-
1 GLB
"A U.S. law containing financial provisions that require all financial institutions to disclose to consumer customers their policies and practices for protecting the privacy of non-public personal information. Non-public personal information includes any PII provided by a customer, resulting from transactions with the financial institution or obtained by a financial institution through providing products or services." -
2 assignment statement
"A programming language statement used to assign a value to a variable. It usually consists of three elements: an expression to be assigned, an assignment operator (typically a symbol such as = or:=), and a destination variable. On execution of the assignment statement, the expression is evaluated and the resulting value is stored in the specified destination." -
3 crash
"For a system or program, to fail to function correctly, resulting in the suspension of operation." -
4 hash algorithm
"An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1." -
5 sign up
"To enroll in a service, often resulting in setting up a new account." -
6 password synchronization
"A service that replicates users' passwords between multiple computers, devices, folders, or networks, resulting in users having the same password in each environment." -
7 hash function
"An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1." -
8 Data Encryption Standard
"An encryption algorithm that uses a 56-bit key and maps a 64-bit input block to a 64-bit output block. The key appears to be a 64-bit key, but one bit in each of the eight bytes is used for odd parity, resulting in 56 bits of usable key." -
9 DES
"An encryption algorithm that uses a 56-bit key and maps a 64-bit input block to a 64-bit output block. The key appears to be a 64-bit key, but one bit in each of the eight bytes is used for odd parity, resulting in 56 bits of usable key." -
10 precompilation
The process of submitting an entire Web site to a compiler. The resulting Web site output runs without needing to be compiled on first request and does not require source code to be deployed to a production server. -
11 rounding difference
The deviation from an exact value resulting from the use of rounding. -
12 rounding error
The deviation from an exact value resulting from the use of rounding. -
13 foot
To total amounts vertically. The resulting sum can be checked against a total obtained by cross-footing (adding amounts horizontally). -
14 cross-foot
To add amounts across a row (horizontally). The resulting total can be checked against a total obtained by footing (adding amounts vertically). -
15 key risk indicator
"A quantifiable, standardized measurement of the risk of loss resulting from inadequate or failed business processes." -
16 KRI
"A quantifiable, standardized measurement of the risk of loss resulting from inadequate or failed business processes." -
17 biometric sample
A set of data resulting from the measurement of one specific characteristic of a single individual. Examples of a biometric sample would be the image of one fingerprint or one iris scan. -
18 browser-compatible mode
"A mode that displays the necessary ribbons, tools and filitered functionality so that the resulting application is Web-compatible." -
19 profiling
"The collection of detailed performance data, such as memory, stack frame, and CPU utilization, during application execution. Analysis of the resulting data often leads to code optimizations that substantially improve application run-time behavior." -
20 occupational injury
An injury resulting from an accident in the work environment.
- 1
- 2
См. также в других словарях:
resulting — index ancillary (subsidiary), derivative, ensuing Burton s Legal Thesaurus. William C. Burton. 2006 … Law dictionary
Resulting — Result Re*sult , v. i. [imp. & p. p. {Resulted}; p. pr. & vb. n. {Resulting}.] [F. r[ e]sulter, fr. L. resultare, resultarum, to spring or leap back, v. intens. fr. resilire. See {Resile}.] 1. To leap back; to rebound. [Obs.] [1913 Webster] The… … The Collaborative International Dictionary of English
resulting — adjective Of something that follows as the result of something else. After the flood, the resulting epidemics killed even more … Wiktionary
resulting — adj. Resulting is used with these nouns: ↑chaos, ↑confusion, ↑increase … Collocations dictionary
resulting trust — see trust Merriam Webster’s Dictionary of Law. Merriam Webster. 1996. resulting trust … Law dictionary
resulting use — see use 1b Merriam Webster’s Dictionary of Law. Merriam Webster. 1996. resulting use … Law dictionary
resulting from — index contingent, dependent Burton s Legal Thesaurus. William C. Burton. 2006 … Law dictionary
Resulting trust — A resulting trust (from the Latin resultare meaning to jump back ) is a situation where property results back to the transferor. In this instance, the word result means in the result, remains with , or something similar to revert except that in… … Wikipedia
Resulting trust — Result Re*sult , v. i. [imp. & p. p. {Resulted}; p. pr. & vb. n. {Resulting}.] [F. r[ e]sulter, fr. L. resultare, resultarum, to spring or leap back, v. intens. fr. resilire. See {Resile}.] 1. To leap back; to rebound. [Obs.] [1913 Webster] The… … The Collaborative International Dictionary of English
Resulting use — Result Re*sult , v. i. [imp. & p. p. {Resulted}; p. pr. & vb. n. {Resulting}.] [F. r[ e]sulter, fr. L. resultare, resultarum, to spring or leap back, v. intens. fr. resilire. See {Resile}.] 1. To leap back; to rebound. [Obs.] [1913 Webster] The… … The Collaborative International Dictionary of English
Resulting use — Use Use, n. [OE. us use, usage, L. usus, from uti, p. p. usus, to use. See {Use}, v. t.] [1913 Webster] 1. The act of employing anything, or of applying it to one s service; the state of being so employed or applied; application; employment;… … The Collaborative International Dictionary of English