"In analogia con l'omonimo termine legato ai trasporti, nel linguaggio informatico il carico utile o payload indica la parte di dati trasmessi effettiva che \u00E8 destinata all'utilizzatore, in contrasto con i metadati e con gli header che servono esclusivamente a far funzionare il protocollo di comunicazione. Nello specifico, l'espressione viene usata: \n* in informatica, per indicare la parte di un che rappresenta il contenuto informativo; \n* nelle reti di telecomunicazione indica la porzione di banda utilizzata per trasportare esclusivamente l'informazione oggetto dello scambio (per esempio, i byte che trasportano i canali telefonici oppure i canali dati oggetto dello scambio) in contrapposizione all'informazione di overhead (header); \n* nei sistemi di distribuzione dei dati, come nei formati archivio, il carico utile \u00E8 costituito dai file immagazzinati; \n* nei malware il payload \u00E8 il carico trasportato da strumenti di compromissione del sistema."@it . . . . . "\u041A\u043E\u0440\u0438\u0441\u043D\u0435 \u043D\u0430\u0432\u0430\u043D\u0442\u0430\u0436\u0435\u043D\u043D\u044F (\u0456\u043D\u0444\u043E\u0440\u043C\u0430\u0442\u0438\u043A\u0430)"@uk . . . . . "\uD398\uC774\uB85C\uB4DC(\uC601\uC5B4: payload)\uB294 \uC0AC\uC6A9\uC5D0 \uC788\uC5B4\uC11C \uC804\uC1A1\uB418\uB294 \uB370\uC774\uD130\uB97C \uB73B\uD55C\uB2E4. \uD398\uC774\uB85C\uB4DC\uB294 \uC804\uC1A1\uC758 \uADFC\uBCF8\uC801\uC778 \uBAA9\uC801\uC774 \uB418\uB294 \uB370\uC774\uD130\uC758 \uC77C\uBD80\uBD84\uC73C\uB85C \uADF8 \uB370\uC774\uD130\uC640 \uD568\uAED8 \uC804\uC1A1\uB418\uB294 \uD5E4\uB354\uC640 \uBA54\uD0C0\uB370\uC774\uD130\uC640 \uAC19\uC740 \uB370\uC774\uD130\uB294 \uC81C\uC678\uD55C\uB2E4. \uCEF4\uD4E8\uD130 \uBCF4\uC548\uC5D0\uC11C \uD398\uC774\uB85C\uB4DC\uB294 \uBA40\uC6E8\uC5B4\uC758 \uC77C\uBD80\uB97C \uB73B\uD55C\uB2E4. \uC6DC, \uBC14\uC774\uB7EC\uC2A4, \uD2B8\uB85C\uC774\uBAA9\uB9C8 \uAC19\uC740 \uD574\uB85C\uC6B4 \uC18C\uD504\uD2B8\uC6E8\uC5B4\uB97C \uBD84\uC11D\uD560 \uB54C \uD398\uC774\uB85C\uB4DC\uB294 \uADF8 \uC18C\uD504\uD2B8\uC6E8\uC5B4\uAC00 \uC8FC\uB294 \uD53C\uD574\uB97C \uB73B\uD55C\uB2E4. \uC608\uB97C \uB4E4\uC5B4 \uD398\uC774\uB85C\uB4DC\uC5D0\uB294 \uB370\uC774\uD130 \uD6FC\uC190, \uC2A4\uD338\uBA54\uC77C, \uAC1C\uC778\uC815\uBCF4\uB97C \uC54C\uC544\uB0B4\uAE30 \uC704\uD574 \uB2E4\uC218\uC5D0\uAC8C \uBCF4\uB0B4\uB294 \uC774\uBA54\uC77C \uB4F1\uC774 \uC788\uB2E4.\uC989 \uD398\uC774\uB85C\uB4DC\uB294 \uC804\uC1A1 \uD589\uC704\uC758 \uBCF8\uB798 \uC758\uB3C4\uB97C \uB73B\uD55C\uB2E4."@ko . . "15160666"^^ . "Payload (informatyka)"@pl . . . . . "Em computa\u00E7\u00E3o e telecomunica\u00E7\u00F5es, a carga \u00FAtil (payload) \u00E9 a parte dos dados transmitidos que \u00E9 a mensagem real pretendida. Cabe\u00E7alhos e metadados s\u00E3o enviados apenas para permitir a entrega de carga \u00FAtil. No contexto de um v\u00EDrus ou worm de computador, a carga \u00FAtil \u00E9 a parte do malware que executa uma a\u00E7\u00E3o maliciosa. O termo \u00E9 emprestado do transporte, onde carga \u00FAtil se refere \u00E0 parte da carga que paga pelo transporte."@pt . "\u0423 \u043E\u0431\u0447\u0438\u0441\u043B\u044E\u0432\u0430\u043B\u044C\u043D\u0456\u0439 \u0442\u0435\u0445\u043D\u0456\u0446\u0456 \u0442\u0430 \u0442\u0435\u043B\u0435\u043A\u043E\u043C\u0443\u043D\u0456\u043A\u0430\u0446\u0456\u044F\u0445 \u043A\u043E\u0440\u0438\u0441\u043D\u0435 \u043D\u0430\u0432\u0430\u043D\u0442\u0430\u0436\u0435\u043D\u043D\u044F \u0454 \u0447\u0430\u0441\u0442\u0438\u043D\u043E\u044E \u043F\u0435\u0440\u0435\u0434\u0430\u043D\u0438\u0445 \u0434\u0430\u043D\u0438\u0445, \u044F\u043A\u0430 \u0454 \u0444\u0430\u043A\u0442\u0438\u0447\u043D\u0438\u043C \u043F\u043E\u0432\u0456\u0434\u043E\u043C\u043B\u0435\u043D\u043D\u044F\u043C. \u0456 \u043C\u0435\u0442\u0430\u0434\u0430\u043D\u0456 \u043D\u0430\u0434\u0441\u0438\u043B\u0430\u044E\u0442\u044C\u0441\u044F \u043B\u0438\u0448\u0435 \u0434\u043B\u044F \u0437\u0430\u0431\u0435\u0437\u043F\u0435\u0447\u0435\u043D\u043D\u044F \u0434\u043E\u0441\u0442\u0430\u0432\u043A\u0438 \u043A\u043E\u0440\u0438\u0441\u043D\u043E\u0433\u043E \u043D\u0430\u0432\u0430\u043D\u0442\u0430\u0436\u0435\u043D\u043D\u044F. \u0423 \u043A\u043E\u043D\u0442\u0435\u043A\u0441\u0442\u0456 \u043A\u043E\u043C\u043F'\u044E\u0442\u0435\u0440\u043D\u043E\u0433\u043E \u0432\u0456\u0440\u0443\u0441\u0443 \u0430\u0431\u043E \u0445\u0440\u043E\u0431\u0430\u043A\u0430 \u043A\u043E\u0440\u0438\u0441\u043D\u0438\u043C \u043D\u0430\u0432\u0430\u043D\u0442\u0430\u0436\u0435\u043D\u043D\u044F\u043C \u0454 \u0447\u0430\u0441\u0442\u0438\u043D\u0430 \u0437\u043B\u043E\u0432\u043C\u0438\u0441\u043D\u043E\u0433\u043E \u043F\u0440\u043E\u0433\u0440\u0430\u043C\u043D\u043E\u0433\u043E \u0437\u0430\u0431\u0435\u0437\u043F\u0435\u0447\u0435\u043D\u043D\u044F, \u044F\u043A\u0430 \u0432\u0438\u043A\u043E\u043D\u0443\u0454 \u0448\u043A\u0456\u0434\u043B\u0438\u0432\u0456 \u0434\u0456\u0457. \u0422\u0435\u0440\u043C\u0456\u043D \u0437\u0430\u043F\u043E\u0437\u0438\u0447\u0435\u043D\u0438\u0439 \u0437 \u0442\u0440\u0430\u043D\u0441\u043F\u043E\u0440\u0442\u0443\u0432\u0430\u043D\u043D\u044F, \u0434\u0435 \u043A\u043E\u0440\u0438\u0441\u043D\u0435 \u043D\u0430\u0432\u0430\u043D\u0442\u0430\u0436\u0435\u043D\u043D\u044F \u043E\u0437\u043D\u0430\u0447\u0430\u0454 \u0447\u0430\u0441\u0442\u0438\u043D\u0443 \u0432\u0430\u043D\u0442\u0430\u0436\u0443, \u0442\u0440\u0430\u043D\u0441\u043F\u043E\u0440\u0442\u0443\u0432\u0430\u043D\u043D\u044F \u044F\u043A\u043E\u0457 \u043E\u043F\u043B\u0430\u0447\u0443\u0454\u0442\u044C\u0441\u044F."@uk . . . . "Em computa\u00E7\u00E3o e telecomunica\u00E7\u00F5es, a carga \u00FAtil (payload) \u00E9 a parte dos dados transmitidos que \u00E9 a mensagem real pretendida. Cabe\u00E7alhos e metadados s\u00E3o enviados apenas para permitir a entrega de carga \u00FAtil. No contexto de um v\u00EDrus ou worm de computador, a carga \u00FAtil \u00E9 a parte do malware que executa uma a\u00E7\u00E3o maliciosa. O termo \u00E9 emprestado do transporte, onde carga \u00FAtil se refere \u00E0 parte da carga que paga pelo transporte."@pt . . "Carico utile (informatica)"@it . "In computing and telecommunications, the payload is the part of transmitted data that is the actual intended message. Headers and metadata are sent only to enable payload delivery. In the context of a computer virus or worm, the payload is the portion of the malware which performs malicious action. The term is borrowed from transportation, where payload refers to the part of the load that pays for transportation."@en . "Datov\u00FD obsah"@cs . . . "\u5728\u8BA1\u7B97\u673A\u79D1\u5B66\u4E0E\u7535\u4FE1\u9886\u57DF\uFF0C\u8D1F\u8F7D\uFF08\u82F1\u8A9E\uFF1APayload\uFF09\u662F\u6570\u636E\u4F20\u8F93\u4E2D\u6240\u6B32\u4F20\u8F93\u7684\u5B9E\u9645\u4FE1\u606F\uFF0C\u901A\u5E38\u4E5F\u88AB\u79F0\u4F5C\u5B9E\u9645\u6570\u636E\u6216\u8005\u6570\u636E\u4F53\u3002\u4FE1\u5934\u4E0E\u5143\u6570\u636E\uFF0C\u6216\u79F0\u4E3A\u5F00\u9500\u6570\u636E\uFF0C\u4EC5\u7528\u4E8E\u8F85\u52A9\u6570\u636E\u4F20\u8F93\u3002 \u5728\u8BA1\u7B97\u673A\u75C5\u6BD2\u6216\u96FB\u8166\u8815\u87F2\u9886\u57DF\u4E2D\uFF0C\u8D1F\u8F7D\u6307\u7684\u662F\u8FDB\u884C\u6709\u5BB3\u64CD\u4F5C\u7684\u90E8\u5206\uFF0C\u4F8B\u5982\uFF1A\u6570\u636E\u9500\u6BC1\u3001\u53D1\u9001\u5783\u573E\u90AE\u4EF6\u7B49\u3002 \u8FD9\u4E00\u672F\u8BED\u6765\u81EA\u8FD0\u8F93\u4E1A\uFF0C\u8FD0\u8F93\u9886\u57DF\u7684\u916C\u8F09\uFF08payload\uFF09\u6307\u7684\u662F\u9700\u8981\u652F\u4ED8\u904B\u8F38\u8CBB\u7528\u7684\u8D27\u7269\u90E8\u5206\u3002"@zh . . "Datov\u00FD obsah, datov\u00E9 pole (anglicky payload) jsou v po\u010D\u00EDta\u010Dov\u00FDch s\u00EDt\u00EDch u\u017Eite\u010Dn\u00E9 informace p\u0159en\u00E1\u0161en\u00E9 p\u0159i p\u0159enosu dat. Jsou tou \u010D\u00E1st\u00ED vys\u00EDlan\u00FDch dat, kv\u016Fli kter\u00E9 se p\u0159enos dat uskute\u010D\u0148uje, oproti dat\u016Fm, kter\u00E1 jsou pos\u00EDl\u00E1na s datov\u00FDm obsahem a kter\u00E1 jeho p\u0159enos umo\u017E\u0148uj\u00ED (jako nap\u0159\u00EDklad hlavi\u010Dky nebo metadata, n\u011Bkdy ozna\u010Dovan\u00E1 za re\u017Eijn\u00ED data)."@cs . . "Met payload wordt in de informatica de informatie bedoeld die over een computernetwerk getransporteerd dient te worden en het doel van het transport vormt. Dit in tegenstelling tot het gehele pakket aan data dat uiteindelijk getransporteerd wordt. Dit pakket omvat zowel de payload als de informatie om het transport mogelijk te maken, zoals metadata en headers. Voorbeelden van een payload zijn tekst, spraak, afbeeldingen en tonen. Aangezien netwerkcommunicatie gewoonlijk uit verschillende lagen bestaat, hangt het er strikt genomen vanaf vanuit welke laag men redeneert wat precies de payload vormt. Wat voor een bovenliggende laag tot de headers behoort zal voor een onderliggende laag tot de payload behoren. In de computerbeveiliging wordt met payload het uiteindelijke resultaat van een computervirus of andere kwaadaardige software bedoeld."@nl . . . "Als Nutzdaten (Englisch payload) bezeichnet man in der Kommunikationstechnik die w\u00E4hrend einer Kommunikation zwischen zwei Partnern transportierten Daten eines Datenpakets, die keine Steuer- oder Protokollinformationen enthalten. Nutzdaten sind u. a. Sprache, Text, Zeichen, Bilder und T\u00F6ne. Das Nutzdatenfeld folgt im Allgemeinen dem Kopf (Header). Je nach Netzwerkprotokoll kann ein Nachspann (Trailer) folgen."@de . . . . . . . . . . "\u30B3\u30F3\u30D4\u30E5\u30FC\u30C6\u30A3\u30F3\u30B0\u3084\u60C5\u5831\u901A\u4FE1\u306B\u304A\u3044\u3066\u3001\u30DA\u30A4\u30ED\u30FC\u30C9\uFF08\u82F1\u8A9E: payload\uFF09\u3068\u306F\u3001\u9001\u4FE1\u30C7\u30FC\u30BF\u306E\u3046\u3061\u3001\u5B9F\u969B\u306B\u610F\u56F3\u3055\u308C\u305F\u30E1\u30C3\u30BB\u30FC\u30B8\u306E\u90E8\u5206\u306E\u3053\u3068\u3067\u3042\u308B\u3002\u30DA\u30A4\u30ED\u30FC\u30C9\u306B\u3001\u305D\u306E\u9001\u4FE1\u30FB\u4F1D\u9001\u3092\u53EF\u80FD\u306B\u3059\u308B\u305F\u3081\u306E\u30D8\u30C3\u30C0\u3084\u30E1\u30BF\u30C7\u30FC\u30BF\u304C\u4ED8\u52A0\u3055\u308C\u3066\u3001\u9001\u4FE1\u30C7\u30FC\u30BF\u3068\u3057\u3066\u9001\u4FE1\u3055\u308C\u308B\u3002 \u30B3\u30F3\u30D4\u30E5\u30FC\u30BF\u30A6\u30A4\u30EB\u30B9\u3001\u30EF\u30FC\u30E0\u306A\u3069\u306E\u30DE\u30EB\u30A6\u30A7\u30A2\u306E\u5834\u5408\u306F\u3001\u60AA\u610F\u306E\u3042\u308B\u52D5\u4F5C\u3092\u3059\u308B\u90E8\u5206\u306E\u30B3\u30FC\u30C9\u306E\u3053\u3068\u3092\u30DA\u30A4\u30ED\u30FC\u30C9\u3068\u3044\u3046\u3002"@ja . "\u8D1F\u8F7D (\u8BA1\u7B97\u673A)"@zh . . . . . "\u30DA\u30A4\u30ED\u30FC\u30C9 (\u30B3\u30F3\u30D4\u30E5\u30FC\u30BF)"@ja . . "En inform\u00E1tica y telecomunicaciones la carga \u00FAtil\u200B (payload en ingl\u00E9s) es el conjunto de datos transmitidos que es en realidad el mensaje o metadatos, que son enviados simplemente para facilitar la entrega del mensaje. El t\u00E9rmino est\u00E1 tomado prestado del transporte de mercanc\u00EDas, donde carga \u00FAtil se refiere a la parte de la carga que se utiliza para costear el transporte."@es . . "Payload"@nl . "\u5728\u8BA1\u7B97\u673A\u79D1\u5B66\u4E0E\u7535\u4FE1\u9886\u57DF\uFF0C\u8D1F\u8F7D\uFF08\u82F1\u8A9E\uFF1APayload\uFF09\u662F\u6570\u636E\u4F20\u8F93\u4E2D\u6240\u6B32\u4F20\u8F93\u7684\u5B9E\u9645\u4FE1\u606F\uFF0C\u901A\u5E38\u4E5F\u88AB\u79F0\u4F5C\u5B9E\u9645\u6570\u636E\u6216\u8005\u6570\u636E\u4F53\u3002\u4FE1\u5934\u4E0E\u5143\u6570\u636E\uFF0C\u6216\u79F0\u4E3A\u5F00\u9500\u6570\u636E\uFF0C\u4EC5\u7528\u4E8E\u8F85\u52A9\u6570\u636E\u4F20\u8F93\u3002 \u5728\u8BA1\u7B97\u673A\u75C5\u6BD2\u6216\u96FB\u8166\u8815\u87F2\u9886\u57DF\u4E2D\uFF0C\u8D1F\u8F7D\u6307\u7684\u662F\u8FDB\u884C\u6709\u5BB3\u64CD\u4F5C\u7684\u90E8\u5206\uFF0C\u4F8B\u5982\uFF1A\u6570\u636E\u9500\u6BC1\u3001\u53D1\u9001\u5783\u573E\u90AE\u4EF6\u7B49\u3002 \u8FD9\u4E00\u672F\u8BED\u6765\u81EA\u8FD0\u8F93\u4E1A\uFF0C\u8FD0\u8F93\u9886\u57DF\u7684\u916C\u8F09\uFF08payload\uFF09\u6307\u7684\u662F\u9700\u8981\u652F\u4ED8\u904B\u8F38\u8CBB\u7528\u7684\u8D27\u7269\u90E8\u5206\u3002"@zh . . "In analogia con l'omonimo termine legato ai trasporti, nel linguaggio informatico il carico utile o payload indica la parte di dati trasmessi effettiva che \u00E8 destinata all'utilizzatore, in contrasto con i metadati e con gli header che servono esclusivamente a far funzionare il protocollo di comunicazione. Nello specifico, l'espressione viene usata:"@it . "\u0423 \u043E\u0431\u0447\u0438\u0441\u043B\u044E\u0432\u0430\u043B\u044C\u043D\u0456\u0439 \u0442\u0435\u0445\u043D\u0456\u0446\u0456 \u0442\u0430 \u0442\u0435\u043B\u0435\u043A\u043E\u043C\u0443\u043D\u0456\u043A\u0430\u0446\u0456\u044F\u0445 \u043A\u043E\u0440\u0438\u0441\u043D\u0435 \u043D\u0430\u0432\u0430\u043D\u0442\u0430\u0436\u0435\u043D\u043D\u044F \u0454 \u0447\u0430\u0441\u0442\u0438\u043D\u043E\u044E \u043F\u0435\u0440\u0435\u0434\u0430\u043D\u0438\u0445 \u0434\u0430\u043D\u0438\u0445, \u044F\u043A\u0430 \u0454 \u0444\u0430\u043A\u0442\u0438\u0447\u043D\u0438\u043C \u043F\u043E\u0432\u0456\u0434\u043E\u043C\u043B\u0435\u043D\u043D\u044F\u043C. \u0456 \u043C\u0435\u0442\u0430\u0434\u0430\u043D\u0456 \u043D\u0430\u0434\u0441\u0438\u043B\u0430\u044E\u0442\u044C\u0441\u044F \u043B\u0438\u0448\u0435 \u0434\u043B\u044F \u0437\u0430\u0431\u0435\u0437\u043F\u0435\u0447\u0435\u043D\u043D\u044F \u0434\u043E\u0441\u0442\u0430\u0432\u043A\u0438 \u043A\u043E\u0440\u0438\u0441\u043D\u043E\u0433\u043E \u043D\u0430\u0432\u0430\u043D\u0442\u0430\u0436\u0435\u043D\u043D\u044F. \u0423 \u043A\u043E\u043D\u0442\u0435\u043A\u0441\u0442\u0456 \u043A\u043E\u043C\u043F'\u044E\u0442\u0435\u0440\u043D\u043E\u0433\u043E \u0432\u0456\u0440\u0443\u0441\u0443 \u0430\u0431\u043E \u0445\u0440\u043E\u0431\u0430\u043A\u0430 \u043A\u043E\u0440\u0438\u0441\u043D\u0438\u043C \u043D\u0430\u0432\u0430\u043D\u0442\u0430\u0436\u0435\u043D\u043D\u044F\u043C \u0454 \u0447\u0430\u0441\u0442\u0438\u043D\u0430 \u0437\u043B\u043E\u0432\u043C\u0438\u0441\u043D\u043E\u0433\u043E \u043F\u0440\u043E\u0433\u0440\u0430\u043C\u043D\u043E\u0433\u043E \u0437\u0430\u0431\u0435\u0437\u043F\u0435\u0447\u0435\u043D\u043D\u044F, \u044F\u043A\u0430 \u0432\u0438\u043A\u043E\u043D\u0443\u0454 \u0448\u043A\u0456\u0434\u043B\u0438\u0432\u0456 \u0434\u0456\u0457. \u0422\u0435\u0440\u043C\u0456\u043D \u0437\u0430\u043F\u043E\u0437\u0438\u0447\u0435\u043D\u0438\u0439 \u0437 \u0442\u0440\u0430\u043D\u0441\u043F\u043E\u0440\u0442\u0443\u0432\u0430\u043D\u043D\u044F, \u0434\u0435 \u043A\u043E\u0440\u0438\u0441\u043D\u0435 \u043D\u0430\u0432\u0430\u043D\u0442\u0430\u0436\u0435\u043D\u043D\u044F \u043E\u0437\u043D\u0430\u0447\u0430\u0454 \u0447\u0430\u0441\u0442\u0438\u043D\u0443 \u0432\u0430\u043D\u0442\u0430\u0436\u0443, \u0442\u0440\u0430\u043D\u0441\u043F\u043E\u0440\u0442\u0443\u0432\u0430\u043D\u043D\u044F \u044F\u043A\u043E\u0457 \u043E\u043F\u043B\u0430\u0447\u0443\u0454\u0442\u044C\u0441\u044F."@uk . . "Als Nutzdaten (Englisch payload) bezeichnet man in der Kommunikationstechnik die w\u00E4hrend einer Kommunikation zwischen zwei Partnern transportierten Daten eines Datenpakets, die keine Steuer- oder Protokollinformationen enthalten. Nutzdaten sind u. a. Sprache, Text, Zeichen, Bilder und T\u00F6ne. Bei verschachtelten Protokollen (Protokollstapel) h\u00E4ngt die Bezeichnung Nutzdaten vom betrachteten Protokoll ab: Die Nutzdaten werden zur Durchf\u00FChrung des Protokolls um die protokollspezifisch notwendigen Headerinformationen erweitert. Die erhaltenen Daten werden an die darunterliegende Protokollschicht \u00FCbergeben \u2013 und stellen aus Sicht dieses Protokolls wiederum Nutzdaten dar. Das Nutzdatenfeld folgt im Allgemeinen dem Kopf (Header). Je nach Netzwerkprotokoll kann ein Nachspann (Trailer) folgen."@de . . . . . . "Payload \u2013 fragment przesy\u0142anych danych, b\u0119d\u0105cy form\u0105 wiadomo\u015Bci. Payload nie zawiera informacji wysy\u0142anych wraz z nim, takich jak nag\u0142\u00F3wki b\u0105d\u017A metadane, czasami okre\u015Blane jako dane og\u00F3lne, wysy\u0142ane wy\u0142\u0105cznie w celu u\u0142atwienia dostarczenia pakietu."@pl . . "En inform\u00E1tica y telecomunicaciones la carga \u00FAtil\u200B (payload en ingl\u00E9s) es el conjunto de datos transmitidos que es en realidad el mensaje o metadatos, que son enviados simplemente para facilitar la entrega del mensaje. El t\u00E9rmino est\u00E1 tomado prestado del transporte de mercanc\u00EDas, donde carga \u00FAtil se refiere a la parte de la carga que se utiliza para costear el transporte."@es . "\u0641\u064A \u0623\u0645\u0646 \u0627\u0644\u062D\u0627\u0633\u0648\u0628\u060C \u064A\u0634\u064A\u0631 \u0645\u0635\u0637\u0644\u062D \u0627\u0644\u062D\u0645\u0648\u0644\u0629 (\u0628\u0627\u064A\u0644\u0648\u062F \u00AB\u0627\u0644\u062D\u0645\u0648\u0644\u0629 \u0627\u0644\u0645\u0624\u062F\u0649 \u0639\u0646\u0647\u0627\u00BB \u0623\u064A \u062E\u0644\u0627\u0641 \u0627\u0644\u0648\u0632\u0646 \u0627\u0644\u0625\u062C\u0645\u0627\u0644\u064A \u0644\u0648\u0633\u064A\u0644\u0629 \u0627\u0644\u0634\u062D\u0646 \u0627\u0644\u062A\u064A \u0644\u0627 \u064A\u0624\u062F\u0649 \u0625\u0644\u0627 \u0639\u0646 \u062D\u0645\u0648\u0644\u062A\u0647\u0627) \u0625\u0644\u0649 \u0627\u0644\u062C\u0632\u0621 \u0627\u0644\u0645\u0646\u0641\u0651\u0630 \u0644\u0644\u0639\u0645\u0644 \u0627\u0644\u062E\u0628\u064A\u062B \u0641\u064A \u0627\u0644\u0628\u0631\u0627\u0645\u062C \u0627\u0644\u0636\u0627\u0631\u0629.\u0641\u064A \u062A\u062D\u0644\u064A\u0644 \u0627\u0644\u0628\u0631\u0627\u0645\u062C \u0627\u0644\u0636\u0627\u0631\u0629\u060C \u064A\u0634\u064A\u0631 \u0627\u0644\u0645\u0635\u0637\u0644\u062D \u0625\u0644\u0649 \u0627\u0644\u0646\u062A\u0627\u0626\u062C \u0627\u0644\u0636\u0627\u0631\u0629 \u0627\u0644\u0646\u0627\u062A\u062C\u0629 \u0639\u0646 \u062A\u0644\u0643 \u0627\u0644\u0628\u0631\u0627\u0645\u062C.\u0645\u0646 \u0623\u0645\u062B\u0644\u0629 \u0627\u0644\u0628\u0627\u064A\u0644\u0648\u062F\u0632: \u062A\u062F\u0645\u064A\u0631 \u0627\u0644\u0628\u064A\u0627\u0646\u0627\u062A\u060C \u0631\u0633\u0627\u0626\u0644 \u062A\u062D\u0645\u0644 \u0646\u0635 \u0645\u0633\u064A\u0621\u060C \u0623\u0648 \u0631\u0633\u0627\u0626\u0644 \u0625\u0644\u0643\u062A\u0631\u0648\u0646\u064A\u0629 \u0632\u0627\u0626\u0641\u0629 \u0645\u0631\u0633\u0644\u0629 \u0625\u0644\u0649 \u0643\u0645 \u0643\u0628\u064A\u0631 \u0645\u0646 \u0627\u0644\u0623\u0634\u062E\u0627\u0635."@ar . "Payload"@ru . . "\u062D\u0645\u0648\u0644\u0629 (\u062D\u0648\u0633\u0628\u0629)"@ar . . "Payload (computing)"@en . "Datov\u00FD obsah, datov\u00E9 pole (anglicky payload) jsou v po\u010D\u00EDta\u010Dov\u00FDch s\u00EDt\u00EDch u\u017Eite\u010Dn\u00E9 informace p\u0159en\u00E1\u0161en\u00E9 p\u0159i p\u0159enosu dat. Jsou tou \u010D\u00E1st\u00ED vys\u00EDlan\u00FDch dat, kv\u016Fli kter\u00E9 se p\u0159enos dat uskute\u010D\u0148uje, oproti dat\u016Fm, kter\u00E1 jsou pos\u00EDl\u00E1na s datov\u00FDm obsahem a kter\u00E1 jeho p\u0159enos umo\u017E\u0148uj\u00ED (jako nap\u0159\u00EDklad hlavi\u010Dky nebo metadata, n\u011Bkdy ozna\u010Dovan\u00E1 za re\u017Eijn\u00ED data)."@cs . . . "Payload \u2013 fragment przesy\u0142anych danych, b\u0119d\u0105cy form\u0105 wiadomo\u015Bci. Payload nie zawiera informacji wysy\u0142anych wraz z nim, takich jak nag\u0142\u00F3wki b\u0105d\u017A metadane, czasami okre\u015Blane jako dane og\u00F3lne, wysy\u0142ane wy\u0142\u0105cznie w celu u\u0142atwienia dostarczenia pakietu. Termin \u201Epayload\u201D s\u0142u\u017Cy do rozr\u00F3\u017Cnienia \u201Eistotnych\u201D informacji w otrzymanym pakiecie od metadanych wykorzystanych do jego obs\u0142ugi. Poj\u0119cie to jest zapo\u017Cyczone z dziedziny transportu, gdzie odnosi si\u0119 ono do \u201Ewarto\u015Bciowej\u201D cz\u0119\u015Bci obci\u0105\u017Cenia. Przyk\u0142adowo \u0142adowno\u015B\u0107 cysterny wynosi 20 ton oleju, lecz masa ca\u0142kowita pojazdu w pe\u0142ni za\u0142adowanego jest du\u017Co wi\u0119ksza, poniewa\u017C dochodzi do tego m.in. masa zbiornika, \u0142adunku, pojazdu, kierowcy etc. U\u017Cywanie pojazdu do transportu \u0142adunku wi\u0105\u017Ce si\u0119 z kosztami, ale klient p\u0142aci (ang. pay) tylko za dostarczony olej (czyli \u0142adunek \u2013 ang. load), st\u0105d okre\u015Blenie payload."@pl . . . . . . . "\u0641\u064A \u0623\u0645\u0646 \u0627\u0644\u062D\u0627\u0633\u0648\u0628\u060C \u064A\u0634\u064A\u0631 \u0645\u0635\u0637\u0644\u062D \u0627\u0644\u062D\u0645\u0648\u0644\u0629 (\u0628\u0627\u064A\u0644\u0648\u062F \u00AB\u0627\u0644\u062D\u0645\u0648\u0644\u0629 \u0627\u0644\u0645\u0624\u062F\u0649 \u0639\u0646\u0647\u0627\u00BB \u0623\u064A \u062E\u0644\u0627\u0641 \u0627\u0644\u0648\u0632\u0646 \u0627\u0644\u0625\u062C\u0645\u0627\u0644\u064A \u0644\u0648\u0633\u064A\u0644\u0629 \u0627\u0644\u0634\u062D\u0646 \u0627\u0644\u062A\u064A \u0644\u0627 \u064A\u0624\u062F\u0649 \u0625\u0644\u0627 \u0639\u0646 \u062D\u0645\u0648\u0644\u062A\u0647\u0627) \u0625\u0644\u0649 \u0627\u0644\u062C\u0632\u0621 \u0627\u0644\u0645\u0646\u0641\u0651\u0630 \u0644\u0644\u0639\u0645\u0644 \u0627\u0644\u062E\u0628\u064A\u062B \u0641\u064A \u0627\u0644\u0628\u0631\u0627\u0645\u062C \u0627\u0644\u0636\u0627\u0631\u0629.\u0641\u064A \u062A\u062D\u0644\u064A\u0644 \u0627\u0644\u0628\u0631\u0627\u0645\u062C \u0627\u0644\u0636\u0627\u0631\u0629\u060C \u064A\u0634\u064A\u0631 \u0627\u0644\u0645\u0635\u0637\u0644\u062D \u0625\u0644\u0649 \u0627\u0644\u0646\u062A\u0627\u0626\u062C \u0627\u0644\u0636\u0627\u0631\u0629 \u0627\u0644\u0646\u0627\u062A\u062C\u0629 \u0639\u0646 \u062A\u0644\u0643 \u0627\u0644\u0628\u0631\u0627\u0645\u062C.\u0645\u0646 \u0623\u0645\u062B\u0644\u0629 \u0627\u0644\u0628\u0627\u064A\u0644\u0648\u062F\u0632: \u062A\u062F\u0645\u064A\u0631 \u0627\u0644\u0628\u064A\u0627\u0646\u0627\u062A\u060C \u0631\u0633\u0627\u0626\u0644 \u062A\u062D\u0645\u0644 \u0646\u0635 \u0645\u0633\u064A\u0621\u060C \u0623\u0648 \u0631\u0633\u0627\u0626\u0644 \u0625\u0644\u0643\u062A\u0631\u0648\u0646\u064A\u0629 \u0632\u0627\u0626\u0641\u0629 \u0645\u0631\u0633\u0644\u0629 \u0625\u0644\u0649 \u0643\u0645 \u0643\u0628\u064A\u0631 \u0645\u0646 \u0627\u0644\u0623\u0634\u062E\u0627\u0635."@ar . "\uD398\uC774\uB85C\uB4DC (\uCEF4\uD4E8\uD305)"@ko . "Carga \u00FAtil (computa\u00E7\u00E3o)"@pt . . "In computing and telecommunications, the payload is the part of transmitted data that is the actual intended message. Headers and metadata are sent only to enable payload delivery. In the context of a computer virus or worm, the payload is the portion of the malware which performs malicious action. The term is borrowed from transportation, where payload refers to the part of the load that pays for transportation."@en . . . . . . . . . "1116442676"^^ . "2973"^^ . . "Carga \u00FAtil (inform\u00E1tica)"@es . "\u30B3\u30F3\u30D4\u30E5\u30FC\u30C6\u30A3\u30F3\u30B0\u3084\u60C5\u5831\u901A\u4FE1\u306B\u304A\u3044\u3066\u3001\u30DA\u30A4\u30ED\u30FC\u30C9\uFF08\u82F1\u8A9E: payload\uFF09\u3068\u306F\u3001\u9001\u4FE1\u30C7\u30FC\u30BF\u306E\u3046\u3061\u3001\u5B9F\u969B\u306B\u610F\u56F3\u3055\u308C\u305F\u30E1\u30C3\u30BB\u30FC\u30B8\u306E\u90E8\u5206\u306E\u3053\u3068\u3067\u3042\u308B\u3002\u30DA\u30A4\u30ED\u30FC\u30C9\u306B\u3001\u305D\u306E\u9001\u4FE1\u30FB\u4F1D\u9001\u3092\u53EF\u80FD\u306B\u3059\u308B\u305F\u3081\u306E\u30D8\u30C3\u30C0\u3084\u30E1\u30BF\u30C7\u30FC\u30BF\u304C\u4ED8\u52A0\u3055\u308C\u3066\u3001\u9001\u4FE1\u30C7\u30FC\u30BF\u3068\u3057\u3066\u9001\u4FE1\u3055\u308C\u308B\u3002 \u30B3\u30F3\u30D4\u30E5\u30FC\u30BF\u30A6\u30A4\u30EB\u30B9\u3001\u30EF\u30FC\u30E0\u306A\u3069\u306E\u30DE\u30EB\u30A6\u30A7\u30A2\u306E\u5834\u5408\u306F\u3001\u60AA\u610F\u306E\u3042\u308B\u52D5\u4F5C\u3092\u3059\u308B\u90E8\u5206\u306E\u30B3\u30FC\u30C9\u306E\u3053\u3068\u3092\u30DA\u30A4\u30ED\u30FC\u30C9\u3068\u3044\u3046\u3002"@ja . . . "Met payload wordt in de informatica de informatie bedoeld die over een computernetwerk getransporteerd dient te worden en het doel van het transport vormt. Dit in tegenstelling tot het gehele pakket aan data dat uiteindelijk getransporteerd wordt. Dit pakket omvat zowel de payload als de informatie om het transport mogelijk te maken, zoals metadata en headers. In de computerbeveiliging wordt met payload het uiteindelijke resultaat van een computervirus of andere kwaadaardige software bedoeld."@nl . "Nutzdaten"@de . "\uD398\uC774\uB85C\uB4DC(\uC601\uC5B4: payload)\uB294 \uC0AC\uC6A9\uC5D0 \uC788\uC5B4\uC11C \uC804\uC1A1\uB418\uB294 \uB370\uC774\uD130\uB97C \uB73B\uD55C\uB2E4. \uD398\uC774\uB85C\uB4DC\uB294 \uC804\uC1A1\uC758 \uADFC\uBCF8\uC801\uC778 \uBAA9\uC801\uC774 \uB418\uB294 \uB370\uC774\uD130\uC758 \uC77C\uBD80\uBD84\uC73C\uB85C \uADF8 \uB370\uC774\uD130\uC640 \uD568\uAED8 \uC804\uC1A1\uB418\uB294 \uD5E4\uB354\uC640 \uBA54\uD0C0\uB370\uC774\uD130\uC640 \uAC19\uC740 \uB370\uC774\uD130\uB294 \uC81C\uC678\uD55C\uB2E4. \uCEF4\uD4E8\uD130 \uBCF4\uC548\uC5D0\uC11C \uD398\uC774\uB85C\uB4DC\uB294 \uBA40\uC6E8\uC5B4\uC758 \uC77C\uBD80\uB97C \uB73B\uD55C\uB2E4. \uC6DC, \uBC14\uC774\uB7EC\uC2A4, \uD2B8\uB85C\uC774\uBAA9\uB9C8 \uAC19\uC740 \uD574\uB85C\uC6B4 \uC18C\uD504\uD2B8\uC6E8\uC5B4\uB97C \uBD84\uC11D\uD560 \uB54C \uD398\uC774\uB85C\uB4DC\uB294 \uADF8 \uC18C\uD504\uD2B8\uC6E8\uC5B4\uAC00 \uC8FC\uB294 \uD53C\uD574\uB97C \uB73B\uD55C\uB2E4. \uC608\uB97C \uB4E4\uC5B4 \uD398\uC774\uB85C\uB4DC\uC5D0\uB294 \uB370\uC774\uD130 \uD6FC\uC190, \uC2A4\uD338\uBA54\uC77C, \uAC1C\uC778\uC815\uBCF4\uB97C \uC54C\uC544\uB0B4\uAE30 \uC704\uD574 \uB2E4\uC218\uC5D0\uAC8C \uBCF4\uB0B4\uB294 \uC774\uBA54\uC77C \uB4F1\uC774 \uC788\uB2E4.\uC989 \uD398\uC774\uB85C\uB4DC\uB294 \uC804\uC1A1 \uD589\uC704\uC758 \uBCF8\uB798 \uC758\uB3C4\uB97C \uB73B\uD55C\uB2E4."@ko . . .