-
1 dongle
A security device connected to an input/output port to permit the use of a particular software package on that computer. The use of the hardware key hash permits backup copying of software but prevents its unlicensed use on additional computers. -
2 address mask
"A number that, when compared by the computer with a network address number, will block out all but the necessary information. For example, in a network that uses XXX.XXX.XXX.YYY and where all computers within the network use the same first address numbers, the mask will block out XXX.XXX.XXX and use only the significant numbers in the address, YYY." -
3 ar-sa مخطط جانت
"A process for automatic recovery of heap memory. Blocks of memory that had been allocated but are no longer in use are freed, and blocks of memory still in use may be moved to consolidate the free memory into larger blocks." -
4 garbage collection
"A process for automatic recovery of heap memory. Blocks of memory that had been allocated but are no longer in use are freed, and blocks of memory still in use may be moved to consolidate the free memory into larger blocks." -
5 GC
"A process for automatic recovery of heap memory. Blocks of memory that had been allocated but are no longer in use are freed, and blocks of memory still in use may be moved to consolidate the free memory into larger blocks."GC -
6 BIND boot file
"A configuration file used by DNS servers running under versions of the Berkeley Internet Name Domain (BIND) software implementation. The BIND boot file is a text file, Named.boot, where individual lines in the file list boot directives used to start a service when the DNS server is started. By default, Microsoft DNS servers use DNS service parameters stored in the registry, but they allow the use of a BIND boot file as an alternative for reading boot configuration settings." -
7 control point
"The reference point in a compensation range that represents the intended average pay for all employees at that compensation level. For grade structures, control points are typically, but not always, the range midpoint. Broad band structures can use control points but rarely do." -
8 child
"An account holder who is a family member, but not a parent, and who has limited use of the Internet. Children can view their own settings, but they can't change them." -
9 calculator
"Broadly, any device that performs arithmetic operations on numbers. Sophisticated calculators can be programmed for certain functions and can store values in memory, but they differ from computers in several ways: they have a fixed set of commands, they do not recognize text, they cannot retrieve values stored in a data file, and they cannot find and use values generated by a program such as a spreadsheet." -
10 CRC
"A procedure used in checking for errors in data transmission. CRC error checking uses a complex calculation to generate a number based on the data transmitted. The sending device performs the calculation before transmission and includes it in the packet that it sends to the receiving device. The receiving device repeats the same calculation after transmission. If both devices obtain the same result, it is assumed that the transmission was error free. The procedure is known as a redundancy check because each transmission includes not only data but extra (redundant) error-checking values. Communications protocols such as XMODEM and Kermit use cyclical redundancy checking." -
11 cyclic redundancy check
"A procedure used in checking for errors in data transmission. CRC error checking uses a complex calculation to generate a number based on the data transmitted. The sending device performs the calculation before transmission and includes it in the packet that it sends to the receiving device. The receiving device repeats the same calculation after transmission. If both devices obtain the same result, it is assumed that the transmission was error free. The procedure is known as a redundancy check because each transmission includes not only data but extra (redundant) error-checking values. Communications protocols such as XMODEM and Kermit use cyclical redundancy checking." -
12 cyclical redundancy check
"A procedure used in checking for errors in data transmission. CRC error checking uses a complex calculation to generate a number based on the data transmitted. The sending device performs the calculation before transmission and includes it in the packet that it sends to the receiving device. The receiving device repeats the same calculation after transmission. If both devices obtain the same result, it is assumed that the transmission was error free. The procedure is known as a redundancy check because each transmission includes not only data but extra (redundant) error-checking values. Communications protocols such as XMODEM and Kermit use cyclical redundancy checking." -
13 idle
Operational but not in use.معطّل -
14 resource record
"A standard DNS database structure containing information used to process DNS queries. For example, an address (A) resource record contains an IP address corresponding to a host name. Most of the basic resource record types are defined in RFC 1035, but additional RR types have been defined in other RFCs and approved for use with DNS." -
15 RR
"A standard DNS database structure containing information used to process DNS queries. For example, an address (A) resource record contains an IP address corresponding to a host name. Most of the basic resource record types are defined in RFC 1035, but additional RR types have been defined in other RFCs and approved for use with DNS."RR -
16 skin
A customized user interface that overlays an existing user interface. A skin customizes the look of the program but does not affect its functionality. Programs that allow the use of skins usually make standards available for the creation and distribution of new skins. -
17 standby
"A state in which your computer consumes less power when it is idle, but remains available for immediate use. While your computer is on standby, information in computer memory is not saved on your hard disk. If there is an interruption in power, the information in memory is lost." -
18 mounted drive
"A drive attached to an empty folder on an NTFS volume. Mounted drives function the same as any other drive, but are assigned a label or name instead of a drive letter. The mounted drive's name is resolved to a full file system path instead of just a drive letter. Members of the Administrators group can use Disk Management to create mounted drives or reassign drive letters."محركات الأقراص المحمّلة -
19 memory leak
A condition that occurs when an application allocates memory for use but does not free allocated memory when finished. -
20 generic type definition
"The definition of a generic type, in which type parameters act as placeholders for types that the user supplies when creating instances to use. These instances are not instances of the generic type definition, but of the constructed type formed by specifying type arguments."
- 1
- 2
См. также в других словарях:
Use value — In Marx s critique of political economy, any labor product has a value and a use value, and if it is traded as a commodity in markets, it additionally has an exchange value, most often expressed as a money price. Marx acknowledges that… … Wikipedia
use — n 1 Use, service, advantage, profit, account, avail can all mean a useful or valuable end, result, or purpose. Use stresses either employment for some purpose or end of practical value {turn every scrap of material to use} or the practical value… … New Dictionary of Synonyms
use — 1 / yüs/ n 1 a: an arrangement in which property is granted to another with the trust and confidence that the grantor or another is entitled to the beneficial enjoyment of it see also trust; statute of uses in the important laws section ◇ Uses… … Law dictionary
Use of Beads at Prayers — Use of Beads at Prayers † Catholic Encyclopedia ► Use of Beads at Prayers Beads variously strung together, according to the kind, order, and number of prayers in certain forms of devotion, are in common use among Catholics as an… … Catholic encyclopedia
Use of York — Use of York † Catholic Encyclopedia ► Use of York It was a received principle in medieval canon law that while as regards judicial matters, as regards the sacraments, and also the more solemn fasts, the custom of the Roman Church was… … Catholic encyclopedia
but — 1. general. But is a preposition and conjunction, and is used contrastively: (preposition) Everyone seems to know but me / (conjunction) Everyone seems to know but I don t. In more modern usage, as the OED and Fowler (1926) have both recognized,… … Modern English usage
Use (law) — Use, as a term in real property law of common law countries, amounts to a recognition of the duty of a person, to whom property has been conveyed for certain purposes, to carry out those purposes.Uses were equitable or beneficial interests in… … Wikipedia
Use case model — is a model that describes a system’s functional requirements in terms of use cases. Consists of all the actors of the system and all the various use cases by which the actor interact with the system, thereby describing the total functional… … Wikipedia
Use of Free and Open Source Software (FOSS) in the U.S. Department of Defense — is a 2003 report by The MITRE Corporation that documented widespread use of and reliance on free software (termed FOSS ) within the United States Department of Defense (DoD). The report helped end a debate about whether FOSS should be banned from … Wikipedia
Use of Numbers in the Church — Use of Numbers in the Church † Catholic Encyclopedia ► Use of Numbers in the Church No attentive reader of the Old Testament can fail to notice that a certain sacredness seems to attach to particular numbers, for example, seven, forty … Catholic encyclopedia
Use of Wealth — Use of Wealth † Catholic Encyclopedia ► Use of Wealth The term wealth is not used here in the technical sense in which it occurs in treatises on economic subjects, but rather in its common acceptation, synonymous with riches. The… … Catholic encyclopedia