- المجال: Computer
- Number of terms: 318110
- Number of blossaries: 26
- Company Profile:
An American multinational software corporation headquartered in Redmond, Washington that develops, manufactures, licenses, and supports a wide range of products and services related to computing.
The part of a hyperlink in a document or Web page that displays as text on the screen.
Industry:Computer
A mailbox server that is installed in a Windows failover cluster. A clustered mailbox server is used in both cluster continuous replication (CCR) and single copy cluster (SCC) configurations. A clustered mailbox server was called an Exchange Virtual Server in previous versions of Exchange Server.
Industry:Computer
A user-entered value or value from a static source that does not change unless manually altered by the user.
Industry:Computer
A set of characters that Live Meeting uses to simulate pauses or telephone keystrokes so that it can automatically dial an audio conferencing partner and connect to a meeting. For example, a comma represents a pause.
Industry:Computer
An ordered collection of members that uniquely identifies a cell, based on a combination of attribute members from every attribute hierarchy in the cube.
Industry:Computer
The common user interface elements rendered around each Web Parts part control within a given zone. The chrome for a part control includes a border, a title bar, and the icons, title text, and verbs menu that appear within the title bar. The appearance of the chrome is set at the zone level and applies to all part controls in a zone. The rendering of chrome and of individual System.Web.UI.WebControls.WebParts.WebPart controls is handled by the System.Web.UI.WebControls.WebParts.WebPartChrome class.
Industry:Computer
A file that is identified to be included at the beginning of a program in a language such as C and that contains the definitions of data types and declarations of variables used by the functions in the program.
Industry:Computer
A type of security management system for computers and networks. Intrusion detection systems (IDS) provide real-time monitoring of network traffic. An IDS can detect a wide range of hostile attack signatures (patterns), generate alarms to alert operations staff and, in some cases, cause routers to terminate communications from hostile sources.
Industry:Computer
Segmenter une seule table en plusieurs tables basées sur les lignes sélectionnées.
Industry:Computer