-
1 protect key field
поле ключа защиты
—
[Л.Г.Суменко. Англо-русский словарь по информационным технологиям. М.: ГП ЦНИИС, 2003.]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > protect key field
-
2 protect key field
field work — полевая съёмка, работа в поле; разведка, съёмка
-
3 protect key field
Большой англо-русский и русско-английский словарь > protect key field
-
4 protect key field
Вычислительная техника: поле ключа защиты -
5 protect key field
English-Russian dictionary of computer science and programming > protect key field
-
6 protect key field
-
7 field
1) поле; пространство; область; зона2) поле; группа разрядов (напр., числа)3) ЯП поле (один из атрибутов, составляющих объект (object))4) устройство нижнего уровня; цеховое устройство ( на промышленной шине Fieldbus)•- A-field
- alphanumeric field
- alphameric field
- ambient sound field
- analog field
- argument field
- axially symmetric magnetic field
- bias field
- byte index field
- card field
- character field
- command field
- comments field
- common field
- computer field
- control field
- control-data field
- count field
- crystal field
- data field
- decrement field
- demagnetizing field
- derived field
- destination field
- digital field
- discrete field
- display field
- display-only field
- E-field
- entry field
- exponent field
- F-field
- field of events
- fill-in-the-blank field
- finite field
- fixed field
- fixed-length field
- fixed-point field
- flag field
- free field
- H-field
- highly coded field
- Hollerith field
- I-field
- image field
- input field
- instruction field
- integer field
- intrinsic field
- jack field
- joining field
- key field
- label field
- longitudinal field
- main control field
- major control field
- minor control field
- motion field
- multiply field
- multiword field
- N-bit field
- near field
- numeric field
- operand field
- operation field
- overlapping fields
- picture field
- pressure wave field
- printable field
- protect key field
- protected field
- pumping field
- pump field
- punched-card field
- restarting cause field
- rights field
- routing information field
- scalar field
- signed field
- sorting field
- source field
- specialist field
- threshold field
- track reference field
- transverse field
- uniform field
- uniform switching field
- unprotected field
- variable-length field
- variable field
- vector field
- writing field
- X-fieldEnglish-Russian dictionary of computer science and programming > field
-
8 protect
1. v защищать, охранять, предохранять2. v ограждать права по патенту3. v предохранять, ограждать4. v полит. -эк. проводить политику протекционизма5. v ком. фин. акцептовать; оплатитьprotect a bill — акцептировать вексель; оплатить вексель
6. v воен. бронировать, покрывать бронёй7. v ж. -д. сигнализировать о том, что путь закрытСинонимический ряд:1. conserve (verb) conserve; maintain; preserve; sustain2. guard (verb) bulwark; cover; defend; fend; guard; harbor; house; insulate; observe; patrol; safeguard; save; screen; secure; shelter; shield; watch overАнтонимический ряд:assail; attack; endanger; harm; imperil -
9 memory protect
-
10 memory protect
English-Russian dictionary of Information technology > memory protect
-
11 password protect
English-Russian dictionary of Information technology > password protect
-
12 read protect
English-Russian dictionary of Information technology > read protect
-
13 write protect
English-Russian dictionary of Information technology > write protect
-
14 поле ключа защиты
Большой англо-русский и русско-английский словарь > поле ключа защиты
-
15 Shannon, Claude Elwood
[br]b. 30 April 1916 Gaylord, Michigan, USA[br]American mathematician, creator of information theory.[br]As a child, Shannon tinkered with radio kits and enjoyed solving puzzles, particularly crypto-graphic ones. He graduated from the University of Michigan in 1936 with a Bachelor of Science in mathematics and electrical engineering, and earned his Master's degree from the Massachusetts Institute of Technology (MIT) in 1937. His thesis on applying Boolean algebra to switching circuits has since been acclaimed as possibly the most significant this century. Shannon earned his PhD in mathematics from MIT in 1940 with a dissertation on the mathematics of genetic transmission.Shannon spent a year at the Institute for Advanced Study in Princeton, then in 1941 joined Bell Telephone Laboratories, where he began studying the relative efficiency of alternative transmission systems. Work on digital encryption systems during the Second World War led him to think that just as ciphers hide information from the enemy, "encoding" information could also protect it from noise. About 1948, he decided that the amount of information was best expressed quantitatively in a two-value number system, using only the digits 0 and 1. John Tukey, a Princeton colleague, named these units "binary digits" (or, for short, "bits"). Almost all digital computers and communications systems use such on-off, or two-state logic as their basis of operation.Also in the 1940s, building on the work of H. Nyquist and R.V.L. Hartley, Shannon proved that there was an upper limit to the amount of information that could be transmitted through a communications channel in a unit of time, which could be approached but never reached because real transmissions are subject to interference (noise). This was the beginning of information theory, which has been used by others in attempts to quantify many sciences and technologies, as well as subjects in the humanities, but with mixed results. Before 1970, when integrated circuits were developed, Shannon's theory was not the preferred circuit-and-transmission design tool it has since become.Shannon was also a pioneer in the field of artificial intelligence, claiming that computing machines could be used to manipulate symbols as well as do calculations. His 1953 paper on computers and automata proposed that digital computers were capable of tasks then thought exclusively the province of living organisms. In 1956 he left Bell Laboratories to join the MIT faculty as Professor of Communications Science.On the lighter side, Shannon has built many devices that play games, and in particular has made a scientific study of juggling.[br]Principal Honours and DistinctionsNational Medal of Science. Institute of Electrical and Electronics Engineers Medal of Honor, Kyoto Prize.BibliographyHis seminal paper (on what has subsequently become known as information theory) was entitled "The mathematical theory of communications", first published in Bell System Technical Journal in 1948; it is also available in a monograph (written with Warren Weaver) published by the University of Illinois Press in 1949, and in Key Papers in the Development of Information Theory, ed. David Slepian, IEEE Press, 1974, 1988. For readers who want all of Shannon's works, see N.J.A.Sloane and A.D.Wyner, 1992, TheCollected Papers of Claude E.Shannon.HO
См. также в других словарях:
Key Biscayne — is an island located in Miami Dade County, Florida, United States, between the Atlantic Ocean and Biscayne Bay. It is the southernmost of the barrier islands along the Atlantic coast of Florida, and lies south of Miami Beach and southeast of… … Wikipedia
Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… … Wikipedia
Dallas Love Field — This article is about the airport in Dallas, Texas. For the airport in Prescott, Arizona, see Ernest A. Love Field. For the neighborhood around Love Field, see Love Field, Dallas, Texas (Neighborhood). Dallas Love Field USGS aerial photo as of… … Wikipedia
Navy Field — Infobox VG title = Navy Field developer = SD Enternet publisher = game game released = February 8, 2006 genre = MMOG Naval Simulation modes = Multiplayer , single player platforms = Windows media = Download input = Keyboard, mouse requirements =… … Wikipedia
Media Key Block — The Media Key Block (MKB) is one of the keys that are included inside the copying protection system (DRM) AACS. This system is used to protect Blu ray and HD DVD formats from being copied. The system has been developed by big companies from the… … Wikipedia
Near field communication — An NFC enabled mobile phone interacting with a SmartPoster Near field communication, or NFC, allows for simplified transactions, data exchange, and wireless connections between two devices in proximity to each other, usually by no more than a few … Wikipedia
King's Field II — Infobox VG King s Field II is the second game in the King s Field RPG series. Like both its successors and predecessor, the game is played through first person view in a dark and mysterious, medieval fantasy setting.The game was developed by the… … Wikipedia
Derived unique key per transaction — In cryptography, Derived Unique Key Per Transaction (DUKPT) is a key management scheme in which for every transaction, a unique key is used which is derived from a fixed key. Therefore, if a derived key is compromised, future and past transaction … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
Diffie–Hellman key exchange — (D–H)[nb 1] is a specific method of exchanging keys. It is one of the earliest practical examples of key exchange implemented within the field of cryptography. The Diffie–Hellman key exchange method allows two parties that have no prior knowledge … Wikipedia
History of field hockey — Games similar to field hockey have a long history around the world. The modern standard variant of field hockey was developed in nineteenth century England. Contents 1 Games similar to hockey outside the West 2 Evolution of hockey in the West 3… … Wikipedia