-
21 host control
An object that is native to a host application (such as Microsoft Office Word or Microsoft Office Excel) to which data binding and events have been added. Examples of host controls include Bookmark controls and ListObject controls. -
22 bind
"To connect a control to a field or group in the data source so that data entered into the control is saved to the corresponding field or group. When a control is unbound, it is not connected to a field or group, and data entered into the control is not saved." -
23 provider
"In a Web Parts connection, a server control that sends data to a consumer control. A provider can be a WebPart control or any type of server control, but must be designed to function as a provider. A provider must have a special callback method marked with a ConnectionProviderAttribute attribute in the source code. This method provides data to consumer controls in the form of an interface instance." -
24 consumer
"In a Web Parts connection, a server control that receives data from a provider control and processes or displays it. A consumer can be any type of server control, but must be designed to function as a consumer. A consumer must have a special callback method marked with a ConnectionConsumerAttribute attribute in the source code. This method receives data from the provider in the form of an interface instance." -
25 Web Parts connection
"An association between two server controls residing in a WebPartZoneBase zone that enables them to share data, with one control acting as the provider of data and the other control acting as the consumer. A connection is encapsulated within a System.Web.UI.WebControls.WebParts.WebPartConnection object." -
26 ACK
"A message transmitted to indicate that data has been received correctly. The Transmission Control Protocol (TCP) requires that the recipient acknowledge successful receipt of data. Such acknowledgments (ACKs) generate additional network traffic, decreasing the rate at which data passes but increasing reliability. To reduce the impact on performance, most hosts send an acknowledgment for every other segment or when a specified time interval has passed." -
27 acknowledgement
"A message transmitted to indicate that data has been received correctly. The Transmission Control Protocol (TCP) requires that the recipient acknowledge successful receipt of data. Such acknowledgments (ACKs) generate additional network traffic, decreasing the rate at which data passes but increasing reliability. To reduce the impact on performance, most hosts send an acknowledgment for every other segment or when a specified time interval has passed." -
28 SDLC
A type of link service used for managing synchronous data transfer over standard telephone lines (switched lines) or leased lines. The data transmission protocol most widely used by networks conforming to IBM's Systems Network Architecture (SNA). SDLC is similar to the HDLC (High-level Data Link Control) protocol developed by the International Organization for Standardization (ISO). -
29 active object
"In a collaboration diagram, an object role that can initiate control. Typical active objects include processes and tasks. In contrast, a passive object holds data and may send messages, but it does not initiate control." -
30 packet
"An Open Systems Interconnection (OSI) network layer transmission unit that consists of binary information representing both data and a header containing an identification number, source and destination addresses, and error-control data." -
31 inline alert
A data validation alert that marks controls that contain invalid or missing data with a dashed red border or red asterisk. Users can display custom error messages by right-clicking the control or by clicking a link for more information. -
32 expression box
A control on a form that displays read-only data as the result of a lookup or calculation against the data using an XPath expression. -
33 Test Access Port
"A collection of boundary scan control signals that define a serial protocol for scan-based devices. There are five pins, TCK/clock, TMS/mode select, TDI/data in, TDO/data out, and TRST/reset." -
34 TAP
"A collection of boundary scan control signals that define a serial protocol for scan-based devices. There are five pins, TCK/clock, TMS/mode select, TDI/data in, TDO/data out, and TRST/reset." -
35 numerical
[nju:΄merikl] a թվային, թվանշանային, թվի. numerical data թվային տվյալներ. numerical superiority թվային գերազանցություն. հմկրգ. numerical control (NC) թվային ծրագրային կառավարում. numerical data թվային տվյալներ. numerical error թվային սխալ. numerical value թվային արժ եք -
36 ar-sa المؤدّي
"A standard single-byte character encoding scheme used for text-based data. ASCII uses designated 7-bit or 8-bit number combinations to represent either 128 or 256 possible characters. Standard ASCII uses 7 bits to represent all uppercase and lowercase letters, the numbers 0 through 9, punctuation marks, and special control characters used in U.S. English. Most current x86-based systems support the use of extended (or ""high"") ASCII. Extended ASCII allows the eighth bit of each character to identify an additional 128 special symbol characters, foreign-language letters, and graphic symbols." -
37 ASCII
"A standard single-byte character encoding scheme used for text-based data. ASCII uses designated 7-bit or 8-bit number combinations to represent either 128 or 256 possible characters. Standard ASCII uses 7 bits to represent all uppercase and lowercase letters, the numbers 0 through 9, punctuation marks, and special control characters used in U.S. English. Most current x86-based systems support the use of extended (or ""high"") ASCII. Extended ASCII allows the eighth bit of each character to identify an additional 128 special symbol characters, foreign-language letters, and graphic symbols." -
38 American Standard Code for Information Interchange
"A standard single-byte character encoding scheme used for text-based data. ASCII uses designated 7-bit or 8-bit number combinations to represent either 128 or 256 possible characters. Standard ASCII uses 7 bits to represent all uppercase and lowercase letters, the numbers 0 through 9, punctuation marks, and special control characters used in U.S. English. Most current x86-based systems support the use of extended (or ""high"") ASCII. Extended ASCII allows the eighth bit of each character to identify an additional 128 special symbol characters, foreign-language letters, and graphic symbols."English-Arabic terms dictionary > American Standard Code for Information Interchange
-
39 Clear To Send
A control packet that a destination station sends to indicate its readiness to receive data. A destination station responds to a request to send (RTS) by transmitting a CTS. -
40 CTS
A control packet that a destination station sends to indicate its readiness to receive data. A destination station responds to a request to send (RTS) by transmitting a CTS.
См. также в других словарях:
Data Control & Systems — was a company formed by Rob Nursten in Zimbabwe. The company set out to provide Internet access to the whole nation from 1994 onwards. Its domain name was http://harare.iafrica.com. Eventually it changed names to Internet Unlimited and was then… … Wikipedia
Data Control Block — In IBM mainframe operating systems, such as OS/360, MVS, z/OS, a Data Control Block (DCB) is a description of a dataset in a program. A DCB is coded in Assembler programs using the DCB macro instruction (which expands into a large number of… … Wikipedia
Data control language — A data control language (DCL) is a syntax similar to a computer programming language used to control access to data stored in a database. In particular, it is a component of Structured Query Language (SQL). Examples of DCL commands include: GRANT … Wikipedia
Data Control Language — A Data Control Language (DCL) is a computer language and a subset of SQL, used to control access to data in a database. Examples of DCL commands include: * GRANT to allow specified users to perform specified tasks. * REVOKE to cancel previously… … Wikipedia
Data Control Language — Die Data Control Language (DCL) ist derjenige Teil einer Datenbanksprache, der verwendet wird, um Berechtigungen zu vergeben oder zu entziehen. DCL ist die Datenüberwachungssprache einer Datenbank. Die DCL gibt es in unterschiedlichen Systemen in … Deutsch Wikipedia
sampled-data control — diskretusis valdymas statusas T sritis automatika atitikmenys: angl. discrete control; sampled data control; sampling control vok. Abtastregelung, f rus. дискретное управление, n pranc. commande à échantillonnage, f; commande discrète, f … Automatikos terminų žodynas
sampled-data control system — diskrečiojo valdymo sistema statusas T sritis automatika atitikmenys: angl. discrete control system; sampled data control system vok. Abtastregelsystem, n; Abtastregelungssystem, n; Abtaststeuersystem, n; diskretes Steuersystem, n rus. система… … Automatikos terminų žodynas
Data quality control — is the process of controlling the usage of data with known quality measurement for an application or a process. This process is usually done after a Data quality assurance process, which consists of discovery of data inconsistency and correction … Wikipedia
Data Definition Language — (DDL) (язык описания данных) это семейство компьютерных языков, используемых в компьютерных программах для описания структуры баз данных. На текущий момент наиболее популярным языком DDL является SQL, используемый для получения и… … Википедия
Data Manipulation Language — (DML) (язык управления (манипулирования) данными) это семейство компьютерных языков, используемых в компьютерных программах или пользователями баз данных для получения, вставки, удаления или изменения данных в базах данных. На текущий… … Википедия
Data Description Language — Die Data Definition Language (DDL) ist eine Computersprache, die verwendet wird, um Datenstrukturen und verwandte Elemente zu beschreiben, zu ändern oder zu entfernen. Ursprünglich bezog sich DDL auf Datenbanksysteme, der Begriff wird aber heute… … Deutsch Wikipedia