-
101 APPC
"An IBM Systems Network Architecture communications method that uses the LU 6.2 protocol to establish, manage, and terminate network communication between programs in a distributed computing environment." -
102 backup media pool
A logical collection of data-storage media that has been reserved for use by Microsoft Windows Backup. Backup uses Removable Storage to control access to specific media within a library. -
103 bootable CD
A CD-ROM that can be used to start a computer. An automated installation uses a bootable CD to start a computer. -
104 BOOTP
A protocol used primarily on TCP/IP networks to configure diskless workstations. RFCs 951 and 1542 define this protocol. DHCP is a later boot configuration protocol that uses this protocol. The Microsoft DHCP service provides limited support for BOOTP service. -
105 bootstrap protocol
A protocol used primarily on TCP/IP networks to configure diskless workstations. RFCs 951 and 1542 define this protocol. DHCP is a later boot configuration protocol that uses this protocol. The Microsoft DHCP service provides limited support for BOOTP service. -
106 Challenge Handshake Authentication Protocol
A challenge-response authentication protocol for Point-to-Point Protocol (PPP) connections described in RFC 1994. It uses the industry-standard MD5 hashing algorithm to hash the combination of a challenge string issued by the authenticating server and the user's password in the response."بروتوكول ""Challenge Handshake Authentication Protocol"""English-Arabic terms dictionary > Challenge Handshake Authentication Protocol
-
107 CHAP
A challenge-response authentication protocol for Point-to-Point Protocol (PPP) connections described in RFC 1994. It uses the industry-standard MD5 hashing algorithm to hash the combination of a challenge string issued by the authenticating server and the user's password in the response. -
108 Digital Signature Standard
A standard that uses the Digital Signature Algorithm (DSA) for its signature algorithm and Secure Hash Algorithm (SHA-1) as its message hash algorithm. DSA is a public-key cipher that is used only to generate digital signatures and cannot be used for data encryption.English-Arabic terms dictionary > Digital Signature Standard
-
109 DSS
A standard that uses the Digital Signature Algorithm (DSA) for its signature algorithm and Secure Hash Algorithm (SHA-1) as its message hash algorithm. DSA is a public-key cipher that is used only to generate digital signatures and cannot be used for data encryption. -
110 express message
"For Message Queuing, a message that uses fewer resources and is faster than a recoverable message. However, because express messages are mapped to memory, they are lost if the computer storing them fails." -
111 MFU list
A list of applications that the end user has recently used or uses frequently. -
112 Most Frequently Used List
A list of applications that the end user has recently used or uses frequently. -
113 multicast static route
A static route that a multicast-enabled router uses to forward an IP packet from a sending computer to the receiving multicast group. -
114 foreign computer
"A computer that uses another message queuing system but, through a connector application, can exchange messages with computers that run Message Queuing." -
115 Network Load Balancing
"A Windows network component that uses a distributed algorithm to load-balance Internet Protocol (IP) traffic across a number of hosts, helping to enhance the scalability and availability of mission-critical, IP-based services, such as Remote Desktop Services, Web services, virtual private networking, and streaming media. It also provides high availability by detecting host failures and automatically redistributing traffic to the surviving hosts." -
116 symmetric-key cryptography
A type of cryptography that uses symmetric keys to provide confidentiality.English-Arabic terms dictionary > symmetric-key cryptography
-
117 Meet Now
An application feature that one uses to join an unscheduled meeting. It is a virtual office to which a user can invite participants for an impromptu web conference. -
118 Windows Media Author
"A graphical interface tool for creating and testing illustrated audio. The tool is designed to combine and synchronize audio and image files. Using it, the author can manage objects-sounds, images, and URLs-so that they appear at the correct time during playback. This tool uses technology from Digital Renaissance, Inc." -
119 b-node
A NetBIOS implementation that uses broadcast NetBIOS name queries for name registration and resolution. -
120 local user
A person who uses a computer that is not connected to a network. A local user is most likely someone using a computer at home.
См. также в других словарях:
Uses — (Geogr.), so v.w. Uzes … Pierer's Universal-Lexikon
USES — United States Employment Service Short Dictionary of (mostly American) Legal Terms and Abbreviations … Law dictionary
ušės — sf. pl. KŽ = ušios … Dictionary of the Lithuanian Language
uses — USES, ville episcopale, Vtica. Inde Vticensis episcopatus. Il est en l Archevesché de Narbonne … Thresor de la langue françoyse
USES — abbrev. United States Employment Service … English World dictionary
uses — See use; Statute of Uses … Ballentine's law dictionary
Uses and gratifications — Uses and gratifications, is not a single approach but a body of approaches developed out of empirical studies beginning in the mid 20th century. It is one of many audience theories recognised in the media.The basic theme of uses and… … Wikipedia
Uses and gratifications approach — [ juːsɪz ənd grætɪfɪ keɪʃnz ə prəʊtʃ, englisch] der, , Nutzen und Belohnungs|ansatz, Nutzen|ansatz, in Kommunikationswissenschaften und Publizistik ein Erklärungsmodell, welches davon ausgeht, dass der Mediennutzer (Rezipient) diejenigen… … Universal-Lexikon
Uses-and-Gratifications-Ansatz — Der Nutzen und Belohnungsansatz (auch Uses and Gratifications Approach, Uses and Gratifications Ansatz oder Theorie der selektiven Zuwendung) ist ein Modell der Mediennutzungsforschung und widerspricht dem Wirkungsansatz des älteren Stimulus… … Deutsch Wikipedia
Uses and Gratifications — Der Nutzen und Belohnungsansatz (auch Uses and Gratifications Approach, Uses and Gratifications Ansatz oder Theorie der selektiven Zuwendung) ist ein Modell der Mediennutzungsforschung und widerspricht dem Wirkungsansatz des älteren Stimulus… … Deutsch Wikipedia
Uses and Gratifications Approach — Der Nutzen und Belohnungsansatz (auch Uses and Gratifications Approach, Uses and Gratifications Ansatz oder Theorie der selektiven Zuwendung) ist ein Modell der Mediennutzungsforschung und widerspricht dem Wirkungsansatz des älteren Stimulus… … Deutsch Wikipedia