-
1 ar-sa المؤدّي
"A standard single-byte character encoding scheme used for text-based data. ASCII uses designated 7-bit or 8-bit number combinations to represent either 128 or 256 possible characters. Standard ASCII uses 7 bits to represent all uppercase and lowercase letters, the numbers 0 through 9, punctuation marks, and special control characters used in U.S. English. Most current x86-based systems support the use of extended (or ""high"") ASCII. Extended ASCII allows the eighth bit of each character to identify an additional 128 special symbol characters, foreign-language letters, and graphic symbols." -
2 ASCII
"A standard single-byte character encoding scheme used for text-based data. ASCII uses designated 7-bit or 8-bit number combinations to represent either 128 or 256 possible characters. Standard ASCII uses 7 bits to represent all uppercase and lowercase letters, the numbers 0 through 9, punctuation marks, and special control characters used in U.S. English. Most current x86-based systems support the use of extended (or ""high"") ASCII. Extended ASCII allows the eighth bit of each character to identify an additional 128 special symbol characters, foreign-language letters, and graphic symbols." -
3 American Standard Code for Information Interchange
"A standard single-byte character encoding scheme used for text-based data. ASCII uses designated 7-bit or 8-bit number combinations to represent either 128 or 256 possible characters. Standard ASCII uses 7 bits to represent all uppercase and lowercase letters, the numbers 0 through 9, punctuation marks, and special control characters used in U.S. English. Most current x86-based systems support the use of extended (or ""high"") ASCII. Extended ASCII allows the eighth bit of each character to identify an additional 128 special symbol characters, foreign-language letters, and graphic symbols."English-Arabic terms dictionary > American Standard Code for Information Interchange
-
4 command line interface
"A form of interface between the operating system and the user in which the user types commands, using a special command language. Although systems with command-line interfaces are usually considered more difficult to learn and use than those with graphical interfaces, command-based systems are usually programmable; this gives them flexibility unavailable in graphics-based systems that do not have a programming interface." -
5 command-line interface
"A form of interface between the operating system and the user in which the user types commands, using a special command language. Although systems with command-line interfaces are usually considered more difficult to learn and use than those with graphical interfaces, command-based systems are usually programmable; this gives them flexibility unavailable in graphics-based systems that do not have a programming interface." -
6 ar-sa مخطط دائري
"A file that provides information to Windows about how best to run MS-DOS-based programs. When you start an MS-DOS-based program, Windows looks for a program information file to use with it.program information files contain such items as the name of the file, a start-up directory, and multitasking options." -
7 PIF
"A file that provides information to Windows about how best to run MS-DOS-based programs. When you start an MS-DOS-based program, Windows looks for a program information file to use with it.program information files contain such items as the name of the file, a start-up directory, and multitasking options." -
8 program information file
"A file that provides information to Windows about how best to run MS-DOS-based programs. When you start an MS-DOS-based program, Windows looks for a program information file to use with it.program information files contain such items as the name of the file, a start-up directory, and multitasking options." -
9 Voice over Internet Protocol
"The use of the Internet Protocol (IP) for transmitting voice communications. VoIP delivers digitized audio in packet form and can be used to transmit over intranets, extranets, and the Internet. It is essentially an inexpensive alternative to traditional telephone communication over the circuit-switched Public Switched Telephone Network (PSTN). VoIP covers computer-to-computer, computer-to-telephone, and telephone-based communications. For the sake of compatibility and interoperability, a group called the VoIP Forum promotes product development based on the ITU-T H.323 standard to transmit multimedia over the Internet."English-Arabic terms dictionary > Voice over Internet Protocol
-
10 VoIP
"The use of the Internet Protocol (IP) for transmitting voice communications. VoIP delivers digitized audio in packet form and can be used to transmit over intranets, extranets, and the Internet. It is essentially an inexpensive alternative to traditional telephone communication over the circuit-switched Public Switched Telephone Network (PSTN). VoIP covers computer-to-computer, computer-to-telephone, and telephone-based communications. For the sake of compatibility and interoperability, a group called the VoIP Forum promotes product development based on the ITU-T H.323 standard to transmit multimedia over the Internet." -
11 Voice over IP
"The use of the Internet Protocol (IP) for transmitting voice communications. VoIP delivers digitized audio in packet form and can be used to transmit over intranets, extranets, and the Internet. It is essentially an inexpensive alternative to traditional telephone communication over the circuit-switched Public Switched Telephone Network (PSTN). VoIP covers computer-to-computer, computer-to-telephone, and telephone-based communications. For the sake of compatibility and interoperability, a group called the VoIP Forum promotes product development based on the ITU-T H.323 standard to transmit multimedia over the Internet." -
12 computer audio
"The use of the Internet Protocol (IP) for transmitting voice communications. VoIP delivers digitized audio in packet form and can be used to transmit over intranets, extranets, and the Internet. It is essentially an inexpensive alternative to traditional telephone communication over the circuit-switched Public Switched Telephone Network (PSTN). VoIP covers computer-to-computer, computer-to-telephone, and telephone-based communications. For the sake of compatibility and interoperability, a group called the VoIP Forum promotes product development based on the ITU-T H.323 standard to transmit multimedia over the Internet." -
13 GDI+
"A class-based API for C/C++ programmers that enables applications to use graphics and formatted text on both the video display and the printer. Applications based on the Microsoft Win32 API do not access graphics hardware directly. Instead, GDI+ interacts with device drivers on behalf of applications. GDI+ is also supported by Microsoft Win64."GDI+ -
14 Tablet PC Input Panel
"A Tablet PC accessory that enables you to use handwriting, speech, or an on-screen keyboard to enter text, symbols, numbers, or keyboard shortcuts. You can use it to interact with any Windows-based program." -
15 Input Panel
"A Tablet PC accessory that enables you to use handwriting, speech, or an on-screen keyboard to enter text, symbols, numbers, or keyboard shortcuts. You can use it to interact with any Windows-based program." -
16 ASCII character set
"A standard 7-bit code for representing ASCII characters using binary values; code values range from 0 to 127. Most PC-based systems use an 8-bit extended ASCII code, with an extra 128 characters used to represent special symbols, foreign-language characters, and graphic symbols." -
17 CRC
"A procedure used in checking for errors in data transmission. CRC error checking uses a complex calculation to generate a number based on the data transmitted. The sending device performs the calculation before transmission and includes it in the packet that it sends to the receiving device. The receiving device repeats the same calculation after transmission. If both devices obtain the same result, it is assumed that the transmission was error free. The procedure is known as a redundancy check because each transmission includes not only data but extra (redundant) error-checking values. Communications protocols such as XMODEM and Kermit use cyclical redundancy checking." -
18 cyclic redundancy check
"A procedure used in checking for errors in data transmission. CRC error checking uses a complex calculation to generate a number based on the data transmitted. The sending device performs the calculation before transmission and includes it in the packet that it sends to the receiving device. The receiving device repeats the same calculation after transmission. If both devices obtain the same result, it is assumed that the transmission was error free. The procedure is known as a redundancy check because each transmission includes not only data but extra (redundant) error-checking values. Communications protocols such as XMODEM and Kermit use cyclical redundancy checking." -
19 cyclical redundancy check
"A procedure used in checking for errors in data transmission. CRC error checking uses a complex calculation to generate a number based on the data transmitted. The sending device performs the calculation before transmission and includes it in the packet that it sends to the receiving device. The receiving device repeats the same calculation after transmission. If both devices obtain the same result, it is assumed that the transmission was error free. The procedure is known as a redundancy check because each transmission includes not only data but extra (redundant) error-checking values. Communications protocols such as XMODEM and Kermit use cyclical redundancy checking." -
20 family
"A series of hardware or software products that have some properties in common, such as a series of personal computers from the same company, a series of CPU chips from the same manufacturer that all use the same instruction set, a set of 32-bit operating systems based on the same API (for example, Windows 95 and Windows 98), or a set of fonts that are intended to be used together, such as Times New Roman."
См. также в других словарях:
Use of Free and Open Source Software (FOSS) in the U.S. Department of Defense — is a 2003 report by The MITRE Corporation that documented widespread use of and reliance on free software (termed FOSS ) within the United States Department of Defense (DoD). The report helped end a debate about whether FOSS should be banned from … Wikipedia
Use of webcams — at work and home has become a world wide web cultural revolution or change in how we communicate with each other. It can be broken down into positve, negative, freedom of expression or speech and what the future of webcam internet technology may… … Wikipedia
based — 1. based on. To base one thing on another is to use the second as the basis for the first, and it is frequently used in the passive, as in arguments based on statistics. Avoid using based on as an unattached conjunction without a clear antecedent … Modern English usage
Use of Beads at Prayers — Use of Beads at Prayers † Catholic Encyclopedia ► Use of Beads at Prayers Beads variously strung together, according to the kind, order, and number of prayers in certain forms of devotion, are in common use among Catholics as an… … Catholic encyclopedia
use value — n: value of property based on its use rather than on the market use value of agricultural land Merriam Webster’s Dictionary of Law. Merriam Webster. 1996 … Law dictionary
Use It Up and Wear It Out — was a popular single by Odyssey.Written by Sandy Linzer and L Russel Brown and produced by Linzer it was the New York based disco groups sole UK #1 single, spending two weeks at the top in July 1980. The most successful of the acts six UK hit… … Wikipedia
Use case — A use case is a description of a system’s behaviour as it responds to a request that originates from outside of that system.The use case technique is used in software and systems engineering to capture the functional requirements of a system. Use … Wikipedia
Use-define chain — A Use Definition Chain (UD Chain) is a data structure that consists of a use, U, of a variable, and all the definitions, D, of that variable that can reach that use without any other intervening definitions. A definition can have many forms, but… … Wikipedia
Use of courtesy titles and honorifics in professional writing — The use of honorifics (Mr, Mrs, Miss, Ms.) and styles (HRH, His Holiness, etc.) differs greatly among publications in both journalism and academia. The differences are based on tradition, practical concerns (such as space), and cultural norms.… … Wikipedia
Use–mention distinction — The use–mention distinction (sometimes referred to as the words as words distinction) is the distinction between using a word (or phrase) and mentioning it. For example, the following two sentences illustrate use and mention of the word cheese… … Wikipedia
Use of social network websites in investigations — Social network services are increasingly being used in legal and criminal investigations. Information posted on sites such as MySpace and Facebook has been used by police and university officials to prosecute users of said sites. In some… … Wikipedia