user verification function

user verification function
функция подтверждения полномочий пользователя

English-Russian dictionary oil project. 2013.

Игры ⚽ Нужна курсовая?

Смотреть что такое "user verification function" в других словарях:

  • User interface — The user interface, in the industrial design field of human–machine interaction, is the space where interaction between humans and machines occurs. The goal of interaction between a human and a machine at the user interface is effective operation …   Wikipedia

  • Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… …   Wikipedia

  • Device driver synthesis and verification — The device driver is a program which allows the software or higher level computer programs to interact with a hardware device. These software components act as a link between the devices and the operating systems, communicating with each of these …   Wikipedia

  • Software verification — is a broad and complex discipline of software engineering whose goal is to assure that software fully satisfies all the expected requirements.There are two fundamental approaches to verification: * Dynamic verification , also known as Test or… …   Wikipedia

  • Environmental Technology Verification Program — The Environmental Technology Verification (ETV) Program of the Environmental Protection Agency (EPA) in the United States develops testing protocols and verifies the performance of innovative environmental technologies that can address problems… …   Wikipedia

  • Memory bound function — Memory bound refers to a situation in which the time to complete a given computational problem is decided primarily by the amount of available memory to hold data. In other words, the limiting factor of solving a given problem is the memory… …   Wikipedia

  • Digital rights management — (DRM) is a term for access control technologies that are used by hardware manufacturers, publishers, copyright holders and individuals to limit the use of digital content and devices. The term is used to describe any technology that inhibits uses …   Wikipedia

  • Kernel (computer science) — In computer science, the kernel is the central component of most computer operating systems (OS). Its responsibilities include managing the system s resources (the communication between hardware and software components). As a basic component of… …   Wikipedia

  • Product key — A Product key (also referred to as a CD key ) is a specific software based key for a certain program or a computer game. It is used to identify that the copy of the program/game is original. Activation is sometimes done offline simply by entering …   Wikipedia

  • MSSQL — Microsoft SQL Server SQL Server Développeur Microsoft Dernière …   Wikipédia en Français

  • Microsoft SQL Server — SQL Server Développeur Microsoft Dernière version 2008 ( …   Wikipédia en Français


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»