-
1 antivirus program
"A computer program designed to detect and respond to malicious software, such as viruses and worms. Responses may include blocking user access to infected files, cleaning infected files or systems, or informing the user that an infected program was detected." -
2 antimalware program
"A computer program designed to detect and respond to malicious software, such as viruses and worms. Responses may include blocking user access to infected files, cleaning infected files or systems, or informing the user that an infected program was detected." -
3 OLE DB provider
"A program in the OLE DB architecture that enables native access to data, instead of accessing data using ODBC or IISAM drivers, which are external ways to access the data." -
4 antivirus software
"A computer program designed to detect and respond to malicious software, such as viruses and worms. Responses may include blocking user access to infected files, cleaning infected files or systems, or informing the user that an infected program was detected." -
5 AV
"A computer program designed to detect and respond to malicious software, such as viruses and worms. Responses may include blocking user access to infected files, cleaning infected files or systems, or informing the user that an infected program was detected."[lang name="Arabic"]AV -
6 mutual exclusion
"A programming technique that ensures that only one program or routine at a time can access some resource, such as a memory location, an I/O port, or a file, often through the use of semaphores, which are flags used in programs to coordinate the activities of more than one program or routine." -
7 ar-sa ODBC
"A program file used to connect to a particular database. Each database program, such as Access or dBASE, or database management system, such as SQL Server, requires a different driver." -
8 ODBC driver
"A program file used to connect to a particular database. Each database program, such as Access or dBASE, or database management system, such as SQL Server, requires a different driver." -
9 degradation
"In computer systems, a reduction in level of performance or service. Degradation in microcomputer performance is indicated by slow response times or frequent pauses for disk access because memory is insufficient to hold an entire program plus the data the program is using." -
10 antimalware software
"A computer program designed to detect and respond to malicious software, such as viruses and worms. Responses may include blocking user access to infected files, cleaning infected files or systems, or informing the user that an infected program was detected." -
11 paged pool
"The system-allocated virtual memory that has been charged to a process and that can be paged. Paging is the moving of infrequently used parts of a program's working memory from random access memory (RAM) to another storage medium, usually the hard disk." -
12 database engine
The program module or modules that provide access to a database management system (DBMS). -
13 handle
"Any token that a program can use to identify and access an object such as a device, a file, a window, or a dialog box." -
14 kernel mode
"A highly privileged mode of operation where program code has direct access to all memory, including the address spaces of all user-mode processes and applications, and to hardware." -
15 My Documents
"A folder that provides you with a convenient place to store documents, graphics, or other files you want to access quickly. When you save a file in a program such as WordPad or Paint, the file is automatically saved in My Documents, unless you choose a different folder." -
16 supervisor mode
"A highly privileged mode of operation where program code has direct access to all memory, including the address spaces of all user-mode processes and applications, and to hardware." -
17 protected mode
"A highly privileged mode of operation where program code has direct access to all memory, including the address spaces of all user-mode processes and applications, and to hardware." -
18 Ring 0
"A highly privileged mode of operation where program code has direct access to all memory, including the address spaces of all user-mode processes and applications, and to hardware." -
19 passphrase
"A sequence of words or other text used to gain access to a network, program, or data. A passphrase is generally longer for added security." -
20 extent
"On a disk or other direct-access storage device, a continuous block of storage space reserved by the operating system for a particular file or program."
- 1
- 2
См. также в других словарях:
Access — may refer to:Companies and organizations* ACCESS (Australia), an Australian youth network * Access Co., a software company * AirCraft Casualty Emotional Support Services * Arab Community Center for Economic and Social Servicespace and technology* … Wikipedia
Access Hollywood — Infobox Television bgcolour = show name = Access Hollywood caption = Title screen as of October 2007 format = camera = picture format = 480i SDTV audio format = MTS stereo runtime = 30 minutes creator = developer = executive producer = starring … Wikipedia
Access Yea Community Education Program — The Access Yea Community Education Program (AYCE) is an innovative [http://www.theage.com.au/news/education news/home sweet school/2006/03/04/1141191856957.html?page=fullpage#contentSwap2 Home sweet school ] , Lisa Mitchell, The Age, March 6,… … Wikipedia
Access Group — is a nonprofit student loan provider that specializes in graduate and professional student loans. The company provides federally guaranteed Federal Stafford, PLUS and Consolidation loans through the Federal Family Education Loan Program, as well… … Wikipedia
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Program Specific Information — (PSI) is metadata, part of MPEG transport stream.The PSI data contains four tables: PAT (Program Association Table), CAT (Conditional Access Table), PMT (Program Map Table) and NIT (Network Information Table). This last table is normally not used … Wikipedia
Access 5 — is a national project sponsored by NASA and industry with participation by the Federal Aviation Administration (FAA) and United States Department of Defense (DoD) to introduce high altitude long endurance (HALE) remotely operated aircraft (ROA)… … Wikipedia
access time — access ,time noun uncount COMPUTING the time it takes for a computer program to find a piece of information and make it available … Usage of the words and phrases in modern English
Access — (izg. àkses) m DEFINICIJA inform. korisnički program za rad s bazama podataka ETIMOLOGIJA engl.: pristup, ime programa© … Hrvatski jezični portal
Access method — An access method is a function of a mainframe operating system that enables access to data on disk, tape or other external devices. They were introduced in 1963 in IBM OS/360 operating system. [http://researchweb.watson.ibm.com/journal/rd/255/ausl… … Wikipedia
Access to the Region's Core — Trans Hudson Express ARC Tunnel[1] Overview Location Hudson Palisades/Hudson River Coordinates … Wikipedia