upload
Microsoft Corporation
업종: Computer
Number of terms: 318110
Number of blossaries: 26
Company Profile:
An American multinational software corporation headquartered in Redmond, Washington that develops, manufactures, licenses, and supports a wide range of products and services related to computing.
Une méthode de chiffrement qui utilise une paire de clés mathématiquement liées entre elles : une clé publique et une clé privée correspondante. Chaque clé peut être utilisée pour chiffrer les données, mais la clé correspondante doit être utilisée pour le décrypter.
Industry:Computer
Une série de travaux qui exécutent une action complexe dans Virtual Machine Manager, telles que d'effectuer une conversion physique-virtuel machine.
Industry:Computer
A domain controller that holds the schema operations master role in Active Directory. The schema master performs write operations to the directory schema and replicates updates to all other domain controllers in the forest. At any time, the schema master role can be assigned to only one domain controller in the forest.
Industry:Computer
A method of copying Web site content from one server node to another. You can copy files manually, or use replication software to copy content automatically. Replication is a necessary function of clustering to ensure fault tolerance.
Industry:Computer
Use the question-mark pointer to get context-sensitive Help on toolbar buttons, dialog box options, tools in the toolbox, and other parts of the window.
Industry:Computer
The maximum amount of data loss, measured in time, that is acceptable to business requirements.
Industry:Computer
To display the subentries contained within a folder or outline view.
Industry:Computer
For Message Queuing, a queue that stores transactional messages that cannot reach their destination queue. Transactional dead-letter queues store failed messages on the computer on which the message expired. Messages in these queues are written to disk and are therefore recoverable.
Industry:Computer
A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it.
Industry:Computer
A series of jobs that perform a complex action in Virtual Machine Manager, such as performing a physical-to-virtual machine conversion.
Industry:Computer
© 2024 CSOFT International, Ltd.