-
21 AUP
"A statement issued by an Internet service provider or an online information service that indicates what activities users may or may not engage in while logged into the service. For example, some providers prohibit users from engaging in commercial activity on the network." -
22 Active Desktop
"One of the two components installed with Windows Desktop Update. Active Desktop allows users to add active content, such as a stock ticker, to their desktop, taskbar, or folders. Users can also single-click files to run and open them. Active Desktop can be disabled in the Internet Explorer Administration Kit, even if Windows Desktop Update is installed." -
23 Control Panel
"A Windows program that collects and displays for users the system-level features of the computer, including hardware and software setup and configuration. From Control Panel, users can click individual items to configure system-level features and perform related tasks." -
24 directory
"An information source that contains data about users, computer files, or other objects. In a file system, a directory stores information about files. In a distributed computing environment (such as a Windows domain), the directory stores information about objects such as printers, fax servers, applications, databases, and users." -
25 file server
A file-storage device on a local area network that is accessible to users on the network. A file server not only stores files but manages them and maintains order as network users request files and make changes to them. -
26 name resolution
"The process of having software translate between names that are easy for users to work with and numerical IP addresses, which are difficult for users but necessary for TCP/IP communications. Name resolution can be provided by software components such as DNS or WINS." -
27 Point-to-Point Protocol over Ethernet
"A specification for connecting users on an Ethernet network to the Internet through a broadband connection, such as a single DSL line, wireless device, or cable modem. Using PPPoE and a broadband modem, LAN users can gain individual authenticated access to high-speed data networks. By combining Ethernet and Point-to-Point Protocol (PPP), PPPoE provides an efficient way to create a separate connection for each user to a remote server."English-Arabic terms dictionary > Point-to-Point Protocol over Ethernet
-
28 PPPoE
"A specification for connecting users on an Ethernet network to the Internet through a broadband connection, such as a single DSL line, wireless device, or cable modem. Using PPPoE and a broadband modem, LAN users can gain individual authenticated access to high-speed data networks. By combining Ethernet and Point-to-Point Protocol (PPP), PPPoE provides an efficient way to create a separate connection for each user to a remote server." -
29 Point-to-Point Tunneling Protocol
"Networking technology that supports multiprotocol virtual private networks (VPNs), enabling remote users to access corporate networks securely across the Internet or other networks by dialing into an Internet service provider (ISP) or by connecting directly to the Internet. PPTP tunnels, or encapsulates, Internet Protocol (IP) or Internetwork Packet Exchange (IPX) traffic inside IP packets. This means that users can remotely run applications that depend on particular network protocols. PPTP is described in RFC 2637."English-Arabic terms dictionary > Point-to-Point Tunneling Protocol
-
30 PPTP
"Networking technology that supports multiprotocol virtual private networks (VPNs), enabling remote users to access corporate networks securely across the Internet or other networks by dialing into an Internet service provider (ISP) or by connecting directly to the Internet. PPTP tunnels, or encapsulates, Internet Protocol (IP) or Internetwork Packet Exchange (IPX) traffic inside IP packets. This means that users can remotely run applications that depend on particular network protocols. PPTP is described in RFC 2637." -
31 privilege
"A user's right to perform a specific task, usually one that affects an entire computer system rather than a particular object. Privileges are assigned by administrators to individual users or groups of users as part of the security settings for the computer." -
32 ar-sa مشاركة
"A name that refers to a shared resource on a server. Each shared folder on a server has a share name used by personal computer users to refer to the folder. Users of Macintosh computers use the name of the Macintosh-accessible volume that corresponds to a folder, which may be the same as the share name." -
33 share name
"A name that refers to a shared resource on a server. Each shared folder on a server has a share name used by personal computer users to refer to the folder. Users of Macintosh computers use the name of the Macintosh-accessible volume that corresponds to a folder, which may be the same as the share name." -
34 tip
A type of note that helps users apply the techniques and procedures described in the text to their specific needs. A tip suggests alternative methods that may not be obvious and helps users understand the benefits and capabilities of the product. A tip is not essential to the basic understanding of the text. -
35 ar-sa WYSIWYG
Software that allows multiple users across a network to work together on a document that is simultaneously displayed on all the users' screens as though they are gathered around a physical whiteboard. -
36 whiteboard
Software that allows multiple users across a network to work together on a document that is simultaneously displayed on all the users' screens as though they are gathered around a physical whiteboard. -
37 alternative text
"Text displayed by Web browsers during image downloads for users who have graphics turned off, and for users who rely on screen-reading software to convert graphics on the screen to spoken words." -
38 shared workbook
A workbook that is configured to allow multiple users on a network to view and make changes at the same time. Each user who saves the workbook sees the changes that are made by other users. -
39 user-level security
"When using user-level security in an Access database, a database administrator or an object's owner can grant individual users or groups of users specific permissions to tables, queries, forms, reports, and macros." -
40 phisher
"A malicious user who deceives people into revealing personal information, such as account passwords and credit card numbers. A phisher typically uses deceptive e-mail messages or online advertisements as bait to lure unsuspecting users to fraudulent websites, where the users are then tricked into providing personal information."
См. также в других словарях:
Users — UNIX‐утилита, выводящая список имён пользователей на данном хосте, разделённых пробелами. Каждое выводимое имя пользователя соответствует login сессии, например, если пользователь имеет больше чем одну login сессию, то имя этого пользователя… … Википедия
users — UNIX‐утилита, выводящая список имён пользователей на данном хосте, разделённых пробелами. Каждое выводимое имя пользователя соответствует login сессии, например, если пользователь имеет больше чем одну login сессию, то имя этого пользователя… … Википедия
users — vartotojai statusas T sritis ekologija ir aplinkotyra apibrėžtis Organizmai (augalėdžiai, mėsėdžiai, parazitai, koprofagai, nekrofagai), negebantys sintetinti organinių junginių iš neorganinių elementų ir tiesiogiai arba netiesiogiai mintantys… … Ekologijos terminų aiškinamasis žodynas
Users’ Guides to the Medical Literature — Infobox Book name = Users’ Guides to the Medical Literature title orig = translator = image caption = author = Gordon Guyatt, Drummond Rennie illustrator = cover artist = country = language = series = subject = Medicine genre = publisher =… … Wikipedia
Users' group — A users group (also users group or user group) is a type of club focused on the use of a particular technology, usually (but not always) computer related. Users groups started in the early days of mainframe computers, as a way to share sometimes… … Wikipedia
users — us·er || juËzÉ™(r) n. one who uses, one who utilizes; one who uses illegal drugs; one who uses a computer system … English contemporary dictionary
List of users' groups — This is a list of users groups and types of users groups with their own Wikipedia articles, categorized by interest.ComputersGeneral* Chaos Computer Club * Computer Measurement Group (CMG) * Homebrew Computer Club * Port7AllianceHardware… … Wikipedia
International Ventilator Users Network — The International Ventilator Users Network (IVUN) [ http://www.ventusers.org/ Homepage of International Ventilator Users Network] is a nonprofit network of mechanical ventilation users, respiratory health professionals, and ventilatory equipment… … Wikipedia
Power users of ICT — The term Power Users of ICT (Information Communication Technology) is used to describe young individuals who have developed sophisticated technology skills. This phenomenon is being explored through a research initiative led by Education… … Wikipedia
American Highway Users Alliance — Type Non profit organization Industry Automotive, Lobbyist, Non Profit Founded 1932[n 1] Headquarters Washington, DC … Wikipedia
World Network of Users and Survivors of Psychiatry — The World Network of Users and Survivors of Psychiatry (WNUSP) is an international organisation representing, and led by, users (consumers) and survivors of psychiatry. As of 2003, over 70 national organizations were members of WNUSP, based in 30 … Wikipedia