) A table maintained by some operating systems, including<br />

Windows NT, Windows 2000, and Windows XP Professional, to keep track of the<br />

status of various segments of disk space used for file storage.<br />

Files And Settings Transfer Wizard One of two methods used by administrators to<br />

transfer user configuration settings and files from systems running Windows 95 or<br />

later to a clean Windows XP installation.<br />

File Signature Verification utility (Sigverif.exe) A utility that is used to scan a<br />

Windows XP system for unsigned files, providing a simple method to identify<br />

unsigned drivers.<br />

File Transfer Protocol (FTP) A process that provides file transfers between local and<br />

remote computers. FTP supports several commands that allow bidirectional transfer<br />

of binary and ASCII files between computers. The FTP client is installed with the<br />

TCP/IP connectivity utilities. See also ASCII (American Standard Code for Information<br />

Interchange), Transmission Control Protocol/Internet Protocol (TCP/IP).<br />

firewall A security system, usually a combination of hardware and software,<br />

intended to protect a network against external threats coming from another network,<br />

including the Internet. Firewalls prevent an organization’s networked computers<br />

from communicating directly with computers that are external to the<br />

network, and vice versa. Instead, all incoming and outgoing communication is<br />

routed through a proxy server outside the organization’s network. Firewalls also<br />

audit network activity, recording the volume of traffic and information about<br />

unauthorized attempts to gain access. See also proxy server.<br />

firmware Software routines stored in read-only memory (ROM). Unlike random access<br />

memory (RAM), ROM stays intact even in the absence of electrical power. Startup<br />

routines and low-level input/output (I/O) instructions are stored in firmware.<br />

fixed storage device A storage device that is not removable, such as a hard drive.<br />

forest A grouping or hierarchical arrangement of one or more domain trees that form<br />

a disjointed namespace.<br />

formatting Preparing a hard disk to accept data by creating a file system (such as<br />

NTFS or FAT) on that disk.<br />

fragmentation The scattering of the parts of a file over different parts of the disk<br />

rather than having all parts of the file located in contiguous space. When a hard<br />

disk contains numerous fragmented files and folders, the computer takes longer to<br />

gain access to files and folders because it requires several additional reads to collect<br />

the various pieces. Creating new files and folders also takes longer because<br />

the available free space on the hard disk is scattered.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!