Перевод: со всех языков на все языки

со всех языков на все языки

two-set buffer

См. также в других словарях:

  • Buffer overflow protection — refers to various techniques used during software development to enhance the security of executable programs by detecting buffer overflows on stack allocated variables as they occur and preventing them from becoming serious security… …   Wikipedia

  • Two pass verification — Two pass verification, also called double data entry, is a data entry quality control method that was originally employed when data records were entered onto sequential 80 column Hollerith cards with a keypunch. In the first pass through a set of …   Wikipedia

  • Buffer overflow — In computer security and programming, a buffer overflow, or buffer overrun, is an anomalous condition where a process attempts to store data beyond the boundaries of a fixed length buffer. The result is that the extra data overwrites adjacent… …   Wikipedia

  • Buffer zone — For the Karachi neighbourhood, see Buffer Zone, Karachi. This article is about buffer zones in general. For use relating to abortion, see Legal protection of access to abortion. Czechoslovak sign dating from the beginning of the 1980s, informing… …   Wikipedia

  • Buffer Manager — DB2 ist ein kommerzielles relationales Datenbank Management System (RDBMS) der Firma IBM, dessen Ursprünge auf das System R und die Grundlagen von E. F. Codd vom IBM Research aus dem Jahr 1970 zurückgeht. Inhaltsverzeichnis 1 Eigenschaften 1.1… …   Deutsch Wikipedia

  • Buffer Pool — DB2 ist ein kommerzielles relationales Datenbank Management System (RDBMS) der Firma IBM, dessen Ursprünge auf das System R und die Grundlagen von E. F. Codd vom IBM Research aus dem Jahr 1970 zurückgeht. Inhaltsverzeichnis 1 Eigenschaften 1.1… …   Deutsch Wikipedia

  • buffer —    An area of memory set aside for temporary storage of data. Often, the data remains in the buffer until some external event finishes. A buffer can compensate for the differences in transmission or processing speed between two devices or between …   Dictionary of networking

  • Circular buffer — A ring showing, conceptually, a circular buffer. This visually shows that the buffer has no real end and it can loop around the buffer. However, since memory is never physically created as a ring, a linear representation is generally used as is… …   Wikipedia

  • Burroughs large systems instruction set — The B5000 instruction set is the set of valid operations for the Burroughs large systems including the current (as of 2006) Unisys Clearpath/MCP systems. These unique machines have a distinctive design and instruction set. Each word of data is… …   Wikipedia

  • Voice modem command set — Main article: Modem Voice modem is a term commonly used to describe an analog telephone data modem with a built in capability of transmitting and receiving voice recordings over the phone line. Voice modems are used for telephony and answering… …   Wikipedia

  • Irregular Z-buffer — The irregular Z buffer is an algorithm designed to solve the visibility problem in real time 3 d computer graphics. It is related to the classical Z buffer in that it maintains a depth value for each image sample and uses these to determine which …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»