-
21 Enter remote call control URI
"An option in the Manually Configure Phone Integration dialog box where the user enters his phone number in the required format. To access this dialog box, click the Configure button in the Options dialog box, on the Accounts tab."English-Arabic terms dictionary > Enter remote call control URI
-
22 remote control software
"Software designed to provide access to a computer from a remote location. These programs are often installed by the computer owner or administrator, and are only a risk if unexpected." -
23 Ease of Access Center
An area within the Control Panel that provides accessibility options and settings to help users interact more easily with the computer. -
24 Test Access Port
"A collection of boundary scan control signals that define a serial protocol for scan-based devices. There are five pins, TCK/clock, TMS/mode select, TDI/data in, TDO/data out, and TRST/reset." -
25 Audit and Control Management Server
"A Microsoft Office product that provides non-intrusive auditing of changes made to Excel spreadsheets and Access databases, and supports alerts, notifications and automatic workflows based on user activities such as macro or formula changes."English-Arabic terms dictionary > Audit and Control Management Server
-
26 Format Painter
"A feature that replicates formatting from a source item — such as text in Word, a cell in Excel, a control in Access, or a shape in Publisher — to one or more target items." -
27 organization model
"Internal control, data access, and performance reporting structures designed to divide responsibility for human and operations resources and work processes." -
28 ar-sa التحكم بالوصول
"An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object." -
29 ACE
"An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object." -
30 Host Credentials Authorization Protocol
A protocol used by Access Control Server (ACS) to send and receive statements of health to and from other NAP infrastructure components. HCAP is installed on NPS so that it can function with Access Control Server (ACS).English-Arabic terms dictionary > Host Credentials Authorization Protocol
-
31 HCAP
A protocol used by Access Control Server (ACS) to send and receive statements of health to and from other NAP infrastructure components. HCAP is installed on NPS so that it can function with Access Control Server (ACS). -
32 IP allow list
"A list of IP addresses that are considered ""safe"" by an authority. IP addresses in this list are allowed access to a given resource or web service and are thereby excluded from further processing of access control policies that would otherwise be used to determine the validity of that clients request for access. For example, an IP allow list can be used to exclude a trusted set of clients from needing to use a second-factor of authentication to sign in to a web service, while other clients that are not in the list would have no other choice but to provide a second-factor method to be successfully authenticated." -
33 ACL
"In Windows-based systems, a list of access control entries (ACE) that apply to an entire object, a set of the object's properties, or an individual property of an object, and that define the access granted to one or more security principals." -
34 DACL
An access control list that is controlled by the owner of an object and that specifies the access particular users or groups can have to the object. -
35 filtered group
"A local security group that is removed from an access token. When User Account Control (UAC) creates the filtered access token, the filtered groups are removed."مجموعة مُصفاة -
36 header block
"In SOAP, an element placed in the Header element and which contains control information. For example, information that influences payload processing, such as a credentials element that helps control access to the operation." -
37 Family Safety
"An item in the Windows Control Panel that enables users to access Parental Controls and other third-party parental control features, such as web filters." -
38 Address Resolution Protocol
"In TCP/IP, a protocol that uses broadcast traffic on the local network to resolve a logically assigned Internet Protocol version 4 (IPv4) address to its physical hardware or media access control (MAC layer address. In asynchronous transfer mode (ATM), ARP is used two different ways. For classical IPv4 over ATM (CLIP), ARP is used to resolve addresses to ATM hardware addreses. For ATM LAN emulation (LANE), ARP is used to resolve Ethernet/802.3 or Token Ring addresses to ATM hardware addresses."English-Arabic terms dictionary > Address Resolution Protocol
-
39 ARP
"In TCP/IP, a protocol that uses broadcast traffic on the local network to resolve a logically assigned Internet Protocol version 4 (IPv4) address to its physical hardware or media access control (MAC layer address. In asynchronous transfer mode (ATM), ARP is used two different ways. For classical IPv4 over ATM (CLIP), ARP is used to resolve addresses to ATM hardware addreses. For ATM LAN emulation (LANE), ARP is used to resolve Ethernet/802.3 or Token Ring addresses to ATM hardware addresses." -
40 inheritance
A mechanism that allows a given access control entry (ACE) to be copied from the container where it was applied to all children of the container. Inheritance can be combined with delegation to grant administrative rights to a whole subtree of the directory in a single update operation.
См. также в других словарях:
List of highway systems with full control of access and no cross traffic — Many countries have national networks of highways with full control of access and no cross traffic. These do not always include all such highways or even all the major ones in the country.Asia*China: Expressways *Japan: Expressways *Indonesia:… … Wikipedia
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Access Control List — Muster einer ACL Eine Access Control List, auch ACL, deutsch Zugriffssteuerungsliste, ist eine Software Technik, mit der Betriebssysteme und Anwendungsprogramme Zugriffe auf Daten und Funktionen eingrenzen können. Eine ACL legt fest, welcher… … Deutsch Wikipedia
Control panel (web hosting) — A Control panel in web hosting refers to the interface provided by the hosting company for the maintenance and monitoring of the hosted website. Some of the commonly available modules in most control panels: * Access to server logs. * Details of… … Wikipedia
Access Control Matrix — or Access Matrix is an abstract, formal computer protection and security model used in computer systems, that characterizes the rights of each subject with respect to every object in the system. It was first introduced by Butler W. Lampson in… … Wikipedia
Access Control Entry — Access Control List Pour les articles homonymes, voir ACL. Access Control List (ACL), en français liste de contrôle d accès, désigne deux choses en sécurité informatique : un système permettant de faire une gestion plus fine des droits d… … Wikipédia en Français
Access Control Lists — Access Control List Pour les articles homonymes, voir ACL. Access Control List (ACL), en français liste de contrôle d accès, désigne deux choses en sécurité informatique : un système permettant de faire une gestion plus fine des droits d… … Wikipédia en Français
Access control list — Pour les articles homonymes, voir ACL. Access Control List (ACL), en français liste de contrôle d accès, désigne deux choses en sécurité informatique : un système permettant de faire une gestion plus fine des droits d accès aux fichiers que… … Wikipédia en Français
Access-list — Access Control List Pour les articles homonymes, voir ACL. Access Control List (ACL), en français liste de contrôle d accès, désigne deux choses en sécurité informatique : un système permettant de faire une gestion plus fine des droits d… … Wikipédia en Français
CONTROL-M — is batch scheduling software produced by BMC Software, originally written for mainframes but also available for distributed computing platforms including Unix, Windows, Linux and OpenVMS environments. BMC Software claims that CONTROL M is the… … Wikipedia
Access rights — can refer to: *Access to Information Act, a Canadian act that allows public access to government information *Disability rights movement, disabled access to public and private locations is a key issue *Access control, the ability to permit or… … Wikipedia