DictionaryForumContacts

Terms containing key | all forms | exact matches only
SubjectEnglishDutch
commun.Access To Public Information: A Key to Commercial Growth And Electronic DemocracyToegang tot publieke informatie: Een sleutel tot commerciële groei en elektronische democratie
agric.age-length keyverhouding lengte-leeftijd
agric.age-length keyleeftijd-lengteverhouding
commun.alarm keyalarmtoests
IT, dat.proc.alphanumerical keyalfanumerieke toets
comp., MSALT keyAlt-toets (A keyboard key that is used in conjunction with another key to produce some special feature or function and is typically marked with the letters Alt)
comp., MSalternate keyalternatieve sleutel (A candidate key that is not designated as the primary key and is used to uniquely identify records in a database table)
el.amplitude keyingdigitale amplitudemodulatie
comp., MSarrow keypijltoets (Any of four keys labeled with arrows pointing up, down, left, and right, used to move the cursor vertically or horizontally on the display screen or, in some programs, to extend the highlight)
comp., MSasymmetric key algorithmalgoritme van asymmetrische sleutel (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
ITasymmetric key cipheropenbaar versleuteld systeem
ITasymmetric key cipherasymmetrisch encryptie-algoritme
ITasymmetric key cipherpublic key cryptosysteem
comp., MSattestation identity keyAttestation Identity Key (The cryptographic representation of the hardware or software state and other integrity metrics, and which can be used to perform anonymous or pseudo-anonymous attestations to remote parties in multiparty transactions)
el.audio frequency-shift keyingaudio frequency shift keying
fin., ITauthentication keyverificatiesleutel
fin., ITauthority keysauthenticatiesleutels
chem., el.automated key-stop truck loadingtankautolaadsysteem met automatische afslag
comp., MSBACKSPACE keyBACKSPACE-toets (A keyboard key that moves the cursor to the left, one character at a time, usually erasing each character as it moves)
commun., ITbasic keybasissleutel
transp., mech.eng.Berne keyrijtuigsleutel
ITbinary phase shift keyingbinaire phase shift keying
el.biphase phase shift keyingbifase phase shift keying
el.biphase shift keyingtweefasenmodulatie
comp., MSBitLocker recovery keyBitLocker-herstelsleutel (A special key that you can create when you turn on Bitlocker Drive Encryption for the first time on each drive that you encrypt)
mech.eng.box keyringsleutel
mech.eng.box keydopsleutel
construct.box spanner, box key, socket wrench, crutch keysoksleutel
industr.bump keyslagsleutel
industr.bump keyklopsleutel
gen.burst keying signalburst-sleutelsignaal
commun., ITcalculation of basic keyberekening van de toegangssleutel
ITcandidate keykandidaatsleutel
mech.eng.cap keypijpsleutel
mech.eng.cap keyringsleutel
mech.eng.cap keystecksleutel
mech.eng.cap keybuistang
transp., mech.eng.car keycontactsleutel
transp., mech.eng.carriage keyrijtuigsleutel
stat.census statistical areas key personsleutelfiguur voor een statistisch gebied van de volkstelling
IT, tech.check keycontrolecijfer
commun.Cipher Key Sequence Numberencryptiesleutelnummer
commun.ciphering key sequence numberencryptiesleutelnummer
comp., MSclear keylege sleutel (The key that is stored unencrypted on the disk volume. This key is used to freely access the volume master key, and in turn, the full volume encryption key when BitLocker Drive Encryption protection is disabled but the disk volume remains encrypted)
el.coherent phase shift keyingcoherente PSK
comp., MScolor keykleursleutel (A color used for transparent or translucent effects. An overlay surface is displayed in the region of the primary surface that contains the color key. In video production, color keys are used to combine two video signals)
gen.Committee for implementation of the regulation to avoid trade diversion into the European Union of certain key medicinesComité voor de uitvoering van de verordening ter voorkoming van verlegging van het handelsverkeer in bepaalde belangrijke geneesmiddelen naar de Europese Unie
comp., MScomposite keysamengestelde sleutel (A key whose definition consists of two or more fields in a file, columns in a table, or attributes in a relation)
ITconfidentiality keyvertrouwelijkheidssleutel
fin., econ.contribution keyverdeelsleutel
comp., MSControl keyCtrl-toets (A key that, when pressed in combination with another key, gives the other key an alternative meaning)
automat.control keystuurtoets
stat.conversion keyomrekeningstabel
agric.correction based on a "green key"correctie op basis van een groene sleutel
el.correlative phase shift keyingphase shift keying met correlatie tussen de fasetoestanden
econ., account.cost allocation keyverdeelsleutel
econ., transp.cost-allocation keyverdeelsleutel der kosten
transp., avia.cotter keyspie
comp., MScrypto escrow keyescrow-sleutel voor versleuteling (A secondary encryption key that provides the ability for an authorized IT Helpdesk administrator to open an encrypted document when the password is lost)
commun., ITcryptographic keycoderingssleutel
commun., ITcryptographic keysleutel
commun., ITcryptographic keyencryptiesleutel
commun., ITcryptographic keycryptosleutel
commun., ITcryptographic keycryptografische sleutel
commun., ITcryptographic keywebsleutel
comp., MScryptographic keycryptografische sleutel (A piece of data that is required to initialize a cryptographic algorithm)
ITcryptographic signature keycryptografische sleutel voor handtekening
comp., MSCTRL keyCtrl-toets (A key that, when pressed in combination with another key, gives the other key an alternative meaning)
comp., MScursor keypijltoets (Any of four keys labeled with arrows pointing up, down, left, and right, used to move the cursor vertically or horizontally on the display screen or, in some programs, to extend the highlight)
comp., MScustomer-specific volume license keyklantspecifieke volumelicentiecode (A unique volume license key used to activate a key management service (KMS) host or to enable volume software licenses to be issued and managed from Active Directory)
commun., ITcypher keycoderingssleutel
commun., ITcypher keyencryptiesleutel
commun., ITcypher keycryptosleutel
commun., ITcypher keysleutel
commun., ITcypher keywebsleutel
commun., ITcypher keycryptografische sleutel
ITdecryption keydecryptiesleutel
comp., MSDELETE keyDelete-toets (On IBM and PC-compatible computers, a key whose function changes depending on the application program. Usually it erases the character under the cursor, although in some applications it can erase selected text or graphics)
el.delta modulation with phase shift keyingdeltamodulatie met phase shift keying
comp., MSderived keyafgeleide sleutel (A cryptographic key created by a call to CryptDeriveKey. A derived key can be created from a password, or any other user data. Derived keys allow applications to create session keys as needed, eliminating the need to store a particular key)
comp., MSderived session keyafgeleide sessiesleutel (A session key created by an application as needed. Before creating a derived session key, an application prompts the user for a password)
fin.determination of the key for the financial resourcesverdeelsleutel voor de financiële middelen
el.differential coherent phase-shift keyingdifferentieel coherente phase shift keying
el.differential phase shift keying codingDPSK codering
el.differential phase-shift keyingdifferentiële phase shift keying
el.differentially coherent phase-shift keyingdifferentieel coherente phase shift keying
el.differentially encoded coherent phase shift keyingdifferentieel gecodeerde coherente phase shift keying
el.differentially encoded coherent phase shift keyingdifferentieel gecodeerde coherente modulatie met faseverschuiving
el.differentially encoded coherent phase shift keyingdifferentieel gecodeerde coherente PSK
el.differentially-coherent phase-shift keyingdifferentieel coherente phase shift keying
IT, el.Digital Phase Shift KeyingDPSK:Digital Phase Shift Keying
el.diplex keyingdiplex-sleuteling
ITdirectory of public keyslijst van openbare sleutels
mech.eng.diving keytandstang
mech.eng.diving key type transmissiontandwieloverbrenging met losse tandwielen en een tandstang
construct.door-bell keydraaiknop voor deurschel
construct.door-bell turn-keydraaiknop voor deurschel
earth.sc., life.sc.drawing keygidsafdruk
life.sc.drawing keyblauwdruk
mech.eng.driving keymeenemer
med.Dubois-Reymond keysleutel van Dubois-Reymond
commun., ITdynamic function keydynamische functietoets
mech.eng.dynamometric keysleutel met koppelbegrenzing
mech.eng.dynamometric keysleutel met koppelmeting
mech.eng.dynamometric keysleutel met regelbaar koppel
mech.eng.dynamometric keyinstelbare torsiesleutel
commun.electronic key systemelektronisch kiessysteem
el.electronic key telephone setstelefoontoestel met elektronisch kiessysteem
commun.electronic key telephone systemelektronisch kiessysteem
mech.eng., construct.emergency release keyontgrendelsleutel
ITencryption keyvercijfersleutel
comp., MSencryption keyencryptiesleutel (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data)
ITencryption keycodesleutel
comp., MSencryption keyversleutelingssleutel (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data)
comp., MSendorsement keygoedkeuringssleutel (A key pair, consisting of a public key and a private key, which is used to verify that a TPM is genuine)
comp., MSENTER keyENTER-toets (The key that is used at the end of a line or command to instruct the computer to process the command or text. In word processing programs, the Enter key is used at the end of a paragraph. Also called: Return key)
comp., MSentity keyentiteitssleutel (A reference to an entity of a specific entity type)
ITerase input keyuitwistoets
comp., MSESC keyESC-toets (A keyboard key that sends the escape (ESC) character to the computer. Often this key moves the user back one level in the menu structure or exits the program)
lab.law.exchange of experience between key personneluitwisseling van ervaringen t.b.h.v. personen die deze gegevens verder kunnen verspreiden
coal., el.exploder keysleutel
coal., el.exploder keyaandrijfsleutel
comp., MSexternal keyexterne sleutel (A file that contains information to access cryptographically locked data, which is stored away from the system, such as on a USB flash drive)
comp., MSexternal key fileexterne-sleutelbestand (A file that contains the external key and is stored on an external media device. The name and contents of the file are internal to Microsoft and can change from version to version)
commun.fast frequency shift keyingminimum shift keying
mech.eng.feather keystelspie
tech.feather keyveer
coal., el.firing keysleutel
coal., el.firing keyaandrijfsleutel
mech.eng.flat keyvlakspie
mech.eng.flat keyspie
tech.flat keyvlakke spie
mech.eng.flat saddle keyspie
life.sc., environ.flux of key source gases of anthropogenic origincirculeren van belangrijke gassen van antropogene oorsprong
life.sc., environ.flux of key source gases of natural origincirculatie van belangrijke gassen van natuurlijke oorsprong
comp., MSforeign keyrefererende sleutel (" A key in a database table that comes from another table (also know as the "referenced table") and whose values match the primary key (PK) or unique key in the referenced table.")
commun., ITfrequency-keying signalingsignalisatie door frequentieverschuiving
commun., ITfrequency-keying signallingsignalisatie door frequentieverschuiving
commun.frequency shift keyingsleuteling door frequentieomzetting
commun.frequency shift keyingfrequentieomschakeling
commun.frequency shift keyingmodulatie door frequentieverschuiving
commun.frequency-shift keyingseinen door middel van frequentieverschuiving
commun.frequency-shift keyingdigitale frequentiemodulatie
commun.frequency-shift keyingmodulatie met frequentieverschuiving
commun.frequency-shift keyingFSK-systeem
el.frequency-shift keying modemFSK-modem
comp., MSfull volume encryption keyversleutelingscode voor volledig volume (The algorithm-specific key that is used to encrypt (and optionally, diffuse) data on disk sectors. Currently, this key can be either 128 bits or 256 bits advanced encryption standard (AES). The default encryption algorithm that BitLocker Drive Encryption uses is AES 128 bit with diffuser)
el.fundamental keying frequencygrondsleutelfrequentie
el.fundamental keying frequencyfundamentele sleutelfrequentie
el.Gaussian filtered minimum shift keyingGaussisch gefilterde minimum shift keying
mech.eng.gib-head taper sunk keydrijfspie met kop
tech.gib-headed keykopspie
comp., MSglobal system keyglobale systeemsleutel (A tool used to configure the startup key, a random, 128-bit, symmetric cryptographic key created at system startup and used to encrypt all of the user`s symmetric cryptographic keys)
patents.goods of leather and imitations of leather, namely bags and other containers not designed to contain any particular object, as well as small leather goods, especially purses, pocket wallets, key walletsgoederen van leder en kunstleder, te weten andere niet aan de op te nemen voorwerpen aangepaste houders alsmede kleinlederwaren, met name portemonnees, portefeuilles, sleuteletuis
mater.sc.ground hydrant keysleutel voor ondergrondse hydrant
mater.sc.ground hydrant keysleutel voor ondergrondse brandkraan
comp., MSGroup Key Distribution ServiceGroup Key Distribution-service (An Active Directory Domain Services service that provides cryptographic keys that correspond to arbitrary sets of security principals in AD DS to users who are authorized to access those keys)
chem.heavy keyzware sleutelcomponent
gen.hierarchic key distributionhiërarchisch sleutelbeheer
construct.hollow keypijpsleutel
construct.hookspanner, skeleton keyloper (sleutel)
fin., ITidentifier of key to be discontinuedidentificatie van verouderde sleutel
transp., mech.eng.ignition keycontactsleutel
earth.sc., el.illuminated keylichtknop
gen.independent monitoring of key dataonafhankelijke controle van kerntechnische gegevens
work.fl., ITindexing by key-phrasesindexering met woordgroepen
comp., MSINSERT keyInsert-toets (" A key on the keyboard, labeled "Insert" or "Ins", whose usual function is to toggle a program's editing setting between an insert mode and an overwrite mode, although it may perform different functions in different applications.")
ITinsert mode keytoets voor de invoegmodus
mech.eng.integral keyspievertanding
earth.sc., life.sc.interpretation keyfotointerpretatiesleutel
ITkeeping a single keyéén enkele sleutel houden
gen.key actionkernactiviteit
automat.key addresssleuteladres
construct.key anchoragewigverankering
econ., fin.key audit partnerpartner belast met een essentiële taak bij de uitvoering van de wettelijke controle
econ., fin.key audit partnerbij de uitvoering van de wettelijke controle met een essentiële taak belaste vennoot
law, fin.key audit pointskritische posten
construct.key bitsleutelbaard
construct.key bitbaard (smidsvak)
mun.plan.key boardsleutelbord
construct.key cardsleutelkaart
automat.key card punchponsmachine
automat.key card punchponsdoos
automat.key card punchkaartponser
patents.key casessleuteletuis
patents.key chainssleutelkettingen
el.key-clicksleutelklik
chem.key componentsleutelcomponent
account.key controlessentiële controle
gen.key currencyreserve-valuta
life.sc., construct.key damhoofddam
life.sc., construct.key damvoornaamste dam
tech.key diagramprincipeschakeling
tech.key diagramprincipeschema
comp., MSKey Distribution Center proxy serviceKey Distribution Center-proxyservice (A service that runs on corporate network edge servers to proxy Kerberos protocol messages to domain controllers which are situated on the corporate network. This permits Kerberos authentication to edge services such as Remote Desktop Services Gateway or DirectAccess Server)
commun.key drawingtekenen van kaders
gen.key-encrypting keymeestersleutel
IT, dat.proc.key entrytoetsenbordinvoer
med.key enzymesleutelenzyme
gen.key familycodegroep
patents.key fobsversieringen voor sleutelringen
lawkey for capital subscriptionverdeelsleutel voor de inschrijving op het kapitaal
fin.key for subscription of the capital of the European Central Bankverdeelsleutel voor de inschrijving op het kapitaal van de Europese Centrale Bank
fin.key for subscription of the ECB's capitalverdeelsleutel voor de inschrijving op het kapitaal van de ECB
gen.key for subscription of the ECB's capitalverdeelsleutel voor de inschrijving op het kapitaal
fin.key for subscription to the capital of the European Central Bankverdeelsleutel voor de inschrijving op het kapitaal van de ECB
gen.key for subscription to the capital of the European Central Bankverdeelsleutel voor de inschrijving op het kapitaal
fin.key for subscription to the European Central Bank's capitalverdeelsleutel voor de inschrijving op het kapitaal van de ECB
gen.key for subscription to the European Central Bank's capitalverdeelsleutel voor de inschrijving op het kapitaal
stat., geogr.key geographic locationsleutellocatie
construct.key guidegeleider (of a lock, slot)
ITto key-inintoetsen
gen.key indicatorkernindicator
gen.key indicatorssleutelindicatoren
automat.key instructionsleutelopdracht
fin.key interest rateofficiële discontovoet
fin.key interest ratebasisrentetarief
fin.key interest ratebelangrijkste rentetarieven
law, fin.key interest ratebelangrijkste rentetarief
lawkey interest ratesbelangrijkste rentetarieven
law, lab.law.key jobsleutelpositie
met.key lacquergrondlak
work.fl.key letters in context indexkey letters-in-context-register
work.fl.key letters in context indexKLIC-register
mun.plan.key lockslot met sleutel
gen.key management facilitysleutelbeheerfaciliteit
econ., fin.key management positionessentiële bestuursfunctie
comp., MSKey Management ServerSleutelbeheerserver (The Exchange computer on which the Key Management Service has been installed. There can be one Key Management Server per administrative group)
comp., MSKey Management Serviceservice voor sleutelbeheer (An optional Microsoft Exchange 2000 Server component that is installed on a designated server in an administrative group. It provides centralized administration and archival of private keys, and maintains every user s private encryption key in an encrypted database. The keys are used for encrypting e-mail messages and signing messages with digital signatures)
comp., MSKey Mastersleutelmaster (A DNS server role that is responsible for all DNSSEC key management for a specific DNSSEC-signed DNS zone. Different DNS zones can have different Key Masters. The Key Master role can be moved from one DNS server to a different DNS server, but a DNS zone can have only one Key Master at a given time. To be a Key Master, the DNS server must be authoritative for the DNS zone, the zone must be signed with DNSSEC, and the DNS server must be selected to be the Key Master for the DNS zone)
energ.ind., nucl.phys.key measurement pointhoofdmeetpunt
gen.key messagekernpunt
comp., MSKey Metricsmetrische sleutelgegevens (A tab in Application Diagnostics that provides an at-a-glance view of a selected application. The graph displays 1. the average performance based on the Monitored Requests counter, and 2. the number of requests. By looking at the graph, you can easily determine the traffic load and make inferences about problems that might be occurring)
commer., econ.key moneysleutelgeld
fin.key money ratespilkoers
fin.key money ratemiddenkoers
transp.key of the anchor stockankerstokpen
agric., mater.sc.key-opening canbus met afroldeksel
construct.key-operated locking haspveiligheidsoverval met sleutel
earth.sc., el.key-operated switchschakelaar met sleutel
comp., MSkey performance indicatorKey Performance Indicator (A predefined measure that is used to track performance of a strategic goal, objective, plan, initiative, or business process. A KPI is evaluated against a target. An explicit and measurable value taken directly from a data source. Key performance indicators (KPIs) are used to measure performance in a specific area, for example, revenue per customer)
gen.key personnelkader
construct.key pipe, key shanksleutelschacht
construct.key pipe, key shanksleutelpijp
gen.key planning assumptionsvoornaamste planningsuitgangspunten
chem.key precursorsleutelvoorloper
chem., engl.key precursorprecursor
comp., MSKey pressToetsen indrukken (" An option in "ringtones & sounds" settings. When this option is selected, the phone makes a sound when buttons on the on-screen keypad or keyboard are tapped.")
automat.key punchponsmachine
automat.key punchponsdoos
automat.key punchkaartponser
IT, lab.law.key-punch operatorponstypiste
gen.key qualificationssleutelbekwaamheden
econ., tech.key raw materialessentiële grondstof
construct.key ringsleuteloog
mun.plan.key ringsleutelring
gen.key rings trinkets or fobssleutelhangers fantasie-artikelen
patents.key-ringssleutelringen
patents.key-rings of common metalmetalen sleutelringen
comp., MSkey search attacksleutelzoekaanval (An attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered)
econ.key sectorbelangrijke sector
econ.key sectorsleutelsector
gen.key-sending telephonedruktoetstelefoon
comp., MSkey signing keysleutelondertekeningssleutel (A public key corresponding to a private key that is used to sign one or more DNS record sets at the zone apex)
agric.key stimulusspecifieke stimulus
tech.key testsleutelproef
tech.key testbeslissende proef
commun., ITkey-titlesleuteltitel
nat.sc., agric.key utilisation speciesplantensoort die aanwijzing geeft
nat.sc., agric.key utilization speciesplantensoort die aanwijzing geeft
comp., MSkey-value pairsleutel-waardepaar (A set of data items that contains a unique identifier, called a key, and a value that is the actual data for the key)
patents.key walletssleuteletuis
zool.Key West quail-doveCubaanse duif (Geotrygon chrysia)
commun., ITkey-word searchtoegang via trefwoordenlijst
gen.key wrenchstangensleutel
gen.key wrenchboorstangsleutel
construct.keyhole plate, key platesleutelplaatje
el.keying cyclesleutelingscyclus
commun., el.keying filtersleutelklikfilter
commun., el.keying filterseinfilter
IT, dat.proc.keying-inintoetsen
fin., ITkeying relationshipsleutelrelatie
el.keying slotkoppelingsgleuf
mech.eng.keys and pinsspieën
insur.keys clausesleutel-clausule
construct.keystone, key block, key of an arch crown stone, apex stonesluitsteen van een boog
construct.keystone, key block, key of an arch crown stone, apex stonesleutel
law, ITlawful access to encryption keyswettelijk toegestane toegang tot encryptiesleutels
fin.layout keystandaardformulier
comp., MSlegend keyslegendasleutels (Symbols in legends that show the patterns and colors assigned to the data series (or categories) in a chart. Legend keys appear to the left of legend entries. Formatting a legend key also formats the data marker that's associated with it)
IT, dat.proc.letter keygegevenstoets
tech.Lewis keytangentiaalwig
chem.light keylichte sleutelcomponent
transp., mech.eng.lock keysleutel
construct.locking key, folding wedgesopsluitwig
cultur., earth.sc.low-key lightingvoornamelijk bijkomende verlichting
ITmajor keyhoofdsleutel
commun., ITmanual keying speedmanuale schakelingssnelheid
ITmaster keyvercijfersleutel
comp., MSmaster keyhoofdsleutel (The key used by the client and server for all session key generation. The master key is used to generate the client-read key, the client-write key, the server-read key, and the server-write key. Master keys can be exported as simple key BLOBs)
mech.eng.master keybeveiligingssleutel
gen.master keymeestersleutel
ITmessage keyberichtsleutel
ITmessage keyberichtensleutel
patents.metal key chainsmetalen sleutelkettingen
comp., MSMicrosoft Group Key Distribution ServiceMicrosoft Group Key Distribution-service (An Active Directory Domain Services service that provides cryptographic keys that correspond to arbitrary sets of security principals in AD DS to users who are authorized to access those keys)
mech.eng.to mill a key wayspiesleuf frezen
mech.eng.to mill a key wayspiebaan frezen
mech.eng.to mill a key wayspiegleuf frezen
mech.eng.to mill a key waygroef uithakken
commun.minimum-shift keyingminimum frequentie-verschuivingssleuteling
commun.Morse keymorsesleutel
gen.morse-type keytoestel met seinsleutel
gen.multi-key retrievalmulti-sleutel-zoeken
comp., MSmulti-activation keyproductcode voor meerdere activeringen (A product key that is provided to Microsoft customers who choose a Microsoft Volume Licensing program for their organizations and that allows multiple installations of a particular product. The key is assigned to a company or institution intended for their sole use and only for distribution to employees or third parties who are authorized to install and distribute licenses pursuant to the terms of their license agreement)
el.multi-frequency-shift-keying techniquesleutelingstechniek door meervoudige frequentieverschuiving
comp., MSmultiple activation keymeervoudige activeringscode (A volume license key that is used for one-time activation with activation services that are hosted by Microsoft)
gen.multiple key retrievalmulti-sleutel-zoeken
mech.eng.multiple keysmeervoudige spievertanding
transp., mech.eng.multiple keysgroef
el.multiple phase shift keyingmeervoudige phase shift keying
commun., ITmute keydempingssleutel
el.narrow-band phase-shift keyingsmalband PSK
comp., MSnetwork keynetwerksleutel (A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key)
comp., MSnetwork security keynetwerkbeveiligingssleutel (A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key)
gen.New Key ProjectNieuw Sleutel Project
mech.eng.non-tapered keyhalvemaanspie
construct.notch for the key bit in the tail of a lock boltvinkeep
el.notched keying wheelstuurtandwiel
ITnumeric keynumerieke toets
ITnumeric key punchnumerieke ponsmachine
mech.eng.offset hexagon bar keystiftsleutel
mech.eng.offset hexagon bar keyinbussleutel
ITonce-only keyeenmaal gebruikte sleutel
ITone-time keyeenmaal gebruikte sleutel
commun., ITon-off keyingaan-uit-sleuteling
commun., ITon-off keyingaritmische modulatie
commun., ITon-off keyingaan-uitsleuteling
commun.on-off keyingaan/uitsleuteling
commun., ITon-off keying modulationaan-uitsleutelingsmodulatie
el.opposite keying polaritytegengestelde sleutelingspolariteit
comp., MSPAGE DOWN keyPageDown-toets (" A keyboard key (often labeled "PgDn") that is often used to move the cursor down to the top of the next page or a specific number of lines. Its function may vary in different programs.")
comp., MSPAGE UP keyPageUp-toets (" A keyboard key (often labeled "PgUp") that is often used to move the cursor up to the top of the previous page or a specific number of lines. Its function may vary in different programs.")
polit.permanent key nucleuskernstaf
commun.phase shift keyingmodulatie met faseverschuiving
commun.phase shift keyingmodulatie met fazeverschuiving
commun.phase shift keyingfaseverschuivingssleuteling
commun.phase-coherent frequency shift keyingfase coherent frequentie coderen
earth.sc., life.sc.photointerpretation keyfotointerpretatiesleutel
ITphysical keyfysieke sleutel
gen.piano keyspianotoetsen
mech.eng.1:pillar hydrant key2:sleutel voor bovengrondse hydrant
mech.eng.1:pillar hydrant key1:sleutel voor bovengrondse brandkraan
comp., MSPIN unlock keyOntgrendelingscode (An 8-digit code used to unlock the SIM card. A Personal Unlocking Key is a type of personal identification number (PIN))
mech.eng.plain keyvlakspie
ITpossible keykandidaatsleutel
comp., MSpredefined keyvooraf gedefinieerde sleutel (A key that represents one of the main divisions of the registry. Each predefined key is displayed in a separate Registry Editor window, with the key's name appearing in the window's title bar. For example, HKEY_CLASSES_ROOT is a predefined key)
comp., MSPre-shared keyVooraf gedeelde sleutel (An option that allows the user to view the code that can be used to authenticate IPSec/L2TP connections (typically VPN connections))
earth.sc., mech.eng.pressure keydrukknop
comp., MSprimary keyprimaire sleutel (One or more fields that uniquely identify each record in a table. In the same way that a license plate number identifies a car, the primary key uniquely identifies a record)
gen.primary keymeestersleutel
comp., MSPRINT SCREEN keyPRINT-SCRN-toets (A key on IBM PC and compatible keyboards that normally causes the computer to send a character-based "picture" of the screen contents to the printer)
ITprivate cryptographic signature keycryptografische privésleutel
commun., ITprivate keyprivésleutel
comp., MSprivate keypersoonlijke sleutel (The secret half of a cryptographic key pair that is used with a public key algorithm. Private keys are typically used to decrypt a symmetric session key, digitally sign data, or decrypt data that has been encrypted with the corresponding public key)
gen.private key data confidentialitygeheimhouding met behulp van een geheime sleutel
gen.private key data confidentialitydatavertrouwelijkheid met geheime sleutel
gen.private key enciphermentgeheim sleutelsysteem
construct.procedure for key planning decisionsprocedure van de planologische kernbeslissingen
ITprocessor controlled keying systemprogrammabestuurd intoetssysteem
comp., MSproduct keyproductcode (A sequence of 25 letters and numbers. To activate some software, you must enter a product key during the activation process)
transp., mech.eng.propeller keyschroefspie
IT, dat.proc.protection keykeylock
IT, dat.proc.protection keybeschermingssleutel
ITpublic cryptographic keycryptografische openbare sleutel
comp., MSpublic keyopenbare sleutel (The nonsecret half of a cryptographic key pair that is used with a public key algorithm. Public keys are typically used when encrypting a session key, verifying a digital signature, or encrypting data that can be decrypted with the corresponding private key)
comp., MSpublic keyopenbare sleutel (The nonsecret half of a cryptographic key pair that is used with a public key algorithm. Public keys are typically used when encrypting a session key, verifying a digital signature, or encrypting data that can be decrypted with the corresponding private key)
comp., MSpublic key algorithmalgoritme van openbare sleutel (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message)
ITpublic-key cryptographic systemcryptografisch systeem met openbare sleutel
ITpublic key cryptographyopenbaar versleuteld systeem
ITpublic key cryptographyasymmetrisch encryptie-algoritme
gen.public key data confidentialitygegevensbeveiliging met openbare sleutel
gen.public key data confidentialitygeheimhouding met openbare sleutel
gen.public key data confidentialitydatavertrouwelijkheid met openbare sleutel
ITpublic key enciphermentopenbaar versleuteld systeem
ITpublic key enciphermentasymmetrisch encryptie-algoritme
commun., ITpublic key encryptionasymmetrische encryptie
comp., MSpublic key encryptionopenbare-sleutelversleuteling (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
busin., dat.proc.public key infrastructureopenbare sleutelinfrastructuur
comp., MSpublic key infrastructurePublic Key Infrastructure (The laws, policies, standards, and software that regulate or manipulate certificates and public and private keys. In practice, it is a system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in an electronic transaction. Standards for PKI are still evolving, even though they are being widely implemented as a necessary element of electronic commerce)
comp., MSPublic Key Infrastructure certificatecertificaat voor de infrastructuur van openbare sleutels (A system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in an electronic transaction)
comp., MSpublic key infrastructure hierarchyhiërarchie voor openbare-sleutelinfrastructuur (A hierarchy in which the roles of the certification authority are separated into one root CA and one or more subordinate CAs)
social.sc., ITPublic Sector Information: A Key Resource for Europe - Green Paper on Public Sector Information in the Information SocietyGroenboek van de Commissie: "Overheidsinformatie: een essentiële hulpbron voor Europa. Groenboek over overheidsinformatie in de informatiemaatschappij"
construct., ITPublic sector information: a key resource for Europe - Green Paper on public sector information in the information societyOverheidsinformatie: een essentiële hulpbron voor Europa - Groenboek over overheidsinformatie in de informatiemaatschappij
earth.sc., life.sc.punch card keyponskaartensleutel
commun., nat.sc., engl.Quadrature Phase Shift KeyingQ-phased shift key
el.quadrature phase shift keyingvierfase PSK
el.quadrature phase-shift keyingvierfase PSK
el.quadriphase shift keyingvierfase PSK
el.quaternary phase shift keyingvierfase PSK
el.quaternary phase-shift keyingvierfase PSK
transp., avia.radio transmission keyingde verzending van radioberichten
lab.law.to recognize signals and key sounds during workmet het werk verband houdende informatieve geluiden
comp., MSreferencing keyrefererende sleutel (" A key in a database table that comes from another table (also know as the "referenced table") and whose values match the primary key (PK) or unique key in the referenced table.")
comp., MSregistry keyregistersleutel (An identifier for a record or group of records in the registry)
comp., MSRelease keyvrijgavetoets (The key combination (Ctrl+Alt+Left arrow key by default) that must be pressed to move keyboard and mouse focus from a guest operating system back to the physical computer)
econ., transp.release keyvrijmakingsknop
automat.release keyloslaattoets
comp., MSreplica keyreplicasleutel (A 4-byte value that maps to a replica ID in a replica key map)
comp., MSresume keyhervattingssleutel (A key supplied by the SMB client that allows the system to reference the handle during a resume operation after a failover)
comp., MSretail keyproductcode (A type of product key required during the installation of Windows)
gen.rings of common metal for keyssleutelringen van metaal
ITroll keyafrol-toets
gen.rolling keydraaispie
mun.plan.roughly cast key blankruw gegoten sleutel
mun.plan.roughly stamped key blankruw gestampte sleutel
ITrouting by keyroutebepaling aan de hand van de sleutel
mech.eng.safety keybeveiligingssleutel
social.sc., empl.scoreboard of key employment and social indicatorsscorebord van sociale en werkgelegenheidsindicatoren
social.sc., empl.scoreboard of key employment and social indicatorsscorebord van kernindicatoren op sociaal en werkgelegenheidsgebied
mech.eng.screw keyschroefsleutel
mech.eng.screw keymoersleutel
comp., MSSCROLL LOCK keyScroll-Lock-toets (On the IBM PC/XT and AT and compatible keyboards, a key on the top row of the numeric keypad that controls the effect of the cursor control keys and sometimes prevents the screen from scrolling. On the enhanced and Macintosh keyboards, this key is to the right of the function keys on the top row. Many modern applications ignore the Scroll Lock setting)
IT, tech.search keyzoekkenmerk
IT, tech.search keyselectiecriterium
comp., MSsearch keyzoeksleutel (The value that is to be searched for in a document or any collection of data)
commun., ITsecret keyprivate sleutel
commun., ITsecret keyprivésleutel
comp., MSsecret keygeheime sleutel (A symmetric encryption key shared by two entities, such as between a user and the domain controller (DC), with a long lifetime. A password is a common example of a secret key. When used in a context that implies Kerberos only, a principal's secret key)
gen.secret key enciphermentgeheim sleutelsysteem
comp., MSsecret key encryptionversleuteling met geheime sleutel (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data)
fin., ITseed keyzaadgetalsleutel
fin., ITseed keyseedsleutel
ITsequency keysorteersleutel
gen.series keyreekssleutel
commun., ITsession keyverbindingssleutel
comp., MSsession keysessiesleutel (The key used for encrypting data during a communication session)
fin., ITsession keysessionsleutel
mech.eng.shear keydwarskrachttand
comp., MSSHIFT keySHIFT-toets (A keyboard key that, when pressed in combination with another key, gives that key an alternative meaning, for example, producing an uppercase character when a letter key is pressed. The SHIFT key is also used in various key combinations to create nonstandard characters or to perform special operations)
commun., transp.signal box with push key routingdrukknoptoestel voor rijweginstelling
commun.single channel frequency shift keying coaxial systemsingle channel FSK systeem
gen.single-key tabulatortabulator
construct.siting, block plan, lay-out, key plansituatie
industr., construct.skeleton keysteeksleutel
industr., construct.skeleton keyloper
mech.eng.slide-key drivetandwieloverbrenging met losse tandwielen en een tandstang
mech.eng.sliding keytandstang
comp., MSsoft keyschermtoets (" One of the two unlabeled keys located just below the display area on a mobile phone. These keys are called "soft" because their functions change to fit the context. Labels in the lower part of the mobile screen tell users what the soft keys do.")
IT, dat.proc.sort keysorteervoorwaarde
IT, dat.proc.sort keysorteersleutel
comp., MSspeed dial keysnelkeuzetoets (A single- or double-digit number associated with telephone numbers, or e-mail or Web addresses, that enables users to quickly access the numbers or addresses)
dat.proc.speed keytoetsenbordafkorting
dat.proc.speed keysneltoets
tech.split keysplitpen
comp., MSstorage root keyopslagbasissleutel (On a system that incorporates a TPM, a cryptographic asymmetric key which is created at the root of the TPM key hierarchy (2048-bit RSA key) and which is used by the TPM to store protected data. The private portion of this key never leaves the TPM. The public part of this key is returned to the owner and needs to be carefully guarded since it uniquely identifies the TPM on the network, therefore is privacy sensitive)
comp., MSsubject key identifieridentificatie van onderwerpsleutel (A certificate extension that contains a hash of the certification authority's certificate public key. This hash is placed in the Authority Key Identifier (AKI) extension of all issued certificates to facilitate chain building)
fin.subscription key to the ECB's capitalverdeelsleutel voor de inschrijving op het kapitaal van de ECB
gen.subscription key to the ECB's capitalverdeelsleutel voor de inschrijving op het kapitaal
mech.eng.sunk keyinlegspie
tech.sunk keysleufspie
comp., MSsurrogate keysurrogaatsleutel (A single attribute candidate key whose values are system-generated and that does not represent properties that identify objects in the real world)
construct.survey map, key planoverzichtskaart
transp., mech.eng.switch keycontactsleutel
tech.switch keyschakelaar
comp., MSsymmetric keysymmetrische sleutel (The cryptographic key used to both encrypt and decrypt protected content during publishing and consumption)
gen.symmetric key ciphergeheim sleutelsysteem
comp., MSsymmetric-key cryptographysymmetrische-sleutelcryptografie (A type of cryptography that uses symmetric keys to provide confidentiality)
comp., MSTAB keyTAB-toets (A keyboard key, often labeled with both a left-pointing and a right-pointing arrow, that traditionally (as in word processing) is used to insert tab characters into a document. In other applications, such as menu-driven programs, the TAB key is often used to move the on-screen highlight from place to place)
ed.Tackling early school leaving: A key contribution to the Europe 2020 AgendaVoortijdig schoolverlaten aanpakken: een essentiële bijdrage aan de Europa 2020-agenda
IT, el.tactile keysignaleringsbedieningsknop
mech.eng.tangential keytangentiaalspie
tech.tangential keytangentiale spie
mech.eng.taper keydrijfspie
ITtest keycontrolesleutel
el.trapezoidal keyingsleuteling met trapeziumvormig signaal
mech.eng., construct.triangular keydriekantsleutel
gen.turn-key buildingsvoor gebruik gerede gebouwen
law, industr.turn-key contractsleutelklaar contract
construct.turn-key contractsleutelklaar project
agric., construct.turn key multi purpose hallhal voor meervoudig gebruik,sleutel op slot
lawturn-key, ready for immediate occupationsleutelklaar,klaar voor gebruik
ITtypamatic keyherhalingstoets
gen.typewriter keystoetsen voor schrijfmachines
mech.eng.untapered keyschijfspie
mech.eng.untapered keyhalvemaanspie
patents.valises, satchels, cases for travel kits, vanity cases, pouches, shoulder bags, kitbags, rucksacks, shopping bags, beach bags, handbags, briefcases, wallets, key cases, credit-card cases, business-card caseskoffers, schooltassen, reissets, beautycases, zakken, schoudertassen, plunjezakken, rugzakken, boodschappentassen, strandtassen, handtassen, aktentassen , portefeuilles, sleuteletuis, etuis voor creditcards, etuis voor visitekaartjes
ITverification of keyingcontroleponsen
comp., MSvirtual key codevirtuele sleutelcode (A symbolic constant name, hexadecimal value, or mouse or keyboard equivalent that provides a hardware and language-independent method of identifying keyboard keys. Each virtual key code represents a unique keyboard key and also identifies the purpose of that key. The keyboard driver must provide one or more keyboard layouts that maps keyboard scan codes to the appropriate virtual key codes)
commun.voice-frequency key sendingdruktoetskeuze met telefoon-frequenties
comp., MSvolume license keyvolumelicentiesleutel (A product key that is provided to Microsoft customers who choose a Microsoft Volume Licensing program for their organizations and that allows multiple installations of a particular product. The key is assigned to a company or institution intended for their sole use and only for distribution to employees or third parties who are authorized to install and distribute licenses pursuant to the terms of their license agreement)
comp., MSvolume license product keyproductcode van de volumelicentie (A product key that is provided to Microsoft customers who choose a Microsoft Volume Licensing program for their organizations and that allows multiple installations of a particular product. The key is assigned to a company or institution intended for their sole use and only for distribution to employees or third parties who are authorized to install and distribute licenses pursuant to the terms of their license agreement)
fin.weighting in the keyweging in de verdeelsleutel
fin.weighting of a national central bank in the keyweging van een nationale centrale bank in de verdeelsleutel
industr., construct.winding keyopwindsleutel
gen.winding keys of metalopwindsleutels
mech.eng.Woodruff keyschijfspie
mech.eng.Woodruff keyhalterplaatje
mech.eng.wrench keystiftsleutel
comp., MSzone signing keyzoneondertekeningssleutel (A public key corresponding to a private key that is used to sign one or more DNS record sets within a zone, below the zone apex)
Showing first 500 phrases

Get short URL