-
41 deferred enforcement
A stage of deployment that allows a noncompliant computer full access to the network until a date and time after which network access becomes restricted. Deferred enforcement provides a client computer sufficient time to remediate before health policy is enforced. -
42 NAP
"A set of operating system components that can help protect access to a private network by enforcing health policies. System administrators establish health policies which NAP enforces by inspecting and assessing the health of client computers, restricting network access when client computers are deemed noncompliant, and remediating noncompliant client computers for full network access. NAP also provides ongoing health compliance enforcement while a client computer is connected to a network." -
43 data transfer
"The movement of information from one location to another, either within a computer (as from a disk drive to memory), between a computer and an external device (as between a file server and a computer on a network), or between separate computers." -
44 Voice over Internet Protocol
"The use of the Internet Protocol (IP) for transmitting voice communications. VoIP delivers digitized audio in packet form and can be used to transmit over intranets, extranets, and the Internet. It is essentially an inexpensive alternative to traditional telephone communication over the circuit-switched Public Switched Telephone Network (PSTN). VoIP covers computer-to-computer, computer-to-telephone, and telephone-based communications. For the sake of compatibility and interoperability, a group called the VoIP Forum promotes product development based on the ITU-T H.323 standard to transmit multimedia over the Internet."English-Arabic terms dictionary > Voice over Internet Protocol
-
45 Remote Installation Server
"An optional component that remotely installs Windows XP Professional. RIS installs the operating system on remote boot-enabled client computers by connecting the computer to the network, starting the client computer, logging on with a valid user account, and copying an operating system image to the client computer."English-Arabic terms dictionary > Remote Installation Server
-
46 VoIP
"The use of the Internet Protocol (IP) for transmitting voice communications. VoIP delivers digitized audio in packet form and can be used to transmit over intranets, extranets, and the Internet. It is essentially an inexpensive alternative to traditional telephone communication over the circuit-switched Public Switched Telephone Network (PSTN). VoIP covers computer-to-computer, computer-to-telephone, and telephone-based communications. For the sake of compatibility and interoperability, a group called the VoIP Forum promotes product development based on the ITU-T H.323 standard to transmit multimedia over the Internet." -
47 Voice over IP
"The use of the Internet Protocol (IP) for transmitting voice communications. VoIP delivers digitized audio in packet form and can be used to transmit over intranets, extranets, and the Internet. It is essentially an inexpensive alternative to traditional telephone communication over the circuit-switched Public Switched Telephone Network (PSTN). VoIP covers computer-to-computer, computer-to-telephone, and telephone-based communications. For the sake of compatibility and interoperability, a group called the VoIP Forum promotes product development based on the ITU-T H.323 standard to transmit multimedia over the Internet." -
48 local machine
"The computer that you are currently logged on to as a user. More generally, a local computer is a computer that you can access directly without using a communications line or a communications device, such as a network adapter or a modem." -
49 address mask
"A number that, when compared by the computer with a network address number, will block out all but the necessary information. For example, in a network that uses XXX.XXX.XXX.YYY and where all computers within the network use the same first address numbers, the mask will block out XXX.XXX.XXX and use only the significant numbers in the address, YYY." -
50 service set identifier
"A unique set of letters or numbers that identifies a wireless network. For a computer or device to connect to a wireless network, it must supply that network’s SSID. An SSID can be up to 32 characters."معرف مجموعة الخدمات -
51 SSID
"A unique set of letters or numbers that identifies a wireless network. For a computer or device to connect to a wireless network, it must supply that network’s SSID. An SSID can be up to 32 characters." -
52 upload
To transfer a copy of a file from a local computer to a remote computer by means of a modem or network.يحمّل -
53 remote procedure call
"A communication mechanism that allows computers to communicate with one another over a network. An RPC consists of a procedure identifier, parameters passed to the procedure, and a value returned to the caller (client computer) after the procedure has executed on the remote system (server computer)."استدعاء إجراء عن بُعد -
54 RPC
"A communication mechanism that allows computers to communicate with one another over a network. An RPC consists of a procedure identifier, parameters passed to the procedure, and a value returned to the caller (client computer) after the procedure has executed on the remote system (server computer)." -
55 shortcut
"A link to any item accessible on your computer or on a network, such as a program or application, file, folder, disk drive, printer, or another computer. You can put shortcuts in various areas, such as on the desktop, on the Start menu, or in specific folders." -
56 upload
"In communications, the process of transferring a copy of a file from a local computer to a remote computer by means of a modem or network." -
57 local user
A person who uses a computer that is not connected to a network. A local user is most likely someone using a computer at home. -
58 modem server
"A server that manages a group of modems. When someone on a network dials out from a computer, or dials in to a computer from another location, the server provides the next available modem to make the connection." -
59 hacker
A programmer or computer user who attempts illegal access to a computer system or network. -
60 Remote Desktop
"A Windows feature that allows users to connect remotely to a computer and access programs, files, and network resources as though they were sitting at the computer."
См. также в других словарях:
Computer network — Computer networks redirects here. For the periodical, see Computer Networks (journal). Datacom redirects here. For other uses, see Datacom (disambiguation). Internet map. The Internet is a global system of interconnected computer networks that… … Wikipedia
Computer Network — [dt. Computernetz], Netzwerk … Universal-Lexikon
computer network — kompiuterių tinklas statusas T sritis automatika atitikmenys: angl. computer network vok. Computernetz, n; Computernetzwerk, n; Rechnernetz, n; Rechnerverbund, m rus. вычислительная сеть, f; сеть вычислительных машин, f pranc. réseau d ordinateur … Automatikos terminų žodynas
Computer Network Operations — (CNO) (dt. Computer Netzwerk Operationen) ist ein militärischer Begriff der mehrere Unterbegriffe umfasst. Inhaltsverzeichnis 1 Computer Network Attack 2 Computer Network Defense 3 Computer Network Exploitation … Deutsch Wikipedia
Computer network operations — (CNO) is a broad term that has both military and civilian application. Conventional wisdom is that information is power, and more and more of the information necessary to make decisions is digitized and conveyed over an ever expanding network of… … Wikipedia
Computer network diagram — A sample network diagram A computer network diagram is a schematic depicting the nodes and connections amongst nodes in a computer network or, more generally, any telecommunications network. Contents … Wikipedia
Computer network programming — In computing, network programming, essentially identical to socket programming or client–server programming, involves writing computer programs that communicate with other programs across a computer network. The program or process initiating the… … Wikipedia
computer network attack — Operations to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves. Electronic attack (EA) can be used against a computer, but it is not computer network attack (CNA) … Military dictionary
computer network defense — Defensive measures to protect and defend information, computers, and networks from disruption, denial, degradation, or destruction. Also called CND. See also computer network attack … Military dictionary
computer network engineer — kompiuterių tinklo inžinierius statusas T sritis profesijos apibrėžtis Inžinierius, atsakingas už kompiuterių tinklo planavimą, projektavimą, įrengimą, techninę priežiūrą ir remontą. atitikmenys: angl. computer network engineer pranc. ingénieur… … Inžinieriai, technikai ir technologai. Trikalbis aiškinamasis žodynėlis
computer network — also called Network, two or more computers that are connected with one another for the purpose of communicating data electronically. Besides physically connecting computer and communication devices, a network system serves the important… … Universalium