-
1 code mask
The format that you define for a work breakdown structure [WBS] code or a custom outline code. The mask specifies the sequence and number of letters or numbers required for each level and the symbol separating the levels. -
2 code signing
The process of adding a digital signature to additions and updates made to source code and applications published on the Internet. Code signing is intended to provide a level of security and trust to Internet software distribution. -
3 code pane
"In Visual Basic for Applications, the window that is used to display, edit, and write module-level and procedure code." -
4 transparency
"A security model that helps developers write and deploy secure libraries and applications by isolating code depending on privilege. Level 1 transparency was introduced in the.NET Framework version 2.0. It enables developers to annotate code to declare which types and members can perform security elevations and other trusted actions (security-critical) and which cannot (security-transparent). Level 2 transparency, which was introduced in the.NET Framework 4, refines this model. It adds a third group of code, security-safe-critical code, which are types or members that access secure resources and can be safely used by partially-trusted code in the.NET Framework." -
5 compile
To translate all the source code of a program from a high-level language into object code prior to execution of the program.يحول برمجياً -
6 compile program
A program that translates all the source code of a program written in a high-level language into object code prior to execution of the program. -
7 compiler
A program that translates all the source code of a program written in a high-level language into object code prior to execution of the program. -
8 kernel
"The core of layered architecture that manages the most basic operations of the operating system and the computer's processor. The kernel schedules different blocks of executing code, called threads, for the processor to keep it as busy as possible and coordinates multiple processors to optimize performance. The kernel also synchronizes activities among Executive-level subcomponents, such as I/O Manager and Process Manager, and handles hardware exceptions and other hardware-dependent functions. The kernel works closely with the hardware abstraction layer." -
9 full trust
"A code access security (CAS) state assigned to managed assemblies. The level of trust granted to an application or Web service affects its ability to use system resources while executing. Assemblies that have full trust can access any resource that is subject to operating system security, and all privileged operations are supported." -
10 application object
"The top-level object that represents the application to the system. The system calls methods on this object when the application is loaded, before it is shut down, and throughout the lifetime of the application to notify it of system-wide events. The application object contains application-wide code and maintains state that can be accessed from multiple views." -
11 build verification test
"A group of tests used to determine the health of a build at a high level. Typically, these tests exercise the core functionality to help team members determine whether further testing is worthwhile. They are run after the daily build to verify that compilation of source code has been built successfully and is ready for further testing." -
12 BVT
"A group of tests used to determine the health of a build at a high level. Typically, these tests exercise the core functionality to help team members determine whether further testing is worthwhile. They are run after the daily build to verify that compilation of source code has been built successfully and is ready for further testing." -
13 build acceptance test
"A group of tests used to determine the health of a build at a high level. Typically, these tests exercise the core functionality to help team members determine whether further testing is worthwhile. They are run after the daily build to verify that compilation of source code has been built successfully and is ready for further testing." -
14 smoke test
"A group of tests used to determine the health of a build at a high level. Typically, these tests exercise the core functionality to help team members determine whether further testing is worthwhile. They are run after the daily build to verify that compilation of source code has been built successfully and is ready for further testing." -
15 expression tree
A tree-form data representation of the structure of language-level code expressions. -
16 Application Assemblies Gallery
"The site collection level gallery containing the binary assemblies that are used by code method business data actions, or External Data Parts."English-Arabic terms dictionary > Application Assemblies Gallery
См. также в других словарях:
Level 9 Computing — Level 9 was a British computer adventure game company which produced some of the most advanced games of the 1980s. Founded in 1981 by Michael, Nicholas and Pete Austin, the company produced about 20 games for BBC Micro, Nascom, ZX Spectrum,… … Wikipedia
Code for Sustainable Homes — The Code for Sustainable Homes is an environmental impact rating system for housing in England and Wales, setting new standards for energy efficiency (above those in current building regulations)[1] and sustainability which are not mandatory… … Wikipedia
Code coverage — is a measure used in software testing. It describes the degree to which the source code of a program has been tested. It is a form of testing that inspects the code directly and is therefore a form of white box testing.[1] Code coverage was among … Wikipedia
Code of Personal Status (Tunisia) — The Code of Personal Status (CPS) (Arabic: مجلة الأحوال الشخصية) is a series of progressive Tunisian laws aiming at the institution of equality between women and men in a number of areas. It was promulgated by beylical decree on August 13, 1956… … Wikipedia
Code morphing — is one of the approaches to protect software applications from reverse engineering, analysis, modifications, and cracking used in obfuscating software. This technology protects intermediate level code such as compiled from Java and .NET languages … Wikipedia
Code Name: Viper — cover art (North American version) Developer(s) Capcom … Wikipedia
Level One — Genre Divertissement Réalisation Pierre Boulay Présentation Marcus (1998 2002) Julien Tellouck (2002) Johann Lefèbvre (2002 2007) Yannick Zicot (2002 2004) … Wikipédia en Français
Code: Breaker — Code:Breaker Cover of the first volume コード: ブレイカー (Kōdo:Bureikā) Genre Action, School Life, Supernatural, Comedy … Wikipedia
Level Park-Oak Park, Michigan — CDP … Wikipedia
Code Age Commanders: Tsugu Mono Tsuga Reru Mono — Developer(s) Square Enix Publisher(s) Square Enix Director(s) … Wikipedia
code — [kəʊd ǁ koʊd] noun 1. [countable] LAW a complete set of written rules or laws: • Each state in the US has a different criminal and civil code. ˈbuilding code [countable] LAW a set of rules that states what features a new building, bridge etc… … Financial and business terms