-
1 modifier key
"A keyboard key that, when pressed (and held), changes the actions of ordinary input." -
2 Data Encryption Standard
"An encryption algorithm that uses a 56-bit key and maps a 64-bit input block to a 64-bit output block. The key appears to be a 64-bit key, but one bit in each of the eight bytes is used for odd parity, resulting in 56 bits of usable key." -
3 DES
"An encryption algorithm that uses a 56-bit key and maps a 64-bit input block to a 64-bit output block. The key appears to be a 64-bit key, but one bit in each of the eight bytes is used for odd parity, resulting in 56 bits of usable key." -
4 dongle
A security device connected to an input/output port to permit the use of a particular software package on that computer. The use of the hardware key hash permits backup copying of software but prevents its unlicensed use on additional computers. -
5 hash algorithm
"An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1." -
6 hash function
"An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1." -
7 Exchange by Phone
A feature that allows a Unified Messaging-enabled user to access their Microsoft Exchange Server mailbox over the telephone. Users can navigate through their mailboxes using telephone-key or Speech input. -
8 pseudo-random function
"A function that takes a key, label, and seed as input, then produces an output of arbitrary length." -
9 PRF
"A function that takes a key, label, and seed as input, then produces an output of arbitrary length." -
10 Outlook Voice Access
A feature that allows a Unified Messaging-enabled user to access their Microsoft Exchange Server mailbox over the telephone. Users can navigate through their mailboxes by using telephone-key or Speech input.
См. также в других словарях:
key — key1 [kē] n. pl. keys [ME keye < OE cæge, akin to OFris kei, kēia, to secure, guard] 1. an instrument, usually of metal, for moving the bolt of a lock and thus locking or unlocking something 2. any of several instruments or mechanical devices… … English World dictionary
Key performance indicator — Key Performance Indicators (KPI) are financial and non financial metrics used to help an organization define and measure progress toward organizational goals [ [http://management.about.com/cs/generalmanagement/a/keyperfindic.htm Key Performance… … Wikipedia
Input method — An input method is an operating system component or program that allows users to enter characters and symbols not found on their input device. For instance, on the computer, this allows the user of keyboards to input Chinese, Japanese, Korean and … Wikipedia
Input device — In computing, an input device is any peripheral (piece of computer hardware equipment) used to provide data and control signals to an information processing system such as a computer or other information appliance. Input and output devices make… … Wikipedia
Key derivation function — KDF redirects here. For the Nazi organization, see Kraft durch Freude In cryptography, a key derivation function (or KDF) is a function which derives one or more secret keys from a secret value and/or other known information such as a password or … Wikipedia
Input-output model — The Input output model of economics uses a matrix representation of a nation s (or a region s) economy to predict the effect of changes in one industry on others and by consumers, government, and foreign suppliers on the economy. This model, if… … Wikipedia
Input selector — A&V A routing switcher or auxiliary bus used to expand the number of video or key inputs that can feed an input of a digital picture manipulator or keyer. Many keyers only accept one key source and fill, but by connecting an input selector to… … Audio and video glossary
key in — [verb] type, enter, input, keyboard * * * key in (computing) To enter (data) by operating a keyboard • • • Main Entry: ↑key * * * ˌkey ˈin [transitive] [present tense I/you/we/they … Useful english dictionary
Key Tronic — Infobox Company company name = Key Tronic EMS company company type = Corporation company slogan = foundation = 1969 location = Spokane, WA key people = num employees = industry = Computer peripherals products = Keyboards revenue = $48.6 million… … Wikipedia
key-punch — /ˈki pʌntʃ/ (say kee punch) verb (i) 1. to use a key punch. –verb (t) 2. to input (data) using a key punch. –key puncher, noun …
key press — noun a) The depression of an input key; a keystroke. b) The buffered electrical signal resulting from such an event, sometimes distinguished from the release … Wiktionary