DictionaryForumContacts

   English
Terms for subject Microsoft containing access | all forms | exact matches only
EnglishArabic
access accountحساب الوصول (An account used to crawl Web sites, servers and network resources included in a content index)
Access appتطبيق Access (An app for SharePoint that is built by using Access and has its data stored in SQL Server or SQL Azure)
Access app for SharePointتطبيق Access لـ SharePoint (An app for SharePoint that is built by using Access and has its data stored in SQL Server or SQL Azure)
access codeرمز الوصول (A string of characters entered by a user to verify his or her identity to a network or to a local computer, device, or client, or to sign in to an account, app, and so on)
access controlالتحكم بالوصول (A security mechanism that determines which operations a user, group, service, or computer is authorized to perform on a computer or on a particular object, such as a file, printer, registry subkey, or directory service object)
access control entryإدخال التحكم بالوصول (An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object)
Access Control Entry Management Viewطريقة عرض إدارة إدخال التحكم بالوصول (A feature that allows the user to set access levels for a group of contacts)
access control listقائمة التحكم بالوصول (In Windows-based systems, a list of access control entries (ACE) that apply to an entire object, a set of the object's properties, or an individual property of an object, and that define the access granted to one or more security principals)
Access Control Serverخادم التحكم في الوصول (A component of Cisco Identity Based Networking Services (IBNS) architecture that improves network access security for Cisco network devices)
Access database engineمشغل قاعدة بيانات Access (Part of the Access database system that retrieves and stores data in user and system databases. The engine can be thought of as a data manager on which database systems are built)
Access Edge serviceخدمة Access Edge (A service that runs on Lync Server that resides in the perimeter network and routes instant messaging (IM) and presence information from external users to internal users)
access keyمفتاح الاختصار (Any combination of keys that must be pressed sequentially)
access levelمستوى الوصول (A security role setting that determines for a given object type at which levels within the organization hierarchy a user can act on that object type)
Access Levels Managementإدارة مستويات الوصول (A UI element that displays a user's contacts and access level entries (ACEs) organized by access level)
access maskقناع الوصول (In Windows-based computers, a 32-bit value (a bitmask) that specifies the permissions that are assigned in an access control entry (ACE). An access mask is also part of the access request when an object is opened. The access mask in the request is compared to the access mask in each ACE to determine whether or not to grant the request)
access permissionsأذونات وصول (Authorization to perform operations associated with a specific shared resource, such as a file, directory, or printer. Permissions must be granted by the system administrator to individual user accounts or administrative groups)
access pointنقطة الوصول (A device used to connect wireless computers and other wireless devices to a wired network)
access privilegesامتيازات الدخول (The type of operations permitted for a given user of a certain system resource on a network or a file server)
access providerموفر خدمة الإنترنت (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers)
Access Services Administrationإدارة خدمات Access (A feature that allows administration of Access services through an administration interface and powershell scripts)
access tokenرمز مميز للوصول (A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority)
alternate access mappingتعيين موقع وصول بديل (An alternate URL mapping that Windows SharePoint Services preserves in the mapping table. It is the URL a user would see, but is not a URL that IIS would give to WSS)
Anonymous accessوصول مجهول (An authentication mechanism that does not require user accounts and passwords)
anonymous user accessوصول مستخدم مجهول (The ability to gain access to a Web server on which one does not have an account)
authenticated accessوصول مصدق (A user access option that you specify at the default Web site level or Application level in IIS. Authenticated access requires a user to have a valid account and password to access the site)
authority information accessالوصول إلى معلومات المرجع (A certificate extension that contains information useful for verifying the trust status of a certificate, as defined by the 2008 Memo of the Network Working Group. This information potentially includes Uniform Resource Locations (URLs) where the issuing CA's certificate can be retrieved, as well as a location of an Online Certificate Status Protocol (OCSP) responder configured to provide status for the certificate in question)
Change Level of Accessتغيير مستوى الوصول (Contact context menu item that allows the user to assign an access level to the selected contact(s))
client access pointنقطة وصول العميل (In SMS 2003 and earlier releases, an SMS site system that provides a communication point between the SMS site server and Legacy Client computers. Legacy Clients deliver their collected files, inventory information, discovery data records, software metering data, and status information to CAPs)
Client Access server roleدور خادم Client Access (A set of components and services that enable users to access their Exchange mailboxes through the application Outlook Web Access and the protocols Exchange ActiveSync, Post Office Protocol version 3 (POP3), and Internet Message Access Protocol 4rev1 (IMAP4). The Client Access server role also includes Web services that are used by other Exchange 2007 server roles)
code access securityأمان الوصول إلى التعليمات البرمجية (A mechanism provided by the common language runtime whereby managed code is granted permissions by security policy and these permissions are enforced, helping to limit the operations that the code will be allowed to perform)
content access accountحساب الوصول إلى المحتوى (An account used to crawl Web sites, servers and network resources included in a content index)
custom driver accessالوصول إلى برنامج تشغيل مخصص (Device IO Control to 3rd party driver, a form of restricted device interface access for privileged apps)
Data Access Objectsكائنات الوصول إلى البيانات (A programming interface to access and manipulate database objects)
data access pageصفحة الوصول إلى البيانات (A Web page, published from Access, that has a connection to a database. In a data access page, you can view, add to, edit, and manipulate the data stored in the database)
Device Access APIواجهة برمجة تطبيقات وصول الأجهزة (A set of COM interfaces that a device companion app can use to send requests, to a specialized device, synchronously or asynchronously)
direct accessوصول مباشر (A way of accessing properties and methods supplied by WMI in a script as if they were automation properties and methods of an object instance)
direct memory accessوصول مباشر للذاكرة (A technology that allows certain devices, such as hard disks and CD or DVD drives, to transfer information directly through the computer's memory without using the computer's processor. DMA improves the performance of the device and frees the computer's processor so it can perform other tasks)
discretionary access control listقائمة نسبية للتحكم بالوصول (An access control list that is controlled by the owner of an object and that specifies the access particular users or groups can have to the object)
dynamic access controlالتحكم الديناميكي بالوصول (The ability for IT pros to define how users access a system based on dynamic qualities, such as a user's location or role)
dynamic random access memory A form of semiconductor random access memory (RAM)ذاكرة الوصول العشوائية الديناميكية (RAM الديناميكية)
Ease of Access Centerمركز سهولة الوصول (An area within the Control Panel that provides accessibility options and settings to help users interact more easily with the computer)
Exchange Fast Accessالوصول السريع من Exchange (A feature that enables Exchange users to see new email messages and up-to-date calendar items as soon as they open Outlook, without waiting for it to finish synchronizing)
external accessوصول خارجي (Authenticated access that can be granted to external partners and clients to enable sharing of selected SharePoint Online content)
field access profileملف تعريف الوصول إلى الحقل (The set of field-level access permissions that have been granted to a user or users)
field-level accessوصول على مستوى الحقل (The permission that is assigned to a user or users that allow them to read, update, or create a specific field)
full accessوصول كامل (A privilege on a computer system that allows a user to read, write, and delete data)
international access codeرمز الوصول الدولي (The prefix that is used to direct a call internationally. The International Access Code is 011 in the United States and 00 in much of the rest of the world)
Internet accessوصول للإنترنت (The capability of a user to connect to the Internet)
Internet access providerمزود خدمة الإنترنت (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers)
Internet Message Access Protocol A method computers use to send and receive e-mail messages. It allows you to access e-mail without downloading it to your computerبروتوكول الوصول إلى الرسائل عبر إنترنت (IMAP)
Lightweight Directory Access Protocolالبروتوكول الخفيف لتغيير بيانات الدليل (The primary access protocol for Active Directory. LDAP is an industry-standard protocol, established by the Internet Engineering Task Force (IETF), that allows users to query and update information in a directory service. Active Directory supports both LDAP version 2 and LDAP version 3)
media access controlوحدة تحكم وصول الوسائط (A sublayer of the IEEE 802 specifications that defines network access methods and framing)
Microsoft Access data fileملف بيانات Microsoft Access (A database or project file for Microsoft Access)
Microsoft Access projectمشروع Microsoft Access (An Access file that connects to a Microsoft SQL Server database and is used to create client/server applications. A project file doesn't contain any data or data-definition-based objects such as tables and views)
Mobile Access for Windows SharePoint Servicesوصول أجهزة محمولة لخدمات Windows SharePoint (A feature that enables mobile devices, such as cellular phones, to access some SharePoint services)
Network Access Protectionحماية الوصول لشبكة الاتصال (A set of operating system components that can help protect access to a private network by enforcing health policies. System administrators establish health policies which NAP enforces by inspecting and assessing the health of client computers, restricting network access when client computers are deemed noncompliant, and remediating noncompliant client computers for full network access. NAP also provides ongoing health compliance enforcement while a client computer is connected to a network)
network access serverملقم وصول للشبكة (The device that accepts Point-to-Point Protocol (PPP) connections and places clients on the network that the NAS serves)
Open Device Access Modelنمط الوصول المفتوح إلى جهاز (The access model for horizontal solutions, which enables a horizontal strategy. Open Device Access enables many different Windows Store apps to access a specialized device. Examples: a smartphone with multiple apps that synchronize contacts; a pedometer that allows multiple apps to read its data and post it to a website)
Outlook Voice Accessوصول صوتي إلى Outlook (A feature that allows a Unified Messaging-enabled user to access their Microsoft Exchange Server mailbox over the telephone. Users can navigate through their mailboxes by using telephone-key or Speech input)
outside line access codeرمز الوصول إلى خط خارجي (The prefix that is used to access an outside line. In the United States, this prefix is typically 9)
Principles for the data access and the testability of digital documentsمبادئ الوصول إلى البيانات وقابلية المستندات الرقمية للاختبار (A German law that requires tax authorities to be capable of digitally checking data from electronic bookkeeping systems)
Quick Access Toolbarشريط أدوات وصول سريع (A customizable toolbar that provides one-click access to commands)
random access memoryذاكرة الوصول العشوائي (The temporary storage area the computer uses to run programs and store data. Information stored in RAM is temporary and is designed to be erased when the computer is turned off)
random access memory cacheتخزين مؤقت في ذاكرة الوصول العشوائي (Cache memory that is used by the system to store and retrieve data from the RAM. Frequently accessed segments of data may be stored in the cache for quicker access compared with secondary storage devices such as disks)
read accessوصول للقراءة فقط (A privilege on a computer system that allows a user to read stored data)
remote accessالوصول عن بُعد (Part of the integrated Routing and Remote Access service that provides remote networking for telecommuters, mobile workers, and system administrators who monitor and manage servers at multiple branch offices. Users can use Network Connections to dial in to remotely access their networks for services such as file and printer sharing, electronic mail, scheduling, and SQL database access)
remote access serverخادم الوصول عن بُعد (A Windows-based computer running the Routing and Remote Access service and configured to provide remote access)
remote access Trojanوصول بعيد عن طريق حصان طروادة (A type of Trojan that provides remote access to a computer)
Remote Direct Memory Accessالوصول المباشر إلى الذاكرة عن بُعد (A networking feature that lets one computer directly place information into the memory of another computer)
Restricted Device Access Modelنمط الوصول المقيد إلى جهاز (The device access model for vertical solutions. Restricted Device Access does not allow other applications to access a specialized device)
scatter/gather direct memory accessالوصول المباشر للذاكرة للتخزين المتفرق (A form of direct memory access (DMA) in which data is transferred to and from noncontiguous ranges of physical memory)
service access pointنقطة الوصول إلى الخدمة (A logical address that allows a system to route data between a remote device and the appropriate communications support)
Simple Object Access ProtocolSimple Object Access Protocol" بروتوكول" (A simple, XML-based protocol for exchanging structured data and type information on the World Wide Web. The protocol is currently the de facto standard for XML messaging)
Specialized Device Access Modelنموذج الوصول إلى الأجهزة المتخصصة (The model that describes the two ways that a Windows Store app can access a specialized device: Open Access Model and Restricted Device Access Model)
subscriber access numberرقم الوصول للمشترك (A number that is configured in a Private Branch eXchange (PBX) that allows a subscriber to access their Microsoft Exchange mailbox over the telephone)
system access control listقائمة التحكم بالوصول للنظام (An ACL that controls the generation of audit messages for attempts to access a securable object. The ability to get or set an object's SACL is controlled by a privilege typically held only by system administrators)
Test Access Portمنفذ اختبار الوصول (A collection of boundary scan control signals that define a serial protocol for scan-based devices. There are five pins, TCK/clock, TMS/mode select, TDI/data in, TDO/data out, and TRST/reset)
UM access telephone numberرقم هاتف الوصول إلى UM (A telephone number that points to a hunt group and is the access number for calls that are routed to Unified Messaging servers)
Visio Web Access Web Partجزء ويب Visio Web Access (A Web Part that enables users to view (in full fidelity) and share Visio files in SharePoint Server without having the Visio client installed)
Wi-Fi Protected Accessالوصول المحمي بالدقة اللاسلكية (A security method used by wireless networks. WPA encrypts the information that is sent between computers on a wireless network and authenticates users to help ensure that only authorized people can access the network)
Wi-Fi Protected Access 2الوصول المحمي بالدقة اللاسلكية 2 (A wireless implementation and the second generation of WPA security that is based on the final IEEE 802.11i amendment to the 802.11 standard)