DictionaryForumContacts

   English
Terms for subject Microsoft containing keys | all forms
EnglishSpanish
ALT keytecla Alt (A keyboard key that is used in conjunction with another key to produce some special feature or function and is typically marked with the letters Alt)
alternate keyclave alternativa (A candidate key that is not designated as the primary key and is used to uniquely identify records in a database table)
arrow keytecla de dirección (Any of four keys labeled with arrows pointing up, down, left, and right, used to move the cursor vertically or horizontally on the display screen or, in some programs, to extend the highlight)
asymmetric key algorithmalgoritmo de clave asimétrica (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
Authority Key IdentifierIdentificador de clave de entidad emisora (A certificate extension used by the certificate chaining engine to determine what certificate was used to sign a presented certificate. The AKI can contain the issuer name, serial number, public key information, or no information at all. By matching the information in a certificate's AKI extension to a CA certificate's Subject Key Identifier (SKI) extension, a certificate chain can be built)
BACKSPACE keytecla Retroceso (A keyboard key that moves the cursor to the left, one character at a time, usually erasing each character as it moves)
BitLocker recovery keyclave de recuperación de BitLocker (A special key that you can create when you turn on Bitlocker Drive Encryption for the first time on each drive that you encrypt)
BREAK keytecla Interrumpir (A key or combination of keys used to tell a computer to halt, or break out of, whatever it is doing. On IBM PCs and compatibles under DOS, pressing the Pause/ Break or Scroll Lock/Break key while holding down the Ctrl key issues the break command (as does Ctrl-C). On Macintosh computers, the key combination that sends a break code is Command-period)
clear keyclave sin cifrado (The key that is stored unencrypted on the disk volume. This key is used to freely access the volume master key, and in turn, the full volume encryption key when BitLocker Drive Encryption protection is disabled but the disk volume remains encrypted)
color keyclave de color (A color used for transparent or translucent effects. An overlay surface is displayed in the region of the primary surface that contains the color key. In video production, color keys are used to combine two video signals)
color key transparencytransparencia de la clave de color (A method for blending texture maps so that parts appear transparent. Color key transparency accomplishes this by defining a single color as transparent)
composite keyclave compuesta (A key whose definition consists of two or more fields in a file, columns in a table, or attributes in a relation)
crypto escrow keyclave de cifrado secundaria (A secondary encryption key that provides the ability for an authorized IT Helpdesk administrator to open an encrypted document when the password is lost)
cursor keytecla de dirección (Any of four keys labeled with arrows pointing up, down, left, and right, used to move the cursor vertically or horizontally on the display screen or, in some programs, to extend the highlight)
customer-specific volume license keyclave de licencia por volumen específica de cliente (A unique volume license key used to activate a key management service (KMS) host or to enable volume software licenses to be issued and managed from Active Directory)
DELETE keytecla Suprimir (On IBM and PC-compatible computers, a key whose function changes depending on the application program. Usually it erases the character under the cursor, although in some applications it can erase selected text or graphics)
derived keyclave derivada (A cryptographic key created by a call to CryptDeriveKey. A derived key can be created from a password, or any other user data. Derived keys allow applications to create session keys as needed, eliminating the need to store a particular key)
dialing keyssecuencia de caracteres de marcado (A set of characters that Live Meeting uses to simulate pauses or telephone keystrokes so that it can automatically dial an audio conferencing partner and connect to a meeting. For example, a comma represents a pause)
ENTER keytecla ENTRAR (The key that is used at the end of a line or command to instruct the computer to process the command or text. In word processing programs, the Enter key is used at the end of a paragraph. Also called: Return key)
ESC keytecla Esc (A keyboard key that sends the escape (ESC) character to the computer. Often this key moves the user back one level in the menu structure or exits the program)
external keyclave externa (A file that contains information to access cryptographically locked data, which is stored away from the system, such as on a USB flash drive)
external key filearchivo de clave externa (A file that contains the external key and is stored on an external media device. The name and contents of the file are internal to Microsoft and can change from version to version)
foreign keyclave externa (" A key in a database table that comes from another table (also know as the "referenced table") and whose values match the primary key (PK) or unique key in the referenced table.")
full volume encryption keyclave de cifrado del volumen completo (The algorithm-specific key that is used to encrypt (and optionally, diffuse) data on disk sectors. Currently, this key can be either 128 bits or 256 bits advanced encryption standard (AES). The default encryption algorithm that BitLocker Drive Encryption uses is AES 128 bit with diffuser)
global system keyclave del sistema global (A tool used to configure the startup key, a random, 128-bit, symmetric cryptographic key created at system startup and used to encrypt all of the user`s symmetric cryptographic keys)
Group Key Distribution ServiceServicio de distribución de claves de grupo (An Active Directory Domain Services service that provides cryptographic keys that correspond to arbitrary sets of security principals in AD DS to users who are authorized to access those keys)
Host keytecla del host (The key (right ALT key by default) that must be pressed with Virtual Server to move keyboard and mouse focus from a guest operating system back to the host operating system)
INSERT keytecla Insertar (" A key on the keyboard, labeled "Insert" or "Ins", whose usual function is to toggle a program's editing setting between an insert mode and an overwrite mode, although it may perform different functions in different applications.")
Internet Key ExchangeIntercambio de claves por red (A protocol that establishes the security association and shared keys necessary for computers to communicate by using Internet Protocol security (IPsec))
Key Distribution CenterCentro de distribución de claves (A network service that supplies session tickets and temporary session keys to users and computers within an Active Directory domain. The KDC runs on each domain controller as part of Active Directory Domain Services (AD DS))
Key Distribution Center proxy serviceservicio de proxy del Centro de distribución de claves (A service that runs on corporate network edge servers to proxy Kerberos protocol messages to domain controllers which are situated on the corporate network. This permits Kerberos authentication to edge services such as Remote Desktop Services Gateway or DirectAccess Server)
Key FiltersFiltros clave (A metadata navigation control that enables users to limit the items displayed in a list or library to those that match selected values)
Key Management Serverservidor de administración de claves (The Exchange computer on which the Key Management Service has been installed. There can be one Key Management Server per administrative group)
Key Management ServiceServicio de administración de claves (An optional Microsoft Exchange 2000 Server component that is installed on a designated server in an administrative group. It provides centralized administration and archival of private keys, and maintains every user s private encryption key in an encrypted database. The keys are used for encrypting e-mail messages and signing messages with digital signatures)
Key MasterMaestro de claves (A DNS server role that is responsible for all DNSSEC key management for a specific DNSSEC-signed DNS zone. Different DNS zones can have different Key Masters. The Key Master role can be moved from one DNS server to a different DNS server, but a DNS zone can have only one Key Master at a given time. To be a Key Master, the DNS server must be authoritative for the DNS zone, the zone must be signed with DNSSEC, and the DNS server must be selected to be the Key Master for the DNS zone)
Key MetricsMétricas clave (A tab in Application Diagnostics that provides an at-a-glance view of a selected application. The graph displays 1. the average performance based on the Monitored Requests counter, and 2. the number of requests. By looking at the graph, you can easily determine the traffic load and make inferences about problems that might be occurring)
key performance indicatorindicador clave de rendimiento (A predefined measure that is used to track performance of a strategic goal, objective, plan, initiative, or business process. A KPI is evaluated against a target. An explicit and measurable value taken directly from a data source. Key performance indicators (KPIs) are used to measure performance in a specific area, for example, revenue per customer)
key performance indicatorindicador de rendimiento clave (A predefined measure that is used to track performance of a strategic goal, objective, plan, initiative, or business process. A KPI is evaluated against a target. An explicit and measurable value taken directly from a data source. Key performance indicators (KPIs) are used to measure performance in a specific area, for example, revenue per customer)
Key pressal presionar una tecla (" An option in "ringtones & sounds" settings. When this option is selected, the phone makes a sound when buttons on the on-screen keypad or keyboard are tapped.")
Key pressPresión de teclas (" An option in "ringtones & sounds" settings. When this option is selected, the phone makes a sound when buttons on the on-screen keypad or keyboard are tapped.")
key range lockbloqueo de rangos con clave (A lock that is used to lock ranges between records in a table to prevent phantom additions to, or deletions from, a set of records. Ensures serializable transactions)
key repeat ratevelocidad de repetición de las teclas (The rate at which characters repeat when a user holds down a key)
key risk indicatorindicador de riesgo clave (A quantifiable, standardized measurement of the risk of loss resulting from inadequate or failed business processes)
key roamingclaves móviles (The process of moving between different environments or computers while authenitcated by certificates or keys centrally stored on a server)
key rolloversustitución de clave (The process by which an existing cryptographic key is replaced with a new cryptographic key and associated signatures are updated)
key search attackataque por búsqueda de clave (An attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered)
key sequencesecuencia de teclas (Any combination of keys that must be pressed sequentially)
key signing keyclave de firma de clave (A public key corresponding to a private key that is used to sign one or more DNS record sets at the zone apex)
key-value pairpar clave-valor (A set of data items that contains a unique identifier, called a key, and a value that is the actual data for the key)
legend keysclave de leyenda (Symbols in legends that show the patterns and colors assigned to the data series (or categories) in a chart. Legend keys appear to the left of legend entries. Formatting a legend key also formats the data marker that's associated with it)
licensing keyclave de licencia (A short character string that serves as a password during the installation of licensed commercial software. The use of licensing keys is a security device aimed at reducing illegal duplication of licensed software)
master keyclave maestra (The key used by the client and server for all session key generation. The master key is used to generate the client-read key, the client-write key, the server-read key, and the server-write key. Master keys can be exported as simple key BLOBs)
Microsoft Exchange Key Management ServerServidor Administrador de claves de Microsoft Exchange (The Exchange computer on which the Key Management Service has been installed. There can be one Key Management Server per administrative group)
Microsoft Group Key Distribution ServiceServicio de distribución de claves de grupo de Microsoft (An Active Directory Domain Services service that provides cryptographic keys that correspond to arbitrary sets of security principals in AD DS to users who are authorized to access those keys)
multi-activation keyclave de activación múltiple (A product key that is provided to Microsoft customers who choose a Microsoft Volume Licensing program for their organizations and that allows multiple installations of a particular product. The key is assigned to a company or institution intended for their sole use and only for distribution to employees or third parties who are authorized to install and distribute licenses pursuant to the terms of their license agreement)
multiple activation keyclave de activación múltiple (A volume license key that is used for one-time activation with activation services that are hosted by Microsoft)
network keyclave de red (A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key)
network security keyclave de seguridad de red (A password that can help protect wireless networks from unauthorized access. A network security key encrypts information sent from one network computer to another so that the information can only be read by someone who has the key)
PAGE DOWN keytecla Avanzar Página (" A keyboard key (often labeled "PgDn") that is often used to move the cursor down to the top of the next page or a specific number of lines. Its function may vary in different programs.")
PAGE UP keytecla Retroceder Página (" A keyboard key (often labeled "PgUp") that is often used to move the cursor up to the top of the previous page or a specific number of lines. Its function may vary in different programs.")
Pairwise Master KeyClave maestra en pares (A 256-bit key derived from the Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) or Protected EAP (PEAP) authentication process)
PIN unlock keycódigo de desbloqueo de PIN (An 8-digit code used to unlock the SIM card. A Personal Unlocking Key is a type of personal identification number (PIN))
PIN unlock keycódigo de desbloqueo PIN (An 8-digit code used to unlock the SIM card. A Personal Unlocking Key is a type of personal identification number (PIN))
predefined keyclave predefinida (A key that represents one of the main divisions of the registry. Each predefined key is displayed in a separate Registry Editor window, with the key's name appearing in the window's title bar. For example, HKEY_CLASSES_ROOT is a predefined key)
Pre-shared keyclave precompartida (An option that allows the user to view the code that can be used to authenticate IPSec/L2TP connections (typically VPN connections))
primary keyclave principal (One or more fields that uniquely identify each record in a table. In the same way that a license plate number identifies a car, the primary key uniquely identifies a record)
PRINT SCREEN keytecla Impr Pant (A key on IBM PC and compatible keyboards that normally causes the computer to send a character-based "picture" of the screen contents to the printer)
PRINT SCREEN keytecla Imprimir pantalla (A key on IBM PC and compatible keyboards that normally causes the computer to send a character-based "picture" of the screen contents to the printer)
private keyclave privada (The secret half of a cryptographic key pair that is used with a public key algorithm. Private keys are typically used to decrypt a symmetric session key, digitally sign data, or decrypt data that has been encrypted with the corresponding public key)
product keyclave del producto (A sequence of 25 letters and numbers. To activate some software, you must enter a product key during the activation process)
product keyclave de producto (A sequence of 25 letters and numbers. To activate some software, you must enter a product key during the activation process)
public keyclave pública (The nonsecret half of a cryptographic key pair that is used with a public key algorithm. Public keys are typically used when encrypting a session key, verifying a digital signature, or encrypting data that can be decrypted with the corresponding private key)
public key algorithmalgoritmo de clave pública (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message)
public key encryptioncifrado de clave pública (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
public key infrastructure The laws, policies, standards, and software that regulate or manipulate certificates and public and private keys. In practice, it is a system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in an electronic transaction. Standards for PKI are still evolving, even though they are being widely implemented as a necessary element of electronic commerceinfraestructura de clave pública (PKI)
Public Key Infrastructure certificate A system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in an electronic transactioncertificado PKI (infraestructura de clave pública)
public key infrastructure hierarchyjerarquía de infraestructura de clave pública (A hierarchy in which the roles of the certification authority are separated into one root CA and one or more subordinate CAs)
recovery keyclave de recuperación (A key that is used for recovering data that is encrypted on a BitLocker volume. This key is cryptographically equivalent to a startup key. If available, the recovery key decrypts the volume master key, which in turn decrypts the full volume encryption key. The recovery key is stored on a USB flash drive. To use the recovery key, a user inserts the USB flash drive and then restarts the computer)
referencing keyclave de referencia (" A key in a database table that comes from another table (also know as the "referenced table") and whose values match the primary key (PK) or unique key in the referenced table.")
Release keycombinación de teclas de liberación (The key combination (Ctrl+Alt+Left arrow key by default) that must be pressed to move keyboard and mouse focus from a guest operating system back to the physical computer)
resume keyclave de reanudación (A key supplied by the SMB client that allows the system to reference the handle during a resume operation after a failover)
SCROLL LOCK keytecla BLOQ DESPL (On the IBM PC/XT and AT and compatible keyboards, a key on the top row of the numeric keypad that controls the effect of the cursor control keys and sometimes prevents the screen from scrolling. On the enhanced and Macintosh keyboards, this key is to the right of the function keys on the top row. Many modern applications ignore the Scroll Lock setting)
secret keyclave secreta (A symmetric encryption key shared by two entities, such as between a user and the domain controller (DC), with a long lifetime. A password is a common example of a secret key. When used in a context that implies Kerberos only, a principal's secret key)
secret key encryptioncifrado de clave secreta (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data)
Serial KeysSerialKeys (A feature of Windows operating systems that, in conjunction with a communications aid interface device, allows keystrokes and mouse controls to be accepted through a computer's serial port. It also allows the user to control the computer using alternative input devices as if they were using a standard keyboard and mouse)
SHIFT keytecla Mayúsculas (A keyboard key that, when pressed in combination with another key, gives that key an alternative meaning, for example, producing an uppercase character when a letter key is pressed. The SHIFT key is also used in various key combinations to create nonstandard characters or to perform special operations)
speed dial keyclave de marcación rápida (A single- or double-digit number associated with telephone numbers, or e-mail or Web addresses, that enables users to quickly access the numbers or addresses)
storage access keyclave de acceso de almacenamiento (A value that is unique to a storage account and that can be used to connect to the storage account from code running in a Windows Azure cloud service, locally on a developer's machine, or anywhere else that has Internet connectivity)
storage root keyclave raíz de almacenamiento (On a system that incorporates a TPM, a cryptographic asymmetric key which is created at the root of the TPM key hierarchy (2048-bit RSA key) and which is used by the TPM to store protected data. The private portion of this key never leaves the TPM. The public part of this key is returned to the owner and needs to be carefully guarded since it uniquely identifies the TPM on the network, therefore is privacy sensitive)
subject key identifieridentificador de clave del firmante (A certificate extension that contains a hash of the certification authority's certificate public key. This hash is placed in the Authority Key Identifier (AKI) extension of all issued certificates to facilitate chain building)
surrogate keyclave suplente (A single attribute candidate key whose values are system-generated and that does not represent properties that identify objects in the real world)
TAB keytecla TAB (A keyboard key, often labeled with both a left-pointing and a right-pointing arrow, that traditionally (as in word processing) is used to insert tab characters into a document. In other applications, such as menu-driven programs, the TAB key is often used to move the on-screen highlight from place to place)
virtual key codecódigo de tecla virtual (A symbolic constant name, hexadecimal value, or mouse or keyboard equivalent that provides a hardware and language-independent method of identifying keyboard keys. Each virtual key code represents a unique keyboard key and also identifies the purpose of that key. The keyboard driver must provide one or more keyboard layouts that maps keyboard scan codes to the appropriate virtual key codes)
virtual-key codecódigo de tecla virtual (A symbolic constant name, hexadecimal value, or mouse or keyboard equivalent that provides a hardware and language-independent method of identifying keyboard keys. Each virtual key code represents a unique keyboard key and also identifies the purpose of that key. The keyboard driver must provide one or more keyboard layouts that maps keyboard scan codes to the appropriate virtual key codes)
volume license keyclave de licencias por volumen (A product key that is provided to Microsoft customers who choose a Microsoft Volume Licensing program for their organizations and that allows multiple installations of a particular product. The key is assigned to a company or institution intended for their sole use and only for distribution to employees or third parties who are authorized to install and distribute licenses pursuant to the terms of their license agreement)
volume license keyclave de licencia por volumen (A product key that is provided to Microsoft customers who choose a Microsoft Volume Licensing program for their organizations and that allows multiple installations of a particular product. The key is assigned to a company or institution intended for their sole use and only for distribution to employees or third parties who are authorized to install and distribute licenses pursuant to the terms of their license agreement)
volume license product keyclave de producto de licencia por volumen (A product key that is provided to Microsoft customers who choose a Microsoft Volume Licensing program for their organizations and that allows multiple installations of a particular product. The key is assigned to a company or institution intended for their sole use and only for distribution to employees or third parties who are authorized to install and distribute licenses pursuant to the terms of their license agreement)
volume master keyclave maestra de volumen (An advanced encryption standard (AES) 256-bit key that is used by BitLocker Drive Encryption to encrypt the full volume encryption key. There is only one volume master key per volume)
zone signing keyclave de firmas de zona (A public key corresponding to a private key that is used to sign one or more DNS record sets within a zone, below the zone apex)