-
21 data entry
The process of writing new data to computer memory. -
22 ENTER key
"The key that is used at the end of a line or command to instruct the computer to process the command or text. In word processing programs, the Enter key is used at the end of a paragraph. Also called: Return key." -
23 installation
The process of adding software to a computer system. -
24 kernel
"The core of layered architecture that manages the most basic operations of the operating system and the computer's processor. The kernel schedules different blocks of executing code, called threads, for the processor to keep it as busy as possible and coordinates multiple processors to optimize performance. The kernel also synchronizes activities among Executive-level subcomponents, such as I/O Manager and Process Manager, and handles hardware exceptions and other hardware-dependent functions. The kernel works closely with the hardware abstraction layer." -
25 logging
"The process of recording actions that take place on a computer, network, or system." -
26 logon
The process of identifying oneself to a computer after connecting to it over a communications line. -
27 operation
A specific action carried out by a computer in the process of executing a program. -
28 resource
"Generally, any part of a computer system or network, such as a disk drive, printer, or memory, that can be allotted to a running program or a process." -
29 resource allocation
The process of distributing a computer system's facilities to different components of a job in order to perform the job. -
30 silent RIP
The capability of a computer to listen for and process Routing Information Protocol (RIP) announcements but without announcing its own routes. -
31 username
"The name by which a user is identified to a computer system or network. During the logon process, the user must enter the username and the correct password. If the system or network is connected to the Internet, the username generally corresponds to the leftmost part of the user's e-mail address (the portion preceding the \@ sign, as in username\@company.com)." -
32 client enrollment
"The process of creating the client licensor certificate, which enables the user's computer or device to create publishing licenses that will be honored by a licensing server." -
33 remoting
"The process of communication between different operating system processes, regardless of whether they are on the same computer."اتصال عن بُعد -
34 master boot record
"The first sector on a hard disk, which begins the process of starting the computer. The MBR contains the partition table for the disk and a small amount of executable code called the master boot code." -
35 Boot Logging
"A process in which a computer that is starting (booting) creates a log file that records the loading of each device and service. The log file is called Ntbtlog.txt, and it is saved in the systemroot directory." -
36 Net Logon service
"A user-mode service that runs in the Windows security subsystem. The Net Logon service passes the user`s credentials through a secure channel to the domain database and returns the domain security identifiers and user rights for the user. In addition, the Net Logon service performs a variety of other functions related to the user logon process, such as periodic password updates for computer accounts and domain controller discovery." -
37 CD boot
The process of starting a computer from the retail product CD-ROM and then installing Windows on the hard disk using the Setup program on the CD. -
38 MBR
"The first sector on a hard disk, which begins the process of starting the computer. The MBR contains the partition table for the disk and a small amount of executable code called the master boot code." -
39 audit mode
The stage of the preinstallation process used to test a manufactured computer before it is delivered to the end user. -
40 ar-sa إنشاء قياسي
Pertaining to the process of manufacturing a computer according to a customer`s specification by customizing a pre-existing image of a master installation.
См. также в других словарях:
process computer — valdymo kompiuteris statusas T sritis automatika atitikmenys: angl. process computer vok. Prozeßrechner, m rus. управляющая электронная вычислительная машина, f pranc. ordinateur de commande des processus, m … Automatikos terminų žodynas
computer science — computer scientist. the science that deals with the theory and methods of processing information in digital computers, the design of computer hardware and software, and the applications of computers. [1970 75] * * * Study of computers, their… … Universalium
Computer-aided process planning — (CAPP) is the use of computer technology to aid in the process planning of a part or product, in manufacturing. CAPP is the link between CAD and CAM in that it provides for the planning of the process to be used in producing a designed part. [1]… … Wikipedia
Process (computing) — In computing, a process is an instance of a computer program that is being executed. It contains the program code and its current activity. Depending on the operating system (OS), a process may be made up of multiple threads of execution that… … Wikipedia
Computer programming — Programming redirects here. For other uses, see Programming (disambiguation). Software development process Activities and steps … Wikipedia
Computer-assisted translation — Part of a series on Translation Types Language interpretation … Wikipedia
Computer vision — is the field concerned with automated imaging and automated computer based processing of images to extract and interpret information. It is the science and technology of machines that see. Here see means the machine is able to extract information … Wikipedia
Computer-supported collaboration — (CSC) research focuses on technology that affects groups, organizations, communities and societies, e.g., voice mail and text chat. It grew from cooperative work study of supporting people s work activities and working relationships. As net… … Wikipedia
Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible … Wikipedia
Computer recycling — Computer monitors are typically packed into low stacks on wooden pallets for recycling and then shrink wrapped.[1] Computer recycling or electronic recycling is the recycling or reuse of computers or other electronics. It includes both finding… … Wikipedia
Computer-assisted language learning — (CALL) is succinctly defined in a seminal work by Levy (1997: p. 1) as the search for and study of applications of the computer in language teaching and learning .[1] CALL embraces a wide range of ICT applications and approaches to teaching… … Wikipedia