-
1 system object
"A database object that is defined by the system, such as the table MSysIndexes, or by the user." -
2 system color
"A color that is defined by the operating system for a specific type of monitor and video adapter and that is associated with a specific part of the user interface, such as a window title or a menu." -
3 system view
A view that is defined for all entities and cannot be deleted or shared. -
4 system-defined financial dimension type
A financial dimension mapped to a table or view in the database that represents an entity type and whose values are in the domain of one attribute of that entity type.نوع البعد المالي المحدد من قِبل النظامEnglish-Arabic terms dictionary > system-defined financial dimension type
-
5 NTFS file system
"An advanced file system designed for use specifically with the Windows NT operating system. It supports long filenames, full security access control, file system recovery, extremely large storage media, and various features for the Windows NT POSIX subsystem. It also supports object-oriented applications by treating all files as objects with user-defined and system-defined attributes." -
6 small computer system interface
"A standard high-speed parallel interface defined by the American National Standards Institute (ANSI). A SCSI interface is used for connecting microcomputers to peripheral devices, such as hard disks and printers, and to other computers and local area networks (LANs)."English-Arabic terms dictionary > small computer system interface
-
7 NTFS
"An advanced file system designed for use specifically with the Windows NT operating system. It supports long filenames, full security access control, file system recovery, extremely large storage media, and various features for the Windows NT POSIX subsystem. It also supports object-oriented applications by treating all files as objects with user-defined and system-defined attributes." -
8 color space
"The three-dimensional space that is defined by a set of coordinates for representing color on devices such as monitors, scanners, and printers. For example, in the LAB color space, the colors are defined in terms of their luminance or whiteness (L), redness-greenness (A), and yellowness-blueness (B); the HVC system uses hue (H), value (V), and chroma (C). The two most common color space models are RGB and YUV." -
9 color space model
"The three-dimensional space that is defined by a set of coordinates for representing color on devices such as monitors, scanners, and printers. For example, in the LAB color space, the colors are defined in terms of their luminance or whiteness (L), redness-greenness (A), and yellowness-blueness (B); the HVC system uses hue (H), value (V), and chroma (C). The two most common color space models are RGB and YUV." -
10 ar-sa تحويل بيانات منظم
"In Windows Presentation Foundation and Silverlight, a property represented by a DependencyProperty identifier that is registered with the property system. Dependency properties can be defined only by DependencyObject types, which typically expose the identifier as a public static field. The property system determines their effective value based on a precedence evaluation of all possible value sources." -
11 dependency property
"In Windows Presentation Foundation and Silverlight, a property represented by a DependencyProperty identifier that is registered with the property system. Dependency properties can be defined only by DependencyObject types, which typically expose the identifier as a public static field. The property system determines their effective value based on a precedence evaluation of all possible value sources." -
12 Universal Disk Format
"A file system defined by the Optical Storage Technology Association (OSTA) that is the successor to the CD-ROM file system (CDFS). UDF is used for removable disk media like DVD, CD, and magneto-optic (MO) disks." -
13 UDF
"A file system defined by the Optical Storage Technology Association (OSTA) that is the successor to the CD-ROM file system (CDFS). UDF is used for removable disk media like DVD, CD, and magneto-optic (MO) disks." -
14 severity
"In Server Manager and Event Viewer, the urgency of an event or error condition, system fault, failure, or action by either the system or the user. Severity can be any of four industry-standard values: Information, Warning, Error, or Critical. These values are defined in the Event Viewer Help." -
15 policy
"The mechanism by which computer settings are configured automatically, as defined by the administrator. Depending on context, this can refer to Group Policy or Windows NT 4.0 System Policy." -
16 sandbox
A security mechanism used to constrain the actions a program can take. A sandbox restricts a program to a defined set of privileges and actions that reduce the likelihood that the program may damage the system hosting the program. -
17 Stop message
"A character-based, full-screen error message displayed on a blue background. A Stop message indicates that the Windows kernel detected a condition from which it cannot recover. Each message is uniquely identified by a Stop error code (a hexadecimal number) and a string indicating the errors symbolic name. Stop messages are usually followed by up to four additional hexadecimal numbers, enclosed in parentheses, which identify developer-defined error parameters. A driver or device may be identified as the cause of the error. A series of troubleshooting tips are also displayed, along with an indication that, if the system was configured to do so, a memory dump file was saved for later use by a kernel debugger." -
18 E-Gov-Project
"A sample E-Government template for a state or local government agency. It uses an electronic payment system as an example of a Government to Citizen e-Gov project. It is defined as a Program with three projects (Technical Architecture, Security Extranet and e-Payment) to show how government projects can be organized as programs with more than one interrelated project." -
19 security role
A defined set of application access privileges. The security role assigned to a user determines which tasks the user can perform and which parts of the user interface the user can view. All users must be assigned at least one security role in order to access the system. -
20 threat model
"A systematic analysis of identifying assets, and assessing and documenting the security risks associated with those assets exposed via software. The threat modeling process involves an understanding of the goals of an adversary in attacking a system based on the systems assets of interest. The scope of the threat model is defined by the scope of functionality of software being modeled."
- 1
- 2
См. также в других словарях:
System — (from Latin systēma , in turn from Greek polytonic|σύστημα systēma) is a set of interacting or interdependent entities, real or abstract, forming an integrated whole. The concept of an integrated whole can also be stated in terms of a system… … Wikipedia
System F — System F, also known as the polymorphic lambda calculus or the second order lambda calculus, is a typed lambda calculus. It was discovered independently by the logician Jean Yves Girard and the computer scientist John C. Reynolds. System F… … Wikipedia
System Center Configuration Manager — Developer(s) Microsoft Corporation Stable release Configuration Manager 2007 R3 SP2 / 2010 Development status Active Operating system Microsoft Windows … Wikipedia
System of systems engineering — (SoSE) is a set of developing processes, tools, and methods for designing, re designing and deploying solutions to System of Systems challenges. Overview System of Systems Engineering (SoSE) methodology is heavily used in Department of Defense… … Wikipedia
System integration — is the bringing together of the component subsystems into one system and ensuring that the subsystems function together as a system. In information technology, systems integration is the process of linking together different computing systems and … Wikipedia
System testing — of software or hardware is testing conducted on a complete, integrated system to evaluate the system s compliance with its specified requirements. System testing falls within the scope of black box testing, and as such, should require no… … Wikipedia
System of Physical Quantities — of Nikolay A. Plotnikov (SPQ) the classification of physical quantities or physical operators, that makes it possible to reveal their dependence on the geometry of space time and fundamental physical constants in the form of differential… … Wikipedia
System Center Virtual Machine Manager — Developer(s) Microsoft Corporation Stable release SCVMM 2008 R2 / 2010 Development status Released Operating system Windows Server 2008 R2 … Wikipedia
System requirements (Spacecraft system) — System requirements in Spacecraft systems are the specific system requirements needed to design and operate a spacecraft or a Spacecraft subsystem. Overview [ V Model of the general Systems Development Life Cycle.… … Wikipedia
System of Leibniz — The System of Leibniz † Catholic Encyclopedia ► The System of Leibniz I. LIFE OF LEIBNIZ Gottfried Wilhelm von Leibniz was born at Leipzig on 21 June (1 July), 1646. In 1661 he entered the University of Leipzig as a student of… … Catholic encyclopedia
System on module — (SoM) is a computer term and an extension of the concept of System on Chip (SoC), and lies between a full up computer and a microcontroller in nature. A SoM solution offers a dense package computer system for use in small or specialized… … Wikipedia