-
1 denial-of-service attack
"An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system." -
2 denial of service attack
"An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system." -
3 DoS
"An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system." -
4 Auto PC
"An information and entertainment system for use in automobiles. Developed by Microsoft and powered by Microsoft® Windows® CE (a Windows-compatible operating system designed for embedded applications), Auto PC implements speech-recognition technology to enable individuals to rely on hands-free, spoken commands for tasks such as accessing a contact database (names, addresses, numbers), calling up e-mail or traffic reports, controlling an audio system, or obtaining destination directions. The Auto PC fits into the dashboard, in the space normally occupied by a radio." -
5 SQL
"A database query and programming language widely used for accessing, querying, updating, and managing data in relational database systems." -
6 Structured Query Language
"A database query and programming language widely used for accessing, querying, updating, and managing data in relational database systems." -
7 user password
The password stored in each user's account. Each user generally has a unique user password and must type that password when logging on or accessing a server. -
8 OLE DB provider
"A program in the OLE DB architecture that enables native access to data, instead of accessing data using ODBC or IISAM drivers, which are external ways to access the data." -
9 reflection
"The process of obtaining information about assemblies and the types defined within them, and creating, invoking, and accessing type instances at run time." -
10 event logging
"The process of recording an audit entry in the audit trail whenever certain events occur, such as services starting and stopping or users logging on and off and accessing resources." -
11 shadow folder
An optional file system folder that contains current copies of all files in a project. The shadow folder provides a location from which to view the files without accessing the Visual SourceSafe database and serves as a convenient place to build or compile the project.مجلّد الظل -
12 Team Explorer
A client application for accessing Team Foundation Server functionality that integrates into Visual Studio 2005 when it is installed on the same computer as Visual Studio 2005. Team Explorer enables you to access the team projects you are working on and provides access to the process guidance documentation that explains the organization and workflow of each team project. -
13 load simulation
"An attempt to model the effect of many users accessing a server at the same time. Load tests do not generate actual load with actual users, but rather simulated load with virtual users." -
14 touch pointer
A tool for accessing right-click menus and targeting small pieces of the interface using touch input. -
15 swizzle
To reorder data within a surface so as to increase the efficiency of accessing the data within the surface.يُعيد ترتيب البيانات -
16 Microsoft® Office Outlook® 2007
An edition of Microsoft messaging and collaboration client software for personal computers accessing Microsoft Exchange Server-based email and collaboration services.Microsoft® Office Outlook® 2007English-Arabic terms dictionary > Microsoft® Office Outlook® 2007
-
17 Microsoft® Office Live Essentials
"A Microsoft set of services that provides affordable tools to manage businesses online including a Web site, personalized e-mail and domain name, Web site statistics reporting, shared workspaces for accessing critical documents, and a variety of applicati"Microsoft® Office Live EssentialsEnglish-Arabic terms dictionary > Microsoft® Office Live Essentials
-
18 Exchange Web Services
A set of features that provides a programming interface for accessing Microsoft Exchange data through the Client Access server role by using Web services. -
19 Exchange store
"A storage platform that provides a single repository for managing multiple types of unstructured information in one infrastructure. The Exchange store combines the features and functionality of the file system, the Web, and a collaboration server (such as Microsoft Exchange) through a single, URL-addressable location for storing, accessing, and managing information, as well as building and running applications. The Exchange store is also known as the Web Storage System." -
20 Microsoft Office Outlook
A family of Microsoft messaging and collaboration client software for personal computers accessing Microsoft Exchange Server-based email and collaboration services.
- 1
- 2
См. также в других словарях:
accessing — ac·cess || ækses n. approach; entry; attack of a disease; permission to enter a computer system and/or retrieve data (Computers) v. gain entrance to, get at … English contemporary dictionary
Robert L. Moore — Robert L. Moore, Ph.D., is an internationally recognized Jungian psychoanalyst and consultant in private practice in Chicago, Illinois, USA. He is: the Distinguished Service Professor of Psychology, Psychoanalysis and Spirituality in the Chicago… … Wikipedia
Representational systems (NLP) — NLP TOPICS … Wikipedia
EPCglobal — is a joint venture between GS1 (formerly known as EAN International) and GS1 US (formerly the Uniform Code Council, Inc.).It is an organization set up to achieve world wide adoption and standardization of Electronic Product Code (EPC) technology… … Wikipedia
Database — A database is an organized collection of data for one or more purposes, usually in digital form. The data are typically organized to model relevant aspects of reality (for example, the availability of rooms in hotels), in a way that supports… … Wikipedia
Computer Fraud and Abuse Act — The Computer Fraud and Abuse Act is a law passed by the United States Congress in 1986, intended to reduce cracking of computer systems and to address federal computer related offenses. The Act (codified as 18 U.S.C. § 1030) governs… … Wikipedia
Pointer (computing) — This article is about the programming data type. For the input interface (for example a computer mouse), see Pointing device. Pointer a pointing to the memory address associated with variable b. Note that in this particular diagram, the computing … Wikipedia
Millennium Development Goals — MDG redirects here. For other uses, see MDG (disambiguation). The Millennium Development Goals are a UN initiative … Wikipedia
Abhinavagupta — Infobox Hindu leader name=Abhinavagupta birth date= c. 950 AD birth place=Kashmir, India birth name=Shankara death date= c. 1020 AD death place=Mangam, Kashmir, India guru=Śambhunātha, Lakṣmasṇagupta, Bhūtirāja, see masters section… … Wikipedia
Property (programming) — In some object oriented programming languages, a property is a special sort of class member, intermediate between a field (or data member) and a method. You read and write a property just as you read and write a field, but this is (usually)… … Wikipedia
C Sharp syntax — The correct title of this article is C# syntax. The substitution or omission of the # sign is because of technical restrictions. Main article: C Sharp (programming language) This article describes the syntax of the C# programming language. The… … Wikipedia