Objects in which Active Directory stores information about directory partitions
and external directory services. An example of an external directory service is
another LDAP-compliant directory.
Expire Interval
For DNS, the number of seconds that DNS servers operating as secondary masters
for a zone will use to determine if zone data should be expired when the zone is
not refreshed and renewed.
Extended Characters
Any of the 128 additional characters in the extended ASCII (8-bit) character
set. These characters include those in several non-English languages, such as
accent marks, and special symbols used for creating pictures.
File and Print Servers for Macintosh
A software component that allows Macintosh users access to a computer running
any version of the Windows Server family. The services provided with this
component allow personal computer and Macintosh users to share files and
resources, such as printers on the AppleTalk network or printers attached to the
Windows server.
File Allocation Table (FAT)
A file system used by MS-DOS and other Windows-based operating systems to
organize and manage files. The file allocation table (FAT) is a data structure
that Windows creates when you format a volume by using the FAT or FAT32 file
systems. Windows stores information about each file in the FAT so that it can
retrieve the file later.
Federal Information Processing Standard 140-1 (FIPS 140-1)
A standard entitled Security Requirements for Cryptographic Modules. FIPS
140-1 describes government requirements that hardware and software cryptomodules
should meet for Sensitive but Unclassified (SBU) use.
Fax Service, Define Fax
A system service that provides fax services to local and remote network clients.
Fax services include receiving faxes and faxing documents, fax wizard messages,
and e-mail messages.
Fault Tolerance
The ability of computer hardware or software to ensure data integrity when
hardware failures occur. Fault tolerant features appear in many server operating
systems and include mirrored volumes, RAID-5 volumes, and server clusters.
What is FAT32? Define FAT32
A derivative of the file allocation table (FAT) file system. FAT32 supports
smaller cluster sizes and larger volumes than FAT, which results in more
efficient space allocation on FAT32 volumes.
Failover
The process of taking resource groups offline on one node and bringing them back
online on another node. When a resource group goes offline, all resources
belonging to that group go offline. The offline and online transitions occur in
a predefined order, with resources that are dependent on other resources taken
offline before and brought online after the resources upon which they depend.
Failback Policy
Parameters that an administrator can set using Cluster Administrator that affect
failback operations.
Define Failback
The process of moving resources, either individually or in a group, back to
their preferred node after the node has failed and come back online.
External Network Number
A 4-byte hexadecimal number used for addressing and routing purposes. The
external network number is associated with physical network adapters and
networks. To communicate with each other, all computers on the same network that
use a specific frame type must have the same external network number. All
external network numbers must be unique to the IPX internetwork.
Extensible Markup Language (XML)
A meta-markup language that provides a format for describing structured data.
This facilitates more precise declarations of content and more meaningful search
results across multiple platforms. In addition, XML will enable a new generation
of Web-based data viewing and manipulation applications.
Extensible Firmware Interface (EFI)
In computers with the Intel Itanium processor, the interface between a
computer's firmware, hardware, and the operating system. The Extensible Firmware
Interface (EFI) defines a new partition style called GUID partition table (GPT).
EFI serves the same purpose for Itanium-based computers as the BIOS found in
x86-based computers. However, it has expanded capabilities that provide a
consistent way to start any compatible operating system and an easy way to add
EFI drivers for new bootable devices without the need to update the computer's
firmware.
Extensible Authentication Protocol (EAP)
An extension to the Point-to-Point Protocol (PPP) that allows for arbitrary
authentication mechanisms to be employed for the validation of a PPP connection.
Extended Partition
A type of partition that you can create only on basic master boot record (MBR)
disks. Extended partitions are useful if you want to create more than four
volumes on a basic MBR disk. Unlike primary partitions, you do not format an
extended partition with a file system and then assign a drive letter to it.
Instead, you create one or more logical drives within the extended partition.
After you create a logical drive, you format it and assign it a drive letter. An
MBR disk can have up to four primary partitions, or three primary partitions,
one extended partition, and multiple logical drives.
Express Message
For Message Queuing, a message that uses fewer resources and is faster than a
recoverable message. However, because express messages are mapped to memory,
they are lost if the computer storing them fails.
Explicit Permissions
Permissions on an object that are automatically assigned when the object is
created, or specifically assigned or changed by the owner of the object.
Expire Interval
For DNS, the number of seconds that DNS servers operating as secondary masters
for a zone will use to determine if zone data should be expired when the zone is
not refreshed and renewed.
What is Expansion Slot?
A socket in a computer, designed to hold expansion boards and connect them to
the system bus.
Expanded Memory
Type of memory that can be added to IBM personal computers. The use of expanded
memory is defined by the Expanded Memory Specification (EMS), which supports
memory boards containing RAM that can be enabled or disabled by software.
Everyone Category
In the Macintosh environment, one of the user categories to which you assign
permissions for a folder. Permissions granted to everyone apply to all users who
use the server, including guests.
Event Viewer
A component you can use to view and manage event logs, gather information about
hardware and software problems, and monitor security events. Event Viewer
maintains logs about program, security, and system events.
Event Logging
The process of recording an audit entry in the audit trail whenever certain
events occur, such as services starting and stopping, or users logging on and
off and accessing resources. You can use Event Viewer to review AppleTalk
network integration events as well as Windows events.
Event Log Service
A service that records events in the system, security, and application logs. The
Event Log service is located in Event Viewer.
Define Ethernet, What is Ethernet?
An IEEE 802.3 standard for contention networks. Ethernet uses a bus or star
topology and relies on the form of access known as Carrier Sense Multiple Access
with Collision Detection (CSMA/DC) to regulate communication line traffic.
Network nodes are linked by coaxial cable, fiber-optic cable, or by twisted-pair
wiring. Data is transmitted in variable-length frames containing delivery and
control information and up to 1,500 bytes of data. The Ethernet standard
provides for baseband transmission at 10 megabits (10 million bits) per second.
Error Detection
A technique for detecting when data is lost during transmission. This allows the
software to recover lost data by notifying the transmitting computer that it
needs to retransmit the data.
Environment Variable
A string consisting of environment information, such as a drive, path, or file
name, associated with a symbolic name that can be used by Windows. You use
System in Control Panel or the set command from the command prompt to
define environment variables.
Enhanced Small Device Interface (ESDI)
A standard that can be used with high-capacity hard disks, floppy disk drives,
and tape drives to allow these devices to communicate with a computer at high
speeds.
Define Encryption
The process of disguising a message or data in such a way as to hide its
substance.
Encrypting File System (EFS)
A feature in this version of Windows that enables users to encrypt files and
folders on an NTFS volume disk to keep them safe from access by intruders.
Encrypted Password
A password that is scrambled. Encrypted passwords are more secure than plaintext
passwords, which are susceptible to network sniffers.
Encapsulated PostScript (EPS) file
A file that prints at the highest possible resolution for your printer. An EPS
file may print faster than other graphical representations. Some Windows-based
and non-Windows-based graphical programs can import EPS files.
Emulated Local Area Network (ELAN)
A logical ATM network that emulates the services of an Ethernet or Token Ring
LAN.
Embedded Object
Information created in another program that has been pasted inside your
document. When information is embedded, you can edit the information in the new
document using toolbars and menus from the original program.
To edit the embedded information, double-click it and the toolbars and menus from the program used to create the information appear. Embedded information is not linked to the original source. If you change information in one place, it is not updated in the other.
To edit the embedded information, double-click it and the toolbars and menus from the program used to create the information appear. Embedded information is not linked to the original source. If you change information in one place, it is not updated in the other.
EFI system partition
On Itanium-based computers, a portion on a GUID partition table (GPT) disk that
is formatted with the FAT file system and contains the files necessary to start
the computer. Every Itanium-based computer must have at least one GPT disk with
an EFI system partition. The EFI system partition serves the same purpose as the
system volume found on x86-based computers.
Dynamic-Link Library (DLL)
An operating system feature that allows executable routines (generally serving a
specific function or set of functions) to be stored separately as files with
.dll extensions. These routines are loaded only when needed by the program that
calls them.
Dynamic Volume
A volume that resides on a dynamic disk. Windows supports five types of dynamic
volumes: simple, spanned, striped, mirrored, and RAID-5. A dynamic volume is
formatted by using a file system, such as FAT or NTFS, and it has a drive letter
assigned to it.
Dynamic Update
An updated specification to the Domain Name System (DNS) standard that permits
hosts that store name information in DNS to dynamically register and update
their records in zones maintained by DNS servers that can accept and process
dynamic update messages.
Dynamic Storage
A storage method in Windows that allows disk and volume management without
requiring operating system restart.
Dynamic Host Configuration Protocol (DHCP)
A TCP/IP service protocol that offers dynamic leased configuration of host IP
addresses and distributes other configuration parameters to eligible network
clients. DHCP provides safe, reliable, and simple TCP/IP network configuration,
prevents address conflicts, and helps conserve the use of client IP addresses on
the network.
DHCP uses a client/server model where the DHCP server maintains centralized management of IP addresses that are used on the network. DHCP-supporting clients can then request and obtain lease of an IP address from a DHCP server as part of their network boot process.
DHCP uses a client/server model where the DHCP server maintains centralized management of IP addresses that are used on the network. DHCP-supporting clients can then request and obtain lease of an IP address from a DHCP server as part of their network boot process.
Dynamic Disk
A physical disk that can be accessed only by Windows 2000 and Windows XP.
Dynamic disks provide features that basic disks do not, such as support for
volumes that span multiple disks. Dynamic disks use a hidden database to track
information about dynamic volumes on the disk and other dynamic disks in the
computer. You convert basic disks to dynamic by using the Disk Management
snap-in or the DiskPart command line utility. When you convert a basic disk to
dynamic, all existing basic volumes become dynamic volumes.
dynamic data exchange (DDE)
A form of inter process communication (IPC) implemented in the Microsoft Windows
family of operating systems. Two or more programs that support dynamic data
exchange (DDE) can exchange information and commands.
What is DWORD? Define DWORD
A data type composed of hexadecimal data with a maximum allotted space of 4
bytes.
DVD drive
A disk storage device that uses digital video disc (DVD) technology. A DVD drive
reads both CD-ROM and DVDs; however, you must have a DVD decoder to display DVD
movies on your computer screen.
DVD decoder
A hardware or software component that allows a digital video disc (DVD) drive to
display movies on your computer screen.
Define Duplex, What is Duplex?
A system capable of transmitting information in both directions over a
communications channel.
Define Dual Boot, What is Dual Boot?
A computer configuration that can start two different operating systems.
Define Drop Folder, What is Drop Folder?
In the Macintosh environment, a folder for which you have the Make Changes permission but not the See Files or See Folders permission. You can copy files into a drop folder, but you cannot see what files and subfolders the drop folder contains.
Drive Letter
The naming convention for disk drives on IBM and compatible computers. Drives
are named by letter, beginning with A, followed by a colon.
What is Drive in Computer?
An area of storage that is formatted with a file system and has a drive letter.
The storage can be a floppy disk, a CD, a hard disk, or another type of disk.
You can view the contents of a drive by clicking its icon in Windows Explorer or
My Computer.
Define Drainstop
For Network Load Balancing, a command that disables all new traffic handling
on the specified hosts. The hosts then enter draining mode to complete existing
connections.
While draining, hosts remain in the cluster and stop their cluster operations when there are no more active connections. To terminate draining mode, explicitly stop cluster mode with the stop command, or restart new traffic handling with the start command. To drain connections from a specific port, use the drain command.
While draining, hosts remain in the cluster and stop their cluster operations when there are no more active connections. To terminate draining mode, explicitly stop cluster mode with the stop command, or restart new traffic handling with the start command. To drain connections from a specific port, use the drain command.
What is Drain?
For Network Load Balancing, a command that disables new traffic handling for the
rule whose port range contains the specified port. All ports specified by the
port rule are affected.
Downloadable Fonts
A set of characters stored on disk and sent (downloaded) to a printer's memory
when needed for printing a document. Downloadable fonts are most commonly used
with laser printers and other page printers, although many dot-matrix printers
can accept some of them. Downloadable fonts are also called soft fonts.
Domain Tree
In DNS, the inverted hierarchical tree structure that is used to index domain names.Domain trees are similar in purpose and concept to the directory trees used by computer filing systems for disk storage. For example,
DOMAIN TREE PICTURES
when numerous files are stored on disk, directories can be used to organize the files into logical collections. When a domain tree has one or more branches, each branch can organize domain names used in the namespace into logical collections. In Active Directory, a hierarchical structure of one or more domains, connected by transitive, bidirectional trusts, that forms a contiguous namespace. Multiple domain trees may belong to the same forest.
DOMAIN TREE PICTURES
when numerous files are stored on disk, directories can be used to organize the files into logical collections. When a domain tree has one or more branches, each branch can organize domain names used in the namespace into logical collections. In Active Directory, a hierarchical structure of one or more domains, connected by transitive, bidirectional trusts, that forms a contiguous namespace. Multiple domain trees may belong to the same forest.
Ads
DHOOM : 3 |
WANTED |
Domain of Origin
The parent DNS domain name that is used to root either a zone or a resource record within a zone. This name is joined to the end of unqualified or relative domain names to form a fully qualified domain name (FQDN) within the zone. In DNS Manager, the domain of origin
will correspond to Zone name as it appears in the Add Zone Wizard or the name that appears in the Parent domain name field for any resource records created within the zone.
Domain Naming Master
The domain controller assigned to control the addition or removal of domains in
the forest. At any time, there can be only one domain naming master in the
forest.
Domain Name System (DNS)
A hierarchical, distributed database that contains mappings of DNS domain names
to various types of data, such as IP addresses. DNS enables the location of
computers and services by user-friendly names, and it also enables the discovery
of other information stored in the database.
Domain Name
The name given by an administrator to a collection of networked computers that
share a common directory. Part of the Domain Name System (DNS) naming structure,
domain names consist of a sequence of name labels separated by periods.
Domain Local Group
A security or distribution group that can contain universal groups, global
groups, and accounts from any domain in the domain tree or forest. A domain
local group can also contain other domain local groups from its own domain.
Rights and permissions can be assigned only at the domain containing the group.
Domain DFS
An implementation of DFS in which DFS topological information is stored in
Active Directory. Because this information is made available on multiple domain
controllers in the domain, domain DFS provides fault-tolerance for any
distributed file system in the domain.
Domain Controller Locator (Locator)
An algorithm that runs in the context of the Net Logon service and that finds
domain controllers on a Windows 2000 network. Locator can find domain
controllers by using DNS names (for IP/DNS-compatible computers) or by using
NetBIOS names (for computers that are running Windows 3.x, Windows for
Workgroups, Windows NT 3.5 or later, Windows 95, or Windows 98, or it can be
used on a network where IP transport is not available).
Domain Controller
In a Windows domain environment, a computer running Active Directory that
manages user access to a network, which includes logging on, authentication, and
access to the directory and shared resources.
Docking Station
A unit for housing a portable computer that contains a power connection,
expansion slots, and connections to peripherals, such as a monitor, printer,
full-sized keyboard, and mouse. The docking station turns the portable computer
into a desktop computer.
DNS suffix
For DNS, a character string that represents a domain name. The DNS suffix shows
where a host is located relative to the DNS root, specifying a host?s location
in the DNS hierarchy. Usually, DNS suffix describes the latter portion of a DNS
name, following one or more of the first labels of a DNS name.
DNS Server
A service that maintains information about a portion of the Domain Name System
(DNS) database and responds to and resolves DNS queries. A computer running this
service is also known as a DNS server.
Distribution Group
A group that is used solely for e-mail distribution and that is not
security-enabled. Distribution groups cannot be listed in discretionary access
control lists (DACLs) used to define permissions on resources and objects.
Distribution groups can be used only with e-mail applications (such as Microsoft
Exchange) to send e-mail to collections of users. If you do not need a group for
security purposes, create a distribution group instead of a security group.
Distinguished Name
A name that uniquely identifies an object by using the relative distinguished
name for the object, plus the names of container objects and domains that
contain the object. The distinguished name identifies the object as well as its
location in a tree. Every object in Active Directory has a distinguished name. A
typical distinguished name might be
CN=MyName,CN=Users,DC=Microsoft,DC=Com
This identifies the MyName user object in the microsoft.com domain.
CN=MyName,CN=Users,DC=Microsoft,DC=Com
This identifies the MyName user object in the microsoft.com domain.
Discretionary Access Control List (DACL)
The part of an object's security descriptor that grants or denies specific users
and groups permission to access the object. Only the owner of an object can
change permissions granted or denied in a DACL; thus, access to the object is at
the owner's discretion.
DirectX
An extension of the Microsoft Windows operating system. DirectX technology helps
games and other programs use the advanced multimedia capabilites of your
hardware.
Directory Service
Both the directory information source and the service that make the information
available and usable. A directory service enables the user to find an object
given any one of its attributes.
Directory Partition
A contiguous subtree of the directory that forms a unit of replication. A
given replica is always a replica of some directory partition. The directory
always has at least three directory partitions:
- The schema, which defines the object classes and attributes contained in Active Directory.
- The configuration, which identifies the domain controllers, replication topology and other related information about the domain controllers within a specific implementation of Active Directory.
- One or more domains that contain the actual directory object data.
Direct Memory Access (DMA)
Memory access that does not involve the microprocessor. DMA is frequently used
for data transfer directly between memory and a peripheral device such as a disk
drive.
Direct Cable Connection
A link between the I/O ports of two computers created with a single cable rather than a modem or other interfacing devices. In most cases, a direct cable connection is made with a null modem cable.
Digital Video Disc (DVD)
A type of optical disc storage technology. A digital video disc (DVD) looks like a CD-ROM disc, but it can store greater amounts of data. DVDs are often used to store full-length movies and other multimedia content that requires large amounts of storage space.
Digital Subscriber Line (DSL)
A type of high-speed Internet connection using standard telephone wires. This is also referred to as a broadband connection.
Digital Signature Standard (DSS)
A standard that uses the Digital Signature Algorithm (DSA) for its signature algorithm and SHA-1 as its message hash algorithm. DSA is a public-key cipher that is used only to generate digital signatures and cannot be used for data encryption.
Digital Signature
A means for originators of a message, file, or other digitally encoded information to bind their identity to the information. The process of digitally signing information entails transforming the information, as well as some secret information held by the sender, into a tag called a signature. Digital signatures are used in public key environments, and they provide nonrepudiation and integrity services.
Differential Data
Saved copies of changed data that can be applied to an original volume to generate a volume shadow copy.
Differential Backup
A backup that copies files created or changed since the last normal or incremental backup. It does not mark files as having been backed up (in other words, the archive attribute is not cleared). If you are performing a combination of normal and differential backups, restoring files and folders requires that you have the last normal as well as the last differential backup.
Dictionary Attack
A method of guessing a user's password or PIN by trying every word in the dictionary until successful.
Dialog Box
A secondary window that contains buttons and various kinds of options through which you can carry out a particular command or task.
Dial-up connection
The connection to your network if you are using a device that uses the telephone network. This includes modems with a standard phone line, ISDN cards with high-speed ISDN lines, or X.25 networks.
If you are a typical user, you may have one or two dial-up connections, for example, to the Internet and to your corporate network. In a more complex server situation, multiple network modem connections might be used to implement advanced routing.
If you are a typical user, you may have one or two dial-up connections, for example, to the Internet and to your corporate network. In a more complex server situation, multiple network modem connections might be used to implement advanced routing.
DHCP/BOOTP Relay Agent
The agent program or component responsible for relaying DHCP and BOOTP broadcast messages between a DHCP server and a client across an IP router. A DHCP relay agent supports DHCP/BOOTP message relay as defined in RFCs 1541 and 2131. The DHCP Relay Agent service is managed using the Routing and Remote Access service.
DHCP client
Any network-enabled device that supports the ability to communicate with a DHCP server for the purpose of obtaining dynamic leased IP configuration and related optional parameters information.
DFS topology
The overall logical hierarchy of the Distributed File System (DFS), including
elements such as roots, links, shared folders, and replica sets, as depicted in
the DFS administrative console. This is not to be confused with the DFS
namespace, which is the logical view of shared resources seen by users.
DFS root
The starting point of the Distributed File System (DFS) namespace. The root is
often used to refer to the namespace as a whole. A root maps to one or more root
targets, each of which corresponds to a shared folder on a server.
DFS link
An element in the Distributed File System (DFS) namespace that lies below the
root and maps to one or more targets, each of which corresponds to a shared
folder or another DFS root.
Device Manager
An administrative tool that you can use to manage the devices on your computer.
Using Device Manager, you can view and change device properties, update device
drivers, configure device settings, and uninstall devices.
Device Fonts
Fonts that reside in your printer. They can be built into the printer itself or
provided by a font cartridge or font card.
Device Driver
A program that allows a specific device, such as a modem, network adapter, or
printer, to communicate with the operating system. Although a device might be
installed on your system, Windows cannot use the device until you have installed
and configured the appropriate driver.
If a device is listed in the Hardware Compatibility List (HCL), a driver is usually included with Windows. Device drivers load automatically (for all enabled devices) when a computer is started, and thereafter run invisibly.
If a device is listed in the Hardware Compatibility List (HCL), a driver is usually included with Windows. Device drivers load automatically (for all enabled devices) when a computer is started, and thereafter run invisibly.
Device Conflict
A conflict that occurs when the same system resources have been allocated to two
or more devices. System resources include interrupt request (IRQ) lines, direct
memory access (DMA) channels, input/output (I/O) ports, and memory addresses.
What is Device?
Any piece of equipment that can be attached to a network or computer; for
example, a computer, printer, joystick, adapter, or modem card, or any other
peripheral equipment. Devices normally require a device driver to function with
Windows.
Details Pane
The pane in the Microsoft Management Console (MMC) that displays the details for
the selected item in the console tree. The details can be a list of items or
they can be administrative properties, services, and events that are acted on by
a snap-in.
Destination Document
The document into which a package or a linked or embedded object is being
inserted. For an embedded object, this is sometimes also called the container
document.
Desktop Pattern
A design that appears across your desktop. You can create your own pattern or
select a pattern provided by Windows.
Descendent Key
All the subkeys that appear when a key in the registry is expanded. A descendent
key is the same as a subkey.
Dependent Client
For Message Queuing, a computer that requires synchronous access to a Message
Queuing server to perform all standard message queuing operations, such as
sending and receiving messages and creating queues.
Dependency
A relationship of reliance between two resources that makes it necessary for
them to run in the same group on the same node. For example, an application is
dependent on the disks that contain its data resources.
Denial-of-service attack
An attack in which an attacker exploits a weakness or a design limitation of
a network service to overload or halt the service, so that the service is not
available for use. This type of attack is typically launched to prevent other
users from using a network service such as a Web server or a file server.
Delegation
The ability to assign responsibility for management and administration of a
portion of the namespace to another user, group, or organization.
For DNS, a name service record in the parent zone that lists the name server authoritative for the delegated zone.
For DNS, a name service record in the parent zone that lists the name server authoritative for the delegated zone.
Defragmentation
The process of rewriting parts of a file to contiguous sectors on a hard disk to
increase the speed of access and retrieval. When files are updated, the computer
tends to save these updates on the largest continuous space on the hard disk,
which is often on a different sector than the other parts of the file. When
files are thus fragmented, the computer must search the hard disk each time the
file is opened to find all of the file's parts, which slows down response time.
Default Host
The host with the highest host priority for which a drainstop command is
not in progress. After convergence, the default host handles all of the network
traffic for TCP and UDP ports that are not otherwise covered by port rules.
What is Default Gateway?
A configuration item for the TCP/IP protocol that is the IP address of a
directly reachable IP router. Configuring a default gateway creates a default
route in the IP routing table.
Default Button
In some dialog boxes, the command button that is selected or highlighted when
the dialog box is initially displayed. The default button has a bold border,
indicating that it will be chosen automatically if you press ENTER. You can
override a default button by clicking Cancel or another command button.
Dedicated Adapter
The network adapter that, when using multiple network adapters in each host of a
Network Load Balancing cluster, handles network traffic not related to cluster
operations (the traffic for individual hosts on the network). This adapter is
programmed with the host's dedicated IP address.
What is Debugger?
A program designed to aid in detecting, locating, and correcting errors in
another program by allowing the programmer to step through the program, examine
the data, and monitor conditions such as the values of variables.
Dead-letter queue
For Message Queuing, a queue that stores nontransactional messages that are
undeliverable or expired. These queues store failed messages on the computer on
which the message expired. Messages in these queues are written to disk and are
therefore recoverable.
Datagram
One packet, or unit, of information that includes relevant delivery information,
such as the destination address, that is sent through a packet-switching
network.
Data-overrun error
A state in which the sending computer is transmitting characters faster than the
receiving computer can accommodate them. If this problem persists, reduce the
bits-per-second (bps) rate.
Data Terminal Equipment (DTE)
In the RS-232-C hardware standard, any device, such as a remote access server or
client, that has the ability to transmit information in digital form over a
cable or a communications line.
Data Link Control (DLC)
An address that uniquely identifies a node on a network. Every network
adapter has a DLC address or DLC identifier (DLCI). Some network protocols, such
as Ethernet and Token Ring, use DLC addresses exclusively. Other protocols, such
as TCP/IP, use a logical address at the OSI Network layer to identify nodes.
However, all network addresses must eventually be translated to DLC addresses. In TCP/IP networks, this translation is performed by the Address Resolution Protocol (ARP).
However, all network addresses must eventually be translated to DLC addresses. In TCP/IP networks, this translation is performed by the Address Resolution Protocol (ARP).
Data Communications Equipment (DCE)
One of two types of hardware connected by an RS-232-C serial connection, the
other being a Data Terminal Equipment (DTE) device. A DCE is an intermediary
device that often transforms input from a DTE before sending it to a recipient.
A modem, for example, is a DCE that modulates data from a microcomputer (DTE)
and sends it along a telephone connection.
Data Communications Equipment (DCE)
One of two types of hardware connected by an RS-232-C serial connection, the
other being a Data Terminal Equipment (DTE) device. A DCE is an intermediary
device that often transforms input from a DTE before sending it to a recipient.
A modem, for example, is a DCE that modulates data from a microcomputer (DTE)
and sends it along a telephone connection.
Daily Backup
A backup that copies all selected files that have been modified the day the
daily backup is performed. The backed-up files are not marked as having been
backed up (in other words, the archive attribute is not cleared).
D-channel
A separate channel of an ISDN line that is used for ISDN signaling. For ISDN
Basic Rate Interface (BRI), the D-channel is 16 kilobits per second (Kbps). For
ISDN Primary Rate Interface (PRI), the D-channel is 64 Kbps. D-channel is also
called data channel.
D-channel
A separate channel of an ISDN line that is used for ISDN signaling. For ISDN
Basic Rate Interface (BRI), the D-channel is 16 kilobits per second (Kbps). For
ISDN Primary Rate Interface (PRI), the D-channel is 64 Kbps. D-channel is also
called data channel.
D-channel
A separate channel of an ISDN line that is used for ISDN signaling. For ISDN
Basic Rate Interface (BRI), the D-channel is 16 kilobits per second (Kbps). For
ISDN Primary Rate Interface (PRI), the D-channel is 64 Kbps. D-channel is also
called data channel.
D-channel
A separate channel of an ISDN line that is used for ISDN signaling. For ISDN
Basic Rate Interface (BRI), the D-channel is 16 kilobits per second (Kbps). For
ISDN Primary Rate Interface (PRI), the D-channel is 64 Kbps. D-channel is also
called data channel.
Custom File Type
Typically, files with extensions that have been created for special kinds of
files. Custom file types are not tracked by the system registry.
Cryptography
The processes, art, and science of keeping messages and data secure.
Cryptography is used to enable and ensure confidentiality, data integrity,
authentication (entity and data origin), and nonrepudiation.
Cryptographic Service Provider (CSP)
The code that performs authentication, encoding, and encryption services that
Windows-based applications access through the CryptoAPI. A CSP is responsible
for creating keys, destroying them, and using them to perform a variety of
cryptographic operations. Each CSP provides a different implementation of the
CryptoAPI. Some provide stronger cryptographic algorithms, while others contain
hardware components, such as smart cards.
CryptoAPI
An application programming interface (API) that is provided as part of Microsoft
Windows. CryptoAPI provides a set of functions that allow applications to
encrypt or digitally sign data in a flexible manner while providing protection
for the user's sensitive private key data. Actual cryptographic operations are
performed by independent modules known as cryptographic service providers
(CSPs).
Cross-reference object
Objects in which Active Directory stores information about directory partitions
and external directory services. An example of an external directory service is
another LDAP-compliant directory.
CRL distribution point
An optional extension in an X.509v3 certificate that identifies how information
is obtained. Also, a directory entry or other distribution source for
certificate revocation lists.
What are credentials?
A set of information that includes identification and proof of identification
that is used to gain access to local and network resources. Examples of
credentials are user names and passwords, smart cards, and certificates.
CRC errors
Errors caused by the failure of a cyclic redundancy check. A CRC error indicates that one or more characters in the data packet received were found garbled on arrival.
Print a picture
Windows Photo Viewer can make prints of your digital photos.
If you don't have a printer handy, you can use Windows to order prints online.
Show contentHide content To print your own pictures
Remember: print quality depends on several factors, including your choices of paper and ink, printer settings, and the quality of the original photo.
Double-click a picture to launch Windows Photo Viewer.
On the toolbar, click the Print button, and then click Print.
In the Print Pictures dialog box, select the printer, paper size, print quality, print style, and number of copies.
Picture of the Print Pictures dialog box Print Pictures dialog box in Windows Photo Viewer
When you're done, click Print.
Notes
To launch the Print Pictures dialog box directly, right-click a photo and then click Print.
Some printers allow you to print a mirror image of a picture (sometimes called "reverse landscape" or "reverse portrait"). If this option is selected, the preview image in the Print Pictures dialog box won't change. However, the picture will print as a mirror image.
Show contentHide content To order prints online
With Windows Photo Viewer, it's easy to order prints from an online service.
Double-click a picture to launch Windows Photo Viewer.
On the toolbar, click Print, and then click Order prints.
On the Select a printing company page, click the printing company that you want to use, and then click Send Pictures.
Follow the instructions to complete your order. The printing company will typically ask you to select the size, style, and number of prints you'd like.
Notes
Your computer must be connected to the Internet to use this feature.
The list of available printing companies might vary depending on your location.
If you don't have a printer handy, you can use Windows to order prints online.
Show contentHide content To print your own pictures
Remember: print quality depends on several factors, including your choices of paper and ink, printer settings, and the quality of the original photo.
Double-click a picture to launch Windows Photo Viewer.
On the toolbar, click the Print button, and then click Print.
In the Print Pictures dialog box, select the printer, paper size, print quality, print style, and number of copies.
Picture of the Print Pictures dialog box Print Pictures dialog box in Windows Photo Viewer
When you're done, click Print.
Notes
To launch the Print Pictures dialog box directly, right-click a photo and then click Print.
Some printers allow you to print a mirror image of a picture (sometimes called "reverse landscape" or "reverse portrait"). If this option is selected, the preview image in the Print Pictures dialog box won't change. However, the picture will print as a mirror image.
Show contentHide content To order prints online
With Windows Photo Viewer, it's easy to order prints from an online service.
Double-click a picture to launch Windows Photo Viewer.
On the toolbar, click Print, and then click Order prints.
On the Select a printing company page, click the printing company that you want to use, and then click Send Pictures.
Follow the instructions to complete your order. The printing company will typically ask you to select the size, style, and number of prints you'd like.
Notes
Your computer must be connected to the Internet to use this feature.
The list of available printing companies might vary depending on your location.
Picture printing: frequently asked questions
Here are answers to some common questions about printing in Windows Photo Viewer.
Picture of the Print Pictures dialog box Print Pictures dialog box in Windows Photo Viewer
Show contentHide content How do I change print sizes in Windows Photo Viewer?
Windows Photo Viewer offers a list of templates that correspond to the most common print sizes, including 4 x 6, 8 x 10, and wallet-sized photos.
However, most digital pictures don't fit perfectly in a standard-sized print, so you might end up with blank space around the edges. To avoid this, you should crop your photo to a standard size and then print the cropped version with Windows Photo Viewer. Most image-editing programs—including Windows Paint—have the ability to crop. (See Crop a picture by using Paint.)
Show contentHide content What does the "Fit picture to frame" option do?
Digital pictures often don't match standard print sizes. If you select the Fit picture to frame check box, Windows will enlarge the image enough to make sure it fits the proportions you specified.
Illustration showing how Fit picture to frame affects printed picturesBefore and after using Fit picture to frame
The only drawback to using this option is that part of the picture will extend beyond the frame and won't be printed. You can always use an image-editing program such as Paint to crop the photo yourself. (See Crop a picture by using Paint.)
Show contentHide content What happens if I try to print a single picture on a template with room for several pictures?
To save ink, Windows only prints what you tell it to print. So if you try to print a single 4-x-6-inch picture on a page with room for three pictures, you'll see your photo surrounded by a lot of white space.
Show contentHide content Why do settings such as paper size and print quality change from time to time?
By default, only the combinations of paper size, paper type, and print quality that give you the best results are displayed in the Print Pictures dialog box.
You can turn off this safeguard to see all the options and combinations, even if they might not print well. To do it, click Options on the lower-right corner of the Print Pictures dialog box, and then clear the Only show options that are compatible with my printer check box.
Show contentHide content What's a contact sheet?
To learn about contact sheets and how they're useful, see View and print picture thumbnails.
Show contentHide content How does paper type affect my printing results?
The type of paper that you use to print your pictures is the single most important factor in determining print quality. You might use plain paper or inkjet paper for routine printing, but to make a high-quality print suitable for framing, you should use a premium glossy or matte photo paper.
For best results, be sure to match the paper type option with what you have in the printer.
Prevent children from using specific programs
You can use Parental Controls to determine which specific programs your child can use. For example, if you use a program to keep track of your finances, you can prevent your child from opening it and viewing your financial information.
Click to open Parental Controls. Administrator permission required If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
Click the name of the person you want to prevent from using specific programs.
Under Parental Controls, click On, enforce current settings.
Click Allow and block specific programs.
Click Person's name can only use the programs I allow.
Select the programs that you want to allow. If the program you want doesn't appear in the list, click Browse to locate the program.
Tip
Make sure that you select all of the programs that you want your child to be able to run. Parental Controls will block any program not selected in the list.
Click to open Parental Controls. Administrator permission required If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
Click the name of the person you want to prevent from using specific programs.
Under Parental Controls, click On, enforce current settings.
Click Allow and block specific programs.
Click Person's name can only use the programs I allow.
Select the programs that you want to allow. If the program you want doesn't appear in the list, click Browse to locate the program.
Tip
Make sure that you select all of the programs that you want your child to be able to run. Parental Controls will block any program not selected in the list.
Start a program by using the Run command
Using the Run command is a quick way to open programs, files, folders, and—when you're connected to the Internet—websites. You can also use the search box on the Start menu in place of the Run command.
Click the Start button Picture of the Start button. In the search box, type run, and then, in the list of results, click Run.
Click the Start button Picture of the Start button. In the search box, type run, and then, in the list of results, click Run.
What is program compatibility?
Program compatibility is a mode in Windows that lets you run programs written for earlier versions of Windows. Most programs written for Windows Vista also work in this version of Windows, but some older programs might run poorly or not run at all. If an older program doesn't run correctly, start the Program Compatibility troubleshooter to simulate earlier versions of Windows.
Click to open the Program Compatibility troubleshooter.
Notes
Do not use the Program Compatibility troubleshooter on older antivirus programs, disk utilities, or other system programs, because using outdated programs of this type might cause data loss or create a security risk.
Some compatibility problems might be caused by drivers. If an older driver is causing problems, you'll need to update it manually. For more information, see Update drivers: recommended links.
You can also open the Program Compatibility troubleshooter by right-clicking a program's icon or shortcut and then clicking Troubleshoot compatibility.
Program Compatibility Assistant: frequently asked questions
What is the Program Compatibility Assistant?
Picture of the Program Compatibility AssistantThe Program Compatibility Assistant can detect problems with older programs
The Program Compatibility Assistant detects known compatibility issues in older programs. After you have run an older program in this version of Windows, it notifies you if there is a problem and offers to fix it the next time you run the program. If the compatibility issue is serious, the Program Compatibility Assistant might warn you or block the program from running. If that happens, you'll have the option to check online for possible solutions.
Show contentHide content What changes does it make?
It depends on the problem, but any changes made are related to how Windows runs the program. No changes are made to the program, itself. For example, the Program Compatibility Assistant can resolve conflicts with User Account Control, a security feature in Windows that can help make your computer safer. Or, it can run the program in a mode that simulates earlier versions of Windows. The changes that Program Compatibility Assistant makes are done automatically, so you don't need to make them.
Show contentHide content How do I turn it off or turn it back on?
Adjustments to program compatibility features can be made by using Group Policy. For advanced information on how to use Group Policy, go to the Microsoft website for IT professionals.
Show contentHide content Can I run it manually?
No. The Program Compatibility Assistant runs automatically when it detects an older program that has a compatibility problem. However, you can use the Program Compatibility troubleshooter, a separate but related feature of Windows, on a program or on a setup file if it won't work or install correctly
Picture of the Program Compatibility AssistantThe Program Compatibility Assistant can detect problems with older programs
The Program Compatibility Assistant detects known compatibility issues in older programs. After you have run an older program in this version of Windows, it notifies you if there is a problem and offers to fix it the next time you run the program. If the compatibility issue is serious, the Program Compatibility Assistant might warn you or block the program from running. If that happens, you'll have the option to check online for possible solutions.
Show contentHide content What changes does it make?
It depends on the problem, but any changes made are related to how Windows runs the program. No changes are made to the program, itself. For example, the Program Compatibility Assistant can resolve conflicts with User Account Control, a security feature in Windows that can help make your computer safer. Or, it can run the program in a mode that simulates earlier versions of Windows. The changes that Program Compatibility Assistant makes are done automatically, so you don't need to make them.
Show contentHide content How do I turn it off or turn it back on?
Adjustments to program compatibility features can be made by using Group Policy. For advanced information on how to use Group Policy, go to the Microsoft website for IT professionals.
Show contentHide content Can I run it manually?
No. The Program Compatibility Assistant runs automatically when it detects an older program that has a compatibility problem. However, you can use the Program Compatibility troubleshooter, a separate but related feature of Windows, on a program or on a setup file if it won't work or install correctly
What is Set Program Access and Computer Defaults?
You must be logged on as an administrator to perform these steps.
Set Program Access and Computer Defaults makes it easy for you to change the default program used for certain activities, such as web browsing, sending e‑mail, playing audio and video files, and using instant messaging.
You can also specify which of these default programs are displayed on the Start menu, on the desktop, and in other locations.
Set Program Access and Computer Defaults: frequently asked questions
Here are some answers to common questions about Set Program Access and Computer Defaults.
Show contentHide content Do I need to be logged in as an administrator to make changes?
Yes, to change these settings, you must be logged on to your computer as an administrator.
Show contentHide content Can I specify different default programs for different users?
Yes, but you can't use Set Program Access and Computer Defaults. To specify different default programs for different users, see Change which programs Windows uses by default. The default programs selected in Set Program Access and Computer Defaults apply to everyone who uses your computer.
Show contentHide content Can I set my preferred non-Microsoft programs as defaults in Set Program Access and Computer Defaults?
It depends. To appear in Set Program Access and Computer Defaults, programs must be registered in the Windows registry. Typically, programs register themselves during installation.
If your program doesn't appear in the list, it hasn't been registered and can't be set as the default program using Set Program Access and Computer Defaults. For assistance, contact the manufacturer of the program.
Show contentHide content Can I remove a non-Microsoft program from the Start menu?
Most of the time, you can, but software manufacturers determine how their products work with Set Program Access and Computer Defaults. Some non-Microsoft programs might continue to show icons on the Start menu and elsewhere even if you clear the Enable access to this program check box.
Show contentHide content Can I change the Custom option so it isn't selected every time I open Set Program Access and Computer Defaults?
No. By default, the feature opens with Custom selected.
What is a runtime error?
A runtime error is a software or hardware problem that prevents a program from working correctly. Runtime errors might cause you to lose information in the file you're working on, cause errors in the file (corrupt the file) so you can't work with it, or prevent you from using a feature. Unlike stop errors, runtime errors don't typically cause Windows or a program to stop working.
Runtime errors can occur if you are running two software programs that aren't compatible, if your computer has memory problems, or if the computer has been infected with malicious software. If a runtime error keeps occurring, follow these steps:
Install the latest updates for Windows and for the program displaying the error. Note that the update for the program might be listed as an optional update on the Windows Update page.
Click to open Windows Update.
For more information about Windows Update, see Install Windows updates.
Check Action Center for a solution to the program displaying the error.
When you have Windows Error Reporting turned on and a program stops working, a problem report is typically sent to Microsoft for more analysis. If a solution is available, or there are steps you can take to minimize the likelihood of the problem recurring, they'll be available in Action Center.
Click to open Action Center.
Update and run your antivirus software. Windows doesn't come with antivirus software, but Action Center can often monitor the antivirus software that you or your computer manufacturer have installed.
Click to open Action Center.
Make sure your computer has at least the minimum amount of random access memory (RAM) required to run the program that is displaying the error. Look for the program requirements online or in the packaging information
What is svchost.exe?
Svchost.exe is a process on your computer that hosts, or contains, other individual services that Windows uses to perform various functions. For example, Windows Defender uses a service that is hosted by a svchost.exe process.
There can be multiple instances of svchost.exe running on your computer, with each instance containing different services. One instance of svchost.exe might host a single service for a program, and another instance might host several services related to Windows. You can use Task Manager to view which services are running under each instance of svchost.exe.
To view which services are currently running under svchost.exe
- Click the Processes tab.
- Click Show processes from all users. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
- Right-click an instance of svchost.exe, and then click Go to Service(s). The services associated with the process are highlighted on the Services tab.
Note
- If you install a program and begin receiving notices that Data Execution Prevention (DEP), a security feature of Windows, is closing svchost.exe or other Windows processes, the cause could be services or extensions created by the program. Check with the publisher of the program to see if there is an updated, DEP-compatible version available, or try uninstalling the program.
What is Data Execution Prevention?
Data Execution Prevention (DEP) is a security feature that can
help prevent damage to your computer from viruses and other security threats.
Harmful programs can try to attack Windows by
attempting to run (also known as execute) code from
your computer's memory reserved for Windows
and other authorized programs. These types of attacks can harm your programs and
files.
DEP can help protect your computer by monitoring your programs to
make sure that they use computer memory safely. If DEP notices a program on your
computer using memory incorrectly, it closes the program and notifies you.
Data Execution Prevention: frequently asked questions
Here are answers to some common questions about Data Execution Prevention (DEP).
Show contentHide content What is DEP?
DEP is a security feature that can help prevent damage to your computer from viruses and other security threats. DEP monitors programs to make sure they use system memory, safely. If a program tries running (also known as executing) code from memory in an incorrect way, DEP closes the program. DEP automatically monitors essential Windows programs and services, but you can increase your protection by having DEP monitor all programs. For more information, see Change Data Execution Prevention settings.
Show contentHide content Is it safe to run a program again if DEP has closed it?
Yes, but only if you leave DEP turned on for that program so that Windows can continue to detect attempts to run code from protected memory locations and help prevent attacks.
Show contentHide content If DEP keeps closing the same program, is my computer under attack?
If you are using the recommended security settings and your antivirus software did not detect a threat, your computer is probably not under attack. In this case, the program might not run correctly when DEP is turned on. Check for a DEP-compatible version of the program or an update from the software publisher before you change any DEP settings.
Show contentHide content How can I prevent DEP from closing a program I trust?
First, see if a DEP-compatible version of the program is available by visiting the software publisher's website. If the publisher has not released an updated, DEP-compatible version of the program, you can turn off DEP for the program that was closed. You will be able to use the program, but it might be vulnerable to an attack that could spread to your other programs and files.
To turn off DEP for a program, see Change Data Execution Prevention settings. If you choose to turn off DEP for a program, it is a good idea to check frequently for an updated version of the program and, after you update it, to turn on DEP again.
Show contentHide content What should I do if DEP is closing a program that’s part of Windows, such as svchost.exe or explorer.exe?
The svchost.exe and explorer.exe programs are parts of the Windows operating system. If DEP closes them or other Windows services, the cause could be smaller programs, such as extensions, that are created by other software publishers and that operate inside Windows. If you have recently installed a program and notice DEP closing Windows programs, check with the software publisher to see if there is an updated, DEP-compatible version available, or try uninstalling the program.
Show contentHide content If my DEP settings indicate that my computer’s processor does not support hardware-based DEP, am I still protected?
Yes. DEP is a software-based feature of Windows. Some computer processors also provide hardware-based DEP under various names. These processors use hardware technology to prevent programs from running code in protected memory locations. If your processor does not support hardware-based DEP, Windows will use software-based DEP to help protect your computer.
Change Data Execution Prevention settings
Data Execution Prevention (DEP) is a security feature that helps prevent damage from viruses and other security threats by monitoring your programs to make sure they use the computer's memory safely. For more information, see What is Data Execution Prevention?
If you want to turn off DEP for a program you trust, first check to see if the software publisher has made a DEP-compatible version of the program or made an update available before you change any DEP settings. If an update or DEP-compatible version is available, we recommend installing it and leaving DEP turned on so you can benefit from the protection it can provide. But if the publisher has not released an updated, DEP-compatible version of the program, you can turn off DEP for the program. You'll be able to use the program, but it might be vulnerable to an attack that could spread to your other programs and files.
Click to open System.
Click Advanced system settings. Administrator permission required If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
Under Performance, click Settings.
Click the Data Execution Prevention tab, and then click Turn on DEP for all programs and services except those I select.
To turn off DEP for an individual program, select the check box next to the program that you want to turn off DEP for, and then click OK.
If the program is not in the list, click Add. Browse to the Program Files folder, find the executable file for the program (it will have an .exe file name extension), and then click Open.
Click OK, click OK in the System Properties dialog box if it appears, and then click OK again. You might need to restart your computer for the changes to take effect.
Note
To turn on DEP for a program, clear the check box next to the program that you want to turn on DEP for, and then click OK.
If you want to turn off DEP for a program you trust, first check to see if the software publisher has made a DEP-compatible version of the program or made an update available before you change any DEP settings. If an update or DEP-compatible version is available, we recommend installing it and leaving DEP turned on so you can benefit from the protection it can provide. But if the publisher has not released an updated, DEP-compatible version of the program, you can turn off DEP for the program. You'll be able to use the program, but it might be vulnerable to an attack that could spread to your other programs and files.
Click to open System.
Click Advanced system settings. Administrator permission required If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
Under Performance, click Settings.
Click the Data Execution Prevention tab, and then click Turn on DEP for all programs and services except those I select.
To turn off DEP for an individual program, select the check box next to the program that you want to turn off DEP for, and then click OK.
If the program is not in the list, click Add. Browse to the Program Files folder, find the executable file for the program (it will have an .exe file name extension), and then click Open.
Click OK, click OK in the System Properties dialog box if it appears, and then click OK again. You might need to restart your computer for the changes to take effect.
Note
To turn on DEP for a program, clear the check box next to the program that you want to turn on DEP for, and then click OK.
Purble Pairs Game
In this game, your goal is to find all the matching pairs of
pictures before time runs out. Flip a tile over to reveal a picture, then find
its match. Use a "sneak peek" token for a quick glimpse of all the tiles on the
board!
-
Number of players: 1
-
Difficulty levels: Beginner, intermediate, advanced
-
Typical playing time: 1 to 10 minutes
Purble Shop Game
This game tests your powers of deduction. Your goal: to make your
Purble's face match the mystery Purble behind the curtain. Choose hair, eyes,
nose, and lips from the shelves, then learn how many—but not which—features you
got right!
-
Number of players: 1
-
Difficulty levels: Beginner, intermediate, advanced
-
Typical playing time: 1 to 5 minutes
Purble Place Game
Purble Place is actually three games in one: Comfy Cakes, Purble
Shop, and Purble Pairs. Designed to teach children memory, pattern recognition,
and reasoning skills, at higher difficulty levels the games challenge players of
all ages.
Comfy Cakes
This game puts you in Chef Purble's bakery, where you must
complete an order for a batch of cakes. The bakery's customers are very
particular, so you'll need to make the cakes exactly as ordered, with the right
combination of shapes, batters, fillings, icings, and decorations.
Work fast because the cakes will keep on coming!
-
Number of players: 1
-
Difficulty levels: Beginner, intermediate, advanced
-
Typical playing time: 1 to 5 minutes
Spider Solitaire
Spider Solitaire is a variant of solitaire that uses two decks'
worth of cards. The object: remove all the cards from the table in the fewest
number of moves. Remove cards by making a complete stack in descending order
(king to ace).
-
Number of players: 1
-
Difficulty levels: Beginner, intermediate, advanced
-
Typical playing time: 1 to 15 minutes
Solitaire
Solitaire is based on the most popular variant of solitaire,
Klondike. To win, you must build four stacks of cards, one for each suit, in
ascending order from ace to king.
-
Number of players: 1
-
Difficulty levels: One level
-
Typical playing time: 1 to 15 minutes
Hearts
Hearts is a card game that you play in rounds against three
computer opponents. Avoid taking the undesirable cards—all hearts and the queen
of spades—unless you're planning to shoot the moon! The player with the lowest
score wins.
-
Number of players: 1 (against 3 computer opponents)
-
Difficulty levels: One level
-
Typical playing time: 10 to 20 minutes
FreeCell
FreeCell is a form of solitaire played with a single deck. The key
to victory lies in the four free cells in the corner of the table—hence the
name!
-
Number of players: 1
-
Difficulty levels: One level
-
Typical playing time: 10 to 20 minutes
Mahjong Titans
Mahjong Titans is a solitaire game played with tiles. Remove
matching pairs of tiles from the board. Remove them all and you win!
Mahjong Titans is only available on premium
editions of Windows 7.
-
Number of players: 1
-
Difficulty levels: Varies by tile layout
-
Typical playing time: 10 to 30 minutes
Minesweeper
Minesweeper is a deceptively simple test of memory and
reasoning—and one of the most popular Windows
games of all time. The goal: uncover empty squares and avoid hidden mines. Click
one, and you lose!
-
Number of players: 1
-
Difficulty levels: Beginner, intermediate, advanced
-
Typical playing time: 1 to 10 minutes
Chess Titans
Chess Titans brings the classic strategy game of chess to life
with three-dimensional graphics and animation. Highlighted squares show where
your pieces can move. Choose a porcelain, marble, or wooden board, and rotate it
any way you like.
Chess Titans is only available in premium
editions of Windows 7.
-
Number of players: 1 or 2
-
Difficulty levels: 1 (beginner) to 10 (expert)
-
Typical playing time: 10 to 60 minutes
Internet Spades
Spades is a popular, fast-paced card game that demands teamwork
and strategy. You guess how many "tricks"—rounds—you and your partner will win.
Guess too low, and you’ll lose big points. Guess too high, and you'll “bag out”!
-
Number of players: 4
-
Difficulty levels: Beginner, intermediate, expert
-
Typical playing time: 10 to 30 minutes
Internet Checkers
One of the oldest and most popular games in the world is back and
better than ever. The perfect way to spend a lazy afternoon.
-
Number of players: 2
-
Difficulty levels: Beginner, intermediate, expert
-
Typical playing time: 10 to 20 minutes
Internet Backgammon
Backgammon is a two-person board game with a straightforward goal: be the first to move all your pieces around and off the board.
Number of players: 2
Difficulty levels: Beginner, intermediate, expert
Typical playing time: 10 to 30 minutes
Number of players: 2
Difficulty levels: Beginner, intermediate, expert
Typical playing time: 10 to 30 minutes
Install a game in the Games folder
The Games folder is more than just the central repository for all games on your computer. It also offers game updates, statistics, rating information, RSS feeds, and more.
Click to open Games.
A game should appear in the folder automatically when you install it. If not, here's how to make it appear.
Show contentHide content To add a game to the Games folder
Drag the game's executable file to the Games folder.
You can find the game's executable file in the folder where you installed the game.
If you don't see Minesweeper, Solitaire, or any of the other games that are included with Windows 7, here's how to make them available.
Show contentHide content To turn on Windows games
Click the Start button Picture of the Start button, click Control Panel, click Programs, click Programs and Features, and then click Turn Windows features on or off. Administrator permission required If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
Select the Games check box, and then click OK.
Click to open Games.
A game should appear in the folder automatically when you install it. If not, here's how to make it appear.
Show contentHide content To add a game to the Games folder
Drag the game's executable file to the Games folder.
You can find the game's executable file in the folder where you installed the game.
If you don't see Minesweeper, Solitaire, or any of the other games that are included with Windows 7, here's how to make them available.
Show contentHide content To turn on Windows games
Click the Start button Picture of the Start button, click Control Panel, click Programs, click Programs and Features, and then click Turn Windows features on or off. Administrator permission required If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
Select the Games check box, and then click OK.
Which version of DirectX is on your computer?
DirectX is a suite of multimedia technologies required by many Windows games. If your computer doesn't have the right version of DirectX installed (the product box should tell you which one you need), your game might not work properly.
To check which version of Direct X is on your computer
Click to open DirectX Diagnostic Tool.
Click the System tab, and then, under System Information, check the DirectX version number.
To download the latest version of DirectX, visit the Microsoft Download Center website.
To check which version of Direct X is on your computer
Click to open DirectX Diagnostic Tool.
Click the System tab, and then, under System Information, check the DirectX version number.
To download the latest version of DirectX, visit the Microsoft Download Center website.
Diagnosing basic problems with DirectX
If you're having problems getting a game or movie to play properly, the DirectX Diagnostic Tool can help you pinpoint the source. DirectX is a suite of technologies used by many of the multimedia programs in Windows.
Click to start the DirectX Diagnostic Tool.
What to look for
Once the Diagnostic Tool has finished, here are three key things to check:
Check your video card
Some programs run very slowly—or not at all—unless Microsoft DirectDraw or Direct3D hardware acceleration is turned on.
To determine this, click the Display tab, and then under DirectX Features, check to see whether DirectDraw, Direct3D, and AGP Texture Acceleration appear as Enabled. If not, try turning on hardware acceleration.
Click to open Screen Resolution.
Click Advanced settings.
Click the Troubleshoot tab, and then click Change settings. Administrator permission required If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
Move the Hardware Acceleration slider to Full.
If that fails, you might need to update the video driver or the card, itself. You can typically find the latest drivers for your hardware in the support section of the manufacturer's website.
Check your game controller
If a joystick or other input device fails to respond, it might not be installed correctly.
Make sure the device shows up on the Input tab. If not, reinstall the device according to the manufacturer's instructions. If it's a USB device, unplug it and then plug it back in.
Check for "unsigned" drivers
A driver that's been digitally signed has been tested by the Microsoft Windows Hardware Quality Lab for DirectX compatibility.
If the Diagnostic Tool flags an unsigned driver, updating the driver might solve your problem. You can typically find the latest driver for your hardware on the support section of the manufacturer's website.
Click to start the DirectX Diagnostic Tool.
What to look for
Once the Diagnostic Tool has finished, here are three key things to check:
Check your video card
Some programs run very slowly—or not at all—unless Microsoft DirectDraw or Direct3D hardware acceleration is turned on.
To determine this, click the Display tab, and then under DirectX Features, check to see whether DirectDraw, Direct3D, and AGP Texture Acceleration appear as Enabled. If not, try turning on hardware acceleration.
Click to open Screen Resolution.
Click Advanced settings.
Click the Troubleshoot tab, and then click Change settings. Administrator permission required If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
Move the Hardware Acceleration slider to Full.
If that fails, you might need to update the video driver or the card, itself. You can typically find the latest drivers for your hardware in the support section of the manufacturer's website.
Check your game controller
If a joystick or other input device fails to respond, it might not be installed correctly.
Make sure the device shows up on the Input tab. If not, reinstall the device according to the manufacturer's instructions. If it's a USB device, unplug it and then plug it back in.
Check for "unsigned" drivers
A driver that's been digitally signed has been tested by the Microsoft Windows Hardware Quality Lab for DirectX compatibility.
If the Diagnostic Tool flags an unsigned driver, updating the driver might solve your problem. You can typically find the latest driver for your hardware on the support section of the manufacturer's website.
How do I watch or record TV on my computer?
To watch or record TV on your computer, you need three things:
-
A TV tunerThere are many types of TV tuners, from internal expansion cards, known as TV tuner cards, to external TV tuners that connect to your computer through a USB port or IEEE 1394 port.Some computers come with TV tuners. If your computer doesn't have a TV tuner, you might be able to add one. For more information about TV tuners, see Get help for your TV tuner.
-
A TV signal connected to your computerDepending on your TV tuner capabilities, it might be possible to connect a TV signal to your computer from an over-the-air antenna, a cable TV jack in the wall, or a cable or satellite TV set-top box. The types of TV signals available in your area will vary—contact your local cable or satellite provider for more information.
-
Software for watching and recording live TVThere are several options for software that will enable you to watch and record live TV on your computer, including solutions from Microsoft and other software providers.
Connect your computer to your TV
-
Turn off your computer and position it within easy reach of your TV. Disconnect the monitor, but leave the mouse and keyboard connected.
-
Connect the appropriate video cable from your computer's output to your TV.
-
Turn on your TV and set it to the input that matches the output on your computer. You might need to refer to the user's guide included with your TV for instructions on how to do this.
-
Turn on your computer.You should see Windows displayed on your TV. If the screen looks stretched, or part of the screen seems cut off, you probably need to adjust the screen resolution in Windows. For more information, see Getting the best display on your monitor.If you can't see Windows on your TV, you might need to reconnect the computer to your monitor and adjust the screen resolution before you connect to your TV.
After you have the right cable, follow these steps to connect your
computer to your TV:
Record audio with Sound Recorder
Sound Recorder lets you record a sound and save it as an audio
file on your computer. You can record sound from different audio devices, such
as a microphone that's plugged into the sound
card on your computer. The types of audio input sources you can record from
depend on the audio devices you have and the input sources on your sound
card.
-
Make sure you have an audio input device, such as a microphone, connected to your computer.
-
Click to open Sound Recorder.
-
Click Start Recording.
-
To stop recording audio, click Stop Recording.
-
(Optional) If you want to continue recording audio, click Cancel in the Save As dialog box, and then click Resume Recording. Continue to record sound, and then click Stop Recording.
-
Click the File name box, type a file name for the recorded sound, and then click Save to save the recorded sound as an audio file.
Note
-
To use Sound Recorder, you must have a sound card and speakers installed on your computer. If you want to record sound, you also need a microphone (or other audio input device).
Should I allow a webpage to access my Windows Media Player library?
By default, Windows Media Player
doesn't allow webpages to access information in your digital media files or in
your library. However, any software that you install on your computer, such as
programs or plug-ins, has full access to your library.
Webpages might request permission to access your library. For
example, webpages might access the information in your digital media files and
library to offer you similar content, advertise sales, or recommend music or
video services, such as subscriptions.
Before the Player shares information from your files and library,
a message is displayed that notifies you that the webpage is seeking read or
full access to your files and library. If you grant the webpage read access, the
webpage can scan the contents of your files and library. If you grant the
webpage full access, the webpage can scan and change media
information in your files and library. Full access can include adding,
removing, and changing media information such as a track name in your library
and in your digital media files.
If you grant a webpage read or full access to your library, you
grant access for only that single instance. In other words, when you open the
webpage again, you will be prompted to grant access again.
The Player might also prompt you when skins and programs try to
access your library, but usually when a skin or program tries to access your
library, it's because the skin or program is changing to a lower access level.
For example, the Player might prompt you when a skin switches from full to read
access.
Subscribe to:
Posts (Atom)