- self-checking code
- код с обнаружением ошибок
Большой англо-русский и русско-английский словарь. 2001.
Большой англо-русский и русско-английский словарь. 2001.
Self-checking — Cliente utilisant un système NCR. Le self checking (de l anglais, self « soi même ») est un système permettant au client de scanner les produits qu il souhaite acheter, en utilisant un lecteur de code barres directement à la caisse . Il … Wikipédia en Français
Self-scanning — Présentoir à lecteurs de code barres à l entrée d un magasin. Le self scanning (de l anglais, self « soi même ») est un système permettant au client de scanner les produits qu il souhaite acheter, en utilisant un lecteur de code barres … Wikipédia en Français
Code 39 — A Code 39 Barcode Label WIKIPEDIA encoded in Code 39 Code 39 (also known as Alpha39, Code 3 of 9, Code 3/9, Type 39 … Wikipedia
Inaccuracies in The Da Vinci Code — This article is about the controversies regarding the novel. For other uses, see The Da Vinci Code (disambiguation). The Da Vinci Code, a popular suspense novel by Dan Brown, generated a great deal of criticism and controversy after its… … Wikipedia
Duck typing — Type systems Type safety Inferred vs. Manifest Dynamic vs. Static Strong vs. Weak Nominal vs. Structural Dependent typing Duck typing Latent typing Linear typing Uniqueness typing … Wikipedia
Buffer overflow — In computer security and programming, a buffer overflow, or buffer overrun, is an anomalous condition where a process attempts to store data beyond the boundaries of a fixed length buffer. The result is that the extra data overwrites adjacent… … Wikipedia
ABAP — Infobox programming language name = ABAP/4 logo = paradigm = Object oriented, structured, imperative year = 1980s designer = SAP AG typing = Static, strong, safe, nominative implementations = SAP R/2,SAP R/3 dialects = influenced by = Objective C … Wikipedia
Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… … Wikipedia
ГОСТ Р ИСО/МЭК 19762-2-2011: Информационные технологии. Технологии автоматической идентификации и сбора данных (АИСД). Гармонизированный словарь. Часть 2. Оптические носители данных (ОНД) — Терминология ГОСТ Р ИСО/МЭК 19762 2 2011: Информационные технологии. Технологии автоматической идентификации и сбора данных (АИСД). Гармонизированный словарь. Часть 2. Оптические носители данных (ОНД) оригинал документа: 04.02.13 ( n, k)… … Словарь-справочник терминов нормативно-технической документации
Addressing mode — Addressing modes are an aspect of the instruction set architecture in most central processing unit (CPU) designs. The various addressing modes that are defined in a given instruction set architecture define how machine language instructions in… … Wikipedia
Algorithmic efficiency — In computer science, efficiency is used to describe properties of an algorithm relating to how much of various types of resources it consumes. Algorithmic efficiency can be thought of as analogous to engineering productivity for a repeating or… … Wikipedia