-
1 access code
"A string of characters entered by a user to verify his or her identity to a network or to a local computer, device, or client, or to sign in to an account, app, and so on." -
2 remote computer
"A computer that you can access only by using a communications line or a communications device, such as a network card or a modem, and a remote access software (such as Remote Desktop Connection)." -
3 local computer
"The computer that you are currently logged on to as a user. More generally, a local computer is a computer that you can access directly without using a communications line or a communications device, such as a network adapter or a modem." -
4 direct memory access
"A technology that allows certain devices, such as hard disks and CD or DVD drives, to transfer information directly through the computer's memory without using the computer's processor. DMA improves the performance of the device and frees the computer's processor so it can perform other tasks." -
5 NAP client
A computer that supports the NAP platform and can provide statements of health (SoHs) to a network access device. -
6 Media Sharing Center
"The primary interface used to enable sharing media to other computers and devices, and to access media sharing settings and devices that interact with the media sharing feature. If you enable sharing you can play your favorite music, videos, and pictures on any computer or device in any room in your home." -
7 Windows Media Sharing Center
"The primary interface used to enable sharing media to other computers and devices, and to access media sharing settings and devices that interact with the media sharing feature. If you enable sharing you can play your favorite music, videos, and pictures on any computer or device in any room in your home."English-Arabic terms dictionary > Windows Media Sharing Center
-
8 authorization
"The process of granting a person, computer process, or device access to certain information, services or functionality. Authorization is derived from the identity of the person, computer process, or device requesting access, which is verified through authentication." -
9 network adapter
"An expansion card or other device used to provide network access to a computer or other device, such as a printer. Mediates between the computer and physical media, such as cabling, over which transmissions travel."محوّل الشبكة -
10 controller
"A device that other devices rely on for access to a computer subsystem. A disk controller, for example, controls access to one or more disk drives, managing physical and logical access to the drive or drives." -
11 local machine
"The computer that you are currently logged on to as a user. More generally, a local computer is a computer that you can access directly without using a communications line or a communications device, such as a network adapter or a modem." -
12 mass-storage controller
"A device on which mass-storage devices rely for access to a computer subsystem. For example, a SCSI card or IDE functionality on the motherboard is a mass-storage controller; the physical hard drive is a mass-storage device." -
13 fingerprint reader
"An authentication device that digitally scans an individual's fingerprint, records the unique pattern of the individual's ridges and valleys, and determines if the pattern matches the pattern of the person who has access permission to a particular device, such as a computer or a phone, or to a Web site." -
14 authorize
"To grant a person, computer process, or device access to certain information, services or functionality."يخوّل -
15 resource
"For Device Manager, any of four system components that control how the devices on a computer work. These four system resources are interrupt request (IRQ) lines, direct memory access (DMA) channels, input/output (I/O) ports, and memory addresses." -
16 security principal
"In Windows-based computers, an account (such as a user, security group, device, or computer) that can be granted or denied access to resources." -
17 principal
"In Windows-based computers, an account (such as a user, security group, device, or computer) that can be granted or denied access to resources."
См. также в других словарях:
Computer fraud — is the use of information technology to commit fraud. In the United States, computer fraud is specifically proscribed by the Computer Fraud and Abuse Act, which provides for jail time and fines. Contents 1 Notable incidents 2 See also 3 External… … Wikipedia
Video ready access device — A Video Ready Access Device, more commonly know as a VRAD, provides DSL access and HD cable TV to customers subscribed to AT T s U verse brand of services. The VRAD equipment is the work of ALCATEL who creates various communications systems. The… … Wikipedia
Computer fraud case studies — BackgroundThe purpose of this page is to explore case studies in using Information Technology to commit fraud. Computer fraud is the act of using a computer to commit fraud (A deception deliberately practiced in order to secure unfair or unlawful … Wikipedia
Computer network — Computer networks redirects here. For the periodical, see Computer Networks (journal). Datacom redirects here. For other uses, see Datacom (disambiguation). Internet map. The Internet is a global system of interconnected computer networks that… … Wikipedia
computer — computerlike, adj. /keuhm pyooh teuhr/, n. 1. Also called processor. an electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed, and display the results of these operations. Cf. analog… … Universalium
Computer insecurity — This article is about computer security exploits and defenses. For computer security through design and engineering, see computer security. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
computer science — computer scientist. the science that deals with the theory and methods of processing information in digital computers, the design of computer hardware and software, and the applications of computers. [1970 75] * * * Study of computers, their… … Universalium
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible … Wikipedia
ACCESS.bus — (or A.b) is a peripheral interconnect computer bus developed by Philips in the early 1990s. It is similar in purpose to USB, in that it allows low speed devices to be added or removed from a computer on the fly. While it was in use earlier than… … Wikipedia
Access Control Matrix — or Access Matrix is an abstract, formal computer protection and security model used in computer systems, that characterizes the rights of each subject with respect to every object in the system. It was first introduced by Butler W. Lampson in… … Wikipedia