-
1 speech recognition
"The ability to interpret vocal commands or convert spoken words into computer-readable text. Speech recognition programs enable you to control an application or enter text by speaking into a microphone, rather than by using a keyboard." -
2 optical character recognition line
A line of characters that is read by special character recognition equipment and translated into computer text.English-Arabic terms dictionary > optical character recognition line
-
3 OCR line
A line of characters that is read by special character recognition equipment and translated into computer text. -
4 USB flash drive
"A small device used to store information. USB flash drives plug into computer USB ports so you can copy information to or from them, making it easy to share and transport information." -
5 USB drive
"A small device used to store information. USB flash drives plug into computer USB ports so you can copy information to or from them, making it easy to share and transport information." -
6 server process
"A process that hosts Component Object Model (COM) components. A COM component can be loaded into a surrogate server process, either on the client computer (local) or on another computer (remote). It can also be loaded into a client application process (in process)." -
7 docking station
"A unit for housing a portable computer that contains a power connection, expansion slots, and connections to peripherals, such as a monitor, printer, full-sized keyboard, and mouse. The docking station turns the portable computer into a desktop computer." -
8 ar-sa برنامج أجهزة FlexGo
"The act of forcing a computer into Hardware Locked Mode (HLM), where the computer is not under the control of the operating system; instead, the boot sequence is stopped at a firmware screen and the user is told to call customer support. Hardware Locked Mode (HLM) prevents the use of a computer in the case of tampering or default on the agreement with the customer." -
9 hardware locking
"The act of forcing a computer into Hardware Locked Mode (HLM), where the computer is not under the control of the operating system; instead, the boot sequence is stopped at a firmware screen and the user is told to call customer support. Hardware Locked Mode (HLM) prevents the use of a computer in the case of tampering or default on the agreement with the customer." -
10 land attack
"A denial-of-service attack (DoS) in which the attacker opens a legitimate TCP session with a spoofed source IP address and port number that match the IP address and port number of the targeted computer so that the targeted computer will try to establish a TCP session with itself, causing some TCP implementations to go into a loop and the computer to fail." -
11 data-link layer
"Layer two of the OSI model. A layer that packages raw bits from the physical layer into frames (logical, structured packets for data). This layer is responsible for transferring frames from one computer to another, without errors. After sending a frame, the data-link layer waits for an acknowledgment from the receiving computer." -
12 MAC address
"A 12-digit hexadecimal address that is preprogrammed into a computer's network adapter, and that uniquely identifies that computer on the network." -
13 pause usage time
To stop metering computer usage time by putting the computer into standby.يوقف وقت الاستخدام مؤقتاً -
14 Ethernet address
"A 12-digit hexadecimal address that is preprogrammed into a computer's network adapter, and that uniquely identifies that computer on the network." -
15 Frequent Restart Mode
"A state that the computer goes into when it has used up all usage time, including borrowed usage time or reserve time. In this mode, the computer is restarted with a set amount of additional borrowed usage time or reserve time and restarts again every time that the borrowed usage time or reserve time is used up." -
16 FRM
"A state that the computer goes into when it has used up all usage time, including borrowed usage time or reserve time. In this mode, the computer is restarted with a set amount of additional borrowed usage time or reserve time and restarts again every time that the borrowed usage time or reserve time is used up." -
17 Remote Direct Memory Access
A networking feature that lets one computer directly place information into the memory of another computer.الوصول المباشر إلى الذاكرة عن بُعدEnglish-Arabic terms dictionary > Remote Direct Memory Access
-
18 RDMA
A networking feature that lets one computer directly place information into the memory of another computer. -
19 disk
A device used to store information. There are two types of disks. Hard disks are permanent and installed into your computer. Floppy disks are portable and can be inserted into and removed from a floppy disk drive. -
20 domain tree
"In DNS, the inverted hierarchical tree structure that is used to index domain names. Domain trees are similar in purpose and concept to the directory trees used by computer filing systems for disk storage. For example, when numerous files are stored on disk, directories can be used to organize the files into logical collections. When a domain tree has one or more branches, each branch can organize domain names used in the namespace into logical collections."
См. также в других словарях:
computer science — computer scientist. the science that deals with the theory and methods of processing information in digital computers, the design of computer hardware and software, and the applications of computers. [1970 75] * * * Study of computers, their… … Universalium
Computer poker players — are computer programs designed to play the game of poker against human opponents or other computer opponents. They are commonly referred to as pokerbots or just simply bots. Contents 1 On the Internet 1.1 Player bots 1.1.1 House enforcement … Wikipedia
Computer Fraud and Abuse Act — n. A federal law passed in 1986 that made hacking into computer systems illegal. abbrv. CFAA The Essential Law Dictionary. Sphinx Publishing, An imprint of Sourcebooks, Inc. Amy Hackney Blackwell. 2008 … Law dictionary
Computer Go — Part of a series of articles on Go (board game) Game specifics Go rules Go handicaps Go proverbs Go terms Go strategy and tactics Fuseki (whole board openings) Joseki (corner based openings) Life and death Tsumego … Wikipedia
computer animation — also known as computer generated images (CGI) Form of animated graphics that has replaced stop motion animation of scale model puppets or drawings. Efforts to lessen the labour and costs of animation have led to simplification and computerization … Universalium
Computer-assisted language learning — (CALL) is succinctly defined in a seminal work by Levy (1997: p. 1) as the search for and study of applications of the computer in language teaching and learning .[1] CALL embraces a wide range of ICT applications and approaches to teaching… … Wikipedia
Computer ethics — is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct.[1] Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia… … Wikipedia
Computer recycling — Computer monitors are typically packed into low stacks on wooden pallets for recycling and then shrink wrapped.[1] Computer recycling or electronic recycling is the recycling or reuse of computers or other electronics. It includes both finding… … Wikipedia
Computer-supported collaboration — (CSC) research focuses on technology that affects groups, organizations, communities and societies, e.g., voice mail and text chat. It grew from cooperative work study of supporting people s work activities and working relationships. As net… … Wikipedia
Computer Warriors — was a toy line made by Mattel from 1989 1990. The storyline behind the toys involves a top secret government computer which unleashes evil Virus troops. These troops, led by Megahert, hide in everyday household objects and have the goal of world… … Wikipedia
Computer music — is a term that was originally used within academia to describe a field of study relating to the applications of computing technology in music composition; particularly that stemming from the Western art music tradition. It includes the theory and … Wikipedia