killer poke - определение. Что такое killer poke
Diclib.com
Словарь ChatGPT
Введите слово или словосочетание на любом языке 👆
Язык:

Перевод и анализ слов искусственным интеллектом ChatGPT

На этой странице Вы можете получить подробный анализ слова или словосочетания, произведенный с помощью лучшей на сегодняшний день технологии искусственного интеллекта:

  • как употребляется слово
  • частота употребления
  • используется оно чаще в устной или письменной речи
  • варианты перевода слова
  • примеры употребления (несколько фраз с переводом)
  • этимология

Что (кто) такое killer poke - определение

SOFTWARE MEANS OF CAUSING COMPUTER HARDWARE DAMAGE

killer poke         
A recipe for inducing hardware damage on a machine via insertion of invalid values (see poke) into a memory-mapped control register; used especially of various fairly well-known tricks on bitty boxes without hardware memory management (such as the IBM PC and Commodore PET) that can overload analog electronics in the monitor. See also HCF. (1994-11-04)
Killer poke         
In computer jargon, a killer poke is a method of inducing physical hardware damage on a machine or its peripherals by the insertion of invalid values, via, for example, BASIC's POKE command, into a memory-mapped control register. The term is typically used to describe a family of fairly well known tricks that can overload the analog electronics in the CRT monitors of computers lacking hardware sanity checking (notable examples being the IBM Portable and Commodore PET.
Killer         
WIKIMEDIA DISAMBIGUATION PAGE
Killer (band); Killer (song); KILLER; Killer (film); Killer (disambiguation); Killer (album)
·noun One who deprives of life; one who, or that which, kills.
II. Killer ·noun A voracious, toothed whale of the genus Orca, of which several species are known.

Википедия

Killer poke

In computer jargon, a killer poke is a method of inducing physical hardware damage on a machine or its peripherals by the insertion of invalid values, via, for example, BASIC's POKE command, into a memory-mapped control register. The term is typically used to describe a family of fairly well known tricks that can overload the analog electronics in the CRT monitors of computers lacking hardware sanity checking (notable examples being the IBM Portable and Commodore PET.)