about icon-addNote android4 Answer apple4 icon-appStoreEN icon-appStoreES icon-appStorePT icon-appStoreRU Imported Layers Copy 7 icon-arrow-spined icon-ask icon-attention icon-bubble-blue icon-bubble-red ButtonError ButtonLoader ButtonOk icon-cake icon-camera icon-card-add icon-card-calendar icon-card-remove icon-card-sort chrome-extension-ru chrome-extension-es-mx chrome-extension-pt-br chrome-extension-ru comment comment icon-cop-cut icon-cop-star Cross Dislike icon-editPen icon-entrance icon-errorBig facebook flag flag_vector icon-globe icon-googlePlayEN icon-googlePlayRU icon-greyLoader icon-cake Heart 4EB021E9-B441-4209-A542-9E882D3252DE Created with sketchtool. Info Kebab icon-lamp icon-lampBig icon-learnHat icon-learning-hat Dislike Loup Loup icon-more icon-note icon-notifications icon-pen Pencil icon-play icon-plus-light icon-plus icon-rosie-cut Rune scrollUp Share-icon Shevron-Down Shevron Left Shevron Right sound sound1 sound2 sound3 sound4 sound2 icon-star Swap icon-translate Trash icon-tutor-ellipsis icon-tutor-flip Tutor folder icon icon-tutor-learned icon-twoWayArrow Mezhdunarodny_logotip_VK vk icon-word pen_icon Logo Logo Logo
without examplesFound in 5 dictionaries

The Universal Dictionary
  • dicts.lingvouniversal_en_ru.description

encode

[ɪn'kəud] , [en-]

гл.

кодировать, шифровать

Biology (En-Ru)

encode

кодировать

Unlock all free
thematic dictionaries

Examples from texts

URL encoding allows someone making a request to encode characters by using hexadecimal values, which use the numbers 0 through 9 and the letters A through F prefixed by the % character.
URL-кодирование позволяет при отправке запроса шифровать входящие в него символы с помощью шестнадцатеричных значений (используя лишь цифры с О до 9 и символы от А до F), перед которыми стоит символ %.
Lockhart, Andrew / Network Security HacksЛокхарт, Эндрю / Антихакинг в сети. Трюки.
Антихакинг в сети. Трюки.
Локхарт, Эндрю
© 2004 O'Reilly Media, Inc.
© Издание на русском языке ЗАО Издательский дом «Питер», 2005
© Перевод на русский язык ЗАО Издательский дом «Питер», 2005
Network Security Hacks
Lockhart, Andrew
© 2004 O'Reilly Media, Inc.
To encode small numbers in less space than large numbers, we look at two types of methods: byte-wise compression and bitwise compression.
Для того чтобы закодировать небольшие числа, используя меньше памяти, чем для кодирования больших чисел, рассмотрим два вида методов: байтовое сжатие (bytewise compression) и битовое сжатие (bitwise compression).
Manning, Christopher D.,Raghavan, Prabhakar,Schuetze, Hinrich / An Introduction to Information Retrieval. Part1Мэннинг, Кристофер,Рагхаван, Прабхакар,Шютце, Хайнрих / Введение в информационный поиск. Часть 1
Введение в информационный поиск. Часть 1
Мэннинг, Кристофер,Рагхаван, Прабхакар,Шютце, Хайнрих
© Издательский дом "Вильямс", 2011
© Cambridge University Press, 2008
An Introduction to Information Retrieval. Part1
Manning, Christopher D.,Raghavan, Prabhakar,Schuetze, Hinrich
© 2009 Cambridge UP
These functions encode tabs and end-of-line characters with the common escape characters that Perl and other languages use (\t, \r, and \n).
Эти функции кодируют символы табуляции и конца строки при помощи обычных экранирующих символов, используемых в Perl и других языках программирования (\t, \r и \n).
Guelich, Scott,Gundavaram, Shishir,Birznieks, Gunther / CGI Programming with PerlГулич, Скотт,Гундаварам, Шишир,Бирзнекс, Гюнтер / CGI-программирование на Perl
CGI-программирование на Perl
Гулич, Скотт,Гундаварам, Шишир,Бирзнекс, Гюнтер
© 2000 O'Reilly & Associates Inc.
© Издательство Символ-Плюс, 2001
CGI Programming with Perl
Guelich, Scott,Gundavaram, Shishir,Birznieks, Gunther
© 2001 O'Reilly & Associates Inc.
Since there are only a finite number of states and a finite number of transition rules, our program can encode states as character strings and use a table of transitions, which it looks up to determine each move.
Поскольку М имеет только конечное число состояний и конечное число правил перехода, наша программа может закодировать состояния в виде цепочек символов и использовать таблицу переходов, которую она просматривает для определения каждого перехода.
Hopcroft, John,Motwani, Rajeev,Ullman, Jeffrey / Introduction to automata theory, languages, and computationХопкрофт, Джон,Мотвани, Раджив,Ульман, Джеффри / Введение в теорию автоматов, языков и вычислений
Введение в теорию автоматов, языков и вычислений
Хопкрофт, Джон,Мотвани, Раджив,Ульман, Джеффри
© Издательский дом "Вильямс", 2002
© Addison-Wesley Publishing Company, Inc. 2001
Introduction to automata theory, languages, and computation
Hopcroft, John,Motwani, Rajeev,Ullman, Jeffrey
© 2001 by Addison-Wesley
The UCS can encode all of the characters and symbols for all of the written languages of the world, with room to spare.
UCS позволяет закодировать символы всех существующих в мире языков, при этом остается огромный резерв.
Geary, David M. / Advanced JavaServer PagesГери, Дэвид М. / Java Server Pages. Библиотека профессионала
Java Server Pages. Библиотека профессионала
Гери, Дэвид М.
© Prentice Hall Inc., 2001
© Издательский дом "Вильямс", 2002
Advanced JavaServer Pages
Geary, David M.
Many binary waveforms use three levels, instead of two, to encode the binary data.
Многие двоичные сигналы для кодировки двоичных данных используют три уровня, а не два.
Sklar, Bernard / Digital Communications: Fundamentals and ApplicationsСкляр, Бернард / Цифровая связь. Теоретические основы и практическое применение
Цифровая связь. Теоретические основы и практическое применение
Скляр, Бернард
© Издательский дом "Вильямc", 2003
© Prentice Hall PTR, 2001
Digital Communications: Fundamentals and Applications
Sklar, Bernard
Since PCP allows arbitrary alphabets, we should encode the symbols of its alphabet in binary or some other fixed alphabet, as discussed in the box on "PCP as a Language" in Section 9.4.1.
Поскольку ПСП может иметь произвольный алфавит, нужно закодировать символы ее алфавита с помощью двоичного или другого фиксированного алфавита, о чем говорилось во врезке "ПСП как язык" в разделе 9.4.1.
Hopcroft, John,Motwani, Rajeev,Ullman, Jeffrey / Introduction to automata theory, languages, and computationХопкрофт, Джон,Мотвани, Раджив,Ульман, Джеффри / Введение в теорию автоматов, языков и вычислений
Введение в теорию автоматов, языков и вычислений
Хопкрофт, Джон,Мотвани, Раджив,Ульман, Джеффри
© Издательский дом "Вильямс", 2002
© Addison-Wesley Publishing Company, Inc. 2001
Introduction to automata theory, languages, and computation
Hopcroft, John,Motwani, Rajeev,Ullman, Jeffrey
© 2001 by Addison-Wesley
Business rules Business rules are the laws, regulations, policies, and procedures that you encode into a computer system.
Законы, директивы, политики и процедуры, реализуемые выражения в форме таблиц в компьютерной системе.
McConnell, Steve / Code Complete: A Practical Handbook of Software ConstructionМакконнелл, Стив / Совершенный код: Практическое руководство по разработке программного обеспечения
Совершенный код: Практическое руководство по разработке программного обеспечения
Макконнелл, Стив
© Перевод на русский язык, Microsoft Corporation, 2004
© Оригинальное издание на английском языке, Steven С. McConnell, 2004
Code Complete: A Practical Handbook of Software Construction
McConnell, Steve
© 2004 by Steven С. McConnell
Symmetries then encode the hidden beauty of nature.
В симметрии закодирована красота природы.
Kaku, Michio / Parallel worlds : a journey through creation, higher dimensions, and the future of the cosmosКаку, Мичио / Параллельные миры: Об устройстве мироздания, высших измерениях и будущем Космоса
Параллельные миры: Об устройстве мироздания, высших измерениях и будущем Космоса
Каку, Мичио
© ООО Издательство «София», 2008
© 2005 by Michio Kaku
© «София», 2008
Parallel worlds : a journey through creation, higher dimensions, and the future of the cosmos
Kaku, Michio
© 2005 Michio Kaku
Gabrielle leaned back against the stone seat of the garden bench, Talleyrand's encoded letter lying open on her lap.
Габриэль сидела, откинувшись на спинку своей любимой каменной скамьи в саду. У нее на коленях лежало шифрованное письмо Талейрана.
Feather, Jane / VelvetФэйзер, Джейн / Бархат
Бархат
Фэйзер, Джейн
Velvet
Feather, Jane
© 1994 by Jane Feather
Each of the above expressions can be represented by a sequence of bits using a simple encoding scheme.
Каждое из приведенных выражений может быть представлено последовательностью битов с использованием простой схемы кодирования.
Aho, Alfred V.,Sethi, Ravi,Ullman, Jeffrey / Compilers: Principles, Techniques, and ToolsАхо, Альфред В.,Ульман, Джеффри,Сети, Рави / Компиляторы: принципы, технологии, инструменты
Компиляторы: принципы, технологии, инструменты
Ахо, Альфред В.,Ульман, Джеффри,Сети, Рави
© Addison-Wesley Publishing Company, Inc., 1985
© 2001
© Издательский дом "Вильямс", 2001
Compilers: Principles, Techniques, and Tools
Aho, Alfred V.,Sethi, Ravi,Ullman, Jeffrey
© 2001 by PEARSON EDUCATION NORTH ASIA LIMITED and PEOPLE'S POSTS & TELECOMMUNICATIONS PUBLISHING HOUSE
© 1986
The known method and system are rather complicated in a realization because they use four arithmetic operations for processes of encoding and decoding.
Известные способ и система достаточно сложны в реализации, поскольку в процессе кодирования и декодирования используют все четыре арифметические операции.
The token for a character can be any conventional integer encoding of that character.
Токен символа может быть обычным целым числом, представляющим этот символ.
Aho, Alfred V.,Sethi, Ravi,Ullman, Jeffrey / Compilers: Principles, Techniques, and ToolsАхо, Альфред В.,Ульман, Джеффри,Сети, Рави / Компиляторы: принципы, технологии, инструменты
Компиляторы: принципы, технологии, инструменты
Ахо, Альфред В.,Ульман, Джеффри,Сети, Рави
© Addison-Wesley Publishing Company, Inc., 1985
© 2001
© Издательский дом "Вильямс", 2001
Compilers: Principles, Techniques, and Tools
Aho, Alfred V.,Sethi, Ravi,Ullman, Jeffrey
© 2001 by PEARSON EDUCATION NORTH ASIA LIMITED and PEOPLE'S POSTS & TELECOMMUNICATIONS PUBLISHING HOUSE
© 1986
It is well-known the method of preparation of anti-tumor vaccine, which is based on the introduction into the organism of the DNA encoding the antigens instead of antigens themselves.
Известен способ получения противоопухолевой вакцины, который основан на введении в организм вместо антигенов опухоли кодирующей их ДНК.
For example, bits in the type field can be used to describe such things as data encoding, encryption, message priority, and so on.
Например, биты поля могут использоваться для описания кодировки данных, шифрования, приоритета сообщения и т.д.
Sklar, Bernard / Digital Communications: Fundamentals and ApplicationsСкляр, Бернард / Цифровая связь. Теоретические основы и практическое применение
Цифровая связь. Теоретические основы и практическое применение
Скляр, Бернард
© Издательский дом "Вильямc", 2003
© Prentice Hall PTR, 2001
Digital Communications: Fundamentals and Applications
Sklar, Bernard

Add to my dictionary

encode1/6
ɪn'kəud; en-Verbкодировать; шифровать

User translations

No translations for this text yet.
Be the first to translate it!

Collocations

encode payment information on magnetic tape
закодировать информацию о платеже на магнитной ленте
encode mode
режим кодирования
Unix-to-Unix Encode
кодирование Unix-Unix
angularly encoded holograms
голограммы, записанные с различной угловой ориентацией
binary encoding
бинарное кодирование
color encoded holography
голографирование с цветовым кодированием
color-encoding filter
кодирующий светофильтр
compact encoding
компактное кодирование
companded encoding
нелинейное кодирование
concatenated encoding
каскадное кодирование
convolutional encoding
сверточное кодирование
data encoding
кодирование данных
differential encoding
дифференциальное кодирование
duobinary encoding
дуобинарное кодирование
encoded chromakey
рирпроекция по полному цветовому видеосигналу

Word forms

encode

verb
Basic forms
Pastencoded
Imperativeencode
Present Participle (Participle I)encoding
Past Participle (Participle II)encoded
Present Indefinite, Active Voice
I encodewe encode
you encodeyou encode
he/she/it encodesthey encode
Present Continuous, Active Voice
I am encodingwe are encoding
you are encodingyou are encoding
he/she/it is encodingthey are encoding
Present Perfect, Active Voice
I have encodedwe have encoded
you have encodedyou have encoded
he/she/it has encodedthey have encoded
Present Perfect Continuous, Active Voice
I have been encodingwe have been encoding
you have been encodingyou have been encoding
he/she/it has been encodingthey have been encoding
Past Indefinite, Active Voice
I encodedwe encoded
you encodedyou encoded
he/she/it encodedthey encoded
Past Continuous, Active Voice
I was encodingwe were encoding
you were encodingyou were encoding
he/she/it was encodingthey were encoding
Past Perfect, Active Voice
I had encodedwe had encoded
you had encodedyou had encoded
he/she/it had encodedthey had encoded
Past Perfect Continuous, Active Voice
I had been encodingwe had been encoding
you had been encodingyou had been encoding
he/she/it had been encodingthey had been encoding
Future Indefinite, Active Voice
I shall/will encodewe shall/will encode
you will encodeyou will encode
he/she/it will encodethey will encode
Future Continuous, Active Voice
I shall/will be encodingwe shall/will be encoding
you will be encodingyou will be encoding
he/she/it will be encodingthey will be encoding
Future Perfect, Active Voice
I shall/will have encodedwe shall/will have encoded
you will have encodedyou will have encoded
he/she/it will have encodedthey will have encoded
Future Perfect Continuous, Active Voice
I shall/will have been encodingwe shall/will have been encoding
you will have been encodingyou will have been encoding
he/she/it will have been encodingthey will have been encoding
Future in the Past Indefinite, Active Voice
I should/would encodewe should/would encode
you would encodeyou would encode
he/she/it would encodethey would encode
Future in the Past Continuous, Active Voice
I should/would be encodingwe should/would be encoding
you would be encodingyou would be encoding
he/she/it would be encodingthey would be encoding
Future in the Past Perfect, Active Voice
I should/would have encodedwe should/would have encoded
you would have encodedyou would have encoded
he/she/it would have encodedthey would have encoded
Future in the Past Perfect Continuous, Active Voice
I should/would have been encodingwe should/would have been encoding
you would have been encodingyou would have been encoding
he/she/it would have been encodingthey would have been encoding
Present Indefinite, Passive Voice
I am encodedwe are encoded
you are encodedyou are encoded
he/she/it is encodedthey are encoded
Present Continuous, Passive Voice
I am being encodedwe are being encoded
you are being encodedyou are being encoded
he/she/it is being encodedthey are being encoded
Present Perfect, Passive Voice
I have been encodedwe have been encoded
you have been encodedyou have been encoded
he/she/it has been encodedthey have been encoded
Past Indefinite, Passive Voice
I was encodedwe were encoded
you were encodedyou were encoded
he/she/it was encodedthey were encoded
Past Continuous, Passive Voice
I was being encodedwe were being encoded
you were being encodedyou were being encoded
he/she/it was being encodedthey were being encoded
Past Perfect, Passive Voice
I had been encodedwe had been encoded
you had been encodedyou had been encoded
he/she/it had been encodedthey had been encoded
Future Indefinite, Passive Voice
I shall/will be encodedwe shall/will be encoded
you will be encodedyou will be encoded
he/she/it will be encodedthey will be encoded
Future Perfect, Passive Voice
I shall/will have been encodedwe shall/will have been encoded
you will have been encodedyou will have been encoded
he/she/it will have been encodedthey will have been encoded