-
81 transition event
"A change in the location of processor event execution between ring 3 (user mode) and ring 0 (kernel mode). Transition events represent time spent outside the direct execution of the application code. Transition events can be time spent in threads that are not part of the profiled item, or time spent executing calls from the profiled item to the operating system." -
82 satellite assembly
"A.NET Framework assembly containing resources specific to a given language. Using satellite assemblies, you can place the resources for difference languages in different assemblies, and the correct assembly is loaded into memory only if the user elects to view that application in that language." -
83 script injection attack
"An attack that attempts to send executable scripts to your application with the intent of having other users run it. A typical script injection attack sends script to a page that stores the script in a database, so that another user who views the data inadvertently runs the code." -
84 AppVerifier
"A graphical user interface (GUI) tool that aids IT managers and developers in testing applications on Microsoft® Windows® and the Windows Server family. It helps developers identify potential application compatibility, stability, and security issues." -
85 built-in menu
A menu that is available by default in an application; it is not created by the user. -
86 accept
"A UI element the user presses to agree to an incoming file transfer, invitation, audio/video call, or application sharing." -
87 Problem Steps Recorder
A utility that allows recording step-by-step user actions in Windows and storing them in an XML file to help developers reproduce and investigate applications problems easily. It also enables end users to share application problems (e.g. with Technical Support) with comprehensive descriptions. -
88 compatibility switching
The process of reverting to legacy code when Windows detects that an application needs it to run seamlessly for the end user. -
89 publisher
"The entity that offers a remote workspace, typically the IT department of the user’s employer, a business partner or vendor, or less commonly, a commercial application service provider. The publisher may use a digital certificate to represent its identity and use it to sign the remote resource files (e.g. RDP files) and the workspace description (e.g. Web Service feed)." -
90 account
A set of attributes that define a user's access to a given service or application. -
91 setup program
"A program whose function is to install another program, either on a storage medium or in memory. An installation program, also called a setup program, might be used to guide a user through the often complex process of setting up an application for a particular combination of machine, printer, and monitor." -
92 out-of-browser
"Pertaining to, or characteristic of, a Silverlight-based application that a user installs from a Web page and runs outside the browser." -
93 security model
"A structure that organizes application access control permissions by using privilege, duty, and business process classifiers and that grants permissions that are aggregated into duties to user role assignments." -
94 duty
"In the security model, a set of application access privileges that are required for a user to carry out their responsibilities." -
95 app data storage
An isolated data store specific to a particular application and user. -
96 Navigation Bar
A control bar in Outlook that enables the user to navigate quickly to different areas or views within the application. -
97 Open with
A menu item that lets the user open a document using a different application than the one associated with the document type. -
98 Office XML Handler
A utility that launches the appropriate Office application when a user tries to open an XML file. -
99 Multi-Factor Authentication app
An application that can be installed on a user's mobile device to receive notifications and to verify that their sign in attempt was valid.English-Arabic terms dictionary > Multi-Factor Authentication app
-
100 push notifications
"A transient message from the application to the user that contains relevant, time-sensitive information and provides quick access to the subject of that content."
См. также в других словарях:
User Account Control — (UAC) is a technology and security infrastructure introduced with Microsoft s Windows Vista operating system. It aims to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator … Wikipedia
User Interface Modeling — is a development technique used by computer application programmers. Today s User Interfaces (UIs) are complex software components, which play an essential role in the usability of an application. The development of UIs requires therefore, not… … Wikipedia
Application performance management — Application Performance Management, or APM, refers to the discipline within systems management that focuses on monitoring and managing the performance and service availability of software applications.APM can be defined as process and use of… … Wikipedia
Application sharing — is an element of remote access, falling under the collaborative software umbrella, that enables two or more users to access a shared application or document from their respective computers simultaneously in real time. Generally, the shared… … Wikipedia
Application gateway — Application gateways, occasionally referred to as called application proxies, are applications located between the end user and the Internet. Application gateways are used in unified communicationsFunctioning mechanism# The end user contacts… … Wikipedia
User environment management — (also abbreviated to UEM) is a computing term used to describe the management of a users experience within their desktop environment.The user environmentIn a modern workplace an organisation grants each user access to an operating system and the… … Wikipedia
Application virtualization — is an umbrella term that describes software technologies that improve portability, manageability and compatibility of applications by encapsulating them from the underlying operating system on which they are executed. A fully virtualized… … Wikipedia
User-mode Linux — (UML) allows multiple virtual Linux systems (known as guests) to run as an application within a normal Linux system (known as the host). As each guest is just a normal application running as a process in user space, this approach provides the… … Wikipedia
User Datagram Protocol — (UDP) is one of the core protocols of the Internet Protocol Suite. Using UDP, programs on networked computers can send short messages sometimes known as datagrams (using Datagram Sockets) to one another. UDP is sometimes called the Universal… … Wikipedia
User interface design — or user interface engineering is the design of computers, appliances, machines, mobile communication devices, software applications, and websites with the focus on the user s experience and interaction. Where traditional graphic design seeks to… … Wikipedia
User-agent — Pour les articles homonymes, voir Agent. Un user agent est une application cliente utilisée avec un protocole réseau particulier ; l expression est plus généralement employée comme référence pour celles qui accèdent au World Wide Web. Les… … Wikipédia en Français