-
1 use case diagram
"A diagram that shows the external actors who will interact with your system and how they will use it. The diagram consists of a system boundary, actors, use cases, and use case relationships (communicates, uses, and extends)." -
2 use case
A collection of scenarios which make up a behaviorally related sequence of interactions that a user performs in a dialog with a system. -
3 single use kanban
A type of kanban that is used with a fixed quantity kanban rule to meet exceptionally high demand. A single use kanban does not trigger a new kanban when it is discarded. -
4 block diagram with perspective
"A type of block diagram that contains 3-D geometric shapes, directional lines, and a vanishing point for changing depth and perspective. Use for functional decomposition, hierarchical, and data structure diagrams."English-Arabic terms dictionary > block diagram with perspective
-
5 easy-to-use
Capable of being used with little or no difficulty. -
6 straighten a photo
"To adjust the axis of a photo so that objects in the photo appear level, typically with use of an image editing tool." -
7 tunneling
"In Windows Presentation Foundation, an event routing strategy where the event instance moves down the element tree (starting at the root of the visual tree and ending with the source). The names of events that use this routing strategy are prefixed with the word ""Preview"". These events have the same signature as their counterparts that use the bubbling event routing strategy." -
8 retargetable assembly
"An assembly that belongs to more than one implementation of the.NET Framework, or an assembly that has been built on more than one implementation of the.NET Framework with the same strong name and with appropriate attributes. Applications that use retargetable assemblies can run on any.NET Framework implementation where those assemblies have been built. For example, applications that are built to use the.NET Compact Framework can run on the desktop implementation of the.NET Framework." -
9 address mask
"A number that, when compared by the computer with a network address number, will block out all but the necessary information. For example, in a network that uses XXX.XXX.XXX.YYY and where all computers within the network use the same first address numbers, the mask will block out XXX.XXX.XXX and use only the significant numbers in the address, YYY." -
10 confidentiality
"A basic security function of cryptography that ensures that only authorized users can read or use confidential or secret information. Without confidentiality, anyone with network access can use readily available tools to eavesdrop on network traffic and intercept valuable proprietary information. For example, an Internet Protocol security service ensures that a message is disclosed only to intended recipients by encrypting the data."السرّية -
11 default printer
The printer to which a computer sends documents if you select the Print command without first specifying which printer you want to use with a program. You can have only one default printer; it should be the printer you use most often. -
12 SGC
"An extension of the Secure Sockets Layer (SSL) that allows financial institutions with export versions of Microsoft Windows 2000 Server to use 128-bit encryption. Although SGC capabilities are built into Windows 2000 Server, a special SGC certificate is required to use SGC." -
13 Server Gated Cryptography
"An extension of the Secure Sockets Layer (SSL) that allows financial institutions with export versions of Microsoft Windows 2000 Server to use 128-bit encryption. Although SGC capabilities are built into Windows 2000 Server, a special SGC certificate is required to use SGC." -
14 Tablet PC Input Panel
"A Tablet PC accessory that enables you to use handwriting, speech, or an on-screen keyboard to enter text, symbols, numbers, or keyboard shortcuts. You can use it to interact with any Windows-based program." -
15 Input Panel
"A Tablet PC accessory that enables you to use handwriting, speech, or an on-screen keyboard to enter text, symbols, numbers, or keyboard shortcuts. You can use it to interact with any Windows-based program." -
16 milestone
"A point on the project schedule at which the project team assesses progress and quality, and reviews deviations in scope and specifications. A project may have many interim milestones for internal use only, which signal a transition within a phase and help divide large projects into workable pieces. External milestones or major milestones typically occur at the end of major phases of work and are associated with the completion of major deliverables. External milestones are the points where the team and customer review work to date and agree to proceed with the project, appear as a task with a duration of zero work units, and are exposed on customer reports." -
17 Windows.UI.Xaml
The APIs that developers can use to create the UI for their Windows app if they use a language other than JavaScript and/or if they have experience with XAML.Windows.UI.Xaml -
18 Windows Store app built for Windows using JavaScript
"A Windows Store app that uses HTML, CSS, and JavaScript, can use the standard Windows UI controls, has access to the Windows Runtime APIs, and can leverage the extensibility offered to Windows Store apps. These apps use CSS for their visual styling with Windows UI controls to create a native look and feel."English-Arabic terms dictionary > Windows Store app built for Windows using JavaScript
-
19 command line interface
"A form of interface between the operating system and the user in which the user types commands, using a special command language. Although systems with command-line interfaces are usually considered more difficult to learn and use than those with graphical interfaces, command-based systems are usually programmable; this gives them flexibility unavailable in graphics-based systems that do not have a programming interface." -
20 command-line interface
"A form of interface between the operating system and the user in which the user types commands, using a special command language. Although systems with command-line interfaces are usually considered more difficult to learn and use than those with graphical interfaces, command-based systems are usually programmable; this gives them flexibility unavailable in graphics-based systems that do not have a programming interface."
См. также в других словарях:
Use case — A use case is a description of a system’s behaviour as it responds to a request that originates from outside of that system.The use case technique is used in software and systems engineering to capture the functional requirements of a system. Use … Wikipedia
use — 1 / yüs/ n 1 a: an arrangement in which property is granted to another with the trust and confidence that the grantor or another is entitled to the beneficial enjoyment of it see also trust; statute of uses in the important laws section ◇ Uses… … Law dictionary
Use of Free and Open Source Software (FOSS) in the U.S. Department of Defense — is a 2003 report by The MITRE Corporation that documented widespread use of and reliance on free software (termed FOSS ) within the United States Department of Defense (DoD). The report helped end a debate about whether FOSS should be banned from … Wikipedia
Use of Beads at Prayers — Use of Beads at Prayers † Catholic Encyclopedia ► Use of Beads at Prayers Beads variously strung together, according to the kind, order, and number of prayers in certain forms of devotion, are in common use among Catholics as an… … Catholic encyclopedia
Use case model — is a model that describes a system’s functional requirements in terms of use cases. Consists of all the actors of the system and all the various use cases by which the actor interact with the system, thereby describing the total functional… … Wikipedia
Use of webcams — at work and home has become a world wide web cultural revolution or change in how we communicate with each other. It can be broken down into positve, negative, freedom of expression or speech and what the future of webcam internet technology may… … Wikipedia
Use of York — Use of York † Catholic Encyclopedia ► Use of York It was a received principle in medieval canon law that while as regards judicial matters, as regards the sacraments, and also the more solemn fasts, the custom of the Roman Church was… … Catholic encyclopedia
Use of Weapons — … Wikipedia
Use (law) — Use, as a term in real property law of common law countries, amounts to a recognition of the duty of a person, to whom property has been conveyed for certain purposes, to carry out those purposes.Uses were equitable or beneficial interests in… … Wikipedia
Use — Use, v. t. [imp. & p. p. {Used}; p. pr. & vb. n. {Using}.] [OE. usen, F. user to use, use up, wear out, LL. usare to use, from L. uti, p. p. usus, to use, OL. oeti, oesus; of uncertain origin. Cf. {Utility}.] [1913 Webster] 1. To make use of; to… … The Collaborative International Dictionary of English
Use case survey — is a list of names and perhaps brief descriptions of use cases associated with a system, component, or other logical or physical entity. This artifact is short and inexpensive to produce early in the analysis or envisioning stages of a software… … Wikipedia