-
21 backward compatibility
The capability of source code or programs developed on a more advanced system or compiler version to be executed or compiled by a less advanced (older) version. -
22 hexadecimal
Pertaining to the base-16 number system represented by the digits 0 through 9 and the uppercase or lowercase letters A (equivalent to decimal 10) through F (equivalent to decimal 15). Hexadecimal values are commonly used in HTML code to identify colors. -
23 hex
Pertaining to the base-16 number system represented by the digits 0 through 9 and the uppercase or lowercase letters A (equivalent to decimal 10) through F (equivalent to decimal 15). Hexadecimal values are commonly used in HTML code to identify colors. -
24 kernel
"The core of layered architecture that manages the most basic operations of the operating system and the computer's processor. The kernel schedules different blocks of executing code, called threads, for the processor to keep it as busy as possible and coordinates multiple processors to optimize performance. The kernel also synchronizes activities among Executive-level subcomponents, such as I/O Manager and Process Manager, and handles hardware exceptions and other hardware-dependent functions. The kernel works closely with the hardware abstraction layer." -
25 Trojan horse
A program that appears to be useful or harmless but that contains hidden code designed to exploit or damage the system on which it is run. -
26 Data Execution Prevention
"A security feature that monitors programs on a computer to determine if they use system memory safely. To do this, DEP software works alone or with compatible microprocessors to mark some memory locations as ""non-executable."" If a program tries to run code that is malicious or is not from a protected location, DEP closes the program and notifies you." -
27 DEP
"A security feature that monitors programs on a computer to determine if they use system memory safely. To do this, DEP software works alone or with compatible microprocessors to mark some memory locations as ""non-executable."" If a program tries to run code that is malicious or is not from a protected location, DEP closes the program and notifies you." -
28 Stop message
"A character-based, full-screen error message displayed on a blue background. A Stop message indicates that the Windows kernel detected a condition from which it cannot recover. Each message is uniquely identified by a Stop error code (a hexadecimal number) and a string indicating the errors symbolic name. Stop messages are usually followed by up to four additional hexadecimal numbers, enclosed in parentheses, which identify developer-defined error parameters. A driver or device may be identified as the cause of the error. A series of troubleshooting tips are also displayed, along with an indication that, if the system was configured to do so, a memory dump file was saved for later use by a kernel debugger." -
29 visual tree
"In Windows Presentation Foundation, the element tree containing all visual elements (elements that derive from the type System.Windows.Media.Visual) used for a piece of the user interface. This tree is the accumulation of all visual elements created directly by the application (whether in code or in markup) and all visual elements created by the template expansion of elements such as controls and data objects." -
30 culture
"In managed code, a class of information about a particular nation or people including their collective name, writing system, calendar used, and conventions for formatting dates and sorting strings." -
31 source control
"A set of features that include a mechanism for checking source code in and out of a central repository. It also implies a version control system that can manage files through the development lifecycle, keeping track of which changes were made, who made them, when they were made, and why." -
32 Trojan
A program that appears to be useful or harmless but that contains hidden code designed to exploit or damage the system on which it is run. -
33 kernel mode exception
"An exception that occurs while the operating system is executing internal code (in drivers, the kernel, etc)." -
34 kernel exception
"An exception that occurs while the operating system is executing internal code (in drivers, the kernel, etc)." -
35 kernel fault
"An exception that occurs while the operating system is executing internal code (in drivers, the kernel, etc)." -
36 Blue Screen of Death
"An exception that occurs while the operating system is executing internal code (in drivers, the kernel, etc)." -
37 BSOD
"An exception that occurs while the operating system is executing internal code (in drivers, the kernel, etc)." -
38 kernel exception signature
"The exception code, exception parameters, and operating system version (including build number and Service Pack version)."English-Arabic terms dictionary > kernel exception signature
-
39 resource leak
A type of software bug that can occur in Windows-based applications developed in Visual C++ if the application is not programmed to release a system resource in the source code. -
40 transition event
"A change in the location of processor event execution between ring 3 (user mode) and ring 0 (kernel mode). Transition events represent time spent outside the direct execution of the application code. Transition events can be time spent in threads that are not part of the profiled item, or time spent executing calls from the profiled item to the operating system."
См. также в других словарях:
National Drug Code System — The National Drug Code (NDC) System is a system that is designed to provide drugs in the United States with a specific 11 digit number that describes the product. Originally created under Medicare to help identify drugs for reimbursement, the… … Wikipedia
pulse-code system — impulsinė kodinė sistema statusas T sritis automatika atitikmenys: angl. pulse code system vok. Impulskodesystem, n rus. кодо импульсная система, f pranc. système d impulsions codées, m … Automatikos terminų žodynas
pulse-code system — kodinė impulsinė sistema statusas T sritis radioelektronika atitikmenys: angl. pulse code system vok. Impulskodesystem, n rus. кодово импульсная система, f; кодо импульсная система, f pranc. système d impulsions codées, m … Radioelektronikos terminų žodynas
Code for municipality — (kommunkod) is a numbercode given to all Swedish municipalities by the Swedish tax authorities.The code is set up by four numbers, the two first the county and the last two for the municipality.The code system was introduced with the municipality … Wikipedia
code — c.1300, systematic compilation of laws, from O.Fr. code system of laws, law book (13c.), from L. codex, earlier caudex book, book of laws, lit. tree trunk, hence, book made up of wooden tablets covered with wax for writing. Meaning cipher (the… … Etymology dictionary
code — coder, n. codeless, adj. /kohd/, n., v., coded, coding. n. 1. a system for communication by telegraph, heliograph, etc., in which long and short sounds, light flashes, etc., are used to symbolize the content of a message: Morse code. 2. a system… … Universalium
code — [[t]koʊd[/t]] n. v. cod•ed, cod•ing 1) tgp a system for communication by telegraph, heliograph, etc., in which the letters of a message are represented by long and short sounds, light flashes, etc.: Morse code[/ex] 2) crp a system used for… … From formal English to slang
code — 01. Local building [codes] were ignored at the stadium, resulting in a tragic accident which killed over 250 spectators. 02. I tried to phone you, but I dialed the wrong area [code], and got someone living in Louisiana instead. 03. I can t… … Grammatical examples in English
Code ami — Logo du CWF Nintendo Un code ami est un code de 12 chiffres, unique[1] pour chaque exemplaire d un jeu vidéo multijoueur Wi Fi de Nintendo DS et de Wii. Ce code permet aux joueurs de se retrouver en ligne sur le … Wikipédia en Français
Code word (disambiguation) — A Code word may refer any of several concepts: Code word (figure of speech), a term chosen for propaganda value Code word , a rhetorical device used in political propaganda Code word, in cryptography and telecommunications a procedure word in… … Wikipedia
Code injection — is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by an attacker to introduce (or inject ) code into a computer program to change the course of execution. The results of a code injection… … Wikipedia