-
1 memory address
A portion of computer memory that can be allocated to a device or used by a program or the operating system. Devices are usually allocated a range of memory addresses. -
2 memory allocation
"In operating systems, the process of reserving memory for use by a program." -
3 available memory
Memory that is not allocated to any program. -
4 setup program
"A program whose function is to install another program, either on a storage medium or in memory. An installation program, also called a setup program, might be used to guide a user through the often complex process of setting up an application for a particular combination of machine, printer, and monitor." -
5 ar-sa مجموعة الدفع
Memory that is not allocated to any program. -
6 available disk space
Memory that is not allocated to any program. -
7 available hard disk space
Memory that is not allocated to any program. -
8 load test
"A test that studies the behavior of the program when it is working at its limits. Types of load tests include volume tests, stress tests, and storage tests. Volume tests study the largest tasks the program can deal with. Stress tests study the program's response to peak bursts of activity. Storage tests study how memory and space is used by the program, either in resident memory or on disk. A test that is designed to put a server application under heavy user load to pinpoint performance and/or scalability problems." -
9 Data Execution Prevention
"A security feature that monitors programs on a computer to determine if they use system memory safely. To do this, DEP software works alone or with compatible microprocessors to mark some memory locations as ""non-executable."" If a program tries to run code that is malicious or is not from a protected location, DEP closes the program and notifies you." -
10 DEP
"A security feature that monitors programs on a computer to determine if they use system memory safely. To do this, DEP software works alone or with compatible microprocessors to mark some memory locations as ""non-executable."" If a program tries to run code that is malicious or is not from a protected location, DEP closes the program and notifies you." -
11 paged pool
"The system-allocated virtual memory that has been charged to a process and that can be paged. Paging is the moving of infrequently used parts of a program's working memory from random access memory (RAM) to another storage medium, usually the hard disk." -
12 dynamic
"Occurring immediately and concurrently. The term is used in describing both hardware and software; in both cases it describes some action or event that occurs when and as needed. In dynamic memory management, a program is able to negotiate with the operating system when it needs more memory." -
13 loader
"A utility that loads the executable code of a program into memory for execution. On most microcomputers, the loader is an invisible part of the operating system and is automatically invoked when a program is run." -
14 heap
A portion of memory reserved for a program to use for the temporary storage of data structures whose existence or size cannot be determined until the program is running. -
15 mutual exclusion
"A programming technique that ensures that only one program or routine at a time can access some resource, such as a memory location, an I/O port, or a file, often through the use of semaphores, which are flags used in programs to coordinate the activities of more than one program or routine." -
16 bootstrap loader
"A program that is run automatically when a computer is turned on or booted. After first performing a few basic hardware tests, the bootstrap loader loads and passes control to a larger loader program, which typically then loads the operating system. The bootstrap loader typically resides in the computer's read-only memory (ROM)." -
17 degradation
"In computer systems, a reduction in level of performance or service. Degradation in microcomputer performance is indicated by slow response times or frequent pauses for disk access because memory is insufficient to hold an entire program plus the data the program is using." -
18 allocation
"In operating systems, the process of reserving memory for use by a program." -
19 calculator
"Broadly, any device that performs arithmetic operations on numbers. Sophisticated calculators can be programmed for certain functions and can store values in memory, but they differ from computers in several ways: they have a fixed set of commands, they do not recognize text, they cannot retrieve values stored in a data file, and they cannot find and use values generated by a program such as a spreadsheet." -
20 kernel mode
"A highly privileged mode of operation where program code has direct access to all memory, including the address spaces of all user-mode processes and applications, and to hardware."
- 1
- 2
См. также в других словарях:
Memory barrier — Memory barrier, also known as membar or memory fence or fence instruction, is a type of barrier and a class of instruction which causes a central processing unit (CPU) or compiler to enforce an ordering constraint on memory operations issued… … Wikipedia
Memory corruption — happens when the contents of a memory location are unintentionally modified due to programming errors; this is known as violating memory safety. When the corrupted memory contents are used later in the computer program, it leads either to program … Wikipedia
Memory disambiguation — is a set of techniques employed by high performance out of order execution microprocessors that execute memory access instructions (loads and stores) out of program order. The mechanisms for performing memory disambiguation, implemented using… … Wikipedia
Memory footprint — refers to the amount of main memory that a program uses or references while running. This includes all sorts of active memory regions like code, static data sections (both initialized and uninitialized), heap, as well as all the stacks, plus… … Wikipedia
Memory Bridge — Memory Bridge, founded in 2004 as The Foundation for Alzheimer’s and Cultural Memory, is an American non profit organization that creates programs that connect people with Alzheimer’s disease to family, friends, and other people in their local… … Wikipedia
Memory segmentation — is the division of computer memory into segments or sections. Segments or sections are also used in object files of compiled programs when they are linked together into a program image, or the image is loaded into memory. In a computer system… … Wikipedia
Memory dependence prediction — is a technique, employed by high performance out of order execution microprocessors that execute memory access operations (loads and stores) out of program order, to predict true dependences between loads and stores at instruction execution time … Wikipedia
Memory tester — Memory testers are specialized test equipment used to test and verify memory modules typically in SIMM or DIMM configurations. It detects functional failures of memory modules. Contents 1 Types 1.1 Hardware testers 1.2 Software testers … Wikipedia
Memory management — is the act of managing computer memory. The essential requirement of memory management is to provide ways to dynamically allocate portions of memory to programs at their request, and freeing it for reuse when no longer needed. This is critical to … Wikipedia
Memory protection — is a way to control memory access rights on a computer, and is a part of most modern operating systems. The main purpose of memory protection is to prevent a process from accessing memory that has not been allocated to it. This prevents a bug… … Wikipedia
Memory Almost Full — Studio album by Paul McCartney Released 4 June 2007 … Wikipedia