-
1 неразрешенное обновление базы данных
неразрешенное обновление базы данных
—
[Л.Г.Суменко. Англо-русский словарь по информационным технологиям. М.: ГП ЦНИИС, 2003.]Тематики
EN
Русско-английский словарь нормативно-технической терминологии > неразрешенное обновление базы данных
См. также в других словарях:
Database — A database is an organized collection of data for one or more purposes, usually in digital form. The data are typically organized to model relevant aspects of reality (for example, the availability of rooms in hotels), in a way that supports… … Wikipedia
Database management system — A database management system (DBMS) is a software package with computer programs that control the creation, maintenance, and the use of a database. It allows organizations to conveniently develop databases for various applications by database… … Wikipedia
неразрешенное обновление базы данных — — [Л.Г.Суменко. Англо русский словарь по информационным технологиям. М.: ГП ЦНИИС, 2003.] Тематики информационные технологии в целом EN database unauthorized updating … Справочник технического переводчика
Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer. The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… … Universalium
Microsoft Data Access Components — MDAC redirects here. For other uses, see MDAC (disambiguation). MDAC (Microsoft Data Access Components) Microsoft Corporation s MDAC provides a uniform framework for accessing a variety of data sources on their Windows platform. Developer(s)… … Wikipedia
encyclopaedia — Reference work that contains information on all branches of knowledge or that treats a particular branch of knowledge comprehensively. It is self contained and explains subjects in greater detail than a dictionary. It differs from an almanac in… … Universalium
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Legal aspects of computing — Part of a series on the Legal aspects of computing Major topics File sharing Legal aspects of hyperlinking and framing Lesser or historical topics Spamming … Wikipedia
iTunes — This article is about the application. For the online media service, see iTunes Store. iTunes iTunes 10.5 running on Mac OS X Lion … Wikipedia
DNS zone transfer — DNS zone transfer, also sometimes known by its (most common) opcode mnemonic AXFR, is a type of DNS transaction. It is one of the many mechanisms available for administrators to employ for replicating the databases containing the DNS data across… … Wikipedia
Lock (computer science) — In computer science, a lock is a synchronization mechanism for enforcing limits on access to a resource in an environment where there are many threads of execution. Locks are one way of enforcing concurrency control policies. Contents 1 Types 2… … Wikipedia