Subject | Hungarian | English |
comp., MS | adattitkosítási kulcs | data encryption key (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data) |
comp., MS | aktiválási kulcs | Activation Key (The unique, 25-character number that activates prepaid computing with Windows) |
fin. | az EKB tőkéjének jegyzésére vonatkozó kulcs | key for subscription of the ECB's capital |
fin. | az EKB tőkéjének jegyzésére vonatkozó kulcs | key for subscription to the European Central Bank's capital |
fin. | az EKB tőkéjének jegyzésére vonatkozó kulcs | key for subscription to the capital of the European Central Bank |
fin. | az EKB tőkéjének jegyzésére vonatkozó kulcs | subscription key to the ECB's capital |
fin. | az EKB tőkéjének jegyzésére vonatkozó kulcs | key for capital subscription |
comp., MS | BitLocker helyreállítási kulcs | BitLocker recovery key (A special key that you can create when you turn on Bitlocker Drive Encryption for the first time on each drive that you encrypt) |
comp., MS | cikkfelosztási kulcs | item allocation key (A product family grouping that is used for forecast and demand scheduling) |
comp., MS | egyszeri kulcs | nonce (A key used only once in a cryptographic communication) |
gen. | elosztási kulcs | distribution key |
fin., polit. | elszámolási kulcs | rate of yield |
comp., MS | elsődleges kulcs | primary key (One or more fields that uniquely identify each record in a table. In the same way that a license plate number identifies a car, the primary key uniquely identifies a record) |
comp., MS | Előmegosztott kulcs | Pre-shared key (An option that allows the user to view the code that can be used to authenticate IPSec/L2TP connections (typically VPN connections)) |
comp., MS | előre definiált kulcs | predefined key (A key that represents one of the main divisions of the registry. Each predefined key is displayed in a separate Registry Editor window, with the key's name appearing in the window's title bar. For example, HKEY_CLASSES_ROOT is a predefined key) |
comp., MS | folytatási kulcs | resume key (A key supplied by the SMB client that allows the system to reference the handle during a resume operation after a failover) |
comp., MS | fő kulcs | master secret (A security key generated by the master secret server when an Enterprise Single Sign-On (SSO) Administrator requests it. This secret key is stored in the registry as a Local Security Authority (LSA) secret on the master secret server. Only SSO Administrators can access this secret key) |
comp., MS | helyettes kulcs | surrogate key (A single attribute candidate key whose values are system-generated and that does not represent properties that identify objects in the real world) |
comp., MS | helyreállítási kulcs | recovery key (A key that is used for recovering data that is encrypted on a BitLocker volume. This key is cryptographically equivalent to a startup key. If available, the recovery key decrypts the volume master key, which in turn decrypts the full volume encryption key. The recovery key is stored on a USB flash drive. To use the recovery key, a user inserts the USB flash drive and then restarts the computer) |
comp., MS | hitelesítésszolgáltatói kulcs azonosítója | Authority Key Identifier (A certificate extension used by the certificate chaining engine to determine what certificate was used to sign a presented certificate. The AKI can contain the issuer name, serial number, public key information, or no information at all. By matching the information in a certificate's AKI extension to a CA certificate's Subject Key Identifier (SKI) extension, a certificate chain can be built) |
comp., MS | hozzáférési kulcs | passkey (A number similar to a personal identification number (PIN) that identifies (or authenticates) a Bluetooth enabled device to a computer) |
fin., econ. | hozzájárulási kulcs | contribution scale |
fin., econ. | hozzájárulási kulcs | contribution key |
comp., MS | hálózati biztonsági kulcs | network security key (A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key) |
comp., MS | hálózati kulcs | network key (A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key) |
comp., MS | idegen kulcs | foreign key (A set of fields whose values are migrated from a primary key or an alternate key from a parent table) |
comp., MS | kereskedelmi kulcs | retail key (A type of product key required during the installation of Windows) |
comp., MS | keresési kulcs | search key (The value that is to be searched for in a document or any collection of data) |
comp., MS | keresési kulcs | candidate key (A column or set of columns that have a unique value for each row in a table) |
comp., MS | kriptográfiai kulcs | crypto key (A piece of data that is required to initialize a cryptographic algorithm) |
comp., MS | kriptográfiai kulcs | cryptographic key (A piece of data that is required to initialize a cryptographic algorithm) |
comp., MS | kulcs-érték pár | key-value pair (A set of data items that contains a unique identifier, called a key, and a value that is the actual data for the key) |
comp., MS | kulcsaláíró kulcs | key signing key (A public key corresponding to a private key that is used to sign one or more DNS record sets at the zone apex) |
tax. | közvetettadó-kulcs | indirect tax rate |
comp., MS | külső kulcs | foreign key (" A key in a database table that comes from another table (also know as the "referenced table") and whose values match the primary key (PK) or unique key in the referenced table.") |
comp., MS | külső kulcs | referencing key (" A key in a database table that comes from another table (also know as the "referenced table") and whose values match the primary key (PK) or unique key in the referenced table.") |
comp., MS | külső kulcs | external key (A file that contains information to access cryptographically locked data, which is stored away from the system, such as on a USB flash drive) |
comp., MS | letéti titkosítási kulcs | crypto escrow key (A secondary encryption key that provides the ability for an authorized IT Helpdesk administrator to open an encrypted document when the password is lost) |
comp., MS | megbízható legfelső szintű kulcs | trusted root key (An encryption key used in Configuration Manager to help clients identify valid management points) |
comp., MS | mennyiségi aktiválási kulcs | multi-activation key (A product key that is provided to Microsoft customers who choose a Microsoft Volume Licensing program for their organizations and that allows multiple installations of a particular product. The key is assigned to a company or institution intended for their sole use and only for distribution to employees or third parties who are authorized to install and distribute licenses pursuant to the terms of their license agreement) |
comp., MS | másodlagos kulcs | alternate key (A candidate key that is not designated as the primary key and is used to uniquely identify records in a database table) |
fin., commun., IT | nyilvános kulcs | public key |
comp., MS | nyilvános kulcs képzési algoritmusa | public key algorithm (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message) |
judo. | nyújtott kulcs | stretched key |
comp., MS | származtatott kulcs | derived key (A cryptographic key created by a call to CryptDeriveKey. A derived key can be created from a password, or any other user data. Derived keys allow applications to create session keys as needed, eliminating the need to store a particular key) |
comp., MS | tanúsítványazonosító kulcs | attestation identity key (The cryptographic representation of the hardware or software state and other integrity metrics, and which can be used to perform anonymous or pseudo-anonymous attestations to remote parties in multiparty transactions) |
comp., MS | teljes kötetet titkosító kulcs | full volume encryption key (The algorithm-specific key that is used to encrypt (and optionally, diffuse) data on disk sectors. Currently, this key can be either 128 bits or 256 bits advanced encryption standard (AES). The default encryption algorithm that BitLocker Drive Encryption uses is AES 128 bit with diffuser) |
comp., MS | természetes kulcs | natural key (A primary key or alternate key whose values identify objects in the real world) |
comp., MS | titkos kulcs | secret key (A symmetric encryption key shared by two entities, such as between a user and the domain controller (DC), with a long lifetime. A password is a common example of a secret key. When used in a context that implies Kerberos only, a principal's secret key) |
comp., MS | titkos kulcs | private key (The secret half of a cryptographic key pair that is used with a public key algorithm. Private keys are typically used to decrypt a symmetric session key, digitally sign data, or decrypt data that has been encrypted with the corresponding public key) |
comp., MS | titkosítatlan kulcs | clear key (The key that is stored unencrypted on the disk volume. This key is used to freely access the volume master key, and in turn, the full volume encryption key when BitLocker Drive Encryption protection is disabled but the disk volume remains encrypted) |
commun., IT | titkosítási kulcs | cryptographic key |
commun., IT | titkosítási kulcs | cypher key |
commun., IT | titkosítási kulcs | key |
comp., MS | titkosítási kulcs | encryption key (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data) |
comp., MS | többször használható aktiválási kulcs | multiple activation key (A volume license key that is used for one-time activation with activation services that are hosted by Microsoft) |
fin. | tőkejegyzési kulcs | key for subscription of the ECB's capital |
fin. | tőkejegyzési kulcs | key for subscription to the European Central Bank's capital |
fin. | tőkejegyzési kulcs | key for subscription to the capital of the European Central Bank |
fin. | tőkejegyzési kulcs | subscription key to the ECB's capital |
fin. | tőkejegyzési kulcs | key for capital subscription |
tech. | villás kulcs | wrench |
comp., MS | zónaaláíró kulcs | zone signing key (A public key corresponding to a private key that is used to sign one or more DNS record sets within a zone, below the zone apex) |
fin., IT | áremelési, illetve árcsökkentési kulcs | scale of price increases and reductions |
zoot. | értékelési kulcs | key of soil classification |
zoot. | értékelési kulcs | key of soil grading |
zoot. | értékelési kulcs | soil quality key |
comp., MS | összetett kulcs | composite key (A key whose definition consists of two or more fields in a file, columns in a table, or attributes in a relation) |