Subject | English | Turkish |
comp., MS | access account | erişim hesabı (An account used to crawl Web sites, servers and network resources included in a content index) |
comp., MS | Access app | Access uygulaması (An app for SharePoint that is built by using Access and has its data stored in SQL Server or SQL Azure) |
comp., MS | Access app for SharePoint | SharePoint için Access uygulaması (An app for SharePoint that is built by using Access and has its data stored in SQL Server or SQL Azure) |
comp., MS | access-based enumeration | erişim tabanlı listeleme (A feature that displays only the files and folders that a user has permissions to access) |
comp., MS | access code | erişim kodu (A string of characters entered by a user to verify his or her identity to a network or to a local computer, device, or client, or to sign in to an account, app, and so on) |
comp., MS | Access Connectivity Engine | Access Bağlantı Altyapısı (Part of the Access database system that retrieves and stores data in user and system databases. The engine can be thought of as a data manager on which database systems are built) |
comp., MS | access control | erişim denetimi (A security mechanism that determines which operations a user, group, service, or computer is authorized to perform on a computer or on a particular object, such as a file, printer, registry subkey, or directory service object) |
comp., MS | access control entry | erişim denetim girdisi (An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object) |
comp., MS | Access Control Entry Management View | Erişim Denetim Girdisi Yönetim Görünümü (A feature that allows the user to set access levels for a group of contacts) |
comp., MS | access control list | erişim denetim listesi (In Windows-based systems, a list of access control entries (ACE) that apply to an entire object, a set of the object's properties, or an individual property of an object, and that define the access granted to one or more security principals) |
comp., MS | Access Control Server | Erişim Denetimi Sunucusu (A component of Cisco Identity Based Networking Services (IBNS) architecture that improves network access security for Cisco network devices) |
comp., MS | Access database engine | Access veritabanı altyapısı (Part of the Access database system that retrieves and stores data in user and system databases. The engine can be thought of as a data manager on which database systems are built) |
comp., MS | access-denied assistance | erişim reddi yardımı (" Assistance provided to users who receive an "access denied" error while attempting to access a file or folder on a file server for which access-denied assistance has been enabled by the administrator of the server.") |
comp., MS | Access Edge service | Erişim Uç hizmeti (A service that runs on Lync Server that resides in the perimeter network and routes instant messaging (IM) and presence information from external users to internal users) |
comp., MS | access key | erişim tuşu (Any combination of keys that must be pressed sequentially) |
comp., MS | access level | erişim düzeyi (A security role setting that determines for a given object type at which levels within the organization hierarchy a user can act on that object type) |
comp., MS | Access Levels Management | Erişim Düzeyleri Yönetimi (A UI element that displays a user's contacts and access level entries (ACEs) organized by access level) |
comp., MS | access mask | erişim maskesi (In Windows-based computers, a 32-bit value (a bitmask) that specifies the permissions that are assigned in an access control entry (ACE). An access mask is also part of the access request when an object is opened. The access mask in the request is compared to the access mask in each ACE to determine whether or not to grant the request) |
comp., MS | access method | erişim yöntemi (In programming, the means by which an application can read from or write to a resource) |
comp., MS | access permissions | erişim izinleri (Authorization to perform operations associated with a specific shared resource, such as a file, directory, or printer. Permissions must be granted by the system administrator to individual user accounts or administrative groups) |
comp., MS | access point | erişim noktası (A device used to connect wireless computers and other wireless devices to a wired network) |
comp., MS | Access Point Name | Erişim Noktası Adı (A field in the Properties dialog box for GPRS installation items in the Mobile Deployment Manager MMC snap-in that enables the user to specify the wireless access point for the device) |
comp., MS | access point name | erişim noktası adı (The name of the access point used to establish wireless connectivity) |
comp., MS | access privileges | erişim ayrıcalıkları (The type of operations permitted for a given user of a certain system resource on a network or a file server) |
comp., MS | access provider | erişim sağlayıcı (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers) |
environ. | access road Any street or narrow stretch of paved surface that leads to a specific destination, such as a main highway | erişim yolu |
comp., MS | Access Services | Access Hizmetleri (A scalable Web platform that enables users to publish an Access database application to a SharePoint site. Data in these databases can then be viewed and edited in a Web browser. This enables browser-based viewing and interaction with the databases on machines that do not have a database application installed) |
comp., MS | Access Services Administration | Access Hizmetleri Yönetimi (A feature that allows administration of Access services through an administration interface and powershell scripts) |
environ. | access to administrative documents The legal right of access to administrative documents or the opportunity to avail oneself of the same | idari evraklara erişim |
environ. | access to culture The ability, right and permission to approach and use, or the general availability of resources that transmit the beliefs, customs, artistic activity and knowledge of a people | kültüre erişim |
environ. | access to information The ability, right and permission to approach and use, or the general availability of resources that convey knowledge | bilgiye erişim |
environ. | access to the courts The right of citizens to access to the organs of the governments where justice is administered | mahkemelere erişim |
environ. | access to the sea | denize erişim |
comp., MS | access token | erişim belirteci (A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority) |
comp., MS | access URL | erişim URL'si (The internal URL that is used by a crawler to identify and access an item) |
comp., MS | access violation | erişim ihlali (An attempt to run a memory operation that the underlying page protection does not allow. An access violation applies to memory operations, but does not apply when the security manager checks user-mode access rights to objects) |
comp., MS | Access Web Services API | Access Web Hizmetleri API'si (An API that provides programmatic access to the capabilities on SharePoint) |
comp., MS | alternate access mapping | alternatif erişim eşlemesi (An alternate URL mapping that Windows SharePoint Services preserves in the mapping table. It is the URL a user would see, but is not a URL that IIS would give to WSS) |
comp., MS | Anonymous access | Anonim erişim (An authentication mechanism that does not require user accounts and passwords) |
comp., MS | anonymous user access | anonim kullanıcı erişimi (The ability to gain access to a Web server on which one does not have an account) |
comp., MS | Anywhere Access | Her Yerden Erişim (A collection of product and platform remote access technologies that enable users anywhere on the Internet to access information located behind the corporate firewall) |
comp., MS | authenticated access | kimliği doğrulanmış erişim (A user access option that you specify at the default Web site level or Application level in IIS. Authenticated access requires a user to have a valid account and password to access the site) |
comp., MS | authority information access | yetkili bilgileri erişimi (A certificate extension that contains information useful for verifying the trust status of a certificate, as defined by the 2008 Memo of the Network Working Group. This information potentially includes Uniform Resource Locations (URLs) where the issuing CA's certificate can be retrieved, as well as a location of an Online Certificate Status Protocol (OCSP) responder configured to provide status for the certificate in question) |
comp., MS | central access policæ | merkezi erişim ilkesi (An access policy that allows organizations to centrally deploy and manage authorization policies that include conditional expressions using user groups, user claims, device claims, and resource properties) |
comp., MS | Change Level of Access | Erişim Düzeyini Değiştir (Contact context menu item that allows the user to assign an access level to the selected contact(s)) |
comp., MS | client access license | kullanıcı bazlı CAL (A license that specifies the number of computers that can connect to and use software located on a server) |
comp., MS | Client Access server | İstemci Erişimi sunucusu (A set of components and services that enable users to access their Exchange mailboxes through the Outlook Web Access application) |
comp., MS | Client Access server role | İstemci Erişimi sunucu rolü (A set of components and services that enable users to access their Exchange mailboxes through the application Outlook Web Access and the protocols Exchange ActiveSync, Post Office Protocol version 3 (POP3), and Internet Message Access Protocol 4rev1 (IMAP4). The Client Access server role also includes Web services that are used by other Exchange 2007 server roles) |
comp., MS | code access security | kod erişimi güvenliği (A mechanism provided by the common language runtime whereby managed code is granted permissions by security policy and these permissions are enforced, helping to limit the operations that the code will be allowed to perform) |
comp., MS | code access security CAS policy | kod erişimi güvenliği CAS ilkesi (A set of rules that defines security permissions for a collection of assemblies by associating attributes of those assemblies, such as location and signature, with a set of code access security permissions) |
comp., MS | content access account | içerik erişim hesabı (An account used to crawl Web sites, servers and network resources included in a content index) |
comp., MS | custodian access | koruyucu erişimi (The highest level of access) |
comp., MS | custom driver access | özel sürücü erişimi (Device IO Control to 3rd party driver, a form of restricted device interface access for privileged apps) |
comp., MS | data access page | veri erişim sayfası (A Web page, published from Access, that has a connection to a database. In a data access page, you can view, add to, edit, and manipulate the data stored in the database) |
comp., MS | Debug Interface Access SDK | Hata Ayıklama Arabirimi Erişim SDK'sı (An SDK that provides access to debug information stored in program database (.pdb) files generated by Microsoft post-compiler tools) |
comp., MS | Device Access API | Cihaz Erişim API'si (A set of COM interfaces that a device companion app can use to send requests, to a specialized device, synchronously or asynchronously) |
comp., MS | Digest Access protocol | Özet Erişim protokolü (A lightweight authentication protocol for parties involved in communications that are based on Hypertext Transfer Protocol (HTTP) or Simple Authentication and Security Layer (SASL)) |
comp., MS | direct access | doğrudan erişim (A way of accessing properties and methods supplied by WMI in a script as if they were automation properties and methods of an object instance) |
comp., MS | direct memory access | doğrudan bellek erişimi (A technology that allows certain devices, such as hard disks and CD or DVD drives, to transfer information directly through the computer's memory without using the computer's processor. DMA improves the performance of the device and frees the computer's processor so it can perform other tasks) |
comp., MS | discretionary access control list | kısıtlı erişim denetim listesi (An access control list that is controlled by the owner of an object and that specifies the access particular users or groups can have to the object) |
comp., MS | disk access time | disk erişim zamanı (The time needed for a read/write head in a disk drive to locate a track on a disk. Access time is usually measured in milliseconds and is used as a performance measure for hard disks and CD-ROM drives) |
comp., MS | dynamic access control | dinamik erişim denetimi (The ability for IT pros to define how users access a system based on dynamic qualities, such as a user's location or role) |
comp., MS | dynamic random access memory | dinamik rasgele erişim belleği (A form of semiconductor random access memory (RAM)) |
comp., MS | Ease of Access Center | Erişim Kolaylığı Merkezi (An area within the Control Panel that provides accessibility options and settings to help users interact more easily with the computer) |
comp., MS | emergency access code | acil durum erişim kodu (An emergency access code is a set of letters and numbers that can be included on your emergency profile wallet card or sheet) |
comp., MS | Exchange Fast Access | Exchange Hızlı Erişim (A feature that enables Exchange users to see new email messages and up-to-date calendar items as soon as they open Outlook, without waiting for it to finish synchronizing) |
comp., MS | external access | dış erişim (Authenticated access that can be granted to external partners and clients to enable sharing of selected SharePoint Online content) |
comp., MS | field access profile | alan erişim profili (The set of field-level access permissions that have been granted to a user or users) |
comp., MS | field-level access | alan düzeyinde erişim (The permission that is assigned to a user or users that allow them to read, update, or create a specific field) |
comp., MS | filtered access token | filtrelenmiş erişim belirteci (An access token with the least administrative privileges required for the session. It is a restricted access token where all elevated privileges have been filtered out. A filtered access token is created by default for all interactive users that are not standard users, except the built-in administrator) |
comp., MS | full access | tam erişim (A privilege on a computer system that allows a user to read, write, and delete data) |
comp., MS | full access token | tam erişim belirteci (An access token with the maximum privileges authorized for the account. Used by User Account Control (UAC)) |
comp., MS | full privilege access token | tam ayrıcalıklı erişim belirteci (An access token with the maximum privileges authorized for the account. Used by User Account Control (UAC)) |
comp., MS | High-Performance Media Access Technology | Yüksek Performanslı Ortam Erişim Teknolojisi (A recording format that can store audio, video, and pictures on a CD or DVD. HighMat discs play on any Windows computer and on some DVD players) |
comp., MS | in-band access | bant içi erişim (Access to host via a connection that does use the IP Network) |
austrian | indefinite leave to remain with restricted access to labour market | Yerleşme izni - sınırlı |
comp., MS | indexed sequential access method | ISAM (A technique for indexing database records that allows sequential or random access of records. When records are accessed sequentially they are accessed in the order in which they were entered in the database, and when records are accessed randomly, the records are accessed through an index) |
comp., MS | Information Access Service | Bilgi Erişim Hizmeti (A part of an IrDA infrared communication protocol used so that devices can learn about the services offered by another device) |
comp., MS | international access code | uluslararası erişim kodu (The prefix that is used to direct a call internationally. The International Access Code is 011 in the United States and 00 in much of the rest of the world) |
comp., MS | Internet access | İnternet erişimi (The capability of a user to connect to the Internet) |
comp., MS | Internet access provider | İnternet erişim sağlayıcı (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers) |
comp., MS | Internet Message Access Protocol 4 | Internet İleti Erişim Protokolü 4 (A standard client/server protocol for receiving e-mail. The user (or the user's e-mail client) can view just the heading and the sender of the letter and then decide whether to download the mail) |
comp., MS | Internet Message Access Protocol | İnternet İleti Erişim Protokolü (A method computers use to send and receive e-mail messages. It allows you to access e-mail without downloading it to your computer) |
comp., MS | Keyboard Access System | Klavye Erişim Sistemi (A set of accelerator keys with associated icons) |
environ. | land access The permission or freedom to use, enter, approach or pass to and from a tract of land, which often consists of real estate property | araziye erişim |
comp., MS | Lightweight Directory Access Protocol | Basit Dizin Erişimi Protokolü (The primary access protocol for Active Directory. LDAP is an industry-standard protocol, established by the Internet Engineering Task Force (IETF), that allows users to query and update information in a directory service. Active Directory supports both LDAP version 2 and LDAP version 3) |
comp., MS | limited access | sınırlı erişim (Access to fewer features than the computer normally has. This reduced access will last for a short amount of time before the computer becomes inoperable) |
comp., MS | low integrity access token | bütünlük düzeyi düşük erişim belirteci (A filtered access token that is created with a low integrity level. This access token is used by Internet Explorer Protected Mode, but can also be used by other applications) |
comp., MS | media access control | ortam erişim denetimi (A sublayer of the IEEE 802 specifications that defines network access methods and framing) |
comp., MS | Microsoft Access data file | Microsoft Access veri dosyası (A database or project file for Microsoft Access) |
comp., MS | Microsoft Access project | Microsoft Access projesi (An Access file that connects to a Microsoft SQL Server database and is used to create client/server applications. A project file doesn't contain any data or data-definition-based objects such as tables and views) |
comp., MS | Microsoft Dynamics CRM for Microsoft Office Outlook with Offline Access | Microsoft Office Outlook için Çevrimdışı Erişimli Microsoft Dynamics CRM (The laptop client version of the Microsoft Dynamics CRM product suite for Microsoft Office Outlook) |
comp., MS | Mobile Access for Windows SharePoint Services | Windows SharePoint Services İçin Mobil Erişim (A feature that enables mobile devices, such as cellular phones, to access some SharePoint services) |
comp., MS | Network Access Protection | Ağ Erişim Koruması (A set of operating system components that can help protect access to a private network by enforcing health policies. System administrators establish health policies which NAP enforces by inspecting and assessing the health of client computers, restricting network access when client computers are deemed noncompliant, and remediating noncompliant client computers for full network access. NAP also provides ongoing health compliance enforcement while a client computer is connected to a network) |
comp., MS | network access server | ağ erişim sunucusu (The device that accepts Point-to-Point Protocol (PPP) connections and places clients on the network that the NAS serves) |
comp. | non volatile random access memory | geçici olmayan rasgele erişimli bellek (Natalya Rovina) |
comp., MS | non-uniform memory access | tekdüzen olmayan bellek erişimi (Access by a CPU of local as well as foreign memory. This process, which is enabled by NUMA architecture, results in different access speeds) |
comp., MS | on-access protection | erişim temelli koruma (Virus protection (e.g. antivirus software) that is active continuously, as opposed to on demand) |
comp., MS | Open Device Access Model | Açık Cihaz Erişim Modeli (The access model for horizontal solutions, which enables a horizontal strategy. Open Device Access enables many different Windows Store apps to access a specialized device. Examples: a smartphone with multiple apps that synchronize contacts; a pedometer that allows multiple apps to read its data and post it to a website) |
comp., MS | Outlook Web Access Web Part | Outlook Web Access Web Bölümü (A piece of the user interface (UI) in Outlook Web Access that can be hosted in iframes as part of other Web applications such as SharePoint Portal Server portals. Outlook Web Access exposes a set of Outlook Web Access Web Part URLs that allow other applications to request certain portions of the Outlook Web Access UI. For example, another application can load the Outlook Web Access Web Part URL for the Inbox, Calendar, or Contact folder into an iframe hosted in that application) |
comp., MS | out-of-band access | bant dışı erişim (Access to host via a connection that doesn't use the IP network) |
comp., MS | outside line access code | dış hat erişim kodu (The prefix that is used to access an outside line. In the United States, this prefix is typically 9) |
comp., MS | Principles for the data access and the testability of digital documents | Veri erişimi ve dijital belgelerin test edilebilirliği prensipleri (A German law that requires tax authorities to be capable of digitally checking data from electronic bookkeeping systems) |
comp., MS | process access token | işlem erişim belirteci (A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority) |
environ. | public access to land The right or permission for all persons of a community to use government owned geographic areas such as parks, campgrounds and historical sites | kamu arazilerine halkın erişimi |
NGO | public internet access points | İnternet Bilgi Merkezleri |
austrian | public internet access points | internet Bilgi Merkezleri |
comp., MS | publication access list | yayın erişim listesi (The primary mechanism for securing the Publisher. It contains a list of logins, accounts, and groups that are granted access to the publication) |
comp., MS | Quick Access Toolbar | Hızlı Erişim Araç Çubuğu (A customizable toolbar that provides one-click access to commands) |
comp., MS | RAD Web Access Configuration | RAD Web Erişimi Yapılandırması (An option on the Remote Desktop Services menu on the Administrative Tools menu that opens the RAD Web Access Web site for administrative purposes) |
comp., MS | random access memory | rasgele erişim belleği (The temporary storage area the computer uses to run programs and store data. Information stored in RAM is temporary and is designed to be erased when the computer is turned off) |
comp., MS | random access memory cache | rasgele erişim bellek önbelleği (Cache memory that is used by the system to store and retrieve data from the RAM. Frequently accessed segments of data may be stored in the cache for quicker access compared with secondary storage devices such as disks) |
comp., MS | read access | okuma yetkisi (A privilege on a computer system that allows a user to read stored data) |
comp., MS | redirected access | yeniden yönlendirilen erişim (Functionality that redirects all I/O operations over the network to another node that has access to the required drive) |
comp., MS | remote access | uzaktan erişim (Part of the integrated Routing and Remote Access service that provides remote networking for telecommuters, mobile workers, and system administrators who monitor and manage servers at multiple branch offices. Users can use Network Connections to dial in to remotely access their networks for services such as file and printer sharing, electronic mail, scheduling, and SQL database access) |
comp., MS | remote access Trojan | uzaktan erişim sağlayan Truva atı (A type of Trojan that provides remote access to a computer) |
comp., MS | remote data access | uzaktan veri erişimi (A service that provides a simple way for a smart device application to access (pull) and send (push) data to and from a remote SQL Server database table and a local SQL Server Mobile Edition database table. RDA can also be used to issue SQL commands on a server running SQL Server) |
comp., MS | Remote Desktop Services client access license | Uzak Masaüstü Hizmetleri istemci erişim lisansı (A license that is required for a user or a device to connect to a remote desktop server) |
comp., MS | Remote Desktop Services Per Device client access license | Uzak Masaüstü Hizmetleri Cihaz Başına istemci erişim lisansı (One of the two types of Remote Desktop Services client access licenses (RDS CALs) that permits one device (used by any user) to connect to a remote desktop server) |
comp., MS | Remote Desktop Services Per User client access license | Uzak Masaüstü Hizmetleri Kullanıcı Başına istemci erişim lisansı (One of the two types of Remote Desktop Services client access licenses (RDS CALs) that permits one user to access remote desktop servers from an unlimited number of client computers or devices) |
comp., MS | Remote Desktop Web Access Configuration | Uzak Masaüstü Web Erişimi Yapılandırması (In Remote Desktop Services, the site where you can configure the RD Web Access Web Part) |
comp., MS | Remote Direct Memory Access | Doğrudan Uzak Bellek Erişimi (A networking feature that lets one computer directly place information into the memory of another computer) |
comp., MS | RemoteApp and Desktop Web Access Configuration | RemoteApp ve Masaüstü Web Erişimi Yapılandırması (An option on the Remote Desktop Services menu on the Administrative Tools menu that opens the RAD Web Access Web site for administrative purposes) |
comp., MS | restricted access token | kısıtlanmış erişim belirteci (An access token with restricted access to securable objects or performing privileged tasks) |
comp., MS | Restricted Device Access Model | Kısıtlanmış Cihaz Erişim Modeli (The device access model for vertical solutions. Restricted Device Access does not allow other applications to access a specialized device) |
environ. | right of access | erişim hakkı |
comp., MS | role-based access control role | rol tabanlı erişim denetimi rolü (The user role that is assigned to a user account, which determines the options that are visible to that user and the tasks that the user can perform in the management interface for Exchange Labs) |
comp., MS | scatter/gather direct memory access | dağıtma/toplama doğrudan bellek erişimi (A form of direct memory access (DMA) in which data is transferred to and from noncontiguous ranges of physical memory) |
comp., MS | service access point | hizmet erişim noktası (A logical address that allows a system to route data between a remote device and the appropriate communications support) |
comp., MS | Simple Object Access Protocol | Basit Nesne Erişim Protokolü (A simple, XML-based protocol for exchanging structured data and type information on the World Wide Web. The protocol is currently the de facto standard for XML messaging) |
comp., MS | Specialized Device Access Model | Özel Cihaz Erişim Modeli (The model that describes the two ways that a Windows Store app can access a specialized device: Open Access Model and Restricted Device Access Model) |
comp., MS | split access token | bölünmüş erişim belirteci (A combination of full access token and filtered access token linked together by the local security authority (LSA) component of the operating system) |
comp., MS | subscriber access number | abone erişim numarası (A number that is configured in a Private Branch eXchange (PBX) that allows a subscriber to access their Microsoft Exchange mailbox over the telephone) |
comp., MS | system access control list | sistem erişim denetimi listesi (An ACL that controls the generation of audit messages for attempts to access a securable object. The ability to get or set an object's SACL is controlled by a privilege typically held only by system administrators) |
comp., MS | System Center Data Access service | System Center Veri Erişim hizmeti (A Windows service that runs on the management servers in each management group, and that allows client applications to access Operations Manager data and functionality) |
comp., MS | Test Access Port | Test Erişim Bağlantı Noktası (A collection of boundary scan control signals that define a serial protocol for scan-based devices. There are five pins, TCK/clock, TMS/mode select, TDI/data in, TDO/data out, and TRST/reset) |
comp., MS | UAC access token | UAC erişim belirteci (An access token with the least administrative privileges required for the session. It is a restricted access token where all elevated privileges have been filtered out. A filtered access token is created by default for all interactive users that are not standard users, except the built-in administrator) |
comp., MS | UM access telephone number | UM erişim telefon numarası (A telephone number that points to a hunt group and is the access number for calls that are routed to Unified Messaging servers) |
comp., MS | User Access Logging | Kullanıcı Erişim Günlüğü (A logging feature that gathers unique client records and events for later retrieval by an administrator using WMI or PowerShell) |
comp., MS | Wi-Fi Protected Access | Wi-Fi Korumalı Erişim (A security method used by wireless networks. WPA encrypts the information that is sent between computers on a wireless network and authenticates users to help ensure that only authorized people can access the network) |
comp., MS | Wi-Fi Protected Access 2 | Wi-Fi Korumalı Erişim 2 (A wireless implementation and the second generation of WPA security that is based on the final IEEE 802.11i amendment to the 802.11 standard) |
comp., MS | Windows PowerShell Web Access | Windows PowerShell Web Erişimi (A feature that lets a server act as a web gateway through which an organization's users can manage remote computers by running Windows PowerShell sessions in a web browser) |
comp., MS | write access | yazma erişimi (A privilege on a computer system that allows a user to save, change, or delete stored data. Write access is usually set by the system administrator for a networked or server system and by the owner of the computer for a stand-alone machine) |
comp., MS | 802.1X-capable wireless access point | 802.1X uyumlu kablosuz erişim noktası (A network access server that adheres to both the Institute of Electrical and Electronics Engineers (IEEE) 802.1X and the Remote Authentication Dial-in User Service (RADIUS) standards, and that is deployed in networks to enforce 802.1X authenticated IEEE 802.3 wired Ethernet access) |