DictionaryForumContacts

   Sesotho sa leboa
Terms containing phihlelelo | all forms | exact matches only
SubjectSesotho sa leboaEnglish
comp., MSDilo tša Phihlelelo ya DathaData Access Objects (A programming interface to access and manipulate database objects)
comp., MSditumelelo tša phihleleloaccess permissions (Authorization to perform operations associated with a specific shared resource, such as a file, directory, or printer. Permissions must be granted by the system administrator to individual user accounts or administrative groups)
comp., MSkhutlo ya phihlelelo ya netwekeaccess point (A device used to connect wireless computers and other wireless devices to a wired network)
comp., MSLenaneotaolo la Dikgetho tša PhihleleloEase of Access Center (An area within the Control Panel that provides accessibility options and settings to help users interact more easily with the computer)
comp., MSLenaneotshepedišo la Phihlelelo ya Bolotelo bja MotheoLightweight Directory Access Protocol (The primary access protocol for Active Directory. LDAP is an industry-standard protocol, established by the Internet Engineering Task Force (IETF), that allows users to query and update information in a directory service. Active Directory supports both LDAP version 2 and LDAP version 3)
comp., MSLenaneotshepedišo la Phihlelelo ya Melaetša ya InthaneteInternet Message Access Protocol (A method computers use to send and receive e-mail messages. It allows you to access e-mail without downloading it to your computer)
comp., MSmoabi wa phihleleloaccess provider (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers)
comp., MSmoabi wa phihlelelo ya inthaneteInternet access provider (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers)
comp., MSphihlelelo ya go ngwalawrite access (A privilege on a computer system that allows a user to save, change, or delete stored data. Write access is usually set by the system administrator for a networked or server system and by the owner of the computer for a stand-alone machine)
comp., MSphihlelelo ya ka ntleexternal access (Authenticated access that can be granted to external partners and clients to enable sharing of selected SharePoint Online content)
comp., MSPhihlelelo ya ka Pela go ExchangeExchange Fast Access (A feature that enables Exchange users to see new email messages and up-to-date calendar items as soon as they open Outlook, without waiting for it to finish synchronizing)
comp., MSphihlelelo ya kgoleremote access (Part of the integrated Routing and Remote Access service that provides remote networking for telecommuters, mobile workers, and system administrators who monitor and manage servers at multiple branch offices. Users can use Network Connections to dial in to remotely access their networks for services such as file and printer sharing, electronic mail, scheduling, and SQL database access)
comp., MSPhihlelelo ya Thwii ya Kelelo ya RimoutoRemote Direct Memory Access (A networking feature that lets one computer directly place information into the memory of another computer)
comp., MSPhihlelelo ye e Šireleditšwego ya Dinetweke tša go Hloka MathaleWi-Fi Protected Access (A security method used by wireless networks. WPA encrypts the information that is sent between computers on a wireless network and authenticates users to help ensure that only authorized people can access the network)
comp., MSPhihlelelo ye e Šireleditšwego ya Dinetweke tša go Hloka Mathale 2Wi-Fi Protected Access 2 (A wireless implementation and the second generation of WPA security that is based on the final IEEE 802.11i amendment to the 802.11 standard)
comp., MStaolo ya phihlelelo ya tshedimošoauthority information access (A certificate extension that contains information useful for verifying the trust status of a certificate, as defined by the 2008 Memo of the Network Working Group. This information potentially includes Uniform Resource Locations (URLs) where the issuing CA's certificate can be retrieved, as well as a location of an Online Certificate Status Protocol (OCSP) responder configured to provide status for the certificate in question)
comp., MSTirelo ya Phihlelelo ya TshedimošoInformation Access Service (A part of an IrDA infrared communication protocol used so that devices can learn about the services offered by another device)
comp., MStšhireletšo ya phihlelelo ya dikhoutecode access security (A mechanism provided by the common language runtime whereby managed code is granted permissions by security policy and these permissions are enforced, helping to limit the operations that the code will be allowed to perform)