Romanian | English |
acces autentificat | authenticated access (A user access option that you specify at the default Web site level or Application level in IIS. Authenticated access requires a user to have a valid account and password to access the site) |
acces complet | full access (A privilege on a computer system that allows a user to read, write, and delete data) |
acces direct la memorie | direct memory access (A technology that allows certain devices, such as hard disks and CD or DVD drives, to transfer information directly through the computer's memory without using the computer's processor. DMA improves the performance of the device and frees the computer's processor so it can perform other tasks) |
Acces direct la memorie de la distanță | Remote Direct Memory Access A networking feature that lets one computer directly place information into the memory of another computer (RDMA) |
acces direct la memorie de tip scatter/gather | scatter/gather DMA (A form of direct memory access (DMA) in which data is transferred to and from noncontiguous ranges of physical memory) |
acces direct la memorie de tip scatter/gather | scatter/gather direct memory access (A form of direct memory access (DMA) in which data is transferred to and from noncontiguous ranges of physical memory) |
acces extern | external access (Authenticated access that can be granted to external partners and clients to enable sharing of selected SharePoint Online content) |
acces la distanță | remote access (Part of the integrated Routing and Remote Access service that provides remote networking for telecommuters, mobile workers, and system administrators who monitor and manage servers at multiple branch offices. Users can use Network Connections to dial in to remotely access their networks for services such as file and printer sharing, electronic mail, scheduling, and SQL database access) |
acces la informații de autoritate | authority information access (A certificate extension that contains information useful for verifying the trust status of a certificate, as defined by the 2008 Memo of the Network Working Group. This information potentially includes Uniform Resource Locations (URLs) where the issuing CA's certificate can be retrieved, as well as a location of an Online Certificate Status Protocol (OCSP) responder configured to provide status for the certificate in question) |
acces la nivel de câmp | field-level access (The permission that is assigned to a user or users that allow them to read, update, or create a specific field) |
Acces mobil pentru Windows SharePoint Services | Mobile Access for Windows SharePoint Services (A feature that enables mobile devices, such as cellular phones, to access some SharePoint services) |
acces muzică nelimitat | unlimited music (Users who subscribe to Xbox Music Pass can download and listen to as many songs as they want as long as the subscription remains active) |
acces protejat Wi-Fi 2 | Wi-Fi Protected Access 2 (A wireless implementation and the second generation of WPA security that is based on the final IEEE 802.11i amendment to the 802.11 standard) |
acces protejat Wi-Fi | Wi-Fi Protected Access (A security method used by wireless networks. WPA encrypts the information that is sent between computers on a wireless network and authenticates users to help ensure that only authorized people can access the network) |
Acces rapid Exchange | Exchange Fast Access (A feature that enables Exchange users to see new email messages and up-to-date calendar items as soon as they open Outlook, without waiting for it to finish synchronizing) |
acces unic | one-time bypass (To allow access one-time) |
acces utilizator anonim | anonymous user access (The ability to gain access to a Web server on which one does not have an account) |
Acces vocal Outlook | Outlook Voice Access (A feature that allows a Unified Messaging-enabled user to access their Microsoft Exchange Server mailbox over the telephone. Users can navigate through their mailboxes by using telephone-key or Speech input) |
API de acces la dispozitiv | Device Access API (A set of COM interfaces that a device companion app can use to send requests, to a specialized device, synchronously or asynchronously) |
Aplicație de acces la serviciile BDC | BDC Service Application (A deployed instance of the Business Data Connectivity Shared Service) |
Aplicație de acces la serviciile Business Data Connectivity | Business Data Connectivity Service Application (A deployed instance of the Business Data Connectivity Shared Service) |
asigurare acces | provisioning (The assignment of access privileges and system resources to users, including employees, contingent staff and business partners; frequently automated as part of Identity and Access Management solutions in order to reduce ongoing support costs and enable corporations to demonstrate their compliance with documented security policies) |
asigurare acces | provision (To configure a user account and enable the account with access to some form of service) |
Bara de instrumente Acces rapid | Quick Access Toolbar (A customizable toolbar that provides one-click access to commands) |
Centru de simplificare acces | Ease of Access Center (An area within the Control Panel that provides accessibility options and settings to help users interact more easily with the computer) |
cheie de acces | passkey (A number similar to a personal identification number (PIN) that identifies (or authenticates) a Bluetooth enabled device to a computer) |
cod de acces | access code (A string of characters entered by a user to verify his or her identity to a network or to a local computer, device, or client, or to sign in to an account, app, and so on) |
cod de acces | passcode (An authentication credential similar to a password, consisting of numbers) |
cont de acces | access account (An account used to crawl Web sites, servers and network resources included in a content index) |
cont de acces la conținut | content access account (An account used to crawl Web sites, servers and network resources included in a content index) |
control acces | access control (A security mechanism that determines which operations a user, group, service, or computer is authorized to perform on a computer or on a particular object, such as a file, printer, registry subkey, or directory service object) |
control acces dinamic | dynamic access control (The ability for IT pros to define how users access a system based on dynamic qualities, such as a user's location or role) |
drepturi de acces | access permissions (Authorization to perform operations associated with a specific shared resource, such as a file, directory, or printer. Permissions must be granted by the system administrator to individual user accounts or administrative groups) |
frază de acces | passphrase (A sequence of words or other text used to gain access to a network, program, or data. A passphrase is generally longer for added security) |
furnizor de acces | access provider (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers) |
furnizor de acces la internet | Internet access provider (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers) |
Furnizor de acces la Internet | IAP (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers) |
Gestionare niveluri de acces | Access Levels Management (A UI element that displays a user's contacts and access level entries (ACEs) organized by access level) |
interfață comună porți de acces | common gateway interface (A server-side interface for initiating software services. For example, a set of interfaces that describe how a Web server communicates with software on the same computer. Any software can be a CGI program if it handles input and output according to the CGI standard) |
intrare control de acces | access control entry (An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object) |
Listă de acces | Jump List (A feature of Windows that provide right-click access from taskbar program buttons to the documents, pictures, songs, or websites a user frequently accesses) |
listă de control pentru acces la sistem | system access control list (An ACL that controls the generation of audit messages for attempts to access a securable object. The ability to get or set an object's SACL is controlled by a privilege typically held only by system administrators) |
mapare alternativă de acces | alternate access mapping (An alternate URL mapping that Windows SharePoint Services preserves in the mapping table. It is the URL a user would see, but is not a URL that IIS would give to WSS) |
mască de acces | access mask (In Windows-based computers, a 32-bit value (a bitmask) that specifies the permissions that are assigned in an access control entry (ACE). An access mask is also part of the access request when an object is opened. The access mask in the request is compared to the access mask in each ACE to determine whether or not to grant the request) |
memorie cache cu acces aleatoriu | random access memory cache (Cache memory that is used by the system to store and retrieve data from the RAM. Frequently accessed segments of data may be stored in the cache for quicker access compared with secondary storage devices such as disks) |
memorie cu acces aleator | random access memory (The temporary storage area the computer uses to run programs and store data. Information stored in RAM is temporary and is designed to be erased when the computer is turned off) |
memorie dinamică cu acces aleator | dynamic random access memory (A form of semiconductor random access memory (RAM)) |
Microsoft Dynamics CRM pentru Microsoft Office Outlook cu acces offline | Microsoft Dynamics CRM for Microsoft Office Outlook with Offline Access (The laptop client version of the Microsoft Dynamics CRM product suite for Microsoft Office Outlook) |
Modificare nivel de acces | Change Level of Access (Contact context menu item that allows the user to assign an access level to the selected contact(s)) |
nivel de acces | access level (A setting that determines how much information a contact can view about you) |
număr de acces abonat | subscriber access number (A number that is configured in a Private Branch eXchange (PBX) that allows a subscriber to access their Microsoft Exchange mailbox over the telephone) |
număr de telefon acces UM | UM access telephone number (A telephone number that points to a hunt group and is the access number for calls that are routed to Unified Messaging servers) |
pachet pentru asigurare acces | provisioning packet (An XML packet that is downloaded by the computer enabled by FlexGo technology from the Provisioning Server over the Internet. Provisioning packets contain configuration information such as an end date or number of hours of computer usage time) |
pagină de acces la date | data access page (A Web page, published from Access, that has a connection to a database. In a data access page, you can view, add to, edit, and manipulate the data stored in the database) |
politică de securitate pentru acces la cod | code access security CAS policy A set of rules that defines security permissions for a collection of assemblies by associating attributes of those assemblies, such as location and signature, with a set of code access security permissions (CAS) |
Port de acces testare | Test Access Port (A collection of boundary scan control signals that define a serial protocol for scan-based devices. There are five pins, TCK/clock, TMS/mode select, TDI/data in, TDO/data out, and TRST/reset) |
profil de acces la câmp | field access profile (The set of field-level access permissions that have been granted to a user or users) |
Protecție acces rețea | Network Access Protection (A set of operating system components that can help protect access to a private network by enforcing health policies. System administrators establish health policies which NAP enforces by inspecting and assessing the health of client computers, restricting network access when client computers are deemed noncompliant, and remediating noncompliant client computers for full network access. NAP also provides ongoing health compliance enforcement while a client computer is connected to a network) |
Protocol simplu de acces la obiecte | Simple Object Access Protocol (A simple, XML-based protocol for exchanging structured data and type information on the World Wide Web. The protocol is currently the de facto standard for XML messaging) |
Proxy pentru aplicații de acces la serviciile BDC | BDC Service Application Proxy (An application proxy that allows Web applications to connect to a Business Data Connectivity Shared Service Application and contains features for using the shared service) |
Proxy pentru aplicații de acces la serviciile Business Data Connectivity | Business Data Connectivity Service Application Proxy (An application proxy that allows Web applications to connect to a Business Data Connectivity Shared Service Application and contains features for using the shared service) |
proxy pentru aplicații de acces la serviciile PerformancePoint | PerformancePoint Service application proxy (The PerformancePoint Web Front End (WFE) service interface. It abstracts the communication layer between WFE components and the service application) |
punct de acces | access point (A device used to connect wireless computers and other wireless devices to a wired network) |
punct de acces la serviciu | service access point (A logical address that allows a system to route data between a remote device and the appropriate communications support) |
Rol de server Acces clienți | Client Access server role (A set of components and services that enable users to access their Exchange mailboxes through the application Outlook Web Access and the protocols Exchange ActiveSync, Post Office Protocol version 3 (POP3), and Internet Message Access Protocol 4rev1 (IMAP4). The Client Access server role also includes Web services that are used by other Exchange 2007 server roles) |
server de Acces clienți | Client Access server (A set of components and services that enable users to access their Exchange mailboxes through the Outlook Web Access application) |
Server de asigurare acces | Provisioning Server (The server that creates packets to manage computers enabled by FlexGo technology) |
server poartă de acces | gatekeeper (A server that uses a directory to perform name-to-IP address translation, admission control, and call management services in H.323 conferencing) |
Serviciu Acces Informații | Information Access Service (A part of an IrDA infrared communication protocol used so that devices can learn about the services offered by another device) |
Serviciu de asigurare acces | Provisioning Service (Part of the Provisioning Server that implements the Provisioning Server's business logic) |
simbol acces | access token (A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority) |
Sistem de acces prin tastatură | Keyboard Access System (A set of accelerator keys with associated icons) |
Sistem de asigurare acces local | Local Provisioning System (A Windows component that resides in the operating system and enforces pay-as-you-go and subscription metering rules) |
sufocare acces la disc | disk bottleneck (A condition that occurs when disk performance is reduced to the extent that overall system performance is affected) |
Tehnologie de înaltă performanță de acces la Media | High-Performance Media Access Technology (A recording format that can store audio, video, and pictures on a CD or DVD. HighMat discs play on any Windows computer and on some DVD players) |
troian acces la distanță | remote access Trojan (A type of Trojan that provides remote access to a computer) |
violare acces | access violation (An attempt to run a memory operation that the underlying page protection does not allow. An access violation applies to memory operations, but does not apply when the security manager checks user-mode access rights to objects) |