- Access Control Field
- 1) Telecommunications: ACF (DQDB)2) File extension: ACF
Универсальный русско-английский словарь. Академик.ру. 2011.
Универсальный русско-английский словарь. Академик.ру. 2011.
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Network Access Control — (NAC) is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security… … Wikipedia
Access badge — An access badge is a credential used to gain entry to an area having automated access control entry points. Entry points may be doors, turnstiles, parking gates or other barriers.Access badges use various technologies to identify the holder of… … Wikipedia
Access token — In Microsoft Windows operating systems, an access token contains the security information for a login session and identifies the user, the user s groups, and the user s privileges. OverviewAn access token is as an object encapsulating the… … Wikipedia
Field experiment — A field experiment applies the scientific method to experimentally examine an intervention in the real world (or as many experimental economists like to say, naturally occurring environments) rather than in the laboratory. Field experiments, like … Wikipedia
Control key — A Control key (marked Ctrl ) on a modern Windows keyboard In computing, a Control key is a modifier key which, when pressed in conjunction with another key, will perform a special operation (for example, Control Alt Delete); similar to the Shift… … Wikipedia
Field-programmability — An electronic device or embedded system is said to be field programmable or in place programmable if its firmware (stored in non volatile memory, such as ROM) can be modified in the field, without disassembling the device or returning it to its… … Wikipedia
Field encapsulation — In computer programming, field encapsulation, also called data hiding, involves providing methods that can be used to read/write to/from the field rather than accessing the field directly. Sometimes these accessor methods are called getX and setX … Wikipedia
Control store — A control store is the part of a CPU s control unit that stores the CPU s microprogram. It is usually accessed by a microsequencer. Early control stores were implemented as a diode array accessed via address decoders, a form of read only memory.… … Wikipedia
Control table — This simple control table directs program flow according to the value of the single input variable. Each table entry holds a possible input value to be tested for equality (implied) and a relevant subroutine to perform in the action column. The… … Wikipedia
field warehousing — Arrangement whereby wholesaler, manufacturer, or merchant finances his business through pledge of goods remaining on his premises and it is limited type of warehousing as distinguished from public warehouse. Lawrence Warehouse Co. v. McKee,… … Black's law dictionary