English | Arabic |
anonymous user | مستخدم مجهول (A user who accesses content on a Web site without providing a user login name and password) |
anonymous user access | وصول مستخدم مجهول (The ability to gain access to a Web server on which one does not have an account) |
authorized user | مستخدم معتمد (A user who has been authenticated and who has access to objects and tasks in the system) |
calendar user agent | عامل مستخدم التقويم (A client program such as Microsoft Outlook. Calendar information can be sent between calendar user agents that comply with the iCalendar specification) |
connected user | مستخدم متصل (A user who has access to a computer or a resource across the network) |
connected, user authenticated | متصل، تمت المصادقة على المستخدم (A user's status when a telephone connection has been established and the user has entered a correct user name and password. If the user has callback permission and has requested callback, the connection is followed by the calling-back phase. If the calling-back phase is followed by a waiting-for-call phase, then the server was unable to reach the user at the specified number. The user may have supplied an inaccurate callback number (in the case of set-by-caller callback), or an unauthorized attempt to access the network may be under way (in the case of preset-to callback)) |
Damage potential Reproducibility Exploitability Affected users Discoverability | امكانية اكتشاف التهديد ومدى قدرة تكاثره والضرر المحتمل على المستخدمين المتضررين (A ranking of the risk that is associated with a vulnerability or a security requirement) |
default user | المستخدم الافتراضي (The profile that serves as a basis for all user profiles. Every user profile begins as a copy of the default user profile) |
e-mail address (A string that identifies a user so that the user can receive Internet email. An email address on the Internet typically consists of an account name, followed by the | عنوان بريد إلكتروني |
email address (A string that identifies a user so that the user can receive Internet email. An email address on the Internet typically consists of an account name, followed by the | عنوان البريد الإلكتروني |
end user | المستخدم (The ultimate user of a computer or computer application in its finished, marketable form) |
end-user recovery | استرداد بواسطة المستخدم (A feature that enables an end user to independently recover data by retrieving a shadow copy. This feature requires the shadow copy client software) |
End-User Spam Notification | إعلام ببريد غير هام للمستخدم النهائي (An email message that contains a spam report for individual users who don't have access to quarantine or the junk email folder) |
external user invitation report | تقرير بيانات دعوات المستخدمين الخارجيين (A report that lists the email address, invitation date, invitation status, and invitation submitter for external users invited to a SharePoint site collection) |
Fast User Switching | التبديل السريع بين المستخدمين (A feature in Windows that allows you to switch to a different computer user account without closing programs and files first) |
filer user | مستخدم مسؤول حفظ عناصر علبة البريد (A user who regularly files mailbox items into folders) |
Fluent user interface | واجهة مستخدم Fluent (The user interface introduced with the 2007 Microsoft Office suite. It includes components and features such as the Ribbon, Galleries, Live Preview, the Mini Toolbar, and Contextual Tabs) |
graphical user interface | واجهة مستخدم رسومية (A display format, like that of Windows, that represents a program's functions with graphic images such as buttons and icons. GUIs enable a user to perform operations and make choices by pointing and clicking with a mouse) |
interactive user | المستخدم الحالي (A user that is interacting directly with the user interface of the computer, by using the local console, Remote Desktop Services, or Remote Desktop) |
local user | مستخدم محلي (A person who uses a computer that is not connected to a network. A local user is most likely someone using a computer at home) |
mail user | مستخدم البريد (A mail-enabled Active Directory user that represents a user outside the Exchange organization. Each mail user has an external e-mail address. A mail user is similar to a mail contact, except that a mail user has Active Directory logon credentials and can access resources) |
mailbox user | مستخدم علبة البريد (A mail-enabled Active Directory user object that has mailbox attributes) |
malicious user | مستخدم ضار (A user who intentionally accesses a system with the intent to cause harm to the system or to use it in an unauthorized manner) |
Manage User-Defined Fields | إدارة حقول معرفة بواسطة المستخدم (An option, found on the Business Contact Manager menu, that enables the user to customize multiple fields) |
mandatory user profile | ملف تعريف مستخدم إلزامي (A type of pre-configured roaming user profile that is not updated when the user logs off) |
master user domain | مجال المستخدم الرئيسي (A Windows NT domain that holds user account data) |
membership user | عضوية مستخدم (An authenticated user of a Web site) |
Microsoft Office Fluent user interface | واجهة مستخدم Microsoft Office Fluent (The user interface introduced with the 2007 Microsoft Office suite. It includes components and features such as the Ribbon, Galleries, Live Preview, the Mini Toolbar, and Contextual Tabs) |
mobile user control | عنصر تحكم مستخدم متنقل (An ASP.NET mobile control derived from the System.Web.UI.MobileControls.MobileUserControl class. User controls provide containers for custom controls built from other ASP.NET mobile controls) |
Multi-Factor Authentication User Portal | مدخل مستخدمي Multi-Factor Authentication (Allows users to complete the Multi-Factor Authentication enrollment process and manage their settings, such as phone number and PIN, through a simple web interface) |
Multilingual User Interface | واجهة المستخدم متعددة اللغات (A technology that allows for the installation and use of multiple user-interface languages) |
Multilingual User Interface Pack | حزمة واجهة المستخدم المتعددة اللغات (A set of language-specific resources for multiple supported languages. MUI technology enables users to set the user-interface language according to their preferences, provided the required language resource files are present on the computer. It is designed to enable large corporations to deploy a single version of Windows worldwide, while enabling their local users to select the user-interface language) |
NetBIOS Extended User Interface | بروتوكول NetBIOS Extended User Interface (A network protocol native to Microsoft Networking. It is usually used in small, department-size local area networks (LANs) of 1 to 200 clients. NetBEUI can use Token Ring source routing as its only method of routing. NetBEUI is the Microsoft implementation of the NetBIOS standard) |
new Windows user interface | واجهة مستخدم Windows الجديدة (The new way of interacting with Windows introduced in Windows 8) |
Office Fluent user interface | واجهة مستخدم Office Fluent (The user interface introduced with the 2007 Microsoft Office suite. It includes components and features such as the Ribbon, Galleries, Live Preview, the Mini Toolbar, and Contextual Tabs) |
offline user state capture | التقاط حالة المستخدم دون اتصال (A type of user state capture that can be performed within Windows Preinstallation Environment phase without needing to boot into full OS) |
per-user control | عنصر تحكم خاص بالمستخدم (A dynamic Web Parts control that can be personalized and permanently deleted from a page for an individual user only. A per-user control appears on the page only when the page is in user scope. Note that a per-user control can have properties that are both user-scope and shared-scope for personalization purposes) |
piler user | مستخدم غير منظم (A user who doesn't file mailbox items regularly) |
Power Users group | مجموعة Power Users (A group whose members can manage accounts, resources, and applications that are installed on a workstation, stand-alone server, or member server. This group does not exist on domain controllers. Administrative tasks that can be performed by members of this group include creating local users and groups; modifying and deleting accounts that they have created; removing users from the Power Users, Users, and Guests groups; installing most applications; and creating and deleting file shares) |
Remote Authentication Dial-In User Service | خادم خدمة مصادقة عن بُعد لمستخدم طلب هاتفي (A proposed Internet protocol in which an authentication server provides authorization and authentication information to a network server to which a user is attempting to link) |
sign-in allowed users | تسجيل دخول المستخدمين المسموح بهم (A set of users of Office 365 who have their sign-in privileges allowed. It is also the name of a view in the users and groups section of Office 365) |
sign-in blocked users | تسجيل دخول المستخدمين المحظورين (A set of users of Office 365 who have their sign-in priveleges blocked. It is also the name of a view in the users and groups section of Office 365) |
synced user | مستخدم متزامن (A user account in a cloud service or other separate system that is synchronized with the local Active Directory directory service) |
Telephone User Interface | واجهة مستخدم الهاتف (An interface that is used to navigate the menus of a Unified Messaging (UM) system using DTMF or touchtone inputs) |
user account | حساب المستخدم (In Active Directory, an object that consists of all the information that defines a domain user, which includes user name, password, and groups in which the user account has membership. User accounts can be stored in either Active Directory or on your local computer) |
User Account Control | التحكم في حساب المستخدم (A security feature that helps prevent unauthorized changes to a computer, by asking user for permission or administrator credentials before performing actions that could potentially affect the computer's operation or that change settings that affect multiple users) |
user account system | نظام حسابات المستخدمين (The LAN Manager user account database) |
user agent string | سلسلة عامل المستخدم (A string that identifies a user's web browser and provides details about the user's computer system to web servers hosting the websites that the user visits) |
user-based policies | نهج مستندة إلى المستخدم (Policies that are detailed enough to be applied to distribution groups, security groups, and individual users) |
User Behavior Analyzer | محلل سلوك المستخدم (Part of the Web Analytics Shared Service that analyzes user behavior data logged by the server when a user visits a Web site) |
User Breakdown Structure | الهيكل التفصيلي للمستخدمين (The structure that describes an organization's hierarchy. The RBS code defines the hierarchical position that a resource holds in the organization) |
user control | عنصر تحكم للمستخدم (A base control that provides a way to create a reusable custom control without having to create a new control class) |
user-controlled scheduling | جدولة بواسطة المستخدم (A feature that allows the user to specify manual or automatic scheduling on a per-task basis) |
User Datagram Protocol | بروتوكول مخطط بيانات المستخدم (A connectionless transport protocol in the TCP/IP protocol stack that is used in cases where some packet loss is acceptable, for example, with digital media streams) |
user-defined field | حقل معرف بواسطة المستخدم (A field that you can define to track information specific to your business) |
user-defined financial dimension type | نوع البعد المالي المحدد من قِبل المستخدم (A financial dimension mapped to a user-defined list of values) |
user-defined object | كائنات معرّفة من قبل المستخدم (A custom object defined by the user) |
user-defined style | أنماط معرّفة من قبل المستخدم (A new style or a modification to a built-in style. User-defined styles always contain cascading style sheet formatting attributes) |
user-defined type | نوع معرف من قبل المستخدم (A base data type that is explicitly defined by using the pre-compiler typedef directive) |
user exception | استثناء المستخدم (An exception that occurs while executing a normal application (in Word, Excel, etc)) |
user experience | تجربة المستخدم (User's perception about the utility usability and desirability of a product as they integrate it into their lives and their family system. The user experience will be the differentiator that drives adoption and use of hardware software and services) |
user form template | قالب نموذج المستخدم (A browser-enabled form template that has been published from InfoPath, and that does not need to be uploaded by an administrator to a server running InfoPath Forms Services) |
user-friendly | سهل الاستخدام (Easy to learn and easy to use) |
user ID | معرف المستخدم (An alphanumeric identification used to identify a particular user) |
user identifier | معرف المستخدم (An alphanumeric identification used to identify a particular user) |
User Interface | واجهة المستخدم (An API for user interface) |
user interface language | لغة واجهة المستخدم (The language in which all software (including the operating system) displays its menus, help files, error messages, and dialog boxes) |
User Interface Privilege Isolation | فصل صلاحية واجهة مستخدم (A window manager subsystem that blocks applications at a lower UI privilege level from sending messages to or hooking threads belonging to processes with a higher UI privilege level) |
user interface privilege level | مستوى صلاحية واجهة مستخدم (The integrity level that is stored in the access token of a process and that is used by the UI Privilege Isolation (UIPI) feature to determine if an application or process is permitted to send Windows messages to another application or process) |
user interface virtualization | ظاهرية واجهة المستخدم (In Windows Presentation Foundation and Silverlight, a technique by which a subset of UI elements are generated from a larger number of data items based on which items are visible on the screen. Virtualization is a performance enhancement, because it is intensive, both in terms of memory and processor, to generate a large number of UI elements when only a few may be on the screen at a given time) |
user isolation | عزل المستخدم (A method, using user names, for separating and isolating content areas within an FTP site. This is to ensure that users don't access FTP directories of one another) |
user-level security | أمن بمستوى المستخدم (When using user-level security in an Access database, a database administrator or an object's owner can grant individual users or groups of users specific permissions to tables, queries, forms, reports, and macros) |
user locale | لغة المستخدم المحلية (The user preferences for the formatting of dates, currencies, numbers, and so on. The user locale is a per-user setting, and does not require the user to restart or to log on or log off the computer) |
user management administrator | مسؤول إدارة المستخدمين (A Microsoft Online Services administrator who manages user accounts, groups, and password resets, manages support tickets, and monitors services health) |
user mode | وضع المستخدم (The nonprivileged processor mode in which application code, including protected subsystem code, executes. User-mode applications cannot gain access to system data except by calling subsystem-supplied functions, which, in turn, call system services) |
user mode exception | استثناء في وضع المستخدم (An exception that occurs while executing a normal application (in Word, Excel, etc)) |
user name | اسم المستخدم (A unique name that identifies a user account to Windows. An account's user name must be unique among the other group names and user names within its own domain or workgroup) |
user object | كائن USER (An object from Window Manager, which includes windows, menus, cursors, icons, hooks, accelerators, monitors, keyboard layouts, and other internal objects. Users can configure Task Manager to display the number of USER objects currently being used by a process) |
user object | كائن المستخدم (An object in Active Directory that contains information about the user, including user logon name, first name, last name, display name, and telephone number) |
user password | كلمة مرور المستخدم (The password stored in each user's account. Each user generally has a unique user password and must type that password when logging on or accessing a server) |
user-preferred interface language | لغة الواجهة المفضلة من قبل المستخدم (A language selected by the user for viewing menus, dialog boxes, messages, and Help files. If none is selected, the system-preferred language is displayed) |
user principal name | اسم المستخدم الأساسي |
user principal name suffix | لاحقة الاسم الأساسي للمستخدم |
User profile | ملف تعريف المستخدم (A form that holds predefined roles. Each user profile consists of predefined Quick Links, Alert rules, Favorites, and Metrics. Users must be assigned to a profile in order to access a respective role center) |
user profile | ملف تعريف المستخدم (A file that contains configuration information for a specific user, such as desktop settings, persistent network connections, and application settings) |
user profile | ملف تعرف المستخدم (A description of the eventual users of the solution in terms of geography, organizational and communication structures, user functions, resource availability, and other relevant information) |
User Profile service | خدمة ملف تعريف المستخدم (A shared service in Microsoft SharePoint Server that enables the creation and management of user profiles that can be accessed from multiple sites and farms) |
user rights | حقوق المستخدم (Tasks that a user is permitted to perform on a computer system or domain) |
User Self Trust Certificate | شهادة ثقة المستخدم الذاتية (In the absence of a certification authority (CA) that is capable of issuing file encryption certificates, a certificate that is generated and digitally signed by applications on behalf of the user) |
User Services pool | تجمّع خدمات المستخدم (Provides presence information and helps to manage preferences) |
User Services service | خدمة خادم المستخدم (A Lync Server service that is used to help maintain presence information for users and to manage meetings and conferences) |
User Solution Packaging | وضع محتويات المستخدم في حزمة (An approach that packages together all content deployable to SharePoint -- list templates, list instance, site template, files and declarative workflows) |
user state capture | التقاط حالة المستخدم (Capability to use default settings and algorithms of Windows Easy Transfer to capture user files and settings. This capability includes logic to determine additional file types that may have been created or modified by users. Without default logic, capture is based on defined manifest of where to look for and what file formats to look for) |
username (The name by which a user is identified to a computer system or network. During the logon process, the user must enter the username and the correct password. If the system or network is connected to the Internet, the username generally corresponds to the leftmost part of the user's e-mail address (the portion preceding the | اسم المستخدم |
Users group | مجموعة المستخدمين (The group account that contains all user accounts. Access automatically adds user accounts to the Users group when you create them) |
Voice User Interface | واجهة المستخدم الصوتية (An interface that is used to navigate the menus of a Unified Messaging (UM) system using speech inputs) |
Windows Azure Multi-Factor Authentication User Portal | مدخل مستخدمي Windows Azure Multi-Factor Authentication (Allows users to complete the Multi-Factor Authentication enrollment process and manage their settings, such as phone number and PIN, through a simple web interface) |
Windows user account | حساب مستخدم Windows (All the information that defines a user to the operating system, including the user name and any required password, membership in groups, and the rights and permissions that are associated with the user) |
Windows user name | اسم المستخدم في Windows (A unique name that identifies a user account to Windows. An account's user name must be unique among the other group names and user names within its own domain or workgroup) |