-
41 security policy
The active policy established by the administrator that programmatically generates granted permissions for all managed code based on the code's requested permissions. Code that requires more permissions than policy will grant is not allowed to run. -
42 boot sector
"A critical disk structure for starting your computer, located at sector 1 of each volume or floppy disk. It contains executable code and data that is required by the code, including information used by the file system to access the volume. The boot sector is created when your format the volume." -
43 requested permissions
"Optionally specified permissions in an assembly that represent the minimum required, optionally desired, and always refused permissions for all code in the assembly. If there is no request, the code is granted the maximum that security policy allows." -
44 master boot record
"The first sector on a hard disk, which begins the process of starting the computer. The MBR contains the partition table for the disk and a small amount of executable code called the master boot code." -
45 dial location
"The country code, area code, and specific dialing requirements for the place you are dialing from. Once you have created a dial location, you can select it to apply the dialing requirements to all your calls. To change dialing locations, select or create a different one." -
46 thunk
"A small section of code that performs a translation or conversion during a call or indirection. For example, a thunk is used to change the size or type of function parameters when calling between 16-bit and 32-bit code." -
47 MBR
"The first sector on a hard disk, which begins the process of starting the computer. The MBR contains the partition table for the disk and a small amount of executable code called the master boot code." -
48 component
"In general, a modular unit of code that acts as part of a larger system or structure. For COM, a unit of code built to deliver a well-specified set of services through well-specified interfaces. A component provides an object that a client requests at runtime."مكوّن -
49 Allow Partially Trusted Callers Attribute
"An attribute that tells the CLR to remove the implicit LinkDemands. By default, strongly named, fully trusted assemblies are given an implicit LinkDemand for FullTrust on every public and protected method of every publicly visible class. Essentially, any code that someone outside of your assembly could use as an entry point into your code is protected with this demand."English-Arabic terms dictionary > Allow Partially Trusted Callers Attribute
-
50 trusted publisher store
"A list of software publisher certificates used to digitally sign code, such as macros. Because you explicitly trust the software publishers, their code is allowed to run on your computer without needing to prompt for permission." -
51 sample application
"End-to-end, compilable application that uses many technologies and is designed as teaching sample or commercial utility for which the code is made available for learning and re-use." -
52 sorting ID
A code which dictates the correct order for sorting the characters of a language. The sorting ID is used in conjunction with a locale ID to distinguish between default sorts and alternate sorts for locales which have more than one sorting order.معرّف الفرز -
53 Monad
The code name for the Windows command-line shell technology and scripting language that provides a task automation solution for the Windows platform. -
54 macro-free
"Pertaining to a file format that does not allow for VBA code. Office 12 default file formats are macro-free. Examples of file extensions for macro-free formats are.docx,.pptx,.xlsx." -
55 macro-enabled
"Pertaining to a file format that allows for VBA code. Examples of file extensions for macro-enabled formats are.docm,.pptm,.xlsm."مُمكن بماكرو -
56 Digitale Identiteit
"A standard security code issued by the Netherlands government to businesses and private citizens for interacting electronically with the government (for submitting tax returns or other documents electronically, requesting information, checking on status, etc.)." -
57 DigiD
"A standard security code issued by the Netherlands government to businesses and private citizens for interacting electronically with the government (for submitting tax returns or other documents electronically, requesting information, checking on status, etc.)." -
58 Windows Web Services API
A native-code implementation of SOAP that provides a foundation for building Web services for internal Microsoft customers such as components of Windows and parts of Office. -
59 WinJS
The namespace name for Windows Library for JavaScript. Developers will type it in their code. -
60 loader
"A utility that loads the executable code of a program into memory for execution. On most microcomputers, the loader is an invisible part of the operating system and is automatically invoked when a program is run."
См. также в других словарях:
Code page — is another term for character encoding. It consists of a table of values that describes the character set for a particular language. The term code page originated from IBM s EBCDIC based mainframe systems,[1] but many vendors use this term… … Wikipedia
Code Geass — Code Geass: Lelouch of the Rebellion First Code Geass DVD volume released in Japan. コードギアス 反逆のルルーシュ (Kōdo Giasu: Hangyaku no Rurūshu) … Wikipedia
Code — redirects here. CODE may also refer to Cultural Olympiad Digital Edition. Decoded redirects here. For the television show, see Brad Meltzer s Decoded. For code (computer programming), see source code. For other uses, see Code (disambiguation).… … Wikipedia
Code coverage — is a measure used in software testing. It describes the degree to which the source code of a program has been tested. It is a form of testing that inspects the code directly and is therefore a form of white box testing.[1] Code coverage was among … Wikipedia
Code (cryptography) — For other uses, see Code (disambiguation). In cryptography, a code is a method used to transform a message into an obscured form, preventing those who do not possess special information, or key, required to apply the transform from understanding… … Wikipedia
Code Lyoko — Format Animated, Science fiction, Action, Comedy Created by Tania Palumbo Thomas Romain … Wikipedia
Code page 437 — Code page 437, as rendered by the IBM PC using a VGA adapter. IBM PC or MS DOS code page 437, often abbreviated CP437 and also known as DOS US, OEM US or sometimes misleadingly referred to as the OEM font, High ASCII or Extended ASCII,[1][2] is… … Wikipedia
Code Pink — For the hospital emergency code, see Hospital emergency codes. Code Pink: Women for Peace Code Pink activists demonstrate in front of the White House on July 4, 2006. Formation … Wikipedia
Code Monkeys — For the phrase on which this program s title is based, see code monkey. Code Monkeys Code Monkeys title card; main characters from left to right: Black Steve, Dave, Todd, Clare, Jerry, Mary, Mr. Larrity, Dean and Benny. G … Wikipedia
Code injection — is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by an attacker to introduce (or inject ) code into a computer program to change the course of execution. The results of a code injection… … Wikipedia
Code of Hammurabi — Code on clay tablet Code on diorite stele The Code of Hammurabi is a well preserved Babylon … Wikipedia