Arab Dict

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 76



GA @
 J@ A@


Q

'


m. @
G. Q

Arabic English
Technical Computing Dictionary
Qm '@ K PA @ IK QK K Q

Free Software Arabisation Team


http://wiki.arabeyes.org/Technical_Dictionary
Version: 3.0.26-06-2015
June 26, 2015

This is a compilation of the Technical Computing Dictionary that is under development at Arabeyes, the Arabic UNIX project. The technical dictionary aims to to translate
and standardise technical terms that are used in software. It is an effort to unify the terms
used across all Open Source projects and to present the user with consistant and understandable interfaces. This work is licensed under the FreeBSD Documentation License,
the text of which is available at the back of this document. Contributors are welcome,
please consult the URL above or contact doc@arabeyes.org.


 @ Y QK AK Q Q Q QK  K Y@

 

.
.



J@
G. Am '@ A j Y
.KJ
 YE
 J@

 J @ J J  J@ HAj

AK. D

@ YJ
kK  g. QK @ A@

.  J
 @
 H Ag k
 @ ' Y J g Q @ K H PA J@ XA J ,H Am '@ l @QK  g QK

. .
.
.
. . .


 K X @ G Q
 kP A@

 kP . J K QAK J @ Yj J j
 

ZA
.

. .



ZAg Q@ , A @ K IkQK .A@
 K AE Q
J @
AB@ @ C @ @ J@
@ H. A Y@
.

. .

. doc@arabeyes.org

A@
 AJ ,( @X)
 A@
Continuation,
m . QK.) K
.
(@ X


Missed call,
I KA A@
Multiplexing,
XYJ A@
License agreement,
J
k Q@ J
A K@
Agreement,
A K@
Calling convention,
Z@YK A K@
Hot Key,
hAJ @ A K@
Shift key,
hAJ @ A K@
Prevent,
I.
Jm .' ,ZA K@
Autocompletion,

KA  K A@
Finalize,
AJJk@ , A@ ,A @
Finish,
ZAE@ , A@ ,A @
. , HAJ
 . K@
Proof,
AQK
P A@
QK @
Mouse trails,
Adaptive answering,
J
J
K K . Ag. @
Response,
K . Ag. @
 P@ , K A@
@
 JJk. @
Deforestation,
K . A@
. HA




Pull,
I.m , Qk. , H. @ YJk. @
Audiographic teleconferencing,
AJk. @
J
m '
YK.



Video conference,

KQ AJk. @
 Qk. @
Fallback procedure,
k. @Q@ H@Z@
Action,
Z@Qk. @


Z@Qk. @ , A Z@Qk. @
Defunct process,
IJ

Z@Qk. @
Defunct process,
A Z@Qk. @ , IJ
Orphan process,

JK
Z@Qk. @
Parallel processing,
m . 'A , P@ J Z@Qk. @
K
P@ J
Procedure,
Z@Qk. @

Runnable process,

J
  Z@Qk. @
General,
A ,
Ag. @
Contact (verb),

.@
P@ QK. @ , KAK




Initial,

K@YK. ,
K@YJK. @

Alphanumeric,

XY
Ym.'. @

Numeric,

XY
Ym.'. @
 @YK @ ,  Qm '@ @YK @
Packet switching, PQ@
.
.


@YK. @
Packet switching, Qm '@ @YK. @ , PQ@
Swap,
@YK. @


Never,
 , @YK. @
E B , YK @
Endless,

KA

.
Highlight,
P@ QK. @
. @ , P@ QK. @
Highlighting,
KAK
 

Pin,
, QK. @
.@
Epsilon,



Revocation,
I.m ,A. @
,XAK. @
Dismiss,
Q
@
, CK
Declaration,
J
KC
.
Swallow,
K. @

Parent,

K. @

White,
J
K. @
 K@
Accessibility,
kA


Direction,
Am.' @
Orientation,
J
k. K , Am.' @
Renew,
YK
Ym.' @
Discriminated union,
  J XAm' @
Disjoint union,
XAm' @ , @ m XAm' @
J
Disjoint union,
m XAm' @ , J XAm' @
@
 ,A@
Span,
QK
.


Connective,
. @P ,
A@
Connect,
A@
Connection,
A@
Highlighting,

 PAJJk@
PAJ.Jk@ ,
.
A
PAJ.Jk@
Functional testing,





Heuristics testing,
J
.@ PAJ.Jk@
. PAJ.Jk@
Hybrid testing,
j
Manual testing,

YK
PAJ.Jk@
Test,
PAJ.Jk@
Yg@ PAJJk@
Test Module,
.


Finalize,
A @ , A @ ,AJJk@


Picker Settings,
H@X@YB
@ Qg@
Beta reduction,
AJ
K. @Q g@
Jk@
Type mismatch,
J@
C
  

Probability,
K ,AJk@
Choice,
PAJ
Jk@
Choose,
PAJ
Jk@

Domain selection,
Aj. @ PAJ
Jk @
Multiselection,
XYJ PAJ
Jk@
Picking,
ZA JK@ ,PAJ
Jk@
Select,
PAJ
Jk@

Serve,
Yg @

Ping-pong,
XP Y g @
,h @Qk@
Input/output,
AgX@
.



I/O subsystem,
AgX@ A ,
Q h. @Qk@

Other,
Qk @

Green,
Q k @

Cache miss,
AJ.m ZAk@

ZAk @
Minor faults,
Q

Hide,
ZA k@
 g @

C
Computer ethics,
H. Ag HAJ
ZCg@
Disclaimer,
J


Disassemble,
,g@

 g B@ ,H @X@
Ethics,
AJ. @ , C
. 



 AJ@ H. @X @
Netiquette,
J.@

Exhaustive testing,

.@
Ak


Half-duplex,
Am.' B@
XAg @

XAg @
Monochrome,
@


Cross-reference,
Ag@

Referral,
Ag@



Convergence,
XAk@
Congestion,
A  Jk@

Probabilistic,
J
AJk @

 . AJ
Jk@
Operational requirements, , J
HAg
 . J
J
HAJ
Requirement,
I.J ,h. AJ
Jk@
 ,AJJk@ q ,AJJk@
Backup,
j

J
AJJk@



Spare,

AJ
Jk @
Standby,

AJ
Jk@

K@Yg@
Cartesian coordinates,
J
KPAK
X HAJ
@ ,P@ Qk@
Scoring,
PQk
@
Scoring,
P@ Qk@ ,PQk
Sense,
j.J ,Ak@


KAk@
Statistics,
HAJ


Statistical,
KAk @



Enumeration,
X@YK ,ZAk@
 ,Cg@
Replacement,
@YJ.@

g
Red,
Q @

News,
PAJ.k @
 PAJJk@
Acceptance testing,
J.@
 .
Automated testing,

@ PAJ.Jk@
Beta testing,
AJ
K. PAJ.Jk@
Branch coverage testing,
J
K PAJ.Jk@
Q J@
Confidence test,
 K PAJ.Jk@
Exhaustive testing,
PAJ.Jk@ ,A PAJ.Jk@


Abort,

Send,

AP@
Simultaneous shipment,

P AP@
Anchoring,
ZAP@
Dock,
ZAP@
 ,() P @
Post,
AP
Submit,
Q@ ,P@

 P@
Guideline,
H@XA

Archiving,
 P @

Archive,
J
P @

Personal Package Archive,
Qm '@ J
P @


j @

Constraint satisfaction,
XJ
 ZAP@



Attach,
AP@

Digits,
AP@

 AP @
Random numbers,
X@Y @ , J
K@

J
K@
 @
Widow,
P
 P@
Indentation,
k@


Shift,
k@P@
@
 P@
 @

Anti-aliasing,





Antialiasing,
@ @P@
 P@
Comment out,
J
K @










Deforestation,
K. A@ HAJJk. @ , K. A@ @P@
 @
 P@
Defragment,
J
 @










Deinstallation,
I
J.J@ , I
J.J@ @P@
 P@
@
Remove,


Hassle,
h. AP@


Deadlock,
P A ,  P @
E-zine,
P@

Weeks,
J
K. A @
YA , A @
Base,
A
 @
Software Foundation,
PA
. @
Microfortnight,
QJ
AJ

Administration,
Change management,
Manage,
Management,

Q
J
J@

P@X@

P@X@

P@X@

P@X@

P@X@
P@X@

P@X@

P@X@
P@X@

Q@ X
 @
Network management,
J
.

Power management,
A@

Project management,
K
PA
System administration,
A J@
Administrative,

P@X@
@
Deprecate,
@X
Q 
QK @X @
Encoder,
@X @
Tool,

Deprecation,
K@ X@

Input/output,
h. @Qk@ ,AgX@

Insert,
h. @P X@

Declare,
C@ ,ZBX@
Dissolve,
K . @ X@
XYJ @
 X@
Multicast,




Go,
@ ,I. X@

X @
File permissions,

Qg ,AK P@
Perplexity,
.



Quarantine,
J
J
K. P @
Dependence,
J
J.K ,AJ.KP@
Keybind,
hAJ @ AJ.KP@
Key binding,
hAJ @ AJ.KP@
 Qk P , A
Jitter,
k
. .  KP@
Height,
A KP@
Increase,
PAJ@ ,YA ,YK
@Q K ,A KP@
 K ,I KP@
Expect,

.

Kernel panic,
Q X ,AJ
KP@
Deferral,
ZAg. P@

Magenta,
G@ k. P @
Memory management,

P@QJ@
Clone,
q J , pA J@
Duplicate...,
... pA J@

Authentication,
A JJ
@
Import,
X@Q
J@
Cylinder,
K@ @


J
X , P @
Legend,
HAj
@
Bottom,


Projection,
A@

Ascii,

@
 @
Continuation passing style, QK
Q H
.

 AJ
K
.


Indent style,
k@PB @ H. @

Names,
ZA @
 PA @
Absolute pathname,

. @
Backronym,
AJ
Qk

Basename,

A @ @
J @
Canonical name,
J
PA
. '@ @
Device name,
PAm
Domain name,
Aj. @ @
@
File name,

@
Filename,

Full pathname,
A PA @

Host name,
J
@ @
@
Hostname,
J


 J J
Logical-hostname,

@
Login name,
h. @ @
Name,
@

Nick name,
PAJ @
Pathname,
PA @ @
@
Private hostname,
,
k J

m J
@
Persistence,


J. @

Workweek,
J. @

Resume,
K AJ@

Replacement,
Cg@ ,@YJ.@

Replace,
YJ.@

 KA J J@
Exceptions,
HA




Exception,
ZAJJ@


Mutual exclusion,
XAJ.J ZAJ J@
J@
Memorandum,
Qm ,PAj




Maturity,
AjJ@

Inquire,
ZA ,Q.j J@
Extract,
h. Qj J@
ZAYJ@
Function call,
J



Invoke,
ZAYJ@
Z@Qk. @ ZAYJ@
Remote procedure call,
YK .
Evolution strategy,
K
P J
m.' @Q@
Loopback,
Ag. Q@
Recover,
Ag. Q@
Redemption,
X@XQ@
Explore,
CJ@
XAJ@
Recovery,
Restore,
XAJ@
Q
J
J X@YJ@
Changeover,
Query,
CJ@
Usage,
AJ@

J.@ C J @
 KAJ
Data mining,
HA


Inspection,
Y  K ,ZA J @

C J@
Device-independent, Q
j.J@

 

Form,
, PAJ@


Continuation, ,(@ X m. QK.) K. AJ ,P@QJ@
 A@
( @X)
Continue,
P@QJ@
Week,

P@Y@ ,
P P@Y@
g. A
Version,
P@Y@
PY @
Versioning,
@
Yellow,
Q
Bug fix,
g hC@
Fix,
hC@

@
Original,




@ ,
Ethics, Cg B@ , H
@X
@
,
AJ
@

.
.

Native,
J
@
Add,
A @
Additional,

A @
Auxiliary,

A @
Extra,

A @
More,
A @
Illumination,
QK
J K , KA @
Child window,

Q PA@

YA PA@
Data frame,
HAJ
Frame,
PA@


Frames per second,
J
KA J@
PA@
PA@
Internal frame,

g@X



Page frame,
j@ PA@

 PA@
Palette window,
@ B@ k





Window frame,
YAJ@ PA@


 . , kQ
Dissertation,
IjJ
@

Firing,
C@


Show,
PA@
Unhide,
PA@
Reboot,
C@ XA@
Reconnect,
A@ XA@
Redirect,
J
k. K XA@
Redirection,
J
k. K XA@
XA@
Redo,

Immediate version,

@
@ ,
m  J

k J

Root user name,

P Ym . '@ Yj J @ @
 @
Sitename,

Textual name,
@ @
Username,
Yj J @ @
User name,
Yj J @

Assignment,
XAJ@



Q
Creeping featurism,
H@ 
@ AD@
 ,D @
Quota,
k

Exponential,

 @
  @
Frequently asked question, K. k. @ J

Exponent,
@
 @
Credits,
H@XA

PA@
Carrier signal,
Ag



Signal,
PA@
, PA@
Sign,
QP

Color saturation,
@ @ AJ.@
Submission,
@Q@
Submit,
P@ ,Q@
Notice,
PA@
Certify,
XAD@

Cache hit,
AJ.m K. A@







Preformat,
K
YJ
JJ
E , K
YJ
 A@


Versions,
H@P @Y@
P@Y@
J@ Q@

Demo version,

jJ

 P@Y@
Major release,
A


Release,
P@Y@
Beta version,
AJ
K. P@Y@
Bug fix release,
i P@Y@
Immediate version,
P@Y@ ,g. A P@Y@

P
Private hostname,

Snooze,
Close,
Closure,
Halt,
Locking,
Avatar,
Dummy,
Best effort,
Horizontally,
Horizontal,
Handshake,
Handshaking,

 , ZA @

C@

C@





AK
@ , C@
 @
A @ , C



PAJ @
JX , YA , @ Q @

 g)
Yk
@
(... Y
. 
AJ
 @

 @
 @
AB @ A






AB @ YJ
AK , AB @ A@

)
Enterprise,

Quotation,
Quote,
Proposition,
Suggest,
Suggestion,
Conjunction,
Restrict,
Restriction,
Crop,
Older than,
Eject,
Approval,
Approve,
Play,
Max,
Solid lines,
Locking,

YK
Yg. Q ( AJ.@ )

AJ.J@
AJ.J@
h Q ,h@Q@
h@Q@
h@Q@
@ Q@
PAJ@
PAJ@
AJ@
Y @


Y  @
P@Q@
P@Q@
 ,ZQ@

 @

XY  @
P@
 @ ,A @
C

J@ XA@
J

Regenerate,
YJ
K XA@

J.J@ XA@
Reinstallation,
I
Reload,
J
m' XA@
Reorganize,

J K XA@
 @
X@Y@ XA@
Repaginate,
j
X@Y@ XA@
 @
Repagination,
j
Repeat,
YK
XQK ,P@QK , XA@
Resize,

j.m' XA@
Restart,
J
  XA@
 XA@
Restructuring,
J




Reuse,
AJB @ P@QK ,AJB @ XA@
Dependency,
K
XAJ@
Credential,
XAJ@
Classic,

YJ
 K ,
XAJ
J@

J@
Sampling,
AJ


Settings,
H@X@Y@
 


Random numbers,
AP @ , J
K@ X@Y @

J
K@
Setup (Configuration),
X@Y@

Display report,
QK
Q J@ Q@
@
Play,
ZQ@ ,  , Q
@
Q. @ ,

Greater,

@
Reverse video,
K
YJ
@

Announce,
C@


Announcement,
C@

Declare,
ZBX@ , C@




Poster,
, C@
 
Highest,
B@ , J
@
Meta,
@


@
Elite,
J . m ' ,ZAk. , AJ

Flood,
Q @

Sheets,
J
@
Refactoring,



A  B@ , K
PAm. '@ A B@
K
PAm. '@

Maximum,
 B@

Optimal,
J B@
Standard deviation,

PAJ
@ @ Qm' B@

@
Forward compatibility, , J.J @ Aj.B




J.J @ K. A J@
  B@
 P
@
Distributed systems,


B@
Objects,
@Y

 @
Breadth-first search,
B @ QAK
IjJ
 .  .
Depth-first search,
B @ AK. IjJ.@
Portuguese,
J
A KQ.@
 J Qm '@ HAJ

m.Q.@
Floss,
- PY @ k

hQ
PJ
K  @ Q.K P X : B PAJk@
. @
Polish,
K
YJJ
K
X AJ@
Functionality,
J
J
@

Xm '@
Quality control,
. Y AJ@
Next,

AJ@
E-commerce,
J
K QB@ PAj.J@
Electronic commerce,
J
K QB@ PAj.J@

Cybernetics,

B@ jJ@
Modulation,

K Q@

Registration,
J
j.@

Key-encrypting,
iJ
KA AK. Q
 @
Forward compatibility,
, J. J @ K . AJ@

J. J @ Aj.B


Normalisation,
J
J.J@
J@
Speech recognition,
C@ Q
Public-key encryption,
hAJ AK. J
J@

@

Word wrap,
HA@
A J@
Capture,
A J@
Collect,
A J@
Current working,

C@
Booting,
C@
Region,
Q ,
@

Less,
 @
 @
Less than,


Lower,
 @
@ ,

Q. @
Greater,

Q
Greater or equal,
A @
. @
Q . @
Greater than,


Write,
I.J @

Acquire,
H. A@

Detection,
A  @

Error detection and correction, A @

ZAk B@ iJ
j

Presence detect,
Yg. @J@ A  @







Increase,
YA ,YK
@QK ,AKP@ ,PAJ@

AK. A@
Exabyte,
IK
Extranet,
I K@ Q@
Finalize,
A @ ,A@
Finish,
A @ ,A@

Lowest,
GX B@

Minimum,
GX B@

Mantissa,

Q@ ZQm . '@ ,


Q@ A B@
 
Fault tolerance,
Aj K. Aj.JB@


Current working,
A B@ , K
PAm. '@ A  B@
K
PAm. '@

PAB @ ,A B@
Key frame, J
KQ@


PAB @
Key frame, A B@ PAB
PAB @
@ ,
J
KQ@


Parent window,
B@ PAB @

Primary window,

A B@ PAB @

 K Q @ X@Y B@
Square numbers,

.

Triangular numbers,
JJ @ X@Y B@

  @ , B@
Highest,
J

Boot,

Brightness,

@

Sanskrit,
J
K
Q@
 J @ @
Jaz Drive,
k


XDMCP socket,
J
j @ I@
Swedish,
K
YK
@
Sweden,
YK
@
 @
Network, the,
J
.
 @
Company,
Q
 J , Q
 @
Organization,


North,
A@


Source code,
J
B@ QJ
@

Paste,
A@




Glyph,
K
QQ@ P@
@
Demand,
I. @ , PQ
@

Warranty,
A
 @ J @
Physical layer,

.


Threshold,
: J.J@

At sign,
@ C@

Physical address,
@ @ J@
@ J@

Virtual address,

QA@

Cancel,
ZA@


Echo cancellation,
Y@ ZA@


Q  J@ ZA@
Pending signals,
? J
J . J @ HCK




Unlock,
@ ZA@
 ZA@

Unsubscribe,
J
j.@





Floating-point,
A@ A@

Alpha,
A @
j@

Power-on self-test,
YJ
G@ Y@
 @
CB





Metric space,

Q @ Aj. @ ,
Q @ ZA@


J.J
J
@
Philippines,

Aleph,
@

 A J@
A @
Distort,
  ,Z@J@

Mantissa,

Q@ A B@ ,
Q@ ZQm . '@
Southbridge,

G. Jm . '@ Qm. '@


 '@
Current session,
J
Am '@ m
.

Append,
Am '@
 '@
Induction,
Im

B@
Infimum,

GX B@ Ym '@

Fields involved,
PJ @ m '@

@ Ag
 m '@
@
Q
,k
@
Fall back,
Zj
.
.

m '@

Fallback,
Zj.@ ,k. @Q@ Ag

Parallel computing,
K
P@ J @ J . m '@

(J
 @)
Quantum computing,
J
@ J . m '@

Lavender,
@ Q m '@
Escape,
m '@
,(...t '@
Validate,
l. @Q.@ KA




FIFO,
B @ h. PAg , B @ g@Y@


First in first out,
B @ h. PAg , B @ g@Y@


First-in, first-out,
B @ h. Qm 
' B @ g@Y@

 
Last-in first-out,
B @ h. PAg , @Qk @ g@Y@

 
LIFO,
B @ h. PAg , @Qk @ g@Y@
Current directory,

Am '@ J
Y@
Root directory,
P Ym . '@ J
Y@
Cron,
K
PY@
 

Physical memory, Q@ Y@ , @ Q@ Y@
 
AJJk Xk. @
   


Physical memory, , AJ
J
k Xk. @ Q@ Y@

 @ Q@ Y@


Magic number,

Qj@ Q@

First customer,
B@ K
. Q@

Scrolling,
Q@
Previous,
K . A@
Screen capture,

 
B @ QB@
@

 
Implicit parallelism, @P@ @ , JJ
Y@ @P@ @

 @

@ @P@ @
Implicit parallelism, @P@ @ , 


JJY@


Earliest deadline first, QK. B@ B@ Y @

B @
Timer,
I  @
 @
@ , I KQ @
Expected location,
A
.
I. KQ @
 @
Literature,
HA
Midi,
YJ
@
Custom window,
J
kCB @  Y A J@
 A J@
USB,
(@) A@
@
 J@
Result,
jJ

Copy left,
J
j. q@
Nickle,
J@

Kernal,
I.@ , @J@

Hindi,
K
YJ@
 J @ K @
Openid,
k



Abstract machine,
XQm.  @
    
 
Digital camera, J
P Q , J
P QK
 @

Instrument,
 @

Machine,
H. Ag ,  @

Pocket calculator,
I.J
j. J . Ag  @

K
 @
Von Neumann machine,
AJ
WAP,
H. @@


Primary Colors,
J
@ @ @

Secondary Colors,
K
KA K @ @

Description,
@
@
Optical fiber,
K
AJ




Optical fibre,
K
AJ
@

Automatically,
AJ
@
Shortest job first,


Q @ A@

B@

 , PY@

 @

 , PY@

 P @Q@
H@
 , @

PY@
  Q
J
P HAJ

K  @
Q@

G
J
KAQ@

AJ KC@
@J@ ,I@
.
Ag m '@ , Zj
@
.
Ag
m '@ , Zj
@
.


I.@

B@ k@

Greatest common divisor,

Force,
Power,
Resolutions,
Force,
Digital electronics,
Electronic,
Chrominance,
Infinity,
Kernal,
Fall back,
Fallback,
Nick,
Motherboard,
Diamond,

k. @Q@
k. @Q@

A @
Computer literacy,
H. Am 'AK. A @
, Q @ Aj @
Metric space,

Q @ ZA @

.
Parent directory,
B@ Yj. @
j @
Subtotal,

Q@
  .
Stock Ticker,
:
J.J @ Qj @
Bibliography,
k. @Q @

Real user,

@@ Yj J @
Receiver,
J. J @
PQ
@ ,I @
Demand,
.

Equation,
XA @
 @ ,I KQ @ A
@
Expected location,

.
I. KQ @
J @
Intellectual property,
K
Q@


J @
Symbolic logic,

QQ@

Look and feel,
Ak B@ Q J @
  J@

Exclusive OR,
:


H. J.K @
Intranet,
I K@ QK@
Internet,
I K QK@
Back-propagation,

g PA K@
Propagation,
PA K@
Waiting,
PA JK@
Enlargement,

j  ,pA JK@
Picking,
PAJ
Jk@ ,ZA JK@
ZA JK@
SYLK file,






Target file,
ZAJK@


 DK@
Timeout,
, @ I
Skew,
@ Qm' @
Alert,
J
J. K ,P@ Y K@
Warning,
P@ Y K@
 @ q@
Copy and paste,




Create,
ZA@
Creation,
ZA @
m ZA @
Tar archive,



Meltdown,
PAD@



Ethics, @ , Cg B@ , H
. @X @ ,AJ.@
Additive,

A @
Join,
A @
YK Yg j
 
Pagebreak,

. C@
 @
Go,
I. X@ ,


Embedding,
Q ,PA@



Q  @
Qj JK
Eigenvectort,
 K@
Refresh,
A
Divergent,

YAJ.K ,
k. @Q K@
Divergence,
YAJ.K ,h. @Q K@
Fork,
   ,h. @Q K@
Divergence,
h. @Q K@ , YAJ.K , @ Q K@
Split,
A K@
Expire,
J
kC@   K@
Pipe,


J
@

Sandbox,
@ YK
Ym' J
@
Journal,
J
J
@

Auto,

@

Automatic,

@

Bot,

@

Forward,
A B@ @


Foreground,
Q J @ J
A @ , k@
J
A @



Foreground,
k@
J
A @ ,Q J @ J
A @
@
Security,
A
Q
J. @
Amper,
@ X@YJ@
File extension,



Extension,
X@YJ@
@ X@YJ@
Filename extension,


J@
Priviledge,
PAJ

J@
Privilege,
PAJ

Optimise,
 J @

Optimization,
 J @

Optimize,
 J @

Command,
Q @

Compound command,
I.Q Q @

Directive,

D
k. K Q @
ZA
@
File signature,


Signature,
ZA@



Computer security,
QKJ
J.@ @
@
Safe,

 ,
@
Safety,
K
A
@
Secure,


Miles,
AJ
@
Em,
@

Mother,
 @
A A@ K JK @
Named pipe,
. .


H. J.K @
Cathode ray tube,

XKA H@Qk
Mechanism,

 ,(H. AJ) H. AK.


 .
Beamer,
HAK
, J JAK
Internal,
J
g@X

.
,AK

Inside,
g@X

 .
Mailer,
YK
QK. IAK.
Remaining,
 AK.
Percent,
J AK.

 , AK
Parcel,
Q
.


Heat sink,
P@Qk AK.

Constructor,

GAK
.




Loose bytes,
HAJK
AK.

AK.
. , IK
Byte,
Qk
  X Q
 KAK

Value added retailer,
J

.
A


Vendor,
KAK
.








Bit,
P X , J
KAJK , JK .

Bitwise,

K .
IK
.
Check bit,
j@
 . , h. @Q @ IK
.
Parity bit,
J
k. Q@ IK








Q
Parity bit,
h. @ @ IK . , J
k. Q@ IK .
.
Broadcast,
IK
 '.
Beam search,
J
AX Im
 '.
Binary search,

KA J K Im
 '.
Find,
( ) PJ , Im
 '.
Lookup,
Im
 '.
Search,
Im
P
 '.
Im
Weighted search,


Intuition,
@YK
.



Scratch,
.(Q) Z
B , K
@YK.
Start,
K
@YK.
JK @ ,K@YK

Initial,

K@Y
.
.
.
Listless,
 A YK

None,
Z
 B , Yg @ B , YK
.
Section,

. (J.)
 A K@
m

Break (program),
A K@

Priority inversion,
J
B@ H. C K@
XAJ
 K@
Functional dependency,
,
J


JK AK
JJ


.
Finish,
A@ ,A @ ,ZAE@
Terminate,
.ZAE@
Crash,
PAJ
E@

Real-time,

G @

Hello World,
AAK. C @
Ellipse,
i.J
@
Ellipsoid,

j.J
@

Bus priority,
@ K K
@

Priority,
K
@
 PY@  @ ,IKQ@ @
First-order,
k
.

.




First-order,
I.
KQ@
@ , k. PY@
 @

Leading,

XAJ
 ,
J
KP ,
@

Primary,

@

Or,
@
Commit,
@YK
@

@
Iceland,
@YJ
Dispatch,
XAK
@
Rhythm,
AK
@
 @ , A K @
Halt,
C






Shut down,
J
 @ AK
@
Q

HA
 K K
@
Mini icons,

Icon,
K K
@
 Y A J@ K K @
Window icon,

September,
K
@

Hello, world,
AJ.kQ ,A@ AE
@
Abortive release,

Portal,

H.

K . @K. ,H. AK.

Freeware,
Hyperware,
Shareware,
Malware,
Software,
Antivirus software,
Backup software,
Charityware,
Computer program,
Functional program,
Metaprogram,
Program,
Schedueler,
Spyware,
Startup Program,
System software,
Proof,
Span,
Electronic mail,
Email,
E-Mail,
E-mail,
Mail,
Mail to,
Phone mail,
Voice mail,
Flash,
Applet,
Naive,
Buzz,
Numerator,
Simple,
Visual,


m. QK.
J
KAm . HAJ

m. QK.
 KA HAJ

m. QK.
J
J.
 HAJ
J
J.k J
m. QK.
J
m. QK.
XA
l AKQK

 Q

HA
. .
.
AJ
Jk@ l. AKQK
.

Q
g l. AKQK
.
H. Ag l. AKQK
l AKQK
.

.

@ l. AKQK
.

l. AKQK.

.
Ym. , Yg
. l. AKQK
.
m.' l. AKQK
.
J
  ZYK. l. AKQK
.
A J@ l. AKQK
.
 . K@ , AQK
HAJ

A@ , QK
.
G Q@ YK QK


Q

G @ YK
QK.
Q@) YK QK
(
G

.
G Q@ YK QK

YK
QK.
@ YK
QK.

KA YK
QK.

G YK
QK.
K
QK.
i.
QK.

h. XA ,Z
QK.
QK . QK .
   .
D ,J
.

Q.

.
X@YK YK
Alternative,
K
YK.
Relay,
A J ,K
YK.
Axiom,
J
E
YK.
Quickstart,
K
Q (J
 ) ZYK.
Starting,
ZYK.

Startup,
J
 @ ZYK.
P YK
Stub,
.


Dirty,
t ,Z
YK.
Legacy software,
J
K@QK l. @QK.
Programs,
l. @QK.
Braille,
K
@QK.
Portugal,
A KQK.
Orange,

A KQK.
Aspect-oriented programming,
m . QK.

QA AK. k
.



Configuration programming, J
 m. QK.

Constraint functional programming, m. QK.

K
YJ
 J
J

  
Evolutionary programming, K
P m. QK.
m . QK.
Functional programming,
J
J

 J k m QK
Generic programming,


. . .

Linear programming,
J
k m . QK.
 J m QK
Logic programming,
J

. .

Microprogramming,
QJ
m. QK.
XYJ m QK
Multiprogramming,
. .





Object-oriented programming, J
KA m. QK.
Jk
. m . QK.
Paranoid programming,

H. AJ
KPB @
Programming,
m . QK.
Reverse engineering,
J
m . QK.
 B@
m QK
Systems programming,

. .


Free software,
Qk HAJ
m. QK.
No numbering,

m'

J.@
 KAJ
HA
J
Jm'

J
K .
Data structure,
J
K .
Infrastructure,
J
K .
Structure,
J
K .
Gate,
K . @K.
Gateway,
K . @K.
 J K @K
Logic gate,
J

. .

Portal,
H. AK. , K. @K.

Proxy gateway,
J
K . @K.
HK
 .
Knowbot,
Q
Baud,
XK.
P K
Focus,
.







Keyboard focus, Q
QK , iJ
KA @ k P K.

iJ
KA @ k

Inch,
K
.

 KAJ
K.
Data,
HA

K.

P , QAJ. HA
 KAJ
Direct graphic,
HAJ
QAJ
.




External data,
J
k. PAg HAKAJ
K.
HA

K.
 KAJ
Metadata,
J



K.
Message catalog,
AQ@
AJ
Beta,
AJ
K.
Perl,
Q
K.
Computational molecular biology, AJ
k. J
K.
.
J
K. Ag J
K
Qk
Environment,
J
K.

 K
Homogeneous environment, Aj.J J

.





Ide,
AJ QK
 J
K.
 J QK  J K
IDE,
A

.


Integrated development environment, J
K.
AJ @ QK
J@

J
K.
Ergonomic,
@ HAJ
Control structure,

H

Computer vision,

G. Ag Q.
 J 

Babbleprint,

.

Battery,
K
PA.

Card,
A
.



Daughtercard,
J
A.


Expansion card,
K A
.



P A.
Graphics card,
HAJ
  A

Network card,
J
.
.



Network interface card,
k. @ A.
 @
J
.

Punch card,
I. K A
.



Sound card,
H@ A.

Storage card,
K
Q j J@ A
.




Ventilator card,
K
E A.

A

KQ
Video card,
HAJ
.


Wild card,
ZAg. A.
Deactivate,
 .
Slow,
Z
.
Delegation,
K . AJ
K , JK.
Dimension,
AJ
 ,YK .
Fractal dimension,

P YK .
,YJ
K.
Remote,
YK.
Pixel,
K.
Null modem,
X CK.
Constructive,

KA JK .
Build,
ZAJK .
Clause,
YJK .
Child,

JK .
XQm J K
Abstract syntax,
.
.

Algebraic structure,
K
Q.g. J
K .
  J @ J K@ JJ J K
ALSA,
Y


.
Architecture,
J
 K .
Child structure,
K
JK . J
K .

J
J.K
 K ,P K AJK
Image sequence,
P I.A
.
Cascade,

AJK

Autotrace,

@ J.K
Backtracking,

g J.K

J.K
Install,
I

J.K
Installation,
I

J.K
Setup (Installation),
I

m ' , '
 K , 
JK
Evaluation,


m ' , K Qk
Partial evaluation,

. 
JK
.

KQk
 J J K
Disk duplexing,
Q@

Ignore,
Am.'
Adjacency,
PAm.'
.'
Bypass,
PAm
PAm
.'
Failover,
 @
.'
Jump,
Q  ,PAm
.'
Override,
PAm
System testing,
A J@ K . Qm.'
Abstraction,
YK
Qm.'
Beta abstraction,
AJ
K. YK
Qm.'

Bracket abstraction,
@ B@ YK
Qm.'

J.@ YK
Qm.'
 KAJ
Data abstraction,
HA
Fragmentation,
K Qm .'
Partitioning,

 K , K Qm .'
Block (verb),
YJ
m.'
Freeze,
YJ
m.'
 m'
Combination,
J

.
Aggregation,
J
m.'
Prevent,
ZA K@ ,I.
Jm .'
. , g Q 
m.'
Mixer device,
Cg PAk
Workaround,
K
Am'
Notify,

J
K. AK
, J
J

XAJ
 K@




Master-slave,
J.J K. AK
Slave,
K. AK
'@ QK QK AK
Case sensitivity,
Qm
 . . Q  
Effect,
QK , 
K AK


Delay,
,Q
g AK
Date,
t'
PAK
Epoch,
H. Am '@ ZYK. t'
PAK
History,
t'
PAK

,
AK
Foundation,


Check,
m , Y AK

Confirm,
YJ
AK

Confirmation,
YJ
AK
 @ A
 @ ,AB @ YJ AK
Handshaking, AB






Hardware handshaking, XAJ A@ YJ
AK
Xm '@ YJ AK
Quality assurance,
.


Kerning,
( Qk B@) J
AK
Complete,
AK
Exact,
AK

Abstract interpretation,
XQm. K
AK

K. XAJ.K
 KAJ
Electronic data interchange, HA
Q@

G




Divergent,

k. @QK@ ,
YAJ.K


Divergence,
@QK@ ,h. @Q K@ ,YAJ.K
Contrast,
K
AJ.K

Lag,
A J . K
Dissipation,
X YJ . K
Packet-switched,
 Qm '@ K
YJ.K

 K
Context switch,
AJ


YJ.K
 K YJK
 Q@
Label switching,
HA

.
Toggle,
K
YJ.K
Dependence,
AJ.KP@ , J
J.K
Functional dependency,


AJK
X J
m'
J@ Jm'
Flow analysis,
 Y


Q
K
P J
m'
Fourier Analysis,
Lexical analysis,

J
m'
J
m'
Object-oriented analysis,

Q
J
k. J@
Parse,
J
m'
Parsing,
J
m'
Real-time structured analysis,
J
m'

P
J
K .
 . AK J
m'
A J
m' , IK
Static analysis,

 . AK J
m' ,
A J
m'
Static analysis,
IK
m , A J@ J
m'
System analysis, A J@
Load,
g ,J
m'
Morphing,
m'
Switch,
m'
   
Discrete Fourier transform, K
P @ K
m'
  J @

Beta conversion,
AJ
K. K
m'
 J)
,K
m'
Converse,
(
Conversion,
K
m'

Conversion to iteration, P@QJ@ @ K
m'
Convert,
K
m'
Converting,
K
m'
Implicit type conversion,
K K
m'

 , 

 K XAJ
.

Linear transformation,

k K
m'
Auxiliary storage,

A @ K
Q m '
K
Q m '
Caching,
I 
Non-volatile storage,
QK
AJQ
K
Q m '
Secondary storage,

KA K K
Q m '
Storage,
K
Q m '
Store,
K
Q m '
Dynamic analysis,

I.J.m'
 '
Infrared,
Qg @ Im
Bus sizing,
@ K
j.m'

Ym'
Incremental update,

YK
@Q K IK

Ym'
Update,
IK
Define,
K
QK ,YK
Ym'
 PY@ YK Ym'
Rating,
QK
Y K , k
.

Specify,
YK
Ym'
Edit,
QK
Qm'
 ,QK Qm'
Edition,
J
.

 Qm'
Animation,
K

Animate,
K
Qm'
Move,
K
Qm'

m'
Enhancement,
Data acquisition,
(AjJ@) J
m'


HAJ
Q
m '
Prepare,


J.@) m 
 KAJ
 m '
Validate, , gY @ HA

(...t '@ ,l. @Q.@ KA

 m '

Validation,
C
Verification,
J
m '
Verify,
J
m '

Control,
m'
 Qk m'
Keymap control,
hAJ 

m'
Remote control,
YK.
Resource control,
XPK. m'
Analysis,
J
m'
Backward analysis,
m '@ @ J
m'
 Jm'

Binding-time analysis, AJ.KPB@ I
 
'
Complexity analysis,
YK J
m

Cryptanalysis,
J
J@ J
m'
  '

K. Y
 KAJ
Data flow analysis,
HA
K J
m

Defect analysis,
@ J
m'
Grain,

K
YK
Q
Y K
Remind,
Q
Y K
Reminder,
Footer,
J
K
Y K
Undo,
(K
YK) k. @QK
Overlapping,
I.@QK
Cumulative,

@QK
Edu,

J
K ,
K. QK
Quadratic,

J
K. QK
Quadrature,
J
K. QK
Education,
J
K. QK
Arrangement,
J . 
KQK
Arrange,
I.
KQK
Ascending order,

YA I.
KQK
 I
KQK

KA
Byte order,
HAJ
.

. I.
KQK
Complete partial ordering,

KQk
A
Descending sort,

PA J K I.
KQK

AK. I.
KQK
Network byte order,

J. IK
. I.
KQK
Partial ordering,

K Qk
Sorting,
PQ ,I.
KQK
  g QK
Fuzzy translation,
D
. .


Rough translation,
J
.K
QK  g. QK
Translate,
k. QK
Salutation,
C , I.J
kQK
License,
J
kQ K
Frequency,
QK@K ,XXQK

JB @ XXQK
Sampling frequency,
AJ


Repeat,
P@QK ,YK
XQK
 ,iJQ K
Filtering,
J




Observations,
HAkC , H@YQK
X Align,
J
QK
Notation,

m '
Customization,
J
m '
 J
 m '
Complete graph,
A

Schematic,

J
m '

Cause-effect graphing, J. J. J
m'

.
Layout,
J
m '
Plot (verb),
k ,J
m '
Skip,
m '
Decrease,
J
 K , J
m ' , J
m '
Decrease,
J
m ' ,J
 K , J
m '
Evaluation,
'
 K , 
JK , 
m '

m '
Guess,
. 
m '

JK ,K Qk
Partial evaluation,

K Qk
Housekeeping,
K
Q
m ' Q
K. @YK
K
Interference,
g@Y
Project planning,

J K ,Q Q
K. YK
Q
 K
Gradient,
h. PY
Grayscale,

XAP h. PYK
h PYK
Hue,
@
.

Consolidate,
YJ
K ,
YK
 

J.@  Y
 KAJ
Data flow,
HA
K
K
Stream,
 X ,  Y
K
Batching,
J
Y
 

K. Y
 KAJ
Dataflow,
HA
K


Audit,
J
YK
 K
Checksum,
j. @ J
Y
 K
PX J
Y
Cyclic redundancy check,


ZAk B@
Q
YK
Destroy,
Internationalization,
K
YK
Specialisation,

J
j.
Register,
J
j.
Subscribe,
J
j.
Subscription,
J
j.
H Q
@ @
File descriptor leak,

.


Memory leak,
Q @ X H. Q
Leak,
I.K
Q
Q
Underscore,

Delivery,



Hill climbing,
CJ@ 


Aliasing,
Justify,
K

Settlement,
K

 . Am '@ Q
J

Accounting management, HAK
 J @ Q
J

Asset management,
HA
Q  QJ
Code management,

Saturation,
J. 
October,
B@ K
Q
Multi threading,

XYK I. 
Threading,
I. 

  
Data fork,
HAJ
Fork,
h. @Q K@ ,   

Automation,

@ J
 
Dry run,

PAJ.Jk@ J
 
Dual boot,
h. X Q J
 
Q  

Space character,
PQ@

Q
 
Crypt,
J
 
i. @
Noise shaping,
Distort,
Z@J@ ,  
Collision,
XA
Ascending,

YA
Increase,
YK
@Q K ,YA
Crossed,
A K , I.A
Record (verb),

J
Q K
Entertainment,
J
Q K
Patch (verb),
J
Q K
Numbering,

Q K

Q K
Hatching,
Filter promotion,
lQ @ J
Q K
YA , J Q K
Promote,


Upgrade,
J
Q K
Modular,

.J
QK
Compose,
I.J
QK
Composition,
I.J
QK
Mounting,
I.J
QK
P K ,iJKA @ k
 Q QK
Keyboard focus,
.




iJ
KA @ k
Keep,
QK
Cell encoding,
AK
Cm '@ Q 
QK
Q 
B@
Character encoding,
Qk

QK


Encode,
Q QK
,Q
QK
Q 
QK
Encoding,

Horizontal encoding,
 @ Q 
QK
Progressive coding,

Y  K Q 
QK
Dynamic translation,
J
AJK
X YJQ K
YJQ K
Professional programming,
J
J
 QK
Header,


Q K
Concurrency,
@
Incremental,

YK
@Q K
Increase,
A KP@ ,YA ,YK
@Q K
Line feed,
Q YK
Q K
Q.j J@ ,ZA
Inquire,
 HCJ

j.
Counting records,
Y@
  
Blocked record,
J J

j.
 j
Child record,
K
JK . J

.

Record,
J
j.
Edutainment,

K. QK

,j 
Amplify,

j 
Enlargement,
pA JK@ ,
j 

Shading,
J



Embed,


Include,
Narrowing,
J


Match,
K . A
 J
J.
Scientific notation,
J
HA
Application,
J
J.
Apply,
J
J.
J
J.
Function application,
J


Horizontal application,
 @ J
J.
Require,
I.

Component based development, . QK


@
 K
HA
Developement,
QK

Development,
QK

Tweak,
K

Dither,

J

Shadowing,
J


Cache conflict,
AJ.m
PAK
 PA
Context clash,
AJ

K
 K
Backup rotation,

AJ
Jk@ I.A
 K
Image sequence,
P K. AJK ,P I.A

Correlation,
 AK
Handle (verb),
AK
K
Collaboration,
A
Q
J.K
Expression,
Regular expression,

Q
J.K

Count,
X@Y K

Enumeration,
ZAk@ ,X@Y K
Growth,

A K ,I.A

Error recovery,
Am '@ YK. iJ
j
Export,
QK
Y
Authorization,
l'
Q
Compilation,
K
Q
Compile,
K
Q

Q

Minimize,

Zoom out,
Q ,Q

 
Browse,
i



Hierarchical navigation,
Qm. i

Navigation,
i

Q

Reset,

Filtering,
iJ
Q K , J

Repair,
iJ

Design,



Object-oriented design,

J
k. J@

 J

Categories,
HA

Classification,
J


Classify,
J


Computer-generated imagery, Y QK

H. Am 'AK.
K ,P ,QK

Q
K ,iJ

Illustration,

Mirroring,

@Q QK


 ,m '@ K

Line buffering, Q@ K
 ,Q@ K 
Line buffering, m '@ K




Q
Q
Render,
( 
. ) 
J
 
Q
J

Rendering,
Conflict,
A J K ,H. PA 

Multiply,
A
Decay,
A 
Fade,

CK , A 
Configuration,
J
. 
Intersection,

Boxed comment,
Comment,
Hang,
Suspend,
Instruction,
Privileged instruction,
Privileged instruction,

Transfer statement,
Edu,
Encrypt,
Incantation,
Mapping,
Map to,
Set,
Encapsulation,
Variations,
Alter,
Alteration,
Change,
Logical shift,
Logical shift left,
Logical shift right,
Modification,
Rename,
Detail,
Differential,
Interactivity,
Interactive,
Condition out,
Core dump,
Crash dump,

K. Q J
K
J
K
J
K
J
K
 K
J




 X J
K

J@ H@
,PAJ
 K

 J

JK ,  J
 K

 X
PAJ
J@ H@
 K
 J@ J

K. QK ,
J
K
J
K
 YK K


J
K
@ 
J
K

J
K
J
K
 Q
K
H@
Q
J
K
Q
J
K
Q
J
K
 J QJ K



PA
J Q
J
K
 J QJ K
J

Q
J
K
B@ Q
J
K
J
A K

A K
J
A K

A K
Q K
Q K
. @ K
Q K
AJ

PAJ
E@ K
Q K


A B@ K
XYK
 @


Polymorphism,
A B@ K
XYK
Cooperative multitasking,
A @ XYK
J@

GA
Hybrid multiprocessing,
Z@Qk. B @ XYK

j.@ m . 'A @ XYK , 
j.@
Hybrid multiprocessing,
m . 'A @ XYK

j.@ Z@Qk. B @ XYK , 
j.@
XYK
 @
Multilingualization,
HA
Multitasking,
A @ XYK
 @ XYK
Pre-emptive multitasking,
HA


KA @
Modify,
K
YK
 K
Identify,
Q
 K
Optical character recognition,
Q
'@ Q
Qm

.
K
Recognition,
Q
 K
QK
System Configuration,
A J@ HA

@ K K
QK
Datatype definition, HAJ
Define,
YK
Ym' , K
QK
Definition,
K
QK
  
Dimensioning,
XAK. B@ I

J.K @ K
QK
Driver,
K
QK
Identification,
K
QK
Recursive definition,

P@QK K
QK
Disable,
J
K
 
Complexity,
Y
K
 
Essential complexity,

A @ YJ
K
Adaptive learning,

J
J
K K

Machine learning,
 B@ K
Annotate,
J
K
 , J
K
Annotation,
J
Ag
Parametric polymorphism,

J
J  K
Technique,
J
J  K
Calendar,
'
 K

JK ,'
 K
Evaluation,
Conservative evaluation,
Am
J
 K
Lazy evaluation,

J
 K
Integrity,
AK
Referential integrity,

k. Q AK
Q
J.K
Enlarge,
Q
J.K
Maximize,
Q  . ,Q
J.K
Zoom in,
Condense,
J
JK
Jam,
AgP ,YK
Q @ X YK
Memory heap,
Reusability,
AJB @ K
P@QK
Recursive,

P@QK
Iteration,
P@QK
Mutual recursion,
XAJ.J P@QK
XA@ , YK XQK ,P@QK
Repeat,


,P@QK
Replication,
A
Reuse,
AJB @ XA@ , AJB @ P@QK
 K
Complement,

Directory stack,
Yj. @ AP , J
Y@ K
Adapt,
J
J
K
Fade,
A  ,
CK
Manipulation,
I.CK
K
Correspondence,
C
Hash,
YJ
J.K
 '@ KA  K
Finite automata,

AJ J Qm


Feed,
K


Cache coherency,
AJ.m A

Cache consistency,
AJ.m A
 AA
Just-in-time,
I @

Nanotechnology,

KA J@

K , Q
K
iJ


K
Preferences,
HCJ
Preference,
J
K
Activate,
J
  K ,J
K
Enable,
J
K


Inspection,
ZA J @ , Y  K
Case based reasoning,
 . Q
K

 J B@
Bijection,
K. A K
Aging,
XA K
 XA K
Password aging,
Q@
Reports,
QK
PA K
Crossed,
I.A ,A K
Intersection,
I.A ,A K
Technology,
KA  K
Advance,
Y K
Progress,
Y K
 PY@ YK Ym' ,QK Y K
Rating,
k
.

Approximate,

.K
Q K

QK
Q K
Problem report,

Report,
QK
Q K
Partitioning,
K Qm .' ,
 K
Segmentation,

 K
 J @  K
Zoning,
A


Classic,

XAJ
J@ ,
YJ
 K
Contraction,
J
 K
Shrink,
J
 K
Decrease,
J
m ' ,J
 K
Parallel reduction,
J
 J K ,P@ J J
 K
 Q J J  K
Fiber optics, , AJ
B@ HAK

. 
 

Fibre optics,
, AJ
B@ HAK
Q. J
JK

 @ J J  K
Humanist technology, Y@ J
KA

Illustration,

YJ
J K


Sequential processing, m. 'A , AJJ YJ
J K

 
J
AJJ
Debug,
iJ
 J K
Parallel reduction,
P@ J J
 K ,J
 J K
Frame relay,
PAB @ J
 J K

Masquerading,
QJ K
 
Dot notation,

 K IK

JK
IK

J K
Infix notation,

g@X
 IK

J K
Postfix notation,
j
 
Prefix notation,
@YJ. IK
JK
Illumination,
KA @ ,QK
J K
 J K
Variant,
K







Format,
 , J
K , JJ
E

 E
Format (verb), J
K ,( Q m , ) JJ


()






Preformat,
K
YJ
A@ , K
YJ
JJ
E
Frequency,
XXQK ,QK@K

HP@
 K
Multiple inheritance,
A
Balance,
P@ K
Parallelism,

P@ K
Communication,
@K
 Y A J  @ K
Fit-to-window,
 P @YB @
 @ K
Backward compatibility, H@

K. A@
Compatibility,
 @ K

Pattern matching,
H. B@  @ K
Documentation,
J
KK
Orientation,
Am.' @ , J
k. K , k. K
Adaptive routing,

J
K J
k. K
Dynamic routing,

J
AJK
X J
k. K
Hierarchical routing,

Q J
k. K
Orientation,
k. K , Am.' @ , J
k. K
Run,

@ JJ
Q

Extend,
YK
Y
QK Q
Message passing,
KAQ@

Pass,
QK
Q
Scroll,
QK
Q
Excercise,
K
Q
Enabling,
i , 

Initialization,
YJ

Name resolution,
B@ Q 
J

Proportional,
I.AJ J ,
.AJ K
Fit,
I.AJ K
Descending,

A J K
Conflict,
H. PA  , A J K
Alternating,

G. AJ K
Alert,
P@ Y K@ , J
J. K
Notification,
J
J. K
Download,
K
Q  K
Coordinate,
J
 K
  , J  K
Format,
JJ
E ,








Format (verb), , ) JJ
E ,() J
K
( Q m
Activate,
J
K , J
  K
Clean,
J
 , J
 K
 J K
Data set organization,
m
.


J.@
 KAJ
HA
Organize,

J K
Q
K. YK ,Q
J K
Project planning,
Q
Executable,

YJ
J K
Executive,

YJ
J K
Execute,
YJ
J K
Execution,
YJ
J K
Launch,
YJ
J K
Knowledge representation,

 . J , iJ
J@ IK
 . AK , iJ
jJ@ IK
 . AK
I
 . AK , iJ
J@ IK
 . AK
Fixed,
iJ
jJ@ IK
 @
IK
 . AK
Fixed-point,
A

 . AK
, IK
Static,

G
Secondary,

KA K
Microsecond,
QJ
J
KA K
Second,

GA K
 
Dithering,
@ B@ HAJ
K
  .


Reliability,
K , HAJ.K
Ctrl,
QK

m '
Bold,
CSS,

Q K
Exploit,


Gap,
@ Q , m. , Q K
 J ,I K
Hole,
j
.


Reliability,
HAJ.K ,  K
J
 K
Heavyweight,
P@

Octet,
J
KA

Octal,

GA
Bidi,
Am.' B@ J
KA J K
Bit,
JK . , P X , J
KA J K
Binary,

KA J K
 KA J K
Bipolar,
I.@
 @

 KA J K
Dual-partition,
J

Fixed,

h.

 , HA

@ XAg.



@ K
Q , HA
@
HA

 . @ J
K. XAg
IJ
.




, A @
PAg. , J
J.J@
PAg.
YJ
J J@
PAg.
 @ PAg , YJ J J@ PAg
A

Information highway,
Bit gravity,
Processing,
Processing,

Routing,
Complete unification,
Distribution,
Normal distribution,
Expand,
Expansion,
Junction,
Major delivery,
Colocation,
Hot swapping,
Linking,
Mail delivery,
Receipt,
Illustration,
Consolidate,
Localization,
Availability,
Provide,
Branch prediction,
Expect,
Forecast,
Pause,
Timing,
Digital signature,
Valid chars,
Suspension,
Probability,
Assertion,
Generate,
Generation,

H
Constant,

J
k. K
A YJ
kK
 P
K

K
K
J
J. K
P
J
K
J
K
 K
J

 K
QJ J

J. J
K

P J
K
J
K
YK
Q.@ J
K
J
K
K
P ,Q
K ,iJ

YK ,YJ
K

K
K
Q
K
Q

 K
Q J@
 K
I. KP@ ,
 

K
 K

I 
 K


IJ
 

P J

K


J
K
 K
J

 K
AJk@ ,
YJ
K
YJ
K
J
k. ,YJ
K
 . AK
IK


P Yg
.
Qk.
Qk

KQ
.

KQ Qk.

Qk.
 X , AK

PAJ.k B@ YK
Qk.
H. @ Y Jk. @ ,Qk.
J ,K Qk

PAj

.
.
Z Qk

AK. , Qk
.
IK
.
h. Q k ZQk

Qk.
Qk.
Qk .
YK
Q.@ Qk.

A Qk.

J
KP k.

k .
.
k
k.
.

@ Qk
I.g.

I.g .

g
.

Root,
Bell,
Visible bell,
Visual bell,
Flow,
Newsletter,
Pull,
Partial,
Molecule,
Byte,
Critical section,
Bridge,
Bridge (noun),
Bridge (verb),
Mail bridge,
Northbridge,
Main body,
Particle,
Polling,
GPL,
Geographical,
Fetch,
Retrieve,
Session,

)
Squatting,

 (g)
ZAQ @
.

h.
Cooperative,
Sum,
Sum (verb),
Sentence,
GNU,

Ag.
m. ,g.
g.
 g

.

Jk.

Processing,

 @
, YJ
J J@
PAg. , A
J
J.J@

PAg.

PAg.
Ongoing,
PAg.

 J ,Ag.
Eyedropper,
I
Gamma,
AAg.
Y J @ IKAg



Deskside,
. . ,I.J @ I.KAg.
. , Y J @ IKAg

Deskside,
I.J @ I.KAg
. .
.
Write side,
K . AJ I.KAg

Ready,
I. AJ ,QAg
.

Cos,
AJk.
Gtk,
Jk.
Firewall,

PAK P@Yg.
Cartesian product,

GPAK
X Z@Yg.

Horizontal tabulation,
J
 @ Yg
.



Instruction scheduling,
HAJ
J@ Yg.

Priority scheduling,
K
B@ Yg
.


Process scheduling, Yg. ,Z@Qk. B
@ Yg.
m. 'A @



Process scheduling, Yg. , m. 'A @ Yg.
Z@Qk. B @

Scheduling,
Yg
.

Tabulation,
Yg.
 '. Yg.
Im
Colour look-up table,


@ B@
Process table,
Z@Qk. B@ Yg.
Routing table,
J
k. K Yg.
Scheduel,
Yg.
Schedule,
Yg.
Spreadsheet,
YJ Yg.
Table,
Yg.
New,
YK
Yg.









Eigenvalue, J
, (G@ X) Q
P Yg.

J
K@ X

KA H. Ag
Computer,
H Ag
 .
Digital computer,

P H. Ag
First generation computer, J
m. '@ H
. Ag

B @
Fourth generation computer,
H. Ag
K. @Q@ J
m. '@
H Ag
Host computer,
J

.
Laptop,
m H. Ag
Laptop computer,
m H. Ag

Machine,
 @ , H. Ag
Mainframe,

J
KP H. Ag
Notebook,
m H. Ag

Parallel computer, (J
 @) P@ J H
. Ag


Personal computer,

m H. Ag
Pocket computer,
I.J
j. H. Ag
Quantum computer,

H. Ag
Second generation computer,
H Ag
GAJ@. Jm '@

 
 .

Annotation,
J
K , J
Ag

Footnote,
J
Ag
QAg
Brace,
Left brace,
K
PA
QAg
Ag
Right brace,
J
J

Q

Clipboard,
 Ag

  Ag
Screensaver,
A @

  Ag
Screen Saver,
A @

Local bus,
J
m  Ag

Edge,
Ag

Case,
Ag

'@) Ag

Q. ,( Qm
Case (font),
( Qk)

Child status,
K
JK . Ag

Problem state,
 @ Ag

Analogue computer,

 ) JJk
P ,(
( P)

.
.
Bus device,
A K PAk
PAk
.
Character device,

Qm

.
Clone device,
q J PAk
.
Complex programmable logic device, PAk







YJQ K. A Y
J
.
Device,
PAk
@ PAk
Dialout Device,
AgXB
.
PAk
.
Display device,
Q@
PAk
.
Input device,
AgX@

.
Mixer device,
g Q 
m.' ,Cg PAk
PAk
.
Peripheral device,

Q

.
Q
 AK PAk
Pointing device,
.
Virtual machine,

QA PAk
,G@ k
. ,g@X
Inside,

AK

 .
Quality,
Xk.

 m '@ Xk.
Quality of service,
HAY
.

K
k
Von Neumann, John,
AJ
Generation,
YJ
K ,J
k.
GNOME,
JJ
k.
 , HAm
Group,
m
.  . h.
 Qk ,@ Qk h
Map,


.


Meaning,
,
GA h.

h
Pie,
Q
,QKA
.
Quorum,
D ,D @ h.
Pound,

h
Sharp,
Guard,
Calculator,
Microcomputer,
Minicomputer,
Computron,

XAg
PAg
J . Ag
QJ
I.Ag
I.Ag
Q

. Ag
K

Hard limit,
Limit,
Redisplay,
Sharpness,
Delete,
Deletion,
Colophon,
Literal,
Lower-case,
Metacharacter,
Upper case,
Wide character,
Wildcard,
Accent,
Gesture,
Motion,
Dynamic,
Float,
Free,
Binary package,
Kamikaze packet,
Narrowband,
Package,
Resource bundle,
RPM package,
Ray,
Account,
Calculate,
Calculation,
Compute,
Root account,
User account,
Case Sensitive,


 Yg
Yg

Yg
Q@

 , Yg
X

Yg

Yg
 @ XQk

,
Qk

Qk
Q


@ Qk

Q
J. Qk


Q Qk

YK. Qk

Qk

Qk

Qk

Qk
Qk
Qk
JKA J K  Qk


K
PAjJK@  Qk

J
 Qk

 Qk

XP  Qk

  Qk
Qk

H. Ak
H. Ak
H. Ak
H. Ak

P Yg. H. Ak
Yj J @ H. Ak
'@ Am
 Ak
Qm

Process status,
Race condition,
Resource state,
State,
Status,
System state,
Wait state,
Zero state,
Current,
Resolver,
Carrier,
Common carrier,
Digital carrier,
Retry,
Container,
Coarse grain,
Fine grain,
Love,
Mask,
Size,
Storage space,
Volume,
Word size,
Event,
Intuitionism,
Intuitive,
Occurence,
Occurrence,
Polynomial,
New talk,
Zoo,
Border,
Closed term,


Ag

Ag

Ag

Ag

Ag

A J@ Ag

PA JK@ Ag
Ag

K
Q

Ag

Ag
A K ,Ag

XAJ
J@ Ag



P A K ,
P Ag

@XYm. Ag
K
Ag
 k I. k
 Ik
J
X
.
I.k

AJ ,H. Am.k
 ,mk

.



K
QjJ@ m.k
m.k
 mk

.
HYg
J
Yg

Yg

HYg

HYg
K
XYg

Yg
YK
Yg. IK
 K@ J
m '@ K
Yg
HA
Yg
 Yg
Z@Qk. B@
K
PA
XP @


J
m g

Loop,
P@QJK. Y JK
,PQK
, g

Repeat loop,
XXQK g
 
Resolve,
Q , g

Nipple,
g
Computer cookie,
H. Ag g

Non-optimal solution,
J @ 
g
  
Resolve,
g , Q , g
K
Ag , q@ K
Ag
Copy protection,

q@
K
Ag
Copy protection,
K
Ag , q@
q@
Q @ X K Ag
Memory protection,


Protect,
K
Ag
Protection,
K
Ag
Backport,

g
Load,
J
m' ,g

HTTP,
 k

HTML,
G k
Alert box,
J
J. J@ P@k
Dialog,
P@k
Discussion,
P@k
Margins,

@k
Computing,
J . k
Fuzzy computing,
J
K. AJ. J . k

Pool,
k

Resource pool,
XP@ k

Hover,
k , Ak

,k
Hover,
Ak




 , , k
Implies,
AJk
Life,


Perplexity,
AK. P@ , Q
g

Local loop,

Sensitive,

Ak
Natural deduction,
J
J. k

Clustering,
Yk

Millennium bug,
J
B@ Qk

Quota,
D @ , k
Get,
k


k
Demote,
J.KQ@
 ,  J , Qk

Block,
Y
 ,Qk

Prevention,
Y

Prohibit,
Qk

Compactness preserving,
A  k

Save,
k

Field,
k

Key field,
hAJ @ k
 k

Password field,
Q@

 . AK k
Static field,
IK

Subfield,

Q k

Injection,
 k
 k




K KA  , HAJ
Legalese,
HAJ
 m '@
 k

m ,QJ@
Copyright,


Fields,
k

Briefcase,
J . J
k

Software development kit,
QK
 J . J
k
l. @QK.

Physical,
,Xk. @
J
k

Real,

J
k
Bus arbitration,
@ J@ k
k
Central arbiter,

JJ

QQ
Arena,
J . g

Rings,
I g

Do loop,
P@QJ@ g

Endless loop,
J
AJ JB g

E B g
Infinite loop,
J
KA

Bitmap,
Charmap,
Specials,
Attribute,
Property,
Private,
Special,
Device-dependent,
Inactive,
Entries,
Checkbox,
Menu item,
Know-how,
Caching-only,
End,
Timestamp,
Mail services,
Professional services,

 g
J
KA J K PA
PA
 g
PAm

Ag
HAJ
J
Ag
J
, J
Ag
Ag
Ag
Q jJ A g

.
Ag
 KA g
HA
Q
 AK KA g
 A KA g
K
@P X , Q. g

 ZI.k
AJk

P k
 g
YK
Q.@ HAY
HAY
 g
J
J

Connection-oriented network service,

ABAK.  k. J
J.

K.
 KAJ
Data service,
HA
 g , JY@
Directory service,
Y

Directory service,
Parallel-service,
Scalable service,
Service,
Output,
Standard output,
Code violation,
Violation,
Exit,

 g
Y
 g
Y
 g
Y

j. @
 
 g , j
Y
. @ Yg
J
Y@
K P@ J Y
 g

 A Y
 g
J
Q K
.
 g
Y

h. Q k

AJ
 h. Q k
 Q
 k
(Y@)
PAQ@
 k
Q
h. Qk

 J@ Q g
A

Xk. ,
k

Bandwidth,
Exist,

p
J
K. Ag
J
K. Ag
J
K. Ag

 B@
(l. 'A) J
K. Ag
Level two cache, J @

GA J@

Primary cache,
J

KP J
K. Ag , J
@ J
K. Ag

Primary cache,
J
@ J
K. Ag , J

KP J
K. Ag
Boot server,
C@ XAg

Caching server,
ZI.k XAg , JJ . m ' XAg

Caching server,
JJ . m ' XAg ,ZI.k XAg
Compute server,
H. Ak XAg

YA XAg
Database server,
HAJ
XAg

File server,
HA
Mail server,
YK
Q.@ XAg
Master server,

J
KP XAg
Proxy server,
J
XAg
 XAg
Screen server,
A @
 @

Webserver,
J
.  XAg
Server,
XAg
Web server,
H. XAg
External,
J
k. PAg


FIFO,
B @ g@Y@
,B @ h. PAg


First in first out,
B @ g@Y@
,B @ h. PAg
 

Last-in first-out,
@Qk @ g@Y@ ,B @ h. PAg

 
LIFO,
@Qk @ g@Y@ ,B @ h. PAg
@ h PAg
Off-topic,

.
Outgoing,
h. PAg
h. PAg
Outside,
h. PAm '@
,
K
XAJ@

Direct mapped cache, J
jJ@ QAJ.
(l. 'A)
Level one cache, J @
Credential cache,

k
k
J
k

Pitch,
Step,
Linear,

)
Serif,


K
Y (k)

p
k

KA

Baseline,

A @ k
Bitmap font,

 K k
 k
Broken line,

 J , @J ,(k
Continuous,
@X)
  k
Dedicated line,
Q
Diagonal line,

Q k
Differential line,

A K  k
 . AK k
Fixed Font,
IK
@
IK
 . AK k
Fixed width font,
Q
Font,
k

Horizontal line,
 @ k
k
Leased line,
Qk.

Mercury delay line,
QQ
Q
g AK k
Outline font,

J
K k
Plot (verb),
J
m ' ,k
Raster font,

 K k
Scan line,
i @ k
Serial line,
 k ,  k

Serial line,

 k ,  k
 k
Cross-fading,
H
J
k
Lightweight,
P@
Lite,
J
k
Invisible,

k
 g
Digest,
C

Backslash,

h. Qk

B@

Qk
Character map,
Qk
 Qk
Linear map,
J
k 




Map,
@Qk h. , 
Qk
 Qk
Portmap,
Y A J @ 


Radar map,
P@X@Q@ 
Qk
 
 Qk
Sector map,
A@



@ Q k
Data warehousing,
HAJ
k
 A
Common properties,
A
k
,A
 @
Properties,
HA
k
 A
Ticker Properties,
 A@
 k
Cluster,
X J ,
Privacy,
J
k
K P , A
 k
Chart,

GAJ

.
 k
Diagram,
A
Plotter,
Ak

Bus error,
A K Ak

Critical error,
h. Qk Ak

Error,
Ak


Fatal error,
hXA Ak
Ak
Internal error,

g@X

Mistake,
Ak
 @
Ak
Page fault,
j

Parity error,

k. Q@ Ak
Portmapper,
Y J @ A k
P Ak
Run-time error,

J
 

Standard error,

AJ
 Ak
 '@ ZAJK Ak
Syntax error,
m
.  .

 J Q Ak
Unexpected error,





Outline,

J
m' P ,  k
 k
Scheme,
m ,
 i @ k
 @
Raster,

A
  J@ k
Dot pitch,

Logout,


. ,g@X

G@ k. ,
AK
P@X
Circuit,
Publisher,
QAK ,Q P@X
Rotate,
PYK
, k P@X
Q  @X

Characteristic function,


Combinator,
J
 @ K @X

 J @X
Continuous function,


Function (Mathematics),
@X

Hash function,
K Qm .' @X

Higher-order function,
J . KQ@ J
A @X

Linear function,
J
k @X

Member function,
Yj J @ @X

@X
Membership function,
K
@

, @X
Indicator,
Q

. @X
Partial function,
J
K Qk
QK@X

Circle,

Permanent,
'@X
Delta,
@ X
Debianize,
J 
K. X

Input,
g X

Standard input,

AJ
 gX

Enter,
kX

Multiple access,
XYJ kX
Qg , K @P X
Know-how,
.

 . PX
Degrees,
HAg
 . PX
Degrees of freedom,
K
Qm '@ HAg
 PX
Degree,
k
.


Chat,
XPX

Decision support,
P@Q X

P X
Run-time support,

J
 
YA ,X
Support,
Address book,
K
AJ QX
Microlog,
QJ
QX
Inside,

g
 , C
PA

Disassembly,
,g
Background,
J
g


Desktop background, I
. J @ i J
g
Virtual Desktop,
I.J @ i J
g
 J
g
Wallpaper,
A @
 g

Aliasing bug,
 g
Nice,
J
,
Cellular,

g
Cell,
J
g
J g
Char cell,
Qm

Servers,
X@k
k
Algorism,
J
PP@
k
Algorithm,
J
PP@
 B J PP@
Anytime algorithm,
J
J

k
   k
Approximation algorithm, I
. K
QK J
PP@
   k
Evolutionary algorithm, K
P J
PP@
k
Genetic algorithm,
J
K@P J
PP@


k
Exponential-time algorithm, J
 @ PP@
Q@

 P AJ
k
Command line options,
Q H@

Q@ B@
 P AJ
k
Options,
H@
Optional,

PAJ
k

Command line option,
Q@ @ Q PAJ
k
Option,
PAJ
k
XML,
k
Difference,

h
P JJ E iJk

.


JPEG,

X
Crawler,
Internal,

P ,H @X
k@
.
JJAK


. , J
g@X


 B@ PX
PX
K
PX
@YK. B @
 PX
K . A ,PX
PX
PBX

X

K
A.A.K
X

Machine cycle,
Period,
Periodic,
Circuit switched,
Floor,
Role,
Dollar,
International,
DMA,

)
Temporary buffer,


(  AJ.m Q@ X)

XA J@ Q@ X
Associative memory,
J
. @QK Q@ X

Base memory,
J
A @ Q@ X
 X Q@ X
Content addressable memory, H@
 K A Jm
Y
.

Conventional memory,
J
kC@ Q@ X
QAJ Q@ X
Direct memory,
.

Q@ X
Distributed memory,
P
Q@ X

Error correcting memory,
jj

Am '@


Expanded memory,
Q@ X

Q@ X
Extended memory,

External memory,
J
k. PAg Q@ X
Main memory,
J

KP Q@ X
Mapped memory,
JJ
Q@ X
Q@ X
Memory,
QK AJQ Q@ X
Non-volatile memory,

Q@ X
Paged memory,

j
QJ Q@ X
Persistent memory,
XQm Q@ X
Raw memory,
.

Access memory,

 X

Push,
X

Qk. ,  X
Flow,
AK
K ,  X
Stream,
 Y

Accuracy,
X

Precision,
X
 , X

, Yg
Sharpness,
h

Minute,
J
X

, BX
Significance,


BX
Axiomatic semantics,
J
E
YK. HAJ
Child directory,

JK . J
X
Directory,
J
X
Guide,
J
X
Home directory,

J
KP J
X
P @ , HAj

Legend,
J
X
Login directory,
h. @ J
X
Manual,
J
X

Sub directory,

Q J
X
Subject index,
J
@ @ J
X
Integration,
l. X
Mail merge,
YK
Q.@ l. X
Merge,
l. X

Dummy,
YA ,
@ Q @ , J
X
, X

Paint,
AJ
.
Duration,
Y ,@ X
Worm,
I K QK@ XX
 
 P X
Revolutions per minute, J
Y@ H@

H@

Rotations per minute,
J
Y@

P X
Rotation,
@P X

Bus cycle,
@K PX
PX
Cycle,
Cycle of reincarnation,
t AJ J@ PX
AJk PX
Life-cycle,

Batch,

 . P
 . @
HAJ
Arity,
J
.KP
Monotonic,
I.
KP
 Qk P
 KP@ , k
Jitter,
A
. .
Back,
k. P

Carriage return, k. Q , Q@ @ k. P
) Q@ @
( Qm



Marble,
AgP


Callback,
(A) Z@YK XP
Reply,
XP

K.  PP
 KAJ
Data packet,
HA
Packet,
 PP
Collate,
PP

Away message,
H. AJ
AP

Bounce message,
H. K AP

Ak AP
Error message,

Letter,
AP

Message,
AP

Message of the day,
J
@ AP
 , AJKP@ AP

Panic message,
Q X AP


 , Q X AP

Panic message,
AJ
KP@ AP

Post,
() P @ , AP

Messages,
KAP
 g KAP

Private Messages,
A
P
Character graphic,

Qm


Chart,
Ak ,
GAJ
K. P
Draw,
P
Drawing,
P


 , jJ
 GAJ
K. P
Histogram, P@QK h. PY


Illustration,
QK
 ,Q
K , iJ

K ,P



Outline,
k ,
J
m' P

K. , QAJ. HAJ
 KAJ

P
Direct graphic,
HA
QAJ
.

Networking,

 Q@ X
J
J
k
Pj
. m Q@ X
Reserved memory,

 
Resident memory,
J

Q@ X
 Q
 Q@ X
Shared memory,

Virtual memory,
K
QA Q@ X
QK AJ Q@ X
Volatile memory,



Pragmatic,

@ ,   , 
K @P X

P X
Atom,
Bit,
J
KA J K , P X
Atomic,

P X
Kernel panic,
AJ
KP@ ,Q X
 
 
 
Bootrom, ZQ C@ Q@ X) C@ X
(

Artificial intelligence,

AJ@
ZAX
FTP,
 X

Block-structured,
J J
K . X
Real Memory,

P
Connective,
Hotlink,
Link,
Permanent link,
Nym server,
Radio,
Vertical,
Arrowhead,
Proposition,
Leader,
Qword,
Dividend,
Bind,
Button binding,
Hard linking,

A@ ,. @P
. @P
kA
. @P
 @P
'@X
.


QJ
P J
K@ k. @P
K
X@P

X ,
@P

D @P

h@Q@ ,h Q ,
@P
YK@ P

AK. P I.Q ,
AK. P
 ,D@ l' P

.
 P
.
P@P P @ . P
I. . P

P
Port number,
Y J @ P
Process ID,
Z@Qk. B @ P
K
QK P
Resource element,
QJ@
J K @ XP
Binary exponential backoff, KA

Directory stack,
, Yj. @ AP , J
Y@ AP
J
Y@ K
Directory stack, , J
Y@ K , Yj. @ AP
J
Y@ AP

Gray code,

Qk. PAP

Native code,
J
@ PAP

Operation code,
J
PAP

Code (symbol),
QP

Control code,
m' QP

Country code,
YJ.@ QP

Mnemonic,

QYK QP
 @ QP

PID,

  
Sign,
K

, PA@ ,QP

Symbol,
QP

Exponential notation,
J
J
PP

Y J K Q@



Symbols,
PP

Modulate,
P
 . P
Robot,
HK

Visibility,
K
P

P

AK
Math,
HAJ

P
Mathematical,

AK
 KP
Bus mastering,
@ K A
Cardinality,

J
KP

Leading,

@ ,
XAJ
 ,
J
KP
Master,

KP ,
J
KP
Principal,

J
KP
Bus master,
@ K 
KP

Number,

Graphics,
Raster graphics,
Vector graphics,
Graphical,
Graphic,
Bullet,
Magic bullet,
Disk array,
Stack,
Stack,
Pound,
Deny,
Refuse,
Reject,
Raise,
Upload,
Shelf,
Software audit,
Chip,
Bilinear patch,
Canvas,
Patch,
Patch (noun),
Digitize,
Digital,
Device number,
Digit,
Host number,
Internet number,
Job number,
Markup,
Natural number,
Network number,


P
HAJ

P
J
JA HAJ

P
J
j.J HAJ

P



X@YK K
Q , AP

K
Qm AP

@Q @ P

 , P
P
 , P

P
 ) JJk
P
(

. ,( P)
P
P
P
P
P

P

l. AK Q.@ m ,l. AK Q.@ K . AP
 A P
 A P]
[ HA
 P
J
KA J K
 P
(Q@)
 P

 P


J P


P
. '@ P
PAm
P
J
@ P
I K QK@ P
 @ P


P
J
J. P
  P
AB@ J
.


Exponential-time,

 @
P
P
Latency,
@
P
Processor time,
l. 'A @ (J
 )

P
Runtime,
J
 @
P
Run-time,

J
 
  @
P
Seek time,
@Y
P ,
@
  @
P , @Y
Seek time,

@
P

P
Settling time, P@QJB@ (@ @)
Parity,
J
k. P
Pair,
h. P
Zombie,

. P
PAK P
Visit,


Offset,
Am'
P
Era,

Prefix,
Dragging,
Bulletin Board,
Place,
Naive,
Clock,
Hour,
Seeking,
Idle,
Hibernate,
Cepstrum,
Hexadecimal,
Hex,
Log,
Master boot record,

Scan register,

K . A
I.m , I.kA

A  K kA

, kA
A

Z
QK. ,h. XA

A

A

AJ
A

A
 .
HAJ
.
Q


Q I

I
m.
 m
CB@

J
KQ@
.

(Q@ )

i @ m.

Master,

P
Crawler,
Angle,
Corner,
Affix,
Dataless client,
Diskfull client,
Diskless client,
Diskless client,
Mail client,
Jam,
Decorative,

J
KP ,
KP

P
H. @X , k@
K
@P
K
@P
YK@ P
. P

@
Ag K
HAJ

 Z K
. P
Q@
. P ,Q YK

. K
. P
K

PA
Q@


. P

,Q@
PA K
. P
. K
Q YK
. P
YK
QK. K
YK ,AgP
k P

)
hJ @YJ. ( P P)

Open switch,

P
P P

Command button,
Q @ P P
Key (Button),
P P

Navigation key,
PAm'. B@ P P
Push-button,
P P
Radio button,
ZA JK@ P P
JK B@
XA@ P P
Reset button,

K@Y
.


Directed set,
h. QP
Q QP
Fuzzy subset,
A



Orthogonal instruction set, HAJ
K QP
YAJ
. QP
Partially ordered set,
I.
KQ@ J
K Qk
 J@
P
Downtime,
J

 A K @
Down-time,
J
 @

P
Button,

Q


@
Information highway,
, HA


@ XAg. , HA
@ K
Q
HA

Silently,

G

 . AK , G
Static,
IK

@
C
Class hierarchy,
A J
Salutation,
I.J
kQK ,C
Passive,

.


KA J K
Bit string,
HAJ

Chain,
YJ
 ,


Character string,
PAm
 K

Daisy chain,
J
J.A
@

Qk
Null string,
PA

 . @
Search string,
IjJ
Wired,




Pin,
QK. @ , 
Behavior,


Daughter,
J


Tolerance,
J
kA
Allow,
hA
Sky,
ZA
Audio,

Audiographic,

J
m '

Theme,


QJ
J
Centimeter,
P J

Singapore,

Year,
J

 J
Years,
H@
Simple,
J
. ,D
User-friendly,
@Yj JB@ D
Arrow,
D
Drop-down arrow,
D , @Y@ D
Y
SCSI,

I.m
Content-based information retrieval, I
m
.

Jj @ . HA
 @ I.m
Drag and drop,
HC
Drag,
I.m
Dragging,
I.kA ,I.m
Pull,
Qk. ,H. @ Y Jk. @ ,I.m
Revocation,
A. @ ,I.m
Magic,

Qm
Spam,
Am 
 Q

Clock rate,
A

Clock speed,
J
KAJ
@ Q
  
Constant angular velocity, JK. AK K
@P Q
 

Constant linear velocity, JK. AK J
k Q
 , Q

Rate,
Y

Speed,
Q

Software theft,
l. @Q.@ Q
Fast,
K
Q
Fragile,
I.@ K
Q

Confidential,

Q
Cursor plane,
 Q  @ i
Desktop,
I.J i

Cache line,
AJ.m Q

Command line,
Q@ B@ Q
Line,
Q



Q
Line of code,
Q@
,Q
Row,

 P
Lines per minute,
J
Y@


Amplitude,


Capacity,


Size,
m.k ,
Seek,


Fallout,

Checkout,

 
J
.



Mesh network,
K
Q J.
 
Net,
J
.

Network,
J.
 
Notwork,
J
.




Regional network,
J. , J
J
@ J.
K
Q

  , K Q J
Regional network,
J
.
 . 
J
J
@
 J
 
 J
g
Ring network,
@
.



Star network,
m.'  J.
 
 J
Wide area network,
@
.




Wireless local area network, J J.
J
B J
m
Pseudo,
J.
. J.
Pseudo-device,
PAk
Pseudo-terminal,
@ Q J.
Semiautomatic,

KA  K J.
 
Grid,
J

.

Lattice,

Q , J
.
XQm J K Qm
Abstract syntax tree,
.
. .
Binary tree,
J
KA J K Qm.
Qm
Hierarchy,
.

Tree,
Qm.
Hierarchical,
Qm.
Mesh,

Online,

@ (Z) , J (m )
I K QKB

@ Q. @
I K QKB


Intensity,
Severity,
Caption,

 Y 

 , Y
 hQ
k

Drop-down arrow,
Left arrow,
Quorum,
Scroll arrow,
Share,
Data mart,
Switzerland,
Policy,
Context,
Fence,
Workflow,
C,
Lexer,
ReNice,

D ,Y D
@Y@

PA
D

D @ h. , D
QK
QJ@ D
 ,D
Q


YA
HAJ
@Q


AJ

AJ

KA
,iJ
.

@ Q



QJ
K@ j 

h'

K K. A

Q ,
K
P
K

K
P
A 
. Q
Gas plasma display,
J
PCK
Screen,
A 
Splash,
ZYK. A 
Splash screen,
K
@YJ.@ A 

Glitch,
 , J . KA 
Common,
KA 
 
Artificial neural network,
J
. J
.
JAJ@




 

Bus network,
K
Q J. , J
k J
.






Bus network,
J
k J. , K
Q J.
 
Computer network,
I.@k J
.





Q
Heterogeneous network, Aj.J 
J.
 
Interconnect,
J
.





Local area network,
J
m J J.
 J J
 
Logical network,
J

.
Distributive lattice,

 Q 
J
KA
Q 
Code (program),
Kangaroo code,
K
Q J Q 
Legacy code,
G@QK Q 
Microcode,
QJ
Q 
Expansion slot,
J
K I. 

Strip,
Q K ,  
,Q
Acknowledgment,
A Q
Constant applicative form,

J
J. 
 . AK
IK
Figure,

PAJ@ ,
Form,

Make,

Normal form,
XA 

Shape,
C

Implies,
k ,  , 
XAD
Certificate,

Digital certificate,
J
P XAD
Month,
QD
Chaos,
@ 

Policy issues,
J
AJ

QJ 
Cipher,

Byte-code,

Online,

Strict,
Ascender,
Valid,
Paint,
Patience,

Slash,
Urgent condition,
Greedy,
Bit slice,
Slice,
Slide,
Bar,
Magnetic stripe,
Magnetic tape,
Menubar,
Menu bar,
Paper tape,
Progress bar,
Scrollbar,
Side bar,
Status bar,
Taskbar,
Vertical bar,
Expunge,
Logo,
Slogan,
Radiosity,

@ (Z)
Q. @ I K QKB


@
J (m ) , I K QKB

Buddy,

Dash,

Radial,
Resource fork,
Sector,
Job,

I.kA
PA
YA
l 'A

, AJ
X
.
Q.

Play,
Network transparency,
Referential transparency,
Transparent,
Assembly code,

 
Q
 
Q
 KA

PQ Q
Q 

KA J K m 
' Q
HAJ
m 
' Q
 Q K
, m 
' Q

Q
J
AJ 
Q

J
AJ 
Q
  Q
 A@



'@@ 
Q
  Q



YJ@ 
Q
 Q@ 
Q
. 
Q

.KAg

@ 
Q
HA
A @ 
Q

XA 
Q
I.
PA
PA
J
A

A
XP J . 
A , J . 


@ ,ZQ@ , 
Q
 @

J
.  J
A
, J
k. Q J
A 
 J
k. Q
J
A @
A 
J
m.' Q 

Row,
Write queue,
Validity,
Solid,
Education contact,

Vacuum tube,
Diode,
Glue,
Box,
Chad box,
Check box,
Chip box,
Inbox,
Mailbox,
Postal Box,
Scroll box,
Size box,
Abstract class,
Base class,
Class,
Complexity class,
Container class,
Equivalence class,
Buffer,
Cut buffer,
Frame buffer,
Digital audio,
Sound,
Blur image,
Boot image,
Captured image,


Q ,

K . AJ
J
kC
I.

Jj. @

K. QK @Q ,
K. Q@
A
Q

KA J K A
 , Z@Q ,
A
 J

K. Q , Y
 J

 J Y
HA
 J

Q
 AK Y
 J

 J Y
HA
 J

XP@@ Y
 J

YK
QK. Y
 J

YK
QK. Y
 J

QK
QJ@ Y

 J

Am.k B@ Y

XQm. J

A @ J

J
 K J

Y

@ J
 J

J A
@
 @
 @


PAB @ @
 

P H

H
 A P
C@ P
  J P

m 
Correct,
iJ
m


, l
Right,
Fault,
,Y

Login shell,
h. Y

Shell,
 Y
 Q K Y
Keypal,
@

Echo,
Y

Local echo,

m Y
Remote echo,
YJ
K. Y


, Y
Block,
J , Qk

, Y
Prevention,
Qk
 ,Q
Parcel,
AK
. 
 , Q
Q

Zoom out,
Q
Sufficiently small,
AJ
A



J
X HAj

Man Pages,
A


Home page,
K
@YJ.@ j


Homepage,
J

KP j
YA @ j


Man page,


Manual page,
K
YK
j


Page,
j


j
Page in,
 g@X
 PAg j


Page out,
k
.


Web page,
J
J. j
PQ@

j
Demand paged,


Paged,

j
Backward chaining,
m '@ @ Y

Zero,
Q


Zero-content, Jj @ PA ,Jj @ Q
 

Group attribute,
m
.

Q

Beep,

Double-ended queue,
, 
JK
AE X

JK
AE X PK. A
Authenticity,

Lossless compression,
Lossy compression,
Multiclick,
Press and Hold,
Press,
Stress,
Video compression,
Implies,
Optical,
Loss,
Guest,

Dot matrix printer,


Ink printer,
Laser printer,
Line printer,
Printer,
Time stamp,
Floor,
Double-ended queue,
Queue,
Mill,
Clumsy,
Bidirectional printing,
Halftone,
Edition,
Print,
Data link layer,
Host-host layer,
Layer,


.
YK






J
KAJ

KQ
 
,

K
AJ

J


H@
PAk
X Q

X
XYJ
J
J@

Lossless audio compression,



A J@ 
Q.g
P Q 

 A
K
.
K A
.
K A
.
K A
.
K A
.

P K. A
PX , K . A
, 
JK
AE X PK. A


JK
AE X
PK. A
KkA


 A

Am.' B@ J
KA J K AJ
.
J
 AJ


.



'
QK
Qm , J.
J.

@ J .
HAJ
J

J .
J

J .

Digital image,
Image,
Picture,
Synthetic image,
Syntax,
Maintenance,
Preventive maintenance,
Formula,
Image format,
Library routines,
SLIP,
SMTP,


J
P P
P
P
P

J
AJ@

AJ

KAJ

 KAJ

J
KA
J

P@ J

JJ J

J

J

h Y , (P) J
K. AJ.
Fuzzy,
D. ,
G. AJ.
Adjust,
J.

Autoconfiguration,

@ J.
Configure,
J.


Noise,
l. ,i.J
m.

Noise,
i.J
m. , l.
Damage,
PQ

Key stroke,
P P

Keystroke,
P P
Compaction,

Compress,

Compression,


K.
 KAJ
Data compression,
HA
 J
Deflate compression,


File compression,

Fractal compression, P (P)

Hold Down,
Q K , J
J@
J
J@
Blur,

Phase,
Buffer overflow,
Spill,
Portrait,
Length,
Low-bandwidth,
Collapse,
Constant folding,


Humor,
Digital envelope,
Envelope,
Kiosk,
Shadow,
Appear,

P

@ @ A

A






jJ k.


 . AK
IK


@ Q


P Q
, Q
C

p ,

P

Normal,
Network storm,
Dead,
Reflexive,
World,
High colour,
High definition,
High density,
High,
Common factor,
Compressibilty factor,
Context operator,
Operator,
Vertically,
General,

Protocol layer,
Nature,
Normal,
Normalised,
Model,
Dump,
Big-endian,
Smart terminal,
Terminal,
Video terminal,
Peripheral,
Third party,
Paths,
Abstract method,
Class method,

Urgent,

Network layer,

Input method,

g. A

J
J. ,
XA
  A

J
.

,A
IJ
A
A

@ B@

A
YK
YjJ@
A
A J@
A
KQ ,A
 A
Q
@ A
A B

 A
AJ

A
AK
XA

Ag. @ ,A

Method,
Information highway,
Route,
Flavor,
Float (verb),
Charset,
Coded character set,
Frame set,
Bus request,
Dial-up,
Interrupt request,
Request,
Embedding,
Bricks,
Develop,

 @
J
.
A J
@

J .
J .
 J
J

XA ,
J
J.
I.
P@ Q

h Q

Q
J.J
Q
PJ J Q


J
Q


Q K J
Q
J
KK

Q

 K Q
IA

 Q
HA
XQm K Q
.

J J


K
Q
@ K Q
AgXB

K
Q

@ K
Q
, HA


@
HA
K
Q
,
 K , @ Y



PAm

 PAm

Q Q

 P A@
H@
A K I.

KA I.
@ I
A KB
.
I.
PA@ ,Q
H.

P

Prodigy,

XQ

Landscape,

Q

Bitmap display,

 K Q

Demo,
Q

Display,
Q

 . AK Q
Fixed width,
IK

 . AK Q
Fixed-width,
IK

Listing,
Q

TERM variable,
:Q
J
J K. A Q

View,
Q

Width,
Q

Acknowledgment,
Q , A Q
 
Distributive lattice, K. A , K
P

K 
Q
K

K
P
  ,  Q
Lattice,
J


Dismiss,
XAK. @ , Q
J
  Qj
Encapsulated Postscript,
IK

J
  Qj
Postscript,
IK
Q
Binary coded decimal,
AJ
KA J K Q Q

Decimal,

Q

Random,

K@

Stochastic,

K@

Joy stick,
H. A B@ A

Joystick,
H. A B@ A
Q
 AJ@ A
Pointing stick,
Neuron,
Modern,
Cluster member,
Member,
Weekend,
Cluster node,
Cluster node,

I.

Q


Yk


J. B@
 , J
 k Y

X J Y

 k Y
 , X J Y

J

Generic,
Yield,
Fence,
Break statement,
Case statement,
Passphrase,
Hardware,
Material,
Opacity,
Find,
Program counter,
Program counter,
Numeral,

A

YKA

i.J
,  KA
A K@ PAJ.

 PAJ
Ag
.

 PAJ.
Q
XAJ
XA ,XAJ
 J

 '. ,( ) PJ
Im
. X@Y ,m QK. X@Y
l. AKQK

m. QK. X@Y ,l. AKQK


. X@Y

XY

)
Scalar,

(XY)

@ XY
XY
Chromatic number,

G

Complex number,
I.Q XY
 @ XY
Effective number of bits, A@ IJ
.
Integer,
iJ
m XY

Prime number,

@ XY
 J. XY
Pseudo-random number, K@

XY
Radix,

P Yg
.



Von Neumann integer,
AJ
K XY
iJ
j@

Y
Blur,
(P) J
K. AJ. ,h
Deselect,
ZA JK@ Y
Null,
 Y
PY@
 Y
Unable,


Reference counting, k. Q Y ,k. @Q @ Y



Reference counting, k. @Q @ Y ,k. Q Y

Cardinal number,

Macrology,

Q A @

Bug,


Glitch,
J . KA  , 
 Q J J  K ,
Fiber optics, AJ
B@ HAK

. 
 

Fibre optics,
AJ
B@ HAK
Q. J
JK ,


 @
On all pages,
HAj



 @
On even pages,
J
k. Q@ HAj
On the line,
m '@
Backbone,
XA
Cognitive architecture,
J
@P X@ PA
 PA
Component architecture,
J
K
Domain architecture,
Aj. @ PA
 . @ 
Bit depth,
IJ

Colour depth,
@ @ 
Depth,



Operations,
HAJ
Child process,
K
JK . J

J
k J

Light-weight process,
P@
Microperation,
QJ
J

Operation,
J

Process,
J

Work in progress,
PAm .' B @ YJ


Vertical,

@P ,
X
Column,
X
Genericity,
J

Global,

Public,

Client,
J

J
Client-server,
XAg




Light client,
J
k J

Mail user agent,


YK
Q.@ Yj J J

, XAm '@ YJ
Server-side,
XAm '@ J.
Configuration item,
J
  QJ

 @
 
J
.  Y

Y
Node,
Y

Root node,
K
P Yg
.
 J)

Converse,
K
m' ,(
Inverse,

Invert,





Equivalence relation,
AJ@ C
 J C

Logical relation,
J


Relation,
C

Hyphens,
@ HAC

Bookmark,
C

 C
Book mark,


Commercial a,
YJ C
 XQ AJJ@ C

Double quote,
k
.
.

Exclamation mark,
I.j. J@ C

Exclamation point,
J
E C
 
Insertion point,
Am B @ C
 , JJm '@ C

Pound sign,
Q@ C

. 
Yg)
( P

Yg) Q@ C
Pound sign,
,( P

J
Jm . '@ C

Question mark,
A JB@ C

C
Watermark,
J
KA
@ , J KC
Declaration,
CK
.

Outbox,
PXA@ J .
J .
Pack,
 
Turing Machine,
 B@ 
Scientific,

Cryptography,
J
J@

Q
 @
Cryptology,
 
Ethics,
H. @X @ , C
g B@
Flag,


Life science,
ZAJ
k B@
Network node,

Remote,
Return,
Software reliability,
Defect,
Internal bug,
Sample,


Gas,
Hair,
Away,
Glue,
Object-orientation,
Object oriented,
Chat room,
Room,
Server room,
Snooze,
Envelope,
Wrapper,
Fault,
Faulty,
Deep,
Guru,
Non-volatile,
Case insensitive,
Heterogeneous,
Heterogenous,
Incompatible,
Junk,
Lossless,
Non-existant,
Nontrivial,


YJ
K. , YK.
X

l. AK Q.@

I.J

IJ

g@X
.

PA


Y
, A
I.KA
 ,Z@Q
, A
J
k. J@ J
Q

J
k. J@
Q
 Q
XPX
Q
XAm '@ Q
ZA @ , 




Q , C

C

Y ,
Y ,

J

P
QK
AJQ

'@ QK QK AJ Q
Qm
. .



Q
Aj.J 

J Q
Aj
.

@ J Q

A , IJ @Q , A Q




( )X Q

Xk. Q

Y JJ. Q

QJ
Item,
QJ
P QJ
Picture element,
 P J
Pixels,
H@
 k ,X J
Cluster,

Computer cluster,

G. Ag X J
 @ J
Absolute address,

Address,
@ J
J ,m '@ @ J
Domain address, Aj. @ @
 J ,Aj @ @ J
Domain address, m '@ @
.






Dot address,
J
K KJ ,
 K @ J
Electronic mail address,
YK
QK. @ J
Q@

G
Q@ YK QK @ J
E-mail address,

G

.
Indirect address,
QAJ. Q
@ J
@ @ J
Internet address,
I K QKB

IP Address,
K
@ @ J
 J @ J
Logical address,


Machine address,
 @ @ J
Missile address,
pPA@ @ J
Network-address,
J.  @ J
@ J
Paged address,

j
@ J
Q@ Y@
Physical memory address,
 @

 @ J
Shared-address,
Q
Specific address,
m @ J
Title,
@ J
Addressing,
K J
 K J

KA
Byte addressing,
HAJ
Dot address,

 K @ J , J
 K K J
QAJ Q K J
Indirect addressing,
.


 X@ K J

Multicast addressing,
XYJ @


Physical addressing,
K J
Element,


Q A
,A
 , A
Distance,
PA
 A
Field separator,
k
Pathname separator,
PA @ @ A
Separator,
A
Whitespace,
A
Actor,
A
Boot virus,
C@ QK
A

Fax,
A
 J
Chad,
HA
 J
Bay,
j
 J
Branch delay slot,
Q J@ J
 j
 j

 A
Card slot,
HA
. J
 J
Hole,
I. K , j
 J
Slot,
j
Open,
iJ
Q K , @ Q , m
Gap,
.


Check,
Y AK , m

Desk check,

.J m

Self-test,

KA  K m

Software audit,
l. AK Q.@ K . AP , l. AK Q.@ m
J
m' , A J@ m
System analysis, A J@
@ Q
Backspace,
j
, @ Q
Blank,
PA
m , @ Q
Gap,
.


Space,
ZA , Am. , @ Q
 Q
Perspective,
P J , k
.

Cocktail shaker sort,
Cg PQ
Monkey sort,
XQ PQ
Sort,
PQ
Sorting,
I.
KQK ,PQ
AQ
Brush,
Decimal point,

Nonvolatile,
Not empty,
Not equal,
Not equal to,
Offline,
Sans serif,
Tentative,
Unavailable,
Unchanged,
Unnamed,
Unrestricted,
Unrestricted,
Unspecified,
Unsupported,
Untitled,
Gigabyte,

QK
AJ Q

Q
PA

XA Q

@ XA Q

J Q

K
Y Q

E Q

KA

QJ Q

Q
Q

 Q

 Q ,Pm Q
Y J





Pm Q
, YJ
Q

XYm Q

Y Q

J
Q


AK. AJ

IK

KA ,hXA

Blank,
@ Q , PA

Empty,
PA


Zero-content, Jj @ Q , Jj @ PA
g , PA

Difference,
C
,A , PA

Distance,
A

Field mouse,
m '@ P A
P A
Mouse,
P A
Optical mouse,
J
K
Corrupt,
YA

Abscissa,
A

Apostrophe,
AJ
A

AJ A
Back quote,
 KA


AJ A
Backtick,
 KA


Comma,
A
Fatal,

Virus,
Overclocking,
Overflow,
Elephant,
Outside,
Mice,
Category,
Concrete class,
Core class,
Derived class,
Protocol class 0,
Subclass,

Q

J
KAJ
@ J

J

J

h. PAg , h. PAm '@

@Q

J
XYm J
. J
J
JAK
 J
 J
A J J
K
Q

JQ J

 J J
K. A
Scalability,
J@ J
K. A
Computable,
I.
jJ K. A
Countable,
X@YJ K. A
K A
Embeddable,
Q K. A ,PAC
.


Embeddable,
PAC K. A ,Q K. A
Extensible,
YK
YJ K. A
Loadable,
J
jJ K. A
Portable,
m , j K. A
 K A
 Z , AJ
Printable,
AJ
.
.
.


 KC K. A
Refreshable,
A


Q
Resizable,
AJ
@ 
J
J K. A
Scalable,
YK
YJ K. A
Fatal,
hXA ,KA
 K QB @ ) lk. . AK PPA
Firebottle,

HA


( A @

Player,
I.B , PA

News reader,
PAJ.k B@ ZPA
 ZPA
Screen reader,
A @

Portability,


J . AJ , Q
Sub,

Q
Branch,
Q
  
Resolve,
g , g , Q
Single,
YK
Q

 ,i
Enabling,
J .) ZA J
Mosaic,
(
KA

Fail,

Failure,

Chapter,

Umount,

Unmount,

Complete metric space,
A
Q ZA
Hyperspace,

. @QK ZA
Space,
Am. , @ Q ,ZA

Garbage,
K
A K , HC
h , Q
Pie,
QKA
 . 




Pragmatic,

K @P X ,
@ ,

 
Paragraph,
Q
Lossy,
X
Q 
QK
Decode,
Decompress,


Decrypt,
J
J@
Q
 
Decryption,
 P@ , I


J.J@ @
Deinstallation,
I

J.J@ 
 ,K Q@
Demodulate,

K Q@


Disassemble,
g@ ,

Disassembly,
g ,
@
Unzip,


Philosophy,

Index,
Q

Overhead,

GA
Computer virus,

G. Ag Q

Occasion,

A
 k
 , HAJ



K KA 
Legalese,
HAJ
Canonicity,
J
K KA 
KA 
Canonical,

G
KA 
Legal,

G
KA 
Computer law,
H. Ag
KA 
Law,

. jJ@  A
Access control list,
XA JAK
 A
Cascaded list,
k. PY

 P AJ
k  A
Checkbox menu, Q
 AK K. Q H@

  A
Clip list,
HAA
  P AJk  A
Context-sensitive menu, QK AJ H@


AJ
AK.


 P AJ
k  A
Contextual menu,
J
AJ
H@
J@  A
Distribution list,
K
P



Doubly linked list, 
Q@
 A
   A
Drop-down menu,
Y
J@  A
Flowchart,
 Y
 KA   A
Hotlist,


 A
Lazy list,

Mailing list,
K
YK
QK.  A
Menu,
 A

Numbered List,
 Q  A
   A
Pop-down menu,
Y
 Y A K)  JJ ,(... t '@  A
Popup,
.

TODO List,
A @  A
 
 X B@
Tool menu,
H@
A

Stand alone,
K@ YK. 'A 
Plug and play,
J
  .
P A@
J 
Mouse grab,
.


Catch-all-entry,
g@Y @ J.
Grab,
J . 
 
Caret,
J
.
Dictionary,

A
Divisor,
A

Base,
A @ , YA
Q  YA
Codebase,

K. YA
 KAJ
Database,
HA

K. YA
 KAJ
Decision support database,
HA
YA ,P@Q@
 X HA
 X

P@Q@
YA

Decision support database, HA
 X HA
 X

K. YA ,P@Q@
 KAJ
P@Q@

YA
Deductive database,
HAJ

J
k. AJJ @





Desktop database,
i HAKAJ
K. YA
I.J @
 HA

K. YA
 KAJ
Distributed database, P
Docking station,
I.J
QK YA
K KA
J@ YA
Eighty-twenty rule,
Q
   KAJ

K. YA
Functional database, , J
K@ Q@ HA

K. YA
 KAJ
J
@X HA

K. YA
 KAJ
Functional database,
, J
@X HA

K. YA
 KAJ
J
K@ Q@ HA
   KAJ

K. YA
Hierarchical database, K
Qm. HA

YA
Intelligent database,

X HAJ

YA
Knowledge base,
PA

K. YA
 KAJ
Network database,
HA
 @
J
.

K. YA
 KAJ
Object-oriented database,
HA

J
 KA


K. YA
 KAJ
Operational database, J
HA


K. YA
 KAJ
Relational database, J
AJ.KP@ HA
YA
Rule,
Q
J. I.A
Macroblock,

Message block,
AQ@
I.A
Template,
I.A

K. A
 KAJ
Data dictionary,
HA
Denominator,

Root disk,
Scratch disk,
Zip Drive,
Pumpking,
Constraint,
Divide,
Division,
Division by zero,
Partition,
Quotient,
Section,
Severity,
Authentication ticket,
Clip art,
Clipart,
Malfunction,
Cut and paste,
Cut,
Nibble,
Hard sector,
Sector,
Droplets,
Diagonal,
Diameter,
Region,
Code segment,
Data segment,
Segment,
Disconnect,
Never,
Data glove,
Jumper,
Jump,

Q

P Yg
.

 . Qk Q
I Q
Q
YJ
 ,Q
 

 


 
Q


(H. AJ) H. AK. , 
Y , 
 J
 
A JJ
@

A
 
J
J A
P
 
@


I. A
J .  ,A
 Q
H@

Q

Q

@ ,Q
Q 
 
 

K.
 KAJ
HA
 

A@ 

@YK. @ ,

K. PA 
 KAJ
HA
A , PA 
.' ,Q 
PAm

Circumflex,
Accept,
Frag,
Kill app,
Kill,
Capability,
Serviceability,
Old,
Read,
Monkey, scratch,
Monkey up,
Pirate,
Software pirate,
Piracy,
Software piracy,
Compact disc,
Digital versatile disc,
Disc,
Disk,
Diskette,
Fixed disk,
Floppy disk,
Floptical,
Hard disk,
Hard drive,
Live CD,
Local disk,
Logical disk,
Magnetic disk,
Magneto-optical disk,
Minifloppy,
Multihost disk,

 
J
.
J.
 J
. J
l. AKQK
J
PY
 m '@ PY
Y
'
Y
Z@Q
 ,XQ


B XQ

AQ

l. @Q.@ AQ

JQ

l. @Q.@ JQ
l. Y Q

PAK.
P Q
Q
Q
Q
Q
I. J Q
Q
Q
Q
Q

K
 . AK Q
IK
I. Q

k Q


m Q
 J Q

J
AJ Q
J
AJ Q

Q.

Q Q
Q


J
@ XYJ Q

AJ

Measurement,
AJ


Chain,

,YJ

Constraint,
Q ,YJ

, J K@ X J
 
Eigenvalue,
(
G@ X) Q 
P Yg
.




 
Hack value,
A@ J



Modal (value),

j.jJ@ J

XQm '@ J
 
Salvage,


Value,
J

 
Comma separated values,

@K .
Values,


Measure,


A

Sufficient,

A
QA
Camera,
Full,
A
Webcam,
I.K
@Q
A


Binary large object,
m 
KA J K KA
 KA

Context object,
AJ


Object,
KA

 KA
Shared object,
Q
'@) Ag

 ,( Qk)
Q.
Case (font),
( Qm
Q
J.K ,Q  .
Zoom in,
Cable,
J.
Cable modem,
X @ J.
Coax,
Pj @ YjJ J.
Dynamic typing,
J
J
AJK
X K . AJ
 K AJ , K AJ
Overwrite,
J

.
.






Overwrite,
K. AJ , J
K. AJ
K . AJ ,  Qm '@ K . AJ
Packet writing,
 PQ@
Detective,

 
 A
HA
.
Lock,

 
Screen lock,
A @
@ I
Invert Selection,
PAJ
JkB
. 

Light pen,
J
k
Pen,

Say,

 
Junk,
I.J
@Q ,A Q
, A
 . @ AJ 
Bit mask,
IJ
  AJ 
Clip mask,
A
Mask,
H. Am.k ,AJ 
 @

Netmask,
J
.  AJ
 @

Network mask,
J
.  AJ
J
 @

Subnet mask,
J
Q@
.  AJ
Alpha channel,
A @ AJ 
AJ 
Channel,

J.@ AJ 
 KAJ
Data channel,
HA

Secure channel,
J @ AJ 
 J 
Mail bomb,
K
YK
QK. J
.
Grammar,
Y@
Reserved blocks,
A @ I.@

Parentheses,
A
Arc,

Bracket,

Left bracket,
(
)PA

Right bracket,
(
)JJ


Square bracket,
K. Q 
Brute force,
J
A 
PY@
 ,
Power,
Leading,

J
KP ,
XAJ


Benchmark,
Z@X B@ AJ

 K AJ
Complexity measure,
Y


Dimension,
YK. ,AJ

Card cage,

K Q@

Detect,


Cookie,


Cost,


Keywords,
J
kAJ HA

Words,
HA


Key word,
J
A @


Keyword,
J
kAJ

Keyword in context,
J
kAJ
 @
AJ


Passcode,
PJ.@


Password,
Q

Word,
QJ :

Every,

Accessory,
A
  





Digital camera, J
P QK
 @ , J
P Q
Completeness,

Amount,
J

Quantity,
J

Alias,
J
J

Nickname,
J
J

,p
Kiosk,
CORBA,
AK. P

Console,


Entity,
AJ
KDE,

YJ

Arbitrary,


AK. J

Kilobyte,
IK
 . J

Kilobit,
IK
 . J

Kilobits per second,


J
KA J@
IK
Kilobaud,
XK. J

QJ

Kilometer,
Kilo-,
J

Demodulation,

K . AJ
Scenario,
K . AJ
Book,
H. AJ
Docbook,
J
KJ@ H. AJ
Catalog,
XQ ,h. AJ
Protected workbooks,
J
m I.J
,  J
Block,
Qk
Block (unit),
 J
Boot block,
C@  J
 
Cache block,
AJ.m J

File control block,
jJ@ Q@ X  J
AK

HA
.

Mute,


 , I.
J
Brochure,
@Q
Handbook,
I.
J
Defect density,
@ A J
 XQ A J
Double density,
k
.
 Q

Brochure,
I.
J , @

Workbook,
@Q
Junk,
A Q
,I.J
@Q
Q
Sphere,
 Q
Slashed Cross,


Bullet,
AP
,X@YK K
Q
Heuristic,
J
.
Q
Fragment,

Break,
Q
Fraction,
Q
Laziness,


Fractal,

P

Monkey, scratch,
XQ ,
 
Autodetect,

@



Collision detection,
HAXA


Demodulate,

K Q@ ,
K Q@
Packet writing,


 Qm '@ K . AJ ,  PQ@

( )
YD

Q
, J
J

CJ
J
J


Tab,
A

Glue,
Z@Q , A
Label,
J

 g , J
Nice,


Game,
J.


Assembly language,
J
J
m.' 
Computer language,
H. Am '@ 
Coordination language,
J
 K 
Database query language,
CJ@ 

J.@ Y@
 KAJ
HA
Declarative language,
K
QK
Q K 
Domain-specific language,
XYm Am. 


First generation language, B @ J
m. '@
Fourth generation language,
J
m. '@ 
K. @Q@

Functional language,
J
J

Functional programming language,



m . QK.
J
J

High-level language,
J @ J
A 
Imperative language,
K
PAJ.k. @ 
Language,

 
Low-level language, J @ jJ

Machine code,
 B@ 

Machine language,
 B@ 
 Q 
Metalanguage,

Natural language,
J
J
J. 
Object-oriented language,
J
Q 
J
k. J@
Procedural language,
J
K@ Qk. @ 
Programming language,
m . QK. 
Functional requirements,

  K J
J
KA J@  A

Computational organochemistry,
ZAJJ

JK Ag K


Kiloflops,

NO-DAEMON,
Suffix,
Nonlinear,
Wireless,
Scratch,
Player,
Banner,
Asymmetric,
Lambda,
Drop-down list,
Drop-down list,
List,
Recipe,
Scrollable list,
Antisymmetric,
Asymmetrical,
Asynchronous,
Endless,
Infinite,
No,
Noname,
None,
None,
Non parity,
Core,

k
.B
kB


 kB
B
K @YK ,.(Q)

ZB

 ,I.B
PA

JB

Q AJ JB
@YB

m ' B ,@Y@ m ' B
 
Y
  m ' B
m ' B , Y
@Y@
m ' B
, K Qm ' m ' B


 A m ' B
Q
K
.
KAJ B

QA J K B
Q K B

YK. @ ,
KA
EB
E B

KA
B

@ B
. ,Yg @ B
YK

Yg @ B , YK
. ,Z
 B

k. P B

I.


ZCB @
P Q 

J J

Fillcolor,
Laser,
Linux,

XAJ , XA

Gated,
K . @K. Q. PA

Deadlock,
 P @ , P A
Carrier scanner,
@k m  A
Scanner,
m  A
@ A
Placeholder,
A
Macros,
QA
Malta,
AA
Owner,
A
Financial,

A

Optimized,
J A

Italic,
KA
J ,KA

Oblique,
Qj
Water,
ZA




Implicit type conversion, ,  K XAJ.

 K K
m'

Permutation,
XAJ
.

Spacing,
YAJ.
JJ.
Newbie,
Y


Dissertation,
kQ
@ , IjJ.

Default,

KYJ
.
Embosser,
Y m. , m. ,P Q .
 Im
 ' lQ. .
Contract programmer,
Y
Programmer,
lQ. .

Scheduler,
Ym. , Yg
. lQ. .
 B@
lQ
Systems programmer,

. .

Obsolete,
Q , J .
Mantainer,
J .
Material,


J
J


J
A

Purely functional language,
J
J


.

A
Second generation language,
J
m. '@ 

GA J@
 
System programming language, m. QK.
A J@
,
Literal,

Qk
@ YJ

SC/XSpread,
h. @QkB

 
Screenshot,
A 
 J ,
Haptic,
AK.

Concatenate,

Message board,
A  J@ HAg

Board,
k

CDE panel,

 m' k


Clip board,
HAA
 k

Colour palette,
@ @ k
 k

Daughterboard,
J


Editor panel,
PQj @ k

Keyboard,
iJ
KA k

Main board,
J

KP k

Mainboard,
J

KP k

Palette,
@ @ k

Panel,
k

Touchpad,
k
 h
Deductive tableau,

k. AJJ @

Pane,
h

Scroll pane,
Q@ h
System board,
A J@ h

Logarithm,
'PA

Color,


Colour,

Pure functional language,


Q
Q
Meter,
Micrometre,
QJ
Q
Q 
Concurrent,
 @ Q , @
Q 
Synchronous,
@
 
Bit pattern,
J
KA J K
Serial,

J
Browser,
i
 
 @

Web browser,
J
J

.

Continuous,
, @J ,(k , @X) J
QJ
Volatile,
QK
AJ
CJ
Functional requirements,
, J
J

Q
J
J


 . J
Operational requirements, , J
HAJ
 . AJ
Jk@
J
HAg
Requirement,
h. AJ
Jk@ , I.J
Orthogonal,
Y AJ
 J @ XYJ
Cross-platform,
HA
 @ XYJ
Multiboot,
CB


Multibyte,
IK
AJ.@ XYJ
 XYJ
Multipart,
AB@
Multiple,
XYJ
 XYJ
Multiple boot,
CB@
 @

Multiple value,
J

XYJ
Multiplexer,
APB @ XYJ
Multiprocessing,
Z@Qk. B@ XYJ
Multiprocessor,
l. 'A @ XYJ

Polymorphic,
A B@ XYJ
Transitive,
K
YJ
 J
Haptic,
, AK.
Q
J
Class variable,
J
Environment variable,
J
K. Q
J
Metric,

G. AJ. ,D.

J.
Connected graph,
J AJ

J.
Connected subgraph,
J
Q AJ

J.
Graph,
AJ
Destructor,
J ,YJ
J.
 J
J.
Screen blanker,
A @
 AJ
Continuation,
A@ ,(@ X m . QK.) K
.


P@QJ@ ,( @X)
 AK QK AJ
Context-sensitive,
AJ

.

Business to business, 
K. Qk. AJ
. ,I. AJ
Ready,
QAg

Accessible,
hAJ
Residual,

J . J
Sequence,
J
AJJ
J
Homogeneous,
Aj
.

Homogenous,
Aj.J

Dealer,
Qj.J
Sense,
Ak@ , j.J
Vector,
j.J
Coaxial,
Pj @ YjJ
J
Museum,
j

Cache controller,
AJ.m jJ
Controller,
jJ
jJ
Microcontroller,
Q

Network interface controller, k. @ jJ
 @
J
.
Specialized,
j J
 J
Grey-scale,

XAQ@ PY
Q , X@
Q
Synonym,
X@
 Q  k. Q
Byte-code compiler,
J
KA
 Q  k. Q
Byte compiler,
J
KA
Compiler compiler,
k. Q k. Q
Obsolete,
J . , Q
Fuzzy,

J

, J
@ J
Reachable,
J
@ @
J
Available,
Q
 J@ I 

 J
,( AJ
J)
Paused,
J

 , G@ X I

Q 
I
Eigenvector,

 ,Q 
I

Eigenvector,

G@ X I
Ideal,

AJ
Example,
AJ
 . J
 . AK , iJ
jJ@ IK
 . AK , I
Fixed, iJ
J@ IK
 . J
 , K
@ I
Identifier,
Q
 . J
Installer,
I

Like,
J
J
Like this,
@ Y
Double-duplex,
h. XQ
J J
Dual-homed,
Q  @ J
 '. HBAm
 .
Search Domains,
Im
@ Am
 @
Criteria range,
HA
.

Lifted domain,
Q Am.
Space,
@ Q ,Am.
Adjacent,
PAm.

. ,Ym.
Schedueler,
Yg
. l. AKQK

Scheduler,
Yg
. lQ. . ,Ym.
Abstract,
XQm .
Plain,
() XQm.
Conduit,
Qm.
Embosser,
m. ,Y m.
Embosser,
P Q . , Y m. , m.
Sensor,
 m .

Folder,
Ym.
Sub folder,

Q Ym.
Electronic magazine,
J
K Q@ m .

Magazine,
m.

Public directory,

m.
Mean,

Q
J
Q
J
Member variable,

Q
J
Variable,
 J QJ J
Logic variable,
J




  J
Free variable,
J

 J ,Qk







Free variable,
Qk
J , J

 J
Generic type variable,
J@

 J
Local variable,

m
 J
Advanced,
Y J
  
Crisp,

J

Discrete,
J , J
Mutually recursive,
XAJ.J PQJ
Destructor,
YJ
J. , J
Stretched,
XY ,XYJ
Proportional,

.AJ K ,I.AJ J

Symmetric,
Q AJ J
Paradox,
  AJ J
Finite,

AJ J

Bounded,
X Y m , AJ J
  J
Eyedropper,
Ag. , I
Miscellaneous,
J J

Body,


Parallelograms,
C B@ K
P @J

Parallelogram,
C B@
P@ J
Parallel,
P @J
Continuous,
(k ,@J
Backward compatible,
AJ
g  @ J
Compatible,
 @ J
Correspondent,
'@ ,'@ J
Involved,
PJ
Average,
J
 J
Intermediate,

Global variable,

@ XAm
@ XAm
Right-justify,
@ XAm
Vertical Alignment,
Justified,
XAm
Emulate,
AAm
AAm
Emulation,
Simulated annealing,
K
YJ@ AAm
AAm
Simulation,
Emulator,

Am
 J Am
Logic emulator,


Attempt,
Am
Content,
Jm
Executable content,

YJ
J K Jm

Command Prompt,
Q@ @ Im

Login prompt,
h. @ Im

Prompt,
Im
Locator,
@ @ XYm
XYm
User defined,
Yj J @


Bounded,
AJ J ,X Y m

Delimiter,
Ym
Desktop publisher,
I.J @ i PQm
 m
Editor,
PQ


Language-based editor,

PQm
.

@
Language-sensitive editor,
Ak PQm


Line editor,

k  PQm

J@ PQm
Linkage editor,
HCJ
 PQm
Screen editor,
A @

Character,
Qm

Char,
Qm

Dingbat,

J
K
Q K Qm

Escape character,
m '@ Qm
Left-justify,

PA


J

XA

 m.



Assembler,
m.
 @ m.
Connection pool,
HBA
Native compiler,
Q m.

Aggregate,
m .
 .
Newsgroups,
K
PAJ.k@ HAm

@ m

Character set,
Qk
.


Chip set,
l' @Q m.

Closed set,
 m
.

Collection,
m.


K. m
 KAJ
Data set,
HA
.






Device group, PAk. m. , H@Q
m.' m.
 , PAk

 Q 
m.' m
Device group, H@
. . m.

 ,XAm' m
Discussion group,
m
.
.
.


AJ K
 ,  A J K m

Discussion group,
m
.
.
XAm.'
 @X @ m

Disk device group,
Q@
.


Group,
HAm. h. , m.

Lower set,
GX @ m
 .

News group,
PAJ.k @ m.

Newsgroup,
PAJ.k @ m
.


Work group,
m.

Workgroup,
m
.
Periodic group,

PX m.
Sum,
g. ,m.
Sum (noun),
m.
Anonymous,
B@ m.
Unknown,
m.
Conversation,
KXAm
@ XAm
Align,
@ XAm
Alignment,
@ XAm
Justification,
Aggregator,

Pm
X-axis,

J
Pm
Y-axis,

XA Pm
Z-axis,

J
Pm

Number Converter,
AP B@ m
Clear,
m
Protocol converter,
A J
m
Contour,
J
m

Desktop environment, I
. J @ i J
m
Development environment,
QK
J@ J
m
 P Jm
Run-time environment, J
 





Backside cache,

g AJ.m

Cache memory,
AJ.m
Hidden,

m , . Jm
Shortcut,
QJm
Cone,
Qm

Q m
Data warehouse,
HAJ
JJ ,( Q m
Format (noun),
)




Format (verb),
) JJ
E ,( Q m
Q m
Z-buffer,
I.KQ I 
m
Descender,
. A ,
Custom,
m
 m
 A@

VFS,
. K . AJ K
. Y HA
Q
QK m
Character encoding scheme,

PAm

Color map,
@ B@ m

Colormap,
@ @ m

Q k .  m
Flow chart,
AK
. m
Gantt Chart,
I KAg
Schema,
m
 k ,m
Scheme,

Chat script,
KXAm m
Directed graph,
k. m
Axis,


@Q @ Qm

Drive,
@Q @ Qm
Engine,
Qm

@ @Q B@ Qm
Floppy disk drive,
KQ
Hard disk drive,
I. Q Qm
 '. Qm
Search engine,
Im
 , ,m
Physical,
Xk. @
J
k
,Qm
QY
Memo,
J@ ,Qm
Memorandum,
PAj


Work station,
m

Workstation,
m

Circular buffer,

PX m
 k
 ,
 m '@
m
Copyright,
QJ@
 m '@
m
Copyrighted,

Criterion,
m

YA m
Database analyst,
HAJ
Data communications analyst,
m

@ HC@

HAJ
Lexical analyser,

m
Protocol analyser,
@Q m
KA m
Cationic cocktail,

GJ

Locale,
J
m
Local,

 m
Parser,
H. Q , m

Autoloader,

@ m
Bootloader,
C@ m
 @ m
Boot loader,
CB

Bootstrap loader,
C@ m
Lilo,
JJ
m
Handheld,
YJ
AK. m
Portable,
j K. A ,m
Protected,

m
Axial,

Pm
Disk drive,


Qm , QY
Q  k
 @Q
Code walk,
.

Revision,
k. @Q
 @Q
D@ k
Spellcheck,
Jj
.
.



Synonym,
X@Q , X@Q
Contact,
@Q



Education contact, , K. QK @Q

K. Q@ Jj. @
Protocols,
@Q

Q  ,  @ Q
Concurrent,
@
J @ Q , AK

Qm. '@ J . @ Q
Flow control,
 Y@
.
J @ Q

Qm. '@ J . @ Q ,  Y@
Flow control,
AK
.


Job control,
@ J.@ Q
J . @ Q
Remote monitoring,
YK.
Watch,
J . @ Q
Bus watcher,
A J@ I.@ Q
 I@ Q
Disk controller,
Q@
.



Port monitor,
YJ @ I.@ Q
Resource monitor,
XP@ @ I.@ Q

 @
Sniffer,
J
.  I.@Q
 @Q
Mirror,
 K @Q
Disk mirroring,
Q@

Anchor,
. Q

 . Q
Area grid,
kA @ HAK

Bounding box,
Ag@
K. Q

,K. Q
Box,
YJ
Combo box,
XQ QK
Qm' K. Q
Combobox,
I.Q K. Q
Dialog box,
P@k K. Q
Rounded square,
PY K. Q
Square,
K. Q
,I.KQ
Sorted,
PQ
Memo,


m
K  m

J.@  Y
 KAJ
Data flow diagram,
HA
Hidden,
. Jm ,
m
 , ,m
Disconnected,


Color chooser,
@ @ Q
 m
@ P@Y
Low earth orbit,
j J
P
(A KPB @)
Handler,
@Y

Entry,
 gY

Back door,
A J
Q gY

Inserted,
h. Y ,gY


Histogram, jJ
 GAJ
K. P , P@QK h. PY


Spell checker,

KC@  Y
Compact,
l. Y
Integral,
l. Y
,h Y
Inserted,
gY
.




Average seek time,
J Im '. Y

Duration,
@ X ,  Y
Y
Tilde,
Round,
PY

Blog,
K Y
Admin,
QK
Y
Administrator,
QK
Y


Database administrator,
YA QK
Y


HAJ

K. YA QK
Y
 KAJ
Database manager,
HA

J.@ QQ
 KAJ
QK
Y
Datacenter manager,
HA
Manager,
QK
Y
System administrator,
A J@ QK
Y
 QK Y
Web master,


Webmaster,
QK
Y
Range,
Y

Flavor,
, @ Y
Maintainer script,

Xk H@

.  X  J
KQ
J
@ X@


J
KQ
Compressed video,


Video,
J
KQ
 '@ A KQ

Full-motion video,
Qm


Visible,

KQ
Removable,
@Q
Q
Sync,
J@
Q
Synchronize,
J@

Q
V-Sync,
J
@P J@
Blending,
h. Q
 h XQ
Double-precision,
Y@
.
Dual,
h XQ
.
Dual head,
@Q@ h. XQ


, Y@ h. XQ
Dual-stack, @ h. XQ


, @
Dual-stack, Y@ h. XQ
h. XQ
Duplex,
h. X Q
 Q
Farm,
P
 

Service provider, Yg Q , Yj K . X Q
@
I K QKB

Increment,
? YK
Q

Workspaces,
HAgA

Closed surface,
 kA
kA

Free space,
PA

Memory address space,
@ J kA

Q@ Y@

Namespace,
B@ kA
 @ kA

Print area,
AJ
.

Surface,
kA

Text area,
J
J.J@ kA

Workspace,
@ kA
 PA
Absolute path,


K. PA
 KAJ
Data path,
HA
Broadcast quality video,

A , KQ
  J k Q
Referential transparency, , J
A@
Jk Q
J A . 



Carriage return, ,( Qm) Q@ @ k. Q

Q@ @ k. P
Reference,
k Q
.
Hello, world,
A@ AE
@ ,AJ.kQ
Repeater,
XXQ




Airbrush,
AJ. X@ XQ
Instant messenger,

P AQ
Messenger,
AQ
Addressee,
J
@ Q
Sender,
Q
Filter,
l  Q
Mail filter,
YK
QK. lQ

Wizard,
YQ

Attachment,
 Q
Q@ YK QK  Q

Email attachement,

.

Q
Refutable,


Q
Rejected,


Monitor,
H. AQ
I.Q ,AK. P , AK. P I.Q
Qword,

 P @
QAJ K
.



Qword,
I.Q , QAJ K. P @ I.Q

AK. P ,
AK. P
 Q
Concentrator,
Q


Accumulator,
Q

Codec,
PAQ

Floppy,
Q
Yg@ Q , Q
One-Time,
Q , Yg@ Q
One-Time,
P A  PQ
Mouse-over,
High,

 J ,QJ
,(k , @X)
@J
Persistent,
QJ

Document,
YJ 

White paper,

 K YJ 
Clone,
pA J@ , q J
Packet sniffer,
 Qm '@    J
Repository,
XJ
Access level,
XA J@ J

@ J
Data link level,
HAJ

Interrupt priority level,
K
@ J
@
A KB




Knowledge level,
Q @ J
Level,
J
Run level,
J
  J
Switch level,
Yg@ J

K. j.
 KAJ
Data logger,
HA
Registry,
j.
Boundary scan,

XYg i
Erase,
i

Multiscan,
XYJ i
Scan,
i
Catalog,
h. AJ ,XQ
XQ
Character repertoire,
PAm

Accelerator,
Q

K Q
Graphics accelerator,

GAJ

.


Data transfer bus,
HAJ
@ K Q
Bit plane,
J
KA J K i
Flat,
i
Q
Ruler,
@ Q
 A
Space bar,
HA
Formal parameter,


Named,

Continuous,

Disk path,
Mail path,
Path,
Relative path,
Scan path,
URL,
Help,
Promote,
Support,
Assistant,
Distance,
Data driven,
Assignment problem,
Contribution,
Contributor,
Equal,
Impossible,
End-user,
Superuser,
User,
Consultant,
Impossible,
Unknown host,
Rectangle,
Forward compatible,

Forward compatible,

Context-free,
Independent,
Deliverable,

Q PA
YK
Q.@ PA
PA

. PA
i @ PA
PA
YA
J
Q K , YA
X , YA
YA


A , A


J.@
 KAJ
A
HA

( m . QK.) 
J
K  A

A
A
X A , A


I.J ,J
j
E Yj J

KA
Yj J
P Yg
.
Yj J

PA 
 ,IJ
J
j
.



Q Q
J


J

@ J J
,Aj.B

.
 @ J@ J. J

,  @ J@ J. J
@
J J
Aj.B

.
AJ@


 J
 J

J


J


K. PXA
 KAJ
Local data sources,
J
m HA

Approved,
J
XA
Exporting,
PY
Open source,
hJ PY
Source,
PY

Faulty,
, Y

Compiler,
Q
 . @ XQ , IjJ
 . @ i
Search term, IjJ
Term,
i
Q

Thumbnail,

Beeper,
Q


Array,



Associative array,
J
. @QK 


Matrix,


Factory,
,J


Maintainer,

 Q
XA
Anti virus,
HA

 Q
XA
Antivirus,
HA


Replication,
P@QK , A


Double,
A

, A


Multiplexed,

Add-in,
A
 @

Value-added,
J

A

Factorial,
H. Q

Compressed,


Polygon,


Built-in,


Embedded,


, 

Multiplexed,
A

Host,
J


Local host,

m J

Localhost,

m J

Suspicious,

X

Magnetic tape drive,

Q


J
AJ

Responsible,


Schedule manager,
J , Yg
.


Yg
.


Participants,
PA

Public domain,
A

Networked,
I.

Share,
D ,Q
   
Cellular automata,
K
g J
@ HC
J
  
Automaton,

@ J



Cellular automaton,

g
@ J

Derivative,
 J
Derived,
 J

Moderator,
Q
Modal,
Q
Project,
Q

Strikethrough,
k JK
,H.

Actuator,


Application Launcher,
J
J.J@
Q 

Floppy drive,
Q
 @

Network operator,
J
. 

Busy,


Encrypted,
Q


Decision problem,
P@Q


 , A K
@

Halting problem,

 K


 K

 ,

Halting problem,



AK
@





Knapsack problem,
J.J
m '@

Post office problem,
YK
Q.@ I.J

Problem,

Draft,

XYJ

m . 'A
 Jm

m . 'A
Word processing,
HA@
 X l. 'A
Batcher,
HA
Coprocessor,
YA l. 'A
CPU,
l. 'A

Front-end processor, AC J
l. 'A
Q
J. l. 'A
Macro processor,
Microprocesor,
QJ
l. 'A
Microprocessor,
QJ
l. 'A
Parallel processor,
P@ J l. 'A

 B@
Post Processor,
H@Yg
l . 'A
Preprocessor,

J . l. 'A ,
YJ
 l. 'A
Preprocessor,

YJ
 l. 'A ,
J . l. 'A
Processor,
l. 'A
Word processor,
 l. 'A
Coefficient,
A
Factor of proportion,
I.AJ K A
Operand,
A
Parameter,
A
 A
Scaling Factor,
AJ
@
XA
Recursion,
Preview,
JK
A
Q.
Cross-over,

Opaque,

Dumb,
J
Lexicon,
j.

 Y
Equipment,
H@
Baud rate,
XAJ.@ Y
 . @ Y
Bit rate,
IJ

J.@  K Y
 KAJ
Data rate,
HA


J.@  K Y
 KAJ
Data transfer rate,
HA
Frame rate,
PAB @ Y
Symmetric multiprocessing,


YK
QK. J

Slow terminals,
JJ
. P A
Printed,
J.
@ Q
Display terminal,
Q
Dumb Terminal,
J @ Q
Intelligent terminal,

X @ Q
  K @ Q
Point of sale terminal,
J
K.
 )
 
Absolute,
( J

( )
Launcher,
 

Verbose,
I.J

Developer,
P

Shader,


Aspect,
Q
Viewer,
Q
 XA

Difference equation,
PA
Equal,
A ,X A
Equalizer,
X A





Background processing, J
m '@ m. 'A

m 'A
 YAK
Batch processing,
HA
. .


Cellular multiprocessing,
XYJ m . 'A
K
g
 A J m 'A
Concurrent processing,

.


 KAJ
J.@ m. 'A
Data processing,
HA

Error handling,
Am '@ m. 'A
Image processing,
P@ m . 'A
Natural language processing,
 m . 'A
J
J
J.
Parallel processing,
Z@Qk. @ , K
P@ J m . 'A
P@ J
Pipeline processing,
K
XP@K m . 'A


Sequential processing, YJ
J K , J
AJJ m. 'A

AJJ
Mail host,

Mirrored,
Reverse,
Reversed,
Marked,
Info,
Information,
Metainformation,
Fact,
Factory,
Fontwork,
Meaning,
Significance,
Standard,
Criteria,
De facto standard,
De facto standard,
Norm,
Standard,
Mapped,
Rhombus,
With,
With copy,
Quit,
Enclosure,
Off,
Modified,
Modifier,
Soft keys,
Partial key,
Arrow key,
Candidate key,
Character key,


HA

HA

@ HA

@ ,
,
J
m '@
h ,

GA
.
 ,

BX
PAJ
,
PAJ

PAJ

@ PAJ
, PAJ

PAJ
,
@ PAJ

PAJ

PAJ
,PAJ

JJ


j
PXA



Q
J

Q
J

jJ@ iJ
KA
. hA

K Qk
D@ hAJ
l  Q hAJ

hAJ

Qm

K . AB@

 B@ i @

YjJ@
IK

JB @
AJ

H@P AB
 @

Hit rate,
Horizontal scan rate,
Refresh rate,
Sampling rate,
Signalling rate,

)
Gold,

Y
Y
Y
Y
Y

( Y)

I. Y@


Y
Counted,
XY


Rate,
Q , Y


JB @ Y
Sample rate,
AJ


@Q
Liquid crystal display,
J.@ KA




Q
Passive matrix display, X @


.
Parser,
m ,H. Q

Gallery,
Q

Contact (noun),
Q

Knowledge,
Q

 
Character set identifier, PAm Q

Generic identifier,

Q

Process identifier,
Z@Qk. B@ Q

Uniform Resource Identifier, A  Q

XP

User identifier,
Yj J @ Q
 Q
Group identifier,
m
. 
 . J , Q

Identifier,
K
@ I
Broken,
P ,H.




Raw data,
( J
A)Ag HAJ
Argument,

Datum,


,Y
Hair,
A
Metal,

Article,
Firefighting,
Socket,
Binding handle,
Handle (noun),
Quoted,
Proposition,
Network segment,
Quoted,
Readable,
Read only,
World-readable,
Dividend,
Destination,
Goal,
Snippet,
Stack segment,
String,
Disconnected,
Netcafe,
Modulo,
Bound,
Restricted,
Host-resident,
Resident,
Equivalent,
Positional,
Place,
Libraries,
Class library,
Library,
Run-time library,



A


PAJ@ A

.

AJ.KP@ J .

J .
J ,J

Q Q.  

@P , h@ @ ,h 


J. J
J
.J ,

ZQ

 ZQ


AJ
A ZQ

D@ l'. P ,

Y
,Y

Y




. m
Pj
Q@



,

I K QK@

AJ


Y J


YJ


J
@

A
 , GA


 , A
kA
 . J
HAJ
@ J . J
A J
J . J
P J . J

J
 

K

Command key,
Q @

Compound key,
I. Q
Concatenated key,

Diamond key,

A
XP@
 JJ AK. Ag)
Flower key, (

Function key,
J

hAJ
hAJ
hAJ
hAJ
hAJ
hAJ
hAJ
Key (Lock),
hAJ

Meta key,
@ hAJ
Mnemonic key,

Q
Y K hAJ
Q
J
hAJ
Modifier key,

. B@
Multi-part key,
Z@Qk
XYJ hAJ
Private key,

Q hAJ
hAJ
Propeller key,
@X
hAJ
Public key,

Secondary key,

GA K hAJ
hAJ
Shortcut key,
PAJkB@
hAJ
Spacebar,
@ Q@
Mail exploder,
YK
Q.@ Qj.
 . @ i , IjJ
 . @ XQ
Search term, IjJ

Sorted,
I.KQ ,PQ

Interpreter,
Q
Interpreted,

Joint,


Favorite,
I.j J ,
.
Side-effect,

.KAg
Q
Agenda,
 ,
Disconnected,
m ,
Screw,
YK
,
, Q


Object file,

Q

Conceptualisation,

Agent,



Compare,
KPA
Clover key,


. HA

ZYJ.@ l. AKQK


 Y@
Batch file,
HA


Cluster file,
Yk

Control file,
m'

.
Core file,

AK


K. A
 KAJ
Data dictionary file,
HA


Distributed file,
P

Dot file,

 K

Executable file,

YJ
J K

File,

 

Genetic programming file, G@P m. QK.

 
Header file,

Q@

Hidden file,
m

Initialization file,
JJ
E

Local file,

m


Locked file,


Log file,
j.@

Metafile,
@

, Q

Object file,
Q


Permanent file,
'@X

Physical file,

, Z@Qk @

Process file,
m . 'A
.
, m 'A

Process file,
Z@Qk. @
.

 
Raster file,

A

 . Qk
Scratch file,



Q @ Y@
Swap file,
K
QA@


Temp file,
I 


Zip file,



Print server,
AJ
.

Virtual server,

QA
Property,
J
Ag , J

Q
Millimeter,
 ,
Physical,
m , Xk. @
J
k
Startup files,

P J . J

J
 
I.J
Central office,

QQ
Y J ,IJ
Desk,
.
Post Office,
YK
Q.@ I.J

Dynamically typed,
AJ
J
AJK
X H. J
 J ,H J
Handout,
j
.

Condensed,
Qk. , J
Duplicate,
PQ

Q
Microphone,



Angle bracket,
P
Broken,
H. ,P

Cube,
I.

Hypercube,
 KA

Q 
Corpus,

Q 
Thesaurus,


YA J
Database machine,
HAJ

Parallel random access machine, XAK J

P@ J
K@

Component,

Adapter,
J

A K 
Host bus adapter,
J





Observations,
H@YQK , HAkC

Remark,
kC

Navigate,
kC
Navigator,
hC

 J . J@ 
K
C
Megabits per second,

HA
J
KA J@
 P AB @  J
Frame grabber,
H@


Plugin,
j
Salt,
i

Summary,
j

,
Poster,
C@



Files,
HA
Runtime library,

 Q 
Home,
Q 
PQK
 
. A
Demand driven,
 J
Platform,

Desk,
I.J , Y J
 J
Area,

 J
Drawing Area,
Q@ 
 J
High memory area,
J
A Q @ X 
 J
Low memory area,
 j J Q @ X 
 J
Time Zone,
J
J P 
 J
Work area,

 J
Boolean,

 J
Logical,

 J
Q K B
Asynchronous logic,

@
 J
Classical logic,

YJ
 K
 J
Combinatory logic,

 @ K
 
Digital logic,
J Q@
J




, I
KQ@  @ J
First-order logic, J
.

k PY@  @
.





First-order logic, J , k. PY@  @ J


I.
KQ@
 @
 J
Fuzzy logic,

G. AJ.
 J
Intuitionistic logic,

E
YK.
 J
Linear logic,
k
 J
Logic,

Look,
Q J
 @ ,
 J
Organization,
Q
 J
Org,

Organizer,
J

Schedule manager,

 , Yg
. J

Yg
.




Sequencer,
K. AJJ@ J
Rank,

Flavorful,
Flavorful,
Millisecond,
Autofill,
Fill,
Full screen,
Expanded,
Stretched,
Blocked,
Case-sensitive,
Distinct,
Callee,
Occasion,
Thread,
Popup,
Pop up,
Alarm,
Alarm clock,
Product,
Favorite,
Forum,
Regular,
Selection,
Backend,
Coproduct,
Partial,
Oblique,
Curve,
Bell curve,
Handout,
Low,
Lurker,
Since,


 JK
. , @ YK


,
@ YK
 JK

.

J
KA K


@ Z
Z
A @
 Z
 J@ @ , 
,YJ
A
XYJ ,XY
J

B@ Am
 Q 
Qk


Q 

XAJ
 , J AJ
Q
.
 A J
(...t '@  A ,  Y A K)  J.J
 J.J
J.J
J.J
i.JJ
,I.j J
YJJ
JJ
 JJ

g DJ
. h JJ

.KAg
.


J

KQk. , PAj
J
, Qj
KA
J
J
Jj
J

Qk. j
 J
H. J , j
j J
YJ
Y J

  YJ

J
.

Host adaptor,
J


 K A , AJ
 Z
Printable,
AJ
.
.
.
XP@

Pipelining,
Load balancing,
K P@ , J
jJ@ K P@
m '@
Load balancing,
K P@ , m '@ K P@
J
jJ@
k , HA

 @
Properties,
A

@
Functional specification,
J
J


Specification,
@
Agree,
 @
OK,
 @
 @

Fine-tune,
J
X
Correspondent,
'@ J ,'@

Matching,
Z@

Key escrow,
hAJ @ 

 QK
Effects,
H@

Q
K AK ,QK
Effect,

Documentor,
 K
.
Condensed,
J ,Qk
Connection-oriented,
ABAK. k.
Router,
k.


Continuous wave,
J k
.

Wave,
k.
Exist,

k ,Xk.
Existing,
Xk.
Modem,
X
Generic resource,

XP
Global resource,

XP
Parallel resource,
P @J XP
Resource,
XP
Network engineer,


Y @ J@ J
 Q ,P J
Perspective,
k
.
J
Isolated,
XQ J , Q
P@ J Y J
Enhanced parallel port, YJ

Ephemeral port,

Y J
Parallel port,

P@ J Y J
Port,
Y J
 @ Y J
Printer port,
AJ
.
Registered port,
j. Y J

Serial port,

 Y J
Y J
Viewport,
Q@

Well-known port,
Q
Y J
J ,XQ J
Isolated,
Q
Discrete,
 J , J

Dataless management utility, Q
K. YK J

@
J
Ag
HAJ
Relay,
K
YK. ,A J

Debugger,
i J

Dotted,
 J
 J
Deflate,

Methodology,
J
j.D

Client-side,
J
@ k
.
,XAm '@ YJ ,XAm '@ J.

Server-side,


XAm '@ J
kAK

 ,XAm '@ J kAK
Server-side, ,XAm '@ J.


XAm '@ YJ
Dialup,

KA ,  KA
Deprecated,
Pj.

Contention slot,
PA J K

Q
g AK ,
Delay,
 @ I

 DK@ ,
Timeout,


Trash,
HC
Task,

Window manager,

Appointment,
Y
Rendezvous,
Y

Provider,
Q
 g Q
, Y
 m '@ Q

Service provider,
Y
 j K X Q , I K QKB
@
Y
.









Q
Service provider, X Q , IK KB
@ Yg Q
, Y
Ym '@ Q
 j K
        .
Paused,
( AJ
J) J , J
J@ I
, 

Positional,

GA


Archive site,

J
P @

Backbone site,

XA

Location,


Q @ Y@

Memory location,

@Q
Mirror site,

News Site,

PAJ.k@

Site,



Website,
I K QKB@
Generator,
Y

Author,


Locked,

 Q  

Byte-code interpreter,
J
KA

Command interpreter,
Q@ @

Command-line interpreter,
Q

Q@ @


Dead,
A , IJ

AK. Aj.J

Megabyte,
IK
Mega-,
Bj.J

Q 
Feature,


Q

Resolution,
. A J

Connectionless protocol,
YK
A@
Topic,

Scalable resource,

Scalable resource,

Inherited,
Distributed,
Distributor,
Hub,
Postmaster,
Switching hub,
Foundation,
Parametric,
Centered,
Expanded,
Ephemeral,
Blinking cursor,
Chase pointers,
Cursor,
Dangling pointer,
Error indicator,
Indicator,
Mouse Cursor,
Null pointer,
Peak indicator,
Pointer,
Stack pointer,
Coaxial cable,
Linked to,
Linker,
Code position,
Hook,
Position,

  XP
XP ,AJ
@
J
Q K A

.




XP , J
Q K. A XP
 
AJ
@


HP

P

P

P

YK
Q.@ P

K
YJ.K P
 

AK ,


YJ , 


 . AK Q
  K Q

AKj
.
Q
( P A@)


Y Q

Ak Q


@X ,Q

P A@
Q


Z
C Q
 
J
A @
Q

Q
 Q

Q@

Pm
@



QP


KQ@ A @

I. J . K
Succeed,
hAm.'
 '
Efficiency,
Am
.

Relief,
Ym.'
 '
Star,
m
.
Concrete syntax,

XA m'
 J m'
Context-free grammar,

 @
AJ

 '

Elite,
ZAk. , AJ
@ , J.m
Call-by-name,
BAK. Z@YK
 Am 'AK Z@YK
Call-by-need,
k
. .
Call-by-reference,
k. Q AK. Z@YK
 AK

Call-by-value,
J

. Z@YK
 @
 
Call-by-value-result,
J

j.J
JK. Z@YK
Callout,
Z@YK
Call-with-current-continuation,
Z@YK
 AK
J
Am '@ @
.
Detach,
Q K

Strip,
  , Q K

Down,
B Q K
Aspect ratio,
J
AK. J . 
Ratio,
J . 
Relative,

.

Backup,

AJ
Jk@ q , J
AJ
Jk@ j

Child version,
K
JK . j

Copy (verb),
j

Facsimile,
 B@  J. j  
 j

Hard copy,
J
P
 , AJJk@ q
Backup,
, J
AJ
Jk@ j

AJ
Jk@
Copy (noun),
q
K AJ
Jk@ q
Differential backup, A

 

Rip,
J
P A q
Heartbeat,

Point-to-point protocol,
Protocol,
Micron,
Micro-,
Micro,
Minix,
Centum call second,
Percentage,
Percentual,
MSDOS,


SOCKS Server,
Publisher,
Smooth,
Inactive window,
Plain window,
Window,
Root Window,
Minus,
Address bus,
Bus,
Carrier,
Data bus,
Digital carrier,
System bell,
Nano-,
Nanocomputer,
Nanometre,
Nanosecond,
Sleeping,
Discard,

  K A J
@

 K
A J

QJ
QJ

QJ

JJ

A@ J
KA K J
K
J

J
Y..

 XAK
'
Q P@X ,QAK
AK
   Q  Y A K

A  Y A K
 Y A K
P Ym . '@  Y A K
A K
K
AJ A K
A K
Ag ,A K

J.@ A K
 KAJ
HA



P Ag ,
P A K
A J@ A K
KA K

@ I.Ag KA K
Q KA K
J
KA K KA K
'A K

Y J . K

 A 
AJ.J @
A

Database management system, Q
K. YK A 

@ YA
HAJ
J
  A 
Disk operating system,


Q@
A 
Distributed system,
P
Complete inference system,

Dynamic database management system,


J.@ YA P@X@ A 
 KAJ

AJK
Y@ HA
Electronic funds transfer system,
A 
QB@ @B@  K

G
Embedded system,
P A 
Q
J.k A 
Expert system,
@ A 

File system,
HA
A 

Filesystem,
HA
 
A 
Hierarchical file system, Qm. HA
A 
I/O subsystem,

Q h. @Qk@ , AgX@



Knowledge-based system, J. A 
@
Q


Multiuser system, 
YjJ @ XYJ A 
Network operating system,
J
  A 
 @
J
.
Numeral system,
Y A 
Operating system,
J
  A 
Production system,
h. AJK@ A 
HA


Root file system,

P Yg
.  A 
P A 
Run-time system,

J
 
P A 
Runtime system,

J
 
System,
A 
Windowing system,
Y @ J@ A 
Window system,
Y @ K A 
Writing system,
K . AJ A 
HB
 B@ K
Q 
Automata theory,
J
K@ Y@

J
 @

 
J
 K ,
 
JJ ,()
Format (noun),
, )

( Q m
Activity,
A 
Podcast,
( J
K) Q


Desktop publishing, I
. J @ i Q. Q
Publish,
Q
Active,
J
 
Q

Half-Sphere,


Halfword,



AK.
Nybble,
IK

Radius,
Q

Ciphertext,
Q

Hypertext,
 KA 
New text,
YK
Yg. 
Perl Script,
Q
K. 
Plain text,
XQm. 
Text,

Text only,
 
Domain maturity,
Aj. @ i. 
Jumper,
PA  ,A

Baseband,

A @ A






Broadband, @ A ,@ XXQK A



Broadband, @ XXQK A ,@ A

 
Domain,
A
 
Scope,
A
 
Timezone,

P A
 
Zone,
A
Bootstrap,
QKJ
J.@ J
  YJ
 A 
 AJ A 
Bug tracking system,
Cg K
.





Bulletin board system, H@QJ@ k A 
Communication system,
A@ A 
Format,

  K
K
AD@
  K
 
Hot spot,
A
  K

Mount point,

  K
Point,
Q K
,
  K
Point of presence,
Xk. @
 .  J  K
Bit block transfer,
IK
  K
Cluster-transport,
Yk
Electronic funds transfer,
@@  K
Q@

G
@  K
File transfer,

Linear transfer,
k  K
Transfer,
 K
, ,
 K
Flavor,
@ Y
 Y

@ k
Data modeling,
HAJ
.


@ k. Y
Data modelling,
HAJ
 Y
Modelling,
k
.

Prototyping,
k. Y
Answer mode,
K . Ag. B @
J@ Q@

Demo mode,

jJ

@
Insert mode,
h. @P XB @ , AgXB

@ , h @P XB @
Insert mode,
AgXB
.


Night mode,

J
Noncluster mode,
B , k B

X J

 B
Noncluster mode, B , XJ

k
,  PP
Packet mode,
 Qk

Page mode,

j
Pattern,

 PAgX@

Power save mode,
A@

Relational model,

 KC

Root mode,

P Yg
.


Single-user mode,
YJ
k@ YjJ @
Endpoint,



HAj
. @ K
Q 
J
E
YJ.@
Complete theory,
K
Q 
Computability theory,
I.
m' K
Q 
 K Q 
Decision theory,
P@Q@


Domain theory,
Am. K
Q 

Number Theory,
AP B@ K
Q 
Q

Q
JJ@
Peer-to-peer,
Q

Analog,
Q

Peer,
Clean,
J
 K , J

Yes,
K
Access,
XA K
XA K
Remote access,
YK .
 , K
A K
Garbage,
HC
Double click,
A KQ K
Q K
Click (noun),
Q K
Tap,

Click,
Q K
Click (verb),
Q K
Hold Down,
, J
J@ Q K
J
J@
Reduce,
 K
Reduction,
 K
Colon,
A J K
  K
Access point,
PJ.@
  @
  K
Breakpoint,
A
  J,A
  K
 K@
Break point,
Q
  K ,Q
  K
Break point,
A K@
 J@
  K
Checkpoint,
 j
  K
Control point,
jJ@
  K
Dot,

 @
 
Dpi,
J
.
K
Axiomatic set theory,

K

J
J. J@ K
K

K
K
JK. , K . AJ
K
I.J
J
K

Type,
Type bindings,
Sleep,
Microkernel,
Delegation,
Netscape,

m , A

.





Dialup,
KA ,
KA
Cellphone,

g KA

Metaphone,
@ KA
Phone,
JE
, KA
Hacker,
QA
Hack,
A



Dummy,

@ Q @ ,YA

A

Marginalia,
HAJ

Margin,
A
Haiti,

K
A
Dial,
J
Spelling,
ZAj.




Brute force attack,
J
A@ AK. j.

j.
Hybrid,

 , Y
Goal,
Y

Marker object,
@ Y

J.@  J
Q
 KAJ
Data hierarchy,
HA
Hierachy,

Q
Pyramid,
Q
Light precipitation,
m.
Left parenthesis,

PA
C
Right parenthesis,

C
 
Constructive solid geometry, J. YJ
J
KA JK .
 J
Domain engineering,
Aj. @ Y
Descender,

Wizard mode,
Packet mode,
Client-server model,
Color model,
Colour model,
Data model,
Growth,
Day mode,
Weekday,
Unexpected end,
Back-end,
End of file,
Front end,
Purge,
Kernel,
Loadable kernel,
Nautilus,
Light,
Abstract data type,
Abstract datatype,
Aggregate type,
Algebraic data type,
Constructed type,
Data type,
Derived type,
Enumerated type,
File type,
Linear type,
Media type,
Mime Type,
Principal type,
Resource type,
System type,


YQ

 PP ,  Qk

J h X
XAg

.

@ @ h. X

@ @ h. X


@ h. X
HAJ
j  ,
J@
PAE
PAE

 J Q K AE

J g K AE



K
AE

J
A @ K
AE
J
kC@ K
AE
@K
J
jJ K. A @K
CJ
KK
PK

K. K
 KAJ
XQm. HA

K. K
 KAJ
XQm. HA

m . K

K. K
 KAJ

Q.g. HA

J . K

J.@ K
 KAJ
HA
 K
 J
 K
X Y
@ K

k K

K
A@
:
J
K K

J
KP K
XP @ K
A J@ K


@
@ @

File descriptor,

Pragmatic,

 , 
 @

,@
Fact,

Web,
H.

Hypotenuse,
QK
 @ QK
Close routine,
C

QK
Routine,


Elite,
AJ
@ ,ZAk.
Emoticon,

Q
J.K k.
Central processing unit,
m . 'A @ Yg
@
K
QQ
Channel service unit,
K
J  J
Yg Yg
Control unit,
m' Yg
 g Yg

J.@ Y
 KAJ
Data service unit,
HA

K. Yg
 KAJ
Data unit,
HA
  
Digital service unit,
J
Q@ Y
m '@ Yg


Yg
Functional unit,
J
J

Yg
Module,
System unit,
A J@ Yg
Yg
Unit,
 X
Widget,
k
 .

Priority inheritance,
J
B@ K@P

Single inheritance,
Yg K@P

Leaf,
P

Sheet,
P

Spread sheet,
H. Ak P

Worksheet,
P

Paper,
P

Distribute,
P

Weight,
P

XA
P A@
Mouse pad,

Hypermedia,
J
. @QK A
Descriptor,

 J
Y
 J
Geometry,
Y
 J

m.Q.@ Y
Software engineering,
HAJ
Geometric,

YJ
ID,
K

Framework,
J






Format (noun),
 ,( Q m , ) JJ

()
 JJ
Time format,
I @

Engineering,


Ring topology,

 K 

 g

Wap,

H. @

API,
k. @
 @
Command line interface,
k
.
Q@ B@


 
Global interface, J
k. @ , J
Ag. @ k. @


 
Global interface, J
Ag. @ k. @ , J
k. @
 @
Graphical user interface,
Yj J k
.
JP



 @

GUI,
J
Q@ YjJ @ k
.


Haptic interface,
J
k. @

 
High speed serial interface, J
 k. @

Q@
J
A

Iconic interface,
J
K K
@ k
. @

Interface,
k. @


 @


 J @ k
MDI,
XYJ @ H@Y
.




Service interface,
Ym '@ k. @
 @
Video interface,
K
YJ
k
.
Incoming,
XP@
 J@ @
,YJ , A
Expanded,

Marker,
@
 J
J.J@
HA

m . QK.
Q

Q @ X h
.

Yg h.
J

K

JK

PY

Memory access,
Single sign-on,
Blink,
Virtual,
Wiki,
Windows,
AND,

Navigating,
Revoke,
Strikethrough,
Orphan,
Converge,
Finger,
Write-protect,
Referer,
Integrate,
Rotate,
Bounce,
Encode,
Left,
Exclude,
Sniff,
Sniff,
Revoke,
Occlude,
Stroke,
Replicate,
Printing,
Rely on,
Infect,
Revert,

QjJ.K

I.j
,J.K

 , k JK

H.

JK

Y m 
'
m
'
K . AJ@ Y
m
'
YK

l. YK

k P@X ,PYK

YKQK


Q 
QK , Q QK

PA

J

  J ,J







J
, J

J.K
, I.j

Y 

Y


PQK
, A

J.

YJK

YK


A

XYJ A
Multimedia,

Push media,
X A
Dirty,
Z
YK . ,t
Medium,

Tag,

Proxy,
J


Utility,
J








Q

'

'
Recipe,
K

m m B ,

Links,
HC


Link rot,
J


Symbolic link,
K
QP


Symlink,
K
QP

Mount,


Pose,
J


Mode,


Protected mode,

m

@
Safe mode,

 @

Supervisor mode,
Q
 , X
 ,h

Sharpness,
Yg

 m ' ,(...t '@ ,l. @Q.@ KA
Validate,

@ HA

J.@) m 
 KAJ
 gY

Function (Programming),
J

QY @ J
Memo function,



Relevance,
K
Q 
J
 J


Functional,


@ , K
A
Safety,


Preventive,

KA

Response time,
K . Aj.JB@ I


Stop,

User agent,
Yj J @ J

Dial-up login,

J h.
Login,
h.
Media,

Heading,

 QK (1)
@ J (2) 

On,
Dictate,
Screw,
Pumpkin,
Normalize,
Loop,
Replicate,
Reachable,
Right,
Spoof,
Lurking,
Lurk,
Slide,
Copy,
Loop,
Double-click,
Right-click,
Phone,
Mumble,
Point,
Sign,
Day,
Unix,
Unicode,

Q
,YK


K

P@QJ@ K

 ,PQK
g



A
,PQK

J
@ J , J
@ @
l , 

jJK

YJK

YJK

m 
' Q ,  Q K

qK

 ,P@QJK Y JK
PQK
, g
.

Ag. X Q Q JK


J
@ Q JK

KA , JE

 K ,Q K


PA@ , QP


,K

K K

XJ
KK


MS,


: K

MTU,

5
Microcentury,

 
AJ.K
QK

J
KA K 6.52

)
CC,

 (1)
. Q j
(3) ; m  AJ (2) ; J
KK
t AJK

FreeBSD Documentation License


Copyright 2006, Arabeyes.org. All rights reserved.
Redistribution and use in source (SGML DocBook) and compiled forms (SGML,
HTML, PDF, PostScript, RTF and so forth) with or without modification, are permitted
provided that the following conditions are met:
Redistributions of source code (SGML DocBook) must retain the above copyright
notice, this list of conditions and the following disclaimer as the first lines of this file
unmodified.
Redistributions in compiled form (transformed to other DTDs, converted to PDF,
PostScript, RTF and other formats) must reproduce the above copyright notice, this list
of conditions and the following disclaimer in the documentation and/or other materials
provided with the distribution.
Important: THIS DOCUMENTATION IS PROVIDED BY THE ARABEYES WIKI
TEAM AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE ARABEYES WIKI TEAM BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Document generation: Djihed Afifi, djihed@gmail.com

 K X @ G Q
 kP
ZA

 m '@ . Arabeyes.org , 2006 q@


 k

m
. 

 KYK

J@ XAK. i

(SGML DocBook) PY @ JJ


. @ K
YJ@ YK. @YjJB@ K
P






 @ HA

QAK. (t '@ ... RTF @ P ostScript @ PDF @ HTML @ (SGML j
.  JJ
@  @
: J
K B@
Q@  A C @ PY @ q@
 k
 Q A JkB@ K @ Im'
ZC@ Y
.

..







  JJ K P

(SGML K
PY @ Q@



J@ XA @ YJ Q
K YK
. AKX @ PY @ Q@
. DocBook)













Q@ ZCgZ , Y Q@ ZA , C @ PY @ q@ k Q YJ
K K
@ I.m.'



XA @ YJ j




, AKX @ PY @
. @
A Q
K K
Qk @ X@
@ @/ J
KJ@
@ Q
Z



 ) j
 @ JJ @ K P
Qk @ K @ m
@ PostScript @ PDF @ m
, DTD
.



J@


.(Qk @ JJ

@ @ RTF


J KJ@ YJ 


 K @ Y
 Q
Q@
ZCg @ A QK
@ H. Q
K
K
Q @
.

K K
:A
 @ PAjJ@ iJJ @ J AJ HA
@ AD A. , JJ
@
. @ m 
' Q HA
 KA
 KA

Z JAJ
.

 Q 



B . Y
J
Z @ QK
@ H. Q K
K
Q J
m'
@ QAJ. 
@ QAJ. , 
K
@

 @ Ag @ X
 Q
 YK HAY
g @ ZAJ J@ A A.) JK @ G A

K. PAk ; K

HAKAJ
.

.



C
 Z H ' @




K @ ;@YjJ@ k @ hAK P @ @






K
Q

J@
I
KA
A
(

gY












@ PB
Z@ AD J
. @
@ K
Y K
Z I KA
,( X Q
@ AZ@ J J) J
KY

J
J@ ' k
@Yj J@

@ Y
 , J
KJ@ @ Y

QK
Yj
 ZH. ZQ @
.Q @

djihed@gmail.com

XAk : m QK
,
J

. . .

You might also like