-
1 impersonation token
"An access token that captures the security information of a client process, allowing a service to ""impersonate"" the client process in security operations." -
2 XImage
"A command-line tool that captures, modifies, and applies installation images for deployment in a manufacturing or corporate environment." -
3 password stealer
A type of Trojan that captures or transmits passwords to an attacker. -
4 Windows Media Audio 9 Professional
"A high-performance codec that delivers better-than-CD resolutions and is designed for audiences that use high-fidelity hardware and 5.1 channel surround sound-equipped computers. It captures full-resolution 24-bit/96 kHz audio in stereo, 5.1 channel, or even 7.1 channel surround sound for streaming, progressive download, or download-and-play delivery at 128 to 768 Kbps."English-Arabic terms dictionary > Windows Media Audio 9 Professional
-
5 WMA Pro
"A high-performance codec that delivers better-than-CD resolutions and is designed for audiences that use high-fidelity hardware and 5.1 channel surround sound-equipped computers. It captures full-resolution 24-bit/96 kHz audio in stereo, 5.1 channel, or even 7.1 channel surround sound for streaming, progressive download, or download-and-play delivery at 128 to 768 Kbps." -
6 browsing history
"A user’s private information such as temporary files, history, passwords, web form entries, and cookies that captures Internet surfing and other online activities." -
7 budget resource
"A resource that captures the maximum capacity for a project to consume money, work, or material units for a project. Budgets can only be applied at the project level by assigning a budget resource to the project summary task." -
8 error reporting
A feature that automatically captures key information at the time of a program or system crash and allows users to report the collected information. -
9 logging table
A system table that captures failures and other events for Access Services. -
10 Demand Management
"A feature that captures and manages work proposals in a single location. Proposals move through a customizable, multi-stage governance process that may include review, selection of proposals for approval, and tracking the execution of approved proposals through to completion." -
11 capture
I[΄kæptʃə] n գրավում, գերում, կալանավորում. captures ռազմական ավար. the capture of tհe city/murderer`s քաղաքի գրավումը, մարդասպանին բռնելըII[΄kæptʃə] v բռնել. գրավել. գերել, կալանավորել. capture a city/giraffe քաղաք գրավել, ընձուղտ բռնել. capture the imagination փխբ. երևակայությունը գերել. capture smb’s attention ուշադրությունը գրավել
См. также в других словарях:
captures — cap·ture || kæpɪtɪtʃə n. catching; copying of all or part of the screen into temporary memory (Computers); prisoner v. entrap, take prisoner … English contemporary dictionary
CAPTURES — … Useful english dictionary
Captures vidéo d’écran — Screencast Un screencast (aussi appelé capture vidéo de l écran) est un enregistrement vidéo d un écran d ordinateur accompagné la plupart du temps d une narration audio. Bien que le terme screencast ait été défini par Jon Udell en 2004, des… … Wikipédia en Français
Histoire de la marine française — L histoire de la Marine française couvre la période du XIIIe siècle au XXIe siècle. Elle est marquée par une alternance de hauts et de bas, la Marine française rencontrant au cours de son histoire trois difficultés majeures qui… … Wikipédia en Français
List of battles 1401–1800 — List of battles: before 601 601 1400 1401 1800 1801 1900 1901 2000 2001 current See also: List of American Revolutionary War battles Early 15th Century (1401 1450) * 1402 **Battle of Casalecchio January 26 Alberico da Barbiano for Milan defeats… … Wikipedia
List of single-ship actions — This is a list of notable single ship actions, naval bombardments and other naval events:ingle ship actions* 1618 about May Maltese Gran Galeone vs 3 Tunisians * 1697 September 5 Hudson s Bay French ship defeats British force * 1781 May 30 Cape… … Wikipedia
Pinger (halieutique) — Dans le domaine de la pêche, on appelle pinger ou répulsif acoustique, alarme acoustique, balise acoustique ou répulsif a cétacés (de l anglais ping, une onomatopée) tout émetteur étanche d impulsions sonores assez puissantes pour repousser les… … Wikipédia en Français
Répulsif a cétacés — Pinger (halieutique) Dans le domaine de la pêche, on appelle pinger ou “ répulsif acoustique ”, “ alarme acoustique ”, “ balise acoustique ” ou répulsif a cétacés (de l anglais ping, une onomatopée) tout émetteur étanche d impulsions sonores… … Wikipédia en Français
Répulsif acoustique — Pinger (halieutique) Dans le domaine de la pêche, on appelle pinger ou “ répulsif acoustique ”, “ alarme acoustique ”, “ balise acoustique ” ou répulsif a cétacés (de l anglais ping, une onomatopée) tout émetteur étanche d impulsions sonores… … Wikipédia en Français
Fairy chess piece — Some fairy pieces Archbishop (knight + bishop compound) Chancellor (knight … Wikipedia
Pierre André de Suffren — Pour les articles homonymes, voir Suffren. Pierre André de Suffren … Wikipédia en Français