English | Danish |
check box | afkrydsningsfelt (" A control that indicates whether or not an option is selected. A check mark or "x" appears in the box when the option is selected.") |
check card | checkkort (A type of bank card where the amount of purchase is immediately withdrawn from the user's bank account) |
check clause | kontrolklausul (Code that enforces constraints on a table or column) |
CHECK constraint | CHECK-begrænsning (A constraint that allows for business rules that span multiple tables. For example, the Order table could have a CHECK constraint that would prevent orders for a customer from exceeding a credit limit defined for the customer in the Customer table) |
check in | tjekke ind (To place a file or project back in a source repository. This releases the lock for editing and enables other users to view the updated file or check out the file) |
check mark | markering (A small x or other sign that appears in the check box if the option represented by the box is selected) |
check out | tjekke ud (To retrieve a writable copy of a file or project from a source repository. This locks the file for editing to prevent others from overwriting or editing it inadvertently) |
check out | gå til kasse (To finalize a purchase on a Web site. For example, when customers shop on your Web site, they may select several items and save them in their shopping basket. When they have finished shopping, they click on a checkout link or graphical button that takes them to an online form where they enter their name, billing address, payment type, and shipping information) |
credit limit check | kontrol af kreditmaks. (A calculation to determine whether a customer's outstanding balance is within the maximum credit allowed for that customer) |
cyclic redundancy check | cyklisk redundanstjek (A procedure used in checking for errors in data transmission. CRC error checking uses a complex calculation to generate a number based on the data transmitted. The sending device performs the calculation before transmission and includes it in the packet that it sends to the receiving device. The receiving device repeats the same calculation after transmission. If both devices obtain the same result, it is assumed that the transmission was error free. The procedure is known as a redundancy check because each transmission includes not only data but extra (redundant) error-checking values. Communications protocols such as XMODEM and Kermit use cyclical redundancy checking) |
declarative security check | deklarativ sikkerhedskontrol (Declarative security information in metadata. Developers can use such declarations, which are usually written as custom attributes, to invoke several kinds of security functionality - require permissions to bind reference to the code, require permissions to derive a type, demand that callers have certain permissions, and so on) |
idempotency check | redundanskontrol (A check to ensure that each unique document is received once and only once) |
imperative security check | påkrævet sikkerhedskontrol (A security check that occurs when a security method is called within the code that is being protected. This type of check can be data-driven and can be isolated to a single location within an object or method. For example, if the name of a file to be protected is known only at run time, an imperative security check can be invoked by passing the file name as a parameter to a security method) |
non-negotiable check | ikke-omsættelig check (A non-negotiable instrument ordering a drawee organization to pay a specified amount of money to the holder) |
pair wise consistency check | parvis konsistenskontrol (A combinatorial testing method that tests all possible discrete combinations of each input parameter pair) |
price check | pristjek (The process of looking up a price) |