protected asset - traduction vers néerlandais
Diclib.com
Dictionnaire ChatGPT
Entrez un mot ou une phrase dans n'importe quelle langue 👆
Langue:

Traduction et analyse de mots par intelligence artificielle ChatGPT

Sur cette page, vous pouvez obtenir une analyse détaillée d'un mot ou d'une phrase, réalisée à l'aide de la meilleure technologie d'intelligence artificielle à ce jour:

  • comment le mot est utilisé
  • fréquence d'utilisation
  • il est utilisé plus souvent dans le discours oral ou écrit
  • options de traduction de mots
  • exemples d'utilisation (plusieurs phrases avec traduction)
  • étymologie

protected asset - traduction vers néerlandais

INFORMANTS FOR SPIES
Asset (Intelligence); Intelligence asset

protected asset      
beveiligd bezit (waarvan de waarde stijgt bij inflatie)
protected mode         
  • Virtual segments of 80286
  • Paging (on Intel 80386) with page size of 4K
  • An Intel 80386 microprocessor
  • Example of privilege ring usage in an operating system using all rings
  • Common method of using paging to create a virtual address space
OPERATIONAL MODE OF X86-COMPATIBLE CENTRAL PROCESSING UNITS
Pmode; Protected Virtual Address Mode; Protected Mode; Protected virtual address mode; Protected-mode; 286 protected mode
beschermde toestand, toestand van de prossecor waarin een aantal toepassingen samen kunnen werken zonder onderlinge tegenwerkingen
assets and liabilities         
  • 348x348px
  • 352x352px
  • 627x627px
  • 343x343px
  • 271x271px
  • Liq gap report2
  • 373x373px
THE PRACTICE OF MANAGING FINANCIAL RISKS THAT ARISE DUE TO MISMATCHES BETWEEN THE ASSETS AND LIABILITIES AS PART OF AN INVESTMENT STRATEGY IN FINANCIAL ACCOUNTING
Asset-liability management; Assets and Liabilities; Liability management; Assets and liabilities; Assets Liabilities; Asset and Liability Management; Asset liability management
activa en passiva {bankrekening}

Définition

protected mode
An operating mode of Intel 80x86 processors. The opposite of real mode. The Intel 8088, Intel 8086, Intel 80188 and Intel 80186 had only real mode, processors beginning with the Intel 80286 feature a second mode called protected mode. In real mode, addresses are generated by adding an address offset to the value of a segment register shifted left four bits. As the segment register and address offset are 16 bits long this results in a 20-bit address. This is the origin of the one megabyte (2^20) limit in real mode. There are 4 segment registers on processors before the {Intel 80386}. The 80386 introduced two more segment registers. Which segment register is used depends on the instruction, on the addressing mode and of an optional instruction prefix which selects the segment register explicitly. In protected mode, the segment registers contain an index into a table of segment descriptors. Each segment descriptor contains the start address of the segment, to which the offset is added to generate the address. In addition, the segment descriptor contains memory protection information. This includes an offset limit and bits for write and read permission. This allows the processor to prevent memory accesses to certain data. The operating system can use this to protect different processes' memory from each other, hence the name "protected mode". While the standard register set belongs to the CPU, the segment registers lie "at the boundary" between the CPU and MMU. Each time a new value is loaded into a segment register while in protected mode, the corresponding descriptor is loaded into a descriptor cache in the (Segment-)MMU. On processors before the Pentium this takes longer than just loading the segment register in real mode. Addresses generated by the CPU (which are segment offsets) are passed to the MMU to be checked against the limit in the segment descriptor and are there added to the segment base address in the descriptor to form a linear address. On a 80386 or later, the linear address is further processed by the paged MMU before the result (the physical address) appears on the chip's address pins. The 80286 doesn't have a paged MMU so the linear address is output directly as the physical address. The paged MMU allows for arbitrary remapping of four klilobyte memory blocks (pages) through a translation table stored in memory. A few entries of this table are cached in the MMU's Translation Lookaside Buffer to avoid excessive memory accesses. After processor reset, all processors start in real mode. Protected mode has to be enabled by software. On the 80286 there exists no documented way back to real mode apart from resetting the processor. Later processors allow switching back to real mode by software. Software which has been written or compiled to run in protected mode must only use segment register values given to it by the operating system. Unfortunately, most application code for MS-DOS, written before the 286, will fail in protected mode because it assumes real mode addressing and writes arbitrary values to segment registers, e.g. in order to perform address calculations. Such use of segment registers is only really necessary with data structures that are larger than 64 kilobytes and thus don't fit into a single segment. This is usually dealt with by the huge memory model in compilers. In this model, compilers generate address arithmetic involving segment registers. A solution which is portable to protected mode with almost the same efficiency would involve using a table of segments instead of calculating new segment register values ad hoc. To ease the transition to protected mode, Intel 80386 and later processors provide "virtual 86 mode". (1995-03-29)

Wikipédia

Asset (intelligence)

In intelligence, assets are persons within organizations or countries being spied upon who provide information for an outside spy. They are sometimes referred to as agents, and in law enforcement parlance, as confidential informants, or "CIs" for short.

There are different categories of assets, including people who:

  • Willingly work for a foreign government for ideological reasons such as being against their own government, but live in a country that doesn't allow political opposition. They may elect to work with a foreign power to change their own country because there are few other ways available.
  • Work in intergovernmental relations for a different part of their government but relay information to their country's intelligence agency. They often obtain useful information in the course of their other work and are sometimes tasked with seeking it out.
  • Work for monetary gain. Intelligence services often pay good wages to people in important positions that are willing to betray secrets.
  • Have been blackmailed and are forced into their role.
  • Do not even know they are being used (so called "useful idiots"). Assets can be loyal to their country, but may still provide a foreign agent with information through failures in information safety, such as using insecure computers or not following proper OPSEC procedures during day-to-day chatting.