English | Serbian Latin |
alias (The portion of the e-mail address that appears to the left of the | pseudonim |
Automatically retrieve Out Of Office settings from Outlook | Automatski preuzmi postavku "Odsutan" iz programa Outlook (An option in the Options dialog box, on the Rules tab. When this option is selected, Communicator obtains the user's Out Of Office information from Outlook and displays it as part of the user's status) |
Best of Web | Najbolje na Vebu (A curated list feature that highlights interesting and noteworthy web sites) |
Blue Screen of Death | Plavi ekran smrti (An exception that occurs while the operating system is executing internal code (in drivers, the kernel, etc)) |
certificate of authenticity | certifikat o autentičnosti (A label with sophisticated anti-counterfeiting features that helps the end user identify that the computer uses a validly licensed copy of Microsoft Windows. The product name and a unique product key appear in the center of the label. The OEM must physically attach the COA label to the computer chassis, and it should never be removed from the computer) |
Champion of Logic | Šampion u logici (Skill level in the Purble Place game. Once a Purble Place game is completed, a player gets a skill level rank assigned automatically by the game (based on number of guesses and hints during the game)) |
Change Level of Access | Promeni nivo pristupa (Contact context menu item that allows the user to assign an access level to the selected contact(s)) |
Code of Conduct | Pravila ponašanja (The link to the code of conduct, which contains rules that explain how someone should behave while using a service or product) |
coefficient of determination | koeficijent determinacije (A number from 0 to 1 that reveals how closely the estimated values for the trendline correspond to your actual data. A trendline is most reliable when its R-squared value is at or near 1) |
denial-of-service attack | napad radi onemogućavanja usluga (An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system) |
denial of service attack | napad radi onemogućavanja usluga (An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system) |
Ease of Access Center | Centar za lakše korišćenje računara (An area within the Control Panel that provides accessibility options and settings to help users interact more easily with the computer) |
elevation of privilege | podizanje nivoa privilegija (The process by which a user obtains a higher level of privilege than that for which he has been authorized. A malicious user may use elevation of privilege as a means to compromise or destroy a system, or to access unauthorized information) |
email address (A string that identifies a user so that the user can receive Internet email. An email address on the Internet typically consists of an account name, followed by the | e-adresa |
e-mail address (A string that identifies a user so that the user can receive Internet email. An email address on the Internet typically consists of an account name, followed by the | adresa e-pošte |
email address (A string that identifies a user so that the user can receive Internet email. An email address on the Internet typically consists of an account name, followed by the | adresa |
Enterprise Quality of Service | Kvalitet usluge na nivou velikih preduzeća (A group policy setting that alleviates network congestion issues by enabling central management of Windows Vista network traffic. Without requiring changes to applications, you can define flexible policies to prioritize the Differentiated Services Code Point (DSCP) marking and throttle rate) |
Financial Modernization Act of 1999 | Financial Modernization Act iz 1999. godine (A U.S. law containing financial provisions that require all financial institutions to disclose to consumer customers their policies and practices for protecting the privacy of non-public personal information. Non-public personal information includes any PII provided by a customer, resulting from transactions with the financial institution or obtained by a financial institution through providing products or services) |
IEEE Standard Protocol for Authentication in Host Attachments of Transient Storage Devices | Protokol po standardu organizacije IEEE za potvrdu identiteta prenosivih uređaja prilikom priključivanja na matične računare (The IEEE industry standard that defines methods for authenticating transient removable storage devices (e.g. USB flash drives, memory cards, and portable hard disks) when they are mounted to host computers in corporate, government, academic, and other environments) |
IPsec Denial of Service Protection | IPsec zaštita od napada radi onemogućavanja usluga (A feature that helps client machines to provide basic protection against denial-of-service attacks) |
method of contact | način kontaktiranja (The preferred method of communication with the Business Contact; for example, phone, e-mail message, letter, fax, and so on) |
millions of instructions per second | miliona instrukcija u sekundi (A common measure of processor speed) |
multiple points of presence | višestruke tačke prisutnosti (The ability of a single user to sign in to a Lync Server or Office Communications Server server with multiple clients) |
National Register of Legal Entities | Nacionalni registar pravnih lica (A 14-digit identification number issued to Brazilian companies by the Brazilian Ministry of Revenue for tax purposes) |
Need of Delivery | potrebe isporuke (The formula used to determine the time and frequency with which a piece of content is delivered. This formula takes into account the total quantity of content to be delivered, and the length of time over which the quantity must be delivered) |
out-of-band release | nepredviđeno izdanje (A release that occurs outside of the normal shipping cycle) |
out-of-box driver | upravljački program koji se ne dobija uz Windows (A driver that is not included with Windows) |
out-of-box experience application | aplikacija za prvi utisak (An application that determines what the out-of-box experience will be) |
out-of-browser | van pregledača (Pertaining to, or characteristic of, a Silverlight-based application that a user installs from a Web page and runs outside the browser) |
Out of Office | Van kancelarije (A status that can be applied to blocks of time in a user's Calendar to indicate that the user will be away) |
Out of office | Odsutan iz kancelarije (A presence status displayed when a user sets up an Out of Office auto-reply in Microsoft Outlook. If the user doesn't have a personal note, their Outlook Out of Office message will appear as their personal note) |
Out of Office message | poruka "Odsutan iz kancelarije" (The auto-reply text specified using Outlook's Automatic Replies or Out of Office Assistant) |
percent of list | procenat kataloške cene (A pricing method that determines the unit price of the product as a percent of the price that was entered in the List Price field on the Product form) |
point-of-sale activation | aktivacija u trenutku prodaje (The process of activating tokens during a purchase) |
proof of purchase | dokaz o kupovini (The original receipt or other document which confirms acquisition of a particular product) |
Quality of Experience | Kvalitet sesije (A measurement of a user's perception of the quality of an audio communication session. For example, in a voice communication, QoE monitors echoes and background noises such as hissing in the line) |
Redundant Array of Independent Disks | redundantni niz nezavisnih diskova (A mechanism for storing identical data on multiple disks for redundancy, improved performance, and increased mean time between failures (MTBF). RAID provides fault tolerance and appears to the operating system as a single logical drive) |
source of authority | izvor autoriteta (The location where Active Directory directory service objects, such as users and groups, are mastered (an original source that defines copies of an object) in a cross-premises deployment) |
source of lead | referentni izvor (The source of an account, business contact, or opportunity; for example, an advertisement or personal reference) |
statement of health | Izjava o zdravstvenom stanju (A declaration from a client computer that asserts the computer's health status. System health agents (SHAs) create SoHs and send them to a corresponding system health validator (SHV)) |
statement of health response | Potvrđena izjava o zdravstvenom stanju (The validation of a statement of health (SoH) that a system health validator (SHV) produces and sends to the NAP administration server. The SoHR can contain remediation instructions) |
table of contents | sadržaj (The listing of contents at the beginning of a document or file) |
Terms of use | Uslovi korišćenja (The link to the Microsoft service agreement) |
Trojan denial of service attack | trojanski konj koji vrši napad radi onemogućavanja usluga (A type of Trojan that creates a denial of service attack) |
unit of measure | jedinica mere (A division of quantity established in calibrated or normative systems of measurement) |
username (The name by which a user is identified to a computer system or network. During the logon process, the user must enter the username and the correct password. If the system or network is connected to the Internet, the username generally corresponds to the leftmost part of the user's e-mail address (the portion preceding the | korisničko ime |
zoom (A multi-touch gesture that consists of two fingers moving in opposite directions ( -> | zum |