cryptographic controller - definition. What is cryptographic controller
Diclib.com
قاموس ChatGPT
أدخل كلمة أو عبارة بأي لغة 👆
اللغة:

ترجمة وتحليل الكلمات عن طريق الذكاء الاصطناعي ChatGPT

في هذه الصفحة يمكنك الحصول على تحليل مفصل لكلمة أو عبارة باستخدام أفضل تقنيات الذكاء الاصطناعي المتوفرة اليوم:

  • كيف يتم استخدام الكلمة في اللغة
  • تردد الكلمة
  • ما إذا كانت الكلمة تستخدم في كثير من الأحيان في اللغة المنطوقة أو المكتوبة
  • خيارات الترجمة إلى الروسية أو الإسبانية، على التوالي
  • أمثلة على استخدام الكلمة (عدة عبارات مع الترجمة)
  • أصل الكلمة

%ما هو (من)٪ 1 - تعريف

Cryptographic Log On; Cryptographic logon

disk controller         
CONTROLLER FOR DISK STORAGE, USUALLY INTEGRATED INTO THE DRIVE
Hard disk controller; Hard drive controller; HD controller; Drive controller
<hardware, storage> (Or "hard disk controller", HDC) The circuit which allows the CPU to communicate with a {hard disk}, floppy disk or other kind of disk drive. The most common disk controllers in use are IDE and SCSI controllers. Most home personal computers use IDE controllers. High end PCs, workstations and network {file servers} mostly have SCSI adaptors. (1998-03-16)
Disk controller         
CONTROLLER FOR DISK STORAGE, USUALLY INTEGRATED INTO THE DRIVE
Hard disk controller; Hard drive controller; HD controller; Drive controller
The disk controller is the controller circuit which enables the CPU to communicate with a hard disk, floppy disk or other kind of disk drive. It also provides an interface between the disk drive and the bus connecting it to the rest of the system.
Irrigation controller         
DEVICE OPERATING AUTOMATIC IRRIGATION SYSTEMS
Controller (irrigation)
An irrigation controller is a device to operate automatic irrigation systems such as lawn sprinklers and drip irrigation systems. Most controllers have a means of setting the frequency of irrigation, the start time, and the duration of watering.

ويكيبيديا

Cryptographic log on

Cryptographic log-on (CLO) is a process that uses Common Access Cards (CAC) and embedded Public Key Infrastructure (PKI) certificates to authenticate a user's identification to a workstation and network. It replaces the username and passwords for identifying and authenticating users. To log-on cryptographically to a CLO-enabled workstation, users simply insert their CAC into their workstation’s CAC reader and provide their Personal Identification Number (PIN).

The Navy/Marine Corps Intranet, among many other secure networks, uses CLO.