-
21 global descriptor table
"A memory segment that contains descriptors for code, data, and descriptor table segments. All processor tasks have access to a common GDT." -
22 kernel mode
"A highly privileged mode of operation where program code has direct access to all memory, including the address spaces of all user-mode processes and applications, and to hardware." -
23 personal identification number
A unique and secret identification code similar to a password that is assigned to an authorized user and used to gain access to personal information or assets via an electronic device.رقم المعرّف الشخصيEnglish-Arabic terms dictionary > personal identification number
-
24 PIN
A unique and secret identification code similar to a password that is assigned to an authorized user and used to gain access to personal information or assets via an electronic device. -
25 smart card
"A plastic (credit card–sized or smaller) device with an embedded microprocessor and a small amount of storage that is used, with an access code, to enable certificate-based authentication. Smart cards securely store certificates, public and private keys, passwords, and other types of personal information." -
26 granted permissions
"The permissions, determined by security policy, that code will be given, allowing it access to resources and giving it identity. The granted permissions are determined by both the requested permissions and what is allowed by the security policy configuration." -
27 MDE file
Microsoft Access database (.mdb) file with all modules compiled and all editable source code removed. -
28 supervisor mode
"A highly privileged mode of operation where program code has direct access to all memory, including the address spaces of all user-mode processes and applications, and to hardware." -
29 protected mode
"A highly privileged mode of operation where program code has direct access to all memory, including the address spaces of all user-mode processes and applications, and to hardware." -
30 Ring 0
"A highly privileged mode of operation where program code has direct access to all memory, including the address spaces of all user-mode processes and applications, and to hardware." -
31 virtual directory
"A name used to access the contents of any Exchange store using a Web browser. The virtual directory name is used to open a mailbox as well as browse the folders of a public store. This name is also used in URLs using the Microsoft Internet Publishing Provider (MSDAIPP), which includes both hyperlinks in Web pages as well as Microsoft ActiveX Data Objects client-side code." -
32 ADE file
A Microsoft Access project (.adp) file with all modules compiled and all editable source code removed. -
33 Microsoft Script Editor
"An editor that is used to add text, edit HTML tags, and edit any Microsoft Visual Basic Scripting Edition (VBScript) code in a data access page. You can also view your page in the Script Editor as it would appear in a Web browser." -
34 ACCDE file
An Access 2007 database (.accdb) file with all modules compiled and all editable source code removed. -
35 compiled binary file
An Access 2007 database (.accdb) file with all modules compiled and all editable source code removed.ملف ثنائي تم تجميعه برمجيًا -
36 ar-sa فيلم الكاميرا
"A Code Division Multiple Access (CDMA) network, used by phones that do not have SIM cards." -
37 CDMA network
"A Code Division Multiple Access (CDMA) network, used by phones that do not have SIM cards."
- 1
- 2
См. также в других словарях:
Code Access Security — (CAS), in the Microsoft .NET framework, is Microsoft s solution to prevent untrusted code from performing privileged actions. When the CLR loads an assembly it will obtain evidence for the assembly and use this to identify the code group that the … Wikipedia
Code Access Security — (CAS) ist das Sicherheitsmodell in Microsofts .NET Framework und stellt Microsofts Lösung dar, nicht privilegierten und nicht vertrauten Code an der Ausführung sicherheitskritischer Aktionen zu hindern. Wird eine Assembly durch die Common… … Deutsch Wikipedia
Code Access Security — Code Access Security механизм защиты, позволяющий ограничивать доступ коду к ресурсам компьютера. Используется в среде .NET Framework. Используется для определения разрешений и установки прав доступа к различным системным ресурсам,… … Википедия
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Code Division Multiple Access — (abrégé en CDMA, la commission générale de terminologie et de néologie propose le terme accès multiple par répartition en code, abrégé en AMRC), est un système de codage des transmissions, utilisant la technique d étalement de spectre. Il permet… … Wikipédia en Français
Code Lyoko — Format Animated, Science fiction, Action, Comedy Created by Tania Palumbo Thomas Romain … Wikipedia
Code injection — is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by an attacker to introduce (or inject ) code into a computer program to change the course of execution. The results of a code injection… … Wikipedia
Code division multiple access — Générations et normes de téléphonie mobile 0G PTT MTS IMTS AMTS 0,5G Autotel/PALM ARP 1G NMT AMPS Hicap CDPD Mobitex DataTac TACS RC2000 C NETZ Comvik NTT … Wikipédia en Français
Access Point Name — or APN is the name of an access point for GPRS.An access point is: * An Internet network to which a mobile can be connected * A set of settings which are used for that connection * A particular option in a set of settings in a mobile phoneWhen a… … Wikipedia
Code of Vengeance — Title card for the 1985 TV movie Also known as Dalton and Dalton s Code of Vengeance Genre … Wikipedia
code — [kəʊd ǁ koʊd] noun 1. [countable] LAW a complete set of written rules or laws: • Each state in the US has a different criminal and civil code. ˈbuilding code [countable] LAW a set of rules that states what features a new building, bridge etc… … Financial and business terms