Vista system commonly used English professional words to explain Daquan

  

Many friends have suggested that they do not know much about the technical vocabulary of some Vista systems, we have specifically summarized a number of commonly used vocabulary one by one.

1.Access control list (ACL)

The access control list, which stores information about who is, what targets can be accessed, and who is responsible for the implementation.

2.ActiveX

A Microsoft developed technology is a combination of OLE and COM (OLE, object linking and embedding; COM, component object model), allowing web developers to build Interactive web pages and provide the same functionality as Java applets.

3.Ad hoc wireless network

Ad hoc wireless network. An 802.11 wi-fi network that operates from a computer to a computer rather than through a wireless access point (WAP).

4.Admin Approval Mode

Manage Approval Mode. The default setting for Vista when running most programs with standard user rights, even if you are logged in as a system administrator account; if necessary, you will be asked to increase the privilege level.

5.Aero

The new user interface for Windows Vista, not for the Starter Edition and the Home Basic Edition.

6.Aero Glass

The most arguing graphical interface in the Aero interface. It provides 3D animation, transparency, and other visual effects, but requires high system resources and a directx 9 compatible graphics card.

7.Anti-spyware

Anti-spyware. Use pre-defined files and heuristic logic to detect known or potential spyware on your computer and warn users to remove or quarantine related spyware.

8.Avalon

See "Windows Presentation Foundation" (WPF).

9.Bcdedit

A command line tool in Windows Vista Used to create and reconfigure the bootloader, which does not need to use the boot.ini file.

10.BitLocker

A security feature provided in Windows Vista Enterprise and Advanced that encrypts the entire operating system volume using a TPM chip or a USB key disk.

11.Custom Scan

Custom Scan. An option for the protection program to scan only the location you specify.

12.Defender

Protection (can view Windows Defender)

13.Desktop Search

Desktop Search. A feature built into Windows Vista that allows you to search for files based on file name (or partial file name), date, author, and many other attributes, which can be accessed directly from the Start Menu.

14.Desktop Windows Manager (DWM)

Desktop Window Manager. A windowing system in Windows Vista that supports Aero (in addition to the Starter Edition and Home Basic Edition) for handling how to sketch the content on the screen.

15.Encrypting File System (EFS)


Encrypting File System (EFS). A digital authentication-based encryption method built into Windows 2000, XP, 2003, and Vista; it allows users to encrypt only a single file or a single folder to protect the confidentiality of data.

16.Exceptions

Exceptions. Free access to and out of packets that are not blocked by Windows Firewall, programs, services, or ports.

17.File/registry virtualization

File/Registry Virtualization. A new feature that allows a program to virtualize only the parts of the resource that it is trying to modify.

18.Firewall profiles

Firewall configuration file. Different firewall configurations are used in different situations; for example, one profile may be used when connecting to a corporate network, while another is used to connect to a home network, while the third is used for the third network Used when connecting to a wireless hotspot in a public place.

Flip /3D Flip

The new window management feature in Windows Vista allows you to use [Alt][Tab] to scroll through the open windows. If you use 3D flipping, you can flip on a three-dimensional running window stack by using the Windows key plus the TAB key. You can also use the scroll wheel or trackball on the mouse to achieve the flipping effect.

19.Full Scan

Complete inspection. A protection program option that searches the entire computer (including files and folders on all hard drives).

20.Heuristics

Heuristic logic. In the content of the protection program, there is a way to determine whether a program is more like spyware according to the behavior of the program and the key mode before the program is finally confirmed by the relevant definition.

21.ICMP

ICMP, Internet Control Message Protocol for error reporting and debugging. ICMP responds to the request and responds to the reply message used by the popular Ping command.

22. Internet Explorer 7

The seventh edition of Internet Explorer IE. A new web browser in Windows Vista (and now a version for Windows XP) that provides tabbed browsing, new security mechanisms, and many other enhancements.

23. Internet Explorer Protected Mode

IE 7 protected mode. A new operating mode of IE 7 in Windows Vista, using Vista's User Account Control (UAC) to distinguish IE from other software, preventing its plug-ins from being removed from Temporary Internet Files without user permission. Write content anywhere except the folder.

24. Internet Information Services (IIS) 7.0

Internet Information Services (IIS) 7.0. A web server built into Windows Vista can be rewritten using a module structure and the web server's configuration is written into an XML file instead of using metabase.

25.IPSec

Internet Protocol Security, a standard mechanism for providing authentication, integrity, and confidentiality for packets traversing IP networks at the network level .

26. IPv6

The next version of the IP protocol, a network layer component of the TCP/IP suite; it extends the address space by using 128-bit addresses (in contrast) Than, IPv4 uses a 32-bit address) and provides a better security mechanism.

27.Kerberos

An authentication standard that provides a "ticket" by using a central server for identification by other servers that provide resources on the network. It is supported on Windows 2000, XP, Server 2003, Vista, and Longhorn, as well as UNIX systems.

28.Legacy applications

Legacy procedures. Written before Vista, there is no program that uses the UAC specification.

Copyright © Windows knowledge All Rights Reserved