table: (1) A list (2) that is defined in a workbook.
(2) A data region on a report layout that displays data in a columnar format.
(3) A two-dimensional object in a relational database that stores data in rows and columns.
table header: The top row of a table, where the column names are displayed.
Table object: An object that is used to view properties for a collection of objects of a specific type, such as a Message object or a Folder object. A Table object is structured in a row and column format with each row representing an object and each column representing a property of the object.
table style: A set of formatting options, such as font, border formatting, and row banding, that are applied to a table. The regions of a table, such as the header row, header column, and data area, can be variously formatted.
tablix: A data region that contains rows and columns that resembles a table or matrix, possibly sharing characteristics of both.
Tagged Image File Format: See TIFF.
target: An actor to which a task (2) is assigned.
target application: A logical entity that represents a software system for which credentials are maintained. It consists of metadata including the number and type of credentials that are required by the software system and a set of claims (2) that identify the administrators who can update, read, and delete the entity.
target group: A named collection of client computers whose members are defined administratively.
target location: The target location is the destination location of a file that has been compressed by RDC.
task: (1) An act to be executed by all query servers, and any requisite information for those query servers to execute that act correctly.
(2) A component of an action (1) that defines the work that actors need to do within a workflow system. An action can have zero or more tasks that are each assigned to different targets. There is a one-to-one correlation between tasks and targets.
(3) An object (1) that represents an assignment to be completed.
(5) The building block of a package. A task consists of code that executes a function, as specified by the options, settings, and parameters of the task that are specified when the task is called.
task pane app: An app for Office that appears docked in a task pane.
taxonomy navigation: A hierarchy of navigation menus that represents the navigation menus in terms and term sets and are independent of where their underlying objects, such as pages, are located.
taxonomy site map provider: A site map provider that uses taxonomy navigation as its source data for constructing a site map.
TCP/IP: A set of networking protocols that is widely used on the Internet and provides communications across interconnected networks of computers with diverse hardware architectures and various operating systems. It includes standards for how computers communicate and conventions for connecting networks and routing traffic.
telespace: See shared space.
template: A file that contains pre-defined formatting including layout, text and graphics. It serves as the basis for new documents that have a similar look or purpose. See also form template (Microsoft InfoPath) and site template (SharePoint Products and Technologies).
tenant: (1) A protocol client or protocol server that accesses a partition in a shared service database.
(2) A built-in custom field in IPAM that is used to specify the tenant machine.
term: A concept or an idea that is stored and can be used as metadata.
term label: A string that is used as the display value for a term. Each term label is associated with a specific language.
term set: A collection of terms that are arranged into and stored as a hierarchy or a flat list.
term set group: A collection of term sets.
term store: A database in which managed metadata is stored in the form of term sets and terms.
text importation: A process that incorporates textual data into a workbook, either by opening a text file or through an external link.
text ruler: A collection of settings for tabs, margins, and indentation of text. See also ruler.
text run: A string of characters that represents a discrete span of text with the same formatting properties.
theme: A set of unified design elements, such as colors, fonts, graphics, and styles, that define the appearance of a website, document, or data visualization.
thicket: A means of storing a complex HTML document with its related files. It consists of a thicket main file and a hidden thicket folder that contains a thicket manifest and a set of thicket supporting files that, together, store the referenced content of the document.
thicket folder: A hidden folder that contains a thicket manifest and a set of thicket supporting files that, together, store the referenced content of a complex HTML document.
thicket main file: The core file of a complex HTML document. It references contained elements such as graphics, pictures, or other media that are stored as thicket supporting files in a thicket folder. The thicket main file is the target that is used by a protocol client to access the content of the document.
thicket supporting file: A file that contains a graphic element, a picture, or other media that is referenced by the thicket main file and is stored in the thicket folder.
third-party request: A conference control request that modifies the state of participants other than the participant who sent the request.
throttle configuration setting: A set of configuration information that supports algorithms that are implementation-specific and enforce time and space limits when executing operations against a line-of-business (LOB) system. Examples are: limiting the number of concurrent operations against the LOB system, stopping an operation after a specific amount of time, and rejecting operations that read or write more than a specific quantity of data.
thumbnail: A miniature version of an image that is typically used to browse multiple images quickly.
tick mark: A small line of measurement, similar to a division line on a ruler, that intersects an axis in a chart.
ticket: A record generated by the key distribution center (KDC) that helps a client authenticate to a service. It contains the client's identity, a unique cryptographic key for use with this ticket (the session key), a time stamp, and other information, all sealed using the service's secret key. It only serves to authenticate a client when presented along with a valid authenticator.
TIFF: A high-resolution, tag-based image format. Tagged Image File Format (TIFF) is used for the universal interchange of digital images. For more information, see [RFC3302].
time code: A digital signal applied to a stream. The signal assigns a number to every frame of video, representing hours, minutes, seconds, and frames.
time condition: A logical condition that can be evaluated, or an event that can be triggered, to determine whether timed object behavior starts or ends. Conditions include items such as the start or end of time nodes, keyboard presses, mouse clicks, or delegate events. See also time node.
time hierarchy: A specialized Online Analytical Processing (OLAP) hierarchy that can be organized into lower and higher levels of detail, such as Year, Quarter, Month, and Day.
time node: A record or parent node that stores the information that is necessary to cause a time- or action-based effect to occur. Each time node has a corresponding object to which an effect is applied. It can be used randomly, simultaneously, or sequentially, and it can be used to specify certain time-based effects between objects that are being animated. Effects include visual and media behaviors.
time stamp authority: A service acknowledging that a datum existed before a specific time. The service is typically a trusted third party.
time zone: A geographical area that observes the same local time. The local time has a positive, zero, or negative offset from Coordinated Universal Time (UTC). The offset can be different during standard time and daylight saving time.
time zone bias: The positive, zero, or negative offset in minutes from Coordinated Universal Time (UTC). For example, Middle European Time (MET, GMT+01:00) has a time zone bias of "-60" because it is one hour ahead of UTC. Pacific Standard Time (PST, GMT-08:00) has a time zone bias of "+480" because it is eight hours behind UTC.
time zone daylight bias: The positive, zero, or negative offset in minutes that is added to the time zone bias during daylight saving time. For example, daylight saving time advances the clock by one hour. The time zone daylight bias is set to "-60".
time zone daylight date: The date and time when the change from standard time to daylight saving time occurs.
time zone standard bias: A positive, zero, or negative offset in minutes that is added to the time zone bias outside daylight saving time.
time zone standard date: The date and time when the change from daylight saving time to standard time occurs.
timestamp: A condition of a digital signature (2) that indicates whether the signature was created with a valid certificate (1) that has expired or was created with a certificate that had expired already. If the certificate expired after the signature was created, the signature can be trusted. If it expired before the signature was created, it cannot be trusted.
TimeStampFilter: A FilterDescriptor type that is used when querying a line-of-business (LOB) system. Its value can be a timestamp that specifies the earliest update to return, if the LOB system can return data that was updated after a specified time.
title master slide: A slide that defines the formatting and content that can be used by presentation slides that have a title slide layout. If a slide uses formatting and content from a title master slide, it is referred to as following a title master slide.
token: (1) A word in an item or a search query that translates into a meaningful word or number in written text. A token is the smallest textual unit that can be matched in a search query. Examples include "cat", "AB14", or "42".
(2) A set of rights and privileges for a given user.
(3) The byte that specifies the start of a record.
(4) A block of data that is issued to a user on successful authentication by the authentication server. Such a token is presented to a service to prove one's identity and attributes to a service. The token is used in the process of determining the user's authorization and access privileges.
tombstone: (1) An individual record of scheduling data that represents a Meeting object where an attendee declined a meeting.
(2) An object that has been deleted, but remains in storage until a configured amount of time (the tombstone lifetime) has passed, after which the object is permanently removed from storage. By keeping the tombstone in existence for the tombstone lifetime, the deleted state of the object is able to replicate. Tombstones exist only when the Recycle Binoptional feature is not enabled.
(3) In Distributed File System Replication (DFS-R), an update pertaining to a file deletion.
(4) A marker that is used to represent an item that has been deleted. A tombstone is used to track deleted items and prevent their reintroduction into the synchronization community.
(5) An inactive DNS node which is not considered to be part of a DNS zone but has not yet been deleted from the zone database in the directory server. Tombstones may be permanently deleted from the zone once they reach a certain age. Tombstones are not used for DNS zones that are not stored in the directory server. A node is a tombstone if its dnsTombstoned attribute has been set to "TRUE".
tombstone lifetime: The amount of time a deleted directory object remains in storage before it is permanently deleted. To avoid inconsistencies in object deletion, the tombstone lifetime is configured to be many times longer than the worst-case replication latency.
toolbar: A row, column, or block of controls that represent tasks or commands within an application. A toolbar can be either a menu toolbar, which provides access to menu commands, or a basic toolbar, which contains buttons that provide shortcuts to tasks that are frequently accessed from menus.
toolbar control: An object that appears on a toolbar and enables user interaction or input, typically to initiate an action, display information, or set values.
toolbar control identifier (TCID): An integer that identifies a specific control on a toolbar.
toolbar delta: A file component that stores a modification that a user made to a built-in toolbar. Stored modifications include adding, changing, or removing a control from a built-in toolbar.
ToolTip: A small pop-up window that provides brief context-sensitive help when users point to an item. Also referred to as ScreenTip.
top N filter: A filter that matches the top or bottom N items or N% of items in a specified column (2).
top N filter by count: A type of top N filter that matches the N largest numerical values or the N newest time and date values.
top N filter by percent: A type of top N filter that matches the N percent largest numerical values or the N percent newest time and date values.
top N filter by sum: A type of top N filter that matches the largest numerical values or the newest time and date values whose sum is equal to or greater than N.
top-level site: The first site in a site collection. All other sites within a site collection are child sites of the top-level site. The URL of the top-level site is also the URL of the site collection.
top-level toolbar: A basic toolbar that is not contained by another toolbar.
topology: The structure of the connections between members.
topology discovery test: A test that an application or higher-layer protocol can use to facilitate discovering the link-layer topology of a single link in a network. That is, to facilitate discovering the set of segments and switches, and determining which responders are on which segments. Compare this term with quick discovery.
total row: A row in a list (2) or table that provides a selection of aggregate functions that are useful for working with numerical data.
tour: A scene or sequence of scenes that describe a story about geographical locations, time periods, and data visualization.
track: (1) Any of the concentric circles on a disk platter over which a magnetic head (used for reading and writing data on the disk) passes while the head is stationary but the disk is spinning. A track is subdivided into sectors, upon which data is read and written.
(2) A time-ordered collection of samples of a particular type (such as audio or video).
transaction: (1) An object that stores the state and metadata for an item during a crawl.
(2) A single unit of work. If a transaction is successful, all data modifications that were made during the transaction are committed and become a permanent part of the database. If a transaction encounters an error and is canceled or rolled back, all data modifications are erased.
(3) The process of opening or creating an object on a server, and the subsequent committing of changes to the object by calling the required save function, at which time all changes to that instance of the object are either saved to the server, or discarded if a failure occurs before saving is finished successfully. Until successfully saved, changes are invisible to any other instances of the object.
(4) In OleTx, an atomic transaction.
transaction manager: The party that is responsible for managing and distributing the outcome of atomic transactions. A transaction manager is either a root transaction manager or a subordinate transaction manager for a specified transaction.
transactional queue: A queue that contains only transactional messages.
Transact-SQL: The Microsoft proprietary version of SQL, the structured query language.
Transact-Structured Query Language (T-SQL): A language that contains the commands that are used to manage instances of Microsoft SQL Server, create and manage all objects in an instance of SQL Server, and to insert, retrieve, modify, and delete all data in SQL Server tables. Transact-SQL is an extension of the language that is defined in the SQL standards that are published by the International Standards Organization (ISO) and the American National Standards Institute (ANSI).
transfer protocol: A protocol that governs the transfer of files, Internet messages, and webpages between networked computers. On the Open Systems Interconnection (OSI) Basic Reference Model, these are application layer protocols. Examples of transfer protocols are Hypertext Transfer Protocol (HTTP), Simple Mail Transfer Protocol (SMTP), and File Transfer Protocol (FTP).
transform: (1) An operation that is performed on data to change it from one form to another. Two examples of transforms are compression and encryption.
(2) An algorithm that transforms the size, orientation, and shape of objects that are copied from one coordinate space into another. Although a transform affects an object as a whole, it is applied to each point, or to each line, in the object.
transition formula entry: A worksheet option that enables users to enter formulas that use IBM Lotus 1-2-3 syntax.
transition formula evaluation: A setting that enables formulas in a worksheet to be calculated in a manner that is consistent with IBM Lotus 1-2-3.
translation group: A subset of translation items within a translation job that share the same base locations for source files and target files.
translation item: A data structure containing information that pertains to the machine translation of a single file, including the locations of the source and target files.
translation job: A set of translation items which are created at the same time and share the same machine translation settings, including target language.
translation rule: A tuple that consists of a regular expression that matches a subset of local numbers and a replacement pattern for it.
Transmission Control Protocol (TCP): A protocol used with the Internet Protocol (IP) to send data in the form of message units between computers over the Internet. TCP handles keeping track of the individual units of data (called packets) that a message is divided into for efficient routing through the Internet.
transport address: (1) A 3-tuple that consists of a port, an IPv4 or IPV6 address, and a transport protocol of User Datagram Protocol (UDP) or Transmission Control Protocol (TCP).
(2) The combination of a network address and port that identifies a transport-level endpoint, for example an IP address and a UDPport. Packets are transmitted from a source transport address to a destination transport address. See [RFC3550] section 3.
Transport Layer Security (TLS): A security protocol that supports confidentiality and integrity of messages in client and server applications communicating over open networks. TLS supports server and, optionally, client authentication by using X.509 certificates (as specified in [X509]). TLS is standardized in the IETF TLS working group. See [RFC4346].
Traversal Using Relay NAT (TURN): A protocol that is used to allocate a public IP address and port on a globally reachable server for the purpose of relaying media from one endpoint (5) to another endpoint (5).
trendline: A line that is added to a chart to show the trend of multiple data points in a series. A trendline is used to facilitate regression analysis.
trigger: A change of state (for example, reaching a specific time of day) that signals when a task is to run. A task runs when any of its triggers and all of its conditions are satisfied.
trust: (1) The state of accepting another authority's statements for the purposes of authentication and authorization. If domain A trusts domain B, domain A will accept domain B's authentication and authorization statements for principals represented by security principal objects in domain B; for example, the list of groups to which a particular user belongs. As a noun, a trust is the relationship between two domains described in the previous sentence.
(2) To accept another authority's statements for the purposes of authentication and authorization, especially in the case of a relationship between two domains. If domain A trusts domain B, domain A accepts domain B's authentication and authorization statements for principals represented by security principal objects in domain B; for example, the list of groups to which a particular user belongs. As a noun, a trust is the relationship between two domains described in the previous sentence.
(3) The characteristic that one entity is willing to rely on a second entity to execute a set of actions and/or to make a set of assertions about a set of subjects and/or scopes. For more information, see [WSFedPRP] sections 1.4 and 2.
trusted location: (1) A directory with properties that indicate how an application processes documents.
(2) A directory from which files can be opened without being checked by the security features of a Microsoft Office application.
trusted subsystem: A method of communication in which two-way trust is established between two server features. Each server feature communicates with the other feature by using an account that is authorized to perform privileged actions, such as retrieving files and settings.
tunnel: (1) The encapsulation of one network protocol within another.
(2) Establishes a context in which all further method calls or data transfer can be performed between the RDG client and the RDG server. A tunnel is unique to a given combination of a RDG server and RDG client instance. All operations on the tunnel are stateful.
tuple: An ordered grouping of members from different dimensions or hierarchies. A single member is a special case of a tuple and can be used as an expression. Every hierarchy does not have to be represented in a tuple.
TURN candidate: A candidate whose transport addresses are TURN-derived transport addresses. See also Traversal Using Relay NAT (TURN).
TURN client: An endpoint (5) that generates Traversal Using Relay NAT (TURN) request messages.
TURN server: An endpoint (5) that receives Traversal Using Relay NAT (TURN) request messages and sends TURN response messages. The protocol server acts as a data relay, receiving data on the public address that is allocated to a protocol client and forwarding that data to the client.
twiddled type library: A modified Automation type library in which all controls are marked as extensible. A twiddled type library is generated automatically by the Visual Basic Editor when a user adds one or more controls to a document.
twip: A unit of measurement that is used in typesetting and desktop publishing. It equals one-twentieth of a printer's point, or 1/1440 of an inch.
two-variable data table: A data table that consists of two input cells, a row input cell and a column input cell.
type information: A collection of information that describes the characteristics and capabilities of an object, including the properties, events, and methods for the object.
type library: (1) A binary file that describes the methods, properties, and data structure of a component.
type library file: A path name that identifies a type library.
TypeDescriptor: A type of MetadataObject that describes a subset of the structure of a Parameter of a Method of the native API of a line-of-business (LOB) system. A TypeDescriptor can contain TypeDescriptors to form hierarchies that describe Parameters representing complex types, where the leaf TypeDescriptors describe simple or primitive types. A root TypeDescriptor, together with DefaultValues for leaf TypeDescriptors can be used to instantiate an instance of a Parameter value to send to a LOB system to execute a Method.
typeface: The primary design of a set of printed characters such as Courier, Helvetica, and Times Roman. The terms typeface and font are sometimes used interchangeably. A font is the particular implementation and variation of the typeface such as normal, bold, or italics. The distinguishing characteristic of a typeface is often the presence or absence of serifs.
type-length-value (TLV): (1) A method of organizing data that involves a Type code (16-bit), a specified length of a Value field (16-bit), and the data in the Value field (variable).
(2) A property of a network interface, so named because each property is composed of a Type field, a Length field, and a value.
(3) Information element encoded within [MS-PEAP]. Type and length fields are a fixed size (that is, 1 to 4 bytes), and the value field is variable. "Type" indicates what kind of field is encoded; "Length" indicates the size of "Value"; "Value" defines the data portion of the TLV element.
TypeReflector: A unit of business logic (2) that converts data structures between the type system of the protocol client and the native type system of a line-of-business (LOB) system.