-
1 earned value analysis
"A method for determining project performance which involves comparing the value of the work that was planned with the budgeted cost of the work performed to date, with what was actually spent. These comparisons provide invaluable information about actual conditions within the project and trends that may be developing in terms of schedule and cost performance." -
2 social networking
The use of Web sites and services that provide enhanced information and interaction capabilities with regard to people and resources. -
3 digital signature
"Data that binds a sender's identity to the information being sent. A digital signature may be bundled with any message, file, or other digitally encoded information, or transmitted separately. Digital signatures are used in public key environments and provide authentication and integrity services." -
4 Customer Experience Improvement Program
"A Microsoft program that invites customers to provide Microsoft with more detailed information about how the software is used including the type and frequency of errors, software and hardware performance, and feature usage. This information is anonymous and voluntary, and is used strictly for the purposes of software development."برنامج تحسين المنتجات وفقًا لاستخدام العملاءEnglish-Arabic terms dictionary > Customer Experience Improvement Program
-
5 CEIP
"A Microsoft program that invites customers to provide Microsoft with more detailed information about how the software is used including the type and frequency of errors, software and hardware performance, and feature usage. This information is anonymous and voluntary, and is used strictly for the purposes of software development." -
6 phishing
A technique used to trick computer users into revealing personal or financial information. A common online phishing scam starts with an e-mail message that appears to come from a trusted source but actually directs recipients to provide information to a fraudulent Web site. -
7 signature
"Data that binds a sender's identity to the information being sent. A digital signature may be bundled with any message, file, or other digitally encoded information, or transmitted separately. Digital signatures are used in public key environments and provide authentication and integrity services." -
8 Safe Harbor Agreement
"An agreement between the U.S. and the European Union regarding the transfer of PII from the European Union to the United States, which is consistent with Fair Information Practices. Companies that register for Safe Harbor with the United States Department of Commerce, and abide by the agreement, are deemed by the European Union to provide adequate data protection for PII transferred from the European Union to the United States." -
9 Safe Harbor Framework
"An agreement between the U.S. and the European Union regarding the transfer of PII from the European Union to the United States, which is consistent with Fair Information Practices. Companies that register for Safe Harbor with the United States Department of Commerce, and abide by the agreement, are deemed by the European Union to provide adequate data protection for PII transferred from the European Union to the United States." -
10 standalone server
"A computer that runs Windows Server but does not participate in a domain. A standalone server has only its own database of end users, and it processes logon requests by itself. It does not share account information with any other computer and cannot provide access to domain accounts."
См. также в других словарях:
provide with information — index instruct (teach) Burton s Legal Thesaurus. William C. Burton. 2006 … Law dictionary
Information Card — Information Cards are personal digital identities that people can use online. Visually, each Information Card has a card shaped picture and a card name associated with it that enable people to organize their digital identities and to easily… … Wikipedia
Information economics — or the economics of information is a branch of microeconomic theory that studies how information affects an economy and economic decisions. Information has special characteristics. It is easy to create but hard to trust. It is easy to spread but… … Wikipedia
information — in‧for‧ma‧tion [ˌɪnfəˈmeɪʆn ǁ fər ] noun [uncountable] 1. facts or details that tell you about something or someone: • This is highly confidential information. • Corporations are making more financial information available to investors. ˈcredit… … Financial and business terms
information processing — Acquisition, recording, organization, retrieval, display, and dissemination of information. Today the term usually refers to computer based operations. Information processing consists of locating and capturing information, using software to… … Universalium
Information hiding — This article is about the computer programming concept. For the practice of hiding data in a message or file, see Steganography. For data encryption, see Obfuscated code. In computer science, information hiding is the principle of segregation of… … Wikipedia
information */*/*/ — UK [ˌɪnfə(r)ˈmeɪʃ(ə)n] / US [ˌɪnfərˈmeɪʃ(ə)n] noun [uncountable] Get it right: information: Information is an uncountable noun, so: ▪ it is never used in the plural ▪ it never comes after an or a number Wrong: Consumers can find informations… … English dictionary
information — noun 1 (U) facts or details that tell you something about a situation, person, event etc: For further information phone the number below. | information that: We have received information that Grant may have left the country. (+ about/on): The… … Longman dictionary of contemporary English
Information asymmetry — In economics and contract theory, information asymmetry deals with the study of decisions in transactions where one party has more or better information than the other. This creates an imbalance of power in transactions which can sometimes cause… … Wikipedia
Information theoretic security — A cryptosystem is information theoretically secure if its security derives purely from information theory. That is, it is secure even when the adversary has unbounded computing power. An example of an information theoretically secure cryptosystem … Wikipedia
information science — the study of the nature, collection, and management of information and of its uses, esp. involving computer storage and retrievals. * * * Discipline that deals with the processes of storing and transferring information. It attempts to bring… … Universalium