permissions level

permissions level
"The extent of access a user has to a site. The default permissions levels are Read, Edit, Design, and Full Control."
مستوي الأذونات

English-Arabic terms dictionary. 2015.

Игры ⚽ Поможем написать курсовую

Look at other dictionaries:

  • Filesystem-level encryption — Filesystem level encryption, often called file or folder encryption, is a form of disk encryption where individual files or directories are encrypted by the file system itself. This is in contrast to full disk encryption where the entire… …   Wikipedia

  • List of former and unopened London Underground stations — St Mary s (Whitechapel Road) tube station shortly after its closure in 1938 The London Underground is a metro system in the United Kingdom that serves Greater London …   Wikipedia

  • Comparison of enterprise bookmarking platforms — The following tables compare Enterprise bookmarking platforms. Contents 1 General 2 Date and content types 3 Content enrichment capabilities 4 Tag management capabilities …   Wikipedia

  • Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… …   Wikipedia

  • Comparison of file systems — The following tables compare general and technical information for a number of file systems. Contents 1 General information 2 Limits 3 Metadata 4 Features …   Wikipedia

  • Windows Registry — The Windows Registry is a hierarchical database that stores configuration settings and options on Microsoft Windows operating systems. It contains settings for low level operating system components as well as the applications running on the… …   Wikipedia

  • Role-based access control — In computer systems security, role based access control (RBAC) [cite conference author = Ferraiolo, D.F. and Kuhn, D.R. title = Role Based Access Control booktitle=15th National Computer Security Conference year = 1992 month = October pages=554… …   Wikipedia

  • Portable Document Format — PDF redirects here. For other uses, see PDF (disambiguation). Portable Document Format Adobe Reader icon Filename extension .pdf Internet media type application/pdf application/x pdf application/x bzpdf application/x gzpdf …   Wikipedia

  • Unix security — Unix security: maintaining a secure environment on Unix and Unix like operating systems is dependent on design concepts of these operating systems, but vigilance through user and administrative techniques is important to maintain security… …   Wikipedia

  • Task State Segment — The Task State Segment is a special x86 structure which holds information about a task. It is used by the operating system kernel for task management. Specifically, the following information is stored in the TSS:* Processor register state * I/O… …   Wikipedia

  • Delegation in IT — If a computer user temporarily hand over his authorizations to another user then this process is called delegation.[1][2] Contents 1 Types of Delegation in IT network 1.1 Delegation at Authentication Level …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”