Glossary – HP NonStop G-Series User Manual

Page 191

Advertising
background image

Glossary

$ZTC0

1. The default transport-provider process that provides Transmission Control Protocol/Internet
Protocol (TCP/IP) services to sockets programs.
2. The default transport-provider process for AF_INET sockets programs.

absolute
pathname.

A pathname that begins with a slash (/) character and is resolved beginning with the root directory.
Contrast with

relative pathname.

access mode

The form of file access permitted for a user or process.

address space

The memory locations to which a process has access.

ADE

See

application development environment (ADE)

.

administrator

1. For a HP NonStop system, the person responsible for the installation and configuration of a
software subsystem on a NonStop node. Contrast with

operator.

2. For an IBM system, the person responsible for the day-to-day monitoring and maintenance
tasks associated with a software subsystem on an IBM node.
3. For a UNIX system, the owner of /dev/console. The administrator is responsible for the
installation and configuration of all hardware and software within a node.

ANSI

The American National Standards Institute.

API

See

application program interface (API)

.

application
development
environment (ADE)

A set of methods and tools (such as the Pathmaker product) that are used throughout the lifecycle
of an application project to design, code, and manage that project.

application
program interface
(API)

A set of services (such as programming language functions or procedures) that are called by an
application program to communicate with other software components. For example, an application
program in the form of a client might use an API to communicate with a server program.

appropriate
privileges

An implementation-defined means of associating privileges with a process for function calls or
function call options that need special privileges.

ASCII

American Standard Code for Information Interchange. A single-byte code set that uses only 7 of
the 8 bits in a byte to represent each character. The ASCII code set contains the uppercase and
lowercase characters of the U.S. English alphabet, some punctuation symbols, the digits 0 through
9, and some symbols and control characters. Because of its limited characters, and because the
8th bit is sometimes used in ASCII programs as a utility bit, the ASCII code set is not appropriate
for use in international software.

atomic

Behaving as a single, indivisible operation. For example, an atomic write operation on a file
cannot write data that is interleaved with data from another, concurrent write operation on that
file.

authentication
attributes

Security attributes of a process that do not change unless a successful reauthentication occurs or
the super ID changes them. The authentication attributes include the login name, real user ID,
real group ID, authentication system (node name), authentication terminal (terminal name),
supplementary group name and supplementary group ID, file creation mode mask (permissions
not to be granted during file creation), and the user rolegroup list.

authorization
attributes

Security attributes of a process that can change through use of functions such as setuid() (or
of Guardian procedures such as PROCESS_CREATE_) without reauthentication. The authorization
attributes include the effective user ID, saved-set user ID, saved-set group ID, user audit flags, and
the effective user name.

background
process

A process that is a member of a background process group.

background
process group.

A process group that is both of the following:

Not a foreground process group


A member of a session that has a connection with a controlling terminal

base computing
platform.

The minimum software implementation that is the foundation for the X/Open common applications
environment (CAE).

191

Advertising
This manual is related to the following products: