Spanish | English |
acceso a Buscar | Search charm (A user interface element that provides access to search in apps or on the PC) |
acceso a Compartir | Share charm (A user interface element that provides access to sharing files and info with other apps) |
acceso a Configuración | Settings charm (A user interface element that provides access to PC and app settings) |
acceso a controlador personalizado | custom driver access (Device IO Control to 3rd party driver, a form of restricted device interface access for privileged apps) |
acceso a datos remotos | remote data access (A service that provides a simple way for a smart device application to access (pull) and send (push) data to and from a remote SQL Server database table and a local SQL Server Mobile Edition database table. RDA can also be used to issue SQL commands on a server running SQL Server) |
acceso a Dispositivos | Devices charm (A user interface element that provides access to external devices like media players or printers) |
acceso a información de entidad emisora | authority information access (A certificate extension that contains information useful for verifying the trust status of a certificate, as defined by the 2008 Memo of the Network Working Group. This information potentially includes Uniform Resource Locations (URLs) where the issuing CA's certificate can be retrieved, as well as a location of an Online Certificate Status Protocol (OCSP) responder configured to provide status for the certificate in question) |
acceso a Inicio | Start charm (The charm that takes users to the Start screen) |
acceso a Internet | Internet access (The capability of a user to connect to the Internet) |
acceso a memoria no uniforme | non-uniform memory access (Access by a CPU of local as well as foreign memory. This process, which is enabled by NUMA architecture, results in different access speeds) |
acceso a nivel de campo | field-level access (The permission that is assigned to a user or users that allow them to read, update, or create a specific field) |
acceso anónimo | Anonymous access (An authentication mechanism that does not require user accounts and passwords) |
acceso autenticado | authenticated access (A user access option that you specify at the default Web site level or Application level in IIS. Authenticated access requires a user to have a valid account and password to access the site) |
acceso de administrador | custodian access (The highest level of access) |
acceso de cliente | client access (The ability of client computers to connect to a server or resource, for example, a file on a server or a cluster resource) |
acceso de escritura | write access (A privilege on a computer system that allows a user to save, change, or delete stored data. Write access is usually set by the system administrator for a networked or server system and by the owner of the computer for a stand-alone machine) |
acceso de invitado | guest access (A type of access that allows visitors to use their own desktop computers on limited resources (such as the Internet or LAN printers) without compromising a company's internal network security) |
acceso de lectura | read access (A privilege on a computer system that allows a user to read stored data) |
acceso de usuario anónimo | anonymous user access (The ability to gain access to a Web server on which one does not have an account) |
Acceso desde cualquier lugar | Anywhere Access (A collection of product and platform remote access technologies that enable users anywhere on the Internet to access information located behind the corporate firewall) |
acceso directo | shortcut (A link to any item accessible on your computer or on a network, such as a program or application, file, folder, disk drive, printer, or another computer. You can put shortcuts in various areas, such as on the desktop, on the Start menu, or in specific folders) |
acceso directo | direct access (The ability of a computer to find and go directly to a particular storage location without having to search sequentially from the beginning location. The human equivalent of random access would be the ability to find a desired address in an address book without having to proceed sequentially through all the addresses. A computer's semiconductor memory (both RAM and ROM) provides random access. Certain types of files stored on disk under some operating systems also allow random access. Such files are best used for data in which each record has no intrinsic relationship to what comes physically before or after it, as in a client list or an inventory) |
acceso directo a memoria | direct memory access (A technology that allows certain devices, such as hard disks and CD or DVD drives, to transfer information directly through the computer's memory without using the computer's processor. DMA improves the performance of the device and frees the computer's processor so it can perform other tasks) |
acceso directo a memoria de dispersión o recopilación | scatter/gather direct memory access (A form of direct memory access (DMA) in which data is transferred to and from noncontiguous ranges of physical memory) |
acceso directo a memoria remota | Remote Direct Memory Access (A networking feature that lets one computer directly place information into the memory of another computer) |
acceso directo a voz | voice shortcut (A voice command that can be executed by the user at any time and performs an action that typically saves a lot of clicks) |
acceso en banda | in-band access (Access to host via a connection that does use the IP Network) |
acceso externo | external access (Authenticated access that can be granted to external partners and clients to enable sharing of selected SharePoint Online content) |
acceso fuera de banda | out-of-band access (Access to host via a connection that doesn't use the IP network) |
acceso multiproceso no sincronizado | multithreaded unsynchronized access (The operation in which two or more threads attempt to call simultaneously into the heap) |
Acceso protegido Wi-Fi 2 | Wi-Fi Protected Access 2 (A wireless implementation and the second generation of WPA security that is based on the final IEEE 802.11i amendment to the 802.11 standard) |
Acceso protegido Wi-Fi | Wi-Fi Protected Access (A security method used by wireless networks. WPA encrypts the information that is sent between computers on a wireless network and authenticates users to help ensure that only authorized people can access the network) |
acceso redirigido | redirected access (Functionality that redirects all I/O operations over the network to another node that has access to the required drive) |
acceso remoto | remote access (Part of the integrated Routing and Remote Access service that provides remote networking for telecommuters, mobile workers, and system administrators who monitor and manage servers at multiple branch offices. Users can use Network Connections to dial in to remotely access their networks for services such as file and printer sharing, electronic mail, scheduling, and SQL database access) |
acceso remoto | remote access (Part of the integrated Routing and Remote Access service that provides remote networking for telecommuters, mobile workers, and system administrators who monitor and manage servers at multiple branch offices. Users can use Network Connections to dial in to remotely access their networks for services such as file and printer sharing, electronic mail, scheduling, and SQL database access) |
Acceso rápido | Quick Path (A control that provides the essential user interface needed for a task, making the interaction straightforward. This feature shows only the most most relevant and most often used information options in a simple format) |
Acceso rápido a Exchange | Exchange Fast Access (A feature that enables Exchange users to see new email messages and up-to-date calendar items as soon as they open Outlook, without waiting for it to finish synchronizing) |
acceso telefónico a redes | dial-up networking (Connecting to other computers or to the Internet by using a modem and a telephone line) |
Acceso telefónico a redes | DUN (A Windows CE-based application that enables remote users to connect to a network) |
Acceso telefónico a redes | Dial-Up Networking (A Windows CE-based application that enables remote users to connect to a network) |
acceso total | full access (A privilege on a computer system that allows a user to read, write, and delete data) |
Administración de niveles de acceso | Access Levels Management (A UI element that displays a user's contacts and access level entries (ACEs) organized by access level) |
API de acceso a dispositivos | Device Access API (A set of COM interfaces that a device companion app can use to send requests, to a specialized device, synchronously or asynchronously) |
asignación alternativa de acceso | alternate access mapping (An alternate URL mapping that Windows SharePoint Services preserves in the mapping table. It is the URL a user would see, but is not a URL that IIS would give to WSS) |
asistencia para acceso denegado | access-denied assistance (" Assistance provided to users who receive an "access denied" error while attempting to access a file or folder on a file server for which access-denied assistance has been enabled by the administrator of the server.") |
barra de acceso | access bar (A toolbar that docks to the desktop, similar to the taskbar) |
Barra de herramientas de acceso rápido | Quick Access Toolbar (A customizable toolbar that provides one-click access to commands) |
Cambiar nivel de acceso | Change Level of Access (Contact context menu item that allows the user to assign an access level to the selected contact(s)) |
clave de acceso de almacenamiento | storage access key (A value that is unique to a storage account and that can be used to connect to the storage account from code running in a Windows Azure cloud service, locally on a developer's machine, or anywhere else that has Internet connectivity) |
conexión de acceso telefónico | dial-up connection (A connection to other computers or to the Internet using a device that uses the telephone network) |
conferencia de acceso telefónico local | dial-in conferencing (A feature that merges public switched telephone network (PSTN) and Voice over IP (VoIP) conferences, which allows participants to dial in to a conference from anywhere as an authenticated user without having to be on the corporate network. Typically, a local number is provided to avoid long-distance fees) |
Configuración de acceso web a RemoteApp y Escritorio | RemoteApp and Desktop Web Access Configuration (An option on the Remote Desktop Services menu on the Administrative Tools menu that opens the RAD Web Access Web site for administrative purposes) |
Configuración de Acceso web de Escritorio remoto | Remote Desktop Web Access Configuration (In Remote Desktop Services, the site where you can configure the RD Web Access Web Part) |
Configuración del acceso web RAD | RAD Web Access Configuration (An option on the Remote Desktop Services menu on the Administrative Tools menu that opens the RAD Web Access Web site for administrative purposes) |
control de acceso | access control (A security mechanism that determines which operations a user, group, service, or computer is authorized to perform on a computer or on a particular object, such as a file, printer, registry subkey, or directory service object) |
control de acceso dinámico | dynamic access control (The ability for IT pros to define how users access a system based on dynamic qualities, such as a user's location or role) |
cuenta de acceso | access account (An account used to crawl Web sites, servers and network resources included in a content index) |
cuenta de acceso al contenido | content access account (An account used to crawl Web sites, servers and network resources included in a content index) |
código de acceso | access code (A string of characters entered by a user to verify his or her identity to a network or to a local computer, device, or client, or to sign in to an account, app, and so on) |
código de acceso | passcode (An authentication credential similar to a password, consisting of numbers) |
código de acceso a línea externa | outside line access code (The prefix that is used to access an outside line. In the United States, this prefix is typically 9) |
código de acceso de emergencia | emergency access code (An emergency access code is a set of letters and numbers that can be included on your emergency profile wallet card or sheet) |
código de acceso internacional | international access code (The prefix that is used to direct a call internationally. The International Access Code is 011 in the United States and 00 in much of the rest of the world) |
derechos de acceso | access rights (The type of operations permitted for a given user of a certain system resource on a network or a file server) |
descriptor de acceso | accessor (A data structure or group of structures created by the consumer that describes how row or parameter data from the data store is to be laid out in the consumer's data buffer, enabling providers to optimize access. An accessor is a collection of bindings) |
directiva de acceso | access policy (A policy which defines the permissions and duration of access to an asset) |
directiva de acceso central | central access policæ (An access policy that allows organizations to centrally deploy and manage authorization policies that include conditional expressions using user groups, user claims, device claims, and resource properties) |
directiva de seguridad de acceso al código | code access security CAS policy A set of rules that defines security permissions for a collection of assemblies by associating attributes of those assemblies, such as location and signature, with a set of code access security permissions (CAS) |
entrada de control de acceso | access control entry (An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object) |
enumeración basada en el acceso | access-based enumeration (A feature that displays only the files and folders that a user has permissions to access) |
equipo de acceso compartido | shared access computer (A computer in a public environment that is accessed by several different users on a daily basis) |
expresión de ruta de acceso personalizada | custom path expression (When data binding to a CLR data source or another object, a data path or binding expression that is hand-edited) |
Firma de acceso compartido | Shared Access Signature (A URL that grants access rights to containers, blobs, queues, and tables) |
Id. de acceso, Id. de inicio de sesión | login ID (" A string that is used to identify a user or entity to an operating system, directory service, or distributed system. For example, in Windows® integrated authentication, a login name uses the form "DOMAIN\username.") |
infracción de acceso | access violation (An attempt to run a memory operation that the underlying page protection does not allow. An access violation applies to memory operations, but does not apply when the security manager checks user-mode access rights to objects) |
licencia de acceso de cliente para Servicios de Escritorio remoto | Remote Desktop Services client access license (A license that is required for a user or a device to connect to a remote desktop server) |
licencia de acceso de cliente por dispositivo para Servicios de Escritorio remoto | Remote Desktop Services Per Device client access license (One of the two types of Remote Desktop Services client access licenses (RDS CALs) that permits one device (used by any user) to connect to a remote desktop server) |
licencia de acceso de cliente por usuario para Servicios de Escritorio remoto | Remote Desktop Services Per User client access license (One of the two types of Remote Desktop Services client access licenses (RDS CALs) that permits one user to access remote desktop servers from an unlimited number of client computers or devices) |
lista de acceso a la publicación | publication access list (The primary mechanism for securing the Publisher. It contains a list of logins, accounts, and groups that are granted access to the publication) |
Lista de accesos directos | Jump List (A feature of Windows that provide right-click access from taskbar program buttons to the documents, pictures, songs, or websites a user frequently accesses) |
lista de accesos permitidos | homework list (A list of apps and websites of any type that a parent chooses which a child can use at any time and for as long as necessary outside of curfew hours) |
lista de control de acceso | access control list (In Windows-based systems, a list of access control entries (ACE) that apply to an entire object, a set of the object's properties, or an individual property of an object, and that define the access granted to one or more security principals) |
lista de control de acceso del sistema | system access control list (An ACL that controls the generation of audit messages for attempts to access a securable object. The ability to get or set an object's SACL is controlled by a privilege typically held only by system administrators) |
lista de control de acceso discrecional | discretionary access control list An access control list that is controlled by the owner of an object and that specifies the access particular users or groups can have to the object (DACL) |
memoria de acceso aleatorio | random access memory (The temporary storage area the computer uses to run programs and store data. Information stored in RAM is temporary and is designed to be erased when the computer is turned off) |
Microsoft Dynamics CRM para Microsoft Office Outlook con acceso sin conexión | Microsoft Dynamics CRM for Microsoft Office Outlook with Offline Access (The laptop client version of the Microsoft Dynamics CRM product suite for Microsoft Office Outlook) |
Modelo de acceso a dispositivo especializado | Specialized Device Access Model (The model that describes the two ways that a Windows Store app can access a specialized device: Open Access Model and Restricted Device Access Model) |
Modelo de acceso abierto a dispositivo | Open Device Access Model (The access model for horizontal solutions, which enables a horizontal strategy. Open Device Access enables many different Windows Store apps to access a specialized device. Examples: a smartphone with multiple apps that synchronize contacts; a pedometer that allows multiple apps to read its data and post it to a website) |
Modelo de acceso restringido a dispositivo | Restricted Device Access Model (The device access model for vertical solutions. Restricted Device Access does not allow other applications to access a specialized device) |
máscara de acceso | access mask (In Windows-based computers, a 32-bit value (a bitmask) that specifies the permissions that are assigned in an access control entry (ACE). An access mask is also part of the access request when an object is opened. The access mask in the request is compared to the access mask in each ACE to determine whether or not to grant the request) |
método de acceso secuencial indizado | indexed sequential access method (A technique for indexing database records that allows sequential or random access of records. When records are accessed sequentially they are accessed in the order in which they were entered in the database, and when records are accessed randomly, the records are accessed through an index) |
nivel de acceso | access level (A security role setting that determines for a given object type at which levels within the organization hierarchy a user can act on that object type) |
Nombre de punto de acceso | Access Point Name (A field in the Properties dialog box for GPRS installation items in the Mobile Deployment Manager MMC snap-in that enables the user to specify the wireless access point for the device) |
número de acceso del suscriptor | subscriber access number (A number that is configured in a Private Branch eXchange (PBX) that allows a subscriber to access their Microsoft Exchange mailbox over the telephone) |
número de acceso telefónico de mensajería unificada | UM access telephone number (A telephone number that points to a hunt group and is the access number for calls that are routed to Unified Messaging servers) |
objetos de acceso a datos | Data Access Objects (A programming interface to access and manipulate database objects) |
obtener acceso | access (To gain entry to memory in order to read or write data) |
perfil de acceso al campo | field access profile (The set of field-level access permissions that have been granted to a user or users) |
permisos de acceso | access permissions (Authorization to perform operations associated with a specific shared resource, such as a file, directory, or printer. Permissions must be granted by the system administrator to individual user accounts or administrative groups) |
Principios para el acceso a la información y para la comprobación de documentos digitales | Principles for the data access and the testability of digital documents (A German law that requires tax authorities to be capable of digitally checking data from electronic bookkeeping systems) |
privilegios de acceso | access privileges (The type of operations permitted for a given user of a certain system resource on a network or a file server) |
Protección de acceso a redes | Network Access Protection (A set of operating system components that can help protect access to a private network by enforcing health policies. System administrators establish health policies which NAP enforces by inspecting and assessing the health of client computers, restricting network access when client computers are deemed noncompliant, and remediating noncompliant client computers for full network access. NAP also provides ongoing health compliance enforcement while a client computer is connected to a network) |
Protocolo de acceso a mensajes de Internet | Internet Message Access Protocol (A method computers use to send and receive e-mail messages. It allows you to access e-mail without downloading it to your computer) |
Protocolo de acceso a mensajes de Internet | Internet Message Access Protocol 4 A standard client/server protocol for receiving e-mail. The user (or the user's e-mail client) can view just the heading and the sender of the letter and then decide whether to download the mail (IMAP4) |
Protocolo de acceso implícito | Digest Access protocol (A lightweight authentication protocol for parties involved in communications that are based on Hypertext Transfer Protocol (HTTP) or Simple Authentication and Security Layer (SASL)) |
protocolo ligero de acceso a directorios | Lightweight Directory Access Protocol (The primary access protocol for Active Directory. LDAP is an industry-standard protocol, established by the Internet Engineering Task Force (IETF), that allows users to query and update information in a directory service. Active Directory supports both LDAP version 2 and LDAP version 3) |
Protocolo simple de acceso a objetos | Simple Object Access Protocol A simple, XML-based protocol for exchanging structured data and type information on the World Wide Web. The protocol is currently the de facto standard for XML messaging (SOAP) |
proveedor de acceso | access provider (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers) |
proveedor de acceso a Internet | Internet service provider (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers) |
proveedor de acceso a Internet | Internet access provider (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers) |
punto de acceso | access point (A device used to connect wireless computers and other wireless devices to a wired network) |
punto de acceso cliente | client access point (In SMS 2003 and earlier releases, an SMS site system that provides a communication point between the SMS site server and Legacy Client computers. Legacy Clients deliver their collected files, inventory information, discovery data records, software metering data, and status information to CAPs) |
punto de acceso inalámbrico compatible con 802.1X | 802.1X-capable wireless access point (A network access server that adheres to both the Institute of Electrical and Electronics Engineers (IEEE) 802.1X and the Remote Authentication Dial-in User Service (RADIUS) standards, and that is deployed in networks to enforce 802.1X authenticated IEEE 802.3 wired Ethernet access) |
página de acceso a datos | data access page (A Web page, published from Access, that has a connection to a database. In a data access page, you can view, add to, edit, and manipulate the data stored in the database) |
redireccionamiento de servidor de acceso de cliente | Client Access server redirection (A process by which Outlook Web Access users who access an Internet-facing Client Access server that is in a different Active Directory site than the site that contains their mailbox can be redirected to the Client Access server that is in the same site as their Mailbox server if that Client Access server is Internet-facing) |
Registro de acceso de usuarios | User Access Logging (A logging feature that gathers unique client records and events for later retrieval by an administrator using WMI or PowerShell) |
regla de ruta de acceso a sitio | site path rule (A rule for a specific part of a site that includes or excludes content from the content index) |
rol de control de acceso basado en roles | role-based access control role (The user role that is assigned to a user account, which determines the options that are visible to that user and the tasks that the user can perform in the management interface for Exchange Labs) |
rol de servidor Acceso de clientes | Client Access server role (A set of components and services that enable users to access their Exchange mailboxes through the application Outlook Web Access and the protocols Exchange ActiveSync, Post Office Protocol version 3 (POP3), and Internet Message Access Protocol 4rev1 (IMAP4). The Client Access server role also includes Web services that are used by other Exchange 2007 server roles) |
ruta de acceso | path (A sequence of folders (directories) that leads to a specific file or folder. A backslash is used to separate each folder in the path. For example, the path to a file called invoice.txt might be C:\Documents\July\invoice.txt) |
ruta de acceso a la tarea | task path (A series of tasks that includes the predecessors and successors to the task that is selected) |
ruta de acceso absoluta | absolute path (A path to a file that begins with the drive identifier and root directory or with a network share and ends with the complete file name (for example, C:\docs\work\contract.txt or \\netshare\docs\work\contract.txt)) |
ruta de acceso al vínculo | link path (The descriptive form, or explicit connecting points, of referring to the location of a link source) |
ruta de acceso canónica | canonical path (The definitive path for navigating to a category or product that is a member of more than one category. The primary parent category determines the canonical path to a category or product) |
ruta de acceso completa | fully qualified path (A path to a file that begins with the drive identifier and root directory or with a network share and ends with the complete file name (for example, C:\docs\work\contract.txt or \\netshare\docs\work\contract.txt)) |
ruta de acceso completa | full path (In a hierarchical filing system, a path name containing all the possible components of a pathname, including the network share or drive and root directory, as well as any subdirectories and the file or object name) |
ruta de acceso de host | host path (A sequence of host group names that specifies the location of a virtual machine host or host group within the hierarchy of host groups. All host paths begin with the root host group, Managed Computers) |
ruta de acceso del objeto | object path (A formatted string used to access namespaces, classes, and instances. Each object on the system has a unique path that identifies it locally or over the network. Object paths are conceptually similar to Universal Resource Locators (URL)) |
ruta de acceso del recurso compartido | share path (The full name of a resource on a network in the format \\servername\sharename, which can include a directory path under the share name) |
ruta de acceso física | physical path (The physical location of a directory or file. May be either a path on the local computer or a universal naming convention (UNC) path on a remote computer) |
ruta de acceso raíz | rooted path (A sequence of folders (directories) that begins with a drive letter and colon (for example, C:) or a directory separator character (\) and leads to a specific file or folder) |
ruta de acceso relativa | relative path (A path that is implied by the current working directory. When a user enters a command that refers to a file, if the full pathname is not entered, the current working directory becomes the relative path of the file referred to) |
ruta de acceso UNC | Universal Naming Convention path (The standard path to access network shares) |
ruta de acceso UNC | UNC path (The standard path to access network shares) |
ruta de acceso virtual | virtual path (A sequence of names that is used to locate a file and that has the same form as a pathname in the file system but is not necessarily the actual sequence of directory names under which the file is located. The part of a URL that follows the server name is a virtual path. For example, if the directory c:\bar\sinister\forces\distance on the server miles is shared on the local area network at foo.com under the name \\miles\baz and contains the file elena.html, that file may be returned by a Web request for http://miles.foo.com/baz/elena.html) |
seguridad de acceso del código | code access security (A mechanism provided by the common language runtime whereby managed code is granted permissions by security policy and these permissions are enforced, helping to limit the operations that the code will be allowed to perform) |
servicio de acceso a datos de System Center | System Center Data Access service (A Windows service that runs on the management servers in each management group, and that allows client applications to access Operations Manager data and functionality) |
servicio perimetral de acceso | Access Edge service (A service that runs on Lync Server that resides in the perimeter network and routes instant messaging (IM) and presence information from external users to internal users) |
Servidor de acceso a datos | Data Access Server (A component that receives events from the MOM Servers and inserts them into the database. Requests for data from the database and requests to insert data into the database typically go through the DAS) |
servidor de acceso a la red | network access server (The device that accepts Point-to-Point Protocol (PPP) connections and places clients on the network that the NAS serves) |
servidor de acceso de cliente | Client Access server (A set of components and services that enable users to access their Exchange mailboxes through the Outlook Web Access application) |
Servidor perimetral de acceso | Access Edge Server (A service that runs on Lync Server that resides in the perimeter network and routes instant messaging (IM) and presence information from external users to internal users) |
Sistema de acceso de teclado | Keyboard Access System (A set of accelerator keys with associated icons) |
Solicitudes de acceso a sitios web | Website requests (The tab on the Family Safety website that displays requests a child has made via e-mail to view a blocked website) |
tecla de acceso | access key (Any combination of keys that must be pressed sequentially) |
tiempo de acceso a disco | disk access time (The time needed for a read/write head in a disk drive to locate a track on a disk. Access time is usually measured in milliseconds and is used as a performance measure for hard disks and CD-ROM drives) |
token de acceso | access token (A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority) |
token de acceso combinado | split access token (A combination of full access token and filtered access token linked together by the local security authority (LSA) component of the operating system) |
token de acceso completo | full access token (An access token with the maximum privileges authorized for the account. Used by User Account Control (UAC)) |
token de acceso con privilegios completos | full privilege access token (An access token with the maximum privileges authorized for the account. Used by User Account Control (UAC)) |
token de acceso de baja integridad | low integrity access token (A filtered access token that is created with a low integrity level. This access token is used by Internet Explorer Protected Mode, but can also be used by other applications) |
token de acceso del proceso | process access token (A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority) |
token de acceso filtrado | filtered access token (An access token with the least administrative privileges required for the session. It is a restricted access token where all elevated privileges have been filtered out. A filtered access token is created by default for all interactive users that are not standard users, except the built-in administrator) |
token de acceso restringido | restricted access token (An access token with restricted access to securable objects or performing privileged tasks) |
token de acceso UAC | UAC access token (An access token with the least administrative privileges required for the session. It is a restricted access token where all elevated privileges have been filtered out. A filtered access token is created by default for all interactive users that are not standard users, except the built-in administrator) |
trampilla de acceso a la lámpara | lamp access door (The metal door in the I/O connections area that you must remove to access the lamp assembly) |
troyano de acceso remoto | remote access Trojan (A type of Trojan that provides remote access to a computer) |
URL de acceso público | public-facing URL (A URL that is directly accessible over the Internet and that does not require special credentials or network access to connect to it) |
Vista Administración del control de acceso | Access Control Entry Management View (A feature that allows the user to set access levels for a group of contacts) |
Vista Administración del control de acceso | ACE Management View (A feature that allows the user to set access levels for a group of contacts) |
vista Ruta de acceso activa | Hot Path view (The Profiler Performance Report view that helps to automate the process of locating a performance bottleneck) |