-
1 ar-sa المؤدّي
"A standard single-byte character encoding scheme used for text-based data. ASCII uses designated 7-bit or 8-bit number combinations to represent either 128 or 256 possible characters. Standard ASCII uses 7 bits to represent all uppercase and lowercase letters, the numbers 0 through 9, punctuation marks, and special control characters used in U.S. English. Most current x86-based systems support the use of extended (or ""high"") ASCII. Extended ASCII allows the eighth bit of each character to identify an additional 128 special symbol characters, foreign-language letters, and graphic symbols." -
2 ASCII
"A standard single-byte character encoding scheme used for text-based data. ASCII uses designated 7-bit or 8-bit number combinations to represent either 128 or 256 possible characters. Standard ASCII uses 7 bits to represent all uppercase and lowercase letters, the numbers 0 through 9, punctuation marks, and special control characters used in U.S. English. Most current x86-based systems support the use of extended (or ""high"") ASCII. Extended ASCII allows the eighth bit of each character to identify an additional 128 special symbol characters, foreign-language letters, and graphic symbols." -
3 American Standard Code for Information Interchange
"A standard single-byte character encoding scheme used for text-based data. ASCII uses designated 7-bit or 8-bit number combinations to represent either 128 or 256 possible characters. Standard ASCII uses 7 bits to represent all uppercase and lowercase letters, the numbers 0 through 9, punctuation marks, and special control characters used in U.S. English. Most current x86-based systems support the use of extended (or ""high"") ASCII. Extended ASCII allows the eighth bit of each character to identify an additional 128 special symbol characters, foreign-language letters, and graphic symbols."English-Arabic terms dictionary > American Standard Code for Information Interchange
-
4 TLB
A table used in a virtual memory system that lists the physical address page number associated with each virtual address page number. A TLB is used in conjunction with a cache whose tags are based on virtual addresses. The virtual address is presented simultaneously to the TLB and to the cache so that cache access and virtual-to-physical address translation can occur simultaneously. -
5 virtualization
"In Windows Presentation Foundation and Silverlight, a technique by which a subset of UI elements are generated from a larger number of data items based on which items are visible on the screen. Virtualization is a performance enhancement, because it is intensive, both in terms of memory and processor, to generate a large number of UI elements when only a few may be on the screen at a given time." -
6 user interface virtualization
"In Windows Presentation Foundation and Silverlight, a technique by which a subset of UI elements are generated from a larger number of data items based on which items are visible on the screen. Virtualization is a performance enhancement, because it is intensive, both in terms of memory and processor, to generate a large number of UI elements when only a few may be on the screen at a given time."English-Arabic terms dictionary > user interface virtualization
-
7 CRC
"A procedure used in checking for errors in data transmission. CRC error checking uses a complex calculation to generate a number based on the data transmitted. The sending device performs the calculation before transmission and includes it in the packet that it sends to the receiving device. The receiving device repeats the same calculation after transmission. If both devices obtain the same result, it is assumed that the transmission was error free. The procedure is known as a redundancy check because each transmission includes not only data but extra (redundant) error-checking values. Communications protocols such as XMODEM and Kermit use cyclical redundancy checking." -
8 cyclic redundancy check
"A procedure used in checking for errors in data transmission. CRC error checking uses a complex calculation to generate a number based on the data transmitted. The sending device performs the calculation before transmission and includes it in the packet that it sends to the receiving device. The receiving device repeats the same calculation after transmission. If both devices obtain the same result, it is assumed that the transmission was error free. The procedure is known as a redundancy check because each transmission includes not only data but extra (redundant) error-checking values. Communications protocols such as XMODEM and Kermit use cyclical redundancy checking." -
9 cyclical redundancy check
"A procedure used in checking for errors in data transmission. CRC error checking uses a complex calculation to generate a number based on the data transmitted. The sending device performs the calculation before transmission and includes it in the packet that it sends to the receiving device. The receiving device repeats the same calculation after transmission. If both devices obtain the same result, it is assumed that the transmission was error free. The procedure is known as a redundancy check because each transmission includes not only data but extra (redundant) error-checking values. Communications protocols such as XMODEM and Kermit use cyclical redundancy checking." -
10 physical address extension
"A feature that allows x86-based computers to support more than 4 gigabytes (GB) of physical memory. Up to 64 GB of physical memory can be used as regular 4-kilobyte (KB) pages, and the number of bits that can be used by the kernel to address physical memory can be expanded from 32 to 36."English-Arabic terms dictionary > physical address extension
-
11 PAE
"A feature that allows x86-based computers to support more than 4 gigabytes (GB) of physical memory. Up to 64 GB of physical memory can be used as regular 4-kilobyte (KB) pages, and the number of bits that can be used by the kernel to address physical memory can be expanded from 32 to 36." -
12 account lockout
"A Windows security feature that locks a user account if a number of failed logon attempts occur within a specified amount of time, based on security policy lockout settings. Locked accounts cannot log on." -
13 Network Load Balancing
"A Windows network component that uses a distributed algorithm to load-balance Internet Protocol (IP) traffic across a number of hosts, helping to enhance the scalability and availability of mission-critical, IP-based services, such as Remote Desktop Services, Web services, virtual private networking, and streaming media. It also provides high availability by detecting host failures and automatically redistributing traffic to the surviving hosts." -
14 Stop message
"A character-based, full-screen error message displayed on a blue background. A Stop message indicates that the Windows kernel detected a condition from which it cannot recover. Each message is uniquely identified by a Stop error code (a hexadecimal number) and a string indicating the errors symbolic name. Stop messages are usually followed by up to four additional hexadecimal numbers, enclosed in parentheses, which identify developer-defined error parameters. A driver or device may be identified as the cause of the error. A series of troubleshooting tips are also displayed, along with an indication that, if the system was configured to do so, a memory dump file was saved for later use by a kernel debugger." -
15 SharePoint list indicator
"The title of a dialog page that enables the user to set up a SharePoint list indicator by setting name, description, list URL, indicator value, indicator appearance, etc. The indicator value can be specified based on number or percentage of certain column values, or certain aggregate data." -
16 hour transaction
A transaction that registers employee costs based on number of hours. -
17 Champion of Logic
"Skill level in the Purble Place game. Once a Purble Place game is completed, a player gets a skill level rank assigned automatically by the game (based on number of guesses and hints during the game)." -
18 Detective
"Skill level in the Purble Place game. Once a Purble Place game is completed, a player gets a skill level rank assigned automatically by the game (based on number of guesses and hints during the game)." -
19 Junior Detective
"Skill level in the Purble Place game. Once a Purble Place game is completed, a player gets a skill level rank assigned automatically by the game (based on number of guesses and hints during the game)." -
20 Purble Master
"Skill level in the Purble Place game. Once a Purble Place game is completed, a player gets a skill level rank assigned automatically by the game (based on number of guesses and hints during the game)."
- 1
- 2
См. также в других словарях:
Number Nine Visual Technology — Corporation was a manufacturer of video graphics chips and cards from 1982 to 1999. Number Nine developed the first 128 bit graphics processor (the Imagine 128), as well as the first 256 color and 16.8 million color cards.[1] The name of the… … Wikipedia
Number Six (The Prisoner) — Number Six is the central fictional character in the 1960s television series The Prisoner, played by Patrick McGoohan. In the AMC remake, the character is played by Jim Caviezel, renamed Six . In several episodes, his attempts to escape his… … Wikipedia
Number prefix — Number prefixes are prefixes derived from numbers or numerals. In English and other European languages, they are used to coin numerous series of words, such as unicycle – bicycle – tricycle, dyad – triad – decade, biped – quadruped, September –… … Wikipedia
Number Seventeen — Directed by Alfred Hitchcock Produced by John Maxwell … Wikipedia
number — or [num′bər] n. [ME nombre < OE < L numerus: see NOMY] 1. a symbol or word, or a group of either of these, showing how many or which one in a series: 1, 2, 10, 101 (one, two, ten, one hundred and one) are called cardinal numbers; 1st, 2d,… … English World dictionary
Number 1 (Goldfrapp song) — Number 1 Single by Goldfrapp from the album Supernature B side … Wikipedia
Number Sense (UIL) — Number Sense is one of several academic events sanctioned by the University Interscholastic League. It is also a competition held by the Texas Math and Science Coaches Association, using the same rules as the UIL. It is one of the UIL s oldest… … Wikipedia
Number 1 Radio School — is currently based at RAF Cosford and forms part of the Defence College of Communications and Information Systems. As a result of the [http://www.mod.uk/DefenceInternet/AboutDefence/WhatWeDo/TrainingandExercises/DTR/ Defence Training Review] ,… … Wikipedia
Number 13 — can refer to a number of different things: The number thirteen A former comic strip in The Beano Number 13 (film), a film by Alfred Hitchcock and starring Ernest Thesiger which was shot but never completed. The footage shot is believed to be lost … Wikipedia
Number 13 (short film) — Number 13 A Ghost Story for Christmas episode Title screen. Episode no … Wikipedia
Number Seventeen (design) — Number Seventeen is the Manhattan based graphic design studio formed by Emily Oberman and Bonnie Siegler. Besides print graphics, the studio also specializes in graphics for film and television. Their clients include Saturday Night Live, Jane… … Wikipedia