access control - definizione. Che cos'è access control
Diclib.com
Dizionario ChatGPT
Inserisci una parola o una frase in qualsiasi lingua 👆
Lingua:

Traduzione e analisi delle parole tramite l'intelligenza artificiale ChatGPT

In questa pagina puoi ottenere un'analisi dettagliata di una parola o frase, prodotta utilizzando la migliore tecnologia di intelligenza artificiale fino ad oggi:

  • come viene usata la parola
  • frequenza di utilizzo
  • è usato più spesso nel discorso orale o scritto
  • opzioni di traduzione delle parole
  • esempi di utilizzo (varie frasi con traduzione)
  • etimologia

Cosa (chi) è access control - definizione

SELECTIVE RESTRICTION OF ACCESS TO A PLACE OR OTHER RESOURCE, ALLOWING ONLY AUTHORIZED USERS
Access Control; Access controls; Access control system; Access Control Systems; Physical access control; Access control protocol; Subject (access control); Authentication in web; Access policy; Personal access control system; Vehicle access control system; Electronic access control
  • Common physical security access control with a finger print.
  • Typical access control door wiring
  • Access control door wiring when using intelligent readers and IO module
  • Access control system using IP controllers
  • Access control system using network-enabled main controllers
  • Access control system using IP readers
  • Access control system using serial main and sub-controllers
  • Access control system using serial main controller and intelligent readers
  • Access control system using serial controllers
  • Access control systems using serial controllers and terminal servers
  • Example of fob based access control using an ACT reader
  • Access control door wiring when using intelligent readers
  • Various control system components
  • Underground entrance to the [[New York City Subway]] system
  • Physical security access control with a [[hand geometry]] scanner
  • Drop Arm Optical Turnstiles Manufactured by Q-Lane Turnstiles LLc
  • A sailor checks an identification card (ID) before allowing a vehicle to enter a military installation.

Media Access Control         
SERVICE LAYER IN IEEE 802 NETWORK STANDARDS
Medium access control sublayer; Medium access controller; MAC layer; Medium Access Control; MAC sublayer; MAC protocol; Media Access Control; Media access control sublayer; Media access control; Media access controller
<networking> (MAC) The lower sublayer of the OSI {data link layer}. The interface between a node's {Logical Link Control} and the network's physical layer. The MAC differs for various physical media. See also MAC Address, Ethernet, IEEE 802.3, token ring. [What does it do? Examples?] (1996-01-29)
Medium access control         
SERVICE LAYER IN IEEE 802 NETWORK STANDARDS
Medium access control sublayer; Medium access controller; MAC layer; Medium Access Control; MAC sublayer; MAC protocol; Media Access Control; Media access control sublayer; Media access control; Media access controller
In IEEE 802 LAN/MAN standards, the medium access control (MAC, also called media access control) sublayer is the layer that controls the hardware responsible for interaction with the wired, optical or wireless transmission medium. The MAC sublayer and the logical link control (LLC) sublayer together make up the data link layer.
Medium Access Control         
SERVICE LAYER IN IEEE 802 NETWORK STANDARDS
Medium access control sublayer; Medium access controller; MAC layer; Medium Access Control; MAC sublayer; MAC protocol; Media Access Control; Media access control sublayer; Media access control; Media access controller

Wikipedia

Access control

In physical security and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.

Locks and login credentials are two analogous mechanisms of access control.

Esempi dal corpus di testo per access control
1. The company ascribed most of the increase to its Passive RFID business – electronic access control and the like.
2. All access points into the building will be monitored by CCTV and have individual access–control keypads.
3. DRM is a generalized term that refers to access control technologies – physical ways to protect computer systems.
4. The delegate companies have extensive experience and knowledge across a range of security products from CCTV, to access control, perimeter detection, alarm monitoring software and data tracking systems.
5. While the government and the Maoists will be responsible for safeguarding these arms, the monitoring of access control will be done by the UN.