-
1 server process
"A process that hosts Component Object Model (COM) components. A COM component can be loaded into a surrogate server process, either on the client computer (local) or on another computer (remote). It can also be loaded into a client application process (in process)." -
2 authorization
"The process of granting a person, computer process, or device access to certain information, services or functionality. Authorization is derived from the identity of the person, computer process, or device requesting access, which is verified through authentication." -
3 named pipe
"A portion of memory that can be used by one process to pass information to another process, so that the output of one is the input of the other. The second process can be local (on the same computer as the first) or remote (on a networked computer)." -
4 pass-through authentication
"The process by which a user account is authenticated when the computer being used for the logon is not a domain controller in the domain where the user account is defined and is also not the computer where the account is defined. In this process, the computer passes the logon information through to a domain controller (directly or indirectly) where the user account is defined."English-Arabic terms dictionary > pass-through authentication
-
5 real-time
"Of or relating to a time frame imposed by external constraints. Real-time operations are those in which the computer's activities match the human perception of time or those in which computer operations proceed at the same rate as a physical or external process. Real-time operations are characteristic of aircraft guidance systems, transaction-processing systems, scientific applications, and other areas in which a computer must respond to situations as they occur (for example, animating a graphic in a flight simulator or making corrections based on measurements)." -
6 bootstrap
"The process of starting or resetting a computer. When first turned on (cold boot) or reset (warm boot), the computer runs the software that loads and starts the computer's operating system, which prepares it for use." -
7 network logon
"The process of logging on to a computer by means of a network. Typically, a user first interactively logs on to a local computer, then provides logon credentials to another computer on the network, such as a server, that he or she is authorized to use." -
8 hot docking
"The process of attaching a laptop computer to a docking station while the computer is running, and automatically activating the docking station's video display and other functions." -
9 upload
"In communications, the process of transferring a copy of a file from a local computer to a remote computer by means of a modem or network." -
10 autologon
The process of automatically logging on to the computer when the computer restarts. -
11 disk duplication
"The process of using third-party hardware or software to copy a full master Windows installation onto the hard disks of multiple destination computers. The master computer and destination computers must have compatible hardware abstraction layers (HALs). The destination computer can be delivered directly to customers, or it might require additional processing on the factory production line." -
12 attestation
"The process of verifying that a computer is really the computer it claims to be, and is running the software it claims to be running." -
13 test agent
"A background process that receives, runs, and reports on tests and collects data on a single computer. The test agent communicates with test agent controller, usually located on another computer." -
14 build agent
"A background process that receives, runs, and reports on Team Foundation Server builds and other property settings on a single computer. The build agent communicates with the build controller, usually located on another computer." -
15 authentication
"The process of verifying the identity of a user, computer, process, or other entity by validating the credentials provided by the entity. Common forms of credentials are digital signatures, smart cards, biometric data, and a combination of user names and passwords." -
16 system
"Any application or process that you want to model. Examples of systems include a computer game, a process for assembling microchips, and a library information system." -
17 local server
"An OLE server object implemented as an executable file that runs on the same computer as the client application. Because the server application is an executable file, it runs in its own process." -
18 vulnerability
"Any weakness, administrative process or act, or physical exposure that makes a computer susceptible to exploit by a threat." -
19 authorize
"To grant a person, computer process, or device access to certain information, services or functionality."يخوّل -
20 cold boot
"A startup process that begins with turning on the computer's power. Typically, a cold boot involves some basic hardware checking by the system, after which the operating system is loaded from disk into memory."
См. также в других словарях:
process computer — valdymo kompiuteris statusas T sritis automatika atitikmenys: angl. process computer vok. Prozeßrechner, m rus. управляющая электронная вычислительная машина, f pranc. ordinateur de commande des processus, m … Automatikos terminų žodynas
computer science — computer scientist. the science that deals with the theory and methods of processing information in digital computers, the design of computer hardware and software, and the applications of computers. [1970 75] * * * Study of computers, their… … Universalium
Computer-aided process planning — (CAPP) is the use of computer technology to aid in the process planning of a part or product, in manufacturing. CAPP is the link between CAD and CAM in that it provides for the planning of the process to be used in producing a designed part. [1]… … Wikipedia
Process (computing) — In computing, a process is an instance of a computer program that is being executed. It contains the program code and its current activity. Depending on the operating system (OS), a process may be made up of multiple threads of execution that… … Wikipedia
Computer programming — Programming redirects here. For other uses, see Programming (disambiguation). Software development process Activities and steps … Wikipedia
Computer-assisted translation — Part of a series on Translation Types Language interpretation … Wikipedia
Computer vision — is the field concerned with automated imaging and automated computer based processing of images to extract and interpret information. It is the science and technology of machines that see. Here see means the machine is able to extract information … Wikipedia
Computer-supported collaboration — (CSC) research focuses on technology that affects groups, organizations, communities and societies, e.g., voice mail and text chat. It grew from cooperative work study of supporting people s work activities and working relationships. As net… … Wikipedia
Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible … Wikipedia
Computer recycling — Computer monitors are typically packed into low stacks on wooden pallets for recycling and then shrink wrapped.[1] Computer recycling or electronic recycling is the recycling or reuse of computers or other electronics. It includes both finding… … Wikipedia
Computer-assisted language learning — (CALL) is succinctly defined in a seminal work by Levy (1997: p. 1) as the search for and study of applications of the computer in language teaching and learning .[1] CALL embraces a wide range of ICT applications and approaches to teaching… … Wikipedia