Глоссарий





Новости переводов

16 мая, 2024

Translating UMI-CMS based website

19 апреля, 2024

Translations in furniture production

07 февраля, 2024

Ghostwriting vs. Copywriting

30 января, 2024

Preparing a scientific article for publication in an electronic (online) journal

20 декабря, 2023

Translation and editing of drawings in CAD systems

10 декабря, 2023

About automatic speech recognition

30 ноября, 2023

Translation services for tunneling shields and tunnel construction technologies



Глоссарии и словари бюро переводов Фларус

Поиск в глоссариях:  

Crypto escrow key

Глоссарий ИТ-терминов
    A secondary encryption key that provides the ability for an authorized it helpdesk administrator to open an encrypted document when the password is lost.




Encryption, английский
  1. The process of transforming text into an unintelligible form called cipher.

  2. A method of encoding data for security.

  3. Защита сообщения от неправомочного прочтения, основанная на преобразовании его в шифрованный текст. расшифровать этот текст, т.е. восстановить исходное сообщение, можно только с помощью ключа, использовавшегося при его шифровании

  4. The rearrangement of the bit stream of a previously digitally encoded signal in a

  5. An encoder electronically alters a signal so that it can be clearly seen only by recipients who have a decoder to reverse encryption. selective addressability/scrambling designates receivers to descramble a signal. each decoder has a unique address.

  6. The rearrangement of the bit stream of a previously digitally encoded signal in a systematic fashion to make the information unrecognizable until restored on receipt of the necessary authorization key. this technique is used for securing information transmitted over a communication channel with the intent of excluding all other than authorized receivers from interpreting the message. can be used for voice, video and other communications signals.

  7. Encryption is a process by which a document (plaintext) is combined with a shorter string of data, called a key (eg. ), to produce an output (ciphertext) which can be "decrypted" back into the original plaintext by someone else who has the key, but which is incomprehensible and computationally infeasible to decrypt for anyone who does not have the key.

  8. Шифрование

  9. The process of converting readable data (plaintext) into a coded form (ciphertext) to prevent it from being read by an unauthorized party.

  10. To use a code to render data unintelligible. an encryption key is data that when supplied to an encryption program and the original data to be encrypted yields the encrypted data. a decryption key when supplied with a decryption program and encrypted data the recovers the original data. many times these two keys are the same.

  11. Кодирование (в телефонии, банковской связи)


Authorized, английский
    Уполномоченный; разрешено


Administrator, английский
  1. Руководитель работ (в секретариате оон имеется несколько подразделений, возглавляемых руководителями работ, которые разрабатывают проекты оказания технической помощи странам-членам оон. а затем руководят работой по их осуществлению; документы оон)

  2. A person who manages accounts and determines safety settings.

  3. A windows live account that manages a subscription.

  4. An employee of hosted customers who can access the administration center to administer their organization’s ehs service.

  5. An option on a user account setup dialog that creates an administrator account.

  6. Highest level of user role. administrators can change instance/application settings and manage users.

  7. On windows-based computers, a user account that is a member of the computer’s local administrators group or a member of a group that is a member of the local administrators group, such as the domain admins group in a windows domain. this is the first account that is created when you install an operating system on a new workstation, stand-alone server, or member server. by default, this account has the highest level of administrative access to the local computer.

  8. The person in charge of managing a computer. the administrator is responsible for installing software, assigning passwords, and managing files.

  9. The person responsible for setting up and managing local computers, stand-alone servers, member servers, or domain controllers. an administrator performs such duties as assigning user accounts and passwords, establishing security access levels, watching for unauthorized access, allocating storage space, and helping users with networking problems.

  10. Арбитражный управляющий


Drill-through report, английский
    A secondary report that is displayed when a user clicks an item in a report. detailed data is displayed in the same report. drive (n)


Offline data source, английский
    A secondary data source that is accessible to users who fill out forms offline. when a user is online, data from the data source is stored on the user’s computer so that it can appear in controls when the form is offline.