English | Portuguese |
access key | tecla de acesso (Any combination of keys that must be pressed sequentially) |
Activation Key | Chave de Ativação (The unique, 25-character number that activates prepaid computing with Windows) |
ALT key | tecla ALT (A keyboard key that is used in conjunction with another key to produce some special feature or function and is typically marked with the letters Alt) |
ALT key | tecla Alt (A keyboard key that is used in conjunction with another key to produce some special feature or function and is typically marked with the letters Alt) |
alternate key | chave alternativa (A candidate key that is not designated as the primary key and is used to uniquely identify records in a database table) |
arrow key | tecla de direção (Any of four keys labeled with arrows pointing up, down, left, and right, used to move the cursor vertically or horizontally on the display screen or, in some programs, to extend the highlight) |
arrow key | tecla de seta (Any of four keys labeled with arrows pointing up, down, left, and right, used to move the cursor vertically or horizontally on the display screen or, in some programs, to extend the highlight) |
asymmetric key algorithm | algoritmo de chave assimétrica (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
attendee key | chave de participante (A meeting key that is used by attendees to join a meeting) |
attestation identity key | chave de identidade de atestado (The cryptographic representation of the hardware or software state and other integrity metrics, and which can be used to perform anonymous or pseudo-anonymous attestations to remote parties in multiparty transactions) |
Authority Key Identifier | Identificador da Chave da Autoridade (A certificate extension used by the certificate chaining engine to determine what certificate was used to sign a presented certificate. The AKI can contain the issuer name, serial number, public key information, or no information at all. By matching the information in a certificate's AKI extension to a CA certificate's Subject Key Identifier (SKI) extension, a certificate chain can be built) |
BACKSPACE key | tecla BACKSPACE (A keyboard key that moves the cursor to the left, one character at a time, usually erasing each character as it moves) |
BACKSPACE key | tecla de retrocesso (A keyboard key that moves the cursor to the left, one character at a time, usually erasing each character as it moves) |
BitLocker recovery key | chave de recuperação do BitLocker (A special key that you can create when you turn on Bitlocker Drive Encryption for the first time on each drive that you encrypt) |
BitLocker recovery key | chave de recuperação BitLocker (A special key that you can create when you turn on Bitlocker Drive Encryption for the first time on each drive that you encrypt) |
candidate key | chave candidata (A column or set of columns that have a unique value for each row in a table) |
CAPS LOCK key | tecla CAPS LOCK (A toggle key that, when on, shifts the alphabetic characters on the keyboard to uppercase) |
CAPS LOCK key | tecla Caps Lock (A toggle key that, when on, shifts the alphabetic characters on the keyboard to uppercase) |
clear key | chave não criptografada (The key that is stored unencrypted on the disk volume. This key is used to freely access the volume master key, and in turn, the full volume encryption key when BitLocker Drive Encryption protection is disabled but the disk volume remains encrypted) |
clear key | chave não encriptada (The key that is stored unencrypted on the disk volume. This key is used to freely access the volume master key, and in turn, the full volume encryption key when BitLocker Drive Encryption protection is disabled but the disk volume remains encrypted) |
color key | chave de cores (A color used for transparent or translucent effects. An overlay surface is displayed in the region of the primary surface that contains the color key. In video production, color keys are used to combine two video signals) |
color key transparency | transparência chave de cor (A method for blending texture maps so that parts appear transparent. Color key transparency accomplishes this by defining a single color as transparent) |
composite key | chave composta (A key whose definition consists of two or more fields in a file, columns in a table, or attributes in a relation) |
content key | chave de conteúdo (The cryptographic key used to both encrypt and decrypt protected content during publishing and consumption) |
Control key | tecla Control (A key that, when pressed in combination with another key, gives the other key an alternative meaning) |
crypto escrow key | chave de caução criptográfica (A secondary encryption key that provides the ability for an authorized IT Helpdesk administrator to open an encrypted document when the password is lost) |
crypto escrow key | chave criptográfica de caução (A secondary encryption key that provides the ability for an authorized IT Helpdesk administrator to open an encrypted document when the password is lost) |
crypto key | chave de criptografia (A piece of data that is required to initialize a cryptographic algorithm) |
crypto key | chave criptográfica (A piece of data that is required to initialize a cryptographic algorithm) |
cryptographic key | chave de criptografia (A piece of data that is required to initialize a cryptographic algorithm) |
cryptographic key | chave criptográfica (A piece of data that is required to initialize a cryptographic algorithm) |
CTRL key | tecla CTRL (A key that, when pressed in combination with another key, gives the other key an alternative meaning) |
cursor key | tecla de cursor (Any of four keys labeled with arrows pointing up, down, left, and right, used to move the cursor vertically or horizontally on the display screen or, in some programs, to extend the highlight) |
customer-specific volume license key | chave de licença de volume específica do cliente (A unique volume license key used to activate a key management service (KMS) host or to enable volume software licenses to be issued and managed from Active Directory) |
customer-specific volume license key | chave de licenciamento em volume específica do cliente (A unique volume license key used to activate a key management service (KMS) host or to enable volume software licenses to be issued and managed from Active Directory) |
data encryption key | chave de criptografia de dados (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data) |
data encryption key | chave de encriptação de dados (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data) |
DELETE key | tecla Delete (On IBM and PC-compatible computers, a key whose function changes depending on the application program. Usually it erases the character under the cursor, although in some applications it can erase selected text or graphics) |
derived key | chave derivada (A cryptographic key created by a call to CryptDeriveKey. A derived key can be created from a password, or any other user data. Derived keys allow applications to create session keys as needed, eliminating the need to store a particular key) |
dual key | chave dupla (A type of key that is the combination of a primary key and a join key. You can use dual keys when you add profile attributes in Commerce Server Business Desk) |
e-mail quick key | tecla rápida de email (A key that you use in some e-mail programs to enter text that is commonly used) |
e-mail quick key | tecla rápida de correio eletrónico (A key that you use in some e-mail programs to enter text that is commonly used) |
encryption key | chave de criptografia (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data) |
encryption key | chave de encriptação (A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data) |
endorsement key | chave de endosso (A key pair, consisting of a public key and a private key, which is used to verify that a TPM is genuine) |
endorsement key | chave de endossamento (A key pair, consisting of a public key and a private key, which is used to verify that a TPM is genuine) |
enhanced key usage | uso avançado de chave (An extended property value that specifies the uses for which a certificate is valid) |
enhanced key usage | utilização de chave avançada (An extended property value that specifies the uses for which a certificate is valid) |
ENTER key | tecla ENTER (The key that is used at the end of a line or command to instruct the computer to process the command or text. In word processing programs, the Enter key is used at the end of a paragraph. Also called: Return key) |
entity key | chave da entidade (A reference to an entity of a specific entity type) |
ESC key | tecla ESC (A keyboard key that sends the escape (ESC) character to the computer. Often this key moves the user back one level in the menu structure or exits the program) |
extended key usage | uso estendido de chave (An extended property value that specifies the uses for which a certificate is valid) |
extended key usage | utilização alargada da chave (An extended property value that specifies the uses for which a certificate is valid) |
external key | chave externa (A file that contains information to access cryptographically locked data, which is stored away from the system, such as on a USB flash drive) |
external key file | arquivo da chave externa (A file that contains the external key and is stored on an external media device. The name and contents of the file are internal to Microsoft and can change from version to version) |
external key file | ficheiro de chave externa (A file that contains the external key and is stored on an external media device. The name and contents of the file are internal to Microsoft and can change from version to version) |
foreign key | chave estrangeira (" A key in a database table that comes from another table (also know as the "referenced table") and whose values match the primary key (PK) or unique key in the referenced table.") |
full volume encryption key | chave de criptografia de volume completo (The algorithm-specific key that is used to encrypt (and optionally, diffuse) data on disk sectors. Currently, this key can be either 128 bits or 256 bits advanced encryption standard (AES). The default encryption algorithm that BitLocker Drive Encryption uses is AES 128 bit with diffuser) |
full volume encryption key | chave de encriptação de volume completo (The algorithm-specific key that is used to encrypt (and optionally, diffuse) data on disk sectors. Currently, this key can be either 128 bits or 256 bits advanced encryption standard (AES). The default encryption algorithm that BitLocker Drive Encryption uses is AES 128 bit with diffuser) |
global system key | chave do sistema global (A tool used to configure the startup key, a random, 128-bit, symmetric cryptographic key created at system startup and used to encrypt all of the user`s symmetric cryptographic keys) |
global system key | chave de sistema global (A tool used to configure the startup key, a random, 128-bit, symmetric cryptographic key created at system startup and used to encrypt all of the user`s symmetric cryptographic keys) |
Group Key Distribution Service | Serviço de Distribuição de Chave de Grupo (An Active Directory Domain Services service that provides cryptographic keys that correspond to arbitrary sets of security principals in AD DS to users who are authorized to access those keys) |
Group Key Distribution Service | Serviço de Distribuição de Chaves de Grupo (An Active Directory Domain Services service that provides cryptographic keys that correspond to arbitrary sets of security principals in AD DS to users who are authorized to access those keys) |
Host key | tecla Host (The key (right ALT key by default) that must be pressed with Virtual Server to move keyboard and mouse focus from a guest operating system back to the host operating system) |
INSERT key | tecla INSERT (" A key on the keyboard, labeled "Insert" or "Ins", whose usual function is to toggle a program's editing setting between an insert mode and an overwrite mode, although it may perform different functions in different applications.") |
Internet Key Exchange | protocolo IKE (A protocol that establishes the security association and shared keys necessary for computers to communicate by using Internet Protocol security (IPsec)) |
Internet Key Exchange A protocol that establishes the security association and shared keys necessary for computers to communicate by using Internet Protocol security (IPsec) | IKE (Internet Key Exchange) |
item allocation key | chave de alocação de item (A product family grouping that is used for forecast and demand scheduling) |
item allocation key | chave de alocação de produtos (A product family grouping that is used for forecast and demand scheduling) |
key action | ação da tecla (Term used to describe program behavior when a certain key is pressed on the keyboard. Key actions are associated with items within a source document) |
key agreement | acordo de chaves (Key exchange without key encryption) |
key-based renewal | renovação baseada em chave (A method of renewing a certificate using the existing key material as the sole form of authentication) |
key chain drive | pen USB (A small device used to store information. USB flash drives plug into computer USB ports so you can copy information to or from them, making it easy to share and transport information) |
key column | coluna de chave (A column whose contents uniquely identify every row in a table) |
key combination | combinação de teclas (Any combination of keys that must be pressed simultaneously) |
key derivation function | função de derivação de chaves (A cryptographic function that generates key material from a secret value) |
key dictation | ditado de chave (The action by a Trusted Intermediary Agent of determining the key that will be used in an IPsec connection) |
key dictation | determinação da chave (The action by a Trusted Intermediary Agent of determining the key that will be used in an IPsec connection) |
Key Distribution Center | centro de distribuição de chaves (A network service that supplies session tickets and temporary session keys to users and computers within an Active Directory domain. The KDC runs on each domain controller as part of Active Directory Domain Services (AD DS)) |
Key Distribution Center | Centro de Distribuição de Chaves (A network service that supplies session tickets and temporary session keys to users and computers within an Active Directory domain. The KDC runs on each domain controller as part of Active Directory Domain Services (AD DS)) |
Key Distribution Center proxy service | serviço de proxy do centro de distribuição de chaves (A service that runs on corporate network edge servers to proxy Kerberos protocol messages to domain controllers which are situated on the corporate network. This permits Kerberos authentication to edge services such as Remote Desktop Services Gateway or DirectAccess Server) |
Key Distribution Center proxy service | serviço de proxy Centro de Distribuição de Chaves (A service that runs on corporate network edge servers to proxy Kerberos protocol messages to domain controllers which are situated on the corporate network. This permits Kerberos authentication to edge services such as Remote Desktop Services Gateway or DirectAccess Server) |
key drive | pen USB (A small device used to store information. USB flash drives plug into computer USB ports so you can copy information to or from them, making it easy to share and transport information) |
key escrow | caução de chaves (An approach to key recovery in which an encryption key is provided to a third party approved by a government agency so that any encrypted message can, if necessary, be decrypted and read by the government) |
key escrow | caução de chave (An approach to key recovery in which an encryption key is provided to a third party approved by a government agency so that any encrypted message can, if necessary, be decrypted and read by the government) |
key exchange | troca de chaves (Confidential exchange of secret keys online, which is commonly done with public key cryptography) |
key filter | filtro principal (A metadata column or field in a Key Filters control) |
key filter | filtro chave (A metadata column or field in a Key Filters control) |
Key Filters | Filtros Principais (A metadata navigation control that enables users to limit the items displayed in a list or library to those that match selected values) |
Key Filters | Filtros Chave (A metadata navigation control that enables users to limit the items displayed in a list or library to those that match selected values) |
key frame | quadro chave (A video frame in which starting and ending positions of an object are given, and all frames in between are interpolated by a computer to produce smooth automated animation. Most ray-traced computer animation is created using this technique) |
key frame | fotograma chave (A video frame in which starting and ending positions of an object are given, and all frames in between are interpolated by a computer to produce smooth automated animation. Most ray-traced computer animation is created using this technique) |
key generator | gerador de chaves (A hardware or software component that is used to generate encryption key material) |
key ID | identificação da chave (A value that identifies the key for a packaged Windows Media file) |
key ID | ID da chave (A value that identifies the key for a packaged Windows Media file) |
key index | índice de chave (The location where a specific network key for a wireless access point is stored) |
key index | índice de chaves (The location where a specific network key for a wireless access point is stored) |
key logger | keylogger (A type of malware that sends key strokes or screen shots to an attacker) |
Key Management Server | Servidor de Gerenciamento de Chaves (The Exchange computer on which the Key Management Service has been installed. There can be one Key Management Server per administrative group) |
Key Management Server | servidor de gestão de chaves (The Exchange computer on which the Key Management Service has been installed. There can be one Key Management Server per administrative group) |
Key Management Service | Serviço de Gerenciamento de Chaves (An optional Microsoft Exchange 2000 Server component that is installed on a designated server in an administrative group. It provides centralized administration and archival of private keys, and maintains every user s private encryption key in an encrypted database. The keys are used for encrypting e-mail messages and signing messages with digital signatures) |
Key Management Service | Serviço de Gestão de Chaves (A Windows role service installed on a KMS host to issue and validate volume software licenses to local computers, enabling individual computers on a network to validate their software licenses locally rather than with Microsoft) |
Key Master | Mestre de Chave (A DNS server role that is responsible for all DNSSEC key management for a specific DNSSEC-signed DNS zone. Different DNS zones can have different Key Masters. The Key Master role can be moved from one DNS server to a different DNS server, but a DNS zone can have only one Key Master at a given time. To be a Key Master, the DNS server must be authoritative for the DNS zone, the zone must be signed with DNSSEC, and the DNS server must be selected to be the Key Master for the DNS zone) |
Key Master | Mestre de Chaves (A DNS server role that is responsible for all DNSSEC key management for a specific DNSSEC-signed DNS zone. Different DNS zones can have different Key Masters. The Key Master role can be moved from one DNS server to a different DNS server, but a DNS zone can have only one Key Master at a given time. To be a Key Master, the DNS server must be authoritative for the DNS zone, the zone must be signed with DNSSEC, and the DNS server must be selected to be the Key Master for the DNS zone) |
Key Metrics | Métricas-chave (A tab in Application Diagnostics that provides an at-a-glance view of a selected application. The graph displays 1. the average performance based on the Monitored Requests counter, and 2. the number of requests. By looking at the graph, you can easily determine the traffic load and make inferences about problems that might be occurring) |
Key Metrics | métrica-chave (A tab in Application Diagnostics that provides an at-a-glance view of a selected application. The graph displays 1. the average performance based on the Monitored Requests counter, and 2. the number of requests. By looking at the graph, you can easily determine the traffic load and make inferences about problems that might be occurring) |
key pair | par de chaves (A private key and its related public key) |
key performance indicator | indicador chave de desempenho (A predefined measure that is used to track performance of a strategic goal, objective, plan, initiative, or business process. A KPI is evaluated against a target. An explicit and measurable value taken directly from a data source. Key performance indicators (KPIs) are used to measure performance in a specific area, for example, revenue per customer) |
Key press | Teclas (" An option in "ringtones & sounds" settings. When this option is selected, the phone makes a sound when buttons on the on-screen keypad or keyboard are tapped.") |
key protector | protetor de chave (A blob (binary large object) that is used to restrict access to a BitLocker-protected disk) |
key recovery | recuperação de chaves (The process of recovering a user's private key) |
key recovery | recuperação de chave (The process of recovering a user's private key) |
key risk indicator | indicador chave de risco (A quantifiable, standardized measurement of the risk of loss resulting from inadequate or failed business processes) |
key roaming | mobilidade de chave (The process of moving between different environments or computers while authenitcated by certificates or keys centrally stored on a server) |
key roaming | itinerância de chaves (The process of moving between different environments or computers while authenitcated by certificates or keys centrally stored on a server) |
key rollover | substituição de chave (The process by which an existing cryptographic key is replaced with a new cryptographic key and associated signatures are updated) |
key rollover | rollover de chave (The process by which an existing cryptographic key is replaced with a new cryptographic key and associated signatures are updated) |
key search attack | ataque de força bruta (An attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered) |
key search attack | ataque de pesquisa de chave (An attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered) |
key sequence | sequência de teclas (Any combination of keys that must be pressed sequentially) |
key-signing key | chave KSK (A public key corresponding to a private key that is used to sign one or more DNS record sets at the zone apex) |
key signing key | chave KSK (A public key corresponding to a private key that is used to sign one or more DNS record sets at the zone apex) |
key signing key | chave de assinatura de chave (A public key corresponding to a private key that is used to sign one or more DNS record sets at the zone apex) |
key spline | spline-chave (A graphical representation of the changes in a property value between two keyframes that animate the property) |
key-value pair | par chave-valor (A set of data items that contains a unique identifier, called a key, and a value that is the actual data for the key) |
license key pack | pacote de chaves de licença (A digital representation of one or more licenses) |
master key | chave mestra (The key used by the client and server for all session key generation. The master key is used to generate the client-read key, the client-write key, the server-read key, and the server-write key. Master keys can be exported as simple key BLOBs) |
meeting key | chave de reunião (A password that is required to join a meeting) |
memory key | pen USB (A small device used to store information. USB flash drives plug into computer USB ports so you can copy information to or from them, making it easy to share and transport information) |
Microsoft Exchange Key Management Server | Servidor de Gerenciamento de Chaves do Microsoft Exchange (The Exchange computer on which the Key Management Service has been installed. There can be one Key Management Server per administrative group) |
Microsoft Group Key Distribution Service | Serviço de Distribuição de Chave de Grupo da Microsoft (An Active Directory Domain Services service that provides cryptographic keys that correspond to arbitrary sets of security principals in AD DS to users who are authorized to access those keys) |
Microsoft Group Key Distribution Service | Serviço de Distribuição de Chaves de Grupo Microsoft (An Active Directory Domain Services service that provides cryptographic keys that correspond to arbitrary sets of security principals in AD DS to users who are authorized to access those keys) |
modifier key | tecla modificadora (A keyboard key that, when pressed (and held), changes the actions of ordinary input) |
multi-activation key | chave de ativação múltipla (A product key that is provided to Microsoft customers who choose a Microsoft Volume Licensing program for their organizations and that allows multiple installations of a particular product. The key is assigned to a company or institution intended for their sole use and only for distribution to employees or third parties who are authorized to install and distribute licenses pursuant to the terms of their license agreement) |
multiple activation key | chave de ativação múltipla (A volume license key that is used for one-time activation with activation services that are hosted by Microsoft) |
natural key | chave natural (A primary key or alternate key whose values identify objects in the real world) |
network key | chave de rede (A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key) |
network security key | chave de segurança de rede (A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key) |
PAGE DOWN key | tecla PAGE DOWN (" A keyboard key (often labeled "PgDn") that is often used to move the cursor down to the top of the next page or a specific number of lines. Its function may vary in different programs.") |
PAGE UP key | tecla PAGE UP (" A keyboard key (often labeled "PgUp") that is often used to move the cursor up to the top of the previous page or a specific number of lines. Its function may vary in different programs.") |
Pairwise Master Key | Chave PMK (A 256-bit key derived from the Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) or Protected EAP (PEAP) authentication process) |
Pairwise Master Key A 256-bit key derived from the Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) or Protected EAP (PEAP) authentication process | PMK (Pairwise Master Key) |
PIN unlock key | chave de desbloqueio do PIN (An 8-digit code used to unlock the SIM card. A Personal Unlocking Key is a type of personal identification number (PIN)) |
pound key | tecla de cerquilha (The character) |
predefined key | chave predefinida (A key that represents one of the main divisions of the registry. Each predefined key is displayed in a separate Registry Editor window, with the key's name appearing in the window's title bar. For example, HKEY_CLASSES_ROOT is a predefined key) |
presenter key | chave do apresentador (A meeting key that is used by meeting presenters) |
primary key | chave primária (One or more fields that uniquely identify each record in a table. In the same way that a license plate number identifies a car, the primary key uniquely identifies a record) |
primary key | chave primária (One or more fields that uniquely identify each record in a table. In the same way that a license plate number identifies a car, the primary key uniquely identifies a record) |
PRINT SCREEN key | tecla PRINT SCREEN (A key on IBM PC and compatible keyboards that normally causes the computer to send a character-based "picture" of the screen contents to the printer) |
private key | chave privada (The secret half of a cryptographic key pair that is used with a public key algorithm. Private keys are typically used to decrypt a symmetric session key, digitally sign data, or decrypt data that has been encrypted with the corresponding public key) |
private key | chave privada (The secret half of a cryptographic key pair that is used with a public key algorithm. Private keys are typically used to decrypt a symmetric session key, digitally sign data, or decrypt data that has been encrypted with the corresponding public key) |
product key A sequence of 25 letters and numbers. To activate some software, you must enter a product key during the activation process | chave do produto (Product Key) |
product key A sequence of 25 letters and numbers. To activate some software, you must enter a product key during the activation process | chave de produto (Product Key) |
product key card | cartão de chave de produto (A physical card on which a product key is printed) |
public key | chave pública (The nonsecret half of a cryptographic key pair that is used with a public key algorithm. Public keys are typically used when encrypting a session key, verifying a digital signature, or encrypting data that can be decrypted with the corresponding private key) |
public key | chave pública (The nonsecret half of a cryptographic key pair that is used with a public key algorithm. Public keys are typically used when encrypting a session key, verifying a digital signature, or encrypting data that can be decrypted with the corresponding private key) |
public key algorithm | algoritmo de chave pública (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message) |
Public Key Cryptography Standards | Public Key Cryptography Standards (A family of standards for public key cryptography that includes RSA encryption, Diffie-Hellman key agreement, password-based encryption, extended-syntax, cryptographic message syntax, private key information syntax, and certificate request syntax, as well as selected attributes. Developed, owned, and maintained by RSA Data Security, Inc) |
public key encryption | criptografia por chave pública (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
public key encryption | encriptação de chave pública (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
public key infrastructure | infraestrutura de chaves públicas (The laws, policies, standards, and software that regulate or manipulate certificates and public and private keys. In practice, it is a system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in an electronic transaction. Standards for PKI are still evolving, even though they are being widely implemented as a necessary element of electronic commerce) |
public key infrastructure | infraestrutura de chave pública (The laws, policies, standards, and software that regulate or manipulate certificates and public and private keys. In practice, it is a system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in an electronic transaction. Standards for PKI are still evolving, even though they are being widely implemented as a necessary element of electronic commerce) |
public key infrastructure hierarchy | hierarquia de infraestrutura de chave pública (A hierarchy in which the roles of the certification authority are separated into one root CA and one or more subordinate CAs) |
public key infrastructure hierarchy | hierarquia de infraestrutura de chaves públicas (A hierarchy in which the roles of the certification authority are separated into one root CA and one or more subordinate CAs) |
recovery key | chave de recuperação (A key that is used for recovering data that is encrypted on a BitLocker volume. This key is cryptographically equivalent to a startup key. If available, the recovery key decrypts the volume master key, which in turn decrypts the full volume encryption key. The recovery key is stored on a USB flash drive. To use the recovery key, a user inserts the USB flash drive and then restarts the computer) |
registry key | chave do Registro (An identifier for a record or group of records in the registry) |
registry key | chave do Registo (An identifier for a record or group of records in the registry) |
Release key | combinação de teclas de liberação (The key combination (Ctrl+Alt+Left arrow key by default) that must be pressed to move keyboard and mouse focus from a guest operating system back to the physical computer) |
replica key | chave da réplica (A 4-byte value that maps to a replica ID in a replica key map) |
resume key | chave de retomada (A key supplied by the SMB client that allows the system to reference the handle during a resume operation after a failover) |
resume key | chave de retoma (A key supplied by the SMB client that allows the system to reference the handle during a resume operation after a failover) |
retail key | chave comercial (A type of product key required during the installation of Windows) |
retail key | chave de produto para instalação individual (A type of product key required during the installation of Windows) |
SCROLL LOCK key | tecla SCROLL LOCK (On the IBM PC/XT and AT and compatible keyboards, a key on the top row of the numeric keypad that controls the effect of the cursor control keys and sometimes prevents the screen from scrolling. On the enhanced and Macintosh keyboards, this key is to the right of the function keys on the top row. Many modern applications ignore the Scroll Lock setting) |
search key | termo de pesquisa (The value that is to be searched for in a document or any collection of data) |
search key | chave de pesquisa (The value that is to be searched for in a document or any collection of data) |
secret key | chave secreta (A symmetric encryption key shared by two entities, such as between a user and the domain controller (DC), with a long lifetime. A password is a common example of a secret key. When used in a context that implies Kerberos only, a principal's secret key) |
secret key encryption | criptografia de chave secreta (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data) |
secret key encryption | encriptação por chave secreta (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data) |
session key | chave da sessão (The key used for encrypting data during a communication session) |
session key | chave de sessão (The key used for encrypting data during a communication session) |
SHIFT key | tecla SHIFT (A keyboard key that, when pressed in combination with another key, gives that key an alternative meaning, for example, producing an uppercase character when a letter key is pressed. The SHIFT key is also used in various key combinations to create nonstandard characters or to perform special operations) |
shortcut key | tecla de atalho (Any combination of keys that must be pressed simultaneously) |
soft key | tecla (" One of the two unlabeled keys located just below the display area on a mobile phone. These keys are called "soft" because their functions change to fit the context. Labels in the lower part of the mobile screen tell users what the soft keys do.") |
soft key | tecla de função (" One of the two unlabeled keys located just below the display area on a mobile phone. These keys are called "soft" because their functions change to fit the context. Labels in the lower part of the mobile screen tell users what the soft keys do.") |
speed dial key | tecla de discagem rápida (A single- or double-digit number associated with telephone numbers, or e-mail or Web addresses, that enables users to quickly access the numbers or addresses) |
speed dial key | tecla de marcação rápida (A single- or double-digit number associated with telephone numbers, or e-mail or Web addresses, that enables users to quickly access the numbers or addresses) |
startup key | chave de inicialização (A key that is stored on a USB flash drive that must be inserted each time the computer starts) |
startup key | chave de arranque (A key that is stored on a USB flash drive that must be inserted each time the computer starts) |
storage access key | chave de acesso de armazenamento (A value that is unique to a storage account and that can be used to connect to the storage account from code running in a Windows Azure cloud service, locally on a developer's machine, or anywhere else that has Internet connectivity) |
storage root key | chave raiz de armazenamento (On a system that incorporates a TPM, a cryptographic asymmetric key which is created at the root of the TPM key hierarchy (2048-bit RSA key) and which is used by the TPM to store protected data. The private portion of this key never leaves the TPM. The public part of this key is returned to the owner and needs to be carefully guarded since it uniquely identifies the TPM on the network, therefore is privacy sensitive) |
storage root key On a system that incorporates a TPM, a cryptographic asymmetric key which is created at the root of the TPM key hierarchy (2048-bit RSA key) and which is used by the TPM to store protected data. The private portion of this key never leaves the TPM. The public part of this key is returned to the owner and needs to be carefully guarded since it uniquely identifies the TPM on the network, therefore is privacy sensitive | SRK (Storage Root Key) |
subject key identifier | identificador de chave da entidade (A certificate extension that contains a hash of the certification authority's certificate public key. This hash is placed in the Authority Key Identifier (AKI) extension of all issued certificates to facilitate chain building) |
subject key identifier | identificador de chave do requerente (A certificate extension that contains a hash of the certification authority's certificate public key. This hash is placed in the Authority Key Identifier (AKI) extension of all issued certificates to facilitate chain building) |
surrogate key | chave alternativa (A single attribute candidate key whose values are system-generated and that does not represent properties that identify objects in the real world) |
symmetric key | chave simétrica (The cryptographic key used to both encrypt and decrypt protected content during publishing and consumption) |
symmetric-key cryptography | criptografia de chave simétrica (A type of cryptography that uses symmetric keys to provide confidentiality) |
symmetric-key cryptography | criptografia de chaves simétricas (A type of cryptography that uses symmetric keys to provide confidentiality) |
TAB key | tecla TAB (A keyboard key, often labeled with both a left-pointing and a right-pointing arrow, that traditionally (as in word processing) is used to insert tab characters into a document. In other applications, such as menu-driven programs, the TAB key is often used to move the on-screen highlight from place to place) |
TAB key | tecla de tabulação (A keyboard key, often labeled with both a left-pointing and a right-pointing arrow, that traditionally (as in word processing) is used to insert tab characters into a document. In other applications, such as menu-driven programs, the TAB key is often used to move the on-screen highlight from place to place) |
toggle key | tecla de alternância (A keyboard key that alternates between turning a particular operation, function, or mode on or off) |
toggle key | tecla de mudança de modo (A keyboard key that alternates between turning a particular operation, function, or mode on or off) |
trusted root key | chave de raiz confiável (An encryption key used in Configuration Manager to help clients identify valid management points) |
trusted root key | chave de raiz fidedigna (An encryption key used in Configuration Manager to help clients identify valid management points) |
virtual key code | código de tecla virtual (A symbolic constant name, hexadecimal value, or mouse or keyboard equivalent that provides a hardware and language-independent method of identifying keyboard keys. Each virtual key code represents a unique keyboard key and also identifies the purpose of that key. The keyboard driver must provide one or more keyboard layouts that maps keyboard scan codes to the appropriate virtual key codes) |
volume license key | chave de licença de volume (A product key that is provided to Microsoft customers who choose a Microsoft Volume Licensing program for their organizations and that allows multiple installations of a particular product. The key is assigned to a company or institution intended for their sole use and only for distribution to employees or third parties who are authorized to install and distribute licenses pursuant to the terms of their license agreement) |
volume license key | chave de licenciamento em volume (A product key that is provided to Microsoft customers who choose a Microsoft Volume Licensing program for their organizations and that allows multiple installations of a particular product. The key is assigned to a company or institution intended for their sole use and only for distribution to employees or third parties who are authorized to install and distribute licenses pursuant to the terms of their license agreement) |
volume license product key | chave de licença de volume do produto (A product key that is provided to Microsoft customers who choose a Microsoft Volume Licensing program for their organizations and that allows multiple installations of a particular product. The key is assigned to a company or institution intended for their sole use and only for distribution to employees or third parties who are authorized to install and distribute licenses pursuant to the terms of their license agreement) |
volume license product key | chave de produto de licenciamento em volume de 25 carateres (A product key that is provided to Microsoft customers who choose a Microsoft Volume Licensing program for their organizations and that allows multiple installations of a particular product. The key is assigned to a company or institution intended for their sole use and only for distribution to employees or third parties who are authorized to install and distribute licenses pursuant to the terms of their license agreement) |
volume master key | chave mestra de volume (An advanced encryption standard (AES) 256-bit key that is used by BitLocker Drive Encryption to encrypt the full volume encryption key. There is only one volume master key per volume) |
Windows key | tecla Windows (A modifier key with the Windows logo on it. This key is used for a number of Windows shortcuts, and is reserved for Windows use. For example, pressing the Windows logo key displays or hides the Windows Start menu) |
Windows logo key | tecla do logotipo do Windows (A modifier key with the Windows logo on it. This key is used for a number of Windows shortcuts, and is reserved for Windows use. For example, pressing the Windows logo key displays or hides the Windows Start menu) |
Windows logo key | tecla do logótipo do Windows (A modifier key with the Windows logo on it. This key is used for a number of Windows shortcuts, and is reserved for Windows use. For example, pressing the Windows logo key displays or hides the Windows Start menu) |
zone signing key | chave ZSK (A public key corresponding to a private key that is used to sign one or more DNS record sets within a zone, below the zone apex) |
zone signing key | chave de assinatura de zona (A public key corresponding to a private key that is used to sign one or more DNS record sets within a zone, below the zone apex) |
zone-signing key | chave ZSK (A public key corresponding to a private key that is used to sign one or more DNS record sets within a zone, below the zone apex) |