Subject | English | Tatar |
comp., MS | access code | керү коды (A string of characters entered by a user to verify his or her identity to a network or to a local computer, device, or client, or to sign in to an account, app, and so on) |
comp., MS | access control list | керү белән идарә исемлеге (In Windows-based systems, a list of access control entries (ACE) that apply to an entire object, a set of the object's properties, or an individual property of an object, and that define the access granted to one or more security principals) |
comp., MS | access key | керү төймәсе (Any combination of keys that must be pressed sequentially) |
comp., MS | access permissions | керү хокукы (Authorization to perform operations associated with a specific shared resource, such as a file, directory, or printer. Permissions must be granted by the system administrator to individual user accounts or administrative groups) |
comp., MS | access point | керү ноктасы (A device used to connect wireless computers and other wireless devices to a wired network) |
comp., MS | access provider | хезмәт күрсәтүче (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers) |
comp., MS | access violation | керү хокукын бозу (An attempt to run a memory operation that the underlying page protection does not allow. An access violation applies to memory operations, but does not apply when the security manager checks user-mode access rights to objects) |
comp., MS | code access security | Кодка керүне идарә итү (A mechanism provided by the common language runtime whereby managed code is granted permissions by security policy and these permissions are enforced, helping to limit the operations that the code will be allowed to perform) |
comp., MS | dynamic access control | динамик керү мөмкинлеге идарәсе (The ability for IT pros to define how users access a system based on dynamic qualities, such as a user's location or role) |
comp., MS | Ease of Access Center | Махсус мөмкинлекләр үзәге (An area within the Control Panel that provides accessibility options and settings to help users interact more easily with the computer) |
comp., MS | Internet access provider | Интернет хезмәте күрсәтүче (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers) |
comp., MS | Internet Message Access Protocol | IMAP протоколы (A method computers use to send and receive e-mail messages. It allows you to access e-mail without downloading it to your computer) |
comp., MS | Lightweight Directory Access Protocol | LDAP протоколы (The primary access protocol for Active Directory. LDAP is an industry-standard protocol, established by the Internet Engineering Task Force (IETF), that allows users to query and update information in a directory service. Active Directory supports both LDAP version 2 and LDAP version 3) |
comp., MS | Quick Access Toolbar | Тиз керү аслыгы (A customizable toolbar that provides one-click access to commands) |
comp., MS | random access memory | оператив хәтер (The temporary storage area the computer uses to run programs and store data. Information stored in RAM is temporary and is designed to be erased when the computer is turned off) |
comp., MS | random access memory | тиз хәтер (The temporary storage area the computer uses to run programs and store data. Information stored in RAM is temporary and is designed to be erased when the computer is turned off) |