-
1 user-level security
"When using user-level security in an Access database, a database administrator or an object's owner can grant individual users or groups of users specific permissions to tables, queries, forms, reports, and macros." -
2 database management system
A layer of software between the physical database and the user. The DBMS manages all access to the database.English-Arabic terms dictionary > database management system
-
3 database object
"A database component (for example, a table, index, trigger, view, key, constraint, default, rule, user-defined data type, or stored procedure in a database)." -
4 user account system
The LAN Manager user account database. -
5 Database restore
A dialog box that enables the user to select the data file to use when restoring a database. -
6 referenced database
The database to which the user has established a reference from the current database. The user can create a reference to a database and then call procedures within standard modules in that database. -
7 model database
A database that is installed with Microsoft SQL Server and that provides the template for new user databases. SQL Server creates a database by copying in the contents of the model database and then expanding the new database to the size requested. -
8 Share Database
"An option, found on the Business Contact Manager menu, in the Database Tools selection, that enables the user to share all information in a database." -
9 Access database engine
Part of the Access database system that retrieves and stores data in user and system databases. The engine can be thought of as a data manager on which database systems are built. -
10 authentication database
A database on a server that matches user names to passwords. -
11 multiuser shared database
A database that permits more than one user to access and modify the same set of data at the same time. -
12 Restore Database
A button on a BCM wizard that enables the user to revert the database to a previous state. -
13 accounts database
A database which stores user accounts and their network access properties. -
14 Manage Database
"An option, located on the Business Contact Manager menu, in the Database Tools selection, that enables a user to manage their databases." -
15 PerformancePoint Settings Database
"A PerformancePoint-specific database that stores the annotations for each dashboard element, user-based filter selections, and other information about dashboard elements."English-Arabic terms dictionary > PerformancePoint Settings Database
-
16 social database
"A database that is used to store social tagging information for a user, i.e. Social Comment or Social Tag or Social Rating." -
17 Net Logon service
"A user-mode service that runs in the Windows security subsystem. The Net Logon service passes the user`s credentials through a secure channel to the domain database and returns the domain security identifiers and user rights for the user. In addition, the Net Logon service performs a variety of other functions related to the user logon process, such as periodic password updates for computer accounts and domain controller discovery." -
18 federated domain
"A domain that is engaged in a trust relationship with another domain, which is also called a federation. This relationship is between two federation servers, and allows a system to provide controlled access to its resources or services to a user that belongs to another security realm without requiring the user to authenticate directly to the system and without the two systems sharing a database of user identities or passwords." -
19 security-enabled workgroup
An Access workgroup in which users log on with a user name and password and in which access to database objects is restricted according to permissions granted to specific user accounts and groups.English-Arabic terms dictionary > security-enabled workgroup
-
20 DBMS
A layer of software between the physical database and the user. The DBMS manages all access to the database.
- 1
- 2
См. также в других словарях:
Database activity monitoring — (DAM) is a database security technology for monitoring and analyzing database activity that operates independently of the database management system (DBMS) and does not rely on any form of native (DBMS resident) auditing or native logs such as… … Wikipedia
Database security — concerns the use of a broad range of information security controls to protect databases (potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated network links)… … Wikipedia
Database Forensics — is a computer science term referring to the forensic study of databases. Definition of Computer forensics:“Gathering and analyzing data in a manner as free from distortion or bias as possible to reconstruct data or what has happened in the past… … Wikipedia
Database — A database is an organized collection of data for one or more purposes, usually in digital form. The data are typically organized to model relevant aspects of reality (for example, the availability of rooms in hotels), in a way that supports… … Wikipedia
Database forensics — Forensic science Physiological sciences … Wikipedia
Database audit — Database auditing involves observing a database so as to be aware of the actions of database users. Database administrators and consultants often set up auditing for security purposes, for example, to ensure that those without the permission to… … Wikipedia
Database Programmer's Toolkit — (DPT) is a freeware product which emulates CCA s Model 204 DBMS. DPT was created by Richard Groves in September 2004 (Version 0.1) as a basic Model 204 emulator where User Language code could be executed without the need for a mainframe. The… … Wikipedia
Database administration and automation — Database administration is the function of managing and maintaining database management systems (DBMS) software. Mainstream DBMS software such as Oracle, IBM DB2 and Microsoft SQL Server need ongoing management. As such, corporations that use… … Wikipedia
User Datagram Protocol — (UDP) is one of the core protocols of the Internet Protocol Suite. Using UDP, programs on networked computers can send short messages sometimes known as datagrams (using Datagram Sockets) to one another. UDP is sometimes called the Universal… … Wikipedia
Database management system — A database management system (DBMS) is a software package with computer programs that control the creation, maintenance, and the use of a database. It allows organizations to conveniently develop databases for various applications by database… … Wikipedia
User-defined function — A User Defined Function, or UDF, is a function provided by the user of a program or environment, in a context where the usual assumption is that functions are built into the program or environment.BASIC languageIn some old implementations of the… … Wikipedia