Beruflich Dokumente
Kultur Dokumente
GA @
J@ A@
Q
m.' @
G. Q
Arabic English
Technical Computing Dictionary
Qm '@ K PA @ IK QK K Q
This is a compilation of the Technical Computing Dictionary that is under development at Arabeyes, the Arabic UNIX project. The technical dictionary aims to to translate
and standardise technical terms that are used in software. It is an effort to unify the terms
used across all Open Source projects and to present the user with consistant and understandable interfaces. This work is licensed under the FreeBSD Documentation License,
the text of which is available at the back of this document. Contributors are welcome,
please consult the URL above or contact doc@arabeyes.org.
@ Y QK AK Q Q Q QK K Y@
.
.
J@
G. Am '@ A j Y
.KJ
YE
J@
J @ J J J@ HAj
AK. D
@ YJ
kK g. QK @
A@
. J
@
H Ag k
@ ' Y J g Q @ K H PA J@ XA J ,H Am '@ l @QK g QK
. .
.
.
. . .
K X @ G Q
kP A@
kP . J K QAK J @ Yj J j
ZA
.
. .
ZAg Q@ , A @ K IkQK .A@
K AE Q
J @
AB@ @ C @ @ J@
@
H. A Y@
.
. .
. doc@arabeyes.org
AJ ,( @X)
A@
m . QK.) K
.
(@ X
Missed call,
I KA
A@
Multiplexing,
XYJ A@
License agreement,
J
k Q@ J
A K@
Agreement,
A K@
Calling convention,
Z@YK A K@
Hot Key,
hAJ @ A K@
Shift key,
hAJ @ A K@
Prevent,
I.
Jm .' ,ZA K@
Autocompletion,
KA
K A@
Finalize,
AJJk@ , A@
,A
@
Finish,
ZAE@
, A@
,A
@
. , HAJ
. K@
Proof,
AQK
P
A@
QK
@
Mouse trails,
Adaptive answering,
J
J
K K . Ag.
@
Response,
K . Ag.
@
P@ , K A@
@
JJk. @
Deforestation,
K . A@
. HA
Pull,
I.m , Qk. , H. @ YJk.
@
Audiographic teleconferencing,
AJk. @
J
m '
YK.
Video conference,
KQ AJk. @
Qk.
@
Fallback procedure,
k. @Q@ H@Z@
Action,
Z@Qk.
@
Z@Qk.
@ , A Z@Qk.
@
Defunct process,
IJ
Z@Qk.
@
Defunct process,
A Z@Qk.
@ , IJ
Orphan process,
JK
Z@Qk. @
Parallel processing,
m . 'A , P@ J Z@Qk.
@
K
P@ J
Procedure,
Z@Qk.
@
Runnable process,
J
Z@Qk. @
General,
A ,
Ag.
@
.@
Abort,
Ak
Continuation,
.@
P@ QK.
@ , KAK
Initial,
K@YK. ,
K@YJK.
@
Alphanumeric,
XY
Ym.'. @
Numeric,
XY
Ym.'. @
@YK @ , Qm '@ @YK @
Packet switching, PQ@
.
.
@YK.
@
Packet switching, Qm '@ @YK.
@ , PQ@
Never,
, @YK. @
E B , YK
@
Endless,
KA
.
Highlight,
P@ QK.
@
. @ , P@ QK. @
Highlighting,
KAK
Pin,
, QK.
@
.@
Epsilon,
Revocation,
I.m ,A.
@
,XAK.
@
Dismiss,
Q
@
, CK
Declaration,
J
KC
.
Swallow,
K. @
Parent,
K. @
White,
J
K. @
K@
Accessibility,
kA
Direction,
Am.' @
Orientation,
J
k. K , Am.' @
Renew,
YK
Ym.' @
Discriminated union,
J XAm'
@
Disjoint union,
XAm'
@ , @ m XAm'
@
J
Disjoint union,
m XAm'
@ , J XAm'
@
@
,A@
Span,
QK
.
Connective,
. @P ,
A@
Connect,
A@
Connection,
A@
Contact (verb),
A@
Highlighting,
PAJJk@
PAJ.Jk@
,
.
A
PAJ.Jk@
Functional testing,
Heuristics testing,
J
.@ PAJ.Jk@
. PAJ.Jk@
Hybrid testing,
j
Manual testing,
YK
PAJ.Jk@
Test,
PAJ.Jk@
Yg@ PAJJk@
Test Module,
.
Finalize,
A
@ , A
@ ,AJJk@
Picker Settings,
H@X@YB
@ Qg@
Beta reduction,
AJ
K. @Q g@
Jk@
Type mismatch,
J@
C
Probability,
K ,AJk@
Choice,
PAJ
Jk@
Choose,
PAJ
Jk@
Domain selection,
Aj. @ PAJ
Jk @
Multiselection,
XYJ PAJ
Jk@
Picking,
ZA JK@
,PAJ
Jk@
Select,
PAJ
Jk@
Serve,
Yg @
Ping-pong,
XP Y g @
,h @Qk@
Input/output,
AgX@
.
I/O subsystem,
AgX@
A ,
Q h. @Qk@
Other,
Qk @
Green,
Q k @
Cache miss,
AJ.m ZAk@
ZAk
@
Minor faults,
Q
Hide,
ZA k@
g
@
C
Computer ethics,
H. Ag HAJ
ZCg@
Disclaimer,
J
Disassemble,
,g@
g B@ ,H @X@
Ethics,
AJ. @ , C
.
AJ@ H. @X @
Netiquette,
J.@
Exhaustive testing,
XAg @
Monochrome,
XAg @
Cross-reference,
Ag@
Referral,
Ag@
Convergence,
XAk@
Congestion,
A Jk@
Probabilistic,
J
AJk @
. AJ
Jk@
Operational requirements, , J
HAg
. J
J
HAJ
Requirement,
I.J ,h. AJ
Jk@
,AJJk@ q ,AJJk@
Backup,
j
J
AJJk@
Spare,
AJ
Jk @
Standby,
AJ
Jk@
K@Yg@
Cartesian coordinates,
J
KPAK
X HAJ
@ ,P@ Qk@
Scoring,
PQk
@
Scoring,
P@ Qk@
,PQk
Sense,
j.J ,Ak@
KAk@
Statistics,
HAJ
Statistical,
KAk @
Enumeration,
X@YK ,ZAk@
,Cg@
Replacement,
@YJ.@
g
Red,
Q @
News,
PAJ.k @
PAJJk@
Acceptance testing,
J.@
.
Automated testing,
@ PAJ.Jk@
Beta testing,
AJ
K. PAJ.Jk@
Branch coverage testing,
J
K PAJ.Jk@
Q J@
Confidence test,
K PAJ.Jk@
Exhaustive testing,
PAJ.Jk@
,A PAJ.Jk@
Half-duplex,
Am.' B@
@
Send,
AP@
Simultaneous shipment,
P AP@
Anchoring,
ZAP@
Dock,
ZAP@
,() P
@
Post,
AP
Submit,
Q@ ,P@
P@
Guideline,
H@XA
Archiving,
P @
Archive,
J
P @
Personal Package Archive,
Qm '@ J
P @
j @
Constraint satisfaction,
XJ
ZAP@
Attach,
AP@
Digits,
AP@
AP
@
Random numbers,
X@Y @ , J
K@
J
K@
@
Widow,
P
P@
Indentation,
k@
Shift,
k@P@
@
P@
@
Anti-aliasing,
Antialiasing,
@ @P@
P@
Comment out,
J
K @
Deforestation,
K. A@ HAJJk.
@ , K. A@ @P@
@
P@
Defragment,
J
@
Deinstallation,
I
J.J@ , I
J.J@ @P@
P@
@
Remove,
Hassle,
h. AP@
Deadlock,
P A , P @
E-zine,
P@
Weeks,
J
K. A @
YA , A
@
Base,
A
@
Software Foundation,
PA
.
@
Microfortnight,
QJ
AJ
Administration,
Change management,
Manage,
Management,
Q
J
J@
P@X@
P@X@
P@X@
P@X@
P@X@
P@X@
P@X@
P@X@
P@X@
Q@ X
@
Network management,
J
.
Power management,
A@
Project management,
K
PA
System administration,
A J@
Administrative,
P@X@
@
Deprecate,
@X
Q
QK @X
@
Encoder,
@X
@
Tool,
Deprecation,
K@ X@
Input/output,
h. @Qk@
,AgX@
Insert,
h. @P X@
Declare,
C@
,ZBX@
Dissolve,
K . @ X@
XYJ @
X@
Multicast,
Go,
@
,I. X@
X
@
File permissions,
Qg ,AK P@
Perplexity,
.
Quarantine,
J
J
K. P @
Dependence,
J
J.K ,AJ.KP@
Keybind,
hAJ @ AJ.KP@
Key binding,
hAJ @ AJ.KP@
Qk P , A
Jitter,
k
. . KP@
Height,
A KP@
Increase,
PAJ@
,YA ,YK
@Q K ,A KP@
K ,I KP@
Expect,
.
Kernel panic,
Q X ,AJ
KP@
Deferral,
ZAg. P@
Magenta,
G@ k. P @
Memory management,
P@QJ@
Clone,
q J , pA J@
Duplicate...,
... pA J@
Authentication,
A JJ
@
Import,
X@Q
J@
Cylinder,
K@ @
J
X , P @
Legend,
HAj
@
Bottom,
Projection,
A@
Ascii,
@
@
Continuation passing style, QK
Q H
.
AJ
K
.
Indent style,
k@PB
@ H. @
Names,
ZA @
PA @
Absolute pathname,
. @
Backronym,
AJ
Qk
Basename,
A @ @
J @
Canonical name,
J
PA
. '@ @
Device name,
PAm
Domain name,
Aj. @ @
@
File name,
@
Filename,
Full pathname,
A PA @
Host name,
J
@ @
@
Hostname,
J
J J
Logical-hostname,
@
Login name,
h. @ @
Name,
@
Nick name,
PAJ @
Pathname,
PA @ @
@
Private hostname,
,
k J
m J
@
Persistence,
J. @
Workweek,
J. @
Resume,
K AJ@
Replacement,
Cg@
,@YJ.@
Replace,
YJ.@
KA
J J@
Exceptions,
HA
Exception,
ZAJJ@
Mutual exclusion,
XAJ.J ZAJ J@
J@
Memorandum,
Qm ,PAj
Maturity,
AjJ@
Inquire,
ZA ,Q.j J@
Extract,
h. Qj J@
ZAYJ@
Function call,
J
Invoke,
ZAYJ@
Z@Qk.
@ ZAYJ@
Remote procedure call,
YK.
Evolution strategy,
K
P J
m.' @Q@
Loopback,
Ag. Q@
Recover,
Ag. Q@
Redemption,
X@XQ@
Explore,
CJ@
XAJ@
Recovery,
Restore,
XAJ@
Q
J
J X@YJ@
Changeover,
Query,
CJ@
Usage,
AJ@
J.@ C J
@
KAJ
Data mining,
HA
Inspection,
Y K ,ZA J@
C J@
Device-independent, Q
j.J@
Form,
, PAJ@
Continuation, ,(@ X m. QK.) K. AJ ,P@QJ@
A@
( @X)
Continue,
P@QJ@
Week,
P@Y@
,
P P@Y@
g. A
Version,
P@Y@
PY
@
Versioning,
@
Yellow,
Q
Bug fix,
g hC@
Fix,
hC@
@
Original,
@ ,
Ethics, Cg B@ , H
@X
@
,
AJ
@
.
.
Native,
J
@
Add,
A @
Additional,
A @
Auxiliary,
A @
Extra,
A @
More,
A @
Illumination,
QK
J K , KA
@
Child window,
Q PA@
YA PA@
Data frame,
HAJ
Frame,
PA@
Frames per second,
J
KA J@
PA@
PA@
Internal frame,
g@X
Page frame,
j@ PA@
PA@
Palette window,
@ B@ k
Window frame,
YAJ@ PA@
. , kQ
Dissertation,
IjJ
@
Firing,
C@
Show,
PA@
Unhide,
PA@
Reboot,
C@ XA@
Reconnect,
A@ XA@
Redirect,
J
k. K XA@
Redirection,
J
k. K XA@
XA@
Redo,
Immediate version,
@
@
,
m J
k J
P Ym . '@ Yj J @ @
@
Sitename,
Textual name,
@ @
Username,
Yj J @ @
User name,
Yj J @
Assignment,
XAJ@
Q
Creeping featurism,
H@
@ AD@
,D
@
Quota,
k
Exponential,
@
@
Frequently asked question, K. k. @ J
Exponent,
@
@
Credits,
H@XA
PA@
Carrier signal,
Ag
Signal,
PA@
, PA@
Sign,
QP
Color saturation,
@ @ AJ.@
Submission,
@Q@
Submit,
P@ ,Q@
Notice,
PA@
Certify,
XAD@
Cache hit,
AJ.m K. A@
Preformat,
K
YJ
JJ
E , K
YJ
A@
Versions,
H@P @Y@
P@Y@
J@ Q@
Demo version,
jJ
P@Y@
Major release,
A
Release,
P@Y@
Beta version,
AJ
K. P@Y@
Bug fix release,
i P@Y@
Immediate version,
P@Y@
,g. A P@Y@
P
Private hostname,
Sheets,
Snooze,
Close,
Closure,
Halt,
Locking,
Avatar,
Dummy,
Best effort,
Horizontally,
Horizontal,
Handshake,
Handshaking,
J
@
, ZA @
C@
C@
AK
@ , C@
@
A @
, C
PAJ @
JX , YA , @ Q
@
g)
Yk
@
(... Y
.
AJ
@
@
@
AB
@ A
YJ
AK , A@ A@
A@
)
Enterprise,
Quotation,
Quote,
Proposition,
Suggest,
Suggestion,
Conjunction,
Restrict,
Restriction,
Crop,
Older than,
Eject,
Approval,
Approve,
Play,
Max,
YK
Yg. Q ( AJ.@
)
AJ.J@
AJ.J@
h Q ,h@Q@
h@Q@
h@Q@
@ Q@
PAJ@
PAJ@
AJ@
Y
@
Y @
P@Q@
P@Q@
,ZQ@
@
J@ XA@
J
Regenerate,
YJ
K XA@
J.J@ XA@
Reinstallation,
I
Reload,
J
m' XA@
Reorganize,
J K XA@
@
X@Y@ XA@
Repaginate,
j
X@Y@ XA@
@
Repagination,
j
Repeat,
YK
XQK ,P@QK , XA@
Resize,
j.m' XA@
Restart,
J
XA@
XA@
Restructuring,
J
Reuse,
AJB
@ P@QK ,AJB
@ XA@
Dependency,
K
XAJ@
Credential,
XAJ@
Classic,
YJ
K ,
XAJ
J@
J@
Sampling,
AJ
Settings,
H@X@Y@
Random numbers,
AP @ , J
K@ X@Y @
J
K@
Setup (Configuration),
X@Y@
Display report,
QK
Q J@ Q@
@
Play,
ZQ@
, , Q
@
Q.
@ ,
Greater,
@
Reverse video,
K
YJ
@
Announce,
C@
Announcement,
C@
Declare,
ZBX@
, C@
Poster,
, C@
@
Highest,
@
, J
Highest,
J
@ , @
Meta,
@
@
Elite,
J . m ' ,ZAk. , AJ
Flood,
Q @
Refactoring,
JJ @ X@Y B@
Current working,
A B@ , K
PAm. '@ A B@
K
PAm. '@
Maximum,
B@
Optimal,
J B@
Standard deviation,
PAJ
@ @ Qm' B@
@
Forward compatibility, , J.J @ Aj.B
J.J @ K. A
J@
P
B@
@
Distributed systems,
@
Breadth-first search,
B @ QAK
IjJ
. .
Depth-first search,
B @ AK. IjJ.@
Portuguese,
J
A KQ.@
J Qm '@ HAJ
m.Q.@
Floss,
- PY @ k
hQ
PJ
K @ Q.K P X : B PAJk@
. @
Polish,
K
YJJ
K
X
AJ@
Functionality,
J
J
@
Xm '@
Quality control,
. Y AJ@
Next,
AJ@
E-commerce,
J
K QB@ PAj.J@
Electronic commerce,
J
K QB@ PAj.J@
Cybernetics,
B@ jJ@
Modulation,
K Q@
Registration,
J
j.@
Key-encrypting,
iJ
KA AK. Q
@
Forward compatibility,
, J. J @ K . AJ@
J. J @ Aj.B
Normalisation,
J
J.J@
J@
Speech recognition,
C@ Q
Public-key encryption,
hAJ AK. J
J@
@
Word wrap,
HA@
A J@
Capture,
A J@
Collect,
A J@
Triangular numbers,
XY
@
P@
@ ,A @
Locking,
C
Boot,
C@
Booting,
C@
Region,
Q ,
@
Less,
@
@
Less than,
Lower,
@
@ ,
Q.
@
Greater,
Q
. @
Greater or equal,
A @
Q.
@
Greater than,
Write,
I.J @
Acquire,
H. A@
Detection,
A @
Error detection and correction, A @
ZAk B@ iJ
j
Presence detect,
Yg. @J@ A @
Increase,
YA ,YK
@QK ,AKP@
,PAJ@
AK. A@
Exabyte,
IK
Extranet,
I K@ Q@
Finalize,
A
@ ,A@
Finish,
A
@ ,A@
Lowest,
GX B@
Minimum,
GX B@
Mantissa,
PAB
@
Key frame, A B@ PAB
PAB
@
@ ,
J
KQ@
Parent window,
B@ PAB
@
Primary window,
A B@ PAB
@
K Q @ X@Y B@
Square numbers,
.
Solid lines,
Brightness,
@
Sanskrit,
J
K
Q@
J @ @
Jaz Drive,
k
XDMCP socket,
J
j @ I@
Swedish,
K
YK
@
Sweden,
YK
@
@
Network, the,
J
.
@
Company,
Q
J , Q
@
Organization,
North,
A@
Source code,
J
@ QJ
@
Paste,
A@
Glyph,
K
QQ@ P@
@
Demand,
I. @ , PQ
@
Warranty,
A
@ J @
Physical layer,
.
Threshold,
: J.J@
At sign,
@ C@
Physical address,
@ @ J@
@ J@
Virtual address,
QA@
Cancel,
ZA@
Echo cancellation,
Y@ ZA@
Q J@ ZA@
Pending signals,
? J
J . J @ HCK
Unlock,
@ ZA@
ZA@
Unsubscribe,
J
j.@
Floating-point,
A@ A@
Alpha,
A @
j@
Power-on self-test,
YJ
G@ Y@
@
CB
Metric space,
Q @ Aj. @ ,
Q @ ZA@
J.J
J
@
Philippines,
Aleph,
@
A J@
A @
Distort,
,Z@J@
Mantissa,
Q@ A B@ ,
Q@ ZQm . '@
Southbridge,
GX B@ Ym '@
Fields involved,
PJ @ m '@
@ Ag
m '@
@
Q
,k
@
Fall back,
Zj
.
.
m '@
Fallback,
Zj.@ ,k. @Q@ Ag
Parallel computing,
K
P@ J @ J . m '@
(J
@)
Quantum computing,
J
@ J . m '@
Lavender,
@ Q m '@
Escape,
m '@
,(...t '@
Validate,
l. @Q.@ KA
FIFO,
B @ h. PAg , B @ g@Y@
First in first out,
B @ h. PAg , B @ g@Y@
First-in, first-out,
B @ h. Qm
' B @ g@Y@
Last-in first-out,
B @ h. PAg , @Qk @ g@Y@
LIFO,
B @ h. PAg , @Qk @ g@Y@
Current directory,
Am '@ J
Y@
Root directory,
P Ym . '@ J
Y@
Cron,
K
PY@
Physical memory, Q@ Y@ , @ Q@ Y@
AJJk Xk. @
Physical memory, , AJ
J
k Xk. @ Q@ Y@
@ Q@ Y@
Magic number,
Qj@ Q@
First customer,
B@ K
. Q@
Scrolling,
Q@
Previous,
K . A@
Screen capture,
B @ QB@
@
Implicit parallelism, @P@ @ , JJ
Y@ @P@ @
@
@ @P@ @
Implicit parallelism, @P@ @ ,
JJY@
Earliest deadline first, QK. B@ B@ Y @
B @
Timer,
I
@
@
@ , I KQ @
Expected location,
A
.
I. KQ @
@
Literature,
HA
Midi,
YJ
@
Custom window,
J
kCB
@ Y A J@
A J@
USB,
(@) A@
@
J@
Result,
jJ
Copy left,
J
j. q@
Nickle,
J@
Kernal,
I.@ , @J@
Hindi,
K
YJ@
J @ K @
Openid,
k
Abstract machine,
XQm. @
Digital camera, J
P Q , J
P QK
@
Instrument,
@
Machine,
H. Ag , @
Pocket calculator,
I.J
j. J . Ag @
K
@
Von Neumann machine,
AJ
WAP,
H. @@
Primary Colors,
J
@ @ @
Secondary Colors,
K
KA K @ @
Description,
@
@
Optical fiber,
K
AJ
Optical fibre,
K
AJ
@
Automatically,
AJ
@
Shortest job first,
Q @ A@
B@
, PY@
@
, PY@
P @Q@
H@
, @
PY@
Q
J
P HAJ
K @
Q@
G
J
KAQ@
AJ KC@
@J@ ,I@
.
Ag m '@ , Zj
@
.
Ag
m '@ , Zj
@
.
I.@
B@ k@
Force,
Power,
Resolutions,
Force,
Digital electronics,
Electronic,
Chrominance,
Infinity,
Kernal,
Fall back,
Fallback,
Nick,
Motherboard,
Diamond,
k. @Q@
k. @Q@
A @
Computer literacy,
H. Am 'AK. A
@
, Q @ Aj @
Metric space,
Q @ ZA @
.
Parent directory,
B@ Yj. @
j @
Subtotal,
Q@
.
Stock Ticker,
:
J.J @ Qj @
Bibliography,
k. @Q @
Real user,
@@ Yj J @
Receiver,
J. J @
PQ
@ ,I @
Demand,
.
Equation,
XA @
@ ,I KQ @ A
@
Expected location,
.
I. KQ @
J @
Intellectual property,
K
Q@
J @
Symbolic logic,
QQ@
Look and feel,
Ak B@ Q J @
J@
Exclusive OR,
:
I K@ QK@
Internet,
I K QK@
Back-propagation,
g PA K@
Propagation,
PA K@
Waiting,
PA JK@
Enlargement,
j ,pA JK@
Picking,
PAJ
Jk@
,ZA JK@
ZA JK@
SYLK file,
Target file,
ZAJK@
DK@
Timeout,
, @ I
Skew,
@ Qm' @
Alert,
J
J. K ,P@ Y K@
Warning,
P@ Y K@
@ q@
Copy and paste,
Create,
ZA@
Creation,
ZA @
m ZA @
Tar archive,
Meltdown,
PAD@
Ethics, @ , Cg B@ , H
. @X @ ,AJ.@
Additive,
A @
Join,
A @
YK Yg j
Pagebreak,
. C@
@
Go,
I. X@
,
Embedding,
Q ,PA@
Q
@
Qj JK
Eigenvectort,
K@
Refresh,
A
Divergent,
YAJ.K ,
k. @Q K@
Divergence,
YAJ.K ,h. @Q K@
Fork,
,h. @Q K@
Divergence,
h. @Q K@
, YAJ.K , @ Q K@
Split,
A K@
Expire,
J
kC@ K@
. (J.)
A K@
Abortive release,
m
Intranet,
J
@
Sandbox,
@ YK
Ym' J
@
Journal,
J
J
@
Auto,
@
Automatic,
@
Bot,
@
Forward,
A B@ @
Foreground,
Q J @ J
A @ , k@
J
A @
Foreground,
k@
J
A @ ,Q J @ J
A @
@
Security,
A
Q
J.
@
Amper,
@ X@YJ@
File extension,
Extension,
X@YJ@
@ X@YJ@
Filename extension,
J@
Priviledge,
PAJ
J@
Privilege,
PAJ
Optimise,
J @
Optimization,
J @
Optimize,
J @
Command,
Q @
Directive,
D
k. K Q @
ZA
@
File signature,
Signature,
ZA@
@
Computer security,
QKJ
J.@
@
Safe,
,
@
Safety,
K
A
@
Secure,
Miles,
AJ
@
Em,
@
Mother,
@
A A@ K JK
@
Named pipe,
. .
H. J.K @
Cathode ray tube,
XKA H@Qk
Pipe,
H. J.K @
Mechanism,
.
,AK
Inside,
g@X
.
Mailer,
YK
QK. IAK.
Remaining,
AK.
Percent,
J
AK.
, AK
Parcel,
Q
.
Heat sink,
P@Qk AK.
Constructor,
GAK
.
Loose bytes,
HAJK
AK.
AK.
. , IK
Byte,
Qk
X Q
KAK
Value added retailer,
J
.
A
Vendor,
KAK
.
Bit,
P X , J
KAJK , JK.
IK
.
Check bit,
j@
. , h. @Q @ IK
.
Parity bit,
J
k. Q@ IK
Q
Parity bit,
h. @ @ IK. , J
k. Q@ IK.
.
Broadcast,
IK
'.
Beam search,
J
AX Im
'.
Binary search,
KA
J K Im
'.
Find,
( ) PJ , Im
'.
Lookup,
Im
'.
Search,
Im
P
'.
Im
Weighted search,
Intuition,
@YK
.
Scratch,
.(Q) Z
B , K
@YK.
Start,
K
@YK.
JK @ ,K@YK
Initial,
K@Y
.
.
.
Listless,
A YK
None,
Z
B , Yg @ B , YK
.
No numbering,
X@YK YK.
Section,
A K@
Priority inversion,
J
B@ H. C K@
XAJ
K@
Functional dependency,
,
J
JK AK
JJ
.
Finish,
A@
,A
@ ,ZAE@
Terminate,
.ZAE@
Crash,
PAJ
E@
Real-time,
G @
Objects,
@Y@
Hello World,
AAK. C @
Ellipse,
i.J
@
Ellipsoid,
j.J
@
Bus priority,
@ K K
@
Priority,
K
@
PY@
@ ,IKQ@
@
First-order,
k
.
.
First-order,
I.
KQ@
@ , k. PY@
@
Leading,
XAJ
,
J
KP
,
@
Primary,
@
Or,
@
Commit,
@YK
@
@
Iceland,
@YJ
Dispatch,
XAK
@
Rhythm,
AK
@
@ , A K @
Halt,
C
Shut down,
J
@ AK
@
Q
HA
K K
@
Mini icons,
Icon,
K K
@
Y A J@ K K @
Window icon,
September,
K
@
Hello, world,
AJ.kQ ,A@ AE
@
Break (program),
Portal,
H.
Hyperware,
Shareware,
Malware,
Software,
Antivirus software,
Backup software,
Charityware,
Computer program,
Functional program,
Metaprogram,
Program,
Schedueler,
Spyware,
Startup Program,
System software,
Proof,
Span,
Electronic mail,
Email,
E-Mail,
E-mail,
Mail,
Mail to,
Phone mail,
Voice mail,
Flash,
Applet,
Naive,
Buzz,
Numerator,
Simple,
Visual,
Computer vision,
m. QK.
KA
HAJ
m. QK.
J
J.
HAJ
J
J.k J
m. QK.
J
m. QK.
XA
l AKQK
Q
HA
. .
.
AJ
Jk@ l. AKQK
.
Q
g l. AKQK
.
H. Ag l. AKQK
l AKQK
. .
@ l . AKQK.
.
l. AKQK
.
Ym. , Yg
. l. AKQK
.
m.' l. AKQK
.
J
ZYK. l. AKQK
.
A J@ l. AKQK
.
. K@
, AQK
HAJ
A@
, QK
.
G Q@ YK QK
Q
G @
YK
QK.
Q@) YK QK
(
G
.
G Q@ YK QK
YK
QK.
@
YK
QK.
KA YK
QK.
G YK
QK.
K
QK.
i.
QK.
h. XA ,Z
QK.
QK . QK .
.
D ,J
.
Q.
G. Ag Q.
Alternative,
K
YK.
Relay,
A J ,K
YK.
Axiom,
J
E
YK.
Quickstart,
K
Q (J
) ZYK.
Starting,
ZYK.
Startup,
J
@ ZYK.
P YK
Stub,
.
Dirty,
t ,Z
YK.
Legacy software,
J
K@QK l. @QK.
Programs,
l. @QK.
Braille,
K
@QK.
Portugal,
A KQK.
Orange,
A KQK.
Aspect-oriented programming,
m . QK.
QA AK. k
.
Configuration programming, J
m. QK.
Constraint functional programming, m. QK.
K
YJ
J
J
Evolutionary programming, K
P m. QK.
m . QK.
Functional programming,
J
J
J k m QK
Generic programming,
. . .
Linear programming,
J
k m . QK.
J m QK
Logic programming,
J
. .
Microprogramming,
QJ
m. QK.
XYJ m QK
Multiprogramming,
. .
Object-oriented programming, J
KA m. QK.
Jk
. m . QK.
Paranoid programming,
H. AJ
KPB
@
Programming,
m . QK.
Reverse engineering,
J
m . QK.
B@
m QK
Systems programming,
. .
Free software,
Qk HAJ
m. QK.
m. QK.
Freeware,
J
KAm . HAJ
J
K .
Infrastructure,
J
K .
Structure,
J
K .
Gate,
K . @K.
Gateway,
K . @K.
J K @K
Logic gate,
J
. .
Portal,
H. AK. , K. @K.
Proxy gateway,
J
K . @K.
HK
.
Knowbot,
Q
Baud,
XK.
Focus,
P K
.
Keyboard focus, Q
QK , iJ
KA @ k P K
.
iJ
KA @ k
Inch,
K
.
Data,
HAKAJ
K.
K.
KAJ
P , QAJ. HA
Direct graphic,
HAJ
QAJ
.
External data,
J
k. PAg HAKAJ
K.
HA
K.
KAJ
Metadata,
J
K
Graphic,
GAJ
.
Message catalog,
AQ@ AJ
K.
Beta,
AJ
K.
Perl,
Q
K.
Computational molecular biology, AJ
k. J
K.
.
J
K. Ag J
K
Qk
Environment,
J
K.
K
Homogeneous environment, Aj.J J
.
Ide,
AJ QK
J
K.
J QK J
K
IDE,
A
.
Integrated development environment, J
K.
AJ @ QK
J@
J
K.
Ergonomic,
@ HAJ
J.@
KAJ
HA
J
Jm'
Data structure,
H
J
.
Battery,
K
PA.
Card,
A
.
Daughtercard,
J
A.
K A
Expansion card,
.
P A.
Graphics card,
HAJ
A
Network card,
J
.
.
Network interface card,
k. @ A.
@
J
.
Punch card,
I. K A
.
Sound card,
H@ A.
Storage card,
K
Q j J@ A
.
Ventilator card,
K
E A.
A
KQ
Video card,
HAJ
.
Wild card,
ZAg. A.
Deactivate,
.
Slow,
Z
.
Delegation,
K. AJ
K , JK.
Dimension,
AJ
,YK.
Fractal dimension,
P YK.
,YJ
K.
Remote,
YK.
Pixel,
K.
Null modem,
X CK.
Constructive,
KA
JK .
Build,
ZAJK .
Clause,
YJK .
Child,
JK .
XQm J K
Abstract syntax,
.
.
Algebraic structure,
K
Q.g. J
K .
J @ J K@ JJ J K
ALSA,
Y
.
Architecture,
J
K.
Child structure,
K
JK . J
K .
Control structure,
m' J
K .
Babbleprint,
K
YJ.K
Dependence,
AJ.KP@ , J
J.K
Notify,
J
J.K
K ,P K AJK
Image sequence,
P I.A
.
Cascade,
AJK
Autotrace,
@ J.K
Backtracking,
g J.K
J.K
Install,
I
J.K
Installation,
I
J.K
Setup (Installation),
I
m ' , '
K ,
JK
Evaluation,
m ' , K
Qk
Partial evaluation,
.
JK
.
KQk
J J K
Disk duplexing,
Q@
Ignore,
Am.'
Adjacency,
PAm.'
.'
Bypass,
PAm
PAm
.'
Failover,
@
.'
Jump,
Q ,PAm
.'
Override,
PAm
System testing,
A J@ K . Qm.'
Abstraction,
YK
Qm.'
Beta abstraction,
AJ
K. YK
Qm.'
Bracket abstraction,
@ B@ YK
Qm.'
J.@ YK
Qm.'
KAJ
Data abstraction,
HA
Fragmentation,
K
Qm .'
Partitioning,
K , K
Qm .'
Block (verb),
YJ
m.'
Freeze,
YJ
m.'
m'
Combination,
J
.
Aggregation,
J
m.'
Prevent,
ZA K@ ,I.
Jm .'
Toggle,
J
K. AK
, J
J
XAJ
K@
Master-slave,
J.J K. AK
Slave,
K. AK
'@ QK QK
AK
Case sensitivity,
Qm
. . Q
Effect,
QK ,
K AK
Delay,
,Q
g AK
Date,
t'
PAK
Epoch,
H. Am '@ ZYK. t'
PAK
History,
t'
PAK
,
AK
Foundation,
Check,
m , Y AK
Confirm,
YJ
AK
Confirmation,
YJ
AK
@ ,A@ YJ
AK
Handshaking,
A
A@
Hardware handshaking, XAJ A@ YJ
AK
Xm '@ YJ
AK
Quality assurance,
.
Kerning,
( Qk B@) J
AK
Complete,
AK
Exact,
AK
Abstract interpretation,
XQm. K
AK
K. XAJ.K
KAJ
Electronic data interchange, HA
Q@
G
Divergent,
k. @QK@
,
YAJ.K
Divergence,
@ Q K@
,h. @Q K@
,YAJ.K
Contrast,
K
AJ.K
Lag,
A J. K
Dissipation,
X YJ . K
Packet-switched,
Qm '@ K
YJ.K
K
Context switch,
AJ
YJ.K
Q@ K
YJ.K
Label switching,
HA
Swap,
K
YJ.K
Functional dependency,
'
Y
K J
m
Defect analysis,
@ J
m'
Dynamic analysis,
AJK
X J
m'
J@ Jm'
Flow analysis,
Y
Q
K
P J
m'
Fourier Analysis,
Lexical analysis,
J
m'
J
m'
Object-oriented analysis,
Q
J
k. J@
Parse,
J
m'
Parsing,
J
m'
Real-time structured analysis,
J
m'
P
J
K .
. AK J
m'
A J
m' , IK
Static analysis,
. AK J
m' ,
A J
m'
Static analysis,
IK
m , A J@ J
m'
System analysis, A J@
Load,
g ,J
m'
Morphing,
m'
Switch,
m'
Discrete Fourier transform, K
P @ K
m'
J @
Beta conversion,
AJ
K. K
m'
J)
,K
m'
Converse,
(
Conversion,
K
m'
Conversion to iteration, P@QJ@ @
K
m'
Convert,
K
m'
Converting,
K
m'
Implicit type conversion,
K K
m'
,
K XAJ
.
Linear transformation,
k K
m'
Auxiliary storage,
A @
K
Q m '
K
Q m '
Caching,
I
Non-volatile storage,
QK
AJQ
K
Q m '
Secondary storage,
KA K K
Q m '
Data flow analysis,
K.
KAJ
HA
Q m'
.
Workaround,
K
Am'
Grain,
I.J.m'
'
Infrared,
Qg @ Im
Bus sizing,
@ K
j.m'
Ym'
Incremental update,
YK
@Q K IK
Ym'
Update,
IK
Define,
K
QK ,YK
Ym'
PY@ YK Ym'
Rating,
QK
Y K , k
.
Specify,
YK
Ym'
Edit,
QK
Qm'
,QK Qm'
Edition,
J
.
Qm'
Animation,
K
Animate,
K
Qm'
Move,
K
Qm'
m'
Enhancement,
Data acquisition,
(AjJ@) J
m'
HAJ
Q
m '
Prepare,
J.@) m
KAJ
m '
Validate, , gY @ HA
(...t '@
,l. @Q.@ KA
m '
Validation,
C
Verification,
J
m '
Verify,
J
m '
Control,
m'
Qk m'
Keymap control,
hAJ
m'
Remote control,
YK.
Resource control,
XPK. m'
Analysis,
J
m'
Backward analysis,
m '@ @
J
m'
Jm'
Binding-time analysis, AJ.KPB@ I
'
Complexity analysis,
YK J
m
Cryptanalysis,
J
J@ J
m'
Mixer device,
. ,g
Cg PAk
Q
YK
Internationalization,
K
YK
Notation,
K
YK
Q
Y K
Remind,
Q
Y K
Reminder,
Footer,
J
K
Y K
Undo,
(K
YK) k. @QK
Overlapping,
I.@QK
Cumulative,
@QK
Edu,
J
K ,
K. QK
Quadratic,
J
K. QK
Quadrature,
J
K. QK
Education,
J
K. QK
Arrangement,
J .
KQK
Arrange,
I.
KQK
Ascending order,
YA I.
KQK
I
KQK
KA
Byte order,
HAJ
.
Complete partial ordering,
KQk. I.
KQK
A
Descending sort,
PA J K I.
KQK
AK. I.
KQK
Network byte order,
J. IK
. I.
KQK
Partial ordering,
K
Qk
Sorting,
PQ ,I.
KQK
g QK
Fuzzy translation,
D
. .
Rough translation,
J
.K
QK g. QK
Translate,
k. QK
Salutation,
C , I.J
kQK
License,
J
kQ K
Frequency,
QK@K ,XXQK
JB @ XXQK
Sampling frequency,
AJ
Repeat,
P@QK ,YK
XQK
,iJQ K
Filtering,
J
Destroy,
K
Q m '
Store,
K
Q m '
Specialisation,
m '
Customization,
J
m '
m '
J
Complete graph,
A
Schematic,
J
m '
Cause-effect graphing, J. J. J
m'
.
Layout,
J
m '
Plot (verb),
k ,J
m '
Skip,
m '
Decrease,
J
K , J
m ' , J
m '
Decrease,
J
m ' ,J
K , J
m '
Evaluation,
'
K ,
JK ,
m '
m '
Guess,
'
JK ,K
Qk
Partial evaluation,
.
m
.
KQk
Housekeeping,
K
Q
m ' Q
K. @YK
K
Interference,
g@Y
Project planning,
J K ,Q Q
K. YK
Q
K
Gradient,
h. PY
Grayscale,
XAP h. PYK
h PYK
Hue,
@
.
Consolidate,
YJ
K ,
YK
J.@ Y
KAJ
Data flow,
HA
K
Stream,
X , YK
K
Batching,
J
Y
K. Y
KAJ
Dataflow,
HA
K
Audit,
J
YK
K
Checksum,
j. @ J
Y
K
PX J
Y
Cyclic redundancy check,
ZAk B@
Storage,
j
K
JK . J
.
Record,
J
j.
Record (verb),
J
j.
Register,
J
j.
Subscribe,
J
j.
Subscription,
J
j.
@ @
H Q
File descriptor leak,
.
Memory leak,
Q @ X H. Q
Leak,
I.K
Q
Q
Underscore,
Delivery,
Hill climbing,
CJ@
Aliasing,
Justify,
K
Settlement,
K
. Am '@ Q
J
Accounting management, HAK
J @ Q
J
Asset management,
HA
Q QJ
Code management,
Saturation,
J.
October,
B@ K
Q
Multi threading,
XYK I.
Threading,
I.
Data fork,
HAJ
Fork,
h. @Q K@
,
Automation,
@ J
Dry run,
PAJ.Jk@
J
Dual boot,
h. X Q J
Q
Space character,
PQ@
Q
Crypt,
J
Noise shaping,
i. @
Distort,
Z@J@ ,
Collision,
XA
Ascending,
YA
Child record,
K
kC
HA
, H@YQ
X Align,
J
QK
Edutainment,
K. QK J
Q K
Entertainment,
J
Q K
Patch (verb),
J
Q K
Numbering,
Q K
Q K
Hatching,
Filter promotion,
lQ @ J
Q K
YA , J Q K
Promote,
Upgrade,
J
Q K
Modular,
.J
QK
Compose,
I.J
QK
Composition,
I.J
QK
Mounting,
I.J
QK
P K
,iJKA @ k
Q QK
Keyboard focus,
.
iJ
KA @ k
Keep,
QK
Cell encoding,
AK
Cm '@ Q
QK
Q
B@
QK
Character encoding,
Qk
Encode,
Q QK
,Q
QK
Q
QK
Encoding,
Horizontal encoding,
@ Q
QK
Progressive coding,
Y K Q
QK
Dynamic translation,
J
AJK
X YJQ K
YJQ K
Professional programming,
J
J
QK
Header,
Q K
Concurrency,
@
Incremental,
YK
@Q K
Increase,
A KP@
,YA ,YK
@Q K
Line feed,
Q YK
Q K
Q.j J@
,ZA
Inquire,
HCJ
j.
Counting records,
Y@
Blocked record,
J J
j.
Observations,
A
Configuration,
J
.
Growth,
,j
Amplify,
j
Enlargement,
pA JK@
,
j
Shading,
J
Embed,
Include,
Narrowing,
J
Match,
K . A
J
J.
Scientific notation,
J
HA
Application,
J
J.
Apply,
J
J.
J
J.
Function application,
J
Horizontal application,
@ J
J.
Require,
I.
Component based development, . QK
@
K
HA
Developement,
QK
Development,
QK
Tweak,
K
Dither,
J
Shadowing,
J
Cache conflict,
AJ.m
PAK
PA
Context clash,
AJ
K
K
Backup rotation,
AJ
Jk@ I.A
K
Image sequence,
P K. AJK ,P I.A
Correlation,
AK
Handle (verb),
AK
K
Collaboration,
A
Q
J.K
Expression,
Regular expression,
Q
J.K
Count,
X@Y K
Fade,
YK
@Q K ,YA
Crossed,
A K ,I.A
Intersection,
A K ,I.A
Error recovery,
Am '@ YK. iJ
j
Export,
QK
Y
Authorization,
l'
Q
Compilation,
K
Q
Compile,
K
Q
Q
Minimize,
Zoom out,
Q ,Q
Browse,
i
Hierarchical navigation,
Qm. i
Navigation,
i
Q
Reset,
Filtering,
iJ
Q K , J
Repair,
iJ
Design,
Object-oriented design,
J
k. J@
J
Categories,
HA
Classification,
J
Classify,
J
Computer-generated imagery, Y QK
H. Am 'AK.
K ,P ,QK
Q
K ,iJ
Illustration,
Mirroring,
@Q QK
,m '@ K
Line buffering, Q@ K
,Q@ K
Line buffering, m '@ K
Render,
(Q
. ) Q
J
Q
J
Rendering,
Conflict,
A J K ,H. PA
Multiply,
A
Decay,
A
Increase,
Annotation,
Boxed comment,
Comment,
Hang,
Suspend,
Instruction,
Privileged instruction,
Privileged instruction,
Transfer statement,
Edu,
Encrypt,
Incantation,
Mapping,
Map to,
Set,
Encapsulation,
Variations,
Alter,
Alteration,
Change,
Logical shift,
Logical shift left,
Logical shift right,
Modification,
Rename,
Detail,
Differential,
Interactivity,
Interactive,
Condition out,
Core dump,
,
J
Ag
K. Q
J
K
J
K
J
K
J
K
J
K
K
J
X J
K
J@
H@
,PAJ
K
J
JK , J
K
X
PAJ
J@
H@
K
J@ J
K. QK ,
J
K
J
K
YK K
J
K
@
J
K
J
K
J
K
Q
K
H@
Q
J
K
Q
J
K
Q
J
K
J QJ K
PA
J Q
J
K
J QJ K
J
Q
J
K
B@ Q
J
K
J
A K
A K
J
A K
A K
Q K
Q K
. @ K
Q K
AJ
ZAk@
,X@Y K
Parametric polymorphism, A B@ K
XYK
@
Polymorphism,
A B@ K
XYK
Cooperative multitasking,
A @ XYK
J@
GA
Hybrid multiprocessing,
Z@Qk. B
@ XYK
j.@ m . 'A @ XYK ,
j.@
Hybrid multiprocessing,
m . 'A @ XYK
j.@ Z@Qk. B
@ XYK ,
j.@
XYK
@
Multilingualization,
HA
Multitasking,
A @ XYK
@ XYK
Pre-emptive multitasking,
HA
KA
@
Modify,
K
YK
K
Identify,
Q
K
Optical character recognition,
Q
'@ Q
Qm
.
K
Recognition,
Q
K
QK
System Configuration,
A J@ HA
@ K K
QK
Datatype definition, HAJ
Define,
YK
Ym' , K
QK
Definition,
K
QK
Dimensioning,
XAK. B@ I
J.K @ K
QK
Driver,
K
QK
Identification,
K
QK
Recursive definition,
P@QK K
QK
Disable,
J
K
Complexity,
Y
K
Essential complexity,
A @ YJ
K
Adaptive learning,
J
J
K K
Machine learning,
B@ K
Annotate,
J
K
Enumeration,
Y@
J
J K
J
J K
Nanotechnology,
Technique,
J
J K
Calendar,
'
K
JK ,'
K
Evaluation,
Conservative evaluation,
Am
J
K
Lazy evaluation,
J
K
Integrity,
AK
Referential integrity,
k. Q AK
Q
J.K
Enlarge,
Q
J.K
Maximize,
Q . ,Q
J.K
Zoom in,
Condense,
J
JK
Jam,
AgP ,YK
Q @ X YK
Memory heap,
Reusability,
AJB
@ K
P@QK
Recursive,
P@QK
Iteration,
P@QK
Mutual recursion,
XAJ.J P@QK
XA@ , YK XQK ,P@QK
Repeat,
,P@QK
Replication,
A
Reuse,
AJB
@ XA@
, AJB
@ P@QK
K
Complement,
Directory stack,
Yj. @ AP , J
Y@ K
Adapt,
J
J
K
Manipulation,
I.CK
K
Correspondence,
C
Hash,
YJ
J.K
'@ KA
K
Finite automata,
AJ J Qm
Feed,
K
Cache coherency,
AJ.m A
Cache consistency,
AJ.m A
AA
Just-in-time,
I @
Humanist technology,
@
J
KA
KA J@
PAJ
E@
K
Q K
K , Q
K
Illustration,
iJ
K
Preferences,
HCJ
Preference,
J
K
Activate,
J
K ,J
K
Enable,
J
K
Inspection,
ZA J@ , Y K
Case based reasoning,
. Q
K
J B@
Bijection,
K. A K
Aging,
XA K
XA K
Password aging,
Q@
Reports,
QK
PA K
Crossed,
I.A ,A K
Intersection,
I.A ,A K
Technology,
KA K
Advance,
Y K
Progress,
Y K
PY@ YK Ym' ,QK Y K
Rating,
k
.
Approximate,
.K
Q K
QK
Q K
Problem report,
Report,
QK
Q K
Partitioning,
K
Qm .' ,
K
Segmentation,
K
J @ K
Zoning,
A
Classic,
XAJ
J@ ,
YJ
K
Contraction,
J
K
Shrink,
J
K
Decrease,
J
m ' ,J
K
Parallel reduction,
J
J K ,P@ J J
K
Q J J K
Fiber optics, , AJ
B@ HAK
.
Fibre optics,
, AJ
B@ HAK
Q. J
JK
Crash dump,
m . 'A ,
AJJ YJ
J K
J
AJJ
Debug,
iJ
J K
Parallel reduction,
P@ J J
K ,J
J K
Frame relay,
PAB
@ J
J K
Masquerading,
QJ K
Dot notation,
K IK
JK
J K
Infix notation,
g@X IK
IK
J K
Postfix notation,
j
Prefix notation,
@YJ. IK
JK
Illumination,
KA
@
,QK
J K
J K
Variant,
K
Format,
JJ
E
E
Format (verb), J
K ,( Q m , ) JJ
()
Preformat,
K
YJ
A@
, K
YJ
JJ
E
Frequency,
XXQK ,QK@K
HP@
K
Multiple inheritance,
A
Balance,
P@ K
Parallelism,
P@ K
Communication,
@K
Y A J @ K
Fit-to-window,
P @YB @
@ K
Backward compatibility, H@
K. A@
Compatibility,
@ K
Pattern matching,
H. B@ @ K
Documentation,
J
KK
Orientation,
Am.' @ , J
k. K , k. K
Adaptive routing,
J
K J
k. K
Dynamic routing,
J
AJK
X J
k. K
Hierarchical routing,
Q J
k. K
Orientation,
k. K , Am.' @ , J
k. K
Routing,
J
k. K
Sequential processing,
@ JJ
Q
Extend,
YK
Y
QK Q
Message passing,
KAQ@
Pass,
QK
Q
Scroll,
QK
Q
Excercise,
K
Q
Enabling,
i ,
Initialization,
YJ
Name resolution,
B@ Q
J
Proportional,
I.AJ J ,
.AJ K
Fit,
I.AJ K
Descending,
A J K
Conflict,
H. PA , A J K
Alternating,
G. AJ K
Alert,
P@ Y K@
, J
J. K
Notification,
J
J. K
Download,
K
Q K
Coordinate,
J
K
E ,() J K
Format (verb), , ) JJ
( Q m
Activate,
J
K , J
K
Clean,
J
, J
K
J K
Data set organization,
m
.
J.@
KAJ
HA
Organize,
J K
Q
K. YK ,Q
J K
Project planning,
Q
Executable,
YJ
J K
Executive,
YJ
J K
Execute,
YJ
J K
Execution,
YJ
J K
Launch,
YJ
J K
Run,
YJ
J K
Knowledge representation,
. AK , iJ
J@ IK
. AK
iJ
jJ@ IK
IK
@
. AK
Fixed-point,
A
. AK
Static,
G
, IK
Secondary,
KA K
Microsecond,
QJ
J
KA K
Second,
GA K
Dithering,
@ B@ HAJ
K
.
Reliability,
K , HAJ.K
Ctrl,
QK
CSS,
Q K
Exploit,
Gap,
@Q , m. , QK
J ,I K
j
Hole,
.
Reliability,
HAJ.K , K
J
K
Heavyweight,
P@
Octet,
J
KA
Octal,
GA
Bidi,
Am.' B@ J
KA
J K
Bit,
JK. , P X , J
KA
J K
Binary,
KA
J K
KA
J K
Bipolar,
I.@
@
Dual-partition,
J
KAJ K
Fixed,
h.
, HA
@ XAg.
@ K
Q , HA
@
HA
. @ J
K. XAg
IJ
.
, A @
PAg. , J
J.J@
PAg.
YJ
J J@
PAg.
@ PAg , YJ J J@ PAg
A
.
.
, YJ J J@
PAg , A
@
PAg
.
.
J
J.J@
PAg.
PAg.
Information highway,
Bit gravity,
Processing,
Processing,
Processing,
Ongoing,
Complete unification,
Distribution,
Normal distribution,
Expand,
Expansion,
Junction,
Major delivery,
Colocation,
Hot swapping,
Linking,
Mail delivery,
Receipt,
Illustration,
Consolidate,
Localization,
Availability,
Provide,
Branch prediction,
Expect,
Forecast,
Pause,
Timing,
Digital signature,
Valid chars,
Suspension,
Probability,
Assertion,
Generate,
Generation,
H
. AK
IK
. J ,iJ
J@ IK
. AK ,iJ
jJ@ IK
. AK
I
Constant,
Fixed,
A YJ
kK
P
K
K
K
J
J. K
P
J
K
J
K
K
J
QJ J
K
J. J
K
P J
K
J
K
YK
Q.@ J
K
J
K
K
P ,Q
K ,iJ
YK ,YJ
K
K
K
Q
K
Q
K
Q J@
K
I. KP@
,
K
K
I
K
IJ
P J
K
K
K
J
K
AJk@
,
YJ
K
YJ
K
J
k. ,YJ
K
Qk
KQ
.
X , AK
Qk.
PAJ.k B@ YK
Qk.
H. @ Y Jk.
@ ,Qk.
J ,K
Qk
PAj
.
.
Z Qk
AK. ,
Qk
.
IK
.
h. Qk ZQk
Qk.
Qk.
Qk.
YK
Q.@ Qk.
A Qk.
J
KP
k.
k.
.
k
k.
.
@Qk
I.g.
I.g.
g
.
Visual bell,
Flow,
Newsletter,
Pull,
Partial,
Molecule,
Byte,
Critical section,
Bridge,
Bridge (noun),
Bridge (verb),
Mail bridge,
Northbridge,
Main body,
Particle,
Polling,
GPL,
Geographical,
Fetch,
Retrieve,
Session,
)
Squatting,
(g)
ZAQ @
.
h.
Ag.
Sum,
m. ,g.
Sum (verb),
g.
g
Sentence,
.
GNU,
Jk.
.
P ,( ) J
Jk
Pound,
( P)
.
Bus device,
A K PAk
PAk
Character device,
Qm
.
Cooperative,
J ,Ag.
I
Gamma,
AAg.
Y J @ IKAg
Deskside,
. . ,I.J @ I.KAg.
. , Y J @ IKAg
Deskside,
I.J @ I.KAg
. .
.
Write side,
K . AJ I.KAg
Ready,
I. AJ ,QAg
.
Cos,
AJk.
Gtk,
Jk.
Firewall,
PAK P@Yg.
Cartesian product,
GPAK
X Z@Yg.
Horizontal tabulation,
J
@ Yg
.
Instruction scheduling,
HAJ
J@ Yg.
Priority scheduling,
K
B@ Yg
.
Process scheduling, Yg. ,Z@Qk. B
@ Yg.
m. 'A @
Process scheduling, Yg. , m. 'A @ Yg.
Z@Qk. B
@
Scheduling,
Yg
.
Tabulation,
Yg.
'. Yg.
Im
Colour look-up table,
@ B@
Process table,
Z@Qk. B@ Yg.
Routing table,
J
k. K Yg.
Scheduel,
Yg.
Schedule,
Yg.
Spreadsheet,
YJ Yg.
Table,
Yg.
New,
YK
Yg.
Eigenvalue, J
, (G@ X) Q
P Yg.
J
K@ X
Root,
P Yg
.
Bell,
Qk.
Qk
Visible bell,
KQ
.
Eyedropper,
J
m. '@ H. Ag
B @
Fourth generation computer,
H. Ag
K. @Q@ J
m. '@
H Ag
Host computer,
J
Laptop,
m H. Ag
Laptop computer,
m H. Ag
Machine,
@ , H. Ag
Mainframe,
J
KP
H. Ag
Notebook,
m H. Ag
Parallel computer, (J
@) P@ J H
. Ag
Personal computer,
m H. Ag
Pocket computer,
I.J
j. H. Ag
Quantum computer,
H. Ag
Second generation computer,
H Ag
GAJ@. Jm '@
.
Annotation,
J
K , J
Ag
Footnote,
J
Ag
QAg
Brace,
Left brace,
K
PA
QAg
Ag
Right brace,
J
J
Q
Clipboard,
Ag
Ag
Screensaver,
A @
Ag
Screen Saver,
A @
Local bus,
J
m Ag
Edge,
Ag
Case,
Ag
'@) Ag
Q. ,( Qm
Case (font),
( Qk)
Child status,
K
JK . Ag
Problem state,
@ Ag
Process status,
Z@Qk. B@ Ag
K Ag
Race condition,
PA
Resource state,
XP @ Ag
.
q J PAk
.
Complex programmable logic device, PAk
A Y
YJ Q K
.
J
.
Device,
PAk
@ PAk
Dialout Device,
AgXB
.
PAk
.
Display device,
Q@
PAk
.
Input device,
AgX@
.
Mixer device,
g Q
m.' ,Cg PAk
PAk
.
Peripheral device,
Q
.
Q
AK PAk
Pointing device,
.
Virtual machine,
QA PAk
,G@ k
. ,g@X
Inside,
AK
.
Quality,
Xk.
m '@ Xk.
Quality of service,
HAY
K
k
.
Von Neumann, John,
AJ
Generation,
YJ
K ,J
k.
GNOME,
JJ
k.
, HAm
Group,
m
. . h.
Qk ,@
Qk h
Map,
.
Meaning,
,
GA h.
Q ,QKA
h
Pie,
.
Quorum,
D ,D @ h.
Clone device,
h
Sharp,
Guard,
Calculator,
Microcomputer,
Minicomputer,
Computron,
Analogue computer,
Computer,
Digital computer,
XAg
PAg
J . Ag
QJ
I.Ag
I.Ag
Q
. Ag
K
KA H. Ag
H Ag
.
P H. Ag
Sharpness,
Delete,
Deletion,
Colophon,
Literal,
Lower-case,
Metacharacter,
Upper case,
Wide character,
Wildcard,
Accent,
Gesture,
Motion,
Dynamic,
Float,
Free,
Binary package,
Kamikaze packet,
Narrowband,
Package,
Resource bundle,
RPM package,
Ray,
Account,
Calculate,
Calculation,
Compute,
Root account,
User account,
Case Sensitive,
Sensitive,
Natural deduction,
Clustering,
, Yg
X
Yg
Yg
@ XQk
,
Qk
Qk
Q
@ Qk
Q
J. Qk
Q Qk
YK. Qk
Qk
Qk
Qk
Qk
Qk
Qk
JKA
J K Qk
K
PAjJK@ Qk
J
Qk
Qk
XP Qk
Qk
Qk
H. Ak
H. Ak
H. Ak
H. Ak
P Yg. H. Ak
Yj J @ H. Ak
'@ Am
Ak
Qm
Ak
J
J. k
Yk
State,
Status,
System state,
Wait state,
Zero state,
Current,
Resolver,
Carrier,
Common carrier,
Digital carrier,
Retry,
Container,
Coarse grain,
Fine grain,
Love,
Mask,
Size,
Storage space,
Volume,
Word size,
Event,
Intuitionism,
Intuitive,
Occurence,
Occurrence,
Polynomial,
New talk,
Zoo,
Border,
Closed term,
Hard limit,
Limit,
Redisplay,
Ag
Ag
A J@ Ag
PA JK@ Ag
Ag
K
Q
Ag
Ag
A K ,Ag
XAJ
J@ Ag
P A K ,
P Ag
@XYm. Ag
K
Ag
k I. k
Ik
J
X
.
I.k
AJ ,H. Am.k
,mk
.
K
Q j J@ m.k
m.k
mk
.
HYg
J
Yg
Yg
HYg
HYg
K
XYg
Yg
YK
Yg. IK
K@ J
m '@ K
Yg
HA
Yg
Yg
Yg
Yg
Yg
Q@
Q , g
Nipple,
g
Computer cookie,
H. Ag g
Non-optimal solution,
J @
g
Resolve,
g , Q , g
K
Ag , q@ K
Ag
Copy protection,
q@
K
Ag
Copy protection,
K
Ag , q@
q@
Q @ X K Ag
Memory protection,
Protect,
K
Ag
Protection,
K
Ag
Backport,
g
Load,
J
m' ,g
HTTP,
k
HTML,
G k
Alert box,
J
J. J@ P@k
Dialog,
P@k
Discussion,
P@k
Margins,
@k
Computing,
J . k
Fuzzy computing,
J
K. AJ. J . k
Pool,
k
Resource pool,
XP@ k
Hover,
k , Ak
,k
Hover,
Ak
, , k
Implies,
AJk
Life,
Perplexity,
AK. P@
, Q
g
J@ Q g
Bandwidth,
A
Exist,
Xk. ,
k
Resolve,
J
B@ Qk
Quota,
D @ , k
Get,
k
k
Demote,
J . KQ@
,Qk
Block,
Y
,Qk
Prevention,
Y
Prohibit,
Qk
Compactness preserving,
A k
Save,
k
Field,
k
Key field,
hAJ @ k
k
Password field,
Q@
. AK k
Static field,
IK
Subfield,
Q k
Injection,
k
k
K KA , HAJ
Legalese,
HAJ
k
m '@
m ,QJ@
Copyright,
Fields,
k
Briefcase,
J . J
k
Software development kit,
QK
J . J
k
l. @QK.
Physical,
,Xk. @
J
k
Real,
J
k
Bus arbitration,
@ J@ k
k
Central arbiter,
JJ
QQ
Arena,
J . g
Rings,
I g
Do loop,
P@QJ@ g
Endless loop,
J
AJ JB g
E B g
Infinite loop,
J
KA
Local loop,
J
m g
Loop,
P@QJK. Y JK
,PQK
, g
Repeat loop,
XXQK g
Millennium bug,
Attribute,
Property,
Private,
Special,
Device-dependent,
Inactive,
Entries,
Checkbox,
Menu item,
Know-how,
Caching-only,
End,
Timestamp,
Mail services,
Professional services,
J
Ag
J
, J
Ag
Ag
Ag
Q jJ A g
.
Ag
KA g
HA
Q
AK KA g
A KA g
K
@P X , Q. g
ZI.k
AJk
P k
g
YK
Q.@ HAY
HAY
g
J
J
ABAK. k. J
J.
K.
KAJ
Data service,
HA
g , JY@
Directory service,
Y
Directory service,
Parallel-service,
Scalable service,
Service,
Output,
Standard output,
Code violation,
Violation,
Exit,
Logout,
Character map,
Linear map,
g
Y
g
Y
g
Y
j. @
g , j
Y
. @ Yg
J
Y@
K P@ J Y
g
A Y
g
J
Q K
.
g
Y
h. Q k
AJ
h. Q k
Q
k
(Y@)
PAQ@
k
Q
h. Qk
h. Qk
B@
Qk
Qk
Qk
Jk
K
XAJ@
Direct mapped cache, J
jJ@ QAJ.
(l. 'A)
Level one cache, J @
J
K. Ag
J
K. Ag
J
K. Ag
B@
(l. 'A) J
K. Ag
Level two cache, J @
GA J@
Primary cache,
J
KP
J
K. Ag , J
@ J
K. Ag
Primary cache,
J
@ J
K. Ag , J
KP
J
K. Ag
Boot server,
C@
XAg
Caching server,
ZI.k XAg , JJ
. m ' XAg
Caching server,
JJ
. m ' XAg ,ZI.k XAg
Compute server,
H. Ak XAg
YA XAg
Database server,
HAJ
XAg
File server,
HA
Mail server,
YK
Q.@ XAg
Master server,
J
KP
XAg
Proxy server,
J
XAg
XAg
Screen server,
A @
@
Webserver,
J
. XAg
Server,
XAg
Web server,
H. XAg
External,
J
k. PAg
,B @ h. PAg
FIFO,
B @ g@Y@
First in first out,
B @ g@Y@
,B @ h. PAg
Last-in first-out,
@Qk @ g@Y@ ,B @ h. PAg
LIFO,
@Qk @ g@Y@ ,B @ h. PAg
@ h PAg
Off-topic,
.
Outgoing,
h. PAg
h. PAg
Outside,
h. PAm '@
,
g
Bitmap,
J
KA
J K PA
PA
g
Charmap,
PAm
Ag
Specials,
HAJ
Credential cache,
)
Serif,
K
Y (k)
p
k
KA
Baseline,
A @ k
Bitmap font,
K k
k
Broken line,
J , @J ,(k
Continuous,
@X)
k
Dedicated line,
Q
Diagonal line,
Q k
Differential line,
A K k
. AK k
Fixed Font,
IK
@
IK
. AK k
Fixed width font,
Q
Font,
k
Horizontal line,
@ k
k
Leased line,
Qk.
Mercury delay line,
QQ
Q
g AK k
Outline font,
J
K k
Plot (verb),
J
m ' ,k
Raster font,
K k
Scan line,
i @ k
Serial line,
k , k
Serial line,
k , k
k
Cross-fading,
H
J
k
Lightweight,
P@
Lite,
J
k
Invisible,
k
g
Digest,
C
g
, C
Difference,
PA
Disassembly,
,g
Background,
J
g
Desktop background, I
. J @ i J
g
Backslash,
Qk
@
Qk h. ,
Portmap,
YAJ @
Qk
Qk
Radar map,
P@X@Q@
Sector map,
A@
Qk
@ Q k
Data warehousing,
HAJ
k
A
Common properties,
A
k
,A
@
Properties,
HA
k
A
Ticker Properties,
A@
k
Cluster,
X J ,
Privacy,
J
k
k
K P , A
Chart,
GAJ
.
k
Diagram,
A
Plotter,
Ak
Bus error,
A K Ak
Critical error,
h. Qk Ak
Error,
Ak
Fatal error,
hXA Ak
Ak
Internal error,
g@X
Mistake,
Ak
Page fault,
j@ Ak
Parity error,
k. Q@ Ak
Portmapper,
Y J @ A k
P
Ak
Run-time error,
J
Standard error,
AJ
Ak
'@ ZAJK
Ak
Syntax error,
m
. .
J Q Ak
Unexpected error,
Outline,
J
m' P , k
k
Scheme,
m ,
i @ k
@
Raster,
A
J@ k
Dot pitch,
k
Pitch,
k
Step,
Linear,
J
k
Map,
Characteristic function,
Combinator,
Continuous function,
Function (Mathematics),
Hash function,
Higher-order function,
Linear function,
Member function,
Membership function,
Indicator,
Partial function,
Circle,
Permanent,
Delta,
Debianize,
Input,
Standard input,
Enter,
Multiple access,
Know-how,
Degrees,
Degrees of freedom,
Degree,
Chat,
Decision support,
Run-time support,
Support,
Address book,
Microlog,
Batch,
Push,
Flow,
Stream,
Q
J @ K
J
@X
@X
@X
@X
K
Qm .' @X
J . KQ@ J
A @X
J
k @X
Yj J @ @X
@X
K
@
, @X
Q
. @X
J
K
Qk
QK@X
'@X
@ X
J
K. X
g X
AJ
gX
kX
XYJ kX
Qg , K @P X
.
. PX
HAg
. PX
K
Qm '@ HAg
PX
k
.
XPX
P@Q X
P X
J
YA ,X
K
AJ QX
QJ
QX
X
X
Qk. , X
AK
K , X
Y
I.J @ i J
g
J
g
Wallpaper,
A @
g
Aliasing bug,
g
Nice,
J
,
Cellular,
g
Cell,
J
g
J g
Char cell,
Qm
Servers,
X@k
k
Algorism,
J
PP@
k
Algorithm,
J
PP@
B J PP@
Anytime algorithm,
J
J
k
k
Approximation algorithm, I
. K
QK J
PP@
k
Evolutionary algorithm, K
P J
PP@
k
Genetic algorithm,
J
K@P J
PP@
k
Exponential-time algorithm, J
@ PP@
Q@
P AJ
k
Command line options,
Q H@
Q@ B@
P AJ
k
Options,
H@
Optional,
PAJ
k
Command line option,
Q@ @ Q PAJ
k
Option,
PAJ
k
XML,
k
Virtual Desktop,
h
P JJ
E iJk
.
JPEG,
X
Crawler,
Internal,
Inside,
Circuit,
Publisher,
Rotate,
P ,H @X
k@
.
JJAK
. , J
g@X
. ,g@X
G@ k. ,
AK
P@X
QAK ,Q P@X
PYK
,k P@X
K . A ,PX
PX
PBX
X
K
A.A.K
X
Floor,
Role,
Dollar,
International,
DMA,
)
Temporary buffer,
( AJ.m Q@ X)
XA J@ Q@ X
Associative memory,
J
. @QK Q@ X
Base memory,
J
A @ Q@ X
X Q@ X
Content addressable memory, H@
K A Jm
Y
.
Conventional memory,
J
kC@ Q@ X
QAJ Q@ X
Direct memory,
.
Distributed memory,
P Q@ X
Q@ X
Error correcting memory,
jj
Am '@
Expanded memory,
Q@ X
Q@ X
Extended memory,
External memory,
J
k. PAg Q@ X
Main memory,
J
KP
Q@ X
Mapped memory,
JJ
Q@ X
Q@ X
Memory,
QK AJQ Q@ X
Non-volatile memory,
Q@ X
Paged memory,
j
QJ Q@ X
Persistent memory,
XQm Q@ X
Raw memory,
.
Real Memory,
J
J
k Q@ X
Pj
. m Q@ X
Reserved memory,
Resident memory,
J
Q@ X
Q
Q@ X
Shared memory,
Access memory,
X
Precision,
X
, X
, Yg
Sharpness,
h
Minute,
J
X
, BX
Significance,
BX
Axiomatic semantics,
J
E
YK. HAJ
Child directory,
JK . J
X
Directory,
J
X
Guide,
J
X
Home directory,
J
KP
J
X
P
@ , HAj
Legend,
J
X
Login directory,
h. @ J
X
Manual,
J
X
Sub directory,
Q J
X
Subject index,
J
@ @ J
X
Integration,
l. X
Mail merge,
YK
Q.@ l. X
Merge,
l. X
Dummy,
YA ,
@ Q @ , J
X
, X
Paint,
AJ
.
,@ X
Y
Duration,
Worm,
I K QK@
XX
P X
Revolutions per minute, J
Y@ H@
H@
Rotations per minute,
J
Y@
P X
Rotation,
@P X
Bus cycle,
@K PX
PX
Cycle,
Cycle of reincarnation,
t AJ J@ PX
AJk PX
Life-cycle,
Machine cycle,
B@ PX
PX
Period,
Periodic,
K
PX
Circuit switched,
@YK. B
@
PX
Accuracy,
Back,
k. P
Carriage return, k. Q , Q@ @
k. P
) Q@ @
( Qm
Marble,
AgP
Callback,
(A ) Z@YK XP
Reply,
XP
K. PP
KAJ
Data packet,
HA
Packet,
PP
Collate,
PP
Away message,
H. AJ
AP
Bounce message,
H. K AP
Error message,
Ak AP
AP
Letter,
Message,
AP
Message of the day,
J
@ AP
, AJKP@ AP
Panic message,
Q X AP
, Q X AP
Panic message,
AJ
KP@
AP
Post,
() P @ , AP
Messages,
KAP
g KAP
Private Messages,
A
P
Character graphic,
Qm
K P
k , GAJ
Chart,
A
.
Draw,
P
Drawing,
P
K P
, jJ
GAJ
Histogram, P@QK h. PY
.
Illustration,
QK
,Q
K , iJ
K ,P
Outline,
k ,
J
m ' P
K. , QAJ. HAJ
KAJ
P
Direct graphic,
HA
QAJ
.
Graphics,
HAJ
P
P
Raster graphics,
J
JA HAJ
P
Vector graphics,
J
j.J HAJ
Graphical,
K
QA Q@ X
QK AJ Q@ X
Volatile memory,
Pragmatic,
@ , ,
K
@P X
P X
Atom,
Bit,
J
KA
J K , P X
Atomic,
P X
Kernel panic,
AJ
KP@
,Q X
Bootrom, ZQ C@
Q@ X) C@
X
(
Artificial intelligence,
AJ@
ZAX
FTP,
X
Block-structured,
J J
K . X
Virtual memory,
P
Connective,
Hotlink,
Link,
Permanent link,
Nym server,
Radio,
Vertical,
Arrowhead,
Proposition,
Leader,
Qword,
Dividend,
Bind,
Button binding,
Hard linking,
Networking,
Arity,
Monotonic,
Jitter,
A@
,. @P
. @P
kA
. @P
@P
'@X
.
QJ
P J
K@ k. @P
K
X@P
X ,
@P
D @P
h@Q@
,h Q ,
@P
YK@
P
AK. P I.Q ,
AK. P
,D@ l' P
.
P
.
P@P P @ . P
I. . P
. @
. P
HAJ
J
.KP
I.
KP
Qk P
KP@
, k
A
. .
, Yj. @ AP , J
Y@ AP
J
Y@ K
Directory stack, , J
Y@ K , Yj. @ AP
J
Y@ AP
Gray code,
Qk. PAP
Native code,
J
@ PAP
Operation code,
J
PAP
Code (symbol),
QP
Control code,
m' QP
Country code,
YJ.@ QP
Mnemonic,
QYK QP
@ QP
PID,
Sign,
K
, PA@
,QP
Symbol,
QP
Exponential notation,
J
J
PP
Y J
K
Q@
Symbols,
PP
Modulate,
P
. P
Robot,
HK
Visibility,
K
P
P
AK
Math,
HAJ
P
Mathematical,
AK
KP
Bus mastering,
@ K A
Cardinality,
J
KP
Leading,
@ ,
XAJ
,
J
KP
Master,
KP
,
J
KP
Principal,
J
KP
Bus master,
@ K
KP
Master,
J
KP
,
KP
Directory stack,
Crawler,
Angle,
Corner,
P
H. @X , k@
K
@P
K
@P
X@YK K
Q , AP
Magic bullet,
K
Qm AP
Disk array,
@Q @ P
, P
Stack,
P
, P
Stack,
P
) JJk
P
Pound,
(
. ,( P)
Deny,
P
Refuse,
P
Reject,
P
Raise,
P
Upload,
P
Shelf,
P
Software audit,
l. AK Q.@ m ,l. AK Q.@ K . AP
A P
A P]
Chip,
[ HA
P
Bilinear patch,
J
KA
J K
P
Canvas,
(Q@)
P
Patch,
P
Patch (noun),
Digitize,
J P
Digital,
P
. '@ P
Device number,
PAm
Digit,
P
Host number,
J
@ P
Internet number,
I K QK@
P
@ P
Job number,
Markup,
P
Natural number,
J
J. P
P
Network number,
AB@ J
.
Number,
P
Port number,
Y J @ P
Process ID,
Z@Qk. B
@ P
K
QK P
Resource element,
QJ@
J K
@ XP
Binary exponential backoff, KA
Bullet,
Run-time,
Seek time,
Seek time,
Settling time,
Parity,
Pair,
Zombie,
Visit,
Offset,
J
@
P
@Y
P ,
@
@
P , @Y
@
P
P
P@Q JB@ (@
@)
J
k. P
h. P
. P
PAK P
Am'
P
K . A
Dragging,
I.m , I.kA
Bulletin Board,
A K kA
, kA
Place,
A
Naive,
Z
QK. ,h. XA
Clock,
A
Hour,
A
AJ
A
Seeking,
Idle,
A
.
Hibernate,
HAJ
.
Cepstrum,
Q
Hexadecimal,
Q I
Hex,
I
Log,
m.
m
CB@
Master boot record, J
KQ@
.
(Q@ )
Scan register,
i @ m.
Checkout,
I.m
Content-based information retrieval, I
. m
Jj @ . HA
@
I.m
Drag and drop,
HC
Drag,
I.m
Dragging,
I.kA ,I.m
Affix,
Dataless client,
Diskfull client,
Diskless client,
Diskless client,
Mail client,
Jam,
Decorative,
YK@
P
. P
@
Ag K
HAJ
Z K
. P
Q@
. P
. P ,Q YK
. K
K
PA
Q@
. P
,Q@
PA K
. K
. P
Q YK
. P
YK
QK. K
YK ,AgP
k P
Prefix,
hJ @YJ. ( P P)
Open switch,
P
P P
Command button,
Q @ P P
Key (Button),
P P
Navigation key,
PAm'. B@ P P
Push-button,
P P
Radio button,
ZA JK@ P P
JK B@
XA@ P P
Reset button,
K@Y
.
Directed set,
h. QP
Q QP
Fuzzy subset,
A
Orthogonal instruction set, HAJ
K QP
YAJ
. QP
Partially ordered set,
I.
KQ@ J
K
Qk
J@
P
Downtime,
J
A K @
Down-time,
J
@
P
P
Era,
P
Exponential-time,
@
P
Latency,
@
P
Processor time,
l. 'A @ (J
)
P
Runtime,
J
@
Button,
Salutation,
Passive,
Bit string,
Chain,
Character string,
Daisy chain,
Null string,
Search string,
Wired,
Pin,
Behavior,
Daughter,
Tolerance,
Allow,
Sky,
Audio,
Audiographic,
Theme,
Centimeter,
Singapore,
Year,
Years,
Simple,
User-friendly,
Arrow,
Drop-down arrow,
Drop-down arrow,
Left arrow,
Quorum,
Scroll arrow,
Share,
I.J
kQK ,C
.
KA
J K
HAJ
YJ
,
PAm
K
J
J.A
@
Qk
PA
. @
IjJ
QK @
,
.
J
JkA
hA
ZA
J
m '
QJ
J
P J
J
J
H@
J
. ,D
@Yj JB@ D
D
D , @Y@
D
Y
D , Y D
@Y@
PA
D
D @ h. , D
QK
QJ@ D
,D
Q
Qm
Spam,
Am
Q
Clock rate,
A
Clock speed,
J
KAJ
@ Q
Constant angular velocity, JK. AK K
@P Q
Constant linear velocity, JK. AK J
k Q
, Q
Rate,
Y
Speed,
Q
Software theft,
l. @Q.@ Q
Fast,
K
Q
Fragile,
I.@ K
Q
Confidential,
Q
Cursor plane,
Q @ i
Desktop,
I.J i
Cache line,
AJ.m Q
Command line,
Q@ B@ Q
Line,
Q
Q
Line of code,
Q@
,Q
Row,
P
Lines per minute,
J
Y@
Amplitude,
Capacity,
Size,
m.k ,
Seek,
Fallout,
SCSI,
Q
@
Information highway,
, HA
@ XAg. , HA
@ K
Q
HA
Silently,
G
. AK ,G
Static,
IK
@
C
Class hierarchy,
A J
Pull,
, J J@ J
J
.
.
K
Q
, K Q J
Regional network,
J
.
.
J
J
@
J
g J
Ring network,
@
.
'
Star network,
m. J.
J
Wide area network,
@
.
Wireless local area network, J J.
J
B J
m
Pseudo,
J.
. J.
Pseudo-device,
PAk
Pseudo-terminal,
@ Q J.
Semiautomatic,
KA
K J.
Grid,
J
.
Lattice,
Q , J
.
XQm J K Qm
Abstract syntax tree,
.
. .
Binary tree,
J
KA
J K Qm.
Qm
Hierarchy,
.
Tree,
Qm.
Hierarchical,
Qm.
Regional network,
Online,
@ (Z) , J (m )
I K QKB
@ Q.
@
I K QKB
Intensity,
Severity,
Caption,
Dash,
Slash,
Urgent condition,
Greedy,
Bit slice,
Y
, Y
hQ
k
Q
Q
KA
PQ Q
Q
KA
J K m
' Q
HAJ
Data mart,
Switzerland,
Policy,
Context,
Fence,
Workflow,
C,
Lexer,
ReNice,
YA
HAJ
@Q
AJ
AJ
KA
,iJ
.
@ Q
QJ
K@ j
h'
K K. A
Q ,
K
P
K
K
P
A
. Q
Gas plasma display,
J
PCK
Screen,
A
Splash,
ZYK. A
Splash screen,
K
@YJ.@ A
Glitch,
, J . KA
Common,
KA
Artificial neural network,
J
. J
.
JAJ@
Bus network,
K
Q J. , J
k J
.
Bus network,
J
k J. , K
Q J.
Computer network,
I.@k J
.
Heterogeneous network, Aj.J Q
J.
Interconnect,
J
.
Local area network,
J
m J J.
J J
Logical network,
J
.
Mesh,
J.
Mesh network,
K
Q J
.
Net,
J.
Network,
J
.
Notwork,
J.
Distributive lattice,
J
K I.
Strip,
Q K ,
,Q
Acknowledgment,
A Q
Constant applicative form,
J
J.
. AK
IK
Figure,
PAJ@ ,
Form,
Make,
Normal form,
XA
Shape,
C
Implies,
k , ,
XAD
Certificate,
Digital certificate,
J
P XAD
Month,
QD
Chaos,
@
Policy issues,
J
AJ
QJ
Cipher,
Expansion slot,
Online,
Strict,
Ascender,
Valid,
Paint,
Patience,
Authenticity,
Correct,
Right,
Fault,
Login shell,
Slide,
Bar,
Magnetic stripe,
Magnetic tape,
Menubar,
Menu bar,
Paper tape,
Progress bar,
Scrollbar,
Side bar,
Status bar,
Taskbar,
Vertical bar,
Expunge,
Logo,
Slogan,
Radiosity,
@ (Z)
Q. @ I K QKB
@
Q
J (m ) , IK KB
Buddy,
Slice,
Radial,
Resource fork,
Sector,
Job,
I.kA
PA
YA
l 'A
, AJ
X
.
Q.
m
iJ
m
, l
,Y
h. Y
Play,
Network transparency,
Referential transparency,
Transparent,
Assembly code,
Byte-code,
Code (program),
Kangaroo code,
Legacy code,
Microcode,
m
' Q
Q K
, m
' Q
Q
J
AJ
Q
J
AJ
Q
Q
A@
'@@
Q
Q
YJ@
Q
Q@
Q
.
Q
.KAg
@
Q
HA
A @
Q
XA
Q
I.
PA
PA
J
A
A
XP J .
A , J .
@ ,ZQ@
,
Q
@
J
. J
A
, J
k. Q J
A
J
k. Q
J
A @
A
J
m.' Q
Q
J
KA
Q
K
Q J Q
G@QK Q
QJ
Q
Education contact,
Vacuum tube,
Diode,
Glue,
Box,
Chad box,
Check box,
Chip box,
Inbox,
Mailbox,
Postal Box,
Scroll box,
Size box,
Abstract class,
Base class,
Class,
Complexity class,
Container class,
Equivalence class,
Buffer,
Cut buffer,
Frame buffer,
Digital audio,
Sound,
Blur image,
Boot image,
Captured image,
Digital image,
Image,
Picture,
Synthetic image,
Jj. @
K. QK @Q ,
K. Q@
A
Q
KA
J K A
, Z@Q ,
A
J
K. Q , Y
J
J Y
HA
J
Q
AK Y
J
J Y
HA
J
XP@@ Y
J
YK
QK. Y
J
YK
QK. Y
J
QK
QJ@ Y
Am.k B@ Y
J
XQm. J
A @ J
J
K J
Y
@ J
J
J
A
@
@
@
PAB
@ @
P H
H
A P
C@
P
J P
J
P P
P
P
P
J
AJ@
Y
Q K Y
Keypal,
@
Echo,
Y
Local echo,
m Y
Remote echo,
YJ
K. Y
, Y
Block,
Qk
, Y
Prevention,
Qk
,Q
Parcel,
AK
.
, Q
Q
Zoom out,
Q
Sufficiently small,
AJ
A
J
X HAj
Man Pages,
A
Home page,
K
@YJ.@ j
Homepage,
J
KP
j
YA @ j
Man page,
Manual page,
K
YK
j
Page,
j
j
Page in,
g@X
PAg j
Page out,
k
.
Web page,
J
J. j
PQ@
j
Demand paged,
Paged,
j
Backward chaining,
m '@ @
Y
Zero,
Q
Zero-content, Jj @ PA ,Jj @ Q
Group attribute,
m
.
Q
Beep,
Double-ended queue,
,
JK
AE X
JK
AE X PK. A
Row,
Q ,
Write queue,
K . AJ
Validity,
J
kC
Solid,
I.
Shell,
XYJ
J
J@
J
KAJ
KQ
,
K
AJ
J
Multiclick,
Press and Hold,
Press,
Stress,
Video compression,
Implies,
Optical,
Loss,
Guest,
A J@
Q.g
P Q
A
K
.
K A
.
K A
.
K A
.
K A
.
P K. A
PX , K . A
,
JK
AE X PK. A
JK
AE X
PK. A
KkA
A
Am.' B@ J
KA
J K AJ
.
J
AJ
.
QK
Qm' , J.
J.
@ J .
HAJ
J
J .
J
J .
@
J
. J.
A J
@ J .
J
J
XA ,
J
J.
Syntax,
Maintenance,
Preventive maintenance,
Formula,
Image format,
Library routines,
SLIP,
SMTP,
AJ
KAJ
KAJ
J
KA
J
P@ J
JJ J
J
J
h Y , (P) J
K. AJ.
Fuzzy,
D. ,
G. AJ.
Adjust,
J.
Autoconfiguration,
@ J.
Configure,
J.
Noise,
l. ,i.J
m.
Noise,
i.J
m. , l.
Damage,
PQ
Key stroke,
P P
Keystroke,
P P
Compaction,
Compress,
Compression,
K.
KAJ
Data compression,
HA
J
Deflate compression,
File compression,
Hold Down,
QK , J
J@
J
J@
Lossless audio compression, H@
PAk YK
.
Lossless compression,
X Q
Lossy compression,
X
Blur,
Length,
Low-bandwidth,
Collapse,
Constant folding,
Humor,
Digital envelope,
Envelope,
Kiosk,
Shadow,
Appear,
j J k
.
. AK
IK
@ Q
P Q
, Q
C
p ,
P
Normal,
Network storm,
Dead,
Reflexive,
World,
High colour,
High definition,
High density,
High,
Common factor,
Compressibilty factor,
Context operator,
Operator,
Vertically,
General,
Generic,
Yield,
Fence,
Break statement,
Model,
Dump,
Big-endian,
Smart terminal,
Terminal,
Video terminal,
Peripheral,
Third party,
Paths,
Abstract method,
Class method,
Urgent,
Normalised,
Input method,
g. A
J
J. ,
XA
A
J
.
,A
IJ
A
A
@ B@
A
YK
YjJ@
A
A J@
A
KQ ,A
A
Q
@ A
A B
AJ A
A
AK
XA
Ag.
@ ,A
A
YKA
i.J
, KA
A K@ PAJ.
Method,
Information highway,
Route,
Flavor,
Float (verb),
Charset,
Coded character set,
Frame set,
Bus request,
Dial-up,
Interrupt request,
Request,
Embedding,
Bricks,
Develop,
Phase,
Buffer overflow,
Spill,
Portrait,
I.
P@ Q
h Q
Q
J.J
Q
PJ J Q
J
Q
Q K J
Q
J
KK
Q
K Q
IA
Q
HA
XQm K Q
.
J J
K
Q
@ K Q
AgXB
K
Q
@ K
Q
, HA
@
HA
K
Q
,
K , @ Y
PAm
PAm
Q Q
P A@
H@
A K I.
KA I.
@ I
A KB
.
I.
PA@
,Q
H.
P
P
@ @ A
A
Q
. AK Q
Fixed width,
IK
. AK Q
Fixed-width,
IK
Listing,
Q
TERM variable,
:Q
J
J K. A Q
View,
Q
Width,
Q
Acknowledgment,
Q , A Q
Distributive lattice, K. A , K
P
K
Q
K
K
P
, Q
Lattice,
J
Bold,
Q
Dismiss,
XAK.
@ , Q
J
Qj
Encapsulated Postscript,
IK
J
Qj
Postscript,
IK
Q
Binary coded decimal,
AJ
KA
J K Q Q
Decimal,
Q
Random,
K@
Stochastic,
K@
Joy stick,
H. A@ A
Joystick,
H. A B@ A
Q
AJ@ A
Pointing stick,
Display,
Neuron,
Modern,
Cluster member,
Member,
Weekend,
Cluster node,
Cluster node,
Network node,
Node,
Root node,
I.
Q
Yk
J. B@
, J
k Y
X J Y
k Y
, X J Y
J
@
J
. Y
Y
Y
K
P Yg
.
Case statement,
Passphrase,
Hardware,
Material,
Opacity,
Find,
Program counter,
Program counter,
Numeral,
PAJ
.
PAJ
.
XAJ
XA ,XAJ
J
'. ,( ) PJ
Im
. X@Y ,m QK. X@Y
l. AKQK
XY
Ag
Q
)
Scalar,
(XY)
@ XY
XY
Chromatic number,
G
Complex number,
I.Q XY
@ XY
Effective number of bits, A@ IJ
.
Integer,
iJ
m XY
Prime number,
@ XY
J. XY
Pseudo-random number, K@
XY
Radix,
P Yg
.
Von Neumann integer,
AJ
K XY
iJ
j@
Y
Blur,
(P) J
K. AJ. ,h
Deselect,
ZA JK@ Y
Null,
Y
PY@
Y
Unable,
Reference counting, k. Q Y ,k. @Q @ Y
Reference counting, k. @Q @ Y ,k. Q Y
Prodigy,
XQ
Landscape,
Q
Bitmap display,
K Q
Demo,
Q
Cardinal number,
B@
AJ
AJ
B@
Q. J
J K ,
HAK
Q. J
J K ,
Fibre optics,
HAK
@
On all pages,
HAj
@
On even pages,
J
k. Q@ HAj
On the line,
m '@
Backbone,
XA
Cognitive architecture,
J
@P X@
PA
PA
Component architecture,
J
K
Domain architecture,
Aj. @ PA
. @
Bit depth,
IJ
Colour depth,
@ @
Depth,
Operations,
HAJ
Child process,
K
JK . J
J
k J
Light-weight process,
P@
Microperation,
QJ
J
Operation,
J
Process,
J
Work in progress,
PAm .' B
@ YJ
Vertical,
@P ,
X
Column,
X
Genericity,
J
Global,
Public,
Client,
J
J
Client-server,
XAg
Light client,
J
k J
, XAm '@ YJ
Server-side,
XAm '@ J.
Configuration item,
J
QJ
Element,
QJ
Item,
QJ
P QJ
Picture element,
Fiber optics,
J)
K
m' ,(
Inverse,
Invert,
J@ C
Equivalence relation,
A
J C
Logical relation,
J
Relation,
C
Hyphens,
@ HAC
Bookmark,
C
C
Book mark,
Commercial a,
YJ C
XQ AJJ@ C
Double quote,
k
.
.
Exclamation mark,
I.j. J@ C
Exclamation point,
J
E C
Insertion point,
Am B
@ C
, JJm '@ C
Pound sign,
Q@ C
.
Yg)
( P
Yg) Q@ C
Pound sign,
,( P
J
Jm . '@ C
Question mark,
A JB@ C
C
Watermark,
J
KA
@ , J KC
Declaration,
CK
.
Outbox,
PXA@ J .
Pack,
J .
Turing Machine,
B@
Scientific,
J
J@
Cryptography,
Q
@
Cryptology,
Ethics,
H. @X @ , C
g B@
Flag,
Life science,
ZAJ
k B@
Macrology,
QA @
Bug,
Glitch,
J . KA
,
Converse,
Defect,
Internal bug,
Sample,
Gas,
Hair,
Away,
Glue,
Object-orientation,
Object oriented,
Chat room,
Room,
Server room,
Snooze,
Envelope,
Wrapper,
Fault,
Faulty,
Deep,
Guru,
Non-volatile,
Case insensitive,
Heterogeneous,
Heterogenous,
Incompatible,
Junk,
Lossless,
Non-existant,
Nontrivial,
Nonvolatile,
Not empty,
Not equal,
I.J
IJ
g@X
.
PA
, A
Y
I.KA
,Z@Q
, A
J
k. J@ J
Q
J
k. J@
Q
Q
XPX
Q
XAm '@ Q
ZA @ ,
Q , C
C
Y ,
Y ,
J
P
QK
AJQ
'@ QK QK
AJ Q
Qm
. .
Aj.J Q
J Q
Aj
.
@ J Q
A , IJ @Q , A Q
Q
( )X
Xk. Q
Y JJ. Q
QK
AJ Q
Q
PA
XA Q
P J
H@
k ,X J
Cluster,
Computer cluster,
G. Ag X J
@ J
Absolute address,
Address,
@ J
J ,m '@ @ J
Domain address, Aj. @ @
J ,Aj @ @ J
Domain address, m '@ @
.
Dot address,
J
K KJ ,
K @ J
Electronic mail address,
YK
QK. @ J
Q@
G
Q@ YK QK @ J
E-mail address,
G
.
Indirect address,
QAJ. Q
@ J
@ @ J
Internet address,
I K QKB
IP Address,
K
@ @ J
J @ J
Logical address,
Machine address,
@ @ J
Missile address,
pPA@ @ J
Network-address,
J. @ J
@ J
Paged address,
j
@ J
Q@ Y@
Physical memory address,
@
@ J
Shared-address,
Q
Specific address,
m @ J
Title,
@ J
Addressing,
K J
K J
KA
Byte addressing,
HAJ
Dot address,
K @ J , J
K K J
QAJ Q K J
Indirect addressing,
.
X@ K J
Multicast addressing,
XYJ @
Physical addressing,
K J
Remote,
YJ
K. ,YK.
X
Return,
Software reliability,
l. AK Q.@
Pixels,
PA @ @ A
Separator,
A
Whitespace,
A
Actor,
A
Boot virus,
C@
QK
A
Fax,
A
J
Chad,
HA
J
Bay,
j
J
Branch delay slot,
Q J@ J
j
j
A
Card slot,
HA
. J
J
Hole,
I. K , j
J
Slot,
j
Open,
iJ
Q K , @ Q , m
Gap,
.
Check,
Y AK , m
Desk check,
.J m
Self-test,
KA
K m
Software audit,
l. AK Q.@ K . AP , l. AK Q.@ m
J
m' , A J@ m
System analysis, A J@
@ Q
Backspace,
j
, @ Q
Blank,
PA
m , @ Q
Gap,
.
Space,
ZA , Am. , @ Q
Q
Perspective,
P J , k
.
Cocktail shaker sort,
Cg PQ
Monkey sort,
XQ PQ
Sort,
PQ
Sorting,
I.
KQK ,PQ
AQ
Brush,
Occasion,
J . AJ , Q
Sub,
Q
Branch,
Q
Pathname separator,
@ XA Q
J Q
K
Y Q
E Q
KA
QJ Q
Q
Q
Q
Q ,Pm Q
Y J
Q
Q
Pm
, YJ
XYm Q
Y Q
J
Q
AK. AJ
IK
KA ,hXA
Blank,
@ Q , PA
Empty,
PA
Zero-content, Jj @ Q , Jj @ PA
g , PA
Difference,
C
,A , PA
Distance,
A
Field mouse,
m '@ P A
P
A
Mouse,
P
A
Optical mouse,
J
K
Corrupt,
YA
Abscissa,
A
Apostrophe,
AJ
A
AJ A
Back quote,
KA
AJ A
Backtick,
KA
Comma,
A
Decimal point,
Q A
, A
,A
Distance,
PA
A
Field separator,
k
Fatal,
Elephant,
Outside,
Mice,
Category,
Concrete class,
Core class,
Derived class,
Protocol class 0,
Subclass,
J
h. PAg , h. PAm '@
@ Q
J
XYm J
. J
J
JAK
J
J
A J J
K
Q
JQ J
J J
K. A
Scalability,
J@ J
K. A
Computable,
I.
jJ K. A
Countable,
X@YJ K. A
K A
Embeddable,
Q K. A ,PAC
.
Embeddable,
PAC
K. A ,Q K. A
Extensible,
YK
YJ K. A
Loadable,
J
jJ K. A
Portable,
m , j K. A
K A
Z , AJ
Printable,
AJ
.
.
.
Refreshable,
AKC
K. A
QJ J K A
Resizable,
AJ
@
.
Scalable,
YK
YJ K. A
Fatal,
hXA ,KA
K QB @ ) lk. .
AK PPA
Firebottle,
HA
( A @
Player,
I.B , PA
News reader,
PAJ.k B@ ZPA
ZPA
Screen reader,
A @
Denominator,
A
Divisor,
A
Base,
A @ , YA
Portability,
g , g , Q
Single,
YK
Q
,i
Enabling,
J .) ZA J
Mosaic,
(
KA
Fail,
Failure,
Chapter,
Umount,
Unmount,
Complete metric space,
A
Q ZA
Hyperspace,
. @QK ZA
Space,
Am. , @ Q ,ZA
Garbage,
K
A K , HC
h , Q
Pie,
QKA
.
Pragmatic,
K @P X ,
@ ,
Paragraph,
Q
Lossy,
X
Q
QK
Decode,
Decompress,
Decrypt,
J
J@
Q
Decryption,
P@ , I
J.J@ @
Deinstallation,
I
J.J@
,K Q@
Demodulate,
K Q@
Disassemble,
g@
,
Disassembly,
g ,
@
Unzip,
Philosophy,
Index,
Q
Overhead,
GA
Computer virus,
G. Ag Q
Virus,
Q
Overclocking,
J
KAJ
@ J
Overflow,
J
Resolve,
KA
G
KA
Legal,
G
KA
Computer law,
H. Ag
KA
Law,
. jJ@
A
Access control list,
XA JAK
A
Cascaded list,
k. PY
P AJ
k
A
Checkbox menu, Q
AK K. Q H@
Clip list,
HAA
A
P AJk
A
Context-sensitive menu, QK AJ H@
AJ
AK.
H@
Contextual menu,
J
AJ
P AJ
k A
J@
A
Distribution list,
K
P
Doubly linked list,
Q@
A
A
Drop-down menu,
Y
J@
A
Flowchart,
Y
KA
A
Hotlist,
A
Lazy list,
Mailing list,
K
YK
QK.
A
Menu,
A
Numbered List,
Q
A
A
Pop-down menu,
Y
Y A K) JJ ,(... t '@
A
Popup,
.
TODO List,
A @ A
X B@
Tool menu,
H@
A
Stand alone,
K@ YK. 'A
Plug and play,
J
.
P
A@
J
Mouse grab,
.
Catch-all-entry,
g@Y @ J.
Grab,
J .
Caret,
J
.
Circumflex,
J.
Accept,
J.
Frag,
J
Canonical,
Q YA
K. YA
KAJ
Database,
HA
K. YA
KAJ
Decision support database,
HA
X HA
YA ,P@Q@
X
P@Q@
YA
Decision support database, HA
X HA
X
K. YA ,P@Q@
KAJ
P@Q@
YA
Deductive database,
HAJ
J
k. AJJ @
Desktop database,
i HAKAJ
K. YA
I.J @
HA
K. YA
KAJ
Distributed database, P
Docking station,
I.J
QK YA
K KA
J@ YA
Eighty-twenty rule,
Q
KAJ
K. YA
Functional database, , J
K@ Q@
HA
K. YA
KAJ
J
@X HA
K. YA
KAJ
Functional database,
, J
@X HA
K. YA
KAJ
J
K@ Q@
HA
KAJ
K. YA
Hierarchical database, K
Qm. HA
YA
Intelligent database,
X HAJ
YA
Knowledge base,
PA
K. YA
KAJ
Network database,
HA
@
J
.
K. YA
KAJ
Object-oriented database,
HA
J
KA
K. YA
KAJ
Operational database, J
HA
K. YA
KAJ
Relational database, J
AJ.KP@ HA
YA
Rule,
Q
J. I.A
Macroblock,
Message block,
AQ@
I.A
Template,
I.A
K. A
KAJ
Data dictionary,
HA
Dictionary,
A
k
, HAJ
K KA
Legalese,
HAJ
Canonicity,
J
K KA
Codebase,
Pumpking,
Constraint,
Divide,
Division,
Division by zero,
Partition,
Quotient,
Section,
Severity,
Authentication ticket,
Clip art,
Clipart,
Malfunction,
Cut and paste,
Cut,
Nibble,
Hard sector,
Sector,
Droplets,
Diagonal,
Diameter,
Region,
Code segment,
Data segment,
Segment,
Disconnect,
Never,
Data glove,
Jumper,
Jump,
Card cage,
Lock,
Screen lock,
Q
YJ
,Q
Q
(H. AJ) H. AK. ,
Y ,
J
A JJ
@
A
J
J A
P
@
I. A
J . ,A
Q
H@
Q
Q
@ ,Q
Q
K.
KAJ
HA
A@
@YK. @ ,
K. PA
KAJ
HA
A , PA
.' ,Q
PAm
A
HA
.
A @
Kill app,
Kill,
Capability,
Serviceability,
Old,
Read,
Monkey, scratch,
Monkey up,
Pirate,
Software pirate,
Piracy,
Software piracy,
Compact disc,
Digital versatile disc,
Disc,
Disk,
Diskette,
Fixed disk,
Floppy disk,
Floptical,
Hard disk,
Hard drive,
Live CD,
Local disk,
Logical disk,
Magnetic disk,
Magneto-optical disk,
Minifloppy,
Multihost disk,
Root disk,
Scratch disk,
Zip Drive,
. J
l. AKQK
J
PY
m '@ PY
Y
'
Y
Z@Q
,XQ
B XQ
AQ
l. @Q.@ AQ
JQ
l. @Q.@ JQ
l. Y Q
PAK.
P Q
Q
Q
Q
Q
I. J Q
Q
Q
Q
Q
K
. AK Q
IK
I. Q
k Q
m Q
J Q
J
AJ Q
J
AJ Q
Q.
Q
Q
Q
J
@ XYJ Q
Q
P Yg
.
. Qk Q
I Q
Q ,YJ
, J K@ X J
Eigenvalue,
(
G@ X) Q
P Yg
.
Hack value,
A@ J
Modal (value),
j.jJ@ J
XQm '@ J
Salvage,
Value,
J
Comma separated values,
@K.
Values,
Constraint,
A
Sufficient,
A
QA
Camera,
Full,
A
Webcam,
I.K
@Q
A
Binary large object,
m
KA
J K KA
KA
Context object,
AJ
Object,
KA
KA
Shared object,
Q
'@) Ag
,( Qk)
Q.
Case (font),
( Qm
Q
J.K ,Q .
Zoom in,
Cable,
J.
Cable modem,
X @ J.
Coax,
Pj @ YjJ J.
Dynamic typing,
J
J
AJK
X K . AJ
K AJ , K AJ
Overwrite,
J
.
.
Overwrite,
K. AJ , J
K. AJ
K . AJ , Qm '@ K . AJ
Packet writing,
PQ@
K . AJ
Packet writing,
Qm '@ K . AJ , PQ@
Scenario,
( )
YD K . AJ
Book,
H. AJ
Detective,
@ I
PAJ
JkB
.
Light pen,
J
k
Pen,
Say,
Junk,
I.J
@Q ,A Q
, A
. @ AJ
Bit mask,
IJ
AJ
Clip mask,
A
Mask,
H. Am.k ,AJ
@
Netmask,
J
. AJ
@
Network mask,
J
. AJ
J
@
Subnet mask,
J
Q@
.
AJ
Alpha channel,
A @ AJ
AJ
Channel,
J.@ AJ
KAJ
Data channel,
HA
Secure channel,
J @ AJ
J
Mail bomb,
K
YK
QK. J
.
Grammar,
Y@
Reserved blocks,
A @ I.@
Parentheses,
A
Arc,
Bracket,
Left bracket,
(
)PA
Right bracket,
(
)JJ
Square bracket,
K. Q
Brute force,
J
A
PY@
,
Power,
Leading,
J
KP
,
XAJ
Benchmark,
Z@X B@ AJ
K AJ
Complexity measure,
Y
Dimension,
YK. ,AJ
Measure,
AJ
Measurement,
AJ
Chain,
,YJ
Invert Selection,
J
kAJ HA
Words,
HA
Key word,
J
A @
Keyword,
J
kAJ
Keyword in context,
J
kAJ
@
AJ
Passcode,
PJ.@
Password,
Q
Word,
QJ :
Every,
Accessory,
A
Digital camera, J
P QK
@ , J
P Q
Completeness,
Amount,
J
Quantity,
J
Alias,
J
J
Nickname,
J
J
Kiosk,
,p
CORBA,
AK. P
Console,
Entity,
AJ
KDE,
YJ
Arbitrary,
AK. J
Kilobyte,
IK
. J
Kilobit,
IK
. J
QJ
Kilometer,
Kilo-,
J
K J
Kiloflops,
J
KA J@
A
Computational organochemistry,
ZAJJ
JK Ag K
Keywords,
J
KJ@ H. AJ
Catalog,
XQ ,h. AJ
Protected workbooks,
J
m I.J
Block (unit),
J
Boot block,
C@
J
Cache block,
AJ.m J
File control block,
jJ@ Q@ X J
AK
HA
.
Mute,
, I.
J
Brochure,
@Q
Handbook,
I.
J
Defect density,
@ A J
XQ A J
Double density,
k
.
Q
Brochure,
I.
J , @
Workbook,
@Q
Junk,
A Q
,I.J
@Q
Q
Sphere,
Q
Slashed Cross,
Bullet,
AP
,X@YK K
Q
Heuristic,
J
.
Q
Fragment,
Break,
Q
Fraction,
Q
Laziness,
Fractal,
P
Monkey, scratch,
XQ ,
Autodetect,
@
Collision detection,
HAXA
Demodulate,
K Q@ ,
K Q@
Demodulation,
K Q@
Detect,
Cookie,
Cost,
Docbook,
J .
Assembly language,
J
J
m.'
Computer language,
H. Am '@
Coordination language,
J
K
Database query language,
CJ@
J.@ Y@
KAJ
HA
Declarative language,
K
QK
Q K
Domain-specific language,
XYm Am.
First generation language, B @ J
m. '@
Fourth generation language,
J
m. '@
K. @Q@
Functional language,
J
J
Functional programming language,
m . QK.
J
J
High-level language,
J @ J
A
Imperative language,
K
PAJ.k.
@
Language,
Low-level language, J @ jJ
Machine code,
B@
Machine language,
B@
Q
Metalanguage,
Natural language,
J
J
J.
Object-oriented language,
J
Q
J
k. J@
Procedural language,
J
K@
Qk.
@
Programming language,
m . QK.
Pure functional language,
J
J
J
A
Purely functional language,
J
J
.
A
Second generation language,
J
m. '@
GA J@
System programming language, m. QK.
A J@
Game,
k
.B
Suffix,
kB
Nonlinear,
kB
Wireless,
B
Scratch,
K
@YK. ,.(Q) Z
B
,I.B
Player,
PA
Banner,
JB
Asymmetric,
Q AJ JB
Lambda,
@YB
Drop-down list,
m ' B ,@Y@
m '
B
Y
m '
B
Drop-down list,
m '
B , Y
@Y@
List,
m '
B
, K Qm ' m '
B
Recipe,
A m '
B
K
Scrollable list,
Q
.
Antisymmetric,
KAJ B
Asymmetrical,
QA J K B
Q K B
Asynchronous,
@
Endless,
YK. @ ,
KA
EB
E B
Infinite,
KA
No,
B
. ,Yg @ B
None,
YK
None,
Yg @ B , YK
. ,Z
B
Non parity,
k. P B
Core,
I.
Q
Functional requirements,
, J
J
CJ
J
J
Tab,
A
Glue,
Z@Q , A
Label,
J
g , J
Nice,
NO-DAEMON,
@k m A
Scanner,
m A
@ A
Placeholder,
A
Macros,
QA
Malta,
AA
Owner,
A
Financial,
A
Optimized,
J A
Italic,
KA
J ,KA
Oblique,
Qj
Water,
ZA
Implicit type conversion, , K XAJ.
K K
m'
Permutation,
XAJ
.
Spacing,
YAJ.
JJ.
Newbie,
Y
.
Dissertation,
kQ
@ , IjJ
Default,
KYJ
.
Embosser,
Ym. , m. ,P Q.
Im
' lQ. .
Contract programmer,
Y
Programmer,
lQ. .
Scheduler,
Ym. , Yg
. lQ. .
B@
lQ
Systems programmer,
. .
Obsolete,
Q , J .
Mantainer,
J .
Fuzzy,
G. AJ. ,D.
J.
Connected graph,
J AJ
J.
Connected subgraph,
J
Q AJ
J.
Graph,
AJ
Destructor,
J ,YJ
J.
J
J.
Screen blanker,
A @
AJ
Continuation,
A@ ,(@ X m . QK.) K
.
P@QJ@ ,( @X)
Carrier scanner,
Qk
@ YJ
h. @QkB
A
J ,
AK.
A J@ HAg
k
m' k
HAA
k
@ @ k
k
J
PQj @ k
iJ
KA k
J
KP
k
J
KP
k
@ @ k
k
k
h
k. AJJ @
h
Q@ h
A J@ h
'PA
ZCB
@
P Q
J J
Literal,
SC/XSpread,
Screenshot,
Haptic,
Concatenate,
Message board,
Board,
CDE panel,
Clip board,
Colour palette,
Daughterboard,
Editor panel,
Keyboard,
Main board,
Mainboard,
Palette,
Panel,
Touchpad,
Deductive tableau,
Pane,
Scroll pane,
System board,
Logarithm,
Color,
Colour,
Fillcolor,
Laser,
Linux,
Material,
Gated,
Deadlock,
XAJ , XA
K . @K. Q. PA
P @ , P A
@
J
. J
J
Continuous,
, @J ,(k , @X)
QJ
Volatile,
QK
AJ
CJ
Functional requirements,
, J
J
Q
J
J
. J
Operational requirements, , J
HAJ
. AJ
Jk@
J
HAg
Requirement,
h. AJ
Jk@
, I.J
Orthogonal,
Y AJ
J @ XYJ
Cross-platform,
HA
@ XYJ
Multiboot,
CB
Multibyte,
IK
AJ.@ XYJ
XYJ
Multipart,
AB@
Multiple,
XYJ
XYJ
Multiple boot,
CB@
@
Multiple value,
J
XYJ
Multiplexer,
APB
@ XYJ
Multiprocessing,
Z@Qk. B@ XYJ
Multiprocessor,
l. 'A @ XYJ
Polymorphic,
A B@ XYJ
Transitive,
K
YJ
J
Haptic,
, AK.
Q
J
Class variable,
J
Environment variable,
J
K. Q
J
Global variable,
Q
J
Q
J
Member variable,
Q
J
Variable,
J QJ J
Logic variable,
J
J
Free variable,
J
J ,Qk
J , J
J
Free variable,
Qk
m
J
Web browser,
AK QK
AJ
AJ
.
Business to business,
K. Qk. AJ
. ,I.
AJ
Ready,
QAg
Accessible,
hAJ
Residual,
J . J
Sequence,
J
AJJ
J
Homogeneous,
Aj
.
Homogenous,
Aj.J
Dealer,
Qj.J
Sense,
Ak@
, j.J
Vector,
j.J
Coaxial,
Pj @ YjJ
J
Museum,
j
Cache controller,
AJ.m jJ
Controller,
jJ
jJ
Microcontroller,
Q
Network interface controller, k. @ jJ
@
J
.
Specialized,
j J
J
Grey-scale,
XAQ@ PY
Q , X@
Q
Synonym,
X@
Q k. Q
Byte-code compiler,
J
KA
Q k. Q
Byte compiler,
J
KA
Compiler compiler,
k. Q k. Q
Obsolete,
J . , Q
Metric,
Q
Q
Meter,
Micrometre,
QJ
Q
Q
Concurrent,
@ Q , @
Q
Synchronous,
@
Bit pattern,
J
KA
J K
Serial,
J
Browser,
i
Context-sensitive,
. AK , iJ
jJ@ IK
. AK , I
. J
iJ
J@ IK
. J
, K
@ I
Identifier,
Q
. J
Installer,
I
Like,
J
J
Like this,
@ Y
Double-duplex,
h. XQ
J J
Dual-homed,
Q @ J
.
'. HBAm
Search Domains,
Im
@ Am
@
Criteria range,
HA
.
Lifted domain,
Q Am.
Space,
@ Q ,Am.
Adjacent,
PAm.
. ,Ym.
Schedueler,
Yg
. l. AKQK
Scheduler,
Yg
. lQ. . ,Ym.
Abstract,
XQm .
Plain,
() XQm.
Conduit,
Qm.
Embosser,
m. ,Ym.
Embosser,
P Q. , Ym. ,m.
Sensor,
m.
Folder,
Ym.
Sub folder,
Q Ym.
Electronic magazine,
J
K Q@
m .
Magazine,
m.
Public directory,
m.
m.
Aggregator,
Assembler,
m.
@ m.
Connection pool,
HBA
Native compiler,
Q m.
Aggregate,
m .
.
Newsgroups,
K
PAJ.k@
HAm
@ m
Character set,
Qk
.
Chip set,
l' @Q m.
Fixed,
Y J
Crisp,
J
Discrete,
J , J
Mutually recursive,
XAJ.J PQJ
Destructor,
YJ
J. , J
Stretched,
XY ,XYJ
Proportional,
.AJ K ,I.AJ J
Symmetric,
Q AJ J
Paradox,
AJ J
Finite,
AJ J
Bounded,
X Y m , AJ J
J
Eyedropper,
Ag. , I
Miscellaneous,
J J
Body,
Parallelograms,
C B@ K
P @J
Parallelogram,
C B@
P@ J
Parallel,
P @J
Continuous,
(k ,@J
Backward compatible,
AJ
g @ J
Compatible,
@ J
Correspondent,
'@
,'@
J
Involved,
PJ
Average,
J
J
Intermediate,
Mean,
J
, J
@
J
Reachable,
J
@
@
J
Available,
Q
J@ I
J
,( AJ
J)
Paused,
J
,G@ X I
Q
I
Eigenvector,
,Q
I
Eigenvector,
G@ X I
Ideal,
AJ
Example,
AJ
Advanced,
Am
J Am
Logic emulator,
Attempt,
Am
Content,
Jm
Executable content,
YJ
J K Jm
Command Prompt,
Q@ @ Im
Login prompt,
h. @ Im
Prompt,
Im
Locator,
@ @ XYm
XYm
User defined,
Yj J @
Bounded,
AJ J ,X Y m
Delimiter,
Ym
Desktop publisher,
I.J @ i PQm
m
Editor,
PQ
Language-based editor,
J. PQm
@
Language-sensitive editor,
Ak PQm
Line editor,
k PQm
J@ PQm
Linkage editor,
HCJ
PQm
Screen editor,
A @
Character,
Qm
Char,
Qm
Dingbat,
J
K
Q K Qm
Escape character,
m '@ Qm
Disk drive,
@Q @ Qm
Drive,
@Q @ Qm
Engine,
Qm
@ @Q B@ Qm
Floppy disk drive,
KQ
Hard disk drive,
I. Q Qm
'. Qm
Search engine,
Im
, , m
Physical,
Xk. @
J
k
,Qm
QY
Memo,
Emulator,
m
.
Collection,
m.
K. m
KAJ
Data set,
HA
.
. m. , H@Q
m.' m.
Device group, PAk
, PAk
Q
m.' m
Device group, H@
. . m.
,XAm' m
Discussion group,
m
.
.
.
AJ K
, A J K m
Discussion group,
m
.
.
XAm.'
@X
@ m
Disk device group,
Q@
.
. h. , m.
Group,
HAm
Lower set,
GX @ m
.
News group,
PAJ.k @ m.
Newsgroup,
PAJ.k @ m
.
Work group,
m.
Workgroup,
m
.
Periodic group,
PX m.
Sum,
g. ,m.
Sum (noun),
m.
Anonymous,
B@ m.
Unknown,
m.
Conversation,
KXAm
@ XAm
Align,
@ XAm
Alignment,
@ XAm
Justification,
Left-justify,
PA
@ XAm
J
@ XAm
Right-justify,
Vertical Alignment,
XA @ XAm
Justified,
XAm
Emulate,
AAm
AAm
Emulation,
Simulated annealing,
K
YJ@ AAm
AAm
Simulation,
Closed set,
I.J @ i J
m
Development environment,
QK
J@ J
m
P Jm
Run-time environment, J
Backside cache,
g AJ.m
Cache memory,
AJ.m
Hidden,
m ,
. Jm
Shortcut,
QJm
Cone,
Qm
Q m
Data warehouse,
HAJ
JJ
,( Q m
Format (noun),
)
Format (verb),
) JJ
E ,( Q m
Q m
Z-buffer,
I.KQ I
m
Descender,
. A ,
Custom,
m
m
A@
VFS,
. K . AJ K
. Y HA
Q
QK m
Character encoding scheme,
PAm
Color map,
@ B@ m
Colormap,
@ @ m
Q k. m
Flow chart,
AK
. m
Gantt Chart,
I KAg
Schema,
m
k ,m
Scheme,
Chat script,
KXAm m
Directed graph,
k. m
m
Maintainer script,
K m
J.@ Y
KAJ
Data flow diagram,
HA
Hidden,
. Jm ,
m
, ,m
Disconnected,
Color chooser,
@ @ Q
m
@ P@Y
Low earth orbit,
j J
P
(A KPB
@)
Handler,
@Y
Desktop environment,
J@ ,Qm
PAj
Work station,
m
Workstation,
m
Circular buffer,
PX m
k
,
m '@
m
Copyright,
QJ@
m '@
m
Copyrighted,
Criterion,
m
YA m
Database analyst,
HAJ
Data communications analyst,
m
@ HC@
HAJ
Lexical analyser,
m
Protocol analyser,
@Q m
KA m
Cationic cocktail,
GJ
Locale,
J
m
Local,
m
Parser,
H. Q , m
Autoloader,
@ m
Bootloader,
C@
m
@ m
Boot loader,
CB
Bootstrap loader,
C@
m
Lilo,
JJ
m
Handheld,
YJ
AK. m
Portable,
j K. A ,m
Protected,
m
Axial,
Pm
Axis,
Pm
X-axis,
J
Pm
Y-axis,
XA Pm
Z-axis,
J
Pm
Number Converter,
AP B@ m
Clear,
m
Protocol converter,
A J
m
Contour,
J
m
Memorandum,
Protocols,
@Q
Q , @ Q
Concurrent,
@
J @ Q , AK
Qm. '@ J . @ Q
Flow control,
Y@
.
J @ Q
Qm. '@ J . @ Q , Y@
Flow control,
AK
.
Job control,
@ J.@ Q
J . @ Q
Remote monitoring,
YK.
Watch,
J . @ Q
Bus watcher,
A J@ I.@ Q
I@ Q
Disk controller,
Q@
.
Port monitor,
YJ @ I.@ Q
Resource monitor,
XP@ @ I.@ Q
@
Sniffer,
J
. I.@Q
@Q
Mirror,
K @Q
Disk mirroring,
Q@
Anchor,
. Q
. Q
Area grid,
kA @ HAK
Bounding box,
Ag@
K. Q
,K. Q
Box,
YJ
Combo box,
XQ QK
Qm' K. Q
Combobox,
I.Q K. Q
Dialog box,
P@k K. Q
Rounded square,
PY K. Q
Square,
K. Q
,I.KQ
Sorted,
PQ
High,
A , KQ
J k Q
Referential transparency, , J
A@
Jk Q
J A .
Carriage return, ,( Qm) Q@ @
k. Q
Q@ @
k. P
Reference,
k Q
.
Hello, world,
A@ AE
@ ,AJ.kQ
Repeater,
XXQ
X@ XQ
Airbrush,
AJ
.
gY
Back door,
A J
Q gY
Inserted,
h. Y ,gY
Histogram, jJ
GAJ
K. P , P@QK h. PY
Spell checker,
KC@
Y
Compact,
l. Y
Integral,
l. Y
,h Y
Inserted,
gY
.
Average seek time,
J Im '. Y
Duration,
@ X , Y
Y
Tilde,
Round,
PY
Blog,
K Y
Admin,
QK
Y
Administrator,
QK
Y
Database administrator,
YA QK
Y
HAJ
K. YA QK
Y
KAJ
Database manager,
HA
J.@ QQ
KAJ
QK
Y
Datacenter manager,
HA
Manager,
QK
Y
System administrator,
A J@ QK
Y
QK Y
Web master,
Webmaster,
QK
Y
Range,
Y
Flavor,
, @ Y
Memo,
Qm , QY
@Q
Q k
Code walk,
.
Revision,
k. @Q
@Q
D@ k
Spellcheck,
Jj
.
.
Synonym,
X@Q , X@Q
Contact,
@Q
Education contact, , K. QK @Q
K. Q@ Jj. @
Entry,
h. Q
h XQ
Double-precision,
Y@
.
Dual,
h. XQ
Dual head,
@Q@ h. XQ
, Y@
Dual-stack, @ h. XQ
h. XQ
, @
Dual-stack, Y@ h. XQ
h. XQ
Duplex,
h. XQ
Q
Farm,
P
Service provider, Yg Q , YjK. X Q
@
I K QKB
Increment,
? YK
Q
Workspaces,
HAgA
Closed surface,
kA
kA
Free space,
PA
Memory address space,
@ J kA
Q@ Y@
Namespace,
B@ kA
@ kA
Print area,
AJ
.
Surface,
kA
Text area,
J
J.J@ kA
Workspace,
@ kA
PA
Absolute path,
K. PA
KAJ
Data path,
HA
Disk path,
Q PA
Mail path,
YK
Q.@ PA
Path,
PA
Relative path,
. PA
Scan path,
i @ PA
URL,
PA
Help,
YA
Promote,
J
QK , YA
Support,
X , YA
Assistant,
YA
Blending,
P AQ
Messenger,
AQ
Addressee,
J
@
Q
Sender,
Q
Filter,
l Q
Mail filter,
YK
QK. lQ
Wizard,
YQ
Attachment,
Q
Q@ YK QK Q
Email attachement,
.
Q
Refutable,
Q
Rejected,
Monitor,
H. AQ
I.Q ,AK. P , AK. P I.Q
Qword,
P
@
QAJ K
.
Qword,
I.Q , QAJ K. P @ I.Q
AK. P ,
AK. P
Q
Concentrator,
Q
Accumulator,
Q
Codec,
PAQ
Floppy,
Q
Yg@ Q , Q
One-Time,
Q , Yg@ Q
One-Time,
P
A PQ
Mouse-over,
X J
KQ
Broadcast quality video, Xk. H@
J
@ X@
J
KQ
Compressed video,
Video,
J
KQ
'@ A KQ
Full-motion video,
Qm
Visible,
KQ
Removable,
@Q
Q
Sync,
J@
Q
Synchronize,
J@
Q
V-Sync,
J
@P J@
Instant messenger,
Knowledge level,
Level,
Run level,
Switch level,
Data logger,
Registry,
Boundary scan,
Erase,
Multiscan,
Scan,
Catalog,
Character repertoire,
Accelerator,
Graphics accelerator,
Data transfer bus,
Bit plane,
Flat,
Ruler,
Space bar,
Formal parameter,
Named,
Draft,
Magnetic tape drive,
Responsible,
Schedule manager,
Participants,
Public domain,
Networked,
Share,
Cellular automata,
Automaton,
@ J
Q
J
J
J
Yg@ J
K. j.
KAJ
HA
j.
XYg i
i
XYJ i
i
h. AJ ,XQ
XQ
PAm
Q
K Q
GAJ
.
@ K Q
HAJ
J
KA
J K i
i
Q
@ Q
A
HA
X
Q
J
AJ
J , Yg
.
Yg
.
PA
A
I.
D ,Q
J
K
g J
@ HC
@ J
A , A
J.@
KAJ
A
Data driven,
HA
Assignment problem, ( m. QK.)
J
K A
Contribution,
A
Contributor,
A
Equal,
X A , A
Impossible,
I.J ,J
j
E Yj J
End-user,
KA
Yj J
Superuser,
P Yg
.
User,
Yj J
Consultant,
PA
,IJ
Impossible,
J
j
.
Q Q
J
Unknown host,
Rectangle,
J
@ J J
Forward compatible,
,Aj.B
.
@ J@
J J
.
Forward compatible,
, @J@ J.J
Aj.B
@ J.J
@
Context-free,
AJ
J
Independent,
J
Deliverable,
J
J ,QJ
Continuous,
,(k , @X)
@J
Persistent,
QJ
Document,
YJ
White paper,
K YJ
Clone,
pA J@ ,q J
Packet sniffer,
Qm '@ J
Repository,
XJ
Access level,
XA J@ J
@ J
Data link level,
HAJ
Interrupt priority level,
K
@ J
@
A KB
Distance,
Beeper,
Array,
Associative array,
Matrix,
Factory,
Maintainer,
Anti virus,
Antivirus,
Replication,
Double,
Multiplexed,
Add-in,
Value-added,
Factorial,
Compressed,
Polygon,
Built-in,
Embedded,
Multiplexed,
Host,
Localhost,
Local host,
Mail host,
Slow terminals,
Printed,
Display terminal,
Dumb Terminal,
Intelligent terminal,
Point of sale terminal,
Absolute,
Launcher,
Verbose,
Developer,
Q
J
. @QK
,J
Q
XA
HA
Q
XA
HA
P@QK , A
A
, A
A
@
J
A
H. Q
,
A
J
m J
m J
YK
QK. J
JJ
. P A
J.
Q @ Q
J @ Q
X @ Q
K @ Q
J
K.
)
( J
( )
I.J
P
g
@ J
Derivative,
J
Derived,
J
Moderator,
Q
Modal,
Q
Project,
Q
Strikethrough,
k JK
,H.
Actuator,
Application Launcher,
J
J.J@
Q
Floppy drive,
Q
@
Network operator,
J
.
Busy,
Encrypted,
Q
Decision problem,
P@Q
, A K
@
Halting problem,
K
K
,
Halting problem,
AK
@
Knapsack problem,
J . J
m '@
Post office problem,
YK
Q.@ I.J
Problem,
Suspicious,
J
K. PXA
KAJ
Local data sources,
J
m HA
Approved,
J
XA
Formatted,
, A
Exporting,
PY
Open source,
hJ PY
Source,
PY
Faulty,
,Y
Compiler,
Q
. @ XQ , IjJ
. @ i
Search term, IjJ
Term,
i
Q
Thumbnail,
Cellular automaton,
J . l. 'A ,
YJ
l. 'A
Preprocessor,
YJ
l. 'A ,
J . l. 'A
Processor,
l. 'A
Word processor,
l. 'A
Coefficient,
A
Factor of proportion,
I.AJK A
Operand,
A
Parameter,
A
A
Scaling Factor,
AJ
@
XA
Recursion,
Preview,
JK
A
Q.
Cross-over,
Opaque,
Dumb,
J
Lexicon,
j.
Y
Equipment,
H@
Baud rate,
XAJ.@ Y
. @ Y
Bit rate,
IJ
J.@ K Y
KAJ
Data rate,
HA
J.@ K Y
KAJ
Data transfer rate,
HA
Frame rate,
PAB
@ Y
Hit rate,
K . AB@ Y
Horizontal scan rate,
B@ i @ Y
YjJ@ Y
Refresh rate,
IK
JB @ Y
Sampling rate,
AJ
Signalling rate,
H@P AB
@ Y
Preprocessor,
)
Gold,
( Y)
I. Y@
Metal,
Counted,
Rate,
Y
XY
Q , Y
Aspect,
Q
Viewer,
Q
XA
Difference equation,
PA
Equal,
A ,X A
Equalizer,
X A
Background processing, J
m '@ m. 'A
m 'A
YAK
Batch processing,
HA
. .
Cellular multiprocessing,
XYJ m . 'A
K
g
A J m 'A
Concurrent processing,
.
Data processing,
HAKAJ
J.@ m. 'A
Error handling,
Am '@ m. 'A
Image processing,
P@ m . 'A
Natural language processing,
m . 'A
J
J
J.
Parallel processing,
Z@Qk.
@ , K
P@ J m . 'A
P@ J
Pipeline processing,
K
XP@K m . 'A
Sequential processing, YJ
J K , J
AJJ m. 'A
AJJ
Symmetric multiprocessing, XYJ m. 'A
Jm
m . 'A
Word processing,
HA@
X l. 'A
Batcher,
HA
Coprocessor,
YA l. 'A
CPU,
l. 'A
Front-end processor, AC J
l. 'A
Q
J. l. 'A
Macro processor,
Microprocesor,
QJ
l. 'A
Microprocessor,
QJ
l. 'A
Parallel processor,
P@ J l. 'A
B@
Post Processor,
H@Yg
l . 'A
Shader,
Standard,
PAJ
,
PAJ
Criteria,
PAJ
De facto standard, @ PAJ
, PAJ
De facto standard, PAJ
, @ PAJ
Norm,
PAJ
Standard,
PAJ
,PAJ
Mapped,
JJ
Rhombus,
With,
With copy,
j
PXA
Quit,
Enclosure,
Off,
Q
J
Modified,
Q
J
Modifier,
Soft keys,
jJ@ iJ
KA
. hA
Partial key,
K
Qk
Arrow key,
D@ hAJ
Candidate key,
l Q hAJ
hAJ
Character key,
Qm
Clover key,
K hAJ
Command key,
Q @ hAJ
Compound key,
I. Q hAJ
Concatenated key,
hAJ
Diamond key,
A hAJ
XP@ hAJ
JJ AK. Ag)
Flower key, (
hAJ
Function key,
J
Key (Lock),
hAJ
Meta key,
@ hAJ
Mnemonic key,
Q
Y K hAJ
Q
J
hAJ
Modifier key,
. B@
Multi-part key,
Z@Qk
XYJ hAJ
JB @ Y
AJ
Liquid crystal display,
J.@ KA
@Q
Q
Passive matrix display, X @
.
Parser,
m ,H. Q
Gallery,
Q
Contact (noun),
Q
Knowledge,
Q
Character set identifier, PAm Q
Generic identifier,
Q
Process identifier,
Z@Qk. B@ Q
Uniform Resource Identifier, A Q
XP
User identifier,
YjJ @ Q
Q
Group identifier,
m
.
. J , Q
Identifier,
K
@ I
Broken,
P ,H.
Raw data,
( J
A)Ag HAJ
Argument,
Datum,
,Y
Hair,
A
Mirrored,
Reverse,
Reversed,
Marked,
Info,
HA
Information,
HA
Metainformation,
@ HA
Fact,
@ ,
,
Factory,
J
Fontwork,
m '@
h ,
Meaning,
GA
.
,
Significance,
BX
Sample rate,
World-readable,
Dividend,
Destination,
Goal,
Snippet,
Stack segment,
String,
Disconnected,
Netcafe,
Modulo,
Bound,
Restricted,
Host-resident,
Resident,
Equivalent,
Positional,
Place,
Libraries,
Class library,
Library,
Run-time library,
Runtime library,
Central office,
Desk,
Post Office,
Dynamically typed,
Handout,
Condensed,
Duplicate,
Microphone,
Angle bracket,
Broken,
AJ
A ZQ
D@ l'. P ,
Y
,Y
Y
. m
Pj
Q@
,
I K QK@
AJ
Y J
YJ
J
@
A
, GA
, A
kA
. J
HAJ
@ J . J
A J
J . J
P J . J
J
P J . J
J
I.J
QQ
Y J ,IJ
.
Q
YK
.@ I.J
AJ
J
AJK
X H. J
J , H J
j
.
Qk. , J
PQ
Q
P
H. ,P
Q hAJ
hAJ
Propeller key,
@X
hAJ
Public key,
Secondary key,
GA K hAJ
hAJ
Shortcut key,
PAJkB@
hAJ
Spacebar,
@ Q@
Mail exploder,
YK
Q.@ Qj.
. @ i , IjJ
. @ XQ
Search term, IjJ
Sorted,
I.KQ ,PQ
Interpreter,
Q
Interpreted,
Joint,
Favorite,
I.j J ,
.
Side-effect,
.KAg
Q
Agenda,
,
Disconnected,
m ,
Screw,
YK
,
, Q
Object file,
Q
Conceptualisation,
Agent,
Compare,
KPA
Article,
A
Firefighting,
PAJ@ A
Socket,
.
Binding handle,
AJ.KP@ J .
Handle (noun),
J .
J ,J
Quoted,
Q Q.
Proposition,
@P ,h@ @
,h
Network segment,
J. J
J
Quoted,
.J ,
Readable,
ZQ
Read only,
ZQ
Private key,
Q@
Hidden file,
m
Initialization file,
JJ
E
Local file,
m
Locked file,
Log file,
j.@
Metafile,
@
, Q
Object file,
Q
Permanent file,
'@X
Physical file,
, Z@Qk @
Process file,
m . 'A
.
, m 'A
Process file,
Z@Qk.
@
.
Raster file,
A
. Qk
Scratch file,
Q @ Y@
Swap file,
K
QA@
Temp file,
I
Zip file,
Print server,
AJ
.
Virtual server,
QA
Property,
J
Ag , J
Q
Millimeter,
,
Physical,
m , Xk. @
J
k
JK
.
, @ YK
Flavorful,
Flavorful,
@ YK.
, JK.
Millisecond,
J
KA K
Autofill,
@ Z
Fill,
Z
Z
Full screen,
A @
J@ @ ,
,YJ
Expanded,
A
Stretched,
XYJ ,XY
Blocked,
J
Q
B@
Case-sensitive,
Qk
Am
Q
Distinct,
Header file,
I.
Hypercube,
KA
Q
Corpus,
Q
Thesaurus,
YA J
Database machine,
HAJ
Parallel random access machine, XAK J
P@ J
K@
Component,
Adapter,
J
A K
Host bus adapter,
J
K , HA
kC
Observations,
H@YQ
Remark,
kC
Navigate,
kC
Navigator,
hC
J.J@
K
C
Megabits per second,
HA
J
KA J@
P AB @ J
Frame grabber,
H@
Plugin,
j
Salt,
i
Summary,
j
,
Poster,
C@
Files,
HA
. HA
Startup files,
ZYJ.@ l. AKQK
Y@
Batch file,
HA
Cluster file,
Yk
Control file,
m'
.
Core file,
AK
K. A
KAJ
Data dictionary file,
HA
Distributed file,
P
Dot file,
K
Executable file,
YJ
J K
File,
Genetic programming file, G@P m. QK.
Cube,
J
J
Logical,
J
Q K B
Asynchronous logic,
@
J
Classical logic,
YJ
K
J
Combinatory logic,
@ K
Digital logic,
J Q@
J
First-order logic, J , I
.
KQ@
@ J
PY@
@
k
.
J
, k. PY@ @
First-order logic, J
I.
KQ@
@
J
Fuzzy logic,
G. AJ.
J
Intuitionistic logic,
E
YK.
J
Linear logic,
k
J
Logic,
Look,
Q J
@ ,
J
Organization,
Q
J
Org,
Organizer,
J
Schedule manager,
, Yg
. J
Yg
.
Sequencer,
K. AJJ@ J
Window manager,
Y @ J@ J
Q ,P J
Perspective,
k
.
J
Isolated,
XQ J , Q
P@ J Y J
Enhanced parallel port, YJ
Ephemeral port,
Y J
Parallel port,
P@ J Y J
Port,
Y J
@ Y J
Printer port,
AJ
.
Registered port,
j. Y J
Serial port,
Y J
Y J
Viewport,
Q@
Boolean,
XAJ
, J AJ
Occasion,
Q
.
Thread,
A J
Popup,
(...t '@
A , Y A K) J.J
Pop up,
J.J
Alarm,
J.J
Alarm clock,
J.J
Product,
i.JJ
Favorite,
,I.j J
Forum,
YJJ
Regular,
JJ
Selection,
JJ
Backend,
g DJ
. h JJ
Coproduct,
.KAg
.
. , PAj
J
Partial,
KQk
J
, Qj
Oblique,
KA
J
Curve,
J
Jj
J
Bell curve,
Qk. j
J
Handout,
H. J , j
Low,
j J
Lurker,
YJ
Since,
Y J
Rank,
Q
Home,
Q
PQK
. A
Demand driven,
J
Platform,
Desk,
I.J , Y J
J
Area,
J
Drawing Area,
Q@
J
High memory area,
J
A Q@ X
J
Low memory area,
j J Q@ X
J
Time Zone,
J
J P
J
Work area,
Callee,
@
Agree,
@
OK,
@
@
Fine-tune,
J
X
Correspondent,
'@
J ,'@
Matching,
Z@
Key escrow,
hAJ @
QK
Effects,
H@
Q
K AK ,QK
Effect,
Documentor,
K
.
Condensed,
J ,Qk
Connection-oriented,
ABAK. k.
Router,
k.
J k
Continuous wave,
.
Wave,
k.
Exist,
k ,Xk.
Existing,
Xk.
Modem,
X
Generic resource,
XP
Global resource,
XP
Parallel resource,
P @J XP
Resource,
XP
Scalable resource, XP , AJ
@ XP
J
Q K A
.
Q
Scalable resource, XP , J
K. A XP
AJ
@
Inherited,
HP
Distributed,
P
Distributor,
P
Hub,
P
Postmaster,
YK
Q.@ P
Switching hub,
K
YJ.K P
Specification,
Q
Y J
J ,XQ J
Isolated,
Q
Discrete,
J , J
Dataless management utility, Q
K. YK J
@
J
Ag
HAJ
Relay,
K
YK. ,A J
Debugger,
i J
Dotted,
J
J
Deflate,
Methodology,
J
j.D
Client-side,
J
@ k
.
,XAm '@ YJ ,XAm '@ J.
Server-side,
XAm '@ J
kAK
,XAm '@ J kAK
Server-side, ,XAm '@ J.
XAm '@ YJ
Dialup,
KA , KA
Deprecated,
Pj.
Contention slot,
PA J K
Q
g
AK ,
Delay,
@ I
DK@ ,
Timeout,
Trash,
HC
Task,
YJ
Network engineer,
J
.
,
Formatted,
A
Host adaptor,
J
Printable,
AJ. K. A , AJ. Z
XP@
Pipelining,
Load balancing,
K P@ ,J
jJ@ K P@
m '@
Load balancing,
K P@ ,m '@ K P@
J
jJ@
k , HA
@
Properties,
A
@
Functional specification,
J
J
Well-known port,
XA
Location,
Q @ Y@
Memory location,
@Q
Mirror site,
News Site,
PAJ.k@
Site,
Website,
I K QKB@
Generator,
Y
Author,
Locked,
Q
Byte-code interpreter,
J
KA
Command interpreter,
Q@ @
Command-line interpreter,
Q
Q@ @
Dead,
A , IJ
AK. Aj.J
Megabyte,
IK
Mega-,
Bj.J
Q
Feature,
Q
Resolution,
. AJ
Connectionless protocol,
YK
A@
K A J
Point-to-point protocol,
@
K
Protocol,
A J
Micron,
QJ
Micro-,
QJ
Micro,
QJ
Minix,
JJ
J
MSDOS,
Y..
Backbone site,
AK ,
Parametric,
Centered,
Expanded,
YJ ,
Ephemeral,
Blinking cursor,
. AK Q
K Q
Chase pointers,
AKj
.
Q
Cursor,
( P A@)
Dangling pointer,
Y Q
Error indicator,
Ak Q
Indicator,
@X ,Q
P
A@
Q
Mouse Cursor,
Null pointer,
Z
C Q
Peak indicator,
J
A @
Q
Pointer,
Q
Q
Stack pointer,
Q@
Coaxial cable,
Pm
Linked to,
@
Linker,
Code position,
QP
KQ@ A @
Hook,
Position,
Topic,
Appointment,
Y
Rendezvous,
Y
Provider,
Q
g Q
, Y
m '@ Q
Service provider,
Y
j K X Q , I K QKB
@
Y
.
Service provider, X Q , IKQKB
@ Yg Q
Ym '@
Q
, Y
j K
.
Paused,
( AJ
J) J , J
J@ I
,
Positional,
GA
Archive site,
J
P @
Foundation,
AK
J
. Z@YK
@
Call-by-value-result,
J
j.J
JK. Z@YK
Callout,
Z@YK
Call-with-current-continuation,
Z@YK
AK
J
Am '@ @
.
Detach,
Q K
Strip,
, Q K
Down,
B Q K
Aspect ratio,
J
AK. J .
Ratio,
J .
Relative,
.
Backup,
AJ
Jk@ q , J
AJ
Jk@ j
Child version,
K
JK . j
Copy (verb),
j
Facsimile,
B@ J. j
j
Hard copy,
J
P
, AJJk@ q
Backup,
, J
AJ
Jk@ j
AJ
Jk@
Copy (noun),
q
K AJJk@ q
Differential backup, A
Rip,
J
P A q
JJ
,()
Format (noun),
, )
( Q m
Activity,
A
Podcast,
( J
K) Q
Desktop publishing, I
. J @ i Q. Q
Publish,
Q
Active,
J
Q
Half-Sphere,
Halfword,
AK.
Nybble,
IK
Radius,
Q
Ciphertext,
Q
Call-by-value,
XAK
'
Publisher,
Q P@X ,QAK
Smooth,
AK
Q Y A K
Inactive window,
Plain window,
A Y A K
Y A K
Window,
Root Window,
P Ym . '@ Y A K
Minus,
A K
Address bus,
K
AJ A K
Bus,
A K
Carrier,
Ag ,A K
J.@ A K
KAJ
Data bus,
HA
Digital carrier,
P Ag ,
P A K
System bell,
A J@ A K
Nano-,
KA K
Nanocomputer,
@ I.Ag KA K
Q KA K
Nanometre,
Nanosecond,
J
KA K KA K
Sleeping,
'A
K
Discard,
Y J. K
Heartbeat,
I. J . K
Succeed,
hAm.'
'
Efficiency,
Am
.
Relief,
Ym.'
'
Star,
m
.
Concrete syntax,
XA m'
J m'
Context-free grammar,
@
AJ
'
Elite,
ZAk. , AJ
@ , J.m
Call-by-name,
BAK. Z@YK
Am 'AK Z@YK
Call-by-need,
k
. .
Call-by-reference,
k. Q AK. Z@YK
SOCKS Server,
A
HA
A
Hierarchical file system, Qm. HA
A
I/O subsystem,
Q h. @Qk@
, AgX@
Knowledge-based system, J. A
@
Q
Multiuser system,
YjJ @ XYJ A
Network operating system,
J
A
@
J
.
Numeral system,
Y A
Operating system,
J
A
Production system,
h. AJK@
A
HA
Root file system,
P Yg
. A
P A
Run-time system,
J
P A
Runtime system,
J
System,
A
Windowing system,
Y @ J@ A
Window system,
Y @ K A
Writing system,
K . AJ A
HB
B@ K
Q
Automata theory,
J
K@ Y@
J
@
Axiomatic set theory,
HAj
. @ K
Q
J
E
YJ.@
Complete theory,
K
Q
Computability theory,
I.
m' K
Q
K Q
Decision theory,
P@Q@
Domain theory,
Am. K
Q
Number Theory,
AP B@ K
Q
Q
Q
JJ@
Peer-to-peer,
Q
Analog,
Q
Peer,
Clean,
J
K , J
Yes,
K
Access,
XA K
Filesystem,
New text,
Perl Script,
Plain text,
Text,
Text only,
Domain maturity,
Aj. @ i.
Jumper,
PA ,A
Baseband,
A @ A
Broadband, @ A ,@ XXQK A
Broadband, @ XXQK A ,@ A
Domain,
A
Scope,
A
Timezone,
P A
Zone,
A
Bootstrap,
QKJ
J.@ J
YJ
A
AJ A
Bug tracking system,
Cg K
.
Bulletin board system, H@QJ@ k A
Communication system,
A@ A
Complete inference system, AJ.J @ A
A
Database management system, Q
K. YK A
@ YA
HAJ
J
A
Disk operating system,
Q@
A
Distributed system,
P
Hypertext,
KA
YK
Yg.
Q
K.
Q
J.@ YA P@X@ A
KAJ
AJK
Y@ HA
Electronic funds transfer system,
A
QB@ @B@ K
G
Embedded system,
P A
Q
J.k A
Expert system,
@ A
File system,
HA
Y
k
.
Data modelling,
k. Y
Y
Modelling,
k
.
Prototyping,
k. Y
Answer mode,
K . Ag. B
@
J@ Q@
Demo mode,
jJ
@
Insert mode,
h. @P XB
@ , AgXB
Insert mode,
AgXB
@ , h. @P XB
@
Night mode,
J
Noncluster mode,
B , k B
X J
B
Noncluster mode, B , XJ
k
, PP
Packet mode,
Qk
Page mode,
j
Pattern,
PAgX@
Power save mode,
A@
Relational model,
KC
Root mode,
P Yg
.
Single-user mode,
YJ
k@ YjJ @
Wizard mode,
YQ
Packet mode,
PP , Qk
J h X
Client-server model,
XAg
.
Color model,
@ @ h. X
Colour model,
@ @ h. X
@ h. X
Data model,
HAJ
Growth,
j ,
Day mode,
J@
PAE
Weekday,
PAE
J Q K AE
Unexpected end,
Back-end,
J
g K
AE
K AE
End of file,
Data modeling,
@
HAJ
@
HAJ
XA K
YK.
, K
A K
Garbage,
HC
Double click,
A KQ K
Q K
Click (noun),
Q K
Tap,
Click,
Q K
Click (verb),
Q K
Hold Down,
, J
J@ Q K
J
J@
Reduce,
K
Reduction,
K
Colon,
A J K
K
Access point,
PJ.@
@
K
Breakpoint,
A
J,A
K
K@
Break point,
Q
K
K ,Q
Break point,
A K@
K
J@
Checkpoint,
j
K
Control point,
jJ@
K
Dot,
@
Dpi,
J
.
K
K
Endpoint,
K
AD@
K
Hot spot,
A
K
Mount point,
K
Point,
Q K
,
K
Point of presence,
Xk. @
. J K
Bit block transfer,
IK
K
Cluster-transport,
Yk
Electronic funds transfer,
@@ K
Q@
G
@ K
File transfer,
Linear transfer,
k K
Transfer,
K
, ,
K
Flavor,
@ Y
Remote access,
JE
, KA
Hacker,
QA
Hack,
A
Dummy,
@ Q @ ,YA
A
Marginalia,
HAJ
Margin,
A
Haiti,
K
A
Dial,
J
Spelling,
ZAj.
Brute force attack,
J
A@ AK. j.
j.
Hybrid,
, Y
Goal,
Y
Marker object,
@ Y
J.@ J
Q
KAJ
Data hierarchy,
HA
Hierachy,
Q
Pyramid,
Q
Light precipitation,
m.
Left parenthesis,
PA
C
Right parenthesis,
C
Constructive solid geometry, J. YJ
J
KA
JK .
J
Domain engineering,
Aj. @ Y
J
Engineering,
Y
J
Geometry,
Y
J
m.Q.@ Y
Software engineering,
HAJ
Geometric,
YJ
ID,
K
Framework,
J
JJ
,( Q m , )
Format (noun),
()
Time format,
I @ JJ
Phone,
J
A @
J
kC@
K
AE
K
AE
@K
J
jJ K. A @K
CJ
KK
PK
K. K
KAJ
XQm. HA
K. K
KAJ
XQm. HA
m . K
K. K
KAJ
Q.g. HA
J . K
J.@ K
KAJ
HA
K
J
K
X Y
@ K
k K
K
A@
:
J
K K
J
KP
K
XP @ K
A J@ K
K
J
J. J@ K
K
K
K
JK. , K . AJ
K
I.J
J
K
Front end,
Purge,
Kernel,
Loadable kernel,
Nautilus,
Light,
Abstract data type,
Abstract datatype,
Aggregate type,
Algebraic data type,
Constructed type,
Data type,
Derived type,
Enumerated type,
File type,
Linear type,
Media type,
Mime Type,
Principal type,
Resource type,
System type,
Type,
Type bindings,
Sleep,
Microkernel,
Delegation,
Netscape,
Descender,
Dialup,
Cellphone,
Metaphone,
m , A
.
KA , KA
g KA
@ KA
m . 'A @ Yg
@
K
QQ
K
J J
Yg Yg
m' Yg
g Yg
J.@ Y
KAJ
HA
K. Yg
KAJ
HA
J
Q@ Y
m '@ Yg
JJ
Yg
Yg
A J@ Yg
Yg
X
k
.
J B@
K@P
Yg K@P
P
P
H. Ak P
P
P
P
P
P A@
XA
J
. @QK A
A
XYJ A
X A
Z
YK . ,t
J
J
HC
K
g
Ring topology,
Wap,
H. @
API,
k. @
@
k
Command line interface,
.
Q@ B@
Global interface, J
k. @ , J
Ag.
@ k. @
Global interface, J
Ag.
@ k. @ , J
k. @
@
Graphical user interface,
Yj J k
.
JP
@
GUI,
J
Q@ YjJ @ k
.
Haptic interface,
J
k. @
High speed serial interface, J
k. @
Q@
J
A
Iconic interface,
J
K K
@ k
. @
Interface,
k. @
@
J @ k
MDI,
XYJ @ H@Y
.
Service interface,
Ym '@ k. @
@
Video interface,
K
YJ
k
.
Incoming,
XP@
J@ @
,YJ , A
Expanded,
Marker,
@
Descriptor,
@
@ @
File descriptor,
Pragmatic,
,
@
,@
Fact,
Web,
H.
Hypotenuse,
QK
@ QK
Close routine,
C
QK
Routine,
Elite,
AJ
@ ,ZAk.
Emoticon,
Q
J.K k.
J
J.J@
HA
m . QK.
Q
Revoke,
I.j
,J.K
, k JK
Strikethrough,
H.
Orphan,
JK
Converge,
Y m
'
Finger,
m
'
Write-protect,
K . AJ@ Y
m
'
Referer,
YK
Integrate,
l. YK
Rotate,
k P@X ,PYK
Bounce,
YKQK
Q
QK , Q QK
Encode,
Left,
PA
Exclude,
J
Sniff,
J
,J
Sniff,
J
, J
Revoke,
J.K
, I.j
Occlude,
Y
Stroke,
Y
Replicate,
PQK
, A
Printing,
J.
Rely on,
YJK
Infect,
YK
Revert,
K
On,
K
Dictate,
Q
Screw,
,YK
K
Pumpkin,
Normalize,
P@QJ@ K
,PQK
Loop,
g
Replicate,
A
,PQK
Reachable,
J
@
J , J
@
@
Right,
l ,
Spoof,
jJK
J
K
QP
K
QP
Symbolic link,
Symlink,
Mount,
Pose,
J
Mode,
Protected mode,
m
@
Safe mode,
@
Supervisor mode,
Q
, X
,h
Sharpness,
Yg
m ' ,(...t '@
,l. @Q.@ KA
Validate,
@ HA
J.@) m
KAJ
gY
J
Function (Programming),
QY @ J
Memo function,
Relevance,
K
Q
J
J
Functional,
@ , K
A
Safety,
Preventive,
KA
Response time,
K . Aj.JB@ I
Stop,
User agent,
Yj J @ J
Dial-up login,
J h.
Login,
h.
Q@ X h
Memory access,
.
Single sign-on,
Yg h.
Blink,
J
Virtual,
Wiki,
K
JK
Windows,
PY
AND,
Link rot,
Navigating,
QjJ.
K
Lurking,
Lurk,
Slide,
Copy,
Loop,
Double-click,
Right-click,
Phone,
Mumble,
Point,
Sign,
Day,
Unix,
Unicode,
YJK
YJK
m
' Q , Q K
qK
,P@QJK Y JK
PQK
, g
.
Ag. X Q Q JK
J
@ Q JK
KA , JE
K ,Q K
PA@ , QP
,K
K K
XJ
KK
MS,
: K
MTU,
5
Microcentury,
AJ.K
QK
J
KA K 6.52
)
(1)
. Q j
(3) ; m AJ (2) ; J
KK
t AJK
QK (1)
Heading,
@ J (2)
CC,
Noname,
K X
@ G Q
kP
ZA
(SGML DocBook) PY @ JJ
. @ K
YJ@ YK. @YjJB@ K
P
@ HA
QAK. (t '@ ... RTF @ P ostScript @ PDF @ HTML @ (SGML j
. JJ
@ @
: J
K B@
Q@
A C
@ PY @ q@
k
Q A JkB@ K
@ Im'
ZC@ Y
.
..
JJ
K P
(SGML K
PY @ Q@
J@ XA @ YJ Q
K YK
. AKX @ PY @ Q@
. DocBook)
Q@ ZCgZ , Y Q@ ZA , C @ PY @ q@ k Q YJ
K K
@ I.m.'
XA
@ YJ j
, AKX
@ PY @
. @
A Q
K K
Qk @ X@
@ @/ J
KJ@
@ Q
Z
) j
@ JJ
@ K P
Qk @ K
@ m
@ PostScript @ PDF @ m
, DTD
.
J@
.(Qk @ JJ
@ @ RTF
J KJ@ YJ
K @ Y
Q
Q@
ZCg @ A QK
@ H. Q
K
K
Q @
.
K K
:A
@ PAjJ@ iJJ @ J AJ HA
@ AD A. , JJ
@
.
@ m
' Q HA
KA
KA
Z JAJ
.
Q
B . Y
J
Z @ QK
@ H. Q K
K
Q J
m'
@ QAJ.
@ QAJ. ,
K
@
@ Ag
@ X
Q
YK HAY
g
@ ZAJ J@ A A.) JK
@ G A
K. PAk ; K
HAKAJ
.
.
C
Z H ' @
K @ ;@YjJ@ k @ hAK P @
@
K
Q
J@
I
KA
A
(
gY
@ PB
Z@ AD J
. @
@ K
Y K
Z I KA
,( X Q
@ AZ@ J J) J
KY
J
J@ ' k
@Yj J@
@ Y
, J
KJ@ @ Y
QK
Yj
ZH. ZQ @
.Q @
djihed@gmail.com
XAk : m QK
,
J
. . .