-
21 backward compatibility
The capability of source code or programs developed on a more advanced system or compiler version to be executed or compiled by a less advanced (older) version. -
22 hexadecimal
Pertaining to the base-16 number system represented by the digits 0 through 9 and the uppercase or lowercase letters A (equivalent to decimal 10) through F (equivalent to decimal 15). Hexadecimal values are commonly used in HTML code to identify colors. -
23 hex
Pertaining to the base-16 number system represented by the digits 0 through 9 and the uppercase or lowercase letters A (equivalent to decimal 10) through F (equivalent to decimal 15). Hexadecimal values are commonly used in HTML code to identify colors. -
24 kernel
"The core of layered architecture that manages the most basic operations of the operating system and the computer's processor. The kernel schedules different blocks of executing code, called threads, for the processor to keep it as busy as possible and coordinates multiple processors to optimize performance. The kernel also synchronizes activities among Executive-level subcomponents, such as I/O Manager and Process Manager, and handles hardware exceptions and other hardware-dependent functions. The kernel works closely with the hardware abstraction layer." -
25 Trojan horse
A program that appears to be useful or harmless but that contains hidden code designed to exploit or damage the system on which it is run. -
26 Data Execution Prevention
"A security feature that monitors programs on a computer to determine if they use system memory safely. To do this, DEP software works alone or with compatible microprocessors to mark some memory locations as ""non-executable."" If a program tries to run code that is malicious or is not from a protected location, DEP closes the program and notifies you." -
27 DEP
"A security feature that monitors programs on a computer to determine if they use system memory safely. To do this, DEP software works alone or with compatible microprocessors to mark some memory locations as ""non-executable."" If a program tries to run code that is malicious or is not from a protected location, DEP closes the program and notifies you." -
28 Stop message
"A character-based, full-screen error message displayed on a blue background. A Stop message indicates that the Windows kernel detected a condition from which it cannot recover. Each message is uniquely identified by a Stop error code (a hexadecimal number) and a string indicating the errors symbolic name. Stop messages are usually followed by up to four additional hexadecimal numbers, enclosed in parentheses, which identify developer-defined error parameters. A driver or device may be identified as the cause of the error. A series of troubleshooting tips are also displayed, along with an indication that, if the system was configured to do so, a memory dump file was saved for later use by a kernel debugger." -
29 visual tree
"In Windows Presentation Foundation, the element tree containing all visual elements (elements that derive from the type System.Windows.Media.Visual) used for a piece of the user interface. This tree is the accumulation of all visual elements created directly by the application (whether in code or in markup) and all visual elements created by the template expansion of elements such as controls and data objects." -
30 culture
"In managed code, a class of information about a particular nation or people including their collective name, writing system, calendar used, and conventions for formatting dates and sorting strings." -
31 source control
"A set of features that include a mechanism for checking source code in and out of a central repository. It also implies a version control system that can manage files through the development lifecycle, keeping track of which changes were made, who made them, when they were made, and why." -
32 Trojan
A program that appears to be useful or harmless but that contains hidden code designed to exploit or damage the system on which it is run. -
33 kernel mode exception
"An exception that occurs while the operating system is executing internal code (in drivers, the kernel, etc)." -
34 kernel exception
"An exception that occurs while the operating system is executing internal code (in drivers, the kernel, etc)." -
35 kernel fault
"An exception that occurs while the operating system is executing internal code (in drivers, the kernel, etc)." -
36 Blue Screen of Death
"An exception that occurs while the operating system is executing internal code (in drivers, the kernel, etc)." -
37 BSOD
"An exception that occurs while the operating system is executing internal code (in drivers, the kernel, etc)." -
38 kernel exception signature
"The exception code, exception parameters, and operating system version (including build number and Service Pack version)."English-Arabic terms dictionary > kernel exception signature
-
39 resource leak
A type of software bug that can occur in Windows-based applications developed in Visual C++ if the application is not programmed to release a system resource in the source code. -
40 transition event
"A change in the location of processor event execution between ring 3 (user mode) and ring 0 (kernel mode). Transition events represent time spent outside the direct execution of the application code. Transition events can be time spent in threads that are not part of the profiled item, or time spent executing calls from the profiled item to the operating system."
См. также в других словарях:
Code injection — is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by an attacker to introduce (or inject ) code into a computer program to change the course of execution. The results of a code injection… … Wikipedia
Code::Blocks — Not to be confused with the computer programming term code block. Code::Blocks Code::Blocks 10.05 running on Windows Vista … Wikipedia
Code page — is another term for character encoding. It consists of a table of values that describes the character set for a particular language. The term code page originated from IBM s EBCDIC based mainframe systems,[1] but many vendors use this term… … Wikipedia
Code Geass — Code Geass: Lelouch of the Rebellion First Code Geass DVD volume released in Japan. コードギアス 反逆のルルーシュ (Kōdo Giasu: Hangyaku no Rurūshu) … Wikipedia
Code signing — is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed by use of a cryptographic hash. Code signing can provide several valuable … Wikipedia
Code Co-op — Developer(s) Reliable Software Initial release 1996; 14 years ago (1996) Stable rele … Wikipedia
System i — Modell 570 mit Power 6 Prozessoren (Oktober 2007) i5 Modell 570 (2006) Syst … Deutsch Wikipedia
System i5 — System i Modell 570 mit Power 6 Prozessoren (Oktober 2007) i5 Modell 570 (2006) System i (frühere Namen AS/400 oder eServer iSeries oder System i5) ist eine Computer Baureihe der Firma IBM. IBMs Systeme … Deutsch Wikipedia
Code Name: Viper — cover art (North American version) Developer(s) Capcom … Wikipedia
Code Access Security — (CAS), in the Microsoft .NET framework, is Microsoft s solution to prevent untrusted code from performing privileged actions. When the CLR loads an assembly it will obtain evidence for the assembly and use this to identify the code group that the … Wikipedia
System Management Mode — (SMM) is an operating mode first released with the Intel 386SL and available in later microprocessors in the x86 architecture, in which all normal execution (including the operating system) is suspended, and special separate software (usually… … Wikipedia