-
61 security role
A defined set of application access privileges. The security role assigned to a user determines which tasks the user can perform and which parts of the user interface the user can view. All users must be assigned at least one security role in order to access the system. -
62 SRK
"On a system that incorporates a TPM, a cryptographic asymmetric key which is created at the root of the TPM key hierarchy (2048-bit RSA key) and which is used by the TPM to store protected data. The private portion of this key never leaves the TPM. The public part of this key is returned to the owner and needs to be carefully guarded since it uniquely identifies the TPM on the network, therefore is privacy sensitive." -
63 storage root key
"On a system that incorporates a TPM, a cryptographic asymmetric key which is created at the root of the TPM key hierarchy (2048-bit RSA key) and which is used by the TPM to store protected data. The private portion of this key never leaves the TPM. The public part of this key is returned to the owner and needs to be carefully guarded since it uniquely identifies the TPM on the network, therefore is privacy sensitive." -
64 health
"Information about a client computer that Network Access Protection (NAP) uses to allow or deny access to a network and which is encapsulated in a statement of health (SoH), which is issued by a system health agent (SHA) on the client computer." -
65 local database
"A local copy of a shared remote database, which you work in on your computer, and which is periodically synchronized with the remote database." -
66 remote database
"A database which is stored on another computer and is shared out to other users. These users create their own local copy, which is periodically synchronized with the shared database." -
67 soft SA
"A security association (SA) in which the Negotiate security filter action is enabled, but there is no authentication or encryption being performed because the computer with which communication occurs is not running IPSec." -
68 mail-enabled object
"A type of object that has an e-mail address on a domain in the organization, but the object does not have a mailbox in the domain at which to receive messages. The object appears in the global address list, which allows other people in the organization to easily locate or send a message to that person, but the administrator does not need to manage an unnecessary mailbox. Contacts, users, and even folders can be mail-enabled." -
69 Windows Vista Upgrade Advisor
"A downloadable Web application that helps Windows users identify which edition of Windows meets their needs, whether their PCs are ready for an upgrade to the next Windows version, and which features of the suggested Windows version will be able to run on their PCs."English-Arabic terms dictionary > Windows Vista Upgrade Advisor
-
70 display mode
"The mode in which a Web Parts page can be displayed. It enables users to modify a page in specified ways. The states that ship with the Web Parts control set are: catalog, connect, design, edit, and browse. The default or normal mode for a Web page is browse. Developers can extend this display mode feature by adding custom display modes, which requires extending the WebPartManager class." -
71 anniversary date
The calendar date which signifies the date on which an event occurred in some previous year. -
72 low-value asset
"In Australia, a depreciating asset that is not a low-cost asset but which has an opening net book value less than $1,000 (as of July 1 in the year that it is allocated to the pool), and for which the organization has previously worked out any deduction using the reducing balance depreciation method." -
73 OR constraint
"An indicator of a situation in which any instance of a class can participate in only one association at one time. The constraint is shown as a dashed line connecting two or more associations, which must have a class in common." -
74 security-enabled workgroup
An Access workgroup in which users log on with a user name and password and in which access to database objects is restricted according to permissions granted to specific user accounts and groups.English-Arabic terms dictionary > security-enabled workgroup
-
75 task type
"A characterization of a task based on which aspect of the task is fixed and which aspects are variable. There are three task types: Fixed Units, Fixed Work, and Fixed Duration. The default task type in Project is Fixed Units." -
76 stacking order
The order in which shapes overlap other shapes on the page and the order in which shapes are selected. -
77 synchronization session
"A unidirectional synchronization in which the source provider enumerates its changes and sends them to the destination provider, which applies them to its store." -
78 regex
"A concise and flexible notation for finding and replacing patterns of text. The notation comprises two basic character types: literal (normal) text characters, which indicate text that must exist in the target string, and metacharacters, which indicate the text that can vary in the target string. You can use regular expressions to quickly parse large amounts of text to find specific character patterns; extract, edit, replace, or delete text substrings; or to add the extracted strings to a collection in order to generate a report." -
79 KeyTip
A keyboard shortcut that is displayed over the option to which it corresponds in the user interface and tells the user which key(s) can be used to access or activate that feature or command. -
80 toolbar
"A horizontal grouping of actions that apply to the container (or containers) with which the toolbar is associated. For example, a container in which mail is viewed might have an action toolbar with options that include Reply, Delete, and Move to."
См. также в других словарях:
Which — Which, pron. [OE. which, whilk, AS. hwilc, hwylc, hwelc, from the root of hw[=a] who + l[=i]c body; hence properly, of what sort or kind; akin to OS. hwilik which, OFries. hwelik, D. welk, G. welch, OHG. wel[=i]h, hwel[=i]h, Icel. hv[=i]l[=i]kr,… … The Collaborative International Dictionary of English
Which — which Unix утилита, отображающая полный путь к указанным командам или сценариям. Содержание 1 Описание 2 Опции 3 Пример использования … Википедия
Which — Voir « which » sur le Wiktionnaire … Wikipédia en Français
Which — is an English relative pronoun and interrogative pronoun.Which may also refer to: *Which?, a UK charity and its magazine *which (Unix), a Unix command See also * English relative clauses, for discussion of when to use which and when to use that… … Wikipedia
Which? — Infobox Magazine title = Which? image size = image caption = frequency = Monthly category = Consumer publisher = Which? firstdate = October 1957 country = flagcountry|United Kingdom language = English website = [http://www.which.co.uk… … Wikipedia
which — /hwich, wich/, pron. 1. what one?: Which of these do you want? Which do you want? 2. whichever: Choose which appeals to you. 3. (used relatively in restrictive and nonrestrictive clauses to represent a specified antecedent): The book, which I… … Universalium
which — I. adjective Etymology: Middle English, of what kind, which, from Old English hwilc; akin to Old High German wilīh of what kind, which, Old English hwā who, gelīk like more at who, like Date: before 12th century 1. being what one or ones out of a … New Collegiate Dictionary
Which? — a magazine produced each month by the Consumers’ Association in Britain. It consists of reports comparing different makes of similar products and services, to help people to decide which one to buy. It is only available to members of the… … Universalium
which — See: GAME AT WHICH TWO CAN PLAY … Dictionary of American idioms
which — See: GAME AT WHICH TWO CAN PLAY … Dictionary of American idioms
Which (Unix) — which Voir « which » sur le Wiktionnaire … Wikipédia en Français