-
1 data
['deɪtə] 1.nome plurale dati m.2.modificatore inform. [capture, protection, security, retrieval] dei dati; [directory, collection, file] di dati; [disk, entry, handling, input, transmission] dati* * *(or noun singular facts or information (especially the information given to a computer): All the data has/have been fed into the computer.) dati- database- data-processing* * *['deɪtə] 1.nome plurale dati m.2.modificatore inform. [capture, protection, security, retrieval] dei dati; [directory, collection, file] di dati; [disk, entry, handling, input, transmission] dati -
2 ♦ real
♦ real (1) /rɪəl/A a.1 vero; reale: a real object, un oggetto reale; He has no real friends, non ha dei veri amici; It was hard to tell whether the danger was real or imaginary, era difficile sapere se il pericolo era reale o immaginario; Some people believe that ghosts are real, alcuni pensano che i fantasmi esistano davvero; The trip was a real laugh, il viaggio è stato davvero divertente; real silk, vera seta; seta pura; (mat.) real numbers, numeri reali; (fin.) real partner, socio effettivo NOTA D'USO: - true, real o genuine?-3 (econ., fin.) reale; in termini reali; al netto dell'inflazione: real output, prodotto reale; produzione reale; real income, reddito reale (o in termini reali); real interest rate, tasso di interesse realeB n. [u]– the real, il realeC avv.(fam.) davvero; molto: a real fine day, una giornata veramente bella; It's real cold, fa proprio freddo; I'm real sorry, mi dispiace molto● real ale, birra tradizionale senza additivi e anidride carbonica □ real agent = real-estate agent ► sotto □ (leg.) real assets, beni immobili □ (econ.) real business cycle, ciclo economico reale □ (ass.) real damages, risarcimento satisfattorio □ real-estate agency [agent], agenzia [agente] immobiliare □ (fin.) real-estate investment trust, fondo d'investimento immobiliare □ (fin.) the real-estate market, il mercato immobiliare □ (fisc.) real estate tax, imposta sul patrimonio immobiliare □ (leg.) real evidence, prova materiale (o concreta) □ (econ.) real GDP, PIL reale □ real-life, (agg.) autentico □ real live, (agg.) in carne ed ossa: I've never met a real live movie star, non ho mai incontrato un attore del cinema in carne ed ossa □ real money, moneta reale ( biglietti e monete) □ real price, prezzo reale □ (leg.) real property, proprietà immobiliare □ (leg.) real rights, diritti reali □ (leg.) real security, garanzia reale (o immobiliare) □ ( sport, stor.) real tennis = court tennis ► court □ (pubbl.) the real thing, il prodotto genuino; ( anche) il meglio, il non plus ultra □ real time, tempo reale □ (comput., ecc.) real-time, in tempo reale: real-time processing, elaborazione in tempo reale □ (econ.) real value, valore reale □ (econ.) real wage, salario reale □ real wood, legno massiccio □ the real world, la realtà □ (fam. USA) for real, (avv.) davvero, sul serio; (agg.) fatto (o detto) sul serio: Is this for real?, sul serio?; Are you for real?, dici (o fai) sul serio? □ ( slang USA) Get real!, fatti furbo! □ in real earnest, proprio sul serio □ (fam. USA, anche iron.) It's been real!, è stata proprio una bella festa!real (2) /reɪˈɑ:l/n.
См. также в других словарях:
Security Advisory Opinion — (SAO) or Washington Special Clearance,cite web url=http://foia.state.gov/masterdocs/09FAM/09G0500.PDF title=Washington Special Clearances (Security Advisory Opinions), 9 FAM Appendix G, 500 work=U.S. Department of State Foreign Affairs Manual… … Wikipedia
Security Assertion Markup Language — (SAML) is an XML based standard for exchanging authentication and authorization data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions). SAML is a product… … Wikipedia
Security Architecture — Security provided by IT Systems can be defined as the IT system’s ability to being able to protect confidentiality and integrity of processed data, as well as to be able to provide availability of the system and data.“IT Architecture” may be… … Wikipedia
Security of Advanced Access Content System — The security of Advanced Access Content System has a subject of discussion amongst security researchers, high definition video enthusiasts, and consumers at large since its inception. A successor to Content Scramble System, the digital rights… … Wikipedia
Security clearance — For use by the United Nations, see Security Clearance (UN) A security clearance is a status granted to individuals allowing them access to classified information, i.e., state secrets, or to restricted areas after completion of a thorough… … Wikipedia
Security Now! — Infobox Podcast title = Security Now! caption = host = Leo Laporte Steve Gibson url = [http://www.twit.tv/SN http://www.twit.tv/SN] rss = [http://leoville.tv/podcasts/sn.xml MP3 Feed] status = Weekly audio format = MP3 began = August 19, 2005… … Wikipedia
Security Operations Center — A Security Operations Center (SOC) is a centralized unit in an organization that deals with security issues, on an organizational an technical level. SOCs used for facility security An SOC within a building or facility is a central location from… … Wikipedia
Security log — A security log is used to track security related information on a computer system. Examples include: * Windows Security Log * Internet Connection Firewall security logAccording to Stefan Axelsson, Most UNIX installations do not run any form of… … Wikipedia
Security Parameter Index — The Security Parameter Index (SPI) is an identification tag added to the header while using IPSec for tunneling the IP traffic. This tag helps the kernel discern between two traffic streams where different encryption rules and algorithms may be… … Wikipedia
List of Scientology Security Checks — In Scientology, the Security Check (or Sec Check) is a practice instituted by founder L. Ron Hubbard in 1960.[1] It involves an Ethics officer probing the thoughts, attitudes and behavior of an individual member by asking them large numbers of… … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia