-
21 ATL Pipeline Component Wizard
A Visual C++ wizard that uses ATL and additional templates to facilitate the development of pipeline components.English-Arabic terms dictionary > ATL Pipeline Component Wizard
-
22 auditing
"The process an operating system uses to detect and record security-related events, such as an attempt to create, to access, or to delete objects such as files and directories. The records of such events are stored in a file known as a security log, whose contents are available only to those with the proper clearance." -
23 bar chart
A graph that uses horizontal bars to illustrate comparisons among individual data items. -
24 base currency
"The currency a business uses to record all transactions in their ledgers, or the primary currency in which they transact with their bank. The base currency is also commonly referred to as the billing currency, functional currency, or booking currency of a business. The Order Processing pipeline always processes orders using the base currency of the Web site. The base currency can be different than the buyer currency and the supplier currency. The base currency is stored in the billing_currency field in the orderform header." -
25 bilinear
A rendering method used to map a source image to a target image. This method uses the weighted average of the four nearest source pixels to define a target pixel. -
26 bilinear filtering
A rendering method used to map a source image to a target image. This method uses the weighted average of the four nearest source pixels to define a target pixel. -
27 bar code reader
"An optical device that uses a laser beam to read and interpret bar codes, such as the Universal Product Codes, found on grocery products and other retail items." -
28 boot drive
"In a PC-compatible computer, the disk drive that the BIOS uses to automatically load the operating system when the computer is turned on." -
29 certificate of authenticity
"A label with sophisticated anti-counterfeiting features that helps the end user identify that the computer uses a validly licensed copy of Microsoft Windows. The product name and a unique product key appear in the center of the label. The OEM must physically attach the COA label to the computer chassis, and it should never be removed from the computer."English-Arabic terms dictionary > certificate of authenticity
-
30 COA
"A label with sophisticated anti-counterfeiting features that helps the end user identify that the computer uses a validly licensed copy of Microsoft Windows. The product name and a unique product key appear in the center of the label. The OEM must physically attach the COA label to the computer chassis, and it should never be removed from the computer." -
31 CBT
"The use of computers and specially developed tutorial programs for teaching. CBT uses color, graphics, and other attention-getting aids to help maintain interest, and it has both simple and sophisticated applications." -
32 CIM
"The model that describes how to represent real-world managed objects. CIM uses an object-oriented paradigm, where managed objects are modeled using the concepts of classes and instances. The CIM is divided into the metamodel and the standard schema. The metamodel describes what types of entities make up the schema. It also defines how these entities can be combined into objects that represent real-world devices." -
33 Common Information Model
"The model that describes how to represent real-world managed objects. CIM uses an object-oriented paradigm, where managed objects are modeled using the concepts of classes and instances. The CIM is divided into the metamodel and the standard schema. The metamodel describes what types of entities make up the schema. It also defines how these entities can be combined into objects that represent real-world devices." -
34 client
"In object-oriented programming, a member of a class (group) that uses the services of another class to which it is not related." -
35 client
"A process, such as a program or task, that requests a service provided by another program--for example, a word processor that calls on a sort routine built into another program. The client process uses the requested service without having to ""know"" any working details about the other program or the service itself." -
36 color space
"The three-dimensional space that is defined by a set of coordinates for representing color on devices such as monitors, scanners, and printers. For example, in the LAB color space, the colors are defined in terms of their luminance or whiteness (L), redness-greenness (A), and yellowness-blueness (B); the HVC system uses hue (H), value (V), and chroma (C). The two most common color space models are RGB and YUV." -
37 color space model
"The three-dimensional space that is defined by a set of coordinates for representing color on devices such as monitors, scanners, and printers. For example, in the LAB color space, the colors are defined in terms of their luminance or whiteness (L), redness-greenness (A), and yellowness-blueness (B); the HVC system uses hue (H), value (V), and chroma (C). The two most common color space models are RGB and YUV." -
38 column chart
A graph that uses vertical bars to show data changes over a period of time or illustrate comparisons among items. -
39 column graph
A graph that uses vertical bars to show data changes over a period of time or illustrate comparisons among items. -
40 CRC
"A procedure used in checking for errors in data transmission. CRC error checking uses a complex calculation to generate a number based on the data transmitted. The sending device performs the calculation before transmission and includes it in the packet that it sends to the receiving device. The receiving device repeats the same calculation after transmission. If both devices obtain the same result, it is assumed that the transmission was error free. The procedure is known as a redundancy check because each transmission includes not only data but extra (redundant) error-checking values. Communications protocols such as XMODEM and Kermit use cyclical redundancy checking."
См. также в других словарях:
Uses — (Geogr.), so v.w. Uzes … Pierer's Universal-Lexikon
USES — United States Employment Service Short Dictionary of (mostly American) Legal Terms and Abbreviations … Law dictionary
ušės — sf. pl. KŽ = ušios … Dictionary of the Lithuanian Language
uses — USES, ville episcopale, Vtica. Inde Vticensis episcopatus. Il est en l Archevesché de Narbonne … Thresor de la langue françoyse
USES — abbrev. United States Employment Service … English World dictionary
uses — See use; Statute of Uses … Ballentine's law dictionary
Uses and gratifications — Uses and gratifications, is not a single approach but a body of approaches developed out of empirical studies beginning in the mid 20th century. It is one of many audience theories recognised in the media.The basic theme of uses and… … Wikipedia
Uses and gratifications approach — [ juːsɪz ənd grætɪfɪ keɪʃnz ə prəʊtʃ, englisch] der, , Nutzen und Belohnungs|ansatz, Nutzen|ansatz, in Kommunikationswissenschaften und Publizistik ein Erklärungsmodell, welches davon ausgeht, dass der Mediennutzer (Rezipient) diejenigen… … Universal-Lexikon
Uses-and-Gratifications-Ansatz — Der Nutzen und Belohnungsansatz (auch Uses and Gratifications Approach, Uses and Gratifications Ansatz oder Theorie der selektiven Zuwendung) ist ein Modell der Mediennutzungsforschung und widerspricht dem Wirkungsansatz des älteren Stimulus… … Deutsch Wikipedia
Uses and Gratifications — Der Nutzen und Belohnungsansatz (auch Uses and Gratifications Approach, Uses and Gratifications Ansatz oder Theorie der selektiven Zuwendung) ist ein Modell der Mediennutzungsforschung und widerspricht dem Wirkungsansatz des älteren Stimulus… … Deutsch Wikipedia
Uses and Gratifications Approach — Der Nutzen und Belohnungsansatz (auch Uses and Gratifications Approach, Uses and Gratifications Ansatz oder Theorie der selektiven Zuwendung) ist ein Modell der Mediennutzungsforschung und widerspricht dem Wirkungsansatz des älteren Stimulus… … Deutsch Wikipedia