DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> Digitally your's - Hardware,Software & Internet Info Guide by M.K.Ravi
 

Digitally your's - Hardware,Software & Internet Info Guide by M.K.Ravi

 
Links
Hardware
Tutor


Digitally4all
Other things
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Duis ligula lorem, consequat eget, tristique nec, auctor quis, purus. Vivamus ut sem. Fusce aliquam nunc vitae purus.
Other things
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Duis ligula lorem, consequat eget, tristique nec, auctor quis, purus. Vivamus ut sem. Fusce aliquam nunc vitae purus.
Other things
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Duis ligula lorem, consequat eget, tristique nec, auctor quis, purus. Vivamus ut sem. Fusce aliquam nunc vitae purus.
Other things
.
//-->
A Glossary of Computer Oriented Abbreviations and Acronyms
Sunday, March 23, 2008

ADVANCED CONFIGURATION AND POWER INTERFACE : An open industry specification that defines power management on a wide range of mobile, desktop, and server computers and peripherals. ACPI is the foundation for the OnNow industry initiative that allows system manufacturers to deliver computers that start at the touch of a keyboard. ACPI design is essential to take full advantage of power management and Plug and Play.

3270 : A class of IBM Systems Network Architecture terminal and related protocol used to communicate with IBM mainframe host systems.

3DES : An encrypting algorithm that processes each data block three times, using a unique key each time. 3DES is much more difficult to break than straight DES. It is the most secure of the DES combinations, and is therefore slower in performance.

5250 : A class of IBM Systems Network Architecture terminal and related protocol used to communicate with AS/400 host systems.

802.1p : A protocol that supports the mapping of Resource Reservation Protocol (RSVP) signals to Layer 2 signals by using 802.1p priority markings to enable the prioritization of traffic across Layer 2 devices, such as switches, on a network segment. IEEE 802 refers to the Layer 2 technology used by LANs including the data-link layer and the media access control layer.
8mm cassette : A tape cartridge format used for data backups, similar to that used for some video cameras except that the tape is rated for data storage. The capacity is 5 GB or more of (optionally compressed) data.

AC-3 : The coding system used by Dolby Digital. A standard for high quality digital audio that is used for the sound portion of video stored in digital format.
Accelerated Graphics Port (AGP) : A type of expansion slot that is solely for video cards. Designed by Intel, AGP is a dedicated bus that provides fast, high-quality video and graphics performance.

Access control entry (ACE) : An entry in an object's discretionary access control list (DACL) that grants permissions to a user or group. An ACE is also an entry in an object's system access control list (SACL) that specifies the security events to be audited for a user or group.
access control list (ACL) : A list of security protections that apply to an entire object, a set of the object's properties, or an individual property of an object. There are two types of access control lists: discretionary and system.

Discretionary access control list (DACL) : The part of an object's security descriptor that grants or denies specific users and groups permission to access the object. Only the owner of an object can change permissions granted or denied in a DACL; thus, access to the object is at the owner's discretion.

System access control list (SACL): The part of an object's security descriptor that specifies which events are to be audited per user or group. Examples of auditing events are file access, logon attempts, and system shutdowns.

Access mask : A 32-bit value that specifies the rights that are allowed or denied in an access control entry (ACE) of an access control list (ACL). An access mask is also used to request access rights when an object is opened.

Access token : A data structure that contains the security identifier (SID) for a security principal, SIDs for the groups that the security principal belongs to, and a list of the security principal's privileges (also called user rights) on the local computer.

Active Directory : The directory service that stores information about objects on a network and makes this information available to users and network administrators. Active Directory gives network users access to permitted resources anywhere on the network using a single logon process. It provides network administrators with an intuitive, hierarchical view of the network and a single point of administration for all network objects.

Active partition : A partition from which an x86-based computer starts up. The active partition must be a primary partition on a basic disk. If you use Windows exclusively, the active partition can be the same as the system volume.
Active volume : The volume from which the computer starts up. The active volume must be a simple volume on a dynamic disk. You cannot mark an existing dynamic volume as the active volume, but you can upgrade a basic disk containing the active partition to a dynamic disk. After the disk is upgraded to dynamic, the partition becomes a simple volume that is active.

ActiveX : A set of technologies that allows software components to interact with one another in a networked environment, regardless of the language in which the components were created.

Advanced Power Management (APM): A software interface (designed by Microsoft and Intel) between hardware-specific power management software (such as that located in a system BIOS) and an operating system power management driver.

Advertisement :
In Systems Management Server, a notification sent by the site server to the client access points (CAPs) specifying that a software distribution program is available for clients to use. In Windows 2000 and Windows XP, the Software Installation snap-in generates an application advertisement script and stores this script in the appropriate locations in Active Directory and the Group Policy object.

Allocation unit
: The smallest amount of disk space that can be allocated to hold a file. All file systems used by Windows organize hard disks based on allocation units. The smaller the allocation unit size, the more efficiently a disk stores information. If you do not specify an allocation unit size when formatting the disk, Windows picks default sizes based on the size of the volume. These default sizes are selected to reduce the amount of space that is lost and the amount of fragmentation on the volume. An allocation unit is also called a cluster.

Workgroup:
A simple grouping of computers, intended only to help users find such things as printers and shared folders within that group. Workgroups in Windows do not offer the centralized user accounts and authentication offered by domains.

posted by Ravi @ 9:25 AM 0 comments
Free E-Books
Saturday, March 22, 2008
Tons of Free E-Books.
http://www.parsian.net/set1252/pages/books.htm

http://www.oopweb.com/

Free E-Book and software
ftp://194.44.214.3/pub/e-books
posted by Ravi @ 3:52 AM 0 comments
Google
Thursday, March 13, 2008
64-Bit Computing
With Windows Server 2003, 64-bit computing achieves its full potential. Not only do
computers running 64-bit versions of Windows perform better and run faster than their
32-bit counterparts, they are also more scalable, as they can process more data per clock
cycle, address more memory, and perform numeric calculations faster. Windows Server
2003 supports two different 64-bit architectures:
? The first architecture is based on the Explicitly Parallel Instruction Computing (EPIC)
processor architecture, which is implemented in Intel Itanium (IA-64) processors. This
architecture offers native 64-bit processing, allowing 64-bit applications to achieve
optimal performance.
? The second architecture is based on 64-bit extensions to the x86 instructions set,
which is implemented in AMD Opteron (AMD64) processors and Intel Xeon processors
with 64-bit extension technology. This architecture offers native 32-bit processing
and 64-bit extension processing. 64-bit computing is designed for performing operations
that are memory-intensive and that require extensive numeric calculations. With 64-bit
processing, applications can load large data sets entirely into physical memory
(that is, RAM), which reduces the need to page to disk and increases performance
substantially. The EPIC instruction set enables Itanium based processors to perform
up to 20 operations simultaneously.
x86-based and Itanium-based computers differ in many fundamental ways. x86-based
computers use BIOS and the Master Boot Record (MBR) disk type. Itanium-based computers
use Extensible Firmware Interface (EFI) and the GUID Partition Table (GPT) disk
type. This means there are differences in the way you manage x86-based and Itanium based
computers, particularly when it comes to setup and disk configuration.
posted by Ravi @ 8:26 PM 0 comments
Guys we are coming with tons of information about Digital world ..........please wait.
Sunday, March 9, 2008
posted by Ravi @ 7:20 AM 0 comments
About Me

Name: Ravi
Home: Bangalore, Karnataka, India
About Me:
See my complete profile
Previous Post
Archives
Links
Powered by

BLOGGER

© 2005 Digitally your's - Hardware,Software & Internet Info Guide by M.K.Ravi Blogspot Template