It 240 Appendix F

Topics: X86, Operating system technology, Windows NT Pages: 1 (260 words) Published: June 17, 2011
Vocabulary Table

Define five of the key terms listed in the Vocabulary Table.

User mode:This mode is available for Windows users with limited access. These users do not have access to hardware and can only access their own address space in the Windows environment. Since the User mode operates in Ring 3 of the Intel 386 microprocessor protection model, they should not have access, or alter, programs running in Ring 0 (Kernel mode) on the computer. (Regan, 2006)

Kernel mode: Kernel mode (also referred to as privileged mode) operates on Ring 0 of the Intel 386 microprocessor protection model and has access to all hardware, memory, and has access to the other user’s address space. This mode includes access to the Windows NT family Executive Services, the hardware abstraction layer (HAL), and the Microkernel. (Regan, 2006)

CDFS: CDFS Is the CD-ROM file system. This is a read-only file system used to access a CD-ROM disk. Since this system is read-only, you cannot assign permissions to files on a CD-ROM through CDFS. (Regan, 2006)

Schema: “The schema of the Active Directory contains a formal definition and set of rules for all objects and attributes of those objects” (Regan, 2006, p.385).

TCP/IP:Transmission Control Protocol / Internet Protocol (TCP/IP) TCP is the protocol used in networking that provides a connection-oriented, reliable way for applications to communicate large amount of data at one time over a network. IP is a connectionless protocol responsible for addressing network devices, and routing packets between them.
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • It 240 Appendix F Essay
  • Essay about Appendix D CJS/240
  • Essay about It 240
  • It240 Appendix F Essay
  • Appendix F Essay
  • Appendix f Essay
  • Essay on Appendix E Hca 240
  • HCA 240 Appendix D Essay

Become a StudyMode Member

Sign Up - It's Free