Глоссарий





Новости переводов

07 февраля, 2024

Ghostwriting vs. Copywriting

30 января, 2024

Preparing a scientific article for publication in an electronic (online) journal

20 декабря, 2023

Translation and editing of drawings in CAD systems

10 декабря, 2023

About automatic speech recognition

30 ноября, 2023

Translation services for tunneling shields and tunnel construction technologies

22 ноября, 2023

Proofreading of English text

20 ноября, 2023

Chatbot machine learning language service



Глоссарии и словари бюро переводов Фларус

Поиск в глоссариях:  

Anti-virus software

Глоссарий терминов по социальной инженерии и информационной безопасности
    Software designed to prevent and detect malware infections. early versions of anti-virus software were signature-based, which meant detection relied on a database of known malware. however, malware and virus authors circumvented these detection methods by using techniques, such as polymorphism (changing code on-the-fly), encryption and obfuscation. as a result, many av companies introduced heuristic-based (behaviour-based) detection into their products. but even this type of detection can be avoided as threats can be programmed to lie dormant or execute inside “safe” applications. the efficacy of anti-virus software is further eroded by the prevalence of so-called zero-day threats in circulation which av software has difficulty detecting. despite these shortcomings, anti-virus still acts as a useful layer of defence against known threats. see also scareware.


Scareware, английский
    Also known as “fake anti-virus”, scareware software issue a pop-up alert that aims to frighten unsuspecting internet users into purchasing worthless security software. scareware can also take the form of “system optimisation” software. many scareware applications are vectors for malware that connects your pc to a botnet. in many instances, scareware can be removed from an infected system without paying the attacker. for this reason, many cyberspace miscreants now propagate more profitable ransomware instead.




Software, английский
  1. The programs and instructions which direct a computer.

  2. A set of programs, procedures or related documentation associated with a system; materials for use with audio visual equipment; programs in contrast to equipment.

  3. Программное обеспечение

  4. Программное обеспечение; программные средства

  5. The programs and instructions required to operate a computer as opposed to hardware which refers to the machine itself.

  6. Licensed copies of microsoft software identified on the product list. software does not include online services or services deliverables, but software may be part of an online service. software

  7. A set of information that includes at least one program and optionally many programs and data les. the set of information is generally related and used with a speci c goal in mind such as image processing software. solid state disk (ssd) - uses chips to emulate a rotating disk but with no moving parts. much faster than rotating mechanical disks but currently not as much storage and more expensive.

  8. Sw


Software, испанский
  1. Dícese de cualquier componente lógico (programas, aplicaciones) relacionado con el sector informático. antónimo 'hardware' (hard = duro) por oposición a 'software' (soft = blando).

  2. Componentes inmateriales del ordenador programas, sistemas operativos, etc.

  3. Conjunto de instrucciones mediante las cuales la computadora puede realizar tareas. los programas, los sistemas operativos y las aplicaciones son ejemplos de software.


Software ("logical"), испанский
    Es el programa que ejecuta el ordenador .


Software agent, английский
    The term "software agent" was coined to describe a software robot, an entity that "lives" in a computer or a network of computers. an agent would have some intelligence or understanding of a particular area and be able to follow instructions autonomously and interact with both humans and other agents or systems. typically, an agent would be expected to demonstrate some intelligence in understanding a user`s statement of a problem or goal and exercise some degree of adaptive reasoning in finding a solution. software, belief network a extensive commented list of software for constructing and manipulating a belief network, bayesian network, influence diagram, or probabilistic graphical model is maintained at http://bayes.stat.washington.edu/almond/belief.htm. this includes hyperlinks as well as pricing information see also: belief net, bayesian network, graphical model, influence diagram. software, knowledge discovery in databases (kdd) an extensive list of public domain, research, and commercial systems for data mining and knowledge discovery is maintained at http://www.kdnuggets.com/siftware.html see also: data mining, knowledge discovery in databases.


Software and information industry association, английский

Software aplicado, испанский
    Programas escritos para la realización de tareas especiales, como el procesado de palabras o listas de correspondencia .


Software as a service, английский
    The capability provided to the consumer for using the provider’s applications running on a cloud infrastructure. the applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based email), or a program interface. the consumer does not manage or control the underlying cloud infrastructure, including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.


Software as a service (saas), английский
  1. Software as a service (saas) is a software distribution model in which a third-party provider hosts applications

  2. Saas is software that is hosted by a vendor and made available to multiple customers over the internet.


Software asset management, английский
    A best practice incorporating a set of proven processes and procedures for managing and optimizing the purchase, deployment, maintenance, utilization, and disposal of software applications within an organization. sam practice helps to manage risk from counterfeit as well as improperly licensed software.


Software bundler, английский
    A program that installs other potentially unwanted software, such as adware or spyware. the license agreement of the bundling program may require these other components in order to function.


Software business association, английский

Software configuration management;, русский

Software correction, английский
    Программное обеспечение для коррекции (напр., погрешностей перемещения рабочих органов)


Software cryptographic mechanisms, английский

Software de combinacion de texto, испанский
    Software que busca en un documento de texto y proporciona una lista de similitudes en el texto y referencias a fuentes coincidentes.


Software de sistemas, испанский
    Secciones de códigos que llevan a cabo tareas administrativas dentro del ordenador o ayudan en la escritura de otros programas, pero que no se usan para realizar la tarea que se quiere que ejecute el ordenador.


Software decoder, английский
    A type of digital video disc () decoder that allows a dvd drive to display movies on your computer screen. a software decoder uses only software to display movies.


Software defined network, английский

Software deployment, английский
    The process of distributing and installing a software program throughout an entire organization.


Software development environment, английский

Polymorphism, английский
  1. Полиморфизм

  2. In an object-oriented programming language, the ability to redefine a routine in a derived class (a class that inherited its data structures and routines from another class).

  3. The property of a chemical substance crystallizing into two or more forms having different structures, such as diamond, graphite, and fullerenes from carbon. also known as pleomorphism.


Encryption, английский
  1. The process of transforming text into an unintelligible form called cipher.

  2. A method of encoding data for security.

  3. Защита сообщения от неправомочного прочтения, основанная на преобразовании его в шифрованный текст. расшифровать этот текст, т.е. восстановить исходное сообщение, можно только с помощью ключа, использовавшегося при его шифровании

  4. The rearrangement of the bit stream of a previously digitally encoded signal in a

  5. An encoder electronically alters a signal so that it can be clearly seen only by recipients who have a decoder to reverse encryption. selective addressability/scrambling designates receivers to descramble a signal. each decoder has a unique address.

  6. The rearrangement of the bit stream of a previously digitally encoded signal in a systematic fashion to make the information unrecognizable until restored on receipt of the necessary authorization key. this technique is used for securing information transmitted over a communication channel with the intent of excluding all other than authorized receivers from interpreting the message. can be used for voice, video and other communications signals.

  7. Encryption is a process by which a document (plaintext) is combined with a shorter string of data, called a key (eg. ), to produce an output (ciphertext) which can be "decrypted" back into the original plaintext by someone else who has the key, but which is incomprehensible and computationally infeasible to decrypt for anyone who does not have the key.

  8. Шифрование

  9. The process of converting readable data (plaintext) into a coded form (ciphertext) to prevent it from being read by an unauthorized party.

  10. To use a code to render data unintelligible. an encryption key is data that when supplied to an encryption program and the original data to be encrypted yields the encrypted data. a decryption key when supplied with a decryption program and encrypted data the recovers the original data. many times these two keys are the same.

  11. Кодирование (в телефонии, банковской связи)


Obfuscation, английский
  1. In software development, the deliberate act of creating obfuscated code to make it difficult for humans to understand and conceal its purpose or its logic, to prevent tampering, deter reverse engineering, or as a puzzle or recreational challenge for someone reading the source code.

  2. Hackers or social engineers can hide infected domains or malicious code behind official looking or shortened urls or attachments.


Programmed, английский
    Программируемый


Prevalence, английский
  1. The number of existing disease cases in a defined population during a specific time period [contrast with incidence].

  2. The number of cases of a disease in a specific place at a specific time  the prevalence of malaria in some tropical countries  the prevalence of cases of malnutrition in large towns  a high prevalence of renal disease

  3. Поражённость распространенность 61 суммарная совокупность случаев клинически выраженных заболеваний и/или носительства возбудителя какой-либо инфекционной (паразитарной) болезни среди населения определенной территории в определенный отрезок времени. prevalence rate, syn. proportion prevalence

  4. Распространенность. частота конкретного события в изучаемой популяции.

  5. Поражённость распространенность

  6. The total number or proportion of individuals in a population ill with a specific disease


Circulation, английский
  1. Циркуляция

  2. Circulation (of the blood) movement of blood around the body from the heart through the arteries to the capillaries and back to the heart through the veins  she has poor circulation in her legs.  rub your hands to get the circulation going. comment: blood circulates around the body, carrying oxygen from the lungs and nutrients from the liver through the arteries and capillaries to the tissues. the capillaries exchange the oxygen for waste matter such as carbon dioxide which is taken back to the lungs to be expelled. at the same time the blood obtains more oxygen in the lungs to be taken to the tissues. the circulation pattern is as follows: blood returns through the veins to the right atrium of the heart. from there it is pumped through the right ventricle into the pulmonary artery, and then into the lungs. from the lungs it returns through the pulmonary veins to the left atrium of the heart and is pumped from there through the left ventricle into the aorta and from the aorta into the other arteries.

  3. The passing of any liquid or gas to the end of the drill string and back to the surface in the process of drilling a borehole.

  4. The movement of air currents through mine openings.

  5. An item that is communicated to team members on a group work site, and that supports confirmation and tracking of which team members have viewed it. cisc (n)

  6. Caused by quick changes in pressure, cavitation is the creation of vapor cavities within a low-pressure liquid. cavitation can cause severe wear through cyclic stress on metal surfaces as they implode.


Difficulty, английский
  1. Dificultad

  2. Difficulty, in proof-of-work mining, is how hard it is to verify blocks in a blockchain network. in the bitcoin network, the difficulty of mining adjusts verifying blocks every 2016 blocks. this is to keep block verification time at ten minutes.

  3. A word unknown to true salts.

  4. According to admiral smyth’s 1887 sailor’s word-book, “this word is unknown to true salts.” (see impossible.)


Baiting, английский
    A social engineering attack that involves the attacker leaving malware infected portable storage media, such as usb memory sticks, in locations where people will find them. the hope is that the target will insert the usb device into a computer. once this occurs, an executable malware file is triggered to run surreptitiously. for example, keylogger software might be downloaded onto the target’s computer, which transmits login credentials back to the attacker’s command and control centre. the stuxsnet virus was propagated using an infected usb stick which was strategically dropped near an iranian nuclear facility.


Angler phishing, английский
    A recent trend where cyber criminals pose as customer support representatives of various organisations on social media platforms, such as twitter and facebook. here they can initiate an interaction with a target under the pretext of helping them whilst also extracting personal information. for example, twitter’s direct message service might be used by social engineers to get a bank customer who is experiencing an issue with their bank account to divulge their credit card and pin number. see also reverse social engineering.