-
1 data integrity
"The accuracy of data and its conformity to its expected value, especially after being transmitted or processed." -
2 DATA INTEGRITY
-
3 data
[΄deitə] n pl տվյալներ, տեղեկություններ, փաստեր. official/statistic/advanced data պաշ տոնական/վիճակագրական/նորագույն տվյալներ. collect/obtain data տվյալներ հավաքել. data processing տվյալների մշակում: հմկրգ. data base տվյալների բազա. data access տվյալ ների ընտ րելը. data acquisition տվյալների կուտակումը. data adressed memory զուգոր դական հիշողություն. data area տվյալ նե րի տի րույթ. data bank տվյալների բանկ. data channel ին ֆոր մա ցիոն ալիք. data communication տվյալների փոխանցում. data consistancy տվյալ ների անհա կասելիություն. data domain ա ռարկայական տիրույթ. data entry տվյալների մուտ քագրում. data flow տվյալնե րի հոսք. data input տվյալ ների մուտ քագրում. data integrity տվյալնե րի ամբողջականություն. data network տվյալների փոխանցման ցանց. data rate տվյալ ների հա ղորդ ման արագություն. data set տվյալ ների հա վաքածու. data validation տվյալների ճշտության ստու գում/հիմնավորում -
4 data model
"A collection of related object types, operators, and integrity rules that form the abstract entity supported by a database management system (DBMS). Thus, one speaks of a relational DBMS, a network DBMS, and so on, depending on the type of data model a DBMS supports. In general, a DBMS supports only one data model as a practical rather than a theoretical restriction." -
5 Secure Sockets Layer
"The protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation." -
6 SSL
"The protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation." -
7 ar-sa عامل تصفية
"The study or analysis of codes and encoding methods used to secure information. Cryptography is used to provide confidentiality, data integrity, authentication (entity and data origin), and nonrepudiation." -
8 cryptography
"The study or analysis of codes and encoding methods used to secure information. Cryptography is used to provide confidentiality, data integrity, authentication (entity and data origin), and nonrepudiation." -
9 fault tolerance
"The ability of computer hardware or software to ensure data integrity when hardware failures occur. Fault-tolerant features appear in many server operating systems and include mirrored volumes, RAID-5 volumes, and server clusters." -
10 Safe Harbor Principles
"Seven principles agreed to by the United States and the European Union for the transfer of PII from the European Union to the United States, which a company must adhere to if it registers for Safe Harbor. The seven principles are categorized into the following subjects: (1) Notice; (2) Choice; (3) Access; (4) Onward Transfer; (5) Security; (6) Data Integrity; and (7) Enforcement." -
11 maintenance rule
"A rule that is executed by the SharePoint Maintenance Manager to identify problems that are related to configuration settings, data integrity, performance, security, and other issues." -
12 digital signature
"Data that binds a sender's identity to the information being sent. A digital signature may be bundled with any message, file, or other digitally encoded information, or transmitted separately. Digital signatures are used in public key environments and provide authentication and integrity services." -
13 signature
"Data that binds a sender's identity to the information being sent. A digital signature may be bundled with any message, file, or other digitally encoded information, or transmitted separately. Digital signatures are used in public key environments and provide authentication and integrity services." -
14 recover
"To put back into a stable condition. A computer user may be able to recover lost or damaged data by using a program to search for and salvage whatever information remains in storage. A database may be recovered by restoring its integrity after some problem has damaged it, such as abnormal termination of the database management program." -
15 Message Authentication Code
An algorithm that allows a receiver to ensure that a block of data has retained its integrity from the time it was sent until the time it was received.English-Arabic terms dictionary > Message Authentication Code
-
16 MAC
An algorithm that allows a receiver to ensure that a block of data has retained its integrity from the time it was sent until the time it was received.
См. также в других словарях:
Data integrity — in its broadest meaning refers to the trustworthiness of system resources over their entire life cycle. In more analytic terms, it is the representational faithfulness of information to the true state of the object that the information represents … Wikipedia
Data Integrity — [engl.], Datenintegrität … Universal-Lexikon
data integrity — duomenų vientisumas statusas Aprobuotas sritis informacija, informacinės technologijos ir informacinė visuomenė apibrėžtis Elektroninės informacijos savybė – elektroninė informacija nebuvo atsitiktinai ar neteisėtai pakeista ar sunaikinta.… … Lithuanian dictionary (lietuvių žodynas)
data integrity — duomenų nepažeistumas statusas T sritis informatika apibrėžtis Duomenų tapatumo išsaugojimas juos laikant, perkeliant į kitą vietą, persiunčiant tinklu. Duomenys turi išlikti absoliučiai tokie pat, kokie buvo pradžioje. Tai gali užtikrinti… … Enciklopedinis kompiuterijos žodynas
data integrity — duomenų vientisumas statusas T sritis informatika apibrėžtis Perduodamų ir apdorojamų duomenų suderinamumas, tikslumas ir neprieštaringumas. atitikmenys: angl. data integrity ryšiai: dar žiūrėk – apsauga … Enciklopedinis kompiuterijos žodynas
Data Integrity Field — DIF stands for Data Integrity Field. The purpose of this field is to provide End to End data protection in Computer/Enterprise data storage methodology. Data integrity concerns are not new, and protection mechanisms abound. Packet based storage… … Wikipedia
Data integrity — An ISO term. The property that data has not been altered or destroyed in an unauthorised manner … International financial encyclopaedia
data integrity — A measure of accuracy based on error detection … IT glossary of terms, acronyms and abbreviations
Data warehouse — Overview In computing, a data warehouse (DW) is a database used for reporting and analysis. The data stored in the warehouse is uploaded from the operational systems. The data may pass through an operational data store for additional operations… … Wikipedia
Integrity constraints — are used to ensure accuracy and consistency of data in a relational database. Data integrity is handled in a relational database through the concept of referential integrity. There are many types of integrity constraints that play a role in… … Wikipedia
Data quality — Data are of high quality if they are fit for their intended uses in operations, decision making and planning (J. M. Juran). Alternatively, the data are deemed of high quality if they correctly represent the real world construct to which they… … Wikipedia