-
1 Key Management Server
The Exchange computer on which the Key Management Service has been installed. There can be one Key Management Server per administrative group. -
2 computer build report
A report generated by OEMs for each OA 3.0 manufactured computer which is then sent to Microsoft for processing. This report includes the hardware hash value and Product Key ID. -
3 ENTER key
"The key that is used at the end of a line or command to instruct the computer to process the command or text. In word processing programs, the Enter key is used at the end of a paragraph. Also called: Return key." -
4 ESC key
A keyboard key that sends the escape (ESC) character to the computer. Often this key moves the user back one level in the menu structure or exits the program. -
5 network security key
A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key. -
6 PRINT SCREEN key
A key on IBM PC and compatible keyboards that normally causes the computer to send a character-based “picture” of the screen contents to the printer. -
7 control-break
"A key or combination of keys used to tell a computer to halt, or break out of, whatever it is doing. On IBM PCs and compatibles under DOS, pressing the Pause/ Break or Scroll Lock/Break key while holding down the Ctrl key issues the break command (as does Ctrl-C). On Macintosh computers, the key combination that sends a break code is Command-period." -
8 certificate of authenticity
"A label with sophisticated anti-counterfeiting features that helps the end user identify that the computer uses a validly licensed copy of Microsoft Windows. The product name and a unique product key appear in the center of the label. The OEM must physically attach the COA label to the computer chassis, and it should never be removed from the computer."English-Arabic terms dictionary > certificate of authenticity
-
9 COA
"A label with sophisticated anti-counterfeiting features that helps the end user identify that the computer uses a validly licensed copy of Microsoft Windows. The product name and a unique product key appear in the center of the label. The OEM must physically attach the COA label to the computer chassis, and it should never be removed from the computer." -
10 Windows grace
A state between licensed and non-licensed for the user to activate/reactivate the Windows license. Typical retail Windows will be unlicensed after it is first installed before activation. Enterprise Windows (volume license clients) may find they are in this state if the computer has not been connected to the enterprise key management service for more than 180 days. Finally a customer who has initially used an invalid product key that Microsoft later identifies may be placed in this state and asked to get a valid product key. -
11 certificate
"A digital document that is commonly used for authentication and to help secure information on a network. A certificate binds a public key to an entity that holds the corresponding private key. Certificates are digitally signed by the certification authority that issues them, and they can be issued for a user, a computer, or a service." -
12 digital certificate
"A digital document that is commonly used for authentication and to help secure information on a network. A certificate binds a public key to an entity that holds the corresponding private key. Certificates are digitally signed by the certification authority that issues them, and they can be issued for a user, a computer, or a service." -
13 hardware branch
"The hardware archive root key in the registry that is a superset of the memory-resident hardware tree. Although the hardware tree contains information only about those devices currently detected and running in the system, the registry contains a complete list of all hardware ever installed on the particular computer. The hardware root key is \\HKEY-LOCAL-MACHINE\Hardware." -
14 Windows XP Validation Advisor
A program that determines whether the Windows product key installed on a computer matches the original Windows product key that was purchased and provides customized recommendations for resolution when an installation of Windows has failed validation.English-Arabic terms dictionary > Windows XP Validation Advisor
-
15 chat
"A real-time conversation via computer using short instant messages between two or more participants. When a participant types a line of text and then presses the Enter key, that participant's words appear on the screens of the other participants, who can then respond in kind." -
16 dongle
A security device connected to an input/output port to permit the use of a particular software package on that computer. The use of the hardware key hash permits backup copying of software but prevents its unlicensed use on additional computers. -
17 safe mode
A method of starting Windows using only basic files and drivers. Safe mode is available by pressing the F8 key during startup. This allows you to start the computer when a problem prevents it from starting correctly. -
18 SPACEBAR
A long key occupying much of the bottom row of most keyboards that sends a space character to the computer. -
19 content header
"Part of the file structure of a Windows Media file that contains information necessary for a client computer to decompress and render the content data. In a packaged file, an additional content header exists and contains the key ID, content ID, and license acquisition URL. This content header can also include a required individualization version number and attributes defined by the content provider." -
20 health certificate
"An X.509 certificate that asserts the health of a client computer. Client computers can use this certificate to prove their identities and health through security services and mechanisms such as Internet Protocol security (IPsec) and Internet Key Exchange (IKE), which recognize the X.509 standard."
- 1
- 2
См. также в других словарях:
Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible … Wikipedia
computer science — computer scientist. the science that deals with the theory and methods of processing information in digital computers, the design of computer hardware and software, and the applications of computers. [1970 75] * * * Study of computers, their… … Universalium
Key disclosure law — Key disclosure laws, also known as mandatory key disclosure, is legislation that require individuals to surrender cryptographic keys to law enforcement. The purpose is to allow access to material for confiscation or digital forensics purposes and … Wikipedia
Computer-assisted language learning — (CALL) is succinctly defined in a seminal work by Levy (1997: p. 1) as the search for and study of applications of the computer in language teaching and learning .[1] CALL embraces a wide range of ICT applications and approaches to teaching… … Wikipedia
Key — (k[=e]), n. [OE. keye, key, kay, AS. c[ae]g.] 1. An instrument by means of which the bolt of a lock is shot or drawn; usually, a removable metal instrument fitted to the mechanism of a particular lock and operated by turning in its place. [1913… … The Collaborative International Dictionary of English
Key bed — Key Key (k[=e]), n. [OE. keye, key, kay, AS. c[ae]g.] 1. An instrument by means of which the bolt of a lock is shot or drawn; usually, a removable metal instrument fitted to the mechanism of a particular lock and operated by turning in its place … The Collaborative International Dictionary of English
Key bolt — Key Key (k[=e]), n. [OE. keye, key, kay, AS. c[ae]g.] 1. An instrument by means of which the bolt of a lock is shot or drawn; usually, a removable metal instrument fitted to the mechanism of a particular lock and operated by turning in its place … The Collaborative International Dictionary of English
Key bugle — Key Key (k[=e]), n. [OE. keye, key, kay, AS. c[ae]g.] 1. An instrument by means of which the bolt of a lock is shot or drawn; usually, a removable metal instrument fitted to the mechanism of a particular lock and operated by turning in its place … The Collaborative International Dictionary of English
key fruit — Key Key (k[=e]), n. [OE. keye, key, kay, AS. c[ae]g.] 1. An instrument by means of which the bolt of a lock is shot or drawn; usually, a removable metal instrument fitted to the mechanism of a particular lock and operated by turning in its place … The Collaborative International Dictionary of English
Key of a country — Key Key (k[=e]), n. [OE. keye, key, kay, AS. c[ae]g.] 1. An instrument by means of which the bolt of a lock is shot or drawn; usually, a removable metal instrument fitted to the mechanism of a particular lock and operated by turning in its place … The Collaborative International Dictionary of English
Key of a position — Key Key (k[=e]), n. [OE. keye, key, kay, AS. c[ae]g.] 1. An instrument by means of which the bolt of a lock is shot or drawn; usually, a removable metal instrument fitted to the mechanism of a particular lock and operated by turning in its place … The Collaborative International Dictionary of English