-
1 scatter chart
"A chart that plots numerical data along two value axes (x,y)." -
2 xy chart
"A chart that plots numerical data along two value axes (x,y)." -
3 hash algorithm
"An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1." -
4 one-to-many relationship
An association between two tables in which the primary key value of each record in the primary table corresponds to the value in the matching field or fields of many records in the related table. -
5 one-to-one relationship
"An association between two tables in which the primary key value of each record in the primary table corresponds to the value in the matching field or fields of one, and only one, record in the related table." -
6 splined interpolation
"One of three methods used to describe how an animation transitions between values over its duration. This method uses a Bezier curve to describe how the animation transitions between key frames. The Bezier curve starts at zero, which corresponds to the current key frame value, and ends at one (the next key frame's value). By altering the curve's two control points, you alter the animation's progress curve." -
7 hash function
"An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1." -
8 realized gain
The increase in the value of an asset calculated as the difference in the value of the asset when two economic events occur and when the difference is recognized on the occurrence of the second event as an increase in wealth. -
9 realized loss
The decrease in the value of an asset calculated as the difference in the value of the asset when two economic events occur and when the difference is recognized on the occurrence of the second event as a reduction in wealth. -
10 unrealized loss
The anticipated decrease in the value of an asset calculated as the difference in the value of the asset when two economic events occur and when the difference is recognized on the occurrence of the second event as an anticipated reduction in wealth. -
11 unrealized gain
The anticipated increase in the value of an asset calculated as the difference in the value of the asset when two economic events occur and when the difference is recognized on the occurrence of the second event as an anticipated increase in wealth. -
12 AND
"A logical operation combining the values of two bits (0, 1) or two Boolean values (false, true) that returns a value of 1 (true) if both input values are 1 (true) and returns a 0 (false) otherwise."و -
13 OR
"A logical operation for combining two bits (0 or 1) or two Boolean values (false or true). If one or both values are 1 (true), it returns the value 1 (true)."OR -
14 lag time
"A delay between tasks that have a dependency. For example, if you need a two-day delay between the finish of one task and the start of another, you can establish a finish-to-start dependency and specify a two-day lag time [has a positive value]." -
15 checksum
"A calculated value that is used to test data for the presence of errors that can occur when data is transmitted or when it is written to disk. The checksum is calculated for a given chunk of data by sequentially combining all the bytes of data with a series of arithmetic or logical operations. After the data is transmitted or stored, a new checksum is calculated in the same way using the (possibly faulty) transmitted or stored data. If the two checksums do not match, an error has occurred, and the data should be transmitted or stored again. Checksums cannot detect all errors, and they cannot be used to correct erroneous data." -
16 color space
"The three-dimensional space that is defined by a set of coordinates for representing color on devices such as monitors, scanners, and printers. For example, in the LAB color space, the colors are defined in terms of their luminance or whiteness (L), redness-greenness (A), and yellowness-blueness (B); the HVC system uses hue (H), value (V), and chroma (C). The two most common color space models are RGB and YUV." -
17 color space model
"The three-dimensional space that is defined by a set of coordinates for representing color on devices such as monitors, scanners, and printers. For example, in the LAB color space, the colors are defined in terms of their luminance or whiteness (L), redness-greenness (A), and yellowness-blueness (B); the HVC system uses hue (H), value (V), and chroma (C). The two most common color space models are RGB and YUV." -
18 unique index
"An index in which no two rows are permitted to have the same index value, thus prohibiting duplicate index or key values." -
19 matching principle
A rule that specifies whether matching cost and revenue on a fixed-price project should be handled as one transaction (sales value) or as two transactions (production + profit). -
20 bubble chart
"A variation on a scatter chart in which the data points are replaced with bubbles, and three values are compared instead of two. The third value determines the size of the bubble marker."
- 1
- 2
См. также в других словарях:
Value system — A value system is a set of consistent ethic values (more specifically the personal and cultural values) and measures used for the purpose of ethical or ideological integrity. A well defined value system is a moral code. Personal and communal One… … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Two-sided market — Two sided markets, also called two sided networks, are economic networks having two distinct user groups that provide each other with network benefits. Example markets include credit cards, comprised of cardholders and merchants; HMOs (patients… … Wikipedia
Value engineering — is a systematic method to improve the value of goods and services by using an examination of function. Value, as defined, is the ratio of function to cost. Value can therefore be increased by either improving the function or reducing the cost. It … Wikipedia
Value vs Growth Investing — Value investing and Growth Investing are often presented as two competing styles of investing. Indeed there are now many Exchange traded funds available which claim to offer one of the two styles.Performance of Value and Growth stylesFor several… … Wikipedia
Value at risk — (VaR) is a maximum tolerable loss that could occur with a given probability within a given period of time. VaR is a widely applied concept to measure and manage many types of risk, although it is most commonly used to measure and manage the… … Wikipedia
Two-dimensional nuclear magnetic resonance spectroscopy — (2D NMR) is a set of nuclear magnetic resonance spectroscopy (NMR) methods which give data plotted in a space defined by two frequency axes rather than one. Types of 2D NMR include correlation spectroscopy (COSY), J spectroscopy, exchange… … Wikipedia
Value theory — encompasses a range of approaches to understanding how, why and to what degree people should value things; whether the thing is a person, idea, object, or anything else. This investigation began in ancient philosophy, where it is called axiology… … Wikipedia
Value of information — (VoI) in decision analysis is the amount a decision maker would be willing to pay for information prior to making a decision. imilar termsVoI is sometimes distinguished into value of perfect information, also called value of clairvoyance (VoC),… … Wikipedia
Value — Val ue, n. [OF. value, fr. valoir, p. p. valu, to be worth, fr. L. valere to be strong, to be worth. See {Valiant}.] 1. The property or aggregate properties of a thing by which it is rendered useful or desirable, or the degree of such property or … The Collaborative International Dictionary of English
Value received — Value Val ue, n. [OF. value, fr. valoir, p. p. valu, to be worth, fr. L. valere to be strong, to be worth. See {Valiant}.] 1. The property or aggregate properties of a thing by which it is rendered useful or desirable, or the degree of such… … The Collaborative International Dictionary of English