Export (0) Print
Expand All

Windows Server 2003 Glossary - W

Updated: March 7, 2008

Applies To: Windows Server 2000, Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2

For more Windows Server terms, see the Windows Server 2008 Glossary.

Glossary - W

#  A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z

Waiting for Call

A telephony signal that Network Connections has put the modem in Listen mode and is waiting for incoming calls.

See also: modem (modulator/demodulator)   Network Connections   

wake-on-LAN

A power management feature that allows a device to bring the operating system out of standby or sleep mode if there is network activity.

See also: sleep mode   

WAN

See other term: wide area network (WAN)  

warning level

The point at which users are nearing their quota limit.

See also: quota limit   

weak password

A password that does not provide an effective defense against unauthorized access to a resource. A weak password can be less than six characters long, contain all or part of a users account name, or contain less than three of the four following categories of characters: uppercase characters, lowercase characters, base 10 digits, and symbols found on the keyboard (such as !, @, #).

See also: password   password policy   strong password   

Web Distributed Authoring and Versioning (WebDAV)

An application protocol related to Hypertext Transfer Protocol (HTTP) 1.1 that allows clients to transparently publish and manage resources on the World Wide Web.

See also: Hypertext Transfer Protocol (HTTP)   protocol   

Web server

A computer that is maintained by a system administrator or Internet service provider (ISP) and that responds to requests from a user's browser.

See also: Internet service provider (ISP)   

Web Services (WS-*)

The specifications for a Web Services Architecture that is based on industry standards such as Simple Object Access Protocol (SOAP); XML; Web Service Description Language (WSDL); and Universal Description, Discovery, and Integration (UDDI). WS-* provides a foundation for delivering complete, interoperable business solutions for the extended enterprise, including the ability to manage federated identity and security.

Web Services Security (WS-Security)

A series of specifications that describe how to attach signature and encryption headers to Simple Object Access Protocol (SOAP) messages. In addition, WS-Security describes how to attach security tokens, including binary security tokens such as X.509 certificates and Kerberos tickets, to messages. In Active Directory Federation Services (ADFS), WS-Security is used when Kerberos signs security tokens.

WebDAV

well-connected

Sufficient connectivity to make your network and Active Directory useful to clients on your network. The precise meaning of well-connected is determined by your particular needs.

See also: Active Directory   client   

well-known services

Services that are so pervasive in the computer industry that standard bindings are universally recognized. These services often maintain a machine-centric status and are frequently legacy services such as those developed for use in TCP/IP networks, for example, Telnet and File Transfer Protocol (FTP). Well-known services can published in Active Directory, but because their bindings are widely known, the information is superfluous.

See also: Active Directory   File Transfer Protocol (FTP)   machine-centric   service   Transmission Control Protocol/Internet Protocol (TCP/IP)   

wide area network (WAN)

A network that connects geographically separated locations by using telecommunications services.

See also: device   local area network (LAN)   

wildcard character

A keyboard character that can be used to represent one or many characters when conducting a query. The question mark (?) represents a single character, and the asterisk (*) represents one or more characters.

wildcarding

In DNS, the supported use of wildcard characters such as the asterisk (*) in domain names for DNS queries that resolve to multiple names. When wildcarding is used, DNS servers must support resolving name queries that use wildcard characters, and resolvers must be able to parse multiple records from any resource record sets (RRsets) issued in wildcard query responses.

See also: DNS server   domain name   Domain Name System (DNS)   resource record set (RRset)   wildcard character   

Windows Catalog

A Web site that lists hardware and software that is designed for use with Windows XP, Windows 2000 Server products, and products in the Windows Server 2003 family. You can use this site to help you decide whether to purchase a particular device or program, to help you evaluate whether a particular computer would support an upgraded operating system, or for similar decisions about hardware and software.

See also: device   Hardware Compatibility List (HCL)   

Windows Clustering

A feature of Windows Server 2003, Enterprise Edition, and Windows Server 2003, Datacenter Edition, that provides the complementary clustering technologies, Network Load Balancing clusters, and server clusters.

See also: cluster   Network Load Balancing cluster   server cluster   

Windows Hardware Quality Labs (WHQL)

Provides compatibility testing services to test hardware and drivers for Windows operating systems.

Windows Internet Name Service (WINS)

A Windows name resolution service for network basic input/output system (NetBIOS) names. WINS is used by hosts running NetBIOS over TCP/IP (NetBT) to register NetBIOS names and to resolve NetBIOS names to Internet Protocol (IP) addresses.

See also: IP address   network basic input/output system (NetBIOS)   resource   service   WINS proxy   WINS resource   

Windows Logo Program

A certification program to help customers identify systems, hardware, and software that meet a baseline definition of platform features and quality goals and ensure a good user experience of Windows.

See also: signed driver   unsigned driver   

Windows Management Instrumentation (WMI)

A management infrastructure in Windows that supports monitoring and controlling system resources through a common set of interfaces and provides a logically organized, consistent model of Windows operation, configuration, and status.

See also: resource   

Windows Management Instrumentation filter

A query that is based on Windows Management Instrumentation (WMI) and used to filter the effect of a Group Policy object (GPO). WMI filters are written in WMI Query Language (WQL) and are evaluated on the target computer or user. If the filter evaluates to true, then the GPO is applied. Otherwise, the GPO is not applied. WMI filters are useful for exception management.

See also: Group Policy Management console (GPMC)   Group Policy object (GPO)   Group Policy object link   

Windows Media Services

Software that provides multimedia support, allowing you to deliver content using Advanced Streaming Format over an internet or the Internet.

See also: multimedia streaming   

Windows Open Services Architecture (WOSA)

A common set of interfaces that connect front-end applications with back-end services.

See also: service   

Windows Support Tools

Tools that administrators, developers, or support personnel can use to diagnose and troubleshoot operating system configuration problems. Although Windows Support Tools are included on the operating system CD, they are not guaranteed or supported by Microsoft, and they must be installed separately from the operating system.

Windows NT token–based application

A Windows application that relies on a Windows NT token to perform authorization of users.

WINS

WINS proxy

A computer that listens to name query broadcasts and responds for those names not on the local subnet. The proxy communicates with a WINS server to resolve names and then caches them for a specific time period.

See also: subnet   Windows Internet Name Service (WINS)   

WINS resource

A resource type that provides Windows Internet Name Service (WINS) from a cluster.

See also: cluster   resource types   Windows Internet Name Service (WINS)   

Winsock

Windows Sockets. An application programming interface (API) standard for software that provides a TCP/IP interface under Windows.

See also: application programming interface (API)   Transmission Control Protocol/Internet Protocol (TCP/IP)   

wireless communication

Communication between a computer and another computer or device without wires. The form of wireless communication provided as part of the Windows operating system uses infrared (IR) light to transmit files. Radio frequencies, as used by cellular and cordless telephones, are another form of wireless communication.

See also: infrared (IR)   infrared device   infrared port   

WMI

WMI filter

workgroup

A simple grouping of computers, intended only to help users find such things as printers and shared folders within that group. Workgroups in Windows do not offer the centralized user accounts and authentication offered by domains.

See also: authentication   domain   user account   

working set

For a process, the amount of physical memory assigned to the process by the operating system.

See also: process   

World Wide Web (WWW)

A system for exploring the Internet by using hyperlinks. When you use a Web browser, the Web appears as a collection of text, pictures, sounds, and digital movies.

See also: Internet   

WOSA

WS-Federation

A specification that defines a model and set of messages for brokering trust and the federation of identity and authentication information across different trust realms. The WS-Federation specification identifies two sources of identity and authentication requests across trust realms: active requestors, such as Simple Object Access Protocol (SOAP)-enabled applications, and passive requestors, which are defined as HTTP browsers capable of supporting broadly supported HTTP, for example, HTTP 1.1.

WS-Federation Passive Requestor Profile (WS-F PRP)

An implementation of the WS-Federation specification that proposes a standard protocol for how passive clients (such as Web browsers) apply the federation framework. Within this protocol, Web service requestors are expected to understand the new security mechanisms and be capable of interacting with Web service providers.

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

ADD
Show:
© 2014 Microsoft