Subject | English | Arabic |
environ. | aerial attack | هجوم جَوِّي |
environ. | air attack | هجوم جَوِّي |
environ. | air attack base | قاعدة الهجوم الجوي |
forestr. | air attack boss | رئيس العمليات |
forestr. | air attack boss | رئيس الهجوم الجوي |
forestr. | air attack boss | منسق جوي |
environ. | attack a fire | هَجَمَ على النار |
econ. | attack a judgment | طعن في حكم |
forestr. | attack line | خط الهجوم |
econ. | attack on the rights of property | إضرار بحقوق الملكية |
UN, AIDS. | attack phase | طور النوبة |
math. | attack rate | معدل الاصابة |
fishery | attack sonar | سونارٌ لِلْهُجومِ |
gen. | attack sonar | مِكْشافٌ صَوْتِيٌّ بِأَعْمِدَةٍ للهُجومٍِ |
forestr. | attack time | فترة الهجوم |
forestr. | attack time | وقت الهجوم |
forestr. | attack unit | وَحدة الهجوم |
forestr. | attack unit response | فَعَّالية وحدة الهجوم |
econ. | collateral attack | إدعاء بالبطلان المطلق |
comp., MS | denial of service attack | هجوم لقطع الخدمة (An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system) |
comp., MS | denial-of-service attack | هجوم لقطع الخدمة (An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system) |
forestr. | direct attack | إطفاء مباشر |
forestr. | direct attack | إخماد مباشر للحريق |
law | direct attack | هجوم مباشر (على إجراء قضائي) |
environ. | extended attack situation | وَضْع يتطلب تعزيزات |
vet.med. | heel fly attack | هَجْمَة ذُبابة النغف Hypoderma lineatum |
environ. | indirect attack | طريقة غير مباشرة للإطفاء |
environ. | indirect attack | هجوم غير مباشر |
forestr. | initial attack | مباشرة العمل |
comp., MS | land attack | هجوم لقطع الخدمة (A denial-of-service attack (DoS) in which the attacker opens a legitimate TCP session with a spoofed source IP address and port number that match the IP address and port number of the targeted computer so that the targeted computer will try to establish a TCP session with itself, causing some TCP implementations to go into a loop and the computer to fail) |
avia., transp. | parallel attack | إطفاء متواز |
pest.contr. | pest attack | هجوم الآفات |
pest.contr. | pest attack | هجوم حشرى |
acrid. | pest attack | هجمات الآفـات |
UN | pre-emptive attack | هجومها الإجهاضي هجوم وقائـي |
comp., MS | script injection attack | هجوم عن طريق الحقن بالنصوص (An attack that attempts to send executable scripts to your application with the intent of having other users run it. A typical script injection attack sends script to a page that stores the script in a database, so that another user who views the data inadvertently runs the code) |
fishery | searchlight attack sonar | سونارٌ هُجومِـيٌّ مُـتَـغَـيِّـرُ الْـمَـوْقِـعِ |
IMF. | speculative attack | نوبة مضاربة |
IMF. | speculative attack | ھجمة مضاربة |
comp., MS | SQL injection attack | حقنة هجوم SQL (An attack that attempts to compromise your database (and potentially the computer on which the database is running) by creating SQL commands that are executed instead of, or in addition to, the commands that you have built into your application) |
polit. | terrorist attack | هجوم إرهابي |
comp., MS | Time Attack Mode | وضع تجاوز الحد الزمني (A menu item on the Purble Place menu that allows the user to select a timed mode for their game) |
comp., MS | Trojan denial of service attack | منع الخدمات نتيجة لهجوم طروادة (A type of Trojan that creates a denial of service attack) |
UN, health. | unlawful attacks on his or her honour and reputation | التهجم غير المشروع على الشرف والسمعة |