Subject | English | Korean |
comp., MS | access account | 액세스 계정 (An account used to crawl Web sites, servers and network resources included in a content index) |
comp., MS | Access app | Access 앱 (An app for SharePoint that is built by using Access and has its data stored in SQL Server or SQL Azure) |
comp., MS | Access app for SharePoint | SharePoint용 Access 앱 (An app for SharePoint that is built by using Access and has its data stored in SQL Server or SQL Azure) |
comp., MS | access bar | 액세스 도구 모음 (A toolbar that docks to the desktop, similar to the taskbar) |
comp., MS | access-based enumeration | 액세스 기반 열거 (A feature that displays only the files and folders that a user has permissions to access) |
comp., MS | access code | 액세스 코드 (A string of characters entered by a user to verify his or her identity to a network or to a local computer, device, or client, or to sign in to an account, app, and so on) |
comp., MS | Access Control | 액세스 제어 (A security mechanism that determines which operations a user, group, service, or computer is authorized to perform on a computer or on a particular object, such as a file, printer, registry subkey, or directory service object) |
IT | access control | 접근 통제 |
comp., MS | access control | 액세스 제어 (A security mechanism that determines which operations a user, group, service, or computer is authorized to perform on a computer or on a particular object, such as a file, printer, registry subkey, or directory service object) |
comp., MS | access control entry | 액세스 제어 항목 (An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object) |
comp., MS | Access Control Entry Management View | 액세스 제어 항목 관리 보기 (A feature that allows the user to set access levels for a group of contacts) |
IT | access control list | 접근 통제 목록ACL |
comp., MS | access control list | 액세스 제어 목록 (In Windows-based systems, a list of access control entries (ACE) that apply to an entire object, a set of the object's properties, or an individual property of an object, and that define the access granted to one or more security principals) |
comp., MS | Access Control Service | 액세스 제어 서비스 (The Windows Azure service that provides federated authentication and rules-driven, claims-based authorization for REST Web services) |
IT | access control table | 접근 통제 테이블 |
comp., MS | Access database engine | Access 데이터베이스 엔진 (Part of the Access database system that retrieves and stores data in user and system databases. The engine can be thought of as a data manager on which database systems are built) |
comp., MS | access-denied assistance | 액세스 거부 지원 (" Assistance provided to users who receive an "access denied" error while attempting to access a file or folder on a file server for which access-denied assistance has been enabled by the administrator of the server.") |
comp., MS | Access Edge Server | 액세스 에지 서버 (A service that runs on Lync Server that resides in the perimeter network and routes instant messaging (IM) and presence information from external users to internal users) |
comp., MS | Access Edge service | 액세스 에지 서비스 (A service that runs on Lync Server that resides in the perimeter network and routes instant messaging (IM) and presence information from external users to internal users) |
comp., MS | access key | 선택키 (Any combination of keys that must be pressed sequentially) |
comp., MS | access level | 액세스 수준 (A security role setting that determines for a given object type at which levels within the organization hierarchy a user can act on that object type) |
comp., MS | Access Levels Management | 액세스 수준 관리 (A UI element that displays a user's contacts and access level entries (ACEs) organized by access level) |
comp., MS | access mask | 액세스 마스크 (In Windows-based computers, a 32-bit value (a bitmask) that specifies the permissions that are assigned in an access control entry (ACE). An access mask is also part of the access request when an object is opened. The access mask in the request is compared to the access mask in each ACE to determine whether or not to grant the request) |
comp., MS | access mechanism | 액세스 메서드 (In programming, the means by which an application can read from or write to a resource) |
comp., MS | access mechanism | 액세스 방법 (In programming, the means by which an application can read from or write to a resource) |
IT | access method | 접근 방법 |
comp., MS | access method | 액세스 방법 (In programming, the means by which an application can read from or write to a resource) |
IT | access path | 접근 경로 |
comp., MS | access permissions | 액세스 권한 (Authorization to perform operations associated with a specific shared resource, such as a file, directory, or printer. Permissions must be granted by the system administrator to individual user accounts or administrative groups) |
comp., MS | access point | 액세스 지점 (A device used to connect wireless computers and other wireless devices to a wired network) |
comp., MS | access policy | 액세스 정책 (A policy which defines the permissions and duration of access to an asset) |
comp., MS | access privileges | 액세스 권한 (The type of operations permitted for a given user of a certain system resource on a network or a file server) |
comp., MS | access provider | 액세스 공급자 (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers) |
IT | access rights | 접근 권한 |
IT | access server | 접근 서버 |
comp., MS | Access Services Administration | Access Services 관리 (A feature that allows administration of Access services through an administration interface and powershell scripts) |
comp., MS | access speed | 액세스 속도 (The time needed for a read/write head in a disk drive to locate a track on a disk. Access time is usually measured in milliseconds and is used as a performance measure for hard disks and CD-ROM drives) |
comp., MS | access time | 액세스 시간 (The time needed for a read/write head in a disk drive to locate a track on a disk. Access time is usually measured in milliseconds and is used as a performance measure for hard disks and CD-ROM drives) |
comp., MS | access token | 액세스 토큰 (A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority) |
comp., MS | access violation | 액세스 위반 (An attempt to run a memory operation that the underlying page protection does not allow. An access violation applies to memory operations, but does not apply when the security manager checks user-mode access rights to objects) |
comp., MS | alternate access mapping | 대체 액세스 매핑 (An alternate URL mapping that Windows SharePoint Services preserves in the mapping table. It is the URL a user would see, but is not a URL that IIS would give to WSS) |
comp., MS | Anonymous access | 익명 액세스 (An authentication mechanism that does not require user accounts and passwords) |
comp., MS | anonymous user access | 익명 사용자 액세스 (The ability to gain access to a Web server on which one does not have an account) |
comp., MS | Anywhere Access | 원격 액세스 (A collection of product and platform remote access technologies that enable users anywhere on the Internet to access information located behind the corporate firewall) |
comp., MS | authenticated access | 인증된 액세스 (A user access option that you specify at the default Web site level or Application level in IIS. Authenticated access requires a user to have a valid account and password to access the site) |
comp., MS | authority information access | 권한 정보 액세스 (A certificate extension that contains information useful for verifying the trust status of a certificate, as defined by the 2008 Memo of the Network Working Group. This information potentially includes Uniform Resource Locations (URLs) where the issuing CA's certificate can be retrieved, as well as a location of an Online Certificate Status Protocol (OCSP) responder configured to provide status for the certificate in question) |
comp., MS | central access policæ | 중앙 액세스 정책 (An access policy that allows organizations to centrally deploy and manage authorization policies that include conditional expressions using user groups, user claims, device claims, and resource properties) |
comp., MS | Change Level of Access | 액세스 수준 변경 (Contact context menu item that allows the user to assign an access level to the selected contact(s)) |
comp., MS | client access | 클라이언트 액세스 (The ability of client computers to connect to a server or resource, for example, a file on a server or a cluster resource) |
comp., MS | client access point | 클라이언트 액세스 지점 (In SMS 2003 and earlier releases, an SMS site system that provides a communication point between the SMS site server and Legacy Client computers. Legacy Clients deliver their collected files, inventory information, discovery data records, software metering data, and status information to CAPs) |
comp., MS | Client Access server | 클라이언트 액세스 서버 (A set of components and services that enable users to access their Exchange mailboxes through the Outlook Web Access application) |
comp., MS | Client Access server redirection | 클라이언트 액세스 서버 리디렉션 (A process by which Outlook Web Access users who access an Internet-facing Client Access server that is in a different Active Directory site than the site that contains their mailbox can be redirected to the Client Access server that is in the same site as their Mailbox server if that Client Access server is Internet-facing) |
comp., MS | Client Access server role | 클라이언트 액세스 서버 역할 (A set of components and services that enable users to access their Exchange mailboxes through the application Outlook Web Access and the protocols Exchange ActiveSync, Post Office Protocol version 3 (POP3), and Internet Message Access Protocol 4rev1 (IMAP4). The Client Access server role also includes Web services that are used by other Exchange 2007 server roles) |
comp., MS | code access security | 코드 액세스 보안 (A mechanism provided by the common language runtime whereby managed code is granted permissions by security policy and these permissions are enforced, helping to limit the operations that the code will be allowed to perform) |
IT | concurrent access | 동시 접근 |
comp., MS | content access account | 콘텐츠 액세스 계정 (An account used to crawl Web sites, servers and network resources included in a content index) |
comp., MS | custodian access | 보유자 액세스 (The highest level of access) |
comp., MS | custom driver access | 사용자 지정 드라이버 액세스 (Device IO Control to 3rd party driver, a form of restricted device interface access for privileged apps) |
comp., MS | data access page | 데이터 액세스 페이지 (A Web page, published from Access, that has a connection to a database. In a data access page, you can view, add to, edit, and manipulate the data stored in the database) |
comp., MS | Data Access Server | 데이터 액세스 서버 (A component that receives events from the MOM Servers and inserts them into the database. Requests for data from the database and requests to insert data into the database typically go through the DAS) |
comp., MS | Device Access API | 장치 액세스 API (A set of COM interfaces that a device companion app can use to send requests, to a specialized device, synchronously or asynchronously) |
IT | dial-in access control | 다이얼-인 접근 통제 |
comp., MS | Digest Access protocol | Digest Access 프로토콜 (A lightweight authentication protocol for parties involved in communications that are based on Hypertext Transfer Protocol (HTTP) or Simple Authentication and Security Layer (SASL)) |
comp., MS | direct access | 직접 액세스 (The ability of a computer to find and go directly to a particular storage location without having to search sequentially from the beginning location. The human equivalent of random access would be the ability to find a desired address in an address book without having to proceed sequentially through all the addresses. A computer's semiconductor memory (both RAM and ROM) provides random access. Certain types of files stored on disk under some operating systems also allow random access. Such files are best used for data in which each record has no intrinsic relationship to what comes physically before or after it, as in a client list or an inventory) |
IT | discretionary access control | 임의적 접근 통제DAC |
comp., MS | disk access time | 디스크 액세스 시간 (The time needed for a read/write head in a disk drive to locate a track on a disk. Access time is usually measured in milliseconds and is used as a performance measure for hard disks and CD-ROM drives) |
comp., MS | dynamic access control | 동적 액세스 제어 (The ability for IT pros to define how users access a system based on dynamic qualities, such as a user's location or role) |
comp., MS | Ease of Access Center | 접근성 센터 (An area within the Control Panel that provides accessibility options and settings to help users interact more easily with the computer) |
comp., MS | emergency access code | 응급 액세스 코드 (An emergency access code is a set of letters and numbers that can be included on your emergency profile wallet card or sheet) |
comp., MS | Exchange Fast Access | Exchange 빠른 액세스 (A feature that enables Exchange users to see new email messages and up-to-date calendar items as soon as they open Outlook, without waiting for it to finish synchronizing) |
comp., MS | external access | 외부 액세스 (Authenticated access that can be granted to external partners and clients to enable sharing of selected SharePoint Online content) |
comp., MS | field access profile | 필드 액세스 프로필 (The set of field-level access permissions that have been granted to a user or users) |
comp., MS | field-level access | 필드 수준 액세스 권한 (The permission that is assigned to a user or users that allow them to read, update, or create a specific field) |
comp., MS | filtered access token | 필터링된 액세스 토큰 (An access token with the least administrative privileges required for the session. It is a restricted access token where all elevated privileges have been filtered out. A filtered access token is created by default for all interactive users that are not standard users, except the built-in administrator) |
comp., MS | full access | 모든 권한 (A privilege on a computer system that allows a user to read, write, and delete data) |
comp., MS | full access token | 모든 권한 액세스 토큰 (An access token with the maximum privileges authorized for the account. Used by User Account Control (UAC)) |
comp., MS | guest access | 게스트 액세스 (A type of access that allows visitors to use their own desktop computers on limited resources (such as the Internet or LAN printers) without compromising a company's internal network security) |
IT | identity access management | ID 액세스 관리IAM |
comp., MS | in-band access | 대역 내 액세스 (Access to host via a connection that does use the IP Network) |
IT | Indexed Sequential Access Method | 인덱스된 순차적 접근 방법 (ISAM) |
comp., MS | international access code | 국가별 액세스 코드 (The prefix that is used to direct a call internationally. The International Access Code is 011 in the United States and 00 in much of the rest of the world) |
comp., MS | Internet access | 인터넷 액세스 (The capability of a user to connect to the Internet) |
comp., MS | Internet access provider | 인터넷 액세스 공급자 (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers) |
comp., MS | Keyboard Access System | 키보드 액세스 시스템 (A set of accelerator keys with associated icons) |
comp., MS | lamp access door | 램프 액세스 도어 (The metal door in the I/O connections area that you must remove to access the lamp assembly) |
comp., MS | Least Recently Accessed Files | 오래 전에 액세스한 파일 (A storage report that lists files that have been accessed least recently. Use this report to identify rarely used data) |
comp., MS | limited access | 제한된 액세스 (Access to fewer features than the computer normally has. This reduced access will last for a short amount of time before the computer becomes inoperable) |
IT | logical access | 논리적 접근 |
IT | logical access controls | 논리적 접근 통제 |
comp., MS | low integrity access token | 낮은 무결성 액세스 토큰 (A filtered access token that is created with a low integrity level. This access token is used by Internet Explorer Protected Mode, but can also be used by other applications) |
IT | mandatory access control | 강제적 접근 통제MAC |
IT | media access control | 매체접근제어 (MAC) |
comp., MS | media access control | 미디어 액세스 제어 (A sublayer of the IEEE 802 specifications that defines network access methods and framing) |
IT | media access control MAC address | MAC주소 |
comp., MS | Microsoft Access data file | Microsoft Access 데이터 파일 (A database or project file for Microsoft Access) |
comp., MS | Microsoft Access project | Microsoft Access 프로젝트 (An Access file that connects to a Microsoft SQL Server database and is used to create client/server applications. A project file doesn't contain any data or data-definition-based objects such as tables and views) |
comp., MS | Microsoft Dynamics CRM for Microsoft Office Outlook with Offline Access The laptop client version of the Microsoft Dynamics CRM product suite for Microsoft Office Outlook | Microsoft Office Outlook용 Microsoft Dynamics CRM (오프라인 액세스 가능) |
comp., MS | Most Recently Accessed Files | 최근에 액세스한 파일 (A storage report that lists files that have been accessed most recently. Use this report to identify frequently used data that needs to be highly available) |
comp., MS | multithreaded unsynchronized access | 다중 스레드 비동기 액세스 (The operation in which two or more threads attempt to call simultaneously into the heap) |
comp., MS | Network Access Protection | 네트워크 액세스 보호 (A set of operating system components that can help protect access to a private network by enforcing health policies. System administrators establish health policies which NAP enforces by inspecting and assessing the health of client computers, restricting network access when client computers are deemed noncompliant, and remediating noncompliant client computers for full network access. NAP also provides ongoing health compliance enforcement while a client computer is connected to a network) |
comp., MS | network access server | 네트워크 액세스 서버 (The device that accepts Point-to-Point Protocol (PPP) connections and places clients on the network that the NAS serves) |
comp., MS | on-access protection | 실시간 바이러스 보호 (Virus protection (e.g. antivirus software) that is active continuously, as opposed to on demand) |
comp., MS | Open Device Access Model | 개방형 장치 액세스 모델 (The access model for horizontal solutions, which enables a horizontal strategy. Open Device Access enables many different Windows Store apps to access a specialized device. Examples: a smartphone with multiple apps that synchronize contacts; a pedometer that allows multiple apps to read its data and post it to a website) |
comp., MS | Outlook Web Access Web Part | Outlook Web Access 웹 파트 (A piece of the user interface (UI) in Outlook Web Access that can be hosted in iframes as part of other Web applications such as SharePoint Portal Server portals. Outlook Web Access exposes a set of Outlook Web Access Web Part URLs that allow other applications to request certain portions of the Outlook Web Access UI. For example, another application can load the Outlook Web Access Web Part URL for the Inbox, Calendar, or Contact folder into an iframe hosted in that application) |
comp., MS | out-of-band access | 대역 외 액세스 (Access to host via a connection that doesn't use the IP network) |
comp., MS | outside line access code | 외부 회선 액세스 코드 (The prefix that is used to access an outside line. In the United States, this prefix is typically 9) |
comp., MS | process access token | 프로세스 액세스 토큰 (A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority) |
comp., MS | publication access list | 게시 액세스 목록 (The primary mechanism for securing the Publisher. It contains a list of logins, accounts, and groups that are granted access to the publication) |
comp., MS | Quick Access Toolbar | 빠른 실행 도구 모음 (A customizable toolbar that provides one-click access to commands) |
comp., MS | RAD Web Access Configuration | RAD 웹 액세스 구성 (An option on the Remote Desktop Services menu on the Administrative Tools menu that opens the RAD Web Access Web site for administrative purposes) |
IT | random access memory | 임의 접근 메모리 (RAM) |
comp., MS | read access | 읽기 권한 (A privilege on a computer system that allows a user to read stored data) |
comp., MS | redirected access | 리디렉션 액세스 (Functionality that redirects all I/O operations over the network to another node that has access to the required drive) |
comp., MS | remote access | 원격 액세스 (Part of the integrated Routing and Remote Access service that provides remote networking for telecommuters, mobile workers, and system administrators who monitor and manage servers at multiple branch offices. Users can use Network Connections to dial in to remotely access their networks for services such as file and printer sharing, electronic mail, scheduling, and SQL database access) |
IT | remote access service | 원격 접근 서비스 (RAS) |
comp., MS | Remote Desktop Services client access license | 원격 데스크톱 서비스 클라이언트 액세스 라이선스 (A license that is required for a user or a device to connect to a remote desktop server) |
comp., MS | Remote Desktop Services Per Device client access license | 원격 데스크톱 서비스 장치 단위 클라이언트 액세스 라이선스 (One of the two types of Remote Desktop Services client access licenses (RDS CALs) that permits one device (used by any user) to connect to a remote desktop server) |
comp., MS | Remote Desktop Services Per User client access license | 원격 데스크톱 서비스 사용자 단위 클라이언트 액세스 라이선스 (One of the two types of Remote Desktop Services client access licenses (RDS CALs) that permits one user to access remote desktop servers from an unlimited number of client computers or devices) |
comp., MS | Remote Desktop Web Access Configuration | 원격 데스크톱 웹 액세스 구성 (In Remote Desktop Services, the site where you can configure the RD Web Access Web Part) |
comp., MS | Remote Direct Memory Access | 원격 직접 메모리 액세스 (A networking feature that lets one computer directly place information into the memory of another computer) |
comp., MS | RemoteApp and Desktop Web Access Configuration | RemoteApp 및 데스크톱 웹 액세스 구성 (An option on the Remote Desktop Services menu on the Administrative Tools menu that opens the RAD Web Access Web site for administrative purposes) |
comp., MS | restricted access token | 제한된 액세스 수준 (An access token with restricted access to securable objects or performing privileged tasks) |
comp., MS | Restricted Device Access Model | 제한된 장치 액세스 모델 (The device access model for vertical solutions. Restricted Device Access does not allow other applications to access a specialized device) |
comp., MS | role-based access control role | 역할 기반 액세스 제어 역할 (The user role that is assigned to a user account, which determines the options that are visible to that user and the tasks that the user can perform in the management interface for Exchange Labs) |
comp., MS | scatter/gather direct memory access | 분산/수집 직접 메모리 액세스 (A form of direct memory access (DMA) in which data is transferred to and from noncontiguous ranges of physical memory) |
comp., MS | service access point | 서비스 액세스 지점 (A logical address that allows a system to route data between a remote device and the appropriate communications support) |
comp., MS | Shared Access Signature | 공유 액세스 서명 (A URL that grants access rights to containers, blobs, queues, and tables) |
IT | Simple Object Access Protocol | 단순 객체 접근 프로토콜 (SOAP) |
comp., MS | Specialized Device Access Model | 특수 장치 액세스 모델 (The model that describes the two ways that a Windows Store app can access a specialized device: Open Access Model and Restricted Device Access Model) |
comp., MS | split access token | 분리된 액세스 토큰 (A combination of full access token and filtered access token linked together by the local security authority (LSA) component of the operating system) |
comp., MS | storage access key | 저장소 액세스 키 (A value that is unique to a storage account and that can be used to connect to the storage account from code running in a Windows Azure cloud service, locally on a developer's machine, or anywhere else that has Internet connectivity) |
comp., MS | subscriber access number | 구독자 액세스 번호 (A number that is configured in a Private Branch eXchange (PBX) that allows a subscriber to access their Microsoft Exchange mailbox over the telephone) |
comp., MS | system access control list | 시스템 액세스 제어 목록 (An ACL that controls the generation of audit messages for attempts to access a securable object. The ability to get or set an object's SACL is controlled by a privilege typically held only by system administrators) |
comp., MS | System Center Data Access service | System Center Data Access 서비스 (A Windows service that runs on the management servers in each management group, and that allows client applications to access Operations Manager data and functionality) |
comp., MS | UAC access token | UAC 액세스 토큰 (An access token with the least administrative privileges required for the session. It is a restricted access token where all elevated privileges have been filtered out. A filtered access token is created by default for all interactive users that are not standard users, except the built-in administrator) |
comp., MS | UM access telephone number | UM 액세스 전화 번호 (A telephone number that points to a hunt group and is the access number for calls that are routed to Unified Messaging servers) |
comp., MS | User Access Logging | 사용자 액세스 로깅 (A logging feature that gathers unique client records and events for later retrieval by an administrator using WMI or PowerShell) |
comp., MS | Visio Web Access Web Part | Visio Web Access 웹 파트 (A Web Part that enables users to view (in full fidelity) and share Visio files in SharePoint Server without having the Visio client installed) |
IT | Wi-Fi Protected Access | Wi-Fi 보호 액세스 (WPA) |
IT | Wi-Fi protected access | II 보호된 Wi-Fi 접근 II (WPA2) |
comp., MS | Wi-Fi Protected Access | Wi-Fi 보호 액세스 (A security method used by wireless networks. WPA encrypts the information that is sent between computers on a wireless network and authenticates users to help ensure that only authorized people can access the network) |
comp., MS | Wi-Fi Protected Access 2 | Wi-Fi 보호 액세스 2 (A wireless implementation and the second generation of WPA security that is based on the final IEEE 802.11i amendment to the 802.11 standard) |
comp., MS | Windows Azure AD Access Control | Windows Azure AD 액세스 제어 (The Windows Azure service that provides federated authentication and rules-driven, claims-based authorization for REST Web services) |
comp., MS | Windows PowerShell Web Access | Windows PowerShell 웹 액세스 (A feature that lets a server act as a web gateway through which an organization's users can manage remote computers by running Windows PowerShell sessions in a web browser) |
comp., MS | write access | 쓰기 권한 (A privilege on a computer system that allows a user to save, change, or delete stored data. Write access is usually set by the system administrator for a networked or server system and by the owner of the computer for a stand-alone machine) |
comp., MS | 802.1X-capable wireless access point | 802.1X 호환 무선 액세스 지점 (A network access server that adheres to both the Institute of Electrical and Electronics Engineers (IEEE) 802.1X and the Remote Authentication Dial-in User Service (RADIUS) standards, and that is deployed in networks to enforce 802.1X authenticated IEEE 802.3 wired Ethernet access) |