English | Slovak |
access key | prístupový kláves (Any combination of keys that must be pressed sequentially) |
ALT key | kláves Alt (A keyboard key that is used in conjunction with another key to produce some special feature or function and is typically marked with the letters Alt) |
alternate key | alternatívny kľúč (A candidate key that is not designated as the primary key and is used to uniquely identify records in a database table) |
arrow key | kláves so šípkou (Any of four keys labeled with arrows pointing up, down, left, and right, used to move the cursor vertically or horizontally on the display screen or, in some programs, to extend the highlight) |
attestation identity key | kľúč AIK (The cryptographic representation of the hardware or software state and other integrity metrics, and which can be used to perform anonymous or pseudo-anonymous attestations to remote parties in multiparty transactions) |
Authority Key Identifier | Identifikátor kľúča certifikačnej autority (A certificate extension used by the certificate chaining engine to determine what certificate was used to sign a presented certificate. The AKI can contain the issuer name, serial number, public key information, or no information at all. By matching the information in a certificate's AKI extension to a CA certificate's Subject Key Identifier (SKI) extension, a certificate chain can be built) |
BACKSPACE key | kláves Backspace (A keyboard key that moves the cursor to the left, one character at a time, usually erasing each character as it moves) |
BitLocker recovery key | kľúč na obnovenie pre šifrovanie BitLocker (A special key that you can create when you turn on Bitlocker Drive Encryption for the first time on each drive that you encrypt) |
CAPS LOCK key | Caps Lock (A toggle key that, when on, shifts the alphabetic characters on the keyboard to uppercase) |
class key | kľúč triedy (The subset of data members of a class whose values uniquely identify an instance of the class) |
color key | farebný kľúč (A color used for transparent or translucent effects. An overlay surface is displayed in the region of the primary surface that contains the color key. In video production, color keys are used to combine two video signals) |
content key | kľúč obsahu (The cryptographic key used to both encrypt and decrypt protected content during publishing and consumption) |
crypto escrow key | sekundárny uschovaný šifrovací kľúč (A secondary encryption key that provides the ability for an authorized IT Helpdesk administrator to open an encrypted document when the password is lost) |
data encryption key | kľúč na šifrovanie údajov (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data) |
dead key | pomocný diakritický kláves (A key that is used to modify the character that follows it, for example, by adding an accent mark or other diacritic) |
DELETE key | kláves Delete (On IBM and PC-compatible computers, a key whose function changes depending on the application program. Usually it erases the character under the cursor, although in some applications it can erase selected text or graphics) |
derived session key | odvodený kľúč relácie (A session key created by an application as needed. Before creating a derived session key, an application prompts the user for a password) |
e-mail quick key | kláves na rýchle zadávanie textu pri písaní e-mailu (A key that you use in some e-mail programs to enter text that is commonly used) |
encryption key | šifrovací kľúč (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data) |
endorsement key | overovací kľúč (A key pair, consisting of a public key and a private key, which is used to verify that a TPM is genuine) |
enhanced key usage | rozšírené použitie kľúča (An extended property value that specifies the uses for which a certificate is valid) |
ENTER key | kláves Enter (The key that is used at the end of a line or command to instruct the computer to process the command or text. In word processing programs, the Enter key is used at the end of a paragraph. Also called: Return key) |
ESC key | kláves Esc (A keyboard key that sends the escape (ESC) character to the computer. Often this key moves the user back one level in the menu structure or exits the program) |
foreign key | cudzí kľúč (" A key in a database table that comes from another table (also know as the "referenced table") and whose values match the primary key (PK) or unique key in the referenced table.") |
INSERT key | kláves Insert (" A key on the keyboard, labeled "Insert" or "Ins", whose usual function is to toggle a program's editing setting between an insert mode and an overwrite mode, although it may perform different functions in different applications.") |
key action | akcia po stlačení kľúča (Term used to describe program behavior when a certain key is pressed on the keyboard. Key actions are associated with items within a source document) |
key combination | kombinácia klávesov (Any combination of keystrokes that can be used to perform a task that would otherwise require a mouse or other pointing device) |
key compromise | ohrozenie zabezpečenia kľúča (The loss of the confidentiality associated with the key, as would happen if, for example, someone gained a copy of the key) |
Key Distribution Center | stredisko distribúcie kľúčov (A network service that supplies session tickets and temporary session keys to users and computers within an Active Directory domain. The KDC runs on each domain controller as part of Active Directory Domain Services (AD DS)) |
key exchange | výmena kľúčov (Confidential exchange of secret keys online, which is commonly done with public key cryptography) |
key filter | kľúčový filter (A metadata column or field in a Key Filters control) |
Key Filters | Kľúčové filtre (A metadata navigation control that enables users to limit the items displayed in a list or library to those that match selected values) |
key frame | kľúčová snímka (A video frame in which starting and ending positions of an object are given, and all frames in between are interpolated by a computer to produce smooth automated animation. Most ray-traced computer animation is created using this technique) |
key ID | identifikácia kľúča (A value that identifies the key for a packaged Windows Media file) |
Key Management Server | server na správu kľúčov (The Exchange computer on which the Key Management Service has been installed. There can be one Key Management Server per administrative group) |
Key Management Service | služba na spravovanie kľúčov (An optional Microsoft Exchange 2000 Server component that is installed on a designated server in an administrative group. It provides centralized administration and archival of private keys, and maintains every user s private encryption key in an encrypted database. The keys are used for encrypting e-mail messages and signing messages with digital signatures) |
Key press | stlačenie klávesu (" An option in "ringtones & sounds" settings. When this option is selected, the phone makes a sound when buttons on the on-screen keypad or keyboard are tapped.") |
key protector | protektor klúča (A blob (binary large object) that is used to restrict access to a BitLocker-protected disk) |
key roaming | roaming pomocou kľúča (The process of moving between different environments or computers while authenitcated by certificates or keys centrally stored on a server) |
license key seed | generátor licenčných kľúčov (A shared secret value that is used to generate keys to encrypt Windows Media files) |
multi-activation key | kód pre viaceré aktivácie (A product key that is provided to Microsoft customers who choose a Microsoft Volume Licensing program for their organizations and that allows multiple installations of a particular product. The key is assigned to a company or institution intended for their sole use and only for distribution to employees or third parties who are authorized to install and distribute licenses pursuant to the terms of their license agreement) |
network security key | klúč zabezpečenia siete (A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key) |
PAGE DOWN key | kláves Page Down (" A keyboard key (often labeled "PgDn") that is often used to move the cursor down to the top of the next page or a specific number of lines. Its function may vary in different programs.") |
PAGE UP key | kláves Page Up (" A keyboard key (often labeled "PgUp") that is often used to move the cursor up to the top of the previous page or a specific number of lines. Its function may vary in different programs.") |
Pairwise Master Key | kľúč PMK (A 256-bit key derived from the Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) or Protected EAP (PEAP) authentication process) |
PIN unlock key | kód na odblokovanie PIN kódu (An 8-digit code used to unlock the SIM card. A Personal Unlocking Key is a type of personal identification number (PIN)) |
primary key | primárny kľúč (One or more fields that uniquely identify each record in a table. In the same way that a license plate number identifies a car, the primary key uniquely identifies a record) |
private key | súkromný kľúč (The secret half of a cryptographic key pair that is used with a public key algorithm. Private keys are typically used to decrypt a symmetric session key, digitally sign data, or decrypt data that has been encrypted with the corresponding public key) |
private key | súkromný kľúč (The secret half of a cryptographic key pair that is used with a public key algorithm. Private keys are typically used to decrypt a symmetric session key, digitally sign data, or decrypt data that has been encrypted with the corresponding public key) |
product key | kód Product Key (A sequence of 25 letters and numbers. To activate some software, you must enter a product key during the activation process) |
public key | verejný kľúč (The nonsecret half of a cryptographic key pair that is used with a public key algorithm. Public keys are typically used when encrypting a session key, verifying a digital signature, or encrypting data that can be decrypted with the corresponding private key) |
public key | verejný kľúč (The nonsecret half of a cryptographic key pair that is used with a public key algorithm. Public keys are typically used when encrypting a session key, verifying a digital signature, or encrypting data that can be decrypted with the corresponding private key) |
public key encryption | šifrovanie verejným kľúčom (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
public key infrastructure | infraštruktúra verejných kľúčov (The laws, policies, standards, and software that regulate or manipulate certificates and public and private keys. In practice, it is a system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in an electronic transaction. Standards for PKI are still evolving, even though they are being widely implemented as a necessary element of electronic commerce) |
registry key | kľúč databázy Registry (An identifier for a record or group of records in the registry) |
replica key | kľúč repliky (A 4-byte value that maps to a replica ID in a replica key map) |
retail key | kód retail key (A type of product key required during the installation of Windows) |
SCROLL LOCK key | kláves Scroll Lock (On the IBM PC/XT and AT and compatible keyboards, a key on the top row of the numeric keypad that controls the effect of the cursor control keys and sometimes prevents the screen from scrolling. On the enhanced and Macintosh keyboards, this key is to the right of the function keys on the top row. Many modern applications ignore the Scroll Lock setting) |
search key | kľúč vyhľadávania (The value that is to be searched for in a document or any collection of data) |
secret key | tajný kľúč (A symmetric encryption key shared by two entities, such as between a user and the domain controller (DC), with a long lifetime. A password is a common example of a secret key. When used in a context that implies Kerberos only, a principal's secret key) |
soft key | funkčné tlačidlo (" One of the two unlabeled keys located just below the display area on a mobile phone. These keys are called "soft" because their functions change to fit the context. Labels in the lower part of the mobile screen tell users what the soft keys do.") |
speed dial key | tlačidlo rýchlej voľby (A single- or double-digit number associated with telephone numbers, or e-mail or Web addresses, that enables users to quickly access the numbers or addresses) |
storage root key | kľúč SRK (On a system that incorporates a TPM, a cryptographic asymmetric key which is created at the root of the TPM key hierarchy (2048-bit RSA key) and which is used by the TPM to store protected data. The private portion of this key never leaves the TPM. The public part of this key is returned to the owner and needs to be carefully guarded since it uniquely identifies the TPM on the network, therefore is privacy sensitive) |
symmetric-key cryptography | šifrovanie symetrickými kľúčmi (A type of cryptography that uses symmetric keys to provide confidentiality) |
toggle key | prepínací kláves (A keyboard key that alternates between turning a particular operation, function, or mode on or off) |
virtual key code | kód virtuálneho klávesu (A symbolic constant name, hexadecimal value, or mouse or keyboard equivalent that provides a hardware and language-independent method of identifying keyboard keys. Each virtual key code represents a unique keyboard key and also identifies the purpose of that key. The keyboard driver must provide one or more keyboard layouts that maps keyboard scan codes to the appropriate virtual key codes) |
volume license key | licenčný kód multilicencie (A product key that is provided to Microsoft customers who choose a Microsoft Volume Licensing program for their organizations and that allows multiple installations of a particular product. The key is assigned to a company or institution intended for their sole use and only for distribution to employees or third parties who are authorized to install and distribute licenses pursuant to the terms of their license agreement) |