-
21 code
1) код || кодировать3) (машинная) программа || программировать4) код, (машинное) слово (напр., команда)•- absolute code
- abstract code
- access code - address code
- alphanumeric code
- alphameric code
- alphabetical code
- alphabetic code
- amplitude code
- ASA code
- attribute-control code
- augmented operation code - balanced code
- bar code
- baseline code
- basic code
- basic order code
- Baudot code
- binary code
- binary decimal code
- binary-coded decimal code
- biquinary code
- block code
- block structured code
- Bose-Chaudhuri code
- brevity code
- bug-arresting code
- burst error correcting code
- cable code
- call directing code
- call direction code- cap code- character code
- check code
- checkable code
- Chinese binary code
- color code
- column binary code
- comma-free code
- command code
- compiler-produced code
- completion code
- computer code
- conditional code
- condition code
- constant ratio code
- continuous progressive code - convolution code
- convolutional code
- correcting code- CP code- cyclic code
- cyclic permuted code
- data code
- data conversion code
- data link code - dense binary code
- deposited source code
- destination code
- device code
- digital code
- direct code
- directing character code
- dot-and-dash code
- double-error correcting code
- eight channel code
- entry code - error-checking code
- error-control code
- error-correcting code
- error-detecting code
- error-detection code
- error-limited code
- escape code - executable code
- exit code
- exponent code
- extended mneminic code
- external readable code
- factorable code
- false code
- fault code
- feature code
- Fire code
- five bit code
- five channel code
- forbidden-character code
- forbidden code
- format code
- four-adress code
- fragile code
- frequency code
- function code
- Gray code
- group code
- Hamming code
- hash code - Huffman code
- identification code
- identifying code
- illegal code
- improper code
- in-line code
- inner code
- instantaneously decodable code
- instruction code
- internal code
- interpretive code
- inverted code - line code
- linear code
- line-feed code
- lock code
- machine code
- machine-instruction code
- machine-language code
- machine-operation code
- machine-readable code
- machine-treatable code
- magnetic bar code
- magnetic tape code
- Manchester code
- message-format code
- micro code
- minimum-access code
- minimum-delay code
- minimum-distance code
- minimum-latency code
- minimum-redundance code
- mnemonic code
- modified binary code
- modular code
- modulation code - Muller code
- multiple-address code
- multiple-error correcting code
- N-adjacent code
- name code
- N-ary code
- native code
- natural binary code
- N-bit code
- N-error correcting code
- N-level code
- noise combating code
- nonconsistently based code
- nonexistent code
- nonprint code
- nonreproducing code
- non-return-to-zero code
- nonsystematic code
- nonweighted code
- N-place code
- number address code
- number code
- numerical code
- numeric code
- N-unit code
- object code
- one-address code
- one-dimensional code
- one-level code
- one-out-of-ten code
- op code
- operand code
- operation code
- optimum code
- order code
- outer code
- own code
- paired-disparity code
- paper tape code
- parallel code
- parity-checking code
- parity-check code
- perforated tape code
- permutation code
- permuted code
- personal-identification code
- phonetic code
- physical-hardware-dependent code- positional code- position code
- position-independent code
- precedence code
- print restore code - pseudocyclic code
- pseudorandom code
- pulse code
- punched card code
- punched tape code
- pure code
- quibinary code
- ready-to-run code
- recurrent code
- redundant code
- Reed-Muller code
- Reed-Solomon code
- reenterable code
- reentrant code
- reflected binary code
- reflected code
- relative code
- relocatable code
- repertory code
- reproducing code
- residual class code
- residue code
- restricted-magnitude-error correcting code
- retrieval code
- return code
- return-to-zero code
- routing code
- row-binary code
- safety code - self-checking code
- self-complementaring code
- self-complementing code
- self-correcting code
- self-demarcating code
- separable code
- serial code - severity code
- Shannon code
- short computer code
- short code
- sign code
- signal code
- significant-digit subset code - single-address code
- single-error correcting and double-error detecting code
- single-error correcting code
- single-error detecting code
- single-parity code - skip code
- source code
- space code
- space-efficient code
- specific code - status code
- Stone's code
- stop code
- straight binary code
- straight-line code
- strip code
- syllable code
- symbol code
- symbolic code
- systematic error checking code
- tape code
- task code
- telecommunication code
- telegraph code
- teleprinter code
- teletype code
- ternary code
- threaded code
- three-adress code
- throw-away code
- time code
- timing code
- trace back code
- transmission code
- transmitter-start code
- triple-error correcting code
- two-address code
- two-out-of-five code
- two-rail code
- uniquely decipherable code
- uniquely decodable code
- unitary code
- unit-distance code
- unused code
- variable-length code
- viral code - weighted code
- weighted-checksum code - zero-address code
- zone codeEnglish-Russian dictionary of computer science and programming > code
- 1
- 2
См. также в других словарях:
Hardware-based full disk encryption — is being pursued by a number of HDD vendors including Intel, Seagate Technology, and Hitachi, Ltd. with the rest of the hard drive industry following. Encryption and the symmetric encryption key is maintained independently from the CPU, thus… … Wikipedia
Key strengthening — In cryptography, key strengthening or key stretching refer to techniques used to make a possibly weak key, typically a password or passphrase, more secure against a brute force attack by increasing the time it takes to test each possible key.… … Wikipedia
Key derivation function — KDF redirects here. For the Nazi organization, see Kraft durch Freude In cryptography, a key derivation function (or KDF) is a function which derives one or more secret keys from a secret value and/or other known information such as a password or … Wikipedia
Hardware emulation — is the process of imitating the behavior of one or more pieces of hardware (typically a system under design) with another piece of hardware, typically a special purpose emulation system. The goal is normally debugging of the system being designed … Wikipedia
Key West — is an island in the Straits of Florida on the North American continent at the southernmost tip of the Florida Keys.Key West is politically within the limits of the city of Key West, Monroe County, Florida, United States. The city also occupies… … Wikipedia
Hardware random number generator — This SSL Accelerator computer card uses a hardware random number generator to generate cryptographic keys to encrypt data sent over computer networks. In computing, a hardware random number generator is an apparatus that generates random numbers… … Wikipedia
Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… … Wikipedia
Hardware Security Module — A Hardware Security Module (often abbreviated to HSM) is a physical device in form of a plug in card or an external security device that can be attached to general purpose computer and servers.The goals of an HSM are the: (a) secure generation,… … Wikipedia
Key West, Florida — Infobox Settlement official name = City of Key West other name = native name = nickname = The Conch Republic and the Southernmost City In The Continental United States settlement type = City motto = One human family imagesize = image caption =… … Wikipedia
Key selection vector — The Key Selection Vector means the numerical associated with a Device Key Set and distributed by Licensor or its designee to Adopters and used to support authentication of Licensed Products and Revocation. It is considered a confidential set of… … Wikipedia
Disk encryption hardware — To protect confidentiality of the data stored on a computer disk a computer security technique called disk encryption is used. This article discusses hardware which is used to implement the technique (for cryptographic aspects of the problem see… … Wikipedia