user-proven

user-proven
апробированный пользователем

English-Russian dictionary of mechanical engineering and automation. - RUSSO. . 2003.

Игры ⚽ Поможем решить контрольную работу

Смотреть что такое "user-proven" в других словарях:

  • List of ReBoot characters — This is a list of characters from the animated television series, ReBoot. With the exception of a few characters, such as Bob, most ReBoot characters are named after technical computer terms or pieces of computer hardware.[verification needed]… …   Wikipedia

  • Information and communication technologies for development — An OLPC class in Ulaanbaatar, Mongolia …   Wikipedia

  • List of misconceptions about illegal drugs — Many urban legends and misconceptions about classified drugs have been created and circulated among children and the general public, with varying degrees of veracity. These are commonly repeated by organizations which oppose all classified drug… …   Wikipedia

  • Criticism of Facebook — Facebook s growth as an Internet social networking site has met criticism on a range of issues, including online privacy, child safety, and the inability to terminate accounts without first manually deleting the content. In 2008, many companies… …   Wikipedia

  • Liste der IT-Zertifikate — IT Zertifizierungen sind Nachweise einer Qualifikation in der Branche der Informationstechnik. Sie werden von verschiedenen Organisationen angeboten. Diese Organisationen bescheinigen dem Zertifikatsinhaber Kenntnisse auf einem Gebiet. Die… …   Deutsch Wikipedia

  • Myspace — Type Private Founded …   Wikipedia

  • MySpace — Infobox Dotcom company company name = MySpace company slogan = A Place for Friends owner = Fox Interactive Media company company type = Subsidiary foundation = 2003 location city = Beverly Hills, California location country = key people = Tom… …   Wikipedia

  • Digital signature — This article is about secure cryptographic signatures. For simple signatures in digital form, see Electronic signature. A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital… …   Wikipedia

  • Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key …   Wikipedia

  • Mobile payment — Part of a series on Electronic commerce Online goods and services Streaming media Electronic books Softwar …   Wikipedia

  • Configurable Network Computing — or CNC is JD Edwards s (JDE) client–server proprietary architecture and methodology that implements its highly scalable enterprise wide business solutions software that can run on a wide variety of hardware, operating systems (OS) and hardware… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»