-
41 firewall
"A security solution that segregates one portion of a network from another portion, allowing only authorized network traffic to pass through according to traffic filtering rules." -
42 intranet
"A network within an organization that uses Internet technologies and protocols, but is available only to certain people, such as employees of a company." -
43 active cell
The selected cell in which data is entered when you begin typing. Only one cell is active at a time. The active cell is bounded by a heavy border. -
44 current cell
The selected cell in which data is entered when you begin typing. Only one cell is active at a time. The active cell is bounded by a heavy border. -
45 address mask
"A number that, when compared by the computer with a network address number, will block out all but the necessary information. For example, in a network that uses XXX.XXX.XXX.YYY and where all computers within the network use the same first address numbers, the mask will block out XXX.XXX.XXX and use only the significant numbers in the address, YYY." -
46 anonymous user
"A non-validated user who is not recognized by the server, and who can only access published folders and address lists." -
47 auditing
"The process an operating system uses to detect and record security-related events, such as an attempt to create, to access, or to delete objects such as files and directories. The records of such events are stored in a file known as a security log, whose contents are available only to those with the proper clearance." -
48 Bezier curve
"A curve that is calculated mathematically to connect separate points into smooth, free-form curves and surfaces of the type needed for illustration programs and CAD models. Bezier curves need only a few control points to define a large number of shapes--hence their usefulness over other mathematical methods for approximating a given shape." -
49 binary file
"A file that contains encoded information that is interpreted according to the application that created it. In general, a binary file can be edited only by the application in which it was created." -
50 basic input/output system
"The set of essential software routines that test computer hardware at startup, start the operating system, and support the transfer of information between hardware devices. The BIOS is stored in read-only memory (ROM) so that it can be run when the computer is turned on. Although critical to performance, the BIOS is usually invisible to computer users."نظام الإدخال/الإخراج الأساسي -
51 BIOS
"The set of essential software routines that test computer hardware at startup, start the operating system, and support the transfer of information between hardware devices. The BIOS is stored in read-only memory (ROM) so that it can be run when the computer is turned on. Although critical to performance, the BIOS is usually invisible to computer users." -
52 carbon copy
"A directive to an e-mail program to send a complete copy of a given piece of mail to another individual. The use of cc mail addressing, as opposed to directly addressing the mail to a person, generally implies that the recipient is not required to take any action; the message is for informational purposes only. In a cc directive, the fact that this recipient received the mail is printed in the mail header and is thus known to all other recipients." -
53 courtesy copy
"A directive to an e-mail program to send a complete copy of a given piece of mail to another individual. The use of cc mail addressing, as opposed to directly addressing the mail to a person, generally implies that the recipient is not required to take any action; the message is for informational purposes only. In a cc directive, the fact that this recipient received the mail is printed in the mail header and is thus known to all other recipients." -
54 case-sensitive
Capable of distinguishing between uppercase and lowercase letters. A case-sensitive search finds only text that is an exact match of uppercase and lowercase letters. -
55 common groups
Groups that appear in the program list on the Start menu for all users who log on to the computer. Only administrators can create or change common groups. -
56 CRC
"A procedure used in checking for errors in data transmission. CRC error checking uses a complex calculation to generate a number based on the data transmitted. The sending device performs the calculation before transmission and includes it in the packet that it sends to the receiving device. The receiving device repeats the same calculation after transmission. If both devices obtain the same result, it is assumed that the transmission was error free. The procedure is known as a redundancy check because each transmission includes not only data but extra (redundant) error-checking values. Communications protocols such as XMODEM and Kermit use cyclical redundancy checking." -
57 cyclic redundancy check
"A procedure used in checking for errors in data transmission. CRC error checking uses a complex calculation to generate a number based on the data transmitted. The sending device performs the calculation before transmission and includes it in the packet that it sends to the receiving device. The receiving device repeats the same calculation after transmission. If both devices obtain the same result, it is assumed that the transmission was error free. The procedure is known as a redundancy check because each transmission includes not only data but extra (redundant) error-checking values. Communications protocols such as XMODEM and Kermit use cyclical redundancy checking." -
58 cyclical redundancy check
"A procedure used in checking for errors in data transmission. CRC error checking uses a complex calculation to generate a number based on the data transmitted. The sending device performs the calculation before transmission and includes it in the packet that it sends to the receiving device. The receiving device repeats the same calculation after transmission. If both devices obtain the same result, it is assumed that the transmission was error free. The procedure is known as a redundancy check because each transmission includes not only data but extra (redundant) error-checking values. Communications protocols such as XMODEM and Kermit use cyclical redundancy checking." -
59 data model
"A collection of related object types, operators, and integrity rules that form the abstract entity supported by a database management system (DBMS). Thus, one speaks of a relational DBMS, a network DBMS, and so on, depending on the type of data model a DBMS supports. In general, a DBMS supports only one data model as a practical rather than a theoretical restriction." -
60 distribution list
"A collection of users, computers, contacts, and other groups that is used only for e-mail distribution, and addressed as a single recipient."
См. также в других словарях:
Only Fools and Horses — Title screen Genre Sitcom Created by John Sullivan … Wikipedia
Only Girl (In the World) — Only Girl (In the World) … Wikipedia
Only Built 4 Cuban Linx... Pt. II — Studio album by Raekwon Released S … Wikipedia
Only Girl (In the World) — «Only Girl (In the World)» Sencillo de Rihanna del álbum Loud Publicación 10 de septiembre de 2010 Formato Descarga Digital Sencillo en CD Grabación 2010 … Wikipedia Español
Only Girl (In the World) — «Only Girl (In the World)» Сингл … Википедия
Only Happy When It Rains — Single by Garbage from the album Garbage B … Wikipedia
Only by the Night — Studio album by Kings of Leon Released September 19, 2008 … Wikipedia
Only Built 4 Cuban Linx... — Only Built 4 Cuban Linx... Studio album by Raekwon Released August 1, 1995 … Wikipedia
Only Fools and Horses DVDs — have been sold in Regions 1, 2 and 4. Only Fools and Horses started in 1981 and ended in 2003. 64 episodes were broadcast in total. Six shorts were made, four of which were broadcast commercially but none of them have been released on official… … Wikipedia
Only Revolutions (album) — Only Revolutions Studio album by Biffy Clyro Released 9 November 2009 … Wikipedia
Only Girl (In the World) — Rihanna Veröffentlichung 10. September 2010 Länge 3:55 Genre(s) Europop, Dance Pop Autor(en) Crystal John … Deutsch Wikipedia