Define five of the key terms listed in the Vocabulary Table.
This mode is available for Windows users with limited access. These users do not have access to hardware and can only access their own address space in the Windows environment. Since the User mode operates in Ring 3 of the Intel 386 microprocessor protection model, they should not have access, or alter, programs running in Ring 0 (Kernel mode) on the computer. (Regan, 2006)
Kernel mode: Kernel mode (also referred to as privileged mode) operates on Ring 0 of the Intel 386 microprocessor protection model and has access to all hardware, memory, and has access to the other user’s address space. This mode includes access to the Windows NT family Executive Services, the hardware abstraction layer (HAL), and the Microkernel. (Regan, 2006)
CDFS: CDFS Is the CD-ROM file system. This is a read-only file system used to access a CD-ROM disk. Since this system is read-only, you cannot assign permissions to files on a CD-ROM through CDFS. (Regan, 2006)
Schema: “The schema of the Active Directory contains a formal definition and set of rules for all objects and attributes of those objects” (Regan, 2006, p.385).
Transmission Control Protocol / Internet Protocol (TCP/IP) TCP is the protocol used in networking that provides a connection-oriented, reliable way for applications to communicate large amount of data at one time over a network. IP is a connectionless protocol responsible for addressing network devices, and routing packets between them.
Please join StudyMode to read the full document