-
1 Agile method
"Any of a family of processes that software developers use to minimize risk by developing applications incrementally, over a series of short iterations. In this model, real-time communications, such as in person conversations and telephone calls, are preferred over written documentation; the primary measure of progress is working software, instead of hours spent, tasks completed, documents reviewed, or phases signed-off; stakeholders are expected to collaborate, instead of negotiating; and planning happens continuously in order to respond to change." -
2 bilinear
A rendering method used to map a source image to a target image. This method uses the weighted average of the four nearest source pixels to define a target pixel. -
3 bilinear filtering
A rendering method used to map a source image to a target image. This method uses the weighted average of the four nearest source pixels to define a target pixel. -
4 provider
"In a Web Parts connection, a server control that sends data to a consumer control. A provider can be a WebPart control or any type of server control, but must be designed to function as a provider. A provider must have a special callback method marked with a ConnectionProviderAttribute attribute in the source code. This method provides data to consumer controls in the form of an interface instance." -
5 consumer
"In a Web Parts connection, a server control that receives data from a provider control and processes or displays it. A consumer can be any type of server control, but must be designed to function as a consumer. A consumer must have a special callback method marked with a ConnectionConsumerAttribute attribute in the source code. This method receives data from the provider in the form of an interface instance." -
6 job market pricing
"A method of determining compensation by comparing individual jobs to market benchmark data for similar jobs in order to identify a value-relative basis. With this method, a specific pay range is associated with an individual job, but not with a compensation level (grade or band). Job market pricing is a feature of broad-banding compensation structures, but not of grades or steps." -
7 nearest neighbor
A rendering method used to map a source image to a target image. This method uses only the nearest source pixel to define a target pixel. -
8 combinator
A method used to map a source image to a target image. This method uses the weighted average of the four nearest source pixels to define a target pixel. -
9 registry boot
"The default boot option used by most Windows DNS servers. When registry boot is used, DNS is started and initialized using DNS parameters and their values as they are stored in the Windows registry. You can use a Berkeley Internet Name Domain (BIND) boot file as an alternative to this method of boot configuration for DNS." -
10 discrete interpolation
"One of three methods used to describe how an animation transitions between values over its duration. This method produces a jump from one value to the next, without generating in-between values." -
11 linear interpolation
One of three methods used to describe how an animation transitions between values over its duration. This method produces a constant rate of change. -
12 splined interpolation
"One of three methods used to describe how an animation transitions between values over its duration. This method uses a Bezier curve to describe how the animation transitions between key frames. The Bezier curve starts at zero, which corresponds to the current key frame value, and ends at one (the next key frame's value). By altering the curve's two control points, you alter the animation's progress curve." -
13 recommend
[ˌrekə΄mend] v հանձնարարել, խոր հուրդ տալ, առաջադրել, ներկայաց նել. This method is not recommended Այս մեթոդը չի հանձնարարվում. recommend smb for a post/decoration պաշտոնի/շքանշանի առաջադ րել/ներ կայաց նել. a list of recommended books հանձնարարված գրքերի ցուցակ -
14 imperative security check
"A security check that occurs when a security method is called within the code that is being protected. This type of check can be data-driven and can be isolated to a single location within an object or method. For example, if the name of a file to be protected is known only at run time, an imperative security check can be invoked by passing the file name as a parameter to a security method." -
15 access
[΄ækses] n մուտք, մոտենալու հնա րավո րություն, ներթափանցում. I have access to these documents Ես այս փաստաթղթերից օգտվելու հնարավորություն/իրավունք ունեմ. He has direct access to the minister Նա ան միջա կան մուտք ունի նախարարի մոտ. There is no access to this building Այս շենքին մոտենալու հնարավորություն չկա. the only access to this house շենքի միակ մուտքը. easy of access մատ չելի. difficult of access դժվար մատչելի. բժշկ. նոպա an access of coughing հազի նոպա. right of access մուտքի/անցնելու իրավունք. հմկրգ. access add ress դիմելու հասցե. access control հա սա նելիու թյան ղեկա վա րում. access method դիմելու/ ընտրման մեթոդ -
16 campaign
"A marketing program designed to accomplish a specific result, such as introducing a new product or increasing market share. The main way to accomplish this result is through communicating the benefits of a product or service to people and businesses. Campaigns often include more than one communication method, such as print advertisements, promotional discounts, and direct mail." -
17 safe mode
A method of starting Windows using only basic files and drivers. Safe mode is available by pressing the F8 key during startup. This allows you to start the computer when a problem prevents it from starting correctly. -
18 value type
"A data type that is represented by the type's actual value. If a value type is assigned to a variable, that variable is given a fresh copy of the value. (This is in contrast to a reference type, where assignment does not create a copy.) Value types are usually created on a method's stack frame, rather than in the garbage-collected heap. A value type can be boxed, which is a process that creates a corresponding reference type." -
19 broadcast
"A method by which a client receives a stream. During a broadcast connection, clients cannot control the stream. This is the opposite of an on-demand presentation."بث -
20 Syspart
A process that executes through an optional parameter of Winnt32.exe. Used for clean installations to computers that have dissimilar hardware. This automated installation method reduces deployment time by eliminating the file-copy phase of Setup.
- 1
- 2
См. также в других словарях:
Method & Red — This article is about the television series. For the stars of the series, see Method Man Redman. Method Red Promotional poster Format … Wikipedia
This Is the House That Jack Built — is a popular British nursery rhyme, first popularized by Randolph Caldecott. It is a cumulative tale that doesn t tell the story of Jack, who builds a house, but instead shows how the house is indirectly linked to numerous things and people, and… … Wikipedia
Method of loci — The method of loci (plural of Latin locus for place or location), also called the memory palace, is a mnemonic device introduced in ancient Roman rhetorical treatises (in the anonymous Rhetorica ad Herennium, Cicero s De Oratore, and Quintilian s … Wikipedia
Method of analytic tableaux — A graphical representation of a partially built propositional tableau In proof theory, the semantic tableau (or truth tree) is a decision procedure for sentential and related logics, and a proof procedure for formulas of first order logic. The… … Wikipedia
Method of complements — Complement numbers on an adding machine c. 1910 In mathematics and computing, the method of complements is a technique used to subtract one number from another using only addition of positive numbers. This method was commonly used in mechanical… … Wikipedia
Method of image charges — The method of image charges (also known as the method of images and method of mirror charges) is a basic problem solving tool in electrostatics. The name originates from the replacement of certain elements in the original layout with imaginary… … Wikipedia
Method of lines — The method of lines (MOL, NMOL, NUMOL) (Schiesser, 1991; Hamdi, et al., 2007; Schiesser, 2009 ) is a technique for solving partial differential equations (PDEs) in which all but one dimension is discretized. MOL allows standard, general purpose… … Wikipedia
Method of moments (statistics) — See method of moments (probability theory) for an account of a technique for proving convergence in distribution. In statistics, the method of moments is a method of estimation of population parameters such as mean, variance, median, etc. (which… … Wikipedia
method — noun ADJECTIVE ▪ accurate, effective, efficient, good, practical, reliable, tried and tested (esp. BrE), tried and true (esp. AmE) ▪ Which method is … Collocations dictionary
Method of matched asymptotic expansions — In mathematics, particularly in solving singularly perturbed differential equations, the method of matched asymptotic expansions is a common approach to finding an accurate approximation to a problem s solution. Contents 1 Method overview 2… … Wikipedia
Method of steepest descent — For the optimization algorithm, see Gradient descent. In mathematics, the method of steepest descent or stationary phase method or saddle point method is an extension of Laplace s method for approximating an integral, where one deforms a contour… … Wikipedia