DictionaryForumContacts

   English
Terms for subject Microsoft containing check | all forms | exact matches only
EnglishDutch
check boxselectievakje (" A control that indicates whether or not an option is selected. A check mark or "x" appears in the box when the option is selected.")
check cardbetaalpas (A type of bank card where the amount of purchase is immediately withdrawn from the user's bank account)
check clausecontrolecomponent (Code that enforces constraints on a table or column)
CHECK constraintCHECK-beperking (A constraint that allows for business rules that span multiple tables. For example, the Order table could have a CHECK constraint that would prevent orders for a customer from exceeding a credit limit defined for the customer in the Customer table)
check datechequedatum (The date on the check)
check ininchecken (To place a file or project back in a source repository. This releases the lock for editing and enables other users to view the updated file or check out the file)
check letterremisebrief (A payment letter that accompanies a check and which lists the documents that are paid by the check. Used for French check format)
check listcontrolelijst (A set of standards that a deliverable or task should meet or a list of possible errors)
check markvinkje (A small x or other sign that appears in the check box if the option represented by the box is selected)
check numberchequenummer (A unique identification number that is assigned to a check)
check outuitchecken (To retrieve a writable copy of a file or project from a source repository. This locks the file for editing to prevent others from overwriting or editing it inadvertently)
check outbetalen (To finalize a purchase on a Web site. For example, when customers shop on your Web site, they may select several items and save them in their shopping basket. When they have finished shopping, they click on a checkout link or graphical button that takes them to an online form where they enter their name, billing address, payment type, and shipping information)
check registerchequeregister (A list of all transactions for a specific checkbook)
credit limit checkkredietlimietcontrole (A calculation to determine whether a customer's outstanding balance is within the maximum credit allowed for that customer)
cyclic redundancy checkcyclische redundantiecontrole (A procedure used in checking for errors in data transmission. CRC error checking uses a complex calculation to generate a number based on the data transmitted. The sending device performs the calculation before transmission and includes it in the packet that it sends to the receiving device. The receiving device repeats the same calculation after transmission. If both devices obtain the same result, it is assumed that the transmission was error free. The procedure is known as a redundancy check because each transmission includes not only data but extra (redundant) error-checking values. Communications protocols such as XMODEM and Kermit use cyclical redundancy checking)
cyclic redundancy checkcyclische redundantiecontrole (A procedure used in checking for errors in data transmission. CRC error checking uses a complex calculation to generate a number based on the data transmitted. The sending device performs the calculation before transmission and includes it in the packet that it sends to the receiving device. The receiving device repeats the same calculation after transmission. If both devices obtain the same result, it is assumed that the transmission was error free. The procedure is known as a redundancy check because each transmission includes not only data but extra (redundant) error-checking values. Communications protocols such as XMODEM and Kermit use cyclical redundancy checking)
cyclical redundancy checkcyclische redundantiecontrole (A procedure used in checking for errors in data transmission. CRC error checking uses a complex calculation to generate a number based on the data transmitted. The sending device performs the calculation before transmission and includes it in the packet that it sends to the receiving device. The receiving device repeats the same calculation after transmission. If both devices obtain the same result, it is assumed that the transmission was error free. The procedure is known as a redundancy check because each transmission includes not only data but extra (redundant) error-checking values. Communications protocols such as XMODEM and Kermit use cyclical redundancy checking)
cyclical redundancy checkcyclische redundantiecontrole (A procedure used in checking for errors in data transmission. CRC error checking uses a complex calculation to generate a number based on the data transmitted. The sending device performs the calculation before transmission and includes it in the packet that it sends to the receiving device. The receiving device repeats the same calculation after transmission. If both devices obtain the same result, it is assumed that the transmission was error free. The procedure is known as a redundancy check because each transmission includes not only data but extra (redundant) error-checking values. Communications protocols such as XMODEM and Kermit use cyclical redundancy checking)
declarative security checkdeclaratieve beveiligingscontrole (Declarative security information in metadata. Developers can use such declarations, which are usually written as custom attributes, to invoke several kinds of security functionality - require permissions to bind reference to the code, require permissions to derive a type, demand that callers have certain permissions, and so on)
frame check sequenceframecontrolereeks (The extra checksum characters added to a frame in a communication protocol for error detection and correction. Source: Wikipedia)
idempotency checkidempotentiecontrole (A check to ensure that each unique document is received once and only once)
imperative security checkimperatieve beveiligingscontrole (A security check that occurs when a security method is called within the code that is being protected. This type of check can be data-driven and can be isolated to a single location within an object or method. For example, if the name of a file to be protected is known only at run time, an imperative security check can be invoked by passing the file name as a parameter to a security method)
non-negotiable checkniet-overdraagbare cheque (A non-negotiable instrument ordering a drawee organization to pay a specified amount of money to the holder)
pair wise consistency checkpaarsgewijze consistentiecontrole (A combinatorial testing method that tests all possible discrete combinations of each input parameter pair)
price checkprijscontrole (The process of looking up a price)