Глоссарий





Новости переводов

16 мая, 2024

Translating UMI-CMS based website

19 апреля, 2024

Translations in furniture production

07 февраля, 2024

Ghostwriting vs. Copywriting

30 января, 2024

Preparing a scientific article for publication in an electronic (online) journal

20 декабря, 2023

Translation and editing of drawings in CAD systems

10 декабря, 2023

About automatic speech recognition

30 ноября, 2023

Translation services for tunneling shields and tunnel construction technologies



Глоссарии и словари бюро переводов Фларус

Поиск в глоссариях:  

Backup operators group

Глоссарий ИТ-терминов
    A type of local or global group that contains the user rights you need to back up and restore files and folders. members of the backup operators group can back up and restore files and folders regardless of ownership, permissions, encryption, or auditing settings.




Regardless, английский
    Невзирая на, несмотря на


Permissions, английский
  1. Права доступа; полномочия

  2. Authorization to perform operations associated with a specific shared resource, such as a file, directory, or printer. permissions must be granted by the system administrator to individual user accounts or administrative groups.


Encryption, английский
  1. The process of transforming text into an unintelligible form called cipher.

  2. A method of encoding data for security.

  3. Защита сообщения от неправомочного прочтения, основанная на преобразовании его в шифрованный текст. расшифровать этот текст, т.е. восстановить исходное сообщение, можно только с помощью ключа, использовавшегося при его шифровании

  4. The rearrangement of the bit stream of a previously digitally encoded signal in a

  5. An encoder electronically alters a signal so that it can be clearly seen only by recipients who have a decoder to reverse encryption. selective addressability/scrambling designates receivers to descramble a signal. each decoder has a unique address.

  6. The rearrangement of the bit stream of a previously digitally encoded signal in a systematic fashion to make the information unrecognizable until restored on receipt of the necessary authorization key. this technique is used for securing information transmitted over a communication channel with the intent of excluding all other than authorized receivers from interpreting the message. can be used for voice, video and other communications signals.

  7. Encryption is a process by which a document (plaintext) is combined with a shorter string of data, called a key (eg. ), to produce an output (ciphertext) which can be "decrypted" back into the original plaintext by someone else who has the key, but which is incomprehensible and computationally infeasible to decrypt for anyone who does not have the key.

  8. Шифрование

  9. The process of converting readable data (plaintext) into a coded form (ciphertext) to prevent it from being read by an unauthorized party.

  10. To use a code to render data unintelligible. an encryption key is data that when supplied to an encryption program and the original data to be encrypted yields the encrypted data. a decryption key when supplied with a decryption program and encrypted data the recovers the original data. many times these two keys are the same.

  11. Кодирование (в телефонии, банковской связи)


Lazy area location reporting, английский
    A type of location reporting that specifies the area into which users performed their last session, country, region and locality associated to devices, based on cell id or wifi.


Advanced list, английский
    A type of list task page where the primary action is selecting an entity from the list. users access the advanced list through the advanced link on the dropdown list. if the user cannot find the information they need on the simple drop-down list, they may choose to view the more complete advanced list where they can view all the fields for a particular entity.