-
1 virtual network
A virtual version of a physical network switch. A virtual network can be configured to provide access to local or external network resources for one or more virtual machines. -
2 restricted network
A logical portion of the network where client computers that either do not meet health policy or are not capable of asserting that they meet health policy are placed. Computers in the restricted network cannot initiate communication to resources in the secure network. -
3 peer-to-peer network
"A group of computers that are connected on a network and share resources, such as printers and files." -
4 Computer Browser service
A service that maintains an up-to-date list of computers that share resources on your network and that supplies the list to programs that request it. The Computer Browser service is used to view a list of available network resources. -
5 claims-based identity
"A unique identifier that represents a specific user, application, computer, or other entity, enabling it to gain access to multiple resources, such as applications and network resources, without entering credentials multiple times. It also enables resources to validate requests from an entity." -
6 admission control
The service used to administratively control network resources on shared network segments. -
7 credentials
"Information that includes identification and proof of identification that is used to gain access to local and network resources. Examples of credentials are user names and passwords, smart cards, and certificates." -
8 domain controller
"In an Active Directory forest, a server that contains a writable copy of the Active Directory database, participates in Active Directory replication, and controls access to network resources." -
9 domain administrator
"A person who is a member of the Domain Admins group. Domain administrators can create, delete, and manage all objects that reside within the domain in which they are administrators. They can also assign and reset passwords and delegate administrative authority for network resources to other trusted users." -
10 Credential Provider
"A tool that provides information, which includes identification and proof of identification, that is used to gain access to local and network resources." -
11 DC
"In an Active Directory forest, a server that contains a writable copy of the Active Directory database, participates in Active Directory replication, and controls access to network resources."DC -
12 content access account
"An account used to crawl Web sites, servers and network resources included in a content index." -
13 access account
"An account used to crawl Web sites, servers and network resources included in a content index." -
14 crawling account
"An account used to crawl Web sites, servers and network resources included in a content index." -
15 Remote Desktop
"A Windows feature that allows users to connect remotely to a computer and access programs, files, and network resources as though they were sitting at the computer." -
16 Windows Fingerprint Credential Provider
The Windows component that provides fingerprint information that is used to gain access to local and network resources.English-Arabic terms dictionary > Windows Fingerprint Credential Provider
-
17 sign-in info
"Information that includes identification and proof of identification that is used to gain access to local and network resources. Examples of credentials are user names and passwords, smart cards, and certificates." -
18 sign-in information
"Information that includes identification and proof of identification that is used to gain access to local and network resources. Examples of credentials are user names and passwords, smart cards, and certificates." -
19 Remote Desktop
"The app that allows users to connect remotely to a computer and access programs, files, and network resources as though they were sitting at the computer." -
20 namespace
"A naming convention that defines a set of unique names for resources in a network. For DNS, a hierarchical naming structure that identifies each network resource and its place in the hierarchy of the namespace. For WINS, a flat naming structure that identifies each network resource using a single, unique name. For DFS Namespaces, a virtual tree of folders that begins with \\ServerOrDomainName\RootName."
- 1
- 2
См. также в других словарях:
Network Access Control — (NAC) is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security… … Wikipedia
Network congestion avoidance — is a process used in computer networks to avoid congestion.The fundamental problem is that all network resources are limited, including router processing time and link throughput. Eg.: *today s (2006) Wireless LAN effective bandwidth throughput… … Wikipedia
Network Load Balancing — (commonly referred to as dual WAN routing or multihoming) is the ability to balance traffic across two WAN links without using complex routing protocols like BGP. This capability balances network sessions like Web, email, etc. over multiple… … Wikipedia
Network operating system — A networking operating system (NOS), also referred to as the Dialoguer,[1] is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions.[2] The network… … Wikipedia
Network virtualization — In computing, Network Virtualization is the process of combining hardware and software network resources and network functionality into a single, software based administrative entity, a virtual network. Network virtualization involves platform… … Wikipedia
Network congestion — In data networking and queueing theory, network congestion occurs when a link or node is carrying so much data that its quality of service deteriorates. Typical effects include queueing delay, packet loss or the blocking of new connections. A… … Wikipedia
Network management model — The ISO under the direction of the OSI group has created a network management model as the primary means for understanding the major functions of network management systems. The model in question is interchangeably called either the OSI network… … Wikipedia
Network Integration Transmission Service — A service that allows the customer to integrate, plan, dispatch, and regulate its Network Resources … Energy terms
Network-Centric Service-Oriented Enterprise (NCSOE) — is a new generation enterprise capable of conducting collaboration and management of internal and external information. Using Network Centric Enterprise Services (NCES) , the enterprise can now enforce information and decision superiority in a… … Wikipedia
Network management — refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems.[1] Operation deals with keeping the network (and the services that the network provides)… … Wikipedia
Network Agility — is an architectural discipline for computer networking. It can be defined as: The ability of network software and hardware to automatically control and configure itself and other network assets across any number of devices on a network. With… … Wikipedia