Sunteți pe pagina 1din 76



GA @
 J@ A@


Q

'


m. @
G. Q

Arabic English
Technical Computing Dictionary
Qm '@ K PA @ IK QK K Q

Free Software Arabisation Team


http://wiki.arabeyes.org/Technical_Dictionary
Version: 3.0.27-08-2010
August 27, 2010

This is a compilation of the Technical Computing Dictionary that is under development at Arabeyes, the Arabic UNIX project. The technical dictionary aims to to translate
and standardise technical terms that are used in software. It is an effort to unify the terms
used across all Open Source projects and to present the user with consistant and understandable interfaces. This work is licensed under the FreeBSD Documentation License,
the text of which is available at the back of this document. Contributors are welcome,
please consult the URL above or contact doc@arabeyes.org.


 @ Y QK AK Q Q Q QK  K Y@

 

.
.



J@
G. Am '@ A j Y
.KJ
 YE
 J@

 J @ J J  J@ HAj

AK. D

@ YJ
kK  g. QK @ A@

.  J
 @
 H Ag k
 @ ' Y J g Q @ K H PA J@ XA J ,H Am '@ l @QK  g QK

. .
.
.
. . .


 K X @ G Q
 kP A@

 kP . J K QAK J @ Yj J j
 

ZA
.

. .



ZAg Q@ , A @ K IkQK .A@
 K AE Q
J @
AB@ @ C @ @ J@
@ H. A Y@
.

. .

. doc@arabeyes.org

 AJ ,( @X)
 A@
m . QK.) K
.
(@ X
 , J A@
Dial-up link,
J
J



Missed call,
IKA A@
Multiplexing,
XYJ A@
License agreement,
J
k Q@ J
A K@
Agreement,
A K@
Calling convention,
Z@YK A K@
Hot Key,
hAJ @ A K@
Shift key,
hAJ @ A K@
Prevent,
I.
Jm .' ,ZA K@
Autocompletion,

KA  K A@
Finalize,
AJJk@ , A@ ,A @
Finish,
ZAE@ , A@ ,A @
. , HAJ
 . K@
Proof,
AQK
P A@
QK @
Mouse trails,
Adaptive answering,
J
J
K K . Ag. @
Response,
K . Ag. @
 P@ , K A@
@
 JJk. @
Deforestation,
K . A@
. HA




Pull,
I.m , Qk. , H. @ YJk. @
Audiographic teleconferencing,
AJk. @
J
m '
YK.



Video conference,

KQ AJk. @
 Qk. @
Fallback procedure,
k. @Q@ H@Z@
Action,
Z@Qk. @


Z@Qk. @ , A Z@Qk. @
Defunct process,
IJ

Z@Qk. @
Defunct process,
A Z@Qk. @ , IJ
Orphan process,

JK
Z@Qk. @
Parallel processing,
m . 'A , P@ J Z@Qk. @
K
P@ J
Procedure,
Z@Qk. @

Runnable process,

J
  Z@Qk. @
General,
A ,
Ag. @
Continuation,

.@
P@ QK. @ , KAK




Initial,

K@YK. ,
K@YJK. @

Alphanumeric,

XY
Ym.'. @

Numeric,

XY
Ym.'. @
 @YK @

Packet switching, Qm '@ @YK. @ , PQ@
.


@YK. @ , Qm '@ @YK. @
Packet switching, PQ@

Never,
  , @YK. @
E B , YK @
Endless,

KA

.


Highlighting,
KAK. @ ,P@ QK. @
Highlight,
P@ QK. @

Pin,
 , QK. @
.@
Epsilon,


Revocation,
I.m ,A. @
,XAK. @
Dismiss,
Q
@
, CK
Declaration,
J
KC
.
Swallow,
K. @

Parent,

K. @

White,
J
K. @
 K@
Accessibility,
kA


Direction,
Am.' @
Orientation,
J
k. K , Am.' @
Renew,
YK
Ym.' @
Discriminated union,
  J XAm' @
Disjoint union,
XAm' @ , @ m XAm' @
J
Disjoint union,
m XAm' @ , J XAm' @
@
 ,A@
Span,
QK
.


Connective,
. @P ,
A@
Connection,
A@
Connect,
A@
Contact (verb),
A@
Highlighting,

 PAJJk@
PAJ.Jk@ ,
.
A
PAJ.Jk@
Functional testing,





Heuristics testing,
J
.@ PAJ.Jk@
. PAJ.Jk@
Hybrid testing,
j
Manual testing,

YK
PAJ.Jk@
Yg@ PAJJk@
Test Module,
.
Test,
PAJ.Jk@
Finalize,
A @ , A @ ,AJJk@


Picker Settings,
H@X@YB
@ Qg@
Beta reduction,
AJ
K. @Q g@
Jk@
Type mismatch,
J@
C
  

Probability,
K ,AJk@
Choice,
PAJ
Jk@
Choose,
PAJ
Jk@

Domain selection,
Aj. @ PAJ
Jk @
Multiselection,
XYJ PAJ
Jk@
Picking,
ZA JK@ ,PAJ
Jk@
Select,
PAJ
Jk@

Serve,
Yg @

Ping-pong,
XP Y g @
A  , Q h @Qk@
I/O subsystem,
AgX@

.
Input/output,
AgX@ ,h. @Qk@

Other,
Qk @

Green,
Q k @

Cache miss,
AJ.m ZAk@

ZAk @
Minor faults,
Q

Hide,
ZA k@
 g @

C
Computer ethics,
H. Ag HAJ
ZCg@
Disclaimer,
J


Disassemble,
,g@

 g B@ ,H @X@
Ethics,
AJ. @ , C
. 



 AJ@ H. @X @
Netiquette,
J.@

Exhaustive testing,

.@
Ak


Half-duplex,
Am.' B@
XAg @

XAg @
Monochrome,
@


Cross-reference,
Ag@

Referral,
Ag@



Convergence,
XAk@
Congestion,
A  Jk@

Probabilistic,
J
AJk @

 . AJ
Jk@
Operational requirements, , J
HAg
 . J
J
HAJ
Requirement,
I.J ,h. AJ
Jk@
 ,AJJk@ q ,AJJk@
Backup,
j

J
AJJk@



Spare,

AJ
Jk @
Standby,

AJ
Jk@

K@Yg@
Cartesian coordinates,
J
KPAK
X HAJ
@ ,P@ Qk@
Scoring,
PQk
@
Scoring,
P@ Qk@ ,PQk
Sense,
j.J ,Ak@


KAk@
Statistics,
HAJ


Statistical,
KAk @



Enumeration,
X@YK ,ZAk@
 ,Cg@
Replacement,
@YJ.@

g
Red,
Q @

News,
PAJ.k @
 PAJJk@
Acceptance testing,
J.@
 .
Automated testing,

@ PAJ.Jk@
Beta testing,
AJ
K. PAJ.Jk@
Branch coverage testing,
J
K PAJ.Jk@
Q J@
Confidence test,
 K PAJ.Jk@
Exhaustive testing,
PAJ.Jk@ ,A PAJ.Jk@


Abort,

Send,

AP@
Simultaneous shipment,

P AP@
Anchoring,
ZAP@
Dock,
ZAP@
 ,() P @
Post,
AP
Submit,
Q@ ,P@

 P@
Guideline,
H@XA

Archiving,
 P @

Archive,
J
P @

Constraint satisfaction,
XJ
 ZAP@



Attach,
AP@

Digits,
AP@

 AP @
Random numbers,
X@Y @ , J
K@

J
K@
 @
Widow,
P
 P@
Indentation,
k@



Shift,
k@P@


 P@
@ @
Anti-aliasing,






@ @P@
Antialiasing,
 P@
Comment out,
J
K @









Deforestation,
K. A@ HAJJk. @ , K. A@ @P@
 P@
 @
Defragment,
J
 @










Deinstallation,
I
J.J@ , I
J.J@ @P@
 P@
Remove,
@


Hassle,
h AP@
. 

Deadlock,
P A , P @
E-zine,
P@

Weeks,
J
K. A @
YA , A @
Base,
A
 @
Software Foundation,
PA
. @
Microfortnight,
QJ
AJ

Week,
J. @

Workweek,
J. @

Administration,
Change management,
Management,
Manage,

Q
J
J@

P@X@

P@X@

P@X@

P@X@

P@X@
P@X@

P@X@

P@X@
P@X@

Q@ X
 @
Network management,
J
.

Power management,
A@

Project management,
K
PA
System administration,
A J@
Administrative,

P@X@
@
Deprecate,
@X
Q 
QK @X @
Encoder,
@X @
Tool,

Deprecation,
K@ X@

Input/output,
h. @Qk@ ,AgX@

Insert,
h. @P X@

Declare,
C@ ,ZBX@
Dissolve,
K . @ X@
XYJ @
 X@
Multicast,




Go,
@ ,I. X@

X @
File permissions,

Qg ,AK P@
Perplexity,
.



Quarantine,
J
J
K. P @
Dependence,
J
J.K ,AJ.KP@
Key binding,
hAJ @ AJ.KP@
Keybind,
hAJ @ AJ.KP@
 Qk P , A
Jitter,
k
. .  KP@
Height,
A KP@
Increase,
PAJ@ ,YA ,YK
@Q K ,A KP@
 K ,I KP@
Expect,

.

Kernel panic,
Q X ,AJ
KP@
Deferral,
ZAg. P@

Magenta,
G@ k. P @
Memory management,


A JJ
@
Import,
X@Q
J@
Cylinder,
K@ @


J
X , P @
Legend,
HAj
@
Bottom,


Projection,
A@

Ascii,

@
 @
Continuation passing style, QK
Q H
.

 AJ
K
.

@ H. @
Indent style,
k@PB

Style,
H. @

Names,
ZA @
 PA @
Absolute pathname,

. @
Backronym,
AJ
Qk

Basename,

A @ @
J @
Canonical name,
J
PA
. '@ @
Device name,
PAm
Domain name,
Aj. @ @
@
File name,

@
Filename,

Full pathname,
A PA @

Host name,
J
@ @
@
Hostname,
J


 J J
Logical-hostname,

@
Login name,
h. @ @
Name,
@
Nick name,
PAJ @
Pathname,
PA @ @
@
Private hostname,
,
k J

m J
@
 @
Private hostname, @ , m J

k J

Authentication,


K AJ@

Replacement,
Cg@ ,@YJ.@

Replace,
YJ.@

 KA J J@
Exceptions,
HA




Exception,
ZAJJ@


Mutual exclusion,
XAJ.J ZAJ J@
J@
Memorandum,
Qm ,PAj




Maturity,
AjJ@

Inquire,
ZA ,Q.j J@
Extract,
h. Qj J@
ZAYJ@
Function call,
J



Invoke,
ZAYJ@
Z@Qk. @ ZAYJ@
Remote procedure call,
YK .
Evolution strategy,
K
P J
m.' @Q@
Loopback,
Ag. Q@
Recover,
Ag. Q@
Redemption,
X@XQ@
Explore,
CJ@
XAJ@
Recovery,
Restore,
XAJ@
Q
J
J X@YJ@
Changeover,
Query,
CJ@
Usage,
AJ@

J.@ C J @
 KAJ
Data mining,
HA


Inspection,
Y  K ,ZA J @

C J@
Device-independent, Q
j.J@

Form,
 , PAJ@


Continuation, ,(@ X m. QK.) K. AJ ,P@QJ@
 A@
( @X)
Persistence,
P@QJ@
Clone,
q J ,pA J@
Duplicate...,
...pA J@
Resume,

Version,

P@Y@
PY @
Versioning,
@
Yellow,
Q
Bug fix,
g hC@
Fix,
hC@

Original,
@




@ ,
@X
@
,
AJ
@
Ethics, Cg B@ , H

.
.



Add,
A@
Additional,

A @
Auxiliary,

A @
Extra,

A @
More,
A @
Illumination,
QK
J K , KA @
Child window,

Q PA@

YA PA@
Data frame,
HAJ
Frames per second,
J
KA J@
PA@
Frame,
PA@

Internal frame,

g@X PA@

PA@
Page frame,
j@



Palette window,
@ B@ k PA@
 Y A J@ PA@
Window frame,


 . , kQ
Dissertation,
IjJ
@

Firing,
C@


Show,
PA@
Unhide,
PA@
Reboot,
C@ XA@
Reconnect,
A@ XA@
Redirection,
J
k. K XA@
Redirect,
J
k. K XA@
XA@
Redo,




Refactoring,
J
J@ XA@
Regenerate,
YJ
K XA@

J.J@ XA@
Reinstallation,
I

P Ym . '@ Yj J @ @
 @
Sitename,

Textual name,
@ @
User name,
Yj J @
Username,
Yj J @ @

Assignment,
XAJ@



Q
Creeping featurism,
H@ 
@ AD@
 ,D @
Quota,
k

Exponential,

 @
  @
Frequently asked question, K. k. @ J

Exponent,
@

PA@
Carrier signal,
Ag



PA@
Signal,
, PA@
Sign,
QP

Color saturation,
@ @ AJ.@
Submission,
@Q@
Submit,
P@ ,Q@
Notice,
PA@
Notification,
PA@
Certify,
XAD@

AJ.m K. A@
Cache hit,

Preformat,
K
YJ
 JJ
E , K
YJ
 A@


Versions,
H@P @Y@



Demo version,

jJ
J@ Q@ P@Y@
 P@Y@
Major release,
A


Release,
P@Y@
Beta version,
AJ
K. P@Y@
Bug fix release,
i P@Y@
Immediate version,
P@Y@ ,g. A P@Y@

P
Immediate version,
P@Y@ ,
P P@Y@
g. A
Root user name,

Closure,
Halt,
Locking,
Avatar,
Dummy,
Best effort,
Horizontally,
Horizontal,
Handshake,
Handshaking,

 @
C





AK
@ , C@
 @
A @ , C



PAJ @

J
X , YA ,
@ Q @
 g)
Yk @
(... Y
. 
AJ
 @

 @
 @
AB @ A





YJ
AK , A@ A@
A@

)
Enterprise,

Quotation,
Quote,
Proposition,
Suggestion,
Suggest,
Conjunction,
Restriction,
Restrict,
Older than,
Eject,
Approval,
Approve,
Play,
Max,
Solid lines,
Locking,
Booting,
Boot,

YK
Yg. Q ( AJ.@ )

AJ.J@
AJ.J@
h Q ,h@Q@
h@Q@
h@Q@
@ Q@
PAJ@
PAJ@
Y @


Y  @
P@Q@
P@Q@
 ,ZQ@

 @

XY  @
P@
 @ ,A @
C



C@
C@

J
m' XA@
Reorganize,

J K XA@
 @
X@Y@ XA@
Repaginate,
j
X@Y@ XA@
 @
Repagination,
j
Repeat,
YK
XQK ,P@QK , XA@
Resize,

j.m' XA@
Restart,
J
  XA@
 XA@
Restructuring,
J




Reuse,
AJB @ P@QK ,AJB @ XA@
Dependency,
K
XAJ@
Credential,
XAJ@
Classic,

YJ
 K ,
XAJ
J@

J@
Sampling,
AJ


Settings,
H@X@Y@

 X@Y @
Random numbers,
AP @ , J
K@

J
K@
Setup (Configuration),
X@Y@


Display report,
QK
QJ@ Q@
@
Play,
ZQ@ ,  , Q
@

Q. @ ,
Greater,

@
Reverse video,
K
YJ
@

Announcement,
C@


Announce,
C@

Declare,
ZBX@ , C@




Poster,
, C@
  @
Highest,
@ , J



Highest,
J
@ , @

Meta,
@

@
Elite,
J . m ' ,ZAk. , AJ

Flood,
Q @

Sheets,
J
@
 , ZA @
Snooze,



Close,
C@
Reload,


J B@
Standard deviation,

PAJ
@ @ Qm' B@

@
Forward compatibility, , J.J @ Aj.B




J.J @ K. A J@
 P
  B@
@
Distributed systems,


 . @
Breadth-first search,
B @ QAK
IjJ
.

 . @
Depth-first search,
B @ AK
. IjJ
Portuguese,
J
A KQ.@
 J Qm '@ HAJ

m.Q.@
Floss,
- PY @ k
hQ

PJ
K  @ Q.K P X : B PAJk@
. @
Polish,
K
YJJ
K
X AJ@
Functionality,
J
J
@

Xm '@

Quality control,
Y
AJ@
.
Next,

AJ@
E-commerce,
J
K QB@ PAj.J@
Electronic commerce,
J
K QB@ PAj.J@

Cybernetics,

B@ jJ@
Modulation,

K Q@

Registration,
J
j.@

Key-encrypting,
iJ
KA AK. Q
 @
Forward compatibility,
, J. J @ K . AJ@

 
@
J

. J @ Aj.B


Normalisation,
J
J.J@
J@
Speech recognition,
C@ Q
Public-key encryption,
hAJ AK. J
J@

@

Word wrap,
HA@
A J@
Capture,
A J@
Collect,
A J@
 A J@
Screen capture,
A @
Distort,
  ,Z@J@

Mantissa,

Q@ A B@ ,
Q@ ZQm . '@
Southbridge,

G. Jm . '@ Qm. '@


Optimal,

Q ,
@
 @
Less than,


Less,
 @

Lower,
 @
Q
. @
Greater or equal,
A @
Q . @
Greater than,

@ ,
Q. @

Greater,


Write,
I.J @

Acquire,
H. A@

Detection,
A  @

Error detection and correction, A @

ZAk B@ iJ
j

Presence detect,
Yg. @J@ A  @






Increase,
YA ,YK
@Q K ,AKP@ ,PAJ@

AK. A@
Exabyte,
IK
Extranet,
I K@ Q@
Finalize,
A @ ,A@
Finish,
A @ ,A@

Lowest,
GX B@

Minimum,
GX B@

Mantissa,

Q@ ZQm . '@ ,


Q@ A B@
 
Fault tolerance,
Aj K. Aj.JB@


Current working,
A B@ , K
PAm. '@ A  B@
K
PAm. '@

PAB @
Key frame, A B@ PAB
@
,
J
KQ@


Key frame, J
KQ@ PAB
PAB @
@ ,
A B@


Parent window,
B@ PAB @

Primary window,

A B@ PAB @

 K Q @ X@Y B@
Square numbers,

.

Triangular numbers,
JJ @ X@Y B@


Current working,
A  B@ , K
PAm. '@ A B@
K
PAm. '@

Maximum,
 B@
Region,

K
YK
@
Sweden,
YK
@
 @
Network, the,
J
.
 @
Company,
Q
 J , Q
 @
Organization,


North,
A@

Source code,
J
@ QJ
@

Paste,
A@




Glyph,
K
QQ@ P@
@
Demand,
I. @ , PQ
@

Warranty,
A
 @ J @
Physical layer,

.


Threshold,
: J.J@

At sign,
@ C@

Physical address,
@ @ J@
@ J@

Virtual address,

QA@

Cancel,
ZA@


Echo cancellation,
Y@ ZA@




Q  J@ ZA@
Pending signals,
? J
J.J @ HCK




Unlock,
@ ZA@
 ZA@

Unsubscribe,
J
j.@





Floating-point,
A@ A@

Alpha,
A @
j@

Power-on self-test,
YJ
G@ Y@
 @
CB





Q
Q
Metric space,

 @ Aj. @ ,
 @ ZA@


J.J
J
@
Philippines,

Aleph,
@

Greatest common divisor,
Q @ A@

B@

 , PY@

Force,
 @

Power,
 , PY@
Swedish,

 '@
J
Am '@ m
.

Append,
Am '@
 '@
Induction,
Im

B@
GX B@ Ym '@
Infimum,

 J @ m '@
Fields involved,
P

 

@
Fall back,
Zj
. ,k. @Q@ Ag
m '@
 m '@
@ ,k @Q@ Ag
Fallback,
Zj
.
.

Parallel computing,
K
P@ J @ J . m '@

(J
 @)
Quantum computing,
J
@ J . m '@

Lavender,
@ Q m '@
Escape,
m '@
,(...t '@
Validate,
l. @Q.@ KA



FIFO,
B @ h. PAg , B @ g@Y@


First in first out,
B @ h. PAg , B @ g@Y@


First-in, first-out,
B @ h. Qm 
' B @ g@Y@

 
LIFO,
B @ h. PAg , @Qk @ g@Y@

 
Last-in first-out,
B @ h. PAg , @Qk @ g@Y@
Current directory,

Am '@ J
Y@
Root directory,
P Ym . '@ J
Y@
Cron,
K
PY@
 

Physical memory, , AJ
J
k Xk. @ Q@ Y@

 @ Q@ Y@

 

Physical memory, Q@ Y@ , @ Q@ Y@
 
AJ
J
k Xk. @

Magic number,

Qj@ Q@

First customer,
B@ K
. Q@
Scrolling,
 Q@
Previous,
K . A@
Brightness,
@



Sanskrit,
J
K
Q@
 J @ @
Jaz Drive,
k


XDMCP socket,
J
j @ I@
Current session,

@P@ @ , JJ Y@


@P@ @

 @


Earliest deadline first, QK. B@ B@ Y @

B @
Timer,
I  @
 @
@ , I KQ @
Expected location,
A
.
I. KQ @
 @
Literature,
HA
Midi,
YJ
@
Custom window,
J
kCB @  Y A J@
 A J@
USB,
(@) A@
@
 J@
Result,
jJ

Copy left,
J
j. q@
Nickle,
J@

Kernal,
I.@ , @J@

Hindi,
K
YJ@
 J @ K @
Openid,
k



Abstract machine,
XQm.  @
    
 
Digital camera, J
P Q , J
P QK
 @

Instrument,
 @

Machine,
 @

Pocket calculator,
I.J
j. J . Ag  @

K
 @
Von Neumann machine,
AJ
WAP,
H @@
.

Primary Colors,
J
@ @ @


Secondary Colors,
K
KA K @ @

Description,
@
@ , K B@
Explicit state,
:  Aj

@



Optical fiber,
K
AJ





Optical fibre,
K
AJ
@

Automatically,
AJ
@

Mechanism,
J
@

Sandbox,
@ YK
Ym' J
@
Implicit parallelism,


 P @Q@
H@
 , @

PY@
Force,
  Q
Digital electronics,
J
P HAJ

K  @
Q@
Electronic,

G
Chrominance,
J
KAQ@
Infinity,

AJ KC@
@J@ ,I@
Kernal,
 .



Q
Fall back,
k. @ @ Ag
m '@ , Zj.@

 m '@ , Zj
@
Fallback,
k. @Q@ Ag
.


Nick,
I.@

Motherboard,
B@ k@
Diamond,
A @
Computer literacy,
H. Am 'AK. A @
, Q @ Aj @
Metric space,

Q @ ZA @

.
Parent directory,
B@ Yj. @
j @
Subtotal,

Q@
.




Explicit state,
K
B@ ,: Aj @

Stock Ticker,
:
J . J @
Qj @
Bibliography,
k. @Q @

Real user,

@@ Yj J @
Receiver,
J. J @
PQ
@ ,I @
Demand,
.

Equation,
XA @
 @ ,I KQ @ A
@
Expected location,

.
I. KQ @
J @
Intellectual property,
K
Q@


J @
Symbolic logic,

QQ@

Look and feel,
Ak B@ Q J @
  J@

Exclusive OR,
:
 
Shortest job first,
B @ QB@ @

@ @P@ @
Implicit parallelism, @P@ @ , 


JJ
Y@
Resolutions,

PA JK@
Enlargement,

j  ,pA JK@
Picking,
PAJ
Jk@ ,ZA JK@
ZA JK@
SYLK file,






Target file,
ZAJK@


 DK@
Timeout,
, @ I
Skew,
@ Qm' @
Alert,
J
J. K ,P@ Y K@
Warning,
P@ Y K@
 @ q@
Copy and paste,




Create,
ZA@
Creation,
ZA @
m ZA @
Tar archive,



Meltdown,
PAD@



Ethics, @ , Cg B@ , H
. @X @ ,AJ.@
Additive,

A @
Join,
A @
YK Yg j
 
Pagebreak,

. C@
 @
Go,
I. X@ ,


Embedding,
Q ,PA@

Q  @
Qj  JK
Eigenvectort,
 K@
Refresh,
A
Divergent,

YAJ.K ,
k. @Q K@
Divergence,
YAJ.K ,h. @Q K@
Fork,
   ,h. @Q K@
Divergence,
h. @Q K@ , YAJ.K , @ Q K@
Split,
A K@
Expire,
J
kC@   K@
. (J.)
 A K@
Abortive release,
m

Break (program),
A K@

Priority inversion,
J
B@ H. C K@
Waiting,

J
J
@

Automatic,

@

Auto,

@

Forward,
A B@ @


Foreground,
Q J @ J
A @ , k@
J
A @



Foreground,
k@
J
A @ ,Q J @ J
A @
@
Security,
A
Q
J. @
Amper,
@ X@YJ@
File extension,



Extension,
X@YJ@

Filename extension,
@ X@YJ@

J@
Priviledge,
PAJ

J@
Privilege,
PAJ

Optimise,
 J @

Optimization,
 J @

Optimize,
 J @

Command,
Q @

Directive,

D
k. K Q @
ZA
@
File signature,


Signature,
ZA@


@
Computer security,
QKJ
J.@
 ,
@
Safety,
K
A
@
Safe,

@
Secure,


Miles,
AJ
@

Mother,
 @
A A@ K JK @
Named pipe,
. .



Cathode ray tube,

XKA H@Qk H. J.K @



Pipe,
H. J.K @
Intranet,
I K@ QK@
Internet,
I K QK@
Back-propagation,

g PA K@
Propagation,
PA K@
Journal,

, J JAK
J
g@X

.
,AK

Inside,
g@X

 .
Mailer,
YK
QK. IAK.
Remaining,
 AK.
Percent,
J AK.

 , AK
Parcel,
Q
.


Heat sink,
P@Qk AK.

Constructor,

GAK
.




Loose bytes,
HAJK
AK.

AK.
. , IK
Byte,
Qk
  X Q
 KAK

Value added retailer,
J

.
A


Vendor,
KAK
.








Bit,
P X , J
KAJK , JK .
IK
.
Check bit,
j@
 . , J
k. Q@ IK
.
Parity bit,
h. @Q @ IK








Q
Parity bit,
J
k. Q@ IK . , h. @ @ IK .
.
Broadcast,
IK
 '.
Beam search,
J
AX Im
 '.
Binary search,

KA J K Im
 '.
Find,
( ) PJ , Im
 '.
Lookup,
Im
 '.
Search,
Im
P
 '.
Im
Weighted search,


Intuition,
@YK
.


Scratch,
.(Q) Z
B , K
@YK.
Start,
K
@YK.
JK @ ,K@YK

Initial,

K@Y
.
.
.
Listless,
 A YK
PAk YK
.
Lossless,
.
No numbering,
X@YK YK

None,
Z
 B , Yg @ B , YK
.
Alternative,
K
YK.
Internal,

XAJ
 K@
,
J


JK AK
JJ


.
A@ ,A @ ,ZAE@
.ZAE@
PAJ
E@


G @

@Y@

AAK. C @
i.J
@

j.J
@

@ K K
@

K
@


I.
KQ@
@ , k
PY@
 @
.
 PY@  @ ,IKQ@ @
k
.

 .

XAJ
,
J
KP ,
@

@

@
@YK
@

@
@YJ
XAK
@
AK
@
 @ , A K @
C








J
@ AK
@
Q
 K K
@

HA

K K
@
 Y A J@ K K @

K
@

AJ.kQ ,A@ AE
@

Functional dependency,

Finish,
Terminate,
Crash,
Real-time,
Objects,
Hello World,
Ellipse,
Ellipsoid,
Bus priority,
Priority,
First-order,
First-order,
Leading,
Primary,
Or,
Commit,
Iceland,
Dispatch,
Rhythm,
Halt,
Shut down,
Mini icons,
Icon,
Window icon,
September,
Hello, world,

Portal,
Section,
Beamer,

H.

K . @K. ,H. AK.


 ,(H. AJ) H. AK.
 .
HAK

Shareware,
Malware,
Software,
Antivirus software,
Backup software,
Charityware,
Computer program,
Functional program,
Metaprogram,
Program,
Schedueler,
Spyware,
Startup Program,
System software,
Proof,
Span,
E-Mail,
E-mail,
Electronic mail,
Email,
Mail to,
Mail,
Phone mail,
Voice mail,
Flash,
Applet,
Naive,
Buzz,
Numerator,
Simple,
Visual,
Computer vision,
Babbleprint,


m. QK.
J
J.
 HAJ
J
J.k J
m. QK.
J
m. QK.
XA
l AKQK

 Q

HA
. .
.
AJ
Jk@ l. AKQK
.

Q
g l. AKQK
.
H. Ag l. AKQK
l AKQK
.

.

@ l. AKQK
.
.
l . AKQK

.
Ym. , Yg
. l. AKQK
.
m.' l. AKQK
.
J
  ZYK. l. AKQK
.
A J@ l. AKQK
.
 . K@ , AQK
HAJ

A@ , QK
.


(
G Q@ ) YK
QK.
Q@ YK QK

.
G Q@ YK QK


Q

G @ YK
QK.
@ YK
QK.
YK
QK.

KA YK
QK.

G YK
QK.
K
QK.
i.
QK.

h. XA ,Z
QK.
QK . QK .
   .
D ,J
.

Q.

G. Ag Q.
 J 


.

A J ,K
YK.
Axiom,
J
E
YK.
Quickstart,
K
Q (J
 ) ZYK.
Starting,
ZYK.
 ZYK
Startup,
J
 @
.


Stub,
P YK.
Dirty,
t ,Z
YK .
Legacy software,
J
K@QK l. @QK.
Programs,
l. @QK.
Braille,
K
@QK.
Portugal,
A KQK.
Orange,

A KQK.
Aspect-oriented programming,
m . QK.

QA AK. k
.


Configuration programming, J
  m. QK.

Constraint functional programming, m. QK.

K
YJ
 J
J

  
Evolutionary programming, K
P m. QK.
m . QK.
Functional programming,
J
J

 J k m QK
Generic programming,


. . .

Linear programming,
J
k m . QK.
 J m QK
Logic programming,
J

. .

Microprogramming,
QJ
m. QK.
XYJ m QK
Multiprogramming,
. .





Object-oriented programming, J
KA m. QK.
Jk
. m . QK.

Paranoid programming,
H. AJ
KPB @
Programming,
m . QK.
Reverse engineering,
J
m . QK.
 B@
m QK
Systems programming,

. .


Free software,
Qk HAJ
m. QK.

m. QK.
Freeware,
J
KAm . HAJ

m. QK.
Hyperware,
 KA HAJ
Relay,

J
Jm' J
K .
Structure,
J
K .
Gateway,
K . @K.
Gate,
K . @K.
 J K @K
Logic gate,
J

. .

Portal,
H. AK. , K. @K.

Proxy gateway,
J
K . @K.
HK
 .
Knowbot,
Q
Baud,
XK.

Focus,
P K .
 

Keyboard focus, Q
QK , iJ
KA @ k P K
.



iJ
KA @ k

K
Inch,
.


Data,
HAKAJ
K.

K.

P , QAJ. HA
 KAJ
Direct graphic,
HAJ
QAJ
.




External data,
J
k. PAg HAKAJ
K.
K
Graphic,

GAJ

.


Message catalog,
AQ@ AJ
K.
Beta,
AJ
K.
Perl,
Q
K.
Computational molecular biology, AJ
k. J
K.
.
J
K. Ag J
K
Qk
Environment,
J
K.

 K
Homogeneous environment, Aj.J J

.





IDE,
AJ QK
 J
K.
 J QK  J K
Ide,
A

.


Integrated development environment, J
K.
AJ @ QK
J@

J
K.
Ergonomic,
@ HAJ
Infrastructure,

H
Functional dependency,


, J
J

J
K. AK
XAJ
 K@

K
PA.

Card,
A
.



Daughtercard,
J
A.
 K A

Expansion card,

.



Graphics card,
HAJ
P A.
  A

Network card,
J
.
.



Network interface card,
k. @ A.
 @
J
.

Punch card,
I. K A
.



Sound card,
H@ A.

Storage card,
K
Q j J@ A
.




Ventilator card,
K
E A.

A

KQ
Video card,
HAJ
.


Wild card,
ZAg. A.
Deactivate,
 .
Slow,
Z
.

Delegation,
K. AJ
K , JK.
Dimension,
AJ
 ,YK .
Fractal dimension,

P YK .
,YJ
K.
Remote,
YK.
Pixel,
K.
Null modem,
X CK.
Constructive,

KA JK .
Build,
ZAJK .
Clause,
YJK .
Child,

JK .
  J @ J K@ JJ J K
ALSA,
Y


.

Abstract syntax,
XQm. J
K .
Algebraic structure,
K
Q.g. J
K .
Architecture,
J
 K .
Child structure,
K
JK . J
K .
Control structure,
m' J
K .

J.@ J
K .
 KAJ
Data structure,
HA
Battery,

J
J.K
 K ,P K AJK
Image sequence,
P I.A
.
Cascade,

AJK

Autotrace,

@ J.K
Backtracking,

g J.K

J.K
Installation,
I

J.K
Install,
I

J.K
Setup (Installation),
I

m ' , '
 K , 
JK
Evaluation,


m ' , K Qk
Partial evaluation,

. 
JK
.

KQk
 J J K
Disk duplexing,
Q@

Ignore,
Am.'
Adjacency,
PAm.'
.'
Bypass,
PAm
PAm
.'
Failover,
 @
.'
Jump,
Q  ,PAm
.'
Override,
PAm
System testing,
A J@ K . Qm.'
Abstraction,
YK
Qm.'
Beta abstraction,
AJ
K. YK
Qm.'

Bracket abstraction,
@ B@ YK
Qm.'

J.@ YK
Qm.'
 KAJ
Data abstraction,
HA
Fragmentation,
K Qm .'
Partitioning,

 K , K Qm .'
Block (verb),
YJ
m.'
Freeze,
YJ
m.'
 m'
Combination,
J

.
Aggregation,
J
m.'
Prevent,
ZA K@ ,I.
Jm .'
. , g Q 
m.'
Mixer device,
Cg PAk
Grain,
I.J.m'
Notify,

J.J K. AK
Slave,
K. AK
'@ QK QK AK
Case sensitivity,
Qm
 . . Q  
Effect,
QK , 
K AK
 ,Qg AK
Delay,

Date,
t'
PAK
Epoch,
H. Am '@ ZYK. t'
PAK
History,
t'
PAK

,
AK
Foundation,


Check,
m , Y AK

Confirmation,
YJ
AK

Confirm,
YJ
AK
 @ ,A@ YJ AK
Handshaking,
A



A@



Hardware handshaking, XAJ A@ YJ
AK
Xm '@ YJ AK
Quality assurance,
.


Kerning,
( Qk B@) J
AK
Complete,
AK
Exact,
AK

Abstract interpretation,
XQm. K
AK

K. XAJ.K
 KAJ
Electronic data interchange, HA
Q@

G




Divergent,

k. @QK@ ,
YAJ.K


Divergence,
@QK@ ,h. @Q K@ ,YAJ.K
Contrast,
K
AJ.K

Lag,
A J . K
Dissipation,
X YJ . K
Packet-switched,
 Qm '@ K
YJ.K

 K
Context switch,
AJ


YJ.K
 K YJK
 Q@
Label switching,
HA

.
Swap,
K
YJ.K
Toggle,
K
YJ.K
Dependence,
AJ.KP@ , J
J.K
Master-slave,

J@ Jm'
 Y


Q
K
P J
m'
Fourier Analysis,
Lexical analysis,

J
m'
J
m'
Object-oriented analysis,

Q
J
k. J@
Parse,
J
m'
Parsing,
J
m'
Real-time structured analysis,
J
m'

P
J
K .
 . AK J
m' ,
A J
m'
Static analysis,
IK
 . AK J
m'
A J
m' , IK
Static analysis,

m , A J@ J
m'
System analysis, A J@
Load,
g ,J
m'
Morphing,
m'
Switch,
m'
   
Discrete Fourier transform, K
P @ K
m'
  J @

Beta conversion,
AJ
K. K
m'
 J)
,K
m'
Converse,
(

Conversion to iteration, P@QJ@ @ K
m'
Conversion,
K
m'
Converting,
K
m'
Convert,
K
m'
Implicit type conversion,
K K
m'

 , 

 K XAJ
.

Linear transformation,

k K
m'
Auxiliary storage,

A @ K
Q m '
K
Q m '
Caching,
I 
Non-volatile storage,
QK
AJQ
 K
Q m '
Secondary storage,

KA K K
Q m '
Storage,
K
Q m '
Store,
K
Q m '
Specialisation,
m '
Flow analysis,

 '
Qg @ Im
Bus sizing,
@ K
j.m'

Ym'
Incremental update,

YK
@Q K IK

Ym'
Update,
IK
Define,
K
QK ,YK
Ym'
 PY@ YK Ym'
Rating,
QK
Y K , k
.

Specify,
YK
Ym'
 ,QK Qm'
Edition,
J
.

Edit,
QK
Qm'
 Qm'
Animation,
K

Animate,
K
Qm'
Move,
K
Qm'

m'
Enhancement,
Data acquisition,
(AjJ@) J
m'


HAJ
Q
m '
Prepare,


J.@) m 
 KAJ
 m '
Validate, , gY @ HA

(...t '@ ,l. @Q.@ KA

 m '
Validation,
C

Verification,
J
m '
Verify,
J
m '

Control,
m'
 Qk m'
Keymap control,
hAJ 

m'
Remote control,
YK.
Resource control,
XPK. m'
Analysis,
J
m'
Backward analysis,
m '@ @ J
m'
 Jm'

Binding-time analysis, AJ.KPB@ I
 
'
Complexity analysis,
YK J
m

Cryptanalysis,
J
J@ J
m'
  '

K. Y
 KAJ
Data flow analysis,
HA
K J
m

@ J
m'
Defect analysis,
Dynamic analysis,

AJK
X J
m'
Infrared,

Q
Y K
Footer,
J
K
Y K
Undo,
(K
YK) k. @QK
Overlapping,
I.@QK
Cumulative,

@QK
Edu,

J
K ,
K. QK
Quadratic,

J
K. QK
Quadrature,
J
K. QK
Education,
J
K. QK
Arrangement,
J . 
KQK
Arrange,
I.
KQK
Ascending order,

YA I.
KQK
 I
KQK

KA
Byte order,
HAJ
.

. I.
KQK
Complete partial ordering,

KQk
A


Descending sort,

PA JK I.
KQK

AK. I.
KQK
Network byte order,

J. IK
. I.
KQK
Partial ordering,

K Qk
Sorting,
PQ ,I.
KQK
  g QK
Fuzzy translation,
D
. .


Rough translation,
J
.K
QK  g. QK
Translate,
k. QK
Salutation,
C , I.J
kQK
License,
J
kQ K
Frequency,
QK@K ,XXQK

JB @ XXQK
Sampling frequency,
AJ


Repeat,
P@QK ,YK
XQK
 ,iJQ K
Filtering,
J




Observations,
HAkC , H@YQK
X Align,
J
QK
Edutainment,

K. QK J
Q K
Entertainment,
J
Q K
Remind,

J
m '
 J
 m '
Complete graph,
A

Schematic,

J
m '

Cause-effect graphing, J. J. J
m'

.
Layout,
J
m '
Plot (verb),
k ,J
m '
Skip,
m '
Decrease,
J
 K , J
m ' , J
m '
Decrease,
J
m ' ,J
 K , J
m '
Evaluation,
'
 K , 
JK , 
m '

m '
Guess,
. 
m '

JK ,K Qk
Partial evaluation,

K Qk
Housekeeping,
K
Q
m ' Q
K. @YK
K
Interference,
g@Y
Project planning,

J K ,Q Q
K. YK
Q
 K
Gradient,
h. PY
Grayscale,

XAP h. PYK
h PYK
Hue,
@
.

Consolidate,
YJ
K ,
YK
 

J.@  Y
 KAJ
Data flow,
HA
K
K
Stream,
 X ,  Y
K
Batching,
J
Y
 

K. Y
 KAJ
Dataflow,
HA
K


Audit,
J
YK
 K
Checksum,
j. @ J
Y
 K
PX J
Y
Cyclic redundancy check,


ZAk B@
Q
YK
Destroy,
Internationalization,
K
YK
Notation,
K
YK
Customization,

J
j.
Subscription,
J
j.
@ @
H Q
File descriptor leak,

.


Memory leak,
Q @ X H. Q
Leak,
I.K
Q
Q
Underscore,

Delivery,



Hill climbing,
CJ@ 


Aliasing,
Justify,
K

Settlement,
K

 . Am '@ Q
J

Accounting management, HAK
 J @ Q
J

Asset management,
HA
Q  QJ
Code management,

Saturation,
J. 
October,
B@ K
Q
Multi threading,

XYK I. 
Threading,
I. 

  
Data fork,
HAJ
Fork,
h. @Q K@ ,   

Automation,

@ J
 
Dry run,

PAJ.Jk@ J
 
Dual boot,
h. X Q J
 
Q  

Space character,
PQ@

Q
 
Crypt,
J
 
Noise shaping,
i. @
Distort,
Z@J@ ,  
Collision,
XA
Ascending,

YA
Increase,
YK
@Q K ,YA
Crossed,
A K , I.A
Intersection,
A K , I.A

Debugging,
ZAk B@ iJ
j
Subscribe,

J
Q K
Numbering,

Q K

Q K
Hatching,
Filter promotion,
lQ @ J
Q K
YA , J Q K
Promote,


Upgrade,
J
Q K
Compose,
I.J
QK
Composition,
I.J
QK
Mounting,
I.J
QK
 Q QK
P K ,iJKA @ k
Keyboard focus,
.




iJ
KA @ k
Keep,
QK
Cell encoding,
AK
Cm '@ Q 
QK
Q 
B@
Character encoding,
Qk

QK
 ,Q QK
Encode,
Q QK

Q 
QK
Encoding,

Horizontal encoding,
 @ Q 
QK
Progressive coding,

Y  K Q 
QK
Dynamic translation,
J
AJK
X YJQ K
YJQ K
Professional programming,
J
J
 QK
Header,


Q K
Concurrency,
@
Incremental,

YK
@Q K
Increase,
A KP@ ,YA ,YK
@Q K
Line feed,
Q YK
Q K
Q.j J@ ,ZA
Inquire,
 HCJ

j.
Counting records,
Y@
  
Blocked record,
J J

j.


Child record,
K
JK . J
j.
 j
Record,
J

.
Record (verb),
J
j.
Register,
J
j.

J
j.
Single sign-on,

XAg @ kX
Patch (verb),


j 
Enlargement,
pA JK@ ,
j 

Shading,
J



Embed,


Include,
Narrowing,
J


Match,
K . A
 J
J.
Scientific notation,
J
HA
Application,
J
J.
Apply,
J
J.
J
J.
Function application,
J


Horizontal application,
 @ J
J.
Require,
I.

Component based development, . QK


@
 K
HA
Developement,
QK

Development,
QK

Tweak,
K

Dither,

J

Shadowing,
J


Cache conflict,
AJ.m
PAK
 PA
Context clash,
AJ

K
 K
Backup rotation,

AJ
Jk@ I.A
 K
Image sequence,
P K. AJK ,P I.A

Correlation,
 AK
Handle (verb),
AK
K
Collaboration,
A
Q
J.K
Expression,
Regular expression,

Q
J.K

Count,
X@Y K

Enumeration,
ZAk@ ,X@Y K

Parametric polymorphism, A B@ K
XYK
 @

Amplify,


Am '@ YK. iJ
j
Export,
QK
Y
Authorization,
l'
Q
Compilation,
K
Q
Compile,
K
Q

Q

Minimize,

Zoom out,
Q ,Q

 
Browse,
i



Hierarchical navigation,
Qm. i

Navigation,
i

Q

Reset,

Filtering,
iJ
Q K , J

Repair,
iJ

Design,



Object-oriented design,

J
k. J@

 J

Categories,
HA

Classification,
J


Classify,
J


Computer-generated imagery, Y QK

H. Am 'AK.
K ,P ,QK

Q
K ,iJ

Illustration,

Mirroring,

@Q QK


 ,m '@ K

Line buffering, Q@ K
 ,Q@ K 
Line buffering, m '@ K

Q
Rendering,

J


Render,
(Q
. ) Q
J
 
Conflict,
A J K ,H. PA 

Multiply,
A
Decay,
A 
Fade,
A 
Configuration,
J
. 
Growth,
,j 
Error recovery,

Suspend,
Instruction,
Privileged instruction,
Privileged instruction,

Transfer statement,
Edu,
Encrypt,
Incantation,
Map to,
Mapping,
Set,
Encapsulation,
Variations,
Alteration,
Alter,
Change,
Logical shift left,
Logical shift right,
Logical shift,
Modification,
Rename,
Detail,
Differential,
Interactivity,
Interactive,
Condition out,
Core dump,
Crash dump,
Illustration,
Preferences,
Preference,

J
K
 K
J

 K
 X J
,PAJ
J@ H@

K
 J

JK ,
 J
 K

 X

J@ H@
PAJ
 K
 J@ J

K. QK ,
J
K
J
K
 YK K


@ 
J
K


JK

J
K
J
K
 Q
K
H@
Q
J
K
Q
J
K
Q
J
K
 J QJ K
PA




J

J Q
J
K
 J QJ K

Q
J
K
B@ Q
J
K
J
A K

A K
J
A K

A K
Q K
Q K
. @ K
Q K
AJ

PAJ
E@ K
Q K
K , Q
K
iJ


K
HCJ
J
K


A B@ K
XYK
Cooperative multitasking,
A @ XYK
J@

GA
Hybrid multiprocessing,
m . 'A @ XYK

j.@ Z@Qk. B @ XYK , 
j.@
Hybrid multiprocessing,
Z@Qk. B @ XYK

j.@ m . 'A @ XYK , 
j.@
XYK
 @
Multilingualization,
HA
Multitasking,
A @ XYK
 @ XYK
Pre-emptive multitasking,
HA


KA @
Modify,
K
YK
 K
Identify,
Q
 K
Optical character recognition,
Q
'@ Q
Qm

.
K
Recognition,
Q
 K
QK
System Configuration,
A J@ HA

@ K K
QK
Datatype definition, HAJ
Define,
YK
Ym' , K
QK
Definition,
K
QK
  
Dimensioning,
XAK. B@ I

J.K @ K
QK
Identification,
K
QK
Recursive definition,

P@QK K
QK
Disable,
J
K
 
Complexity,
Y
K
 
Essential complexity,

A @ YJ
K
Adaptive learning,

J
J
K K

Machine learning,
 B@ K
Annotate,
J
K
 , J
K
Annotation,
J
Ag
Boxed comment,
K. Q J
K
Comment,
J
K
Hang,
J
K
Polymorphism,


JK ,'
 K
Conservative evaluation,
Am
J
 K
Lazy evaluation,

J
 K
Integrity,
AK
Referential integrity,

k. Q AK
Q
J.K
Enlarge,
Q
J.K
Maximize,
Q  . ,Q
J.K
Zoom in,
Condense,
J
JK
Jam,
AgP ,YK
Q @ X YK
Memory heap,
Reusability,
AJB @ K
P@QK
Recursive,

P@QK
Iteration,
P@QK
Mutual recursion,
XAJ.J P@QK
XA@ , YK XQK ,P@QK
Repeat,


,P@QK
Replication,
A
Reuse,
AJB @ XA@ , AJB @ P@QK
 K
Complement,

Directory stack,
Yj. @ AP , J
Y@ K
Adapt,
J
J
K
Manipulation,
I.CK
K
Correspondence,
C
Hash,
YJ
J.K
 '@ KA  K
Finite automata,

AJ J Qm


Feed,
K


Cache coherency,
AJ.m A

Cache consistency,
AJ.m A
 AA
Just-in-time,
I @

@ JJ
Knowledge representation,
Q

Extend,
YK
Y
QK Q
Message passing,
KAQ@

Pass,
QK
Q
Evaluation,

J
  K ,J
K
Enable,
J
K


Inspection,
ZA J @ , Y  K
Case based reasoning,
 . Q
K

 J B@
Bijection,
K. A K
Aging,
XA K
 XA K
Password aging,
Q@
Reports,
QK
PA K
Crossed,
I.A ,A K
Intersection,
I.A ,A K
Technology,
KA  K
Advance,
Y K
Progress,
Y K
 PY@ YK Ym' ,QK Y K
Rating,
k
.

Approximate,

.K
Q K

QK
Q K
Problem report,

Report,
QK
Q K
Partitioning,
K Qm .' ,
 K
Segmentation,

 K
 J @  K
Zoning,
A


Classic,

XAJ
J@ ,
YJ
 K
Contraction,
J
 K
Shrink,
J
 K
Decrease,
J
m ' ,J
 K
Parallel reduction,
J
 J K ,P@ J J
 K
 Q J J  K
Fiber optics, , AJ
B@ HAK

. 
 

Fibre optics,
, AJ
B@ HAK
Q. J
JK

 @ J J  K
Humanist technology, Y@ J
KA




Nanotechnology,
KAJ@ J
J  K
Technique,
J
J  K
Calendar,
'
 K
Activate,

 

 K IK

JK
IK

J K
Infix notation,

g@X
 IK

J K
Postfix notation,
j
 
Prefix notation,
@YJ. IK
JK
Illumination,
KA @ ,QK
J K
 J K
Variant,
K






E


Format (verb), J
K ,( Q m , ) JJ


()
Format,
JJ
E
, K YJ JJ E
Preformat,
K
YJ
 A@


Frequency,
XXQK ,QK@K

HP@
 K
Multiple inheritance,
A
Balance,
P@ K
Parallelism,

P@ K
Communication,
@K
 Y A J  @ K
Fit-to-window,
 P @YB @
 @ K
Backward compatibility, H@

K. A@
Compatibility,
 @ K

Pattern matching,
H. B@  @ K
Documentation,
J
KK
Orientation,
Am.' @ , J
k. K , k. K
Adaptive routing,

J
K J
k. K
Dynamic routing,

J
AJK
X J
k. K
Hierarchical routing,

Q J
k. K
Orientation,
k. K , Am.' @ , J
k. K
Routing,
J
k. K
Complete unification,
A YJ
kK
 P
Distribution,
K

K
K
Normal distribution,
J
J. K
P
Expand,
J
K
Expansion,
J
K
 K
Junction,
J

Dot notation,

K
Q
Enabling,
i , 

Initialization,
YJ


Name resolution,
B@ Q 
J

Proportional,
I.AJ J ,
.AJ K
Fit,
I.AJ K
Descending,

A J K
Conflict,
H. PA  , A J K
Alternating,

G. AJ K
Alert,
P@ Y K@ , J
J. K
Download,
K
Q  K
Coordinate,
J
 K
 E ,() J  K
Format (verb), , ) JJ


( Q m
Activate,
J
K , J
  K
Clean,
J
 , J
 K
 J K
Data set organization,
m
.


J.@
 KAJ
HA
Organize,

J K
Q
K. YK ,Q
J K
Project planning,
Q
Executable,

YJ
J K
Executive,

YJ
J K
Execute,
YJ
J K
Execution,
YJ
J K
Launch,
YJ
J K
Run,
YJ
J K


Sequential processing, m. 'A ,AJJ YJ
J K

 
J
AJJ
Debug,
ij
,iJ
 J K
Parallel reduction,
P@ J J
 K ,J
 J K
Frame relay,
PAB @ J
 J K

Masquerading,
QJ K
Excercise,

 
@ B@ HAJ
K
    . 
K , HAJ.K
QK
Q K


@ Q , m. , Q K
 J ,I K
j
.
HAJ.K ,  K
J
 K
P@

J
KA


GA
Am.' B@ J
KA J K
JK . , P X , J
KA J K

KA J K
 KA J K
I.@
 @

 KA J K
J

Dithering,
Reliability,
Ctrl,
Exploit,
Gap,
Hole,
Reliability,
Heavyweight,
Octet,
Octal,
Bidi,
Bit,
Binary,
Bipolar,
Dual-partition,

h.

 , HA

@ XAg.



@ K
Q , HA
@
HA

 . @ J
K. XAg
IJ
.

A @ PAg , YJ J J@ PAg
.

.
, YJ J J@
PAg , A
 @
PAg

.  
.
J
J.J@
PAg.

, A @
PAg. , J
J.J@
PAg.
YJ
J J@
PAg.
PAg.

 J , Ag.
I
AAg.



J
m ,  ,
, Ag.
Y J @ IKAg
.
, IJ @ IKAg

.
.
. .
. , Y J @ IKAg

I.J @ I.KAg
. .
.
K . AJ I.KAg

I. AJ ,QAg
.

Information highway,
Bit gravity,
Processing,
Processing,
Processing,
Ongoing,
Eyedropper,
Gamma,
Macro,
Deskside,
Deskside,
Write side,
Ready,

QJ J


.
K

J. J
K

P J
K
J
K
YK
Q.@ J
K
J
K
K
P ,Q
K ,iJ

YK ,YJ
K

K
K
Q
K
Q

 K
Q J@
 K
I. KP@ ,
 

K
 K

I 
 K


IJ
 

P J

K


J
K
 K
J

 K
AJk@ ,
YJ
K
YJ
K
J
k. ,YJ
K

Major delivery,
Colocation,
Hot swapping,
Linking,
Mail delivery,
Receipt,
Illustration,
Consolidate,
Localization,
Availability,
Provide,
Branch prediction,
Expect,
Forecast,
Pause,
Timing,
Digital signature,
Valid chars,
Suspension,
Probability,
Assertion,
Generate,
Generation,

H

 . AK
IK
 @
IK
 . AK
Fixed-point,
A
 . J ,iJ
J@ IK
 . AK ,iJ
jJ@ IK
 . AK
Fixed, I
 . AK ,iJ
J@ IK
 . AK
Fixed,
iJ
jJ@ IK

 . AK
Static,

G
, IK
Secondary,

KA K
Microsecond,
QJ
J
KA K
Second,

GA K
Constant,


AK. , Qk
.
IK
.
h. Q k ZQk

Qk.
Qk .
Qk.
YK
Q.@ Qk.

A Qk.

J
KP k.
.
k
k.

.

@Qk
I.g.

I.g .

g
.

Byte,
Critical section,
Bridge (noun),
Bridge (verb),
Bridge,
Mail bridge,
Northbridge,
Main body,
Polling,
GPL,
Geographical,
Fetch,
Retrieve,
Session,

)
Squatting,

 (g)
ZAQ @
.

h.

Ag.
Sum (verb),
g.
Sum,
m. ,g.
 g
Sentence,

.

GNU,
Jk.
 ) JJk
P ,(
Pound,
( P)

.
.
Bus device,
A K PAk
PAk
.
Character device,

Qm

.
Clone device,
q J PAk
.
Complex programmable logic device, PAk






YJQ K. A Y
J
.
Device,
PAk
@ PAk
Dialout Device,
AgXB
.
PAk
.
Display device,
Q@
PAk
Input device,
AgX@
.
Cooperative,

AJk.
Gtk,
Jk.
Firewall,

PAK P@Yg.
Cartesian product,

GPAK
X Z@Yg.

Horizontal tabulation,
J
 @ Yg
.



J@ Yg.
Instruction scheduling,
HAJ

Priority scheduling,
K
B@ Yg
.



Process scheduling, Yg. , m. 'A @ Yg.
Z@Qk. B @


Process scheduling, Yg. ,Z@Qk. B
@ Yg.
m. 'A @

Scheduling,
Yg
.

Tabulation,
Yg.
 '. Yg.
Im
Colour look-up table,


@ B@
Process table,
Z@Qk. B@ Yg.
Routing table,
J
k. K Yg.
Scheduel,
Yg.
Schedule,
Yg.

Spreadsheet,
YJ Yg.
Table,
Yg.
New,
YK
Yg.









Eigenvalue, J
, (G@ X) Q
P Yg.

J
K@ X

Root,
P Yg
.
Bell,
Qk.
Qk
Visible bell,

KQ
.

Visual bell,

KQ Qk.


Qk.
Flow,
X , AK

Newsletter,
PAJ.k B@ YK
Qk.
Pull,
H. @ Y Jk. @ ,Qk.
J ,K Qk

Partial,
PAj

.
.
Molecule,
Z Qk
Cos,


J
KP H. Ag
Notebook,
m H. Ag

Parallel computer, (J
 @) P@ J H
. Ag
Personal computer,

m  H. Ag
Pocket computer,
I.
Jj. H. Ag
Quantum computer,

H. Ag
Second generation computer,
H Ag
GAJ@. Jm '@

 
 .

Annotation,
J
K , J
Ag

Footnote,
J
Ag
QAg
Brace,
Left brace,
K
PA
QAg
Ag
Right brace,
J
J

Q

Clipboard,
 Ag

  Ag
Screen Saver,
A @

  Ag
Screensaver,
A @

Local bus,
J
m  Ag

Edge,
Ag

'@) Ag

Q. ,( Qm
Case (font),
( Qk)

Case,
Ag

Child status,
K
JK . Ag

Problem state,
 @ Ag

Process status,
Z@Qk. B@ Ag

K Ag
Race condition,
PA

Resource state,
XP @ Ag

State,
Ag

Status,
Ag

System state,
A J@ Ag

Wait state,
PA JK@ Ag
Ag

Zero state,
K
Q
Current,

Ag

Resolver,
Ag
Carrier,
A K ,Ag

Mainframe,

Mixer device,
Peripheral device,
Pointing device,
Virtual machine,
Inside,
Quality of service,
Quality,

Von Neumann, John,


Generation,
GNOME,
Group,
Map,
Meaning,
Pie,
Quorum,

Q m' ,Cg PAk


.

.
PAk
.

Q
.
Q
 AK PAk
.

QA PAk
,G@ k
. ,g@X

AK
.



 m '@ Xk.
HAY
Xk
.
AJ
K
.
k
YJ
K ,J
k.
JJ
k.
 , HAm
m
.  . h.
 Qk ,@ Qk h


.


,
GA h.
Q ,QKA
h

.
D ,D @ h.

h
Sharp,

XAg
Guard,
PAg
Calculator,
J . Ag
Microcomputer,
QJ
I.Ag
I.Ag
Q

Minicomputer,
. Ag
Computron,
K

Analogue computer,

KA H. Ag
Computer,
H Ag
 .
Digital computer,

P H. Ag
First generation computer, J
m. '@ H
. Ag

B @
Fourth generation computer,
H. Ag
K. @Q@ J
m. '@
H Ag
Host computer,
J

.
Laptop computer,
m H. Ag
Laptop,
m H. Ag


YK. Qk

Accent,
Qk

Gesture,
Qk

Motion,
Qk
Dynamic,

Qk
Float,
Qk
Free,
Qk






Binary package,
J
KAJK Qk

Kamikaze packet,
K
PAjJK@  Qk

Narrowband,
J
 Qk

Package,
 Qk

RPM package,
  Qk

Resource bundle,
XP  Qk
Qk

Ray,
Account,
H. Ak
Calculate,
H. Ak
Calculation,
H. Ak
Compute,
H. Ak

Root account,

P Yg. H. Ak
User account,
Yj J @ H. Ak
'@ Am
 Ak
Case Sensitive,
Qm
Sensitive,
Ak
Natural deduction,
J
J. k

Clustering,
Yk

Millennium bug,
J
B@ Qk

Quota,
D @ , k
Get,
k

k
Demote,
J.KQ@
 ,Qk

Block,
Y
 ,Qk

Prevention,
Y

Prohibit,
Qk

Compactness preserving,
A  k

Save,
k

Wildcard,

Common carrier,
Digital carrier,
Retry,
Container,
Coarse grain,
Fine grain,
Love,
Mask,
Size,
Storage space,
Volume,
Word size,
Event,
Intuitionism,
Intuitive,
Occurence,
Occurrence,
Polynomial,
New talk,
Zoo,
Border,
Closed term,
Hard limit,
Limit,
Redisplay,
Sharpness,
Delete,
Deletion,
Literal,
Lower-case,
Metacharacter,
Upper case,
Wide character,

XAJ
J@ Ag



P A K ,
P Ag

@XYm. Ag
K
Ag
 k I. k
 Ik
J
X
.
I.k


AJ ,H. Am.k
 ,mk

.
K
Q j J@ m.k
m.k
 mk

.
HYg
J
Yg

Yg

HYg

HYg
K
XYg

Yg
YK
Yg. IK
 K@ J
m '@ K
Yg
HA
Yg
 Yg

 Yg
Yg


Q@ Yg

 , Yg
X

Yg

Yg

,
Qk

Qk
Q


@ Qk

Q
J. Qk


Q Qk

Q @ X K Ag

K Ag

K Ag

g
J
m' ,g

 k

G k
J
J. J@ P@k
P@k
P@k

@k
J . k
J
K. AJ. J . k

k

XP@ k

 ,  , k
AJk


AK. P@ , Q
g
 J@ Q g
A

Xk. ,
k

Memory protection,
Protection,
Protect,
Backport,
Load,
HTTP,
HTML,
Alert box,
Dialog,
Discussion,
Margins,
Computing,
Fuzzy computing,
Pool,
Resource pool,
Implies,
Life,
Perplexity,
Bandwidth,
Exist,

p
K
XAJ@

Direct mapped cache, J
jJ@ QAJ.
(l. 'A)
Level one cache, J @

Credential cache,

Level two cache,


Primary cache,
Primary cache,
Boot server,
Caching server,

J
K. Ag
J
K. Ag
J
K. Ag

 B@
(l. 'A) J
K. Ag
J @

GA J@

J
@ J
K. Ag , J

KP J
K. Ag

J

KP J
K. Ag , J
@ J
K. Ag
C@ XAg

ZI.k XAg , JJ . m ' XAg


k

Key field,
hAJ @ k
 k

Password field,
Q@

 . AK k
Static field,
IK

Subfield,

Q k

Injection,
 k
 k


K KA  , HAJ


Legalese,
HAJ
 m '@
 k

m ,QJ@
Copyright,


Fields,
k

Briefcase,
J . J
k

Software development kit,
QK
 J . J
k
l. @QK.

Physical,
,Xk. @
J
k

Real,

J
k
Bus arbitration,
@ J@ k
k
Central arbiter,

JJ

QQ
Arena,
J . g

Rings,
I g

Do loop,
P@QJ@ g

Endless loop,
J
AJ JB g

E B g
Infinite loop,
J
KA

Local loop,
J
m g

Loop,
P@QJK. Y JK
,PQK
, g

Repeat loop,
XXQK g
 
Resolve,
Q , g

Nipple,
g
Computer cookie,
H. Ag g

Non-optimal solution,
J @ 
g
  
Resolve,
g , Q , g
K
Ag
Copy protection,
K
Ag ,q@
q@
K
Ag ,q@ K
Ag
Copy protection,

q@
Field,

End,
Timestamp,
Mail services,
Professional services,

AJk

P k
 g
YK
Q.@ HAY
HAY
 g
J
J

Connection-oriented network service,

ABAK.  k. J
J.

K.
 KAJ
Data service,
HA

 g , j @
Directory service,
Y
.
Directory service,

Parallel-service,
Scalable service,
Service,
Output,
Standard output,
Code violation,
Violation,
Exit,
Logout,
Character map,
Linear map,
Map,
Portmap,
Radar map,
Sector map,
Data warehousing,
Common properties,
Properties,
Ticker Properties,
Cluster,
Privacy,
Chart,

 g
Y
 g
Y
 g
Y
J
Y@
 g , JY@ Y
 g
Y


j. @
 g
K
P@ J Y
 A Y
 g
J
Q K
.
 g
Y

h. Q k

AJ
 h. Q k
 Q
 k
(Y@)
PAQ@
 k
Q
h. Qk
h. Qk

B@
Qk

Qk
Jk 
 Qk



@Qk h. , 
Qk
 Qk
Y A J @ 


P@X@Q@ 
Qk
 
 Qk
A@

HAJ
@ Q k
k
 A
A
k
, A
 @
HA
k
 A
 A@
 k
X J ,
J
k
 k
K P , A

GAJ

Caching server,
Compute server,
Database server,
File server,
Mail server,
Master server,
Proxy server,
Screen server,
Webserver,
Server,
Web server,
External,
FIFO,
First in first out,
LIFO,
Last-in first-out,
Off-topic,
Outgoing,
Outside,
Bitmap,
Charmap,
Specials,
Attribute,
Property,
Private,
Special,
Device-dependent,
Inactive,
Entries,
Checkbox,
Menu item,
Know-how,
Caching-only,


JJ . m ' XAg ,ZI.k XAg
H. Ak XAg

YA XAg
HAJ
XAg

HA
YK
Q.@ XAg

J
KP XAg
J
XAg
 XAg
A @
 @

J
.  XAg
XAg
H. XAg
J
k. PAg


,B @ h. PAg
B @ g@Y@


,B @ h. PAg
B @ g@Y@
 

@Qk @ g@Y@ ,B @ h. PAg
 

@Qk @ g@Y@ ,B @ h. PAg
@ h PAg

.
h. PAg
h. PAg
h. PAm '@
,
 g
J
KA J K PA
PA
 g
PAm

Ag
HAJ
J
Ag
J
, J
Ag
Ag
Ag
Q jJ A g

.
Ag
 KA g
HA
Q
 AK KA g
 A KA g
K
@P X , Q. g

 ZI.k


Q

A K
 . AK
IK
@
IK
 . AK
Q

k
 k
Differential line,
Fixed Font,
k
Fixed width font,
k
Font,
k

Horizontal line,
 @ k
k
Leased line,
Qk.

Mercury delay line,
QQ
Q
g AK k
Outline font,

J
K k
Plot (verb),
J
m ' ,k
Raster font,

 K k
Scan line,
i @ k
Serial line,
 k ,  k

Serial line,

 k ,  k
 k
Cross-fading,
H
J
k
Lightweight,
P@
Lite,
J
k
Invisible,

k
 g
Digest,
C
g
 , C
Difference,
PA

Disassembly,
,g
Background,
J
g


Desktop background, I
. J @ i J
g
Virtual Desktop,
I.J @ i J
g
 J
g
Wallpaper,
A @
 g

Aliasing bug,
 g
Nice,
J
,
Cellular,

g
Cell,
J
g
J g
Char cell,
Qm

Servers,
X@k
k
Algorism,
J
PP@
k
Algorithm,
J
PP@
Diagonal line,

Diagram,
Plotter,
Bus error,
Critical error,
Error,
Fatal error,
Internal error,
Mistake,
Page fault,
Parity error,
Portmapper,
Run-time error,
Standard error,
Syntax error,
Unexpected error,
Outline,
Scheme,
Raster,
Dot pitch,
Pitch,
Step,
Linear,

 k
A
Ak

A K Ak

h. Qk Ak

Ak


hXA Ak
Ak

g@X

Ak
j@
Ak

k. Q@ Ak
Y J @ A k
P Ak

J
 

AJ
 Ak
 '@ ZAJK Ak
m
.  .

 J Q Ak





J
m' P ,  k
 k
m ,
 i @ k
 @

A
  J@ k

k
k
J
k

)
Serif,


K
Y (k)

p
Backslash,
Baseline,
Bitmap font,
Broken line,
Continuous,
Dedicated line,

KA

A @ k

 K k
 k

 J ,@J ,(k
@X)
  k
Q

Partial function,
Circle,
Permanent,
Delta,
Debianize,
Input,
Standard input,
Enter,
Multiple access,
Know-how,
Degrees of freedom,
Degrees,
Degree,
Chat,
Decision support,
Run-time support,
Support,
Address book,
Microlog,
Batch,
Push,
Flow,
Stream,
Accuracy,
Precision,
Sharpness,
Minute,
Significance,
Axiomatic semantics,
Child directory,
Directory,
Guide,
Home directory,


. @X
J
K Qk
QK@X


'@X
@ X
J 
K. X

g X


AJ
 gX

kX

XYJ kX
Qg , K @P X
.

K Qm '@ HAg
 . PX

 . PX
HAg
 PX
k
.
XPX

P@Q X
P X

J
 
YA ,X
K
AJ QX
QJ
QX
 X

X

Qk. ,  X
AK
K ,  X
 Y

X

X
 , X

, Yg
h

J
X

, BX


BX
J
E
YK. HAJ

JK . J
X
J
X
J
X

J
KP J
X

 B J PP@
J
J

k
   k
Approximation algorithm, I
. K
QK J
PP@
   k
Evolutionary algorithm, K
P J
PP@
k
Genetic algorithm,
J
K@P J
PP@
 k
Exponential-time algorithm, J
 @ PP@
Q@

 P AJ
k
Command line options,
Q H@

Q@ B@
 P AJ
k
Options,
H@
Optional,

PAJ
k

Command line option,
Q@ @ Q PAJ
k
Option,
PAJ
k
XML,
k
Anytime algorithm,

h
P JJ E iJk

.


JPEG,

P ,H @X
k@
.




Internal,
J
JAK. , J
g@X

. ,g@X
Inside,

G@ k. ,
AK
P@X
Circuit,
Publisher,
QAK ,Q P@X
Rotate,
PYK
,k P@X
Q  @X

Characteristic function,


Combinator,
J
 @ K @X
 J @X

Continuous function,


Function (Mathematics),
@X

Hash function,
K Qm .' @X

Higher-order function,
J . KQ@ J
A @X

Linear function,
J
k @X

Member function,
Yj J @ @X

@X
Membership function,
K
@

, @X
Indicator,
Q
Crawler,

J
. @QK Q@ X

Base memory,
J
A @ Q@ X
 X Q@ X
Content addressable memory, H@
 K A Jm
Y
.

Conventional memory,
J
kC@ Q@ X
QAJ Q@ X
Direct memory,
.


Distributed memory,
P Q@ X

Q@ X
Error correcting memory,
jj

Am '@
Q@ X

Expanded memory,

Q@ X

Extended memory,

External memory,
J
k. PAg Q@ X
Main memory,
J

KP Q@ X
Mapped memory,
JJ
Q@ X
Q@ X
Memory,
QK AJQ Q@ X
Non-volatile memory,

Q@ X
Paged memory,

j
QJ Q@ X
Persistent memory,
XQm Q@ X
Raw memory,
.



Real Memory,
J
J
k Q@ X
Pj
. m Q@ X
Reserved memory,

 
Resident memory,
J

Q@ X
 Q
 Q@ X
Shared memory,

Virtual memory,
K
QA Q@ X
QK AJ Q@ X
Volatile memory,





Pragmatic,

@ ,  , 
K @P X

P X
Atom,
Bit,
J
KA J K , P X
KB
  K , K P X
@
Spawn,
AY


Atomic,

P X
Kernel panic,
AJ
KP@ ,Q X
 
 
 
Bootrom, ZQ C@ Q @ X) C@ X
(
Associative memory,

Legend,

P @ , HAj

h. @

J
X
Login directory,
J
X
Manual,
J
X
Sub directory,

Q J
X
Subject index,
J
@ @ J
X
Integration,
l. X
Mail merge,
YK
Q.@ l. X
Merge,
l. X

Dummy,
YA ,
@ Q @ , J
X
, X
Paint,
AJ
.
,@ X
 Y
Duration,
Worm,
I K QK@ XX
 
 P X
Revolutions per minute, J
Y@ H@

 H@

Rotations per minute,
J
Y@

P X
Rotation,
@P X


Bus cycle,
@K PX
Cycle of reincarnation,
t AJ J@ PX
PX
Cycle,
AJk PX
Life-cycle,



Machine cycle,
B@ PX
PX
Period,
Periodic,
K
PX
Circuit switched,
@YK. B @
 PX
Floor,
K . A ,PX
Role,
PX
Dollar,
PBX
International,

X

DMA,
K
A.A.K
X

)
Temporary buffer,

X
Access memory,


(  AJ.m Q@ X)
XA J@ Q@ X


AP

Bounce message,
AP

Error message,
AP

Letter,
AP

Message of the day,
J
@ AP

Message,
AP

 , Q X AP
Panic message,
AJ
KP@ AP
 , AJKP@ AP

Panic message,
Q X AP



Post,
() P @ , AP

Messages,
KAP
 g KAP

Private Messages,
A
P
Character graphic,

Qm
 k , GAJ
K P
Chart,
A


.
Drawing,
P
Draw,
P



 , jJ
 GAJ
K. P
Histogram, P@QK h. PY

.
Illustration,
QK
 ,Q
K , iJ

K ,P



Outline,
k ,
J
m' P

K. , QAJ. HAJ
 KAJ

P
Direct graphic,
HA
QAJ
.

Graphics,
HAJ
P

P
Raster graphics,
J
JA HAJ

P
Vector graphics,
J
j.J HAJ
Graphical,

P


Bullet,
X@YK K
Q , AP

Magic bullet,
K
Qm AP

Disk array,
@Q @ P

 , P
Stack,
P
 , P

Stack,
P
 ) JJk
P
Pound,
(

. ,( P)
Deny,
P
Refuse,
P
Reject,
P
Away message,

H. AJ

H. K

Ak

AJ@
ZAX
 X

J J
K . X

Artificial intelligence,
FTP,
Block-structured,

P
Connective,
Hotlink,
Permanent link,
Persistent link,
Nym server,
Radio,
Vertical,
Arrowhead,
Proposition,
Leader,
Qword,
Dividend,
Bind,
Button binding,
Hard linking,
Networking,
Arity,
Monotonic,
Jitter,
Back,
Carriage return,
Marble,
Callback,
Reply,
Data packet,
Packet,
Collate,

A@ ,. @P
. @P
kA
 @P
'@X
.

QJ . @P
QJ
P J
 K@ k. @P
K
X@P

X ,
@P

D @P

h@Q@ ,h Q ,
@P
YK@ P

AK. P I.Q ,
AK. P
 ,D@ l' P

.
 P
.
P@P P @ . P
I. . P
 . @
 . P
HAJ
J
.KP
I.
KP
 Qk P
 KP@ , k
A
. .
k. P

k. Q ,Q@ @ k. P
) Q@ @
( Qm



AgP
(A ) Z@YK XP
XP

K.  PP
 KAJ
HA
 PP
PP

Country code,
Mnemonic,
PID,
Sign,
Symbol,
Exponential notation,
Symbols,
Modulate,
Robot,
Visibility,
Math,
Mathematical,
Bus mastering,
Cardinality,
Leading,
Master,
Principal,
Bus master,
Master,

P
Crawler,
Angle,
Corner,
Affix,
Dataless client,
Diskfull client,
Diskless client,
Diskless client,
Mail client,
Jam,


YJ.@ QP

QY K QP
 @ QP

  
K

, PA@ ,QP

QP

J
J
PP

Y J K Q@



PP

P
 . P
HK

K
P

P

AK
HAJ

P

AK
 KP
@ K A

J
KP

@ ,
XAJ
 ,
J
KP

KP ,
J
KP

J
KP
@ K 
KP

J
KP ,
KP

P
H. @X , k@
K
@P
K
@P
YK@ P
. P

@
Ag K
HAJ

 Z K
. P
Q@



PA
, Q@
K. P



. P
Q YK. K
. P , Q YK
. K
. P
K

PA
Q@

. P
YK
QK. K
YK ,AgP

P
Upload,
P

Shelf,
P

Software audit,
l. AK Q.@ m ,l. AK Q.@ K . AP
 A P
 A P]
Chip,
[ HA
 P
Bilinear patch,
J
KA J K
 P
Canvas,
(Q@)
 P
Patch (noun),

 P
Patch,


Digitize,
J P

Digital,

P
. '@ P
Device number,
PAm
Digit,
P
Host number,
J
@ P
Internet number,
I K QK@ P
 @ P
Job number,


Markup,
P
Natural number,
J
J. P
  P
Network number,
AB@ J
.
Number,
P
Port number,
Y J @ P
Process ID,
Z@Qk. B @ P
K
QK P
Resource element,
QJ@
J K @ XP
Binary exponential backoff, KA

Directory stack, ,J
Y@ K ,Yj. @ AP
J
Y@ AP
Directory stack,
,Yj. @ AP ,J
Y@ AP
J
Y@ K

Gray code,

Qk. PAP

Native code,
J
@ PAP

Operation code,
J
PAP

Code (symbol),
QP

Control code,
m' QP
Raise,

K . A
Dragging,
I.m , I.kA

Bulletin Board,
A  K kA

, kA
Place,
A

Naive,
Z
QK. ,h. XA

Clock,
A

Hour,
A

Seeking,
AJ
A

Idle,
A
 .
Hibernate,
HAJ
.
Cepstrum,
Q

Hexadecimal,

Q I

Hex,
I
Log,
m.
 m
CB@
Master boot record, J
KQ@
.


(Q@ )

Scan register,
i @ m.
Checkout,
I.m
Content-based information retrieval, I
m 
.

Jj @ . HA
 @ I.m
Drag and drop,
HC
Dragging,
I.kA ,I.m
Drag,
I.m
Pull,
Qk. , H. @ Y Jk. @ ,I.m
Revocation,
A. @ ,I.m
Magic,

Qm
Spam,
Am 
 Q

Clock rate,
A

Clock speed,
J
KAJ
@ Q
  
Constant angular velocity, JK. AK K
@P Q
 

Constant linear velocity, JK. AK J
k Q
 , Q

Rate,
Y

k P

Decorative,

Prefix,

)
hJ @YJ. ( P P)

Open switch,

P
P P

Command button,
Q @ P P
Key (Button),
P P

Navigation key,
PAm'. B@ P P
Push-button,
P P
Radio button,
ZA JK@ P P
JK B@
XA@ P P
Reset button,

K@Y
.


Directed set,
h. QP
Q QP
Fuzzy subset,
A


K QP
Orthogonal instruction set, HAJ
YAJ
. QP
Partially ordered set,
I.
KQ@ J
K Qk
 A K @
Down-time,
J
 @

P
 J@
P
Downtime,
J

P
Era,


P
Exponential-time,

 @
P
Latency,
@
P
Processor time,
l. 'A @ (J
 )
P
Run-time,

J
 

P
Runtime,
J
 @
  @
P
@Y
Seek time,
P ,
@
  @
P , @Y
Seek time,

@
P

P
Settling time, P@QJB@ (@ @)
Parity,
J
k. P
Pair,
h. P
Zombie,

. P
PAK P
Visit,


Offset,
Am'
P
Button,

Scale,
Pin,
Behavior,
Daughter,
Allow,
Sky,
Audiographic,
Audio,
Theme,
Centimeter,
Singapore,
Year,
Years,
Simple,
User-friendly,
Arrow,
Drop-down arrow,
Drop-down arrow,
Left arrow,
Quorum,
Scroll arrow,
Share,
Data mart,
Switzerland,
Policy,
Context,
Fence,
Workflow,
C,
Lexer,
ReNice,

 ,
AJ

QK @ , 
.


J

hA
ZA

J
m '



QJ
J
P J


J

 J
H@
J
. ,D
@Yj JB@ D
D

D , @Y@ D
Y
D , Y D
@Y@

PA
D

D @ h. , D
QK
QJ@ D
 ,D
Q


YA
HAJ
@Q


AJ

AJ

KA
,iJ
.

@ Q



QJ
K@ j 

h'


Q

Software theft,
l. @Q.@ Q
Fast,
K
Q
Fragile,
I.@ K
Q

Confidential,

Q
Cursor plane,
 Q  @ i
Desktop,
I.J i

Cache line,
AJ.m Q

Command line,
Q@ B@ Q
Q @

Q
Line of code,
Line,
Q
,Q
Row,

 P
Lines per minute,
J
Y@


Amplitude,


Capacity,


Size,
m.k ,
Seek,


Fallout,


SCSI,

Q


@
Information highway,
, HA


@ XAg. , HA
@ K
Q
HA

Silently,

G

 . AK ,G
Static,
IK

@
C
Class hierarchy,
A J
Salutation,
I.J
kQK ,C
Passive,

.


KA J K
Bit string,
HAJ

Chain,
YJ
 ,


Character string,
PAm
 K

Daisy chain,
J
J.A
@
Qk

Null string,
PA

 . @
Search string,
IjJ
Wired,


Speed,

Pseudo-terminal,
Pseudo,
Semiautomatic,
Grid,
Lattice,
Abstract syntax tree,
Binary tree,
Hierarchy,
Tree,
Hierarchical,
Intensity,
Severity,
Caption,
Dash,
Urgent condition,
Greedy,
Bit slice,
Slice,
Slide,
Bar,
Magnetic stripe,
Magnetic tape,
Menu bar,
Menubar,
Paper tape,
Progress bar,
Scrollbar,
Side bar,
Slider,
Status bar,
Taskbar,
Vertical bar,
Expunge,

@ Q J.
J.

KA  K J.
 
J

.



Q , J
.
XQm J K Qm
.
. .
J
KA J K Qm.
Qm
.
Qm
.
Qm.
 Y 

 , Y
 hQ
k
 
Q

PQ Q
Q 

KA J K m 
' Q
HAJ
m 
' Q
 Q K
, m 
' Q

Q
J
AJ 
Q

J
AJ 
Q
  Q
'@ @

 A@
  Q

P 
Q
Y J@ 
Q
 Q@ 
Q
. 
Q

.KAg
QK
QJ@ 
Q

@ 
Q
HA
A @ 
Q

XA 
Q
I.

K K. A

Q ,
K
P
K

K
P
A 
. Q
Gas plasma display,
J
PCK
Screen,
A 
Splash screen,
K
@YJ.@ A 
Splash,
ZYK. A 

Glitch,
 , J . KA 
Common,
KA 
 
Artificial neural network,
J
. J
.

J
AJ@
  , J  k J
 
Bus network,
K
Q J
.

.







Bus network,
J
k J. , K
Q J.
 
Computer network,
I.@k J
.





Heterogeneous network, Aj.J Q
J.
 
Interconnect,
J
.





Local area network,


J
m J J.
 
 J J
Logical network,
J

.



Mesh network,
K
Q J.
 
Mesh,
J
.

Network,
J.
 
Net,
J
.

Notwork,
J.
  , K Q J

Regional network,
J
.
 . 
J
J
@



 
Regional network,
J. , J
J
@ J
.
K
Q
 J
 
 J
g
Ring network,
@
.



Star network,
m.'  J.
 J
 
Wide area network,
@
.



J.
Wireless local area network, J
J
B J
m
. J.
Pseudo-device,
PAk
Distributive lattice,

@ 

J
AJ

QJ 

Chaos,
Policy issues,
Cipher,

Buddy,
Strict,
Ascender,
Valid,
Paint,
Patience,
Authenticity,
Correct,
Right,
Fault,
Login shell,
Shell,
Keypal,
Echo,
Local echo,
Remote echo,
Block,
Prevention,
Parcel,
Zoom out,
Sufficiently small,
Man Pages,
Home page,
Homepage,
Man page,
Manual page,
Page in,
Page out,

I.kA
PA
YA
l 'A

, AJ
X
.
Q.
m 
iJ
m


, l
,Y

h. Y

 Y
 Q K Y
@

Y


m Y
YJ
K. Y

, Y
Qk

, Y
Qk
 ,Q
AK
. 
 , Q
Q

Q
AJ
A



J
X HAj

A


K
@YJ.@ j


J

KP j
YA @ j




K
YK
j


j
 g@X
 PAg j


k
.

PA
Slogan,
PA
Radiosity,
J
A
Radial,

A
Resource fork,
XP J . 
Sector,
A , J . 
Job,


@ ,ZQ@ , 
Play,
Q
 @

Network transparency,
J
.  J
A


Referential transparency, , J
k. Q J
A
 J
k. Q
J
A @
Transparent,
A 
Assembly code,
J
m.' Q 
 Q 
Byte-code,
J
KA
Q 
Code (program),
Kangaroo code,
K
Q J Q 
Legacy code,
G@QK Q 
Microcode,
QJ
Q 
Expansion slot,
J
K I. 

Strip,
Q K ,  
,Q
Acknowledgment,
A Q
Credits,
QK
Y K Q
Constant applicative form,

J
J. 
 . AK
IK
Figure,

PAJ@ ,
Form,

Make,

Normal form,
XA 

Shape,
C

Implies,
k ,  , 
XAD
Certificate,

Digital certificate,
J
P XAD
Month,
QD
Logo,

Container class,


J

J
@
 @
 @


PAB @ @
 

P H

H
 A P
C@ P
  J P

J
P P
P
P
P

J
AJ@

AJ

KAJ

 KAJ

J
KA
J

P@ J

JJ J

J

J
@

J A

Equivalence class,
Buffer,
Cut buffer,
Frame buffer,
Digital audio,
Sound,
Blur image,
Boot image,
Captured image,
Digital image,
Image,
Picture,
Synthetic image,
Syntax,
Maintenance,
Preventive maintenance,
Formula,
Image format,
Library routines,
SLIP,
SMTP,

h Y , (P) J
K. AJ.
Fuzzy,
D. ,
G. AJ.
Adjust,
J
 .
Autoconfiguration,

@ J.
Configure,
J.


Noise,
l. ,i.J
m.

Noise,
i.J
m. , l.
Damage,
PQ

Key stroke,
P P
Blur,



j


Web page,
J
J. j
PQ@

j
Demand paged,


Paged,

j
Backward chaining,
m '@ @ Y


Zero-content, Jj @ PA ,Jj @ Q

Zero,
Q
 

Group attribute,
m
.

Q

Beep,

Double-ended queue,
, 
JK
AE X

JK
AE X PK. A

Row,
Q ,

Write queue,
K . AJ
Validity,
J
kC
Solid,
I.


Education contact,
Jj. @

K. QK @Q ,
K. Q@
A
Vacuum tube,
Q
Diode,

KA J K A
 ,Z@Q ,
Glue,
A
 J

Box,
K. Q , Y
 J

 J Y
Chad box,
HA
 J

Q
 AK Y
Check box,
 J

 J Y
Chip box,
HA
 J

Inbox,
XP@@ Y
 J

Mailbox,
YK
QK. Y
 J

Postal Box,

YK
QK. Y
 J

Scroll box,
QK
QJ@ Y

Size box,
Am.k B@ Y
J

Abstract class,
XQm. J

Base class,

A @ J

Class,
J
 K J

Complexity class,
Y
Page,

Halftone,
Edition,
Print,
Data link layer,
Host-host layer,
Layer,
Network layer,
Protocol layer,
Nature,
Normal,
Normalised,
Model,
Dump,
Big-endian,
Smart terminal,
Terminal,
Video terminal,
Peripheral,
Third party,
Paths,
Abstract method,
Class method,
Input method,
Method,
Information highway,
Route,
Flavor,
Float (verb),
Charset,
Coded character set,
Frame set,
Bus request,

 AJ

J

.


QK
Qm' , J.
J.

@ J .
HAJ
J

J .
J

J .

 @
J
.  J.
A J
@ J .
 J
J

XA ,
J
J.
I.
P@ Q

h Q

Q
J.J
Q
PJ J Q


J
Q


Q K J
Q
J
KK

Q

 K Q
IA

 Q
HA
XQm K Q
.


J J

K
Q
@ K Q
AgXB

K
Q

@ K
Q
, HA


@
HA
K
Q
,
 K , @ Y



PAm

 PAm

Q Q

 P A@
H@
A K I.


P P
Compaction,

Compression,

Compress,


K.
 KAJ
Data compression,
HA
 J
Deflate compression,


File compression,

Fractal compression, P (P)


Lossless audio compression, H@

PAk YK
.
Lossy compression,
X
Multiclick,
XYJ
Press,



Stress,

J
KAJ

Video compression,

KQ

 , 
Implies,

Optical,

K
Loss,
AJ

Guest,
J

Keystroke,

Dot matrix printer,


Ink printer,
Laser printer,
Line printer,
Printer,
Time stamp,
Floor,
Double-ended queue,
Queue,
Mill,
Clumsy,
Bidirectional printing,



A J@ 
Q.g
P Q 

 A
K
.
K A
.
K A
.
K A
.
K A
.

P K. A
PX , K . A
, 
JK
AE X PK. A


JK
AE X
PK. A

KkA

 A

Am.' B@ J
KA J K AJ
.

 A
Q
@ A
Compressibilty factor,
A B


Context operator,
AJ
A
Operator,
A
Vertically,
AK
XA
General,

Ag. @ ,A
Generic,
A

Yield,
YKA

Fence,
i.J
,  KA
Break statement,
A K@ PAJ.

 PAJ
Case statement,
Ag
.
 PAJ.
Passphrase,
Q
Hardware,
XAJ
XA ,XAJ
Material,
 J
Opacity,

 '. ,( ) PJ
Find,
Im
. X@Y , m QK. X@Y
Program counter, l. AKQK

.
Program counter, m QK. X@Y , l. AKQK
. X@Y

.
Numeral,

XY
Common factor,

)
Scalar,

Interrupt request,
Request,
Embedding,
Bricks,
Develop,
Phase,
Buffer overflow,
Spill,
Portrait,
Length,
Low-bandwidth,
Collapse,
Constant folding,


Humor,
Digital envelope,
Envelope,
Kiosk,
Shadow,

(XY)

Appear,

@ XY
XY
Chromatic number,

G

Complex number,
I.Q XY
 @ XY
Effective number of bits, A@ IJ
.


Hard link count,
Y , J.@ . @ Q@ XY
J . @ . @ Q@
Integer,
iJ
m XY

Prime number,

@ XY
 J. XY
Pseudo-random number, K@

XY
Radix,

P Yg
.

I.
I.
I.
PA@ ,Q
H.

P
P

@@ A


A


j J k
.

 . AK
IK


@ Q


P Q
, Q
C

p ,

P

Cardinal number,

KA
@
A KB

Dial-up,

Urgent,
Normal,
Network storm,
Dead,
Reflexive,
World,
High colour,
High definition,
High density,
High,

g. A

J
J. ,
XA
  A

J
.

,A
IJ
A
A

@ B@
A
YK
YjJ@
A
A J@
A
KQ ,A

K@
Joy stick,
H. A@ A

Joystick,
H. A B@ A
Q
 AJ@ A
Pointing stick,
Neuron,
I.
Modern,

Q


Cluster member,
Yk

Member,


Weekend,
J. B@
 k Y
 , X J Y

Cluster node,
J

 , J
 k Y

Cluster node,
X J Y

 @
 
Network node,
J
.  Y
Y

Node,
Y

Root node,
K
P Yg
.
 J)

Converse,
K
m' ,(
Inverse,

Invert,



Equivalence relation,
AJ@ C
 J C

Logical relation,
J


Relation,
C

Hyphens,
@ HAC

 C
Book mark,


Bookmark,
C

Commercial a,
YJ C
 XQ AJJ@ C

Double quote,
k
.
.

Exclamation mark,
I.j. J@ C

Exclamation point,
J
E C
 
Insertion point,
Am B @ C

Yg) Q@ C
Pound sign,
,( P

J
Jm . '@ C
 , JJm '@ C

Pound sign,
Q@ C

. 
Yg)
( P

Question mark,
A JB@ C
Stochastic,


K
XY
AJ
iJ
j@
Y
Blur,
(P) J
K. AJ. ,h
Deselect,
ZA JK@ Y
Null,
 Y
PY@
 Y
Unable,

Hard link count,
XY , J . @ . @ Q@ Y
J . @ . @ Q@


Reference counting, k. @Q @ Y ,k. Q Y



Reference counting, k. Q Y ,k. @Q @ Y

Prodigy,

XQ

Landscape,

Q

Bitmap display,

 K Q

Demo,
Q

Display,
Q

 . AK Q
Fixed width,
IK

 . AK Q
Fixed-width,
IK

Listing,
Q

TERM variable,
:Q
J
J K. A Q

View,
Q

Width,
Q

Acknowledgment,
Q , A Q
 
Distributive lattice, K. A ,K
P

K 
Q
K

K
P
  ,  Q
Lattice,
J


Bold,

Q

Dismiss,
XAK. @ , Q
J
  Qj
Encapsulated Postscript,
IK

J
  Qj
Postscript,
IK
Q
Binary coded decimal,
AJ
KA J K Q Q

Decimal,

Q

Random,

K@
Von Neumann integer,

@P ,
X
Column,
X
Genericity,
J

Global,

Public,

J
Client-server,
XAg

Client,
J

Light client,
J
k J

Mail user agent,


YK
Q.@ Yj J J


Macro,
Ag. , J
m ,  ,

, XA
m '@ YJ
Server-side,
XAm '@ J.
Configuration item,
J
  QJ
Element,
QJ
Item,
QJ
P QJ
Picture element,
 P J
Pixels,
H@
 k ,X J
Cluster,

Computer cluster,

G. Ag X J
 @ J
Absolute address,

Address,
@ J
J , m '@ @ J
Domain address, Aj. @ @
 J , Aj @ @ J
Domain address, m '@ @
.






Dot address,
J
K KJ ,
 K @ J
Q@ YK QK @ J
E-mail address,

G

.
Electronic mail address,
YK
QK. @ J
Q@

G
IP Address,
K
@ @ J
Indirect address,
QAJ. Q
@ J
@ @ J
Internet address,
I K QKB

 J @ J
Logical address,


Machine address,
 @ @ J
Missile address,
pPA@ @ J
Network-address,
J.  @ J
Vertical,


C
J
KA
@ , J KC
Declaration,
CK
.

Outbox,
PXA@ J .
Pack,
J .
 
Turing Machine,
 B@ 
Scientific,



Cryptography,
J
J@

Q
 @
Cryptology,
 
Ethics,
H. @X @ , C
g B@
Flag,


Life science,
ZAJ
k B@
Macrology,
QA @

Bug,


Glitch,
J . KA  , 
 Q J J  K ,
Fiber optics, AJ
B@ HAK

. 
 

Fibre optics,
AJ
B@ HAK
Q. J
JK ,


 @
On all pages,
HAj



 @
On even pages,
J
k. Q@ HAj
On the line,
m '@
Backbone,
XA
Cognitive architecture,
J
@P X@ PA
 PA
Component architecture,
J
K
Domain architecture,
Aj. @ PA
 . @ 
Bit depth,
IJ


Colour depth,
@ @
Depth,



Operations,
HAJ
Child process,
K
JK . J

J
k J

Light-weight process,
P@
Microperation,
QJ
J

Operation,
J

Process,
J

Work in progress,
PAm .' B @ YJ

Watermark,

Fault,
Deep,
Guru,
Non-volatile,
Case insensitive,
Heterogeneous,
Heterogenous,
Incompatible,
Junk,
Non-existant,
Nontrivial,
Nonvolatile,
Not empty,
Not equal to,
Not equal,
Offline,
Sans serif,
Tentative,
Unavailable,
Unchanged,
Unnamed,
Unrestricted,
Unrestricted,
Unspecified,
Unsupported,
Untitled,
Gigabyte,

Y ,

J

P
QK
AJQ

'@ QK QK AJ Q
Qm
. .



Aj.J Q

J Q
Aj
.

@ J Q

A , IJ @Q , A Q

Q
Xk. 

Y JJ. Q

QK
AJ Q

Q
PA

@ XA Q

XA Q

J Q

K
Y Q

E Q

KA

QJ Q

Q
Q

 Q

 Q ,Pm Q
Y J





Pm Q
, YJ
Q

XYm Q

Y Q

Q

J


AK. AJ

IK

Fatal,
Blank,
Empty,
Zero-content,

KA ,hXA

@ Q , PA

PA

, Jj @ PA
Jj @ Q

@ J

j
@ J
Q@ Y@
Physical memory address,
 @

 @ J
Shared-address,
Q
Specific address,
m @ J
Title,
@ J
Addressing,
K J
 K J

KA
Byte addressing,
HAJ
Dot address,

 K @ J , J
 K K J
QAJ Q K J
Indirect addressing,
.


 X@ K J

Multicast addressing,
XYJ @


Physical addressing,
K J

Remote,
YJ
K. ,YK.
X
Return,

Software reliability,
l. AK Q.@

Defect,
I.J


Internal bug,

g@X I.J

Sample,


Paged address,

Gas,
Hair,
Away,
Glue,
Object-orientation,
Object oriented,
Chat room,
Room,
Server room,
Snooze,
Envelope,
Wrapper,
Faulty,

PA


Y
, A
I.KA
 ,Z@Q
, A

J
k. J@ J
Q

J
k. J@
Q
 Q
XPX
Q
XAm '@ Q
ZA @ , 




Q , C

C

Y ,


A J@ J
m' , A J@ m
@ Q
Backspace,
j
, @ Q
Blank,
PA
m , @ Q
Gap,
.

Space,
ZA , Am. , @ Q
 Q
Perspective,
P J , k
.

Cocktail shaker sort,
Cg PQ
Monkey sort,
XQ PQ
Sorting,
I.
KQK ,PQ
Sort,
PQ
AQ
Brush,

Occasion,
J . AJ , Q
Sub,

Q
Branch,
Q
  
Resolve,
g , g , Q
Single,
YK
Q

 ,i
Enabling,
J . ) ZA J
Mosaic,
(
KA

Failure,

Fail,

Chapter,

Umount,

Unmount,

Complete metric space,
A
Q ZA
Hyperspace,

. @QK ZA
Space,
Am. , @ Q ,ZA

Garbage,
K
A K , HC
Native,
Q
h , Q
Pie,
QKA

.




Pragmatic,

K @P X , 
@ ,  

 
Paragraph,
Q
Lossy,
X

System analysis,

g , PA

C
,A , PA

Distance,
A

Field mouse,
m '@ P A
P A
Mouse,
P A
Optical mouse,
J
K
Corrupt,
YA

Abscissa,
A

Apostrophe,
AJ
A

AJ A
Back quote,
 KA


AJ A
Backtick,
 KA


Comma,
A
Decimal point,

Q A
 , A
,A
Distance,
PA
 A
Field separator,
k
Pathname separator,
PA @ @ A
Separator,
A
Whitespace,
A
Actor,
A
Boot virus,
C@ QK
A

Fax,
A
 J
Chad,
HA
 J
Bay,
j
 J
Branch delay slot,
Q J@ J
 j

 j
 A
Card slot,
HA
. J
 J
Hole,
I. K , j
 J
Slot,
j
Open,
iJ
Q K , @ Q , m
Gap,
.


Check,
Y AK , m

Desk check,

.J m

Self-test,

KA  K m

Software audit,
l. AK Q.@ K . AP ,l. AK Q.@ m
Difference,

YK
YJ K. A
Loadable,
J
jJ K. A
Portable,
m , j K. A
 K A
 Z , AJ
Printable,
AJ
.
.
.



Refreshable,
AKC K. A
 QJ J K A
Resizable,
AJ
@

.

Scalable,
YK
YJ K. A
Fatal,
hXA ,KA
 K QB @ ) lk. . AK PPA
Firebottle,

HA


( A @

Player,
I.B , PA

News reader,
PAJ.k B@ ZPA
 ZPA
Screen reader,
A @
Denominator,
A
Divisor,
A

Base,
A @ , YA
Q  YA
Codebase,

K. YA
 KAJ
Database,
HA
YA

Decision support database, HA
 X HA
 X

K. YA ,P@Q@
 KAJ
P@Q@

K. YA
 KAJ
Decision support database,
HA
 X HA
 X
YA ,P@Q@

P@Q@

YA
Deductive database,
HAJ

J
k. AJJ @





Desktop database,
i HAKAJ
K. YA
I.J @
 HA

K. YA
 KAJ
Distributed database, P
Docking station,
I.J
QK YA
K KA
J@ YA
Eighty-twenty rule,
Q
   KAJ

K. YA
Functional database, , J
K@ Q@ HA

K. YA
 KAJ
J
@X HA

K. YA
 KAJ
Functional database,
, J
@X HA

K. YA
 KAJ
J
K@ Q@ HA
Extensible,

Decode,
Decompress,
Decryption,
Decrypt,
Deinstallation,
Demodulate,
Disassemble,
Disassembly,
Unzip,
Philosophy,
Index,
Overhead,
Computer virus,
Virus,
Overclocking,
Overflow,
Elephant,
Outside,
Mice,
Category,
Concrete class,
Core class,
Derived class,
Protocol class 0,
Subclass,

Q 
QK

Q
 

J
J@
 P@ , I


J.J@ @
I

J.J@ 
 ,K Q@

K Q@


g@ ,

g ,
@



Q


GA

G. Ag Q

Q

J
KAJ
@ J

J

J

h. PAg ,h. PAm '@

@ Q
J
XYm J
. J
J
JAK
 J
 J
A J J
K
Q

JQ J

Portability,
Scalability,
Computable,
Countable,
Embeddable,
Embeddable,

 J J
K. A
J@ J
K. A
I.
jJ K. A
X@YJ K. A
K A
Q K. A ,PAC
.


PAC K. A ,Q K. A

 A
Mailing list,
 A
Menu,
 A

Numbered List,
 Q  A
   A
Pop-down menu,
Y
 Y A K)  JJ ,(... t '@  A
Popup,
.

TODO List,
A @  A
 
 X B@
Tool menu,
H@
A

Stand alone,
K@ YK. 'A 
Plug and play,
J
  .
J 
P A@
Mouse grab,
.


Catch-all-entry,
g@Y @ J.
Grab,
J . 
 
Caret,
J
.

Circumflex,
J.
Accept,
J.
. J
Kill app,
l. AKQK
Kill,
J
PY
Capability,
 m '@ PY
Serviceability,
Y
Old,
'
Y
Z@Q
Read,

Monkey up,
B XQ
 ,XQ
Monkey, scratch,


Pirate,
AQ

Software pirate,
l. @Q.@ AQ

Piracy,
JQ

Software piracy,
l. @Q.@ JQ
Compact disc,
l. Y Q

Digital versatile disc,
PAK.
P Q
Disc,
Q
Q
Diskette,
Q
Disk,
Q

Lazy list,

K
YK
QK.


K.
 KAJ
K
Qm. HA


X HAJ

PA

K.
 KAJ
HA

YA
YA
Intelligent database,
YA
Knowledge base,
YA
Network database,
 @
J
.

K. YA
 KAJ
Object-oriented database,
HA

J
 KA


K. YA
 KAJ
Operational database, J
HA


K. YA
 KAJ
Relational database, J
AJ.KP@ HA
YA
Rule,
Q
J. I.A
Macroblock,

Message block,
AQ@
I.A
Template,
I.A

K. A
 KAJ
Data dictionary,
HA
Dictionary,
A
 k
 , HAJ



K KA 
Legalese,
HAJ
Canonicity,
J
K KA 
KA 
Canonical,

G
KA 
Legal,

G
KA 
Computer law,
H. Ag
KA 
Law,

. jJ@  A
Access control list,
XA JAK
 A
Cascaded list,
k. PY

 P AJ
k  A
Checkbox menu, Q
 AK K. Q H@

Clip list,
HAA
  A
  P AJk  A
Context-sensitive menu, QK AJ H@


AJ
AK.


 P AJ
k  A
Contextual menu,
J
AJ
H@
J@  A
Distribution list,
K
P



Doubly linked list, 
Q@
 A
   A
Drop-down menu,
Y
J@  A
Flowchart,
 Y
 KA   A
Hotlist,

Hierarchical database,

Sector,
Droplets,
Diagonal,
Diameter,
Region,
Code segment,
Data segment,
Segment,
Disconnect,
Never,
Data glove,
Jumper,
Jump,
Card cage,
Lock,
Screen lock,
Invert Selection,
Light pen,
Pen,
Say,
Junk,
Bit mask,
Clip mask,
Mask,
Netmask,
Network mask,
Subnet mask,
Alpha channel,
Channel,
Data channel,
Secure channel,
Mail bomb,
Grammar,

J .  ,A
 Q
H@

Q

Q

@ ,Q
Q 
 
 

K.
 KAJ
HA
 

A@ 

@YK. @ ,

K. PA 
 KAJ
HA
A , PA 
.' ,Q 
PAm
 
 A
HA
.

 
A @
@ I
PAJ
JkB
. 

J
k


 
I.J
@Q , A Q
, A
 . @ AJ 
IJ
  AJ 
A
H. Am.k ,AJ 

 @
J
.  AJ
 @

J
.  AJ
J
 @

J
Q@
.  AJ
A @ AJ 
AJ 

J.@ AJ 
 KAJ
HA

J @ AJ 
 J 
K
YK
QK. J
.
Y@

Fixed disk,
Floppy disk,
Floptical,
Hard disk,
Hard drive,
Live CD,
Local disk,
Logical disk,
Magnetic disk,
Magneto-optical disk,
Minifloppy,
Multihost disk,
Root disk,
Scratch disk,
Zip Drive,
Pumpking,
Constraint,
Divide,
Division by zero,
Division,
Partition,
Quotient,
Section,
Severity,
Authentication ticket,
Clip art,
Clipart,
Malfunction,
Cut and paste,
Cut,
Nibble,
Hard sector,

I. J Q
Q
Q
Q
Q

K
 . AK Q
IK
I. Q

k Q


m Q
 J Q

J
AJ Q
J
AJ Q

Q.


Q
Q Q

J
@ XYJ Q
Q

P Yg
.

 . Qk Q
I Q
Q
YJ
 ,Q
 


 
Q
 



(H. AJ) H. AK. , 
Y , 
 J
 
A JJ
@

A
 
J
J A
P
 
@


I. A


m 
KA J K

AJ


KA

KA
Context object,

Object,
KA

 KA
Shared object,
Q
'@) Ag

 ,( Qk)
Q.
Case (font),
( Qm
Q
J.K ,Q  .
Zoom in,
Cable modem,
X @ J.
Cable,
J.
Coax,
Pj @ YjJ J.
Dynamic typing,
J
J
AJK
X K . AJ
 K AJ , K AJ
Overwrite,
J

.
.






Overwrite,
K. AJ , J
K. AJ
K . AJ
Packet writing,
 Qm '@ K . AJ ,  PQ@
K . AJ ,  Qm '@ K . AJ
Packet writing,
 PQ@

Scenario,
( )
YD K . AJ
Book,
H. AJ
Docbook,
J
KJ@ H. AJ
Catalog,
XQ ,h. AJ
Protected workbooks,
J
m I.J
Block (unit),
 J
Boot block,
C@  J
 
Cache block,
AJ.m J
File control block,
jJ@ Q@ X  J
AK

HA
.

Mute,

 Q
 , I.
J
Brochure,
@
Handbook,
I.
J
Defect density,
@ A J
 XQ A J
Double density,
k
.
 Q

Brochure,
I.
J , @

Workbook,
@Q
Junk,
A Q
, I.J
@Q
Q
Sphere,
Binary large object,

A @ I.@

Parentheses,
A
Arc,

Bracket,

Left bracket,
(
)PA

Right bracket,
(
)JJ


Square bracket,
K. Q 
Brute force,
J
A 
PY@
 ,
Power,
Leading,

J
KP ,
XAJ

Benchmark,
Z@XB@ AJ

 K AJ
Complexity measure,
Y


Dimension,
YK. ,AJ

Measurement,
AJ

Measure,
AJ


Chain,

,YJ

Constraint,
Q ,YJ

, J K@ X J
 
Eigenvalue,
(
G@ X) Q 
P Yg
.




 
Hack value,
A@ J



Modal (value),

j.jJ@ J

XQm '@ J
 
Salvage,


Value,
J

 
Comma separated values,

@K .
Values,


Reserved blocks,

Detective,
Sufficient,
Camera,
Web cam,
Full,


A

A
QA
J
J. QA
A


,p
CORBA,
AK. P

Console,


Entity,
AJ
KDE,

YJ

Arbitrary,


AK. J

Kilobyte,
IK
 . J

Kilobits per second,


J
KA J@
IK
 . J

Kilobit,
IK
Kilobaud,
XK. J

QJ

Kilometer,
Kilo-,
J


  K J
Kiloflops,
J
KA J@  A

Computational organochemistry,
ZAJJ

JK Ag K


Kiosk,

NO-DAEMON,
Suffix,
Nonlinear,
Wireless,
Scratch,
Player,
Banner,
Asymmetric,
Lambda,
Drop-down list,
Drop-down list,
List,
Recipe,
Scrollable list,

k
.B
kB


 kB

B
ZB
K
@YK. ,.(Q)

 ,I.B
PA

JB

Q AJ JB
@YB
m' B , @Y@ m ' B
 
Y
  m ' B
m ' B , Y
@Y@
m ' B
, K Qm ' m ' B


Q
 A m ' B
K
.

 Q


Bullet,
AP
,X@YK K
Q
Heuristic,
J
.
Q
Fragment,

Break,
Q
Fraction,
Q
Laziness,


Fractal,

P

Monkey, scratch,
XQ ,
 
Autodetect,

@



Collision detection,
HAXA


Demodulate,

K Q@ ,
K Q@

Demodulation,

K Q@

Detect,


Cookie,


Cost,


Keywords,
J
kAJ HA

Words,
HA


Key word,
J
A @

Keyword in context,
J
kAJ
 @
AJ
 


Keyword,
J
kAJ

Passcode,
PJ.@


Password,
Q

Word,
QJ :


Macro,

, J
m , 


Every,

Accessory,

A




   
Digital camera, J
P QK
 @ , J
P Q
Completeness,

Amount,
J

Quantity,
J

Alias,
J
J
Slashed Cross,

J @  j J 

Machine code,
 B@ 

Machine language,
 B@ 
 Q 
Metalanguage,

Natural language,
J
J
J. 
Object-oriented language,
J
Q 
J
k. J@
Procedural language,
J
K@ Qk. @ 
Programming language,
m . QK. 

Pure functional language,
J
J


J
A

Purely functional language,
J
J


.

A
Second generation language,
J
m. '@ 

GA J@
 
System programming language, m. QK.
A J@
,
Literal,

Qk
@ YJ

SC/XSpread,
h. @QkB


Scroll,

 
Screenshot,
A 
 J ,
Haptic,
AK.

Concatenate,

Message board,
A  J@ HAg

Board,
k

CDE panel,

 m' k


Clip board,
HAA
 k

Colour palette,
@ @ k
 k

Daughterboard,
J


Editor panel,
PQj @ k

Keyboard,
iJ
KA k

Main board,
J

KP k

Mainboard,
J

KP k
Low-level language,

Antisymmetric,

KAJ

QA J K
Q K

@

E

YK. @ ,
KA
E

KA

k. P
. ,Yg @
YK

Yg @ B , YK
. ,Z


B
Asymmetrical,
B
Asynchronous,
B
B
Endless,
Infinite,
B
Non parity,
B
None,
B
None,
B
No,
B

Core,
I.
Q
Functional requirements,
, J
J

CJ
J
J


Tab,
A

Glue,
Z@Q , A
Label,
J

 g , J
Nice,


Game,
J.


Assembly language,
J
J
m.' 
Computer language,
H. Am '@ 
Coordination language,
J
 K 
Database query language,
CJ@ 

J.@ Y@
 KAJ
HA
Declarative language,
K
QK
Q K 
Domain-specific language,
XYm Am. 


First generation language, B @ J
m. '@
Fourth generation language,
J
m. '@ 
K. @Q@

Functional language,
J
J

Functional programming language,



m . QK.
J
J

High-level language,
J @ J
A 
Imperative language,
K
PAJ.k. @ 
Language,




kQ
@ , IjJ.

Default,

KYJ
.

Embosser,
Y m. , m. ,P Q .
 Im
 ' lQ. .
Contract programmer,
Y
Programmer,
lQ. .

Scheduler,
Ym. , Yg
. lQ. .
lQ
 B@
Systems programmer,

. .

Obsolete,
Q , J .
Mantainer,
J .
Fuzzy,

G. AJ. ,D.

J.
Connected graph,
J AJ

J.
Connected subgraph,
J
Q AJ

J.
Graph,
AJ
Destructor,
J ,YJ
J.
 J
J.
Screen blanker,
A @
 AJ
Continuation,
A@ ,(@ X m . QK.) K
.


P@QJ@ ,( @X)
 AJ
Continue,
K
.


Context-sensitive,
AJ
AK. QK AJ

Business to business, 
K. Qk. AJ
. ,I. AJ
Ready,
QAg

Accessible,
hAJ
Residual,

J . J
Sequence,
J
AJJ
J
Homogeneous,
Aj
.

Homogenous,
Aj.J

Dealer,
Qj.J
Sense,
Ak@ , j.J
Vector,
j.J
Coaxial,
Pj @ YjJ
J
Museum,
j

Cache controller,
AJ.m jJ
Controller,
jJ
Dissertation,


@ @ k

k
 h

k. AJJ @

h
 Q@ h
A J@ h

'PA


ZCB @
P Q 

J J

Palette,
Panel,
Deductive tableau,
Pane,
Scroll pane,
System board,
Logarithm,
Color,
Colour,
Fillcolor,
Laser,
Linux,

XAJ , XA

Gated,
K . @K. Q. PA

Deadlock,
 P @ , P A
Carrier scanner,
@k m  A
Scanner,
m  A
@ A
Placeholder,
A
Macros,
QA
Malta,
AA
Owner,
A
Financial,

A

Optimized,
J A

Italic,
KA
J ,KA

Oblique,
Qj
Water,
ZA




Implicit type conversion, ,  K XAJ.

 K K
m'

Permutation,
XAJ
.

Spacing,
YAJ.
JJ.
Newbie,
Y
Material,

 XYJ
CB@

 @
Multiple value,
J

XYJ
Multiplexer,
APB @ XYJ
Multiple,
XYJ
Multiprocessing,
Z@Qk. B@ XYJ
Multiprocessor,
l. 'A @ XYJ

Polymorphic,
A B@ XYJ
Transitive,
K
YJ
 J
Haptic,
, AK.
Q
J
Class variable,
J
Environment variable,
J
K. Q
J
Global variable,

Q
J
Q
J
Member variable,

Q
J
Variable,
 J QJ J
Logic variable,
J



  J , J
 J
Free variable,
Qk

  J
Free variable,
J

 J ,Qk

Generic type variable,


J@

 J
Local variable,

m
 J
Advanced,
Y J
  
Crisp,

J
Discrete,
J , J
Mutually recursive,
XAJ.J PQJ
Destructor,
YJ
J. , J
Stretched,
XY ,XYJ
Proportional,

.AJ K , I.AJ J

Symmetric,
Q AJ J
Paradox,
  AJ J
Finite,

AJ J

Bounded,
X Y m , AJ J
  J
Eyedropper,
Ag. , I
Miscellaneous,
J J

Body,
Multiple boot,

jJ
Q

Network interface controller, k. @ jJ
 @
J
.
Specialized,
j J
 J
Grey-scale,

XAQ@ PY
Q
Q , X@
Synonym,
X@
 Q  k. Q
Byte compiler,
J
KA
 Q  k. Q
Byte-code compiler,
J
KA
Compiler compiler,
k. Q k. Q
Obsolete,
J . , Q
Metric,

Q
Q
Meter,
Micrometre,
QJ
Q
Q 
Concurrent,
 @ Q , @
Q 
Synchronous,
@
 
Bit pattern,
J
KA J K
Serial,

J
Browser,
i

 @
Web browser,
J
.  J
 J
Continuous,
,@J ,(k , @X)
QJ
Online,
J
Volatile,
QK
AJ
CJ
Functional requirements,
, J
J

Q
J
J


 . J
Operational requirements, , J
HAJ
 . AJ
Jk@
J
HAg
Requirement,
h. AJ
Jk@ ,I.J
Orthogonal,
Y AJ
 J @ XYJ
Cross-platform,
HA
 @ XYJ
Multiboot,
CB


Multibyte,
IK
AJ.@ XYJ
 XYJ
Multipart,
AB@
Microcontroller,

XQm .
Plain,
() XQm.
Conduit,
Qm.
Embosser,
m. ,Y m.
Embosser,
P Q . , Y m. , m.
Sensor,
 m .

Folder,
Ym.
Sub folder,

Q Ym.
Electronic magazine,
J
K Q@ m .

Magazine,
m.

Public directory,

m.
 m.
Aggregator,



Assembler,
m.
 @ m.
Connection pool,
HBA
Native compiler,
Q m.

Aggregate,
m .
 .
Newsgroups,
K
PAJ.k@ HAm

@ m

Character set,
Qk
.




'
Chip set,
l @Q m.

Closed set,
 m
.

Collection,
m.


K. m
 KAJ
Data set,
HA
.





. m. , H@Q
m.' m.
Device group, PAk

 , PAk
 Q 
m.' m
Device group, H@
. . m.
 ,  A J K m

Discussion group,
m
.
.

XAm. '
 , XAm' m

Discussion group,
m
.
.
.
 A J K
 @X @ m

Disk device group,
Q@
.

 . h. , m.
Group,
HAm

Lower set,
GX @ m
 .

News group,
PAJ.k @ m.

Newsgroup,
PAJ.k @ m
.
Abstract,


C B@

C B@


K
P @J
Parallelogram,

P@ J
Parallel,
P @J
Continuous,
(k ,@J
Backward compatible,
AJ
g  @ J
Compatible,
 @ J
Correspondent,
'@ ,'@ J
Involved,
PJ
Average,
J
 J
Intermediate,

Mean,
J

, J
@ J
Reachable,
J
@ @
J
Available,
Q
 J@ I 

 J
,( AJ
J)
Paused,
J

 ,G@ X I

Q 
I
Eigenvector,

 ,Q 
I

Eigenvector,

G@ X I
Ideal,

AJ
Example,
AJ
 . AK ,iJ
jJ@ IK
 . AK , I
 . J
Fixed, iJ
J@ IK
 . J
 , K
@ I
Identifier,
Q
 . J
Installer,
I


Like this,
@ Y J
Like,
J
Double-duplex,
h. XQ
J J
Dual-homed,
Q  @ J
 '. HBAm
 .
Search Domains,
Im
@ Am
 @
Criteria range,
HA
.

Lifted domain,
Q Am.
Space,
@ Q ,Am.
Adjacent,
PAm.

. ,Ym.
Schedueler,
Yg
. l. AKQK

Scheduler,
Yg
. lQ. . ,Ym.
Parallelograms,

J . PQm

@
Language-sensitive editor,
Ak PQm


Line editor,

k  PQm

J@ PQm
Linkage editor,
HCJ
 PQm
Screen editor,
A @

Character,
Qm

Char,
Qm

Dingbat,

J
K
Q K Qm

Escape character,
m '@ Qm

Drive,
@Q @ Qm
Engine,
Qm

@ @Q B@ Qm
Floppy disk drive,
KQ
 '. Qm
Search engine,
Im
 , , m
Physical,
Xk. @
J
k
J@ ,Qm
Memorandum,
PAj



Memo,
QY ,Qm

Work station,
m

Workstation,
m

Circular buffer,

PX m
 m '@
m
Copyrighted,

 k
 ,
 m '@
m
Copyright,
QJ@
Criterion,
m
Data communications analyst,
m

@ HC@

HAJ

YA m
Database analyst,
HAJ
Lexical analyser,

m
Protocol analyser,
@Q m
KA m
Cationic cocktail,

GJ

Locale,
J
m
Local,

 m
Parser,
H. Q , m
Language-based editor,

Work group,
Workgroup,
Periodic group,
Sum (noun),
Sum,
Anonymous,
Unknown,
Conversation,
Alignment,
Align,
Justification,
Left-justify,
Right-justify,
Vertical Alignment,
Justified,
Emulate,
Emulation,
Simulated annealing,
Simulation,
Emulator,
Logic emulator,
Attempt,
Content,
Executable content,
Command Prompt,
Login prompt,
Prompt,
Locator,
User defined,
Bounded,
Delimiter,
Desktop publisher,
Editor,


m
.

m.

PX m.
m.
g. ,m.
B@ m.
m.
KXAm
@ XAm
@ XAm
@ XAm
PA
@ XAm

J
@ XAm

XA @ XAm
XAm
AAm
AAm
K
YJ@ AAm
AAm

Am
 J Am


Am
Jm

YJ
J K Jm

Q@ @ Im

h. @ Im

Im
@ @ XYm
XYm
Yj J @


AJ J ,X Y m

Ym
I.J @ i PQm
 m
PQ

Q 
QK m

PAm

Color map,
@ B@ m

Colormap,
@ @ m

Q k .  m
Flow chart,
AK
. m
Gantt Chart,
I KAg
Schema,
m
 k ,m
Scheme,

Chat script,
KXAm m
Directed graph,
k. m

m
Maintainer script,
K  m

J.@  Y
 KAJ
Data flow diagram,
HA
Hidden,
. Jm ,
m
 , ,m
Disconnected,


Color chooser,
@ @ Q 
m
@ P@Y
Low earth orbit,
j J
P
(A KPB @)
Handler,
@Y

Entry,
 gY

Back door,
A J
Q gY

Inserted,
h. Y ,gY


Histogram, jJ
 GAJ
K. P , P@QK h. PY


Spell checker,

KC@  Y
Compact,
l. Y
Integral,
l. Y
, h Y
Inserted,
gY
.




Average seek time,
J Im '. Y

Duration,
@ X ,  Y
Y
Tilde,
Round,
PY

Blog,
K Y
Administrator,
QK
Y
Admin,
QK
Y
Character encoding scheme,

@ m
Bootloader,
C@ m
Bootstrap loader,
C@ m
Lilo,
JJ
m

Link loader,
HC
m
Handheld,
YJ
AK. m
Portable,
j K. A ,m
Protected,

m
Axial,

Pm
Axis,
Pm
X-axis,

J
Pm
Y-axis,

XA Pm
Z-axis,

J
Pm

Number Converter,
AP B@ m
Clear,
m
Protocol converter,
A J
m
Contour,
J
m

Desktop environment, I
. J @ i J
m
Development environment,
QK
J@ J
m


Macro,

, J
m
 P Jm
Run-time environment, J
 





Backside cache,

g AJ.m

Cache memory,
AJ.m
Hidden,

m , . Jm
Shortcut,
QJm
Cone,
Qm

Q m
Data warehouse,
HAJ
JJ ,( Q m
Format (noun),
)




Format (verb),
) JJ
E ,( Q m
Q m
Z-buffer,
I.KQ I 
m
Descender,
. A ,
Custom,
m
 m
 A@

VFS,
. K . AJ K
. Y HA

Autoloader,

 @ HAK
 . Q
kA

Bounding box,
Ag@
K. Q
 J
,K. Q
Box,
Y
Combo box,
XQ QK
Qm' K. Q
Combobox,
I.Q K. Q
Dialog box,
P@k K. Q
Rounded square,
PY K. Q
Square,
K. Q

,I.KQ
Sorted,
PQ
High,
A , KQ
  J k Q
Referential transparency, , J
A@

.
J
k. Q J
A 


Carriage return, ,( Qm) Q@ @ k. Q

Q@ @ k. P
Reference,
k Q
.
Hello, world,
A@ AE
@ ,AJ.kQ
Repeater,
XXQ




Airbrush,
AJ. X@ XQ
Instant messenger,

P AQ
Messenger,
AQ
Addressee,
J
@ Q
Sender,
Q
Filter,
l  Q
Mail filter,
YK
QK. lQ

Wizard,
YQ

Attachment,
 Q
Q@ YK QK  Q

Email attachement,

.

Q
Refutable,


Q
Rejected,


Monitor,
H. AQ
I.Q , AK. P , AK. P I.Q
Qword,

 P @
QAJ K
.
Area grid,

YA QK Y

HAJ

K. YA QK
Y
 KAJ
Database manager,
HA

J.@ QQ
 KAJ
QK
Y
Datacenter manager,
HA
Manager,
QK
Y


System administrator,
AJ@ QK
Y
 QK Y
Web master,


Webmaster,
QK
Y
Range,
Y

Flavor,
, @ Y

Memo,
Qm , QY
 @Q
Q  k
Code walk,
.

Revision,
k. @Q

 @Q


Spellcheck,
Jj.D@ k
.



Synonym,
X@Q , X@Q
Contact,
@Q


Education contact, , K. QK @Q

K. Q@ Jj. @
Protocols,
@Q
Q  ,  @ Q
Concurrent,
@
J @ Q , AK

Qm. '@ J . @ Q
Flow control,
 Y@
.
J @ Q

Qm. '@ J . @ Q ,  Y@
Flow control,
AK
.


Job control,
@ J.@ Q
J . @ Q
Remote monitoring,
YK.
Watch,
J . @ Q
Bus watcher,
A J@ I.@ Q
 I@ Q
Disk controller,
Q@
.



Port monitor,
YJ @ I.@ Q
Resource monitor,
XP@ @ I.@ Q
 @

Sniffer,
J
.  I.@Q
 @Q
Mirror,
 K @Q
Disk mirroring,
Q@

Anchor,
. Q
Database administrator,


@ J kA

Q@ Y@

B@ kA
 @ kA

AJ
.

kA

J
J.J@ kA

@ kA
 PA


K. PA
 KAJ
HA
Q PA
YK
Q.@ PA
PA

. PA
i @ PA
PA
YA
J
Q K , YA
X , YA
YA

A , A


J.@
 KAJ
A
HA

( m . QK.) 
J
K  A

A
A
X A , A

I.J , J
j
E Yj J

KA
Yj J

PA 
 , IJ
J
j
.



Q Q
J


J


Memory address space,


Namespace,
Print area,
Surface,
Text area,
Workspace,
Absolute path,
Data path,
Disk path,
Mail path,
Path,
Relative path,
Scan path,
URL,
Help,
Promote,
Support,
Assistant,
Distance,
Data driven,
Assignment problem,
Contribution,
Contributor,
Equal,
Impossible,
End-user,
User,
Consultant,
Impossible,
Unknown host,
Rectangle,

Qword,

 P @
I.Q , QAJ K
.

AK. P ,

I.Q

AK. P
 Q
Concentrator,
Q


Accumulator,
Q

Codec,
PAQ

Floppy,
Q
Q
Instance,
Q , Yg@ Q
One-Time,
Yg@ Q , Q
One-Time,
P A  PQ
Mouse-over,


 X J
KQ
Broadcast quality video, Xk. H@
J
@ X@


J
KQ
Compressed video,


Video,
J
KQ
 '@ A KQ

Full-motion video,
Qm


Visible,

KQ
Removable,
@Q
Q
Synchronize,
J@
Q
Sync,
J@
Blending,
h. Q

Double-precision,
Y@ h. XQ

Dual head,
@Q@ h. XQ


, Y@
Dual-stack, @ h. XQ
h. XQ


, @
Dual-stack, Y@ h. XQ
h. XQ
Dual,
h. XQ
Duplex,
h. X Q
 Q
Farm,
P
 

Service provider, Yg Q , Yj K . X Q

@
I K QKB

Increment,
? YK
Q

Workspaces,
HAgA

Closed surface,
 kA
kA

Free space,
PA


@  K Q
HAJ
Bit plane,
J
KA J K i
Flat,
i
Q
Ruler,
Formal parameter,


Named,


Draft,
X


Disc drive,
Q



Disk drive,
Q

Hard disk drive,
I. Q

Magnetic tape drive,

Q

J
AJ

Responsible,


Schedule manager,
J , Yg
.


Yg
.


Participants,
PA

Public domain,
A

Networked,
I.

Share,
D ,Q
   
Cellular automata,
K
g J
@ HC
J
  
Automaton,

@ J



Cellular automaton,

g
@ J

Derivative,
 J
Derived,
 J

Moderator,
Q
Modal,
Q
Project,
Q

Strikethrough,
k JK
, H.

Actuator,


Application Launcher,
J
J.J@

Driver,

Q 

Floppy drive,
Q
 @

Network operator,
J
. 
Data transfer bus,

@ J J
,Aj.B
.
@ J@
J J

. 



Forward compatible,
, @J@ J.J
@
J J
Aj.B

.

 J
Context-free,
AJ
@

Independent,
 J

Deliverable,
J
 J ,QJ
Continuous,
,(k , @X)
@J
Persistent,
QJ

Document,
YJ 

White paper,

 K YJ 
Clone,
pA J@ ,q J
Packet sniffer,
 Qm '@    J
Repository,
XJ
Access level,
XA J@ J

@ J
Data link level,
HAJ

Interrupt priority level,
K
@ J
@
A KB

@ J
Knowledge level,
Q
Level,
J
Run level,
J
  J
Switch level,
Yg@ J

K. j.
 KAJ
Data logger,
HA
Registry,
j.
Boundary scan,

XYg i
Erase,
i
Multiscan,
XYJ i
Scan,
i
Catalog,
h. AJ ,XQ
XQ
Character repertoire,
PAm

Accelerator,
Q



Graphics accelerator,

GAJ
K. Q
Forward compatible,

Add-in,
Value-added,
Factorial,
Compressed,
Polygon,
Built-in,
Embedded,
Multiplexed,
Host,
Local host,
Localhost,
Mail host,
Slow terminals,
Printed,
Display terminal,
Dumb Terminal,
Intelligent terminal,
Point of sale terminal,
Absolute,
Launcher,
Verbose,
Developer,
Aspect,
Viewer,
Difference equation,
Equalizer,
Equal,
Background processing,
Batch processing,
Cellular multiprocessing,
Concurrent processing,
Data processing,


A

 @
J

A

H. Q










, 
A

J

m J

m J


YK
QK. J

JJ
. P A
J.
@ Q
Q
J @ Q

X @ Q
  K @ Q
J
K.
 
 )
( J

( )
 

I.J

P

Q
Q
 XA

PA
X A
A ,X A
J m '@ m 'A

.

m 'A
HAYAK
. .
XYJ m 'A
.
K
g
 A J m 'A

.


 KAJ
J.@ m. 'A
HA




Encrypted,
Q


Decision problem,
P@Q
 K


 ,

Halting problem,

A K
@


 , A K
@

Halting problem,



K


Knapsack problem,
J . J
m '@

Post office problem,
YK
Q.@ I.J

Problem,


Suspicious,
J


K. PXA
 KAJ
Local data sources,
J
m HA

Approved,
J
XA

Formatted,

, A
Exporting,
PY

Open source,
hJ PY
Source,
PY
Faulty,
,Y

Compiler,
Q
 . @ XQ , IjJ
 . @ i
Search term, IjJ
Term,
i
Q

Thumbnail,

Beeper,
Q



Array,



Associative array,
J
. @QK 



Matrix,

Factory,
,J


Maintainer,

 Q
XA
Anti virus,
HA

 Q
XA
Antivirus,
HA


Replication,
P@QK , A


Double,
A

, A


Multiplexed,
Busy,

J
j.

 Y
H@
XAJ.@ Y
 . @ Y
IJ

J.@  K Y
 KAJ
HA


J.@  K Y
 KAJ
HA
PAB @ Y
K AB@ Y
.


B@ i @ Y

YjJ@ Y
IK

JB @ Y
AJ

 P AB
 @ Y
H@

Opaque,
Dumb,
Lexicon,
Equipment,
Baud rate,
Bit rate,
Data rate,
Data transfer rate,
Frame rate,
Hit rate,
Horizontal scan rate,
Refresh rate,
Sampling rate,
Signalling rate,

)
Gold,

( Y)

I. Y@

Metal,
Counted,
Rate,
Sample rate,
Liquid crystal display,
Passive matrix display,
Parser,
Gallery,
Contact (noun),
Knowledge,
Character set identifier,
Generic identifier,
Process identifier,


Y
XY

Q , Y


JB @ Y
AJ


J.@ KA
@Q

X @ Q



.
m ,H. Q

Q

Q

Q

 Q
PAm

Q

Z@Qk. B@ Q


Am '@
P@


m . 'A
Image processing,
m . 'A
Natural language processing,
m . 'A
J
J
J.
Parallel processing,
Z@Qk. @ , K
P@ J m . 'A
P@ J
Pipeline processing,
K
XP@K m . 'A


Sequential processing, YJ
J K , J
AJJ m. 'A

AJJ


Symmetric multiprocessing, XYJ m. 'A
 Jm

Word processing,
HA@
m . 'A
 X l. 'A
Batcher,
HA
CPU,
l. 'A
Coprocessor,
YA l. 'A

Front-end processor, AC J
l. 'A
Q
J. l. 'A
Macro processor,
Microprocesor,
QJ
l. 'A
Microprocessor,
QJ
l. 'A
Parallel processor,
P@ J l. 'A

 B@
Post Processor,
H@Yg
l . 'A


Preprocessor,

J. l. 'A ,
YJ
l. 'A
Preprocessor,

YJ
 l. 'A ,
J . l. 'A
Processor,
l. 'A
Word processor,
 l. 'A
Coefficient,
A


Factor of proportion,
I.AJK A
Operand,
A
Parameter,
A
 A
Scaling Factor,
AJ
@
XA
Recursion,
Preview,
JK
A
Q.
Cross-over,
Error handling,

PXA

Enclosure,

Off,

Q
J

Modified,
Q
J

Modifier,
Soft keys,
jJ@ iJ
KA
. hA
Partial key,

K Qk
Arrow key,
D@ hAJ

Candidate key,
l Q hAJ
hAJ
Character key,

Qm
Clover key,
K hAJ

Command key,
Q @ hAJ

I. Q hAJ
Compound key,
Concatenated key,
hAJ
Diamond key,

A hAJ
XP@ hAJ
 JJ AK. Ag)
Flower key, (
hAJ
Function key,
J

Key (Lock),
hAJ

Meta key,
@ hAJ
Mnemonic key,

Q
Y K hAJ
Q
J
hAJ
Modifier key,

. B@
Multi-part key,
Z@Qk
XYJ hAJ
Private key,

Q hAJ
hAJ
Propeller key,
@X
hAJ
Public key,

Secondary key,

GA K hAJ
hAJ
Shortcut key,
PAJkB@
hAJ
Space bar,
@ Q@
hAJ
Spacebar,
@ Q@
Mail exploder,
YK
Q.@ Qj.
 . @ i , IjJ
 . @ XQ
Search term, IjJ

Sorted,
I.KQ ,PQ
Quit,

A  Q
XP

Yj J @ Q
 Q
m
. 
 . J , Q

K
@ I
P ,H.




( J
A)Ag HAJ



,Y
A


HA

HA

@ HA

@ ,
,
J
m '@
h ,

GA
.
 ,

BX
PAJ
,
PAJ

PAJ

PAJ
,
@ PAJ

@ PAJ
, PAJ

PAJ

PAJ
,PAJ

JJ


j

Uniform Resource Identifier,

User identifier,
Group identifier,
Identifier,
Broken,
Raw data,
Argument,
Datum,
Hair,
Mirrored,
Reversed,
Reverse,
Marked,
Information,
Info,
Metainformation,
Fact,
Factory,
Fontwork,
Meaning,
Significance,
Standard,
Criteria,
De facto standard,
De facto standard,
Norm,
Standard,
Mapped,
Rhombus,
With copy,
With,


AJ



Scale,
,AJ


Bound,
Y J


Host-resident,
J
@


Resident,

Equivalent,
A
 , GA

Positional,


 , A
Place,
kA
 . J
Libraries,
HAJ

@ J . J
Class library,
A J
Library,
J . J
P J . J
Run-time library,

J
 
P J . J
Runtime library,

J
 
I.J
Central office,

QQ
Y J ,IJ
Desk,
.
Post Office,
YK
Q.@ I.J

Dynamically typed,
AJ
J
AJK
X H. J
 J , H J
Handout,
j
.

Condensed,
Qk. , J
Duplicate,
PQ

Q
Microphone,



Angle bracket,
P
Broken,
H. ,P

Cube,
I.

Hypercube,
 KA

Q 
Corpus,

Q 
Thesaurus,


YA J
Database machine,
HAJ

Parallel random access machine, XAK J

P@ J
K@

Component,

Adapter,
J

A K 
Host bus adapter,
J

Modulo,

Interpreter,
Interpreted,
Joint,
Favorite,
Side-effect,
Agenda,
Disconnected,
Screw,
Object file,
Conceptualisation,
Agent,
Compare,
Article,
Firefighting,
Socket,
Binding handle,
Handle (noun),
Quoted,
Proposition,
Network segment,
Quoted,
Read only,
Readable,
World-readable,
Dividend,
Destination,
Goal,
Snippet,
Stack segment,
String,
Disconnected,
Netcafe,


Q



I.j J ,
.

.KAg
Q
 ,
m ,
YK
,
, Q

Q





KPA


A


PAJ@ A

.

AJ.KP@ J .

J .
J ,J

Q Q.  

@P ,h@ @ ,h 


J. J
J
.J ,

 ZQ

ZQ


AJ
A ZQ

D@ l'. P ,

Y
,Y

Y




. m
Pj
Q@



,

I K QK@



, m 'A

Process file,
Z@Qk. @
.
, Z@Qk @

Process file,
m . 'A
.

 
Raster file,

A

 . Qk
Scratch file,



Q @ Y@
Swap file,
K
QA@


Temp file,
I 


Zip file,



Print server,
AJ
.

Virtual server,

QA
Property,
J
Ag , J

Q
Millimeter,
 ,
Physical,
m , Xk. @
J
k

 JK
. , @ YK
Flavorful,





Flavorful,
@ YK.
, JK.

Millisecond,
J
KA K

Autofill,

@ Z
Fill,
Z

 Z
Full screen,
A @
 J@ @ , 
,YJ
Expanded,
A
Stretched,
XYJ ,XY
Proprietary,

Blocked,
J
 Q
B@
Case-sensitive,
Qk
Am 

Q 

Distinct,
Callee,
XAJ
 , J AJ
Occasion,
Q
.

Thread,
 A J
Popup,
(... t '@  A ,  Y A K)  J.J
Pop up,
 J.J
Alarm clock,
J.J
Alarm,
J.J
Product,
i.JJ
Physical file,

K , HA


 kC
H@YQ

Remark,
kC

Navigate,
kC
Navigator,
hC
 J . J@ 
K
C
Megabits per second,

HA
J
KA J@
 P AB @  J
Frame grabber,
H@


Plugin,
j
Salt,
i

Summary,
j

,
Poster,
C@



Files,
HA

. HA

Startup files,
ZYJ.@ l. AKQK


 Y@
Batch file,
HA


Cluster file,
Yk

Control file,
m'

.
Core file,

AK


K. A
 KAJ
Data dictionary file,
HA


Distributed file,
P

Dot file,

 K

Executable file,

YJ
J K

File,

 

Genetic programming file, G@P m. QK.

 
Header file,

Q@

Hidden file,
m

Initialization file,
JJ
E

Local file,

m


Locked file,


Log file,
j.@

Metafile,
@
,Q

Object file,
Q



Permanent file,
'@X
Observations,

 J , IKQ@  @
 J

 PY@  @
k
.

J
Fuzzy logic,

G. AJ.
 J
Intuitionistic logic,

E
YK.
 J
Linear logic,
k
 J
Logic,

Look,
Q J
 @ ,
 J
Organization,
Q
 J
Org,

Organizer,
J

Schedule manager,

 , Yg
. J

Yg
.




Sequencer,
K. AJJ@ J

Window manager,
Y @ J@ J
 Q ,P J
Perspective,
k
.
J
Isolated,
XQ J , Q
P@ J Y J
Enhanced parallel port, YJ

Ephemeral port,

Y J
Parallel port,

P@ J Y J
Port,
Y J
 @ Y J
Printer port,
AJ
.
Registered port,
j. Y J

Serial port,

 Y J
Y J
Viewport,
Q@

Well-known port,
Q
Y J
J ,XQ J
Isolated,
Q
Discrete,
 J , J

Dataless management utility, Q
K. YK J

@
J
Ag
HAJ
Relay,
K
YK. ,A J

Debugger,
i J

Dotted,
 J
First-order logic,

,I.j J
Forum,
YJJ
Regular,
JJ
Selection,
 JJ
Backend,

g DJ
. h JJ
Coproduct,

.KAg
.

J

Partial,

KQk. , PAj
J
, Qj
Oblique,
KA
J
Curve,
J
Jj
J
Bell curve,

Qk. j
 J
Handout,
H. J , j
Low,
j J
Lurker,
YJ
Since,
Y J
Rank,
 Q 
Home,
Q 
 
PQK
. A
Demand driven,
 J
Platform,

Desk,
I.J , Y J
 J
Area,

 J
Drawing Area,
Q@ 
 J
High memory area,
J
A Q@ X 
 J
Low memory area,
 j J Q@ X 
 J
Work area,

 J
Boolean,

 J
Logical,

 J
Q K B
Asynchronous logic,

@
 J
Classical logic,

YJ
 K
 J
Combinatory logic,

 @ K
 
Digital logic,
J Q@
J

 , k
 PY@  @
 J
First-order logic, J
.


I.
KQ@
 @
Favorite,


Q
K AK ,QK

Documentor,
 K
.
Condensed,
J ,Qk
Connection-oriented,
ABAK. k.
Router,
k.



Continuous wave,
J k
.

Wave,
k.
Existing,
Xk.
Exist,

k ,Xk.
Modem,
X
Generic resource,

XP
Global resource,

XP
Parallel resource,
P @J XP
Resource,
XP


Scalable resource, XP , AJ
@ XP
J
Q K A

.




Scalable resource, XP , J
Q K. A XP

 
AJ
@


Inherited,
HP

Distributed,
P

Distributor,
P

Hub,
P

Postmaster,
YK
Q.@ P

Switching hub,
K
YJ.K P

Foundation,

AK ,

Parametric,


Centered,


Expanded,
YJ , 
Ephemeral,


Blinking cursor,
 . AK Q
  K Q

Chase pointers,
AKj
.
Q
Cursor,
( P A@)
Effect,

 J

Methodology,
J
j.D

Client-side,
J
@ k
.
,XAm '@ YJ ,XAm '@ J.

Server-side,


XAm '@ J
kAK

 ,XAm '@ J kAK
Server-side, ,XAm '@ J.


XAm '@ YJ
Dialup,

KA ,  KA
Deprecated,
Pj.

Contention slot,
PA J K

Q
g AK ,
Delay,
 @ I

 DK@ ,
Timeout,


Trash,
HC
Task,

  YJ

Network engineer,
J
.
,
Formatted,
A





Host adaptor,
J





Printable,
AJ. K. A , AJ. Z

XP@
Pipelining,
Load balancing,
K P@ ,J
jJ@ K P@
m '@
Load balancing,
K P@ ,m '@ K P@
J
jJ@
k , HA

 @
Properties,
A

@
Functional specification,
J
J


Specification,
@
Agree,
 @
OK,
 @
 @

Fine-tune,
J
X
Correspondent,
'@ J ,'@

Matching,
Z@

Key escrow,
hAJ @ 

 QK
Effects,
H@
Deflate,

 Q  

J
KA

Command interpreter,
Q@ @

Command-line interpreter,
Q

Q@ @


Dead,
A , IJ

AK. Aj.J

Megabyte,
IK
Mega-,
Bj.J

Q 
Feature,


Q
Resolution,




. AJ

Connectionless protocol,
YK
A@
  K A J
Point-to-point protocol,
@

 K
Protocol,
A J

Micron,
QJ
Micro-,
QJ

Micro,
QJ

Minix,
JJ

Centum call second,


A@ J
KA K J
Percentage,
K
J
Percentual,

J
MSDOS,
Y..
Byte-code interpreter,


SOCKS Server,
Publisher,
Smooth,
Inactive window,
Plain window,
Window,
Root Window,
Minus,
Address bus,

 XAK
'
Q P@X ,QAK
AK
   Q  Y A K

A  Y A K
 Y A K
P Ym . '@  Y A K
A K
K
AJ A K



Y Q

Error indicator,
Ak Q


Indicator,
@X ,Q
P A@
Q

Mouse Cursor,

Null pointer,
Z
C Q
 
Peak indicator,
J
A @
Q

Pointer,
Q
 Q

Stack pointer,
Q@
Coaxial cable,

Pm
Linked to,
@
Linker,



Code position,
QP


KQ@ A @
Hook,


Topic,

Rendezvous,
Y

Provider,
Q
 g Q

@ Y
, I K QKB
Service provider, X Q

 m '@ Q
, Y
 j K
Y
.






Service provider,
Yg Q , Ym '@ Q
 j K X Q , I K QKB
@
Y
.


       
Paused,
( AJ
J) J , J
J@ I

, 
Positional,

GA


Archive site,

J
P @

Backbone site,

XA

Location,


Q@ Y@

Memory location,
@Q

Mirror site,

News Site,

PAJ.k@

Site,



Website,
I K QKB@
Generator,
Y

Author,


Locked,

Dangling pointer,


.

Backup,

AJ
Jk@ q , J
AJ
Jk@ j

Child version,
K
JK . j

Copy (verb),
j

Facsimile,
 B@  J. j  
 j

Hard copy,
J
P
 , AJJk@ q
Backup,
, J
AJ
Jk@ j

AJ
Jk@
Copy (noun),
q
K AJ
Jk@ q
Differential backup, A

 

Rip,
J
P A q
JJ ,()
 
Format (noun),
, )

( Q m
Activity,
A 
Podcast,
( J
K) Q


Desktop publishing, I
. J @ i Q. Q
Publish,
Q
Active,
J
 
Q

Half-Sphere,


Halfword,



AK.
Nybble,
IK

Radius,
Q

Ciphertext,
Q

Hypertext,
 KA 
New text,
YK
Yg. 
Perl Script,
Q
K. 

Plain text,
Q


Text only,

Text,

Domain maturity,
Aj. @ i. 
Jumper,
PA  ,A

Baseband,

A @ A

Relative,

A K
Carrier,
Ag ,A K

J.@ A K
 KAJ
Data bus,
HA


Digital carrier,

P Ag ,
P A K
System bell,
A J@ A K
Nano-,
KA K

Nanocomputer,
@ I.Ag KA K
Q KA K
Nanometre,
Nanosecond,
J
KA K KA K
Sleeping,
'A K

Discard,
Y J . K
Heartbeat,
I. J . K
Succeed,
hAm.'
 '
Efficiency,
Am
.

Relief,
Ym.'
 '
Star,
m
.
Concrete syntax,

XA m'
 J m'
Context-free grammar,

 @
AJ

 '

Elite,
ZAk. , AJ
@ , J.m
Call-by-name,
BAK. Z@YK
 Am 'AK Z@YK
Call-by-need,
k
. .
Call-by-reference,
k. Q AK. Z@YK
 @
 
Call-by-value-result,
J

j.J
JK. Z@YK
 AK

Call-by-value,
J

. Z@YK
Call-with-current-continuation,
Z@YK
 AK
J
Am '@ @
.
Callout,
Z@YK
Detach,
Q K

Strip,
  , Q K

Down,
B Q K
@ A KPB@ J . 
Aspect ratio,
Q@

Ratio,
J . 
Bus,

Production system,
Root file system,
Run-time system,
Runtime system,
System,
Window system,
Windowing system,
Writing system,
Automata theory,
Axiomatic set theory,
Complete theory,
Computability theory,
Decision theory,
Domain theory,
Number Theory,
Peer-to-peer,
Analog,
Peer,
Clean,
Yes,
Access,
Remote access,
Garbage,
Double click,
Click (noun),
Tap,
Click (verb),
Click,
Reduce,
Reduction,
Colon,

A 
A 
A 
A 
A 
Y @ K A 
Y @ J@ A 
K . AJ A 
HB
 B@ K
Q 
J
K@ Y@

J
 @


HAj
. @ K
Q 
J
E
YJ.@
K
Q 
I.
m' K
Q 
 K Q 
P@Q@

Am. K
Q 

AP B@ K
Q 
Q

Q
JJ@
Q

Q

J
 K , J

K
XA K
XA K
YK .
 , K
A K
HC
A KQ K
Q K
Q K
Q K

Q K
 K
 K
A J K
h. AJK@
HA

P Yg
. 
P

J
 
P

J
 

 
A
 
Broadband,
A
 
Domain,
A
 
Scope,
A
 
Zone,
A
Bootstrap,
QKJ
J.@ J
  YJ
 A 
 AJ A 
Bug tracking system,
Cg K
.


 QJ@ k A 
Bulletin board system, H@
Communication system,
A@ A 


Complete inference system, AJ.J @ A 
A

Database management system, Q
K. YK A 

@ YA
HAJ
J
  A 
Disk operating system,


Q@
A 
Distributed system,
P
Broadband,

@
@

  ,@

XXQK A
  ,@ XXQK
A

Dynamic database management system,


J.@ YA P@X@ A 
 KAJ

AJK
Y@ HA
Electronic funds transfer system,
A 
QB@ @B@  K

G
Embedded system,
P A 
Q
J.k A 
Expert system,
@ A 

File system,
HA
A 

Filesystem,
HA
 
A 
Hierarchical file system, Qm. HA
A 
I/O subsystem,

Q h. @Qk@ ,AgX@



Knowledge-based system, J. A 
@
Q


Multiuser system, 
YjJ @ XYJ A 
Network operating system,
J
  A 
 @
J
.
Numeral system,
Y A 
Operating system,
J
  A 

B , k B

X J

 B
Noncluster mode, B , XJ

k
,  PP
Packet mode,
 Qk

Page mode,

j
Pattern,

 PAgX@

Power save mode,
A@

Relational model,

 KC

Root mode,

P Yg
.


Single-user mode,
YJ
k@ YjJ @

Wizard mode,
YQ

Packet mode,
 PP ,  Qk

J h X
Client-server model,
XAg

.

Color model,
@ @ h. X

Colour model,
@ @ h. X


@ h. X
Data model,
HAJ
Growth,
j  ,
Day mode,
J@
PAE
Weekday,
PAE

 J Q K AE
Unexpected end,



Back-end,
J
g K
AE
K AE
End of file,




Front end,
J
A @ K
AE

Purge,
J
kC@ K
AE
@K
Kernel,
Loadable kernel,
J
jJ K. A @K
Nautilus,
CJ
KK
Light,
PK

K. K
 KAJ
Abstract data type,
XQm. HA

K. K
 KAJ
Abstract datatype,
XQm. HA

Aggregate type,
m . K
Noncluster mode,

  K

  K

Break point,
  K
Break point,

  K

Breakpoint,
  K
Checkpoint,

  K
Control point,

  K
Dot,

 
 @
Dpi,
J
.
K
  K
Endpoint,
K
AD@
 
  K
Hot spot,
A
  K

Mount point,

  K
Point of presence,
Xk. @
  K
Point,
Q K
,
 @
  K , K P X ,AY
KB
  K
@
Spawn, AJ.KB



 @
  K , A JKB
 
Spawn, K
P X ,AYKB
. @ K

 .  J  K
Bit block transfer,
IK
  K
Cluster-transport,
Yk
Electronic funds transfer,
@@  K
Q@

G
@  K
File transfer,

Linear transfer,
k  K
Transfer,
 K
, ,
 K
Flavor,
@ Y
 Y

@ k
Data modeling,
HAJ
.


@ k. Y
Data modelling,
HAJ
 Y
Modelling,
k
.

Prototyping,
k. Y
Answer mode,
K . Ag. B @
J@ Q@

Demo mode,

jJ

@
Insert mode,
h. @P XB @ ,AgXB

@ ,h @P XB @
Insert mode,
AgXB
.


Night mode,

J
Access point,

PJ.@
  J,A
 K@
Q
  K ,Q
A K@
  @
A
 J@
 j
jJ@

 AK
 j
J
A@
. .

j.
Hybrid,

 , Y
Goal,
Y

Marker object,
@ Y

J.@  J
Q
 KAJ
Data hierarchy,
HA
Hierachy,

Q
Pyramid,
Q
Light precipitation,
m.
Left parenthesis,

PA
C
Right parenthesis,

C
 
Constructive solid geometry, J. YJ
J
KA JK .
 J
Domain engineering,
Aj. @ Y
 J
Engineering,
Y
 J
Geometry,
Y
 J

m.Q.@ Y
Software engineering,
HAJ
Geometric,

YJ
ID,
K

Framework,
J

JJ
  ,( Q m , )
Format (noun),


()

Time format,
I @ JJ

Brute force attack,


Ring topology,

Wap,

H. @
 @
 J
J.J@ m . QK. k
API,
HA
.

Command line interface,
Q k. @

Q@ B@
 @
GUI,
J
Q@ Yj J @ k
.




g

Global interface, J
A . @ k. @ , J
k. @
 


Global interface, J
k. @ , J
Ag. @ k. @

K
K
K
K
K
K
K
K
K
K
K
K
K
K
K

K
K
JK. , K . AJ
K
I.J
J
K

Constructed type,
Data type,
Derived type,
Enumerated type,
File type,
Linear type,
Media type,
Mime Type,
Principal type,
Resource type,
System type,
Type bindings,
Type,
Sleep,
Microkernel,
Delegation,
Netscape,

Descender,
Dialup,
Cellphone,
Metaphone,

 K 

 g


K.
 KAJ

Q.g. HA

J .

J.@
 KAJ
HA

 J

X Y
@

k

A@
:
J
K

J
KP
XP @
A J@

J
J. J@

Algebraic data type,

Phone,
Hacker,
Hack,
Dummy,
Marginalia,
Margin,
Haiti,
Dial,
Spelling,

m , A

.
 KA , KA

g KA

@ KA
JE
, KA
QA
A

@ Q @ ,YA

A

HAJ

A

K
A
J
ZAj.

Yg
 X
Widget,
k
 .

Priority inheritance,
J
B@ K@P
Yg K@P
Single inheritance,

Leaf,
P

Sheet,
P

Spread sheet,
H. Ak P

Worksheet,
P

Paper,
P

Distribute,
P

Weight,
P
P A@
XA
Mouse pad,

Hypermedia,
J
. @QK A

Media,
A

XYJ A
Multimedia,

Push media,
X A
Dirty,
Z
YK . ,t
Medium,

Tag,

Proxy,
J


Utility,
J








Recipe,
K
Q
m' m' B ,

Links,
HC
XK

Back link,
.


Dial-up link,

J A@ , J
J

Hard link,
J .


Link rot,
J

Link,



Symbolic link,
K
QP


Symlink,
K
QP

Mount,


Pose,
J


Mode,

Unit,

 @
Yj J k
.
J
P
 @
Haptic interface,
J
k
.



High speed serial interface, J
 k. @

J
A
Q@

Iconic interface,
J
K K
@ k
. @

Interface,
k. @
XYJ @ H@Y
 @ k
 @
 J 
MDI,
.



Service interface,
Ym '@ k. @
 @
Video interface,
K
YJ
k
.
Incoming,
XP@




,YJ , AJ@ @
Expanded,

Marker,
@

Descriptor,
@


File descriptor,
@ @
Pragmatic,

 , 
 @

Fact,

,@
Web,
H.

Hypotenuse,
QK
 @ QK
Close routine,
C

QK
Routine,


Elite,
AJ
@ ,ZAk.
Emoticon,

Q
J.K k.
Central processing unit,
m . 'A @ Yg
@
K
QQ
Channel service unit,
K
J  J
Yg Yg
Control unit,
m' Yg
 g Yg

J.@ Y
 KAJ
Data service unit,
HA

K. Yg
 KAJ
Data unit,
HA
  
Digital service unit,
J
Q@ Y
m '@ Yg


Yg
Functional unit,
J
J

Yg
Module,
System unit,
A J@ Yg
Graphical user interface,

Rotate,
Bounce,
Encode,
Left,
Exclude,
Sniff,
Sniff,
Revoke,
Occlude,
Debug,
Stroke,
Replicate,
Printing,
Rely on,
Infect,
Revert,
On,
Dictate,
Screw,
Pumpkin,
Normalize,
Loop,
Replicate,
Reachable,
Right,
Spoof,
Lurking,
Lurk,
Slide,
Copy,
Loop,
Double-click,
Right-click,

k P@X ,PYK

YKQK


Q 
QK , Q QK

PA

J

  J ,J





J
,  J

J.K
, I.j

Y 

iJ
 J K ,ij

Y


PQK
, A

J.

YJK

YK

Q
,YK


K

P@QJ@ K

 ,PQK
g



A
,PQK

J
@ J , J
@ @
l , 

jJK

YJK

YJK

m 
' Q ,  Q K

qK

 , P@QJK Y JK
PQK
, g
.

Ag. X Q Q JK


J
@ Q JK

m

@
Safe mode,

 @

Supervisor mode,
Q
 , X
 ,h

Sharpness,
Yg

 m ' ,(...t '@ ,l. @Q.@ KA
Validate,

@ HA

J.@) m 
 KAJ
 gY

Function (Programming),
J

QY @ J
Memo function,



Relevance,
K
Q 
J
 J


Functional,



@ , K
A
Safety,


Preventive,

KA

K . Aj.JB@ I
Response time,


Stop,

User agent,
Yj J @ J

Dial-up login,

J h.
Login,
h.


Memory access,
Q@ X h.
Blink,
J

Wiki,

K

JK

Windows,
PY
AND,

Protected mode,

Navigating,
Revoke,
Strikethrough,
Orphan,
Converge,
Finger,
Write-protect,
Referer,
Integrate,

QjJ.K

I.j
,J.K

 ,k JK

H.

JK

Y m 
'
m
'
K . AJ@ Y
m
'
YK

l. YK

KA , JE

  K ,Q K

PA@ , QP

,K

K K

XJ
KK

Phone,
Mumble,
Point,
Sign,
Day,
Unix,
Unicode,


MS,


: K

MTU,

)
 (1)
. Q j
(3) ; m  AJ (2) ; J
KK
t AJK

 QK (1)
Heading,
@ J (2) 

CC,

5
Microcentury,

Noname,

   
AJ.K
QK J
KAK 6.52

@

FreeBSD Documentation License


Copyright 2006, Arabeyes.org. All rights reserved.
Redistribution and use in source (SGML DocBook) and compiled forms (SGML,
HTML, PDF, PostScript, RTF and so forth) with or without modification, are permitted
provided that the following conditions are met:
Redistributions of source code (SGML DocBook) must retain the above copyright
notice, this list of conditions and the following disclaimer as the first lines of this file
unmodified.
Redistributions in compiled form (transformed to other DTDs, converted to PDF,
PostScript, RTF and other formats) must reproduce the above copyright notice, this list
of conditions and the following disclaimer in the documentation and/or other materials
provided with the distribution.
Important: THIS DOCUMENTATION IS PROVIDED BY THE ARABEYES WIKI
TEAM AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE ARABEYES WIKI TEAM BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Document generation: Djihed Afifi, djihed@gmail.com

 K X @ G Q
 kP
ZA

 m '@ . Arabeyes.org , 2006 q@


 k

m
. 

 KYK

J@ XAK. i

(SGML DocBook) PY @ JJ


. @ K
YJ@ YK. @YjJB@ K
P






 @ HA

QAK. (t '@ ... RTF @ P ostScript @ PDF @ HTML @ (SGML j
.  JJ
@  @
: J
K B@
Q@  A C @ PY @ q@
 k
 Q A JkB@ K @ Im'
ZC@ Y
.

..







  JJ K P

(SGML K
PY @ Q@



J@ XA @ YJ Q
K YK
. AKX @ PY @ Q@
. DocBook)













Q@ ZCgZ , Y Q@ ZA , C @ PY @ q@ k Q YJ
K K
@ I.m.'



XA @ YJ j




, AKX @ PY @
. @
A Q
K K
Qk @ X@
@ @/ J
KJ@
@ Q
Z



 ) j
 @ JJ @ K P
Qk @ K @ m
@ PostScript @ PDF @ m
, DTD
.



J@


.(Qk @ JJ

@ @ RTF


J KJ@ YJ 


 K @ Y
 Q
Q@
ZCg @ A QK
@ H. Q
K
K
Q @
.

K K
:A
 @ PAjJ@ iJJ @ J AJ HA
@ AD A. , JJ
@
. @ m 
' Q HA
 KA
 KA

Z JAJ
.

 Q 



B . Y
J
Z @ QK
@ H. Q K
K
Q J
m'
@ QAJ. 
@ QAJ. , 
K
@

 @ Ag @ X
 Q
 YK HAY
g @ ZAJ J@ A A.) JK @ G A

K. PAk ; K

HAKAJ
.

.



C
 Z H ' @




K @ ;@YjJ@ k @ hAK P @ @






K
Q

J@
I
KA
A
(

gY












@ PB
Z@ AD J
. @
@ K
Y K
Z I KA
,( X Q
@ AZ@ J J) J
KY

J
J@ ' k
@Yj J@

@ Y
 , J
KJ@ @ Y

QK
Yj
 ZH. ZQ @
.Q @

djihed@gmail.com

XAk : m QK
,
J

. . .

S-ar putea să vă placă și