-
1 access code
"A string of characters entered by a user to verify his or her identity to a network or to a local computer, device, or client, or to sign in to an account, app, and so on." -
2 international access code
The prefix that is used to direct a call internationally. The International Access Code is 011 in the United States and 00 in much of the rest of the world. -
3 outside line access code
"The prefix that is used to access an outside line. In the United States, this prefix is typically 9." -
4 zero access code
[΄ziərəu ΄ækses ΄kəud] հմկրգ. անհասցե կոդ -
5 code access security
"A mechanism provided by the common language runtime whereby managed code is granted permissions by security policy and these permissions are enforced, helping to limit the operations that the code will be allowed to perform." -
6 CODE–DIVISION MULTIPLE ACCESS
English-Arabic military dictionary > CODE–DIVISION MULTIPLE ACCESS
-
7 participant code
"An access code that is required for a user to join a conference as a participant. This code is entered in the Options dialog box, on the Accounts tab, under Conferencing Information." -
8 leader code
"An access code that is needed in order for a user to join a conference as a leader. This string is entered in the Options dialog box, on the Accounts tab, under Conferencing Information." -
9 authorization code
"A code that grants rights to an individual, for example to use a system or access stored data." -
10 interactive dialog box
"A dialog box that requires a response from the user. Intermediary devices such as a security host require such a dialog box as an added layer of security between the client and the remote access server. In such dialog boxes, the user types an access code or a user name and password on the remote access terminal screen." -
11 smart card
"A plastic (credit card–sized or smaller) device with an embedded microprocessor and a small amount of storage that is used, with an access code, to enable certificate-based authentication. Smart cards securely store certificates, public and private keys, passwords, and other types of personal information." -
12 transparency
"A security model that helps developers write and deploy secure libraries and applications by isolating code depending on privilege. Level 1 transparency was introduced in the.NET Framework version 2.0. It enables developers to annotate code to declare which types and members can perform security elevations and other trusted actions (security-critical) and which cannot (security-transparent). Level 2 transparency, which was introduced in the.NET Framework 4, refines this model. It adds a third group of code, security-safe-critical code, which are types or members that access secure resources and can be safely used by partially-trusted code in the.NET Framework." -
13 common language runtime
"The engine at the core of managed code execution. The runtime supplies managed code with services such as cross-language integration, code access security, object lifetime management, and debugging and profiling support." -
14 CLR
"The engine at the core of managed code execution. The runtime supplies managed code with services such as cross-language integration, code access security, object lifetime management, and debugging and profiling support." -
15 runtime
"The engine at the core of managed code execution. The runtime supplies managed code with services such as cross-language integration, code access security, object lifetime management, and debugging and profiling support." -
16 full trust
"A code access security (CAS) state assigned to managed assemblies. The level of trust granted to an application or Web service affects its ability to use system resources while executing. Assemblies that have full trust can access any resource that is subject to operating system security, and all privileged operations are supported." -
17 boot sector
"A critical disk structure for starting your computer, located at sector 1 of each volume or floppy disk. It contains executable code and data that is required by the code, including information used by the file system to access the volume. The boot sector is created when your format the volume." -
18 user mode
"The nonprivileged processor mode in which application code, including protected subsystem code, executes. User-mode applications cannot gain access to system data except by calling subsystem-supplied functions, which, in turn, call system services." -
19 critical section
"A segment of code which is not reentrant; that is, it does not support concurrent access by multiple threads. Often, a critical section is used to protect shared resources." -
20 GDT
"A memory segment that contains descriptors for code, data, and descriptor table segments. All processor tasks have access to a common GDT."
- 1
- 2
См. также в других словарях:
Access code — An access code is a sequence of characters and/or numbers that allow access to a secure service. Access codes are often used in security systems to permit entry. [ [http://www.pcmag.com/encyclopedia term/0,2542,t=access+code i=37382,00.asp PC… … Wikipedia
access code — noun a code (a series of characters or digits) that must be entered in some way (typed or dialed or spoken) to get the use of something (a telephone line or a computer or a local area network etc.) • Syn: ↑access • Hypernyms: ↑code • Hyponyms:… … Useful english dictionary
access code — a code, as of numbers or letters, that is entered into a computer, telephone, or telecommunications network so as to access a particular service. * * * … Universalium
access code — noun an alphanumeric sequence that permits access to a secure service or network … Wiktionary
access code — A digit or series of digits necessary to be connected to a private line for dial access … IT glossary of terms, acronyms and abbreviations
access code — password … English contemporary dictionary
code — [kəʊd ǁ koʊd] noun 1. [countable] LAW a complete set of written rules or laws: • Each state in the US has a different criminal and civil code. ˈbuilding code [countable] LAW a set of rules that states what features a new building, bridge etc… … Financial and business terms
Code::Blocks — Code::Blocks … Википедия
Code of Federal Regulations — Administrative law General prin … Wikipedia
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Code Access Security — (CAS), in the Microsoft .NET framework, is Microsoft s solution to prevent untrusted code from performing privileged actions. When the CLR loads an assembly it will obtain evidence for the assembly and use this to identify the code group that the … Wikipedia