DictionaryForumContacts

   Konkani
Terms containing एक्सेस | all forms
SubjectKonkaniEnglish
comp., MSएक्सेस अनुमतीaccess permissions (Authorization to perform operations associated with a specific shared resource, such as a file, directory, or printer. Permissions must be granted by the system administrator to individual user accounts or administrative groups)
comp., MSएक्सेस उल्लंघनaccess violation (An attempt to run a memory operation that the underlying page protection does not allow. An access violation applies to memory operations, but does not apply when the security manager checks user-mode access rights to objects)
comp., MSएक्सेस कीaccess key (Any combination of keys that must be pressed sequentially)
comp., MSएक्सेस केंद्राची रांकEase of Access Center (An area within the Control Panel that provides accessibility options and settings to help users interact more easily with the computer)
comp., MSएक्सेस कोडaccess code (A string of characters entered by a user to verify his or her identity to a network or to a local computer, device, or client, or to sign in to an account, app, and so on)
comp., MSएक्सेस नियंत्रण सुचीaccess control list (In Windows-based systems, a list of access control entries (ACE) that apply to an entire object, a set of the object's properties, or an individual property of an object, and that define the access granted to one or more security principals)
comp., MSएक्सेस पुरवणकर्तो, सर्विस प्रोव्हायडरaccess provider (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers)
comp., MSएक्सेस पॉयंटaccess point (A device used to connect wireless computers and other wireless devices to a wired network)
comp., MSएक्सेस सेवाAccess Services (A scalable Web platform that enables users to publish an Access database application to a SharePoint site. Data in these databases can then be viewed and edited in a Web browser. This enables browser-based viewing and interaction with the databases on machines that do not have a database application installed)
comp., MSडायरेक्ट मॅमरी एक्सेसdirect memory access (A technology that allows certain devices, such as hard disks and CD or DVD drives, to transfer information directly through the computer's memory without using the computer's processor. DMA improves the performance of the device and frees the computer's processor so it can perform other tasks)
comp., MSबरोवंक एक्सेसwrite access (A privilege on a computer system that allows a user to save, change, or delete stored data. Write access is usually set by the system administrator for a networked or server system and by the owner of the computer for a stand-alone machine)
comp., MSबेगीन एक्सेस साधनपट्टीQuick Access Toolbar (A customizable toolbar that provides one-click access to commands)
comp., MSम्हायती एक्सेस सेवाInformation Access Service (A part of an IrDA infrared communication protocol used so that devices can learn about the services offered by another device)
comp., MSमाजाळे एक्सेस पुरवणकर्तोInternet access provider (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers)
comp., MSमाजाळें संदेश एक्सेस प्रोटोकॉलInternet Message Access Protocol (A method computers use to send and receive e-mail messages. It allows you to access e-mail without downloading it to your computer)
comp., MSरॅंडम एक्सेस मॅमरीrandom access memory (The temporary storage area the computer uses to run programs and store data. Information stored in RAM is temporary and is designed to be erased when the computer is turned off)
comp., MSWi-Fi राखिल्लो एक्सेस 2Wi-Fi Protected Access 2 (A wireless implementation and the second generation of WPA security that is based on the final IEEE 802.11i amendment to the 802.11 standard)
comp., MSWi-Fi राखिल्लो एक्सेसWi-Fi Protected Access (A security method used by wireless networks. WPA encrypts the information that is sent between computers on a wireless network and authenticates users to help ensure that only authorized people can access the network)
comp., MSरिमोट एक्सेremote access (Part of the integrated Routing and Remote Access service that provides remote networking for telecommuters, mobile workers, and system administrators who monitor and manage servers at multiple branch offices. Users can use Network Connections to dial in to remotely access their networks for services such as file and printer sharing, electronic mail, scheduling, and SQL database access)
comp., MSलायटवेट डिरॅक्ट्री एक्सेस प्रोटोकॉलLightweight Directory Access Protocol (The primary access protocol for Active Directory. LDAP is an industry-standard protocol, established by the Internet Engineering Task Force (IETF), that allows users to query and update information in a directory service. Active Directory supports both LDAP version 2 and LDAP version 3)
comp., MSWi-Fi सांबाळिल्लो एक्सेसWPA (A security method used by wireless networks. WPA encrypts the information that is sent between computers on a wireless network and authenticates users to help ensure that only authorized people can access the network)
comp., MSसांबाळिल्लो एक्सेस, WPAWPA (A security method used by wireless networks. WPA encrypts the information that is sent between computers on a wireless network and authenticates users to help ensure that only authorized people can access the network)
comp., MSWi-Fi सांबाळिल्लो एक्सेसWi-Fi Protected Access (A security method used by wireless networks. WPA encrypts the information that is sent between computers on a wireless network and authenticates users to help ensure that only authorized people can access the network)
comp., MSसांबाळिल्लो एक्सेसWi-Fi Protected Access (A security method used by wireless networks. WPA encrypts the information that is sent between computers on a wireless network and authenticates users to help ensure that only authorized people can access the network)