DictionaryForumContacts

Terms containing key | all forms | exact matches only
SubjectEnglishNorwegian Bokmål
comp., MSaccess keytilgangstast (Any combination of keys that must be pressed sequentially)
comp., MSALT keyAlt-tasten (A keyboard key that is used in conjunction with another key to produce some special feature or function and is typically marked with the letters Alt)
comp., MSalternate keyalternativ nøkkel (A candidate key that is not designated as the primary key and is used to uniquely identify records in a database table)
comp., MSarrow keypiltast (Any of four keys labeled with arrows pointing up, down, left, and right, used to move the cursor vertically or horizontally on the display screen or, in some programs, to extend the highlight)
comp., MSasymmetric key algorithmasymmetrisk nøkkelalgoritme (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
comp., MSAuthority Key Identifiernøkkelidentifikator for instans (A certificate extension used by the certificate chaining engine to determine what certificate was used to sign a presented certificate. The AKI can contain the issuer name, serial number, public key information, or no information at all. By matching the information in a certificate's AKI extension to a CA certificate's Subject Key Identifier (SKI) extension, a certificate chain can be built)
comp., MSBACKSPACE keyTilbake-tasten (A keyboard key that moves the cursor to the left, one character at a time, usually erasing each character as it moves)
comp., MSBitLocker recovery keyBitLocker-gjenopprettingsnøkkel (A special key that you can create when you turn on Bitlocker Drive Encryption for the first time on each drive that you encrypt)
comp., MScandidate keykandidatnøkkel (A column or set of columns that have a unique value for each row in a table)
comp., MSCAPS LOCK keyCaps Lock (A toggle key that, when on, shifts the alphabetic characters on the keyboard to uppercase)
comp., MSclass keyklassenøkkel (The subset of data members of a class whose values uniquely identify an instance of the class)
comp., MSclass key membermedlem av klassenøkkel, klassenøkkelmedlem (One of the members of a multi-valued class key)
comp., MScolor keyfargenøkkel (A color used for transparent or translucent effects. An overlay surface is displayed in the region of the primary surface that contains the color key. In video production, color keys are used to combine two video signals)
comp., MScontent keyinnholdsnøkkel (The cryptographic key used to both encrypt and decrypt protected content during publishing and consumption)
comp., MSControl keykontrolltast (A key that, when pressed in combination with another key, gives the other key an alternative meaning)
comp., MScrypto escrow keyreservekrypteringsnøkkel (A secondary encryption key that provides the ability for an authorized IT Helpdesk administrator to open an encrypted document when the password is lost)
comp., MSCTRL keyCtrl-tasten (A key that, when pressed in combination with another key, gives the other key an alternative meaning)
comp., MSdata encryption keydatakrypteringsnøkkel (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data)
comp., MSdead keydødtast (A key that is used to modify the character that follows it, for example, by adding an accent mark or other diacritic)
comp., MSderived keyavledet nøkkel (A cryptographic key created by a call to CryptDeriveKey. A derived key can be created from a password, or any other user data. Derived keys allow applications to create session keys as needed, eliminating the need to store a particular key)
comp., MSderived session keyavledet øktsnøkkel (A session key created by an application as needed. Before creating a derived session key, an application prompts the user for a password)
comp., MSe-mail quick keye-posthurtigtast (A key that you use in some e-mail programs to enter text that is commonly used)
comp., MSencryption keykrypteringsnøkkel (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data)
comp., MSenhanced key usageutvidet nøkkelbruk (An extended property value that specifies the uses for which a certificate is valid)
comp., MSentity keyentity-nøkkel (A reference to an entity of a specific entity type)
comp., MSESC keyESC-tasten (A keyboard key that sends the escape (ESC) character to the computer. Often this key moves the user back one level in the menu structure or exits the program)
comp., MSforeign keysekundærnøkkel (" A key in a database table that comes from another table (also know as the "referenced table") and whose values match the primary key (PK) or unique key in the referenced table.")
comp., MSINSERT keyInsert (" A key on the keyboard, labeled "Insert" or "Ins", whose usual function is to toggle a program's editing setting between an insert mode and an overwrite mode, although it may perform different functions in different applications.")
comp., MSitem allocation keyvarefordelingsnøkkel (A product family grouping that is used for forecast and demand scheduling)
comp., MSkey actiontastehandling (Term used to describe program behavior when a certain key is pressed on the keyboard. Key actions are associated with items within a source document)
comp., MSkey combinationtastekombinasjon (Any combination of keys that must be pressed simultaneously)
comp., MSkey derivation functionnøkkelavledningsfunksjon (A cryptographic function that generates key material from a secret value)
comp., MSKey Distribution Centernøkkeldistribusjonssenter (A network service that supplies session tickets and temporary session keys to users and computers within an Active Directory domain. The KDC runs on each domain controller as part of Active Directory Domain Services (AD DS))
comp., MSkey enciphermentnøkkelchiffrering (The creation of a randomly-generated symmetric key to encrypt file data)
comp., MSkey exchangenøkkelutveksling (Confidential exchange of secret keys online, which is commonly done with public key cryptography)
comp., MSkey filternøkkelfilter (A metadata column or field in a Key Filters control)
comp., MSKey FiltersNøkkelfiltre (A metadata navigation control that enables users to limit the items displayed in a list or library to those that match selected values)
comp., MSkey framenøkkelbilde (A video frame in which starting and ending positions of an object are given, and all frames in between are interpolated by a computer to produce smooth automated animation. Most ray-traced computer animation is created using this technique)
comp., MSkey IDnøkkel-ID (A value that identifies the key for a packaged Windows Media file)
comp., MSKey lockTastelås (An option that locks the keypad to avoid accidental key presses)
comp., MSkey loggertastelogger (A type of malware that sends key strokes or screen shots to an attacker)
comp., MSKey Management Servernøkkelbehandlingsserver (The Exchange computer on which the Key Management Service has been installed. There can be one Key Management Server per administrative group)
comp., MSKey Management Servicetjeneste for nøkkelbehandling (An optional Microsoft Exchange 2000 Server component that is installed on a designated server in an administrative group. It provides centralized administration and archival of private keys, and maintains every user s private encryption key in an encrypted database. The keys are used for encrypting e-mail messages and signing messages with digital signatures)
comp., MSkey pairnøkkelpar (A private key and its related public key)
comp., MSKey pressTastetrykk (" An option in "ringtones & sounds" settings. When this option is selected, the phone makes a sound when buttons on the on-screen keypad or keyboard are tapped.")
gen.key ratestyringsrente
comp., MSkey sequencetastesekvens (Any combination of keys that must be pressed sequentially)
comp., MSkey-value pairnøkkelverdipar (A set of data items that contains a unique identifier, called a key, and a value that is the actual data for the key)
gen.key wordnøkkelord
comp., MSlegend keysforklaringsnøkler (Symbols in legends that show the patterns and colors assigned to the data series (or categories) in a chart. Legend keys appear to the left of legend entries. Formatting a legend key also formats the data marker that's associated with it)
comp., MSlicense key seedlisensnøkkelkode (A shared secret value that is used to generate keys to encrypt Windows Media files)
comp., MSmaster keyhovednøkkel (The key used by the client and server for all session key generation. The master key is used to generate the client-read key, the client-write key, the server-read key, and the server-write key. Master keys can be exported as simple key BLOBs)
comp., MSmodifier keyendringstast (A keyboard key that, when pressed (and held), changes the actions of ordinary input)
comp., MSmulti-activation keymultiaktiveringsnøkkel (A product key that is provided to Microsoft customers who choose a Microsoft Volume Licensing program for their organizations and that allows multiple installations of a particular product. The key is assigned to a company or institution intended for their sole use and only for distribution to employees or third parties who are authorized to install and distribute licenses pursuant to the terms of their license agreement)
comp., MSnatural keynaturlig nøkkel (A primary key or alternate key whose values identify objects in the real world)
comp., MSnetwork keynettverksnøkkel (A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key)
comp., MSnetwork security keysikkerhetsnøkkel for nettverk (A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key)
comp., MSPIN unlock keyKode for å låse opp PIN-kode (An 8-digit code used to unlock the SIM card. A Personal Unlocking Key is a type of personal identification number (PIN))
comp., MSpredefined keyforhåndsdefinert nøkkel (A key that represents one of the main divisions of the registry. Each predefined key is displayed in a separate Registry Editor window, with the key's name appearing in the window's title bar. For example, HKEY_CLASSES_ROOT is a predefined key)
comp., MSPre-shared keyForhåndsdelt nøkkel (An option that allows the user to view the code that can be used to authenticate IPSec/L2TP connections (typically VPN connections))
comp., MSprimary keyprimærnøkkel (One or more fields that uniquely identify each record in a table. In the same way that a license plate number identifies a car, the primary key uniquely identifies a record)
comp., MSPRINT SCREEN keyPrintScr (A key on IBM PC and compatible keyboards that normally causes the computer to send a character-based "picture" of the screen contents to the printer)
comp., MSprivate keyprivatnøkkel (The secret half of a cryptographic key pair that is used with a public key algorithm. Private keys are typically used to decrypt a symmetric session key, digitally sign data, or decrypt data that has been encrypted with the corresponding public key)
comp., MSproduct keyproduktnøkkel (A sequence of 25 letters and numbers. To activate some software, you must enter a product key during the activation process)
comp., MSpublic keyfellesnøkkel (The nonsecret half of a cryptographic key pair that is used with a public key algorithm. Public keys are typically used when encrypting a session key, verifying a digital signature, or encrypting data that can be decrypted with the corresponding private key)
comp., MSpublic key algorithmfellesnøkkelalgoritme (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message)
comp., MSpublic key encryptionkryptering med fellesnøkkel (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
comp., MSpublic key infrastructureinfrastruktur for fellesnøkkel (The laws, policies, standards, and software that regulate or manipulate certificates and public and private keys. In practice, it is a system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in an electronic transaction. Standards for PKI are still evolving, even though they are being widely implemented as a necessary element of electronic commerce)
comp., MSPublic Key Infrastructure certificatePublic Key Infrastructure-sertifikat (A system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in an electronic transaction)
comp., MSreferencing keysekundærnøkkel (" A key in a database table that comes from another table (also know as the "referenced table") and whose values match the primary key (PK) or unique key in the referenced table.")
comp., MSregistry keyregisternøkkel (An identifier for a record or group of records in the registry)
comp., MSreplica keyreplikanøkkel (A 4-byte value that maps to a replica ID in a replica key map)
comp., MSretail keydetaljsalgsnøkkel (A type of product key required during the installation of Windows)
comp., MSSCROLL LOCK keyScroll Lock (On the IBM PC/XT and AT and compatible keyboards, a key on the top row of the numeric keypad that controls the effect of the cursor control keys and sometimes prevents the screen from scrolling. On the enhanced and Macintosh keyboards, this key is to the right of the function keys on the top row. Many modern applications ignore the Scroll Lock setting)
comp., MSsearch keysøkenøkkel (The value that is to be searched for in a document or any collection of data)
comp., MSsecret keyhemmelig nøkkel (A symmetric encryption key shared by two entities, such as between a user and the domain controller (DC), with a long lifetime. A password is a common example of a secret key. When used in a context that implies Kerberos only, a principal's secret key)
comp., MSsecret key encryptionkryptering med hemmelig nøkkel (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data)
comp., MSsession keyøktsnøkkel (The key used for encrypting data during a communication session)
comp., MSSHIFT keySkift (A keyboard key that, when pressed in combination with another key, gives that key an alternative meaning, for example, producing an uppercase character when a letter key is pressed. The SHIFT key is also used in various key combinations to create nonstandard characters or to perform special operations)
comp., MSshortcut keyhurtigtast (Any combination of keys that must be pressed simultaneously)
comp., MSsoft keyfunksjonstast (" One of the two unlabeled keys located just below the display area on a mobile phone. These keys are called "soft" because their functions change to fit the context. Labels in the lower part of the mobile screen tell users what the soft keys do.")
comp., MSspeed dial keykortnummertast (A single- or double-digit number associated with telephone numbers, or e-mail or Web addresses, that enables users to quickly access the numbers or addresses)
comp., MSsurrogate keysurrogatnøkkel (A single attribute candidate key whose values are system-generated and that does not represent properties that identify objects in the real world)
comp., MSsymmetric-key cryptographyinnholdsnøkkelkryptografi (A type of cryptography that uses symmetric keys to provide confidentiality)
comp., MSTAB keytabulatortast (A keyboard key, often labeled with both a left-pointing and a right-pointing arrow, that traditionally (as in word processing) is used to insert tab characters into a document. In other applications, such as menu-driven programs, the TAB key is often used to move the on-screen highlight from place to place)
comp., MStoggle keyveksletast (A keyboard key that alternates between turning a particular operation, function, or mode on or off)
comp., MStrusted root keyklarert rotnøkkel (An encryption key used in Configuration Manager to help clients identify valid management points)
comp., MSvirtual key codekode for virtuell tast (A symbolic constant name, hexadecimal value, or mouse or keyboard equivalent that provides a hardware and language-independent method of identifying keyboard keys. Each virtual key code represents a unique keyboard key and also identifies the purpose of that key. The keyboard driver must provide one or more keyboard layouts that maps keyboard scan codes to the appropriate virtual key codes)
comp., MSvolume license keyvolumlisensnøkkel (A product key that is provided to Microsoft customers who choose a Microsoft Volume Licensing program for their organizations and that allows multiple installations of a particular product. The key is assigned to a company or institution intended for their sole use and only for distribution to employees or third parties who are authorized to install and distribute licenses pursuant to the terms of their license agreement)
comp., MSvolume license product keyvolumlisensproduktnøkkel (A product key that is provided to Microsoft customers who choose a Microsoft Volume Licensing program for their organizations and that allows multiple installations of a particular product. The key is assigned to a company or institution intended for their sole use and only for distribution to employees or third parties who are authorized to install and distribute licenses pursuant to the terms of their license agreement)

Get short URL