English | Hindi |
Access app | Access अनुप्रयोग (An app for SharePoint that is built by using Access and has its data stored in SQL Server or SQL Azure) |
Access app for SharePoint | SharePoint के लिए Access अनुप्रयोग (An app for SharePoint that is built by using Access and has its data stored in SQL Server or SQL Azure) |
access code | पहुँच कोड (A string of characters entered by a user to verify his or her identity to a network or to a local computer, device, or client, or to sign in to an account, app, and so on) |
access control | पहुँच नियंत्रण (A security mechanism that determines which operations a user, group, service, or computer is authorized to perform on a computer or on a particular object, such as a file, printer, registry subkey, or directory service object) |
access control entry | एक्सेस कंट्रोल एंट्री, पहुँच नियंत्रण प्रविष्टि (An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object) |
access control list | प्रवेश नियंत्रण सूची (In Windows-based systems, a list of access control entries (ACE) that apply to an entire object, a set of the object's properties, or an individual property of an object, and that define the access granted to one or more security principals) |
access level | पहुँच स्तर (A setting that determines how much information a contact can view about you) |
Access Levels Management | पहुँच स्तर प्रबंधन (A UI element that displays a user's contacts and access level entries (ACEs) organized by access level) |
access mask | पहुँच मास्क (In Windows-based computers, a 32-bit value (a bitmask) that specifies the permissions that are assigned in an access control entry (ACE). An access mask is also part of the access request when an object is opened. The access mask in the request is compared to the access mask in each ACE to determine whether or not to grant the request) |
access point | पहुँच बिंदु (A device used to connect wireless computers and other wireless devices to a wired network) |
access provider | सेवा प्रदाता (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers) |
access token | एक्सेस टोकन (A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority) |
alternate access mapping | वैकल्पिक पहुंच मैपिंग (An alternate URL mapping that Windows SharePoint Services preserves in the mapping table. It is the URL a user would see, but is not a URL that IIS would give to WSS) |
authenticated access | प्रमाणित पहुँच (A user access option that you specify at the default Web site level or Application level in IIS. Authenticated access requires a user to have a valid account and password to access the site) |
authority information access | अथॉरिटी इन्फ़ॉर्मेशन एक्सेस (A certificate extension that contains information useful for verifying the trust status of a certificate, as defined by the 2008 Memo of the Network Working Group. This information potentially includes Uniform Resource Locations (URLs) where the issuing CA's certificate can be retrieved, as well as a location of an Online Certificate Status Protocol (OCSP) responder configured to provide status for the certificate in question) |
Change Level of Access | पहुंच का स्तर बदलें (Contact context menu item that allows the user to assign an access level to the selected contact(s)) |
Client Access server | क्लायंट पहुँच सर्वर (A set of components and services that enable users to access their Exchange mailboxes through the Outlook Web Access application) |
Client Access server role | क्लायंट पहुँच सर्वर रोल (A set of components and services that enable users to access their Exchange mailboxes through the application Outlook Web Access and the protocols Exchange ActiveSync, Post Office Protocol version 3 (POP3), and Internet Message Access Protocol 4rev1 (IMAP4). The Client Access server role also includes Web services that are used by other Exchange 2007 server roles) |
code access security | कोड पहुँच सुरक्षा (A mechanism provided by the common language runtime whereby managed code is granted permissions by security policy and these permissions are enforced, helping to limit the operations that the code will be allowed to perform) |
Data Access Objects | डेटा एक्सेस ऑब्जेक्ट (A programming interface to access and manipulate database objects) |
Device Access API | डिवाइसेस (A set of COM interfaces that a device companion app can use to send requests, to a specialized device, synchronously or asynchronously) |
direct memory access | सीधी मेमोरी पहुँच (A technology that allows certain devices, such as hard disks and CD or DVD drives, to transfer information directly through the computer's memory without using the computer's processor. DMA improves the performance of the device and frees the computer's processor so it can perform other tasks) |
discretionary access control list | डिस्क्रिशनरी एक्सेस कंट्रोल लिस्ट (An access control list that is controlled by the owner of an object and that specifies the access particular users or groups can have to the object) |
dynamic access control | डायनेमिक पहुँच नियंत्रण (The ability for IT pros to define how users access a system based on dynamic qualities, such as a user's location or role) |
dynamic random access memory | गतिक याद्विच्छिक अभिगम स्मृति (A form of semiconductor random access memory (RAM)) |
Ease of Access Center | पहुँच की सुगमता केंद्र (An area within the Control Panel that provides accessibility options and settings to help users interact more easily with the computer) |
Exchange Fast Access | Exchange त्वरित पहुँच (A feature that enables Exchange users to see new email messages and up-to-date calendar items as soon as they open Outlook, without waiting for it to finish synchronizing) |
external access | बाह्य पहुँच (Authenticated access that can be granted to external partners and clients to enable sharing of selected SharePoint Online content) |
field access profile | फ़ील्ड एक्सेस प्रोफ़ाइल (The set of field-level access permissions that have been granted to a user or users) |
field-level access | फ़ील्ड-स्तरीय पहुँच (The permission that is assigned to a user or users that allow them to read, update, or create a specific field) |
Information Access Service | सूचना पहुंच सेवा (A part of an IrDA infrared communication protocol used so that devices can learn about the services offered by another device) |
international access code | अंतर्राष्ट्रीय संपर्क कोड (The prefix that is used to direct a call internationally. The International Access Code is 011 in the United States and 00 in much of the rest of the world) |
Internet access provider | इंटरनेट पहुँच प्रदाता (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers) |
Internet Message Access Protocol | इंटरनेट संदेश पहुंच प्रोटोकॉल (A method computers use to send and receive e-mail messages. It allows you to access e-mail without downloading it to your computer) |
Lightweight Directory Access Protocol | लाइटवेट डायरेक्टरी एक्सेस प्रोटोकॉल (The primary access protocol for Active Directory. LDAP is an industry-standard protocol, established by the Internet Engineering Task Force (IETF), that allows users to query and update information in a directory service. Active Directory supports both LDAP version 2 and LDAP version 3) |
Microsoft Dynamics CRM for Microsoft Office Outlook with Offline Access | ऑफ़लाइन पहुँच के साथ Microsoft Office Outlook के लिए Microsoft Dynamics CRM (The laptop client version of the Microsoft Dynamics CRM product suite for Microsoft Office Outlook) |
Mobile Access for Windows SharePoint Services | Windows SharePoint Services के लिए मोबाइल पहुँच (A feature that enables mobile devices, such as cellular phones, to access some SharePoint services) |
Network Access Protection | नेटवर्क पहुँच सुरक्षा (A set of operating system components that can help protect access to a private network by enforcing health policies. System administrators establish health policies which NAP enforces by inspecting and assessing the health of client computers, restricting network access when client computers are deemed noncompliant, and remediating noncompliant client computers for full network access. NAP also provides ongoing health compliance enforcement while a client computer is connected to a network) |
Outlook Web Access Web Part | Outlook Web Access वेब पार्ट (A piece of the user interface (UI) in Outlook Web Access that can be hosted in iframes as part of other Web applications such as SharePoint Portal Server portals. Outlook Web Access exposes a set of Outlook Web Access Web Part URLs that allow other applications to request certain portions of the Outlook Web Access UI. For example, another application can load the Outlook Web Access Web Part URL for the Inbox, Calendar, or Contact folder into an iframe hosted in that application) |
outside line access code | बाहरी लाइन संपर्क कोड (The prefix that is used to access an outside line. In the United States, this prefix is typically 9) |
Quick Access Toolbar | त्वरित पहुँच उपकरण पट्टी (A customizable toolbar that provides one-click access to commands) |
remote access | दूरस्थ पहुँच (Part of the integrated Routing and Remote Access service that provides remote networking for telecommuters, mobile workers, and system administrators who monitor and manage servers at multiple branch offices. Users can use Network Connections to dial in to remotely access their networks for services such as file and printer sharing, electronic mail, scheduling, and SQL database access) |
remote access Trojan | दूरस्थ पहुँच ट्रोजन (A type of Trojan that provides remote access to a computer) |
Remote Direct Memory Access | रिमोट डायरेक्ट मेमोरी एक्सेस (A networking feature that lets one computer directly place information into the memory of another computer) |
role-based access control role | भूमिका-आधारित पहूँच नियंत्रण भूमिका (The user role that is assigned to a user account, which determines the options that are visible to that user and the tasks that the user can perform in the management interface for Exchange Labs) |
Simple Object Access Protocol | सिंपल ऑब्जेक्ट एक्सेस प्रोटोकॉल (A simple, XML-based protocol for exchanging structured data and type information on the World Wide Web. The protocol is currently the de facto standard for XML messaging) |
subscriber access number | सदस्य पहुँच संख्या (A number that is configured in a Private Branch eXchange (PBX) that allows a subscriber to access their Microsoft Exchange mailbox over the telephone) |
system access control list | सिस्टम पहुँच नियंत्रण सूची (An ACL that controls the generation of audit messages for attempts to access a securable object. The ability to get or set an object's SACL is controlled by a privilege typically held only by system administrators) |
UM access telephone number | UM पहुँच टेलिफोन नंबर (A telephone number that points to a hunt group and is the access number for calls that are routed to Unified Messaging servers) |
Visio Web Access Web Part | Visio Web Access वेब पार्ट (A Web Part that enables users to view (in full fidelity) and share Visio files in SharePoint Server without having the Visio client installed) |
Wi-Fi Protected Access 2 | वाई-फ़ाई प्रोटेक्टेड एक्सेस 2 (A wireless implementation and the second generation of WPA security that is based on the final IEEE 802.11i amendment to the 802.11 standard) |
Wi-Fi Protected Access | वाई-फ़ाई सुरक्षित पहुंच (A security method used by wireless networks. WPA encrypts the information that is sent between computers on a wireless network and authenticates users to help ensure that only authorized people can access the network) |
Wi-Fi Protected Access 2 | वाई-फ़ाई सुरक्षित पहुंच 2 (A wireless implementation and the second generation of WPA security that is based on the final IEEE 802.11i amendment to the 802.11 standard) |
Wi-Fi Protected Access | वाई-फ़ाई प्रोटेक्टेड एक्सेस (A security method used by wireless networks. WPA encrypts the information that is sent between computers on a wireless network and authenticates users to help ensure that only authorized people can access the network) |