| A | B |
| New Technology | NT |
| telnet | TCP/IP terminal emulation program |
| ping | utility used to test the connection between two computers |
| tracert | Used to troubleshoot connections between routes that a packet will take before reaching its destination address |
| ipconfig | Displays a system’s IP address and additional information |
| client | computer on a domain network environment |
| server | computer used to centralize network resources and serve the clients on the network |
| workstation | a version of Win NT 4.0 |
| kernel | the main part of the OS |
| user | a person who uses computers and resources on the network |
| hardware | computer devices both internal and external |
| network | a group of computers on a domain or workgroup sharing resources |
| workgroup | a group of computers sharing a network connection but not on a domain |
| security | protecting data and access to network/computer/server resources |
| application | a software program installed and running on a computer |
| plug-n-play | automated installation of computer devices |
| registry | the central database which stores all settings and options on a Microsoft Windows computer |
| user profile | environment settings and preferences for the user on a computer |
| user id | the identification a user types in to the computer along with a password in order to gain access to a computer/network |
| domain | A group of networked computer systems that share a common Security Accounts Manager (SAM) database |
| network administrator | a person who manages a network |
| minimum hardware requirements | 486 processor, 12 mb ram, VGA display adapter, 110 MB available disk space, CD-ROM, 3.5 inch floppy drive |
| recommended hardware requirements | Pentium processor, 16 MB RAM, SVGA, 300 MB disk space, CD-ROM, floppy and NIC |
| HCL | Hardware List |
| NTLDR | Used to see that the OS boot process is carried out properly |
| System Policies | Control user environment. Administrator can configure system policies for computers, users, or groups of users |
| drive mapping | Establishing drive mappings in an operating system allows you to connect to other computers, printers and network resources |
| system log | Log:maintains information pertaining to important system events, such as services that have been stopped or started within the operating system |
| security log | Keeps a record of successful and unsuccessful logon attempts to the domain or network |
| application log | keeps track of important information about system-related applications |
| nslookup | Used to query a DNS for a host name to IP address resolution |