-
21 American Standard Code for Information Interchange
"A standard single-byte character encoding scheme used for text-based data. ASCII uses designated 7-bit or 8-bit number combinations to represent either 128 or 256 possible characters. Standard ASCII uses 7 bits to represent all uppercase and lowercase letters, the numbers 0 through 9, punctuation marks, and special control characters used in U.S. English. Most current x86-based systems support the use of extended (or ""high"") ASCII. Extended ASCII allows the eighth bit of each character to identify an additional 128 special symbol characters, foreign-language letters, and graphic symbols."English-Arabic terms dictionary > American Standard Code for Information Interchange
-
22 bitmap
"A data structure in memory that represents information in the form of a collection of individual bits. A bit map is used to represent a bit image. Another use of a bit map in some systems is the representation of the blocks of storage on a disk, indicating whether each block is free (0) or in use (1)." -
23 bitness
"A characteristic of a microprocessor's data stream (the distinction between 16-bit, 32-bit and 64-bit address spaces) and the potential differences in instantiation of components that this entails." -
24 padding
"In data storage, the addition of one or more bits, usually zeros, to a block of data in order to fill it, to force the actual data bits into a certain position, or to prevent the data from duplicating a bit pattern that has an established meaning, such as an embedded command" -
25 hash algorithm
"An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1." -
26 hash function
"An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1." -
27 dword
A data type consisting of a 32-bit unsigned integer. -
28 HDLC
"A protocol for information transfer adopted by the ISO. HDLC is a bit-oriented, synchronous protocol that applies to the data-link (message-packaging) layer (layer 2 of the ISO/OSI reference model) for computer-to-microcomputer communications." -
29 MBR
A characteristic of a data stream in which the same content is encoded at several different bit rates in oder to optimize content delivery. -
30 Secure Hash Algorithm 1
"An algorithm that generates a 160-bit hash value from an arbitrary amount of input data. SHA-1 is used with the Digital Signature Algorithm (DSA) in the Digital Signature Standard (DSS), among other places." -
31 SHA-1
"An algorithm that generates a 160-bit hash value from an arbitrary amount of input data. SHA-1 is used with the Digital Signature Algorithm (DSA) in the Digital Signature Standard (DSS), among other places." -
32 ar-sa عنوان ويب
"A character set for protocols evolving beyond the use of ASCII. The UTF-8 protocol provides for support of extended ASCII characters and translation of UCS-2, an international 16-bit Unicode character set. UTF-8 enables a far greater range of names than can be achieved using ASCII or extended ASCII encoding for character data." -
33 UCS Transformation Format 8
"A character set for protocols evolving beyond the use of ASCII. The UTF-8 protocol provides for support of extended ASCII characters and translation of UCS-2, an international 16-bit Unicode character set. UTF-8 enables a far greater range of names than can be achieved using ASCII or extended ASCII encoding for character data."English-Arabic terms dictionary > UCS Transformation Format 8
-
34 UTF-8
"A character set for protocols evolving beyond the use of ASCII. The UTF-8 protocol provides for support of extended ASCII characters and translation of UCS-2, an international 16-bit Unicode character set. UTF-8 enables a far greater range of names than can be achieved using ASCII or extended ASCII encoding for character data." -
35 bits per pixel
"The number of bits (e.g. 8, 16, 24, or 32) used to store and display the color data for a single pixel. This is the standard unit of measure for bit or color depth." -
36 encryption key
A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data. -
37 four character code
A 32-bit unsigned integer that is created by concatenating four ASCII characters to identify a data format. -
38 FOURCC code
A 32-bit unsigned integer that is created by concatenating four ASCII characters to identify a data format. -
39 PIC S9(9) COMP Integer
"A 32-bit COBOL data type that represents a 4 byte signed arithmetic operation, and can take on values from -999999999 to +999999999 or -2147483648 to +2147483647, depending on compiler options. A PIC S9(9) COMP Integer is similar to a Long Integer in C." -
40 MD5
"An industry-standard one-way, 128-bit hashing scheme, developed by RSA Data Security, Inc., and used by various Point-to-Point Protocol (PPP) vendors for encrypted authentication."
См. также в других словарях:
data bit — informacijos bitas statusas T sritis automatika atitikmenys: angl. data bit; information bit vok. Datenbit, n; Informationsbit, n rus. информационный бит, m pranc. bit d information, m … Automatikos terminų žodynas
data bit — duomenų bitas statusas T sritis automatika atitikmenys: angl. data bit; information bit vok. Datenbit, n rus. информационный двоичный разряд, m pranc. bit de données, m … Automatikos terminų žodynas
data bit — duomenų bitas statusas T sritis informatika apibrėžtis ↑Asinchroninio perdavimo bitų grupės bitas, skirtas duomenims perduoti. Perduodamų bitų grupės pradžioje būna ↑pradžios bitas, pabaigoje – ↑pabaigos bitas, o tarp jų keletas (5, 6, 7, 8)… … Enciklopedinis kompiuterijos žodynas
Bit stuffing — In data transmission and telecommunication, bit stuffing (also known uncommonly as positive justification) is the insertion of noninformation bits into data. Stuffed bits should not be confused with overhead bits. Bit stuffing is used for various … Wikipedia
Data link layer — The OSI model 7 Application layer 6 Presentation layer 5 Session layer 4 Transport layer 3 Network layer 2 … Wikipedia
bit d'information — informacijos bitas statusas T sritis automatika atitikmenys: angl. data bit; information bit vok. Datenbit, n; Informationsbit, n rus. информационный бит, m pranc. bit d information, m … Automatikos terminų žodynas
bit de données — duomenų bitas statusas T sritis automatika atitikmenys: angl. data bit; information bit vok. Datenbit, n rus. информационный двоичный разряд, m pranc. bit de données, m … Automatikos terminų žodynas
Bit rate — Bit rates Decimal prefixes (SI) Name Symbol Multiple kilobit per second kbit/s 103 megabit per second Mbit/s 106 gigabit per second Gbit/s 109 … Wikipedia
Data General Nova — System Data General Nova 1200 front panel … Wikipedia
Data structure alignment — is the way data is arranged and accessed in computer memory. It consists of two separate but related issues: data alignment and data structure padding. When a modern computer reads from or writes to a memory address, it will do this in word sized … Wikipedia
Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis … Wikipedia