-
1 code profiler
"A software tool, implemented as a DLL, which is called by the runtime system during the execution of an image." -
2 CODE-COMMAND SYSTEM
-
3 managed code
"Code that is executed by the common language runtime environment rather than directly by the operating system. Managed code applications gain common language runtime services such as automatic garbage collection, runtime type checking and security support, and so on. These services help provide uniform platform- and language-independent behavior of managed-code applications."تعليمات برمجية مُدارة -
4 unmanaged code
"Code that is executed directly by the operating system, outside the.NET Framework common language runtime. Unmanaged code must provide its own memory management, type checking, and security support, unlike managed code, which receives these services from the common language runtime."تعليمات برمجية غير مُدارة -
5 unsafe code
"Code that is executed directly by the operating system, outside the.NET Framework common language runtime. Unmanaged code must provide its own memory management, type checking, and security support, unlike managed code, which receives these services from the common language runtime." -
6 Trojan code
A program that appears to be useful or harmless but that contains hidden code designed to exploit or damage the system on which it is run. -
7 source code control
"A set of features that include a mechanism for checking source code in and out of a central repository. It also implies a version control system that can manage files through the development lifecycle, keeping track of which changes were made, who made them, when they were made, and why." -
8 authorization code
"A code that grants rights to an individual, for example to use a system or access stored data." -
9 Match Code Update
A system job that scans the system for records for which match codes are not updated and persist their corresponding matchcodes in the database (this wakes up every 5 mins). -
10 IFSC code
A series of 11 alphanumeric characters used by the Indian Financial System to identify banks participating in the NEFT system and to route transactions between banks. -
11 user mode
"The nonprivileged processor mode in which application code, including protected subsystem code, executes. User-mode applications cannot gain access to system data except by calling subsystem-supplied functions, which, in turn, call system services." -
12 Language for non-Unicode programs
A Regional and Language Options setting that specifies the default code pages and associated bitmap font files for a specific computer that affects all of that computer's users. The default code pages and fonts enable a non-Unicode application written for one operating system language version to run correctly on another operating system language version.English-Arabic terms dictionary > Language for non-Unicode programs
-
13 embedded controller interface
"A standard hardware and software communications interface between an operating system driver and an embedded controller, such as Smart Battery and AML code. This allows any operating system to provide a standard driver that can directly communicate with an embedded controller in the system, thus allowing other drivers to communicate with and use the resources of the system embedded controllers."English-Arabic terms dictionary > embedded controller interface
-
14 application object
"The top-level object that represents the application to the system. The system calls methods on this object when the application is loaded, before it is shut down, and throughout the lifetime of the application to notify it of system-wide events. The application object contains application-wide code and maintains state that can be accessed from multiple views." -
15 boot sector
"A critical disk structure for starting your computer, located at sector 1 of each volume or floppy disk. It contains executable code and data that is required by the code, including information used by the file system to access the volume. The boot sector is created when your format the volume." -
16 component
"In general, a modular unit of code that acts as part of a larger system or structure. For COM, a unit of code built to deliver a well-specified set of services through well-specified interfaces. A component provides an object that a client requests at runtime."مكوّن -
17 full trust
"A code access security (CAS) state assigned to managed assemblies. The level of trust granted to an application or Web service affects its ability to use system resources while executing. Assemblies that have full trust can access any resource that is subject to operating system security, and all privileged operations are supported." -
18 loader
"A utility that loads the executable code of a program into memory for execution. On most microcomputers, the loader is an invisible part of the operating system and is automatically invoked when a program is run." -
19 virus
"Malware that replicates, commonly by infecting other files in the system, thus allowing the execution of the malware code and its propagation when those files are activated." -
20 worm
"Self-propagating malicious code that can automatically distribute itself from one computer to another through network connections. A worm can take harmful action, such as consuming network or local system resources, possibly causing a denial of service attack."
См. также в других словарях:
National Drug Code System — The National Drug Code (NDC) System is a system that is designed to provide drugs in the United States with a specific 11 digit number that describes the product. Originally created under Medicare to help identify drugs for reimbursement, the… … Wikipedia
pulse-code system — impulsinė kodinė sistema statusas T sritis automatika atitikmenys: angl. pulse code system vok. Impulskodesystem, n rus. кодо импульсная система, f pranc. système d impulsions codées, m … Automatikos terminų žodynas
pulse-code system — kodinė impulsinė sistema statusas T sritis radioelektronika atitikmenys: angl. pulse code system vok. Impulskodesystem, n rus. кодово импульсная система, f; кодо импульсная система, f pranc. système d impulsions codées, m … Radioelektronikos terminų žodynas
Code for municipality — (kommunkod) is a numbercode given to all Swedish municipalities by the Swedish tax authorities.The code is set up by four numbers, the two first the county and the last two for the municipality.The code system was introduced with the municipality … Wikipedia
code — c.1300, systematic compilation of laws, from O.Fr. code system of laws, law book (13c.), from L. codex, earlier caudex book, book of laws, lit. tree trunk, hence, book made up of wooden tablets covered with wax for writing. Meaning cipher (the… … Etymology dictionary
code — coder, n. codeless, adj. /kohd/, n., v., coded, coding. n. 1. a system for communication by telegraph, heliograph, etc., in which long and short sounds, light flashes, etc., are used to symbolize the content of a message: Morse code. 2. a system… … Universalium
code — [[t]koʊd[/t]] n. v. cod•ed, cod•ing 1) tgp a system for communication by telegraph, heliograph, etc., in which the letters of a message are represented by long and short sounds, light flashes, etc.: Morse code[/ex] 2) crp a system used for… … From formal English to slang
code — 01. Local building [codes] were ignored at the stadium, resulting in a tragic accident which killed over 250 spectators. 02. I tried to phone you, but I dialed the wrong area [code], and got someone living in Louisiana instead. 03. I can t… … Grammatical examples in English
Code ami — Logo du CWF Nintendo Un code ami est un code de 12 chiffres, unique[1] pour chaque exemplaire d un jeu vidéo multijoueur Wi Fi de Nintendo DS et de Wii. Ce code permet aux joueurs de se retrouver en ligne sur le … Wikipédia en Français
Code word (disambiguation) — A Code word may refer any of several concepts: Code word (figure of speech), a term chosen for propaganda value Code word , a rhetorical device used in political propaganda Code word, in cryptography and telecommunications a procedure word in… … Wikipedia
Code injection — is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by an attacker to introduce (or inject ) code into a computer program to change the course of execution. The results of a code injection… … Wikipedia