DictionaryForumContacts

   English
Terms for subject Microsoft containing access | all forms | exact matches only
EnglishKinyarwanda
access codekodi yo kwinjira (A string of characters entered by a user to verify his or her identity to a network or to a local computer, device, or client, or to sign in to an account, app, and so on)
access control listilisiti igenzura kwinjira (In Windows-based systems, a list of access control entries (ACE) that apply to an entire object, a set of the object's properties, or an individual property of an object, and that define the access granted to one or more security principals)
access keybuto y'ibusamo (Any combination of keys that must be pressed sequentially)
access permissionsimpushya zo kwinjira (Authorization to perform operations associated with a specific shared resource, such as a file, directory, or printer. Permissions must be granted by the system administrator to individual user accounts or administrative groups)
access pointaho binjirira (A device used to connect wireless computers and other wireless devices to a wired network)
access providermutanga kwinjira (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers)
access violationkwica amategeko agenga ikoresha (An attempt to run a memory operation that the underlying page protection does not allow. An access violation applies to memory operations, but does not apply when the security manager checks user-mode access rights to objects)
authority information accessUburenganzira bwo kugera ku makuru nyemeza (A certificate extension that contains information useful for verifying the trust status of a certificate, as defined by the 2008 Memo of the Network Working Group. This information potentially includes Uniform Resource Locations (URLs) where the issuing CA's certificate can be retrieved, as well as a location of an Online Certificate Status Protocol (OCSP) responder configured to provide status for the certificate in question)
central access policæIngamba z'ikoresha ridasesuye (An access policy that allows organizations to centrally deploy and manage authorization policies that include conditional expressions using user groups, user claims, device claims, and resource properties)
code access securityumutekano wo kwinjira na kode (A mechanism provided by the common language runtime whereby managed code is granted permissions by security policy and these permissions are enforced, helping to limit the operations that the code will be allowed to perform)
Data Access ObjectsIbintu byo kugera ku makurushingiro (A programming interface to access and manipulate database objects)
direct memory accesskwigerera ku bubiko (A technology that allows certain devices, such as hard disks and CD or DVD drives, to transfer information directly through the computer's memory without using the computer's processor. DMA improves the performance of the device and frees the computer's processor so it can perform other tasks)
dynamic access controlIgenzura ryihuta ry'uburenganzira (The ability for IT pros to define how users access a system based on dynamic qualities, such as a user's location or role)
Ease of Access CenterKwihuza byoroshye (An area within the Control Panel that provides accessibility options and settings to help users interact more easily with the computer)
external accesskugerwaho n'abo hanze (Authenticated access that can be granted to external partners and clients to enable sharing of selected SharePoint Online content)
Information Access Serviceserivisi IAS (A part of an IrDA infrared communication protocol used so that devices can learn about the services offered by another device)
Internet access providermutanga kwinjira interineti (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers)
Internet Message Access Protocolporotokore IMAP (A method computers use to send and receive e-mail messages. It allows you to access e-mail without downloading it to your computer)
Lightweight Directory Access Protocolporotokore LDAP (The primary access protocol for Active Directory. LDAP is an industry-standard protocol, established by the Internet Engineering Task Force (IETF), that allows users to query and update information in a directory service. Active Directory supports both LDAP version 2 and LDAP version 3)
Quick Access ToolbarAgace k'ibikoresho k'ibusamo (A customizable toolbar that provides one-click access to commands)
random access memoryububiko bw'igihe gito (The temporary storage area the computer uses to run programs and store data. Information stored in RAM is temporary and is designed to be erased when the computer is turned off)
redirected accessiyinjira ryayobowe ahandi (Functionality that redirects all I/O operations over the network to another node that has access to the required drive)
remote accessukugerwaho kwitaruye (Part of the integrated Routing and Remote Access service that provides remote networking for telecommuters, mobile workers, and system administrators who monitor and manage servers at multiple branch offices. Users can use Network Connections to dial in to remotely access their networks for services such as file and printer sharing, electronic mail, scheduling, and SQL database access)
Remote Direct Memory AccessIkoreshwa rya kure ryo kwigerera ku bubiko (A networking feature that lets one computer directly place information into the memory of another computer)
write accesskwandika birashoboka (A privilege on a computer system that allows a user to save, change, or delete stored data. Write access is usually set by the system administrator for a networked or server system and by the owner of the computer for a stand-alone machine)