checksum protection

checksum protection
zabezpieczenie przez sumę kontrolną

English-Polish dictionary of Electronics and Computer Science. 2013.

Игры ⚽ Нужен реферат?

Look at other dictionaries:

  • Checksum — Somme de contrôle La somme de contrôle (en anglais checksum) est un concept de la théorie des codes utilisé pour les codes correcteurs, elle correspond à un cas particulier de contrôle par redondance. Elle est largement utilisée en informatique… …   Wikipédia en Français

  • Copy protection — Copy protection, also known as content protection, copy obstruction, copy prevention and copy restriction, refer to techniques used for preventing the reproduction of software, films, music, and other media, usually for copyright reasons.[1]… …   Wikipedia

  • Header checksum — refers to the basic protection used in the header of IP packets against data corruption. This checksum is calculated only for the header bytes and is 16 bit long and is a part of the IP packet header. This checksum is calculated by word aligning… …   Wikipedia

  • CD/DVD copy protection — is a blanket term for various methods of copy protection for CDs and DVDs. Such methods include DRM, CD checks, Dummy Files, illegal tables of contents, over sizing or over burning the CD, physical errors, and bad sectors. Many protection schemes …   Wikipedia

  • Compact Disc and DVD copy protection — CD/DVD copy protection is a blanket term for various methods of copy protection for CDs and DVDs. Such methods include DRM, CD checks, Dummy Files, illegal tables of contents, over sizing or over burning the CD, physical errors, and bad sectors.… …   Wikipedia

  • Modbus — is a serial communications protocol published by Modicon in 1979 for use with its programmable logic controllers (PLCs). Simple and robust, it has since become one of the de facto standard communications protocols in the industry, and it is now… …   Wikipedia

  • Anti-spam techniques — To prevent e mail spam (aka unsolicited bulk email), both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users… …   Wikipedia

  • Procedures francaises assurant la sincerite des machines a voter — Procédures françaises assurant la sincérité des machines à voter Une machine à voter permet d organiser un vote, sous réserve du respect de certaines règles : En l absence de telles règles, un informaticien de bon niveau pourrait faire… …   Wikipédia en Français

  • Procédures françaises assurant la sincérité des machines à voter — Une machine à voter permet d organiser un vote, sous réserve du respect de certaines règles : En l absence de telles règles, un informaticien de bon niveau pourrait faire délivrer à la machine un résultat erroné [1], en modifiant certains… …   Wikipédia en Français

  • Cyclic redundancy check — A cyclic redundancy check (CRC) is an error detecting code designed to detect accidental changes to raw computer data, and is commonly used in digital networks and storage devices such as hard disk drives. Blocks of data entering these systems… …   Wikipedia

  • File Allocation Table — For other uses, see Fat (disambiguation). FAT Developer Microsoft Full Name File Allocation Table FAT12 (12‑bit version) FAT16/FAT16B (16‑bit versions) FAT32 (32‑bit version with 28 bits used) Introduced …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”