DictionaryForumContacts

Terms containing key | all forms | exact matches only
SubjectEnglishArabic
comp., MSaccess keyمفتاح الاختصار (Any combination of keys that must be pressed sequentially)
corp.gov.accounting flexfield keyمفتاح المجال المرن للحسابات
comp., MSActivation Keyمفتاح التنشيط (The unique, 25-character number that activates prepaid computing with Windows)
IMF.allocative keyمفتاح التوزيع
comp., MSALT keyمفتاح Alt (A keyboard key that is used in conjunction with another key to produce some special feature or function and is typically marked with the letters Alt)
comp., MSalternate keyمفتاح بديل (A candidate key that is not designated as the primary key and is used to uniquely identify records in a database table)
comp., MSarrow keyمفتاح السهم (Any of four keys labeled with arrows pointing up, down, left, and right, used to move the cursor vertically or horizontally on the display screen or, in some programs, to extend the highlight)
comp., MSasymmetric key algorithmلوغاريتم المفاتيح غير المتماثلة (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
comp., MSattestation identity keyمفتاح تعريف الشاهد (The cryptographic representation of the hardware or software state and other integrity metrics, and which can be used to perform anonymous or pseudo-anonymous attestations to remote parties in multiparty transactions)
comp., MSAuthority Key Identifierمعرّف مفتاح التصديق (A certificate extension used by the certificate chaining engine to determine what certificate was used to sign a presented certificate. The AKI can contain the issuer name, serial number, public key information, or no information at all. By matching the information in a certificate's AKI extension to a CA certificate's Subject Key Identifier (SKI) extension, a certificate chain can be built)
comp., MSAuthority Key Identifierمعرّف مفتاح المرجع (A certificate extension used by the certificate chaining engine to determine what certificate was used to sign a presented certificate. The AKI can contain the issuer name, serial number, public key information, or no information at all. By matching the information in a certificate's AKI extension to a CA certificate's Subject Key Identifier (SKI) extension, a certificate chain can be built)
comp., MSBACKSPACE keyمفتاح مسافة للخلف (A keyboard key that moves the cursor to the left, one character at a time, usually erasing each character as it moves)
comp., MSBitLocker recovery keyمفتاح استرداد BitLocker (A special key that you can create when you turn on Bitlocker Drive Encryption for the first time on each drive that you encrypt)
comp., MSCAPS LOCK keyمفتاح Caps Lock (A toggle key that, when on, shifts the alphabetic characters on the keyboard to uppercase)
econ.cipher keyمفتاح الشفرة
comp., MSclass keyمفتاح الفئات (The subset of data members of a class whose values uniquely identify an instance of the class)
comp., MScolor keyمفتاح اللون (A color used for transparent or translucent effects. An overlay surface is displayed in the region of the primary surface that contains the color key. In video production, color keys are used to combine two video signals)
med.connective tissue sheath of Key and Retziusالغِمْدُ النَّسيجِيُّ الضَّامُّ لكَاي وَرِيتْزيُوس
comp., MScontent keyمفتاح المحتوى (The cryptographic key used to both encrypt and decrypt protected content during publishing and consumption)
comp., MSControl keyمفتاح التحكم (A key that, when pressed in combination with another key, gives the other key an alternative meaning)
IMF.conversion keyجدول تطابق
IMF.conversion keyجدول تحويل
IMF.conversion keyجدول تناظر
comp., MScrypto escrow keyمفتاح escrow المشفر (A secondary encryption key that provides the ability for an authorized IT Helpdesk administrator to open an encrypted document when the password is lost)
comp., MSCTRL keyمفتاح CTRL (A key that, when pressed in combination with another key, gives the other key an alternative meaning)
comp., MSdata encryption keyمفتاح تشفير البيانات (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data)
tel.decadic key padلوحة مفاتيح عشرية
comp., MSDELETE keyمفتاح الحذف (On IBM and PC-compatible computers, a key whose function changes depending on the application program. Usually it erases the character under the cursor, although in some applications it can erase selected text or graphics)
comp., MSe-mail quick keyالمفتاح السريع للبريد الإلكتروني (A key that you use in some e-mail programs to enter text that is commonly used)
comp., MSencryption keyمفتاح التشفير (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data)
comp., MSendorsement keyمفتاح مصادقة (A key pair, consisting of a public key and a private key, which is used to verify that a TPM is genuine)
comp., MSenhanced key usage An extended property value that specifies the uses for which a certificate is validاستخدام مفتاح محسن (EKU)
comp., MSENTER keyمفتاح الإدخال (The key that is used at the end of a line or command to instruct the computer to process the command or text. In word processing programs, the Enter key is used at the end of a paragraph. Also called: Return key)
comp., MSentity keyمفتاح الكيان (A reference to an entity of a specific entity type)
comp., MSESC keyمفتاح الخروج (A keyboard key that sends the escape (ESC) character to the computer. Often this key moves the user back one level in the menu structure or exits the program)
med.foramen of Key and Retziusثُقْبَةُ كي و رتزيوس
comp., MSforeign keyمفتاح خارجي (" A key in a database table that comes from another table (also know as the "referenced table") and whose values match the primary key (PK) or unique key in the referenced table.")
dat.proc.function keyمفتاح وظيفي
comp., MSInternet Key Exchangeمفتاح إنترنت التبادلي (A protocol that establishes the security association and shared keys necessary for computers to communicate by using Internet Protocol security (IPsec))
rem.sens.interpretation keyمفتاح التأويل
comp., MSitem allocation keyمفتاح توزيع الصنف (A product family grouping that is used for forecast and demand scheduling)
econ.keep under lock and keyاحتفظ بِالشَّيء فِي مكان مغلق
comp., MSkey actionمفتاح الإجراء (Term used to describe program behavior when a certain key is pressed on the keyboard. Key actions are associated with items within a source document)
med.key-and-keyway attachmentمُرْتَكَزٌ مُتَوازٍ (متوازي)
econ.key-boardمجموعة حروف آلة كاتبة
econ.key-boardلوحة المفاتيح
el.key clicksضوضاء برقي
comp., MSkey combinationمجموعة مفاتيح (Any combination of keys that must be pressed simultaneously)
comp., MSkey combinationتركيبة المفاتيح (Any combination of keystrokes that can be used to perform a task that would otherwise require a mouse or other pointing device)
econ.key commodityسلعة أساسية رئيسية
agric., econ.key constraintعامل مجِِد
econ.key currencyعملة رائدة
econ.key currencyعملة رئيسية
comp., MSKey Distribution Centerمركز توزيع المفاتيح (A network service that supplies session tickets and temporary session keys to users and computers within an Active Directory domain. The KDC runs on each domain controller as part of Active Directory Domain Services (AD DS))
econ.key economic indicatorsالمؤشرات الاقتصادية الأساسية
econ.key economic indicatorsمؤشرات اقتصادية رئيسية
corp.gov.key efficiency targetغاية الكفاءة الأساسية
comp., MSkey filterعامل تصفية أساسي (A metadata column or field in a Key Filters control)
comp., MSKey Filtersعوامل تصفية أساسية (A metadata navigation control that enables users to limit the items displayed in a list or library to those that match selected values)
comp., MSkey IDمعرّف المفتاح (A value that identifies the key for a packaged Windows Media file)
dat.proc.key inإدخال البيانات بواسطة لوحة الملامس
org.name.Key Indicator Mapping Systemنظام رسم خرائط المؤشرات الرئيسية كيمس
org.name.Key Indicator Mapping Systemنظام رسم الخرائط للمؤشرات الرئيسية
org.name.Key Indicators Mapping Systemنظام رسم خرائط المؤشرات الرئيسية كيمس
org.name.Key Indicators Mapping Systemنظام رسم الخرائط للمؤشرات الرئيسية
econ.key-industryصناعة رئيسية
econ.key-industryصناعة أم
econ.key industryصناعة رئيسية
plann.key informantمصدر رئيسي للمعلومات
corp.gov.key information circularمذكرة معلومات أساسية
UN, account.key item management reporting systemنظام تقديم التقارير الإدارية عن نقطة معينة
oilkey jointوصلة بخابور
railw., sec.sys.key lockقفل مفتاح
comp., MSkey loggerمسجل المفاتيح (A type of malware that sends key strokes or screen shots to an attacker)
econ.key-manمدير أساسي
econ.key-manرجل مهم
comp., MSKey Management Serverخادم Key Management (The Exchange computer on which the Key Management Service has been installed. There can be one Key Management Server per administrative group)
comp., MSKey Management Serviceخدمة Key Management (An optional Microsoft Exchange 2000 Server component that is installed on a designated server in an administrative group. It provides centralized administration and archival of private keys, and maintains every user s private encryption key in an encrypted database. The keys are used for encrypting e-mail messages and signing messages with digital signatures)
econ.key moneyنقود خلو الرجل
econ.key-moneyقيمة داخلية للنقود
econ.key money sum paid by the new tenant to the previous oneخلو رجل
econ.key money sum paid by the new tenant to the previous oneخلو
econ.key occupationsمهن رئيسية
corp.gov.key officialsكبار المسؤولين
tel.key padلوحة المفاتيح
tel.key pad telephone setمجموعةهاتف آلية مزودة بلوحة أزرار
comp., MSkey pairمفتاح مزدوج (A private key and its related public key)
comp., MSkey performance indicatorمؤشر الأداء الأساسي (A predefined measure that is used to track performance of a strategic goal, objective, plan, initiative, or business process. A KPI is evaluated against a target. An explicit and measurable value taken directly from a data source. Key performance indicators (KPIs) are used to measure performance in a specific area, for example, revenue per customer)
comp., MSkey performance indicatorمؤشر الأداء الرئيسي (A predefined measure that is used to track performance of a strategic goal, objective, plan, initiative, or business process. A KPI is evaluated against a target. An explicit and measurable value taken directly from a data source. Key performance indicators (KPIs) are used to measure performance in a specific area, for example, revenue per customer)
IMF.key performance indicatorsمؤشرات الأداء الرئيسية
corp.gov.key personnelالموظفون الرئيسيون
econ.key personnelموظفون أساسيون
acrid.key pestآفة خطيرة
econ.key pointsنقاط أساسية
econ.key-positionوظيفة رئيسية
comp., MSKey pressضغطة مفتاح (" An option in "ringtones & sounds" settings. When this option is selected, the phone makes a sound when buttons on the on-screen keypad or keyboard are tapped.")
econ.key-productsمنتجات رئيسية
comp., MSkey protectorأداة حماية المفاتيح (A blob (binary large object) that is used to restrict access to a BitLocker-protected disk)
econ.key-punchآلة تثقيب
comp., MSkey repeat rateمعدل التكرار للمفتاح (The rate at which characters repeat when a user holds down a key)
comp., MSkey risk indicatorمؤشر المخاطرة الأساسي (A quantifiable, standardized measurement of the risk of loss resulting from inadequate or failed business processes)
comp., MSkey roamingالتجوال استنادًا إلى المفاتيح (The process of moving between different environments or computers while authenitcated by certificates or keys centrally stored on a server)
comp., MSkey sequenceتسلسل المفاتيح (Any combination of keys that must be pressed sequentially)
math.key sequenceدليل التكرار
genet.key speciesنوع رئيسى
genet.key speciesنوع مفتاحى
econ.key-staffوظائف عليا
gen.key-staffكوادر
tel.key telephone setجهاز هاتف بمفتاح
math.key to a graphمفتاح رسم بياني
railw., sec.sys.key transmitterمفتاح تحويل
oilkey wellبئر رئيسية
econ.key-wordكلمة السر
rem.sens.low keyمفعول التضاد
comp., MSmaster keyالمفتاح الرئيسي (The key used by the client and server for all session key generation. The master key is used to generate the client-read key, the client-write key, the server-read key, and the server-write key. Master keys can be exported as simple key BLOBs)
econ.master-keyمفتاح عُمُومِيّ
UN, polit.Mekong River Commission Multi-donor Partner Support to the Mekong River Commission MRC for Key Officers Posts and Capacity-buildingالدعم المقدم من الشركاء المانحين المتعددي الأطراف إلى لجنة نهر الميكونغ لصالح وظائف الموظفين الأساسيين وبناء القدرات
comp., MSmodifier keyمفتاح التعديل (A keyboard key that, when pressed (and held), changes the actions of ordinary input)
telegr.Morse keyمفتاح مورس
comp., MSmulti-activation keyمفتاح التنشيط المتعدد (A product key that is provided to Microsoft customers who choose a Microsoft Volume Licensing program for their organizations and that allows multiple installations of a particular product. The key is assigned to a company or institution intended for their sole use and only for distribution to employees or third parties who are authorized to install and distribute licenses pursuant to the terms of their license agreement)
tel.multifrequency key padلوحة مفاتيح متعددة الترددات
comp., MSnatural keyمفتاح طبيعي (A primary key or alternate key whose values identify objects in the real world)
comp., MSnetwork security keyمفتاح أمان الشبكة (A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key)
comp., MSPAGE DOWN keyمفتاح PAGE DOWN (" A keyboard key (often labeled "PgDn") that is often used to move the cursor down to the top of the next page or a specific number of lines. Its function may vary in different programs.")
comp., MSPairwise Master Keyمفتاح تشفير أصلي (A 256-bit key derived from the Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) or Protected EAP (PEAP) authentication process)
rem.sens.photointerpretation keyمفتاح تأويل تصويري
gen.photointerpretation key- فتوغرافي
comp., MSPIN unlock keyمفتاح إلغاء الحظر الشخصي (An 8-digit code used to unlock the SIM card. A Personal Unlocking Key is a type of personal identification number (PIN))
comp., MSpound keyمفتاح (The character)
comp., MSpredefined keyمفتاح معرف مسبقا (A key that represents one of the main divisions of the registry. Each predefined key is displayed in a separate Registry Editor window, with the key's name appearing in the window's title bar. For example, HKEY_CLASSES_ROOT is a predefined key)
comp., MSprimary keyمفتاح أساسي (One or more fields that uniquely identify each record in a table. In the same way that a license plate number identifies a car, the primary key uniquely identifies a record)
comp., MSPRINT SCREEN keyمفتاح PRINT SCREEN (A key on IBM PC and compatible keyboards that normally causes the computer to send a character-based "picture" of the screen contents to the printer)
comp., MSprivate keyمفتاح خاص (The secret half of a cryptographic key pair that is used with a public key algorithm. Private keys are typically used to decrypt a symmetric session key, digitally sign data, or decrypt data that has been encrypted with the corresponding public key)
comp., MSproduct keyمفتاح المنتج (A sequence of 25 letters and numbers. To activate some software, you must enter a product key during the activation process)
comp., MSpublic keyمفتاح عام (The nonsecret half of a cryptographic key pair that is used with a public key algorithm. Public keys are typically used when encrypting a session key, verifying a digital signature, or encrypting data that can be decrypted with the corresponding private key)
comp., MSpublic key algorithmخوارزمية المفتاح العمومي (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message)
comp., MSPublic Key Cryptography Standardsمقاييس تشفير المفتاح العمومي (A family of standards for public key cryptography that includes RSA encryption, Diffie-Hellman key agreement, password-based encryption, extended-syntax, cryptographic message syntax, private key information syntax, and certificate request syntax, as well as selected attributes. Developed, owned, and maintained by RSA Data Security, Inc)
comp., MSpublic key encryptionتشفير مفتاح عام (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
comp., MSreferencing keyمفتاح خارجي (" A key in a database table that comes from another table (also know as the "referenced table") and whose values match the primary key (PK) or unique key in the referenced table.")
comp., MSregistry keyمفتاح التسجيل (An identifier for a record or group of records in the registry)
comp., MSreplica keyمفتاح النسخة المتماثلة (A 4-byte value that maps to a replica ID in a replica key map)
comp., MSretail keyمفتاح البيع بالتجزئة (A type of product key required during the installation of Windows)
comp., MSSCROLL LOCK keyمفتاح SCROLL LOCK (On the IBM PC/XT and AT and compatible keyboards, a key on the top row of the numeric keypad that controls the effect of the cursor control keys and sometimes prevents the screen from scrolling. On the enhanced and Macintosh keyboards, this key is to the right of the function keys on the top row. Many modern applications ignore the Scroll Lock setting)
comp., MSsecret keyمفتاح سري (A symmetric encryption key shared by two entities, such as between a user and the domain controller (DC), with a long lifetime. A password is a common example of a secret key. When used in a context that implies Kerberos only, a principal's secret key)
comp., MSsecret key encryptionتشفير بالمفتاح السري (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data)
work.fl.sequence keyدليل التسلسل
comp., MSsession keyمفتاح جلسة العمل (The key used for encrypting data during a communication session)
comp., MSSHIFT keyمفتاح SHIFT (A keyboard key that, when pressed in combination with another key, gives that key an alternative meaning, for example, producing an uppercase character when a letter key is pressed. The SHIFT key is also used in various key combinations to create nonstandard characters or to perform special operations)
comp., MSshortcut keyمفتاح الاختصار (Any combination of keys that must be pressed simultaneously)
dat.proc.soft function keyلمسة قابلة للبرمجة
dat.proc.soft function keyمفتاح قابل للبرمجة
dat.proc.soft keyمفتاح قابل للبرمجة
dat.proc.soft keyلمسة قابلة للبرمجة
comp., MSsoft keyمفتاح مرن (" One of the two unlabeled keys located just below the display area on a mobile phone. These keys are called "soft" because their functions change to fit the context. Labels in the lower part of the mobile screen tell users what the soft keys do.")
comp., MSstorage root keyمفتاح جذر التخزين (On a system that incorporates a TPM, a cryptographic asymmetric key which is created at the root of the TPM key hierarchy (2048-bit RSA key) and which is used by the TPM to store protected data. The private portion of this key never leaves the TPM. The public part of this key is returned to the owner and needs to be carefully guarded since it uniquely identifies the TPM on the network, therefore is privacy sensitive)
comp., MSsurrogate keyمفتاح بديل (A single attribute candidate key whose values are system-generated and that does not represent properties that identify objects in the real world)
comp., MSsymmetric-key cryptographyنوع تشفير المفتاح المماثل (A type of cryptography that uses symmetric keys to provide confidentiality)
comp., MSTAB keyمفتاح TAB (A keyboard key, often labeled with both a left-pointing and a right-pointing arrow, that traditionally (as in word processing) is used to insert tab characters into a document. In other applications, such as menu-driven programs, the TAB key is often used to move the on-screen highlight from place to place)
oiltaper keyخابور مائل غاطس
econ.telegraphic keyمفتاح تِلِغْرَافَيْ
econ.telegraphic keyشفرة برقية
comp., MStoggle keyمفتاح التشغيل (A keyboard key that alternates between turning a particular operation, function, or mode on or off)
comp., MSvirtual key codeرمز المفتاح الظاهري (A symbolic constant name, hexadecimal value, or mouse or keyboard equivalent that provides a hardware and language-independent method of identifying keyboard keys. Each virtual key code represents a unique keyboard key and also identifies the purpose of that key. The keyboard driver must provide one or more keyboard layouts that maps keyboard scan codes to the appropriate virtual key codes)
comp., MSvolume license keyمفتاح المنتج للترخيص المجمع (A product key that is provided to Microsoft customers who choose a Microsoft Volume Licensing program for their organizations and that allows multiple installations of a particular product. The key is assigned to a company or institution intended for their sole use and only for distribution to employees or third parties who are authorized to install and distribute licenses pursuant to the terms of their license agreement)
comp., MSvolume license product keyمفتاح ترخيص مجمع (A product key that is provided to Microsoft customers who choose a Microsoft Volume Licensing program for their organizations and that allows multiple installations of a particular product. The key is assigned to a company or institution intended for their sole use and only for distribution to employees or third parties who are authorized to install and distribute licenses pursuant to the terms of their license agreement)
oilwedge keyالخابور
oilwedge keyمسمار

Get short URL