-
1 process
I[΄prəuses] n ընթացք. գործընթաց. պրոցես. in the process of ընթացքում. due process of law իրավ. պատշաճ իրավական ընթացակարգII[΄prəuses] v մշակել. process leather/information/ film մշակել կաշին/տեղեկատ վությու նը/տեղեկությունը. ժապավենը երևակել -
2 process event
"One or more recommendation work streams that are bundled and executed simultaneously and time-constrained, and which use compensation information for a group of employees to create date-specific employee compensation records. A process event can be as simple as an anniversary-based merit increase for one employee, or as complex as an annual enterprise-wide combined compensation process." -
3 process accounting
A feature of Internet Information Services (IIS) that administrators can use to monitor and log resource consumption of Common Gateway Interface (CGI) scripts and out-of-process applications. -
4 Process Arrows
A SmartArt graphic layout used to show information illustrating a process or workflow. Level 1 text appears in the circular shapes and Level 2 text appears in the arrow shapes. Works best for minimal text and to emphasize movement or direction. -
5 Process List
"A SmartArt graphic layout used to show multiple groups of information or steps and sub-steps in a task, process, or workflow. Level 1 text corresponds to the top horizontal shapes, and Level 2 text corresponds to vertical sub-steps under each related top-level shape." -
6 information
"The meaning of data as it is intended to be interpreted by people. Data consists of facts, which become information when they are seen in context and convey meaning to people. Computers process data without any understanding of what the data represents." -
7 process
The virtual address space and the control information necessary for the execution of a program. -
8 Closed Chevron Process
"A SmartArt graphic layout used to show a progression, a timeline, or sequential steps in a task, process, or workflow, or to emphasize movement or direction. Can be used to emphasize information in the starting shape. Works best with Level 1 text only." -
9 authorization
"The process of granting a person, computer process, or device access to certain information, services or functionality. Authorization is derived from the identity of the person, computer process, or device requesting access, which is verified through authentication." -
10 named pipe
"A portion of memory that can be used by one process to pass information to another process, so that the output of one is the input of the other. The second process can be local (on the same computer as the first) or remote (on a networked computer)." -
11 primary token
An access token assigned to a process to represent the default information for that process. It is used in security operations by a thread working on behalf of the process itself rather than on behalf of a client. -
12 Grouped List
"A SmartArt graphic layout used to show groups and sub-groups of information, or steps and sub-steps in a task, process, or workflow. Level 1 text corresponds to the top-level horizontal shapes, and Level 2 text corresponds to vertical sub-steps under each related top-level shape. Works well for emphasizing sub-groups or sub-steps, hierarchical information, or multiple lists of information." -
13 impersonation token
"An access token that captures the security information of a client process, allowing a service to ""impersonate"" the client process in security operations." -
14 Control chart
"A chart that displays additional information about a graph in terms of the following control lines: Average, Upper limit (calculated based on natural process deviation and six sigma technique), and Lower limit (calculated based on natural process deviation and six sigma technique)." -
15 system
"Any application or process that you want to model. Examples of systems include a computer game, a process for assembling microchips, and a library information system." -
16 pass-through authentication
"The process by which a user account is authenticated when the computer being used for the logon is not a domain controller in the domain where the user account is defined and is also not the computer where the account is defined. In this process, the computer passes the logon information through to a domain controller (directly or indirectly) where the user account is defined."English-Arabic terms dictionary > pass-through authentication
-
17 Annual Report Preparation
"A template that addresses, from a Finance & Accounting view, the general activities that define a typical effort to prepare an Annual Financial Report. Includes activities focused on obtaining the necessary information from multiple departments, to working with other departments (e.g., Legal and Public Relations) to ensure all required information is presented accurately, and up through the printing and distribution process." -
18 inverse multiplexing
"The process whereby bandwidth enables a call to transmit more information at the same time in the same timeframe than information from a single signal transmitted over a single channel. This is accomplished by splitting a single high-speed channel into multiple signals, transmitting the multiple signals over multiple facilities operating at a lower rate than the original signal, and then recombining the separately transmitted portions into the original signal at the original rate." -
19 tracing
The process of capturing and displaying debugging information about a Web page as the page is running. Tracing information includes HTTP headers and control state. You can display trace output in the page or in a separate trace viewer. -
20 Alternating Flow
"A SmartArt graphic layout used to show groups of information or sequential steps in a task, process, or workflow. Emphasizes the interaction or relationships among the groups of information."
См. также в других словарях:
Information engineering — (IE) or information engineering methodology (IEM) in software engineering is an approach to designing and developing information systems. Contents 1 Overview 2 History 3 Information engineering topics … Wikipedia
Process mining — techniques allow for the analysis of business processes based on event logs. They are often used when no formal description of the process can be obtained by other means, or when the quality of an existing documentation is questionable. For… … Wikipedia
Information management — (IM) is the collection and management of information from one or more sources and the distribution of that information to one or more audiences. This sometimes involves those who have a stake in, or a right to that information. Management means… … Wikipedia
Process (computing) — In computing, a process is an instance of a computer program that is being executed. It contains the program code and its current activity. Depending on the operating system (OS), a process may be made up of multiple threads of execution that… … Wikipedia
process — [[t]pro͟ʊses, AM prɑ͟ːses[/t]] ♦ processes, processing, processed 1) N COUNT: oft supp N, N of n A process is a series of actions which are carried out in order to achieve a particular result. There was total agreement to start the peace process… … English dictionary
process — 01. In recent months, a [process] has begun in North and South Korea which the people there hope will lead to the eventual reunification of the two countries. 02. It is important to learn a [process] which will help you to deduce the meaning of… … Grammatical examples in English
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Information assurance — (IA) is the practice of managing information related risks. More specifically, IA practitioners seek to protect and defend information and information systems by ensuring confidentiality, integrity, authentication, availability, and non… … Wikipedia
Information Engineering — (IE) or Information Engineering Methodology (IEM) is an approach to designing and developing information systems. It has a somewhat chequered history that follows two very distinct threads. It is said to have originated in Australia between 1976… … Wikipedia
Process Oriented Psychology — (POP) refers to a body of theory and practice that encompasses a broad range of psychotherapeutic, personal growth, and group process applications. It is more commonly called Process Work in the United States, the longer name being used in Europe … Wikipedia
Information technology audit process — Information technology audit process:Generally Accepted Auditing Standards (GAAS)In 1947, the American Institute of Certified Public Accountants (AICPA) adopted GAAS to establish standards for audits. The standards cover the following three… … Wikipedia