-
1 antivirus program
"A computer program designed to detect and respond to malicious software, such as viruses and worms. Responses may include blocking user access to infected files, cleaning infected files or systems, or informing the user that an infected program was detected." -
2 antimalware program
"A computer program designed to detect and respond to malicious software, such as viruses and worms. Responses may include blocking user access to infected files, cleaning infected files or systems, or informing the user that an infected program was detected." -
3 OLE DB provider
"A program in the OLE DB architecture that enables native access to data, instead of accessing data using ODBC or IISAM drivers, which are external ways to access the data." -
4 antivirus software
"A computer program designed to detect and respond to malicious software, such as viruses and worms. Responses may include blocking user access to infected files, cleaning infected files or systems, or informing the user that an infected program was detected." -
5 AV
"A computer program designed to detect and respond to malicious software, such as viruses and worms. Responses may include blocking user access to infected files, cleaning infected files or systems, or informing the user that an infected program was detected."[lang name="Arabic"]AV -
6 mutual exclusion
"A programming technique that ensures that only one program or routine at a time can access some resource, such as a memory location, an I/O port, or a file, often through the use of semaphores, which are flags used in programs to coordinate the activities of more than one program or routine." -
7 ar-sa ODBC
"A program file used to connect to a particular database. Each database program, such as Access or dBASE, or database management system, such as SQL Server, requires a different driver." -
8 ODBC driver
"A program file used to connect to a particular database. Each database program, such as Access or dBASE, or database management system, such as SQL Server, requires a different driver." -
9 degradation
"In computer systems, a reduction in level of performance or service. Degradation in microcomputer performance is indicated by slow response times or frequent pauses for disk access because memory is insufficient to hold an entire program plus the data the program is using." -
10 antimalware software
"A computer program designed to detect and respond to malicious software, such as viruses and worms. Responses may include blocking user access to infected files, cleaning infected files or systems, or informing the user that an infected program was detected." -
11 paged pool
"The system-allocated virtual memory that has been charged to a process and that can be paged. Paging is the moving of infrequently used parts of a program's working memory from random access memory (RAM) to another storage medium, usually the hard disk." -
12 database engine
The program module or modules that provide access to a database management system (DBMS). -
13 handle
"Any token that a program can use to identify and access an object such as a device, a file, a window, or a dialog box." -
14 kernel mode
"A highly privileged mode of operation where program code has direct access to all memory, including the address spaces of all user-mode processes and applications, and to hardware." -
15 My Documents
"A folder that provides you with a convenient place to store documents, graphics, or other files you want to access quickly. When you save a file in a program such as WordPad or Paint, the file is automatically saved in My Documents, unless you choose a different folder." -
16 supervisor mode
"A highly privileged mode of operation where program code has direct access to all memory, including the address spaces of all user-mode processes and applications, and to hardware." -
17 protected mode
"A highly privileged mode of operation where program code has direct access to all memory, including the address spaces of all user-mode processes and applications, and to hardware." -
18 Ring 0
"A highly privileged mode of operation where program code has direct access to all memory, including the address spaces of all user-mode processes and applications, and to hardware." -
19 passphrase
"A sequence of words or other text used to gain access to a network, program, or data. A passphrase is generally longer for added security." -
20 extent
"On a disk or other direct-access storage device, a continuous block of storage space reserved by the operating system for a particular file or program."
- 1
- 2
См. также в других словарях:
Community Access Program — The Community Access Program (CAP, also seen as C@p) is an initiative of the Government of Canada which aims to provide Canadians with affordable public access to the Internet and the skills they need to use it effectively. The program is… … Wikipedia
Internet access program — An internet access program is a software program, generally included as part of the operating system, to access the Internet.There are two main ways to access the Net. * Dial up access; that generally uses a narrowband modem. * Network access;… … Wikipedia
Market Access Program — The Market Access Program (MAP; formerly the Market Promotion Program) is administered by the Foreign Agricultural Service and uses funds from the Commodity Credit Corporation (CCC). It helps producers, exporters, private companies, and other… … Wikipedia
Clinical Information Access Program — This article is about Editing Clinical Information Access Program. For Calf intestinal alkaline phosphatase, see Calf intestinal alkaline phosphatase. The Clinical Information Access Program, commonly referred to as CIAP, is a project of the New… … Wikipedia
Access Group — is a nonprofit student loan provider that specializes in graduate and professional student loans. The company provides federally guaranteed Federal Stafford, PLUS and Consolidation loans through the Federal Family Education Loan Program, as well… … Wikipedia
special access program — A sensitive program, approved in writing by a head of agency with original top secret classification authority, that imposes need to know and access controls beyond those normally provided for access to confidential, secret, or top secret… … Military dictionary
Special access program — Special access programs (SAP) and special access budgets (SAB) are the Pentagon s terminology when used to refer to black programs and black budgets, respectively. The terms were devised and put into circulation in the late 1980s during Ronald… … Wikipedia
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Program Specific Information — (PSI) is metadata, part of MPEG transport stream.The PSI data contains four tables: PAT (Program Association Table), CAT (Conditional Access Table), PMT (Program Map Table) and NIT (Network Information Table). This last table is normally not used … Wikipedia
Access — may refer to:Companies and organizations* ACCESS (Australia), an Australian youth network * Access Co., a software company * AirCraft Casualty Emotional Support Services * Arab Community Center for Economic and Social Servicespace and technology* … Wikipedia
Access 5 — is a national project sponsored by NASA and industry with participation by the Federal Aviation Administration (FAA) and United States Department of Defense (DoD) to introduce high altitude long endurance (HALE) remotely operated aircraft (ROA)… … Wikipedia