- Industry: Computer; Software
- Number of terms: 54848
- Number of blossaries: 7
- Company Profile:
Apple Inc., formerly Apple Computer, Inc., is an American multinational corporation headquartered in Cupertino, California, that designs, develops, and sells consumer electronics, computer software and personal computers.
A pane in the Print dialogue that lets the user set the number of copies and the range of pages to be printed.
Industry:Software; Computer
A data structure used to synchronise access to a shared resource. The most common use for a lock is in multithreaded programmes where multiple threads need access to global data. Generally, only one thread can hold the lock at a time; by convention, this thread is the only one that can modify the data during this period. Some lock variants such as read-write locks allow multiple threads to hold a single lock under certain conditions. See also mutex lock
Industry:Software; Computer
A QuickDraw function that has no direct replacement in Quartz, primarily because Quartz does not use a bit-based graphics model, as QuickDraw does.
Industry:Software; Computer
The shape of a signal when visualised as a graph showing its variation in amplitude over time.
Industry:Software; Computer
System-level database of all the installation packages installed by the Installer application.
Industry:Software; Computer
A delayed copy optimization used in Mach. The object to be copied is marked temporarily read-only. When a thread attempts to write to any page in that object, a trap occurs, and the kernel copies only the page or pages that are actually being modified. See also thread.
Industry:Software; Computer
A set of iPhone OS and Mac OS X frameworks that provides audio services (depending on the platform) that include recording, playback, synchronization, signal processing, format conversion, panning and surround sound, hardware abstraction, and others.
Industry:Software; Computer
A keychain state in which no key is available in memory to decrypt the passwords and other secrets protected by the keychain. When an application attempts to retrieve a secret from a locked keychain, the user is prompted for a password. The login keychain is unlocked automatically at login if its password matches that of the user’s login account. There is no way to extract secrets from a locked keychain without providing the keychain’’sassword. All of a users keychains lock automatically when the user logs out.
Industry:Software; Computer
In object-oriented languages such as Java and Objective-C, an object that belongs to (is a member of) a particular class. Instances are created at runtime according to the specification in the class definition.
Industry:Software; Computer