- three-key function
- трёхклавишное функционирование (на трёх режимах)
Англо-русский словарь по машиностроению. Академик.ру. 2011.
Англо-русский словарь по машиностроению. Академик.ру. 2011.
Three-pass protocol — In cryptography, the three pass protocol for sending messages is a framework which allows one party to securely send a message to a second party without the need to exchange or distribute encryption keys. This message protocol should not be… … Wikipedia
Function key — A function key is a key on a computer or terminal keyboard which can be programmed so as to cause an operating system command interpreter or application program to perform certain actions. On some keyboards/computers, function keys may have… … Wikipedia
Function (mathematics) — f(x) redirects here. For the band, see f(x) (band). Graph of example function, In mathematics, a function associates one quantity, the a … Wikipedia
Key punch — A key punch is a device for entering data into punched cards by precisely punching holes at locations designated by the keys struck by the operator. Early keypunches were manual devices. Later keypunches were mechanized, often resembled a small… … Wikipedia
Three-dimensional integrated circuit — In electronics, a three dimensional integrated circuit (3D IC, 3D IC, or 3 D IC) is a chip in which two or more layers of active electronic components are integrated both vertically and horizontally into a single circuit. The semiconductor… … Wikipedia
Key frame — A key frame in animation and filmmaking is a drawing which defines the starting and ending points of any smooth transition. They are called frames because their position in time is measured in frames on a strip of film. A sequence of keyframes… … Wikipedia
Key fob — A key fob is a generally decorative and at times useful item many people often carry with their keys, on a ring or a chain, for ease of tactile identification, to provide a better grip, or to make a personal statement. Key fobs are often called… … Wikipedia
Diatonic function — Scale degree names[1] (C major scale) … Wikipedia
Hash function — A hash function is any well defined procedure or mathematical function for turning some kind of data into a relatively small integer, that may serve as an index into an array. The values returned by a hash function are called hash values, hash… … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
Efficient Probabilistic Public-Key Encryption Scheme — EPOC (Efficient Probabilistic Public Key Encryption) is a probabilistic public key encryption scheme.EPOC was developed in 1999 by T. Okamoto, S. Uchiyama and E. Fujisaki of NTT Labs in Japan. It is based on the random oracle model, in which a… … Wikipedia