DictionaryForumContacts

   Spanish English
Terms for subject Microsoft containing acceso de | all forms | exact matches only | in specified order only
SpanishEnglish
acceso a información de entidad emisoraauthority information access (A certificate extension that contains information useful for verifying the trust status of a certificate, as defined by the 2008 Memo of the Network Working Group. This information potentially includes Uniform Resource Locations (URLs) where the issuing CA's certificate can be retrieved, as well as a location of an Online Certificate Status Protocol (OCSP) responder configured to provide status for the certificate in question)
acceso a nivel de campofield-level access (The permission that is assigned to a user or users that allow them to read, update, or create a specific field)
acceso de clienteclient access (The ability of client computers to connect to a server or resource, for example, a file on a server or a cluster resource)
acceso de escriturawrite access (A privilege on a computer system that allows a user to save, change, or delete stored data. Write access is usually set by the system administrator for a networked or server system and by the owner of the computer for a stand-alone machine)
acceso de invitadoguest access (A type of access that allows visitors to use their own desktop computers on limited resources (such as the Internet or LAN printers) without compromising a company's internal network security)
acceso directo a memoria de dispersión o recopilaciónscatter/gather direct memory access (A form of direct memory access (DMA) in which data is transferred to and from noncontiguous ranges of physical memory)
acceso fuera de bandaout-of-band access (Access to host via a connection that doesn't use the IP network)
Administración de niveles de accesoAccess Levels Management (A UI element that displays a user's contacts and access level entries (ACEs) organized by access level)
API de acceso a dispositivosDevice Access API (A set of COM interfaces that a device companion app can use to send requests, to a specialized device, synchronously or asynchronously)
asignación alternativa de accesoalternate access mapping (An alternate URL mapping that Windows SharePoint Services preserves in the mapping table. It is the URL a user would see, but is not a URL that IIS would give to WSS)
barra de accesoaccess bar (A toolbar that docks to the desktop, similar to the taskbar)
Barra de herramientas de acceso rápidoQuick Access Toolbar (A customizable toolbar that provides one-click access to commands)
Cambiar nivel de accesoChange Level of Access (Contact context menu item that allows the user to assign an access level to the selected contact(s))
clave de acceso de almacenamientostorage access key (A value that is unique to a storage account and that can be used to connect to the storage account from code running in a Windows Azure cloud service, locally on a developer's machine, or anywhere else that has Internet connectivity)
conferencia de acceso telefónico localdial-in conferencing (A feature that merges public switched telephone network (PSTN) and Voice over IP (VoIP) conferences, which allows participants to dial in to a conference from anywhere as an authenticated user without having to be on the corporate network. Typically, a local number is provided to avoid long-distance fees)
Configuración de acceso web a RemoteApp y EscritorioRemoteApp and Desktop Web Access Configuration (An option on the Remote Desktop Services menu on the Administrative Tools menu that opens the RAD Web Access Web site for administrative purposes)
Configuración de Acceso web de Escritorio remotoRemote Desktop Web Access Configuration (In Remote Desktop Services, the site where you can configure the RD Web Access Web Part)
control de accesoaccess control (A security mechanism that determines which operations a user, group, service, or computer is authorized to perform on a computer or on a particular object, such as a file, printer, registry subkey, or directory service object)
control de acceso dinámicodynamic access control (The ability for IT pros to define how users access a system based on dynamic qualities, such as a user's location or role)
código de accesoaccess code (A string of characters entered by a user to verify his or her identity to a network or to a local computer, device, or client, or to sign in to an account, app, and so on)
código de acceso de emergenciaemergency access code (An emergency access code is a set of letters and numbers that can be included on your emergency profile wallet card or sheet)
código de acceso internacionalinternational access code (The prefix that is used to direct a call internationally. The International Access Code is 011 in the United States and 00 in much of the rest of the world)
descriptor de accesoaccessor (A data structure or group of structures created by the consumer that describes how row or parameter data from the data store is to be laid out in the consumer's data buffer, enabling providers to optimize access. An accessor is a collection of bindings)
directiva de acceso centralcentral access policæ (An access policy that allows organizations to centrally deploy and manage authorization policies that include conditional expressions using user groups, user claims, device claims, and resource properties)
directiva de seguridad de acceso al códigocode access security CAS policy A set of rules that defines security permissions for a collection of assemblies by associating attributes of those assemblies, such as location and signature, with a set of code access security permissions (CAS)
entrada de control de accesoaccess control entry (An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object)
expresión de ruta de acceso personalizadacustom path expression (When data binding to a CLR data source or another object, a data path or binding expression that is hand-edited)
Firma de acceso compartidoShared Access Signature (A URL that grants access rights to containers, blobs, queues, and tables)
Id. de acceso, Id. de inicio de sesiónlogin ID (" A string that is used to identify a user or entity to an operating system, directory service, or distributed system. For example, in Windows® integrated authentication, a login name uses the form "DOMAIN\username.")
infracción de accesoaccess violation (An attempt to run a memory operation that the underlying page protection does not allow. An access violation applies to memory operations, but does not apply when the security manager checks user-mode access rights to objects)
licencia de acceso de cliente para Servicios de Escritorio remotoRemote Desktop Services client access license (A license that is required for a user or a device to connect to a remote desktop server)
licencia de acceso de cliente por dispositivo para Servicios de Escritorio remotoRemote Desktop Services Per Device client access license (One of the two types of Remote Desktop Services client access licenses (RDS CALs) that permits one device (used by any user) to connect to a remote desktop server)
licencia de acceso de cliente por usuario para Servicios de Escritorio remotoRemote Desktop Services Per User client access license (One of the two types of Remote Desktop Services client access licenses (RDS CALs) that permits one user to access remote desktop servers from an unlimited number of client computers or devices)
lista de acceso a la publicaciónpublication access list (The primary mechanism for securing the Publisher. It contains a list of logins, accounts, and groups that are granted access to the publication)
Lista de accesos directosJump List (A feature of Windows that provide right-click access from taskbar program buttons to the documents, pictures, songs, or websites a user frequently accesses)
lista de accesos permitidoshomework list (A list of apps and websites of any type that a parent chooses which a child can use at any time and for as long as necessary outside of curfew hours)
lista de control de accesoaccess control list (In Windows-based systems, a list of access control entries (ACE) that apply to an entire object, a set of the object's properties, or an individual property of an object, and that define the access granted to one or more security principals)
lista de control de acceso del sistemasystem access control list (An ACL that controls the generation of audit messages for attempts to access a securable object. The ability to get or set an object's SACL is controlled by a privilege typically held only by system administrators)
lista de control de acceso discrecionaldiscretionary access control list An access control list that is controlled by the owner of an object and that specifies the access particular users or groups can have to the object (DACL)
memoria de acceso aleatoriorandom access memory (The temporary storage area the computer uses to run programs and store data. Information stored in RAM is temporary and is designed to be erased when the computer is turned off)
Modelo de acceso a dispositivo especializadoSpecialized Device Access Model (The model that describes the two ways that a Windows Store app can access a specialized device: Open Access Model and Restricted Device Access Model)
Modelo de acceso abierto a dispositivoOpen Device Access Model (The access model for horizontal solutions, which enables a horizontal strategy. Open Device Access enables many different Windows Store apps to access a specialized device. Examples: a smartphone with multiple apps that synchronize contacts; a pedometer that allows multiple apps to read its data and post it to a website)
Modelo de acceso restringido a dispositivoRestricted Device Access Model (The device access model for vertical solutions. Restricted Device Access does not allow other applications to access a specialized device)
máscara de accesoaccess mask (In Windows-based computers, a 32-bit value (a bitmask) that specifies the permissions that are assigned in an access control entry (ACE). An access mask is also part of the access request when an object is opened. The access mask in the request is compared to the access mask in each ACE to determine whether or not to grant the request)
método de acceso secuencial indizadoindexed sequential access method (A technique for indexing database records that allows sequential or random access of records. When records are accessed sequentially they are accessed in the order in which they were entered in the database, and when records are accessed randomly, the records are accessed through an index)
nivel de accesoaccess level (A security role setting that determines for a given object type at which levels within the organization hierarchy a user can act on that object type)
Nombre de punto de accesoAccess Point Name (A field in the Properties dialog box for GPRS installation items in the Mobile Deployment Manager MMC snap-in that enables the user to specify the wireless access point for the device)
número de acceso del suscriptorsubscriber access number (A number that is configured in a Private Branch eXchange (PBX) that allows a subscriber to access their Microsoft Exchange mailbox over the telephone)
número de acceso telefónico de mensajería unificadaUM access telephone number (A telephone number that points to a hunt group and is the access number for calls that are routed to Unified Messaging servers)
permisos de accesoaccess permissions (Authorization to perform operations associated with a specific shared resource, such as a file, directory, or printer. Permissions must be granted by the system administrator to individual user accounts or administrative groups)
Principios para el acceso a la información y para la comprobación de documentos digitalesPrinciples for the data access and the testability of digital documents (A German law that requires tax authorities to be capable of digitally checking data from electronic bookkeeping systems)
privilegios de accesoaccess privileges (The type of operations permitted for a given user of a certain system resource on a network or a file server)
Protección de acceso a redesNetwork Access Protection (A set of operating system components that can help protect access to a private network by enforcing health policies. System administrators establish health policies which NAP enforces by inspecting and assessing the health of client computers, restricting network access when client computers are deemed noncompliant, and remediating noncompliant client computers for full network access. NAP also provides ongoing health compliance enforcement while a client computer is connected to a network)
Protocolo de acceso a mensajes de InternetInternet Message Access Protocol (A method computers use to send and receive e-mail messages. It allows you to access e-mail without downloading it to your computer)
Protocolo de acceso a mensajes de InternetInternet Message Access Protocol 4 A standard client/server protocol for receiving e-mail. The user (or the user's e-mail client) can view just the heading and the sender of the letter and then decide whether to download the mail (IMAP4)
Protocolo de acceso implícitoDigest Access protocol (A lightweight authentication protocol for parties involved in communications that are based on Hypertext Transfer Protocol (HTTP) or Simple Authentication and Security Layer (SASL))
protocolo ligero de acceso a directoriosLightweight Directory Access Protocol (The primary access protocol for Active Directory. LDAP is an industry-standard protocol, established by the Internet Engineering Task Force (IETF), that allows users to query and update information in a directory service. Active Directory supports both LDAP version 2 and LDAP version 3)
Protocolo simple de acceso a objetosSimple Object Access Protocol A simple, XML-based protocol for exchanging structured data and type information on the World Wide Web. The protocol is currently the de facto standard for XML messaging (SOAP)
proveedor de accesoaccess provider (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers)
proveedor de acceso a InternetInternet service provider (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers)
proveedor de acceso a InternetInternet access provider (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers)
punto de accesoaccess point (A device used to connect wireless computers and other wireless devices to a wired network)
punto de acceso clienteclient access point (In SMS 2003 and earlier releases, an SMS site system that provides a communication point between the SMS site server and Legacy Client computers. Legacy Clients deliver their collected files, inventory information, discovery data records, software metering data, and status information to CAPs)
punto de acceso inalámbrico compatible con 802.1X802.1X-capable wireless access point (A network access server that adheres to both the Institute of Electrical and Electronics Engineers (IEEE) 802.1X and the Remote Authentication Dial-in User Service (RADIUS) standards, and that is deployed in networks to enforce 802.1X authenticated IEEE 802.3 wired Ethernet access)
página de acceso a datosdata access page (A Web page, published from Access, that has a connection to a database. In a data access page, you can view, add to, edit, and manipulate the data stored in the database)
redireccionamiento de servidor de acceso de clienteClient Access server redirection (A process by which Outlook Web Access users who access an Internet-facing Client Access server that is in a different Active Directory site than the site that contains their mailbox can be redirected to the Client Access server that is in the same site as their Mailbox server if that Client Access server is Internet-facing)
Registro de acceso de usuariosUser Access Logging (A logging feature that gathers unique client records and events for later retrieval by an administrator using WMI or PowerShell)
rol de control de acceso basado en rolesrole-based access control role (The user role that is assigned to a user account, which determines the options that are visible to that user and the tasks that the user can perform in the management interface for Exchange Labs)
rol de servidor Acceso de clientesClient Access server role (A set of components and services that enable users to access their Exchange mailboxes through the application Outlook Web Access and the protocols Exchange ActiveSync, Post Office Protocol version 3 (POP3), and Internet Message Access Protocol 4rev1 (IMAP4). The Client Access server role also includes Web services that are used by other Exchange 2007 server roles)
ruta de accesopath (A sequence of folders (directories) that leads to a specific file or folder. A backslash is used to separate each folder in the path. For example, the path to a file called invoice.txt might be C:\Documents\July\invoice.txt)
ruta de acceso a la tareatask path (A series of tasks that includes the predecessors and successors to the task that is selected)
ruta de acceso absolutaabsolute path (A path to a file that begins with the drive identifier and root directory or with a network share and ends with the complete file name (for example, C:\docs\work\contract.txt or \\netshare\docs\work\contract.txt))
ruta de acceso canónicacanonical path (The definitive path for navigating to a category or product that is a member of more than one category. The primary parent category determines the canonical path to a category or product)
ruta de acceso completafully qualified path (A path to a file that begins with the drive identifier and root directory or with a network share and ends with the complete file name (for example, C:\docs\work\contract.txt or \\netshare\docs\work\contract.txt))
ruta de acceso completafull path (In a hierarchical filing system, a path name containing all the possible components of a pathname, including the network share or drive and root directory, as well as any subdirectories and the file or object name)
ruta de acceso de hosthost path (A sequence of host group names that specifies the location of a virtual machine host or host group within the hierarchy of host groups. All host paths begin with the root host group, Managed Computers)
ruta de acceso del objetoobject path (A formatted string used to access namespaces, classes, and instances. Each object on the system has a unique path that identifies it locally or over the network. Object paths are conceptually similar to Universal Resource Locators (URL))
ruta de acceso del recurso compartidoshare path (The full name of a resource on a network in the format \\servername\sharename, which can include a directory path under the share name)
ruta de acceso físicaphysical path (The physical location of a directory or file. May be either a path on the local computer or a universal naming convention (UNC) path on a remote computer)
ruta de acceso raízrooted path (A sequence of folders (directories) that begins with a drive letter and colon (for example, C:) or a directory separator character (\) and leads to a specific file or folder)
ruta de acceso relativarelative path (A path that is implied by the current working directory. When a user enters a command that refers to a file, if the full pathname is not entered, the current working directory becomes the relative path of the file referred to)
ruta de acceso virtualvirtual path (A sequence of names that is used to locate a file and that has the same form as a pathname in the file system but is not necessarily the actual sequence of directory names under which the file is located. The part of a URL that follows the server name is a virtual path. For example, if the directory c:\bar\sinister\forces\distance on the server miles is shared on the local area network at foo.com under the name \\miles\baz and contains the file elena.html, that file may be returned by a Web request for http://miles.foo.com/baz/elena.html)
seguridad de acceso del códigocode access security (A mechanism provided by the common language runtime whereby managed code is granted permissions by security policy and these permissions are enforced, helping to limit the operations that the code will be allowed to perform)
servicio de acceso a datos de System CenterSystem Center Data Access service (A Windows service that runs on the management servers in each management group, and that allows client applications to access Operations Manager data and functionality)
servicio perimetral de accesoAccess Edge service (A service that runs on Lync Server that resides in the perimeter network and routes instant messaging (IM) and presence information from external users to internal users)
Servidor de acceso a datosData Access Server (A component that receives events from the MOM Servers and inserts them into the database. Requests for data from the database and requests to insert data into the database typically go through the DAS)
servidor de acceso a la rednetwork access server (The device that accepts Point-to-Point Protocol (PPP) connections and places clients on the network that the NAS serves)
servidor de acceso de clienteClient Access server (A set of components and services that enable users to access their Exchange mailboxes through the Outlook Web Access application)
Servidor perimetral de accesoAccess Edge Server (A service that runs on Lync Server that resides in the perimeter network and routes instant messaging (IM) and presence information from external users to internal users)
Solicitudes de acceso a sitios webWebsite requests (The tab on the Family Safety website that displays requests a child has made via e-mail to view a blocked website)
tiempo de acceso a discodisk access time (The time needed for a read/write head in a disk drive to locate a track on a disk. Access time is usually measured in milliseconds and is used as a performance measure for hard disks and CD-ROM drives)
token de accesoaccess token (A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority)
token de acceso combinadosplit access token (A combination of full access token and filtered access token linked together by the local security authority (LSA) component of the operating system)
token de acceso con privilegios completosfull privilege access token (An access token with the maximum privileges authorized for the account. Used by User Account Control (UAC))
token de acceso de baja integridadlow integrity access token (A filtered access token that is created with a low integrity level. This access token is used by Internet Explorer Protected Mode, but can also be used by other applications)
token de acceso del procesoprocess access token (A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority)
token de acceso filtradofiltered access token (An access token with the least administrative privileges required for the session. It is a restricted access token where all elevated privileges have been filtered out. A filtered access token is created by default for all interactive users that are not standard users, except the built-in administrator)
token de acceso UACUAC access token (An access token with the least administrative privileges required for the session. It is a restricted access token where all elevated privileges have been filtered out. A filtered access token is created by default for all interactive users that are not standard users, except the built-in administrator)
trampilla de acceso a la lámparalamp access door (The metal door in the I/O connections area that you must remove to access the lamp assembly)
URL de acceso públicopublic-facing URL (A URL that is directly accessible over the Internet and that does not require special credentials or network access to connect to it)