Sie sind auf Seite 1von 76



GA @
 J@ A@

Q 
m.' @
G. Q

Arabic English
Technical Computing Dictionary
Qm '@ K PA @ IK QK K Q

Free Software Arabisation Team


http://wiki.arabeyes.org/Technical_Dictionary
Version: 3.0.15-02-2013
February 15, 2013

This is a compilation of the Technical Computing Dictionary that is under development at Arabeyes, the Arabic UNIX project. The technical dictionary aims to to translate
and standardise technical terms that are used in software. It is an effort to unify the terms
used across all Open Source projects and to present the user with consistant and understandable interfaces. This work is licensed under the FreeBSD Documentation License,
the text of which is available at the back of this document. Contributors are welcome,
please consult the URL above or contact doc@arabeyes.org.


 @ Y QK AK Q Q Q QK  K Y@

 

.
.



J@
G. Am '@ A j Y
.KJ
 YE
 J@

 J @ J J  J@ HAj

AK. D

@ YJ
kK  g. QK @ A@

.  J
 @
 H Ag k
 @ ' Y J g Q @ K H PA J@ XA J ,H Am '@ l @QK  g QK

. .
.
.
. . .


 K X @ G Q
 kP A@

 kP . J K QAK J @ Yj J j
 

ZA
.

. .



ZAg Q@ , A @ K IkQK .A@
 K AE Q
J @
AB@ @ C @ @ J@
@ H. A Y@
.

. .

. doc@arabeyes.org

 AJ ,( @X)
 A@
m . QK.) K
.
(@ X
Missed call,
I KA A@
Multiplexing,
XYJ A@
License agreement,
J
k Q@ J
A K@
Agreement,
A K@
Calling convention,
Z@YK A K@
Hot Key,
hAJ @ A K@
Shift key,
hAJ @ A K@
Prevent,
I.
Jm .' ,ZA K@
Autocompletion,

KA  K A@
Finalize,
AJJk@ , A@ ,A @
Finish,
ZAE@ , A@ ,A @
. , HAJ
 . K@
Proof,
AQK
P A@
QK @
Mouse trails,
Adaptive answering,
J
J
K K . Ag. @
Response,
K . Ag. @
 P@ , K A@
@
 JJk. @
Deforestation,
K . A@
. HA




Pull,
I.m , Qk. , H. @ YJk. @
Audiographic teleconferencing,
AJk. @
J
m '
YK.



Video conference,

KQ AJk. @
 Qk. @
Fallback procedure,
k. @Q@ H@Z@
Action,
Z@Qk. @



Z@Qk. @ , A Z@Qk. @
Defunct process,
IJ

Z@Qk. @
Defunct process,
A Z@Qk. @ , IJ
Orphan process,

JK
Z@Qk. @
Parallel processing,
m . 'A , P@ J Z@Qk. @
K
P@ J
Procedure,
Z@Qk. @


Runnable process,

J
  Z@Qk. @
General,
A ,
Ag. @
.@
Abort,
Ak

Continuation,

.@
P@ QK. @ , KAK




Initial,

K@YK. ,
K@YJK. @

Alphanumeric,

XY
Ym.'. @

Numeric,

XY
Ym.'. @
 @YK @ ,  Qm '@ @YK @
Packet switching, PQ@
.
.


@YK. @
Packet switching, Qm '@ @YK. @ , PQ@

Never,
  , @YK. @
E B , YK @
Endless,

KA

.
Highlight,
P@ QK. @
. @ , P@ QK. @
Highlighting,
KAK
 

Pin,
, QK. @
.@
Epsilon,


Revocation,
I.m ,A. @
,XAK. @
Dismiss,
Q
@
, CK
Declaration,
J
KC
.
Swallow,
K. @

Parent,

K. @

White,
J
K. @
 K@
Accessibility,
kA


Direction,
Am.' @
Orientation,
J
k. K , Am.' @
Renew,
YK
Ym.' @
Discriminated union,
  J XAm' @
Disjoint union,
XAm' @ , @ m XAm' @
J
Disjoint union,
m XAm' @ , J XAm' @
@
 ,A@
Span,
QK
.


Connective,
. @P ,
A@
Connect,
A@
Connection,
A@
Contact (verb),
A@
Highlighting,

 PAJJk@
PAJ.Jk@ ,
.
A
PAJ.Jk@
Functional testing,





Heuristics testing,
J
.@ PAJ.Jk@
. PAJ.Jk@
Hybrid testing,
j
Manual testing,

YK
PAJ.Jk@
Test,
PAJ.Jk@
Yg@ PAJJk@
Test Module,
.


Finalize,
A @ , A @ ,AJJk@


Picker Settings,
H@X@YB
@ Qg@
Beta reduction,
AJ
K. @Q g@
Jk@
Type mismatch,
J@
C
  

Probability,
K ,AJk@
Choice,
PAJ
Jk@
Choose,
PAJ
Jk@

Domain selection,
Aj. @ PAJ
Jk @
Multiselection,
XYJ PAJ
Jk@
Picking,
ZA JK@ ,PAJ
Jk@
Select,
PAJ
Jk@

Serve,
Yg @

Ping-pong,
XP Y g @
,h @Qk@
Input/output,
AgX@
.



I/O subsystem,
AgX@ A ,
Q h. @Qk@

Other,
Qk @

Green,
Q k @

Cache miss,
AJ.m ZAk@

ZAk @
Minor faults,
Q

Hide,
ZA k@
 g @

C
Computer ethics,
H. Ag HAJ
ZCg@
Disclaimer,
J


Disassemble,
,g@

 g B@ ,H @X@
Ethics,
AJ. @ , C
. 



 AJ@ H. @X @
Netiquette,
J.@

Exhaustive testing,

XAg @

Monochrome,

XAg @

Cross-reference,
Ag@

Referral,
Ag@



Convergence,
XAk@
Congestion,
A  Jk@

Probabilistic,
J
AJk @

 . AJ
Jk@
Operational requirements, , J
HAg
 . J
J
HAJ
Requirement,
I.J ,h. AJ
Jk@
 ,AJJk@ q ,AJJk@
Backup,
j

J
AJJk@



Spare,

AJ
Jk @
Standby,

AJ
Jk@

K@Yg@
Cartesian coordinates,
J
KPAK
X HAJ
@ ,P@ Qk@
Scoring,
PQk
@
Scoring,
P@ Qk@ ,PQk
Sense,
j.J ,Ak@


KAk@
Statistics,
HAJ


Statistical,
KAk @



Enumeration,
X@YK ,ZAk@
 ,Cg@
Replacement,
@YJ.@

g
Red,
Q @

News,
PAJ.k @
 PAJJk@
Acceptance testing,
J.@
 .
Automated testing,

@ PAJ.Jk@
Beta testing,
AJ
K. PAJ.Jk@
Branch coverage testing,
J
K PAJ.Jk@
Q J@
Confidence test,
 K PAJ.Jk@
Exhaustive testing,
PAJ.Jk@ ,A PAJ.Jk@


Half-duplex,

Am.' B@

@

Send,

AP@
Simultaneous shipment,

P AP@
Anchoring,
ZAP@
Dock,
ZAP@
 ,() P @
Post,
AP
Submit,
Q@ ,P@

 P@
Guideline,
H@XA

Archiving,
 P @

Archive,
J
P @

Personal Package Archive,
Qm '@ J
P @


j @

Constraint satisfaction,
XJ
 ZAP@



Attach,
AP@

Digits,
AP@

 AP @
Random numbers,
X@Y @ , J
K@

J
K@
 @
Widow,
P
 P@
Indentation,
k@


Shift,
k@P@
@
 P@
 @

Anti-aliasing,





Antialiasing,
@ @P@
 P@
Comment out,
J
K @










Deforestation,
K. A@ HAJJk. @ , K. A@ @P@
 @
 P@
Defragment,
J
 @










Deinstallation,
I
J.J@ , I
J.J@ @P@
 P@
@
Remove,


Hassle,
h. AP@


Deadlock,
P A ,  P @
E-zine,
P@

Weeks,
J
K. A @
YA , A @
Base,
A
 @
Software Foundation,
PA
. @
Microfortnight,
QJ
AJ

Administration,
Change management,
Manage,
Management,

Q
J
J@

P@X@

P@X@

P@X@

P@X@

P@X@
P@X@

P@X@

P@X@
P@X@

Q@ X
 @
Network management,
J
.

Power management,
A@

Project management,
K
PA
System administration,
A J@
Administrative,

P@X@
@
Deprecate,
@X
Q 
QK @X @
Encoder,
@X @
Tool,

Deprecation,
K@ X@

Input/output,
h. @Qk@ ,AgX@

Insert,
h. @P X@

Declare,
C@ ,ZBX@
Dissolve,
K . @ X@
XYJ @
 X@
Multicast,




Go,
@ ,I. X@

X @
File permissions,

Qg ,AK P@
Perplexity,
.



Quarantine,
J
J
K. P @
Dependence,
J
J.K ,AJ.KP@
Keybind,
hAJ @ AJ.KP@
Key binding,
hAJ @ AJ.KP@
 Qk P , A
Jitter,
k
. .  KP@
Height,
A KP@
Increase,
PAJ@ ,YA ,YK
@Q K ,A KP@
 K ,I KP@
Expect,

.

Kernel panic,
Q X ,AJ
KP@
Deferral,
ZAg. P@

Magenta,
G@ k. P @
Memory management,

P@QJ@
Clone,
q J , pA J@
Duplicate...,
... pA J@

Authentication,
A JJ
@
Import,
X@Q
J@
Cylinder,
K@ @


J
X , P @
Legend,
HAj
@
Bottom,


Projection,
A@

Ascii,

@
 @
Continuation passing style, QK
Q H
.

 AJ
K
.


Indent style,
k@PB @ H. @

Names,
ZA @
 PA @
Absolute pathname,

. @
Backronym,
AJ
Qk

Basename,

A @ @
J @
Canonical name,
J
PA
. '@ @
Device name,
PAm
Domain name,
Aj. @ @
@
File name,

@
Filename,

Full pathname,
A PA @

Host name,
J
@ @
@
Hostname,
J


 J J
Logical-hostname,

@
Login name,
h. @ @
Name,
@

Nick name,
PAJ @
Pathname,
PA @ @
@
Private hostname,
,
k J

m J
@
Persistence,


J. @

Workweek,
J. @

Resume,
K AJ@

Replacement,
Cg@ ,@YJ.@

Replace,
YJ.@

 KA J J@
Exceptions,
HA




Exception,
ZAJJ@


Mutual exclusion,
XAJ.J ZAJ J@
J@
Memorandum,
Qm ,PAj




Maturity,
AjJ@

Inquire,
ZA ,Q.j J@
Extract,
h. Qj J@
ZAYJ@
Function call,
J



Invoke,
ZAYJ@
Z@Qk. @ ZAYJ@
Remote procedure call,
YK .
Evolution strategy,
K
P J
m.' @Q@
Loopback,
Ag. Q@
Recover,
Ag. Q@
Redemption,
X@XQ@
Explore,
CJ@
XAJ@
Recovery,
Restore,
XAJ@
Q
J
J X@YJ@
Changeover,
Query,
CJ@
Usage,
AJ@

J.@ C J @
 KAJ
Data mining,
HA


Inspection,
Y  K ,ZA J @

C J@
Device-independent, Q
j.J@

 

Form,
, PAJ@


Continuation, ,(@ X m. QK.) K. AJ ,P@QJ@
 A@
( @X)
Continue,
P@QJ@
Week,

P@Y@ ,
P P@Y@
g. A
Version,
P@Y@
PY @
Versioning,
@
Yellow,
Q
Bug fix,
g hC@
Fix,
hC@

@
Original,




@ ,
Ethics, Cg B@ , H
@X
@
,
AJ
@

.
.

Native,
J
@
Add,
A @
Additional,

A @
Auxiliary,

A @
Extra,

A @
More,
A @
Illumination,
QK
J K , KA @
Child window,

Q PA@

YA PA@
Data frame,
HAJ
Frame,
PA@


Frames per second,
J
KA J@
PA@
PA@
Internal frame,

g@X



Page frame,
j@ PA@

 PA@
Palette window,
@ B@ k





Window frame,
YAJ@ PA@


 . , kQ
Dissertation,
IjJ
@

Firing,
C@


Show,
PA@
Unhide,
PA@
Reboot,
C@ XA@
Reconnect,
A@ XA@
Redirect,
J
k. K XA@
Redirection,
J
k. K XA@
XA@
Redo,

Immediate version,

@
@ ,
m  J

k J

Root user name,

P Ym . '@ Yj J @ @
 @
Sitename,

Textual name,
@ @
Username,
Yj J @ @
User name,
Yj J @

Assignment,
XAJ@



Q
Creeping featurism,
H@ 
@ AD@
 ,D @
Quota,
k

Exponential,

 @
  @
Frequently asked question, K. k. @ J

Exponent,
@
 @
Credits,
H@XA

PA@
Carrier signal,
Ag



Signal,
PA@
, PA@
Sign,
QP

Color saturation,
@ @ AJ.@
Submission,
@Q@
Submit,
P@ ,Q@
Notice,
PA@
Certify,
XAD@

Cache hit,
AJ.m K. A@







Preformat,
K
YJ
JJ
E , K
YJ
 A@


Versions,
H@P @Y@
P@Y@
J@ Q@

Demo version,

jJ

 P@Y@
Major release,
A


Release,
P@Y@
Beta version,
AJ
K. P@Y@
Bug fix release,
i P@Y@
Immediate version,
P@Y@ ,g. A P@Y@

P
Private hostname,

Sheets,
Snooze,
Close,
Closure,
Halt,
Locking,
Avatar,
Dummy,
Best effort,
Horizontally,
Horizontal,
Handshake,
Handshaking,


J
@
 , ZA @

C@

C@





AK
@ , C@
 @
A @ , C



PAJ @
JX , YA , @ Q @

 g)
Yk
@
(... Y
. 
AJ
 @

 @
 @
AB @ A





YJ
AK , A@ A@
A@

)
Enterprise,

Quotation,
Quote,
Proposition,
Suggest,
Suggestion,
Conjunction,
Restrict,
Restriction,
Crop,
Older than,
Eject,
Approval,
Approve,
Play,
Max,

YK
Yg. Q ( AJ.@ )

AJ.J@
AJ.J@
h Q ,h@Q@
h@Q@
h@Q@
@ Q@
PAJ@
PAJ@
AJ@
Y @


Y  @
P@Q@
P@Q@
 ,ZQ@

 @

J@ XA@
J

Regenerate,
YJ
K XA@

J.J@ XA@
Reinstallation,
I
Reload,
J
m' XA@
Reorganize,

J K XA@
 @
X@Y@ XA@
Repaginate,
j
X@Y@ XA@
 @
Repagination,
j
Repeat,
YK
XQK ,P@QK , XA@
Resize,

j.m' XA@
Restart,
J
  XA@
 XA@
Restructuring,
J




Reuse,
AJB @ P@QK ,AJB @ XA@
Dependency,
K
XAJ@
Credential,
XAJ@
Classic,

YJ
 K ,
XAJ
J@

J@
Sampling,
AJ


Settings,
H@X@Y@
 


Random numbers,
AP @ , J
K@ X@Y @

J
K@
Setup (Configuration),
X@Y@

Display report,
QK
Q J@ Q@
@
Play,
ZQ@ ,  , Q
@
Q. @ ,

Greater,

@
Reverse video,
K
YJ
@

Announce,
C@


Announcement,
C@

Declare,
ZBX@ , C@




Poster,
, C@
  @
Highest,
@ , J



Highest,
J
@ , @

Meta,
@

@
Elite,
J . m ' ,ZAk. , AJ

Flood,
Q @
Refactoring,



JJ @ X@Y B@


Current working,
A  B@ , K
PAm. '@ A B@
K
PAm. '@

Maximum,
 B@

Optimal,
J B@
Standard deviation,

PAJ
@ @ Qm' B@

@
Forward compatibility, , J.J @ Aj.B




J.J @ K. A J@
 P
  B@
@
Distributed systems,


 @
Breadth-first search,
B @ QAK
IjJ
 .  .
Depth-first search,
B @ AK. IjJ.@
Portuguese,
J
A KQ.@
 J Qm '@ HAJ

m.Q.@
Floss,
- PY @ k

hQ
PJ
K  @ Q.K P X : B PAJk@
. @
Polish,
K
YJJ
K
X AJ@
Functionality,
J
J
@

Xm '@
Quality control,
. Y AJ@
Next,

AJ@
E-commerce,
J
K QB@ PAj.J@
Electronic commerce,
J
K QB@ PAj.J@

Cybernetics,

B@ jJ@
Modulation,

K Q@

Registration,
J
j.@

Key-encrypting,
iJ
KA AK. Q
 @
Forward compatibility,
, J. J @ K . AJ@

J. J @ Aj.B


Normalisation,
J
J.J@
J@
Speech recognition,
C@ Q
Public-key encryption,
hAJ AK. J
J@

@

Word wrap,
HA@
A J@
Capture,
A J@
Collect,
A J@
Triangular numbers,


XY  @
P@
 @ ,A @
Locking,
C



Boot,
C@
Booting,
C@
Region,
Q ,
@

Less,
 @
 @
Less than,


Lower,
 @
@ ,

Q. @
Greater,

Q
. @
Greater or equal,
A @
Q . @
Greater than,


Write,
I.J @

Acquire,
H. A@

Detection,
A  @

Error detection and correction, A @

ZAk B@ iJ
j

Presence detect,
Yg. @J@ A  @







Increase,
YA ,YK
@QK ,AKP@ ,PAJ@

AK. A@
Exabyte,
IK
Extranet,
I K@ Q@
Finalize,
A @ ,A@
Finish,
A @ ,A@

Lowest,
GX B@

Minimum,
GX B@

Mantissa,

Q@ ZQm . '@ ,


Q@ A B@
 
Fault tolerance,
Aj K. Aj.JB@


Current working,
A B@ , K
PAm. '@ A  B@
K
PAm. '@

PAB @ ,A B@
Key frame, J
KQ@


PAB @
Key frame, A B@ PAB
PAB @
@ ,
J
KQ@


Parent window,
B@ PAB @

Primary window,

A B@ PAB @

 K Q @ X@Y B@
Square numbers,

.
Solid lines,

Brightness,

@

Sanskrit,
J
K
Q@
 J @ @
Jaz Drive,
k


XDMCP socket,
J
j @ I@
Swedish,
K
YK
@
Sweden,
YK
@
 @
Network, the,
J
.
 @
Company,
Q
 J , Q
 @
Organization,


North,
A@

Source code,
J
@ QJ
@

Paste,
A@




Glyph,
K
QQ@ P@
@
Demand,
I. @ , PQ
@

Warranty,
A
 @ J @
Physical layer,

.


Threshold,
: J.J@

At sign,
@ C@

Physical address,
@ @ J@
@ J@

Virtual address,

QA@

Cancel,
ZA@


Echo cancellation,
Y@ ZA@


Q  J@ ZA@
Pending signals,
? J
J . J @ HCK




Unlock,
@ ZA@
 ZA@

Unsubscribe,
J
j.@





Floating-point,
A@ A@

Alpha,
A @
j@

Power-on self-test,
YJ
G@ Y@
 @
CB





Metric space,

Q @ Aj. @ ,
Q @ ZA@


J.J
J
@
Philippines,

Aleph,
@

 A J@
A @
Distort,
  ,Z@J@

Mantissa,

Q@ A B@ ,
Q@ ZQm . '@
Southbridge,

G. Jm . '@ Qm. '@


 '@
Current session,
J
Am '@ m
.

Append,
Am '@
 '@
Induction,
Im

B@
Infimum,

GX B@ Ym '@

Fields involved,
PJ @ m '@

@ Ag
 m '@
@
Q
,k
@
Fall back,
Zj
.
.

m '@

Fallback,
Zj.@ ,k. @Q@ Ag

Parallel computing,
K
P@ J @ J . m '@

(J
 @)
Quantum computing,
J
@ J . m '@

Lavender,
@ Q m '@
Escape,
m '@
,(...t '@
Validate,
l. @Q.@ KA




FIFO,
B @ h. PAg , B @ g@Y@


First in first out,
B @ h. PAg , B @ g@Y@


First-in, first-out,
B @ h. Qm 
' B @ g@Y@

 
Last-in first-out,
B @ h. PAg , @Qk @ g@Y@

 
LIFO,
B @ h. PAg , @Qk @ g@Y@
Current directory,

Am '@ J
Y@
Root directory,
P Ym . '@ J
Y@
Cron,
K
PY@
 

Physical memory, Q@ Y@ , @ Q@ Y@
 
AJJk Xk. @
   


Physical memory, , AJ
J
k Xk. @ Q@ Y@

 @ Q@ Y@


Magic number,

Qj@ Q@

First customer,
B@ K
. Q@

Scrolling,
Q@
Previous,
K . A@
Screen capture,

 
B @ QB@
@

 
Implicit parallelism, @P@ @ , JJ
Y@ @P@ @

 @

@ @P@ @
Implicit parallelism, @P@ @ , 


JJY@


Earliest deadline first, QK. B@ B@ Y @

B @
Timer,
I  @
 @
@ , I KQ @
Expected location,
A
.
I. KQ @
 @
Literature,
HA
Midi,
YJ
@
Custom window,
J
kCB @  Y A J@
 A J@
USB,
(@) A@
@
 J@
Result,
jJ

Copy left,
J
j. q@
Nickle,
J@

Kernal,
I.@ , @J@

Hindi,
K
YJ@
 J @ K @
Openid,
k



Abstract machine,
XQm.  @
    
 
Digital camera, J
P Q , J
P QK
 @

Instrument,
 @

Machine,
H. Ag ,  @

Pocket calculator,
I.J
j. J . Ag  @

K
 @
Von Neumann machine,
AJ
WAP,
H. @@


Primary Colors,
J
@ @ @

Secondary Colors,
K
KA K @ @

Description,
@
@
Optical fiber,
K
AJ




Optical fibre,
K
AJ
@

Automatically,
AJ
@
Shortest job first,


Q @ A@

B@

 , PY@

 @

 , PY@

 P @Q@
H@
 , @

PY@
  Q
J
P HAJ

K  @
Q@

G
J
KAQ@

AJ KC@
@J@ ,I@
.
Ag m '@ , Zj
@
.
Ag
m '@ , Zj
@
.


I.@

B@ k@

Greatest common divisor,

Force,
Power,
Resolutions,
Force,
Digital electronics,
Electronic,
Chrominance,
Infinity,
Kernal,
Fall back,
Fallback,
Nick,
Motherboard,
Diamond,

k. @Q@
k. @Q@

A @
Computer literacy,
H. Am 'AK. A @
, Q @ Aj @
Metric space,

Q @ ZA @

.
Parent directory,
B@ Yj. @
j @
Subtotal,

Q@
  .
Stock Ticker,
:
J.J @ Qj @
Bibliography,
k. @Q @

Real user,

@@ Yj J @
Receiver,
J. J @
PQ
@ ,I @
Demand,
.

Equation,
XA @
 @ ,I KQ @ A
@
Expected location,

.
I. KQ @
J @
Intellectual property,
K
Q@


J @
Symbolic logic,

QQ@

Look and feel,
Ak B@ Q J @
  J@

Exclusive OR,
:

I K@ QK@
Internet,
I K QK@
Back-propagation,

g PA K@
Propagation,
PA K@
Waiting,
PA JK@
Enlargement,

j  ,pA JK@
Picking,
PAJ
Jk@ ,ZA JK@
ZA JK@
SYLK file,






Target file,
ZAJK@


 DK@
Timeout,
, @ I
Skew,
@ Qm' @
Alert,
J
J. K ,P@ Y K@
Warning,
P@ Y K@
 @ q@
Copy and paste,




Create,
ZA@
Creation,
ZA @
m ZA @
Tar archive,



Meltdown,
PAD@



Ethics, @ , Cg B@ , H
. @X @ ,AJ.@
Additive,

A @
Join,
A @
YK Yg j
 
Pagebreak,

. C@
 @
Go,
I. X@ ,


Embedding,
Q ,PA@



Q  @
Qj JK
Eigenvectort,
 K@
Refresh,
A
Divergent,

YAJ.K ,
k. @Q K@
Divergence,
YAJ.K ,h. @Q K@
Fork,
   ,h. @Q K@
Divergence,
h. @Q K@ , YAJ.K , @ Q K@
Split,
A K@
Expire,
J
kC@   K@
. (J.)
 A K@
Abortive release,
m

Intranet,


J
@

Sandbox,
@ YK
Ym' J
@
Journal,
J
J
@

Auto,

@

Automatic,

@

Bot,

@

Forward,
A B@ @


Foreground,
Q J @ J
A @ , k@
J
A @



Foreground,
k@
J
A @ ,Q J @ J
A @
@
Security,
A
Q
J. @
Amper,
@ X@YJ@
File extension,



Extension,
X@YJ@
@ X@YJ@
Filename extension,


J@
Priviledge,
PAJ

J@
Privilege,
PAJ

Optimise,
 J @

Optimization,
 J @

Optimize,
 J @

Command,
Q @

Directive,

D
k. K Q @
ZA
@
File signature,


Signature,
ZA@


@
Computer security,
QKJ
J.@
@
Safe,

 ,
@
Safety,
K
A
@
Secure,


Miles,
AJ
@
Em,
@

Mother,
 @
A A@ K JK @
Named pipe,
. .


H. J.K @
Cathode ray tube,

XKA H@Qk

Pipe,
H. J.K @
Mechanism,

 ,(H. AJ) H. AK.


 .
Beamer,
HAK
, J JAK
Internal,
J
g@X

.
,AK

Inside,
g@X

 .
Mailer,
YK
QK. IAK.
Remaining,
 AK.
Percent,
J AK.

 , AK
Parcel,
Q
.


Heat sink,
P@Qk AK.

Constructor,

GAK
.




Loose bytes,
HAJK
AK.

AK.
. , IK
Byte,
Qk
  X Q
 KAK

Value added retailer,
J

.
A


Vendor,
KAK
.








Bit,
P X , J
KAJK , JK .
IK
.
Check bit,
j@
 . , h. @Q @ IK
.
Parity bit,
J
k. Q@ IK








Q
Parity bit,
h. @ @ IK . , J
k. Q@ IK .
.
Broadcast,
IK
 '.
Beam search,
J
AX Im
 '.
Binary search,

KA J K Im
 '.
Find,
( ) PJ , Im
 '.
Lookup,
Im
 '.
Search,
Im
P
 '.
Im
Weighted search,


Intuition,
@YK
.


Scratch,
.(Q) Z
B , K
@YK.
Start,
K
@YK.
JK @ ,K@YK

Initial,

K@Y
.
.
.
Listless,
 A YK

None,
Z
 B , Yg @ B , YK
.


No numbering,
X@YK YK.
Section,

A K@

Priority inversion,
J
B@ H. C K@
XAJ
 K@
Functional dependency,
,
J


JK AK
JJ


.
Finish,
A@ ,A @ ,ZAE@
Terminate,
.ZAE@
Crash,
PAJ
E@

Real-time,

G @

Objects,
@Y@

Hello World,
AAK. C @
Ellipse,
i.J
@
Ellipsoid,

j.J
@

Bus priority,
@ K K
@

Priority,
K
@
 PY@  @ ,IKQ@ @
First-order,
k
.

.




First-order,
I.
KQ@
@ , k. PY@
 @

Leading,

XAJ
 ,
J
KP ,
@

Primary,

@

Or,
@
Commit,
@YK
@

@
Iceland,
@YJ
Dispatch,
XAK
@
Rhythm,
AK
@
 @ , A K @
Halt,
C






Shut down,
J
 @ AK
@
Q

HA
 K K
@
Mini icons,

Icon,
K K
@
 Y A J@ K K @
Window icon,

September,
K
@

Hello, world,
AJ.kQ ,A@ AE
@
Break (program),

Portal,

H.

K . @K. ,H. AK.

Hyperware,
Shareware,
Malware,
Software,
Antivirus software,
Backup software,
Charityware,
Computer program,
Functional program,
Metaprogram,
Program,
Schedueler,
Spyware,
Startup Program,
System software,
Proof,
Span,
Electronic mail,
Email,
E-Mail,
E-mail,
Mail,
Mail to,
Phone mail,
Voice mail,
Flash,
Applet,
Naive,
Buzz,
Numerator,
Simple,
Visual,
Computer vision,


m. QK.
 KA HAJ

m. QK.
J
J.
 HAJ
J
J.k J
m. QK.
J
m. QK.
XA
l AKQK

 Q

HA
. .
.
AJ
Jk@ l. AKQK
.

Q
g l. AKQK
.
H. Ag l. AKQK
l AKQK

. .
@ l . AKQK.
.
l. AKQK

.
Ym. , Yg
. l. AKQK
.
m.' l. AKQK
.
J
  ZYK. l. AKQK
.
A J@ l. AKQK
.
 . K@ , AQK
HAJ

A@ , QK
.
G Q@ YK QK


Q

G @ YK
QK.
Q@) YK QK
(
G

.
G Q@ YK QK

YK
QK.
@ YK
QK.

KA YK
QK.

G YK
QK.
K
QK.
i.
QK.

h. XA ,Z
QK.
QK . QK .
   .
D ,J
.

Q.

G. Ag Q.

Alternative,

K
YK.
Relay,
A J ,K
YK.
Axiom,
J
E
YK.
Quickstart,
K
Q (J
 ) ZYK.
Starting,
ZYK.


Startup,
J
 @ ZYK.
P YK
Stub,
.

Dirty,
t ,Z
YK.
Legacy software,
J
K@QK l. @QK.
Programs,
l. @QK.
Braille,
K
@QK.
Portugal,
A KQK.
Orange,

A KQK.
Aspect-oriented programming,
m . QK.

QA AK. k
.



Configuration programming, J
 m. QK.

Constraint functional programming, m. QK.

K
YJ
 J
J

  
Evolutionary programming, K
P m. QK.
m . QK.
Functional programming,
J
J

 J k m QK
Generic programming,


. . .

Linear programming,
J
k m . QK.
 J m QK
Logic programming,
J

. .

Microprogramming,
QJ
m. QK.
XYJ m QK
Multiprogramming,
. .





Object-oriented programming, J
KA m. QK.
Jk
. m . QK.
Paranoid programming,

H. AJ
KPB @
Programming,
m . QK.
Reverse engineering,
J
m . QK.
 B@
m QK
Systems programming,

. .


Free software,
Qk HAJ
m. QK.

m. QK.
Freeware,
J
KAm . HAJ

J
K .
Infrastructure,
J
K .
Structure,
J
K .
Gate,
K . @K.
Gateway,
K . @K.
 J K @K
Logic gate,
J

. .

Portal,
H. AK. , K. @K.

Proxy gateway,
J
K . @K.
HK
 .
Knowbot,
Q
Baud,
XK.

Focus,
P K .
 

Keyboard focus, Q
QK , iJ
KA @ k P K
.



iJ
KA @ k

Inch,
K
.


Data,
HAKAJ
K.

K.
 KAJ

P , QAJ. HA
Direct graphic,
HAJ
QAJ
.




External data,
J
k. PAg HAKAJ
K.
HA

K.
 KAJ
Metadata,
J

K
Graphic,

GAJ

.


Message catalog,
AQ@ AJ
K.
Beta,
AJ
K.
Perl,
Q
K.
Computational molecular biology, AJ
k. J
K.
.
J
K. Ag J
K
Qk
Environment,
J
K.

 K
Homogeneous environment, Aj.J J

.





Ide,
AJ QK
 J
K.
 J QK  J K
IDE,
A

.


Integrated development environment, J
K.
AJ @ QK
J@

J
K.
Ergonomic,
@ HAJ

J.@
 KAJ
HA
J
Jm'

Data structure,

H

 J 


.

Battery,
K
PA.

Card,
A
.



Daughtercard,
J
A.
 K A

Expansion card,

.



P A.
Graphics card,
HAJ

  A
Network card,
J
.
.



Network interface card,
k. @ A.
 @
J
.

Punch card,
I. K A
.



Sound card,
H@ A.

Storage card,
K
Q j J@ A
.




Ventilator card,
K
E A.

A

KQ
Video card,
HAJ
.


Wild card,
ZAg. A.
Deactivate,
 .
Slow,
Z
.

Delegation,
K. AJ
K , JK.
Dimension,
AJ
 ,YK .
Fractal dimension,

P YK .
,YJ
K.
Remote,
YK.
Pixel,
K.
Null modem,
X CK.
Constructive,

KA JK .
Build,
ZAJK .
Clause,
YJK .
Child,

JK .
XQm J K
Abstract syntax,
.
.

Algebraic structure,
K
Q.g. J
K .
  J @ J K@ JJ J K
ALSA,
Y


.
Architecture,
J
 K .
Child structure,
K
JK . J
K .
Control structure,
m' J
K .
Babbleprint,

K
YJ.K
Dependence,
AJ.KP@ , J
J.K
Notify,
J
J.K
 K ,P K AJK
Image sequence,
P I.A
.
Cascade,

AJK

Autotrace,

@ J.K
Backtracking,

g J.K

J.K
Install,
I

J.K
Installation,
I

J.K
Setup (Installation),
I

m ' , '
 K , 
JK
Evaluation,


m ' , K Qk
Partial evaluation,

. 
JK
.

KQk
 J J K
Disk duplexing,
Q@

Ignore,
Am.'
Adjacency,
PAm.'
.'
Bypass,
PAm
PAm
.'
Failover,
 @
.'
Jump,
Q  ,PAm
.'
Override,
PAm
System testing,
A J@ K . Qm.'
Abstraction,
YK
Qm.'
Beta abstraction,
AJ
K. YK
Qm.'

Bracket abstraction,
@ B@ YK
Qm.'

J.@ YK
Qm.'
 KAJ
Data abstraction,
HA
Fragmentation,
K Qm .'
Partitioning,

 K , K Qm .'
Block (verb),
YJ
m.'
Freeze,
YJ
m.'
 m'
Combination,
J

.
Aggregation,
J
m.'
Prevent,
ZA K@ ,I.
Jm .'
Toggle,

J
K. AK
, J
J

XAJ
 K@




Master-slave,
J.J K. AK
Slave,
K. AK
'@ QK QK AK
Case sensitivity,
Qm
 . . Q  
Effect,
QK , 
K AK


Delay,
,Q
g AK
Date,
t'
PAK
Epoch,
H. Am '@ ZYK. t'
PAK
History,
t'
PAK

,
AK
Foundation,


Check,
m , Y AK

Confirm,
YJ
AK

Confirmation,
YJ
AK
 @ ,A@ YJ AK
Handshaking,
A


A@


Hardware handshaking, XAJ A@ YJ
AK
Xm '@ YJ AK
Quality assurance,
.


Kerning,
( Qk B@) J
AK
Complete,
AK
Exact,
AK

Abstract interpretation,
XQm. K
AK

K. XAJ.K
 KAJ
Electronic data interchange, HA
Q@

G




Divergent,

k. @QK@ ,
YAJ.K
Divergence,
@ Q K@ ,h. @Q K@ ,YAJ.K
Contrast,
K
AJ.K

Lag,
A J . K
Dissipation,
X YJ . K
Packet-switched,
 Qm '@ K
YJ.K


 K
Context switch,
AJ


YJ.K

 Q@ K
YJ.K
Label switching,
HA
Swap,
K
YJ.K
Functional dependency,

  '
Y
K J
m

Defect analysis,
@ J
m'
Dynamic analysis,

AJK
X J
m'
J@ Jm'
Flow analysis,
 Y


Q
K
P J
m'
Fourier Analysis,
Lexical analysis,

J
m'
J
m'
Object-oriented analysis,

Q
J
k. J@
Parse,
J
m'
Parsing,
J
m'
Real-time structured analysis,
J
m'

P
J
K .
 . AK J
m'
A J
m' , IK
Static analysis,

 . AK J
m' ,
A J
m'
Static analysis,
IK
m , A J@ J
m'
System analysis, A J@
Load,
g ,J
m'
Morphing,
m'
Switch,
m'
   
Discrete Fourier transform, K
P @ K
m'
  J @

Beta conversion,
AJ
K. K
m'
 J)
,K
m'
Converse,
(
Conversion,
K
m'

Conversion to iteration, P@QJ@ @ K
m'
Convert,
K
m'
Converting,
K
m'
Implicit type conversion,
K K
m'

 , 

 K XAJ
.

Linear transformation,

k K
m'
Auxiliary storage,

A @ K
Q m '
K
Q m '
Caching,
I 
Non-volatile storage,
QK
AJQ
K
Q m '
Secondary storage,

KA K K
Q m '
Data flow analysis,


K.
 KAJ
HA

Q m'

.
Workaround,
K
Am'
Grain,
I.J.m'
 '
Infrared,
Qg @ Im
Bus sizing,
@ K
j.m'

Ym'
Incremental update,

YK
@Q K IK

Ym'
Update,
IK
Define,
K
QK ,YK
Ym'
 PY@ YK Ym'
Rating,
QK
Y K , k
.

Specify,
YK
Ym'
Edit,
QK
Qm'
 ,QK Qm'
Edition,
J
.

 Qm'
Animation,
K

Animate,
K
Qm'
Move,
K
Qm'

m'
Enhancement,
Data acquisition,
(AjJ@) J
m'


HAJ
Q
m '
Prepare,


J.@) m 
 KAJ
 m '
Validate, , gY @ HA

(...t '@ ,l. @Q.@ KA

 m '
Validation,
C

Verification,
J
m '
Verify,
J
m '

Control,
m'
 Qk m'
Keymap control,
hAJ 

m'
Remote control,
YK.
Resource control,
XPK. m'
Analysis,
J
m'
Backward analysis,
m '@ @ J
m'
 Jm'

Binding-time analysis, AJ.KPB@ I
 
'
Complexity analysis,
YK J
m

Cryptanalysis,
J
J@ J
m'
Mixer device,

. ,g
Cg PAk

Q
YK
Internationalization,
K
YK
Notation,
K
YK
Q
Y K
Remind,
Q
Y K
Reminder,
Footer,
J
K
Y K
Undo,
(K
YK) k. @QK
Overlapping,
I.@QK
Cumulative,

@QK
Edu,

J
K ,
K. QK
Quadratic,

J
K. QK
Quadrature,
J
K. QK
Education,
J
K. QK
Arrangement,
J . 
KQK
Arrange,
I.
KQK
Ascending order,

YA I.
KQK
 I
KQK

KA
Byte order,
HAJ
.


Complete partial ordering,

KQk. I.
KQK
A
Descending sort,

PA J K I.
KQK

AK. I.
KQK
Network byte order,

J. IK
. I.
KQK
Partial ordering,

K Qk
Sorting,
PQ ,I.
KQK
  g QK
Fuzzy translation,
D
. .


Rough translation,
J
.K
QK  g. QK
Translate,
k. QK
Salutation,
C , I.J
kQK
License,
J
kQ K
Frequency,
QK@K ,XXQK

JB @ XXQK
Sampling frequency,
AJ

Repeat,
P@QK ,YK
XQK
 ,iJQ K
Filtering,
J

Destroy,

K
Q m '
Store,
K
Q m '
Specialisation,
m '
Customization,
J
m '
 m '
 J
Complete graph,
A

Schematic,

J
m '

Cause-effect graphing, J. J. J
m'

.
Layout,
J
m '
Plot (verb),
k ,J
m '
Skip,
m '
Decrease,
J
 K , J
m ' , J
m '
Decrease,
J
m ' ,J
 K , J
m '
Evaluation,
'
 K , 
JK , 
m '

m '
Guess,
'

JK ,K Qk
Partial evaluation,

. 
m
.

KQk
Housekeeping,
K
Q
m ' Q
K. @YK
K
Interference,
g@Y
Project planning,

J K ,Q Q
K. YK
Q
 K
Gradient,
h. PY
Grayscale,

XAP h. PYK
h PYK
Hue,
@
.

Consolidate,
YJ
K ,
YK
 

J.@  Y
 KAJ
Data flow,
HA
K




Stream,
X , YK
K
Batching,
J
Y
 

K. Y
 KAJ
Dataflow,
HA
K


Audit,
J
YK
 K
Checksum,
j. @ J
Y
 K
PX J
Y
Cyclic redundancy check,


ZAk B@
Storage,

 j
K
JK . J

.

Record,
J
j.
Record (verb),
J
j.
Register,
J
j.
Subscribe,
J
j.
Subscription,
J
j.
@ @
H Q
File descriptor leak,

.


Memory leak,
Q @ X H. Q
Leak,
I.K
Q
Q
Underscore,

Delivery,



Hill climbing,
CJ@ 


Aliasing,
Justify,
K

Settlement,
K

 . Am '@ Q
J

Accounting management, HAK
 J @ Q
J

Asset management,
HA
Q  QJ
Code management,

Saturation,
J. 
October,
B@ K
Q
Multi threading,

XYK I. 
Threading,
I. 

  
Data fork,
HAJ
Fork,
h. @Q K@ ,   

Automation,

@ J
 
Dry run,

PAJ.Jk@ J
 
Dual boot,
h. X Q J
 
Q  

Space character,
PQ@

Q
Crypt,

 
J
 
Noise shaping,
i. @
Distort,
Z@J@ ,  
Collision,
XA
Ascending,

YA
Child record,

K

 kC

HA
, H@YQ
X Align,
J
QK
Edutainment,

K. QK J
Q K
Entertainment,
J
Q K
Patch (verb),
J
Q K
Numbering,

Q K

Q K
Hatching,
Filter promotion,
lQ @ J
Q K
YA , J Q K
Promote,


Upgrade,
J
Q K
Modular,

.J
QK
Compose,
I.J
QK
Composition,
I.J
QK
Mounting,
I.J
QK
P K ,iJKA @ k
 Q QK
Keyboard focus,
.




iJ
KA @ k
Keep,
QK
Cell encoding,
AK
Cm '@ Q 
QK
Q 
B@

QK
Character encoding,
Qk


Encode,
Q QK
,Q
QK
Q 
QK
Encoding,

Horizontal encoding,
 @ Q 
QK
Progressive coding,

Y  K Q 
QK
Dynamic translation,
J
AJK
X YJQ K
YJQ K
Professional programming,
J
J
 QK
Header,


Q K
Concurrency,
@
Incremental,

YK
@Q K
Increase,
A KP@ ,YA ,YK
@Q K
Line feed,
Q YK
Q K
Q.j J@ ,ZA
Inquire,
 HCJ

j.
Counting records,
Y@
  
Blocked record,
J J

j.
Observations,

A 
Configuration,
J
. 
Growth,
,j 
Amplify,

j 
Enlargement,
pA JK@ ,
j 

Shading,
J



Embed,


Include,
Narrowing,
J


Match,
K . A
 J
J.
Scientific notation,
J
HA
Application,
J
J.
Apply,
J
J.
J
J.
Function application,
J


Horizontal application,
 @ J
J.
Require,
I.

Component based development, . QK

 @
 K
HA
Developement,
QK

Development,
QK

Tweak,
K

Dither,

J

Shadowing,
J


Cache conflict,
AJ.m
PAK
 PA
Context clash,
AJ

K
 K
Backup rotation,

AJ
Jk@ I.A
 K
Image sequence,
P K. AJK ,P I.A

Correlation,
 AK
Handle (verb),
AK
K
Collaboration,
A
Q
J.K
Expression,
Regular expression,

Q
J.K

Count,
X@Y K
Fade,

YK
@Q K ,YA
Crossed,
A K ,I.A
Intersection,
A K ,I.A

Error recovery,
Am '@ YK. iJ
j
Export,
QK
Y
Authorization,
l'
Q
Compilation,
K
Q
Compile,
K
Q

Q

Minimize,

Zoom out,
Q ,Q

 

Browse,
i


Hierarchical navigation,
Qm. i

Navigation,
i

Q

Reset,

Filtering,
iJ
Q K , J

Repair,
iJ

Design,



Object-oriented design,

J
k. J@

 J

Categories,
HA

Classification,
J


Classify,
J


Computer-generated imagery, Y QK

H. Am 'AK.
K ,P ,QK

Q
K ,iJ

Illustration,

Mirroring,

@Q QK


 ,m '@ K

Line buffering, Q@ K
 ,Q@ K 
Line buffering, m '@ K




Render,
(Q
. ) Q
J
 
Q
J

Rendering,
Conflict,
A J K ,H. PA 

Multiply,
A
Decay,
A 
Increase,

Annotation,
Boxed comment,
Comment,
Hang,
Suspend,
Instruction,
Privileged instruction,
Privileged instruction,

Transfer statement,
Edu,
Encrypt,
Incantation,
Mapping,
Map to,
Set,
Encapsulation,
Variations,
Alter,
Alteration,
Change,
Logical shift,
Logical shift left,
Logical shift right,
Modification,
Rename,
Detail,
Differential,
Interactivity,
Interactive,
Condition out,
Core dump,

 ,
J
Ag
K. Q

J
K
J
K
J
K
J
K
J
K
 K
J




 X J
K

J@ H@
,PAJ
 K

 J

JK ,  J
 K

 X
PAJ
J@ H@
 K
 J@ J

K. QK ,
J
K
J
K
 YK K


J
K
@ 
J
K

J
K
J
K
 Q
K
H@
Q
J
K
Q
J
K
Q
J
K
 J QJ K



PA
J Q
J
K
 J QJ K
J

Q
J
K
B@ Q
J
K
J
A K

A K
J
A K

A K
Q K
Q K
. @ K
Q K
AJ


ZAk@ ,X@Y K

Parametric polymorphism, A B@ K
XYK
 @


Polymorphism,
A B@ K
XYK
Cooperative multitasking,
A @ XYK
J@

GA
Hybrid multiprocessing,
Z@Qk. B @ XYK

j.@ m . 'A @ XYK , 
j.@
Hybrid multiprocessing,
m . 'A @ XYK

j.@ Z@Qk. B @ XYK , 
j.@
XYK
 @
Multilingualization,
HA
Multitasking,
A @ XYK
 @ XYK
Pre-emptive multitasking,
HA


KA @
Modify,
K
YK
 K
Identify,
Q
 K
Optical character recognition,
Q
'@ Q
Qm

.
K
Recognition,
Q
 K
QK
System Configuration,
A J@ HA

@ K K
QK
Datatype definition, HAJ
Define,
YK
Ym' , K
QK
Definition,
K
QK
  
Dimensioning,
XAK. B@ I

J.K @ K
QK
Driver,
K
QK
Identification,
K
QK
Recursive definition,

P@QK K
QK
Disable,
J
K
 
Complexity,
Y
K
 
Essential complexity,

A @ YJ
K
Adaptive learning,

J
J
K K

Machine learning,
 B@ K
Annotate,
J
K
Enumeration,


Y@

J
J  K
J
J  K
Nanotechnology,
Technique,
J
J  K
Calendar,
'
 K

JK ,'
 K
Evaluation,
Conservative evaluation,
Am
J
 K
Lazy evaluation,

J
 K
Integrity,
AK
Referential integrity,

k. Q AK
Q
J.K
Enlarge,
Q
J.K
Maximize,
Q  . ,Q
J.K
Zoom in,
Condense,
J
JK
Jam,
AgP ,YK
Q @ X YK
Memory heap,
Reusability,
AJB @ K
P@QK
Recursive,

P@QK
Iteration,
P@QK
Mutual recursion,
XAJ.J P@QK
XA@ , YK XQK ,P@QK
Repeat,


,P@QK
Replication,
A
Reuse,
AJB @ XA@ , AJB @ P@QK
 K
Complement,

Directory stack,
Yj. @ AP , J
Y@ K
Adapt,
J
J
K
Manipulation,
I.CK
K
Correspondence,
C
Hash,
YJ
J.K
 '@ KA  K
Finite automata,

AJ J Qm


Feed,
K


Cache coherency,
AJ.m A

Cache consistency,
AJ.m A
 AA
Just-in-time,
I @

Humanist technology,

@
J
KA
KA J@

PAJ
E@ K
Q K
K , Q
K
Illustration,
iJ


K
Preferences,
HCJ
Preference,
J
K
Activate,
J
  K ,J
K
Enable,
J
K


Inspection,
ZA J @ , Y  K
Case based reasoning,
 . Q
K

 J B@
Bijection,
K. A K
Aging,
XA K
 XA K
Password aging,
Q@
Reports,
QK
PA K
Crossed,
I.A ,A K
Intersection,
I.A ,A K
Technology,
KA  K
Advance,
Y K
Progress,
Y K
 PY@ YK Ym' ,QK Y K
Rating,
k
.

Approximate,

.K
Q K

QK
Q K
Problem report,

Report,
QK
Q K
Partitioning,
K Qm .' ,
 K
Segmentation,

 K
 J @  K
Zoning,
A


Classic,

XAJ
J@ ,
YJ
 K
Contraction,
J
 K
Shrink,
J
 K
Decrease,
J
m ' ,J
 K
Parallel reduction,
J
 J K ,P@ J J
 K
 Q J J  K
Fiber optics, , AJ
B@ HAK

. 
 

Fibre optics,
, AJ
B@ HAK
Q. J
JK
Crash dump,

m . 'A ,
AJJ YJ
J K
J
AJJ
Debug,
iJ
 J K
Parallel reduction,
P@ J J
 K ,J
 J K
Frame relay,
PAB @ J
 J K

Masquerading,
QJ K
 
Dot notation,

 K IK

JK


J K
Infix notation,

g@X IK
 IK

J K
Postfix notation,
j
 
Prefix notation,
@YJ. IK
JK
Illumination,
KA @ ,QK
J K
 J K
Variant,
K


Format,
JJ
E
 E

Format (verb), J
K ,( Q m , ) JJ


()






Preformat,
K
YJ
A@ , K
YJ
JJ
E
Frequency,
XXQK ,QK@K

HP@
 K
Multiple inheritance,
A
Balance,
P@ K
Parallelism,

P@ K
Communication,
@K
 Y A J  @ K
Fit-to-window,
 P @YB @
 @ K
Backward compatibility, H@

K. A@
Compatibility,
 @ K

Pattern matching,
H. B@  @ K
Documentation,
J
KK
Orientation,
Am.' @ , J
k. K , k. K
Adaptive routing,

J
K J
k. K
Dynamic routing,

J
AJK
X J
k. K
Hierarchical routing,

Q J
k. K
Orientation,
k. K , Am.' @ , J
k. K
Routing,
J
k. K
Sequential processing,

@ JJ
Q

Extend,
YK
Y
QK Q
Message passing,
KAQ@

Pass,
QK
Q
Scroll,
QK
Q
Excercise,
K
Q
Enabling,
i , 

Initialization,
YJ

Name resolution,
B@ Q 
J

Proportional,
I.AJ J ,
.AJ K
Fit,
I.AJ K
Descending,

A J K
Conflict,
H. PA  , A J K
Alternating,

G. AJ K
Alert,
P@ Y K@ , J
J. K
Notification,
J
J. K
Download,
K
Q  K
Coordinate,
J
 K
 E ,() J  K
Format (verb), , ) JJ

( Q m
Activate,
J
K , J
  K
Clean,
J
 , J
 K
 J K
Data set organization,
m
.


J.@
 KAJ
HA
Organize,

J K
Q
K. YK ,Q
J K
Project planning,
Q
Executable,

YJ
J K
Executive,

YJ
J K
Execute,
YJ
J K
Execution,
YJ
J K
Launch,
YJ
J K
Run,
YJ
J K
Knowledge representation,

 . AK , iJ
J@ IK
 . AK
iJ
jJ@ IK
IK
 @
 . AK
Fixed-point,
A

 . AK
Static,

G
, IK
Secondary,

KA K
Microsecond,
QJ
J
KA K
Second,

GA K
 
Dithering,
@ B@ HAJ
K
  .


Reliability,
K , HAJ.K
Ctrl,
QK
CSS,

Q K
Exploit,
  





Gap,
@Q , m. , QK
 J ,I K
j
Hole,
.


Reliability,
HAJ.K ,  K
J
 K
Heavyweight,
P@

Octet,
J
KA

Octal,

GA
Bidi,
Am.' B@ J
KA J K
Bit,
JK . , P X , J
KA J K
Binary,

KA J K
 KA J K
Bipolar,
I.@


 @
Dual-partition,
J


KAJ K
Fixed,

h.

 , HA

@ XAg.



@ K
Q , HA
@
HA

 . @ J
K. XAg
IJ
.




, A @
PAg. , J
J.J@
PAg.
YJ
J J@
PAg.
 @ PAg , YJ J J@ PAg
A
.

.
, YJ J J@
PAg , A
 @
PAg

.  
.
J
J.J@
PAg.
PAg.

Information highway,
Bit gravity,
Processing,
Processing,
Processing,
Ongoing,

Complete unification,
Distribution,
Normal distribution,
Expand,
Expansion,
Junction,
Major delivery,
Colocation,
Hot swapping,
Linking,
Mail delivery,
Receipt,
Illustration,
Consolidate,
Localization,
Availability,
Provide,
Branch prediction,
Expect,
Forecast,
Pause,
Timing,
Digital signature,
Valid chars,
Suspension,
Probability,
Assertion,
Generate,
Generation,

H

 . AK
IK
 . J ,iJ
J@ IK
 . AK ,iJ
jJ@ IK
 . AK
I

Constant,
Fixed,

A YJ
kK
 P
K

K
K
J
J. K
P
J
K
J
K
 K
J

QJ J
 K

J. J
K

P J
K
J
K
YK
Q.@ J
K
J
K
K
P ,Q
K ,iJ

YK ,YJ
K

K
K
Q
K
Q

 K
Q J@
 K
I. KP@ ,
 

K
 K

I 
 K


IJ
 

P J

K
 K

 K
J

 K
AJk@ ,
YJ
K
YJ
K
J
k. ,YJ
K

Qk

KQ
.
X , AK

Qk.

PAJ.k B@ YK
Qk.
H. @ Y Jk. @ ,Qk.
J ,K Qk

PAj

.
.
Z Qk

AK. , Qk
.
IK
.
h. Q k ZQk

Qk.
Qk.
Qk .
YK
Q.@ Qk.

A Qk.

J
KP k.

k .
.
k
k.

.

@Qk
I.g.

I.g .

g
.

Visual bell,
Flow,
Newsletter,
Pull,
Partial,
Molecule,
Byte,
Critical section,
Bridge,
Bridge (noun),
Bridge (verb),
Mail bridge,
Northbridge,
Main body,
Particle,
Polling,
GPL,
Geographical,
Fetch,
Retrieve,
Session,

)
Squatting,

 (g)
ZAQ @
.

h.

Ag.
Sum,
m. ,g.
Sum (verb),
g.
 g
Sentence,

.

GNU,
Jk.

.
P ,( ) J
Jk
Pound,
( P)
.
Bus device,
A K PAk
PAk

Character device,

Qm
.

Cooperative,

  J ,Ag.
I
Gamma,
AAg.
Y J @ IKAg



Deskside,
. . ,I.J @ I.KAg.
. , Y J @ IKAg

Deskside,
I.J @ I.KAg
. .
.
Write side,
K . AJ I.KAg

Ready,
I. AJ ,QAg
.

Cos,
AJk.
Gtk,
Jk.
Firewall,

PAK P@Yg.
Cartesian product,

GPAK
X Z@Yg.

Horizontal tabulation,
J
 @ Yg
.



Instruction scheduling,
HAJ
J@ Yg.

Priority scheduling,
K
B@ Yg
.


Process scheduling, Yg. ,Z@Qk. B
@ Yg.
m. 'A @



Process scheduling, Yg. , m. 'A @ Yg.
Z@Qk. B @

Scheduling,
Yg
.

Tabulation,
Yg.
 '. Yg.
Im
Colour look-up table,


@ B@
Process table,
Z@Qk. B@ Yg.
Routing table,
J
k. K Yg.
Scheduel,
Yg.
Schedule,
Yg.
Spreadsheet,
YJ Yg.
Table,
Yg.
New,
YK
Yg.









Eigenvalue, J
, (G@ X) Q
P Yg.

J
K@ X

Root,
P Yg
.
Bell,
Qk.
Qk
Visible bell,

KQ
.
Eyedropper,

J
m. '@ H. Ag

B @
Fourth generation computer,
H. Ag
K. @Q@ J
m. '@
H Ag
Host computer,
J

Laptop,
m H. Ag
Laptop computer,
m H. Ag

Machine,
 @ , H. Ag
Mainframe,

J
KP H. Ag
Notebook,
m H. Ag

Parallel computer, (J
 @) P@ J H
. Ag
Personal computer,

m  H. Ag
Pocket computer,
I.J
j. H. Ag
Quantum computer,

H. Ag
Second generation computer,
H Ag
GAJ@. Jm '@

 
 .

Annotation,
J
K , J
Ag

Footnote,
J
Ag
QAg
Brace,
Left brace,
K
PA
QAg
Ag
Right brace,
J
J

Q

Clipboard,
 Ag

  Ag
Screensaver,
A @

  Ag
Screen Saver,
A @

Local bus,
J
m  Ag

Edge,
Ag

Case,
Ag

'@) Ag

Q. ,( Qm
Case (font),
( Qk)

Child status,
K
JK . Ag

Problem state,
 @ Ag

Process status,
Z@Qk. B@ Ag

K Ag
Race condition,
PA

Resource state,
XP @ Ag

First generation computer,

.
q J PAk
.
Complex programmable logic device, PAk
 A Y


YJ Q K
.

J
.
Device,
PAk
@ PAk
Dialout Device,
AgXB
.
PAk
.
Display device,
Q@
PAk
.
Input device,
AgX@

.
Mixer device,
g Q 
m.' ,Cg PAk
PAk
.
Peripheral device,

Q
.
Q
 AK PAk
Pointing device,
.
Virtual machine,

QA PAk
,G@ k
. ,g@X
Inside,

AK

 .
Quality,
Xk.

 m '@ Xk.
Quality of service,
HAY

K
k
.
Von Neumann, John,
AJ
Generation,
YJ
K ,J
k.
GNOME,
JJ
k.
 , HAm
Group,
m
.  . h.
 Qk ,@ Qk h
Map,


.


Meaning,
,
GA h.
Q ,QKA
h
Pie,

.
Quorum,
D ,D @ h.
Clone device,

h
Sharp,
Guard,
Calculator,
Microcomputer,
Minicomputer,
Computron,
Analogue computer,
Computer,
Digital computer,

XAg
PAg
J . Ag
QJ
I.Ag
I.Ag
Q

. Ag
K


KA H. Ag
H Ag
 .

P H. Ag

Sharpness,
Delete,
Deletion,
Colophon,
Literal,
Lower-case,
Metacharacter,
Upper case,
Wide character,
Wildcard,
Accent,
Gesture,
Motion,
Dynamic,
Float,
Free,
Binary package,
Kamikaze packet,
Narrowband,
Package,
Resource bundle,
RPM package,
Ray,
Account,
Calculate,
Calculation,
Compute,
Root account,
User account,
Case Sensitive,
Sensitive,
Natural deduction,
Clustering,


 , Yg
X

Yg

Yg
 @ XQk

,
Qk

Qk
Q


@ Qk

Q
J. Qk


Q Qk

YK. Qk

Qk

Qk

Qk

Qk
Qk
Qk
JKA J K  Qk


K
PAjJK@  Qk

J
 Qk

 Qk

XP  Qk

  Qk
Qk

H. Ak
H. Ak
H. Ak
H. Ak

P Yg. H. Ak
Yj J @ H. Ak
'@ Am
 Ak
Qm
Ak
J
J. k

Yk

State,
Status,
System state,
Wait state,
Zero state,
Current,
Resolver,
Carrier,
Common carrier,
Digital carrier,
Retry,
Container,
Coarse grain,
Fine grain,
Love,
Mask,
Size,
Storage space,
Volume,
Word size,
Event,
Intuitionism,
Intuitive,
Occurence,
Occurrence,
Polynomial,
New talk,
Zoo,
Border,
Closed term,
Hard limit,
Limit,
Redisplay,


Ag

Ag

A J@ Ag

PA JK@ Ag
Ag

K
Q

Ag

Ag
A K ,Ag

XAJ
J@ Ag



P A K ,
P Ag

@XYm. Ag
K
Ag
 k I. k
 Ik
J
X
.
I.k


AJ ,H. Am.k
 ,mk

.
K
Q j J@ m.k
m.k
 mk

.
HYg
J
Yg

Yg

HYg

HYg
K
XYg

Yg
YK
Yg. IK
 K@ J
m '@ K
Yg
HA
Yg
 Yg

 Yg
Yg

Yg
Q@

 
Q , g

Nipple,
g
Computer cookie,
H. Ag g

Non-optimal solution,
J @ 
g
  
Resolve,
g , Q , g
K
Ag , q@ K
Ag
Copy protection,

q@
K
Ag
Copy protection,
K
Ag , q@
q@
Q @ X K Ag
Memory protection,


Protect,
K
Ag
Protection,
K
Ag
Backport,

g
Load,
J
m' ,g

HTTP,
 k

HTML,
G k
Alert box,
J
J. J@ P@k
Dialog,
P@k
Discussion,
P@k
Margins,

@k
Computing,
J . k
Fuzzy computing,
J
K. AJ. J . k

Pool,
k

Resource pool,
XP@ k

Hover,
k , Ak

,k
Hover,
Ak





 , , k
Implies,
AJk
Life,


Perplexity,
AK. P@ , Q
g
 J@ Q g
Bandwidth,
A

Exist,
Xk. ,
k

Resolve,


J
B@ Qk

Quota,
D @ , k
Get,
k
k
Demote,
J . KQ@
 ,Qk

Block,
Y
 ,Qk

Prevention,
Y

Prohibit,
Qk

Compactness preserving,
A  k

Save,
k

Field,
k

Key field,
hAJ @ k
 k

Password field,
Q@

 . AK k
Static field,
IK

Subfield,

Q k

Injection,
 k
 k




K KA  , HAJ
Legalese,
HAJ
 k
 m '@

m ,QJ@
Copyright,


Fields,
k

Briefcase,
J . J
k

Software development kit,
QK
 J . J
k
l. @QK.

Physical,
,Xk. @
J
k

Real,

J
k
Bus arbitration,
@ J@ k
k
Central arbiter,

JJ

QQ
Arena,
J . g

Rings,
I g

Do loop,
P@QJ@ g

Endless loop,
J
AJ JB g

E B g
Infinite loop,
J
KA

Local loop,
J
m g

Loop,
P@QJK. Y JK
,PQK
, g

Repeat loop,
XXQK g
Millennium bug,

Attribute,
Property,
Private,
Special,
Device-dependent,
Inactive,
Entries,
Checkbox,
Menu item,
Know-how,
Caching-only,
End,
Timestamp,
Mail services,
Professional services,

J
Ag
J
, J
Ag
Ag
Ag
Q jJ A g

.
Ag
 KA g
HA
Q
 AK KA g
 A KA g
K
@P X , Q. g

 ZI.k
AJk

P k
 g
YK
Q.@ HAY
HAY
 g
J
J

Connection-oriented network service,

ABAK.  k. J
J.

K.
 KAJ
Data service,
HA
 g , JY@
Directory service,
Y

Directory service,
Parallel-service,
Scalable service,
Service,
Output,
Standard output,
Code violation,
Violation,
Exit,
Logout,
Character map,
Linear map,

 g
Y
 g
Y
 g
Y

j. @
 
 g , j
Y
. @ Yg
J
Y@
K P@ J Y
 g

 A Y
 g
J
Q K
.
 g
Y

h. Q k

AJ
 h. Q k
 Q
 k
(Y@)
PAQ@
 k
Q
h. Qk
h. Qk

B@
Qk

Qk
 Qk
Jk 

K
XAJ@

Direct mapped cache, J
jJ@ QAJ.
(l. 'A)
Level one cache, J @

J
K. Ag
J
K. Ag
J
K. Ag

 B@
(l. 'A) J
K. Ag
Level two cache, J @

GA J@

Primary cache,
J

KP J
K. Ag , J
@ J
K. Ag

Primary cache,
J
@ J
K. Ag , J

KP J
K. Ag
Boot server,
C@ XAg

Caching server,
ZI.k XAg , JJ . m ' XAg

Caching server,
JJ . m ' XAg ,ZI.k XAg
Compute server,
H. Ak XAg

YA XAg
Database server,
HAJ
XAg

File server,
HA
Mail server,
YK
Q.@ XAg
Master server,

J
KP XAg
Proxy server,
J
XAg
 XAg
Screen server,
A @
 @

Webserver,
J
.  XAg
Server,
XAg
Web server,
H. XAg
External,
J
k. PAg


,B @ h. PAg
FIFO,
B @ g@Y@


First in first out,
B @ g@Y@
,B @ h. PAg
 

Last-in first-out,
@Qk @ g@Y@ ,B @ h. PAg
 

LIFO,
@Qk @ g@Y@ ,B @ h. PAg
@ h PAg
Off-topic,

.
Outgoing,
h. PAg
h. PAg
Outside,
h. PAm '@
,
 g
Bitmap,
J
KA J K PA
PA
 g
Charmap,
PAm

Ag
Specials,
HAJ
Credential cache,

)
Serif,


K
Y (k)

p
k

KA

Baseline,

A @ k
Bitmap font,

 K k
 k
Broken line,

 J , @J ,(k
Continuous,
@X)
  k
Dedicated line,
Q
Diagonal line,

Q k
Differential line,

A K  k
 . AK k
Fixed Font,
IK
@
IK
 . AK k
Fixed width font,
Q
Font,
k

Horizontal line,
 @ k
k
Leased line,
Qk.

Mercury delay line,
QQ
Q
g AK k
Outline font,

J
K k
Plot (verb),
J
m ' ,k
Raster font,

 K k
Scan line,
i @ k
Serial line,
 k ,  k

Serial line,

 k ,  k
 k
Cross-fading,
H
J
k
Lightweight,
P@
Lite,
J
k
Invisible,

k
 g
Digest,
C
g
 , C
Difference,
PA

Disassembly,
,g
Background,
J
g


Desktop background, I
. J @ i J
g

Backslash,

 Qk
@ Qk h. , 





Portmap,
YAJ @ 
Qk
 Qk
Radar map,
P@X@Q@ 



Sector map,
A@ 
Qk

@ Q k
Data warehousing,
HAJ
k
 A
Common properties,
A
k
,A
 @
Properties,
HA
k
 A
Ticker Properties,
 A@
 k
Cluster,
X J ,
Privacy,
J
k
 k
K P , A
Chart,

GAJ

.
 k
Diagram,
A
Plotter,
Ak

Bus error,
A K Ak

Critical error,
h. Qk Ak

Error,
Ak


Fatal error,
hXA Ak
Ak
Internal error,

g@X

Mistake,
Ak



Page fault,
j@ Ak

Parity error,

k. Q@ Ak
Portmapper,
Y J @ A k
P Ak
Run-time error,

J
 

Standard error,

AJ
 Ak
 '@ ZAJK Ak
Syntax error,
m
.  .

 J Q Ak
Unexpected error,





Outline,

J
m' P ,  k
 k
Scheme,
m ,
 i @ k
 @
Raster,

A
  J@ k
Dot pitch,

k
Pitch,
k
Step,
Linear,
J
k
Map,

Characteristic function,
Combinator,
Continuous function,
Function (Mathematics),
Hash function,
Higher-order function,
Linear function,
Member function,
Membership function,
Indicator,
Partial function,
Circle,
Permanent,
Delta,
Debianize,
Input,
Standard input,
Enter,
Multiple access,
Know-how,
Degrees,
Degrees of freedom,
Degree,
Chat,
Decision support,
Run-time support,
Support,
Address book,
Microlog,
Batch,
Push,
Flow,
Stream,

Q 

J @ K

 J


@X

@X

@X

@X

K Qm .' @X

J . KQ@ J
A @X

J
k @X

Yj J @ @X

@X
K
@

, @X
Q

. @X
J
K Qk
QK@X


'@X
@ X
J 
K. X

g X


AJ
 gX

kX

XYJ kX
Qg , K @P X
.

 . PX
HAg
 . PX
K
Qm '@ HAg
 PX
k
.
XPX

P@Q X
P X

J
 
YA ,X
K
AJ QX
QJ
QX
 X

X

Qk. ,  X
AK
K ,  X
 Y

I.J @ i J
g
 J
g
Wallpaper,
A @
 g

Aliasing bug,
 g
Nice,
J
,
Cellular,

g
Cell,
J
g
J g
Char cell,
Qm

Servers,
X@k
k
Algorism,
J
PP@
k
Algorithm,
J
PP@
 B J PP@
Anytime algorithm,
J
J

k
   k
Approximation algorithm, I
. K
QK J
PP@
   k
Evolutionary algorithm, K
P J
PP@
k
Genetic algorithm,
J
K@P J
PP@
 k
Exponential-time algorithm, J
 @ PP@
Q@

 P AJ
k
Command line options,
Q H@

Q@ B@
 P AJ
k
Options,
H@
Optional,

PAJ
k

Command line option,
Q@ @ Q PAJ
k
Option,
PAJ
k
XML,
k
Virtual Desktop,

h
P JJ E iJk

.


JPEG,

X
Crawler,
Internal,
Inside,
Circuit,
Publisher,
Rotate,

P ,H @X
k@
.
JJAK


. , J
g@X

. ,g@X

G@ k. ,
AK
P@X
QAK ,Q P@X
PYK
,k P@X

K . A ,PX
PX
PBX

X

K
A.A.K
X

Floor,
Role,
Dollar,
International,
DMA,

)
Temporary buffer,


(  AJ.m Q@ X)

XA J@ Q@ X
Associative memory,
J
. @QK Q@ X

Base memory,
J
A @ Q@ X
 X Q@ X
Content addressable memory, H@
 K A Jm
Y
.

Conventional memory,
J
kC@ Q@ X
QAJ Q@ X
Direct memory,
.


Distributed memory,
P Q@ X
Q@ X

Error correcting memory,
jj

Am '@


Expanded memory,
Q@ X

Q@ X
Extended memory,

External memory,
J
k. PAg Q@ X
Main memory,
J

KP Q@ X
Mapped memory,
JJ
Q@ X
Q@ X
Memory,
QK AJQ Q@ X
Non-volatile memory,

Q@ X
Paged memory,

j
QJ Q@ X
Persistent memory,
XQm Q@ X
Raw memory,
.



Real Memory,
J
J
k Q@ X
Pj
. m Q@ X
Reserved memory,
 

Resident memory,
J

Q@ X
 Q
 Q@ X
Shared memory,

Access memory,


X

Precision,
X
 , X

, Yg
Sharpness,
h

Minute,
J
X

, BX
Significance,


BX
Axiomatic semantics,
J
E
YK. HAJ
Child directory,

JK . J
X
Directory,
J
X
Guide,
J
X
Home directory,

J
KP J
X
P @ , HAj

Legend,
J
X
Login directory,
h. @ J
X
Manual,
J
X
Sub directory,

Q J
X
Subject index,
J
@ @ J
X
Integration,
l. X
Mail merge,
YK
Q.@ l. X
Merge,
l. X

Dummy,
YA ,
@ Q @ , J
X
, X
Paint,
AJ
.
,@ X
 Y
Duration,
Worm,
I K QK@ XX
 
 P X
Revolutions per minute, J
Y@ H@

 H@

Rotations per minute,
J
Y@

P X
Rotation,
@P X


Bus cycle,
@K PX
PX
Cycle,
Cycle of reincarnation,
t AJ J@ PX
AJk PX
Life-cycle,



Machine cycle,
B@ PX
PX
Period,
Periodic,
K
PX
Circuit switched,
@YK. B @
 PX
Accuracy,

Back,

k. P

Carriage return, k. Q , Q@ @ k. P
) Q@ @
( Qm



Marble,
AgP
Callback,
(A ) Z@YK XP
Reply,
XP

K.  PP
 KAJ
Data packet,
HA
Packet,
 PP
Collate,
PP

Away message,
H. AJ
AP

Bounce message,
H. K AP

Error message,
Ak AP

AP
Letter,

Message,
AP

Message of the day,
J
@ AP
 , AJKP@ AP

Panic message,
Q X AP



 , Q X AP
Panic message,
AJ
KP@ AP

Post,
() P @ , AP

Messages,
KAP
 g KAP

Private Messages,
A
P
Character graphic,

Qm
K P
 k , GAJ
Chart,
A


.
Draw,
P
Drawing,
P
K P
 , jJ
 GAJ
Histogram, P@QK h. PY

.





Illustration,
QK
 ,Q
K , iJ
K ,P

Outline,
 k ,
J
m ' P

K. , QAJ. HAJ
 KAJ

P
Direct graphic,
HA
QAJ
.

Graphics,
HAJ
P

P
Raster graphics,
J
JA HAJ

P
Vector graphics,
J
j.J HAJ
Graphical,

K
QA Q@ X
QK AJ Q@ X
Volatile memory,




Pragmatic,

@ ,   , 
K @P X

P X
Atom,
Bit,
J
KA J K , P X
Atomic,

P X
Kernel panic,
AJ
KP@ ,Q X
 
 
 
Bootrom, ZQ C@ Q@ X) C@ X
(

Artificial intelligence,

AJ@
ZAX
FTP,
 X

Block-structured,
J J
K . X
Virtual memory,

P
Connective,
Hotlink,
Link,
Permanent link,
Nym server,
Radio,
Vertical,
Arrowhead,
Proposition,
Leader,
Qword,
Dividend,
Bind,
Button binding,
Hard linking,
Networking,
Arity,
Monotonic,
Jitter,

A@ ,. @P
. @P
kA
. @P
 @P
'@X
.


QJ
P J
K@ k. @P
K
X@P

X ,
@P

D @P

h@Q@ ,h Q ,
@P
YK@ P

AK. P I.Q ,
AK. P
 ,D@ l' P

.
 P
.
P@P P @ . P
I. . P
 . @
 . P
HAJ
J
.KP
I.
KP
 Qk P
 KP@ , k
A
. .

, Yj. @ AP , J
Y@ AP
J
Y@ K
Directory stack, , J
Y@ K , Yj. @ AP
J
Y@ AP

Gray code,

Qk. PAP

Native code,
J
@ PAP

Operation code,
J
PAP

Code (symbol),
QP

Control code,
m' QP

Country code,
YJ.@ QP

Mnemonic,

QYK QP
 @ QP

PID,

  
Sign,
K
, PA@ ,QP

Symbol,
QP

Exponential notation,
J
J
PP

Y J
K
Q@

Symbols,
PP

Modulate,
P
 . P
Robot,
HK

Visibility,
K
P

P

AK
Math,
HAJ

P
Mathematical,

AK
 KP
Bus mastering,
@ K A
Cardinality,

J
KP

Leading,

@ ,
XAJ
 ,
J
KP
Master,

KP ,
J
KP
Principal,

J
KP
Bus master,
@ K 
KP
Master,

J
KP ,
KP

Directory stack,

Crawler,
Angle,
Corner,

P
H. @X , k@
K
@P
K
@P


X@YK K
Q , AP

Magic bullet,
K
Qm AP

Disk array,
@Q @ P

 , P
Stack,
P
 , P

Stack,
P
 ) JJk
P
Pound,
(

. ,( P)
Deny,
P
Refuse,
P
Reject,
P
Raise,
P
Upload,
P

Shelf,
P

Software audit,
l. AK Q.@ m ,l. AK Q.@ K . AP
 A P
 A P]
Chip,
[ HA
 P
Bilinear patch,
J
KA J K
 P
Canvas,
(Q@)
 P
Patch,

 P
Patch (noun),


Digitize,
J P

Digital,

P
. '@ P
Device number,
PAm
Digit,
P
Host number,
J
@ P
Internet number,
I K QK@ P
 @ P
Job number,


Markup,
P
Natural number,
J
J. P
  P
Network number,
AB@ J
.
Number,
P
Port number,
Y J @ P
Process ID,
Z@Qk. B @ P
K
QK P
Resource element,
QJ@
J K @ XP
Binary exponential backoff, KA

Bullet,

Run-time,
Seek time,
Seek time,
Settling time,
Parity,
Pair,
Zombie,
Visit,
Offset,

J
 
  @
P
@Y
P ,
@
  @
P , @Y

@
P
P
P@Q JB@ (@ @)
J
k. P
h. P

. P
PAK P

Am'
P

K . A
Dragging,
I.m , I.kA

Bulletin Board,
A  K kA

, kA
Place,
A

Naive,
Z
QK. ,h. XA

Clock,
A

Hour,
A

AJ
A
Seeking,

Idle,
A
 .
Hibernate,
HAJ
.
Cepstrum,
Q

Hexadecimal,

Q I

Hex,
I
Log,
m.
 m
CB@
Master boot record, J
KQ@
.


(Q@ )

Scan register,
i @ m.
Checkout,
I.m
Content-based information retrieval, I
. m 



Jj @ . HA
 @ I.m
Drag and drop,
HC
Drag,
I.m
Dragging,
I.kA ,I.m

Affix,
Dataless client,
Diskfull client,
Diskless client,
Diskless client,
Mail client,
Jam,
Decorative,

YK@ P
. P

@
Ag K
HAJ

 Z K
. P
Q@
. P
. P ,Q YK

. K
K

PA
Q@


. P

,Q@
PA K
. K
. P
Q YK
. P
YK
QK. K
YK ,AgP
k P

Prefix,

hJ @YJ. ( P P)

Open switch,

P
P P

Command button,
Q @ P P
Key (Button),
P P

Navigation key,
PAm'. B@ P P
Push-button,
P P
Radio button,
ZA JK@ P P
JK B@
XA@ P P
Reset button,

K@Y
.


Directed set,
h. QP
Q QP
Fuzzy subset,
A



Orthogonal instruction set, HAJ
K QP
YAJ
. QP
Partially ordered set,
I.
KQ@ J
K Qk
 J@
P
Downtime,
J

 A K @
Down-time,
J
 @

P
P
Era,


P
Exponential-time,

 @
P
Latency,
@
P
Processor time,
l. 'A @ (J
 )

P
Runtime,
J
 @
Button,

Salutation,
Passive,
Bit string,
Chain,
Character string,
Daisy chain,
Null string,
Search string,
Wired,
Pin,
Behavior,
Daughter,
Tolerance,
Allow,
Sky,
Audio,
Audiographic,
Theme,
Centimeter,
Singapore,
Year,
Years,
Simple,
User-friendly,
Arrow,
Drop-down arrow,
Drop-down arrow,
Left arrow,
Quorum,
Scroll arrow,
Share,

I.J
kQK ,C

.


KA J K
HAJ

YJ
 ,


PAm
 K

J
J.A
@
Qk

PA

 . @
IjJ

QK @
, 
.


J

JkA

hA
ZA

J
m '



QJ
J
P J


J

 J
H@
J
. ,D
@Yj JB@ D
D

D , @Y@ D
Y
D , Y D
@Y@

PA
D

D @ h. , D
QK
QJ@ D
 ,D
Q

Qk. ,H. @ Y Jk. @ ,I.m


Revocation,
A. @ ,I.m
Magic,

Qm
Spam,
Am 

 Q
Clock rate,
A

Clock speed,
J
KAJ
@ Q
  
Constant angular velocity, JK. AK K
@P Q
 

Constant linear velocity, JK. AK J
k Q
 , Q

Rate,
Y

Speed,
Q

Software theft,
l. @Q.@ Q
Fast,
K
Q
Fragile,
I.@ K
Q

Confidential,

Q
Cursor plane,
 Q  @ i
Desktop,
I.J i

Cache line,
AJ.m Q

Command line,
Q@ B@ Q
Line,
Q



Q
Line of code,
Q@
,Q
Row,

 P
Lines per minute,
J
Y@


Amplitude,


Capacity,


Size,
m.k ,
Seek,


Fallout,


SCSI,

Q


@
Information highway,
, HA


@ XAg. , HA
@ K
Q
HA

Silently,

G

 . AK ,G
Static,
IK

@
C
Class hierarchy,
A J
Pull,

  , J J@ J

J
.

 . 
K
Q
  , K Q J

Regional network,
J
.
 . 
J
J
@

 

 J
g J
Ring network,
@
.





'
Star network,
m. J.
 J
 
Wide area network,
@
.




Wireless local area network, J J.
J
B J
m
Pseudo,
J.
. J.
Pseudo-device,
PAk
Pseudo-terminal,
@ Q J.
Semiautomatic,

KA  K J.
 
Grid,
J

.


Lattice,

Q , J
.
XQm J K Qm
Abstract syntax tree,
.
. .
Binary tree,
J
KA J K Qm.
Qm
Hierarchy,
.

Tree,
Qm.
Hierarchical,
Qm.
Regional network,

Online,

@ (Z) , J (m )
I K QKB

@ Q. @
I K QKB


Intensity,
Severity,
Caption,
Dash,
Slash,
Urgent condition,
Greedy,
Bit slice,

 Y 

 , Y
 hQ
k
 
Q
 
Q
 KA

PQ Q
Q 

KA J K m 
' Q
HAJ

Data mart,
Switzerland,
Policy,
Context,
Fence,
Workflow,
C,
Lexer,
ReNice,



YA
HAJ
@Q


AJ

AJ

KA
,iJ
.

@ Q



QJ
K@ j 

h'

K K. A

Q ,
K
P
K

K
P
A 
. Q
Gas plasma display,
J
PCK
Screen,
A 
Splash,
ZYK. A 
Splash screen,
K
@YJ.@ A 

Glitch,
 , J . KA 
Common,
KA 
 
Artificial neural network,
J
. J
.
JAJ@




 


Bus network,
K
Q J. , J
k J
.







Bus network,
J
k J. , K
Q J.
 
Computer network,
I.@k J
.





Heterogeneous network, Aj.J Q
J.
 
Interconnect,
J
.





Local area network,
J
m J J.
 J J
 
Logical network,
J

.

Mesh,
J.
 
Mesh network,
K
Q J
.

Net,
J.
 
Network,
J
.

Notwork,
J.
Distributive lattice,

J
K I. 

Strip,
Q K ,  
,Q
Acknowledgment,
A Q
Constant applicative form,

J
J. 
 . AK
IK
Figure,

PAJ@ ,
Form,

Make,

Normal form,
XA 

Shape,
C




Implies,
k , ,
XAD
Certificate,

Digital certificate,
J
P XAD
Month,
QD
Chaos,
@ 

Policy issues,
J
AJ

QJ 
Cipher,

Expansion slot,

Online,

Strict,
Ascender,
Valid,
Paint,
Patience,
Authenticity,
Correct,
Right,
Fault,
Login shell,

Slide,
Bar,
Magnetic stripe,
Magnetic tape,
Menubar,
Menu bar,
Paper tape,
Progress bar,
Scrollbar,
Side bar,
Status bar,
Taskbar,
Vertical bar,
Expunge,
Logo,
Slogan,
Radiosity,

@ (Z)
Q. @ I K QKB






@



Q
J (m ) , IK KB

Buddy,

Slice,

Radial,
Resource fork,
Sector,
Job,

I.kA
PA
YA
l 'A

, AJ
X
.
Q.
m 
iJ
m


, l
,Y

h. Y

Play,
Network transparency,
Referential transparency,
Transparent,
Assembly code,
Byte-code,
Code (program),
Kangaroo code,
Legacy code,
Microcode,

m 
' Q
 Q K
, m 
' Q

Q
J
AJ 
Q

J
AJ 
Q
  Q
 A@



'@@ 
Q
  Q



YJ@ 
Q
 Q@ 
Q
. 
Q

.KAg

@ 
Q
HA
A @ 
Q

XA 
Q
I.
PA
PA
J
A

A
XP J . 
A , J . 

@ ,ZQ@ , 
Q
 @

J
.  J
A
, J
k. Q J
A 
 J
k. Q
J
A @
A 
J
m.' Q 
 Q 
J
KA
Q 
K
Q J Q 
G@QK Q 
QJ
Q 

Education contact,

Vacuum tube,
Diode,
Glue,
Box,
Chad box,
Check box,
Chip box,
Inbox,
Mailbox,
Postal Box,
Scroll box,
Size box,
Abstract class,
Base class,
Class,
Complexity class,
Container class,
Equivalence class,
Buffer,
Cut buffer,
Frame buffer,
Digital audio,
Sound,
Blur image,
Boot image,
Captured image,
Digital image,
Image,
Picture,
Synthetic image,


Jj. @

K. QK @Q ,
K. Q@
A
Q

KA J K A
 , Z@Q ,
A
 J

K. Q , Y
 J

 J Y
HA
 J

Q
 AK Y
 J

 J Y
HA
 J

XP@@ Y
 J

YK
QK. Y
 J

YK
QK. Y
 J

QK
QJ@ Y

Am.k B@ Y
J


XQm. J

A @ J

J
 K J

Y

@ J
 J

J A
@
 @
 @


PAB @ @
 

P H

H
 A P
C@ P
  J P

J
P P
P
P
P

J
AJ@


 Y
 Q K Y
Keypal,
@

Echo,
Y

Local echo,

m Y
Remote echo,
YJ
K. Y

, Y
Block,
Qk

, Y
Prevention,
Qk
 ,Q
Parcel,
AK
. 
 , Q
Q

Zoom out,
Q
Sufficiently small,
AJ
A



J
X HAj

Man Pages,
A


Home page,
K
@YJ.@ j


Homepage,
J

KP j
YA @ j


Man page,


Manual page,
K
YK
j


Page,
j


j
Page in,
 g@X
 PAg j


Page out,
k
.


Web page,
J
J. j
PQ@

j
Demand paged,


Paged,

j
Backward chaining,
m '@ @ Y

Zero,
Q


Zero-content, Jj @ PA ,Jj @ Q
 

Group attribute,
m
.

Q

Beep,

Double-ended queue,
, 
JK
AE X

JK
AE X PK. A

Row,
Q ,

Write queue,
K . AJ
Validity,
J
kC
Solid,
I.
Shell,

XYJ
J
J@

J
KAJ

KQ

 , 

K
AJ

J

Multiclick,
Press and Hold,
Press,
Stress,
Video compression,
Implies,
Optical,
Loss,
Guest,

Dot matrix printer,


Ink printer,
Laser printer,
Line printer,
Printer,
Time stamp,
Floor,
Double-ended queue,
Queue,
Mill,
Clumsy,
Bidirectional printing,
Halftone,
Edition,
Print,
Data link layer,
Host-host layer,
Layer,
Network layer,
Protocol layer,
Nature,
Normal,



A J@ 
Q.g
P Q 

 A
K
.
K A
.
K A
.
K A
.
K A
.

P K. A
PX , K . A
, 
JK
AE X PK. A


JK
AE X
PK. A
KkA


 A

Am.' B@ J
KA J K AJ
.
J
 AJ


.


QK
Qm' , J.
J.


@ J .
HAJ
J

J .
J

J .
 @

J
.  J.
A J
@ J .
 J
J

XA ,
J
J.

Syntax,
Maintenance,
Preventive maintenance,
Formula,
Image format,
Library routines,
SLIP,
SMTP,


AJ

KAJ

 KAJ

J
KA
J

P@ J

JJ J

J

J

h Y , (P) J
K. AJ.
Fuzzy,
D. ,
G. AJ.
Adjust,
J.

Autoconfiguration,

@ J.
Configure,
J.


Noise,
l. ,i.J
m.

Noise,
i.J
m. , l.
Damage,
PQ

Key stroke,
P P

Keystroke,
P P
Compaction,

Compress,

Compression,


K.
 KAJ
Data compression,
HA
 J
Deflate compression,


File compression,

Fractal compression, P (P)

 
Hold Down,
QK , J
J@
J
J@

Lossless audio compression, H@

PAk YK
.
Lossless compression,
X Q

Lossy compression,
X
Blur,

Length,
Low-bandwidth,
Collapse,
Constant folding,


Humor,
Digital envelope,
Envelope,
Kiosk,
Shadow,
Appear,


j J k
.

 . AK
IK


@ Q


P Q
, Q
C

p ,

P

Normal,
Network storm,
Dead,
Reflexive,
World,
High colour,
High definition,
High density,
High,
Common factor,
Compressibilty factor,
Context operator,
Operator,
Vertically,
General,
Generic,
Yield,
Fence,
Break statement,

Model,
Dump,
Big-endian,
Smart terminal,
Terminal,
Video terminal,
Peripheral,
Third party,
Paths,
Abstract method,
Class method,

Urgent,

Normalised,

Input method,

g. A

J
J. ,
XA

  A
J
.

,A
IJ
A
A

@ B@
A
YK
YjJ@
A
A J@
A
KQ ,A
 A
Q
@ A
A B

AJ A

A
AK
XA

Ag. @ ,A
A

YKA

i.J
,  KA
A K@ PAJ.

Method,
Information highway,
Route,
Flavor,
Float (verb),
Charset,
Coded character set,
Frame set,
Bus request,
Dial-up,
Interrupt request,
Request,
Embedding,
Bricks,
Develop,
Phase,
Buffer overflow,
Spill,
Portrait,

I.
P@ Q

h Q

Q
J.J
Q
PJ J Q


J
Q


Q K J
Q
J
KK

Q

 K Q
IA

 Q
HA
XQm K Q
.

J J


K
Q
@ K Q
AgXB

K
Q

@ K
Q
, HA


@
HA
K
Q
,
 K , @ Y



PAm

 PAm

Q Q

 P A@
H@
A K I.

KA I.
@ I
A KB
.
I.

PA@ ,Q
H.

P
P

@ @ A

A


Q

 . AK Q
Fixed width,
IK

 . AK Q
Fixed-width,
IK

Listing,
Q

TERM variable,
:Q
J
J K. A Q

View,
Q

Width,
Q

Acknowledgment,
Q , A Q
 
Distributive lattice, K. A , K
P

K 
Q
K

K
P
  ,  Q
Lattice,
J


Bold,

Q

Dismiss,
XAK. @ , Q
J
  Qj
Encapsulated Postscript,
IK

J
  Qj
Postscript,
IK
Q
Binary coded decimal,
AJ
KA J K Q Q

Decimal,

Q

Random,

K@

Stochastic,

K@
Joy stick,
H. A@ A

Joystick,
H. A B@ A
Q
 AJ@ A
Pointing stick,
Display,

Neuron,
Modern,
Cluster member,
Member,
Weekend,
Cluster node,
Cluster node,
Network node,
Node,
Root node,

I.

Q


Yk


J. B@
 , J
 k Y

X J Y

 k Y
 , X J Y

J

 @
 
J
.  Y
Y

Y

K
P Yg
.

Case statement,
Passphrase,
Hardware,
Material,
Opacity,
Find,
Program counter,
Program counter,
Numeral,


PAJ
.
PAJ
.

XAJ
XA ,XAJ
 J

 '. ,( ) PJ
Im
. X@Y ,m QK. X@Y
l. AKQK

m. QK. X@Y ,l. AKQK


. X@Y

XY

Ag

Q

)
Scalar,

(XY)

@ XY
XY
Chromatic number,

G

Complex number,
I.Q XY
 @ XY
Effective number of bits, A@ IJ
.
Integer,
iJ
m XY

Prime number,

@ XY
 J. XY
Pseudo-random number, K@

XY
Radix,

P Yg
.



Von Neumann integer,
AJ
K XY
iJ
j@


Y
Blur,
(P) J
K. AJ. ,h
Deselect,
ZA JK@ Y
Null,
 Y
PY@
 Y
Unable,


Reference counting, k. Q Y ,k. @Q @ Y



Reference counting, k. @Q @ Y ,k. Q Y

Prodigy,

XQ

Landscape,

Q

Bitmap display,

 K Q

Demo,
Q
Cardinal number,


B@
AJ



AJ
B@


Q. J
J  K ,
HAK

Q. J
J  K ,
Fibre optics,
HAK


 @
On all pages,
HAj


 @
On even pages,
J
k. Q@ HAj
On the line,
m '@
Backbone,
XA
Cognitive architecture,
J
@P X@ PA
 PA
Component architecture,
J
K
Domain architecture,
Aj. @ PA
 . @ 
Bit depth,
IJ


Colour depth,
@ @
Depth,



Operations,
HAJ
Child process,
K
JK . J

J
k J

Light-weight process,
P@
Microperation,
QJ
J

Operation,
J

Process,
J

Work in progress,
PAm .' B @ YJ


Vertical,

@P ,
X
Column,
X
Genericity,
J

Global,

Public,

Client,
J

J
Client-server,
XAg



Light client,
J
k J

Mail user agent,


YK
Q.@ Yj J J

, XAm '@ YJ
Server-side,
XAm '@ J.
Configuration item,
J
  QJ
Element,
QJ
Item,
QJ
P QJ
Picture element,
Fiber optics,

 J)

K
m' ,(
Inverse,

Invert,

J@ C

Equivalence relation,
A
 J C

Logical relation,
J


Relation,
C

Hyphens,
@ HAC

Bookmark,
C
 C

Book mark,


Commercial a,
YJ C
 XQ AJJ@ C

Double quote,
k
.
.

Exclamation mark,
I.j. J@ C

Exclamation point,
J
E C
 
Insertion point,
Am B @ C
 , JJm '@ C

Pound sign,
Q@ C

. 
Yg)
( P

Yg) Q@ C
Pound sign,
,( P

J
Jm . '@ C

Question mark,
A JB@ C

C
Watermark,
J
KA
@ , J KC
Declaration,
CK
.

Outbox,
PXA@ J .
Pack,
J .
 
Turing Machine,
 B@ 
Scientific,


J
J@
Cryptography,

Q
 @
Cryptology,
 
Ethics,
H. @X @ , C
g B@
Flag,


Life science,
ZAJ
k B@
Macrology,
QA @

Bug,


Glitch,
J . KA  , 
Converse,

Defect,
Internal bug,
Sample,


Gas,
Hair,
Away,
Glue,
Object-orientation,
Object oriented,
Chat room,
Room,
Server room,
Snooze,
Envelope,
Wrapper,
Fault,
Faulty,
Deep,
Guru,
Non-volatile,
Case insensitive,
Heterogeneous,
Heterogenous,
Incompatible,
Junk,
Lossless,
Non-existant,
Nontrivial,
Nonvolatile,
Not empty,
Not equal,

I.J

IJ

g@X
.

PA


, A
Y
I.KA
 ,Z@Q
, A
J
k. J@ J
Q

J
k. J@
Q
 Q
XPX
Q
XAm '@ Q
ZA @ , 




Q , C

C

Y ,
Y ,

J

P
QK
AJQ

'@ QK QK AJ Q
Qm
. .



Aj.J Q

J Q
Aj
.

@ J Q

A , IJ @Q , A Q




Q
( )X 

Xk. Q

Y JJ. Q

QK
AJ Q

Q
PA

XA Q

 P J
H@
 k ,X J
Cluster,

Computer cluster,

G. Ag X J
 @ J
Absolute address,

Address,
@ J
J ,m '@ @ J
Domain address, Aj. @ @
 J ,Aj @ @ J
Domain address, m '@ @
.






Dot address,
J
K KJ ,
 K @ J
Electronic mail address,
YK
QK. @ J
Q@

G
Q@ YK QK @ J
E-mail address,

G

.

Indirect address,
QAJ. Q
@ J
@ @ J
Internet address,
I K QKB

IP Address,
K
@ @ J
 J @ J
Logical address,


Machine address,
 @ @ J
Missile address,
pPA@ @ J
Network-address,
J.  @ J
@ J
Paged address,

j
@ J
Q@ Y@
Physical memory address,
 @

 @ J
Shared-address,
Q
Specific address,
m @ J
Title,
@ J
Addressing,
K J
 K J

KA
Byte addressing,
HAJ
Dot address,

 K @ J , J
 K K J
QAJ Q K J
Indirect addressing,
.


 X@ K J

Multicast addressing,
XYJ @


Physical addressing,
K J

Remote,
YJ
K. ,YK.
X
Return,

Software reliability,
l. AK Q.@

Pixels,

PA @ @ A
Separator,
A
Whitespace,
A
Actor,
A
Boot virus,
C@ QK
A

Fax,
A
 J
Chad,
HA
 J
Bay,
j
 J
Branch delay slot,
Q J@ J
 j

 j
 A
Card slot,
HA
. J
 J
Hole,
I. K , j
 J
Slot,
j
Open,
iJ
Q K , @ Q , m
Gap,
.


Check,
Y AK , m

Desk check,

.J m

Self-test,

KA  K m

Software audit,
l. AK Q.@ K . AP , l. AK Q.@ m
J
m' , A J@ m
System analysis, A J@
@ Q
Backspace,
j
, @ Q
Blank,
PA
m , @ Q
Gap,
.

Space,
ZA , Am. , @ Q
 Q
Perspective,
P J , k
.

Cocktail shaker sort,
Cg PQ
Monkey sort,
XQ PQ
Sort,
PQ
Sorting,
I.
KQK ,PQ
AQ
Brush,

Occasion,
J . AJ , Q
Sub,

Q
Branch,
Q
Pathname separator,

Not equal to,


Offline,
Sans serif,
Tentative,
Unavailable,
Unchanged,
Unnamed,
Unrestricted,
Unrestricted,
Unspecified,
Unsupported,
Untitled,
Gigabyte,

@ XA Q

J Q

K
Y Q

E Q

KA

QJ Q



Q
Q

 Q

 Q ,Pm Q
Y J





Q
Q
Pm 
, YJ


XYm Q

Y Q

J
Q


AK. AJ

IK

KA ,hXA

Blank,
@ Q , PA

Empty,
PA


Zero-content, Jj @ Q , Jj @ PA
g , PA

Difference,
C
,A , PA

Distance,
A

Field mouse,
m '@ P A
P A
Mouse,
P A
Optical mouse,
J
K
Corrupt,
YA

Abscissa,
A

Apostrophe,
AJ
A

AJ A
Back quote,
 KA


AJ A
Backtick,
 KA


Comma,
A
Decimal point,

Q A
 , A
,A
Distance,
PA
 A
Field separator,
k
Fatal,

Elephant,
Outside,
Mice,
Category,
Concrete class,
Core class,
Derived class,
Protocol class 0,
Subclass,

J

h. PAg , h. PAm '@

@ Q
J
XYm J
. J
J
JAK
 J
 J
A J J
K
Q

JQ J

 J J
K. A
Scalability,
J@ J
K. A
Computable,
I.
jJ K. A
Countable,
X@YJ K. A
K A
Embeddable,
Q K. A ,PAC
.


Embeddable,
PAC K. A ,Q K. A
Extensible,
YK
YJ K. A
Loadable,
J
jJ K. A
Portable,
m , j K. A
 K A
 Z , AJ
Printable,
AJ
.
.
.



Refreshable,
AKC K. A
 QJ J K A
Resizable,
AJ
@

.

Scalable,
YK
YJ K. A
Fatal,
hXA ,KA
 K QB @ ) lk. . AK PPA
Firebottle,

HA


( A @

Player,
I.B , PA

News reader,
PAJ.k B@ ZPA
 ZPA
Screen reader,
A @
Denominator,
A
Divisor,
A

Base,
A @ , YA

Portability,

  
g , g , Q
Single,
YK
Q

 ,i
Enabling,
J .) ZA J
Mosaic,
(
KA

Fail,

Failure,

Chapter,

Umount,

Unmount,

Complete metric space,
A
Q ZA
Hyperspace,

. @QK ZA
Space,
Am. , @ Q ,ZA

Garbage,
K
A K , HC
h , Q
Pie,
QKA

.




Pragmatic,

K @P X , 
@ ,  

 
Paragraph,
Q
Lossy,
X
Q 
QK
Decode,
Decompress,


Decrypt,
J
J@
Q
 
Decryption,
 P@ , I


J.J@ @
Deinstallation,
I

J.J@ 
 ,K Q@
Demodulate,

K Q@


Disassemble,
g@ ,

Disassembly,
g ,
@
Unzip,


Philosophy,

Index,
Q

Overhead,

GA
Computer virus,

G. Ag Q

Virus,
Q

Overclocking,
J
KAJ
@ J

Overflow,
J

Resolve,

KA 

G
KA 
Legal,

G
KA 
Computer law,
H. Ag
KA 
Law,

. jJ@  A
Access control list,
XA JAK
 A
Cascaded list,
k. PY

 P AJ
k  A
Checkbox menu, Q
 AK K. Q H@

Clip list,
HAA
  A
  P AJk  A
Context-sensitive menu, QK AJ H@


AJ
AK.
 
 H@
Contextual menu,
J
AJ

 P AJ
k A
J@  A
Distribution list,
K
P



Doubly linked list, 
Q@
 A
   A
Drop-down menu,
Y
J@  A
Flowchart,
 Y
 KA   A
Hotlist,


 A
Lazy list,

Mailing list,
K
YK
QK.  A
Menu,
 A

Numbered List,
 Q  A
   A
Pop-down menu,
Y
 Y A K)  JJ ,(... t '@  A
Popup,
.

TODO List,
A @  A
 
 X B@
Tool menu,
H@
A

Stand alone,
K@ YK. 'A 
Plug and play,
J
  .
P A@
J 
Mouse grab,
.


Catch-all-entry,
g@Y @ J.
Grab,
J . 
 
Caret,
J
.

Circumflex,
J.
Accept,
J.
Frag,
 J
Canonical,

Q  YA

K. YA
 KAJ
Database,
HA

K. YA
 KAJ
Decision support database,
HA
 X HA
YA ,P@Q@
 X

P@Q@
YA

Decision support database, HA
 X HA
 X

K. YA ,P@Q@
 KAJ
P@Q@

YA
Deductive database,
HAJ

J
k. AJJ @





Desktop database,
i HAKAJ
K. YA
I.J @
 HA

K. YA
 KAJ
Distributed database, P
Docking station,
I.J
QK YA
K KA
J@ YA
Eighty-twenty rule,
Q
   KAJ

K. YA
Functional database, , J
K@ Q@ HA

K. YA
 KAJ
J
@X HA

K. YA
 KAJ
Functional database,
, J
@X HA

K. YA
 KAJ
J
K@ Q@ HA
   KAJ

K. YA
Hierarchical database, K
Qm. HA

YA
Intelligent database,

X HAJ

YA
Knowledge base,
PA

K. YA
 KAJ
Network database,
HA
 @
J
.

K. YA
 KAJ
Object-oriented database,
HA

J
 KA


K. YA
 KAJ
Operational database, J
HA


K. YA
 KAJ
Relational database, J
AJ.KP@ HA
YA
Rule,
Q
J. I.A
Macroblock,

Message block,
AQ@
I.A
Template,
I.A

K. A
 KAJ
Data dictionary,
HA
Dictionary,
A
 k
 , HAJ



K KA 
Legalese,
HAJ
Canonicity,
J
K KA 
Codebase,

Pumpking,
Constraint,
Divide,
Division,
Division by zero,
Partition,
Quotient,
Section,
Severity,
Authentication ticket,
Clip art,
Clipart,
Malfunction,
Cut and paste,
Cut,
Nibble,
Hard sector,
Sector,
Droplets,
Diagonal,
Diameter,
Region,
Code segment,
Data segment,
Segment,
Disconnect,
Never,
Data glove,
Jumper,
Jump,
Card cage,
Lock,
Screen lock,

Q
YJ
 ,Q
 

 


 
Q


(H. AJ) H. AK. , 
Y , 
 
 J
A JJ
@

A
 
J
J A
P
 
@


I. A
J .  ,A
 Q
H@

Q

Q

@ ,Q
Q 
 
 

K.
 KAJ
HA
 

A@ 

@YK. @ ,

K. PA 
 KAJ
HA
A , PA 
.' ,Q 
PAm
 
 A
HA
.

 
A @

Kill app,
Kill,
Capability,
Serviceability,
Old,
Read,
Monkey, scratch,
Monkey up,
Pirate,
Software pirate,
Piracy,
Software piracy,
Compact disc,
Digital versatile disc,
Disc,
Disk,
Diskette,
Fixed disk,
Floppy disk,
Floptical,
Hard disk,
Hard drive,
Live CD,
Local disk,
Logical disk,
Magnetic disk,
Magneto-optical disk,
Minifloppy,
Multihost disk,
Root disk,
Scratch disk,
Zip Drive,

. J
l. AKQK
J
PY
 m '@ PY
Y
'
Y
Z@Q
 ,XQ


B XQ

AQ

l. @Q.@ AQ

JQ

l. @Q.@ JQ
l. Y Q

PAK.
P Q
Q
Q
Q
Q
I. J Q
Q
Q
Q
Q

K
 . AK Q
IK
I. Q

k Q


m Q
 J Q

J
AJ Q
J
AJ Q

Q.
Q
Q
Q


J
@ XYJ Q
Q

P Yg
.

 . Qk Q
I Q

Q ,YJ

, J K@ X J
 
Eigenvalue,
(
G@ X) Q 
P Yg
.




 
Hack value,
A@ J



Modal (value),

j.jJ@ J

XQm '@ J
 
Salvage,


Value,
J

 
Comma separated values,


@K.
Values,


Constraint,


A

Sufficient,

A
QA
Camera,
Full,
A
Webcam,
I.K
@Q
A


Binary large object,
m 
KA J K KA
 KA

Context object,
AJ


Object,
KA

 KA
Shared object,
Q
'@) Ag

 ,( Qk)
Q.
Case (font),
( Qm
Q
J.K ,Q  .
Zoom in,
Cable,
J.
Cable modem,
X @ J.
Coax,
Pj @ YjJ J.
Dynamic typing,
J
J
AJK
X K . AJ
 K AJ , K AJ
Overwrite,
J

.
.






Overwrite,
K. AJ , J
K. AJ
K . AJ ,  Qm '@ K . AJ
Packet writing,
 PQ@
K . AJ
Packet writing,
 Qm '@ K . AJ ,  PQ@

Scenario,
( )
YD K . AJ
Book,
H. AJ
Detective,

@ I
PAJ
JkB
. 

Light pen,
J
k
Pen,

Say,

 
Junk,
I.J
@Q ,A Q
, A
 . @ AJ 
Bit mask,
IJ
  AJ 
Clip mask,
A
Mask,
H. Am.k ,AJ 
 @

Netmask,
J
.  AJ
 @

Network mask,
J
.  AJ
J
 @

Subnet mask,
J
Q@
.  AJ
Alpha channel,
A @ AJ 
AJ 
Channel,

J.@ AJ 
 KAJ
Data channel,
HA

Secure channel,
J @ AJ 
 J 
Mail bomb,
K
YK
QK. J
.
Grammar,
Y@
Reserved blocks,
A @ I.@

Parentheses,
A
Arc,

Bracket,

Left bracket,
(
)PA

Right bracket,
(
)JJ


Square bracket,
K. Q 
Brute force,
J
A 
PY@
 ,
Power,
Leading,

J
KP ,
XAJ


Benchmark,
Z@X B@ AJ

 K AJ
Complexity measure,
Y


Dimension,
YK. ,AJ

Measure,
AJ

Measurement,
AJ


Chain,

,YJ

Invert Selection,


J
kAJ HA

Words,
HA

Key word,
J
A @


Keyword,
J
kAJ

Keyword in context,
J
kAJ
 @
AJ


Passcode,
PJ.@


Password,
Q

Word,
QJ :

Every,

Accessory,
A
  





Digital camera, J
P QK
 @ , J
P Q
Completeness,

Amount,
J

Quantity,
J

Alias,
J
J

Nickname,
J
J

Kiosk,
,p
CORBA,
AK. P

Console,


Entity,
AJ
KDE,

YJ

Arbitrary,


AK. J

Kilobyte,
IK
 . J

Kilobit,
IK
 . J

Kilobits per second,


J
KA J@
IK
Kilobaud,
XK. J

QJ

Kilometer,
Kilo-,
J

  K J
Kiloflops,
J
KA J@  A

Computational organochemistry,
ZAJJ

JK Ag K


Keywords,

J
KJ@ H. AJ
Catalog,
XQ ,h. AJ
Protected workbooks,
J
m I.J
Block (unit),
 J
Boot block,
C@  J
 
Cache block,
AJ.m J


File control block,
jJ@ Q@ X  J
AK

HA
.

Mute,


 , I.
J
Brochure,
@Q
Handbook,
I.
J
Defect density,
@ A J
 XQ A J
Double density,
k
.
 Q

Brochure,
I.
J , @

Workbook,
@Q
Junk,
A Q
,I.J
@Q
Q
Sphere,
 Q
Slashed Cross,


Bullet,
AP
,X@YK K
Q
Heuristic,
J
.
Q
Fragment,

Break,
Q
Fraction,
Q
Laziness,


Fractal,

P

Monkey, scratch,
XQ ,
 
Autodetect,

@



Collision detection,
HAXA


Demodulate,

K Q@ ,
K Q@

Demodulation,

K Q@

Detect,


Cookie,


Cost,

Docbook,

J .
Assembly language,
J
J
m.' 
Computer language,
H. Am '@ 
Coordination language,
J
 K 
Database query language,
CJ@ 

J.@ Y@
 KAJ
HA
Declarative language,
K
QK
Q K 
Domain-specific language,
XYm Am. 


First generation language, B @ J
m. '@
Fourth generation language,
J
m. '@ 
K. @Q@



Functional language,
J
J

Functional programming language,

m . QK.
J
J

High-level language,
J @ J
A 
Imperative language,
K
PAJ.k. @ 
Language,

 
Low-level language, J @ jJ

Machine code,
 B@ 

Machine language,
 B@ 
 Q 
Metalanguage,

Natural language,
J
J
J. 
Object-oriented language,
J
Q 
J
k. J@
Procedural language,
J
K@ Qk. @ 
Programming language,
m . QK. 

Pure functional language,
J
J


J
A

Purely functional language,
J
J


.

A
Second generation language,
J
m. '@ 

GA J@
 
System programming language, m. QK.
A J@

Game,

k
.B

Suffix,
kB

Nonlinear,

 kB
Wireless,

B


Scratch,
K
@YK. ,.(Q) Z
B
 ,I.B
Player,
PA

Banner,
JB

Asymmetric,
Q AJ JB
Lambda,
@YB

Drop-down list,
m ' B ,@Y@ m ' B
 
Y
  m ' B
Drop-down list,
m ' B , Y
@Y@
List,
m ' B
, K Qm ' m ' B
Recipe,



 A m ' B
K
Scrollable list,
Q
.
Antisymmetric,
KAJ B
Asymmetrical,

QA J K B
Q K B
Asynchronous,

@

Endless,

YK. @ ,
KA
EB
E B
Infinite,

KA
No,
B

. ,Yg @ B
None,
YK

None,
Yg @ B , YK
. ,Z
 B
Non parity,

k. P B

Core,
I.
Q
Functional requirements,
, J
J

CJ
J
J


Tab,
A

Glue,
Z@Q , A
Label,
J

 g , J
Nice,

NO-DAEMON,

@k m  A
Scanner,
m  A
@ A
Placeholder,
A
Macros,
QA
Malta,
AA
Owner,
A
Financial,

A

Optimized,
J A

Italic,
KA
J ,KA

Oblique,
Qj
Water,
ZA


Implicit type conversion, ,  K XAJ.

 K K
m'

Permutation,
XAJ
.

Spacing,
YAJ.
JJ.
Newbie,
Y


 .
Dissertation,
kQ
@ , IjJ

Default,

KYJ
.

Embosser,
Y m. , m. ,P Q .
 Im
 ' lQ. .
Contract programmer,
Y
Programmer,
lQ. .

Scheduler,
Ym. , Yg
. lQ. .
 B@
lQ
Systems programmer,

. .

Obsolete,
Q , J .
Mantainer,
J .
Fuzzy,

G. AJ. ,D.

J.
Connected graph,
J AJ

J.
Connected subgraph,
J
Q AJ

J.
Graph,
AJ
Destructor,
J ,YJ
J.
 J
J.
Screen blanker,
A @
 AJ
Continuation,
A@ ,(@ X m . QK.) K
.


P@QJ@ ,( @X)
Carrier scanner,

Qk
@ YJ

h. @QkB

 
A 
 J ,
AK.


A  J@ HAg

k


 m' k


HAA
 k

@ @ k
 k

J


PQj @ k

iJ
KA k

J

KP k

J

KP k

@ @ k

k

k
 h

k. AJJ @

h
 Q@ h
A J@ h

'PA


ZCB @
P Q 

J J

Literal,
SC/XSpread,
Screenshot,
Haptic,
Concatenate,
Message board,
Board,
CDE panel,
Clip board,
Colour palette,
Daughterboard,
Editor panel,
Keyboard,
Main board,
Mainboard,
Palette,
Panel,
Touchpad,
Deductive tableau,
Pane,
Scroll pane,
System board,
Logarithm,
Color,
Colour,
Fillcolor,
Laser,
Linux,

Material,
Gated,
Deadlock,

XAJ , XA

K . @K. Q. PA

 P @ , P A


 @
J
.  J
 J
Continuous,
, @J ,(k , @X)
QJ
Volatile,
QK
AJ
CJ
Functional requirements,
, J
J

Q
J
J


 . J
Operational requirements, , J
HAJ
 . AJ
Jk@
J
HAg
Requirement,
h. AJ
Jk@ , I.J
Orthogonal,
Y AJ
 J @ XYJ
Cross-platform,
HA
 @ XYJ
Multiboot,
CB


Multibyte,
IK
AJ.@ XYJ
 XYJ
Multipart,
AB@
Multiple,
XYJ
 XYJ
Multiple boot,
CB@
 @

Multiple value,
J

XYJ
Multiplexer,
APB @ XYJ
Multiprocessing,
Z@Qk. B@ XYJ
Multiprocessor,
l. 'A @ XYJ

Polymorphic,
A B@ XYJ
Transitive,
K
YJ
 J
Haptic,
, AK.
Q
J
Class variable,
J
Environment variable,
J
K. Q
J
Global variable,

Q
J
Q
J
Member variable,

Q
J
Variable,
 J QJ J
Logic variable,
J



  J
Free variable,
J

 J ,Qk

  J , J
 J
Free variable,
Qk

Generic type variable,


J@

 J
Local variable,

m
 J
Web browser,

 AK QK AJ
AJ

.

Business to business, 
K. Qk. AJ
. ,I. AJ
Ready,
QAg

Accessible,
hAJ
Residual,

J . J
Sequence,
J
AJJ
J
Homogeneous,
Aj
.

Homogenous,
Aj.J

Dealer,
Qj.J
Sense,
Ak@ , j.J
Vector,
j.J
Coaxial,
Pj @ YjJ
J
Museum,
j

Cache controller,
AJ.m jJ
Controller,
jJ
jJ
Microcontroller,
Q

Network interface controller, k. @ jJ
 @
J
.
Specialized,
j J
 J
Grey-scale,

XAQ@ PY
Q , X@
Q
Synonym,
X@
 Q  k. Q
Byte-code compiler,
J
KA
 Q  k. Q
Byte compiler,
J
KA
Compiler compiler,
k. Q k. Q
Obsolete,
J . , Q
Metric,

Q
Q
Meter,
Micrometre,
QJ
Q
Q 
Concurrent,
 @ Q , @
Q 
Synchronous,
@
 
Bit pattern,
J
KA J K
Serial,

J
Browser,
i
Context-sensitive,

 . AK , iJ
jJ@ IK
 . AK , I
 . J
iJ
J@ IK
 . J
 , K
@ I
Identifier,
Q
 . J
Installer,
I

Like,
J
J
Like this,
@ Y
Double-duplex,
h. XQ
J J
Dual-homed,
Q  @ J
 .
 '. HBAm
Search Domains,
Im
@ Am
 @
Criteria range,
HA
.

Lifted domain,
Q Am.
Space,
@ Q ,Am.
Adjacent,
PAm.

. ,Ym.
Schedueler,
Yg
. l. AKQK

Scheduler,
Yg
. lQ. . ,Ym.
Abstract,
XQm .
Plain,
() XQm.
Conduit,
Qm.
Embosser,
m. ,Y m.
Embosser,
P Q . , Y m. , m.
Sensor,
 m .

Folder,
Ym.
Sub folder,

Q Ym.
Electronic magazine,
J
K Q@ m .

Magazine,
m.

Public directory,

m.
 m.
Aggregator,



Assembler,
m.
 @ m.
Connection pool,
HBA
Native compiler,
Q m.

Aggregate,
m .
 .
Newsgroups,
K
PAJ.k@ HAm
@ m

Character set,
Qk
.



Chip set,
l' @Q m.
Fixed,

Y J
  
Crisp,

J
Discrete,
J , J
Mutually recursive,
XAJ.J PQJ
Destructor,
YJ
J. , J
Stretched,
XY ,XYJ
Proportional,

.AJ K ,I.AJ J

Symmetric,
Q AJ J
Paradox,
  AJ J
Finite,

AJ J

Bounded,
X Y m , AJ J
  J
Eyedropper,
Ag. , I
Miscellaneous,
J J

Body,


Parallelograms,
C B@ K
P @J

Parallelogram,
C B@
P@ J
Parallel,
P @J
Continuous,
(k ,@J
Backward compatible,
AJ
g  @ J
Compatible,
 @ J
Correspondent,
'@ ,'@ J
Involved,
PJ
Average,
J
 J
Intermediate,

Mean,
J

, J
@ J
Reachable,
J
@ @
J
Available,
Q
 J@ I 

 J
,( AJ
J)
Paused,
J

 ,G@ X I

Q 
I
Eigenvector,
 ,Q

I

Eigenvector,

G@ X I
Ideal,

AJ
Example,
AJ
Advanced,


Am
 J Am
Logic emulator,


Attempt,
Am
Content,
Jm
Executable content,

YJ
J K Jm

Command Prompt,
Q@ @ Im

Login prompt,
h. @ Im

Prompt,
Im
Locator,
@ @ XYm
XYm
User defined,
Yj J @


Bounded,
AJ J ,X Y m

Delimiter,
Ym
Desktop publisher,
I.J @ i PQm
 m
Editor,
PQ


Language-based editor,
J. PQm

@
Language-sensitive editor,
Ak PQm


Line editor,

k  PQm

J@ PQm
Linkage editor,
HCJ
 PQm
Screen editor,
A @

Character,
Qm

Char,
Qm

Dingbat,

J
K
Q K Qm

Escape character,
m '@ Qm

Disk drive,
@Q @ Qm

Drive,
@Q @ Qm
Engine,
Qm

@ @Q B@ Qm
Floppy disk drive,
KQ
Hard disk drive,
I. Q Qm
 '. Qm
Search engine,
Im
 , , m
Physical,
Xk. @
J
k
,Qm
QY
Memo,
Emulator,


 m
.

Collection,
m.


K. m
 KAJ
Data set,
HA
.





. m. , H@Q
m.' m.
Device group, PAk
 , PAk

 Q 
m.' m
Device group, H@
. . m.
 ,XAm' m

Discussion group,
m
.
.
.


AJ K
 ,  A J K m

Discussion group,
m
.
.
XAm.'

 @X @ m
Disk device group,
Q@
.

 . h. , m.
Group,
HAm

Lower set,
GX @ m
 .

News group,
PAJ.k @ m.

Newsgroup,
PAJ.k @ m
.


Work group,
m.

Workgroup,
m
.
Periodic group,

PX m.
Sum,
g. ,m.
Sum (noun),
m.
Anonymous,
B@ m.
Unknown,
m.
Conversation,
KXAm
@ XAm
Align,
@ XAm
Alignment,
@ XAm
Justification,
Left-justify,
PA
@ XAm

J
@ XAm
Right-justify,
Vertical Alignment,

XA @ XAm
Justified,
XAm
Emulate,
AAm
AAm
Emulation,
Simulated annealing,
K
YJ@ AAm
AAm
Simulation,
Closed set,

I.J @ i J
m
Development environment,
QK
J@ J
m
 P Jm
Run-time environment, J
 





Backside cache,

g AJ.m

Cache memory,
AJ.m


Hidden,

m , . Jm
Shortcut,
QJm
Cone,
Qm

Q m
Data warehouse,
HAJ
JJ ,( Q m
Format (noun),
)




Format (verb),
) JJ
E ,( Q m
Q m
Z-buffer,
I.KQ I 
m
Descender,
. A ,
Custom,
m
 m
 A@

VFS,
. K . AJ K
. Y HA
Q 
QK m
Character encoding scheme,

PAm

Color map,
@ B@ m

Colormap,
@ @ m

Q k .  m
Flow chart,
AK
. m
Gantt Chart,
I KAg
Schema,
m
 k ,m
Scheme,

Chat script,
KXAm m
Directed graph,
k. m

m
Maintainer script,
K  m

J.@  Y
 KAJ
Data flow diagram,
HA
Hidden,
. Jm ,
m
 , ,m
Disconnected,


Color chooser,
@ @ Q 
m
@ P@Y
Low earth orbit,
j J
P
(A KPB @)
Handler,
@Y
Desktop environment,

J@ ,Qm
PAj


Work station,
m

Workstation,
m

Circular buffer,

PX m
 k
 ,
 m '@
m
Copyright,
QJ@
 m '@
m
Copyrighted,

Criterion,
m

YA m
Database analyst,
HAJ
Data communications analyst,
m


@ HC@
HAJ
Lexical analyser,

m
Protocol analyser,
@Q m
KA m
Cationic cocktail,

GJ

Locale,
J
m
Local,

 m
Parser,
H. Q , m

Autoloader,

@ m
Bootloader,
C@ m
 @ m
Boot loader,
CB

Bootstrap loader,
C@ m
Lilo,
JJ
m
Handheld,
YJ
AK. m
Portable,
j K. A ,m
Protected,

m
Axial,

Pm
Axis,
Pm
X-axis,

J
Pm
Y-axis,

XA Pm
Z-axis,

J
Pm

Number Converter,
AP B@ m
Clear,
m
Protocol converter,
A J
m
Contour,
J
m
Memorandum,

Protocols,

@Q
Q  ,  @ Q
Concurrent,
@
J @ Q , AK

Qm. '@ J . @ Q
Flow control,
 Y@
.
J @ Q

Qm. '@ J . @ Q ,  Y@
Flow control,
AK
.


Job control,
@ J.@ Q
J . @ Q
Remote monitoring,
YK.
Watch,
J . @ Q
Bus watcher,
A J@ I.@ Q
 I@ Q
Disk controller,
Q@
.



Port monitor,
YJ @ I.@ Q
Resource monitor,
XP@ @ I.@ Q
 @

Sniffer,
J
.  I.@Q
 @Q
Mirror,
 K @Q
Disk mirroring,
Q@

Anchor,
. Q

 . Q
Area grid,
kA @ HAK

Bounding box,
Ag@
K. Q

,K. Q
Box,
YJ
Combo box,
XQ QK
Qm' K. Q
Combobox,
I.Q K. Q
Dialog box,
P@k K. Q
Rounded square,
PY K. Q
Square,
K. Q
,I.KQ
Sorted,
PQ
High,
A , KQ
  J k Q
Referential transparency, , J
A@
Jk Q
J A . 



Carriage return, ,( Qm) Q@ @ k. Q

Q@ @ k. P
Reference,
k Q
.
Hello, world,
A@ AE
@ ,AJ.kQ
Repeater,
XXQ
X@ XQ

Airbrush,
AJ
.


 gY

Back door,
A J
Q gY

Inserted,
h. Y ,gY


Histogram, jJ
 GAJ
K. P , P@QK h. PY


Spell checker,

KC@  Y
Compact,
l. Y
Integral,
l. Y
,h Y
Inserted,
gY
.




Average seek time,
J Im '. Y

Duration,
@ X ,  Y
Y
Tilde,
Round,
PY

Blog,
K Y
Admin,
QK
Y
Administrator,
QK
Y


Database administrator,
YA QK
Y


HAJ

K. YA QK
Y
 KAJ
Database manager,
HA

J.@ QQ
 KAJ
QK
Y
Datacenter manager,
HA
Manager,
QK
Y
System administrator,
A J@ QK
Y
 QK Y
Web master,


Webmaster,
QK
Y
Range,
Y

Flavor,
, @ Y

Memo,
Qm , QY
 @Q
Q  k
Code walk,
.

Revision,
k. @Q
 @Q
D@ k
Spellcheck,
Jj
.
.



Synonym,
X@Q , X@Q
Contact,
@Q

Education contact, , K. QK @Q

K. Q@ Jj. @
Entry,

h. Q
 h XQ
Double-precision,
Y@
.
Dual,
h. XQ

Dual head,
@Q@ h. XQ


, Y@
Dual-stack, @ h. XQ
h. XQ


, @
Dual-stack, Y@ h. XQ
h. XQ
Duplex,
h. X Q
 Q
Farm,
P
 

Service provider, Yg Q , Yj K . X Q
@
I K QKB

Increment,
? YK
Q

Workspaces,
HAgA

Closed surface,
 kA
kA

Free space,
PA

Memory address space,
@ J kA

Q@ Y@

Namespace,
B@ kA
 @ kA

Print area,
AJ
.

Surface,
kA

Text area,
J
J.J@ kA

Workspace,
@ kA
 PA
Absolute path,


K. PA
 KAJ
Data path,
HA
Disk path,
Q PA
Mail path,
YK
Q.@ PA
Path,
PA
Relative path,

. PA
Scan path,
i @ PA
URL,
PA

Help,
YA



Promote,
J
QK , YA
Support,
X , YA
Assistant,
YA
Blending,

P AQ
Messenger,
AQ
Addressee,
J
@ Q
Sender,
Q
Filter,
l  Q
Mail filter,
YK
QK. lQ

Wizard,
YQ

Attachment,
 Q
Q@ YK QK  Q

Email attachement,

.

Q
Refutable,


Q
Rejected,


Monitor,
H. AQ
I.Q ,AK. P , AK. P I.Q
Qword,

 P @
QAJ K
.



Qword,
I.Q , QAJ K. P @ I.Q

AK. P ,
AK. P
 Q
Concentrator,
Q


Accumulator,
Q

Codec,
PAQ

Floppy,
Q
Yg@ Q , Q
One-Time,
Q , Yg@ Q
One-Time,
P A  PQ
Mouse-over,


 X J
KQ
Broadcast quality video, Xk. H@
J
@ X@


J
KQ
Compressed video,


Video,
J
KQ
 '@ A KQ

Full-motion video,
Qm


Visible,

KQ
Removable,
@Q
Q
Sync,
J@
Q
Synchronize,
J@

Q
V-Sync,
J
@P J@
Instant messenger,

Knowledge level,
Level,
Run level,
Switch level,
Data logger,
Registry,
Boundary scan,
Erase,
Multiscan,
Scan,
Catalog,
Character repertoire,
Accelerator,
Graphics accelerator,
Data transfer bus,
Bit plane,
Flat,
Ruler,
Space bar,
Formal parameter,
Named,
Draft,
Magnetic tape drive,
Responsible,
Schedule manager,

Participants,
Public domain,
Networked,
Share,
Cellular automata,
Automaton,

@ J
Q
J
J
  J
Yg@ J

K. j.
 KAJ
HA
j.

XYg i
i
XYJ i
i
h. AJ ,XQ
XQ
PAm

Q

K Q

GAJ

.


@ K Q
HAJ
J
KA J K i
i
Q
@ Q
 A
HA

X


Q


J
AJ



J , Yg
.


Yg
.
PA


A

I.

D ,Q

 J

K
g J
@ HC
  

@ J


A , A


J.@
 KAJ
A
Data driven,
HA


Assignment problem, ( m. QK.) 
J
K A

Contribution,
A
Contributor,
A
Equal,
X A , A


Impossible,
I.J ,J
j
E Yj J
End-user,

KA
Yj J
Superuser,
P Yg
.
User,
Yj J

Consultant,
PA 
 ,IJ
Impossible,
J
j
.



Q Q
J

Unknown host,

Rectangle,
J

@ J J
Forward compatible,
,Aj.B
.
@ J@
J J

. 



Forward compatible,
, @J@ J.J



Aj.B @ J.J


 @

Context-free,
AJ
J


Independent,
 J

Deliverable,
J
 J ,QJ
Continuous,
,(k , @X)
@J
Persistent,
QJ

Document,
YJ 

White paper,

 K YJ 
Clone,
pA J@ ,q J
Packet sniffer,
 Qm '@    J
Repository,
XJ
Access level,
XA J@ J

@ J
Data link level,
HAJ

Interrupt priority level,
K
@ J
@
A KB

Distance,

Beeper,
Array,
Associative array,
Matrix,
Factory,
Maintainer,
Anti virus,
Antivirus,
Replication,
Double,
Multiplexed,
Add-in,
Value-added,
Factorial,
Compressed,
Polygon,
Built-in,
Embedded,
Multiplexed,
Host,
Localhost,
Local host,
Mail host,
Slow terminals,
Printed,
Display terminal,
Dumb Terminal,
Intelligent terminal,
Point of sale terminal,
Absolute,
Launcher,
Verbose,
Developer,


Q





J
. @QK 




,J



 Q
XA
HA

 Q
XA
HA


P@QK , A


A

, A



A
 @

J

A

H. Q









, 

A

J

m J

m J


YK
QK. J

JJ
. P A
J.

Q @ Q
J @ Q

X @ Q
  K @ Q
J
K.
 )
 
( J

( )
 

I.J

P




g
@ J

Derivative,
 J
Derived,
 J

Moderator,
Q
Modal,
Q
Project,
Q

Strikethrough,
k JK
,H.

Actuator,


Application Launcher,
J
J.J@
Q 

Floppy drive,
Q
 @

Network operator,
J
. 

Busy,


Encrypted,
Q


Decision problem,
P@Q


 , A K
@

Halting problem,



K

 K

 ,

Halting problem,


AK
@


Knapsack problem,
J . J
m '@

Post office problem,
YK
Q.@ I.J

Problem,


Suspicious,
J


K. PXA
 KAJ
Local data sources,
J
m HA

Approved,
J
XA

Formatted,

, A
Exporting,
PY
Open source,
hJ PY
Source,
PY
Faulty,
,Y

Compiler,
Q
 . @ XQ , IjJ
 . @ i
Search term, IjJ
Term,
i
Q

Thumbnail,
Cellular automaton,


J . l. 'A ,
YJ
 l. 'A
Preprocessor,

YJ
 l. 'A ,
J . l. 'A
Processor,
l. 'A
Word processor,
 l. 'A
Coefficient,
A


Factor of proportion,
I.AJK A
Operand,
A
Parameter,
A
 A
Scaling Factor,
AJ
@
XA
Recursion,
Preview,
JK
A
Q.
Cross-over,

Opaque,

Dumb,
J
Lexicon,
j.

 Y
Equipment,
H@
Baud rate,
XAJ.@ Y
 . @ Y
Bit rate,
IJ

J.@  K Y
 KAJ
Data rate,
HA


J.@  K Y
 KAJ
Data transfer rate,
HA
Frame rate,
PAB @ Y
Hit rate,
K . AB@ Y

Horizontal scan rate,

 B@ i @ Y

YjJ@ Y
Refresh rate,
IK

JB @ Y
Sampling rate,
AJ



Signalling rate,
H@P AB @ Y
Preprocessor,

)
Gold,

( Y)

I. Y@

Metal,
Counted,
Rate,


Y
XY

Q , Y




Aspect,
Q
Viewer,
Q
 XA

Difference equation,
PA
Equal,
A ,X A
Equalizer,
X A





Background processing, J
m '@ m. 'A

m 'A
 YAK
Batch processing,
HA
. .


Cellular multiprocessing,
XYJ m . 'A
K
g
 A J m 'A
Concurrent processing,

.



Data processing,
HAKAJ
J.@ m. 'A

Error handling,
Am '@ m. 'A
Image processing,
P@ m . 'A
Natural language processing,
 m . 'A
J
J
J.
Parallel processing,
Z@Qk. @ , K
P@ J m . 'A
P@ J
Pipeline processing,
K
XP@K m . 'A


Sequential processing, YJ
J K , J
AJJ m. 'A

AJJ


Symmetric multiprocessing, XYJ m. 'A
 Jm

m . 'A
Word processing,
HA@
 X l. 'A
Batcher,
HA
Coprocessor,
YA l. 'A
CPU,
l. 'A

Front-end processor, AC J
l. 'A
Q
J. l. 'A
Macro processor,
Microprocesor,
QJ
l. 'A
Microprocessor,
QJ
l. 'A
Parallel processor,
P@ J l. 'A

 B@
Post Processor,
H@Yg
l . 'A
Shader,

Standard,

PAJ
,
PAJ

Criteria,
PAJ



De facto standard, @ PAJ
, PAJ


De facto standard, PAJ
, @ PAJ

Norm,
PAJ

Standard,

PAJ
,PAJ

Mapped,
JJ

Rhombus,
With,




With copy,
j
PXA
Quit,

Enclosure,

Off,

Q
J

Modified,
Q
J

Modifier,
Soft keys,
jJ@ iJ
KA
. hA
Partial key,

K Qk
Arrow key,
D@ hAJ

Candidate key,
l Q hAJ
hAJ
Character key,

Qm
Clover key,
K hAJ

Command key,
Q @ hAJ

Compound key,
I. Q hAJ
Concatenated key,
hAJ
Diamond key,

A hAJ
XP@ hAJ
 JJ AK. Ag)
Flower key, (
hAJ
Function key,
J

Key (Lock),
hAJ

Meta key,
@ hAJ
Mnemonic key,

Q
Y K hAJ
Q
J
hAJ
Modifier key,

. B@
Multi-part key,
Z@Qk
XYJ hAJ



JB @ Y
AJ


Liquid crystal display,
J.@ KA
@Q

Q
Passive matrix display, X @


.
Parser,
m ,H. Q

Gallery,
Q

Contact (noun),
Q

Knowledge,
Q

 
Character set identifier, PAm Q

Generic identifier,

Q

Process identifier,
Z@Qk. B@ Q

Uniform Resource Identifier, A  Q

XP



User identifier,
YjJ @ Q
 Q
Group identifier,
m
. 
 . J , Q

Identifier,
K
@ I
Broken,
P ,H.



Raw data,
( J
A)Ag HAJ
Argument,

Datum,


,Y
Hair,
A
Mirrored,

Reverse,

Reversed,

Marked,


Info,
HA

Information,
HA

Metainformation,
@ HA

Fact,
@ ,
,
Factory,
J
Fontwork,
m '@
h ,

Meaning,

GA
.
 ,

Significance,
BX
Sample rate,

World-readable,
Dividend,
Destination,
Goal,
Snippet,
Stack segment,
String,
Disconnected,
Netcafe,
Modulo,
Bound,
Restricted,
Host-resident,
Resident,
Equivalent,
Positional,
Place,
Libraries,
Class library,
Library,
Run-time library,
Runtime library,
Central office,
Desk,
Post Office,
Dynamically typed,
Handout,
Condensed,
Duplicate,
Microphone,
Angle bracket,
Broken,



AJ
A ZQ

D@ l'. P ,

Y
,Y

Y




. m
Pj
Q@



,

I K QK@

AJ


Y J


YJ


J
@

A
 , GA


 , A
kA
 . J
HAJ
@ J . J
A J
J . J
P J . J

J
 
P J . J

J
 
I.J

QQ
Y J ,IJ
.
Q
YK
.@ I.J

AJ
J
AJK
X H. J
 J , H J
j
.
Qk. , J
PQ

Q


P
H. ,P

Q hAJ
hAJ
Propeller key,
@X
hAJ
Public key,

Secondary key,

GA K hAJ
hAJ
Shortcut key,
PAJkB@
hAJ
Spacebar,
@ Q@
Mail exploder,
YK
Q.@ Qj.
 . @ i , IjJ
 . @ XQ
Search term, IjJ

Sorted,
I.KQ ,PQ

Interpreter,
Q
Interpreted,

Joint,


Favorite,
I.j J ,
.
Side-effect,

.KAg
Q
Agenda,
 ,
Disconnected,
m ,
Screw,
YK
,
, Q


Object file,

Q

Conceptualisation,

Agent,



Compare,
KPA


Article,
A


Firefighting,
PAJ@ A

Socket,
.

Binding handle,
AJ.KP@ J .

Handle (noun),
J .
J ,J
Quoted,

Q Q.  
Proposition,

@P ,h@ @ ,h 

Network segment,

J. J
J
Quoted,
.J ,

Readable,
ZQ

Read only,
 ZQ
Private key,

 Q@




Hidden file,
m

Initialization file,
JJ
E

Local file,

m


Locked file,


Log file,
j.@

Metafile,
@

, Q

Object file,
Q


Permanent file,
'@X

Physical file,

, Z@Qk @

Process file,
m . 'A
.
, m 'A

Process file,
Z@Qk. @
.

 
Raster file,

A

 . Qk
Scratch file,



Q @ Y@
Swap file,
K
QA@


Temp file,
I 


Zip file,



Print server,
AJ
.

Virtual server,

QA
Property,
J
Ag , J

Q
Millimeter,
 ,
Physical,
m , Xk. @
J
k

 JK
. , @ YK
Flavorful,





Flavorful,
@ YK.
, JK.

Millisecond,
J
KA K

Autofill,

@ Z
Fill,
Z

 Z
Full screen,
A @
 J@ @ , 
,YJ
Expanded,
A
Stretched,
XYJ ,XY
Blocked,
J
 Q
B@
Case-sensitive,
Qk
Am 

Q 

Distinct,
Header file,


I.

Hypercube,
 KA

Q 
Corpus,

Q 
Thesaurus,


YA J
Database machine,
HAJ

Parallel random access machine, XAK J

P@ J
K@

Component,

Adapter,
J

A K 
Host bus adapter,
J

K , HA

 kC
Observations,
H@YQ

Remark,
kC

Navigate,
kC
Navigator,
hC




 J.J@ 
K
C
Megabits per second,

HA
J
KA J@
 P AB @  J
Frame grabber,
H@


Plugin,
j
Salt,
i

Summary,
j

,
Poster,
C@



Files,
HA

. HA

Startup files,
ZYJ.@ l. AKQK


 Y@
Batch file,
HA


Cluster file,
Yk

Control file,
m'

.
Core file,

AK


K. A
 KAJ
Data dictionary file,
HA


Distributed file,
P

Dot file,

 K

Executable file,

YJ
J K

File,

 

Genetic programming file, G@P m. QK.

Cube,

 J

 J
Logical,

 J
Q K B
Asynchronous logic,

@
 J
Classical logic,

YJ
 K
 J
Combinatory logic,

 @ K
 
Digital logic,
J Q@
J







First-order logic, J , I
. 
KQ@
 @ J
 PY@  @
k
.



 J
, k. PY@  @
First-order logic, J


I.
KQ@
 @
 J
Fuzzy logic,

G. AJ.
 J
Intuitionistic logic,

E
YK.
 J
Linear logic,
k
 J
Logic,

Look,
Q J
 @ ,
 J
Organization,
Q
 J
Org,

Organizer,
J

Schedule manager,

 , Yg
. J

Yg
.




Sequencer,
K. AJJ@ J

Window manager,
Y @ J@ J
 Q ,P J
Perspective,
k
.
J
Isolated,
XQ J , Q
P@ J Y J
Enhanced parallel port, YJ

Ephemeral port,

Y J
Parallel port,

P@ J Y J
Port,
Y J
 @ Y J
Printer port,
AJ
.
Registered port,
j. Y J

Serial port,

 Y J
Y J
Viewport,
Q@
Boolean,

XAJ
 , J AJ
Occasion,
Q
.

Thread,
 A J
Popup,
(...t '@  A ,  Y A K)  J.J
Pop up,
 J.J
Alarm,
J.J
Alarm clock,
J.J
Product,
i.JJ
Favorite,
,I.j J
Forum,
YJJ
Regular,
JJ
Selection,
 JJ
Backend,

g DJ
. h JJ
Coproduct,

.KAg
.

. , PAj
J
Partial,

KQk
J
, Qj
Oblique,
KA
J
Curve,
J
Jj
J
Bell curve,

Qk. j
 J
Handout,
H. J , j
Low,
j J
Lurker,
YJ
Since,
Y J
Rank,
 Q 
Home,
Q 
PQK
 
. A
Demand driven,
 J
Platform,

Desk,
I.J , Y J
 J
Area,

 J
Drawing Area,
Q@ 
 J
High memory area,
J
A Q@ X 
 J
Low memory area,
 j J Q@ X 
 J
Time Zone,
J
J P 
 J
Work area,

Callee,


@
Agree,
 @
OK,
 @
 @

Fine-tune,
J
X
Correspondent,
'@ J ,'@

Matching,
Z@

Key escrow,
hAJ @ 

 QK
Effects,
H@



Q
K AK ,QK
Effect,

Documentor,
 K
.
Condensed,
J ,Qk
Connection-oriented,
ABAK. k.
Router,
k.
 J k

Continuous wave,

.

Wave,
k.
Exist,

k ,Xk.
Existing,
Xk.
Modem,
X
Generic resource,

XP
Global resource,

XP
Parallel resource,
P @J XP
Resource,
XP


Scalable resource, XP , AJ
@ XP
J
Q K A

.




Q
Scalable resource, XP , J
 K. A XP

 
AJ
@


Inherited,
HP

Distributed,
P

Distributor,
P

Hub,
P

Postmaster,
YK
Q.@ P

Switching hub,
K
YJ.K P
Specification,


Q
Y J
J ,XQ J
Isolated,
Q
Discrete,
 J , J

Dataless management utility, Q
K. YK J

@
J
Ag
HAJ
Relay,
K
YK. ,A J

Debugger,
i J

Dotted,
 J
 J
Deflate,

Methodology,
J
j.D

Client-side,
J
@ k
.
,XAm '@ YJ ,XAm '@ J.

Server-side,


XAm '@ J
kAK

 ,XAm '@ J kAK
Server-side, ,XAm '@ J.


XAm '@ YJ
Dialup,

KA ,  KA
Deprecated,
Pj.

Contention slot,
PA J K

Q
g AK ,
Delay,
 @ I

 DK@ ,
Timeout,


Trash,
HC
Task,

  YJ

Network engineer,
J
.
,
Formatted,
A





Host adaptor,
J





Printable,
AJ. K. A , AJ. Z

XP@
Pipelining,
Load balancing,
K P@ ,J
jJ@ K P@
m '@
Load balancing,
K P@ ,m '@ K P@
J
jJ@
k , HA

 @
Properties,
A

@
Functional specification,
J
J

Well-known port,

XA

Location,


Q @ Y@

Memory location,
@Q

Mirror site,

News Site,

PAJ.k@

Site,



Website,
I K QKB@
Generator,
Y

Author,


Locked,

 Q  

Byte-code interpreter,
J
KA

Command interpreter,
Q@ @

Command-line interpreter,
Q

Q@ @


Dead,
A , IJ

AK. Aj.J

Megabyte,
IK
Mega-,
Bj.J

Q 
Feature,


Q
Resolution,




. AJ

Connectionless protocol,
YK
A@
  K A J
Point-to-point protocol,
@

 K
Protocol,
A J

Micron,
QJ
Micro-,
QJ

Micro,
QJ

Minix,
JJ

Centum call second,


A@ J
KA K J
Percentage,
K
J
Percentual,

J
MSDOS,
Y..
Backbone site,



AK ,

Parametric,


Centered,


Expanded,
YJ , 
Ephemeral,


Blinking cursor,
 . AK Q
  K Q

Chase pointers,
AKj
.
Q
Cursor,
( P A@)


Dangling pointer,
Y Q

Error indicator,
Ak Q


Indicator,
@X ,Q
P A@
Q

Mouse Cursor,

Null pointer,
Z
C Q
 
Peak indicator,
J
A @
Q

Pointer,
Q
 Q

Stack pointer,
Q@
Coaxial cable,

Pm
Linked to,
@
Linker,



Code position,
QP


KQ@ A @
Hook,


Position,


Topic,

Appointment,
Y
Rendezvous,
Y

Provider,
Q
 g Q
, Y
 m '@ Q

Service provider,
Y
 j K X Q , I K QKB
@
Y
.









Service provider, X Q , IKQKB
@ Yg Q
Ym '@ Q
, Y
 j K
        .
Paused,
( AJ
J) J , J
J@ I
, 

Positional,

GA


Archive site,

J
P @
Foundation,

 AK

J

. Z@YK
 
 @
Call-by-value-result,
J

j.J
JK. Z@YK
Callout,
Z@YK
Call-with-current-continuation,
Z@YK
 AK
J
Am '@ @
.
Detach,
Q K

Strip,
  , Q K

Down,
B Q K
Aspect ratio,
J
AK. J . 
Ratio,
J . 
Relative,

.

Backup,

AJ
Jk@ q , J
AJ
Jk@ j

Child version,
K
JK . j

Copy (verb),
j
 

Facsimile,
B@ J. j 
 j

Hard copy,
J
P
 , AJJk@ q
Backup,
, J
AJ
Jk@ j

AJ
Jk@
Copy (noun),
q
K AJJk@ q
Differential backup, A

 

Rip,
J
P A q
JJ ,()
 
Format (noun),
, )

( Q m
Activity,
A 
Podcast,
( J
K) Q


Desktop publishing, I
. J @ i Q. Q
Publish,
Q
Active,
J
 
Q

Half-Sphere,


Halfword,



AK.
Nybble,
IK

Radius,
Q

Ciphertext,
Q


Call-by-value,

 XAK
'
Publisher,
Q P@X ,QAK
Smooth,
AK
   Q  Y A K
Inactive window,


Plain window,
A  Y A K
 Y A K
Window,
Root Window,
P Ym . '@  Y A K
Minus,
A K
Address bus,
K
AJ A K
Bus,
A K
Carrier,
Ag ,A K

J.@ A K
 KAJ
Data bus,
HA


Digital carrier,

P Ag ,
P A K
System bell,
A J@ A K
Nano-,
KA K

Nanocomputer,
@ I.Ag KA K
Q KA K
Nanometre,
Nanosecond,
J
KA K KA K
Sleeping,
'A K

Discard,
Y J . K
Heartbeat,
I. J . K
Succeed,
hAm.'
 '
Efficiency,
Am
.

Relief,
Ym.'
 '
Star,
m
.
Concrete syntax,

XA m'
 J m'
Context-free grammar,

 @
AJ

 '

Elite,
ZAk. , AJ
@ , J.m
Call-by-name,
BAK. Z@YK
 Am 'AK Z@YK
Call-by-need,
k
. .
Call-by-reference,
k. Q AK. Z@YK

SOCKS Server,

A 

HA
 
A 
Hierarchical file system, Qm. HA
A 
I/O subsystem,

Q h. @Qk@ , AgX@



Knowledge-based system, J. A 
@
Q


Multiuser system, 
YjJ @ XYJ A 
Network operating system,
J
  A 
 @
J
.
Numeral system,
Y A 
Operating system,
J
  A 
Production system,
h. AJK@ A 
HA


Root file system,

P Yg
.  A 
P A 
Run-time system,

J
 
P A 
Runtime system,

J
 
System,
A 
Windowing system,
Y @ J@ A 
Window system,
Y @ K A 
Writing system,
K . AJ A 
HB
 B@ K
Q 
Automata theory,
J
K@ Y@

J
 @


Axiomatic set theory,
HAj
. @ K
Q 
J
E
YJ.@
Complete theory,
K
Q 
Computability theory,
I.
m' K
Q 
 K Q 
Decision theory,
P@Q@

Domain theory,
Am. K
Q 

Number Theory,
AP B@ K
Q 
Q

Q
JJ@
Peer-to-peer,
Q

Analog,
Q

Peer,
Clean,
J
 K , J

Yes,
K
Access,
XA K
Filesystem,


New text,

Perl Script,

Plain text,

Text,

Text only,
 
Domain maturity,
Aj. @ i. 
Jumper,
PA  ,A

Baseband,

A @ A





Broadband, @ A ,@ XXQK A



Broadband, @ XXQK A ,@ A

 
Domain,
A
 
Scope,
A
 
Timezone,

P A
 
Zone,
A
Bootstrap,
QKJ
J.@ J
  YJ
 A 
 AJ A 
Bug tracking system,
Cg K
.





Bulletin board system, H@QJ@ k A 
Communication system,
A@ A 


Complete inference system, AJ.J @ A 
A

Database management system, Q
K. YK A 

@ YA
HAJ
J
  A 
Disk operating system,


Q@
A 
Distributed system,
P
Hypertext,

 KA
YK
Yg.
Q
K.

Q

Dynamic database management system,


J.@ YA P@X@ A 
 KAJ

AJK
Y@ HA
Electronic funds transfer system,
A 
QB@ @B@  K

G
Embedded system,
P A 
Q
J.k A 
Expert system,
@ A 

File system,
HA

 Y
k
.

Data modelling,
k. Y
 Y
Modelling,
k
.

Prototyping,
k. Y
Answer mode,
K . Ag. B @
J@ Q@

Demo mode,

jJ

@
Insert mode,
h. @P XB @ , AgXB



Insert mode,
AgXB @ , h. @P XB @

Night mode,

J

Noncluster mode,
B , k B

X J

 B
Noncluster mode, B , XJ

k
,  PP
Packet mode,
 Qk

Page mode,

j
Pattern,

 PAgX@

Power save mode,
A@

Relational model,

 KC

Root mode,

P Yg
.


Single-user mode,
YJ
k@ YjJ @

Wizard mode,
YQ

Packet mode,
 PP ,  Qk

J h X
Client-server model,
XAg

.

Color model,
@ @ h. X

Colour model,
@ @ h. X


@ h. X
Data model,
HAJ
Growth,
j  ,
Day mode,
J@
PAE
Weekday,
PAE

 J Q K AE
Unexpected end,



Back-end,
J
g K
AE
K AE
End of file,

Data modeling,


@
HAJ

@
HAJ

XA K
YK .
 , K
A K
Garbage,
HC
Double click,
A KQ K
Q K
Click (noun),
Q K
Tap,

Click,
Q K
Click (verb),
Q K
Hold Down,
, J
J@ Q K
J
J@
Reduce,
 K
Reduction,
 K
Colon,
A J K
  K
Access point,
PJ.@
  @
  K
Breakpoint,
A
  J,A
  K
 K@
Break point,
Q
  K
  K ,Q
Break point,
A K@
  K
 J@
Checkpoint,
 j
  K
Control point,
jJ@
  K
Dot,

 
 @
Dpi,
J
.
K
  K
Endpoint,
K
AD@
 
  K
Hot spot,
A
  K

Mount point,

  K
Point,
Q K
,
  K
Point of presence,
Xk. @
 .  J  K
Bit block transfer,
IK
  K
Cluster-transport,
Yk
Electronic funds transfer,
@@  K
Q@

G
@  K
File transfer,

Linear transfer,
k  K
Transfer,
 K
, ,
 K
Flavor,
@ Y
Remote access,

JE
, KA
Hacker,
QA
Hack,
A

Dummy,

@ Q @ ,YA

A

Marginalia,
HAJ

Margin,
A
Haiti,

K
A
Dial,
J
Spelling,
ZAj.




Brute force attack,
J
A@ AK. j.

j.
Hybrid,

 , Y
Goal,
Y

Marker object,
@ Y

J.@  J
Q
 KAJ
Data hierarchy,
HA
Hierachy,

Q
Pyramid,
Q
Light precipitation,
m.
Left parenthesis,

PA
C
Right parenthesis,

C
 
Constructive solid geometry, J. YJ
J
KA JK .
 J
Domain engineering,
Aj. @ Y
 J
Engineering,
Y
 J
Geometry,
Y
 J

m.Q.@ Y
Software engineering,
HAJ
Geometric,

YJ
ID,
K

Framework,
J

JJ
  ,( Q m , )
Format (noun),


()

Time format,
I @ JJ

Phone,


J
A @
J
kC@

K
AE
K
AE
@K
J
jJ K. A @K
CJ
KK
PK

K. K
 KAJ
XQm. HA

K. K
 KAJ
XQm. HA

m . K

K. K
 KAJ

Q.g. HA

J . K

J.@ K
 KAJ
HA
 K
 J
 K
X Y
@ K

k K

K
A@
:
J
K K

J
KP K
XP @ K
A J@ K
K

J
J. J@ K
K

K
K
JK. , K . AJ
K
I.J
J
K

Front end,
Purge,
Kernel,
Loadable kernel,
Nautilus,
Light,
Abstract data type,
Abstract datatype,
Aggregate type,
Algebraic data type,
Constructed type,
Data type,
Derived type,
Enumerated type,
File type,
Linear type,
Media type,
Mime Type,
Principal type,
Resource type,
System type,
Type,
Type bindings,
Sleep,
Microkernel,
Delegation,
Netscape,

Descender,
Dialup,
Cellphone,
Metaphone,

m , A

.
 KA , KA

g KA

@ KA

m . 'A @ Yg
@
K
QQ
K
J  J
Yg Yg
m' Yg
 g Yg

J.@ Y
 KAJ
HA

K. Yg
 KAJ
HA
  
J
Q@ Y
m '@ Yg
JJ



Yg
Yg
A J@ Yg
Yg
 X
k
 .
J B@
K@P

Yg K@P

P

P

H. Ak P

P

P

P

P

P A@
XA

J
. @QK A

A

XYJ A

X A
Z
YK . ,t


J


J

K Qm ' m ' B , 



HC

Central processing unit,


Channel service unit,
Control unit,
Data service unit,
Data unit,
Digital service unit,
Functional unit,
Module,
System unit,
Unit,
Widget,
Priority inheritance,
Single inheritance,
Leaf,
Sheet,
Spread sheet,
Worksheet,
Paper,
Distribute,
Weight,
Mouse pad,
Hypermedia,
Media,
Multimedia,
Push media,
Dirty,
Medium,
Tag,
Proxy,
Utility,
Recipe,
Links,

 K 

 g

Ring topology,

Wap,

H. @

API,
k. @
 @
k
Command line interface,
.
Q@ B@


 
Global interface, J
k. @ , J
Ag. @ k. @


 
Global interface, J
Ag. @ k. @ , J
k. @
 @
Graphical user interface,
Yj J k
.
JP



 @

GUI,
J
Q@ YjJ @ k
.


Haptic interface,
J
k. @

 
High speed serial interface, J
 k. @

Q@
J
A

Iconic interface,
J
K K
@ k
. @

Interface,
k. @

 @

 J  @ k
MDI,
XYJ @ H@Y
.




Service interface,
Ym '@ k. @
 @
Video interface,
K
YJ
k
.
Incoming,
XP@
 J@ @
,YJ , A
Expanded,

Marker,
@

Descriptor,
@
@ @

File descriptor,

Pragmatic,

 , 
 @

,@
Fact,

Web,
H.

Hypotenuse,
QK
 @ QK
Close routine,
C

QK
Routine,


Elite,
AJ
@ ,ZAk.
Emoticon,

Q
J.K k.
 J
J.J@
HA

m . QK.
Q

Revoke,

I.j
,J.K

 , k JK

Strikethrough,
H.
Orphan,

JK

Converge,
Y m 
'
Finger,
m
'
Write-protect,
K . AJ@ Y
m
'
Referer,
YK

Integrate,
l. YK

Rotate,
k P@X ,PYK

Bounce,
YKQK


Q 
QK , Q QK
Encode,

Left,
PA


Exclude,

J







Sniff,
J
,J

Sniff,
J
,    J

Revoke,
J.K
, I.j

Occlude,
Y 

Stroke,
Y


Replicate,
PQK
, A

Printing,
J.

Rely on,
YJK

Infect,

YK

Revert,
K

On,
K

Dictate,
Q
Screw,
,YK


K

Pumpkin,
Normalize,
P@QJ@ K

 ,PQK
Loop,
g



Replicate,
A
,PQK

Reachable,
J
@ J , J
@ @
Right,
l , 

Spoof,
jJK


J

K
QP

K
QP


Symbolic link,


Symlink,


Mount,


Pose,
J


Mode,


Protected mode,

m

@
Safe mode,

 @

Supervisor mode,
Q
 , X
 ,h

Sharpness,
Yg

 m ' ,(...t '@ ,l. @Q.@ KA
Validate,

@ HA

J.@) m 
 KAJ
 gY

J

Function (Programming),
QY @ J
Memo function,



Relevance,
K
Q 
J
 J


Functional,


@ , K
A
Safety,


Preventive,

KA

Response time,
K . Aj.JB@ I


Stop,

User agent,
Yj J @ J

Dial-up login,

J h.
Login,
h.
Q@ X h
Memory access,
.

Single sign-on,
Yg h.
Blink,
J

Virtual,

Wiki,

K

JK

Windows,
PY
AND,

Link rot,

Navigating,

QjJ.
K

Lurking,
Lurk,
Slide,
Copy,
Loop,
Double-click,
Right-click,
Phone,
Mumble,
Point,
Sign,
Day,
Unix,
Unicode,

YJK

YJK

m 
' Q ,  Q K

qK

 ,P@QJK Y JK
PQK
, g
.

Ag. X Q Q JK


J
@ Q JK

KA , JE

 K ,Q K


PA@ , QP


,K

K K

XJ
KK


MS,


: K

MTU,

5
Microcentury,

 
AJ.K
QK

J
KA K 6.52

)
 (1)
. Q j
(3) ; m  AJ (2) ; J
KK
t AJK

 QK (1)
Heading,
@ J (2) 

CC,

Noname,

FreeBSD Documentation License


Copyright 2006, Arabeyes.org. All rights reserved.
Redistribution and use in source (SGML DocBook) and compiled forms (SGML,
HTML, PDF, PostScript, RTF and so forth) with or without modification, are permitted
provided that the following conditions are met:
Redistributions of source code (SGML DocBook) must retain the above copyright
notice, this list of conditions and the following disclaimer as the first lines of this file
unmodified.
Redistributions in compiled form (transformed to other DTDs, converted to PDF,
PostScript, RTF and other formats) must reproduce the above copyright notice, this list
of conditions and the following disclaimer in the documentation and/or other materials
provided with the distribution.
Important: THIS DOCUMENTATION IS PROVIDED BY THE ARABEYES WIKI
TEAM AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE ARABEYES WIKI TEAM BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Document generation: Djihed Afifi, djihed@gmail.com

 K X @ G Q
 kP
ZA

 m '@ . Arabeyes.org , 2006 q@


 k

m
. 

 KYK

J@ XAK. i

(SGML DocBook) PY @ JJ


. @ K
YJ@ YK. @YjJB@ K
P






 @ HA

QAK. (t '@ ... RTF @ P ostScript @ PDF @ HTML @ (SGML j
.  JJ
@  @
: J
K B@
Q@  A C @ PY @ q@
 k
 Q A JkB@ K @ Im'
ZC@ Y
.

..







  JJ K P

(SGML K
PY @ Q@



J@ XA @ YJ Q
K YK
. AKX @ PY @ Q@
. DocBook)













Q@ ZCgZ , Y Q@ ZA , C @ PY @ q@ k Q YJ
K K
@ I.m.'



XA @ YJ j




, AKX @ PY @
. @
A Q
K K
Qk @ X@
@ @/ J
KJ@
@ Q
Z



 ) j
 @ JJ @ K P
Qk @ K @ m
@ PostScript @ PDF @ m
, DTD
.



J@


.(Qk @ JJ

@ @ RTF


J KJ@ YJ 


 K @ Y
 Q
Q@
ZCg @ A QK
@ H. Q
K
K
Q @
.

K K
:A
 @ PAjJ@ iJJ @ J AJ HA
@ AD A. , JJ
@
. @ m 
' Q HA
 KA
 KA

Z JAJ
.

 Q 



B . Y
J
Z @ QK
@ H. Q K
K
Q J
m'
@ QAJ. 
@ QAJ. , 
K
@

 @ Ag @ X
 Q
 YK HAY
g @ ZAJ J@ A A.) JK @ G A

K. PAk ; K

HAKAJ
.

.



C
 Z H ' @




K @ ;@YjJ@ k @ hAK P @ @






K
Q

J@
I
KA
A
(

gY












@ PB
Z@ AD J
. @
@ K
Y K
Z I KA
,( X Q
@ AZ@ J J) J
KY

J
J@ ' k
@Yj J@

@ Y
 , J
KJ@ @ Y

QK
Yj
 ZH. ZQ @
.Q @

djihed@gmail.com

XAk : m QK
,
J

. . .

Das könnte Ihnen auch gefallen