Subject | English | Czech |
comp., MS | asymmetric key algorithm | algoritmus asymetrických klíčů (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
comp., MS | Authority Key Identifier | Identifikátor klíče certifikačního úřadu (A certificate extension used by the certificate chaining engine to determine what certificate was used to sign a presented certificate. The AKI can contain the issuer name, serial number, public key information, or no information at all. By matching the information in a certificate's AKI extension to a CA certificate's Subject Key Identifier (SKI) extension, a certificate chain can be built) |
comp., MS | color key transparency | průhlednost podle klíče barvy (A method for blending texture maps so that parts appear transparent. Color key transparency accomplishes this by defining a single color as transparent) |
construct. | construction machine for key operation | stroj pro základní operace |
build.struct. | elastic key joint | pružný uzávěr |
build.struct. | elastic key joint | pružná vazba |
build.struct. | elastic key joint | pružný závěr |
comp., MS | external key file | soubor externího klíče (A file that contains the external key and is stored on an external media device. The name and contents of the file are internal to Microsoft and can change from version to version) |
comp., MS | foreign key association | přidružení cizího klíče (An association between entities that is managed through foreign key properties) |
comp., MS | Group Key Distribution Service | Služba distribuce klíčů skupinám (An Active Directory Domain Services service that provides cryptographic keys that correspond to arbitrary sets of security principals in AD DS to users who are authorized to access those keys) |
comp., MS | Internet Key Exchange A protocol that establishes the security association and shared keys necessary for computers to communicate by using Internet Protocol security (IPsec) | IKE (Internet Key Exchange) |
comp., MS | key action | reakce na stisknutí klávesy (Term used to describe program behavior when a certain key is pressed on the keyboard. Key actions are associated with items within a source document) |
construct. | key-activity network | rozšířený uzlový síťový graf |
construct. | key-activity network | rozšířený uzlově definovaný síťový graf |
construct. | key-activity network | rozšířený síťový graf |
comp., MS | key agreement | výměna klíčů (Key exchange without key encryption) |
construct. | key assembly | sraz s hmoždinkami |
comp., MS | key attribute | klíčový atribut (The attribute of a dimension that links the non-key attributes in the dimension to related measures) |
econ., fin. | key audit partner | klíčový auditorský partner |
comp., MS | key-based renewal | obnovení na základě klíčů (A method of renewing a certificate using the existing key material as the sole form of authentication) |
construct. | key brick | závěrná cihla |
comp., MS | key combination | kombinace kláves (Any combination of keys that must be pressed simultaneously) |
ed. | key competence | klíčová kompetence |
construct. | key diagram | základní schéma elektrického zapojení |
comp., MS | key dictation | diktování priority klíče (The action by a Trusted Intermediary Agent of determining the key that will be used in an IPsec connection) |
comp., MS | Key Distribution Center A network service that supplies session tickets and temporary session keys to users and computers within an Active Directory domain. The KDC runs on each domain controller as part of Active Directory Domain Services (AD DS) | služba KDC (Key Distribution Center) |
comp., MS | Key Distribution Center proxy service A service that runs on corporate network edge servers to proxy Kerberos protocol messages to domain controllers which are situated on the corporate network. This permits Kerberos authentication to edge services such as Remote Desktop Services Gateway or DirectAccess Server | proxy služba KDC (Key Distribution Center) |
industr. | key enabling technology | klíčová základní technologie |
comp., MS | key exchange | výměna klíčů (Confidential exchange of secret keys online, which is commonly done with public key cryptography) |
comp., MS | key filter | hlavní filtr (A metadata column or field in a Key Filters control) |
comp., MS | Key Filters | Hlavní filtry (A metadata navigation control that enables users to limit the items displayed in a list or library to those that match selected values) |
fin. | key for capital subscription | klíč pro upisování základního kapitálu |
fin. | key for capital subscription | klíč pro upisování základního kapitálu ECB |
fin. | key for subscription of the ECB's capital | klíč pro upisování základního kapitálu |
fin. | key for subscription of the ECB's capital | klíč pro upisování základního kapitálu ECB |
fin. | key for subscription to the capital of the European Central Bank | klíč pro upisování základního kapitálu |
fin. | key for subscription to the capital of the European Central Bank | klíč pro upisování základního kapitálu ECB |
fin. | key for subscription to the European Central Bank's capital | klíč pro upisování základního kapitálu ECB |
fin. | key for subscription to the European Central Bank's capital | klíč pro upisování základního kapitálu |
comp., MS | key frame | klíčový snímek (A video frame in which starting and ending positions of an object are given, and all frames in between are interpolated by a computer to produce smooth automated animation. Most ray-traced computer animation is created using this technique) |
construct. | key groove | klínová drážka |
construct. | key hinge | vrcholový kloub |
comp., MS | key ID | identifikátor klíče (A value that identifies the key for a packaged Windows Media file) |
comp., MS | key index | index klíče (The location where a specific network key for a wireless access point is stored) |
fin., invest. | key information document | sdělení klíčových informací |
fin., invest. | key information document | klíčové informace pro investory |
fin., invest. | key investor information | sdělení klíčových informací |
fin., invest. | key investor information | klíčové informace pro investory |
fin., invest. | key investor information document | sdělení klíčových informací |
fin., invest. | key investor information document | klíčové informace pro investory |
fin., invest. | Key Investor Information sheet | sdělení klíčových informací |
fin., invest. | Key Investor Information sheet | klíčové informace pro investory |
polit. | Key Issues Paper | dokument o klíčových otázkách |
construct. | key joining | spojení podélným klínem |
construct. | key joint | hmoždíkový spoj |
construct. | key joint | svlakový spoj |
comp., MS | Key lock | Zámek klávesnice (An option that locks the keypad to avoid accidental key presses) |
comp., MS | key logger | program pro monitorování stisknutých kláves na klávesnici (A type of malware that sends key strokes or screen shots to an attacker) |
comp., MS | Key Management Server | server správy klíčů (The Exchange computer on which the Key Management Service has been installed. There can be one Key Management Server per administrative group) |
comp., MS | Key Management Service | Služba správy klíčů (An optional Microsoft Exchange 2000 Server component that is installed on a designated server in an administrative group. It provides centralized administration and archival of private keys, and maintains every user s private encryption key in an encrypted database. The keys are used for encrypting e-mail messages and signing messages with digital signatures) |
comp., MS | Key Master | Správce klíčů (A DNS server role that is responsible for all DNSSEC key management for a specific DNSSEC-signed DNS zone. Different DNS zones can have different Key Masters. The Key Master role can be moved from one DNS server to a different DNS server, but a DNS zone can have only one Key Master at a given time. To be a Key Master, the DNS server must be authoritative for the DNS zone, the zone must be signed with DNSSEC, and the DNS server must be selected to be the Key Master for the DNS zone) |
gen. | key message | klíčové sdělení |
comp., MS | Key Metrics | Klíčová metrika (A tab in Application Diagnostics that provides an at-a-glance view of a selected application. The graph displays 1. the average performance based on the Monitored Requests counter, and 2. the number of requests. By looking at the graph, you can easily determine the traffic load and make inferences about problems that might be occurring) |
zoot. | key of soil classification | bonitační klíč |
zoot. | key of soil grading | bonitační klíč |
comp., MS | key pair | pár klíčů (A private key and its related public key) |
comp., MS | key performance indicator | klíčový indikátor výkonnosti (A predefined measure that is used to track performance of a strategic goal, objective, plan, initiative, or business process. A KPI is evaluated against a target. An explicit and measurable value taken directly from a data source. Key performance indicators (KPIs) are used to measure performance in a specific area, for example, revenue per customer) |
comp., MS | key performance indicator | klíčový ukazatel výkonu (A predefined measure that is used to track performance of a strategic goal, objective, plan, initiative, or business process. A KPI is evaluated against a target. An explicit and measurable value taken directly from a data source. Key performance indicators (KPIs) are used to measure performance in a specific area, for example, revenue per customer) |
comp., MS | Key press | Stisknutí tlačítka (" An option in "ringtones & sounds" settings. When this option is selected, the phone makes a sound when buttons on the on-screen keypad or keyboard are tapped.") |
comp., MS | key protector | ochrana pomocí klíče (A blob (binary large object) that is used to restrict access to a BitLocker-protected disk) |
comp., MS | key range lock | zámek rozsahu klíčů (A lock that is used to lock ranges between records in a table to prevent phantom additions to, or deletions from, a set of records. Ensures serializable transactions) |
econ., tech. | key raw material | klíčová surovina |
comp., MS | key risk indicator | klíčový indikátor rizika (A quantifiable, standardized measurement of the risk of loss resulting from inadequate or failed business processes) |
comp., MS | key roaming | roaming klíčů (The process of moving between different environments or computers while authenitcated by certificates or keys centrally stored on a server) |
comp., MS | key rollover | výměna klíče (The process by which an existing cryptographic key is replaced with a new cryptographic key and associated signatures are updated) |
comp., MS | key search attack | útok s cílem zjistit klíč (An attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered) |
comp., MS | key sequence | kombinace kláves (Any combination of keys that must be pressed sequentially) |
comp., MS | key signing key | podpisový klíč klíče (A public key corresponding to a private key that is used to sign one or more DNS record sets at the zone apex) |
construct. | key spacing | vzdálenost hmoždinek |
construct. | key spacing | rozteč hmoždinek |
comp., MS | key spline | klíčová křivka (A graphical representation of the changes in a property value between two keyframes that animate the property) |
comp., MS | key-value pair | pár klíč-hodnota (A set of data items that contains a unique identifier, called a key, and a value that is the actual data for the key) |
construct. | key-valve | šoupě s hradítkem |
construct. | key-valve | šoupátko s hradítkem |
construct. | key word | klíčové slovo |
comp., MS | license key seed | jádro licenčního kódu (A shared secret value that is used to generate keys to encrypt Windows Media files) |
comp., MS | Microsoft Group Key Distribution Service | Služba distribuce klíčů skupinám Microsoft (An Active Directory Domain Services service that provides cryptographic keys that correspond to arbitrary sets of security principals in AD DS to users who are authorized to access those keys) |
comp., MS | public key algorithm | algoritmus veřejného klíče (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message) |
comp., MS | Public Key Cryptography Standards A family of standards for public key cryptography that includes RSA encryption, Diffie-Hellman key agreement, password-based encryption, extended-syntax, cryptographic message syntax, private key information syntax, and certificate request syntax, as well as selected attributes. Developed, owned, and maintained by RSA Data Security, Inc | sada standardů PKS (Public Key Cryptography Standards) |
comp., MS | public key encryption | šifrování s veřejným klíčem (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
comp., MS | public key infrastructure | infrastruktura veřejných klíčů (The laws, policies, standards, and software that regulate or manipulate certificates and public and private keys. In practice, it is a system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in an electronic transaction. Standards for PKI are still evolving, even though they are being widely implemented as a necessary element of electronic commerce) |
comp., MS | Public Key Infrastructure certificate A system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in an electronic transaction | certifikát PKI (Public Key Infrastructure) |
comp., MS | public key infrastructure hierarchy | hierarchie infrastruktury veřejných klíčů (A hierarchy in which the roles of the certification authority are separated into one root CA and one or more subordinate CAs) |
comp., MS | release key combination | kombinace kláves pro uvolnění (The key combination (CTRL+ALT+LEFT ARROW by default) that must be pressed to move keyboard and mouse focus from a guest operating system back to the physical computer) |
social.sc., empl. | scoreboard of key employment and social indicators | srovnávací přehled ukazatelů zaměstnanosti a sociálních ukazatelů |
social.sc., empl. | scoreboard of key employment and social indicators | srovnávací přehled klíčových ukazatelů zaměstnanosti a sociálních ukazatelů |
comp., MS | secret key encryption | šifrování s tajným klíčem (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data) |
comp., MS | subject key identifier | identifikátor klíče subjektu (A certificate extension that contains a hash of the certification authority's certificate public key. This hash is placed in the Authority Key Identifier (AKI) extension of all issued certificates to facilitate chain building) |
fin. | subscription key to the ECB's capital | klíč pro upisování základního kapitálu |
fin. | subscription key to the ECB's capital | klíč pro upisování základního kapitálu ECB |
comp., MS | symmetric-key cryptography | šifrování pomocí symetrického klíče (A type of cryptography that uses symmetric keys to provide confidentiality) |
construct. | turn-key-type building | budova na klíč |
comp., MS | virtual key code | kód virtuální klávesy (A symbolic constant name, hexadecimal value, or mouse or keyboard equivalent that provides a hardware and language-independent method of identifying keyboard keys. Each virtual key code represents a unique keyboard key and also identifies the purpose of that key. The keyboard driver must provide one or more keyboard layouts that maps keyboard scan codes to the appropriate virtual key codes) |
comp., MS | virtual-key code | kód virtuální klávesy (A symbolic constant name, hexadecimal value, or mouse or keyboard equivalent that provides a hardware and language-independent method of identifying keyboard keys. Each virtual key code represents a unique keyboard key and also identifies the purpose of that key. The keyboard driver must provide one or more keyboard layouts that maps keyboard scan codes to the appropriate virtual key codes) |
forestr. | woodland key-habitat | klíčový biotop |