keyed sequential access method
- keyed sequential access method
последовательный метод доступа по ключу
direct method — прямой метод
pioneer method — новый метод
savage method — жестокий метод
adopt a method — принимать метод
paper method — камеральный метод
English-Russian dictionary of Information technology.
2005.
Смотреть что такое "keyed sequential access method" в других словарях:
KSAM — Keyed Sequential Access Method … Acronyms
KSAM — Keyed Sequential Access Method … Acronyms von A bis Z
ISAM — stands for Indexed Sequential Access Method , a method for indexing data for fast retrieval. ISAM was originally developed by IBM for mainframe computers. Today the term is used for several related concepts: * Specifically, the IBM ISAM product… … Wikipedia
Single-access key — A key in Biology is a modeling method used for categorizing species using logical choices. A single access key (Dichotomous key also called sequential key , analytical key [1], or pathway key ) is a key where the sequence and structure of… … Wikipedia
последовательный метод доступа с ключами — — [Л.Г.Суменко. Англо русский словарь по информационным технологиям. М.: ГП ЦНИИС, 2003.] Тематики информационные технологии в целом EN keyed sequential access methodKSAM … Справочник технического переводчика
Extensible Storage Engine — For JET Red storage engine of Microsoft Access, see Microsoft Jet Database Engine. For the teacher s term, Exceptional education. Extensible Storage Engine (ESE), also known as JET Blue, is an Indexed Sequential Access Method (ISAM) data storage… … Wikipedia
AppleScript — Paradigm(s) Natural language, Scripting … Wikipedia
interior design — 1. the design and coordination of the decorative elements of the interior of a house, apartment, office, or other structural space, including color schemes, fittings, furnishings, and sometimes architectural features. 2. the art, business, or… … Universalium
Block cipher modes of operation — This article is about cryptography. For method of operating , see modus operandi. In cryptography, modes of operation is the procedure of enabling the repeated and secure use of a block cipher under a single key.[1][2] A block cipher by itself… … Wikipedia
Citation — This article is about the research concept acknowledging the use of another s ideas. For other uses, see Citation (disambiguation). Citation needed redirects here. For the Wikipedia tag, see Template:Citation needed. For Wikipedia s citation… … Wikipedia
Text Creation Partnership — The Text Creation Partnership (TCP) is a not for profit organization based in the library of the University of Michigan since 2000. Its purpose is to produce large scale full text electronic resources (especially in the humanities) on behalf of… … Wikipedia