-
21 modem compression
A technique used to reduce the number of characters transmitted without losing data content. The transmitting modem compresses the data and the receiving computer or modem decompresses the data back to its original state. -
22 ar-sa مسؤول المجال
A technique for detecting when data is lost during transmission. This allows the software to recover lost data by notifying the transmitting computer that it needs to retransmit the data. -
23 error detection
A technique for detecting when data is lost during transmission. This allows the software to recover lost data by notifying the transmitting computer that it needs to retransmit the data. -
24 RAM
The temporary storage area the computer uses to run programs and store data. Information stored in RAM is temporary and is designed to be erased when the computer is turned off. -
25 random access memory
The temporary storage area the computer uses to run programs and store data. Information stored in RAM is temporary and is designed to be erased when the computer is turned off. -
26 Windows Live OneCare safety scanner
"The free online on-demand tool that conducts three types of scans: the protection scan checks for and removes things like viruses and malware; the clean-up scan checks the hard disk for unnecessary files and helps users decide which ones they can safely remove, and also clears the computer's registry of orphaned data; the tune-up scan helps improve the computer's performance by defragmenting the hard disk."English-Arabic terms dictionary > Windows Live OneCare safety scanner
-
27 safety scanner
"The free online on-demand tool that conducts three types of scans: the protection scan checks for and removes things like viruses and malware; the clean-up scan checks the hard disk for unnecessary files and helps users decide which ones they can safely remove, and also clears the computer's registry of orphaned data; the tune-up scan helps improve the computer's performance by defragmenting the hard disk." -
28 test agent
"A background process that receives, runs, and reports on tests and collects data on a single computer. The test agent communicates with test agent controller, usually located on another computer." -
29 Windows Live OneCare Safety Scanner
"The free online on-demand tool that conducts three types of scans: the protection scan checks for and removes things like viruses and malware; the clean-up scan checks the hard disk for unnecessary files and helps users decide which ones they can safely remove, and also clears the computer's registry of orphaned data; the tune-up scan helps improve the computer's performance by defragmenting the hard disk."English-Arabic terms dictionary > Windows Live OneCare Safety Scanner
-
30 array
"In programming, a list of data values, all of the same type, any element of which can be referenced by an expression consisting of the array name followed by an indexing expression. Arrays are part of the fundamentals of data structures, which, in turn, are a major fundamental of computer programming." -
31 crash recovery
"The ability of a computer to resume operation after a disastrous failure, such as the failure of a hard drive. Ideally, recovery can occur without any loss of data, although usually some, if not all, data is lost." -
32 crash
"The failure of either a program or a disk drive. A program crash results in the loss of all unsaved data and can leave the operating system unstable enough to require restarting the computer. A disk drive crash, sometimes called a disk crash, leaves the drive inoperable and can cause loss of data." -
33 Jet engine
A client/server data engine that provides local data storage on a smaller computer system and that is compatible with Microsoft SQL Server 2000 and prior. -
34 modem
A communications device that converts between digital data from a computer or terminal and analog audio signals that can pass through a standard telephone line. -
35 modulator/demodulator
A communications device that converts between digital data from a computer or terminal and analog audio signals that can pass through a standard telephone line.مضمن/مزيل تضمين -
36 AGP
"A technology that provides a dedicated, high-speed port through which large blocks of 3-D texture data can be moved between the computer's graphics controller and system memory." -
37 accelerated graphics port
"A technology that provides a dedicated, high-speed port through which large blocks of 3-D texture data can be moved between the computer's graphics controller and system memory."منفذ رسومات مسرّع -
38 authentication
"The process of verifying the identity of a user, computer, process, or other entity by validating the credentials provided by the entity. Common forms of credentials are digital signatures, smart cards, biometric data, and a combination of user names and passwords." -
39 bad sector
"A disk sector that cannot be used for data storage, usually because of media damage or imperfections. Finding, marking, and avoiding bad sectors on a disk is one of the many tasks performed by a computer's operating system. A disk-formatting utility can also find and mark the bad sectors on a disk." -
40 boot sector
"A critical disk structure for starting your computer, located at sector 1 of each volume or floppy disk. It contains executable code and data that is required by the code, including information used by the file system to access the volume. The boot sector is created when your format the volume."
См. также в других словарях:
Computer data processing — Data processing redirects here. For Unit record data processing, see Unit record equipment. Computer data processing is any process that a computer program does to enter data and summarise, analyse or otherwise convert data into usable… … Wikipedia
Computer data logging — is the process of recording events, with an automated computer program, in a certain scope in order to provide an audit trail that can be used to understand the activity of the system and to diagnose problems. Logs are essential to understanding… … Wikipedia
Computer data storage — 1 GB of SDRAM mounted in a personal computer. An example of primary storage … Wikipedia
Data transmission — Data transmission, digital transmission, or digital communications is the physical transfer of data (a digital bit stream) over a point to point or point to multipoint communication channel. Examples of such channels are copper wires, optical… … Wikipedia
Data conversion — is the conversion of computer data from one format to another. Throughout a computer environment, data is encoded in a variety of ways. For example, computer hardware is built on the basis of certain standards, which requires that data contains,… … Wikipedia
Data loss prevention software — Data Loss Prevention (DLP) is a computer security term referring to systems that identify, monitor, and protect data in use (e.g. endpoint actions), data in motion (e.g. network actions), and data at rest (e.g. data storage) through deep content… … Wikipedia
Data recovery — is the process of salvaging data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. Often the data are being salvaged from storage media such as internal or external hard disk drives,… … Wikipedia
Data loss — is an error condition in information systems in which information is destroyed by failures or neglect in storage, transmission, or processing. Information systems implement backup and disaster recovery equipment and processes to prevent data loss … Wikipedia
Data acquisition — is the process of sampling signals that measure real world physical conditions and converting the resulting samples into digital numeric values that can be manipulated by a computer. Data acquisition systems (abbreviated with the acronym DAS or… … Wikipedia
Data consistency — summarizes the validity, accuracy, usability and integrity of related data between applications and across an IT enterprise. This ensures that each user observes a consistent view of the data, including visible changes made by the user s own… … Wikipedia
Data efficiency — refers to efficiency of the many processes that can be applied to data such as storage, access, filtering, sharing, etc., and whether or not the processes lead to the desired outcome within resource constraints. A management definition of Data… … Wikipedia