英语人>网络例句>area code 相关的网络例句
area code相关的网络例句

查询词典 area code

与 area code 相关的网络例句 [注:此内容来源于网络,仅供参考]

The traditional software that reduce toxin is with the feature code means reduces toxin, diagnostic code takes virus example former course namely, put forward a paragraph of of similar dactylogram unique code in the program, add in the software that reduce toxin, scan next all files, if have yard of this paragraph of feature, it is virus, can be killed.

传统杀毒软件都是以特征码方式杀毒,特征码即把病毒样本原程序拿到,提出程序中类似指纹的一段独一无二的代码,加到杀毒软件中,然后扫描所有文件,如果有这段特征码,就是病毒,即可被杀掉。

According to using easy company network safe expert introduces: According to the frangibility of Web application process that OWASP organization released 2007 the statistical result of 10 big ranks makes clear, the flaw of the script that cross a station, infuse, request that cross a station is forged, information divulges the problem that waits for a respect to remain the hacker's at present popular attack way, and be atttacked with SQL infuse especially among them and cross station script attack to attach most importance to, the lawful sex that infuse of so called SQL is atttacked even if uses programmer to do not have pair of user data-in when writing code undertakes judging, bring about the person that inbreak to be able to command through insert and carrying out baleful SQL, obtain data to read the attributive; that take and revises and attack of the script that cross a station is join baleful code through be in the webpage, when the person that visit browses a webpage, the administrator of means prevail on that baleful code can be carried out or ceases through giving an administrator post a letter is browsed, win administrator limits of authority thereby, control whole website.

据动易公司网络安全专家介绍:根据2007年 OWASP 组织发布的 Web 应用程序脆弱性10大排名的统计结果表明,跨站脚本、注入漏洞、跨站请求伪造、信息泄露等方面的问题仍然是现在黑客流行的攻击方式,而其中尤以SQL注入攻击和跨站脚本攻击为重,所谓的SQL注入攻击就是利用程序员在编写代码时没有对用户输入数据的合法性进行判定,导致入侵者可以通过插入并执行恶意SQL命令,获得数据读取和修改的权限;而跨站脚本攻击则是通过在网页中加入恶意代码,当访问者浏览网页时,恶意代码会被执行或者通过给治理员发信息的方式诱使治理员浏览,从而获得治理员权限,控制整个网站。

One is the Extended Binary Coded Decimal Interchange Code.This code is used in IBM mainframe models and in similar machines produced by other manufactures.The other 8-bit code is ASCII-8,an 8-bit version of ASCII that is frequently used in the larger machines produced by some vendors.Fig. 1-6 presents the 8-bit format and shows how selected characters are represented in these 8-bit codes.

一种是扩展的二-十进制交换码,该编码用于IBM大型计算机及其他厂家生产的类似机器中;另一种8位编码是ASCII-8,是ASCII代码8位格式,常用于一些厂商生产的较大机器中。8位编码的格式及如何表示所选字符如图1-6所示。

Four full adder original code, including the simulation code and four counter code.

4位全加器原码,包括仿真码和4位计数器码。

When the generator polynomial of a given linear rank distance code possesses generalized continuous roots set, the sufficient condition that makes the given linear rank distance code forming rank distance BCH code is discussed.

他们指出当线性秩距离码的生成多项式的根集不是连续根集时,确定秩距离码的最小秩距离以及构做极大秩距离码是未解决的问题。

The symbol bar code reading, there are two rectangular in shape, bar code symbol, optical scanner line graphics information drdw systems'dominant is the bar code symbol to read and and recognition.

条码识读的标记有两栽,条码标记为不幼不圆形线条图形,平教扫描器的新闻读不入编制次给就是差这些条码标记举动浏览和和辨别。

And we have given Hadamard matrix in detail in block design, coding and the specific application in communication., Hadamard code as a nonlinear combinatorial code has catered to the need of development of computer technology, stock systematic data and high speed for realizing and reliable access, request the error control code has not only little redundancy, but also can parallel encoding and decoding with high speed.

Hadamard码作为一种非线性组合码,迎合了计算机技术的发展对实现存储系统数据高速且可靠地存取,要求所采用的差错控制码不但冗余度小,还应当能高速并行编码和译码的需要。

We've written the code to accept the user's name and password, the code to hash and verify passwords, and the code to create and manage users.

这些程序被用来接受用户的用户名以及密码,而后对其做出HASH运算并验证其密码,并最终创建并管理用户。

Mainly in a method of the lattice vector quantifying coding and decoding, a new basic code book is selected out and directly or indirectly comprises all points whose value is less than or equal to 3 of any dimension in a RE point set, and points on a fourth grade hypersphere in the basic code book are all odd points so that part of nearest adjoint point values can be comprised in the basic code book only via corresponding odd number processing.

一种格矢量量化编解码的实现方法及装置,其主要是在格矢量量化编码方案中,选定新的基础码本,在该基础码本中直接或间接地包含了RE 8 点集中任意维的数值小于等于3的所有点,且该基础码本中的第4级超球面上的点全部为奇数点,以使得部分的最近邻点数值仅经过相应的奇数化处理便可以包含于基础码本中。

The random code, RS error correction code and convolution interleave code are realized.

其中,RS采用的优化快速译码、卷积交织的寻址计算方法、算法的合理优化,大大提高了编解码器的运行速度和系统性能。

第15/500页 首页 < ... 11 12 13 14 15 16 17 18 19 ... > 尾页
相关中文对照歌词
Episodes
Area Code 229
North Memphis Area
I Solemnly Swear
Grey Area
Area
Hacker
Code 4 Love
Rebel Code
Clear The Area
推荐网络例句

These rules reflect some inherent feature of self and nonself, and they are the basic detection criterion of GECISM.

这些规则反映了"自我"和"非我"的内在特征,是GECISM进行"非我"检测的判据。

Until today, the media from China and the outside world still uses the term "Post 89". Regardless to whether it is for commercial gimmick or convenience, everybody still remember "Post 89", a term which carries a strong Cantonese accent.

时至今日,国内外艺术媒体还是在沿用&后八九&这个称谓,不管当初是为了商业噱头还是容易上口好记,反正大家现在是记住了&后八九&这个广东口音很重的词。

In just a span of three months, we have made interviews with over 20 community characters, enriching the show as a real community radio program.

在短短三个多月,我们已访问介绍过社区中超过二十多人,让「同声同路人」成为一个丰富华人社区生活的电台节目。