-
1 code profiler
"A software tool, implemented as a DLL, which is called by the runtime system during the execution of an image." -
2 CODE-COMMAND SYSTEM
-
3 managed code
"Code that is executed by the common language runtime environment rather than directly by the operating system. Managed code applications gain common language runtime services such as automatic garbage collection, runtime type checking and security support, and so on. These services help provide uniform platform- and language-independent behavior of managed-code applications."تعليمات برمجية مُدارة -
4 unmanaged code
"Code that is executed directly by the operating system, outside the.NET Framework common language runtime. Unmanaged code must provide its own memory management, type checking, and security support, unlike managed code, which receives these services from the common language runtime."تعليمات برمجية غير مُدارة -
5 unsafe code
"Code that is executed directly by the operating system, outside the.NET Framework common language runtime. Unmanaged code must provide its own memory management, type checking, and security support, unlike managed code, which receives these services from the common language runtime." -
6 Trojan code
A program that appears to be useful or harmless but that contains hidden code designed to exploit or damage the system on which it is run. -
7 source code control
"A set of features that include a mechanism for checking source code in and out of a central repository. It also implies a version control system that can manage files through the development lifecycle, keeping track of which changes were made, who made them, when they were made, and why." -
8 authorization code
"A code that grants rights to an individual, for example to use a system or access stored data." -
9 Match Code Update
A system job that scans the system for records for which match codes are not updated and persist their corresponding matchcodes in the database (this wakes up every 5 mins). -
10 IFSC code
A series of 11 alphanumeric characters used by the Indian Financial System to identify banks participating in the NEFT system and to route transactions between banks. -
11 user mode
"The nonprivileged processor mode in which application code, including protected subsystem code, executes. User-mode applications cannot gain access to system data except by calling subsystem-supplied functions, which, in turn, call system services." -
12 Language for non-Unicode programs
A Regional and Language Options setting that specifies the default code pages and associated bitmap font files for a specific computer that affects all of that computer's users. The default code pages and fonts enable a non-Unicode application written for one operating system language version to run correctly on another operating system language version.English-Arabic terms dictionary > Language for non-Unicode programs
-
13 embedded controller interface
"A standard hardware and software communications interface between an operating system driver and an embedded controller, such as Smart Battery and AML code. This allows any operating system to provide a standard driver that can directly communicate with an embedded controller in the system, thus allowing other drivers to communicate with and use the resources of the system embedded controllers."English-Arabic terms dictionary > embedded controller interface
-
14 application object
"The top-level object that represents the application to the system. The system calls methods on this object when the application is loaded, before it is shut down, and throughout the lifetime of the application to notify it of system-wide events. The application object contains application-wide code and maintains state that can be accessed from multiple views." -
15 boot sector
"A critical disk structure for starting your computer, located at sector 1 of each volume or floppy disk. It contains executable code and data that is required by the code, including information used by the file system to access the volume. The boot sector is created when your format the volume." -
16 component
"In general, a modular unit of code that acts as part of a larger system or structure. For COM, a unit of code built to deliver a well-specified set of services through well-specified interfaces. A component provides an object that a client requests at runtime."مكوّن -
17 full trust
"A code access security (CAS) state assigned to managed assemblies. The level of trust granted to an application or Web service affects its ability to use system resources while executing. Assemblies that have full trust can access any resource that is subject to operating system security, and all privileged operations are supported." -
18 loader
"A utility that loads the executable code of a program into memory for execution. On most microcomputers, the loader is an invisible part of the operating system and is automatically invoked when a program is run." -
19 virus
"Malware that replicates, commonly by infecting other files in the system, thus allowing the execution of the malware code and its propagation when those files are activated." -
20 worm
"Self-propagating malicious code that can automatically distribute itself from one computer to another through network connections. A worm can take harmful action, such as consuming network or local system resources, possibly causing a denial of service attack."
См. также в других словарях:
Code injection — is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by an attacker to introduce (or inject ) code into a computer program to change the course of execution. The results of a code injection… … Wikipedia
Code::Blocks — Not to be confused with the computer programming term code block. Code::Blocks Code::Blocks 10.05 running on Windows Vista … Wikipedia
Code page — is another term for character encoding. It consists of a table of values that describes the character set for a particular language. The term code page originated from IBM s EBCDIC based mainframe systems,[1] but many vendors use this term… … Wikipedia
Code Geass — Code Geass: Lelouch of the Rebellion First Code Geass DVD volume released in Japan. コードギアス 反逆のルルーシュ (Kōdo Giasu: Hangyaku no Rurūshu) … Wikipedia
Code signing — is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed by use of a cryptographic hash. Code signing can provide several valuable … Wikipedia
Code Co-op — Developer(s) Reliable Software Initial release 1996; 14 years ago (1996) Stable rele … Wikipedia
System i — Modell 570 mit Power 6 Prozessoren (Oktober 2007) i5 Modell 570 (2006) Syst … Deutsch Wikipedia
System i5 — System i Modell 570 mit Power 6 Prozessoren (Oktober 2007) i5 Modell 570 (2006) System i (frühere Namen AS/400 oder eServer iSeries oder System i5) ist eine Computer Baureihe der Firma IBM. IBMs Systeme … Deutsch Wikipedia
Code Name: Viper — cover art (North American version) Developer(s) Capcom … Wikipedia
Code Access Security — (CAS), in the Microsoft .NET framework, is Microsoft s solution to prevent untrusted code from performing privileged actions. When the CLR loads an assembly it will obtain evidence for the assembly and use this to identify the code group that the … Wikipedia
System Management Mode — (SMM) is an operating mode first released with the Intel 386SL and available in later microprocessors in the x86 architecture, in which all normal execution (including the operating system) is suspended, and special separate software (usually… … Wikipedia