-
1 IEEE 1667 compatible silo
"A silo that is defined outside of the IEEE 1667 Working Group but uses the IEEE 1667 protocol to provide extensibility to allow people outside the IEEE 1667 Working Group (e.g. other standards, individuals, companies) to define a silo that uses the IEEE 1667 protocol for host to device communication." -
2 active scripting
A Microsoft technology that uses COM to run third-party scripts in Microsoft Internet Explorer without regard to language and other elements of implementation. -
3 bar code reader
"An optical device that uses a laser beam to read and interpret bar codes, such as the Universal Product Codes, found on grocery products and other retail items." -
4 CBT
"The use of computers and specially developed tutorial programs for teaching. CBT uses color, graphics, and other attention-getting aids to help maintain interest, and it has both simple and sophisticated applications." -
5 client
"A process, such as a program or task, that requests a service provided by another program--for example, a word processor that calls on a sort routine built into another program. The client process uses the requested service without having to ""know"" any working details about the other program or the service itself." -
6 dial-up
"Of, pertaining to, or being a connection that uses the public switched telephone network rather than a dedicated circuit or some other type of private network." -
7 dial-up connection
A connection to other computers or to the Internet using a device that uses the telephone network. -
8 scanner
An optical input device that uses light-sensing equipment to capture an image on paper or some other object. Captured image data is converted into binary files that can be stored and manipulated by computer programs. -
9 public key algorithm
"An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message." -
10 dashboard
"A customizable landing page for a business application or workspace that uses Web Parts to display selected information. It can provide a comprehensive look at the information inside the application or workspace by consolidating lists, libraries, text, images and other data into a dynamic, customizable information portal." -
11 Windows Assessment Console
"A tool in the Windows ADK that uses assessments to create jobs that evaluate quality and view the results after a job runs. The Windows AC can also package a job and other necessary files, save the files in a folder that contains an executable file, move the job to another computer, and then run the job on the new computer."English-Arabic terms dictionary > Windows Assessment Console
-
12 Windows AC
"A tool in the Windows ADK that uses assessments to create jobs that evaluate quality and view the results after a job runs. The Windows AC can also package a job and other necessary files, save the files in a folder that contains an executable file, move the job to another computer, and then run the job on the new computer."
См. также в других словарях:
Other — For other uses, see Other (disambiguation). The Other or Constitutive Other (also the verb othering) is a key concept in continental philosophy; it opposes the Same. The Other refers, or attempts to refer, to that which is Other than the initial… … Wikipedia
Uses of trigonometry — Trigonometry has an enormous variety of applications. The ones mentioned explicitly in textbooks and courses on trigonometry are its uses in practical endeavors such as navigation, land surveying, building, and the like. It is also used… … Wikipedia
Other Tales of the Flying Fox — For other uses, see Other Tales of the Flying Fox (disambiguation). Other Tales of the Flying Fox/Young Flying Fox Author(s) Jin Yong … Wikipedia
Other Voices (TV series) — For other uses, see Other Voices. Other Voices The Other Voices logo Format Live music / interviews Created by South Wind Blows Productions … Wikipedia
Uses and gratifications — Uses and gratifications, is not a single approach but a body of approaches developed out of empirical studies beginning in the mid 20th century. It is one of many audience theories recognised in the media.The basic theme of uses and… … Wikipedia
Other Voices, Other Rooms (novel) — Other Voices, Other Rooms … Wikipedia
other — O.E. oþer the second, one of the two, other, from P.Gmc. *antharaz (Cf. O.S. athar, O.N. annarr, Ger. ander, Goth. anþar other ), from PIE *an tero , variant of *al tero the other of two (Cf. Lith. antras, Skt. antarah oth … Etymology dictionary
Uses of torture in recent times — Torture, the infliction of severe physical or psychological pain upon an individual to extract information, a confession or as a punishment, is prohibited by international law and illegal in most countries. However, it is still used by many… … Wikipedia
Other Oni Kamen Rider — In the Japanese tokusatsu program, Kamen Rider Hibiki, there were many Kamen Riders. Currently 113 Oni Kamen Riders are active, with only 8 having been shown in episode format. This article covers many of the other known Oni Kamen Riders.… … Wikipedia
Uses of compost — Compost is a versatile product resulting from composting the biodegradation of organic waste, industrially, commercially or domestically produced. The basic use is conditioning and fertilizing soil by the addition of humus, nutrients and… … Wikipedia
Uses of podcasting — The following article is a list of uses for podcasting, including but not limited to:Public services*Unofficial audio tours of museums (musecast). [Kennedy, Randy. 2005. [http://www.nytimes.com/2005/05/28/arts/design/28podc.html?ex=1274932800… … Wikipedia