- log-on procedure
- 1) Техника: процедура регистрации (пользователя)2) Вычислительная техника: процедура входа в систему3) Сетевые технологии: процедура регистрации
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
log off — Procedure which ends a terminal session … IT glossary of terms, acronyms and abbreviations
log on — Procedure which initiates a terminal session … IT glossary of terms, acronyms and abbreviations
Log-normal distribution — Probability distribution name =Log normal type =density pdf μ=0 cdf μ=0 parameters =sigma > 0 infty < mu < infty support = [0,+infty)! pdf =frac{1}{xsigmasqrt{2piexpleft [ frac{left(ln(x) mu ight)^2}{2sigma^2} ight] cdf =frac{1}{2}+frac{1}{2}… … Wikipedia
Transaction log — Binary log redirects here. For logarithms in base 2, see Binary logarithm. In the field of databases in computer science, a transaction log (also database log or binary log) is a history of actions executed by a database management system to… … Wikipedia
privilege log — USA A document that describes the nature of communications, documents or other tangible things being withheld from disclosure in litigation under the attorney client privilege, attorney work product doctrine or other applicable privilege or… … Law dictionary
Jacob Truedson Demitz — Demitz at his Mae West Centenary dinner given at Berns in Stockholm, Sweden, August 17, 1993 Background information Birth name Lars Erik Jacob Ridderstedt … Wikipedia
Skandiabanken — is an internet bank based in Sweden , owned by Skandia. It has one branch office in Stockholm and conducts the rest of its business over the internet and via telephone. Skandiabanken also operates in Norway and Denmark and is the largest internet … Wikipedia
Toshiko Sato — Doctor Who universe character Toshiko Sato Affiliated Torchwood Institute Home era Early 21st century … Wikipedia
George B. Purdy — George Barry Purdy Naissance Domicile Cincinnati (Ohio) Nationalité Américaine Champs Mathématiques, informatique Institution University of Cincinnati Texas A M University Diplômé de … Wikipédia en Français
decoy program — A program or text sent on mainframes and multiline BBS s that simulates the log on procedure. The unsuspecting user will enter his password, and the person who made the decoy program will get the password and can use the account. Only enter your… … Dictionary of telecommunications
восстанавливать связь — [Интент] Параллельные тексты EN RU To re establish communication the client is required to perform a new log on procedure with the device (IED). [Schneider Electric] Для восстановления связи клиент должен снова выполнить процедуру регистрации… … Справочник технического переводчика