-
1 program code
A five-digit code that identifies which of the solution provider's program offerings the customer's computer belongs to. -
2 activation code
A unique 12-character code that is used in combination with a computer ID to activate Windows in licensing models where a product key is not used for activation. -
3 access code
"A string of characters entered by a user to verify his or her identity to a network or to a local computer, device, or client, or to sign in to an account, app, and so on." -
4 virus signature
A portion of unique computer code contained in a virus. Antivirus programs search for known virus signatures to identify infected programs and files. -
5 Language for non-Unicode programs
A Regional and Language Options setting that specifies the default code pages and associated bitmap font files for a specific computer that affects all of that computer's users. The default code pages and fonts enable a non-Unicode application written for one operating system language version to run correctly on another operating system language version.English-Arabic terms dictionary > Language for non-Unicode programs
-
6 assembly cache
"A machine-wide code cache used for side-by-side storage of assemblies. There are two parts to the cache: the global assembly cache contains assemblies that are explicitly installed to be shared among many applications on the computer; the download cache stores code downloaded from Internet or intranet sites, isolated to the application that triggered the download so that code downloaded on behalf of one application/page does not impact other applications." -
7 global assembly cache
A computer-wide code cache that stores assemblies specifically installed to be shared by many applications on the computer. -
8 token
"The unique, 25-character code on a prepaid card that adds computer use time to your prepaid computer or that pays for your subscription."رمز مميّز -
9 boot sector
"A critical disk structure for starting your computer, located at sector 1 of each volume or floppy disk. It contains executable code and data that is required by the code, including information used by the file system to access the volume. The boot sector is created when your format the volume." -
10 master boot record
"The first sector on a hard disk, which begins the process of starting the computer. The MBR contains the partition table for the disk and a small amount of executable code called the master boot code." -
11 MBR
"The first sector on a hard disk, which begins the process of starting the computer. The MBR contains the partition table for the disk and a small amount of executable code called the master boot code." -
12 trusted publisher store
"A list of software publisher certificates used to digitally sign code, such as macros. Because you explicitly trust the software publishers, their code is allowed to run on your computer without needing to prompt for permission." -
13 worm
"Self-propagating malicious code that can automatically distribute itself from one computer to another through network connections. A worm can take harmful action, such as consuming network or local system resources, possibly causing a denial of service attack." -
14 kernel
"The core of layered architecture that manages the most basic operations of the operating system and the computer's processor. The kernel schedules different blocks of executing code, called threads, for the processor to keep it as busy as possible and coordinates multiple processors to optimize performance. The kernel also synchronizes activities among Executive-level subcomponents, such as I/O Manager and Process Manager, and handles hardware exceptions and other hardware-dependent functions. The kernel works closely with the hardware abstraction layer." -
15 security file
A file that contains a digital code that makes it possible to seal messages or to add a digital signature to messages. This file can be stored on a 3.5-inch disk or on your computer's hard disk. -
16 Data Execution Prevention
"A security feature that monitors programs on a computer to determine if they use system memory safely. To do this, DEP software works alone or with compatible microprocessors to mark some memory locations as ""non-executable."" If a program tries to run code that is malicious or is not from a protected location, DEP closes the program and notifies you." -
17 DEP
"A security feature that monitors programs on a computer to determine if they use system memory safely. To do this, DEP software works alone or with compatible microprocessors to mark some memory locations as ""non-executable."" If a program tries to run code that is malicious or is not from a protected location, DEP closes the program and notifies you." -
18 token
A code that is used to add time to a computer that is running Microsoft FlexGo technology. -
19 trusted location
"A folder or file path on your computer or a location on your intranet from which it is safe to run code. Default trusted locations include the Templates, Addins, and Startup folders, and you can specify your own trusted locations." -
20 non-Microsoft token
A code provided by a payment provider that is used to add usage time to a computer that is running Microsoft FlexGo technology.
- 1
- 2
См. также в других словарях:
computer code — noun (computer science) the symbolic arrangement of data or instructions in a computer program or the set of such instructions • Syn: ↑code • Derivationally related forms: ↑code (for: ↑code) • Topics: ↑ … Useful english dictionary
computer science — computer scientist. the science that deals with the theory and methods of processing information in digital computers, the design of computer hardware and software, and the applications of computers. [1970 75] * * * Study of computers, their… … Universalium
Computer ethics — is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct.[1] Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia… … Wikipedia
code — [kəʊd ǁ koʊd] noun 1. [countable] LAW a complete set of written rules or laws: • Each state in the US has a different criminal and civil code. ˈbuilding code [countable] LAW a set of rules that states what features a new building, bridge etc… … Financial and business terms
Code and Other Laws of Cyberspace — (1999) is a book by Lawrence Lessig. It has evolved into a partially wiki written book Code v2 under a Creative Commons Attribution ShareAlike 2.5 License.[1] Contents 1 Main topic 2 In detail 3 … Wikipedia
Computer program — A computer program (also software, or just a program) is a sequence of instructions written to perform a specified task with a computer.[1] A computer requires programs to function, typically executing the program s instructions in a central… … Wikipedia
computer — computerlike, adj. /keuhm pyooh teuhr/, n. 1. Also called processor. an electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed, and display the results of these operations. Cf. analog… … Universalium
Computer insecurity — This article is about computer security exploits and defenses. For computer security through design and engineering, see computer security. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
Computer experiment — In the scientific context, a computer experiment refer to mathematical modeling using computer simulation. It has become common to call such experiments in silico. This area includes Computational physics, Computational chemistry, Computational… … Wikipedia
Computer-aided software engineering — Example of a CASE tool. Computer aided software engineering (CASE) is the scientific application of a set of tools and methods to a software system which is meant to result in high quality, defect free, and maintainable software products.[1] It… … Wikipedia
computer science — noun the branch of engineering science that studies (with the aid of computers) computable processes and structures • Syn: ↑computing • Topics: ↑computer, ↑computing machine, ↑computing device, ↑data processor, ↑electronic computer, ↑ … Useful english dictionary