-
1 set-by-caller callback
"In Network Connections, a form of callback in which the user supplies the telephone number that the remote access server uses for callback. This setting spares the user any long-distance telephone charges." -
2 Set Note...
The item on the user's My Status menu that enables the user to type a note that will appear as part of his status.تعيين ملاحظة... -
3 connected, user authenticated
"A user's status when a telephone connection has been established and the user has entered a correct user name and password. If the user has callback permission and has requested callback, the connection is followed by the calling-back phase. If the calling-back phase is followed by a waiting-for-call phase, then the server was unable to reach the user at the specified number. The user may have supplied an inaccurate callback number (in the case of set-by-caller callback), or an unauthorized attempt to access the network may be under way (in the case of preset-to callback).""متصل، تمت المصادقة على المستخدم"English-Arabic terms dictionary > connected, user authenticated
-
4 Multilingual User Interface Pack
"A set of language-specific resources for multiple supported languages. MUI technology enables users to set the user-interface language according to their preferences, provided the required language resource files are present on the computer. It is designed to enable large corporations to deploy a single version of Windows worldwide, while enabling their local users to select the user-interface language."English-Arabic terms dictionary > Multilingual User Interface Pack
-
5 local term set
A term set that is created when a user defines a column. -
6 SharePoint list indicator
"The title of a dialog page that enables the user to set up a SharePoint list indicator by setting name, description, list URL, indicator value, indicator appearance, etc. The indicator value can be specified based on number or percentage of certain column values, or certain aggregate data." -
7 Peer-to-Peer
An item in Control Panel that opens a dialog box that allows the user to set preferences for a peer-to-peer network. -
8 recognizer language
A language that user can set in handwriting recognizer on Tablet PC. -
9 ar-sa تحويل
A call-forwarding option that allows the user to set the number of seconds that the phone will ring before a call is redirected. -
10 ring duration
A call-forwarding option that allows the user to set the number of seconds that the phone will ring before a call is redirected. -
11 authentication option
One of multiple authentication mechanisms or settings that a user can set. -
12 junk e-mail filter
An e-mail filter that enables the user to set the strictness level that keeps junk e-mail from being delivered to their Inbox. -
13 ACE Management View
A feature that allows the user to set access levels for a group of contacts. -
14 Access Control Entry Management View
A feature that allows the user to set access levels for a group of contacts.English-Arabic terms dictionary > Access Control Entry Management View
-
15 settings+pin
"An appbar menu item in the Wallet panorama that, when tapped, takes users to the Wallet Settings, where the user can set a Wallet PIN."الإعدادات+رمز PIN -
16 security role
A defined set of application access privileges. The security role assigned to a user determines which tasks the user can perform and which parts of the user interface the user can view. All users must be assigned at least one security role in order to access the system. -
17 MUI Pack
"A set of language-specific resources for multiple supported languages. MUI technology enables users to set the user-interface language according to their preferences, provided the required language resource files are present on the computer. It is designed to enable large corporations to deploy a single version of Windows worldwide, while enabling their local users to select the user-interface language." -
18 account policy
"On local area networks and multiuser operating systems, a set of rules governing whether a new user is allowed access to the system and whether an existing user's rights are expanded to include additional system resources. An account policy also generally states the rules with which the user must comply while using the system in order to maintain access privileges." -
19 claims-based authentication
"The process of authenticating a user based on a set of claims about the user's identity contained in a trusted token. This token is often issued and signed by an entity that is able to authenticate the user by other means, and that is trusted by the entity doing the claims-based authentication."English-Arabic terms dictionary > claims-based authentication
-
20 object
"An entity, such as a file, folder, shared folder, printer, or Active Directory object, described by a distinct, named set of attributes. For example, the attributes of a File object include its name, location, and size; the attributes of an Active Directory User object might include the user's first name, last name, and e-mail address."
См. также в других словарях:
User Account Control — (UAC) is a technology and security infrastructure introduced with Microsoft s Windows Vista operating system. It aims to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator … Wikipedia
User-Agent — это клиентское приложение, использующее определённый сетевой протокол. Термин обычно используется для приложений, осуществляющих доступ к веб сайтам, таким как браузеры, поисковые роботы (и другие «пауки»), мобильные телефоны и другие устройства … Википедия
User-agent — это клиентское приложение, использующее определённый сетевой протокол. Термин обычно используется для приложений, осуществляющих доступ к веб сайтам, таким как браузеры, поисковые роботы (и другие «пауки»), мобильные телефоны и другие устройства … Википедия
User agent — это клиентское приложение, использующее определённый сетевой протокол. Термин обычно используется для приложений, осуществляющих доступ к веб сайтам, таким как браузеры, поисковые роботы (и другие «пауки»), мобильные телефоны и другие устройства … Википедия
User-mode Linux — (UML) allows multiple virtual Linux systems (known as guests) to run as an application within a normal Linux system (known as the host). As each guest is just a normal application running as a process in user space, this approach provides the… … Wikipedia
User Datagram Protocol — (UDP) is one of the core protocols of the Internet Protocol Suite. Using UDP, programs on networked computers can send short messages sometimes known as datagrams (using Datagram Sockets) to one another. UDP is sometimes called the Universal… … Wikipedia
User-generated TV — User Generated Television or UGTV refers to TV footage that was originally created by a member of the public and then uploaded to the internet. Often the process of selecting such footage for broadcast includes the input of web users. UGTV can… … Wikipedia
Set and setting — describes the context for psychoactive and particularly psychedelic drug experiences: one s mindset and the setting in which the user has the experience. This is especially relevant for psychedelic or hallucinogenic experiences; the term was… … Wikipedia
User Interface Privilege Isolation — (UIPI) is a technology introduced in Windows Vista and Windows Server 2008 to combat code injection exploits. By leveraging Mandatory Integrity Control, it prevents processes with a lower integrity level (IL) from sending messages to higher IL… … Wikipedia
user account — UK US noun [C] ► IT, INTERNET an agreement allowing you to use a particular computer system, website, etc.: »To trial the software, you will need to set up a user account. »To log on to the site, please enter your user account password … Financial and business terms
user defined — set by the user, determined by the user … English contemporary dictionary