Glossary

A B CD E FG H IJ K LM N OP Q RS T UV W X Y Z 

A

access control list (ACL) Contains entries that identify which groups or users have access to a particular object, including the type and scope of that access.

Acme Setup Setup technology used in previous versions of Microsoft Office. Acme Setup relies on tables of information in text files to copy program files, set registry entries, and perform other tasks necessary for installing Office on a user’s computer.

active document In Microsoft Internet Explorer, a document from any application that supports ActiveX document interfaces. These interfaces allow the document to be activated and edited in Internet Explorer.

Active Server Pages (ASP) Technology that allows Web developers to combine scripts and HTML code to create dynamic Web content and Web-based applications.

add-in Software that extends an application by adding functionality that is not in the main application. For example, the Microsoft Office 2000 MultiLanguage Pack includes several localized Excel add-ins.

ADE file Microsoft Access project (ADP) file with all modules compiled and all editable source code removed.

administrative installation point Network share from which users install Office. Created by running Setup with the /a command-line option; contains all the Office files.

administrator privileges Highest level of permissions that can be granted to an account in Windows NT User Manager. An administrator can set permissions for other users and create groups and accounts within the domain.

Admins group   1. In Office Server Extensions, the group account created by the OSE Configuration Wizard. Used to establish and maintain user permissions for access to Web Discussions. 2. In user-level security for Access databases and MDE files, the default administrators group that can establish and maintain group and user permissions for access to database objects.

ADP file Microsoft Access project file. Provides efficient, native-mode access to a Microsoft SQL Server database through the OLE DB component architecture. Acts as a front-end to the SQL database.

advertise Windows installer method for making an application available to the user without installing it. When the user attempts to use the application, the application is installed and run.****See also**assign, publish.

advertisement In Systems Management Server, a notification to a target group of computers that a program is available to be run.

anonymous access Allows users without Windows NT accounts to connect to the server and use server resources. All Web browsers support anonymous access.

ANSI SQL-92 standard Standard for Structured Query Language approved by the ANSI committee. Includes requirements to support international languages.

assign Windows installer method for advertising an application. When you assign an application, the installer creates shortcuts and Start menu icons, and the application appears to be installed. The application is actually installed the first time the user attempts to use it. See alsoadvertise, publish.

authentication   1. Process used to validate the user account that is attempting to gain access to the network or to a resource within the network. 2. Process used to validate the source of a certificate delivered by a Web site. If the security level enabled on the recipient’s computer cannot authenticate the digital signature of the certificate, the certificate is ignored or the user is prompted.

AutoNavigation view Customizable view for OSE-extended web sites. Resembles the table of contents in a printed book.

A B CD E FG H IJ K LM N OP Q RS T UV W X Y Z 

B

bridgehead server Server that handles directory replication between sites. Automatically updates other servers within a site.

A B CD E FG H IJ K LM N OP Q RS T UV W X Y Z 

C

cascading style sheets Implementation of extended fonts and styles in HTML through the use of an external file usually indicated with a file name extension of .css.

certificate Set of data issued by a certificate authority to completely identify an entity; issued only after that authority has verified the entity's identity.

certificate authority A mutually trusted organization that issues certificates. Before issuing a certificate, the certificate authority requires you to provide identification information. Verisign, Inc. is a recognized certificate authority.

character entity reference A set of HTML characters that are represented by easy-to-remember mnemonic names.

child feature In Office Setup, an Office feature that is contained within another feature in the tree. For example, Help for Word Perfect is a child feature of the Microsoft Word for Windows Help feature.

code page Ordered set of characters in which a numeric index (code point) is associated with each character of a particular writing system. There are separate code pages for different writing systems, such as Western European and Cyrillic. See alsoUnicode.

code point Numeric value in Unicode encoding or in a code page; corresponds to a character. In the Western European code page, 65 is the code point for the letter A; however, in another code page, the code point 65 might correspond to a different character.

complex script Writing system based on characters that are composed of multiple glyphs or whose shape depends on adjacent characters. Thai and Arabic use complex scripts. See alsoglyph.

Component Object Model (COM) Methodology behind the design and development of Automation and ActiveX.

concurrency   1. In multitasking operating systems, allows more than one thread or process to run at the same time. For example, Explorer runs concurrently in Windows when other applications are running in the foreground. 2. In multiuser database systems, such as a shared Access database, describes the availability of data to users sharing the database. Determined by a system of locking that regulates how users work with records in the database.

cross-domain data access Access to a database or Web site from an external domain without security authentication.

customizable alert Error message that can be linked to an external source (such as a Web page). Also known as a customizable error message.

A B CD E FG H IJ K LM N OP Q RS T UV W X Y Z 

D

data access page HTML pages created with the Microsoft Access Data Source component. Data access pages provide interactive database control for published HTML documents.

database engine Application designed to manage and organize a database. Usually incorporates a structured query language (SQL) or other means of manipulating or sorting content to assemble information from raw data elements.

database replication Method of keeping multiple Access databases synchronized. Requires special considerations for database design and connectivity between all instances of the database.

delegate owner User who has permissions to view and modify the schedule of another Schedule+ or Outlook user. A delegate owner can also designate other delegates.

delegation application Application designed or designated to share processing of a task submitted from another computer. For example, an OSE-extended web site can incorporate the use of a remote SQL Server to return information at a user’s request.

Design Master Original copy of an Access database. Usually refers to the master copy when the database has been configured for replication. Changes to data structure and macros can be accomplished only in the Design Master.

digital certificate   File issued by a certificate authority. Can be used to verify the user’s identity for digitally signed or encrypted e-mail. Associates the user’s identity with a public encryption key.

Digital ID   Combination of a digital certificate and a public and private encryption key set.

digital signature Confirms that an e-mail message, macro, or program originated from a trusted source who signed it. Also confirms that the message, macro, or program has not been altered.

distribution point Server location for storing Systems Management Server package files. Clients contact distribution points to obtain programs and files after they have received notification of the availability from an advertisement. See alsoadvertisement.

A B CD E FG H IJ K LM N OP Q RS T UV W X Y Z 

E

elevated privileges In Windows NT 4.0, method for giving an installation program administrator rights to install software into system areas. Can be accomplished by logging on with administrator rights, advertising the program, giving administrator rights to all Windows installer programs, or using Systems Management Server. See alsoadvertise

encryption Method used to scramble the content of a file or data packet to make the data unreadable without the decryption key.

encryption, 40-bit Medium level of encryption. Uses a 40-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key.

encryption, 128-bit High level of encryption. Uses a 128-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key.

executable mode Configuration in which Microsoft Access and Microsoft Excel run to support display of text, macro behavior, and other features specific to a particular Asian or right-to-left language.

Execute mode Windows NT installation mode that installs Office for only the Windows Terminal Client user running Setup. See alsoInstall mode.

explicit permissions   1. Permission assigned to a user to grant or deny access to a specific resource on the network. 2. In Access user-level security, set of permissions granted or denied to a user to access database objects in a shared Access database or MDE file.

A B CD E FG H IJ K LM N OP Q RS T UV W X Y Z 

F

file allocation table (FAT) Common file format of file cataloging for DOS and Windows operating systems; physical method of storing and accessing files from a hard drive. The FAT contains a list of all files on the physical or logical drive.

firewall Security system meant to protect your internal network from unauthorized external access. Used to block users from viewing inappropriate sites on the Internet. Also known as a proxy server.

FrontPage-extended web Web site in which FrontPage Server Extensions have been installed to provide support for forms and other interactive elements.

A B CD E FG H IJ K LM N OP Q RS T UV W X Y Z 

G

glyph Shape of a character as rendered by a font. For example, the italic "a" and the roman "a" are different glyphs representing the same alphabetical character.

A B CD E FG H IJ K LM N OP Q RS T UV W X Y Z 

I

ideographic script Writing system that is based on characters of Chinese origin, where the characters represent words or syllables that are generally used in more than one Asian language.

IExpress Installation technology that compresses a number of files into a self-extracting executable file.

implicit permissions   1. Permission granted to a group of users so that all users have the same permission level for a specific resource on the network. 2. In Access user-level security, the set of permissions granted or denied to a group of users to access database objects in a shared Access database or MDE file.

Input Method Editor (IME) Software utility that converts keystrokes to characters in an ideographic script (Korean, Chinese, Japanese, and so on).

Install mode Windows NT installation mode that installs Office for all Windows Terminal Client users who connect to a Windows Terminal Server computer. See alsoExecute mode.

installation language Locale ID (LCID) assigned to the value entry InstallLanguage in the Windows registry. This entry, which is created by Office Setup, determines default behavior of the installation process.

interactive HTML format Means of displaying and modifying Office documents in Internet Explorer by using most of the functionality of the original Office application.

A B CD E FG H IJ K LM N OP Q RS T UV W X Y Z 

J

job Systems Management Server object that handles distribution of packages to client computers. You configure jobs in the Jobs window in Systems Management Server versions 1.2 and 2.0.

A B CD E FG H IJ K LM N OP Q RS T UV W X Y Z 

L

locale ID (LCID) A 32-bit value defined by Windows that consists of a language ID, sort ID, and reserved bits. Identifies a particular language. For example, the LCID for English is 1033, and the LCID for Japanese is 1041.

A B CD E FG H IJ K LM N OP Q RS T UV W X Y Z 

M

machine group   In Systems Management Server version 1.2, a set of computers with similar configurations and features. Used to stagger the distribution of Office 2000.

MDB file Microsoft Access database file.

MDE file Microsoft Access database file with all modules compiled and all editable source code removed.

metabase Database used exclusively by Internet Information Server (IIS). Composed of metadata in a compressed format. Design is similar to that of the Windows registry.

metadata Data that describes the structure of other data. Created and maintained by Internet Information Server (IIS) and stored in the metabase.

metastore Small database maintained within each FrontPage-extended web. Contains properties and settings of the Web site.

Microsoft Management Console (MMC) In Windows NT version 4.0 and Windows 2000, a utility designed to manage servers and services through a common user interface. MMC snap-ins include FrontPage Server Extensions, Internet Information Server (IIS), and SQL Server.

MSI file Windows installer package used by the Microsoft Office Custom Installation Wizard to run Office Setup from an administrative installation point. See alsopackage.

MST file Windows installer transform that temporarily modifies the behavior of the package (MSI file) to customize Office installation. Created to modify or restrict Office 2000 Setup from an administrative installation point*.* See alsotransform.

multidimensional data source Data structure that contains Online Analytical Processing (OLAP) data. Consists of dimensions that organize the types of data into hierarchies, and data fields that measure the quantities being tracked in the database. Can be used to create dynamic PivotTable and PivotChart reports in Excel and Access.

A B CD E FG H IJ K LM N OP Q RS T UV W X Y Z 

N

NTFS file system (NTFS) Designed exclusively for use with the Windows NT operating system. NTFS allows for stronger security and more flexible file management methods than does FAT. See alsofile allocation table (FAT)

A B CD E FG H IJ K LM N OP Q RS T UV W X Y Z 

O

object model In object-oriented programming languages, the design of an object and the classes required to create and enable an instance of the object by using methods, properties, and events to interact with the object.

Office user profile Collection of user-defined settings for Office 2000 created by using the Profile Wizard. Contains most of the customizations that users make to the Office 2000 environment. See alsoOPS file.

OLE DB provider Data access component that provides access to data for applications and services that support the OLE DB standard. Makes data available in tabular form from both relational and nonrelational data sources. Excel and Access can use OLE DB providers to access data, and the ActiveX Data Objects (ADO) programming model can be used from any Office application to work with data exposed by an OLE DB provider.

Online Analytical Processing (OLAP) Technology that allows users to perform multidimensional analysis on large volumes of data. Supported by Excel 2000. See alsomultidimensional data source.

OPS file Settings file created by the Profile Wizard; a binary file.

OSE-extended web In****Office Server Extensions, allows the Web site you create to use extended features, such as collaboration, advanced navigation, and search.

A B CD E FG H IJ K LM N OP Q RS T UV W X Y Z 

P

package   1. In Windows installer, MSI file used by the Microsoft Office Custom Installation Wizard to run Office Setup from an administrative installation point. 2. In Systems Management Server, defines the files that comprise the software application to be distributed, and includes package configuration and identification information*.*

package definition file (PDF) Used by Systems Management Server to distribute applications to selected clients.

permissions   1. In server management, user rights granted by an administrator for a given project, Web site, file, or folder. The highest level of flexibility and security is available only on an NTFS-formatted disk under Windows NT 4.0 or Windows 2000. 2. In Access 2000 user-level security, user or group rights granted or denied by an administrator to control access to database objects.

personal identifier (PID) In Access 2000, unique identifier used when creating a user-level security user or group account. Personal identifiers are case-sensitive alphanumeric strings that can be 4–20 characters long.

plug-in language features User interface, online Help, and editing tools that users can install with Office 2000 to run Office in their own language, and to create documents in many other languages.

private key One of a pair of keys used for encryption. A message encrypted with the public key must be decrypted with the private key. Part of a Digital ID.

private property In Windows installer, a type of Setup property in the package (MSI file). Private property names are a mix of uppercase and lowercase letters, and can be specified only on the Modify Setup Properties panel of the Custom Installation Wizard.

public key One of a pair of keys used for encryption. A message encrypted with the public key must be decrypted with the private key. Part of a Digital ID.

public property In Windows installer, a type of Setup property in the package (MSI file). Public property names are all uppercase and can be specified in the Setup command line, in the settings file, or on the Modify Setup Properties panel of the Custom Installation Wizard. With few exceptions, all properties used to manage the installation process are public properties.

publish Windows installer method for advertising an application. When you publish an application, the installer does not create shortcuts or Start menu icons, but the application is configured to be installed the first time another application activates it. See alsoadvertise, assign.

A B CD E FG H IJ K LM N OP Q RS T UV W X Y Z 

R

reconciling Process of retrieving and updating a user profile.

replica Copy of an Access database distributed and maintained through replication.

replica set Set of replicated databases. Includes the Design Master and all replicas.

roaming user User who travels or who uses more than one computer on a regular basis. Works at multiple sites using different computers or transports a portable computer that must adapt to different locales.

roaming user profiles Account information established for roaming users within the given domain of a network. Automatically configures the computer when the user logs on. Available only under Windows NT version 4.0 or later.

root web FrontPage-extended web that functions as the top-level content folder of a Web site.

A B CD E FG H IJ K LM N OP Q RS T UV W X Y Z 

S

script   1. In HTML documents, code or applets written in Microsoft Visual Basic Scripting Edition (VBScript) or JScript that manipulate elements on the page, such as responding to user actions or animating graphics. 2. In character sets, a set of characters from a particular writing system, such as Arabic, Cyrillic, Hebrew, or Latin.

security identifier (SID) Computer-generated, nonreadable binary string that uniquely identifies a user or group.

Setup settings file Text file (Setup.ini) in which you enter properties and values to customize the installation process. You can edit the Setup settings file to specify the same properties that you use on the Setup command line. Every command-line option has a corresponding setting in the settings file.

share-level security Provides security for objects or resources within a database by requiring a user to enter a password to gain access to an object or to perform an operation. In Access 2000, the only form of share-level security is a database password, which is required before a user can open the database.

Secure Multipurpose Internet Mail Extensions (S/MIME) Method of security that allows users to exchange encrypted and digitally signed messages with any S/MIME–compliant mail reader. Messages are encrypted or digitally signed by the sending client and decrypted by the recipient.

Systems Management Server Installer Add-on utility that allows you to create installation scripts by comparing preinstallation and postinstallation computer images. Designed for administrators who need to maintain consistent desktop clients.

subweb Microsoft FrontPage-extended web that is contained within the root web or another subweb.

system database Database used to store group and user account names and the passwords used to authenticate users when they log on to an Access database or MDE file secured with user-level security. See alsoworkgroup information file.

system locale In Windows NT 4.0 and Windows 2000, the setting that determines the code page and default user locale. See alsouser locale, code page.

Systems Network Architecture (SNA) Set of seven-layered protocols developed by IBM to connect mainframe computers. Dependent on the fundamental protocol synchronous data link control (SDLC).

A B CD E FG H IJ K LM N OP Q RS T UV W X Y Z 

T

three-tier data access One of two modes of data access used by the Microsoft Office Data Source control to determine whether a data access page is considered safe. With three-tier data access*,* the data access page is considered inherently safe, and**cross-domain data access is allowed. See also two-tier data access.

transform Windows installer MST file that temporarily modifies the behavior of the package (MSI file) to customize Office installation. Created to modify or restrict Office 2000 Setup from an administrative installation point. See also: package.

traveling user Uses more than one computer on a regular basis. Traveling users might have different language requirements or need access to different configurations of the same application (local or remote). See alsoroaming user.

two-tier data access One of two modes of data access used by the Microsoft Office Data Source control to determine whether a data access page is considered safe. With two-tier data access*,* a data access page is considered unsafe. Cross-domain data access is allowed only when the data access page is published from a Web site that is registered as a member of the Trusted sites security*.* See alsothree-tier data access.

A B CD E FG H IJ K LM N OP Q RS T UV W X Y Z 

U

Unicode Universal character set that can accommodate all known scripts. Unlike code pages, Unicode uses a unique two-byte encoding for every character.

user locale Setting that determines formats and sort orders for date, time, currency, and so on. Also known as regional settings.

user-level security Sets security for objects or resources within an Access database or MDE file by establishing a level of access for groups or individual users. User names and passwords are authenticated against a database of user and group account information in an Access workgroup information file or system database.

A B CD E FG H IJ K LM N OP Q RS T UV W X Y Z 

V

virtual directory Acts as a layer of indirection between the addresses that users enter and the physical folder structure of a Web site. The physical mapping identifies where IIS retrieves content when clients request the alias.

virtual key code Hardware-independent number that uniquely identifies a key on the keyboard.

A B CD E FG H IJ K LM N OP Q RS T UV W X Y Z 

W

Web Folders object Container for shortcuts to Web sites. Appears in My Computer, Windows Explorer, and the Open and Save As dialog boxes in Office 2000 applications.

Windows installer shortcut Application shortcut that uses the globally unique identifier (GUID), rather than a fixed path, to point to the application. Used to advertise an application and to support the Installed on First Use installation option in Office 2000 Setup. See alsoadvertise.

workgroup ID In Access, a case-sensitive alphanumeric string 4–20 characters in length. Specified when you create a new workgroup information file. Prevents other users from creating an identical copy of the file.

workgroup information file In Access, synonym for the system database. Used to store group and user account names and the passwords used to authenticate users when they log on to an Access database or MDE file secured with user-level security. See alsouser-level security.

Friday, March 5, 1999