-
1 Access database engine
Part of the Access database system that retrieves and stores data in user and system databases. The engine can be thought of as a data manager on which database systems are built. -
2 access permissions
"Authorization to perform operations associated with a specific shared resource, such as a file, directory, or printer. Permissions must be granted by the system administrator to individual user accounts or administrative groups." -
3 system administrator
"The person responsible for setting up and managing local computers, stand-alone servers, member servers, or domain controllers. An administrator performs such duties as assigning user accounts and passwords, establishing security access levels, watching for unauthorized access, allocating storage space, and helping users with networking problems." -
4 access privileges
The type of operations permitted for a given user of a certain system resource on a network or a file server. -
5 access control entry
"An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object." -
6 system access control list
An ACL that controls the generation of audit messages for attempts to access a securable object. The ability to get or set an object's SACL is controlled by a privilege typically held only by system administrators.English-Arabic terms dictionary > system access control list
-
7 dynamic access control
"The ability for IT pros to define how users access a system based on dynamic qualities, such as a user's location or role." -
8 random access memory cache
Cache memory that is used by the system to store and retrieve data from the RAM. Frequently accessed segments of data may be stored in the cache for quicker access compared with secondary storage devices such as disks.English-Arabic terms dictionary > random access memory cache
-
9 Microsoft Access 2013
The 2013 edition of the Microsoft relational database management system. -
10 Network Access Protection
"A set of operating system components that can help protect access to a private network by enforcing health policies. System administrators establish health policies which NAP enforces by inspecting and assessing the health of client computers, restricting network access when client computers are deemed noncompliant, and remediating noncompliant client computers for full network access. NAP also provides ongoing health compliance enforcement while a client computer is connected to a network." -
11 NTFS file system
"An advanced file system designed for use specifically with the Windows NT operating system. It supports long filenames, full security access control, file system recovery, extremely large storage media, and various features for the Windows NT POSIX subsystem. It also supports object-oriented applications by treating all files as objects with user-defined and system-defined attributes." -
12 remote access
"Part of the integrated Routing and Remote Access service that provides remote networking for telecommuters, mobile workers, and system administrators who monitor and manage servers at multiple branch offices. Users can use Network Connections to dial in to remotely access their networks for services such as file and printer sharing, electronic mail, scheduling, and SQL database access."الوصول عن بُعد -
13 Compact Disc File System
A 32-bit protected-mode file system that controls access to the contents of CD-ROM drives. -
14 database management system
A layer of software between the physical database and the user. The DBMS manages all access to the database.English-Arabic terms dictionary > database management system
-
15 Infrastructure APIs for the Windows Runtime
"A set of C++ APIs that are used by the Windows Runtime to gain access to operating system functionality. They are primarily designed for the infrastructure of the Windows Runtime, but they could be used in advanced C++ Windows Store app development."English-Arabic terms dictionary > Infrastructure APIs for the Windows Runtime
-
16 client access point
"In SMS 2003 and earlier releases, an SMS site system that provides a communication point between the SMS site server and Legacy Client computers. Legacy Clients deliver their collected files, inventory information, discovery data records, software metering data, and status information to CAPs." -
17 service access point
A logical address that allows a system to route data between a remote device and the appropriate communications support. -
18 security role
A defined set of application access privileges. The security role assigned to a user determines which tasks the user can perform and which parts of the user interface the user can view. All users must be assigned at least one security role in order to access the system. -
19 user mode
"The nonprivileged processor mode in which application code, including protected subsystem code, executes. User-mode applications cannot gain access to system data except by calling subsystem-supplied functions, which, in turn, call system services." -
20 paged pool
"The system-allocated virtual memory that has been charged to a process and that can be paged. Paging is the moving of infrequently used parts of a program's working memory from random access memory (RAM) to another storage medium, usually the hard disk."
См. также в других словарях:
Advanced Access Content System — AACS decryption process The Advanced Access Content System (AACS) is a standard for content distribution and digital rights management, intended to restrict access to and copying of the next generation of optical discs and DVDs. The specification … Wikipedia
Distributed Access Control System — DACS The Distributed Access Control System Original author(s) Developers at Distributed Systems Software Developer(s) Distributed Systems Software Stable release 1.4.26 / September 30, 2011; 14 days ago (2011 09 30) … Wikipedia
Direct Access File System — DAFS redirects here. For other uses, see DAFS (disambiguation). Direct Access File System (DAFS) is a network file system that is based on NFSv4 and the Virtual Interface (VI) data transfer mechanism. DAFS uses remote direct memory access (RDMA)… … Wikipedia
Digital Access Carrier System — (DACS) is the name used by British Telecom (BT Group plc) in the United Kingdom for a 0+2 Pair gain system. Two Telspec DACS remote units mounted on a pole Contents 1 Usage … Wikipedia
Digital Access Signalling System — For the Depression, Anxiety and Stress Scale (DASS), see DASS (psychology). For the Defensive Aid Sub System of an aircraft, see Defensive Aids System. The Digital Access Signalling System (DASS) is the United Kingdom proprietary standard created … Wikipedia
Total Access Communication System — (TACS) and ETACS are mostly obsolete variants of AMPS which were used in some European countries (including the UK Ireland in 1983). TACS was also used in Japan under the name Japanese Total Access Communication (JTAC).… … Wikipedia
Security of Advanced Access Content System — The security of Advanced Access Content System has a subject of discussion amongst security researchers, high definition video enthusiasts, and consumers at large since its inception. A successor to Content Scramble System, the digital rights… … Wikipedia
Taoyuan International Airport Access MRT System — Chinese t=台灣桃園國際機場聯外捷運系統 p=Táiwān Táoyuán Guójì Jīchǎng Liánwài Jiéyùn Xìtǒng tp=Táiwan Táoyuán Guójì Jichǎng Liánwài Jiéyùn Sìtǒng w=T ai2 wan1 T ao2 yüan2 Kuo2 chi4 Chi1 ch ang3 Lien2 wai4 Chieh2 yün4 Hsi4 t ung3 poj=Tâi oân Thô hn̂g Kok chè Ki … Wikipedia
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Access Control Matrix — or Access Matrix is an abstract, formal computer protection and security model used in computer systems, that characterizes the rights of each subject with respect to every object in the system. It was first introduced by Butler W. Lampson in… … Wikipedia
System Configuration — The specific definition of the elements that define and/or prescribe what a system is composed of. For example, in Systems Engineering, a System Configuration (SC) defines the computers, processes, and devices that compose the system and it s… … Wikipedia