-
1 проверка ключа защиты памяти
Русско-английский политехнический словарь > проверка ключа защиты памяти
-
2 ISK
-
3 проверка ключа защиты памяти
Engineering: insert storage instruction key, insert storage keyУниверсальный русско-английский словарь > проверка ключа защиты памяти
-
4 вводить
engage with...
в зацепление с...
- в эксплуатацию — put /introduce, place/ into service
- в "память" (запоминающее устройство) — load the memory /storage/
- (к-л) величину на счетчик — enter (some) data to be displayed on /in/ counter
- данные (в систему) — enter /insert/ data (into system)
- данные с помощью наборного поля — use the keyboard to enter /insert/ data
- данные с помощью наборнаго поля (для индикации на табло) — use the keyboard to type data (on display)
- долготу (широту), начиная со старших разрядов числа до низшего разряда и десятых минуты — insert /enter/ longitude (latitude) from most to least significant digit to nearest tenth of а minute
- знак +/e/ для восточной 6 долготы (на устройстве ввода информации) — press +/e/ key to enter east 6 latitude
-знак +/n/ для северной 2 широты (на уви) — press +/n/ key to enter north 2 latitude
- индикацию по кнопке "ввод" — insert data display by pressing the insert button (or key)
- координаты (правильные) снова — reenter (proper) coordinates
- операцию (напр. ремонт, регулировку, в бюллетене) — include revised information concerning the repair, adjustment
- поправку в... (на...) — introduce correction into... (for...)Русско-английский сборник авиационно-технических терминов > вводить
См. также в других словарях:
Extensible Storage Engine — For JET Red storage engine of Microsoft Access, see Microsoft Jet Database Engine. For the teacher s term, Exceptional education. Extensible Storage Engine (ESE), also known as JET Blue, is an Indexed Sequential Access Method (ISAM) data storage… … Wikipedia
Database storage structures — Database tables/indexes are typically stored on hard disk in one of many forms, ordered/unordered Flat files, ISAM, Heaps, Hash buckets or B+ Trees. These have various advantages and disadvantages discussed in this topic. The most commonly used… … Wikipedia
Surrogate key — A surrogate key in a database is a unique identifier for either an entity in the modeled world or an object in the database. The surrogate key is not derived from application data. Definition Two definitions of a surrogate appear in the… … Wikipedia
ISK — • Insert Storage Key ( > IEEE Standard Dictionary ) • Nasik, India internationale Flughafen Kennung … Acronyms
ISK — [1] Insert Storage Key ( > IEEE Standard Dictionary ) [2] Nasik, India internationale Fughafen Kennung … Acronyms von A bis Z
Bloom filter — The Bloom filter, conceived by Burton H. Bloom in 1970, is a space efficient probabilistic data structure that is used to test whether an element is a member of a set. False positives are possible, but false negatives are not. Elements can be… … Wikipedia
Van Emde Boas tree — A van Emde Boas tree (or van Emde Boas priority queue), also known as a vEB tree, is a tree data structure which implements an associative array with m bit integer keys. It performs all operations in O(log m ) time. Notice that m is the size of… … Wikipedia
Man-in-the-middle attack — Not to be confused with Meet in the middle attack. In cryptography, the man in the middle attack (often abbreviated MITM), bucket brigade attack, or sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent … Wikipedia
Linked list — In computer science, a linked list is a data structure consisting of a group of nodes which together represent a sequence. Under the simplest form, each node is composed of a datum and a reference (in other words, a link) to the next node in the… … Wikipedia
Freenet — Infobox Software name = Freenet caption = An indexing freesite (a freenet hosted page) called The Freedom Engine developer = The Freenet Projectcite web | title = Freenet: People | url = http://freenetproject.org/people.html | date = 2008 09 22 | … Wikipedia
IBM System/36 — The IBM System/36 was a minicomputer marketed by IBM from 1983 to 2000. It was a multi user, multi tasking successor to the System/34. Like the System/34 and the older System/32, the System/36 was primarily programmed in the RPG II language. One… … Wikipedia