-
1 Data Execution Prevention
"A security feature that monitors programs on a computer to determine if they use system memory safely. To do this, DEP software works alone or with compatible microprocessors to mark some memory locations as ""non-executable."" If a program tries to run code that is malicious or is not from a protected location, DEP closes the program and notifies you." -
2 order status code
"A numerical data code that identifies the types of order status used on your Web site. For example, you may create order status codes to define saved orders, deleted orders, or unprocessed orders." -
3 pure code
"Code that can contain both native and managed data types, but only managed functions." -
4 dynamic data exchange conversation
The interaction between two applications that are communicating and exchanging data through special functions and code known as dynamic data exchange (DDE).English-Arabic terms dictionary > dynamic data exchange conversation
-
5 hash code
"A fixed-size result that is obtained by applying a one-way mathematical function (sometimes called a hash algorithm) to an arbitrary amount of data. If there is a change in the input data, the hash changes. The hash can be used in many operations, including authentication and digital signing." -
6 field code
"Placeholder text that shows where specified information from your data source will appear; the elements in a field that generate a field's result. The field code includes the field characters, field type, and instructions." -
7 authorization code
"A code that grants rights to an individual, for example to use a system or access stored data." -
8 American Standard Code for Information Interchange
"A standard single-byte character encoding scheme used for text-based data. ASCII uses designated 7-bit or 8-bit number combinations to represent either 128 or 256 possible characters. Standard ASCII uses 7 bits to represent all uppercase and lowercase letters, the numbers 0 through 9, punctuation marks, and special control characters used in U.S. English. Most current x86-based systems support the use of extended (or ""high"") ASCII. Extended ASCII allows the eighth bit of each character to identify an additional 128 special symbol characters, foreign-language letters, and graphic symbols."English-Arabic terms dictionary > American Standard Code for Information Interchange
-
9 Message Authentication Code
An algorithm that allows a receiver to ensure that a block of data has retained its integrity from the time it was sent until the time it was received.English-Arabic terms dictionary > Message Authentication Code
-
10 four character code
A 32-bit unsigned integer that is created by concatenating four ASCII characters to identify a data format. -
11 FOURCC code
A 32-bit unsigned integer that is created by concatenating four ASCII characters to identify a data format. -
12 module
"In programming, a collection of routines and data structures that performs a particular task or implements a particular abstract data type. Modules usually consist of two parts: an interface, which lists the constants, data types, variables, and routines that can be accessed by other modules or routines, and an implementation, which is private (accessible only to the module) and which contains the source code that actually implements the routines in the module." -
13 provider
"In a Web Parts connection, a server control that sends data to a consumer control. A provider can be a WebPart control or any type of server control, but must be designed to function as a provider. A provider must have a special callback method marked with a ConnectionProviderAttribute attribute in the source code. This method provides data to consumer controls in the form of an interface instance." -
14 DDE conversation
The interaction between two applications that are communicating and exchanging data through special functions and code known as dynamic data exchange (DDE). -
15 isolated storage
A data storage mechanism that provides isolation and safety by defining standardized ways of associating code with saved data. -
16 Type-Length-Value
"A method of organizing data that involves a Type code (16 bit), a specified length of a Value field (16 bit), and the data in the Value field (variable)." -
17 Type, Length, Value
"A method of organizing data that involves a Type code (16 bit), a specified length of a Value field (16 bit), and the data in the Value field (variable).""Type, Length, Value" -
18 TLV
"A method of organizing data that involves a Type code (16 bit), a specified length of a Value field (16 bit), and the data in the Value field (variable)." -
19 consumer
"In a Web Parts connection, a server control that receives data from a provider control and processes or displays it. A consumer can be any type of server control, but must be designed to function as a consumer. A consumer must have a special callback method marked with a ConnectionConsumerAttribute attribute in the source code. This method receives data from the provider in the form of an interface instance." -
20 profiling
"The collection of detailed performance data, such as memory, stack frame, and CPU utilization, during application execution. Analysis of the resulting data often leads to code optimizations that substantially improve application run-time behavior."
См. также в других словарях:
data code — duomenų kodas statusas T sritis automatika atitikmenys: angl. data code vok. Datencode, m rus. код данных, m pranc. code de données, m … Automatikos terminų žodynas
data code — A number, letter, character, or any combination thereof used to represent a data element or data item … Military dictionary
Code injection — is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by an attacker to introduce (or inject ) code into a computer program to change the course of execution. The results of a code injection… … Wikipedia
code de données — duomenų kodas statusas T sritis automatika atitikmenys: angl. data code vok. Datencode, m rus. код данных, m pranc. code de données, m … Automatikos terminų žodynas
Data, context and interaction — (DCI) is a paradigm used in computer software to program systems of communicating objects. Its goals are: To improve the readability of object oriented code by giving system behavior first class status; To cleanly separate code for rapidly… … Wikipedia
Data transformation — Data transformation/Source transformation Concepts metadata · data mapping data transformation · model transf … Wikipedia
Code — redirects here. CODE may also refer to Cultural Olympiad Digital Edition. Decoded redirects here. For the television show, see Brad Meltzer s Decoded. For code (computer programming), see source code. For other uses, see Code (disambiguation).… … Wikipedia
Data-centric programming language — defines a category of programming languages where the primary function is the management and manipulation of data. A data centric programming language includes built in processing primitives for accessing data stored in sets, tables, lists, and… … Wikipedia
Data Execution Prevention — (DEP) is a security feature included in modern operating systems. It is known to be available in Linux, Mac OS X, and Microsoft Windows operating systems and is intended to prevent an application or service from executing code from a non… … Wikipedia
Data integration — involves combining data residing in different sources and providing users with a unified view of these data.[1] This process becomes significant in a variety of situations, which include both commercial (when two similar companies need to merge… … Wikipedia
Data sharing — is the practice of making data used for scholarly research available to other investigators. Replication has a long history in science. The motto of The Royal Society is Nullius in verba , translated Take no man s word for it. [1] Many funding… … Wikipedia