-
1 Data Analyzer Light
A component that performs some of the simpler data processing tasks for the Web Analytics Web Part. -
2 data processing
The manipulation of data to transform it into some desired result. -
3 Data Execution Prevention
"A security feature that monitors programs on a computer to determine if they use system memory safely. To do this, DEP software works alone or with compatible microprocessors to mark some memory locations as ""non-executable."" If a program tries to run code that is malicious or is not from a protected location, DEP closes the program and notifies you." -
4 authentication data
"A scheme-specific block of data that is exchanged between the server and client during authentication. To prove its identity, the client encrypts some or all of this data with a user name and password. The client sends the encrypted data to the server, which decrypts the data and compares it to the original. If the decrypted data matches the original data, the client is authenticated." -
5 confirm
To acknowledge an action or the value of some data (e.g. password) by definite assurance.يؤكّد -
6 CD-ROM drive
"An electromechancial device that reads data on CD-ROMs. Most CD-ROM drives have a SCSI interface, although some are connected to a PC via a controller for a disk drive. Data is read through a small laser that is focused on the surface of the CD-ROM through optical mirrors in the read/write head. A spindle and drive motor revolve the CD-ROM, so all data, which is stored in spirals from the center, can be read." -
7 hash algorithm
"An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1." -
8 hash function
"An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1." -
9 crash recovery
"The ability of a computer to resume operation after a disastrous failure, such as the failure of a hard drive. Ideally, recovery can occur without any loss of data, although usually some, if not all, data is lost." -
10 visualization
"A feature of an application that displays data in the form of an image, diagram, or animation. For example, some databases can interpret and show data in the form of a two- or three-dimensional model." -
11 visualizer
"A component of the Visual Studio debugger user interface that creates a dialog box or other interface to displays a variable or object in a meaningful way that is appropriate to its data type. For example, an HTML visualizer interprets an HTML string and displays the result as it would appear in a browser window, a bitmap visualizer interprets a bitmap structure and displays the graphic it represents, and so on. Some visualizers allow you to edit as well as view the data." -
12 PowerPC
"A microprocessor architecture developed in 1992 by Motorola and IBM, with some participation by Apple. A PowerPC microprocessor is RISC-based and superscalar, with a 64-bit data bus and 32-bit address bus. It also has separate data and instruction caches, although the size of each varies by implementation. All PowerPC microprocessors have multiple integer and floating-point units. The voltage and operating speed varies with the implementation. Starting with the PowerPC 740, the microprocessors were manufactured with copper, instead of aluminum, for better performance and reliability." -
13 search
The process of seeking a particular file or specific data. A search is carried out by a program through comparison or calculation to determine whether a match to some pattern exists or whether some other criteria have been met. -
14 Search
The UI element that initiates the process of seeking a particular file or specific data. A search is carried out by a program through comparison or calculation to determine whether a match to some pattern exists or whether some other criteria have been met. -
15 access token
"A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority." -
16 alias
"An alternative label for some object, such as a file or data collection." -
17 bitmap
"A data structure in memory that represents information in the form of a collection of individual bits. A bit map is used to represent a bit image. Another use of a bit map in some systems is the representation of the blocks of storage on a disk, indicating whether each block is free (0) or in use (1)." -
18 byte
"A unit of data that typically holds a single character, such as a letter, a digit, or a punctuation mark. Some single characters can take up more than one byte." -
19 communication channel
"A medium for transferring information. Depending on its type, a communications channel can carry information (data, sound, and/or video) in either analog or digital form. A communications channel can be a physical link, such as the cable connecting two stations in a network, or it can consist of some electromagnetic transmission on one or more frequencies within a bandwidth in the electromagnetic spectrum, as in radio and television, or in optical, microwave, or voice-grade communication." -
20 column
The area in each row of a database table that stores the data value for some attribute of the object modeled by the table.
- 1
- 2
См. также в других словарях:
Data logger — Cube storing technical and sensor data A data logger (also datalogger or data recorder) is an electronic device that records data over time or in relation to location either with a built in instrument or sensor or via external instruments and… … Wikipedia
Data recovery — is the process of salvaging data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. Often the data are being salvaged from storage media such as internal or external hard disk drives,… … Wikipedia
Data erasure — (also called data clearing or data wiping) is a software based method of overwriting data that completely destroys all electronic data residing on a hard disk drive or other digital media. Permanent data erasure goes beyond basic file deletion… … Wikipedia
Data parallelism — (also known as loop level parallelism) is a form of parallelization of computing across multiple processors in parallel computing environments. Data parallelism focuses on distributing the data across different parallel computing nodes. It… … Wikipedia
Data-flow analysis — is a technique for gathering information about the possible set of values calculated at various points in a computer program. A program s control flow graph (CFG) is used to determine those parts of a program to which a particular value assigned… … Wikipedia
Data independence — is the type of data transparency that matters for a centralized DBMS. It refers to the immunity of user applications to make changes in the definition and organization of data. Physical data independence deals with hiding the details of the… … Wikipedia
Data link layer — The OSI model 7 Application layer 6 Presentation layer 5 Session layer 4 Transport layer 3 Network layer 2 … Wikipedia
Data Link Layer — The Data Link Layer is Layer 2 of the seven layer OSI model. It responds to service requests from the Network Layer and issues service requests to the Physical Layer.The Data Link Layer is the protocol layer which transfers data between adjacent… … Wikipedia
Data monitoring switch — A data monitoring switch is a networking hardware appliance that provides a pool of monitoring tools with access to traffic from a large number of network links. It provides a combination of functionality that may include aggregating monitoring… … Wikipedia
Data-structured language — In computing a data structured language is a programming language in which the data structure is a main organizing principle, representation, model, for data and logic (code) alike, in which both are stored and operated upon, i.e., program data… … Wikipedia
Data mining in meteorology — Meteorology is the interdisciplinary scientific study of the atmosphere. It observes the changes in temperature, air pressure, moisture and wind direction. Usually, temperature, pressure, wind measurements and humidity are the variables that are… … Wikipedia