Cross-reference object

Objects in which Active Directory stores information about directory partitions and external directory services. An example of an external directory service is another LDAP-compliant directory.

Expire Interval

For DNS, the number of seconds that DNS servers operating as secondary masters for a zone will use to determine if zone data should be expired when the zone is not refreshed and renewed.

Extended Characters

Any of the 128 additional characters in the extended ASCII (8-bit) character set. These characters include those in several non-English languages, such as accent marks, and special symbols used for creating pictures.

File and Print Servers for Macintosh

A software component that allows Macintosh users access to a computer running any version of the Windows Server family. The services provided with this component allow personal computer and Macintosh users to share files and resources, such as printers on the AppleTalk network or printers attached to the Windows server.

File Allocation Table (FAT)

A file system used by MS-DOS and other Windows-based operating systems to organize and manage files. The file allocation table (FAT) is a data structure that Windows creates when you format a volume by using the FAT or FAT32 file systems. Windows stores information about each file in the FAT so that it can retrieve the file later.

Federal Information Processing Standard 140-1 (FIPS 140-1)

A standard entitled Security Requirements for Cryptographic Modules. FIPS 140-1 describes government requirements that hardware and software cryptomodules should meet for Sensitive but Unclassified (SBU) use.

Fax Service, Define Fax

A system service that provides fax services to local and remote network clients. Fax services include receiving faxes and faxing documents, fax wizard messages, and e-mail messages.

Fault Tolerance

The ability of computer hardware or software to ensure data integrity when hardware failures occur. Fault tolerant features appear in many server operating systems and include mirrored volumes, RAID-5 volumes, and server clusters.

What is FAT32? Define FAT32

A derivative of the file allocation table (FAT) file system. FAT32 supports smaller cluster sizes and larger volumes than FAT, which results in more efficient space allocation on FAT32 volumes.

Failover

The process of taking resource groups offline on one node and bringing them back online on another node. When a resource group goes offline, all resources belonging to that group go offline. The offline and online transitions occur in a predefined order, with resources that are dependent on other resources taken offline before and brought online after the resources upon which they depend.

Failback Policy

Parameters that an administrator can set using Cluster Administrator that affect failback operations.

Define Failback

The process of moving resources, either individually or in a group, back to their preferred node after the node has failed and come back online.

External Network Number

A 4-byte hexadecimal number used for addressing and routing purposes. The external network number is associated with physical network adapters and networks. To communicate with each other, all computers on the same network that use a specific frame type must have the same external network number. All external network numbers must be unique to the IPX internetwork.

Extensible Markup Language (XML)

A meta-markup language that provides a format for describing structured data. This facilitates more precise declarations of content and more meaningful search results across multiple platforms. In addition, XML will enable a new generation of Web-based data viewing and manipulation applications.

Extensible Firmware Interface (EFI)

In computers with the Intel Itanium processor, the interface between a computer's firmware, hardware, and the operating system. The Extensible Firmware Interface (EFI) defines a new partition style called GUID partition table (GPT). EFI serves the same purpose for Itanium-based computers as the BIOS found in x86-based computers. However, it has expanded capabilities that provide a consistent way to start any compatible operating system and an easy way to add EFI drivers for new bootable devices without the need to update the computer's firmware.

Extensible Authentication Protocol (EAP)

An extension to the Point-to-Point Protocol (PPP) that allows for arbitrary authentication mechanisms to be employed for the validation of a PPP connection.

Extended Partition

A type of partition that you can create only on basic master boot record (MBR) disks. Extended partitions are useful if you want to create more than four volumes on a basic MBR disk. Unlike primary partitions, you do not format an extended partition with a file system and then assign a drive letter to it. Instead, you create one or more logical drives within the extended partition. After you create a logical drive, you format it and assign it a drive letter. An MBR disk can have up to four primary partitions, or three primary partitions, one extended partition, and multiple logical drives.

Extended Memory

Memory beyond one megabyte in 80286, 80386, 80486, and Pentium computers.

Express Message

For Message Queuing, a message that uses fewer resources and is faster than a recoverable message. However, because express messages are mapped to memory, they are lost if the computer storing them fails.

Explicit Permissions

Permissions on an object that are automatically assigned when the object is created, or specifically assigned or changed by the owner of the object.

Expire Interval

For DNS, the number of seconds that DNS servers operating as secondary masters for a zone will use to determine if zone data should be expired when the zone is not refreshed and renewed.

What is Expansion Slot?

A socket in a computer, designed to hold expansion boards and connect them to the system bus.

Expanded Memory

Type of memory that can be added to IBM personal computers. The use of expanded memory is defined by the Expanded Memory Specification (EMS), which supports memory boards containing RAM that can be enabled or disabled by software.

Everyone Category

In the Macintosh environment, one of the user categories to which you assign permissions for a folder. Permissions granted to everyone apply to all users who use the server, including guests.

Event Viewer

A component you can use to view and manage event logs, gather information about hardware and software problems, and monitor security events. Event Viewer maintains logs about program, security, and system events.

Event Logging

The process of recording an audit entry in the audit trail whenever certain events occur, such as services starting and stopping, or users logging on and off and accessing resources. You can use Event Viewer to review AppleTalk network integration events as well as Windows events.

Event Log Service

A service that records events in the system, security, and application logs. The Event Log service is located in Event Viewer.

Define Ethernet, What is Ethernet?

An IEEE 802.3 standard for contention networks. Ethernet uses a bus or star topology and relies on the form of access known as Carrier Sense Multiple Access with Collision Detection (CSMA/DC) to regulate communication line traffic. Network nodes are linked by coaxial cable, fiber-optic cable, or by twisted-pair wiring. Data is transmitted in variable-length frames containing delivery and control information and up to 1,500 bytes of data. The Ethernet standard provides for baseband transmission at 10 megabits (10 million bits) per second.

Error Detection

A technique for detecting when data is lost during transmission. This allows the software to recover lost data by notifying the transmitting computer that it needs to retransmit the data.

Environment Variable

A string consisting of environment information, such as a drive, path, or file name, associated with a symbolic name that can be used by Windows. You use System in Control Panel or the set command from the command prompt to define environment variables.

Enhanced Small Device Interface (ESDI)

A standard that can be used with high-capacity hard disks, floppy disk drives, and tape drives to allow these devices to communicate with a computer at high speeds.

Define Encryption

The process of disguising a message or data in such a way as to hide its substance.

Encrypting File System (EFS)

A feature in this version of Windows that enables users to encrypt files and folders on an NTFS volume disk to keep them safe from access by intruders.

Encrypted Password

A password that is scrambled. Encrypted passwords are more secure than plaintext passwords, which are susceptible to network sniffers.

Encapsulated PostScript (EPS) file

A file that prints at the highest possible resolution for your printer. An EPS file may print faster than other graphical representations. Some Windows-based and non-Windows-based graphical programs can import EPS files.

Emulated Local Area Network (ELAN)

A logical ATM network that emulates the services of an Ethernet or Token Ring LAN.

Embedded Object

Information created in another program that has been pasted inside your document. When information is embedded, you can edit the information in the new document using toolbars and menus from the original program.
To edit the embedded information, double-click it and the toolbars and menus from the program used to create the information appear. Embedded information is not linked to the original source. If you change information in one place, it is not updated in the other.

EFI system partition

On Itanium-based computers, a portion on a GUID partition table (GPT) disk that is formatted with the FAT file system and contains the files necessary to start the computer. Every Itanium-based computer must have at least one GPT disk with an EFI system partition. The EFI system partition serves the same purpose as the system volume found on x86-based computers.

Dynamic-Link Library (DLL)

An operating system feature that allows executable routines (generally serving a specific function or set of functions) to be stored separately as files with .dll extensions. These routines are loaded only when needed by the program that calls them.

Dynamic Volume

A volume that resides on a dynamic disk. Windows supports five types of dynamic volumes: simple, spanned, striped, mirrored, and RAID-5. A dynamic volume is formatted by using a file system, such as FAT or NTFS, and it has a drive letter assigned to it.

Dynamic Update

An updated specification to the Domain Name System (DNS) standard that permits hosts that store name information in DNS to dynamically register and update their records in zones maintained by DNS servers that can accept and process dynamic update messages.

Dynamic Storage

A storage method in Windows that allows disk and volume management without requiring operating system restart.

Dynamic Host Configuration Protocol (DHCP)

A TCP/IP service protocol that offers dynamic leased configuration of host IP addresses and distributes other configuration parameters to eligible network clients. DHCP provides safe, reliable, and simple TCP/IP network configuration, prevents address conflicts, and helps conserve the use of client IP addresses on the network.
DHCP uses a client/server model where the DHCP server maintains centralized management of IP addresses that are used on the network. DHCP-supporting clients can then request and obtain lease of an IP address from a DHCP server as part of their network boot process.

Dynamic Disk

A physical disk that can be accessed only by Windows 2000 and Windows XP. Dynamic disks provide features that basic disks do not, such as support for volumes that span multiple disks. Dynamic disks use a hidden database to track information about dynamic volumes on the disk and other dynamic disks in the computer. You convert basic disks to dynamic by using the Disk Management snap-in or the DiskPart command line utility. When you convert a basic disk to dynamic, all existing basic volumes become dynamic volumes.

dynamic data exchange (DDE)

A form of inter process communication (IPC) implemented in the Microsoft Windows family of operating systems. Two or more programs that support dynamic data exchange (DDE) can exchange information and commands.

What is DWORD? Define DWORD

A data type composed of hexadecimal data with a maximum allotted space of 4 bytes.

DVD drive

A disk storage device that uses digital video disc (DVD) technology. A DVD drive reads both CD-ROM and DVDs; however, you must have a DVD decoder to display DVD movies on your computer screen.

DVD decoder

A hardware or software component that allows a digital video disc (DVD) drive to display movies on your computer screen.

Define Duplex, What is Duplex?

A system capable of transmitting information in both directions over a communications channel.

Define Dual Boot, What is Dual Boot?

A computer configuration that can start two different operating systems.

Define Drop Folder, What is Drop Folder?

In the Macintosh environment, a folder for which you have the Make Changes permission but not the See Files or See Folders permission. You can copy files into a drop folder, but you cannot see what files and subfolders the drop folder contains.

Drive Letter

The naming convention for disk drives on IBM and compatible computers. Drives are named by letter, beginning with A, followed by a colon.

What is Drive in Computer?

An area of storage that is formatted with a file system and has a drive letter. The storage can be a floppy disk, a CD, a hard disk, or another type of disk. You can view the contents of a drive by clicking its icon in Windows Explorer or My Computer.

Define Drainstop

For Network Load Balancing, a command that disables all new traffic handling on the specified hosts. The hosts then enter draining mode to complete existing connections.
While draining, hosts remain in the cluster and stop their cluster operations when there are no more active connections. To terminate draining mode, explicitly stop cluster mode with the stop command, or restart new traffic handling with the start command. To drain connections from a specific port, use the drain command.

What is Drain?

For Network Load Balancing, a command that disables new traffic handling for the rule whose port range contains the specified port. All ports specified by the port rule are affected.

Define Drag, What is Drag?

To move an item on the screen by selecting the item and then pressing and holding down the mouse button while moving the mouse. For example, you can move a window to another location on the screen by dragging its title bar.


 See this image


Downloadable Fonts

A set of characters stored on disk and sent (downloaded) to a printer's memory when needed for printing a document. Downloadable fonts are most commonly used with laser printers and other page printers, although many dot-matrix printers can accept some of them. Downloadable fonts are also called soft fonts.

Double-Byte Characters

A set of characters in which each character is represented by two bytes. Some languages, such as Japanese, Chinese, and Korean, require double-byte character sets.

see this image

 

Dots Per Inch (DPI)

The standard used to measure screen and printer resolution, expressed as the number of dots that a device can display or print per linear inch. The greater the number of dots per inch, the better the resolution.

see this image

Domain Tree

In DNS, the inverted hierarchical tree structure that is used to index domain names.Domain trees are similar in purpose and concept to the directory trees used by computer filing systems for disk storage. For example,
DOMAIN TREE PICTURES 

when numerous files are stored on disk, directories can be used to organize the files into logical collections. When a domain tree has one or more branches, each branch can organize domain names used in the namespace into logical collections. In Active Directory, a hierarchical structure of one or more domains, connected by transitive, bidirectional trusts, that forms a contiguous namespace. Multiple domain trees may belong to the same forest.

Ads

DHOOM : 3
WANTED







Domain of Origin

The parent DNS domain name that is used to root either a zone or a resource record within a zone. This name is joined to the end of unqualified or relative domain names to form a fully qualified domain name (FQDN) within the zone. In DNS Manager, the domain of origin


will correspond to Zone name as it appears in the Add Zone Wizard or the name that appears in the Parent domain name field for any resource records created within the zone.

Domain Naming Master

The domain controller assigned to control the addition or removal of domains in the forest. At any time, there can be only one domain naming master in the forest.


Domain Namespace

The database structure used by the Domain Name System (DNS).

Domain Name System (DNS)

A hierarchical, distributed database that contains mappings of DNS domain names to various types of data, such as IP addresses. DNS enables the location of computers and services by user-friendly names, and it also enables the discovery of other information stored in the database.

Domain Name

The name given by an administrator to a collection of networked computers that share a common directory. Part of the Domain Name System (DNS) naming structure, domain names consist of a sequence of name labels separated by periods.

Domain Local Group

A security or distribution group that can contain universal groups, global groups, and accounts from any domain in the domain tree or forest. A domain local group can also contain other domain local groups from its own domain. Rights and permissions can be assigned only at the domain containing the group.

Domain DFS

An implementation of DFS in which DFS topological information is stored in Active Directory. Because this information is made available on multiple domain controllers in the domain, domain DFS provides fault-tolerance for any distributed file system in the domain.

Domain Controller Locator (Locator)

An algorithm that runs in the context of the Net Logon service and that finds domain controllers on a Windows 2000 network. Locator can find domain controllers by using DNS names (for IP/DNS-compatible computers) or by using NetBIOS names (for computers that are running Windows 3.x, Windows for Workgroups, Windows NT 3.5 or later, Windows 95, or Windows 98, or it can be used on a network where IP transport is not available).

Domain Controller

In a Windows domain environment, a computer running Active Directory that manages user access to a network, which includes logging on, authentication, and access to the directory and shared resources.

What Is Domain?


Docking Station

A unit for housing a portable computer that contains a power connection, expansion slots, and connections to peripherals, such as a monitor, printer, full-sized keyboard, and mouse. The docking station turns the portable computer into a desktop computer.

DNS suffix

For DNS, a character string that represents a domain name. The DNS suffix shows where a host is located relative to the DNS root, specifying a host?s location in the DNS hierarchy. Usually, DNS suffix describes the latter portion of a DNS name, following one or more of the first labels of a DNS name.

dock

To connect a laptop or notebook computer to a docking station.

DNS Server

A service that maintains information about a portion of the Domain Name System (DNS) database and responds to and resolves DNS queries. A computer running this service is also known as a DNS server.

Distribution Group

A group that is used solely for e-mail distribution and that is not security-enabled. Distribution groups cannot be listed in discretionary access control lists (DACLs) used to define permissions on resources and objects. Distribution groups can be used only with e-mail applications (such as Microsoft Exchange) to send e-mail to collections of users. If you do not need a group for security purposes, create a distribution group instead of a security group.

Distinguished Name

A name that uniquely identifies an object by using the relative distinguished name for the object, plus the names of container objects and domains that contain the object. The distinguished name identifies the object as well as its location in a tree. Every object in Active Directory has a distinguished name. A typical distinguished name might be
CN=MyName,CN=Users,DC=Microsoft,DC=Com
This identifies the MyName user object in the microsoft.com domain.

Discretionary Access Control List (DACL)

The part of an object's security descriptor that grants or denies specific users and groups permission to access the object. Only the owner of an object can change permissions granted or denied in a DACL; thus, access to the object is at the owner's discretion.

DirectX

An extension of the Microsoft Windows operating system. DirectX technology helps games and other programs use the advanced multimedia capabilites of your hardware.

Directory Service

Both the directory information source and the service that make the information available and usable. A directory service enables the user to find an object given any one of its attributes.

Directory Partition

A contiguous subtree of the directory that forms a unit of replication. A given replica is always a replica of some directory partition. The directory always has at least three directory partitions:
  • The schema, which defines the object classes and attributes contained in Active Directory.
  • The configuration, which identifies the domain controllers, replication topology and other related information about the domain controllers within a specific implementation of Active Directory.
  • One or more domains that contain the actual directory object data.
A domain controller always stores the partitions for the schema, configuration, and its own (and no other) domain. The schema and configuration are replicated to every domain controller in the domain tree or forest. The domain is replicated only to domain controllers for that domain. A subset of the attributes for all domain objects is replicated to the global catalog.

Direct Memory Access (DMA)

Memory access that does not involve the microprocessor. DMA is frequently used for data transfer directly between memory and a peripheral device such as a disk drive.

Direct Cable Connection

A link between the I/O ports of two computers created with a single cable rather than a modem or other interfacing devices. In most cases, a direct cable connection is made with a null modem cable.

Digital Video Disc (DVD)

A type of optical disc storage technology. A digital video disc (DVD) looks like a CD-ROM disc, but it can store greater amounts of data. DVDs are often used to store full-length movies and other multimedia content that requires large amounts of storage space.

Digital Subscriber Line (DSL)

A type of high-speed Internet connection using standard telephone wires. This is also referred to as a broadband connection.

Digital Signature Standard (DSS)

A standard that uses the Digital Signature Algorithm (DSA) for its signature algorithm and SHA-1 as its message hash algorithm. DSA is a public-key cipher that is used only to generate digital signatures and cannot be used for data encryption.

Digital Signature

A means for originators of a message, file, or other digitally encoded information to bind their identity to the information. The process of digitally signing information entails transforming the information, as well as some secret information held by the sender, into a tag called a signature. Digital signatures are used in public key environments, and they provide nonrepudiation and integrity services.

Differential Data

Saved copies of changed data that can be applied to an original volume to generate a volume shadow copy.

Differential Backup

A backup that copies files created or changed since the last normal or incremental backup. It does not mark files as having been backed up (in other words, the archive attribute is not cleared). If you are performing a combination of normal and differential backups, restoring files and folders requires that you have the last normal as well as the last differential backup.

Dictionary Attack

A method of guessing a user's password or PIN by trying every word in the dictionary until successful.

Dialog Box

A secondary window that contains buttons and various kinds of options through which you can carry out a particular command or task.

Dial-up connection

The connection to your network if you are using a device that uses the telephone network. This includes modems with a standard phone line, ISDN cards with high-speed ISDN lines, or X.25 networks.

If you are a typical user, you may have one or two dial-up connections, for example, to the Internet and to your corporate network. In a more complex server situation, multiple network modem connections might be used to implement advanced routing.

DHCP/BOOTP Relay Agent

The agent program or component responsible for relaying DHCP and BOOTP broadcast messages between a DHCP server and a client across an IP router. A DHCP relay agent supports DHCP/BOOTP message relay as defined in RFCs 1541 and 2131. The DHCP Relay Agent service is managed using the Routing and Remote Access service.

DHCP client

Any network-enabled device that supports the ability to communicate with a DHCP server for the purpose of obtaining dynamic leased IP configuration and related optional parameters information.

DFS topology

The overall logical hierarchy of the Distributed File System (DFS), including elements such as roots, links, shared folders, and replica sets, as depicted in the DFS administrative console. This is not to be confused with the DFS namespace, which is the logical view of shared resources seen by users.

DFS root

The starting point of the Distributed File System (DFS) namespace. The root is often used to refer to the namespace as a whole. A root maps to one or more root targets, each of which corresponds to a shared folder on a server.

DFS link

An element in the Distributed File System (DFS) namespace that lies below the root and maps to one or more targets, each of which corresponds to a shared folder or another DFS root.

Device Manager

An administrative tool that you can use to manage the devices on your computer. Using Device Manager, you can view and change device properties, update device drivers, configure device settings, and uninstall devices.

Device Fonts

Fonts that reside in your printer. They can be built into the printer itself or provided by a font cartridge or font card.

Device Driver

A program that allows a specific device, such as a modem, network adapter, or printer, to communicate with the operating system. Although a device might be installed on your system, Windows cannot use the device until you have installed and configured the appropriate driver.
If a device is listed in the Hardware Compatibility List (HCL), a driver is usually included with Windows. Device drivers load automatically (for all enabled devices) when a computer is started, and thereafter run invisibly.

Device Conflict

A conflict that occurs when the same system resources have been allocated to two or more devices. System resources include interrupt request (IRQ) lines, direct memory access (DMA) channels, input/output (I/O) ports, and memory addresses.

What is Device?

Any piece of equipment that can be attached to a network or computer; for example, a computer, printer, joystick, adapter, or modem card, or any other peripheral equipment. Devices normally require a device driver to function with Windows.

Details Pane

The pane in the Microsoft Management Console (MMC) that displays the details for the selected item in the console tree. The details can be a list of items or they can be administrative properties, services, and events that are acted on by a snap-in.

Destination Document

The document into which a package or a linked or embedded object is being inserted. For an embedded object, this is sometimes also called the container document.

Desktop Pattern

A design that appears across your desktop. You can create your own pattern or select a pattern provided by Windows.

Desktop

The on-screen work area on which windows, icons, menus, and dialog boxes appear.

Desired Zone

The zone in which AppleTalk network integration appears on the network.

Descendent Key

All the subkeys that appear when a key in the registry is expanded. A descendent key is the same as a subkey.

Dependent Client

For Message Queuing, a computer that requires synchronous access to a Message Queuing server to perform all standard message queuing operations, such as sending and receiving messages and creating queues.

Dependency Tree

A diagram for visualizing the dependency relationships between resources.

Dependency

A relationship of reliance between two resources that makes it necessary for them to run in the same group on the same node. For example, an application is dependent on the disks that contain its data resources.

Denial-of-service attack

An attack in which an attacker exploits a weakness or a design limitation of a network service to overload or halt the service, so that the service is not available for use. This type of attack is typically launched to prevent other users from using a network service such as a Web server or a file server.

Delegation

The ability to assign responsibility for management and administration of a portion of the namespace to another user, group, or organization.
For DNS, a name service record in the parent zone that lists the name server authoritative for the delegated zone.

Defragmentation

The process of rewriting parts of a file to contiguous sectors on a hard disk to increase the speed of access and retrieval. When files are updated, the computer tends to save these updates on the largest continuous space on the hard disk, which is often on a different sector than the other parts of the file. When files are thus fragmented, the computer must search the hard disk each time the file is opened to find all of the file's parts, which slows down response time.

Default Host

The host with the highest host priority for which a drainstop command is not in progress. After convergence, the default host handles all of the network traffic for TCP and UDP ports that are not otherwise covered by port rules.

What is Default Gateway?

A configuration item for the TCP/IP protocol that is the IP address of a directly reachable IP router. Configuring a default gateway creates a default route in the IP routing table.

Default Button

In some dialog boxes, the command button that is selected or highlighted when the dialog box is initially displayed. The default button has a bold border, indicating that it will be chosen automatically if you press ENTER. You can override a default button by clicking Cancel or another command button.

Dedicated Adapter

The network adapter that, when using multiple network adapters in each host of a Network Load Balancing cluster, handles network traffic not related to cluster operations (the traffic for individual hosts on the network). This adapter is programmed with the host's dedicated IP address.

What is Debugger?

A program designed to aid in detecting, locating, and correcting errors in another program by allowing the programmer to step through the program, examine the data, and monitor conditions such as the values of variables.

Dead-letter queue

For Message Queuing, a queue that stores nontransactional messages that are undeliverable or expired. These queues store failed messages on the computer on which the message expired. Messages in these queues are written to disk and are therefore recoverable.

Datagram

One packet, or unit, of information that includes relevant delivery information, such as the destination address, that is sent through a packet-switching network.

Data-overrun error

A state in which the sending computer is transmitting characters faster than the receiving computer can accommodate them. If this problem persists, reduce the bits-per-second (bps) rate.

Data Terminal Equipment (DTE)

In the RS-232-C hardware standard, any device, such as a remote access server or client, that has the ability to transmit information in digital form over a cable or a communications line.

Data Packet

A unit of information transmitted as a whole from one device to another on a network.

Data Link Control (DLC)

An address that uniquely identifies a node on a network. Every network adapter has a DLC address or DLC identifier (DLCI). Some network protocols, such as Ethernet and Token Ring, use DLC addresses exclusively. Other protocols, such as TCP/IP, use a logical address at the OSI Network layer to identify nodes.
However, all network addresses must eventually be translated to DLC addresses. In TCP/IP networks, this translation is performed by the Address Resolution Protocol (ARP).

Data Communications Equipment (DCE)

One of two types of hardware connected by an RS-232-C serial connection, the other being a Data Terminal Equipment (DTE) device. A DCE is an intermediary device that often transforms input from a DTE before sending it to a recipient. A modem, for example, is a DCE that modulates data from a microcomputer (DTE) and sends it along a telephone connection.

Data Communications Equipment (DCE)

One of two types of hardware connected by an RS-232-C serial connection, the other being a Data Terminal Equipment (DTE) device. A DCE is an intermediary device that often transforms input from a DTE before sending it to a recipient. A modem, for example, is a DCE that modulates data from a microcomputer (DTE) and sends it along a telephone connection.

Daily Backup

A backup that copies all selected files that have been modified the day the daily backup is performed. The backed-up files are not marked as having been backed up (in other words, the archive attribute is not cleared).

D-channel

A separate channel of an ISDN line that is used for ISDN signaling. For ISDN Basic Rate Interface (BRI), the D-channel is 16 kilobits per second (Kbps). For ISDN Primary Rate Interface (PRI), the D-channel is 64 Kbps. D-channel is also called data channel.

D-channel

A separate channel of an ISDN line that is used for ISDN signaling. For ISDN Basic Rate Interface (BRI), the D-channel is 16 kilobits per second (Kbps). For ISDN Primary Rate Interface (PRI), the D-channel is 64 Kbps. D-channel is also called data channel.

D-channel

A separate channel of an ISDN line that is used for ISDN signaling. For ISDN Basic Rate Interface (BRI), the D-channel is 16 kilobits per second (Kbps). For ISDN Primary Rate Interface (PRI), the D-channel is 64 Kbps. D-channel is also called data channel.

D-channel

A separate channel of an ISDN line that is used for ISDN signaling. For ISDN Basic Rate Interface (BRI), the D-channel is 16 kilobits per second (Kbps). For ISDN Primary Rate Interface (PRI), the D-channel is 64 Kbps. D-channel is also called data channel.

Custom File Type

Typically, files with extensions that have been created for special kinds of files. Custom file types are not tracked by the system registry.

Cryptography

The processes, art, and science of keeping messages and data secure. Cryptography is used to enable and ensure confidentiality, data integrity, authentication (entity and data origin), and nonrepudiation.

Cryptographic Service Provider (CSP)

The code that performs authentication, encoding, and encryption services that Windows-based applications access through the CryptoAPI. A CSP is responsible for creating keys, destroying them, and using them to perform a variety of cryptographic operations. Each CSP provides a different implementation of the CryptoAPI. Some provide stronger cryptographic algorithms, while others contain hardware components, such as smart cards.

CryptoAPI

An application programming interface (API) that is provided as part of Microsoft Windows. CryptoAPI provides a set of functions that allow applications to encrypt or digitally sign data in a flexible manner while providing protection for the user's sensitive private key data. Actual cryptographic operations are performed by independent modules known as cryptographic service providers (CSPs).

Cross-reference object

Objects in which Active Directory stores information about directory partitions and external directory services. An example of an external directory service is another LDAP-compliant directory.

CRL distribution point

An optional extension in an X.509v3 certificate that identifies how information is obtained. Also, a directory entry or other distribution source for certificate revocation lists.

What are credentials?

A set of information that includes identification and proof of identification that is used to gain access to local and network resources. Examples of credentials are user names and passwords, smart cards, and certificates.

CRC errors

Errors caused by the failure of a cyclic redundancy check. A CRC error indicates that one or more characters in the data packet received were found garbled on arrival.

Print a picture

Windows Photo Viewer can make prints of your digital photos.

If you don't have a printer handy, you can use Windows to order prints online.

Show contentHide content To print your own pictures
Remember: print quality depends on several factors, including your choices of paper and ink, printer settings, and the quality of the original photo.


Double-click a picture to launch Windows Photo Viewer.

On the toolbar, click the Print button, and then click Print.

In the Print Pictures dialog box, select the printer, paper size, print quality, print style, and number of copies.

Picture of the Print Pictures dialog box Print Pictures dialog box in Windows Photo Viewer

When you're done, click Print.

Notes
To launch the Print Pictures dialog box directly, right-click a photo and then click Print.

Some printers allow you to print a mirror image of a picture (sometimes called "reverse landscape" or "reverse portrait"). If this option is selected, the preview image in the Print Pictures dialog box won't change. However, the picture will print as a mirror image.

Show contentHide content To order prints online
With Windows Photo Viewer, it's easy to order prints from an online service.

Double-click a picture to launch Windows Photo Viewer.

On the toolbar, click Print, and then click Order prints.

On the Select a printing company page, click the printing company that you want to use, and then click Send Pictures.

Follow the instructions to complete your order. The printing company will typically ask you to select the size, style, and number of prints you'd like.

Notes
Your computer must be connected to the Internet to use this feature.

The list of available printing companies might vary depending on your location.

Picture printing: frequently asked questions


Here are answers to some common questions about printing in Windows Photo Viewer.

Picture of the Print Pictures dialog box Print Pictures dialog box in Windows Photo Viewer


Show contentHide content How do I change print sizes in Windows Photo Viewer?
Windows Photo Viewer offers a list of templates that correspond to the most common print sizes, including 4 x 6, 8 x 10, and wallet-sized photos.

However, most digital pictures don't fit perfectly in a standard-sized print, so you might end up with blank space around the edges. To avoid this, you should crop your photo to a standard size and then print the cropped version with Windows Photo Viewer. Most image-editing programs—including Windows Paint—have the ability to crop. (See Crop a picture by using Paint.)

Show contentHide content What does the "Fit picture to frame" option do?
Digital pictures often don't match standard print sizes. If you select the Fit picture to frame check box, Windows will enlarge the image enough to make sure it fits the proportions you specified.

Illustration showing how Fit picture to frame affects printed picturesBefore and after using Fit picture to frame

The only drawback to using this option is that part of the picture will extend beyond the frame and won't be printed. You can always use an image-editing program such as Paint to crop the photo yourself. (See Crop a picture by using Paint.)

Show contentHide content What happens if I try to print a single picture on a template with room for several pictures?
To save ink, Windows only prints what you tell it to print. So if you try to print a single 4-x-6-inch picture on a page with room for three pictures, you'll see your photo surrounded by a lot of white space.

Show contentHide content Why do settings such as paper size and print quality change from time to time?
By default, only the combinations of paper size, paper type, and print quality that give you the best results are displayed in the Print Pictures dialog box.

You can turn off this safeguard to see all the options and combinations, even if they might not print well. To do it, click Options on the lower-right corner of the Print Pictures dialog box, and then clear the Only show options that are compatible with my printer check box.

Show contentHide content What's a contact sheet?
To learn about contact sheets and how they're useful, see View and print picture thumbnails.

Show contentHide content How does paper type affect my printing results?
The type of paper that you use to print your pictures is the single most important factor in determining print quality. You might use plain paper or inkjet paper for routine printing, but to make a high-quality print suitable for framing, you should use a premium glossy or matte photo paper.

For best results, be sure to match the paper type option with what you have in the printer.

Prevent children from using specific programs

You can use Parental Controls to determine which specific programs your child can use. For example, if you use a program to keep track of your finances, you can prevent your child from opening it and viewing your financial information.


Click to open Parental Controls. ‌ Administrator permission required If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

Click the name of the person you want to prevent from using specific programs.

Under Parental Controls, click On, enforce current settings.

Click Allow and block specific programs.

Click Person's name‌ can only use the programs I allow.

Select the programs that you want to allow. If the program you want doesn't appear in the list, click Browse to locate the program.

Tip
Make sure that you select all of the programs that you want your child to be able to run. Parental Controls will block any program not selected in the list.

Start a program by using the Run command

Using the Run command is a quick way to open programs, files, folders, and—when you're connected to the Internet—websites. You can also use the search box on the Start menu in place of the Run command.


Click the Start button Picture of the Start button. In the search box, type run, and then, in the list of results, click Run.

What is program compatibility?


Program compatibility is a mode in Windows that lets you run programs written for earlier versions of Windows. Most programs written for Windows Vista also work in this version of Windows, but some older programs might run poorly or not run at all. If an older program doesn't run correctly, start the Program Compatibility troubleshooter to simulate earlier versions of Windows.

Click to open the Program Compatibility troubleshooter.

Notes
Do not use the Program Compatibility troubleshooter on older antivirus programs, disk utilities, or other system programs, because using outdated programs of this type might cause data loss or create a security risk.

Some compatibility problems might be caused by drivers. If an older driver is causing problems, you'll need to update it manually. For more information, see Update drivers: recommended links.

You can also open the Program Compatibility troubleshooter by right-clicking a program's icon or shortcut and then clicking Troubleshoot compatibility.

Program Compatibility Assistant: frequently asked questions

What is the Program Compatibility Assistant?
Picture of the Program Compatibility AssistantThe Program Compatibility Assistant can detect problems with older programs

The Program Compatibility Assistant detects known compatibility issues in older programs. After you have run an older program in this version of Windows, it notifies you if there is a problem and offers to fix it the next time you run the program. If the compatibility issue is serious, the Program Compatibility Assistant might warn you or block the program from running. If that happens, you'll have the option to check online for possible solutions.

Show contentHide content What changes does it make?
It depends on the problem, but any changes made are related to how Windows runs the program. No changes are made to the program, itself. For example, the Program Compatibility Assistant can resolve conflicts with User Account Control, a security feature in Windows that can help make your computer safer. Or, it can run the program in a mode that simulates earlier versions of Windows. The changes that Program Compatibility Assistant makes are done automatically, so you don't need to make them.

Show contentHide content How do I turn it off or turn it back on?
Adjustments to program compatibility features can be made by using Group Policy. For advanced information on how to use Group Policy, go to the Microsoft website for IT professionals.

Show contentHide content Can I run it manually?
No. The Program Compatibility Assistant runs automatically when it detects an older program that has a compatibility problem. However, you can use the Program Compatibility troubleshooter, a separate but related feature of Windows, on a program or on a setup file if it won't work or install correctly

What is Set Program Access and Computer Defaults?


You must be logged on as an administrator to perform these steps.
Set Program Access and Computer Defaults makes it easy for you to change the default program used for certain activities, such as web browsing, sending e‑mail, playing audio and video files, and using instant messaging.
You can also specify which of these default programs are displayed on the Start menu, on the desktop, and in other locations.

Set Program Access and Computer Defaults: frequently asked questions


Here are some answers to common questions about Set Program Access and Computer Defaults.

Show contentHide content Do I need to be logged in as an administrator to make changes?
Yes, to change these settings, you must be logged on to your computer as an administrator.

Show contentHide content Can I specify different default programs for different users?
Yes, but you can't use Set Program Access and Computer Defaults. To specify different default programs for different users, see Change which programs Windows uses by default. The default programs selected in Set Program Access and Computer Defaults apply to everyone who uses your computer.

Show contentHide content Can I set my preferred non-Microsoft programs as defaults in Set Program Access and Computer Defaults?
It depends. To appear in Set Program Access and Computer Defaults, programs must be registered in the Windows registry. Typically, programs register themselves during installation.

If your program doesn't appear in the list, it hasn't been registered and can't be set as the default program using Set Program Access and Computer Defaults. For assistance, contact the manufacturer of the program.

Show contentHide content Can I remove a non-Microsoft program from the Start menu?
Most of the time, you can, but software manufacturers determine how their products work with Set Program Access and Computer Defaults. Some non-Microsoft programs might continue to show icons on the Start menu and elsewhere even if you clear the Enable access to this program check box.

Show contentHide content Can I change the Custom option so it isn't selected every time I open Set Program Access and Computer Defaults?
No. By default, the feature opens with Custom selected.

What is a runtime error?


A runtime error is a software or hardware problem that prevents a program from working correctly. Runtime errors might cause you to lose information in the file you're working on, cause errors in the file (corrupt the file) so you can't work with it, or prevent you from using a feature. Unlike stop errors, runtime errors don't typically cause Windows or a program to stop working.

Runtime errors can occur if you are running two software programs that aren't compatible, if your computer has memory problems, or if the computer has been infected with malicious software. If a runtime error keeps occurring, follow these steps:

Install the latest updates for Windows and for the program displaying the error. Note that the update for the program might be listed as an optional update on the Windows Update page.

Click to open Windows Update.

For more information about Windows Update, see Install Windows updates.

Check Action Center for a solution to the program displaying the error.

When you have Windows Error Reporting turned on and a program stops working, a problem report is typically sent to Microsoft for more analysis. If a solution is available, or there are steps you can take to minimize the likelihood of the problem recurring, they'll be available in Action Center.

Click to open Action Center.

Update and run your antivirus software. Windows doesn't come with antivirus software, but Action Center can often monitor the antivirus software that you or your computer manufacturer have installed.

Click to open Action Center.

Make sure your computer has at least the minimum amount of random access memory (RAM) required to run the program that is displaying the error. Look for the program requirements online or in the packaging information

What is svchost.exe?

Svchost.exe is a process on your computer that hosts, or contains, other individual services that Windows uses to perform various functions. For example, Windows Defender uses a service that is hosted by a svchost.exe process.
There can be multiple instances of svchost.exe running on your computer, with each instance containing different services. One instance of svchost.exe might host a single service for a program, and another instance might host several services related to Windows. You can use Task Manager to view which services are running under each instance of svchost.exe.

 To view which services are currently running under svchost.exe

Note

  • If you install a program and begin receiving notices that Data Execution Prevention (DEP), a security feature of Windows, is closing svchost.exe or other Windows processes, the cause could be services or extensions created by the program. Check with the publisher of the program to see if there is an updated, DEP-compatible version available, or try uninstalling the program.

What is Data Execution Prevention?

Data Execution Prevention (DEP) is a security feature that can help prevent damage to your computer from viruses and other security threats. Harmful programs can try to attack Windows by attempting to run (also known as execute) code from your computer's memory reserved for Windows and other authorized programs. These types of attacks can harm your programs and files.
DEP can help protect your computer by monitoring your programs to make sure that they use computer memory safely. If DEP notices a program on your computer using memory incorrectly, it closes the program and notifies you.

Data Execution Prevention: frequently asked questions


Here are answers to some common questions about Data Execution Prevention (DEP).

Show contentHide content What is DEP?
DEP is a security feature that can help prevent damage to your computer from viruses and other security threats. DEP monitors programs to make sure they use system memory, safely. If a program tries running (also known as executing) code from memory in an incorrect way, DEP closes the program. DEP automatically monitors essential Windows programs and services, but you can increase your protection by having DEP monitor all programs. For more information, see Change Data Execution Prevention settings.

Show contentHide content Is it safe to run a program again if DEP has closed it?
Yes, but only if you leave DEP turned on for that program so that Windows can continue to detect attempts to run code from protected memory locations and help prevent attacks.

Show contentHide content If DEP keeps closing the same program, is my computer under attack?
If you are using the recommended security settings and your antivirus software did not detect a threat, your computer is probably not under attack. In this case, the program might not run correctly when DEP is turned on. Check for a DEP-compatible version of the program or an update from the software publisher before you change any DEP settings.

Show contentHide content How can I prevent DEP from closing a program I trust?
First, see if a DEP-compatible version of the program is available by visiting the software publisher's website. If the publisher has not released an updated, DEP-compatible version of the program, you can turn off DEP for the program that was closed. You will be able to use the program, but it might be vulnerable to an attack that could spread to your other programs and files.

To turn off DEP for a program, see Change Data Execution Prevention settings. If you choose to turn off DEP for a program, it is a good idea to check frequently for an updated version of the program and, after you update it, to turn on DEP again.

Show contentHide content What should I do if DEP is closing a program that’s part of Windows, such as svchost.exe or explorer.exe?
The svchost.exe and explorer.exe programs are parts of the Windows operating system. If DEP closes them or other Windows services, the cause could be smaller programs, such as extensions, that are created by other software publishers and that operate inside Windows. If you have recently installed a program and notice DEP closing Windows programs, check with the software publisher to see if there is an updated, DEP-compatible version available, or try uninstalling the program.

Show contentHide content If my DEP settings indicate that my computer’s processor does not support hardware-based DEP, am I still protected?
Yes. DEP is a software-based feature of Windows. Some computer processors also provide hardware-based DEP under various names. These processors use hardware technology to prevent programs from running code in protected memory locations. If your processor does not support hardware-based DEP, Windows will use software-based DEP to help protect your computer.

Change Data Execution Prevention settings

Data Execution Prevention (DEP) is a security feature that helps prevent damage from viruses and other security threats by monitoring your programs to make sure they use the computer's memory safely. For more information, see What is Data Execution Prevention?

If you want to turn off DEP for a program you trust, first check to see if the software publisher has made a DEP-compatible version of the program or made an update available before you change any DEP settings. If an update or DEP-compatible version is available, we recommend installing it and leaving DEP turned on so you can benefit from the protection it can provide. But if the publisher has not released an updated, DEP-compatible version of the program, you can turn off DEP for the program. You'll be able to use the program, but it might be vulnerable to an attack that could spread to your other programs and files.

Click to open System.

Click Advanced system settings. Administrator permission required If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

Under Performance, click Settings.

Click the Data Execution Prevention tab, and then click Turn on DEP for all programs and services except those I select.

To turn off DEP for an individual program, select the check box next to the program that you want to turn off DEP for, and then click OK.

If the program is not in the list, click Add. Browse to the Program Files folder, find the executable file for the program (it will have an .exe file name extension), and then click Open.

Click OK, click OK in the System Properties dialog box if it appears, and then click OK again. You might need to restart your computer for the changes to take effect.

Note
To turn on DEP for a program, clear the check box next to the program that you want to turn on DEP for, and then click OK.

Purble Pairs Game

In this game, your goal is to find all the matching pairs of pictures before time runs out. Flip a tile over to reveal a picture, then find its match. Use a "sneak peek" token for a quick glimpse of all the tiles on the board!
  • Number of players: 1
  • Difficulty levels: Beginner, intermediate, advanced
  • Typical playing time: 1 to 10 minutes

Purble Shop Game

This game tests your powers of deduction. Your goal: to make your Purble's face match the mystery Purble behind the curtain. Choose hair, eyes, nose, and lips from the shelves, then learn how many—but not which—features you got right!
  • Number of players: 1
  • Difficulty levels: Beginner, intermediate, advanced
  • Typical playing time: 1 to 5 minutes

Purble Place Game

Purble Place is actually three games in one: Comfy Cakes, Purble Shop, and Purble Pairs. Designed to teach children memory, pattern recognition, and reasoning skills, at higher difficulty levels the games challenge players of all ages.

Comfy Cakes

This game puts you in Chef Purble's bakery, where you must complete an order for a batch of cakes. The bakery's customers are very particular, so you'll need to make the cakes exactly as ordered, with the right combination of shapes, batters, fillings, icings, and decorations.
Work fast because the cakes will keep on coming!
  • Number of players: 1
  • Difficulty levels: Beginner, intermediate, advanced
  • Typical playing time: 1 to 5 minutes

Spider Solitaire

Spider Solitaire is a variant of solitaire that uses two decks' worth of cards. The object: remove all the cards from the table in the fewest number of moves. Remove cards by making a complete stack in descending order (king to ace).
  • Number of players: 1
  • Difficulty levels: Beginner, intermediate, advanced
  • Typical playing time: 1 to 15 minutes

Solitaire

Solitaire is based on the most popular variant of solitaire, Klondike. To win, you must build four stacks of cards, one for each suit, in ascending order from ace to king.
  • Number of players: 1
  • Difficulty levels: One level
  • Typical playing time: 1 to 15 minutes

Hearts

Hearts is a card game that you play in rounds against three computer opponents. Avoid taking the undesirable cards—all hearts and the queen of spades—unless you're planning to shoot the moon! The player with the lowest score wins.
  • Number of players: 1 (against 3 computer opponents)
  • Difficulty levels: One level
  • Typical playing time: 10 to 20 minutes

FreeCell

FreeCell is a form of solitaire played with a single deck. The key to victory lies in the four free cells in the corner of the table—hence the name!
  • Number of players: 1
  • Difficulty levels: One level
  • Typical playing time: 10 to 20 minutes

Mahjong Titans

Mahjong Titans is a solitaire game played with tiles. Remove matching pairs of tiles from the board. Remove them all and you win!
Mahjong Titans is only available on premium editions of Windows 7.
  • Number of players: 1
  • Difficulty levels: Varies by tile layout
  • Typical playing time: 10 to 30 minutes

Minesweeper

Minesweeper is a deceptively simple test of memory and reasoning—and one of the most popular Windows games of all time. The goal: uncover empty squares and avoid hidden mines. Click one, and you lose!
  • Number of players: 1
  • Difficulty levels: Beginner, intermediate, advanced
  • Typical playing time: 1 to 10 minutes

Chess Titans

Chess Titans brings the classic strategy game of chess to life with three-dimensional graphics and animation. Highlighted squares show where your pieces can move. Choose a porcelain, marble, or wooden board, and rotate it any way you like.
Chess Titans is only available in premium editions of Windows 7.
  • Number of players: 1 or 2
  • Difficulty levels: 1 (beginner) to 10 (expert)
  • Typical playing time: 10 to 60 minutes

Internet Spades

Spades is a popular, fast-paced card game that demands teamwork and strategy. You guess how many "tricks"—rounds—you and your partner will win. Guess too low, and you’ll lose big points. Guess too high, and you'll “bag out”!
  • Number of players: 4
  • Difficulty levels: Beginner, intermediate, expert
  • Typical playing time: 10 to 30 minutes

Internet Checkers

One of the oldest and most popular games in the world is back and better than ever. The perfect way to spend a lazy afternoon.
  • Number of players: 2
  • Difficulty levels: Beginner, intermediate, expert
  • Typical playing time: 10 to 20 minutes

Internet Backgammon

Backgammon is a two-person board game with a straightforward goal: be the first to move all your pieces around and off the board.

Number of players: 2

Difficulty levels: Beginner, intermediate, expert

Typical playing time: 10 to 30 minutes

Install a game in the Games folder

The Games folder is more than just the central repository for all games on your computer. It also offers game updates, statistics, rating information, RSS feeds, and more.

Click to open Games.

A game should appear in the folder automatically when you install it. If not, here's how to make it appear.

Show contentHide content To add a game to the Games folder
Drag the game's executable file to the Games folder.

You can find the game's executable file in the folder where you installed the game.

If you don't see Minesweeper, Solitaire, or any of the other games that are included with Windows 7, here's how to make them available.

Show contentHide content To turn on Windows games
Click the Start button Picture of the Start button, click Control Panel, click Programs, click Programs and Features, and then click Turn Windows features on or off. Administrator permission required If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

Select the Games check box, and then click OK.

Which version of DirectX is on your computer?

DirectX is a suite of multimedia technologies required by many Windows games. If your computer doesn't have the right version of DirectX installed (the product box should tell you which one you need), your game might not work properly.

To check which version of Direct X is on your computer
Click to open DirectX Diagnostic Tool.

Click the System tab, and then, under System Information, check the DirectX version number.

To download the latest version of DirectX, visit the Microsoft Download Center website.

Diagnosing basic problems with DirectX

If you're having problems getting a game or movie to play properly, the DirectX Diagnostic Tool can help you pinpoint the source. DirectX is a suite of technologies used by many of the multimedia programs in Windows.

Click to start the DirectX Diagnostic Tool.

What to look for
Once the Diagnostic Tool has finished, here are three key things to check:

Check your video card

Some programs run very slowly—or not at all—unless Microsoft DirectDraw or Direct3D hardware acceleration is turned on.

To determine this, click the Display tab, and then under DirectX Features, check to see whether DirectDraw, Direct3D, and AGP Texture Acceleration appear as Enabled. If not, try turning on hardware acceleration.

Click to open Screen Resolution.

Click Advanced settings.

Click the Troubleshoot tab, and then click Change settings. Administrator permission required If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

Move the Hardware Acceleration slider to Full.

If that fails, you might need to update the video driver or the card, itself. You can typically find the latest drivers for your hardware in the support section of the manufacturer's website.

Check your game controller

If a joystick or other input device fails to respond, it might not be installed correctly.

Make sure the device shows up on the Input tab. If not, reinstall the device according to the manufacturer's instructions. If it's a USB device, unplug it and then plug it back in.

Check for "unsigned" drivers

A driver that's been digitally signed has been tested by the Microsoft Windows Hardware Quality Lab for DirectX compatibility.

If the Diagnostic Tool flags an unsigned driver, updating the driver might solve your problem. You can typically find the latest driver for your hardware on the support section of the manufacturer's website.

How do I watch or record TV on my computer?

To watch or record TV on your computer, you need three things:
  • A TV tuner
    There are many types of TV tuners, from internal expansion cards, known as TV tuner cards, to external TV tuners that connect to your computer through a USB port or IEEE 1394 port.
    Some computers come with TV tuners. If your computer doesn't have a TV tuner, you might be able to add one. For more information about TV tuners, see Get help for your TV tuner.
    A typical external TV tuner
  • A TV signal connected to your computer
    Depending on your TV tuner capabilities, it might be possible to connect a TV signal to your computer from an over-the-air antenna, a cable TV jack in the wall, or a cable or satellite TV set-top box. The types of TV signals available in your area will vary—contact your local cable or satellite provider for more information.
  • Software for watching and recording live TV
    There are several options for software that will enable you to watch and record live TV on your computer, including solutions from Microsoft and other software providers.

Connect your computer to your TV

    After you have the right cable, follow these steps to connect your computer to your TV:
  1. Turn off your computer and position it within easy reach of your TV. Disconnect the monitor, but leave the mouse and keyboard connected.
  2. Connect the appropriate video cable from your computer's output to your TV.
  3. Turn on your TV and set it to the input that matches the output on your computer. You might need to refer to the user's guide included with your TV for instructions on how to do this.
  4. Turn on your computer.
    You should see Windows displayed on your TV. If the screen looks stretched, or part of the screen seems cut off, you probably need to adjust the screen resolution in Windows. For more information, see Getting the best display on your monitor.
    If you can't see Windows on your TV, you might need to reconnect the computer to your monitor and adjust the screen resolution before you connect to your TV.

Record audio with Sound Recorder

Sound Recorder lets you record a sound and save it as an audio file on your computer. You can record sound from different audio devices, such as a microphone that's plugged into the sound card on your computer. The types of audio input sources you can record from depend on the audio devices you have and the input sources on your sound card.
Sound Recorder
  1. Make sure you have an audio input device, such as a microphone, connected to your computer.
  2. Click to open Sound Recorder.
  3. Click Start Recording.
  4. To stop recording audio, click Stop Recording.
  5. (Optional) If you want to continue recording audio, click Cancel in the Save As dialog box, and then click Resume Recording. Continue to record sound, and then click Stop Recording.
  6. Click the File name box, type a file name for the recorded sound, and then click Save to save the recorded sound as an audio file.

Note

  • To use Sound Recorder, you must have a sound card and speakers installed on your computer. If you want to record sound, you also need a microphone (or other audio input device).

Should I allow a webpage to access my Windows Media Player library?

By default, Windows Media Player doesn't allow webpages to access information in your digital media files or in your library. However, any software that you install on your computer, such as programs or plug-ins, has full access to your library.
Webpages might request permission to access your library. For example, webpages might access the information in your digital media files and library to offer you similar content, advertise sales, or recommend music or video services, such as subscriptions.
Before the Player shares information from your files and library, a message is displayed that notifies you that the webpage is seeking read or full access to your files and library. If you grant the webpage read access, the webpage can scan the contents of your files and library. If you grant the webpage full access, the webpage can scan and change media information in your files and library. Full access can include adding, removing, and changing media information such as a track name in your library and in your digital media files.
If you grant a webpage read or full access to your library, you grant access for only that single instance. In other words, when you open the webpage again, you will be prompted to grant access again.
The Player might also prompt you when skins and programs try to access your library, but usually when a skin or program tries to access your library, it's because the skin or program is changing to a lower access level. For example, the Player might prompt you when a skin switches from full to read access.