-
1 authentication exposure
English-Russian electronics dictionary > authentication exposure
-
2 authentication exposure
The New English-Russian Dictionary of Radio-electronics > authentication exposure
-
3 exposure
2) экспозицияб) произведение освещённости светочувствительного материала на время выдержки3) раскрытие (напр. ключа к шифру)•- double exposure
- E-beam exposure
- electron-beam exposure
- holographic exposure
- ion exposure
- light exposure
- mask exposure
- multiple-pulse exposure
- proximity exposure
- radiant exposure
- resist exposure
- single-pulse exposure
- spatially varying exposure and color
- spatially varying pixel exposure
- step-and-repeat exposure
- time exposure
- ultraviolet exposure
- UV exposure
- X-ray exposure -
4 exposure
2) экспозицияб) произведение освещённости светочувствительного материала на время выдержки3) раскрытие (напр. ключа к шифру)•- double exposure
- E-beam exposure
- electron-beam exposure
- holographic exposure
- ion exposure
- light exposure
- mask exposure
- multiple-pulse exposure
- proximity exposure
- radiant exposure
- resist exposure
- single-pulse exposure
- spatially varying exposure and color
- spatially varying pixel exposure
- step-and-repeat exposure
- time exposure
- ultraviolet exposure
- UV exposure
- X-ray exposureThe New English-Russian Dictionary of Radio-electronics > exposure
См. также в других словарях:
Ultraviolet — UV redirects here. For other uses, see UV (disambiguation). UVB redirects here. For the mysterious shortwave radio station in Russia, see UVB 76. For other uses, see Ultraviolet (disambiguation). False color image of the Sun s corona as seen in… … Wikipedia
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia
Internet security — is a branch of computer security[1] specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet.[2] The Internet represents an insecure channel for exchanging information leading … Wikipedia
The Protocols of the Elders of Zion — ( Protocols of the wise men of Zion , Library of Congress s Uniform Title; ru. Протоколы сионских мудрецов , or Сионские протоколы ; see also other titles) is an antisemitic tract alleging a Jewish and Masonic plot to achieve world domination. It … Wikipedia
Domain Name System Security Extensions — Internet protocol suite Application layer BGP DHCP DNS FTP HTTP … Wikipedia
Shroud of Turin — The Shroud of Turin: modern photo of the face, positive left, negative right. Negative has been contrast enhanced. The Shroud of T … Wikipedia
Killian documents controversy — Further information: Killian documents authenticity issues and George W. Bush military service controversy Charles Johnson s animated GIF image comparing what CBS claimed to be a 1973 era typewritten memo with a 2004 era Microsoft Word… … Wikipedia
Automated Tissue Image Systems — (ATIS) are computer controlled automatic test equipment (ATE) systems classified as medical device and used as pathology laboratory tools (tissue based cancer diagnostics) to characterize a stained tissue sample embedded on a bar coded glass… … Wikipedia
Digital versus film photography — has been a topic of debate since the invention of digital cameras towards the end of the 20th Century. Both digital and film photography have advantages and drawbacks.[1][2] 21st century photography is dominated by digital operation, but the… … Wikipedia
Credit card fraud — Personal finance Credit and debt Pawnbroker Student loan Employment contract Salary Wage Empl … Wikipedia
Art forgery — refers to creating and, in particular, selling works of art that are falsely attributed to be work of another, usually more famous, artist. Art forgery is extremely lucrative, but modern dating and analysis techniques have made the identification … Wikipedia